Next Article in Journal
Smooth Function Approximation by Deep Neural Networks with General Activation Functions
Next Article in Special Issue
A Hybrid Information Reconciliation Method for Physical Layer Key Generation
Previous Article in Journal
Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain
Previous Article in Special Issue
Confidential Cooperative Communication with the Trust Degree of Jammer
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Enhancing Scheme for Spatial Modulation Using Antenna Selection and Artificial Noise

1
Division of Electronic Engineering, IT Convergence Research Center, Chonbuk National University, Jeonju 54896, Korea
2
Shanghai Aerospace Electronic Technology Institute, Shanghai 201109, China
3
Department of Communication Engineering, Donghua University, Shanghai 201620, China
*
Author to whom correspondence should be addressed.
Current address: 567 Baekje-daero, Deokjin-gu, Jeonju, Jeollabuk-do 54896, Korea.
Entropy 2019, 21(7), 626; https://doi.org/10.3390/e21070626
Submission received: 31 May 2019 / Accepted: 23 June 2019 / Published: 26 June 2019
(This article belongs to the Special Issue Information-Theoretic Security II)

Abstract

:
In this paper, we present a new secrecy-enhancing scheme for the spatial modulation (SM) system, by considering imperfect channel state information (CSI). In the proposed scheme, two antennas are activated at the same time. One of the activated antennas transmits information symbols along with artificial noise (AN) optimized under the imperfect CSI condition. On the other hand, the other activated antenna transmits another AN sequence. Because the AN are generated by exploiting the imperfect CSI of the legitimate channel, they can only be canceled at the legitimate receiver, while the passive eavesdropper will suffer from interference. We derive the secrecy rate of the proposed scheme in order to estimate the performance. The numerical results demonstrated in this paper verify that the proposed scheme can achieve a better secrecy rate compared to the conventional scheme at the same effective data rate.

