1 Introduction

Security is becoming not only a necessary and critical requirement in communication networks but also a powerful mean and tool to maintain the sustainability and usefulness of the digital world we are living in [1, 2]. It has recently become very obvious that the super benefits in terms of new Internet of Things (IoT)-based services and applications that future 5G and beyond wireless networks are expected to provide cannot be practically realized without ensuring security and having it as a high priority [3, 4]. Particularly, security forms a formidable challenge for the new emerging massive and critical IoT-5G type of services such as massive machine-type communication (mMTC) and ultra-reliable low-latency communication (URLLC) due to their unique features and requirements [5, 6].

Among the many important security aspects and goals including confidentiality, privacy, authentication, integrity, availability, and so forth, confidentiality comes at the highest priority. Providing confidentiality is a challenging task to achieve in wireless systems mainly because of the broadcast nature of the wireless transmission, where the transmitted signals can be captured and recorded by malicious users in the networks in order to intercept the undergoing communication between the legitimate parties. This results in not only eavesdropping their data but also in using this eavesdropped data to launch more attacks such as identity-based attack, denial of service (DoS), man-in-the-middle, data modification, session hijacking, spoofing (impersonation), and sniffing. These critical vulnerabilities could significantly affect the authenticity, confidentiality, integrity, and availability of the communication link between legitimate users [7, 8]. This necessitates providing security defense against eavesdropping, which is considered to be one of the most critical attacks that is needed as a prerequisite to launch any kind of attacks in the network.

Traditionally, confidentiality against eavesdropping has been tackled using cryptography and encryption-based approaches. However, the tremendous technological advances in future wireless networks (e.g., 5G and beyond networks) substantiate the need for new alternative security methods that can meet and address new challenges that did not exist before. This makes the classically used cryptographic techniques unsuitable, ineffective, and even impractical in future wireless networks and services due to many hindrances, among which, we mention the key distribution and management processes for the legitimate parties. These are extremely difficult tasks, especially in large-scale, dense, and heterogeneous wireless networks, where a massive amount of smart IoT devices are simultaneously connected to the network, causing excessive complexity, high overhead, and costly computational processes. Besides, the management and control frames exchanged between communication entities are usually not protected. More importantly, the emergence of new wireless technologies like IoT-based mMTC, 5G-Tactile Internet, vehicular communication for autonomous driving, remote surgery, instant control for sensitive IoT actuators, etc. makes current encryption-based methods unsuitable since these kind of technologies are naturally delay-sensitive, power-limited, and processing-restricted.

To address this, physical layer security based on keyless approach has emerged as a new concept and strong alternative that can supplement and may even replace encryption-based approaches [9,10,11]. The basic idea of physical layer security is to exploit channel characteristics such as noise, fading, dispersion, and interference, in order to provide secrecy against eavesdropping [9, 12].

Due to the fact that orthogonal frequency-division multiplexing (OFDM) is the most commonly used waveform in currently existing systems and is expected to keep its dominance with different numerologies in future wireless systems like 5G, securing OFDM waveform has drawn the attention of many researchers. It is worth mentioning that besides developing techniques tailored to common transmit waveforms like OFDM, there have recently been some efforts to design new inherently secure waveforms as in [13,14,15].

In the literature, several OFDM-based security techniques have been proposed. These techniques can be categorized from a high-level viewpoint into four main enabling schemes. First are secret key-based schemes, in which secret random sequences are generated from the channel and then used to encrypt the transmitted data on either the application layer [16] or the physical layer such as dynamic coordinate interleaving and constellation rotation schemes [17]. Second are adaptive transmission-based schemes, in which the transmission parameters are adjusted to just meet the quality of service (QoS) requirements of only the legitimate receiver [18]. Among these techniques are optimal power allocation [19], adaptive modulation with hybrid automatic repeat request (HARQ) [20], adaptive precoding and interleaving [21], fading-based subcarrier deactivation schemes [22], and channel shortening [23]. Third are artificial noise (AN)-based schemes [24], in which AN is designed based on the legitimate receiver’s channel so that it only harms the eavesdropper’s reception while maintaining an interference-free reception at the legitimate user. Fourth are schemes that can exploit OFDM transceiver impairments [25] or conceal some key features in the OFDM signal to provide secrecy [26].

Among the aforementioned techniques, OFDM-SIS (subcarrier index selection) [27] is a recently proposed flexible and adaptive technique that not only provides secrecy but also improves the reliability performance with minimal complexity, making it a very attractive technique for future secure IoT-5G systems. However, although the optimal subcarrier index selection technique (OFDM-SIS) can provide a relatively good secrecy performance, its secrecy gap is limited and may not be sufficient in specific scenarios, where it is highly desirable to increase and ensure secrecy even when Eve’s average signal-to-noise ratio (SNR) is much higher than that of Bob.

Therefore, this work comes to address the aforementioned limitation of OFDM-SIS by enhancing its secrecy further and maintaining a good secrecy gap over all SNR ranges. In the proposed scheme, named as OFDM-SIS with artificially interfering signals (OFDM-SIS-AIS), the whole OFDM block is divided into subblocks, each containing good and bad subcarriers. The good subcarriers, corresponding to high subchannel gains, are used for data transmission in order to maximize the SNR at only the legitimate receiver, while the rest (the bad ones) are injected with AIS that can only degrade Eve’s reception while not affecting Bob’s performance whatsoever. The provided results prove the effectiveness of the proposed design in enhancing the secrecy gap considerably over all SNR regimes while keeping the bit error rate (BER) performance of the legitimate receiver as that achieved by OFDM-SIS.

The rest of this chapter is organized as follows. The system model and its preliminaries are described in Sect. 2. The details of the proposed OFDM-SIS-AIS scheme are revealed in Sect. 3. Computer simulation results are exhibited and discussed in Sect. 4. Finally, a concise conclusion is drawn in Sect. 5.

Notations: Vectors are denoted by bold small letters, whereas matrices are denoted by bold capital letters. I is the N × N identity matrix. The transpose, Hermitian, and inverse of a matrix are symbolized by ( ⋅ )T, ( ⋅ )H and ( ⋅ )−1, respectively.

2 Preliminaries and System Model

A single-input single-output (SISO) OFDM system is adopted, where a transmitting node (Alice) tries to communicate confidentially with a legitimate receiving node (Bob), whereas an eavesdropping node (Eve) attempts to intercept the communication link between the two legitimate nodes (Alice and Bob) as shown in Fig. 1. The channels of both Bob and Eve, denoted by \({\mathbf {h}}_{\mathbf {b}} \in \mathbb {C}^{[1 \times L]}\) and \({\mathbf {h}}_{\mathbf {e}} \in \mathbb {C}^{[1 \times L]}\), respectively, are assumed to experience multipath slowly varying channels with L exponentially decaying taps, each with Rayleigh fading distribution. Moreover, as Eve is a passive node in practice, Alice is assumed to have no knowledge of Eve’s channel.

Fig. 1
figure 1

A simplified system model of the considered PHY security scenario

Moreover, both Bob and Eve are assumed to experience uncorrelated channels as the channel varies according to the positions of communicating nodes [14]. In addition, time division duplexing (TDD) system is adopted, where Alice and Bob estimate the channel state information (CSI) of their common link by sending sounding reference signals (SRS). This will prevent Eve from accessing or having the knowledge of the CSI of the legitimate link [14] as there is no explicit CSI feedback.

At Alice, N number of frequency-domain complex data symbols is transmitted. Thus, the frequency-domain OFDM symbol can be represented as \(\mathbf {s}=\begin {bmatrix} s_{0} & s_{1} &\ldots & s_{N-1}\end {bmatrix}^{\textrm T} \in \mathbb {C}^{[N \times 1]}\). The OFDM symbol is then interleaved in order to eliminate the correlation between the subchannels and make the effective channel response look random and completely independent as shown in Fig. 2. This is performed so that we can ensure distributing the deep-faded subchannels uniformly over the whole OFDM symbol and thus guarantee to experience a few deep-faded subchannels in each subblock. In this work, we consider using an adaptive CSI-dependent interleaver, denoted by a unitary matrix R of size N × N, where the entries of each column are all zeros except a single entry of value equals to one at the position of the subcarrier to be permutated [21]. We select CSI-based adaptive interleaving as it is known to be the best in terms of mitigating burst errors (or consecutive deep-faded subchannels) and make them uniformly distributed over the whole OFDM block when the CSI is available at Tx [28].

Fig. 2
figure 2

Bob’s and Eve’s channel frequency responses alongside their effective channels after interleaving, i.e., \({\mathbf {H}}_{\mathbf {b}}^{\mathbf {f}}\mathbf {R}\) and \({\mathbf {H}}_{\mathbf {e}}^{\mathbf {f}}\mathbf {R}\) (shown in the lower part of the figure)

It is worth mentioning that the interleaver design devised in [21] was perceived as a kind of precoder due to the fact that R was extracted by applying singular value decomposition (SVD) on the diagonal matrix of the channel amplitude frequency response and then taking the right unitary matrix, resulting from the decomposition, as the interleaver. For more details on this, we refer the readers to [21, 28]. It should also be mentioned that we do not consider in our performance evaluation the secrecy level that can be obtained by the channel-based adaptive interleaver design as it has already been investigated in the literature [21]. Rather, we focus on the secrecy level obtained by the optimal subcarrier index selection along with artificially interfering signals injection.

Similar to OFDM-IM [29], where the whole OFDM block is split into subblocks and only a subset of the available subcarriers in each subblock is utilized for data transmission, here we adopt a similar structure; however, in our technique, the subcarriers are selected based on the channel of the legitimate receiver to improve secrecy. This is different from OFDM-IM, where the subcarriers are selected based on the incoming data to convey information by the subcarrier indices so that better reliability can be achieved at the expense of a minor spectral efficiency loss. The details of the proposed OFDM-SIS-AIS security technique will be explained in the next section.

The interleaved block (Rs) is then passed through an IFFT process \({\mathbf {F}}^{\textrm H} \in \mathbb {C}^{[N \times N]}\), which basically maps the data points to orthogonal subcarriers, where F is the discrete Fourier transform matrix. To preclude the inter-symbol interference, a cyclic prefix (CP) of length L is inserted by using the CP appending matrix \(\mathbf {C} \in \mathbb {R}^{[(N+L) \times N]}\). Thus, the transmitted baseband signal by Alice (before considering the proposed design) can be represented as

$$\displaystyle \begin{aligned} \begin{array}{rcl} \mathbf{x}=\mathbf{C} {\mathbf{F}}^{\textrm H}\mathbf{R}\mathbf{s} \in \mathbb{C}^{[(N+L) \times 1]}. \end{array} \end{aligned} $$
(1)

After the signal x passes through the channel and reaches both Bob and Eve, each one of them will first discard the CP part of the signal using the matrix \(\mathbf {D} \in \mathbb {R}^{[N \times (N+L)]}\) and then perform an FFT process using the matrix \(\mathbf {F} \in \mathbb {C}^{[N \times N]}\) to transform the signal into the frequency domain. Thus, the net-received signal vector with dimensions N × 1 at Bob after performing the aforementioned operations can be given in a linear matrix representation form as follows:

$$\displaystyle \begin{aligned} \begin{array}{rcl} {\mathbf{y}}_{\mathbf{b}}&\displaystyle =&\displaystyle \mathbf{F}\mathbf{D}\left({\mathbf{H}}_{\mathbf{b}} \mathbf{C}{\mathbf{F}}^{\textrm H}\mathbf{R}\mathbf{s}+{\mathbf{z}}_{\mathbf{b}}\right) \end{array} \end{aligned} \vspace*{-6pt}$$
(2)
$$\displaystyle \begin{aligned} \begin{array}{rcl} &\displaystyle =&\displaystyle {\mathbf{H}}_{\mathbf{b}}^{\mathbf{f}}\mathbf{R}\mathbf{s}+\hat{\mathbf{z}}_{\mathbf{b}}. \end{array} \end{aligned} $$
(3)

On the other hand, at Eve, the captured signal after the FFT process can be formulated as

$$\displaystyle \begin{aligned} \begin{array}{rcl} {\mathbf{y}}_{\mathbf{e}}&\displaystyle =&\displaystyle \mathbf{F}\mathbf{D}\left( {\mathbf{H}}_{\mathbf{e}} \mathbf{C}{\mathbf{F}}^{\textrm H}\mathbf{R}\mathbf{s}+{\mathbf{z}}_{\mathbf{e}}\right) \end{array} \end{aligned} \vspace*{-6pt}$$
(4)
$$\displaystyle \begin{aligned} \begin{array}{rcl} &\displaystyle =&\displaystyle {\mathbf{H}}_{\mathbf{e}}^{\mathbf{f}}\mathbf{R}\mathbf{s}+\hat{\mathbf{z}}_{\mathbf{e}}. \end{array} \end{aligned} $$
(5)

In this model, \({\mathbf {H}}_{\mathbf {b}} \in \mathbb {C}^{[(N+L) \times (N+L)]}\) and \({\mathbf {H}}_{\mathbf {e}} \in \mathbb {C}^{[(N+L) \times (N+L)]}\) are the Toeplitz matrices corresponding to the channel impulse responses of both Bob and Eve, whereas \({\mathbf {H}}_{\mathbf {b}}^{\mathbf {f}}=\mathbf {F}\mathbf {D} {\mathbf {H}}_{\mathbf {b}}\mathbf {C}{\mathbf {F}}^{\textrm H}=\text{diag}[H_{b_{1}}, \cdots , H_{b_{N}}] \in \mathbb {C}^{[N \times N]}\) and \({\mathbf {H}}_{\mathbf {e}}^{\mathbf {f}}=\mathbf {F}\mathbf {D} {\mathbf {H}}_{\mathbf {e}}\mathbf {C}{\mathbf {F}}^{\textrm H}=\text{diag}[H_{e_{1}}, \cdots , H_{e_{N}}]\in \mathbb {C}^{[N \times N]}\) are the diagonal matrices corresponding to the channel frequency responses of Bob and Eve, respectively. Note that \(H_{b_{i}}\) and \(H_{e_{i}}\) for 1 ≤ i ≤ N denote the subchannel frequency response of the ith subcarrier with respect to Bob and Eve, respectively. The vectors z b and z e are formed by the samples of the zero-mean complex additive white Gaussian noise (AWGN) with variances of \(\sigma _b^2\) and \(\sigma _e^2\) at Bob and Eve, respectively, while \(\hat {\mathbf {z}}_{\mathbf {b}}\) and \(\hat {\mathbf {z}}_{\mathbf {e}}\) are the Fourier-transformed versions of the noise vectors at Bob and Eve, respectively.

3 Review of OFDM-Subcarrier Index Selection (OFDM-SIS)

In the OFDM-SIS scheme [27], the transmitted OFDM block, i.e., s, is first divided and partitioned into a set of smaller subblocks, each containing K number of subcarriers. The basic idea of the proposed scheme is to enlarge the gap between Bob and Eve’s capacities by making the effective SNR at Bob higher than that at Eve for a given channel frequency response. This is achieved by dividing the K subcarriers in each subblock into two subsets: the first, which includes the subcarriers corresponding to the highest subchannel gains, is used for data transmission (to maximize the effective SNR at Bob), whereas the second, which includes the subcarriers corresponding to the lowest channel gains, is suppressed and nulled (i.e., not used for data transmission).

Particularly, for each subblock, a set of M out of K subcarriers is optimally selected to maximize the SNR at Bob, while the remaining K − M, which are not used for data transmission, are filled with zeros. Here, ζ = MK is defined as the subcarrier activation ratio of the number of selected subcarriers to the number of available subcarriers in each subblock. Note that the SNR of Bob over each subcarrier can be given by \(SNR_{b_{i}}=\gamma _{b}=\frac {P |H_{b_{i}}|{ }^{2}}{\sigma _{b}^2}\), where P is the power allocated to each subcarrier. Now, the problem of the optimal selection of the indices of M subcarriers corresponds to solving the below optimization problem for all possible subcarrier combinations, given as

$$\displaystyle \begin{aligned} \begin{array}{rcl} \{c^{opt}_1,\cdots,c^{opt}_M\} = \text{arg} \underset {\{c_1,\cdots,c_M\} \in \mathcal{A}_M} \max SNR_{b_{\left[ c_1,\cdots,c_M \right]}}, \end{array} \end{aligned} $$
(6)

where \(\mathcal {A}_M\) denotes the set of all possible subcarrier combinations with M selected out of K subcarriers and \(SNR_{b_{\left [ c_1,\cdots ,c_M \right ]}}\) is the sum of SNRs of the M selected subcarriers in each subblock. Since uniform power allocation is used for all subcarriers, the aforementioned problem boils down to selecting the subcarriers corresponding to the best subchannel gains.

This can be given as below

$$\displaystyle \begin{aligned} \begin{array}{rcl} \{c^{opt}_1,c^{opt}_2,\cdots,c^{opt}_M\} = \text{arg} \underset{\{c_1,\cdots,c_M\} \in \mathcal{A}_M}\max H_{b_{\left[ c_1,\cdots,c_M\right]}}. \end{array} \end{aligned} $$
(7)

That is, finding all possible subcarrier combinations, i.e., \(\binom KM=\frac {K!}{M!(K-M)!}\), may cause huge complexity, especially when the block size is very large. Therefore, it is important to considerably reduce the complexity of solving the above problem. This is possible when the whole OFDM block is divided into smaller parts to decrease the size of the search space. Moreover, it is also required to guarantee that, in each subblock, the subcarriers have to experience independent and different high and low subchannel gains so that the high ones with respect to Bob can be used for data transmission, while the low ones are suppressed (i.e., filled with zeros).

Now, to further minimize the complexity of the optimization problem, Alice can select M (1 ≤ M ≤ K) out of K subcarriers that maximizes the effective instantaneous SNR at Bob in each subblock by first ranking the subcarriers based on their instantaneous channel gains in a descending order, i.e., {∥H b12 ≥∥H b22 ≥⋯ ≥∥H bK2}. Then, Alice selects the first M indices of the subcarriers corresponding to the sorted subchannel gains.

In this scheme, the transmitted baseband signal by Alice can be reformulated as

$$\displaystyle \begin{aligned} \begin{array}{rcl} \mathbf{x}=\mathbf{C} {\mathbf{F}}^{\mathbf{H}} \mathbf{R} \mathbf{P} \begin{bmatrix}{\mathbf{s}}_{d} \\ {\mathbf{s}}_{z}\end{bmatrix} \in \mathbb{C}^{[(N+L) \times 1]}, \end{array} \end{aligned} $$
(8)

where \({\mathbf {s}}_{d}=[s_{(1)}, s_{(2)}, \ldots , s_{(N-N_{r})}]^{\mathrm {T}}\) is the vector of N d = N − N r = ζN frequency data symbols and \({\mathbf {s}}_{z}=[s_{(1)}, s_{(2)}, \ldots , s_{(N_{r})}]^{T}\) is the zero vector of N r = (1 − ζ)N frequency points (i.e., nulled subcarriers). P is the permutation matrix, which determines the positions of the data and the nulled subcarriers within the subblocks of each OFDM symbol.

4 Proposed OFDM-Subcarrier Index Selection with Artificially Interfering Signals (OFDM-SIS-AIS)

Although the OFDM-SIS technique discussed in the previous section can provide a relatively good secrecy performance as demonstrated in [27], its secrecy gap may not be sufficient enough in specific scenarios, where it is highly desirable to increase the secrecy gap even when Eve’s average SNR is higher than that of Bob. In addition, despite the fact that OFDM-SIS technique is motivated (besides its low complexity and better reliability) by its capability to work in the worst security scenario, where the CSI of the legitimate link can be accessed by Eve due to using explicit feedback as is the case in FDD systems, the technique adheres and maintains its applicability in TDD systems as well and can be modified in such a way to boost the achievable secrecy performance (especially in scenarios where Eve’s SNR is higher than that of Bob). This is possible in TDD systems by utilizing the fact that Eve has no knowledge on the CSI between the legitimate parties due to using channel reciprocity-dependent sounding techniques for CSI acquisition instead of sending public channel feedback [10]. This will make Eve ignorant to the indices of the subcarriers used for data transmission.

Motivated by these facts, secrecy performance of the proposed design can be enhanced when TDD is adopted by utilizing the remaining nulled subcarriers, which are not used for data transmission. Particularly, these nulled subcarriers can be injected and filled by well-designed artificially interfering signals (AIS) that can only degrade Eve’s reception as visualized in Fig. 3 while not affecting Bob’s performance whatsoever.

Fig. 3
figure 3

Subcarrier structure of the designed secure OFDM-SIS-AIS scheme with ζ = 3∕4: In each subblock, surrounded by red rectangle, the subcarriers (blue-colored) experiencing good subchannel gains with respect to Bob are used for data transmission, while the rest (black-colored) are injected with AIS. Note that with respect to Eve, the AIS-injected subcarriers do not usually correspond to her weak (bad) subchannels as opposed to Bob’s subchannels

It is obvious from Fig. 3 that, with respect to Bob, the transmitted data points correspond to high subchannel gains, while the AIS-injected subcarriers correspond to deep-faded subchannels; on the other hand, it is not the same with respect to Eve, whose channel looks random with respect to the optimally selected subcarriers at Alice. We call this secure transmission scheme enhanced OFDM-subcarrier index selection with artificially interfering signals (OFDM-SIS-AIS) injection. In this scheme, the transmitted baseband signal by Alice can be formulated as

$$\displaystyle \begin{aligned} \begin{array}{rcl} \mathbf{x}=\mathbf{C} {\mathbf{F}}^{\mathbf{H}} \mathbf{R} \mathbf{P} \begin{bmatrix}{\mathbf{s}}_{d} \\ {\mathbf{s}}_{r}\end{bmatrix} \in \mathbb{C}^{[(N+L) \times 1]}, \end{array} \end{aligned} $$
(9)

where \({\mathbf {s}}_{d}=[s_{(1)}, s_{(2)}, \ldots , s_{(N-N_{r})}]^{T}\) is a vector of N d = N − N r frequency data symbols and \({\mathbf {s}}_{r}=[s_{(1)}, s_{(2)}, \ldots , s_{(N_{r})}]^{T}\) is a vector of N r artificially interfering symbols within each OFDM block.

In the proposed design, s r is judiciously designed to have a distribution and power level similar to that of the data-modulated symbols. This is made as so in order to preclude and prohibit Eve from distinguishing the samples of AIS vector (s d) from that of the data vector itself (s r). For instance, in the case when QPSK modulation is used, s r can be designed according to the below formula

$$\displaystyle \begin{aligned} \begin{array}{rcl} {\mathbf{s}}_{r}&\displaystyle =&\displaystyle \sqrt{\frac{1}{2}}\left((2\mathbf{u}-1)+j(2\mathbf{q}-1)\right) \: , \end{array} \end{aligned} $$
(10)

where the samples of u and q vectors are chosen to be Bernoulli-distributed random variables with values of ones and zeros. Note that the positions of the AIS are channel-dependent and thus cannot be known by Eve when TDD system is used [14]. For Bob, the positions (indices) of these AIS can be obtained from the previous optimization algorithm as the complement of the indices that maximize the SNR at Bob.

Accordingly, the captured frequency domain signal at Bob’s side can be given as

$$\displaystyle \begin{aligned} \begin{array}{rcl} {\mathbf{y}}_{\mathbf{b}}= {\mathbf{H}}_{\mathbf{b}}^{\mathbf{f}}\mathbf{R}\mathbf{P} \begin{bmatrix}{\mathbf{s}}_{d} \\ {\mathbf{s}}_{r}\end{bmatrix} +\hat{\mathbf{z}}_{\mathbf{b}} \in \mathbb{C}^{[ N \times 1]}. \end{array} \end{aligned} $$
(11)

After discarding the subcarriers injected with AIS, y b will have the size of (ζN) × 1. Bob then employs the low-complexity zero-forcing frequency-domain equalization and deinterleaving to detect the transmitted data symbols.

At Eve’s side, its captured signal can be given by

$$\displaystyle \begin{aligned} \begin{array}{rcl} {\mathbf{y}}_{\mathbf{e}}= {\mathbf{H}}_{\mathbf{e}}^{\mathbf{f}}\mathbf{R}\mathbf{P} \begin{bmatrix}{\mathbf{s}}_{d} \\ {\mathbf{s}}_{r}\end{bmatrix} +\hat{\mathbf{z}}_{\mathbf{e}} \in \mathbb{C}^{[ N \times 1]}. \end{array} \end{aligned} $$
(12)

Note that Eve cannot avoid the effect of the added AIS in the deep fades of the legitimate channel, which is different from her channel, and thus Eve can only make random guesses. Without loss of generality, for Eve to detect the transmitted symbols, she equalizes its received data symbols vector by its corresponding effective channel frequency response. Note that Eve will not have the same performance as that of the legitimate receiver due to the fact that her channel is different from Bob’s one. In other words, since the selected subcarriers at Alice are independent of Eve’s channel, the M strongest, selected transmit subcarriers for Bob correspond to a random set selection of transmit subcarriers with respect to Eve.

It is worth mentioning that the extra degree of freedom formed by OFDM-SIS-AIS scheme can provide flexibility in the OFDM design in the sense that it can be exploited to not only enhance secrecy with minimal capacity reduction but also to perform other useful functionalities. More precisely, the AIS can intelligently be redesigned to reduce peak-to-average power ratio (PAPR), out-of-band emission (OOBE), and/or adjacent channel interference (ACI) in multiuser scenario as is the case in unique-word OFDM waveform [30]. These kind of designs are beyond the scope of this paper but can be considered as a future work on the proposed technique from a waveform design perspective.

5 Performance Analysis

Assuming Eve is fully aware and knowledgeable of the applied PHY security technique (OFDM-SIS-AIS), then she can perform any of the following reception procedures: (1) Receive the whole OFDM symbol, and try to randomly guess the indices used for carrying useful data from that used for AIS injection. Note that since the structure of the AIS is the same as that of the data, Eve cannot benefit from using intelligent detection technique and thus can never be certain about which subcarrier indices used for what purpose (i.e., data transmission or AIS injection). (2) Receive the OFDM symbol, and try to guess the indices used for data from that used for AIS injection based on Eve’s channel quality in a similar manner as Bob does. However, since the channel of Eve is different and independent from that of Bob, Eve will end up making mistakes in the process of selecting and deciding on the subcarrier indices used for data from that used for AIS injection.Footnote 1

Note that since the process of identifying and detecting the subcarriers injected by AIS is fully random in both of the above-explained reception procedures, the performance results for both cases will be similar (this will be demonstrated in the numerical evaluation results). Accordingly, the investigation and theoretical analysis of one of the cases is sufficient enough to provide and quantify the detailed performance of the proposed OFDM-SIS-AIS technique.

5.1 Error Probability Associated with Bob and Eve

Under the proposed OFDM-SIS-AIS design, the BER of Bob is anticipated to be the same as that of OFDM-SIS for any used selection ratio. This is due to the fact that Bob can (by using his channel estimate) simply detect and identify the subcarriers used for data transmission from those used for injecting AIS. Thus, Bob can exclude all these subcarriers filled with AIS in his detection process, resulting in an interference-free detection with a BER performance equivalent to that of OFDM-SIS technique that we have recently analyzed in our work in [27].

On the flip side, the BER performance of Eve will not be the same as that of Bob due to injecting AIS as well as selecting the transmit subcarriers based on Bob’s channel. Thus, Eve will not be able to avoid the detrimental effect of AIS as her channel is different from that of Bob. Specifically, the error probability (P e) of the inability of Eve to correctly detect the subcarriers injected with AIS in each subblock is equal to the product of two error probability events. The first error event denoted by (P e1 = 1 − P c1) represents the probability that the K − M subcarriers injected with AIS are detected wrongly in each subblock composed of K subcarriers, whereas the second error event denoted by (P e2 = 1 − P c2) represents the probability that the K − M subcarriers injected with AIS are detected wrongly in the shortened subblock composed of the remaining K − (K − M) subcarriers. Mathematically, this can be given as

$$\displaystyle \begin{aligned} \begin{array}{rcl} P_{e} &\displaystyle =&\displaystyle P_{e1} \times P_{e2} =\left( 1-P_{c1} \right) \times \left( 1-P_{c2} \right) \\[12pt] &\displaystyle =&\displaystyle \left( 1-\dfrac{(K-M)}{K} \right) \times \left( 1-\dfrac{(K-M)}{K-(K-M)} \right). \end{array} \end{aligned} $$
(13)

Thus, at high SNR regimes, Eve’s average BER can be simply formulated as

$$\displaystyle \begin{aligned} \begin{array}{rcl} BER_{e}=\dfrac{1}{2} \times P_{e} = \dfrac{1}{2} \times \dfrac{M}{K} \times \dfrac{2M-K}{M}. \end{array} \end{aligned} $$
(14)

For the special case when ζ = 3∕4, P e can be given as

$$\displaystyle \begin{aligned} \begin{array}{rcl} P_{e} &\displaystyle =&\displaystyle \left( 1-\dfrac{(4-3)}{4} \right) \times \left( 1-\dfrac{(4-3)}{4-(4-3)} \right) \\[12pt] &\displaystyle =&\displaystyle \left( \dfrac{3}{4} \right) \times \left( \dfrac{2}{3}\right)= \dfrac{1}{2}. \end{array} \end{aligned} $$
(15)

In this case when ζ = 3∕4, BER e is given as

$$\displaystyle \begin{aligned} \begin{array}{rcl} BER_{e}=\dfrac{1}{2}\times P_{e} = \dfrac{1}{2} \times \dfrac{1}{2}=\dfrac{1}{4}. \end{array} \end{aligned} $$
(16)

For the case when ζ = 2∕4, \(BER_{e} = \dfrac {1}{2}\).

5.2 Secrecy Outage Probability

In this subsection, we use the secrecy outage probability as a metric to analytically evaluate the secrecy performance of the proposed OFDM-SIS-AIS scheme. Secrecy outage is chosen as a suitable metric to quantify the performance because of the fact that the CSI of Eve’s channel in a practical passive eavesdropping scenario is neither available to Alice nor to Bob. Before calculating secrecy outage, we need first to determine the effective SNR formulas at both Bob and Eve. Besides, we need to determine the effective channel distribution of both the good subchannel used for data transmission and the bad ones used for injecting AIS.

Since Bob knows exactly the locations (indices) of the subcarriers filled with interfering signals, he can just discard these subcarriers carrying non-data interfering signals. Thus, Bob’s effective SNR will not be affected by interference, and it can be given per each subblock as

$$\displaystyle \begin{aligned} \begin{array}{rcl} \gamma_{b}= \dfrac{\zeta |H_{b_{i}}|{}^{2} P}{\sigma_b^2} \end{array} \end{aligned} $$
(17)
$$\displaystyle \begin{aligned} \begin{array}{rcl} \gamma_{e}= \frac{\zeta |H_{e_{i}}|{}^{2} P}{(1-\zeta) |H_{e_{i},int}|{}^{2} P_{int}+\sigma_e^2} \end{array} \end{aligned} $$
(18)
$$\displaystyle \begin{aligned} \begin{array}{rcl} \gamma_{e}= \frac{\phi_{1} \sigma}{ \phi_{2} \tau +1}, \end{array} \end{aligned} $$
(19)

where \(\phi _{1}=\frac {\zeta P}{\sigma _e^2}\), \(\phi _{2}=\frac {(1-\zeta ) P_{int}}{\sigma _e^2}\), \(\sigma = |H_{e_{i}}|{ }^{2}\), and \(\tau = |H_{e_{i},int}|{ }^{2}\). Note that both \(|H_{e_{i}}|{ }^{2}\) and \(|H_{e_{i},int}|{ }^{2}\) have exponential power distribution. Consequently, the effective CDF of γ e can be found as follows:

$$\displaystyle \begin{aligned} F(\gamma_{e}) &= \int_{\tau=0}^{+\infty} \int_{\sigma=0}^{\gamma_{e}(\tau+1)}f(\sigma,\tau) d\sigma\,d\tau \end{aligned} $$
(20)
$$\displaystyle \begin{aligned} &= \int_{\tau=0}^{+\infty} \int_{\sigma=0}^{\gamma_{e}(\tau+1)}\phi_1\phi_2 e^{(-\phi_1\sigma)}e^{(-\phi_2\tau)} d\sigma\,d\tau \end{aligned} $$
(21)
$$\displaystyle \begin{aligned} &=\phi_1\phi_2\int_{\tau=0}^{+\infty} e^{(-\phi_2\tau)}\int_{\sigma=0}^{\gamma_{e}(\tau+1)}e^{(-\phi_1\sigma)}d\sigma\,d\tau \end{aligned} $$
(22)
$$\displaystyle \begin{aligned} &=\phi_2\int_{\tau=0}^{+\infty}e^{(-\phi_2\tau)}.(1-e^{(-\phi_1(1+\tau).\gamma_{e})})d\tau \end{aligned} $$
(23)
$$\displaystyle \begin{aligned} &=\phi_2\left(\frac{1}{\phi_2}-\frac{e^{(-\phi_1\gamma_{e})}}{\phi_2+\phi_1.\gamma_{e}}\right). \end{aligned} $$
(24)

To find the PDF of γ e, we derive the above CDF with respect to γ e to obtain

$$\displaystyle \begin{aligned} f_{\gamma_{e}}(\gamma_{e})&=\frac{dF(\gamma_{e})}{d\gamma_{e}} \end{aligned} $$
(25)
$$\displaystyle \begin{aligned} &=\phi_1\phi_2e^{(-\phi_1\gamma_{e})}.\left[\frac{1}{\phi_1 \gamma_{e}+\phi_2}+\frac{1}{(\phi_1\gamma_{e}+\phi_2)^2}\right]. \end{aligned} $$
(26)

Now, having obtained the PDF and CDF of the effective instantaneous SNR at Eve as well as Bob, one can analytically find and calculate the secrecy outage probability as follows. The secrecy outage probability can be given as [10]

$$\displaystyle \begin{aligned}P_{{\mathrm{sout}}}=\Pr\{ {{R_{sec}} <{R_{s}}}\},\end{aligned} $$
(27)

where R sec is the instantaneous secrecy rate of the proposed OFDM-SIS-AIS technique and is given by \(R_{sec}=\left [ R_{b}-R_{e}\right ]^{+}\), in which \(\left [ q\right ]^{+}\) denotes \(\max \left \lbrace 0; x \right \rbrace \), R b = log2(1 + γ b) is the instantaneous rate of the Bob’s channel, andR e = log2(1 + γ e) is the instantaneous rate of the Eve’s channel, whereas R s > 0 is a predefined targeted secrecy rate. The secrecy outage probability can be further defined as [9]

$$\displaystyle \begin{aligned} \begin{array}{rcl} P_{{\mathrm{sout}}}&\displaystyle =&\displaystyle \Pr[R_{sec}<{ R}_{s}\mid\gamma_{b}>\gamma_{e}]\Pr[\gamma_{b}>\gamma_{e}] \\ &\displaystyle +&\displaystyle \Pr[R_{sec}<{ R}_{s}\mid\gamma_{b}\leq\gamma_{e}]\Pr[\gamma_{b}\leq\gamma_{e}]. \end{array} \end{aligned} $$
(28)

Since \(\Pr [R_{sec}<{ R}_{s}\mid \gamma _{b}\leq \gamma _{e}]\) always equals to unity, the above formula can be reduced to

$$\displaystyle \begin{aligned} \begin{array}{rcl} P_{{\mathrm{sout}}}&\displaystyle =&\displaystyle \Pr[R_{sec}<{ R}_{s}\mid\gamma_{b}>\gamma_{e}]\Pr[\gamma_{b}>\gamma_{e}] \\ &\displaystyle +&\displaystyle \Pr[\gamma_{b}\leq\gamma_{e}]. \end{array} \end{aligned} $$
(29)

Using probability concepts, we can rewrite the previous formula as

$$\displaystyle \begin{aligned}P_{{\mathrm{sout}}}= \int_{0}^{\infty} F_{\gamma_{b}}\left(2^{R_{s}}(1+x)-1\right) f_{\gamma_{e}}(x) dx, \end{aligned} $$
(30)

where x = γ e, \(f_{\gamma _{e}}(x)=P_{\gamma _{e}}\left (\gamma _{e}\right )\) and \(F_{\gamma _{b}}(.)\) is the CDF of Bob. The CDF of γ b heavily depends on the selection ratio (ζ) as explained in [27]. For the case when ζ = 2∕4, Bob’s CDF is given as [27]

$$\displaystyle \begin{aligned}F_{\gamma_{b}}(x)=G\left( \dfrac{\sqrt{{\pi}}\operatorname{erf}\left(\sqrt{\rho}\sqrt{x}\right)}{2\rho^{\frac{3}{2}}}-\dfrac{\sqrt{x}\mathrm{e}^{-\rho x}}{\rho}\right), \end{aligned} $$
(31)

where erf(.) is the error function [31]. By substituting the CDF and PDF of the effective instantaneous SNR of Bob and Eve, respectively, into (30), one can get the final expression of P sout.

6 Simulation Results

In this section, we provide simulation results to demonstrate and validate the effectiveness of the proposed security schemes and to also examine the impacts of the selection ratio and the average SNRs on the security performance.

We consider a practical SISO-OFDM system with N = 64 subcarriers adopting quadrature phase-shift keying (QPSK) modulation and a guard period of length L. The number of subblocks in each OFDM block is considered to be NK = 16, where each subblock contains K = 4 subcarriers. Two different values for the selection ratio ζ are considered, i.e., ζ = 3∕4 and ζ = 2∕4. The channel is modeled as an independent and identically distributed (i.i.d.) block fading, where channel coefficients are drawn from a Rayleigh fading distribution and the channel is deemed to be slowly varying. The Rayleigh multipath fading channels of both Bob and Eve are assumed to have the same length, L = 9 samples, with a sparse, normalized power delay profile given by p = [0.8407, 0, 0, 0.1332, 0, 0.0168, 0.0067, 0, 0.0027] mW.

Additionally, we consider that Eve is aware of the transmission technique used by Alice and also knows her CSI but does not know the channel of the legitimate link. In the performance evaluation, we use BER-based secrecy gap metric [14] to both evaluate the secrecy gap between Bob and Eve and to quantify the amount of information leakage to Eve.

Figure 4 exhibits the BER performance of the benchmark scheme (i.e., OFDM-SIS [27]) for both Bob and Eve. It is assumed that Eve is aware of the used scheme as well as the indices of the nulled subcarriers (which are not used for data transmission in OFDM-SIS) as these subcarriers have very low power (ideally zero), making it easy for her to identify and then exclude them from the detection process. It is shown that Eve’s performance is the same as that of standard OFDM. This happens due to the use of channel-dependent optimal subcarrier indices selection with respect to Alice-to-Bob channel that is different from Alice-to-Eve channel, for which the selection process looks random (not optimal). Thus, the system response will not be favorable to Eve, and no performance gain is delivered to her side. In contrast, Bob’s BER is enhanced as the selection ratio decreases due to sending the data over the subcarriers that are experiencing good subchannels with respect to only Bob. As noticed, the secrecy gap between Bob’s and Eve’s channel is promising and can be utilized to provide QoS-based secrecy [20].

Fig. 4
figure 4

BER performance comparison between Bob and Eve when OFDM-SIS-AIS is used compared to OFDM-SIS. QPSK modulation alongside ζ = 3∕4 and ζ = 2∕4 are adopted. TDD mode is considered, where Eve does not know Bob’s CSI [14]

However, as it can be observed, secrecy cannot be maintained over all SNR values. For instance, for ζ = 3∕4 and for the case when Bob’s SNR is equal to or less than 18 dB, while Eve’s SNR is equal to or greater than 25 dB, Eve will be able to reliably decode a service of BER requirement equals to 10−3, while Bob cannot. Thus, there is a security breach as the secrecy gap in this case will be negative. This problem can be addressed by the proposed OFDM-SIS-AIS scheme, where positive secrecy gap can be ensured at any SNR Bob and Eve may experience.

Figure 4 presents the BER performance of both Bob and Eve using the proposed OFDM-SIS-AIS scheme with ζ = 3∕4 and ζ = 2∕4, compared to OFDM-SIS with the same ζ values and standard OFDM (equivalent to OFDM-SIS with ζ = 4∕4). It is depicted that the BER performance of Bob using OFDM-SIS-AIS remains the same as that of OFDM-SIS since Bob can just discard the subcarriers not used for data transmission as he knows his CSI, which is assumed in this technique to be estimated using channel sounding techniques in a TDD system. With respect to Eve, a considerable BER degradation is observed over all SNR ranges due to the artificially injected interfering signals, which cannot be avoided by Eve due to having a channel different than that of Bob. It is observed that the secrecy gap as well as the BER performance of Bob increases as the selection ratio decreases.

Figure 5 depicts the secrecy outage probability performance versus Bob’s average SNR. The performance achieved by the proposed OFDM-SIS-AIS scheme is also compared with conventional OFDM-SIS and standard OFDM schemes when the predefined secrecy rate threshold is set to unity (i.e., R s = 1) and Eve’s average SNR (\(\bar \gamma _{e}\)) is equal to 10 dB, whereas the selection ratio ζ equals to 2/4 and 3/4. From Fig. 5, we first observe the OFDM-SIS-AIS scheme has superior performance (lower secrecy outage) compared to conventional OFDM-SIS scheme for ζ = 3∕4 as well as ζ = 2∕4. In addition, we notice that the decrease of ζ yields a better (lower) secrecy outage performance as the effective SNR at Bob increases, whereas the injection of AIS worsens Eve’s SNR, resulting in a larger SNR difference between Bob and Eve.

Fig. 5
figure 5

Secrecy outage probability of the proposed OFDM-SIS-AIS for ζ = 1, 3∕4, 2∕4, \(\bar \gamma _{e}=10\) dB, and R s = 1 compared to conventional OFDM-SIS

In Fig. 6, we fix the selection ratio ζ at 3/4 and change Eve’s average SNR \(\bar \gamma _{e}\) from 10 dB (as it was in the previous setup, whose performance is depicted in Fig. 5) to 0 and 20 dB. This is set as so in order to investigate the effect of changing \(\bar \gamma _{e}\) on the secrecy outage performance of OFDM-SIS-AIS and how it compares to conventional OFDM-SIS scheme. We can see that the secrecy outage performance gets lower when \(\bar \gamma _{e}\) decreases as expected. A more interesting observation is that the performance difference between the proposed OFDM-SIS-AIS scheme and the conventional OFDM-SIS gets larger as \(\bar \gamma _{e}\) increases, and vice versa (i.e., it gets lower as \(\bar \gamma _{e}\) decreases). The reason for this behavior is that the injection of AIS becomes less effective in degrading Eve’s performance when her SNR is already very bad (like 0 dB). Thus, the performance of OFDM-SIS-AIS boils down (i.e., become comparable) to that obtained by OFDM-SIS when Eve’s SNR is extremely very low as demonstrated in Fig. 6.

Fig. 6
figure 6

Secrecy outage probability of the proposed OFDM-SIS-AIS for \(\bar \gamma _{e}=0,10, 20\) dB, ζ = 3∕4 and R s = 1 compared to conventional OFDM-SIS

Particularity, Fig. 6 shows that the secrecy outage probability performance of OFDM-SIS-AIS scheme is much better than that obtained by OFDM-SIS scheme when Eve’s SNR is high (e.g., 20 dB) where Eve is very close to the transmitter, Alice. This occurs as in this case Eve will be highly affected negatively by the injected artificially interfering signals whose power levels are stronger at shorter distances from the transmitter. On the other hand, the performance difference between OFDM-SIS-AIS and OFDM-SIS schemes becomes very insignificant when Eve’s SNR is low (e.g., 0 dB) as in this case the effect of the injected artificially interfering signals whose power levels are weaker at longer distances from the transmitter becomes insignificant on degrading the Eve’s performance.

It is noteworthy to mention here that there is a clear trade-off between secrecy and reliability from one side and throughput from another side (i.e., secrecy increases as ζ decreases). However, the new degree of freedom resulted from the controllable selection process can bring more advantages in terms of providing more flexibility to the OFDM design. More precisely, the subcarriers which are used to send AIS because of their low channel gains (which already limit the performance of both BER and throughput) can be deliberately filled with specially optimized signals that can fulfill other important functionalities (besides secrecy) such as reducing PAPR and OOBE.

Based on the obtained results, we have demonstrated that the performance of the proposed OFDM-SIS-AIS outperforms that of OFDM-SIS in terms of secrecy while maintaining the same reliability performance as that of OFDM-SIS.

This enhancement is achieved without sharing secret keys nor knowing Eve’s channel nor even causing any major changes in the receiver design. Given the simplicity of the proposed design, its hardware testbed implementation is very handy to structure, making it very attractive for flexible 5G and beyond systems and low-complexity Internet of Things (IoT) devices.

7 Conclusion

An enhanced physical layer security technique has been proposed for safeguarding OFDM-based transmission against eavesdropping. In this technique, named as OFDM-SIS-AIS, the secrecy performance of the recently proposed OFDM-SIS technique is boosted by injecting artificiality interfering signals (AIS) in the subcarriers that are not used for data transmission, resulting in a significant improvement in the secrecy gap when TDD system is used. The presented analytical and simulation results have demonstrated the capability of the proposed schemes in achieving practical secrecy without increasing the complexity of the OFDM structure or knowing Eve’s channel, making it very suitable for low-complexity 5G-IoT and Tactile Internet applications. Future work can consider designing and investigating the secrecy performance of different variations of the proposed OFDM-SIS-AIS scheme assuming different subblock sizes and activation ratios.