{"title":"基于级联多模混沌逻辑映射的ML-I-NOMA图像传输物理层安全性","authors":"E. Hagras, A. Zein El-Din","doi":"10.21608/ijt.2021.266225","DOIUrl":null,"url":null,"abstract":": In this paper, a new cascaded multi modular chaotic logistic map (CMM-CLM) is proposed. The bifurcation diagram for the proposed CMM-CLM is very complex and it has strong chaos properties. The strong chaos leads to a very high Lyapunov exponent values. Based on the proposed CMM-CLM, a new robust physical layer security for the interleaved NOMA based on the multilayers concept (ML-I-NOMA) with the iterative de-coder has been introduced. The analysis of the proposed ML-I-NOMA cryptosystem is studied in the both encrypted and non-encrypted image transmission. The main contribu-tion of this paper is to prove that, the different layer effect has a slight performance change compared with the bandwidth consumption. Finally, the simulation results clarified that, the proposed MLI-NOMA achieves 50% and 75% bandwidth efficiency at 2 and 4 layers with an excellent visual quality metric in the correct detection. In addition, the security analysis reveals that, the proposed ML-I-NOMA cryptosystem has large key space and good key sensitivity, and its entropy approaches to the idea value. Hence, the proposed ML-I-NOMA cryptosystem based on the CMM-CLM can strongly resist traditional cipher attacks.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"1 1","pages":""},"PeriodicalIF":0.4000,"publicationDate":"2021-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Physical Layer Security Based on Cascaded Multi-Modular Chaotic Logistic Map for ML-I-NOMA Image Transmission\",\"authors\":\"E. Hagras, A. Zein El-Din\",\"doi\":\"10.21608/ijt.2021.266225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": In this paper, a new cascaded multi modular chaotic logistic map (CMM-CLM) is proposed. The bifurcation diagram for the proposed CMM-CLM is very complex and it has strong chaos properties. The strong chaos leads to a very high Lyapunov exponent values. Based on the proposed CMM-CLM, a new robust physical layer security for the interleaved NOMA based on the multilayers concept (ML-I-NOMA) with the iterative de-coder has been introduced. The analysis of the proposed ML-I-NOMA cryptosystem is studied in the both encrypted and non-encrypted image transmission. The main contribu-tion of this paper is to prove that, the different layer effect has a slight performance change compared with the bandwidth consumption. Finally, the simulation results clarified that, the proposed MLI-NOMA achieves 50% and 75% bandwidth efficiency at 2 and 4 layers with an excellent visual quality metric in the correct detection. In addition, the security analysis reveals that, the proposed ML-I-NOMA cryptosystem has large key space and good key sensitivity, and its entropy approaches to the idea value. Hence, the proposed ML-I-NOMA cryptosystem based on the CMM-CLM can strongly resist traditional cipher attacks.\",\"PeriodicalId\":42285,\"journal\":{\"name\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2021-12-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21608/ijt.2021.266225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Interdisciplinary Telecommunications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/ijt.2021.266225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Physical Layer Security Based on Cascaded Multi-Modular Chaotic Logistic Map for ML-I-NOMA Image Transmission
: In this paper, a new cascaded multi modular chaotic logistic map (CMM-CLM) is proposed. The bifurcation diagram for the proposed CMM-CLM is very complex and it has strong chaos properties. The strong chaos leads to a very high Lyapunov exponent values. Based on the proposed CMM-CLM, a new robust physical layer security for the interleaved NOMA based on the multilayers concept (ML-I-NOMA) with the iterative de-coder has been introduced. The analysis of the proposed ML-I-NOMA cryptosystem is studied in the both encrypted and non-encrypted image transmission. The main contribu-tion of this paper is to prove that, the different layer effect has a slight performance change compared with the bandwidth consumption. Finally, the simulation results clarified that, the proposed MLI-NOMA achieves 50% and 75% bandwidth efficiency at 2 and 4 layers with an excellent visual quality metric in the correct detection. In addition, the security analysis reveals that, the proposed ML-I-NOMA cryptosystem has large key space and good key sensitivity, and its entropy approaches to the idea value. Hence, the proposed ML-I-NOMA cryptosystem based on the CMM-CLM can strongly resist traditional cipher attacks.
期刊介绍:
The International Journal of Interdisciplinary Telecommunications and Networking (IJITN) examines timely and important telecommunications and networking issues, problems, and solutions from a multidimensional, interdisciplinary perspective for researchers and practitioners. IJITN emphasizes the cross-disciplinary viewpoints of electrical engineering, computer science, information technology, operations research, business administration, economics, sociology, and law. The journal publishes theoretical and empirical research findings, case studies, and surveys, as well as the opinions of leaders and experts in the field. The journal''s coverage of telecommunications and networking is broad, ranging from cutting edge research to practical implementations. Published articles must be from an interdisciplinary, rather than a narrow, discipline-specific viewpoint. The context may be industry-wide, organizational, individual user, or societal. Topics Covered: -Emerging telecommunications and networking technologies -Global telecommunications industry business modeling and analysis -Network management and security -New telecommunications applications, products, and services -Social and societal aspects of telecommunications and networking -Standards and standardization issues for telecommunications and networking -Strategic telecommunications management -Telecommunications and networking cultural issues and education -Telecommunications and networking hardware and software design -Telecommunications investments and new ventures -Telecommunications network modeling and design -Telecommunications regulation and policy issues -Telecommunications systems economics