Available via license: CC BY 4.0
Content may be subject to copyright.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
1
Artificially Time-Varying Differential MIMO
for Achieving Practical Physical Layer Security
Naoki Ishikawa (Member, IEEE), Jehad M. Hamamreh (Member, IEEE), Eiji Okamoto (Member, IEEE),
Chao Xu (Senior Member, IEEE), and Lixia Xiao (Member, IEEE).
In this paper, we propose a differential multiple-input multiple-output (MIMO) scheme based on the novel concept of chaos-based
time-varying unitary matrices to demonstrate—for the first time in the literature—the ability of differential encoding in achieving
practical physical layer security even without the need for using channel estimation. In the proposed scheme, an erroneous secret
key, which is extracted from the wireless nature, is used to initialize a chaos sequence that is responsible for generating artificially
time-varying unitary matrices capable of obfuscating the transmitted data symbols from illegitimate eavesdroppers. Contrary to
conventional studies, the key agreement ratio in this study is assumed to be imperfect, which is often true and very realistic in
high-mobility scenarios. Following this, we conceive a new calibration algorithm for reconciling the chaotic sequence generated at
the legitimate parties, thus making this calibration algorithm a unique, novel solution to the key sharing problem of conventional
chaos-based communication techniques, which has been overlooked over the past few decades. It is found out that differential
encoding obviates additional complexity and insecurity in dealing with channel estimation, whereas an eavesdropper must tackle
the complicated differentially encoded patterns, which have an exponentially increasing complexity order. In addition, the obtained
simulation results demonstrate that the proposed scheme can outperform conventional chaos-based MIMO schemes that assume
perfect channel knowledge.
Index Terms—MIMO, differential modulation, differential space-time block codes, physical layer security, physical layer encryption,
chaos theory, phase ambiguity, constrained capacity, secrecy rate, security gap.
I. INT ROD UC TI ON
RADIO waves can propagate over long distances. Even
a low-power signal that is transmitted by a household
Wi-Fi device can reach as far as 100 meters if a line of
sight path is present [1]. In public Wi-Fi networks, it is easy
for eavesdroppers to obtain standardized 802.11 frames and
retrieve private information streams [2–4]. Because the private
information is encrypted in the transport layer, we feel safe
using wireless network, but this security is not guaranteed
forever. For example, the widely used public-key encryption
method, RSA [5], has been threatened by the invention of
Shor’s algorithm [6], which performs integer factoring in
polynomial time using a quantum computer [7]. Therefore, it is
necessary to invent practical wireless communication method
in the physical layer that reinforces security.
Operational wireless systems generally rely on encryption-
based methods to secure communications, where a secret
key is exchanged in advance. Physical layer communication
schemes that require a perfect secret key are classifiable
into the physical layer encryption (PLE) category [8]. As a
N. Ishikawa is with the Faculty of Engineering, Yokohama National
University, 240-8501 Kanagawa, Japan (e-mail: ishikawa-naoki-fr@ynu.ac.jp).
J. M. Hamamreh is with the Department of Electrical and Electronics
Engineering, Antalya Bilim University, 07468 Antalya, Turkey (e-mail: je-
had.hamamreh@gmail.com). E. Okamoto is with the Department of Electrical
and Mechanical Engineering, Nagoya Institute of Technology, 466-8555
Nagoya, Japan. (e-mail: okamoto@nitech.ac.jp). C. Xu is with the School of
Electronics and Computer Science, University of Southampton, Southampton
SO17 1BJ, U.K. (e-mail: cx1g08@ecs.soton.ac.uk). L. Xiao is with the Wuhan
National Laboratory for Optoelectronics, Huazhong University of Science
and Technology, Wuhan 430074, China. (e-mail: lixiaxiao@hust.edu.cn). The
work of N. Ishikawa was supported in part by the Japan Society for the
Promotion of Science (JSPS) KAKENHI under Grant No. 19K14987. The
work of J. M. Hamamreh was supported in part by the Scientific and
Technological Research Council of Turkey (TUBITAK) under Grant No.
119E392. The work of L. Xiao was supported in part by the National Science
Foundation of China under Grant No. 62001179.
pioneering PLE study, Dedieu et al. proposed a seminal chaos-
based communication system [9], designated as chaos shift
keying (CSK). The original CSK system of [9] was proposed
for wired communications using Chua’s analog circuit, which
generates a chaotic carrier. Based on this CSK philosophy [9],
Okamoto et al. proposed the chaos MIMO technique [10–13].
This technique generates a Gaussian-distributed constellation
that is difficult to perceive and eavesdrop because the Gaussian
symbols are naturally hidden by additive Gaussian noise.
Furthermore, the chaos MIMO arrangement obtains channel
coding gain by exploiting a unique chaos modulation structure.
In parallel, Kaddoum et al. proposed the MIMO-CSK concept
[14] for a 2×2setup, where chaos is used to spread data
symbols. Note that all the above chaos-based schemes [10–
14] require precise estimates of channel state information
(CSI). The estimation of CSI imposes potential risk as the
eavesdropper may use pilot symbols to synchronize received
signals and obtain accurate CSI between the transmitter and
the eavesdropper [15, 16].
Key-based encryption techniques that rely on computational
security may be cracked by future supercomputers [8, 17, 18].
In order to overcome this limitation, physical layer security
(PLS) methods that frequently update private keys have been
conceived [19], which rely on the true randomness of wireless
channels. The information-theoretic foundation of secret-key
agreement in public channels was first established by Maurer
and Wolf [20–22]. Most of secret-key agreement or generation
methods require the assumptions of time division duplex
(TDD) channel reciprocity and near-perfect CSI [23–25].
The strong assumptions on CSI have hindered the industrial
applications of PLS [26]. When considering realistic CSI
errors, the key agreement ratio between legitimate parties is
far from perfect in practice [27–29]. Hence, it is a challenging
task to achieve the key agreement ratio of 100% in high-
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
2
mobility scenarios. A long-overlooked problem here is that
this erroneous key cannot be used for all the conventional
encryption methods. To improve the key agreement ratio,
the legitimate parties have to exchange thousands of probe
symbols [27]. We have to eliminate this channel estimation
process because it increases both the communication overhead
and risk.
The classic differential MIMO can eliminate the channel
estimation process [30, 31]. The pioneering scheme [30]
established in the early 2000s relies on square unitary ma-
trices. By contrast, in 2017, a new approach of nonsquare
differential MIMO [32–36] was proposed. This new approach
maps the classic unitary matrix to a nonsquare matrix, which
benefically improves the transmission rate linearly. Because
of the differential structure, the resultant constellation might
reach an infinite cardinality [37–39]. This structure is naturally
useful for improving the wireless communication security.
Nevertheless, no report of the relevant literature has described
a study of the differential MIMO in the context of both PLE
and PLS.1
Against this background, we propose a chaos-based differ-
ential MIMO system that is free from the additional complex-
ity and insecurity of dealing with channel estimation. More
explicitly, the data-carrying matrices are obfuscated using
a specially designed artificially time-varying unitary matrix
concept, which is generated by a chaos sequence. Unlike
the conventional chaos-based PLE family [10–14, 40–43],
our proposed system extracts a noisy key from the wireless
channel, which is used as the initial condition of a chaos
sequence. Following this invention, a low-complexity chaos
calibration is conceived to continue estimation of the original
chaos sequence. We also conceive a simple real-valued key
generation method and analyze the minimum security level
achieved by the proposed system.
The major contributions of this paper are summarized in
twofold.
1) Our proposed scheme is the first chaos-based scheme
that is free from key establishment in advance. All of the
schemes of the conventional chaos-based family must
rely on the perfect pre-shared key because the chaos
sequence is sensitive to error. For example, the small
error of 2−1022 added to the initial condition causes
mismatches between the legitimate parties.2We resolve
this issue by conceiving a chaos calibration algorithm
that updates a chaos sequence at the receiver. This
calibration process can be interpreted as information
reconciliation of a chaotic sequence. The advantage of
this process is that there is no additional overhead be-
cause the reconciliation is performed using data matrices
instead of transmitting probe signals.
2) We prove and reveal for the first time that the classic
differential encoding is suitable for achieving practi-
1The differential counterpart of MIMO-CSK [40] has also been proposed
for the synchronizing a chaos sequence both at a transmitter and receiver.
However, it is noteworthy that the term differential differs from the classic
modulation definition, as described in Section III-B.
22−1022 is the absolute minimum of a 64-bit floating point number, which
is specified by IEEE 754.
cal PLS. The security level depends on the length of
differentially encoded matrices. This special encoding
expands the search space exponentially. Most existing
PLS methods assume perfect knowledge of CSI both at
transmitter and receiver, which is impractical in high-
mobility scenarios. We resolve this CSI issue by the
nonsquare differential structure, which mitigates both the
communication overhead and risk.
We must report that the proposed arrangement also has the
following shortcomings, as discussed in Section VI.
1) For a case in which the eavesdropper is in the same
position as the legitimate receiver, the proposed scheme
cannot provide security because the eavesdropper would
have a near-perfect estimate of the channel coefficients
between the legitimate transmitter and receiver. In this
case, the legitimate user can physically eliminate the
eavesdropping device or can halt secret communications.
2) Despite the fact that the search space is increased expo-
nentially because of the employment of differential en-
coding, the proposed scheme might become susceptible
to a brute-force attack when the length of differentially
encoded matrices is short. In this unrealistic case, an
eavesdropper having perfect channel state information
(PCSI) can obtain a part of private information.
The remainder of this paper is organized as follows. Sec-
tion II defines the common system model used for this study.
Section III reviews the classic chaos theory and the conven-
tional chaos-based MIMO schemes. Section IV proposes our
chaos-based differential MIMO that relies on the novel time-
varying basis and the calibration algorithm. Section V presents
an attack algorithm for the proposed scheme. Section VI
demonstrates the performance superiority over conventional
schemes in terms of secrecy rate and reliability. Finally,
Section VII concludes this paper.
We note that italicized symbols represent scalar values. Bold
symbols represent vectors and matrices. Table I presents a list
of mathematical symbols used for this study.
II. SY ST EM MO DE L
This section presents a description of a general system
model common to Sections III and IV. Without loss of
generality, a narrow-band system model is considered in this
paper, but extension to the wide-band scenario in the context
of orthogonal frequency division multiplexing (OFDM) is
straightforward.3
We assume that the legitimate transmitter, Alice, is equipped
with Mantennas, whereas the legitimate receiver, Bob, is
equipped with Nantennas. Additionally, we assume that
eavesdropper Eve has unlimited capabilities of computers,
such as cloud-based computing resources and supercomputers.
