Next Article in Journal
Aerodynamics of Cycling Skinsuits Focused on the Surface Shape of the Arms
Previous Article in Journal
On-Board Road Friction Estimation Technique for Autonomous Driving Vehicle-Following Maneuvers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis of Low Probability of Detection Capability for Chaotic Standard Map-Based FH-OFDMA System

1
LIG Nex1, Sampyeong-dong, Bundang-gu, Sungnam 13488, Korea
2
Department of Computer Engineering, Ajou Univerity, San 5, Wonchon-dong, Youngtong-gu, Suwon 16499, Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2021, 11(5), 2198; https://doi.org/10.3390/app11052198
Submission received: 9 February 2021 / Revised: 25 February 2021 / Accepted: 26 February 2021 / Published: 3 March 2021
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
A frequency hopping orthogonal frequency division multiple access (FH-OFDMA) can provide low probability of detection (LPD) and anti-jamming capabilities to users against adversary detectors. To obtain an extreme LPD capability that cannot be provided by the basic symbol-by-symbol (SBS)-based FH pattern, we proposed two FH patterns, namely chaotic standard map (CSM) and cat map for FH-OFDMA systems. In our previous work, through analysis of complexity to regenerate the transmitted symbol sequence, at the point of adversary detectors, we found that the CSM had a lower probability of intercept than the cat map and SBS. It is possible when a detector already knows symbol and frame structures, and the detector has been synchronized to the FH-OFDMA system. Unlike the previous work, here, we analyze whether the CSM provides greater LPD capability than the cat map and SBS by detection probability using spectrum sensing technique. We analyze the detection probability of the CSM and provide detection probabilities of the cat map and SBS compared to the CSM. Based on our analysis of the detection probability and numerical results, it is evident that the CSM provides greater LPD capability than both the cat map and SBS-based FH-OFDMA systems.

1. Introduction

Frequency hopping-orthogonal frequency division multiple access (FH-OFDMA) can provide low probability of detection (LPD) and anti-jamming capabilities to authenticated users against adversaries for secure multimedia and military communication services [1]. In the OFDMA system, the entire frequency spectrum is divided into multiple narrow-band subcarriers, which are then assigned to multiple users to transmit data symbols on different subcarriers simultaneously [2]. In the FH-OFDMA system, the total number of subcarriers is partitioned into a set of clusters composed of contiguous subcarriers, and each cluster is changed to a different frequency during each period based on the FH pattern. The users are each assigned to one of the clusters to transmit data symbols over the FH-OFDMA system. Thus, the FH-OFDMA system has the advantages of both LPD due to FH pattern and high spectral efficiency of the OFDMA system [3]. The FH-OFDMA system chooses the orthogonal frequency division multiplexing (OFDM) symbols and cyclic prefix durations according to the Doppler and delay spreads of the transmitting channel, respectively; thus, subcarriers of the FH-OFDMA system retain their orthogonality and experience flat fading upon reception. The FH-OFDMA system can be combined with channel coding resulting in frequency diversity when the channel response varies over the hopping distance, and such frequency diversity has been verified in many prior studies [4,5,6]. In the military domain, the authors of Reference [7] consider the condition that an adversary intentionally jams parts of frequency hopping slots and select non-jammed hopping sequences to obtain low bit error performance. However, in this study, we have fundamentally different focus on the advantage of the FH-OFDMA system that supports LPD against detection of adversaries, such as eavesdroppers or radiometers.
