Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission

Recently, the concept of spatial and direction modulation (SDM) has been developed to reap the advantages of both spatial modulation (SM) and directional modulation (DM). On the one hand, DM ensures the transmission security at the expected direction. On the other hand, the structure of SM-aided dis...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Jie Tian, Hao Chen, Zhigang Wang, Xianhua Shi, Zhengyu Ji, Xianglu Li
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/77138a7477434bf991a3a0ccb553aaa8
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
Descripción
Sumario:Recently, the concept of spatial and direction modulation (SDM) has been developed to reap the advantages of both spatial modulation (SM) and directional modulation (DM). On the one hand, DM ensures the transmission security at the expected direction. On the other hand, the structure of SM-aided distributed receivers can enhance the security even if the eavesdropper is located in the same direction as the legitimate receiver. However, the above advantages are achieved based on the assumption that the eavesdropper is not equipped with distributed receivers. On the other hand, the information security can no longer be guaranteed when the eavesdropper is also equipped with distributed receivers. To alleviate this problem, we considered a joint design of SDM and covert information mapping (CIM) in order to conceive of a more robust structure of CIM-SDM. Furthermore, both the detection performances at the eavesdropper and the legitimate user were quantified through theoretical derivation. In general, both the analysis and simulation results supported that the proposed CIM-SDM structure provides more robust secure performance compared to the original SDM, even if the extreme condition of distributed receivers at the eavesdropper is considered, at the cost of moderate performance loss at the legitimate user.