The received signal block at Bob is given as [44]
Y(i) = H(i)S(i) + V(i)∈CN×M,(1)
3Note that the nonsquare differential coding described later is particularly
suitable for high-mobility OFDM scenarios [33, 34].
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
3
TABLE I
LIS T OF IM PO RTANT M ATHEM ATIC AL SY MB OLS
BBinary numbers
RReal numbers
CComplex numbers
ZIntegers
M∈ZNumber of transmit antennas
N∈ZNumber of receive antennas
T∈ZNumber of time slots in a codeword
W∈ZFrame length
D∈ZNumber of data-carrying codewords (= W−M)
B∈ZInput bitwidth
R∈RTransmission rate
Reff ∈REffective transmission rate
Y∈ZNon-zero integer value that determines security
Y(i)∈CN×TBob’s received signal block
H(i)∈CN×MBob’s channel matrix
V(i)∈CN×TBob’s additive noise
YE(i)∈CN×TEve’s received signal block
HE(i)∈CN×MEve’s channel matrix
VE(i)∈CN×TEve’s additive noise
S(i)∈CM×TSpace-time codeword
X(i)∈CM×MSpace-time codeword
˜
S(i)∈CM×MUnitary space-time codeword
E1(i)∈CM×1Square-to-nonsquare projection
W1∈CM×1First column of DFT matrix
ˆ
Y(i)∈CN×MEstimation of H(i)˜
S(i)
b∈BBB-length input bits
σ2
v∈RNoise variance
ϵe∈RAccuracy of shared real-valued keys
ρ∈RChannel correlation coefficient
n∈ZBitwidth of a floating-point number
i∈ZTransmission index (≤W)
h, h′∈CSingle channel coefficient
α(i)∈RForgetting factor
xi∈RPure chaos solution
ˆxi∈RCalibrated counterpart of xi
xt
i, xr
i∈Rxiat transmitter and receiver
x′
i∈RSecond-order Chebyshev polynomial function
yi∈RChaos sequence having a uniform distribution
ˆyi∈RCalibrated counterpart of yi
where irepresents a transmission index, H(i)∈CN×M
denotes a channel matrix that obeys the i.i.d. Rayleigh fad-
ing CN(0,1), and S(i)∈CM×Tstands for a space-time
codeword. The codeword S(i)is transmitted by Mantennas
over Ttime slots. Specific construction methods for S(i)
and the corresponding detectors are described in Sections III
and IV. Furthermore, the additive noise V(i)is assumed to
follow the i.i.d. complex Gaussian distribution, CN(0, σ2
v).
The signal-to-noise ratio (SNR) is calculated as 1/σ2
v, i.e.,
10 ·log10(1/σ2
v)[dB] because we have the power constraint
of Ei∥S(i)∥2
F/T = 1. The transmission index starts from
i= 1 and finishes at a frame length i=W. After extracting
a new private key from the channel, it restarts from i= 1.
Similar to Bob, the received signal block at Eve is given as
YE(i) = HE(i)S(i) + VE(i)∈CN×M,(2)
where Eve’s channel matrix is defined as
HE(i) = ρH(i) + p1−ρ2H′(i),(3)
and H′(i)is an independent channel matrix following
CN(0,1). Here, the channel correlation ρrepresents the sim-
ilarity between the Alice–Bob channel H(i)and the Alice–
Eve channel HE(i). When Eve is near Bob, ρis close to 1.
Eve’s channel matrix HE(i)becomes similar to Bob’s channel
matrix H(i).
In this paper, we model calculation complexity based on
Donald Knuth’s big Omega Ω(·)notation [45], which repre-
sents an asymptotic lower bound. Conventional studies [44]
often only evaluate the total number of real-valued mul-
tiplications. They ignore other operations such as division
and elementary functions, which are as costly as multi-
plication. This asymptotic analysis is useful for estimating
the implementation complexity and power consumption of
circuits [44, 46]. According to [47], the addition and sub-
traction cost Ω(n), where nis the bitwidth of a floating-
point number. The multiplication costs Ω(nlog n), while the
division costs Ω(nlog nlog n). The square root operation √·
costs Ω(nlog n). The elementary functions such as exp(·),
arcsin(·), and arctan(·)cost Ω(nlog nlog n). For example,
the complexity of (a+bj)(a′+b′j)for a, b, a′, b′∈R
is calculated as 4nlog n+ 4n≥Ω(nlog n). The calcula-
tion of H(i)S(i)costs N T (4Mn log n+ 2(M−1)n)≥
Ω(N T M n log n).
III. CON VE NT IO NAL CH AOS TH EO RY AN D ITS
APP LI CATI ON S TO MIMO
Since 1993, chaos theory has been applied to wireless com-
munications for enhancing security [9–15, 41–43]. Although
a chaotic mathematical model is deterministic, it is sensitive
to initial conditions. Moreover, it is almost impossible to
predict future trajectory. This sensitivity can be quantified
by the Lyapunov exponent [48]. Additionally, the chaotic
sequence is bounded within a region and is non-periodic.
Therefore, the initial condition works as a secret key for secure
communications.
In von Neumann’s seminal study [49], the logistic map
xi+1 = 4xi(1 −xi)(4)
is used to generate a random digit. The initial condition x0
must be 0< x0<1. The chaotic sequence of (4) is called
a pure chaos solution. Its Lyapunov exponent is calculated as
loge(2) ≈0.6931, which is higher than the value of 0.0714
[48] of the simplified Rossler equation [50]. The probabilistic
distribution of xiis a non-uniform function of [49]
p(x) = 1
πpx(1 −x),(5)
which differs from a uniform distribution. Because the exact
solution of (4) is given as [51]4
xi= sin22iarcsin(√x0):= f(i, x0),(6)
the chaotic sequence of xican be transformed into a uniform
distribution as [51]
yi=2
πarcsin (√xi),(7)
where we have the uniform distribution of p(y)=1for 0<
y < 1.
4This equation might overflow because of the calculation of 2i. For our
simulations, we calculate f(i, x)in a recursive manner, i.e., f(0, x) = xand
f(i, x)=4f(i−1, x)(1 −f(i−1, x)).
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
4
0 5 10 15 20 25
Index i
0.0
0.2
0.4
0.6
0.8
1.0
Chaos transition xi
Fig. 1. Chaos transition xiover time, for which the initial values of x0=
0.24,x0+ 10−6, and x0+ 10−3were considered.
As a simple example, Fig. 1 portrays the transition of xi,
defined in (4), where the index is increased from i= 0 to 25.
Three initial values were considered as shown in Fig. 1: x0=
0.24,0.24 + 10−3and 0.24 + 10−6. As shown in Fig. 1, both
the initial values x0= 0.24 and 0.24 + 10−6caused almost
identical xifor 0≤i≤13, whereas both sequences exhibited
significantly different transitions for i > 13. In the x0+ 10−3
case, it exhibited different transitions for i > 4. Therefore, the
accuracy of the initial value determines the agreement interval
of the chaos sequence. Based on this fact, we propose a new
practical calibration algorithm in Section IV-F.
A. MIMO-CSK [14]
The MIMO-CSK scheme of [14] uses the second-order
Chebyshev polynomial function of
x′
i= 1 −2x′2
i−1,(8)
where the initial condition x′
0must be within [−1,1]. It is
noteworthy that the mean of x′
iis zero. The variance is 0.5.
The original contribution of [14] considers the direct sequence
spread spectrum instead of OFDM. The chaotic sequence of
(8) is used as a spread sequence over the time domain. The
spreading factor is varied from β= 2 to 50 in [14]. As
described in this paper, we limit the spreading factor to β= 1
for simplicity.5In this case, the 2×2space-time matrix is
generated by S(i) = P(i)X(i)[14], where we have
P(i) = √2·diag(x′
2i, x′
2i+1)(9)
and the orthogonal space-time block code (OSTBC) of [52]
X(i) = 1
√2s1(i)−s∗
2(i)
s2(i)s∗
1(i).(10)
Here, s1(i)and s2(i)denote complex-valued symbols with
L-ary phase-shift keying (PSK) or quadrature amplitude mod-
ulation (QAM). The transmission rate of (10) is R= log2(L).
5As one might expect, this limitation worsens performance. Although
MIMO-CSK is the product of an important pioneering study, it is not a
performance baseline.
Note that the mean transmission power is calculated as
Eih∥S(i)∥2
Fi/T = 2/2=1, which is the same as in other
MIMO techniques. The maximum-likelihood detector is given
as
ˆ
X(i) = arg min
X∥Y(i)−H(i)P(i)X∥2
F,(11)
where the chaotic sequence diag(x′
2i, x′
2i+1)is known per-
fectly at the receiver with no noise.
Although the original contributions of [14] considered only
the M= 2 case, it can be extended to the M > 2cases as
S(i) = P(i)X(i),(12)
where we have
P(i) = √2·diag(x′
i·M, x′
i·M+1,··· , x′
i·M+M−1)(13)
and an M×Mdata-carrying matrix X(i). We must multiply
√2in (13) for any Mbecause the variance of x′
iis 0.5. For
example, the Bell Laboratories layered space-time scheme [53]
is defined as X(i) = [s1(i)s2(i)·· · sM(i)]T/√M∈CM×1.
In the OSTBC case having M= 4, the data-carrying matrix
is given as [54]
X(i) = 1
√2
s1(i)−s∗
2(i) 0 0
s2(i)s∗
1(i) 0 0
0 0 s1(i)−s∗
2(i)
0 0 s2(i)s∗
1(i)
.(14)
The transmission rate of (14) is R= log2(L)/2. Following
the complexity model described in Section II, the detection
complexity of (11) is lower bounded by Ω(2RNM n log n).
B. MIMO-DCSK [41]
The MIMO differential CSK (DCSK) scheme [41] has been
proposed for spread spectrum communications, which require
no CSI either at the transmitter or receiver. The conventional
MIMO-CSK [14] requires the receiver to reproduce the orig-
inal chaos sequence generated by the transmitter. To address
this synchronization issue, Kaddoum et al. proposed DCSK for
a MIMO setup. It generates a space-time codeword of [41]
S(i) = x′
4is1(i)x′
4i+1 x′
4i+2 −s∗
2(i)x′
4i+3
x′
4is2(i)x′
4i+1 x′
4i+2 s∗
1(i)x′
4i+3 (15)
when the spreading factor is 1. By transmitting a chaos se-
quence directly, this scheme helps the receiver to reproduce the
chaos sequence. Such DCSK-related studies [41, 43, 55, 56]
differ from the differential STBC concept established in the
early 2000s [30, 31]. Therefore, we do not consider the DCSK
family in our performance comparisons.
C. C-MIMO [10–13]
The C-MIMO scheme has been proposed for improving the
security of MIMO communications, where PCSI is necessary
at the receiver. An initial condition is generated using a pre-
shared key. The key is processed many times by the Dirac
transformation [10, 13]. The resultant constellation follows the
complex-valued Gaussian distribution.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
5
The C-MIMO scheme requires a pre-shared key c0∈Cthat
obeys 0<Re[c0]<1and 0<Im[c0]<1. The B=M T -
length input bits b= [b1, b2,·· · , bB]∈BBis mapped to a
set of complex-valued symbols s= [s1, s2,··· , sB]∈CB.
This set is then mapped to an M×Tspace-time codeword.
Each symbol skfor k= 1,2,·· ·. Also, B is defined by
two independent chaos sequences Re[zl]and Im[zl]. Both
sequences are initialized by Re[z0] = Γ(Re[ck−1], bk−1)and
Im[z0] = Γ(Im[ck−1], bkmod B), where we have [13]
Γ(a, b) =
a(b= 0)
1−a(b= 1 and a > 1/2)
a+ 1/2 (b= 1 and a≤1/2)
.(16)
Then, both sequences are generated as6
Re[zl] = 2 ·Re[zl−1] mod (1 −10−16 ) and
Im[zl] = 2 ·Im[zl−1] mod (1 −10−16 )(17)
for l= 1,2,·· · , Ns, Ns+ 1, and Ns= 100 [13]. The C-
MIMO symbol skfor k= 1,2,·· · , B is given by [13]
sk=r−log c(x)
kcos 2πc(y)
k+jsin 2πc(y)
k,
(18)
where we have [13]
ck= Re[zNs+b(k+B/2) mod B] + jIm[zNs+b(k+B/2+1) mo d B]
c(x)
k= arccos(cos(37π(Re[ck] + Im[ck])))/π
c(y)
k= arcsin(sin(43π(Re[ck]−Im[ck])))/π +1
2
.
(19)
By virtue of the Box–Muller transform in (18), skfollows
the complex Gaussian distribution CN(0,1). Finally, the code-
word associated with B=M T -length bits bis given as
S(i) = 1
√M
s1sM+1 ·· · sM T −M+1
s2sM+2 ·· · sM T −M+2
.
.
..
.
.....
.
.
sMs2M·· · sM T
∈CM×T.
(20)
The normalized transmission rate is calculated as R=M
[bit/symbol]. The detection complexity is lower bounded by
Ω(2RT N Mn log n), where the complexity of generating (20)
is ignored for simplicity.
IV. PROPOSED CHAOS-BAS ED DI FFE RE NT IA L MIMO
The proposed scheme has a common structure with the
conventional nonsquare differential scheme of [32–34, 36].
It invokes a chaos-based time-varying basis and a chaos
calibration algorithm. Fig. 2 shows (a) the transmitter and (b)
the receiver of our proposed system. As shown in Fig. 2, our
system extracts a secret initial key from the wireless channel,
which is denoted by xt
0at the transmitter and xr
0at the receiver.
At the transmitter, an input bit sequence b(i)is mapped to a
differentially-encoded square matrix ˜
S(i). In parallel, a chaos
6The modulo operation is extended to real numbers as xmod y:= x−
y· ⌊x/y⌋.
s
/
Input
bits Delay
Proposed
time-varying
mapping
E è
E
è
EFs
E Unitary matrix
mapper (21)
Conventional differential encoding
ó5E
Initial
key
T4
ç
v
Fs s
TÜ
ç
Delay
Basis
mapper (35)
ELr
EPr
E
(a) Transmitter
s
0Output
bits
E
ó5E
E
Detector (28)
Delay EFs
Basis mapper (35)
Chaos calibrator (46)
Initial
key
T4
å
v
Fs s
TÜ
å
Delay
ELr
EPr
ÜTÜ
å
(b) Receiver
Fig. 2. Schematic of the proposed system.
sequence xt
iis used to generate a time-varying basis E1(i)∈
CM×1. Then, the square matrix ˜
S(i)∈CM×Mis mapped into
a nonsquare matrix ˜
S(i)E1(i)∈CM×1. Conventional studies
[32–34] adopted a static basis E1∈CM×1instead of this
time-varying counterpart. At the receiver, the chaos sequence
xr
iis initialized by xr
0. It is used to estimate the private bit
sequence ˆ
b(i). Because the chaos sequence xr
imight include
errors, it is calibrated by the proposed algorithm and is used
for the next time slot.
A. Encoding at the transmitter
We first introduce the encoding process which supports the
time-varying basis. The B-length input bit sequence b∈BB
is associated with an M×Msquare data-carrying matrix of
[30]
X(i) = diag exp j2πb
2Bu1,·· · ,exp j2πb
2BuM (21)
:= X(b),(22)
which is known as diagonal unitary code (DUC). Here, the
code index is given as b= (b)10, where (·)10 denotes
the binary to decimal conversion. Additionally, Mdiversity-
maximizing factors 0< u1≤ ·· · ≤ uM≤2B/2∈Zare
designed to maximize the diversity product of [30]
min
b∈{1,··· ,2B−1}
M
Y
m=1
sin πbum
2B
1
M
.(23)
Although this optimization is a time-consuming task, the
designed factors are available from the open-source library
used in [57].7For example, in the (M, B) = (4,4) case, the
designed factors are [u1, u2, u3, u4] = [1,3,5,7]. Note that
7https://github.com/ishikawalab/wiphy/blob/master/wiphy/code/duc.py
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
6
(21) can be replaced with all of the sophisticated differential
family which relies on sparse unitary matrices [37–39, 58, 59].
However, to simplify our analysis, we limit X(i)of (21) to
the classic DUC.
The time-varying basis E1(i)∈CM×1varies as the
transmission index increases from i= 1 to i=W, where
Wis the frame length. Details of the construction method
of E1(i)are presented in Section IV-C. This basis E1(i)is
the first column of E(i)∈CM×M. Later, other columns are
represented by E(i)=[E1(i)E2(i)·· · EM(i)] ∈CM×M.
For 1≤i≤Mblocks, the baseband symbol of (1) is defined
as
S(i) = Ei(M)∈CM×1.(24)
This equation implies that the unitary matrix E(M)∈CM×M
is transmitted in the first Mtime slots. Although this matrix
E(M)∈CM×Mis equivalent to the conventional reference
symbol, the overall performance will not change when increas-
ing W[34], which is similar to the classic differential MIMO
family. For M+ 1 ≤i≤Wblocks, the baseband symbol is
defined as
S(i) = ˜
S(i)E1(i)∈CM×1,(25)
where we have the M×Mmatrix of
˜
S(i) = (IM(i≤M)
˜
S(i−1)X(i) (i > M).(26)
The effective transmission rate is calculated as Reff = (W−
M)/W ·R= (1 −M /W )·R, whereas the ideal transmission
rate is R=B[bit/symbol]. In this paper, we use W= 20 ·M
to keep the rate loss at 5%. The frame lengths of W= 100·M
and 1000 ·Mare also possible. However, these simulations
might become time-consuming.
B. Decoding at the receiver
For 1≤i≤Mblocks, the estimate of H(i)˜
S(i)∈CN×M
is updated as
ˆ
Y(i) = ˆ
Y(i−1) + Y(i)EH
i(M)∈CN×M,(27)
where the initial value is a zero matrix, i.e., ˆ
Y(0) = 0N×M.
Then, for i>Mblocks, the data-carrying matrix X(i)of
(21), which is associated with the input bits b, is estimated
by the maximum-likelihood detector of8
ˆ
X(i) = arg min
X
Y(i)−ˆ
Y(i−1)XE1(i)
2
F,(28)
where we have
ˆ
Y(i) = ˆ
Y(i−1) ˆ
X(i) + (1 −α(i)) D(i)EH
1(i)∈CN×M,
(29)
α(i) = min N·σ2
v/∥D(i)∥2
F,0.99∈R,(30)
8If the coherent time is extremely short, the noncoherent detection will
cause an error floor, which is similar to the coherent detection. Refer to [33]
for a study in high-mobility scenarios and [34] for a study in millimeter-wave
scenarios.
and
D(i) = Y(i)−ˆ
Y(i−1) ˆ
X(i)E1(i)∈CN×1.(31)
The adaptive forgetting factor α(i)must be within the range
of (0,1), which minimizes the error of
ˆ
Y(i)−H(i)˜
S(i)
2
F.
As given, the estimate of CSI, H(i), is not included in
(28). Instead of H(i), this detector is used to calculate
ˆ
Y(i)≈H(i)˜
S(i), which yields a low-complexity detection.
Specifically, the detection complexity of (28) is lower bounded
by Ω(2RNM2nlog n). This complexity is higher than those
of the conventional chaos-based schemes having T= 1.
However, these schemes must carry out complex channel
estimation that is not considered for this study.
C. Proposed chaos basis
The proposed chaos basis inherits a basic property from
the conventional basis proposed in [33]. Similarly to the
conventional method, the following M×Mstatic discrete
Fourier transform (DFT) matrix is generated [33]:
W=1
√M
1 1 ·· · 1
1ω·· · ωM−1
1ω2·· · ω2(M−1)
.
.
..
.
.....
.
.
1ωM−1·· · ω(M−1)(M−1)
,(32)
where ω= exp(−2πj/M). Later, the first column of Wis
denoted as
W1= [1 1 ·· · 1]T
| {z }
Mrows
/√M(33)
for simple notation. The conventional static DFT basis is
generated by [33]
E(i) = W,(34)
whereas the proposed time-varying unitary matrix is generated
as
E(i) = exp(j2πyiY)W(35)
= exp(j4 arcsin (√xi)Y)W(36)
:= exp(jθ(xi))W(37)
where yiis a chaos sequence defined in (7) and Yis a
non-zero arbitrary integer. If |Y| ≥ 2, (35) becomes a non-
invertible function of yi, which improves security. The tradeoff
between security and reliability is discussed in Section VI.
Finally, the time-varying DFT basis is generated as E1(i) =
exp(2πyiY j)W1∈CM×1.
Fig. 3 shows the transitions of the chaos DFT basis (35)
having (M, T ) = (4,1) and Y= 8, where the time index was
increased from i=M/T + 1 = 5 to W= 80. As shown in
Fig. 3, the first row of E1(i)was distributed uniformly on a
circle.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
7
−0.6 −0.4 −0.2 0.0 0.2 0.4 0.6
Real part
−0.6
−0.4
−0.2
0.0
0.2
0.4
0.6
Imaginary part
Fig. 3. Transition of the chaos DFT basis E1(i)∈C4×1(35), where the
first row of E1(i)was presented in the I/Q domain.
D. Generation of a real-valued secret key from the true
randomness of wireless nature
In the literature, several key generation methods have been
proposed. They rely on the true randomness of wireless nature
[19], with characteristics such as the random received signal
strength (RSS) [60], the random channel coefficients [27],
the diversity of MIMO [28], the MIMO channel fluctuations
[29], and distributed antennas [61]. Most of these methods are
highly reliable. However, achieving the key agreement ratio
of 100% in high-mobility scenarios, where the benefits of
differential coding can be exploited, is a challenging task. As
described in Section III, any chaos-based system requires at
least one initial real-valued key, which is represented as a 64-
bit floating-point number, for example. Here, optimal mapping
between a shared 64-bit key and a real-valued key remains
unknown. One bit error might result in a large difference in the
real-valued counterpart. Therefore, we must consider a real-
valued key generation method that differs from conventional
binary key generation methods.
Because the proposed scheme is free from the channel
estimation process, we opt to use the randomness of RSS
to generate a real-valued key, which is inspired by the key
generation method presented earlier in the literature [60].
The following RSS-based key generation method is used to
model the error of shared keys, the effects of SNR and the
channel correlation between Alice-Bob and Alice-Eve channel
matrices.
RSS-Based Example: We specifically examine a single
receive antenna. Its RSS value is mapped to a [0,1] real-valued
key. To be more specific, the initial condition of (4) at the
transmitter is modeled as
xt
0= exp − |h+ϵeσvv|2,(38)
where h∼ CN(0,1) represents a single channel coefficient,
v∼ CN (0,1) stands for an additive noise, and ϵe∈Rdenotes
the accuracy of shared keys. Because the Rayleigh fading
channel is assumed for this study, |h|follows the Rayleigh
distribution; also, xt
0follows a uniform distribution [0,1] at
high SNRs. Obviously, the phase information of hcan be
useful in the same manner as [62], which is not considered
in this paper for simplicity. By contrast, at the receiver, the
corresponding real-valued key is generated as
xr
0= exp −ρh +p1−ρ2h′+ϵeσvv′
2,(39)
where h′∼ CN(0,1) and v′∼ CN(0,1) respectively denote
single channel and noise components. The channel correlation
ρ∈[0,1] also determines the accuracy. Bob invariably has
ρ= 1, whereas Eve might have ρ∈[0,1). The error between
xt
0and xr
0improves as SNR = 1/σ2
vincreases. In the MIMO
context, the methods described in several papers rely on the
assumption of PCSI at both the transmitter and the receiver,
i.e., ϵe= 0. This assumption is optimistic because the effects
of the additive noise [63] and the mismatch of the TDD
channel reciprocity cannot be ignored. As shown in Fig. 1,
even a small error induces a mismatch in the chaos sequences
at the transmitter and the receiver.
As might be inferred from (38) and (39), when Eve is near
Bob, i.e., ρis close to 1, Eve can estimate the secret key
generated at Bob. Assuming this simple but vulnerable RSS-
based method, one can discuss the minimum security level that
can be guaranteed under the proposed system. Actually, the
security level can be improved using artificial noise [27] and
beamforming [64] with the sacrifice of additional complexity.
The key generation example above can be replaced with such
a sophisticated method.
E. Secrecy rate of the proposed scheme
In [65], Wang et al. defined the secrecy rate as
Cs= max(0, IB−IE).(40)
Here, IBdenotes the average mutual information (AMI)
between Alice and Bob, while IEdenotes the AMI between
Alice and Eve. Since the AMI for nonsquare differential
coding is still unknown, we assume coherent detection at the
receiver and calculate the AMI for the proposed time-varying
codewords. The AMI IBcan be derived by extending the
definition of [66] as follows:
IB=B−1
2B
1
W−M
W
X
i=M+1
2B
X
f=1
EH,V
log2
2B
X
g=1
exp ηB[i, f, g ]
σ2
v
,(41)
where we have
ηB[i, f, g ] = −
HX(f)−X(g)exp(jθ(xt
i))W1+V
2
F
+∥V∥2
F.(42)
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
8
Similarly, the AMI IEcan be derived by
IE=B−1
2B
1
W−M
W
X
i=M+1
2B
X
f=1
EH,V
log2
2B
X
g=1
exp ηE[i, f, g ]
σ2
v
,(43)
where we have
ηE[i, f, g ] =
− ∥HX(f)exp(jθ(xt
i)) −X(g)exp(jθ(xr
i))W1+V∥2
F
+∥HX(f)exp(jθ(xt
i)) −X(f)exp(jθ(xr
i))W1+V∥2
F.
(44)
F. Low-complexity calibration of the chaos sequence
The difference between xt
0and xr
0induces severe communi-
cation errors. For that reason, all the conventional chaos-based
systems used a pre-shared key for initializing chaos sequences
at the transmitter and receiver. To address this issue, we
propose a novel calibration algorithm for the chaos sequence at
the receiver. For each candidate Xin (28), the corresponding
E1(i) = exp(2πyr
iY j)W1in (28) is calibrated. Specifically,
the detector tries to calibrate xr
iand yr
i= 2 arcsin pxr
i/π,
which might contain errors. The latter yr
ican be calibrated by
solving
ˆyr
i= arg min
y
Y(i)−exp(j2πyY )ˆ
Y(i−1)XW1
2
F(45)
for a given X. This optimization problem has multiple solu-
tions because of the phase ambiguity induced by Y. Here, (45)
is solvable by a low-complexity closed-form equation of
ˆyr
i=θy+ ˆnπ
2πY ,(46)
where we have θy= arctan(−Im[a]/Re[a]),a=
tr[Y(i)Hˆ
Y(i−1)XW1], and ˆn=⌊2yr
iY−θy/π + 0.5⌋.
Finally, the receiver obtains the calibrated chaos sequences
ˆyr
iand ˆxr
i= sin2(ˆyr
iπ/2). After obtaining ˆyr
i, the receiver
updates E1(i) = exp(2πˆyr
iY j)W1of (28).
The complexity of (45) is lower bounded by
Ω(NgN n log n), where Ngis the search space size of
y; it is set to a large value such as 103or 104. By contrast,
the complexity of (46) is negligible by virtue of its closed-
form calculations. Therefore, the lower-bound for overall
ML complexity with the calibration algorithm is the same as
that of the conventional nonsquare differential decoding, as
analyzed in Section IV-B.
In summary, the proposed detection process with the chaos
calibration algorithm is outlined in Algorithm 1.
V. ATTACK AL GO RI TH M AN D SEC UR IT Y ANALYSIS
We conceive an attack algorithm for the proposed scheme,
for which we assume that Eve has PCSI [67] and infinite SNR,
although Bob has no CSI and realistic SNR. In practice, it
is a challenging task for Eve to obtain a precise estimate of
CSI because the proposed scheme transmits no fixed reference
Algorithm 1 Proposed ML detector with the chaos calibration
algorithm of Section IV-F.
Input: Y(i),ˆ
Y(i−1),ˆxr
i−1,W1, B, Y , N, σ2
v
Output: ˆ
b(i),ˆ
Y(i),ˆxr
i
Initialization:
1: τmin = +∞ {τmin is the minimum of (26)}
2: xr
i= 4ˆxr
i−11−ˆxr
i−1{update xr
iusing (2)}
3: yr
i= 2 arcsin(pxr
i)/π {update yr
iusing (5)}
ML detection for ˆ
X(i) = X(bmin):
4: for b= 0 to 2B−1do
5: a= tr hY(i)Hˆ
Y(i−1)X(b)W1i{calibrate yr
i}
6: θy= arctan(−Im[a]/Re[a])
7: ˆn=⌊2yr
iY−θy/π + 0.5⌋
8: ˆyr
i= (θy+ ˆnπ)/(2πY ){obtain the calibrated ˆyr
i}
9: E1(i) = exp(2πˆyr
iY j)W1{update E1(i)}
10: D=Y(i)−ˆ
Y(i−1)X(b)E1(i)
11: τ=∥D∥2
F{calculate ML detection norm using (26)}
12: if (τ < τmin )then
13: τmin =τ,bmin =b, and Dmin =D
14: ˆxr
i= sin2(ˆyr
iπ/2)
15: ˆ
E1(i) = E1(i)
16: end if
17: end for
Finalization:
18: ˆ
b(i) = (bmin)2{obtain the estimated bits}
19: α(i) = min N·σ2
v/τmin,0.99{update ˆ
Y(i)}
20: ˆ
Y(i) = ˆ
Y(i−1)X(bmin)+ (1 −α(i)) Dmin ˆ
EH
1(i)
21: return ˆ
b(i),ˆ
Y(i),ˆxr
i
symbol. If reference symbols are not available, then the
receiver can exploit a sophisticated blind channel estimation
method [68, 69]. However, this blind estimation is possible
only if all the transmitted space-time matrices are semi-unitary
[68]. As described in an earlier report [68], results showed
that 50 unknown unitary matrices were necessary to obtain
a precise CSI for a 4×4MIMO scenario. Another blind
estimation method [69] required 2000 OFDM symbols, each
of which had 64 subcarriers. It is unrealistic to apply these
blind estimation approaches to high-mobility scenarios, where
differential schemes work efficiently.
A. Attack algorithm
Eve has PCSI HE∈CN×M, which is unrealistic, as
described above. This fact enables coherent detection at Eve,
although the transmitted matrix ˜
S(i)of (26) is differentially
encoded. Later, the first Mreceived symbols are denoted
by ¯
YE= [YE(1) YE(2) ·· · YE(M)], which converges to
HEE(M)when SNR →+∞. The secret key x0can be
estimated by solving
ˆx0= arg min
xg1(x),(47)
where we have
g1(x) =
¯
YE−exp (jθ(x)) HEW
2
F(48)
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
9
and θ(x)defined in (37). However, this optimization problem
returns multiple solutions because we have |Y|>1. The phase
ambiguity imposed by |Y|>1enhances security.
To address this challenge, Eve must perform high-
complexity joint optimization over i= 1,··· , W blocks.
Letting d= [d1, d2,·· · , dD]be a set of integers indicating
data-carrying matrices and letting D=W−Mbe the number
of these matrices, then as defined in (22), each integer in d
ranges from 0to 2B−1. Accordingly, the number of possible
patterns of dis calculable as 2BD . Eve estimates ˆx0and ˆ
d
simultaneously by solving
ˆx0,ˆ
d= arg min
(x,d)g1(x) +
D
X
i′=1
g2(i′, x, d),(49)
where we have
g2(i′, x, d) = ∥YE(M+i′)−exp (jθ (f(i′, x))) HEF(i′,d)∥2
F
(50)
and
F(i′,d) = X(d1)X(d2)·· ·X(di′)
| {z }
i′matrices
W1.(51)
Note that f(·,·)is defined in (6), X(·)is defined in (22), and
W1is defined in (33).
B. Security analysis
The complexity of (49) is extremely high because of the
global optimization imposed by ˆx0∈[0,1] and the large
search space of ˆ
d∈ZD.
a) Global optimization for continuous ˆx0:Since the
objective function of (49) is non-convex, Eve has to perform
a global optimization for ˆx0, such as the brute-force search
with a step size of 10−64, the dual annealing method [70]
with a large number of iterations, and the differential evolution
method [71]. The first derivative of (49) is given as
d
dx "g1(x) +
D
X
i′=1
g2(i′, x, d)#
=−2·d
dxRe"exp(jθ(x))tr( ¯
YH
EHEW)
+
D
X
i′=1
exp(jθ(f(i′, x)))tr(YH
E(M+i′)HEF(i′,d))#,(52)
which contains a degree D+ 1 polynomial function, and
cannot be solved algebraically. For example, if we consider
the D=W−M= 80 −4 = 76 case, the first deriva-
tive d/dx(exp(jθ(f(76, x)))), where f(76, x)is a degree 77
polynomial function, yields a lot of solutions, which makes
this global optimization difficult.
b) Brute-force search for discrete d:To solve the opti-
mization problem of (49) and to resolve the phase ambiguity,
Eve must perform a brute-force combinatorial search for
estimation of d. The search space for dis calculable as
2B(W−M)= 2BD , which increases exponentially with the
transmission rate R=Band the number of transmit antennas
M. For example, in the (M, R, D) = (4,1,2) case, we have
22= 4 patterns: d= [d1, d2] = [0,0],[0,1],[1,0],[0,1].
Each set determines the combination of differentially en-
coded symbols as X(0)X(0) ,X(0)X(1) ,X(1)X(0) ,X(1)X(1) .
To maximize the effective transmission rate, Reff = (1 −
M/W )·R= (1 −M /W )·R, the frame length is set to a large
value such as W= 20M,100M, or 1000M. In each case, the
search space becomes 2BD = 2R(W−M)= 219RM ,299RM ,
and 2999RM . Here, Eve must prepare 2304,21584 , and 215984
candidates. Because the National Security Agency in the USA
recommended the key length of 256 bits as the advanced
encryption standard9, the search space of the proposed scheme
is sufficiently large.
In summary, the overall complexity of (49) is lower bounded
by Ω(2RDNgD2M2Nn log n), where Ngdenotes the maxi-
mum iteration limit of the global optimization method. Al-
though we considered the simplest and the worst real-valued
key generation method in Section IV-D, the minimum security
level achieved by the proposed system is sufficiently high.
VI. PE RF OR MA NC E COM PARI SO NS
We investigated the performance of the proposed scheme in
terms of the secrecy rate and bit error ratio (BER). Specifically,
the proposed scheme having the time-varying chaos basis of
(35) was considered, where the novel detector of (28) and the
chaos calibration algorithm of (46) were used. Additionally,
we considered two conventional chaos-based MIMO schemes:
MIMO-CSK [14] described in Section III-A and C-MIMO
[10–13] described in Section III-C. Here, PCSI at the le-
gitimate receiver was assumed to benefit these conventional
schemes. We also considered the classic differential star-
QAM (SQAM) [72] and the conventional nonsquare DUC
(N-DUC) [33], both of which worked efficiently without CSI.
As a reference, the massive MIMO (M-MIMO) cryptography
method of [73] was considered, although it required PCSI at
both the transmitter and receiver. It is noteworthy that the M-
MIMO cryptography is designed particularly for large-scale
scenarios, but is also beneficial for small-scale scenarios by
virtue of its linear precoding [73].
For our simulations, we assumed the ideal Rayleigh fading
channel model as described in Section II. The numbers of
transmit and receive antennas were, respectively, M= 4 and
N= 4. The transmission rate was R= 4 [bit/symbol]. The
frame length was W= 20 ·M= 80. The conventional
MIMO-CSK scheme used (12) with two 256-QAM symbols,
whereas the conventional C-MIMO scheme used (20) with
(M, T , Ns) = (4,1,100) and (4,2,100). The M-MIMO
cryptography method used 16-QAM symbols. The proposed
scheme used (35) with Y= 8 to generate a time-varying chaos
basis. The data-carrying unitary matrix of (21) was generated
by [u1, u2, u3, u4] = [1,1,1,1] for R=B= 2,[1,3,5,7]
for R= 4,[1,21,24,25] for R= 6, and [1,35,41,119] for
R= 8.
First, we investigated the performance of the proposed
scheme in channel-coded scenarios. Fig. 4 portrays an AMI
comparison where we considered our proposed scheme and
four other reference curves: the Shannon capacity, 16–SQAM
9https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
10
−20 −15 −10 −50 5 10 15 20
SNR [dB]
0.0
0.5
1.0
1.5
2.0
2.5
3.0
3.5
4.0
AMI [bit/symbol]
Shannon capacity
16-SQAM (T= 1) [72]
Conv. C-MIMO (T= 1) [13]
Conv. C-MIMO (T= 2) [13]
Proposed (T= 1)
Fig. 4. AMI comparison for which we considered the frame length of W=
M+ 1 = 5 and the transmission rate of R=B= 4 [bit/symbol].
−20 −15 −10 −50 5 10 15 20
SNR [dB]
0
1
2
3
4
5
6
7
8
Secrecy rate [bit/symbol]
Proposed (R= 2)
Proposed (R= 4)
Proposed (R= 6)
Proposed (R= 8)
Fig. 5. Secrecy rate comparison upon increasing the transmission rate R=B
[bit/symbol], where other parameters are the same as those used in Fig. 4.
[72], and the C-MIMO scheme [10] having T= 1 and 2.
Here, we calculated AMI in the same manner as [44]. Because
the constrained AMI of the nonsquare differential coding is
not yet known, we assumed PCSI at the legitimate receiver
and used the frame length of W=M+ 1 = 5, which
implies that the effects of differential encoding and decoding
were not considered. Additionally, we assumed that Alice’s
and Bob’s initial keys (xt
0, xr
0)were identical. As shown in
Fig. 4, our proposed scheme having T= 1 outperformed
the C-MIMO scheme having T= 1 and achieved the same
AMI as the C-MIMO scheme having T= 2 that required
additional decoding complexity. We observed the same trend
in the (M, R) = (8,8) case. In fact, the C-MIMO has the
advantage of Gaussian-distributed symbols, which are difficult
for Eve to perceive, whereas the proposed scheme generates
constant-envelope symbols.
Following Fig. 4, we investigated the achievable secrecy rate
of the proposed scheme in Fig. 5, where the transmission rate
was increased from R= 2 to 8[bit/symbol] and where other
simulation parameters were identical to those used in Fig. 4.
Here, we calculated the secrecy rate defined by an earlier
study [65], which was introduced in Section IV-E. We assumed
that Bob’s and Eve’s channel matrices were independent, and
assumed that both SNRs were identical. As shown in Fig. 5,
the secrecy rate improved upon increasing the transmission
rate from R= 2 to 8monotonically. The corresponding
ratios of the information leaked to Eve were, respectively,
19.83%, 20.39%, 12.37%, and 9.61% of the transmitted bits.
This observation suggests that Eve is unable to decode all
the private information correctly when we use the powerful
channel coding technique with the coding rates of 1/2,2/3,
3/4, or 5/6, for example.
Second, as shown in the panels of Fig. 6, we investigated
the BER performance of the proposed scheme. Here, we
considered (a) perfect key and (b) erroneous key scenarios.
Additionally, we investigated the performance of Eve’s attack
algorithm as shown in Fig. 6(c).
For Fig. 6(a), an ideal condition was assumed: Alice
and Bob had the same generated key xt
0=xr
0. Only the
conventional schemes of MIMO-CSK [14], C-MIMO [10],
and M-MIMO cryptography [73] had PCSI. Other schemes,
including our proposal, had no CSI. As shown in Fig. 6(a), the
proposed scheme with the time-varying chaos basis achieved
the same performance as that of the conventional N-DUC
scheme of [33]. This finding implies that the use of chaos basis
induces no performance penalty. The conventional MIMO-
CSK scheme having PCSI exhibited worse performance than
the classic differential SQAM. Actually, this is true because
MIMO-CSK relies on the diagonal matrix (13) composed of
a chaos sequence. Since this diagonal matrix is not unitary,
the minimum Euclidean distance of the resultant space-time
matrix becomes a small value.10 The conventional C-MIMO
scheme having T= 1 and 2achieved competitive perfor-
mances. Specifically, the C-MIMO scheme having T= 2
achieved the best performance in the sacrifice of complexity,
as analyzed in Section III-C, and outperformed M-MIMO
cryptography, which required PCSI at the transmitter. In the
T= 1 case, our proposed noncoherent scheme exhibited a
similar trend to that of the coherent C-MIMO scheme having
PCSI. This is particularly noteworthy because a noncoherent
system generally exhibits the well-known 3 [dB] loss, unlike
its coherent counterpart. Because the C-MIMO symbols follow
a Gaussian distribution, which is a good property for improv-
ing security, the resultant BER might become a little worse
despite having PCSI.
In Fig. 6(b), Alice and Bob obtained a secret key from the
wireless channel, as described in Section IV-D. Both extracted
keys mutually differed. The difference was determined by the
model of (39), where the error metric of ϵe= 10−1,10−2,
and 10−10 were considered. The proposed scheme remains
free from the estimation of a full channel matrix H(i)∈
CN×M, but it requires an RSS value to generate a secret
key xt
0and xr
0, as described in Section IV-D. As shown
in Fig. 6(b), the proposed scheme without the calibration
10Note that the original MIMO-CSK scheme was conceived for spread
spectrum communications [14].
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
11
0 5 10 15 20 25 30 35 40
SNR [dB]
10−7
10−6
10−5
10−4
10−3
10−2
10−1
100
BER
T= 1
T= 2
Diff. 16-SQAM (ref.) [72]
Conv. M-MIMO crypt. (ref.) [73]
Conv. CSK (w/ PCSI) [14]
Conv. C-MIMO (w/ PCSI) [13]
Conv. N-DUC (w/o CSI) [33]
Proposed (w/o CSI)
(a) Perfect key scenario (W= 80).
0 5 10 15 20 25 30 35 40
SNR [dB]
10−7
10−6
10−5
10−4
10−3
10−2
10−1
100
BER
ǫe= 10−10
ǫe= 10−1
ǫe= 10−2
4.6dB
Conv. CSK (PCSI) [14]
Conv. C-MIMO (PCSI) [13]
Proposed w/o key errors
Proposed w/o calibration
Proposed w/ calibration
(b) Erroneous key scenario (W= 80).
0 5 10 15 20 25 30 35 40
SNR [dB]
10−7
10−6
10−5
10−4
10−3
10−2
10−1
100
BER
Bob’s BER w/o CSI
Eve has the same CSI and key as Bob
Eve’s attack algorithm (w/ PCSI and dual annealing)
Eve’s attack algorithm (w/ PCSI and diff. evolution)
(c) Eve’s attack algorithm (W= 6).
Fig. 6. BER comparisons for which we considered three scenarios, where
the transmission rate was R= 4 [bit/symbol].
0 50 100 150 200 250
Index of possible dpatterns
10−2
10−1
100
101
102
Detection norm (49) at Eve’s SNR = 100 [dB]
Bob selected a sub-optimal solution
and obtained the correct bits.
Eve selected the global
optimal solution and
obtained incorrect bits.
Fig. 7. Detection norms of Eve’s attack algorithm (49) for all the possible
dpatterns, where the parameters were the same as those used in Fig. 6(c),
the size of search space for dwas 28= 256, and the dual annealing method
[70] was used.
algorithm exhibited an error floor where the key contained
the small error of ϵe= 10−10, which were similar to other
conventional schemes. By contrast, the proposed scheme with
the calibration algorithm achieved practical BER performance,
even though we considered the high errors of ϵe= 10−1and
10−2. The SNR gap separating the perfect key scenario was
4.6[dB] at BER = 10−3.
In Fig. 6(c), we investigated the performance of Eve’s attack
algorithm described in Section V. In Figs. 6(a) and (b), we
considered a realistic frame length W= 20 ·M= 80. By
contrast, in Fig. 6(c), we changed the frame length W= 80
to 6to enable the brute-force search at Eve. The corresponding
search space was reduced from 24(80−4) = 2304 to 24(6−4) =
28. In this unrealistic setup, the effective transmission rate was
reduced from 3.80 to 1.33 [bit/symbol]. Since the brute-force
search with a step size of 10−64 is infeasible, we used the dual
annealing method [70] and the differential evolution method
[71].11 As shown in Fig. 6(c), Eve was able retrieve the same
information as Bob when she had the same CSI as him. When
Eve had no knowledge of CSI between Alice and Bob, and
used the attack algorithm with the PCSI between Alice and
Eve, she also succeeded in decoding 92.67% of information.
Here, the performance of the dual annealing outperformed that
of the differential evolution method. In summary, the proposed
scheme offers limited security when Eve has the same CSI as
Bob or has PCSI between her and Alice. The proposed scheme
does not transmit fixed reference symbols and semi-unitary
space-time matrices, as described in Section V. Consequently,
it is difficult for Eve to obtain accurate CSI, especially when
we consider high-mobility scenarios.
In Fig. 6(c), we observed a high error floor of BER =
7.33·10−2when Eve had PCSI and SNR →+∞. To elucidate
characteristics of this error floor, in Fig. 7, we calculated Eve’s
detection norm (49) at SNR = 100 [dB], where all the 28=
11Specifically, we used the corresponding functions
scipy.optimize.dual annealing and scipy.optimize.differential evolution
with the maximum iteration limit of Ng= 100.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
12
0.0 2.5 5.0 7.5 10.0 12.5 15.0 17.5 20.0
Security gap [dB]
0.0
0.2
0.4
0.6
0.8
1.0
Eve’s channel reliability
ρ= 99.99%
ρ= 99.99%
ρ= 0.0%
ρ= 0.0%
Proposed (R= 4)
Proposed (R= 6)
Fig. 8. Eve’s channel reliability upon increasing the channel correlation ρ
and the security gap. The simulation parameters were the same as those used
in Fig. 6(a).
256 patterns for dwere considered. Ideally, the detection norm
(49) converges to zero at a high SNR. However, as shown
in Fig. 7, we observed many local optimal solutions, which
revealed that the optimization of (49) was not straightforward.
This ambiguity resulted from the high complexity of (49) and
its numerical errors. Specifically, the |Y|>1setup yields
multiple solutions and induces the phase ambiguity for Eve. As
a result, Eve selected the global optimal solution and obtained
incorrect bits, whereas Bob selected a sub-optimal solution
and obtained the correct bits. This promising result can be
expected in general.
Finally, in Fig. 8, we investigated the effects of Eve’s
channel correlation and the security gap, which is defined
by SNRBob −SNREve in dB [74, 75]. The simulation pa-
rameters were fundamentally the same as those used for
Fig. 6(a), except for the correlation ρbetween the Alice–
Bob and Alice–Eve channel matrices. Specifically, Bob’s
channel model is defined in (1), whereas Eve’s channel
model is defined in (2). Here, the correlation coefficient was
ρ= 99.99%,99.9%,99.0%,90.0%, and 0.0%. Because the
BER curves were difficult to differentiate, we showed the
channel reliability instead. The channel reliability is defined
as 1−2·BER. It is useful to calculate the channel capacity as
demonstrated in [76]. In the same manner as [75], we define
the BER ≥0.4region as safe. The channel reliability must
be less than 0.2. As presented in Fig. 8, the proposed scheme
having R= 4 exhibited high channel reliability at Eve and
required the security gap of about 11.1[dB] to reach the
safe region. By contrast, the proposed scheme having R= 6
required the security gap of about 3.0[dB] in the ρ≤90.0%
case. Its performance is comparable to those of conventional
PLS methods [74, 75].
VII. CON CL US IO NS
In this paper, we proposed the chaos-based differential
MIMO to alleviate the channel estimation overhead that would
help the eavesdropper obtain an exact full channel matrix.
Uniquely, the proposed scheme extracts an initial condition
of the pure chaos sequence from wireless nature, which is
the first attempt in the literature. Due to the sensitivity to
initial conditions, conventional chaos-based communication
systems must exchange a common secret key in advance
with no exception. In our work, the extracted noisy key is
used to generate an artificially time-varying unitary matrix,
which obfuscates private data symbols. The keys extracted
respectively for each transmitter and receiver might become
different. To address this mismatch issue, we then proposed the
low-complexity calibration algorithm for the chaos sequence at
the receiver. Additionally, we conceived the brute-force attack
algorithm for the proposed scheme. Our security analysis
revealed that, because of its differential encoding structure,
this attack algorithm was much more complex than the existing
standard encryption method. Despite the fact that the proposed
scheme requires no channel estimation, it outperformed the
representative chaos-based scheme that had perfect channel
estimates. It was found that the proposed calibration algorithm
worked properly even if the extracted key contained non-
negligible errors. However, our proposed system was unable
to provide security if the eavesdropper had similar channel
coefficients to a legitimate receiver, i.e., ρ≥99.99%, or if
the frame length was extremely short, such as W≤M+ 2.
Based on our analysis, we conclude that differential encod-
ing can achieve practical physical layer security in wireless
communications.
ACK NOW LE DG ME NT
The authors are indebted to the Editor and the anonymous
reviewers for their invaluable suggestions and comments,
which further improved this paper.
REF ER EN CE S
[1] P. Barsocchi, G. Oligeri, and F. Potorti, “Measurement-based frame error
model for simulating outdoor Wi-Fi networks,” IEEE Transactions on
Wireless Communications, vol. 8, no. 3, pp. 1154–1158, 2009.
[2] F. Armknecht, J. Girao, A. Matos, and R. L. Aguiar, “Who said that?
Privacy at link layer,” in IEEE INFOCOM, Barcelona, Spain, May 6-12,
2007.
[3] J. Noh, J. Kim, and S. Cho, “Secure authentication and four-way
handshake scheme for protected individual communication in public Wi-
Fi networks,” IEEE Access, vol. 6, pp. 16 539–16 548, 2018.
[4] N. Ishikawa, Y. Ohishi, and K. Maeda, “Nulls in the air: Passive and
low-complexity QoS estimation method for a large-scale Wi-Fi network
based on null function data frames,” IEEE Access, vol. 7, no. 1, pp.
28 581–28 591, 2019.
[5] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital
signatures and public-key cryptosystems,” Communications of the ACM,
vol. 21, no. 2, pp. 120–126, 1978.
[6] P. Shor, “Algorithms for quantum computation: Discrete logarithms and
factoring,” in Annual Symposium on Foundations of Computer Science,
Santa Fe, NM, USA, Nov. 20-22, 1994.
[7] P. Botsinis, D. Alanis, Z. Babar, H. V. Nguyen, D. Chandra, S. X. Ng,
and L. Hanzo, “Quantum search algorithms for wireless communica-
tions,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp.
1209–1242, Secondquarter 2019.
[8] J. M. Hamamreh, H. M. Furqan, and H. Arslan, “Classifications and
applications of physical layer security techniques for confidentiality: A
comprehensive survey,” IEEE Communications Surveys and Tutorials,
vol. 21, no. 2, pp. 1773–1828, 2019.
[9] H. Dedieu, M. P. Kennedy, and M. Hasler, “Chaos shift keying: Mod-
ulation and demodulation of a chaotic carrier using self-synchronizing
Chua’s circuits,” IEEE Transactions on Circuits and Systems II: Analog
and Digital Signal Processing, vol. 40, no. 10, pp. 634–642, 1993.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
13
[10] E. Okamoto, “A chaos MIMO transmission scheme for channel coding
and physical-layer security,” IEICE Transactions on Communications,
vol. E95-B, no. 4, pp. 1384–1392, 2012.
[11] E. Okamoto and Y. Inaba, “A chaos MIMO transmission scheme
using turbo principle for secure channel-coded transmission,” IEICE
Transactions on Communications, vol. E98B, no. 8, pp. 1482–1491,
2015.
[12] E. Okamoto and N. Horiike, “Application of MAP decoding for chaos
MIMO scheme to improve error rate performance,” IEICE Communica-
tions Express, vol. 5, no. 10, pp. 365–370, 2016.
[13] ——, “Performance improvement of chaos MIMO scheme using ad-
vanced stochastic characteristics,” IEICE Communications Express,
vol. 1, no. 10, pp. 371–377, 2016.
[14] G. Kaddoum, M. Vu, and F. Gagnon, “On the performance of chaos
shift keying in MIMO communications systems,” in IEEE Wireless
Communications and Networking Conference, Cancun, Quintana Roo,
Mexico, March 28-3, 2011.
[15] J. Zhang, A. Marshall, R. Woods, and T. Q. Duong, “Design of
an OFDM physical layer encryption scheme,” IEEE Transactions on
Vehicular Technology, vol. 66, no. 3, pp. 2114–2127, 2017.
[16] J. M. Hamamreh, E. Basar, and H. Arslan, “OFDM-subcarrier index
selection for enhancing security and reliability of 5G URLLC services,”
IEEE Access, vol. 5, pp. 25 863–25 875, 2017.
[17] W. Trappe, “The challenges facing physical layer security,” IEEE Com-
munications Magazine, vol. 53, no. 6, pp. 16–20, 2015.
[18] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst,
“Principles of physical layer security in multiuser wireless networks: A
survey,” IEEE Communications Surveys Tutorials, vol. 16, no. 3, pp.
1550–1573, 2014.
[19] J. Zhang, G. Li, A. Marshall, A. Hu, and L. Hanzo, “A new frontier for
IoT security emerging from three decades of key generation relying on
wireless channels,” IEEE Access, vol. 8, pp. 138406–138 446, 2020.
[20] U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated
public channels–Part I: Definitions and a completeness result,” IEEE
Transactions on Information Theory, vol. 49, no. 4, pp. 822–831, 2003.
[21] ——, “Secret-key agreement over unauthenticated public channels–Part
II: The simulatability condition,” IEEE Transactions on Information
Theory, vol. 49, no. 4, pp. 832–838, 2003.
[22] ——, “Secret-key agreement over unauthenticated public channels–Part
III: Privacy amplification,” IEEE Transactions on Information Theory,
vol. 49, no. 4, pp. 839–851, 2003.
[23] P. Huang and X. Wang, “Fast secret key generation in static wireless
networks: A virtual channel approach,” in IEEE INFOCOM, Turin, Italy,
April 14-19, 2013.
[24] K. Zeng, “Physical layer key generation in wireless networks: Chal-
lenges and opportunities,” IEEE Communications Magazine, vol. 53,
no. 6, pp. 33–39, 2015.
[25] J. Tang, H. Wen, K. Zeng, R.-f. Liao, F. Pan, and L. Hu, “Light-weight
physical layer enhanced security schemes for 5G wireless networks,”
IEEE Network, vol. 33, no. 5, pp. 126–133, 2019.
[26] Z. Rezki, M. Zorgui, B. Alomair, and M. S. Alouini, “Secret key
agreement: Fundamental limits and practical challenges,” IEEE Wireless
Communications, vol. 24, no. 3, pp. 72–79, 2017.
[27] D. Chen, X. Mao, Z. Qin, Z. Qin, P. Yang, and Y. Liu, “SmokeGrenade:
A key generation protocol with artificial interference in wireless net-
works,” in IEEE International Conference on Mobile Ad-Hoc and Sensor
Systems, Oct. 2013.
[28] K. Zeng, D. Wu, A. Chan, and P. Mohapatra, “Exploiting multiple-
antenna diversity for shared secret key generation in wireless networks,”
in IEEE INFOCOM, Mar. 2010.
[29] J. W. Wallace and R. K. Sharma, “Automatic secret keys from reciprocal
MIMO wireless channels: Measurement and analysis,” IEEE Transac-
tions on Information Forensics and Security, vol. 5, no. 3, pp. 381–392,
2010.
[30] B. M. Hochwald and W. Sweldens, “Differential unitary space-time
modulation,” IEEE Transactions on Communications, vol. 48, no. 12,
pp. 2041–2052, 2000.
[31] C. Xu, N. Ishikawa, R. Rajashekar, S. Sugiura, R. G. Maunder, Z. Wang,
L.-L. Yang, and L. Hanzo, “Sixty years of coherent versus non-coherent
tradeoffs and the road from 5G to wireless futures,” IEEE Access, vol. 7,
pp. 178 246–178 299, 2019.
[32] N. Ishikawa and S. Sugiura, “Rectangular differential spatial modulation
for open-loop noncoherent massive-MIMO downlink,” IEEE Transac-
tions on Wireless Communications, vol. 16, no. 3, pp. 1908–1920, 2017.
[33] N. Ishikawa, R. Rajashekar, C. Xu, S. Sugiura, and L. Hanzo, “Differ-
ential space-time coding dispensing with channel estimation approaches
the performance of its coherent counterpart in the open-loop mas-
sive MIMO-OFDM downlink,” IEEE Transactions on Communications,
vol. 66, no. 12, pp. 6190–6204, 2018.
[34] N. Ishikawa, R. Rajashekar, C. Xu, M. El-Hajjar, S. Sugiura, L.-L. Yang,
and L. Hanzo, “Differential-detection aided large-scale generalized spa-
tial modulation is capable of operating in high-mobility millimeter-wave
channels,” IEEE Journal of Selected Topics in Signal Processing, vol. 13,
no. 6, pp. 1360–1374, 2019.
[35] C. Wu, Y. Xiao, L. Xiao, P. Yang, X. Lei, and W. Xiang, “Space-time
block coded rectangular differential spatial modulation: System design
and performance analysis,” IEEE Transactions on Communications,
vol. 67, no. 9, pp. 6586–6597, 2019.
[36] L. Xiao, P. Xiao, H. Ruan, N. Ishikawa, L. Lu, Y. Xiao, and L. Hanzo,
“Differentially-Encoded Rectangular Spatial Modulation Approaches
the Performance of Its Coherent Counterpart,” IEEE Transactions on
Communications, vol. 68, no. 12, pp. 7593–7607, 2020.
[37] C. Xu, R. Rajashekar, N. Ishikawa, S. Sugiura, and L. Hanzo, “Single-
RF index shift keying aided differential space-time block coding,” IEEE
Transactions on Signal Processing, vol. 66, no. 3, pp. 773–788, 2018.
[38] C. Xu, P. Zhang, R. Rajashekar, N. Ishikawa, S. Sugiura, L. Wang, and
L. Hanzo, “Finite-cardinality single-RF differential space-time modula-
tion for improving the diversity-throughput tradeoff,” IEEE Transactions
on Communications, in press, vol. 67, no. 1, pp. 318–335, 2019.
[39] R. Rajashekar, C. Xu, N. Ishikawa, S. Sugiura, K. V. S. Hari, and
L. Hanzo, “Algebraic differential spatial modulation is capable of
approaching the performance of its coherent counterpart,” IEEE Trans-
actions on Communications, vol. 65, no. 10, pp. 4260–4273, 2017.
[40] G. Kolumban, B. Vizvki, W. Schwarz, and A. Abel, “Differential
chaos shift keying: A robust coding for chaotic communication,” in
International Workshop on Nonlinear Dynamics of Electronic Systems,
Sevilla, June 27-28, 1996.
[41] G. Kaddoum, M. Vu, and F. Gagnon, “Performance analysis of dif-
ferential chaotic shift keying communications in MIMO systems,” in
IEEE International Symposium on Circuits and Systems, Rio de Janeiro,
Brazil, May 15–18, 2011.
[42] B. Chen, L. Zhang, and H. Lu, “High security differential chaos-based
modulation with channel scrambling for WDM-aided VLC system,”
IEEE Photonics Journal, vol. 8, no. 5, pp. 1–13, 2016.
[43] W. Hu, L. Wang, and G. Kaddoum, “Design and performance analysis of
differentially spatial modulated chaos shift keying modulation system,”
IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 64,
no. 11, pp. 1302–1306, 2017.
[44] N. Ishikawa, S. Sugiura, and L. Hanzo, “50 years of permutation, spatial
and index modulation: From classic RF to visible light communications
and data storage,” IEEE Communications Surveys & Tutorials, vol. 20,
no. 3, pp. 1905–1938, 2018.
[45] D. E. Knuth, “Big Omicron and big Omega and big Theta,” ACM
SIGACT News, vol. 8, no. 2, pp. 18–24, 1976.
[46] E. Cavus and B. Daneshrad, “A very low-complexity space-time block
decoder (STBD) ASIC for wireless systems,” IEEE Transactions on
Circuits and Systems I: Regular Papers, vol. 53, no. 1, pp. 60–69, 2006.
[47] R. P. Brent and P. Zimmermann, Modern Computer Arithmetic. Cam-
bridge University Press, 2010.
[48] J. C. Sprott, Chaos and Time-Series Analysis. Oxford University Press,
2003.
[49] J. Von Neumann, “Various techniques used in connection with random
digits,” National Bureau of Standards Applied Mathematics Series,
vol. 12, pp. 36–38, 1951.
[50] O. E. R¨
ossler, “An equation for continuous chaos,” Physics Letters A,
vol. 57, no. 5, pp. 397–398, 1976.
[51] J. J. Collins, M. Fanciulli, R. G. Hohlfeld, D. C. Finch, G. v. H. Sandri,
and E. S. Shtatland, “A random number generator based on the logit
transform of the logistic variable,” Computers in Physics, vol. 6, no. 6,
pp. 630–632, 1992.
[52] S. Alamouti, “A simple transmit diversity technique for wireless commu-
nications,” IEEE Journal on Selected Areas in Communications, vol. 16,
no. 8, pp. 1451–1458, 1998.
[53] P. Wolniansky, G. Foschini, G. Golden, and R. Valenzuela, “V-BLAST:
An architecture for realizing very high data rates over the rich-scattering
wireless channel,” in Proceedings of the International Symposium on
Signals, Systems, and Electronics, Pisa, Italy, Oct. 2, 1998.
[54] Y. Zhu and H. Jafarkhani, “Differential modulation based on quasi-
orthogonal codes,” IEEE Transactions on Wireless Communications,
vol. 4, no. 6, pp. 3018–3030, 2005.
[55] S. Wang and X. Wang, “M-DCSK-based chaotic communications in
MIMO multipath channels with no channel state information,” IEEE
Transactions on Circuits and Systems II: Express Briefs, vol. 57, no. 12,
pp. 1001–1005, 2010.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
14
[56] P. Chen, L. Wang, and F. C. M. Lau, “One analog STBC-DCSK
transmission scheme not requiring channel state information,” IEEE
Transactions on Circuits and Systems I: Regular Papers, vol. 60, no. 4,
pp. 1027–1037, 2013.
[57] N. Ishikawa, “IMToolkit: An open-source index modulation toolkit for
reproducible research based on massively parallel algorithms,” IEEE
Access, vol. 7, pp. 93 830–93 846, 2019.
[58] N. Ishikawa and S. Sugiura, “Unified differential spatial modulation,”
IEEE Wireless Communications Letters, vol. 3, no. 4, pp. 337–340, 2014.
[59] R. Rajashekar, N. Ishikawa, S. Sugiura, K. V. S. Hari, and L. Hanzo,
“Full-diversity dispersion matrices from algebraic field extensions for
differential spatial modulation,” IEEE Transactions on Vehicular Tech-
nology, vol. 66, no. 1, pp. 385–394, 2017.
[60] T. Allen, J. Cheng, and N. Al-Dhahir, “Secure space-time block coding
without transmitter CSI,” IEEE Wireless Communications Letters, vol. 3,
no. 6, pp. 573–576, 2014.
[61] Z. Ji, Y. Zhang, Z. He, P. L. Yeoh, B. Li, H. Yin, Y. Li, and B. Vucetic,
“Wireless secret key generation for distributed antenna systems: A joint
space-time-frequency perspective,” IEEE Internet of Things Journal, in
press.
[62] S. Althunibat, V. Sucasas, and J. Rodriguez, “A physical-layer security
scheme by phase-based adaptive modulation,” IEEE Transactions on
Vehicular Technology, vol. 66, no. 11, pp. 9931–9942, 2017.
[63] J. B. Perazzone, P. L. Yu, B. M. Sadler, and R. S. Blum, “Artificial
noise-aided MIMO physical layer authentication with imperfect CSI,”
IEEE Transactions on Information Forensics and Security, vol. 16, pp.
2173–2185, 2021.
[64] Z. Kong, S. Yang, D. Wang, and L. Hanzo, “Robust beamforming and
jamming for enhancing the physical layer security of full duplex radios,”
IEEE Transactions on Information Forensics and Security, vol. 14,
no. 12, pp. 3151–3159, 2019.
[65] L. Wang, S. Bashar, Y. Wei, and R. Li, “Secrecy enhancement analysis
against unknown eavesdropping in spatial modulation,” IEEE Commu-
nications Letters, vol. 19, no. 8, pp. 1351–1354, 2015.
[66] S. X. Ng and L. Hanzo, “On the MIMO channel capacity of multi-
dimensional signal sets,” IEEE Transactions on Vehicular Technology,
vol. 55, no. 2, pp. 528–536, 2006.
[67] H. M. Wang, T. Zheng, and X. G. Xia, “Secure MISO wiretap channels
with multiantenna passive eavesdropper: Artificial noise vs. artificial fast
fading,” IEEE Transactions on Wireless Communications, vol. 14, no. 1,
pp. 94–106, 2015.
[68] S. Shahbazpanahi, A. B. Gershman, and J. H. Manton, “Closed-form
blind MIMO channel estimation for orthogonal space-time block codes,”
IEEE Transactions on Signal Processing, vol. 53, no. 12, pp. 4506–4517,
2005.
[69] C. Shin, R. W. Heath, and E. J. Powers, “Blind channel estimation for
MIMO-OFDM systems,” IEEE Transactions on Vehicular Technology,
vol. 56, no. 2, pp. 670–685, 2007.
[70] Y. Xiang, S. Gubian, B. Suomela, and J. Hoeng, “Generalized simulated
annealing for global optimization: The gensa package,” The R Journal,
vol. 5, no. 1, p. 13, 2013.
[71] J. Lampinen, “A Constraint handling approach for the differential evo-
lution algorithm,” in Congress on Evolutionary Computation, Honolulu,
USA, 2002.
[72] W. Webb, L. Hanzo, and R. Steele, “Bandwidth efficient QAM schemes
for Rayleigh fading channels,” IEE Proceedings, vol. 138, no. 3, pp.
169–175, 1991.
[73] T. R. Dean and A. J. Goldsmith, “Physical-layer cryptography through
massive MIMO,” IEEE Transactions on Information Theory, vol. 63,
no. 8, pp. 5419–5436, 2017.
[74] D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B. Kwak, “LDPC
codes for the gaussian wiretap channel,” IEEE Transactions on Infor-
mation Forensics and Security, vol. 6, no. 3, pp. 532–540, 2011.
[75] M. Baldi, M. Bianchi, and F. Chiaraluce, “Coding with scrambling,
concatenation, and HARQ for the AWGN wire-tap channel: A security
gap analysis,” IEEE Transactions on Information Forensics and Security,
vol. 7, no. 3, pp. 883–894, 2012.
[76] F. Yilmaz, “On the relationships between average channel capacity, av-
erage bit error rate, outage probability, and outage capacity over additive
white Gaussian noise channels,” IEEE Transactions on Communications,
vol. 68, no. 5, pp. 2763–2776, 2020.
Naoki Ishikawa (Member, IEEE) was born in Kana-
gawa, Japan, in 1991. He received the B.E., M.E.,
and Ph.D. degrees from the Tokyo University of
Agriculture and Technology, Tokyo, Japan, in 2014,
2015, and 2017, respectively. In 2015, he was an
academic visitor with the School of Electronics and
Computer Science, University of Southampton, UK.
From 2016 to 2017, he was a research fellow of
the Japan Society for the Promotion of Science.
From 2017 to 2020, he was an assistant professor
in the Graduate School of Information Sciences,
Hiroshima City University, Japan. Since 2020, he has been an Associate
Professor with the Faculty of Engineering, Yokohama National University,
Japan. His research interests include massive MIMO, physical layer security,
and quantum speedup for wireless communications. He was certified as an
Exemplary Reviewer of IEE E TR ANS ACT IO NS ON CO MM UNI CATI ONS 2017.
He received the Yasujiro Niwa Outstanding Paper Award from Tokyo Denki
University in 2018, the Telecom System Technology student Award (honorable
mention) from Telecommunications Advancement Foundation of Japan in
2014, and the Outstanding Paper Award for Young C&C Researchers from
NEC C&C Foundation in 2014.
Jehad M. Hamamreh (Member, IEEE) is the
Founder and Director of WISLAB, and A. Profes-
sor with the Electrical and Electronics Engineering
Department, Antalya Bilim University. He received
his Ph.D. degree in telecommunication engineering
and cyber systems from Istanbul Medipol Univer-
sity, Turkey, in 2018. Previously, he worked as
a Researcher at the Department of Electrical and
Computer Engineering at Texas A&M University.
He is the inventor of more than 20+ Patents and
an author of more than 75+ peer-reviewed scientific
papers along with several book chapters. His innovative patented works won
the gold, silver, and bronze medals by numerous international invention
contests and fairs.
His current research interests include wireless physical and MAC lay-
ers security, orthogonal frequency-division multiplexing and multiple-input
multiple-output systems, advanced waveforms design, multidimensional mod-
ulation techniques, and orthogonal/non-orthogonal multiple access schemes
for future wireless systems. He is a serial referee for various scientific journals
as well as a TPC member for several international conferences. He is an Editor
at Researcherstore, RS-OJICT journal, and Frontiers in Communications and
Networks.
Eiji Okamoto (Member, IEEE) received the B.E.,
M.S., and Ph.D. degrees in Electrical Engineering
from Kyoto University in 1993, 1995, and 2003,
respectively. In 1995 he joined the Communications
Research Laboratory (CRL), Japan. Currently, he
is an associate professor at Nagoya Institute of
Technology. In 2004 he was a guest researcher at
Simon Fraser University. He received the Young
Researchers’ Award in 1999 from IEICE, and the
FUNAI Information Technology Award for Young
Researchers in 2008. His current research interests
are in the areas of wireless technologies, satellite communication, and mobile
communication systems.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/OJCOMS.2021.3112486, IEEE Open
Journal of the Communications Society
15
Chao Xu (Senior Member, IEEE) received a MSc
degree with distinction in Radio Frequency Com-
munication Systems and a Ph.D. degree in Wireless
Communications from the University of Southamp-
ton, UK in 2009 and 2015, respectively. He is
currently a research fellow working at University
of Southampton, UK. His research interests include
index modulation, reduced-complexity MIMO de-
sign, noncoherent detection and turbo detection. He
was awarded the Best M.Sc. Student in Broadband
and Mobile Communication Networks by the IEEE
Communications Society (United Kingdom and Republic of Ireland Chapter)
in 2009. He also received 2012 Chinese Government Award for Outstanding
Self-Financed Student Abroad and 2017 Dean’s Award, Faculty of Physical
Sciences and Engineering, the University of Southampton.
Lixia Xiao (Member, IEEE) received the B.E., M.E.,
and Ph.D. degrees from the UESTC in 2010, 2013,
and 2017, respectively. From 2016 to 2017, she was
a visiting student with the School of Electronics
and Computer Science, University of Southampton.
From 2018 to 2019, she has been a Research Fellow
with the Department of Electrical Electronic En-
gineering, University of Surrey. She is currently a
Full Professor with the Wuhan National Laboratory
for Optoelectronics, Huazhong University of Science
and Technology. In particular, she is very interested
in signal detection and performance analysis of wireless communication
systems. Her research interests include wireless communications and com-
munication theory.