AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (6.8 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

CNNs-based end-to-end asymmetric encrypted communication system

College of Artificial Intelligence, North China University of Science and Technology, Tangshan 063210, China
Show Author Information

Abstract

In this paper, we propose an asymmetric encrypted end-to-end communication system based on convolutional neural networks to solve the problem of secure transmission in the end-to-end wireless communication system. The system generates a key generator through a convolutional neural network as a bridge. The private and public keys establish a key pair relationship of arbitrary length sequence information. The transmitter and receiver consist of autoencoders based on convolutional neural networks. For data confidentiality requirements, we design the loss function of the end-to-end communication model based on a convolutional neural network. We also design bugs based on different predictions about the information the system eavesdropper has. Simulation results show that the system performs well on additive Gaussian white noise and Rayleigh fading channels. A legitimate party can establish a secure transmission under a designed communication system; an illegal eavesdropper without a key cannot accurately decode it.

References

[1]

K. Kaur, S. Kumar, and A. Baliyan, 5G: A new era of wireless communication, Int. J. Inf. Technol., vol. 12, no. 2, pp. 619–624, 2020.

[2]

Q. V. Khanh, N. V. Hoai, L. D. Manh, A. N. Le, and G. Jeon, Wireless communication technologies for IoT in 5G: Vision, applications, and challenges, Wirel. Commun. Mob. Comput., vol. 2022, pp. 1–12, 2022.

[3]

Z. Qin, H. Ye, G. Y. Li, and B. H. F. Juang, Deep learning in physical layer communications, IEEE Wirel. Commun., vol. 26, no. 2, pp. 93–99, 2019.

[4]

Q. Hu, F. Gao, H. Zhang, S. Jin, and G. Y. Li, Deep learning for channel estimation: Interpretation, performance, and comparison, IEEE Trans. Wirel. Commun., vol. 20, no. 4, pp. 2398–2412, 2020.

[5]
W. Zhang, M. Feng, M. Krunz, and A. Hossein Yazdani Abyaneh, Signal detection and classification in shared spectrum: A deep learning approach, in Proc. IEEE INFOCOM 2021 - IEEE Conf. Computer Communications, Vancouver, Canada, 2021, pp. 1–10.
[6]
H. Ye, L. Liang, and G. Y. Li, Circular convolutional auto-encoder for channel coding, in Proc. 2019 IEEE 20th Int. Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2019, pp. 1–5.
[7]
A. V. Makkuva, X. Liu, M. V. Jamali, H. Mahdavifar, S. Oh, and P. Viswanath, KO codes: Inventing nonlinear encoding and decoding for reliable wireless communication via deep-learning, arXiv preprint arXiv: 2108.12920, 2021.
[8]

S. Cammerer, F. A. Aoudia, S. Dörner, M. Stark, J. Hoydis, and S. ten Brink, Trainable communication systems: Concepts and prototype, IEEE Trans. Commun., vol. 68, no. 9, pp. 5489–5503, 2020.

[9]

H. Ye, L. Liang, G. Y. Li, and B. H. Juang, Deep learning-based end-to-end wireless communication systems with conditional GANs as unknown channels, IEEE Trans. Wirel, Commun., vol. 19, no. 5, pp. 3133–3143, 2020.

[10]

F. Ait Aoudia and J. Hoydis, End-to-end learning for OFDM: From neural receivers to pilotless communication, IEEE Trans. Wirel. Commun., vol. 21, no. 2, pp. 1049–1063, 2022.

[11]

H. Ye, G. Y. Li, and B. H. Juang, Deep learning based end-to-end wireless communication systems without pilots, IEEE Trans. Cogn. Commun. Netw, vol. 7, no. 3, pp. 702–714, 2021.

[12]

H. Jiang, S. Bi, L. Dai, H. Wang, and J. Zhang, Residual-aided end-to-end learning of communication system without known channel, IEEE Trans. Cogn. Commun. Netw., vol. 8, no. 2, pp. 631–641, 2022.

[13]

Y. An, S. Wang, L. Zhao, Z. Ji, and I. Ganchev, A learning-based end-to-end wireless communication system utilizing a deep neural network channel module, IEEE Access, vol. 11, pp. 17441–17453, 2023.

[14]

T. O’Shea and J. Hoydis, An introduction to deep learning for the physical layer, IEEE Trans. Cogn. Commun. Netw., vol. 3, no. 4, pp. 563–575, 2017.

[15]
A. Burg, A. Chattopadhyay, and K. -Y. Lam, Wireless communication and security issues for cyber-physical systems and the internet-of-things, Proc. IEEE, vol. 106, no. 1, pp. 38–60, 2017.
[16]
N. Goergen, T. C. Clancy, and T. R. Newman, Physical layer authentication watermarks through synthetic channel emulation, in Proc. 2010 IEEE Symp. on New Frontiers in Dynamic Spectrum (DySPAN), Singapore, 2010, pp. 1–7.
[17]

D. Shan, K. Zeng, W. Xiang, P. Richardson, and Y. Dong, PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks, IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1817–1827, 2013.

[18]

D. Chen, N. Zhang, R. Lu, X. Fang, K. Zhang, Z. Qin, and X. Shen, An LDPC code based physical layer message authentication scheme with prefect security, IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 748–761, 2018.

[19]
T. Dean and A. Goldsmith, Physical-layer cryptography through massive MIMO, in Proc. 2013 IEEE Information Theory Workshop (ITW), Seville, Spain, 2013, pp. 1–5.
[20]

W. Li, D. McLernon, K. K. Wong, S. Wang, J. Lei, and S. Ali Raza Zaidi, Asymmetric physical layer encryption for wireless communications, IEEE Access, vol. 7, pp. 46959–46967, 2019.

[21]
M. Arvandi, S. Wu, A. Sadeghian, W. W. Melek, and I. Woungang, Symmetric cipher design using recurrent neural networks, in Proc. 2006 IEEE Int. Joint Conf. Neural Network Proceedings, Vancouver, Canada, 2006, pp. 2039–2046.
[22]
M. Abadi and D. G. Andersen, Learning to protect communications with adversarial neural cryptography, arXiv preprint arXiv: 1610.06918, 2016.
[23]

Z. Sun, H. Wu, C. Zhao, and G. Yue, End-to-end learning of secure wireless communications: Confidential transmission and authentication, IEEE Wirel. Commun., vol. 27, no. 5, pp. 88–95, 2020.

[24]

A. Nooraiepour and S. R. Aghdam, Learning end-to-end codes for the BPSK-constrained Gaussian wiretap channel, Phys. Commun., vol. 46, p. 101282, 2021.

[25]

Y. An, M. Wang, L. Chen, and Z. Ji, DCGAN-based symmetric encryption end-to-end communication systems, AEU Int. J. Electron. Commun., vol. 154, p. 154297, 2022.

[26]
Z. Li, R. Yates, and W. Trappe, Secrecy capacity of independent parallel channels, in Securing Wireless Communications at the Physical Layer, R. Liu and W. Trappe, Eds. Boston, MA, USA: Springer, 2009, pp. 1–18.
[27]
H. Suo, J. Wan, C. Zou, and J. Liu, Security in the Internet of Things: A review, in Proc. 2012 Int. Conf. Computer Science and Electronics Engineering, Hangzhou, China, 2012, pp. 648–651.
[28]
W. Diffie and M. E. Hellman, New directions in cryptography, in Democratizing cryptography : The work of Whitfield Diffie and Martin Hellman, R. Slayton, Ed. New York, NY, USA: ACM, 2022. pp. 365–390.
[29]

C. E. Shannon, A mathematical theory of communication, SIGMOBILE Mob. Comput. Commun. Rev., vol. 5, no. 1, pp. 3–55, 2001.

[30]
M. Uzair and N. Jamil, Effects of hidden layers on the efficiency of neural networks, in Proc. 2020 IEEE 23rd Int. Multitopic Conf. (INMIC), Bahawalpur, Pakistan, 2021, pp. 1–6.
[31]

A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, 1975.

[32]
C. F. R. Chen, Q. Fan, and R. Panda, CrossViT: Cross-attention multi-scale vision transformer for image classification, in Proc. 2021 IEEE/CVF Int. Conf. Computer Vision (ICCV), Montreal, Canada, 2022, pp. 347–356.
[33]

G. Menghani, Efficient deep learning: A survey on making deep learning models smaller, faster, and better, ACM Comput. Surv., vol. 55, no. 12, pp. 1–37, 2023.

Intelligent and Converged Networks
Pages 313-325
Cite this article:
An Y, Hu Z, Cai H, et al. CNNs-based end-to-end asymmetric encrypted communication system. Intelligent and Converged Networks, 2023, 4(4): 313-325. https://doi.org/10.23919/ICN.2023.0026

351

Views

38

Downloads

0

Crossref

0

Scopus

Altmetrics

Received: 03 April 2023
Accepted: 13 July 2023
Published: 30 December 2023
© All articles included in the journal are copyrighted to the ITU and TUP.

This work is available under the CC BY-NC-ND 3.0 IGO license:https://creativecommons.org/licenses/by-nc-nd/3.0/igo/

Return