1. Introduction

Spatial modulation (SM) is a spatial multiplexing multiple-input multiple-output (MIMO) scheme, and it is known that SM can overcome the drawbacks of the conventional MIMO techniques [1]. For example, SM can entirely avoid the inter-channel interference (ICI) and inter-antenna synchronization (IAS) problems by activating only a part, usually one of the transmit-antennas for data transmission at any signaling time instance. In addition, it usually needs one radio frequency (RF) chain for data transmission [2]. Due to the above-mentioned advantages, SM is expected to be one of the key technologies for future wireless networks [3].
SM is considered as a three-dimensional (3D) modulation technique, because it conveys information bits by utilizing both the antenna index and complex symbols to form a 3D constellation [4]. With this concept, efficient 3D constellation schemes were proposed in order to achieve a better spatial multiplexing gain and high data throughput [4,5]. It was emphasized that they could be easily extended to a massive MIMO system by reducing the cost of the massive numbers of RF chains at the base stations, and the security scheme could be directly adopted. On the other hand, efficient antenna selection techniques were proposed to enhance the system performance. For example, a Euclidean distance optimized antenna selection (EDAS) method was proposed to offer a significant signal-to-noise ratio (SNR) gain [6], and later, the achievable transmit diversity order of the EDAS was analyzed [7].
Due to the inherent broadcasting nature of wireless communication systems, security and privacy protection comprise an increasingly important issue in the design and implementation of wireless networks. Recently, physical layer security (PLS) schemes combined with MIMO techniques have gained much attention, especially when SM is used [8]. Because SM changes the active antenna dynamically, it can be easily applied to a PLS scheme. For example, an antenna selection scheme for SM was proposed to achieve PLS transmission [9].
In combination with the antenna selection, the idea of injecting jamming signals, i.e., artificial noises (AN), into the transmission of SM was proposed to enhance the security [10]. It was presented that activating an extra transmit antenna to transmit AN can increase the security of SM. A similar fact was discussed in [11], where the authors proposed a secure transmission scheme for differential quadrature spatial modulation (DQSM) with AN, and it was shown that the AN technique was a meaningful idea to improve the secrecy performance. Because the AN can be also interference to the legitimate receiver, the antenna carrying AN needs to be directed to the null space, and thus, additional beamforming technique was required. One of our previous studies presented a PLS scheme with AN, which did not require a beamforming technique [12]. On the other hand, a symbol rotation-based secrecy-enhancing scheme combined with SM was proposed [13]. In this scheme, complex symbol values for transmit antenna indices and information were dynamically rotated, where the rotation values were optimized for legitimate channel state information (CSI).
However, all of the aforementioned schemes assumed perfect CSI knowledge at least for the legitimate channel. By considering that the influence of imperfect CSI due to the channel estimation error cannot be ignored, this paper proposes a new secrecy-enhancing scheme for SM under imperfect CSI. We adopt the idea of combining the antenna selection with AN for PLS and utilize the additional activation of the antenna only for transmitting AN. Especially, we propose a method to employ two AN sequences, which have the co-cancellation property, and thus, they can perfectly cancel each other only at the legitimate receiver. We assume the imperfect CSI condition by considering the practical system operation condition, and thus, the generation of AN and antenna selection are all optimized by considering imperfect CSI. In this way, the legitimate receiver can perfectly cancel the AN while the eavesdropper will suffer from the interference induced by the AN. To estimate the secrecy performance, we derive the secrecy rate of the proposed scheme.
The rest of this paper is organized as follows. In Section 2, we describe the basic concept of the conventional PLS scheme with SM by using a simple system model. Section 3 presents the proposed scheme, starting with the representation of the operational principle in brief. Afterwards, it proposes a method to generate AN, which can be perfectly canceled only at the legitimate receiver, and then presents the optimum antenna selection method by considering imperfect CSI. In Section 4, we derive the mathematical expressions of the secrecy rate of the proposed scheme. The numerical results and discussions are presented in Section 5. Finally, Section 6 draws the conclusions.
Notation: Bold lower case letters represent vectors, while bold upper case letters denote matrices. ( · ) H , | · | , and · denote the Hermitian transpose, modulus operator, and Frobenius norm operations, respectively. · · is the binomial coefficient. C m × n stands for the complex space of m × n dimensions.

2. PLS Scheme with SM

Figure 1 shows a system model using SM for PLS. In the generic model of the PLS scheme, there is a cooperative wireless network consisting of three nodes, as shown in Figure 1. One source node, which is the legitimate transmitter node, is referred to as Alice. The corresponding destination node is referred to as Bob, which is the legitimate receiver node. On the other hand, the third node, named Eve, is the passive eavesdropper node. In this model, Alice sends the secret data sequence and communicates confidentially with Bob. Eve attempts to intercept the ongoing communication between the legitimate link, i.e., from the transmitter Alice to the legitimate receiver Bob. In other words, Eve tries to decode and obtain the secret data content from her own observations of the received signals [9].
As shown in Figure 1, it is assumed that the transmitter Alice is equipped with N t antennas, and M-ary amplitude and phase modulation (APM) symbols are transmitted over one of the N t antennas at each signaling time instance. The channels from Alice to Bob and Eve are represented by the N R b × N t matrix H and N R e × N t matrix G, respectively, where N R b and N R e are the numbers of receive antennas at Bob and Eve, respectively. All the channel gains for each transmitted symbol, i.e., all the elements of H and G, are assumed to be independent complex Rayleigh random variables and not to have frequency selectivity. The number of transmit antennas, N t , in the conventional SM system is usually assumed to be a power of two [1]. At the transmitter, the bit stream emitted by a binary source is divided into blocks containing n t and bits each, where n t = log 2 N t is the number of bits to identify a transmit-antenna among N t antennas, and = log 2 M is the number of bits in an M-ary symbol. Therefore, the effective data rate r e = n t + .
When a symbol is chosen to be transmitted at the j-th antenna among N t antennas, the transmission from Alice can be represented by the N t × 1 column vector, x, as follows [14]:
x = [ 0 0 x m j t h 0 0 ] T = e j · x m ,
where x m denotes a modulation symbol drawn from M-ary APM constellation whose power is normalized to one and e j is a unit vector whose jth entry is non-zero for j { 1 , 2 , , N t } . Then, the received signal vector y b C N R b × 1 at Bob and y e C N R e × 1 at Eve are represented by:
y b = H x + n b = h j x m + n b ,
and:
y e = G x + n e = g j x m + n e ,
respectively. In the above equations, h j and g j are the jth column vectors of H and G, respectively, and n b C N R b × 1 and n e C N R e × 1 denote the complex additive white Gaussian noise (AWGN) vectors.

3. Secrecy-Enhancing Spatial Modulation Scheme

3.1. Antenna Selection and Insertion of AN

In our proposed scheme, we consider a multiple-input single-output (MISO) system with N a transmit antennas as shown in Figure 2. Alice is equipped with N a antennas, while Bob and Eve are equipped with only one antenna. In the proposed system, we assume that N a is not necessarily a power of two, N t is a power of two, so that the antenna index can represent digital information, and N a > N t . Information symbol x m is transmitted along with AN of β 1 ν by one of the N t antennas selected by matrix T k , and another AN of β 2 ν is transmitted by one of the remaining ( N a N t ) antennas selected by matrix T q , where ν is the complex Gaussian AN with zero-mean and unit variance. In addition, β 1 and β 2 are coefficients, which are designed to cancel the AN at Bob. Accordingly, the signals received at Bob and Eve in the proposed scheme with antenna selection matrices T k and T q can be, respectively, presented by:
y b = h T k e j ( x m + β 1 ν ) + h T q β 2 ν + n b ,
and:
y e = g T k e j ( x m + β 1 ν ) + g T q β 2 ν + n e ,
where h C 1 × N a and g C 1 × N a are the row vectors representing the channel gains from Alice to Bob and Eve, respectively. T k C N a × N t is the effective transmit antenna selection matrix for k { 1 , 2 , , P } , which is constructed by selecting N t columns from identity matrix I N a . P is the number of transmit antenna combinations, N a N t , and the sample space of all possible antenna combinations is represented as Φ = { Φ 1 , , Φ k , , Φ P } , in which Φ k denotes the k-th combination of the effective transmit antenna set. At each time slot, Alice selects one of the P combinations and shares it with Bob through a low-speed forward link, as in other conventional schemes [15]. In addition, n b and n e are complex AWGN with a mean value of zero and variance of σ 2 . T q C N a × 1 is a single column matrix to select another antenna transmitting AN for q { 1 , 2 , , N a N t } . T q is selected from submatrix I N a C N a × ( N a N t ) , which is composed of the remaining column vectors in I N a after constructing T k .

3.2. Perfect Cancellation of AN

Consider the fact that perfect CSI is hard to obtain in practice due to the estimation errors. The channel gains, h and g, can be expressed by:
h = 1 ρ 2 h ^ + ρ 2 h ˜ ,
and:
g = 1 ρ 2 g ^ + ρ 2 g ˜ .
Here, h ^ C 1 × N a and h ˜ C 1 × N a represent the estimation and the estimation error of the main channel, i.e., from Alice to Bob, respectively. On the other hand, g ^ C 1 × N a and g ˜ C 1 × N a represent the estimation and the estimation error of the eavesdropping channel, i.e., from Alice to Eve, respectively. ρ 2 is the variance of estimation error, and it reflects the accuracy of the CSI.
Inserting (6) into (4) leads to:
y b = 1 ρ 2 h ^ T k e j ( x m + β 1 ν ) + ρ 2 h ˜ T k e j ( x m + β 1 ν ) + 1 ρ 2 h ^ T q β 2 ν + ρ 2 h ˜ T q β 2 ν + n b .
If we let h j ^ = h ^ T k e j , h j ˜ = h ˜ T k e j , h i ^ = h ^ T q , and h i ˜ = h ˜ T q , then:
y b = 1 ρ 2 h j ^ ( x m + β 1 ν ) + ρ 2 h j ˜ ( x m + β 1 ν ) + 1 ρ 2 h i ^ β 2 ν + ρ 2 h i ˜ β 2 ν + n b .
Similarly, if we let g j ^ = g ^ T k e j , g j ˜ = g ˜ T k e j , g i ^ = g ^ T q , and g i ˜ = g ˜ T q , then (5) can be represented by:
y e = 1 ρ 2 g j ^ ( x m + β 1 ν ) + ρ 2 g j ˜ ( x m + β 1 ν ) + 1 ρ 2 g i ^ β 2 ν + ρ 2 g i ˜ β 2 ν + n e .
Our purpose here is to make AN cancel each other at the legitimate receiver; therefore, we need to find proper values of β 1 and β 2 . According to (9), we note that 1 ρ 2 h j ^ β 1 ν + 1 ρ 2 h i ^ β 2 ν is the interference at Bob. Therefore, we should make it equal to zero such that there is no interference at Bob. That means:
1 ρ 2 h j ^ β 1 ν + 1 ρ 2 h i ^ β 2 ν = 0 .
Then, β 1 and β 2 should be calculated by:
β 1 = h i ^ β 2 = h j ^ o r β 1 = h i ^ β 2 = h j ^ .
Since the estimation channel vectors h ^ and g ^ are independent of each other, that is to say h j ^ g j ^ and h i ^ g i ^ , β 1 and β 2 calculated in (12) will lead to:
1 ρ 2 g j ^ β 1 ν + 1 ρ 2 g i ^ β 2 ν 0 .
Therefore, Eve will suffer from the interference due to the AN of 1 ρ 2 g j ^ β 1 ν + 1 ρ 2 g i ^ β 2 ν .

3.3. Optimum Selection of the Transmit Antenna Combination

Assuming that the data are transmitted by the j-th antenna, the received signal power at Eve is g ^ T k e j 2 , which is defined as a quantity, called leakage for Bob [16]. Generally, we can assume that the power of the received signal at Bob, i.e., h ^ T k e j 2 , is sufficiently large compared to the power of the AWGN, (i.e., σ 2 ) and that h ^ T k e j 2 is sufficiently large compared to g ^ T k e j 2 . Based on these two assumptions, we define the signal-to-leakage noise ratio (SLNR) for the j-th channel of the k-th combination as:
φ j ( T k ) = h ^ T k e j 2 g ^ T k e j 2 + σ 2 .
Assume that the selected N t antennas are activated with equal probability to transmit the information symbols. The optimum matrix T k can be found by maximizing SLNR as follows:
max j = 1 N t φ j ( T k ) subject to T k { T 1 , T 2 , , T P } .
However, the above optimum solution of T k with exhaustive search requires a high complexity. We propose the following complexity reduced method.
Assume all of the transmit antennas are independent. Then, the SLNR at the l-th, φ l , can be represented by:
φ l = h ^ l 2 g ^ l 2 + σ 2 ,
where h ^ l and g ^ l denote the l-th elements of the channel h ^ and g ^ , respectively. In this way, we calculate the SLNR values for all transmit antennas, and the calculated SLNR values are sorted in descending order such that:
φ π 1 φ π 2 φ π N t N t selected antennas φ π N a ,
where { π 1 , π 2 , , π N a } is an ordered permutation set of { 1 , 2 , , N a } . Therefore, the optimization problem in (15) is equivalent to selecting φ π d from (17) for 1 d N t .

4. Secrecy Rate Analysis

The received signal at the legitimate receiver Bob, y b , can be rearranged as follows by inserting the result in (11) into (9).
y b = 1 ρ 2 h j ^ x m + ρ 2 h j ˜ ( x m + β 1 ν ) + ρ 2 h i ˜ β 2 ν + n b .
If we let:
n ˜ b = ρ 2 h j ˜ ( x m + β 1 ν ) + ρ 2 h i ˜ β 2 ν + n b ,
then it can be approximated as zero-mean complex Gaussian noise with variance of η b = E [ n ˜ b ( n ˜ b ) H ] . In addition, letting θ = 1 ρ 2 , then the normalized value of y b with noise variance of η b can be approximated by:
y ˜ b = y b η b θ η b h j ^ x m + n ^ b ,
where n ^ b = n ˜ b / η b . After choosing the optimum matrices T k and T q , the probability of selecting each transmit antenna and each symbol x m is 1 N t and 1 M , respectively. Thus, the received signal at Bob follows a complex Gaussian distribution, which can be represented as:
P ( y ˜ b | h j ^ , x m ) = 1 π exp | y ˜ b θ η b h j ^ x m | 2 ,
and:
P ( y ˜ b ) = 1 N t M j = 1 N t m = 1 M 1 π exp | y ˜ b θ η b h j ^ x m | 2 .
Then, the ergodic rate of Bob can be written as,
R b = E h ^ j = 1 N t m = 1 M p ( y ˜ b , h j ^ , x m ) log 2 p ( y ˜ b , h j ^ , x m ) p ( y ˜ b ) p ( h j ^ , x m ) d y ˜ b = log 2 N t M 1 N t M j = 1 N t m = 1 M E h ^ E n ^ b log 2 j = 1 N t m = 1 M × exp | θ η b δ j , m j , m + n ^ b | 2 | n ^ b | 2 ,
in which δ j , m j , m is given by:
δ j , m j , m = h j ^ x m h j ^ x m .
Using Jensen’s inequality, the lower bound of R b is obtained as:
R b l o w = log 2 N t M 1 N t M j = 1 N t m = 1 M log 2 j = 1 N t m = 1 M × E h ^ E n ^ b exp | θ η b δ j , m j , m + n ^ b | 2 | n ^ b | 2 = log 2 N t M + 1 1 ln 2 1 N t M j = 1 N t m = 1 M log 2 j = 1 N t m = 1 M E h ^ exp θ | δ j , m j , m | 2 2 η b .
In order to derive the ergodic rate at the passive eavesdropper, we first represent (10) using θ as follows:
y e = θ g j ^ x m + θ ( g j ^ β 1 + g i ^ β 2 ) ν + ρ 2 ( g j ˜ x m + g j ˜ β 1 ν + g i ˜ β 2 ν ) + n e .
If we let:
n ˜ e = θ ( g j ^ β 1 + g i ^ β 2 ) ν + ρ 2 ( g j ˜ x m + g j ˜ β 1 ν + g i ˜ β 2 ν ) + n e ,
then the normalized value of y e with η e = E [ n ˜ e ( n ˜ e ) H ] can be approximated by:
y ˜ e θ η e g j ^ x m + n ^ e ,
where n ^ e = n ˜ e / η e .
Then, the ergodic rate of Eve is expressed as:
R e = E g ^ j = 1 N t m = 1 M p ( y ˜ e , g j ^ , x m ) log 2 p ( y ˜ e , g j ^ , x m ) p ( y ˜ e ) p ( g j ^ , x m ) d y ˜ e = log 2 N t M 1 N t M j = 1 N t m = 1 M E g ^ E n ^ e log 2 j = 1 N t m = 1 M × exp | θ η e α j , m j , m + n ^ e | 2 | n ^ e | 2 ,
in which α j , m j , m is given by:
α j , m j , m = g j ^ x m g j ^ x m .
Using Jensen’s inequality, the lower bound of R e is obtained as:
R e l o w = log 2 N t M + 1 1 ln 2 1 N t M j = 1 N t m = 1 M log 2 j = 1 N t m = 1 M E g ^ exp θ | α j , m j , m | 2 2 η e .
Based on (23) and (29), the ergodic secrecy rate can be written as:
R ¯ s = max { 0 , R b R e } .

5. Simulation and Numerical Results

This section presents the secrecy performance comparisons in terms of the secrecy rate. The ergodic secrecy rate, derived in (32), was numerically simulated by using several parameters including N a , N t , modulation order M, and SNR values. In the simulations, the power of the modulation symbol was normalized to one, and the power of the complex AWGN at both Bob and Eve was assumed to be σ 2 , while the SNR was 1 / σ 2 .
We first compared the secrecy performance of the proposed scheme according to the antenna selection method. Figure 3 shows the comparison of the secrecy performance when Alice chooses T k by using the optimum selection method described in Section 3.3 and the random selection method, when ρ 2 = 0.01. It was assumed that N a = 6 and N t = 4, and different APM schemes with M = 2, M = 4, and M = 8 were employed. As shown in Figure 3, compared to the random selection scheme, the proposed optimum antenna selection scheme with T k was able to achieve a better secrecy rate. Because the secrecy capacity of fading channels had a ceiling as the transmit SNR increased [17], R ¯ s of the proposed scheme increased with the increasing SNR until the SNR approached about 30 dB. Furthermore, it is easy to see that a higher modulation order M yielded a higher secrecy rate.
Next, we compared the secrecy rate of the proposed scheme with the conventional scheme in [9], by applying the same effective data rate, r e = n t + . Figure 4 and Figure 5 show the comparison of R ¯ s when r e were four and five, respectively. When r e = 4 in Figure 4, we considered the scenario that Alice employed the 8-PSK modulation, and N a and N t were set to three and two, respectively, in the proposed scheme. On the other hand, in the conventional scheme, Alice employed QPSK modulation, and the symbol was transmitted by one of four transmit antennas, i.e., N t = 4 . When r e = 5 in Figure 5, N a and N t of the proposed scheme were set to be six and 4, respectively, and the 8-PSK modulation symbol was transmitted. On the other hand, N t of the conventional scheme was set to be eight, and QPSK symbol was transmitted. As shown in Figure 4 and Figure 5, we observe that the proposed scheme can achieve better secrecy performance than the conventional scheme in [9] when the perfect CSI was given, i.e., ρ 2 = 0 . Furthermore, the proposed scheme with channel estimation error of ρ 2 = 0.01 produced a better performance compared to the conventional scheme with perfect CSI.
Figure 6 demonstrates the performance of the secrecy rate of the proposed scheme versus SNR with different numbers of transmit antennas N a and N t , when ρ 2 was equal to 0.01. We applied the QPSK modulation. We assumed that Alice was equipped with N a = 3, 5, 6, 7, 10, 12, and 15 transmit antennas and utilized N t = 2, 4, and 8 effective transmit antennas to send information. As shown in Figure 6, with the increase in the number of transmit antennas N t , the secrecy rate was remarkably improved. When we set N t to be a fixed value, the more antennas N a Alice had, the higher the secrecy rate was. Simulation results also showed that the secrecy rate was growing rapidly under the low SNR. As the SNR increased, the secrecy rate tended to approach a saturation point. Because in the case of the low SNR, most of the transmit power was used to transmit the information symbols, more transmit power was used to transmit the AN in order to improve the secrecy rate as the SNR increased.
Figure 7 shows the secrecy rate against the SNR with varying channel estimation error, ρ 2 , where N a and N t were set to six and four, respectively. As we can easily deduce, the secrecy rate decreased as ρ 2 increased. Finally, Figure 8 compares the bit error rate (BER) performances of the proposed scheme. We employed the BPSK modulation scheme and various numbers of N a and N t at Alice. It was shown that the BER performance at Bob decreased rapidly with SNR for varying estimation error. However, BER at Eve was nearly 0.5 for all SNRs, which indicated that there was no information leaked to Eve.

6. Conclusions

In this paper, we presented a new secrecy-enhancing scheme for the SM system. The proposed scheme employed two AN sequences, which were designed to be canceled each other perfectly only at the legitimate receiver. The AN sequences were designed by exploiting imperfect CSI of the legitimate channel by considering a practical system environment. In addition, an optimum antenna selection scheme was proposed by reducing the complexities of finding the solution from the exhaustive search. With the proposed scheme, the passive eavesdropper would suffer from the interference induced by the AN, resulting in secrecy rate enhancement of the legitimate receiver. We analyzed the secrecy performance over a Rayleigh fading channel by considering imperfect CSI. The simulation results demonstrated that the secrecy performance of the proposed scheme was enhanced compared to the conventional scheme.

Author Contributions

Conceptualization, P.S. and X.-Q.J.; data curation, P.S.; funding acquisition, S.K.; software, W.Y. and K.Z.; supervision, S.K.; validation, X.-Q.J.; writing, original draft, P.S.; writing, review and editing, S.K.

Funding

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2017R1D1A1B03027939).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mesleh, R.Y.; Haas, H.; Sinanovic, S.; Ahn, C.W.; Yun, S.B. Spatial Modulation. IEEE Trans. Veh. Technol. 2008, 57, 2228–2241. [Google Scholar] [CrossRef]
  2. Renzo, M.D.; Haas, H.; Ghrayeb, A.; Sugiura, S.; Hanzo, L. Spatial Modulation for Generalized MIMO: Challenges, Opportunities, and Implementation. Proc. IEEE 2008, 102, 56–103. [Google Scholar] [CrossRef]
  3. Basar, E. Index modulation techniques for 5G wireless networks. IEEE Commun. Mag. 2016, 54, 168–175. [Google Scholar] [CrossRef]
  4. Guo, S.S.; Zhang, H.X.; Zhang, P.; Wu, D.L.; Yuan, D.F. Generalized 3D Constellation Design for Spatial Modulation. IEEE Trans. Commun. 2017, 65, 3316–3327. [Google Scholar]
  5. Guo, S.S.; Zhang, H.X.; Jin, S.; Zhang, P. Spatial Modulation via 3D Mapping. IEEE Commun. Lett. 2016, 20, 1096–1099. [Google Scholar] [CrossRef]
  6. Rajashekar, R.; Hari, K.V.S.; Hanzo, L. Antenna Selection in Spatial Modulation Systems. IEEE Commun. Lett. 2013, 17, 521–524. [Google Scholar] [CrossRef] [Green Version]
  7. Rajashekar, R.; Hari, K.V.S.; Hanzo, L. Quantifying the Transmit Diversity Order of Euclidean Distance Based Antenna Selection in Spatial Modulation. IEEE Signal Process. Lett. 2015, 22, 1434–1437. [Google Scholar] [CrossRef] [Green Version]
  8. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2018, 21, 1773–1828. [Google Scholar] [CrossRef]
  9. Guan, X.R.; Cai, Y.M.; Yang, W.W. On the Secrecy Mutual Information of Spatial Modulation with Finite Alphabet. In Proceedings of the 2012 International Conference on Wireless Communications and Signal Processing (WCSP), Huangshan, China, 25–27 October 2012; pp. 1–4. [Google Scholar]
  10. Wang, L.; Bashar, S.; Wei, Y.M.; Li, R.G. Secrecy Enhancement Analysis Against Unknown Eavesdropping in Spatial Modulation. IEEE Commun. Lett. 2015, 19, 1351–1354. [Google Scholar] [CrossRef]
  11. Wang, Y.; Zhang, T.; Yang, W.W.; Guo, J.B.; Liu, Y.X.; Shang, X.H. Secure Transmission for Differential Quadrature Spatial Modulation with Artificial Noise. IEEE Access 2018, 7, 7641–7650. [Google Scholar] [CrossRef]
  12. Yu, W.C.; Zhang, K.; Shang, P.P.; Jiang, X.Q.; Wen, M.W.; Li, J.; Hai, H. Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18–21 February 2019; pp. 105–109. [Google Scholar]
  13. Jiang, X.Q.; Wen, M.W.; Hai, H.; Li, J.; Kim, S.Y. Secrecy-Enhancing Scheme for Spatial Modulation. IEEE Commun. Lett. 2018, 22, 550–553. [Google Scholar] [CrossRef]
  14. Wang, X.; Wang, X.; Sun, L. Spatial Modulation aided Physical Layer Security Enhancement for Fading Wiretap Channels. In Proceedings of the 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP), Yangzhou, China, 13–15 October 2016; pp. 1–5. [Google Scholar]
  15. Shu, F.; Wang, Z.W.; Chen, R.Q.; Wu, Y.P.; Wang, J.Z. Two High-performance Schemes of Transmit Antenna Selection for Secure Spatial Modulation. IEEE Trans. Veh. Technol. 2018, 67, 8969–8973. [Google Scholar] [CrossRef]
  16. Sadek, M.; Tarighat, A.; Sayed, A.H. Active Antenna Selection in Multiuser MIMO Communications. IEEE Trans. Signal Process. 2007, 55, 1498–1510. [Google Scholar] [CrossRef]
  17. Lei, H.J.; Ansari, I.S.; Pan, G.F.; Alomair, B.; Alouini, M.S. Secrecy Capacity Analysis Over α-μ Fading Channels. IEEE Commun. Lett. 2017, 21, 1445–1448. [Google Scholar] [CrossRef]
Figure 1. Physical layer security scenario for the spatial modulation systems.
Figure 1. Physical layer security scenario for the spatial modulation systems.
Entropy 21 00626 g001
Figure 2. System model of the proposed secrecy enhancement scheme for the spatial modulation (SM) system.
Figure 2. System model of the proposed secrecy enhancement scheme for the spatial modulation (SM) system.
Entropy 21 00626 g002
Figure 3. The secrecy rate, R ¯ s , of the proposed scheme according to the selection methods of T k when N a = 6 and N t = 4 .
Figure 3. The secrecy rate, R ¯ s , of the proposed scheme according to the selection methods of T k when N a = 6 and N t = 4 .
Entropy 21 00626 g003
Figure 4. Comparison of R ¯ s when r e = 4 bits.
Figure 4. Comparison of R ¯ s when r e = 4 bits.
Entropy 21 00626 g004
Figure 5. Comparison of R ¯ s when r e = 5 bits.
Figure 5. Comparison of R ¯ s when r e = 5 bits.
Entropy 21 00626 g005
Figure 6. Comparison of R ¯ s for the proposed scheme according to N a and N t .
Figure 6. Comparison of R ¯ s for the proposed scheme according to N a and N t .
Entropy 21 00626 g006
Figure 7. Comparison of R ¯ s for the proposed scheme with varying ρ 2 .
Figure 7. Comparison of R ¯ s for the proposed scheme with varying ρ 2 .
Entropy 21 00626 g007
Figure 8. The BER performance under BPSK modulation and various numbers of N a and N t .
Figure 8. The BER performance under BPSK modulation and various numbers of N a and N t .
Entropy 21 00626 g008

Share and Cite

MDPI and ACS Style

Shang, P.; Yu, W.; Zhang, K.; Jiang, X.-Q.; Kim, S. Secrecy Enhancing Scheme for Spatial Modulation Using Antenna Selection and Artificial Noise. Entropy 2019, 21, 626. https://doi.org/10.3390/e21070626

AMA Style

Shang P, Yu W, Zhang K, Jiang X-Q, Kim S. Secrecy Enhancing Scheme for Spatial Modulation Using Antenna Selection and Artificial Noise. Entropy. 2019; 21(7):626. https://doi.org/10.3390/e21070626

Chicago/Turabian Style

Shang, Pingping, Weicheng Yu, Kai Zhang, Xue-Qin Jiang, and Sooyoung Kim. 2019. "Secrecy Enhancing Scheme for Spatial Modulation Using Antenna Selection and Artificial Noise" Entropy 21, no. 7: 626. https://doi.org/10.3390/e21070626

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop