{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T19:49:02Z","timestamp":1766087342593,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T00:00:00Z","timestamp":1539734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Shenzhen Science and Technology Program","award":["JCYJ20170817110410346"],"award-info":[{"award-number":["JCYJ20170817110410346"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>For secure transmission of low cost single antenna communication nodes in wireless crowdsensing networks under static channel, a physical layer communication scheme is proposed, where each digital modulated symbol is encrypted by a random key at the transmitter and decrypted with the same key at the receiver. The legal users exploit the synchronized chaotic sequence and the two-stage block interleaver to generate a complex random variable (random key), whereby its envelope obeys the Rayleigh distribution and its phase obeys the uniformly distribution. The modulated symbol is multiplied by the complex random variable (encryption) to imitate the Rayleigh fading of the channel at the transmitting end. The received symbol is divided by the identical complex random variable (decryption) to recover the transmitted message before the digital demodulation at the receiving end. Simulation results show that the bit error ratio (BER) performance of the legitimate users is consistent with the theoretical value of the Rayleigh fading channel, while the corresponding BER of the eavesdropper is too high (about 0.5) to intercept any information.<\/jats:p>","DOI":"10.3390\/s18103500","type":"journal-article","created":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T10:22:54Z","timestamp":1539771774000},"page":"3500","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Secure Transmission Scheme Based on Artificial Fading for Wireless CrowdSensing Networks"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8691-9602","authenticated-orcid":false,"given":"Zhi-Jiang","family":"Xu","sequence":"first","affiliation":[{"name":"Zhijiang College, Zhejiang University of Technology, Shaoxing 312030, China"},{"name":"College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China"},{"name":"Department of Electrical and Electronic Engineering, Southern University of Science and Technology, Shenzhen 518055, China"}]},{"given":"Fang-Ni","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Southern University of Science and Technology, Shenzhen 518055, China"},{"name":"School of Information and Electronic Engineering, Zhejiang University of Science and Technology, Hangzhou 310023, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2777-7915","authenticated-orcid":false,"given":"Yuan","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7392-8991","authenticated-orcid":false,"given":"Yi","family":"Gong","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Southern University of Science and Technology, Shenzhen 518055, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,10,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"5567","DOI":"10.1109\/TWC.2017.2664832","article-title":"Joint Uplink Base Station Association and Power Control for Small-cell Networks with Non-orthogonal Multiple Access","volume":"16","author":"Qian","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2591","DOI":"10.1109\/TMC.2018.2812722","article-title":"Optimal Power Allocation and Scheduling for Non-Orthogonal Multiple Access Relay-Assisted Networks","volume":"17","author":"Wu","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1109\/JIOT.2016.2560518","article-title":"Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1516","DOI":"10.1109\/JIOT.2017.2779820","article-title":"Small-Cell Assisted Secure Traffic Offloading for Narrow-Band Internet of Thing (NB-IoT) Systems","volume":"5","author":"Yang","year":"2018","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Pechetti, S., Jindal, A., and Bose, R. (2018). Exploiting Mapping Diversity for Enhancing Security at Physical Layer in the Internet of Things. IEEE Internet Things J.","key":"ref_5","DOI":"10.1109\/PIMRC.2017.8292729"},{"doi-asserted-by":"crossref","unstructured":"Li, X., Wang, Q., Dai, H.-N., and Wang, H. (2018). A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack. Sensors, 18.","key":"ref_6","DOI":"10.3390\/s18061938"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MCOM.2017.1600690CM","article-title":"Promoting Cooperation by Social Incentive Mechanism in Mobile Crowdsensing","volume":"55","author":"Yang","year":"2017","journal-title":"IEEE Commun. Mag."