1. Introduction
1.1. Problem Formulation
Wireless communication plays an important role in today’s communication systems. However, since the open nature of the environment allows illegal users to eavesdrop confidential messages, the security of wireless communication is urgently needed and therefore has attracted extensive attention and research [1,2,3].
1.2. Current Literature
A conventional technique for wireless-communication security is mathematical encryption [4]. Nevertheless, it suffers from heavy system overhead and computational complexity. In contrast to mathematical encryption, directional modulation (DM) is a key-less physical-layer security (PLS) transmission technique, which uses an antenna array to transmit signal only along the desired direction or even only in the desired position [5]. In the past few decades, the implementation of DM was mainly based on a phased array (PA) [6]. However, the transmit beam pattern is only angle-dependent if employing PA, and it cannot guarantee the security of the transmission when eavesdroppers share the same direction with the legitimate user.
To address such a problem, another antenna array model, a frequency diverse array (FDA), was proposed in [7]. The authors in [7] pointed out an extra range-dependent property of the FDA by introducing a frequency offset between adjacent antenna elements. Benefiting from this feature, an FDA has the range-angle dependent property and delivers potential applications in PLS. In order to generate the required beam patterns, a number of researchers have conducted investigations on the design of frequency offset [8,9,10,11,12]. Moreover, Gao et al. proposed a multi-carrier FDA scheme in [13] to improve the performance.
The carriers assigned to all antenna elements can be mutually orthogonal by designing a proper frequency offset. Thus, Ding et al. [14] constructed an orthogonal frequency division multiplexing (OFDM) system with an FDA for secure transmission. Unfortunately, as the result of the coupling effect, there were positions besides the legitimate receiver where the BER was low as well. If eavesdroppers were located at these positions, the transmission was not secure. In order to mitigate the coupling effect of a conventional FDA, the authors of [15] proposed a random FDA (RFDA) by employing random frequency increments across the array elements. Furthermore, a multi-beam wireless communication scheme was proposed in [16] with RFDA, which was security-enhanced, spectrum-efficient and power-efficient.
However, for medium-scale and large-scale DM systems, the receiver structure of RFDA dramatically increases the circuit cost, motivating the authors of [17] to propose a random subcarrier-selection array based using the OFDM technique instead of RFDA. Additionally, Shen et al. [18] gave two practical random subcarrier-selection methods: a quadratic subcarrier set plus randomization procedure (QSS Plus RP) and a prime subcarrier set plus randomization procedure (PSS Plus RP), both of which could select the subcarriers randomly and achieve secure precise wireless transmission.
1.3. Motivation and Related Work
It can be derived from [17,18] that the key of combining FDA with OFDM, while mitigating the coupling effect, was to randomly distribute a set of orthogonal subcarriers to each antenna array element. The authors of [18] gave two practical random subcarrier-selection methods: QSS Plus RP and PSS Plus RP. The QSS was defined as a set whose subcarrier index along the antenna array is a non-linear function of the corresponding antenna element index. The PSS was defined as a set whose subcarrier index is prime. Moreover, in order to destroy the regular order and produce a more random subcarrier index distribution over the transmitting antennas, the authors designed a block interleaving randomization procedure and repeated it until the randomization metric was larger than the predefined threshold.
However, this method brought about new problems. First, the repetition of the block interleaving operation increased system complexity, and it was hard to obtain a proper predefined threshold. Also, it generated a large number of unused subcarriers that greatly wasted spectrum.
To alleviate the above problems, this paper proposed a random subcarrier-selection method based on index modulation. On one hand, the bitstream was a random binary sequence, which could guarantee the randomness of the selected subcarriers; on the other hand, similar to IM [19], the indices of the subcarriers could also carry the information, which mitigated the waste of subcarriers. Moreover, our proposed scheme avoided the repeated block interleaving, achieving lower complexity. The proposed scheme could be used in wireless communications where the FDA is required to provide secure transmission.
1.4. Benefits and Challenges
The main benefits are summarized as follows:
A new random subcarrier-selection method was proposed to guarantee the randomness of the selected subcarriers. In contrast to the scheme proposed in [18], RSCS-IM avoids the randomization procedure while the selected subcarriers are more random.
IM is combined with subcarrier selection. By employing IM, the information was conveyed not only by MQAM modulation but also by the indices of the activated subcarriers, which improved the SE. Operating at the same SE, the BER performance was promoted by employing our scheme.
The secure precise transmission via computer simulation was demonstrated and derived the closed-form expression of BER for the desired position. The theoretical outcomes were validated by simulation results as well.
The main challenges are summarized as follows: in order to achieve precise and secure wireless communication, the randomness of the selected subcarriers must be guaranteed; the system complexity must be reduced and SE must be improved.
The rest of the paper can be summarized as follows. In Section 2, the system model is presented, including the conventional random subcarrier-selection method and the proposed random subcarrier-selection method based on IM. Performance analysis is depicted in Section 3. The computer simulation results are given in Section 4 and Section 5 draws the conclusion.
The notations used in this manuscript are shown in Table 1.
2. System Model
2.1. Conventional Random Subcarrier-Selection Method
The frequency increments of the conventional uniform FDA are linearly assigned to all antenna elements, resulting in an insecure coupling effect [7]. For mitigating this problem, a random subcarrier-selection method was proposed in [18], where a -element antenna array was employed at the transmit side and each element transmitted the same subcarrier symbol. The used subcarriers were randomly selected from the all-subcarrier set of OFDM. Assuming that the number of total subcarriers is , then we have the following:
(1)
where is the reference frequency, m denotes the subcarrier index, and stands for the sub-channel bandwidth. The random subcarrier-selection method PSS Plus RP is described below. Firstly, the authors constructed a random subcarrier index set defined as(2)
In order to make a more random subcarrier index distribution over the transmit antennas, the authors proposed a random procedure (RP) by prime modulo operation and block interleaving. A constant p was chosen, which was the largest prime less than . Then, the set was partitioned into p subsets by taking all set elements modulo p, which is represented as
(3)
Finally, the authors permuted the element order in the set K by block interleaving [18], which is depicted in Figure 1. In addition, the values of I and J should satisfy the inequality
(4)
It is worth pointing out that the block interleaving would be repeated until the randomness of the subcarrier index was greater than a certain threshold. To measure the random degree of the selected subcarriers, a random metric (RM) was defined in [18]. Suppose that the indices of the selected subcarriers are represented as
(5)
The subcarrier index spacing vector can be derived as
(6)
Then, can be expressed as
(7)
where is the i-th element of . In addition, denots the average value of , which is given by(8)
Figure 2 draws the flow chart of PSS Plus RP. As shown in Figure 2, firstly, subcarriers were selected whose index was a prime number from the given subcarrier set in (1). Next, a prime number p was chosen, which was the largest prime less than . Then, these indices were partitioned into p groups using the modulo-p operation. Finally, the block interleaving operation was performed, as shown in Figure 1, on this p-group index and the RM was computed. If RM was larger than the predefined threshold, the index output after block interleaving was the desired index. Otherwise, the block interleaving operation was repeated until RM was larger than the predefined threshold. We could see that there were a number of unused subcarriers causing the waste of spectrum. Additionally, a proper threshold was hard to obtain and the repeated block interleaving operation increased the computational complexity.
2.2. The Proposed Random Subcarrier-Selection Method Based on Index Modulation
It could be seen from the description of the conventional scheme in Section 2.1 that the complexity of PSS Plus RP mainly resulted from block interleaving, which was repeated until the random degree was greater than the predefined value. Meanwhile, the spectrum was wasted since a large number of subcarriers were unused. For alleviating this problem, this paper proposed a novel random subcarrier-selection method based on index modulation (RSCS-IM) under a new FDA OFDM communication architecture. The array structure of the proposed FDA OFDM transmitter based on IM is shown in Figure 3, where the legitimate transmitter Alice equipped a -element linear antenna array with element space d. The legitimate receiver Bob and N eavesdroppers Eve all employed a single antenna. In the conventional scheme [18], all antennas of Alice transmitted the same subcarrier symbol per OFDM symbol. While in our scheme, all antennas of Alice transmitted different subcarrier symbols per OFDM symbol to Bob by selecting multiple subcarriers from the subcarrier set using IM. If the first antenna was taken as the reference, Bob was located at (), which was represented as the red star. The positions of the N eavesdroppers were respectively, which were represented as the black stars. Suppose there were orthogonal subcarriers in our FDA OFDM-IM system and the set of subcarriers was
(9)
where is the reference frequency, m denotes the subcarrier index, and stands for the subchannel bandwidth, denotes the period of an OFDM symbol. It was assumed that and , where denotes the wave length and c is the light speed. The subcarrier frequency assigned to the n-th antenna was , where and . was determined by the bits used for index selection. It is worth pointing out that for different , . In a far-field scenario, the received signal at could be represented by(10)
where , . denotes the initial phase of the k-th antenna and is the received additive white Gaussian noise (AWGN) of the k-th antenna with the distribution of . So, we can rewrite (10) as(11)
After receiving the signal in (11), it was firstly down-converted to baseband by multiplying by . Then, the baseband signal was sampled at and we obtained
(12)
Observing Equation (12), if the symbols corresponding to the inactive subcarriers were set to zero and the noise was ignored, was the inverse fast Fourier transform (IFFT) of . For the sake of demodulating the original signal correctly, the initial phase of antenna k should satisfy the following identity [14]
(13)
where is a constant. So, by taking the fast Fourier transform (FFT) for and multiplying by , the original signal could be restored.The concrete random subcarrier-selection method based on index modulation (RSCS-IM) will be described in this part. It was assumed that the number of total orthogonal subcarriers and antenna array elements were and , respectively. For convenience, suppose and , where both and are positive integers and . Firstly, the index of all the orthogonal subcarriers was divided into a matrix whose dimension was , i.e.,
(14)
Next, a subcarrier was selected from every row of , respectively. For every row, p bits were used to select the subcarrier, where
(15)
Figure 4 depicts the flow chart of the proposed scheme, RSCS-IM. As shown in Figure 4, firstly, all the indices from the orthogonal subcarrier set in (9) were divided into the matrix in (14). Next, bits were generated and each p-bit of binary data was converted to a decimal, according to the data bits generated by the source, where . Finally, one index from every row of matrix (14) was picked in turn using these decimal data as columns and we obtained the desired indices. So, we could see that the proposed scheme avoided the repeated block interleaving operation and guaranteed the randomness of the selected subcarriers. Moreover, the indices of the activated subcarriers could transmit extra data bits, mitigating the waste of spectrum.
Hence, the whole block diagram of FDA OFDM-IM system is described in Figure 5, where and M is the order of modulation.
As shown in Figure 5, a total of m information bits entered the bit splitter. These m bits were split into groups. For the first groups, each group contained p bits for index-selection while the other groups each contained q bits for mapping. After that, the signal was conveyed by the FDA OFDM-IM system in the far-field scenario and Bob received the signal in (10). Just as depicted above, taking down-conversion and sampling for in turn, we could obtain in (12). Next, an -point FFT was obtained for . Then, in order to detect the activated subcarriers, we adopted the scheme of greedy detection and determined the location of maximum energy for every row in (14) as the index of the activated subcarrier. Finally, the index demodulation and QAM demodulation were obtained, respectively, and the original data could be restored. As for the eavesdroppers, assuming that they were consistent with the demodulation method used by the legitimate receiver, from (13) we could see that there was a phase offset between the received data and original data. So they could not restore the original data correctly.
In summary, the proposed scheme could guarantee the randomness of the selected subcarriers because of the randomness of the information bits. Moreover, the indices of the activated subcarriers could transmit extra data bits, improving the SE. In Section 3, we will analyse the performance of RSCS-IM and PSS Plus RP in detail.
3. Performance Analysis
In this section, we analyse some important factors of the proposed scheme RSCS-IM, including the SE, complexity and BER performance of the desired position. Meanwhile, the factors mentioned above of the scheme’s “prime subcarrier set plus randomization procedure (PSS Plus RP)” proposed in [18] were also analyzed for comparison.
3.1. Spectral Efficiency and Computational Complexity Analysis
-
Spectral Efficiency Analysis
One OFDM symbol was taken for reference. According to the principle of RSCS-IM, an OFDM symbol included bits information, which was defined as
(16)
where is the number of antennas, represents the number of total subcarriers and M is the modulation order. While for PSS Plus RP, the counterpart was(17)
It was obvious that , so RSCS-IM promoted the spectrum efficiency. Meanwhile, we could see that a large implied a higher spectrum efficiency; however, larger also implied higher computational complexity. We could select the value of and to meet our requirement in a certain scenario.
-
Computational Complexity Analysis
According to the principles of PSS Plus RP and RSCS-IM shown in Figure 2 and Figure 4, respectively, we analyze the computational complexity of these two schemes in this subsection. The computational complexity was evaluated in terms of the real-valued operations, including real-valued multiplication, real-valued additions, and real-valued modulo operations. According to the principles, we gave the complexity of these two methods shown in Table 2, where and denote the number of total subcarriers and antennas, respectively, and N is the number of loops of block interleaving.
From Table 2 we could clearly see that the number of modulo operations in RSCS-IM was less than that of PSS Plus RP. As for the addition operation, in general, and , so . Moreover, in most cases. and N had the same order of magnitude. Thus, we could see that the number of multiplications in these two schemes were basically equal. Overall, the complexity of RSCS-IM was lower.
3.2. BER Performance Analysis of the Desired Position
In what follows, the average BER of the desired position is analyzed. As shown in Figure 5, demodulation includes index demodulation and QAM demodulation, both of which need to know the index of the activated subcarriers. For all alternative orthogonal subcarriers, we could consider that the activated subcarriers conveyed the QAM symbol plus noise while the inactivated subcarriers just conveyed the noise. As a result, we adopted greedy detection to determine the index of activated subcarriers. Suppose that denotes the symbol whose index is of the i-th row in (14), then,
(18)
After determining the index of the activated subcarriers, ML detection was adopted to determine the constellation symbols, which was similar to the classical QAM demodulation, i.e.,
(19)
where S is the set of standard constellation symbols and denotes the received symbol.According to the analysis above, average BER could be represented as
(20)
where and denote the number of wrong bits of index demodulation and QAM demodulation, respectively. denotes the total bits of an OFDM symbol, including the bits of index selection. As the index selection of each group, i.e., each row in (14) did not affect each other, taking an arbitrary group for example, we could get(21)
It was assumed that denoted the error probability of greedy detection. When greedy detection was wrong, the bit error rate of index was and the counterpart of QAM modulation was . Otherwise, the bit error rate of QAM modulation was . So, could be written as
(22)
and as(23)
From the principal of greedy detection, when greedy detection was wrong, i.e., , we have
(24)
In line with [20], a closed-form expression of (24) is
(25)
where denotes the SNR of activated subcarriers and is the binomial coefficient. When it came to , we knew that the index demodulation was turning the decimal index into a binary bit stream and the index met . The essence of wrong greedy detection was detecting the correct index as one of the other wrong indexes. Meanwhile, the probability of detecting the correct index as any other wrong index was the same. So,(26)
As for and , after a brief analysis, we could get
(27)
and(28)
where denotes the BER of classical QAM modulation. Hence, substituting (25)–(28) into (22) and (23) we could obtain and . Finally, could be derived by substituting (21)–(23) into (20).In terms of PSS Plus RP, it did not include the index demodulation and its BER performance was similar to the classical OFDM system in the Gaussian channel, which could be represented as
(29)
From (28) and (29) we could see that was equal to P when the greedy detection was always right, i.e., , which was in line with the analysis.
In terms of Eve, it is worth pointing out that, when employing an RSCS-IM scheme, the bits transmitted by te index could be demodulated correctly when SNR was high enough i.e.,
(30)
where represents the BER of Eve when SNR was high enough for RSCS-IM. While for PSS Plus RP, assuming represents the BER of Eve, regardless of the value of SNR,(31)
since it did not include the index modulation.4. Simulation Results
In this section, the simulation results of the random degree, the computational complexity, and the BER performance are depicted to describe the performance of RSCS-IM. In this simulation, system parameters were chosen as follows: reference frequency GHz [14], signal bandwidth MHz, the number of total subcarriers or 1024, dB, the number of antenna array elements , the legitimate receiver Bob was located at ( m), and we employed a QPSK constellation. The constant in (13). These parameters are listed in Table 3.
4.1. The Simulation Results of Random Degree
To measure the random degree of the selected subcarriers of the proposed RSCS-IM and the PSS Plus RP [18], we calculated in (7) of the two random subcarrier-selection methods many times. The results are presented in Figure 6. As shown in Figure 6, the random degree of the proposed scheme RSCS-IM was always larger than that of PSS Plus RP in ten thousand simulations, meaning that the selected subcarriers employing RSCS-IM were more random. Additionally, comparing Figure 6a with Figure 6b, we could see that when , the random degree was improved using both methods because the number of available subcarriers increased. Moreover, the increase in random degree was greater when employing RSCS-IM rather than employing PSS Plus RP since the number of increased subcarriers employing RSCS-IM was more than the number of increased primes employing PSS Plus RP.
4.2. The Simulation Results of Computational Complexity
To visualize the computational complexity of the two schemes, we simulated the number of addition, multiplication, and modulo operations and selected and . When firstly reached 95% of the maximum random degree, the number of loops . The concrete computational complexity is depicted in Figure 7. Hence, we could see that the number of additions, multiplications, and modulo operations in RSCS-IM were all less than that of PSS Plus RP. The complexity of RSCS-IM was lower. Comparing Figure 7a with Figure 7b, when , the complexity of PSS Plus RP was basically unchanged since the number of loops was basically independent of , while the complexity increased slightly, when employing RSCS-IM, in addition and multiplication operations. However, the complexity of RSCS-IM was still substantially lower than that of PSS Plus RP when was not particularly large.
4.3. The Simulation Results of BER Performance
In order to evaluate the secure performance of the proposed scheme RSCS-IM, the 3-D performance surface of BER versus the direction angle and distance was simulated. Furthermore, we simulated the performance of PSS Plus RP to make a comparison with our scheme. Meanwhile, in order to illustrate the coupling effect of a uniform FDA, and to further illustrate the importance of randomly selecting subcarriers, this paper also simulated the 3-D performance surface of BER versus the direction angle and distance of uniform FDA [7].
Figure 8 is the 3-D performance surface of BER versus the direction angle and distance of a uniform FDA. As shown in Figure 8, besides the desired position, there were other positions where the BER was low as well. If eavesdroppers were located at these positions, the transmission was not secure. This phenomenon is known as the coupling effect of a uniform FDA.
Figure 9 depicts the 3-D BER performance surface versus the direction angle and distance when the number of total subcarriers . Compared with Figure 8, Figure 9 depicts that low bit error rate occurred only in a small area around the desired position. The other positions could not restore the original signal correctly. Therefore, the random selection of subcarriers was important for weakening the coupling effect and, thus, achieving safe and accurate wireless transmission.
When , Figure 10 depicts the 3-D BER performance surface versus the direction angle and distance. Figure 10a is similar to Figure 9a. Comparing Figure 10b with Figure 9b, the BER performance at Eve was slightly improved because of the increased weight of bits used for index selection. In terms of the desired position, there was a certain BER gain when employing RSCS-IM, comparing Figure 10b with Figure 10a.
Figure 11 depicts the BER performance versus of Bob. As shown in Figure 11, the theoretical and simulation curves were basically consistent. Specifically, regardless of or , the BER performance of Bob was consistent when employing PSS Plus RP since it did not include IM. The BER performance of Bob was only related to the symbol modulation method. Additionally, when and BER was , there was more than 1dB gain when employing RSCS-IM rather than PSS Plus RP. When , there was an extra gain in the BER performance of Bob compared with in high , since SE was improved. While in low , there was a distinct degradation in the error probability of greedy detection. So the BER performance of Bob was basically consistent in low when and . Likewise, since the error probability of greedy detection was very high in low , the BER performance of Bob employing RSCS-IM was worse than employing PSS Plus RP.
From Figure 9 we can see that the BER performance of the other positions, other than the desired position, was of small variation. So, when taking an arbitrary position ( m) as an eavesdropper (Eve), the BER performance versus SNR using RSCS-IM with different is shown in Figure 12. The number of total subcarriers . As for Eve, the BER performance versus SNR was always about when employing PSS Plus RP. As the other positions could demodulate the index bits correctly, the BER performance employing RSCS-IM was less than . Specifically, the bigger was, the lower the BER was in high SNRs. In other words, the less bits used in IM, the higher the BER was in high SNRs. Thus, we could control the BER performance in other positions by selecting a proper value of so that Eve could not restore the original signal correctly, even if error correction coding was employed.
5. Conclusions
Based on IM, this paper proposed a new random subcarrier-selection method, RSCS-IM, which achieved secure and precise wireless transmission. Compared to PSS Plus RP, which was proposed in [18], RSCS-IM not only enhanced the SE but also reduced complexity. At the same SE, the proposed RSCS-IM scheme featured better BER performance. Moreover, the BER performance of an eavesdropper could be limited by selecting a proper value of . Finally, we derived the closed-form expression of BER for the desired position and demonstrated the performance of our scheme via numerical simulation.
Conceptualization, X.L.; methodology, X.L., J.C. and T.Z.; software, T.Z. and J.C.; validation, T.Z.; formal analysis, T.Z.; investigation, T.Z.; resources, T.Z.; data curation, T.Z.; writing—original draft preparation, T.Z.; writing—review and editing, X.L. and J.C.; visualization, T.Z.; supervision, X.L. and S.L.; project administration, X.L. and S.L.; funding acquisition, X.L. All authors have read and agreed to the published version of the manuscript.
This work was supported by National Key R&D Program of China (2020YFB1806607) and the Foundation of stability support plan for National Key Lab (IFN2020104).
Not applicable.
Not applicable.
Not applicable.
The authors declare no conflict of interest.
The following abbreviations are used in this manuscript:
FDA | Frequency diverse array |
OFDM | Orthogonal frequency division multiplexing |
RSCS-IM | Random subcarrier-selection method based on index modulation |
BER | Bit error rate |
SE | Spectral efficiency |
PLS | Physical-layer security |
DM | Directional modulation |
PA | Phased array |
RFDA | Random frequency diverse array |
IM | Index modulation |
MQAM | Multiple Quadrature Amplitude Modulation |
FDA OFDM-IM | FDA OFDM transmitter based on index modulation |
AWGN | Additive white Gaussian noise |
PSS Plus RP | Prime subcarrier set plus randomization procedure |
IFFT | Inverse fast Fourier transform |
FFT | Fast Fourier transform |
RM | Random metric |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figure 6. Simulation comparison of the random degree. (a) [Forumla omitted. See PDF.] (b) [Forumla omitted. See PDF.].
Figure 7. The computational complexity of RSCS-IM and PSS Plus RP. (a) [Forumla omitted. See PDF.] (b) [Forumla omitted. See PDF.].
Figure 9. 3-D performance surface of BER versus the direction angle and distance ([Forumla omitted. See PDF.]). (a) 3-D performance surface of BER using PSS Plus RP; (b) 3-D performance surface of BER using RSCS-IM.
Figure 10. 3-D performance surface of BER versus the direction angle and distance ([Forumla omitted. See PDF.]). (a) 3-D performance surface of BER using PSS Plus RP; (b) 3-D performance surface of BER using RSCS-IM.
Figure 12. BER performance versus SNR of Eve under RSCS-IM and PSS Plus RP schemes with different [Forumla omitted. See PDF.].
Notations used in this manuscript.
Notation | Description |
---|---|
∑ | Sum. |
|
The distribution of a circularly symmetric complex Gaussian. |
|
The binomial coefficient. |
Complexity of PSS Plus RP and RSCS-IM.
Scheme | Complexity | ||
---|---|---|---|
Addition | Multiplication | Modulo | |
RSCS-IM |
|
|
— |
PSS Plus RP |
|
|
|
The system parameters in our simulation.
Parameter | Value | Description |
---|---|---|
|
2.404 GHz | Reference frequency. |
B | 20 MHz | Signal bandwidth. |
|
512/1024 | The number of total subcarriers. |
|
64 | The number of antenna array elements. |
|
9 dB | Average bit energy to noise power ratio. |
( |
( |
The desired position. |
|
0 | The constant of Equation ( |
References
1. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag.; 2015; 53, pp. 20-27. [DOI: https://dx.doi.org/10.1109/MCOM.2015.7081071]
2. Zhao, N.; Yu, F.R.; Li, M.; Yan, Q.; Leung, V.C. Physical layer security issues in interference-alignment-based wireless networks. IEEE Commun. Mag.; 2016; 54, pp. 162-168. [DOI: https://dx.doi.org/10.1109/MCOM.2016.7537191]
3. Zou, Y.L.; Zhu, J.; Wang, X.; Leung, V. Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw.; 2015; 29, pp. 42-48. [DOI: https://dx.doi.org/10.1109/MNET.2015.7018202]
4. Xie, N.; Zhang, S. Blind Authentication at the Physical Layer Under Time-Varying Fading Channels. IEEE J. Sel. Areas Commun.; 2018; 36, pp. 1465-1479. [DOI: https://dx.doi.org/10.1109/JSAC.2018.2824583]
5. Kalantari, A.; Soltanalian, M. Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security. IEEE J. Sel. Top. Signal Process; 2016; 10, pp. 1478-1493. [DOI: https://dx.doi.org/10.1109/JSTSP.2016.2600521]
6. Daly, M.P.; Bernhard, J.T. Directional Modulation Technique for Phased Arrays. IEEE Trans. Antennas Propag.; 2009; 57, pp. 2640-2663. [DOI: https://dx.doi.org/10.1109/TAP.2009.2027047]
7. Antonik, P.; Wicks, M.C.; Griffiths, H.D.; Baker, C.J. Frequency diverse array radars. Proceedings of the 2006 IEEE Conference on Radar; Verona, NY, USA, 24–27 April 2006; 3.
8. Khan, W.; Qureshi, I.M.; Saeed, S. Frequency Diverse Array Radar with Logarithmically Increasing Frequency Offset. IEEE Antennas Wirel. Propag. Lett.; 2015; 14, pp. 499-502. [DOI: https://dx.doi.org/10.1109/LAWP.2014.2368977]
9. Xu, Y.; Shi, X.; Li, W.; Xu, J. Flat-Top Beampattern Synthesis in Range and Angle Domains for Frequency Diverse Array via Second-Order Cone Programming. IEEE Antennas Wirel. Propag. Lett.; 2016; 15, pp. 1479-1482. [DOI: https://dx.doi.org/10.1109/LAWP.2015.2513758]
10. Xiong, J.; Wang, W.Q.; Shao, H.; Chen, H. Frequency Diverse Array Transmit Beampattern Optimization with Genetic Algorithm. IEEE Antennas Wirel. Propag. Lett.; 2017; 16, pp. 469-472. [DOI: https://dx.doi.org/10.1109/LAWP.2016.2584078]
11. Xu, Y.; Luk, K.M. Enhanced Transmit—Receive Beamforming for Frequency Diverse Array. IEEE Trans. Antennas Propag.; 2020; 68, pp. 5344-5352. [DOI: https://dx.doi.org/10.1109/TAP.2020.2977717]
12. Liao, Y.; Wang, J.; Liu, Q.H. Transmit Beampattern Synthesis for Frequency Diverse Array with Particle Swarm Frequency Offset Optimization. IEEE Trans. Antennas Propag.; 2021; 69, pp. 892-901. [DOI: https://dx.doi.org/10.1109/TAP.2020.3027576]
13. Gao, K.; Wang, W.Q.; Chen, H.; Cai, J. Transmit Beamspace Design for Multi-Carrier Frequency Diverse Array Sensor. IEEE Sens. J.; 2016; 16, pp. 5709-5714. [DOI: https://dx.doi.org/10.1109/JSEN.2016.2573379]
14. Ding, Y.; Zhang, J.; Fusco, V. Frequency diverse array OFDM transmitter for secure communication. Electron. Lett.; 2015; 51, pp. 1374-1375. [DOI: https://dx.doi.org/10.1049/el.2015.1491]
15. Liu, Y.; Ruan, H.; Wang, L.; Nehorai, A. The random frequency diverse array: A new antenna structure for uncoupled direction-range indication in active sensing. IEEE J. Sel. Top. Signal Process; 2017; 11, pp. 295-308. [DOI: https://dx.doi.org/10.1109/JSTSP.2016.2627183]
16. Gao, J.; Qiu, B.; Zhou, J. Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based on Random Frequency Diverse Array. Sensors; 2020; 20, 5298. [DOI: https://dx.doi.org/10.3390/s20185289] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/32947836]
17. Shu, F.; Wu, X.; Li, J.; Chen, R.; Wang, J. Secure and precise wireless transmission for random-subcarrier-selection based directional modulation transmit antenna array. IEEE J. Sel. Areas Commun.; 2018; 36, pp. 890-904. [DOI: https://dx.doi.org/10.1109/JSAC.2018.2824231]
18. Shen, T.; Zhang, S.; Chen, R.; Wang, J.; Hu, J.; Shu, F.; Wang, J. Two practical random-subcarrier-selection methods for secure precise wireless transmissions. IEEE Trans. Veh. Technol.; 2019; 68, pp. 9018-9028. [DOI: https://dx.doi.org/10.1109/TVT.2019.2931751]
19. Basar, E.; Aygolu, U.; Panayirci, E.; Poor, H.V. Orthogonal frequency division multiplexing with index modulation. Proceedings of the IEEE GLOBECOM; Anaheim, CA, USA, 3–7 December 2012; pp. 4741-4746.
20. Crawford, J.; Ko, Y. Low complexity greedy detection method with generalized multicarrier index keying ofdm. Proceedings of the 2015 IEEE 26th Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC); Hong Kong, China, 30 August–2 September 2015; pp. 688-693.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Recently, a frequency diverse array (FDA) has been employed in an orthogonal frequency division multiplexing (OFDM) transmitter to achieve secure wireless communication without mathematical encryption. However, an insecure coupling effect arises if the frequency increments are linearly assigned to all antenna elements. To solve this problem, random subcarrier-selection methods are proposed; however, the challenge lies in the random selection of subcarriers. Inspired by the randomness of index modulation (IM), this paper proposes a low complexity random subcarrier-selection method based on index modulation (RSCS-IM). Specifically, this work conducted analysis on the spectral efficiency (SE) of our system and the computational complexity of RSCS-IM, which works out a closed-form expression of the BER performance of a desired position and validates the theoretical outcomes through simulation.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China;
2 China Academy of Space Technology (CAST), Beijing 100192, China;