Mapping-Varied Spatial Modulation for Physical Layer Security: Transmission Strategy and Secrecy Rate

被引:49
作者
Yang, Yuli [1 ]
Guizani, Mohsen [2 ]
机构
[1] Univ Chester, Dept Elect & Elect Engn, Chester CH2 4NU, Cheshire, England
[2] Univ Idaho, Dept Elect & Comp Engn, Moscow, ID 83844 USA
关键词
Multiple-input-multiple-output (MIMO) wiretap channel; physical layer security; secrecy rate; spatial modulation; WIRELESS NETWORKS; CAPACITY; SYSTEMS;
D O I
10.1109/JSAC.2018.2824598
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a novel transmission strategy, referred to as mapping-varied spatial modulation, is proposed for physical layer security, where the transmitter varies mapping patterns for the radiated information and the antenna information of spatial modulation, based on the instantaneous pattern of legitimate channel quality information that is unknown to eavesdroppers. Therefore, eavesdroppers cannot successfully decode the confidential information and the transmission over the legitimate link is secured from the wire-tap of eavesdroppers, without relying on higher-layer encryption. An important virtue of the proposed transmission strategy is that the transmitter does not need to know eavesdroppers' channels states at all. To further demonstrate the advantage of this scheme, its secrecy rate was formulated for the purpose of facilitating the performance evaluation. Moreover, illustrative numerical results pertaining to the metrics of ergodic secrecy rate and secrecy outage probability not only substantiate the validity of the proposed transmission strategy, but also provide useful references for the system design with the mapping-varied spatial modulation, from the view of physical layer security.
引用
收藏
页码:877 / 889
页数:13
相关论文
共 32 条
[1]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[2]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[3]  
Hao C, 2010, PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, P1
[4]   Adaptive Downlink and Uplink Channel Split Ratio Determination for TCP-Based Best Effort Traffic in TDD-Based WiMAX Networks [J].
Chiang, Chih-He ;
Liao, Wanjiun ;
Liu, Tehuang ;
Chan, Iam Kin ;
Chao, Hsi-Lu .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (02) :182-190
[5]   Keyholes, correlations, and capacities of multielement transmit and receive antennas [J].
Chizhik, D ;
Foschini, GJ ;
Gans, MJ ;
Valenzuela, RA .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2002, 1 (02) :361-368
[6]   Spatial Modulation for Multiple-Antenna Wireless Systems: A Survey [J].
Di Renzo, Marco ;
Haas, Harald ;
Grant, Peter M. .
IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (12) :182-191
[7]   TDD-CDMA for the 4th generation of wireless communications [J].
Esmailzadeh, R ;
Nakagawa, M ;
Jones, A .
IEEE WIRELESS COMMUNICATIONS, 2003, 10 (04) :8-15
[8]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[9]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[10]   Secure space-time communication [J].
Hero, AO .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (12) :3235-3249