Wireless Cloaking: Hiding Signals in Plain Sight

Author: Denis Avetisyan


A novel approach to wireless security disguises communication signals by intentionally confusing the modulation order, making them harder for eavesdroppers to decipher.

The system’s bit error rate (BER) performance was assessed against signal-to-noise ratio (SNR), demonstrating that disguising higher-order modulations - specifically 16PSK as 9-ary and 8PSK as 5-ary - introduces controlled confusion, with results benchmarked against conventional 16PSK and 8PSK utilizing frames of 1010 symbols.
The system’s bit error rate (BER) performance was assessed against signal-to-noise ratio (SNR), demonstrating that disguising higher-order modulations – specifically 16PSK as 9-ary and 8PSK as 5-ary – introduces controlled confusion, with results benchmarked against conventional 16PSK and 8PSK utilizing frames of 1010 symbols.

This review examines modulation order confusion techniques, including deep learning applications and reconfigurable intelligent surface (RIS) assistance, to enhance physical layer security.

Despite advances in wireless security, modulation classification continues to pose a significant threat to confidential communication. This paper, ‘Secure Communication via Modulation Order Confusion’, introduces a novel physical layer security framework designed to mislead eavesdroppers by intentionally disguising the original modulation order. Through techniques ranging from symbol manipulation in single-antenna systems to receiver-transparent designs leveraging reconfigurable intelligent surfaces, the proposed schemes effectively thwart both deep-learning and expert-based classifiers without sacrificing communication performance. Could this approach represent a viable pathway towards more robust and adaptive wireless security protocols in increasingly contested spectrum environments?


Decoding the Illusion: The Fragility of Wireless Signals

Widely deployed digital communication relies heavily on modulation schemes such as Quadrature Phase-Shift Keying (QPSK) and 16-Quadrature Amplitude Modulation (16QAM) to transmit information, but these methods offer surprisingly little inherent security. While effective at reliably conveying data, QPSK and 16QAM fundamentally encode information in predictable patterns of signal amplitude and phase. A determined eavesdropper equipped with advanced signal processing tools can exploit these patterns to reconstruct the original message, even without knowing the specific encryption key. The signals, though potentially masked by noise, remain vulnerable to correlation attacks and other sophisticated techniques that leverage the inherent structure of the modulation itself, highlighting a crucial need for security measures beyond traditional encryption algorithms.

The relentless surge in bandwidth requirements, coupled with the increasingly congested and noisy nature of modern radio frequency environments, is driving a critical need for innovative signal obfuscation techniques. Traditional methods struggle to maintain signal integrity and security amidst interference, multipath fading, and the sheer density of competing transmissions. Simply increasing transmission power or refining error correction codes offers diminishing returns. Consequently, research is focusing on methods that intentionally introduce controlled complexity into the signal itself, making it significantly more difficult for unauthorized parties to decode information without severely impacting legitimate receiver performance. These advanced techniques aim to camouflage the signal within the background noise, effectively creating a layer of “digital smoke” that safeguards data in environments where traditional security measures are proving inadequate.

Contemporary wireless security protocols frequently depend on the sheer mathematical difficulty of decoding transmitted information, a strategy that assumes adversaries possess limited computational resources. However, this approach exhibits a fundamental vulnerability: the relentless increase in processing power and the development of increasingly sophisticated signal processing algorithms. As computational capabilities expand – fueled by advancements in areas like quantum computing and specialized hardware – previously intractable calculations become feasible, eroding the security foundations of these systems. Moreover, innovative techniques in signal processing, such as advanced filtering and machine learning-based decryption, directly challenge the effectiveness of complexity-based security, highlighting the need for fundamentally new approaches that aren’t solely reliant on keeping adversaries computationally burdened.

Conventional wireless security protocols heavily depend on deterministic encryption – algorithms that produce predictable outputs from given inputs, vulnerable to brute-force attacks as computing power increases. An emerging strategy proposes a move towards probabilistic confusion, intentionally introducing randomness into signal modulation itself. Rather than encoding information in a way that can be definitively deciphered with the correct key, this technique shapes signals to appear as noise to unintended receivers, effectively masking the underlying data. This approach doesn’t aim to prevent all detection, but rather to make accurate demodulation statistically improbable, even with complete knowledge of the modulation scheme. By embracing inherent uncertainty, probabilistic confusion offers a resilient security layer that adapts to evolving computational capabilities, presenting a fundamentally different, and potentially more durable, paradigm for wireless transmission security.

Simulations demonstrate that disguising QPSK as 16QAM introduces bit error rates (BER) dependent on signal-to-noise ratio (SNR) and symbol mapping probability <span class="katex-eq" data-katex-display="false"> \boldsymbol{p} </span>, with probabilities of [0.1, 0.2, 0.3, 0.4] and [0.25, 0.25, 0.25, 0.25] compared against the BER of standard QPSK and 16QAM.
Simulations demonstrate that disguising QPSK as 16QAM introduces bit error rates (BER) dependent on signal-to-noise ratio (SNR) and symbol mapping probability \boldsymbol{p} , with probabilities of [0.1, 0.2, 0.3, 0.4] and [0.25, 0.25, 0.25, 0.25] compared against the BER of standard QPSK and 16QAM.

Obscuring the Language: Introducing Modulation Order Confusion

Modulation Order Confusion (MOC) represents a proactive security technique wherein the transmitting device intentionally obscures the characteristics of its modulation scheme. Unlike traditional methods focused on signal concealment, MOC introduces deliberate ambiguity, preventing an adversary from readily determining the order of modulation-whether it’s Binary Phase-Shift Keying (BPSK), Quadrature Phase-Shift Keying (QPSK), or a more complex scheme. This is accomplished not by masking the signal itself, but by transmitting a signal that appears to conform to multiple possible modulation orders simultaneously, thereby increasing the computational burden required for successful eavesdropping and signal decoding. The core principle is to raise the cost of attack by forcing an interceptor to expend resources attempting to resolve the ambiguity in the transmitted modulation.

Modulation order confusion is implemented via several distinct techniques. Symbol Random Mapping alters the association between transmitted symbols and their corresponding constellation points, effectively randomizing the signal representation. Symbol Time Diversity introduces variations in the symbol transmission schedule, spreading the signal across time to obscure the underlying modulation. Constellation Path Design manipulates the arrangement of symbols within the signal constellation, creating non-standard mappings and increasing the complexity of signal identification. These methods, used individually or in combination, contribute to the overall ambiguity introduced to thwart eavesdropping attempts.

Taylor Series Expansion is utilized to mathematically define and manipulate signal waveforms for Modulation Order Confusion by representing a function as an infinite sum of terms based on the function’s derivatives at a single point. This allows for precise control over signal parameters – amplitude, frequency, and phase – enabling the creation of complex waveforms that deliberately obscure the underlying modulation scheme. By truncating the series to a finite number of terms and strategically adjusting coefficients, the signal’s spectral characteristics can be shaped to maximize ambiguity and increase the computational burden on an attacker attempting to identify the true modulation order; the mathematical formulation allows for quantifiable control over the signal’s distortion, optimizing the trade-off between communication efficiency and security through controlled approximations of the original signal. Specifically, the n^{th} order Taylor polynomial approximates the function, and higher order terms provide greater accuracy but also increase signal complexity.

Modulation Order Confusion increases the computational burden on an attacker by requiring them to analyze a signal exhibiting ambiguous modulation characteristics. This necessitates a broader search space for potential modulation schemes, moving beyond simple identification of a known modulation type. The attacker must then expend processing cycles and time attempting to correctly determine the signal’s modulation order before any meaningful data extraction can occur. This increased computational complexity directly translates to a higher cost of attack, both in terms of required resources and the potential for detection due to increased processing activity. Consequently, the attacker’s resources are depleted simply attempting to decipher the transmission method, creating a security benefit for the legitimate receiver.

Bit error rate performance, evaluated against signal-to-noise ratio, demonstrates the impact of low-to-high-order confusion using a <span class="katex-eq" data-katex-display="false"> \arctan s </span> nonlinearity in a multi-antenna system with <span class="katex-eq" data-katex-display="false"> T_{\text{A}} - 1 </span> Taylor series terms.
Bit error rate performance, evaluated against signal-to-noise ratio, demonstrates the impact of low-to-high-order confusion using a \arctan s nonlinearity in a multi-antenna system with T_{\text{A}} - 1 Taylor series terms.

Quantifying the Distortion: Measuring Signal Confusion

Modulation Order Confusion’s effectiveness is predicated on establishing a measurable statistical difference between the signal an eavesdropper expects to receive and the signal actually transmitted. This divergence is not simply noise; it requires controlled manipulation of the modulation scheme to introduce ambiguity. A successful implementation ensures the difference is substantial enough to increase the computational complexity for an attacker attempting signal reconstruction, while remaining within acceptable error rate parameters for the intended receiver. The magnitude of this divergence directly impacts the security gain achieved, necessitating careful calibration of the probabilistic mapping used to alter modulation orders.

Kullback-Leibler (KL) Divergence is employed to precisely measure the statistical difference between the probability distribution of the transmitted signal and the received signal after modulation order confusion. This metric quantifies the information loss when one probability distribution is used to approximate another, providing a numerical value for the divergence introduced by the confusion process. Optimization algorithms are then applied to adjust the mapping probabilities used in the confusion scheme, aiming to minimize the KL Divergence while simultaneously maintaining acceptable error rates in signal transmission. This balancing act is crucial; a lower KL Divergence indicates a more subtle divergence, enhancing security by making the confusion less detectable, but excessively minimizing it can degrade performance. The goal is to achieve a KL Divergence that provides a sufficient level of security without significantly impacting the bit error rate.

Hamming Distance, representing the number of bit positions differing between two codewords, is a key metric for assessing signal dissimilarity in modulation schemes. Its application to constellation paths allows for the quantification of the minimum distance between possible transmitted and received symbols; a larger Hamming Distance indicates greater resilience to errors and improved security against eavesdropping. Analysis focuses on identifying the minimum Hamming Distance within the mapping used, as this dictates the error correction capability and the likelihood of successful signal recovery. By examining the distribution of Hamming Distances between legitimate signals and potential confusions, system designers can optimize mapping probabilities to maximize security while maintaining acceptable bit error rates.

Performance evaluations utilizing both KL Divergence and Hamming Distance across 5- and 9-ary Gray Amplitude Modulation (5GAM, 9GAM) schemes demonstrate improved security characteristics when contrasted with conventional Quadrature Phase Shift Keying (QPSK) and 16-ary Quadrature Amplitude Modulation (16QAM). These analyses, conducted at high Signal-to-Noise Ratio (SNR) values, indicate that the proposed method achieves quantifiable gains in signal confusion, effectively increasing the difficulty for an eavesdropper to accurately decode the transmitted information. Specifically, the divergence metrics consistently show a statistically significant separation between intended and received signals for 5GAM and 9GAM at high SNR, a divergence not observed to the same extent with QPSK or 16QAM under identical conditions. This suggests a heightened level of security achieved through increased signal ambiguity without substantial performance degradation.

Classification accuracy decreases with lower signal-to-noise ratios when QPSK is disguised as 16QAM, as demonstrated by simulations using VGG, SCGNet, WSMF, and ChainNet classifiers with varying symbol mapping probabilities <span class="katex-eq" data-katex-display="false">{\boldsymbol{p}}</span> of [0,0,0,1], [0.1,0.2,0.3,0.4], and [0.25,0.25,0.25,0.25].
Classification accuracy decreases with lower signal-to-noise ratios when QPSK is disguised as 16QAM, as demonstrated by simulations using VGG, SCGNet, WSMF, and ChainNet classifiers with varying symbol mapping probabilities {\boldsymbol{p}} of [0,0,0,1], [0.1,0.2,0.3,0.4], and [0.25,0.25,0.25,0.25].

Shaping the Chaos: Reconfigurable Surfaces and the Future of Security

Reconfigurable Intelligent Surfaces (RIS) represent a significant advancement in wireless security by actively shaping the way radio waves travel. Unlike traditional fixed infrastructure, these surfaces-composed of numerous individually controllable elements-can dynamically alter the signal propagation path, creating multiple, distorted versions of the original transmission. This manipulation isn’t simply about boosting signal strength; it’s about deliberately introducing ambiguity. By reflecting and refracting signals in varied directions and with differing phases, a RIS effectively creates a ‘cloud’ of signals, making it exceedingly difficult for an unintended receiver to accurately discern the original modulation scheme-the very language of the wireless communication. This technique, known as Modulation Order Confusion, adds a layer of proactive defense, forcing an adversary to expend considerable resources attempting to decode a purposefully obfuscated signal, and substantially improving the overall security of the wireless link.