Some previous works on FH-OFDMA systems have noted various FH pattern designs to achieve LPD capability and frequency diversity [8,9,10,11,12,13]. In Reference [8,9,10,11,12], the transmitted symbol index is changed at each symbol period through the symbol-by-symbol (SBS) hopping strategy. In order to design an SBS-based FH pattern, orthogonal Latin squares and Welch-Costas-based FH patterns are introduced in Reference [8,9], respectively. In Reference [10,11], secure collision free and residue number system arithmetic assisted FH patterns are proposed to obtain high frequency diversity through SBS hopping over fast frequency selective fading. In [12], the authors propose a wide-gap FH pattern, which can be adopted to FH-OFDMA systems, to highly reduce interference between adjacent frequencies. In [13], we propose two frequency hopping strategies based on the chaotic standard map (CSM) and cat map-based FH patterns. As these two FH patterns are hopped into time and frequency domains using additional memory of the cluster size, the FH-OFDMA systems of these two proposed FH patterns have lower probabilities of intercept than the SBS-based FH pattern. Between the CSM and cat map-based FH patterns, the CSM-based FH-OFDMA system has a lower probability of intercept, since a symbol of the CSM cannot be shown in every symbol period, whereas a symbol of the cat map is mixed with the symbol index and is shown in every symbol period similar to the SBS. In Reference [13], we only analyze the complexity of regenerating the transmitted symbol sequence. It is possible that a detector already knows the symbol and frame structures, and their parameters, and the detector is synchronized to the FH-OFDMA system.
Unlike our previous work, here, we analyze whether the CSM provides greater LPD capability than the cat map and SBS-based FH-OFDMA systems by detection probability using spectrum sensing technique. The spectrum sensing technique is studied to identify unused spectrum regions that may be exploited efficiently without causing harmful interference to the existing incumbent users. Although it is very difficult to detect authentic OFDMA signals using spectrum sensing, many studies related to cognitive radio techniques have helped the spectrum sensing domain [14]. Based on spectrum sensing, the authors of Reference [15] propose an FH pattern based on SBS hopping strategy for LPD capability, and the authors analyze detection probability in frequency-hopped wireless communications. Up until very recently, many authors have proposed the signal sensing methods to obtain FH signals based on cross-correlation [16] and deep learning [17]. These detection methods are only focused on the frequency-hopped system, but do not consider an OFDM system constructed by multiple subcarriers. For the OFDM system, an auto-correlation-based spectrum sensing technique is proposed to analyze the detection probability in Reference [18]. Although the auto-correlation-based OFDM signal sensing technique does not require knowledge of the noise variance, the sensing technique for the FH-OFDMA system has different conditions for detection probabilities because of regenerated hopping sequence. We assume that the detector exploits the auto-correlation-based spectrum sensing technique with hypothesis testing to detect the FH-OFDMA signal. We analyze detection probability of the CSM-based FH-OFDMA system and provide detection probabilities of the cat map and SBS-based FH-OFDMA systems compared to the CSM. Based on our analysis of the detection probability, it is evident that the CSM provides a higher LPD capability than both the cat map and SBS-based systems.
The rest of this paper is organized as follows: In Section 2, our CSM and cat map-based FH patterns proposed in Reference [13] are introduced, along with the SBS-based FH pattern for FH-OFDMA systems. In Section 3, we analyze the detection probability based on auto-correlation properties of OFDMA signals with hypothesis testing for the FH-OFDMA systems. Numerical simulations of the systems with specific parameters are carried out, and the simulation results are shown in Section 4. Finally, our conclusions are presented in Section 5.

2. FH Patterns for FH-OFDMA System

The total bandwidth is divided into a number of subcarriers N F F T according to the length of the fast Fourier transform (FFT) signal of the FH-OFDMA system, which is composed of contiguous OFDMA symbols consisting of a sum of subcarriers modulated by multiple phase shift keying (PSK) or quadrature amplitude modulation (QAM). Without loss of generality, we assume the sampling rate between the number of effective symbols T d , and the number of subcarriers N F F T , after the inverse FFT (IFFT) as 1. The size of each subcarrier is constructed using several clusters with the number of clusters N L , which are composed of contiguous subcarriers whose number is denoted as N s . Thus, we achieve N L = N F F T / N s . The FH-OFDMA signal converts from serial to parallel by an IFFT block. Let D n ( 0 ) , D n ( 1 ) , , D n ( N F F T 1 ) be complex multiple PSK or QAM modulated data that are transmitted on N F F T subcarriers at the n-th cluster index; then, the output of the IFFT as the symbol of the transmitted FH-OFDMA frame is
s n ( t ) = 1 N F F T f = 0 N F F T 1 D n ( f ) e j 2 π t f N F F T ,
where t is a discrete time index, t = 0 , , T d 1 , n is cluster index from 0 to N L 1 , and f is a discrete subcarrier index. Let T c be the number of symbols for the cyclic prefix; we define cyclic prefix symbols of the n-th cluster as s n ( T d T c ) , , s n ( T d 1 ) , and the cyclic prefix symbols are added to the FH-OFDMA symbols. In the time domain, the FH-OFDMA time block with duration T s = T d + T c is constructed as [ s n ( T d T c ) , , s n ( T d 1 ) , s n ( 0 ) , s n ( 1 ) , , s n ( T d 1 ) ] .
In the FH-OFDMA system, the modulated data with N F F T size before an IFFT block are constructed by a specific FH pattern given by
f = 0 N F F T 1 D n ( f ) = k i = 0 N L 1 t = i × N s i × N s + ( N s 1 ) d n k ( t ) k { H α , x k ( j ) = i , H α , y k ( j ) = n } ,
where d n k ( t ) denotes the transmitted data of k-th user for n-th cluster at t-th symbol time index. H α , x k ( j ) and H α , y k ( j ) are the x-axis and y-axis of the FH pattern for the j-th generated data of k-th user, respectively. Each user generates data of size N L , and the data is mixed and modulated by the FH pattern, such as CSM, cat map, and SBS-based FH pattern. x-axis and y-axis indicate the range of the symbol and cluster indexes, respectively. Since we consider that a user can be assigned only one cluster index in the FH-OFDMA system, the maximum number of users is limited to N L . With a seed number of α , we assign the value of { H α , x k ( j ) , H α , y k ( j ) } to { L α , x k ( j ) , L α , y k ( j ) } , { T α , x k ( j ) , T α , y k ( j ) } , and { C α , x k ( j ) , C α , y k ( j ) } for the SBS, cat map, and CSM-based hopping strategies, respectively. In Figure 1, we set N s = 4 and show the symbol of a transmitted FH-OFDMA frame as an example. The same-colored blocks are transmitted contiguously by the same user. As shown in Figure 1, the number of symbols for cyclic prefix, T c , is copied from the number of effective symbols, T d , and is added in front of the effective symbols to absorb the multipath delay of the FH-OFDMA system.
Before we introduce three FH patterns to verify the LPD capabilities of the FH-OFDMA system, we address that the CSM and cat map-based FH patterns have practical limitations that those FH patterns must have symbol buffers with size N L unlike the SBS-based FH pattern. Because the transmitting data sequences of the two FH patterns are mixed to increase the complexity of detection probability against eavesdroppers. In addition, receivers of the FH-OFDMA systems using the CSM and cat map-based FH patterns can start parsing modulated data after receiving N L symbol buffers. Now, we show the SBS-based FH pattern and its FH pattern indexes of x-axis and y-axis. In this study, we choose a formula of the Latin squares-based FH pattern as one of the SBS-based FH patterns [13]. We can obtain the SBS-based FH pattern of the j-th data for the k-th user using Latin squares as
L α , x k ( j ) = j L α , y k ( j ) = k j α 1 mod N L ,
where α is the seed number of the FH pattern for α = 2 , , N L 1 . We introduce the cat map-based FH pattern using block symmetric ciphers [13]. In the cat map-based FH pattern, the generated symbols appear to be hopped in both time and frequency domains, since the transmitted symbol of each user appears at each period once, but the transmission order is mixed. The cat map-based FH pattern of the j-th data for the k-th user can be obtained by
T α , x k ( j ) T α , y k ( j ) = b 11 b 12 b 21 b 22 c α k ( j ) j ( mod N L ) ,
where b 11 , b 12 , b 21 , and b 22 are positive integers satisfying relations b 11 × b 22 b 12 × b 21 = 1 and α b 12 > b 11 . The cluster index of c α k ( j ) of the j-th data for the k-th user using a seed number of α is given by
c α k ( j ) = k j α 1 mod N L , j = 0 , , N L 1 ,
where j denotes the data index of consecutive points ( i , j ) for which L α ( i , j ) = k and L α ( i , j ) = ( α i + j ) mod N L , i , j = 0 , , N L 1 [13]. The CSM is widely used to design block symmetric ciphers for LPD capability. Beside the cat map-based FH pattern, the symbols generated by the CSM-based FH pattern are hopped in both time and frequency domains, and the transmitted sequences are mixed. Based on the complexity of detection probability, the CSM-based FH pattern provides greater LPD capability than the cat map and SBS-based FH patterns. The CSM-based FH pattern of the j-th data for the k-th user can be obtained by
C α , x k ( j ) = c α k ( j ) + j + r x + r y mod N L C α , y k ( j ) = j + r y + K C sin C α , x k ( j ) N L 2 π mod N L ,
where the cluster index of c α k ( j ) of the j-th data for the k-th user using a seed number α can be obtained by (5). r x and r y are constant integers from 0 to N L 1 , and K C is a positive integer. x is the nearest integer to x.
Figure 2 shows an example of how to assign the three FH patterns in time and subcarrier domains, and we compare the three FH patterns, i.e., the SBS, cat map, and CSM-based patterns. To increase the detection probability from the point of view of eavesdropping detectors, we assume that the detectors receive a redundant number, N s , of contiguous FH-OFDMA frames consisting of N L symbols. For the examples in Figure 2, we set N L = 5 , N F F T = 20 , N s = 4 , number of transmitting users as 3, and indexes of the users as k = 1, 2, and 5. In Figure 2a, we show an example of an SBS-based FH pattern using Latin squares-based strategy for seed number, α = 4. The users, k = 1, 2, and 5 are assigned their SBS-based FH patterns as { L 4 , x 1 ( j ) , L 4 , y 1 ( j ) } = { ( 1 , 1 ) , ( 2 , 2 ) , ( 3 , 3 ) , ( 4 , 4 ) , ( 5 , 5 ) } , { L 4 , x 2 ( j ) , L 4 , y 2 ( j ) } = { ( 5 , 5 ) , ( 1 , 1 ) , ( 2 , 2 ) , ( 3 , 3 ) , ( 4 , 4 ) } , and { L 4 , x 5 ( j ) , L 4 , y 5 ( j ) } = { ( 2 , 2 ) , ( 3 , 3 ) , ( 4 , 4 ) , ( 5 , 5 ) , ( 1 , 1 ) } for j = 1 , , 5 , respectively. As shown in Figure 2a as an example of the SBS-based FH pattern, the data index of each user is shown once at each cluster and are hopped to a different cluster for each symbol. In addition, the transmitting data order of every user is continuous in Figure 2a. In Figure 2b, we show an example of a cat map-based FH pattern for { b 11 , b 12 , b 21 , b 22 } = { 1 , 1 , 1 , 2 } and seed number, α = 4. The users, k = 1, 2, and 5 are assigned their cat map-based FH patterns as { T 4 , x 1 ( j ) , T 4 , y 1 ( j ) } = { ( 1 , 1 ) , ( 3 , 4 ) , ( 5 , 2 ) , ( 2 , 5 ) , ( 4 , 3 ) } , { T 4 , x 2 ( j ) , T 4 , y 2 ( j ) } = { ( 5 , 5 ) , ( 2 , 3 ) , ( 4 , 1 ) , ( 1 , 4 ) , ( 3 , 2 ) } , and { T 4 , x 5 ( j ) , T 4 , y 5 ( j ) } = { ( 2 , 2 ) , ( 3 , 3 ) , ( 4 , 4 ) , ( 5 , 5 ) , ( 1 , 1 ) } for j = 1 , , 5 , respectively. As shown in Figure 2b as an example of the cat map-based FH pattern, the first data set for k = 2 is transmitted at the symbol period of n = 4 and the first data set for k = 5 is transmitted at the symbol period of n = 1. In the cat map-based FH pattern, the transmitted data order is mixed as shown in Figure 2b. However, the data index of each user using the cat map-based FH pattern is shown once for each cluster and hopped to a different cluster for each symbol. In Figure 2c, we show the example of a CSM-based FH pattern for K C = 3000, r x = 1, r y = 3 and seed number α = 2. The users, k = 1, 2, and 5 are assigned their CSM-based FH patterns as { C 4 , x 1 ( j ) , C 4 , y 1 ( j ) } = { ( 5 , 5 ) , ( 3 , 4 ) , ( 1 , 1 ) , ( 4 , 1 ) , ( 2 , 1 ) } , { C 4 , x 2 ( j ) , C 4 , y 2 ( j ) } = { ( 3 , 3 ) , ( 1 , 5 ) , ( 4 , 5 ) , ( 2 , 5 ) , ( 5 , 4 ) } , and { C 4 , x 5 ( j ) , C 4 , y 5 ( j ) } = { ( 2 , 2 ) , ( 5 , 1 ) , ( 3 , 5 ) , ( 1 , 2 ) , ( 4 , 2 ) } for j = 1 , , 5 , respectively. As shown in Figure 2c as example of the CSM-based FH pattern, two data sets for k = 1 appeared at the symbol period n = 1, and two data sets for k = 5 appeared at the symbol period n = 2. In addition, the transmitted data order is mixed, since the last and first data sets for k = 1 is transmitted at the symbol periods n = 0 and n = 4, respectively.

3. Analysis of Detection Probability

In this section, our goal is to analyze detection probability of a CSM-based FH-OFDMA system compared to detection probabilities of the other FH-OFDMA systems from the point of view of an adversary detector. To increase detection probability, the detector should observe over several FH-OFDMA symbols, i.e., y ( 0 ) , y ( 1 ) , , y ( M + T d 1 ) . The number of observing FH-OFDMA symbols, M, must be composed of multiplications of the redundant number of FH-OFDMA frames, N R , and the number of symbols in a frame, i.e., M = N R × N L . Our analysis assumes that the adversary detector already knows the effective symbol duration T d and its cyclic prefix T c . The knowledge of symbol duration is specified in standards or can be estimated by knowledge of the implementable IFFT and FFT sizes. Even if the exact value is not known, the symbol duration can be estimated by the receipt of sufficient symbols.
We analyze the detection probability using the spectrum sensing technique based on hypothesis testing. First, let h 0 be the null hypothesis, i.e., a transmitting user is absent in a FH-OFDMA system, and h 1 be the alternate hypothesis, i.e., a transmitting user exists in the FH-OFDMA system. Thus, the hypothesis testing problem may be written as
h 0 : y ( t ) = w ( t ) h 1 : y ( t ) = s ( t ) + w ( t ) ,
where y ( t ) is the received complex FH-OFDMA signal, and w ( t ) is the complex circular additive white Gaussian noise. Invoking the central limit theorem under the assumption of sufficiently large IFFT size, we have
s ( t ) N c ( 0 , σ s 2 ) and w ( t ) N c ( 0 , σ w 2 ) ,
where N c ( . ) denotes the Gaussian distribution for a complex random variable. Therefore, for different hypotheses, we have
h 0 : y ( t ) N c ( 0 , σ w 2 ) h 1 : y ( t ) N c ( 0 , σ s 2 + σ w 2 ) . .
We consider y ( t ) = y r ( t ) + j y i ( t ) as a circularly symmetric Gaussian random variable composed of real and imaginary parts of y, and these real and imaginary parts are obtained as:
y r ( t ) N r ( 0 , σ y 2 / 2 ) and y i ( t ) N r ( 0 , σ y 2 / 2 ) ,
where N r ( · ) denotes the Gaussian distribution for a real random variable. For the FH-OFDMA signal using cyclic prefix, the values of the auto-correlation coefficient ρ ( τ ) = E [ y ( t ) y * ( t + τ ) ] / E [ y ( t ) y * ( t ) ] for delay τ = ± T d under the two hypotheses are
h 0 : ρ ( ± T d ) = 0 h 1 : ρ ( ± T d ) = ρ D ,
where
ρ D = T c T d + T c σ s 2 σ s 2 + σ w 2 = T c T d + T c Γ 1 + Γ ,
where Γ denotes the signal-to-noise ratio (SNR) as σ s 2 / σ w 2 and 0 < ρ D < 1 . For a real valued coefficient, ρ ( τ ) = ρ ( τ ) . Hence, without loss of generality, we consider only τ = T d .
We can form two real random vectors from the observations such that z 1 = [ y r ( 0 ) y i ( 0 ) y r ( 1 ) y i ( 1 ) y r ( M 1 ) y i ( M 1 ) ] and z 2 = [ y r ( T d ) y i ( T d ) y r ( T d + 1 ) y i ( T d + 1 ) y r ( M + T d 1 ) y i ( M + T d 1 ) ] , where y r ( t ) and y i ( t ) are the real and imaginary parts of y ( t ) . Due to the circular symmetry assumption, the zero mean random variables y r ( t ) and y i ( t ) are independent and identically distributed (i.i.d.). We define ρ ^ M L as the maximum likelihood estimate from the vectors z 1 and z 2 . When using the log likelihood ratio test (LLRT), we decide the alternative hypothesis for the present hypothesis test above the threshold, η l of the adversary detector. For sufficiently large M, we approximate the distribution of the test statistic described in Reference [18] as
h 0 : ρ ^ M L N r 0 , 1 2 M h 1 : ρ ^ M L N r ρ D , 1 ρ D 2 2 2 M .
This is a classical detection problem with test statistic ρ ^ M L . To detect and intercept the desired signal, detectors can adopt one of the well-known detection strategies. We consider that the detectors adopt the detection strategy of Neyman-Pearson detection to satisfy a constant false alarm rate constraint [19]. For a Gaussian random variable r N r ( μ r , σ r 2 ) , we have
P r > η r = 1 2 e r f c η r μ r 2 σ r ,
where e r f c ( · ) is the complementary error function. Using (14) for 2 M real symbols, the required false alarm probability P f a is given by
P f a = P ρ ^ M L > η l h 0 = 1 2 e r f c M · η l .
Thus, the threshold at the detector can be calculated as
η l = 1 M · e r f c 1 ( 2 P f a ) .
The detection probability of the FH-OFDMA system is composed of the product of the auto-correlation-based symbol detection probability, that we have analyzed, and the intercept probability of FH patterns from the point of view of an adversary detector, as the two events are independent. Thus, the detection probability, P d F T , of the FH-OFDMA system using different FH patterns, such as SBS, cat map, and CSM-based strategies, for 2M real symbols can be obtained using (14), and we get:
P d F T = P I F H · P ρ ^ M L > η l h 1 = P I F H · 1 2 e r f c M · η l ρ D 1 ρ D 2 ,
where P I F H denotes the intercept probability for the FH-OFDMA system using different FH patterns. Based on Reference [13], P I F H has a different value according to the SBS, cat map, CSM-based FH patterns, and FH can, thus, be rewritten by SBS, CAT, and CSM, respectively. Without loss of generality, we assume that the hopping sequence does not change during the M OFDMA symbols, i.e., 2 M real symbols. For the SBS FH pattern, the detector is able to intercept the transmitted OFDMA symbol by selecting one cluster from N L clusters, except the previously selected cluster at each period. For K transmitting users ( K < N L ) , the detector can select one cluster from K clusters at each period. Hence, the P I S B S can be given as
P I S B S = 2 N R N L × N L 1 N L 1 , K = N L , 2 N R K N L , K < N L .
For the cat map-based FH pattern, transmitted symbols of each user appear at each symbol period once with mixed order in the time domain. The detector can intercept these symbols by selecting one cluster from K clusters at each period and finding the correct order from possible permutations. Hence, the P I C A T can be given by
P I C A T = 2 N R N L × N L 1 N L 1 × N L ! , K = N L , 2 N R K N L × N L ! , K < N L .
For the CSM-based FH pattern, the detector should select N L clusters from N L × K ( K N L ) symbols and find the order of these symbols after detecting, receiving, and storing the symbols during the period N L . Hence, the P I C S M is given by
P I C S M = 2 N R N L × K P N L , K N L .
Here, n P r denotes the permutation of n ! / ( n r ) ! .

4. Simulation Results

The simulation results are provided to analyze whether the CSM-based FH-OFDMA system provides greater LPD capability than the cat map and SBS-based FH-OFDMA systems. We set common parameters of simulation results as the number of subcarriers, N F F T = 220, excluding guard subcarriers of 36, number of symbols for cyclic prefix, T c = T d / 4 , number of clusters as the number of maximum transmitting users, N L = 11 , and N s = 20 . The transmitted data is modulated as QPSK or 16-QAM, and the data is coded by convolutional coding at 1/2 coding rate. The FH-OFDMA signal is sent over a wireless six-ray channel impulse model of the Universal Mobile Telecommunications System—Terrestrial Radio Access System (UTRA) vehicular model A [20]. For the SBS-based FH pattern, we select a Latin squares-based FH pattern of α = 4. For the cat map-based FH pattern, we consider α = 4 , b 11 = b 12 = b 21 = 1 , and b 22 = 2 . For the CSM-based FH pattern, we consider α = 2 , r x = 1 , r y = 3 , and K C = 3000.
Before we analyze the detection probabilities of FH-OFDMA systems, we verify that the FH-OFDMA systems based on SBS, cat map, and CSM patterns can achieve frequency diversities by bit error rate (BER) performance. Figure 3 shows the BER results of an OFDMA system without hopping and FH-OFDMA systems based on SBS, cat map, and CSM patterns, in which we adopt two modulation rates as QPSK and 16-QAM over the same channel response. As shown in Figure 3, all the three FH-OFDMA systems can obtain better BER results than the OFDMA system operated without hopping. This result verifies that the SBS, cat map, and CSM-based FH-OFDMA systems can achieve frequency diversities over the channel model. In addition, since the BER results by adopting QPSK are better than those by adopting 16-QAM, we observe that BER performance increases as the modulation rate decreases. Through the simulation results of Figure 3, we show that frequency hopping is a significant and effective method to achieve frequency diversity and improve BER performance in the OFDMA system.
Figure 4 shows the detection probabilities of SBS, cat map, and CSM-based FH-OFDMA systems for logarithmic scales as the SNR increases. We set common parameters for the three FH-OFDMA systems as false alarm probability, P f a = 0.05, redundant number of FH-OFDMA frames, N R = 100, number of clusters, N L = 11, and number of transmitting users, K = 11. As we mentioned previously, since the detection probability of the FH-OFDMA system is the product of the symbol detection probability and the intercept probability, the gap among three FH patterns is sustained as constant as SNR increases. As a result, since the CSM-based FH pattern has the lowest intercept probability, the CSM always has a lower detection probability than other FH-OFDMA systems. In addition, we can observe that all the detection probabilities are increased when SNR is varied from −35 to −15 dB. However, the detection probabilities of the three FH-OFDMA systems converge to a fixed value when the SNR exceeds −14 dB.
Figure 5 shows the relationship between the detection probability and redundant number of FH-OFDMA frames for detecting for the SBS, cat map, and CSM-based FH-OFDMA systems. We set common parameters as false alarm probability, P f a = 0.05, number of clusters, N L = 11, number of transmitting users, K = 11, and SNR = 10 dB. In Figure 5, as the redundant number of FH-OFDMA frames for detecting increases, the detection probability also increases. This result shows that, if a seed number changes after N L periods and the hopping cluster index, thus, changes every FH-OFDMA frame, the LPD capability is enhanced extremely. Figure 5 also shows that the gap among three FH patterns is sustained as constant regardless of the value of N R , since the detection probability of the FH-OFDMA system is the product of the symbol detection probability and the intercept probability.
Figure 6 shows the required false alarm probability for detection probabilities for the SBS, cat map, and CSM-based systems. We choose common parameters as SNR = −20 dB, redundant number of FH-OFDMA frames, N R = 100 , number of clusters, N L = 11 , and number of transmitting users, K = 11 . In Figure 6, we observe that the detection probability at the detector decreases as the required false alarm probability increases. As shown in Figure 6, the CSM always has a lower detection probability than the cat map and SBS for all values of the false alarm probabilities.
Figure 7 shows the detection probabilities of the SBS, cat map, and CSM-based FH-OFDMA systems for logarithmic scales as the user load increases from 0.1 to 1.0. The user load is defined as the ratio of the number of transmitting users K to the number of clusters N L . We set the parameters as false alarm probability, P f a = 0.05, redundant number of FH-OFDMA frames, N R = 100, number of clusters, N L = 11, and SNR = −20 dB. When K = 1, the detection probabilities of the cat map and CSM-based systems have the same value and lower than that of the SBS-based system. When K increases above 1, the detection probability of the CSM becomes smaller than that of the cat map. As shown in Figure 7, we can also observe that when user load approaches 1, the detection probabilities are decreased. This means that an increase in user load enhances the LPD capability of the FH-OFDMA system.
From Figure 4, Figure 5, Figure 6 and Figure 7, we conclude that the CSM-based FH-OFDMA system has the greatest LPD capability. Figure 8 shows the effect of the required false alarm probability, P f a of the CSM-based FH-OFDMA system. We chose three values of P f a as 0.05, 0.1, and 0.2, while setting redundant number of FH-OFDMA frames, N R = 100, number of clusters, N L = 11, and number of transmitting users, K = 11. For the results, we varied the SNR from −35 to −10 dB. As the SNR increases from −35 to −15 dB, detection probabilities of the CSM sharply increase for all values of P f a . Above SNR = −15 dB, the detection probabilities are stable. As seen in Figure 8, as the required false alarm probability increases, the detection probability decreases because the threshold to detect the FH-OFDMA signal increases.