},{"doi-asserted-by":"crossref","unstructured":"Ma, L., Liu, X., Pei, Q., and Xiang, Y. (2018). Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing. IEEE Trans. Serv. Comput.","key":"ref_8","DOI":"10.1109\/TSC.2018.2825986"},{"unstructured":"Li, T., Jung, T., Qiu, Z., Li, H., Cao, L., and Wang, Y. (2018). Scalable Privacy-Preserving Participant Selection for Mobile Crowdsensing Systems: Participant Grouping and Secure Group Bidding. IEEE Trans. Netw. Sci. Eng.","key":"ref_9"},{"key":"ref_10","first-page":"1027","article-title":"A Survey on Multiple-Antenna Techniques for Physical Layer Security","volume":"99","author":"Chen","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MNET.2018.1700320","article-title":"Secrecy-Driven Resource Management for Vehicular Computation Offloading Networks","volume":"32","author":"Wu","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/18.256484","article-title":"Secret Key Agreement by Public Discussion from Common Information","volume":"39","author":"Maurer","year":"1993","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/26.385951","article-title":"Unconventional Cryptographic Keying Variable Management","volume":"43","author":"Hershey","year":"1995","journal-title":"IEEE Trans. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2214","DOI":"10.1109\/TVT.2014.2342714","article-title":"Secret Key Generation via Localization and Mobility","volume":"64","author":"Gungor","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1517","DOI":"10.1109\/TWC.2015.2491935","article-title":"Physical-Layer Secret Key Generation with Colluding Untrusted Relays","volume":"15","author":"Thai","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"5565","DOI":"10.1109\/TWC.2015.2439684","article-title":"Maximization of the Channel-Based Key Establishment Rate in MIMO Systems","volume":"14","author":"Quist","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1360\/N112015-00074","article-title":"Analysis of Secure Communications for A DF and RF Relaying SIMO System with Gauss Errors","volume":"46","author":"Zhao","year":"2016","journal-title":"Sci. Sin. Inform."},{"doi-asserted-by":"crossref","unstructured":"Song, C. (2018). Achievable Secrecy Rate of Artificial Fast-fading Techniques and Secret-key Assisted Design for MIMO Wiretap Channels with Multi-antenna Passive Eavesdropper. IEEE Trans. Veh. Technol.","key":"ref_18","DOI":"10.1109\/TVT.2018.2856764"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"6700","DOI":"10.1109\/TVT.2018.2811733","article-title":"Secure MISO-NOMA Transmission With Artificial Noise","volume":"67","author":"Lv","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"7921","DOI":"10.1109\/ACCESS.2018.2804924","article-title":"Secrecy Capacity of Artificial Noise Aided Secure Communication in MIMO Rician Channels","volume":"6","author":"Ahmed","year":"2018","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","article-title":"A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends","volume":"104","author":"Zou","year":"2016","journal-title":"Proc. IEEE"},{"doi-asserted-by":"crossref","unstructured":"Edman, M., Kiayias, A., and Yener, B. (2011, January 10). On Passive Inference Attacks Against Physical-Layer Key Extraction?. Proceedings of the 4th European Workshop on System Security, Salzburg, Austria.","key":"ref_22","DOI":"10.1145\/1972551.1972559"},{"doi-asserted-by":"crossref","unstructured":"Zang, G., Huang, B., Chen, L., and Gao, Y. (2015, January 15\u201317). One Transmission Scheme Based on Variable MSK Modulator for Wireless Physical Layer Security. Proceedings of the IEEE International Conference on Wireless Communications & Signal (WCSP), Nanjing, China.","key":"ref_23","DOI":"10.1109\/WCSP.2015.7341250"},{"unstructured":"Husain, M., Mahant, S., and Sridhar, R. (November, January 29). CD-PHY: Physical Layer Security in Wireless Networks Through Constellation Diversity. Proceedings of the IEEE Military Communications Conference (MILCOM), Orlando, FL, USA.","key":"ref_24"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/TCE.2010.5606266","article-title":"Secure Communication in TDS-OFDM System Using Constellation Rotation and Noise Insertion","volume":"56","author":"Ma","year":"2010","journal-title":"IEEE Trans. Consum. Electron."},{"doi-asserted-by":"crossref","unstructured":"Li, H., Wang, X., and Hou, W. (2013, January 2\u20135). Secure Transmission in OFDM Systems by Using Time Domain Scrambling. Proceedings of the IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany.","key":"ref_26","DOI":"10.1109\/VTCSpring.2013.6692745"},{"doi-asserted-by":"crossref","unstructured":"Kaddoum, G., Gagnon, F., and Richardson, F. (2012, January 28\u201331). Design of a Secure Multi-Carrier DCSK System. Proceedings of the International Symposium on Wireless Communication Systems (ISWCS), Pairs, France.","key":"ref_27","DOI":"10.1109\/ISWCS.2012.6328511"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2997","DOI":"10.1109\/TVT.2017.2774108","article-title":"Permutation Index DCSK Modulation Technique for Secure Multi-User High-Data-Rate Communication System","volume":"67","author":"Herceg","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"doi-asserted-by":"crossref","unstructured":"Jameel, F., Kaddoum, G., and Trung, Q. (2018). A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Commun. Surv. Turtor.","key":"ref_29","DOI":"10.1109\/COMST.2018.2865607"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1109\/TCOMM.2017.2776944","article-title":"On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks","volume":"66","author":"Vuppala","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2297","DOI":"10.1109\/JSYST.2017.2700438","article-title":"On the Uplink Secrecy Capacity Analysis in D2D-Enabled Cellular Network","volume":"12","author":"Tolossa","year":"2018","journal-title":"IEEE J. Syst."},{"doi-asserted-by":"crossref","unstructured":"Atallah, M., and Kaddoum, G. (2017, January 21\u201327). Secrecy Analysis of Cooperative Network with Untrustworthy Relays Using Location-Based Multicasting Technique. Proceedins of the IEEE 5th International Conference on Future Internet of Things and Cloud, Prague, Czech Republic.","key":"ref_32","DOI":"10.1109\/FiCloudW.2017.74"},{"doi-asserted-by":"crossref","unstructured":"Goldsmith, A. (2005). Wireless Communications, Cambridge University Press.","key":"ref_33","DOI":"10.1017\/CBO9780511841224"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1214\/aoms\/1177706645","article-title":"A Note on the Generation of Random Normal Deviates","volume":"Volume 29","author":"Box","year":"1958","journal-title":"The Annals of Mathematical Statistics"},{"doi-asserted-by":"crossref","unstructured":"Hilborn, R. (2001). Chaos and Nonlinear Dynamics: An Introduction for Scientists and Engineers, Oxford University Press.","key":"ref_35","DOI":"10.1093\/acprof:oso\/9780198507239.001.0001"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1109\/LWC.2015.2469776","article-title":"Detectability of Chaotic Direct-Sequence Spread-Spectrum Signals","volume":"4","author":"Sedaghatnejad","year":"2015","journal-title":"IEEE Wirel. Commun. Lett."},{"unstructured":"Box, G.E.P., Jenkins, G.M., Reinsel, G.C., and Ljung, G.M. (2015). Time Series Analysis: Forecasting and Control, Wiley. [5rd ed.].","key":"ref_37"},{"key":"ref_38","first-page":"132","article-title":"Secure OFDM Transmission Scheme Based on Two-Stage Chaos Mapping","volume":"37","author":"Wang","year":"2016","journal-title":"J. Commun."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MCAS.2008.931739","article-title":"Automatic Modulation Classification for Cognitive Radios Using Cyclic Feature Detection","volume":"9","author":"Ramkumar","year":"2009","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/S0165-1684(99)00127-9","article-title":"Digital Modulation Classification Using Constellation Shape","volume":"80","author":"Mobasseri","year":"2000","journal-title":"Signal Process."},{"unstructured":"Simon, H., and Michael, M. (2004). Modern Wireless Communications, Pearson Prentice Hall.","key":"ref_41"},{"unstructured":"Abramowitz, M. (1974). Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, Dover Publications, Inc.","key":"ref_42"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/10\/3500\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:26:12Z","timestamp":1760196372000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/10\/3500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,17]]},"references-count":42,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2018,10]]}},"alternative-id":["s18103500"],"URL":"https:\/\/doi.org\/10.3390\/s18103500","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,10,17]]}}}