Zhao Li;Lijuan Zhang;Siwei Le;Kang G. Shin;Jia Liu;Zheng Yan
{"title":"利用IRS实现安全通信的分布式调制","authors":"Zhao Li;Lijuan Zhang;Siwei Le;Kang G. Shin;Jia Liu;Zheng Yan","doi":"10.1109/TMC.2025.3579960","DOIUrl":null,"url":null,"abstract":"Due to the broadcast nature of wireless communications, users’ data transmitted wirelessly is susceptible to security/privacy threats. The conventional modulation scheme “loads” all of the user’s transmitted information onto a physical signal. Then, as long as an adversary overhears and processes the signal, s/he may access the user’s information, hence breaching communication privacy. To counter this threat, we propose <bold>IRS-DMSC</b>, a <italic>Distributed Modulation based Secure Communication</i> (DMSC) scheme by exploiting <italic>Intelligent Reflecting Surface</i> (IRS). Under IRS-DMSC, two sub-signals are employed to realize legitimate data transmission. Of these two signals, one is directly generated by the legitimate transmitter (Tx), while the other is obtained by modulating the phase of the direct signal and then reflecting it at the IRS in an indirect way. Both the direct and indirect signal components superimpose on each other at the legitimate receiver (Rx) to produce a waveform identical to that obtained under traditional centralized modulation (CM), so that the legitimate Rx can employ the conventional demodulation method to recover the desired data from the received signal. IRS-DMSC incorporates the characteristics of wireless channels into the modulation process, and hence can fully exploit the randomness of wireless channels to enhance transmission secrecy. However, due to the distribution and randomization of legitimate transmission, it becomes difficult or even impossible for an eavesdropper to wiretap the legitimate user’s information. Furthermore, in order to address the problem of decoding error incurred by the difference of two physical channels’ fading, we develop <italic>Relative Phase Calibration</i> (RPC) and <italic>Constellation Point Calibration</i> (CPC), to improve decoding correctness at the legitimate Rx. Our method design, experiment, and simulation have shown the proposed IRS-DMSC to prevent eavesdroppers from intercepting legitimate information while maintaining good performance of the legitimate transmission.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 10","pages":"11193-11208"},"PeriodicalIF":9.2000,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Distributed Modulation Exploiting IRS for Secure Communications\",\"authors\":\"Zhao Li;Lijuan Zhang;Siwei Le;Kang G. Shin;Jia Liu;Zheng Yan\",\"doi\":\"10.1109/TMC.2025.3579960\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the broadcast nature of wireless communications, users’ data transmitted wirelessly is susceptible to security/privacy threats. The conventional modulation scheme “loads” all of the user’s transmitted information onto a physical signal. Then, as long as an adversary overhears and processes the signal, s/he may access the user’s information, hence breaching communication privacy. To counter this threat, we propose <bold>IRS-DMSC</b>, a <italic>Distributed Modulation based Secure Communication</i> (DMSC) scheme by exploiting <italic>Intelligent Reflecting Surface</i> (IRS). Under IRS-DMSC, two sub-signals are employed to realize legitimate data transmission. Of these two signals, one is directly generated by the legitimate transmitter (Tx), while the other is obtained by modulating the phase of the direct signal and then reflecting it at the IRS in an indirect way. Both the direct and indirect signal components superimpose on each other at the legitimate receiver (Rx) to produce a waveform identical to that obtained under traditional centralized modulation (CM), so that the legitimate Rx can employ the conventional demodulation method to recover the desired data from the received signal. IRS-DMSC incorporates the characteristics of wireless channels into the modulation process, and hence can fully exploit the randomness of wireless channels to enhance transmission secrecy. However, due to the distribution and randomization of legitimate transmission, it becomes difficult or even impossible for an eavesdropper to wiretap the legitimate user’s information. Furthermore, in order to address the problem of decoding error incurred by the difference of two physical channels’ fading, we develop <italic>Relative Phase Calibration</i> (RPC) and <italic>Constellation Point Calibration</i> (CPC), to improve decoding correctness at the legitimate Rx. Our method design, experiment, and simulation have shown the proposed IRS-DMSC to prevent eavesdroppers from intercepting legitimate information while maintaining good performance of the legitimate transmission.\",\"PeriodicalId\":50389,\"journal\":{\"name\":\"IEEE Transactions on Mobile Computing\",\"volume\":\"24 10\",\"pages\":\"11193-11208\"},\"PeriodicalIF\":9.2000,\"publicationDate\":\"2025-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Mobile Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11036685/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Mobile Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11036685/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Distributed Modulation Exploiting IRS for Secure Communications
Due to the broadcast nature of wireless communications, users’ data transmitted wirelessly is susceptible to security/privacy threats. The conventional modulation scheme “loads” all of the user’s transmitted information onto a physical signal. Then, as long as an adversary overhears and processes the signal, s/he may access the user’s information, hence breaching communication privacy. To counter this threat, we propose IRS-DMSC, a Distributed Modulation based Secure Communication (DMSC) scheme by exploiting Intelligent Reflecting Surface (IRS). Under IRS-DMSC, two sub-signals are employed to realize legitimate data transmission. Of these two signals, one is directly generated by the legitimate transmitter (Tx), while the other is obtained by modulating the phase of the direct signal and then reflecting it at the IRS in an indirect way. Both the direct and indirect signal components superimpose on each other at the legitimate receiver (Rx) to produce a waveform identical to that obtained under traditional centralized modulation (CM), so that the legitimate Rx can employ the conventional demodulation method to recover the desired data from the received signal. IRS-DMSC incorporates the characteristics of wireless channels into the modulation process, and hence can fully exploit the randomness of wireless channels to enhance transmission secrecy. However, due to the distribution and randomization of legitimate transmission, it becomes difficult or even impossible for an eavesdropper to wiretap the legitimate user’s information. Furthermore, in order to address the problem of decoding error incurred by the difference of two physical channels’ fading, we develop Relative Phase Calibration (RPC) and Constellation Point Calibration (CPC), to improve decoding correctness at the legitimate Rx. Our method design, experiment, and simulation have shown the proposed IRS-DMSC to prevent eavesdroppers from intercepting legitimate information while maintaining good performance of the legitimate transmission.
期刊介绍:
IEEE Transactions on Mobile Computing addresses key technical issues related to various aspects of mobile computing. This includes (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies. Topics of interest span a wide range, covering aspects like mobile networks and hosts, mobility management, multimedia, operating system support, power management, online and mobile environments, security, scalability, reliability, and emerging technologies such as wearable computers, body area networks, and wireless sensor networks. The journal serves as a comprehensive platform for advancements in mobile computing research.