1. Introduction
Frequency hopping-orthogonal frequency division multiple access (FH-OFDMA) can provide low probability of detection (LPD) and anti-jamming capabilities to authenticated users against adversaries for secure multimedia and military communication services [
1]. In the OFDMA system, the entire frequency spectrum is divided into multiple narrow-band subcarriers, which are then assigned to multiple users to transmit data symbols on different subcarriers simultaneously [
2]. In the FH-OFDMA system, the total number of subcarriers is partitioned into a set of clusters composed of contiguous subcarriers, and each cluster is changed to a different frequency during each period based on the FH pattern. The users are each assigned to one of the clusters to transmit data symbols over the FH-OFDMA system. Thus, the FH-OFDMA system has the advantages of both LPD due to FH pattern and high spectral efficiency of the OFDMA system [
3]. The FH-OFDMA system chooses the orthogonal frequency division multiplexing (OFDM) symbols and cyclic prefix durations according to the Doppler and delay spreads of the transmitting channel, respectively; thus, subcarriers of the FH-OFDMA system retain their orthogonality and experience flat fading upon reception. The FH-OFDMA system can be combined with channel coding resulting in frequency diversity when the channel response varies over the hopping distance, and such frequency diversity has been verified in many prior studies [
4,
5,
6]. In the military domain, the authors of Reference [
7] consider the condition that an adversary intentionally jams parts of frequency hopping slots and select non-jammed hopping sequences to obtain low bit error performance. However, in this study, we have fundamentally different focus on the advantage of the FH-OFDMA system that supports LPD against detection of adversaries, such as eavesdroppers or radiometers.
Some previous works on FH-OFDMA systems have noted various FH pattern designs to achieve LPD capability and frequency diversity [
8,
9,
10,
11,
12,
13]. In Reference [
8,
9,
10,
11,
12], the transmitted symbol index is changed at each symbol period through the symbol-by-symbol (SBS) hopping strategy. In order to design an SBS-based FH pattern, orthogonal Latin squares and Welch-Costas-based FH patterns are introduced in Reference [
8,
9], respectively. In Reference [
10,
11], secure collision free and residue number system arithmetic assisted FH patterns are proposed to obtain high frequency diversity through SBS hopping over fast frequency selective fading. In [
12], the authors propose a wide-gap FH pattern, which can be adopted to FH-OFDMA systems, to highly reduce interference between adjacent frequencies. In [
13], we propose two frequency hopping strategies based on the chaotic standard map (CSM) and cat map-based FH patterns. As these two FH patterns are hopped into time and frequency domains using additional memory of the cluster size, the FH-OFDMA systems of these two proposed FH patterns have lower probabilities of intercept than the SBS-based FH pattern. Between the CSM and cat map-based FH patterns, the CSM-based FH-OFDMA system has a lower probability of intercept, since a symbol of the CSM cannot be shown in every symbol period, whereas a symbol of the cat map is mixed with the symbol index and is shown in every symbol period similar to the SBS. In Reference [
13], we only analyze the complexity of regenerating the transmitted symbol sequence. It is possible that a detector already knows the symbol and frame structures, and their parameters, and the detector is synchronized to the FH-OFDMA system.
Unlike our previous work, here, we analyze whether the CSM provides greater LPD capability than the cat map and SBS-based FH-OFDMA systems by detection probability using spectrum sensing technique. The spectrum sensing technique is studied to identify unused spectrum regions that may be exploited efficiently without causing harmful interference to the existing incumbent users. Although it is very difficult to detect authentic OFDMA signals using spectrum sensing, many studies related to cognitive radio techniques have helped the spectrum sensing domain [
14]. Based on spectrum sensing, the authors of Reference [
15] propose an FH pattern based on SBS hopping strategy for LPD capability, and the authors analyze detection probability in frequency-hopped wireless communications. Up until very recently, many authors have proposed the signal sensing methods to obtain FH signals based on cross-correlation [
16] and deep learning [
17]. These detection methods are only focused on the frequency-hopped system, but do not consider an OFDM system constructed by multiple subcarriers. For the OFDM system, an auto-correlation-based spectrum sensing technique is proposed to analyze the detection probability in Reference [
18]. Although the auto-correlation-based OFDM signal sensing technique does not require knowledge of the noise variance, the sensing technique for the FH-OFDMA system has different conditions for detection probabilities because of regenerated hopping sequence. We assume that the detector exploits the auto-correlation-based spectrum sensing technique with hypothesis testing to detect the FH-OFDMA signal. We analyze detection probability of the CSM-based FH-OFDMA system and provide detection probabilities of the cat map and SBS-based FH-OFDMA systems compared to the CSM. Based on our analysis of the detection probability, it is evident that the CSM provides a higher LPD capability than both the cat map and SBS-based systems.
The rest of this paper is organized as follows: In
Section 2, our CSM and cat map-based FH patterns proposed in Reference [
13] are introduced, along with the SBS-based FH pattern for FH-OFDMA systems. In
Section 3, we analyze the detection probability based on auto-correlation properties of OFDMA signals with hypothesis testing for the FH-OFDMA systems. Numerical simulations of the systems with specific parameters are carried out, and the simulation results are shown in
Section 4. Finally, our conclusions are presented in
Section 5.
2. FH Patterns for FH-OFDMA System
The total bandwidth is divided into a number of subcarriers
according to the length of the fast Fourier transform (FFT) signal of the FH-OFDMA system, which is composed of contiguous OFDMA symbols consisting of a sum of subcarriers modulated by multiple phase shift keying (PSK) or quadrature amplitude modulation (QAM). Without loss of generality, we assume the sampling rate between the number of effective symbols
, and the number of subcarriers
, after the inverse FFT (IFFT) as 1. The size of each subcarrier is constructed using several clusters with the number of clusters
, which are composed of contiguous subcarriers whose number is denoted as
. Thus, we achieve
. The FH-OFDMA signal converts from serial to parallel by an IFFT block. Let
be complex multiple PSK or QAM modulated data that are transmitted on
subcarriers at the
n-th cluster index; then, the output of the IFFT as the symbol of the transmitted FH-OFDMA frame is
where
t is a discrete time index,
,
n is cluster index from 0 to
, and
f is a discrete subcarrier index. Let
be the number of symbols for the cyclic prefix; we define cyclic prefix symbols of the
n-th cluster as
, and the cyclic prefix symbols are added to the FH-OFDMA symbols. In the time domain, the FH-OFDMA time block with duration
is constructed as
.
In the FH-OFDMA system, the modulated data with
size before an IFFT block are constructed by a specific FH pattern given by
where
denotes the transmitted data of
k-th user for
n-th cluster at
t-th symbol time index.
and
are the
x-axis and
y-axis of the FH pattern for the
j-th generated data of
k-th user, respectively. Each user generates data of size
, and the data is mixed and modulated by the FH pattern, such as CSM, cat map, and SBS-based FH pattern.
x-axis and
y-axis indicate the range of the symbol and cluster indexes, respectively. Since we consider that a user can be assigned only one cluster index in the FH-OFDMA system, the maximum number of users is limited to
. With a seed number of
, we assign the value of
to
,
, and
for the SBS, cat map, and CSM-based hopping strategies, respectively. In
Figure 1, we set
= 4 and show the symbol of a transmitted FH-OFDMA frame as an example. The same-colored blocks are transmitted contiguously by the same user. As shown in
Figure 1, the number of symbols for cyclic prefix,
, is copied from the number of effective symbols,
, and is added in front of the effective symbols to absorb the multipath delay of the FH-OFDMA system.
Before we introduce three FH patterns to verify the LPD capabilities of the FH-OFDMA system, we address that the CSM and cat map-based FH patterns have practical limitations that those FH patterns must have symbol buffers with size
unlike the SBS-based FH pattern. Because the transmitting data sequences of the two FH patterns are mixed to increase the complexity of detection probability against eavesdroppers. In addition, receivers of the FH-OFDMA systems using the CSM and cat map-based FH patterns can start parsing modulated data after receiving
symbol buffers. Now, we show the SBS-based FH pattern and its FH pattern indexes of
x-axis and
y-axis. In this study, we choose a formula of the Latin squares-based FH pattern as one of the SBS-based FH patterns [
13]. We can obtain the SBS-based FH pattern of the
j-th data for the
k-th user using Latin squares as
where
is the seed number of the FH pattern for
. We introduce the cat map-based FH pattern using block symmetric ciphers [
13]. In the cat map-based FH pattern, the generated symbols appear to be hopped in both time and frequency domains, since the transmitted symbol of each user appears at each period once, but the transmission order is mixed. The cat map-based FH pattern of the
j-th data for the
k-th user can be obtained by
where
,
,
, and
are positive integers satisfying relations
and
. The cluster index of
of the
j-th data for the
k-th user using a seed number of
is given by
where
j denotes the data index of consecutive points
for which
and
mod
,
[
13]. The CSM is widely used to design block symmetric ciphers for LPD capability. Beside the cat map-based FH pattern, the symbols generated by the CSM-based FH pattern are hopped in both time and frequency domains, and the transmitted sequences are mixed. Based on the complexity of detection probability, the CSM-based FH pattern provides greater LPD capability than the cat map and SBS-based FH patterns. The CSM-based FH pattern of the
j-th data for the
k-th user can be obtained by
where the cluster index of
of the
j-th data for the
k-th user using a seed number
can be obtained by (5).
and
are constant integers from 0 to
, and
is a positive integer.
is the nearest integer to
x.
Figure 2 shows an example of how to assign the three FH patterns in time and subcarrier domains, and we compare the three FH patterns, i.e., the SBS, cat map, and CSM-based patterns. To increase the detection probability from the point of view of eavesdropping detectors, we assume that the detectors receive a redundant number,
, of contiguous FH-OFDMA frames consisting of
symbols. For the examples in
Figure 2, we set
,
,
, number of transmitting users as 3, and indexes of the users as
k = 1, 2, and 5. In
Figure 2a, we show an example of an SBS-based FH pattern using Latin squares-based strategy for seed number,
= 4. The users,
k = 1, 2, and 5 are assigned their SBS-based FH patterns as
,
, and
for
, respectively. As shown in
Figure 2a as an example of the SBS-based FH pattern, the data index of each user is shown once at each cluster and are hopped to a different cluster for each symbol. In addition, the transmitting data order of every user is continuous in
Figure 2a. In
Figure 2b, we show an example of a cat map-based FH pattern for
and seed number,
= 4. The users,
k = 1, 2, and 5 are assigned their cat map-based FH patterns as
,
, and
for
, respectively. As shown in
Figure 2b as an example of the cat map-based FH pattern, the first data set for
k = 2 is transmitted at the symbol period of
n = 4 and the first data set for
k = 5 is transmitted at the symbol period of
n = 1. In the cat map-based FH pattern, the transmitted data order is mixed as shown in
Figure 2b. However, the data index of each user using the cat map-based FH pattern is shown once for each cluster and hopped to a different cluster for each symbol. In
Figure 2c, we show the example of a CSM-based FH pattern for
= 3000,
= 1,
= 3 and seed number
= 2. The users,
k = 1, 2, and 5 are assigned their CSM-based FH patterns as
,
, and
,
for
, respectively. As shown in
Figure 2c as example of the CSM-based FH pattern, two data sets for
k = 1 appeared at the symbol period
n = 1, and two data sets for
k = 5 appeared at the symbol period
n = 2. In addition, the transmitted data order is mixed, since the last and first data sets for
k = 1 is transmitted at the symbol periods
n = 0 and
n = 4, respectively.
3. Analysis of Detection Probability
In this section, our goal is to analyze detection probability of a CSM-based FH-OFDMA system compared to detection probabilities of the other FH-OFDMA systems from the point of view of an adversary detector. To increase detection probability, the detector should observe over several FH-OFDMA symbols, i.e., . The number of observing FH-OFDMA symbols, M, must be composed of multiplications of the redundant number of FH-OFDMA frames, , and the number of symbols in a frame, i.e., . Our analysis assumes that the adversary detector already knows the effective symbol duration and its cyclic prefix . The knowledge of symbol duration is specified in standards or can be estimated by knowledge of the implementable IFFT and FFT sizes. Even if the exact value is not known, the symbol duration can be estimated by the receipt of sufficient symbols.
We analyze the detection probability using the spectrum sensing technique based on hypothesis testing. First, let
be the null hypothesis, i.e., a transmitting user is absent in a FH-OFDMA system, and
be the alternate hypothesis, i.e., a transmitting user exists in the FH-OFDMA system. Thus, the hypothesis testing problem may be written as
where
is the received complex FH-OFDMA signal, and
is the complex circular additive white Gaussian noise. Invoking the central limit theorem under the assumption of sufficiently large IFFT size, we have
where
denotes the Gaussian distribution for a complex random variable. Therefore, for different hypotheses, we have
We consider
as a circularly symmetric Gaussian random variable composed of real and imaginary parts of
y, and these real and imaginary parts are obtained as:
where
denotes the Gaussian distribution for a real random variable. For the FH-OFDMA signal using cyclic prefix, the values of the auto-correlation coefficient
for delay
under the two hypotheses are
where
where
denotes the signal-to-noise ratio (SNR) as
and
. For a real valued coefficient,
. Hence, without loss of generality, we consider only
.
We can form two real random vectors from the observations such that
and
, where
and
are the real and imaginary parts of
. Due to the circular symmetry assumption, the zero mean random variables
and
are independent and identically distributed (i.i.d.). We define
as the maximum likelihood estimate from the vectors
and
. When using the log likelihood ratio test (LLRT), we decide the alternative hypothesis for the present hypothesis test above the threshold,
of the adversary detector. For sufficiently large
M, we approximate the distribution of the test statistic described in Reference [
18] as
This is a classical detection problem with test statistic
. To detect and intercept the desired signal, detectors can adopt one of the well-known detection strategies. We consider that the detectors adopt the detection strategy of Neyman-Pearson detection to satisfy a constant false alarm rate constraint [
19]. For a Gaussian random variable
, we have
where
is the complementary error function. Using (14) for
real symbols, the required false alarm probability
is given by
Thus, the threshold at the detector can be calculated as
The detection probability of the FH-OFDMA system is composed of the product of the auto-correlation-based symbol detection probability, that we have analyzed, and the intercept probability of FH patterns from the point of view of an adversary detector, as the two events are independent. Thus, the detection probability,
, of the FH-OFDMA system using different FH patterns, such as SBS, cat map, and CSM-based strategies, for 2
M real symbols can be obtained using (14), and we get:
where
denotes the intercept probability for the FH-OFDMA system using different FH patterns. Based on Reference [
13],
has a different value according to the SBS, cat map, CSM-based FH patterns, and FH can, thus, be rewritten by SBS, CAT, and CSM, respectively. Without loss of generality, we assume that the hopping sequence does not change during the
M OFDMA symbols, i.e.,
real symbols. For the SBS FH pattern, the detector is able to intercept the transmitted OFDMA symbol by selecting one cluster from
clusters, except the previously selected cluster at each period. For
K transmitting users
, the detector can select one cluster from
K clusters at each period. Hence, the
can be given as
For the cat map-based FH pattern, transmitted symbols of each user appear at each symbol period once with mixed order in the time domain. The detector can intercept these symbols by selecting one cluster from
K clusters at each period and finding the correct order from possible permutations. Hence, the
can be given by
For the CSM-based FH pattern, the detector should select
clusters from
symbols and find the order of these symbols after detecting, receiving, and storing the symbols during the period
. Hence, the
is given by
Here, denotes the permutation of .
4. Simulation Results
The simulation results are provided to analyze whether the CSM-based FH-OFDMA system provides greater LPD capability than the cat map and SBS-based FH-OFDMA systems. We set common parameters of simulation results as the number of subcarriers,
= 220, excluding guard subcarriers of 36, number of symbols for cyclic prefix,
, number of clusters as the number of maximum transmitting users,
, and
. The transmitted data is modulated as QPSK or 16-QAM, and the data is coded by convolutional coding at 1/2 coding rate. The FH-OFDMA signal is sent over a wireless six-ray channel impulse model of the Universal Mobile Telecommunications System—Terrestrial Radio Access System (UTRA) vehicular model A [
20]. For the SBS-based FH pattern, we select a Latin squares-based FH pattern of
= 4. For the cat map-based FH pattern, we consider
,
, and
. For the CSM-based FH pattern, we consider
,
,
, and
= 3000.
Before we analyze the detection probabilities of FH-OFDMA systems, we verify that the FH-OFDMA systems based on SBS, cat map, and CSM patterns can achieve frequency diversities by bit error rate (BER) performance.
Figure 3 shows the BER results of an OFDMA system without hopping and FH-OFDMA systems based on SBS, cat map, and CSM patterns, in which we adopt two modulation rates as QPSK and 16-QAM over the same channel response. As shown in
Figure 3, all the three FH-OFDMA systems can obtain better BER results than the OFDMA system operated without hopping. This result verifies that the SBS, cat map, and CSM-based FH-OFDMA systems can achieve frequency diversities over the channel model. In addition, since the BER results by adopting QPSK are better than those by adopting 16-QAM, we observe that BER performance increases as the modulation rate decreases. Through the simulation results of
Figure 3, we show that frequency hopping is a significant and effective method to achieve frequency diversity and improve BER performance in the OFDMA system.
Figure 4 shows the detection probabilities of SBS, cat map, and CSM-based FH-OFDMA systems for logarithmic scales as the SNR increases. We set common parameters for the three FH-OFDMA systems as false alarm probability,
= 0.05, redundant number of FH-OFDMA frames,
= 100, number of clusters,
= 11, and number of transmitting users,
K = 11. As we mentioned previously, since the detection probability of the FH-OFDMA system is the product of the symbol detection probability and the intercept probability, the gap among three FH patterns is sustained as constant as SNR increases. As a result, since the CSM-based FH pattern has the lowest intercept probability, the CSM always has a lower detection probability than other FH-OFDMA systems. In addition, we can observe that all the detection probabilities are increased when SNR is varied from −35 to −15 dB. However, the detection probabilities of the three FH-OFDMA systems converge to a fixed value when the SNR exceeds −14 dB.
Figure 5 shows the relationship between the detection probability and redundant number of FH-OFDMA frames for detecting for the SBS, cat map, and CSM-based FH-OFDMA systems. We set common parameters as false alarm probability,
= 0.05, number of clusters,
= 11, number of transmitting users,
K = 11, and SNR = 10 dB. In
Figure 5, as the redundant number of FH-OFDMA frames for detecting increases, the detection probability also increases. This result shows that, if a seed number changes after
periods and the hopping cluster index, thus, changes every FH-OFDMA frame, the LPD capability is enhanced extremely.
Figure 5 also shows that the gap among three FH patterns is sustained as constant regardless of the value of
, since the detection probability of the FH-OFDMA system is the product of the symbol detection probability and the intercept probability.
Figure 6 shows the required false alarm probability for detection probabilities for the SBS, cat map, and CSM-based systems. We choose common parameters as SNR = −20 dB, redundant number of FH-OFDMA frames,
, number of clusters,
, and number of transmitting users,
. In
Figure 6, we observe that the detection probability at the detector decreases as the required false alarm probability increases. As shown in
Figure 6, the CSM always has a lower detection probability than the cat map and SBS for all values of the false alarm probabilities.
Figure 7 shows the detection probabilities of the SBS, cat map, and CSM-based FH-OFDMA systems for logarithmic scales as the user load increases from 0.1 to 1.0. The user load is defined as the ratio of the number of transmitting users
K to the number of clusters
. We set the parameters as false alarm probability,
= 0.05, redundant number of FH-OFDMA frames,
= 100, number of clusters,
= 11, and SNR = −20 dB. When
K = 1, the detection probabilities of the cat map and CSM-based systems have the same value and lower than that of the SBS-based system. When
K increases above 1, the detection probability of the CSM becomes smaller than that of the cat map. As shown in
Figure 7, we can also observe that when user load approaches 1, the detection probabilities are decreased. This means that an increase in user load enhances the LPD capability of the FH-OFDMA system.
From
Figure 4,
Figure 5,
Figure 6 and
Figure 7, we conclude that the CSM-based FH-OFDMA system has the greatest LPD capability.
Figure 8 shows the effect of the required false alarm probability,
of the CSM-based FH-OFDMA system. We chose three values of
as 0.05, 0.1, and 0.2, while setting redundant number of FH-OFDMA frames,
= 100, number of clusters,
= 11, and number of transmitting users,
K = 11. For the results, we varied the SNR from −35 to −10 dB. As the SNR increases from −35 to −15 dB, detection probabilities of the CSM sharply increase for all values of
. Above SNR = −15 dB, the detection probabilities are stable. As seen in
Figure 8, as the required false alarm probability increases, the detection probability decreases because the threshold to detect the FH-OFDMA signal increases.