Reconfigurable Intelligent Surfaces (RIS) present a novel approach to wireless security by manipulating the very fabric of signal propagation. Rather than relying solely on encryption, these surfaces can be engineered to selectively reinforce or diminish particular components of a transmitted signal. This targeted amplification and suppression doesn’t alter the core information, but deliberately obscures the signal’s modulation order-the method used to encode data. By making it difficult for an unintended receiver to accurately determine how the signal is encoded, the RIS introduces confusion and effectively hides the information within a seemingly innocuous waveform. The technique doesn’t rely on secrecy of the modulation itself, but rather on making its identification unreliable, adding a crucial layer of obfuscation to wireless communications and bolstering security against increasingly sophisticated eavesdropping attempts.

Reconfigurable Intelligent Surfaces, when integrated with Blind Source Separation (BSS) techniques, offer a potent method for actively disrupting wireless communication security. This pairing moves beyond simply reflecting or redirecting signals; it enables a precise tailoring of the transmitted waveform to deliberately mislead potential eavesdroppers. BSS algorithms effectively decompose a mixed signal into its constituent sources, and when combined with the dynamically adjustable signal paths created by RIS, this allows for the selective enhancement of noise or the creation of phantom signals. The result is a highly confused receiver, struggling to accurately decode the intended message while being bombarded with manipulated data – effectively maximizing the difficulty of intercepting meaningful information. This targeted manipulation isn’t random; it’s a proactive defense, designed to exploit the vulnerabilities of signal recovery algorithms and render intercepted communications unintelligible.

The integration of Reconfigurable Intelligent Surfaces (RIS) with blind source separation techniques demonstrably strengthens wireless security protocols, offering a resilient defense against increasingly complex attacks. This synergistic approach doesn’t merely react to threats, but proactively manipulates signal propagation to create a deliberately confusing environment for potential eavesdroppers. Recent studies have shown successful signal recovery even after strategically simplifying the computational demands by eliminating the first six terms of a Taylor expansion – a critical balance between security performance and practical implementation. This optimization allows for robust operation in challenging wireless environments, extending the effective range of the security mechanism and bolstering its ability to withstand sophisticated adversarial efforts without prohibitive computational costs.

This illustration depicts a reconfigurable intelligent surface (RIS) enhancing a multi-antenna communication system by reflecting and manipulating wireless signals.
This illustration depicts a reconfigurable intelligent surface (RIS) enhancing a multi-antenna communication system by reflecting and manipulating wireless signals.

The pursuit of secure communication, as detailed in this work concerning modulation order confusion, echoes a fundamental principle of understanding any system: to truly know it, one must probe its boundaries. This research, by deliberately obscuring the modulation format, isn’t merely about preventing eavesdropping; it’s about deeply investigating the limits of signal detection. As John von Neumann observed, “If people do not believe that mathematics is simple, it is only because they do not realize how elegantly nature operates.” This elegance, however, is best revealed through rigorous testing, by intentionally introducing confusion to observe how a system – in this case, a wireless communication channel – responds. The manipulation of symbols and exploration of RIS-assisted systems are, at their core, a sophisticated form of reverse-engineering, seeking to expose vulnerabilities and refine defenses.

Beyond the Static: What’s Next?

The pursuit of secure communication via modulation order confusion, as demonstrated, reveals a fundamental truth: security isn’t about impenetrable walls, but about raising the cost of observation to the point of impracticality. The current work successfully introduces obfuscation at the physical layer, but it’s a temporary advantage. Adaptive adversaries, fueled by ever-increasing computational power and sophisticated machine learning algorithms, will inevitably refine their anti-modulation classification techniques. The inevitable response necessitates a shift from static confusion to dynamic deception – a system that not only masks the modulation order but actively learns and counters the eavesdropper’s attempts to decipher it.

Further exploration must address the scalability of these techniques. While RIS-assisted communication offers a promising avenue, the complexity increases exponentially with the number of nodes. The real challenge lies in developing lightweight, energy-efficient algorithms capable of operating in resource-constrained environments. One can envision a future where modulation schemes themselves become polymorphic, shifting in response to detected probing, becoming less a signal and more a carefully constructed illusion.

Ultimately, the best hack is understanding why it worked, and every patch is a philosophical confession of imperfection. This work isn’t a destination, but a provocation – a reminder that true security lies not in preventing attacks, but in anticipating and outmaneuvering them. The next step isn’t simply to make the signal harder to read, but to make the very act of reading it a losing game.


Original article: https://arxiv.org/pdf/2601.05292.pdf

Contact the author: https://www.linkedin.com/in/avetisyan/

See also:

2026-01-12 17:34