5. Conclusions

In this study, we analyzed the detection probability of the CSM-based FH-OFDMA system and compared it with the cat map and SBS-based FH-OFDMA systems. We theoretically derived the LPD capability of the CSM-based FH-OFDMA system using auto-correlation-based spectrum sensing technique with hypothesis testing, and we showed the CSM-based system has greater LPD capability than the cat map and SBS-based systems. Simulation results also show the CSM-based system has similar BER performance as the two systems, but the CSM-based system decreases the detection probability dramatically in various simulation environments. As the redundant number of detecting frames or SNR increases, and the number of simultaneous users decreases, an intentional eavesdropper has a higher detection probability to find FH patterns, and the CSM stands out among the three FH patterns. Additionally, we found that the gap among the three FH patterns is sustained as the redundant number of frames or SNR increases, since the detection probability of the FH-OFDMA system is the product of the symbol detection probability and the intercept probability. The CSM-based FH pattern can be applied to time-frequency hopping domain, as well as the FH-OFDMA system. The CSM-based FH pattern has a limit to having symbol buffers of cluster size. Even considering the limitation, the CSM-based FH pattern has powerful LPD capability because the time and frequency transmitting sequences are mixed.

Author Contributions

Conceptualization, J.J. and J.L.; methodology, J.J. and J.L.; software, J.J. and S.P.; validation, J.L., H.K., and S.K.; investigation, J.J.; writing—original-draft preparation, J.J. and S.P.;writing—review and editing, J.J and S.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Stamatiou, K.; Proakis, J.G. Performance analysis of a coherent FH-MA system based on Latin squares. IEEE Trans. Wirel. Commun. 2007, 6, 4183–4192. [Google Scholar] [CrossRef]
  2. Jung, J.; Lim, J.; Kang, H.; Park, H. Multiple access interference-free multichannel slotted aloha scheme for time-asynchronous OFDMA systems. IEICE Trans. Commun. 2015, E98-B, 686–700. [Google Scholar] [CrossRef]
  3. Jung, J.; Lim, J. Group contention-based OFDMA MAC protocol for multiple access interference-free in WLAN systems. IEEE Trans. Wirel. Commun. 2012, 11, 648–658. [Google Scholar] [CrossRef]
  4. Verhulst, D.; Mouly, M.; Szpirglas, J. Slow frequency hopping multiple access for digital cellular radiotelephone. IEEE J. Sel. Areas Commun. 1984, 2, 563–574. [Google Scholar] [CrossRef]
  5. Olofsson, H.; Naslund, J.; Skold, J. Interference diversity gain in frequency hopping GSM. In Proceedings of the IEEE 45th Vehicle Technology Conference (VTC), Chicago, IL, USA, 25–28 July 1995. [Google Scholar]
  6. Chiani, M.; Conti, A.; Andrisano, O. Outage evaluation for slow frequency-hopping mobile radio systems. IEEE Trans. Commun. 1999, 47, 1865–1874. [Google Scholar] [CrossRef]
  7. Lee, H.; Ahn, J.; Kim, Y.; Chung, J. Outage evaluation for slow frequency-hopping mobile radio systems. Appl. Sci. 2020, 10, 1733. [Google Scholar] [CrossRef] [Green Version]
  8. Stamatiou, K.; Proakis, J.G. A performance analysis of coded frequency-hopped OFDMA. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 13–17 March 2005. [Google Scholar]
  9. Wang, C.; Zhang, X.; Yang, D. Evaluation of Welch-Costas frequency hopping pattern for OFDM cellular system. In Proceedings of the IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Athens, Greece, 3–7 September 2007. [Google Scholar]
  10. Lightfoot, L.; Zhang, L.; Ren, J.; Li, T. Secure collision-free frequency hopping for OFDMA-based wireless networks. EURASIP J. Adv. Signal. Proc. 2009, 2009, 361063. [Google Scholar] [CrossRef] [Green Version]
  11. Zhu, D.; Natarajan, B. Residue number system arithmetic assisted coded frequency-hopped OFDMA. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 263695. [Google Scholar] [CrossRef] [Green Version]
  12. Li, P.; Fan, C.; Yang, Y.; Wang, Y. New bounds on wide-gap frequency-hopping sequences. IEEE Commun. Lett. 2019, 23, 1050–1053. [Google Scholar] [CrossRef]
  13. Jung, J.; Lim, J. Chaotic standard map based frequency hopping OFDMA for low probability of intercept. IEEE Commun. Lett. 2011, 15, 1019–1021. [Google Scholar] [CrossRef]
  14. Axell, E.; Leus, G.; Larsson, E.G. Overview of spectrum sensing for cognitive radio. In Proceedings of the 2nd International Workshop on Cognitive Information Processing (CIP), Elba, Italy, 14–16 June 2010. [Google Scholar]
  15. Ning, B.; Li, Z.; Guan, L.; Zhou, F. Probabilistic frequency-hopping sequence with low probability of detection based on spectrum sensing. IET Commun. 2017, 11, 2147–2153. [Google Scholar] [CrossRef]
  16. Lee, K.G.; Oh, S.J. Detection of fast frequency-hopping signals using dirty template in the frequency domain. IEEE Wirel. Comm. Letters 2019, 8, 281–284. [Google Scholar] [CrossRef]
  17. Li, Z.; Liu, R.; Lin, X.; Shi, H. Detection of frequency-hopping signals based on deep neural networks. In Proceedings of the IEEE 3rd International Conference on Communication and Information Systems (ICCIS), Singapore, 28–30 December 2018. [Google Scholar]
  18. Chaudhari, S.; Koivunen, V.; Poor, H.V. Autocorrelation-based decentralized sequential detection of OFDM signals in cognitive radios. IEEE Trans. Signal. Process 2009, 57, 2690–2700. [Google Scholar] [CrossRef]
  19. Barkat, M. Signal and Detection and Estimation, 2nd ed.; Artech House: Boston, MA, USA, 2005. [Google Scholar]
  20. UMTS. Selection Procedures for Choice of Radio Transmission Technologies of UMTS (TR 101 112, UMTS 30.03, V3.1.0 (1997-11)); 3GPP Mobile Competence Centre: Sophia Antipolis, France, 1997. [Google Scholar]
Figure 1. Contiguous frequency hopping orthogonal frequency division multiplexing (FH-OFDM) symbol structure for spectrum sensing.
Figure 1. Contiguous frequency hopping orthogonal frequency division multiplexing (FH-OFDM) symbol structure for spectrum sensing.
Applsci 11 02198 g001
Figure 2. Comparison of symbol-by-symbol (SBS), cat map, and chaotic standard map (CSM)-based FH patterns.
Figure 2. Comparison of symbol-by-symbol (SBS), cat map, and chaotic standard map (CSM)-based FH patterns.
Applsci 11 02198 g002
Figure 3. Bit error rate (BER) performances versus signal-to-noise ratio (SNR) compared to SBS, cat map, and CSM-based FH-OFDMA systems.
Figure 3. Bit error rate (BER) performances versus signal-to-noise ratio (SNR) compared to SBS, cat map, and CSM-based FH-OFDMA systems.
Applsci 11 02198 g003
Figure 4. Detection probability versus SNR compared to SBS, cat map, and CSM-based FH-OFDMA systems.
Figure 4. Detection probability versus SNR compared to SBS, cat map, and CSM-based FH-OFDMA systems.
Applsci 11 02198 g004
Figure 5. Detection probability versus redundant number of FH-OFDMA frames for detection compared to SBS, cat map, and CSM-based FH-OFDMA systems.
Figure 5. Detection probability versus redundant number of FH-OFDMA frames for detection compared to SBS, cat map, and CSM-based FH-OFDMA systems.
Applsci 11 02198 g005
Figure 6. Required false alarm probability versus detection probability compared to SBS, cat map, and CSM-based FH-OFDMA systems.
Figure 6. Required false alarm probability versus detection probability compared to SBS, cat map, and CSM-based FH-OFDMA systems.
Applsci 11 02198 g006
Figure 7. Detection probability versus user load compared to SBS, cat map, and CSM-based FH patterns.
Figure 7. Detection probability versus user load compared to SBS, cat map, and CSM-based FH patterns.
Applsci 11 02198 g007
Figure 8. SNR versus detection probability compared to required false alarm probabilities of 0.05, 0.1, and 0.2 for CSM-based FH-OFDMA system.
Figure 8. SNR versus detection probability compared to required false alarm probabilities of 0.05, 0.1, and 0.2 for CSM-based FH-OFDMA system.
Applsci 11 02198 g008
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jung, J.; Lim, J.; Park, S.; Kang, H.; Kwon, S. Analysis of Low Probability of Detection Capability for Chaotic Standard Map-Based FH-OFDMA System. Appl. Sci. 2021, 11, 2198. https://doi.org/10.3390/app11052198

AMA Style

Jung J, Lim J, Park S, Kang H, Kwon S. Analysis of Low Probability of Detection Capability for Chaotic Standard Map-Based FH-OFDMA System. Applied Sciences. 2021; 11(5):2198. https://doi.org/10.3390/app11052198

Chicago/Turabian Style

Jung, Junwoo, Jaesung Lim, Sungyeol Park, Haengik Kang, and Seungbok Kwon. 2021. "Analysis of Low Probability of Detection Capability for Chaotic Standard Map-Based FH-OFDMA System" Applied Sciences 11, no. 5: 2198. https://doi.org/10.3390/app11052198

APA Style

Jung, J., Lim, J., Park, S., Kang, H., & Kwon, S. (2021). Analysis of Low Probability of Detection Capability for Chaotic Standard Map-Based FH-OFDMA System. Applied Sciences, 11(5), 2198. https://doi.org/10.3390/app11052198

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop