Next Article in Journal
A Novel NiFe2O4/Paper-Based Magnetoelastic Biosensor to Detect Human Serum Albumin
Previous Article in Journal
Cognitive Radio Networks for Internet of Things and Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based On Random Frequency Diverse Array

1
School of Electronic Engineering, Xi’an Shiyou University, Xi’an 710000, China
2
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(18), 5289; https://doi.org/10.3390/s20185289
Submission received: 22 July 2020 / Revised: 10 September 2020 / Accepted: 12 September 2020 / Published: 16 September 2020
(This article belongs to the Section Communications)

Abstract

:
A security-enhanced, spectral-efficient, and power-efficient multi-beam wireless communication scheme based on random frequency diverse array (RFDA) is proposed in this paper. (AN)-aided directional modulation (DM) schemes. Furthermore, with the aid of spatial modulation (SM) technology and cooperative legitimate users (LUs), we can transmit more information bits by the use of LU number informations than the single modulation symbols. Unlike conventional zero-forcing (ZF) beamforming for multi-beam DM, we design a FDA beamforming vector for each LU based on the minimum transmit power method. Numerical simulations show that (1) the proposed scheme is power-efficient compared to the conventional schemes, (2) the proposed scheme can transmit more information bits than the conventional schemes, and (3) the proposed scheme can ensure communication security when eavesdroppers (Eves) are proximal to LUs or even in same locations.

1. Introduction

Wireless communication has attracted increasing attention in recent years. However, wireless communication occurs in an open environment and broadcasts information to all users in free space [1,2]. Therefore, wireless communication security has become a serious problem in both civil and military fields. Traditionally, upper-layer encryptions technology has been widely used in wired communication. However, encryption systems are inherited from the traditional computer network and ignores the special physical layer characteristics of wireless communication system, such as the openness wireless channel, time-varying network topology, and resource limitation of mobile terminal [3,4]. As a result, physical layer (PHY) security was introduced to achieve the confidentiality of messages at the PHY [5]. PHY security enables wireless communications to exploit the properties of physical layer to scramble information content that could be potentially intercepted by eavesdroppers, while simultaneously delivering it to its desired receivers. DM, as a keyless physical-layer security transmitting technique with great potentials, has attracted a great deal of attention over the past decade. It uses antenna arrays to transmit a signal only along the desired directions while distorting signal constellations in all other directions [6,7].
Traditionally, DM technology has been mainly implemented based on phased arrays (PA) in the past decade [8,9,10,11]. However, the previous communication schemes based on PA can no longer guarantee secure transmission when eavesdroppers locate in the desired direction of LU due to the transmit beampattern being only angle-focusing. Accordingly, it is necessary to investigate other schemes that can prevent eavesdroppers in the desired direction from intercepting messages. Therefore, we depart from PA and apply a frequency diverse array (FDA) into DM implementations because of its extra range dimension dependence, rather than being dependent on only the angle used [12,13,14,15,16,17].
FDA delivers a new opportunity for secure wireless communications. However, the beampattern of FDA is still angle-range coupling, which means that confidential messages are accessible to illegitimate receivers that are located at some angle-range pair curves. Several works have focused on frequency offsets to address the coupling problem of FDA [18]. To this end, in [19,20], the authors proposed a logarithmic frequency increments scheme. Furthermore, with random frequency increments between each element, the author of [21] proposed a new FDA structure, named random FDA, to indicate targets’ direction and range without coupling. Besides the radio frequency fronted technology, adding AN at the baseband is another effective technology used to deteriorate the received messages of Eves that has been employed in DM systems [22,23]. An FDA DM scheme with AN [24,25] has been proposed to further improve secrecy performance, and a robust synthesis scheme with AN was proposed in [26] for a single user scenario.
In summary, the current studies cannot deal with the PHY security problem of multiple receivers obtaining different messages simultaneously, which needs to be addressed in practical applications. The traditional DM schemes with AN need to allocate power to the AN, which will lower the power efficiency of total transmitting power. Furthermore, in practical cases, the Eves would be located as close to LU as possible (even in the same locations as the LUs) to eavesdrop on the confidential signal, and the previous studies have shown that it is difficult to ensure the security of the independent confidential message in this case. In addition, the received power at each LU is not accurately controlled according to the prescribed power.
In order to address the limitations of the previous works and further enhance the PHY security, we proposed a spatial modulation (SM) and multiple parameter weighted-type fractional Fourier transform (WFRFT)-aided scheme based on a random frequency diverse array (RFDA).
WFRFT, as a new transformation domain signal processing method based on Fourier transform [27], is gradually being applied to the wireless communication systems. WFRFT is actually the process of rotating the signal in the time-frequency plane to realize the time-frequency redistribution of signal power, and only when the users rotate the signal in same angle, but the opposite direction can the signal power be concentrated. Therefore, due to its power redistribution on the time-frequency plane, WFRFT technology can be regarded as a cryptographic method to further improve secrecy performance [28,29,30,31]. Furthermore, in [32], a synthesis scheme combining WFRFT and FDA DM was investigated to achieve power efficiency multi-beam secure communication. The contributions to physical layer security were promising. Apart from the above-mentioned WFRFT schemes based on a single parameter, the multiparameter WFRFT synthesis approaches have also been investigated intensively [33,34]. The MP-WFRFT system has a good parameter resistance, allowing it to detect in the condition of the eavesdroppers with a known signal transformation mode; in particular, this method can be combined with the existing DM technology, which can further improve the capacity for anti-interception and anti-detection based on the original system confidentiality.
SM, as an emerging information modulation technology, has gradually been introduced into wireless communication in recent years due to its high data rate and spectral efficiency. The basic idea of SM is to use the transmit antenna number as an additional information bearing unit to transmit more information bits than the single modulation symbols. However, in this paper, unlike previous works which applied SM to the multiple-input multiple-output (MIMO) system [35,36,37,38], the authors use SM technology based on FDA with cooperative LUs in order to avoid high interchannel interference at receivers and complicated estimate algorithms (e.g., maximum likelihood [35] and MRRC [38]) are required.
On the basis of the previous work, we propose a spectrally efficient and power-efficient multi-beam security communication scheme with the joint use of multiple techniques including MP-WFRFT, SM, and FDA–DM. Our main contributions can be summarized as follows.
(1) The proposed scheme combining MP-WFRFT realizes the embedding process of “AN” from the modulation level of digital baseband signal. Therefore, the proposed scheme based on MP-WFREFT avoids the power resource waste compared with traditional AN added scheme.
(2) In this paper, we apply SM technology into the FDA system with cooperative LUs, which can transmit additional information bits by using LUs number information compared to single modulation symbols to improve the capacity of communication system. Furthermore, the proposed scheme can ensure communication security when Eves are proximal to LUs or even in same locations.
(3) Unlike conventional beamforming method for multi-beam DM, we design the FDA beamforming matrix based on the minimum transmission messages power rule, which also can accurately control the received power of LUs.
The rest of this paper is organized as follows. Section 2 provides a review of DM PHY, MP-WFRFT and SM. Then, in Section 3, we propose the SM- and MP-WFRFT-aided scheme based on FDA. The performance is deduced in Section 4 and is numerically evaluated in Section 5. Finally, Section 6 draws conclusions.

2. Related Works

2.1. DM PHY

DM is a secure transmission technology without encryption for physical layer security. It uses antenna arrays to transmit confidential message only along desired directions while distorting signal constellations in all other directions. DM has received great attention in recent years, and it can be classified as PA-DM and FDA-DM. In this paper, we mainly research wireless communication scheme based on DM physical layer security technology.
PA-DM have been employed in many applications; however, these works based on PA-DM schemes can only achieve angle-dependent wireless physical layer security transmission [8,9,10]; Random subcarrier selection (RSCS) based on orthogonal frequency division multiplexing (OFDM) [11] only focuses on the single LU. Unless otherwise stated, other schemes are based on FDA-DM. The AN-aided DM schemes [14,22,23,24,25,26] can achieve the multi-beam secure transmission, regardless of the power efficiency. Moreover, those methods cannot achieve the neighbor security because of constraint on beamwidth. Furthermore, in [32], a synthesis scheme combined WFRFT and FDA DM was investigated to achieve power efficiency and the neighbor security. The contributions to physical layer security are solid. However, WFRFT DM schemes cannot guarantee the security of confidential messages when the WFRFT parameters are leaked to Eves.
On the basis of the previous work, we propose a synthesis multi-beam security communication scheme with the joint use of multiple techniques including MP-WFRFT, SM, and FDA-DM. Moreover, there are four potential practical applications for the proposed schemes in free space.
The first is the secure transmissions of satellite communications (SatCom) from ground station to satellites or from one satellite to others. The second is the secure transmissions of unmanned aerial vehicles (UAV) from the ground controller to UAVs or from one UAV to others. The third is the secure 5G millimeter wave (mmWave) communication. We can ignore the very few multi-path components in mmWave transmission, and the far-field and LoS assumptions can hold simultaneously due to the tiny array size, usually in magnitude of millimeters. The fourth is application in the Internet of Things (IoT). IoT is an indispensable part of our lives. Traditional security mainly relies on key encryption mechanism, but for the IoT with large number of nodes and heterogeneous networks, it is difficult to extract, distribute, and manage the keys. This has led us to develop new security solutions for IoT applications. Our proposed synthesis scheme based on FDA-DM can achieve security of IoT in physical layer, and it can solve the problem of spectrum scarcity in the IoT due to the SM technology.

2.2. MP-WFRFT

MP-WFRFT, known as a variation of the Fourier transform, is essentially the weighted sum of four basis functions. MP-WFRFT can be regarded as the process of rotating the signal in the time–frequency plane to realize the time–frequency redistribution of signal power. Only when the users rotate the signal in the same angle but the opposite direction can the signal power be concentrated. The representation of the 4-WFRFT of discrete sequences was proposed in [27] and has been widely employed in communication systems. Therefore, the classical 4-MP-WFRFT approach is adopted in this paper. For an arbitrary complex sequence x = [ x 1 , x 2 , , x Q ] T , the corresponding MP-WFRFT can be defined as
F α ( m , c ) ( x ) = ω 0 x + ω 1 F ( x ) + ω 2 F 2 ( x ) + ω 3 F 3 ( x ) ,
where F denotes the transform operator of MP-WFRFT; F , F 2 , and F 3 denote 1–3 times discrete Fourier transform (DFT) of sequence x , respectively; α is the MP-WFRFT modulation order; m = [ m 0 , m 1 , m 2 , m 3 ] T and c = [ c 0 , c 1 , c 2 , c 3 ] T are integer vectors; and the weighting coefficient ω l ( l = 0 , 1 , 2 , 3 ) is defined as
ω l = 1 4 k = 0 3 exp { 2 π j 4 [ α ( 4 m k + 1 ) ( 4 c k + k ) l k ] } ,
Based on the principles of transform operator F , F 2 ( x ) = Px , F 3 ( x ) = P F ( x ) , where P is the Q × Q reverse matrix. Therefore, (2) can be expressed as
F α ( m , c ) ( x ) = ω 0 x + ω 1 F ( x ) + ω 2 Px + ω 3 P F ( x ) ,
Furthermore, MP-WFRFT satisfies additive property, which can be expressed as
F α + β ( m , c ) ( x ) = F α ( m , c ) [ F β ( m , c ) ( x ) ] ,
where α , β R are real numbers.
The implementation of the MP-WFRFT operation is demonstrated in Figure 1. It is obvious that the MP-WFRFT can be quickly realized by means of an inversion module and DFT module. Furthermore, from (4), the original sequence for 4-MP-WFRFT can be easily recovered only under the premise that the WFRFT parameter α is substituted with α , i.e., x = F α ( m , c ) [ F α ( m , c ) ( x ) ] . Therefore, the MP-WFRFT technique provides encryption security with parameters ( α , m , c ) . LUs can decode confidential messages by using perfect MP-WFRFT parameters, and Eves only receive a distorted signal that is equivalent to noise.

2.3. SM Based On FDA

SM, as an emerging information modulation technique, has gradually been used in wireless communication in recent years. The basic idea of SM is to exploit spatial location information to transmit messages. Traditional SM is to map block of upcoming information based on transmit antenna number carrying unit and constellation diagram carrying unit (e.g., M-PSK). However, in this paper, we research wireless communication based on FDA with cooperative LUs. Therefore, unlike the traditional SM technique, we apply SM into FDA by directly using LUs number information as a carrying unit to transmit more information bits. At the receiving end, one or some LUs will be active and receive messages. The other LUs are inactive and receive zero power. In our scheme, only if we correctly estimate the LUs number informations and the received symbols will the block of information bits retrieved by the cooperative LUs. We achieve security communication in the case Eves are proximal to LUs or even in same locations.
In general, our proposed scheme maps the block of information bits, which is determined by the number of LUs and digital modulation. The size of each block for a system that use M-PSK or M-QAM constellation diagram and K LUs can be calculated as
B = log 2 ( K ) + Q log 2 ( M ) ,
where the first term log 2 ( K ) is the number of information bits carried by LUs number. Q is the number of active LUs, and the second term Q log 2 ( M ) is the number of information bits carried by symbols of constellation diagram, which are received by Q active LUs, respectively. For example, we set the BPSK constellation diagram ( M = 2 ), the number of LUs is K = 4 , and the number of active is Q = 3 , which maps five message bits as a block to be transmitted at one time, as shown in Table 1.

3. SM and MP-WFRFT Aided Scheme Based On FDA

3.1. The Architecture of System with Cooperative LUs

The traditional PA-DM schemes and even the AN-aided PA-DM synthesis schemes cannot achieve range dependence, and so these schemes cannot prevent eavesdroppers from intercepting messages and recognize private users in same direction. Therefore, we depart from PA and apply FDA into our DM implementations because of its extra range dimension dependence rather than simply angle dependence. In this paper, the line-of-sight (LoS) channel, far-field communication, and Gaussian wiretap channel are considered. As shown in Figure 2, the system consists of a legitimate transmit station, K LUs whose information can be shared with each other, and J passive Eves whose locations are unavailable to transmitter station.
A uniform N elements linear array with a spacing d is utilized for the transmitter. The transmitting frequency at the n t h (n = 1, 2, …, N) antenna is designed as f n = f c + Δ f n , where f c is the carrier wave frequency and Δ f n is the frequency increment. Here, we propose RFDA whose beam pattern is angle-range independent without coupling. Therefore, Δ f n can be replaced as Δ f n = λ n Δ f , where Δ f refers to a fixed frequency increment, and λ n represents a random variable.
For an arbitrary receiver at ( r , θ ) , the normalized steering vector is denoted by
h ( θ , r , t , f ) = ρ ( r ) N e j 2 π f 1 t r c , e j 2 π f 2 t r d sin θ c , , e j 2 π f N t r ( N 1 ) d sin θ c T
where c denotes light speed, ρ ( r ) refers to the path loss factor due to the free space propagation.
The location of LU K is ( r l k , θ l k ) , and for simplicity h ( t ) L k = Δ h L k ( r , θ , t , f ) is the normalized steering vector of LU K. Furthermore, we use the steering matrix H L ( t ) to denote steering vectors of all LUs, i.e.,
H L ( t ) = Δ [ h L 1 ( t ) , h L 2 ( t ) , , h L k ( t ) , , h L K ( t ) ] ,
where h L k ( t ) is the instantaneous normalized steering vector of k-th LU at ( r L k , θ L k ) .

3.2. The Radiating Signal Processed by SM and MP-WFRFT

The architecture of transmit station is shown in Figure 3. In this paper, we innovatively apply two key modulation techniques into FDA-DM. Before transmitting the confidential signal to LUs, we first use the SM module for the confidential signal stream x ( t ) and x ( t ) is normalized, i.e., E [ x ( t ) 2 ] = 1 . Then, we divide the confidential information bit stream into blocks. As mentioned in previous section, each block contains log 2 ( K M Q ) bits. The SM is operated to the confidential information block, which yields the transmitting symbol vector
u ( t ) = U [ x ( t ) ] = [ u 1 ( t ) , u 2 ( t ) , , u K ( t ) ] T ,
where u k ( t ) is the transmitting symbol for the k-th LU, and U [ · ] is the SM mapping.
Second, the transmitting symbol vector u ( t ) is performed by MP-WFRFT with parameters [ α s , m s , c s ] T , which can be expressed as
v = F α s ( m s , c s ) ( u ) = w 0 u + w 1 F ( u ) + w 2 Pu + w 3 P F ( u ) ,
The vector u ( t ) is rotated in the time-frequency plane to realize the time-frequency redistribution of signal power. Therefore, only when the users rotates the signal in same angle but the opposite direction can the signal power be concentrated.
Before radiating, we design the beamforming matrix D to further process the symbol vector v to match all transmit antennas. The beamforming matrix D is given by
D = [ d 1 ( t , f ) , d 2 ( t , f ) , , d K ( t , f ) ] ,
where d k ( t , f ) = [ d k , 1 ( t , f ) , d k , 2 ( t , f ) , , d k , N ( t , f ) ] T , for k = 1 , 2 , K , is the beamforming vector to process symbol v k ( t ) that is transmitted to k-th LU.
In order to obtain the beamforming matrix D , the locations of LUs are assumed to be previously known by transmit station, i.e., the steering matrix H L ( t ) is known in advance. Next, we design the beamforming matrix D based on the rules that (1) the intended LU effectively receives the corresponding confidential messages, while the undesired LUs cannot obtain the messages, and (2) the transmit power is minimum, while satisfying communication performance requirements of each LU. Therefore, the beamforming matrix D is designed by
H L H ( t ) D = A I K ,
where A = diag [ ζ ] , in which ζ = Δ [ ζ 1 , ζ 2 , , ζ k , , ζ K ] , and ζ k is the minimum desired power, for k = 1 , 2 , , K .
According to the pseudo-inverse concept, we obtain D as
D = H L ( t ) ( A 1 ) H [ A 1 H L H ( t ) H L ( t ) ( A 1 ) H ] 1 ,
After processed by the beamforming matrix, the radiating signal for the N antennas is given by
s = Dv = D F a s ( m s , c s ) [ U ( x ) ] ,

3.3. The Received Signal of LUs and Eves

The receiving structure with cooperative LUs is shown in Figure 4. Because of cooperative LUs, we combine all LUs received signals together as an LUs received vector, i.e., y L ( t ) = [ y L 1 ( t ) , y L 2 ( t ) , , y L K ( t ) ] T . In this paper, assuming that (1) the synchronization of time and frequency is perfect in the ideal scenario, and (2) the MP-WFRFT parameters are securely shared between the transmit station and LUs. As shown in Figure 4, the received symbol is first operated by inverse MP-WFRFT with ( α l , m l , c l ) , which yields
y L ( t ) = F α l ( m l , c l ) ( y L ( t ) ) = F α l ( m l , c l ) ( H L H ( t ) s ( t ) ) + F α l ( m l , c l ) ( n L ( t ) )
where the shared parameters ( α l , m l , c l ) = ( α s , m s , c s ) . Based on (9), (11), and (13), (14) can be further simplified as
y L ( t ) = F α s ( m s , c s ) ( Av ( t ) ) + F α s ( m s , c s ) ( n L ( t ) ) = A F α s ( m s , c s ) F α s ( m s , c s ) ( u ( t ) ) + F α s ( m s , n s ) ( n L ( t ) ) = Au ( t ) + n L ( t )
where n L ( t ) = [ n L 1 ( t ) , n L 2 ( t ) , , n L k ( t ) , , n L K ( t ) ] T is the AWGN vector with each element having zero mean and variance σ L k 2 , i.e., n L ( t ) CN ( 0 K × 1 , σ L 2 I K ) . n L ( t ) = [ n L 1 ( t ) , n L 2 ( t ) , , n L k ( t ) , , n L K ( t ) ] T is the AWGN vector after MP-WFRFT, which remains the same distribution characteristics, i.e., n L ( t ) CN ( 0 K × 1 , σ L 2 I K ) . Thereinto, the received symbol of k-th LU is given by
y L k ( t ) = F α s ( m s , c s ) ( h L k H ( t ) s ( t ) ) + n L k ( t ) = h L k H ( t ) d k ( t ) u k ( t ) + h L k H ( t ) i = 1 , i k K d i ( t ) u i + n L k ( t ) = ζ k u k ( t ) + n L k ( t )
From (15) and (16), it can be seen that each LU can effectively receive the corresponding transmitting symbol under the control of desired received power, and the transmitting symbol vector u ( t ) is recovered via inverse MP-WFRFT with cooperative LUs. Then, after the correct reception and inverse MP-WFRFT of all LUs, the confidential signal stream x(t) is obtained by demapping the transmitting symbol vector u ( t ) .
Next, we assume there are J passive Eves located in different positions intercepting the confidential information. We define ( r e j , θ e j ) as the coordinates of Eve j and use the steering matrix H E ( t ) to denote steering vectors of all Eves, i.e.,
H E ( t ) = Δ [ h E 1 ( t ) , h E 2 ( t ) , , h E j ( t ) , , h E J ( t ) ] ,
where h E j ( t ) is the instantaneous normalized steering vector of j-th Eve. Furthermore, we consider a worse case in which Eves in different positions can cooperate with each other. Similarly, the received message of Eves is given by
y E ( t ) = H E H ( t ) D ( t ) v ( t ) + n E ( t ) = H E H ( t ) D ( t ) w 0 u ( t ) Scrambled signal + H E H ( t ) D ( t ) b Equivalant AN + n E ( t ) AWAG
where b = w 1 F ( u ) + w 2 Pu + w 3 P F ( u ) = [ b 1 ( t ) , b 2 ( t ) , , b K ( t ) ] T , and n E ( t ) is the AWGN vector with each element having zero mean and variance σ E j 2 , i.e., n E ( t ) CN ( 0 J × 1 , σ E 2 I J ) . Specifically, the received signal of j-th Eve intercepting k-th LU’s information is given by
y E j , k = h E k H ( t ) d k ( t ) v ( t ) + n E k ( t ) = h E k H ( t ) d k ( t ) w 0 u k ( t ) Scrambled signal + h E k H ( t ) i = 1 , i k K d i ( t ) w 0 u i Interference from others + h E k H ( t ) i = 1 K d i ( t ) b i Equivalant AN + n E k ( t ) AWAG
according to the first part of (18), the amplitude and phase of the received symbol is distorted by MP-WFRFT operations w 0 and the item H E H ( t ) D ( t ) R . The second part of (18) mainly shows interference from other messages, and the third part is the equivalent AN as the process of rotating the signal in the time-frequency plane due to MP-WFRFT. The last part is AWGN. Our proposed scheme does not add noise into the baseband signal, but the application of MP-WFRFT in our proposed method also can achieve an equivalent noise effect on Eves, which means it uses less power compared to conventional AN-DM schemes.
On the other hand, MP-WFRFT technology is dependent on the assumption that the MP-WFRFT parameters are unknown for Eves. Once the MP-WFRFT parameters are leaked to Eves, Eves will demodulate their received signals via inverse MP-WFRFT operation. However, in this paper, we use another SM technique based on FDA with cooperative LUs. After the use of the SM and MP-WFRFT aided multi-beam FDA scheme, it is hard for Eves to wiretap the confidential messages. The Eves can correctly recover the confidential messages, only when estimates of LUs number information, the MP-WFRFT parameters and the corresponding symbols are all correct. Furthermore, even if one or some (but not all) of the Eves’ locations are same as one or some LUs’ locations and MP-WFRFT parameters are leaked to all Eves, our proposed scheme can also ensure the security wireless communication due to the use of SM technique with cooperative LUs. Therefore, our proposed method is able to degrade Eves’ reception and improve transmission security. Furthermore, our proposed method can achieve power efficient due to MP-WFRFT technology and information bits efficient by use of LUs number information as another information carrying unit in addition to constellation diagram.

4. Performance Analysis

With the basic knowledge of the SM and MP-WFRFT aided RFDA-DM scheme, we next analyze the secrecy performance of the system through the symbol error rate (SER) and bit error rate (BER), which are important metrics to measure the performance of wireless communication systems. Moreover, we analyze the anti-interception performance and provide comparisons with different DM schemes.

4.1. Symbol Error Rate

The confidential messages can be recovered only when estimates of MP-WFRFT parameters, the number information of LUs, and the corresponding modulation symbols are all correct. Here, we consider that the MP-WFRFT parameters are securely shared between transmitter station and LUs. Therefore, in order to calculate the overall SER P s , we should consider the probability of error P a for the estimates of number information and the SER P m of corresponding modulation symbols. The overall SER P s can be calculated as
P s = 1 ( 1 P a ) ( 1 P m ) .
First, the P m of corresponding modulation symbols is calculated. Only BPSK modulation, i.e., M = 2 , is considered throughout this paper. Moreover, the number of active LU is Q = 2 . The theoretical SER P m over AWGN channel can be obtained by
P m = 1 ( 1 Q ( r k ) ) 2 = 2 Q ( r k ) Q 2 ( r k ) ,
where Q ( x ) = 1 2 π x exp ( x 2 2 ) d x is the complementary error function. r k is the signal to interference-plus-noise ratio (SINR). According to Equation (16), we can calculate the r k of LU k as
r k = ζ k σ L 2 .
According to the Equations (10), (11), and (12), the total transmit power P s can be calculated as
P s = i = 1 K d k ( t , f ) 2 2 .
By contrast, with the conventional AN-DM shceme, we need allocate power to AN to suppress the signal received by Eve. Therefore, the transmit power of confidential message can be expressed as P m = β 2 P s , and the SINR r k of LU k can be obtained by
r k A N = β 2 ζ k σ L 2 = β 2 r k .
where β is the power splitting coefficient for confidential messages.
According to the Equation (19), we can calculate the r k of j-th Eve intercepting k-th LU’s information as
r k = h E j H ( t ) d k ( t ) 2 i = 1 , i k K h E j H ( t ) d i ( t ) w 0 2 + i = 1 K h E j H ( t ) d i ( t ) b i 2 + σ E 2 .
Next, the probability error P a at LUs and Eves is calculated, respectively. Here, we consider the probability error P a for the LUs. In this paper, we assume that the LUs know the SM mapping in advance and that Eves cannot wiretap any SM information. Meanwhile, each independent LU effectively receives the confidential signal, which is verified in the next subsection. Therefore, we consider a reasonable approximation P a 0 at LUs. Then, we calculate P a at Eves. Due to the arbitrary locations, Eves cannot wiretap any number information. Therefore, P a at Eves can be obtained by
P a = 1 1 2 K 1 .

4.2. Anti-Interception Performance

In this subsection, the anti-interception performance of the proposed MP-WFRFT- and SM-aided DM scheme is investigated. We assume the LUs know the SM mapping in advance and Eves cannot wiretap any number information. However, before performing the proposed scheme, we also need to exchange the MP-WFRFT parameters between the transmitter station and the LUs through a secure channel. In a practical application scenario, the Eve may know the MP-WFRFT modulation and intercept them with imperfect parameters. Therefore, it is necessary to analyze the effect of the leakage of MP-WFRFT parameters on the secrecy performance of our proposed scheme. Here, the actual MP-WFRFT parameters can be expressed as
α ^ m ^ c ^ = α s m s c s + Δ α Δ m Δ c
where Δ α , Δ m = [ Δ m 1 , Δ m 2 , Δ m 3 , Δ m 4 ] T , and Δ c = [ Δ c 1 , Δ c 2 , Δ c 3 , Δ c 4 ] T are the mismatched errors. The detailed simulations and analysis are given in Section 5 for investigating the impact of these nine MP-WFRFT mismatched parameters on secrecy performance.

4.3. Discussion

In this section, we present a comparison with some previous works in Table 2, which fully compares different schemes from different aspects of power efficient (PE), neighbor security (the location of Eve is close to or the same as that of LU, NS), control of received power (CR), range-angle security (RA), and spectral efficiency (SE).
From Table 2, we generalize the advantages of our proposed scheme as follows.
(1) Compared with PA-based DM schemes, the proposed scheme can achieve the range-angle security due to the FDA characteristics.
(2) The high overall spectral efficiency. The idea of SM is to map a block of information bits to symbols that are chosen from the constellation diagram and numbers information of LUs that are chosen from the sets of LUs. The numbers information of multiple LUs can be directly used as additional sources to transmit information simultaneously.
(3) Compared with AN-aided DM schemes, our proposed scheme is power efficient due to MP-WFRFT technique which realizes the embedding process of “AN” from the modulation level of digital baseband signal.
(4) Our proposed scheme can guarantee security of confidential message in some challenging application scenarios. Based on conventional DM schemes, as long as an Eve is close enough to the LU, the confidential messages can be intercepted by the Eve due to constraint on beamwidth. To illustrate the advantage of the proposed schemes, we consider the worst case where Eves know the MP-WFRFT operation with perfect parameters, and these Eves with same number of LUs can cooperate with each other. Therefore, the received symbol vectors of Eves are first operated by the inverse MP-WFRFT with the shared parameters ( α e , m e , c e ) , which yields
y E ( t ) = F α e ( m e , c e ) ( H E H ( t ) Dv ( t ) ) + F α e ( m e , c e ) ( n E ( t ) ) = H E H ( t ) D F α e ( m e , c e ) F α s ( m s , c s ) ( u ( t ) ) + F α e ( m e , c e ) ( n E ( t ) )
Here, we assume Eves know the MP-WFRFT operation with perfect parameters, which means
( α e , m e , c e ) = ( α s , m s , c s ) ,
Then the (35) can be further written as
y E ( t ) = H E H ( t ) D F α s ( m s , c s ) F α s ( m s , c s ) ( u ( t ) ) + F α s ( m s , c s ) ( n E ( t ) ) = H E H ( t ) Du ( t ) + n E ( t )
Specifically, the received signal of j t h Eve intercepting k t h LU’s information can be obtained by
y E j ( t ) = h E k H ( t ) D u k ( t ) + n E j ( t ) = h E k H ( t ) d k u k ( t ) Scrambled signal + h E k H ( t ) i = 1 , i k K d i u i ( t ) i Interference from others + n E j ( t ) AWAG
From (38), in the worst case, we can see that WFRFT operation cannot achieve encryption security. When the Eve’s location is the same as the LUs—i.e., h E j ( t ) = h L k ( t ) , h E k H ( t ) d k = 1 , h E k H ( t ) d i = 0 ( i k ) —the AN–DM scheme and WFRFT-aided DM scheme both fail. However, based on our proposed scheme, it is also difficult for Eves to wiretap confidential messages, as estimates of the index information of LUs also need to be correct. Moreover, even if one or some (but not all) of the Eves’ locations are same as one or some LUs’ locations, the confidential messages are still difficult to retrieve for Eves. Therefore, our proposed method achieves better anti-interception performance and thus improves transmission security.

5. Numerical Results and Analysis

In this section, we provide several numerical experiments to evaluate the performance of the proposed SM and MP-WFRFT aided RFDA-DM scheme and compare its performance with conventional DM schemes. If not otherwise stated, our main parameters in the numerical experiments are given as Table 3.

5.1. Proposed Scheme Focusing Performance Analysis

As discussed in Section 3, the focusing of FDA-DM depends on range-angle dimensions, whereas the focusing of PA-DM only depends on angle. Therefore, our proposed scheme is based on FDA, and in order to improve the focusing performance, we propose random frequency offset and design the beamforming matrix D ( t ) . Here, we give the spatial power distribution of confidential messages and the SINR spatial distribution to evaluate the focusing performance.
The first experiment measures the energy distribution of confidential messages without the aid of SM and MP-WFRFT modulation. In this experiment, the minimum required receiving power of all LUs are set as ς 1 = ς 2 = ς 3 = ς 4 = 90 dBm. In Figure 5, it can be seen that the received confidential energy of LUs is almost equal to −90 dBm. Moreover, in the other region, the energy of confidential decreases as the distance increases. That means our proposed scheme can achieve confidential message energy focusing and accurate control the received power of each LU only based on RFDA.
In the second experiment, we simulate and analyze SINR distribution in free space. Here, we consider the case with independent LUs. The proposed approach combined with MP-WFRFT modulation to realize secure wireless communication. MP-WFRFT realizes the embedding process of “AN” from the modulation level of digital baseband signal. From Figure 6, it is obvious that there are four sharp peaks corresponding to each LU due to FDA with the design of beamforming matrix D ( t ) and the perfect inverse MP-WFRFT operation on received symbol vectors. Otherwise, the SINR of users in other regions is low, due to the weak received signal that is rotated by MP-WFRFT. In general, we achieve satisfactory focusing performance of wireless communication system.

5.2. Secrecy Performance Analysis

In the next experiments, we analyze the secrecy performance of our proposed scheme and compare it with the conventional AN-DM schemes. In a practical case, the Eves would be located as close to LU as possible (even in the same locations as LUs) to eavesdrop messages. We consider that there are four Eves whose locations are closed to LUs, even same as the LUs, and they cooperate with each other. The locations of Eves are set as ( r e 1 , θ e 1 ) = ( 1600 m, 30 ) close to LU 1, ( r e 2 , θ l e 2 ) = ( 2000 m, 50 ) same to LU 2, and ( r e 3 , θ e 3 ) = ( 2500 m, 55 ) close to LU 3, ( r e 4 , θ e 4 ) = ( 3050 m, 35 ) close to LU 4. In order to show the effective reception of independent LU and verify the superiority of the SM with cooperative LUs, we first analyze BER performance of each LU (without cooperation) under different scenarios, and then simulate the SER performance of cooperative LUs.
Figure 7 illustrates the BER performance of LU and Eve versus the desired received power to noise ratio under different scenarios, where the baseband modulation modes of each LU is BPSK. From Figure 7a, we can observe that (1) our optimal method ensures the effective reception of LU 1; (2) the desired received power to noise ratio requested for the proposed scheme is less than the AN-DM schemes (approximately 1 dB when BER 10 2 ); (3) the BERs at Eve 1 are almost equal to 10 5 in Figure 7a, which means that an Eve close to a LU is difficult to receive meaningful message in proposed scheme and AN-DM schemes, respectively. LU 3 and LU 4 have a similar BER performance to LU 1. From Figure 7b, we can see that (1) LU 2 also has satisfactory BER performance; (2) even when the Eve’s location is the same as the location of LU 2, the Eve still cannot intercept the message transmitted to LU 2 with the proposed scheme, whereas the Eve successfully wiretaps the confidential message with AN-DM schemes; (3) in a worst case where MP-WFRFT parameters are perfectly leaked to Eves, our proposed scheme also cannot ensure secure transmission between transmitter station and LU 2.
Next, Figure 8 shows the SER performance of cooperative LUs versus the desired received power to noise ratio, where the number of active LU is L = 2 . From Figure 8, we can observe that (1) the SER of Eves is low with all of desired received power to noise ratio, which shows that Eves cannot retrieve the confidential messages without/with the leakage of WFRFT parameters based on the proposed scheme. When MP-WFRFT parameters are leaked to Eves, the SER of Eves is only little better than the case without leakage; (2) the desired received power to noise ratio is less than the AN-DM schemes.
In general, the proposed scheme can ensure the valid reception for each LU. Moreover, with the SM and MP-WFRFT technology based on cooperative LUs, the eavesdropping capability of Eves is degraded, and thus we can ensure wireless communication security even in the worst case, in which one or some (but not all) independent messages and MP-WFRFT parameters are leaked to Eves. Furthermore, the WFRFT technique overcomes the low-power-efficiency drawback of the conventional AN-DM schemes, and the SM technology improves the capacity of communication system due to the use of indices information.

5.3. Anti-Interception Performance Analysis

The anti-interception performance of our proposed scheme is depicted in Figure 9 and Figure 10, respectively. It is easy to see that the SER performance of the proposed scheme degrades a great deal along with some mismatched parameters. When the mismatch parameter Δ α is small, the secrecy performance is almost unaffected, but the secrecy performance of the system declines rapidly with the increase of the Δ α . When the mismatch parameter Δ α widens to 0.5 , the SER drops to about 0.5 , which means that users cannot obtain any meaningful information. From Figure 10, we can conclude that m k ( k = 1 , 2 , 3 , 4 ) have a similar but richer variation trend. Parameter n k ( k = 1 , 2 , 3 , 4 ) have similar performance to m 2 . Beside correctly estimating the LUs indices information, the eavesdroppers also need to meet the premise that nine parameters are completely consistent. Therefore, our proposed scheme has very good anti-interception performance even under the condition that the Eves know the signal transformation mode (SM modulation and WFRFT modulation).

6. Conclusions

In this paper, a security-enhanced and efficient multi-beam wireless communication scheme with cooperative LUs was proposed. In the proposed scheme, multiple important tools were utilized, including MP-WFRFT technology, SM modulation, and RFDA with the design of the beamforming matrix. With the help of MP-WFRFT, the scheme was found to be more power-efficient than conventional AN-DM schemes. Due to the SM technology, the proposed scheme was shown to have the ability to transmit information bits by the use of LUs number information apart from the modulation symbols. Finally, SINR distribution, BER performance and SER performance were simulated and analyzed, which verify the advantages of the proposed scheme.

Author Contributions

Investigation, J.G.; methodology, J.G. and B.Q.; simulation and analysis, J.G. and J.Z.; writing and editing, J.G. and J.W.; review, J.Z. and J.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Key Laboratory Foundation of Education Bureau of Shaanxi Province (Grant no. 14JS075), the National Natural Science Foundation of China (Grant no. 51874238) and the Innovation Foundation for Doctor Dissertation of Northwestern Polytechnical University (Grant no. CX202038).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Li, B.; Fei, Z.; Zhou, C.; Zhang, Y. Physical Layer Security in Space Information Networks: A Survey. IEEE Internet Things J. 2019, 10, 142–149. [Google Scholar] [CrossRef]
  2. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2015, 104, 1727–1765. [Google Scholar] [CrossRef] [Green Version]
  3. Stallings, W. Cryptography and network security (2nd ed.): Principles and practice. Int. J. Eng. Comput. Sci. 2012, 1, 121–136. [Google Scholar]
  4. Laurent, M. An Introduction to Cryptography; CRC Press, Inc.: Boca Raton, FL, USA, 2000. [Google Scholar]
  5. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Swindlehurst. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutorials 2014, 16, 1550–1573. [Google Scholar] [CrossRef] [Green Version]
  6. Kalantari, A.; Soltanalian, M. Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security. IEEE J. Sel. Top. Signal Process. 2016, 10, 1478–1493. [Google Scholar] [CrossRef]
  7. Xiong, J.; Nusenu, S.Y.; Wang, W.Q. Directional Modulation Using Frequency Diverse Array For Secure Communications. Wirel. Pers. Commun. 2017, 95, 2679–2689. [Google Scholar] [CrossRef]
  8. Shu, F.; Qin, Y.; Chen, R.; Xu, L.; Shen, T.; Wan, S.; Jin, S.; Wang, J.; You, X. Directional Modulation: A Secure Solution to 5G and Beyond Mobile Networks. arXiv 2018, arXiv:1803.09938. [Google Scholar]
  9. Hafez, M.; Yusuf, M.; Khattab, T.; Elfouly, T.; Arslan, H. Secure Spatial Multiple Access Using Directional Modulation. IEEE Trans. Wirel. Commun. 2018, 17, 563–573. [Google Scholar] [CrossRef]
  10. Daly, M.P.; Bernhard, J.T. Directional Modulation Technique for Phased Arrays. IEEE Trans. Antennas Propag. 2009, 57, 2640–2663. [Google Scholar] [CrossRef]
  11. Shu, F.; Wu, X.; Hu, J.; Li, J.; Chen, R.; Wang, J. Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array. IEEE J. Sel. Areas Commun. 2018, 36, 890–904. [Google Scholar] [CrossRef]
  12. Li, J.; Xu, L.; Lu, P.; Liu, T.; Zhuang, Z.; Hu, J.; Shu, F.; Wang, J. Performance analysis of directional modulation with finite-quantized RF phase shifters in analog beamforming structure. IEEE Access 2019, 7, 97457–97465. [Google Scholar] [CrossRef]
  13. Shen, T.; Zhang, S.; Chen, R.; Wang, J.; Hu, J.; Shu, F.; Wang, J. Two practical random-subcarrier-selection methods for secure precise wireless transmissions. IEEE Trans. Veh. Technol. 2019, 68, 9018–9028. [Google Scholar] [CrossRef]
  14. Qiu, B.; Tao, M.; Wang, L.; Xie, J.; Wang, Y. Multi-beam directional modulation synthesis scheme based on frequency diverse array. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2593–2606. [Google Scholar] [CrossRef]
  15. Nusenu, S.Y.; Basit, A. Frequency diverse array antennas: From their origin to their application in wireless communication systems. J. Comput. Netw. Commun. 2018, 18, 1–12. [Google Scholar] [CrossRef] [Green Version]
  16. Mai, C.; Lu, S.; Sun, J.; Wang, G. Beampattern Optimization for Frequency Diverse Array with Sparse Frequency Waveforms. IEEE Access 2017, 18, 1. [Google Scholar] [CrossRef]
  17. Lin, J.; Li, Q.; Yang, J.; Shao, H.; Wang, W.Q. Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach. IEEE Access 2018, 13, 671–684. [Google Scholar] [CrossRef]
  18. Gao, K.; Wang, W.Q.; Cai, J.; Xiong, J. Decoupled frequency diverse array range–angle-dependent beampattern synthesis using non-linearly increasing frequency offsets. IET Microw. Antennas Propag. 2016, 10, 880–884. [Google Scholar] [CrossRef]
  19. Khan, W.; Qureshi, I.M.; Saeed, S. Frequency diverse array radar with logarithmically increasing frequency offset. IEEE Antennas Wirel. Propag. Lett. 2014, 14, 499–502. [Google Scholar] [CrossRef]
  20. Mahmood, M.; Mir, H. Frequency diverse array beamforming using nonuniform logarithmic frequency increments. IEEE Antennas Wirel. Propag. Lett. 2014, 17, 1817–1821. [Google Scholar] [CrossRef]
  21. Liu, Y.; Ruan, H.; Wang, L.; Nehorai, A. The random frequency diverse array: A new antenna structure for uncoupled direction-range indication in active sensing. IEEE J. Sel. Top. Signal Process. 2016, 11, 295–308. [Google Scholar] [CrossRef]
  22. Hu, J.; Yan, S.; Shu, F.; Wang, J.; Li, J.; Zhang, Y. Artificial-noise-aided secure transmission with directional modulation based on random frequency diverse arrays. IEEE Access 2017, 5, 1658–1667. [Google Scholar] [CrossRef]
  23. Shu, F.; Xu, L.; Wang, J.; Zhu, W.; Xiaobo, Z. Artificial-noise-aided secure multicast precoding for directional modulation systems. IEEE Trans. Veh. Technol. 2018, 67, 6658–6662. [Google Scholar] [CrossRef]
  24. Xie, T.; Zhu, J.; Li, Y. Artificial-noise-aided zero-forcing synthesis approach for secure multi-beam directional modulation. IEEE Commun. Lett. 2017, 22, 276–279. [Google Scholar] [CrossRef]
  25. Qiu, B.; Xie, J.; Wang, L.; Wang, Y. Artificial-Noise-Aided Secure Transmission for Proximal Legitimate User and Eavesdropper Based on Frequency Diverse Arrays. IEEE Access 2018, 6, 52531–52543. [Google Scholar] [CrossRef]
  26. Zhou, F.; Li, Z.; Cheng, J.; Li, Q.; Si, J. Robust AN-aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT. IEEE Trans. Wirel. Commun. 2017, 16, 2450–2464. [Google Scholar] [CrossRef] [Green Version]
  27. Mei, L.; Sha, X.; Ran, Q.; Zhang, N. Research on the application of 4-weighted fractional Fourier transform in communication system. Sci. China Inf. Sci. 2010, 6, 1251–1260. [Google Scholar] [CrossRef]
  28. Fang, X.; Sha, X.; Mei, L. Guaranteeing wireless communication secrecy via a WFRFT-based cooperative system. China Commun. 2015, 12, 76–82. [Google Scholar] [CrossRef]
  29. Luo, Z.; Wang, H.; Zhou, K.; Lv, W. Combined Constellation Rotation with Weighted FRFT for Secure Transmission in Polarization Modulation Based Dual-polarized Satellite Communications. IEEE Access 2017, 5, 27061–27073. [Google Scholar] [CrossRef]
  30. Xiaojie, F.; Xuejun, S.; Yong, L. Secret Communication Using Parallel Combinatory Spreading WFRFT. IEEE Commun. Lett. 2015, 19, 62–65. [Google Scholar] [CrossRef]
  31. Fang, X.; Zhang, N.; Sha, X.; Chen, D.; Wu, X.; Shen, X. Physical layer security: A WFRFT-basec cooperation approach. In Proceedings of the IEEE International Conference on Communications, Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  32. Cheng, Q.; Fusco, V.; Zhu, J.; Wang, S.; Wang, F. WFRFT-aided power-efficient multi-beam directional modulation schemes based on frequency diverse array. IEEE Trans. Wirel. Commun. 2019, 18, 5211–5226. [Google Scholar] [CrossRef] [Green Version]
  33. Liang, Y.; Da, X.; Xu, R.; Ni, L.; Zhai, D.; Pan, Y. Research on Constellation-Splitting Criterion in Multiple Parameters WFRFT Modulations. IEEE Access 2018, 6, 34354–34364. [Google Scholar] [CrossRef]
  34. Cheng, Q.; Zhu, J.; Luo, J. Secure Spatial Modulation Based on Dynamic Multi-Parameter WFRFT. Trans. Commun. 2018, 11, 2304–2312. [Google Scholar] [CrossRef]
  35. Jeganathan, J.; Ghrayeb, A.; Szczecinski, L. Spatial modulation: Optimal detection and performance analysis. IEEE Commun. Lett. 2012, 11, 166–168. [Google Scholar] [CrossRef]
  36. Lee, J.; Lee, J.Y.; Lee, Y.H. Spatial Multiplexing of OFDM Signals With QPSK Modulation Over ESPAR. IEEE Trans. Veh. Technol. 2017, 66, 4914–4923. [Google Scholar] [CrossRef]
  37. Basar, E.; Wen, M.; Mesleh, R.; Di Renzo, M.; Xiao, Y.; Haas, H. Index Modulation Techniques for Next-Generation Wireless Networks. IEEE Access 2017, 3, 16693–16746. [Google Scholar] [CrossRef]
  38. Legnain, R.M.; Hafez, R.H.; Legnain, A.M. Improved Spatial Modulation for High Spectral Efficiency. Int. J. Distrib. Parallel Syst. 2012, 3, 693–746. [Google Scholar] [CrossRef]
Figure 1. The implementation of the MP-WFRFT.
Figure 1. The implementation of the MP-WFRFT.
Sensors 20 05289 g001
Figure 2. System model.
Figure 2. System model.
Sensors 20 05289 g002
Figure 3. The architecture of the transmit station.
Figure 3. The architecture of the transmit station.
Sensors 20 05289 g003
Figure 4. The receiving structure with cooperative legitimate users (LUs).
Figure 4. The receiving structure with cooperative legitimate users (LUs).
Sensors 20 05289 g004
Figure 5. The spatial power distribution of confidential messages in range dimension.
Figure 5. The spatial power distribution of confidential messages in range dimension.
Sensors 20 05289 g005
Figure 6. The signal to interference-plus-noise ratio (SINR) spatial distribution versus (a) angle-range, (b) angle dimension, and (c) range dimension.
Figure 6. The signal to interference-plus-noise ratio (SINR) spatial distribution versus (a) angle-range, (b) angle dimension, and (c) range dimension.
Sensors 20 05289 g006
Figure 7. The bit error rate (BER) performance with independent LU versus the desired received power to noise ratio: (a) LU 1 and (b) LU 2.
Figure 7. The bit error rate (BER) performance with independent LU versus the desired received power to noise ratio: (a) LU 1 and (b) LU 2.
Sensors 20 05289 g007
Figure 8. The SER performance of cooperative LUs versus the desired received power to noise ratio.
Figure 8. The SER performance of cooperative LUs versus the desired received power to noise ratio.
Sensors 20 05289 g008
Figure 9. The anti-performance for proposed scheme on parameter α , where ( m , c ) = ( [ 0 , 0 , 0 , 0 ] , [ 0 , 0 , 0 , 0 ] ) .
Figure 9. The anti-performance for proposed scheme on parameter α , where ( m , c ) = ( [ 0 , 0 , 0 , 0 ] , [ 0 , 0 , 0 , 0 ] ) .
Sensors 20 05289 g009
Figure 10. The anti-performance for proposed scheme on parameter m (a) ( α , m , c ) = ( 0.5 , [ m 0 , 0 , 0 , 0 ] , [ 0 , 0 , 0 , 0 ] ) , (b) ( α , m , c ) = ( 0.5 , [ 0 , m 1 , 0 , 0 ] , [ 0 , 0 , 0 , 0 ] ) , (c) ( α , m , c ) = ( 0.5 , [ 0 , 0 , m 2 , 0 ] , [ 0 , 0 , 0 , 0 ] ) , (d) ( α , m , c ) = ( 0.5 , [ 0 , 0 , 0 , m 3 ] , [ 0 , 0 , 0 , 0 ] ) .
Figure 10. The anti-performance for proposed scheme on parameter m (a) ( α , m , c ) = ( 0.5 , [ m 0 , 0 , 0 , 0 ] , [ 0 , 0 , 0 , 0 ] ) , (b) ( α , m , c ) = ( 0.5 , [ 0 , m 1 , 0 , 0 ] , [ 0 , 0 , 0 , 0 ] ) , (c) ( α , m , c ) = ( 0.5 , [ 0 , 0 , m 2 , 0 ] , [ 0 , 0 , 0 , 0 ] ) , (d) ( α , m , c ) = ( 0.5 , [ 0 , 0 , 0 , m 3 ] , [ 0 , 0 , 0 , 0 ] ) .
Sensors 20 05289 g010
Table 1. SM map.
Table 1. SM map.
Bits BlockLUs Numbers u ( t ) Bits BlockLUs Numbers u ( t )
000001,2,3 [ 1 , 1 , 1 , 0 ] 100001,3,4 [ 1 , 0 , 1 , 1 ]
000011,2,3 [ 1 , 1 , + 1 , 0 ] 100011,3,4 [ 1 , 0 , + 1 , 1 ]
000101,2,3 [ 1 , + 1 , 1 , 0 ] 100101,3,4 [ 1 , 0 , 1 , + 1 ]
000111,2,3 [ + 1 , 1 , 1 , 0 ] 100111,3,4 [ + 1 , 0 , 1 , 1 ]
001001,2,3 [ 1 , + 1 , + 1 , 0 ] 101001,3,4 [ 1 , 0 , + 1 , + 1 ]
001011,2,3 [ + 1 , 1 , + 1 , 0 ] 101011,3,4 [ + 1 , 0 , + 1 , 1 ]
001101,2,3 [ + 1 , + 1 , 1 , 0 ] 101101,3,4 [ + 1 , 0 , 1 , + 1 ]
001111,2,3 [ + 1 , + 1 , + 1 , 0 ] 101111,3,4 [ + 1 , 0 , + 1 , + 1 ]
010001,2,4 [ 1 , 1 , 0 , 1 ] 110002,3,4 [ 0 , 1 , 1 , 1 ]
010011,2,4 [ 1 , 1 , 0 , + 1 ] 110012,3,4 [ 0 , 1 , 1 , + 1 ]
010101,2,4 [ 1 , + 1 , 0 , 1 ] 110102,3,4 [ 0 , 1 , + 1 , 1 ]
010111,2,4 [ + 1 , 1 , 0 , 1 ] 110112,3,4 [ 0 , + 1 , 1 , 1 ]
011001,2,4 [ 1 , + 1 , 0 , + 1 ] 111002,3,4 [ 0 , 1 , + 1 , + 1 ]
011011,2,4 [ + 1 , 1 , 0 , + 1 ] 111012,3,4 [ 0 , + 1 , 1 , + 1 ]
011101,2,4 [ + 1 , + 1 , 0 , 1 ] 111102,3,4 [ 0 , + 1 , + 1 , 1 ]
011111,2,4 [ + 1 , + 1 , 0 , + 1 ] 111112,3,4 [ 0 , + 1 , + 1 , + 1 ]
Table 2. Comparisons for different schemes.
Table 2. Comparisons for different schemes.
ITEMPA-DMAN-DMWFRFT-DMPROPOSED-DM
PENONOYESYES
NSNONOYESYES
CRNONONOYES
RANOYESYESYES
SELOWLOWLOWHIGH
Table 3. Simulation parameters.
Table 3. Simulation parameters.
ParameterValue
Carrier frequency f c 1 GHz
Number of FDA elements N32
Inter-element spacing d c / 2 f c
Number of LUs K4
Number of Eves J4
Receive noise power, 10 log ( σ 2 ) −100 dBm
Location of LU1, ( r l 1 , θ l 1 ) ( 1500 m , 30 )
Location of LU2, ( r l 2 , θ l 2 ) ( 2000 m , 50 )
Location of LU3, ( r l 3 , θ l 3 ) ( 2500 m , 50 )
Location of LU4, ( r l 4 , θ l 4 ) ( 3000 m , 30 )
MP-WFRFT parameters ( α , m , c ) ( 0.5 , [ 1 , 2 , 3 , 4 ] , [ 5 , 6 , 7 , 8 ] )

Share and Cite

MDPI and ACS Style

Gao, J.; Qiu, B.; Zhou, J. Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based On Random Frequency Diverse Array. Sensors 2020, 20, 5289. https://doi.org/10.3390/s20185289

AMA Style

Gao J, Qiu B, Zhou J. Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based On Random Frequency Diverse Array. Sensors. 2020; 20(18):5289. https://doi.org/10.3390/s20185289

Chicago/Turabian Style

Gao, Jianbang, Bin Qiu, and Jing Zhou. 2020. "Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based On Random Frequency Diverse Array" Sensors 20, no. 18: 5289. https://doi.org/10.3390/s20185289

APA Style

Gao, J., Qiu, B., & Zhou, J. (2020). Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based On Random Frequency Diverse Array. Sensors, 20(18), 5289. https://doi.org/10.3390/s20185289

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop