Next Article in Journal
A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds
Previous Article in Journal
Advances in Biosensors Technology for Detection and Characterization of Extracellular Vesicles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission

1
Institute of Electronic Engineering, China Academy of Engineering Physics, Mianyang 621999, China
2
Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu 611731, China
3
Guangdong Communications and Networks Institute, Guangzhou 510289, China
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(22), 7646; https://doi.org/10.3390/s21227646
Submission received: 30 September 2021 / Revised: 6 November 2021 / Accepted: 9 November 2021 / Published: 17 November 2021
(This article belongs to the Section Communications)

Abstract

:
Recently, the concept of spatial and direction modulation (SDM) has been developed to reap the advantages of both spatial modulation (SM) and directional modulation (DM). On the one hand, DM ensures the transmission security at the expected direction. On the other hand, the structure of SM-aided distributed receivers can enhance the security even if the eavesdropper is located in the same direction as the legitimate receiver. However, the above advantages are achieved based on the assumption that the eavesdropper is not equipped with distributed receivers. On the other hand, the information security can no longer be guaranteed when the eavesdropper is also equipped with distributed receivers. To alleviate this problem, we considered a joint design of SDM and covert information mapping (CIM) in order to conceive of a more robust structure of CIM-SDM. Furthermore, both the detection performances at the eavesdropper and the legitimate user were quantified through theoretical derivation. In general, both the analysis and simulation results supported that the proposed CIM-SDM structure provides more robust secure performance compared to the original SDM, even if the extreme condition of distributed receivers at the eavesdropper is considered, at the cost of moderate performance loss at the legitimate user.

1. Introduction

Due to the increase in wireless communications, the pursuit of an extremely high transmission rate [1,2] massive access capability [3], and ultra-low-latency communications (URLLC) [4] has been realized gradually with the development of the Fifth-Generation (5G) and beyond networks. Meanwhile, considering the open transmission environment of wireless communications, especially in device-to-device (D2D) networks, and so on [5], the desire for physical layer security [6] has attracted much attention, in order to protect the communications between the legitimate transmitter and receiver, while preventing an unintended receiver from eavesdropping. The design toward physical layer security includes the reconstruction of the wireless waveform [7], information mapping styles [8], and artificial noise injection [9].
Directional modulation (DM) [10,11,12], as an efficient way to disturb the wireless waveform in the unexpected directions, has attracted much attention to provide the physical security between the transmitter (Alice) and the legitimate receiver (Bob) while degrading the quality of signal detection at the eavesdropper (Eve). Specifically, the idea of directional modulation has been widely considered to adopt multicarrier transmission [13], polarized antennas [14], and the antenna array design [15,16,17,18], aiming at enhancing the information security for the current wireless systems by preventing Eve from eavesdropping. However, the above-mentioned security advantage will no longer exist when Eve takes the opportunity to share the same receive direction as Bob. In this case, the original performance gap between Eve and Bob will shrink due to the loss of protection of the waveform from Alice.
To address this issue, an integration with spatial modulation (SM) [19,20,21,22] has been introduced toward the so-called spatial and directional modulation (SDM) [23] system, in order to prevent eavesdropping. On the one hand, the unique way of information modulation for SM with index modulation [24], utilizing the index of the activated antenna, is combined with DM. On the other hand, distributed receivers are employed at Bob [25], so as to utilize the index of the real activated receiver to deliver information. The SDM system can ensure secure information transmission, on the assumption that Eve does not have distributed receivers. However, in many practical situations, Eve tends to increase the hardware cost in order to enhance the detection quality. In this case, if Eve also adopts distributed receivers and each approaches Bob’s subreceivers, the information security will no longer be upheld.
Recently, the idea of secret modulation has also been considered as an efficient way to protect legitimate information even if the waveform is detected. Specifically, the combination of secret modulation and media-based modulation (MBM) was considered in [26]. The extension to modulation with legitimate channels was explored in [27]. The combination of the channel state information at the transmitter toward secure modulation was considered in [28]. Specifically, a class of novel security transmission techniques is covert information mapping (CIM) [1], toward enhancing the information security even if Eve has received the identical waveform as Bob. The initial idea of CIM was to embed the covert information into the spatial modulation waveform, so as to prevent Eve from demodulating this covert information from a disguised waveform that shares the identical statistics as the original SM waveform. The idea of CIM can be easily extended to current modulation schemes such as OFDM-IM [29] and multiple domain IM [30]. However, to the best of the authors’ knowledge, the combination of CIM and SDM to reap their advantages in a secure waveform and information mapping has not been proposed in the current literature.
Against this background, in this paper, we aim at combing the concept of CIM and SDM, in order to prevent Eve from eavesdropping and hence to provide physical transmission security from the aspects of both waveform design and information modulation. The technique’s contributions can be summarized as follows. Firstly, the basic structure of CIM-SDM is studied with modeling, by combining CIM and SDM in the context of distributed receivers. Furthermore, the detection performances at Bob and Eve are both quantified through theoretical analysis, in order to demonstrate the advantages of the developed CIM-SDM system in terms of secure information transmission. Lastly, the simulation results are exhibited on different parameters, to support the theoretical results and prove that CIM-SDM can effectively avert Eve even if Eve is equipped with the identical distributed resources as Bob, so as to provide enhanced information security.
The remainder of this paper is organized as follows. In Section 2, the system model of the original SDM is analyzed, while the structure of the proposed CIM-SDM system is described in more detail. In Section 3, we derive the average bit error probability (ABEP) upper bound for Bob and Eve and analyze their characteristics, while in Section 4, the simulation results are outlined to demonstrate the advantages of the proposed system. Finally, our conclusions are offered in Section 5.
Notation: In this paper, · H represents the conjugate transpose of a matrix, and · represents the Frobenius norm. Moreover, R · and C N indicate the real operators and circularly symmetric complex Gaussian distribution, respectively.

2. Convert Information Mapping for SDM

As shown in Figure 1, we considered a directional modulation system where the transmitter, Alice, is equipped with N t antennas and the legitimate user, Bob, is equipped with N r cooperative single-antenna receivers, which connect to each other through optical fibers. We assumed that Alice is capable of obtaining the directions of Bob’s receivers, while the unintended receiver with N e antennas, as Eve, conceals its eavesdropping on the transmit signals. In this section, we first introduce the traditional SDM scheme, and then, the proposed CIM-SDM scheme and its detection algorithm are detailed.

2.1. Traditional SDM System Model

For the sake of improving the transmission rate, spatial modulation was introduced to DM by utilizing the index of the receiver to convey additional information [23]. In order to introduce the model more intuitively, we use math equations to describe the principle of the traditional SDM system. More specifically, in SDM, the input bitstreams are partitioned into blocks of k 1 + k 2 bits, where the first k 1 = log 2 N r bits are mapped into the index of the activated receiver and the remaining k 2 = log 2 M bits are mapped into the conventional M-ary amplitude-phase modulation (APM) symbol. Consequently, the SDM symbol s i j can be expressed as:
s i j = e i b j ,
where e i represents the i-th column vectors selected from the identify matrix I N r × N r and i denotes the activated receiver index. Furthermore, b j , j = 1 , 2 , , M represents the selected M-ary APM symbol transmitted toward the activated receiver. Then, a precoding matrix P = p 1 , p 2 , , p N r is designed to ensure that only the i-th legitimate receiver is activated without power leakage to the remaining receivers, and hence, the transmitted signal vector x is given by:
x = Ps i j ,
where the i-th column vector p i of the precoding matrix P can be formulated as:
p i = h θ i / N t ,
and h θ i denotes the channel vector between the i-th receiver of Bob and Alice. To be more explicit, in this paper, we considered that Alice sets an array geometric center and equips a uniform linear array to generate the directional beam to Bob, and hence, the free space channel vector h θ i can be detailed as:
h θ i = e j Φ 0 ( θ i ) , e j Φ 1 ( θ i ) , , e j Φ u ( θ i ) , , e j Φ N t 1 ( θ i ) H ,
with:
Φ u ( θ i ) = j 2 π N t 1 / 2 u d cos θ i / λ ,
where λ is the signal wavelength and d λ / 2 represents the antenna spacing.
As a result, the receive signal vector at Bob can be expressed as:
y B = H Θ B x + n B = H Θ B Ps i j + n B ,
with:
H Θ B = [ h θ 1 , h θ 2 , , h θ N r ] H ,
where H Θ B denotes the channel matrix and Θ B = θ 1 , θ 2 , , θ N r represents the direction of Bob. Moreover, n B represents additive Gaussian white noise (AWGN) obeying C N 0 , σ n 2 I N r × N r . As for Eve, the receive signal can be formulated as:
y E = H Θ E x + n E = H Θ E Ps i j + n E ,
where Θ E = θ 1 , θ 2 , , θ N e represents the direction of Eve and H Θ E is the channel matrix of Eve. Furthermore, n E also represents the AWGN obeying C N 0 , σ E 2 I N e × N e . According to (6) and (8), if Eve also has the same number of distributed receivers with similar directions to Bob, Eve may successfully eavesdrop on the signal transmitted from Alice to Bob after carefully observing the activated situation of the receivers. Hence, the security of the transmit signal may be compromised.

2.2. Proposed CIM-SDM Scheme

In order to improve the security of the information from the transmitter to the legitimate receiver and further suppress the performance of the unintended receivers, we propose the covert information mapping for spatial and directional modulation (CIM-SDM) scheme, where a special bits-to-symbol mapping regime is carefully designed to conceal spatial index information. It is worth noting that the special bits-to-symbol mapping regime is known to both the transmitter and legitimate user, while Eve hardly notices, which improves the transmission security. The details of the proposed scheme are proposed as follows.
At the transmitter, unlike traditional SDM, the activated receiver index is carefully conceived to hide the real index information, while Eve still deems it to be a conventional spatially modulated antenna index. To elaborate a little further, from the bitstreams’ perspective, a block of k 1 + k 2 + k 3 bits is divided into three parts. First, the indexes of Bob’s distributed receivers are partitioned into two groups, namely I 1 and I 2 , with I 1 = 1 , 2 , , N r 2 and I 2 = N r 2 + 1 , N r 2 + 2 , , N r . Then, the first k 1 bits are utilized to select the receiver group. For example, if k 1 = [ 1 ] , the receiver group index at the k-th data block retains the same one as the previous. Otherwise, the receiver group index will be different. According to this special mapping rule, let us assume that the selected receiver group at the ( k 1 ) -th data block is I 1 , i.e., I g k 1 = I 1 , and then the receiver group at the k-th data block can be obtained as:
I g k = I 1 , if k 1 = [ 1 ] and I g k 1 = I 1 I 2 , if k 1 = [ 0 ] and I g k 1 = I 1 .
Similarly, for the case of I g k 1 = I 2 , I g k can be obtained as:
I g k = I 2 , if k 1 = [ 1 ] and I g k 1 = I 2 I 1 , if k 1 = [ 0 ] and I g k 1 = I 2 .
On the basis of determining the receiver group, the following k 2 = log 2 ( N r 2 ) bits are then applied to choose one receiver index out of the receiver group I g k as I g k ( d ) . Hence, in CIM-SDM, the index of the activated receiver is different from the index i generated by traditional spatial modulation, and the real index information intelligently hides in the switching of the receiving antenna group. This implies that Eve cannot correctly demodulate the transmitter information, since Eve is unaware of the disguised message regime.
Ultimately, the last k 3 = log 2 M bits are mapped into the conventional APM symbol b j . The CIM-SDM symbol can be expressed as:
s I g k ( d ) j = e I g k ( d ) b j ,
and the transmitted signal vector is analogous to (2), which can be detailed as:
x k = Ps I g k ( d ) j .
Then, x k is transmitted to Bob by the directional beam, which is similar to SDM. It is worth noting that CIM-SDM adopts the transmitter architecture of SDM and still utilizes the receiver index to convey additional bit information. However, the modulation from the bit to receiver index is different from the traditional SDM. Hence, the security of the transmission can be improved.
Here, we give a simple example to elaborate on our proposed scheme. First, we assumed that Alice is equipped with four antennas and quadrature phase shift keying (QPSK) modulation, while Bob has four distributed single-antenna receivers. Furthermore, let us denote the receiver group index at the ( k 1 ) -th data block by I g k 1 = I 1 , and a 4 bit sequence b k = [ 0 , 0 , 1 , 1 ] T is considered at the k-th data block. On the basis of (9) and k 1 = [ 0 ] , I g k will be different from the previous one, i.e., I g k = I 2 . Next, based on the second bit k 2 = [ 0 ] , the activated receiver index I g k ( d ) = 3 is selected from I 2 for directional modulation. The remaining bits k 3 = [ 1 , 1 ] are mapped into the QPSK symbol b 4 = 1 + i . Finally, the transmission signal vector can be expressed as x k = Ps I g k ( k ) j = Ps 3 4 = P e 3 b 4 .
Moreover, we considered the basis situation in which Bob has two distributed single-antenna receivers. In order to explain the differences between CIM-SDM and SDM more clearly, we first introduce the activation rule of SDM, as shown in Figure 2. At each slot, SDM independently determines the activated receiver based on the input bits k 1 . More specifically, we assumed that k 1 = [ 0 ] and k 1 = [ 1 ] represent the activation of the first and the second receiver, respectively, in the context of SDM.
However, in CIM-SDM, the activated receiver selection is jointly determined by the previous slot i 1 and the present slot i, as shown in Figure 3. For example, we assumed that the initial activated receiver at Slot 1 is the first one. Then, different from the traditional SDM, if k 1 = [ 1 ] , the activated receiver at Slot 2 remains the same as Slot 1, i.e., the activated receiver is the first one. Otherwise, the activated receiver switches into the second one. Based on this special mapping rule, the CIM-SDM scheme successfully disguises itself as a traditional SDM, but having reversed bit information compared to that of SDM. Therefore, Eve with a similar direction decodes the received information incorrectly, which improves the transmission security.

2.3. Detection Algorithm for the Proposed Scheme

Similarly, the receive signal vector of Bob at the k-th data block can be formulated as:
y B k = H Θ B x k + n B = H Θ B Ps I g k ( d ) j + n B .
For the sake of simplicity, we used the symbol i c to replace the symbol I g k ( d ) . On the basis of (13), the optimal detector for Bob jointly considers the activated receiver index i c and the modulated symbol b j , yielding:
i ^ c , b j ^ = arg min i ^ c I , b j ^ B y B k H Θ B Ps i ^ c j ^ 2 ,
where I = 1 , 2 , , N r represents the set of the indices of Bob’s receiver and B denotes the constellation of M-ary QAM symbols.
After confirming the activated receiver index i ^ c , we determined the receiver group set as:
g ^ k = 1 , if i ^ c N r 2 2 , if i ^ c > N r 2 .
Combined with the ( k 1 ) -th receiver group set g ^ k 1 , the bit for receiver group selection can be obtained in comparison to g ^ k 1 , which can be detailed as follows,
k 1 = 1 , g ^ k = g ^ k 1 0 , g ^ k g ^ k 1 .
Moreover, the activated receiver index out of I g ^ k can be given by:
d ^ = MO D N r / 2 i ^ c 1 + 1 ,
where MO D a b returns the remainder after division of b by a. Finally, d ^ is capable of being demapped into the receiver index bits. Figure 4 depicts a flowchart of the aforementioned detection algorithm.
As for Eve, the receive signal vector of Eve at the k-th data block can be expressed as:
y E k = H Θ E x k + n E = H Θ E Ps I g k ( d ) j + n E ;
however, it is difficult to recognize whether a covert transmission has occurred even if the channel state information and beamforming matrix can be obtained. More specifically, under the assumption that Eve successfully eavesdrops on the transmitted signal, the optimal ML detection for the transmitted signal in the context of Eve can be given by:
i ^ c , b j ^ = arg min i ^ c I , b j ^ B y E k H Θ E Ps i ^ c j ^ 2 .
However, since Eve is unaware of the covert information mapping scheme, i ^ c and b j ^ are then directly demapped from the bits, which leads to an undesirable decoding performance.
Owing to its peculiar bits-to-symbol mapping regime, the proposed CIM-SDM scheme is able to conceal the real bit information to preclude Eve from decoding it without a transmission rate decrease, which leads to a promising secure transmission technique.

3. Performance Analysis

In this section, the average bit error probability (ABEP) union bound of Bob and Eve is analyzed and derived when communicating over free space channels under the hypothesis of an optimal joint detector being invoked. These derivations are based on the union bound technique described in [31].

3.1. Bob’s Average Bit Error Probability

More specifically, at Bob, let the set of all possible CIM-SDM symbols be denoted by S and the ABEP of the proposed CIM-SDM scheme at k-th data block be upper bounded by:
P B k 1 R p 2 R p s i c j S s m c n S s i c j d s i c j s m c n P s i c j s m c n ,
where R p denotes the transmission rate of the proposed scheme, i.e., R p = log 2 N r + log 2 M ( b p c u ) , which is the same as in the traditional SDM. Moreover, d s i c j s m c n represents the Hamming distance between the equivalent bit representations of s i c j and s m c n , and P s i c j s m c n denotes the pairwise error probability (PEP).
In particular, the PEP in (20) can be formulated as:
P s i c j s m c n = P y B k H Λ s i c j > y B k H Λ s m c n = P H Λ s i c j + n B H Λ s i c j > H Λ s i c j + n B H Λ s m c n = P 0 > H Λ s i c j H Λ s m c n 2 + 2 R ( H Λ s i c j H Λ s m c n ) H n B = P ( R ( H Λ s i c j H Λ s m c n ) H n B > H Λ s i c j H Λ s m c n 2 / 2 ) .
where we define H Λ = H Θ B P .
Since n B represents the AWGN vector obeying C N 0 , σ n 2 I N r × N r , we can derive that R ( H Λ s i c j H Λ s m c n ) H n B is a Gaussian random variable obeying C N 0 , 1 2 σ n 2 H Λ s i c j s m c n 2 . Therefore, the PEP P s i c j s m c n can be further given by:
P s i c j s m c n = Q H Λ s i c j s m c n 2 2 σ n 2 .
Finally, by substituting (22) into (20), we obtain the upper bound of Bob’s ABEP at the k-th data block. However, we introduced the covert information mapping regime, and the bit demapping is associated with the previous data block, i.e., the ( k 1 ) -th data block. Based on this regime, the ABEP of the proposed CIM-SDM scheme entails jointly considering the previous and the present data blocks.
More specifically, the covert information regime has no influence on the PEP and the Hamming distance between s i c j and s m c n , but affects the mapping from the embedded bits to the original bits. For example, if the receiver group at the ( k 1 ) -th data block is misjudged, the original bit information at the k-th data block may not be obtained correctly, according to (16). Hence, the average error probability of the bit for receiver group selection can be approximated by:
P r = P B k 1 × 1 P B k + 1 P B k 1 × P B k ,
which implies that the misjudgment of the receiver group at the ( k 1 ) -th or k-th data block results in the misjudgment of the original bit, even though the remaining data block is correctly demodulated. Using P B k 1 = P B k , Equation (23) can be further simplified as:
P r = 2 P B k 1 P B k .
Then, since the bit error probability associated with receiver group selection has been jointly considered, the ABEP of the ( k 1 ) -th and k-th data blocks also entails being jointly calculated, which can be updated as:
P ¯ B = 1 log 2 N r M × P r + ( log 2 N r M 1 ) log 2 N r M × P B k = ( log 2 N r M + 1 2 P B k ) log 2 N r M P B k .
If P B k is far less than l o g 2 N r M + 1 , Equation (25) can be further approximated by:
P ¯ B ( 1 + 1 log 2 N r M ) P B k .
Finally, we obtain the ABEP P ¯ B of Bob.

3.2. Eve’s Average Bit Error Probability

Based on the optimal joint detector, at Eve, the ABEP of the proposed CIM-SDM scheme at the k-th data block can be upper bounded by:
P E k 1 R p 2 R p s i c j S s m c n S s i c j d s i c j s m c n P H Θ E s i c j s m c n ,
where P H Θ E s i c j s m c n represents the PEP of Eve for a given channel matrix of Even H Θ E . Specifically, the PEP is given by:
P H Θ E s i c j s m c n = P y E k Gs i c j > y E k Gs m c n = P Gs i c j + n E Gs i c j > Gs i c j + n E Gs m c n = P ( R ( Gs i c j Gs m c n ) H n B > Gs i c j Gs m c n 2 / 2 ) ,
where G = H Θ E P . Moreover, R ( Gs i c j Gs m c n ) H n B is a Gaussian random variable obeying C N 0 , 1 2 σ E 2 G s i c j s m c n 2 . Hence, the PEP can be rewritten as:
P H Θ E s i c j s m c n = Q G s i c j s m c n 2 2 σ E 2 .
By substituting (29) into (27), the ABEP of the CIM-SDM scheme at the k-th data block can be obtained. However, since Eve is unaware of the covert information regime, the correct receiver group information and its corresponding original bit information cannot be obtained. Hence, the average error probability of the bit for receiver group selection can be approximated by P r = 0.5 .
Similarly, the ABEP of the ( k 1 ) -th and k-th data block can be formulated as:
P ¯ r = 1 log 2 N e M × P r + ( log 2 N e M 1 ) log 2 N e M × P r k = 0.5 + ( log 2 N e M 1 ) P r k log 2 N e M .
Ultimately, the ABEP P ¯ r of Eve is obtained.

4. Performance Evaluation

4.1. The Implementation of the Simulation Model

Based on our proposed CIM-SDM scheme, we first set up the transceiver architecture, as shown in Figure 5. Such an architecture facilitates the implementation of the scheme on a given platform. Then, the proposed CIM-SDM scheme was implemented in MATLAB.
More specifically, we first generated bitstreams. Next, the bitstreams were divided into several parts and mapped into the constellation symbols and activated receiver index. This process simulated the transmitter in real communication scenarios. Then, we generated a channel matrix based on the free space channel model, as we mentioned in Section 2.1, to simulate the channel environment in real communication scenarios. The noise was also considered in our simulated model. Moreover, we conceived of a receiver to detect the signal on the basis of the algorithm proposed in Section 2.3. Finally, the performance of the proposed scheme was evaluated by means of the bit error rate (BER), which can be calculated by comparing the output bits with the input bits.

4.2. Simulation Results

In this subsection, we provide the simulation results to characterize the CIM-SDM scheme considered, to illustrate its improved transmission security compared with the traditional SDM. More specifically, we illustrate the system performance against the BER, constellation error rate, and receiver index error rate, under the assumption that Eve has the same number of distributed receivers with similar directions as Bob. Moreover, we assumed that the antenna spacing d is λ / 4 , while other system parameters were as summarized in Table 1.
Figure 6 compares Bob’s and Eve’s theoretical and simulated BER performance for the proposed CIM-SDM scheme in the context of N r = N e = 2 . If the theoretical curves provide a good approximation to the simulated ones, we can validate the effectiveness of the theoretical analysis and use the theoretical analysis to evaluate the system performance in future work. By comparing the curves in Figure 6, we made the following observations. First, in CIM-SDM, the theoretical curves of Bob and Eve form a tight upper bound of the simulated curves at a high signal-to-noise ratio (SNR). Meanwhile, the theoretical curves of Bob and Eve are reachable as the SNR increases. Similar trends are also valid for Figure 7, where N r = N e = 4 , which further validates the effectiveness of the theoretical analysis of (26) and (30).
However, the theory and simulation results differed at a low SNR, as shown in Figure 6 and Figure 7. The reason for this trend is that the union bound theory in [28] has some limitations, since the roles played by the spatial and signal constellation diagrams (and the related bit mapping) are hidden in the four-fold summation. Hence, at a high SNR, the theoretical curve provides a tight upper bound. However, at a low SNR, due to the severe influence of noise and the limitation of the analysis method, the theoretical curve slightly deviates from the corresponding simulation results. However, the theoretical curve is still the upper bound for the simulation result.
Having validated our theoretical analysis using Figure 6 and Figure 7, we further illustrate the BER performance of the proposed CIM-SDM scheme compared with the traditional SDM scheme in Figure 8 and Figure 9. As shown in Figure 8, for Eve, the proposed CIM-SDM system provides worse BER performance than the SDM scheme. More specifically, in CIM-SDM, Eve approximately exhibited a 6 dB performance loss at a BER of 10−1 compared with the traditional SDM. What is more, the BER performance of Eve almost stayed at 0.5, which means that it was difficult for Eve to decode the information correctly in the context of CIM-SDM. Another important observation inferred from Figure 8 is that the CIM-SDM scheme exhibited slight performance loss compared to that of SDM. The reason for this degradation was that the original bit demodulation was associated with the previous and present data block, as we analyzed in (23) and (24).
However, observe from Figure 9 that, as expected, the CIM-SDM scheme approximately achieved the same BER performance as the SDM scheme at Bob when the number of receivers increased. The reason for this trend was that the influence of joint detection error was decreasing, as we analyzed in (26). Moreover, we also note in Figure 9 that the SDM scheme without the covert information mapping regime provided a significantly improved BER performance at Eve with increased receivers, while our CIM-SDM scheme still led to a poor BER performance at almost 10−1. Hence, due to the introduction of the special bits-to-symbol mapping regime, our proposed CIM-SDM scheme is capable of increasing the BER performance gap between Bob and Eve, while keeping the same transmission rate as SDM.
In order to further characterize the advantages of the covert information mapping regime, we plot the constellation error rate and receiver index error rate for CIM-SDM and SDM in Figure 10 and Figure 11. In Figure 10, from Bob’s constellation demodulation perspective, the constellation error rate performance of the proposed CIM-SDM scheme achieved the same performance as the traditional SDM in the context of N r = 2 and N r = 4 . The reason for this trend was that the special space–time mapping regime disguised the activated receiver index instead of the constellation symbols. Hence, the introduction of the space–time mapping regime had no influence on the demodulation of the constellation symbols. On the other hand, at Eve, since the constellation symbols transmitting from Alice to Bob were not disguised, the performance of CIM-SDM remained the same as SDM. This trend further validated the importance of embedded information in secure transmission.
As observed in Figure 11, at Eve, the receiver index error rate performance of CIM-SDM almost remained at 0.5 and suffered significant degradation compared with SDM in the context of N r = 2 , which means Eve was incapable of detecting the receiver index information correctly. The improved security was due to its embedded index, since Eve still considered it as a conventional spatially modulated antenna index. Moreover, in Bob, we notice that the proposed CIM-SDM scheme approximately achieved the same performance as the SDM scheme and exhibited a 0.4 dB performance loss compared to that of SDM at a BER of 10−4. A similar trend can be found in the context of N r = 4 . Therefore, the proposed CIM-SDM scheme is preferable to prevent the eavesdropping of Eve at the cost of a slight performance loss at Bob.

5. Conclusions

In this paper, the idea of CIM was combined with SDM systems in order to reap their advantages and hence to further improve the transmission security. The combined performance of this system was investigated using computer simulations based on the proposed transceiver architecture.
Our simulation results demonstrated that, due to the special bits-to-symbol mapping regime, the developed CIM-SDM scheme was capable of outperforming the original SDM in preventing Eve from decoding the information correctly, while keeping the same transmission rate as SDM. Even if the eavesdropper is equipped with distributed receivers with identical receive directions to the legitimate user, the proposed CIM-SDM is able to maintain the index information security. Hence, our proposed CIM-SDM scheme may be a promising secure transmission technology.
However, further study is required in order to determine its effectiveness in hardware platforms, in the context of a more realistic environment. For example, in order to realize the directional communication between Alice and Bob in a realistic environment, we will explore the uniform linear array technique, which is capable of changing the beam direction of the antenna system by controlling the phase excitation of the transmitted signal [32,33,34]. Furthermore, to the best of the authors’ knowledge, the uniform linear array has a limited beam scanning range, and hence, the distributed location of Bob should be taken into consideration. Another challenge that may be encountered in the hardware implementation is cooperative communication [35,36,37,38]. It is of paramount importance to devise a cooperative communication framework with high interactivity and quick response among Bob’s receivers. Moreover, this paper only considered the simple free channel model and AWGN environment, and other forms of impairment such as imperfect angle estimation and the multipath effect were not considered. These issues will comprise the topic of our future work.
Additionally, the developed structure has the potential to adopt high-frequency communications [39] with informant protection or further be combined with another covert information transmission scheme in SDM [40], namely spatial and directional modulation with scrambling (SDM-S), to further improve the transmission security. To sum up, the combination of the proposed structure with other promising technologies will also be investigated in the future.

Author Contributions

Conceptualization, J.T.; formal analysis, X.S.; investigation, H.C. and Z.W.; methodology, J.T.; project administration, X.L.; supervision, X.L. and Z.J.; validation, J.T.; visualization, X.S.; writing (original draft), J.T., X.L. and Z.J.; writing (review and editing), H.C. and Z.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Key-Area Research and Development Program of Guangdong Province under Grant Number 2018B010124001 and by the CAEP Foundation under Grant CX20200010.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wu, C.; Xiao, Y.; Yang, P. Covert Information Embedded Spatial Modulation. IEEE Commun. Lett. 2020, 24, 2426–2430. [Google Scholar] [CrossRef]
  2. Corre, Y.; Gougeon, G.; Doré, J.B.; Bicaïs, S.; Miscopein, B.; Faussurier, E.; Saad, M.; Palicot, J.; Bader, F. Sub-THz Spectrum as Enabler for 6G Wireless Communications up to 1 Tbit/s. In Proceedings of the 6GWireless Summit, Levi, Finland, 24–26 March 2019. [Google Scholar]
  3. Chen, X.; Ng, D.W.K.; Yu, W.; Larsson, E.G.; Al-Dhahir, N.; Schober, R. Massive Access for 5G and Beyond. IEEE J. Sel. Areas Commun. 2021, 39, 615–637. [Google Scholar] [CrossRef]
  4. Ma, Z.; Xiao, M.; Xiao, Y.; Pang, Z.; Poor, H.V.; Vucetic, B. High-Reliability and Low-Latency Wireless Communication for Internet of Things: Challenges, Fundamentals, and Enabling Technologies. IEEE Internet Things J. 2019, 6, 7946–7970. [Google Scholar] [CrossRef]
  5. Wu, C.; Wu, M.; Gao, Y.; You, X. Dynamic relay access for D2D-aided low-latency and high-reliability communications. Sci. China Inf. Sci. 2021, 64, 1–14. [Google Scholar] [CrossRef]
  6. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef] [Green Version]
  7. Li, M.; Kundu, S.; Pados, D.; Batalama, S. Waveform Design for Secure SISO Transmissions and Multicasting. IEEE J. Sel. Areas Commun. 2013, 31, 1864–1874. [Google Scholar] [CrossRef]
  8. Yang, Y.; Guizani, M. Mapping-Varied Spatial Modulation for Physical Layer Security: Transmission Strategy and Secrecy Rate. IEEE J. Sel. Areas Commun. 2018, 36, 877–889. [Google Scholar] [CrossRef] [Green Version]
  9. Niu, H.; Lei, X.; Xiao, Y.; Liu, D.; Li, Y.; Zhang, H. Power Minimization in Artificial Noise Aided Generalized Spatial Modulation. IEEE Commun. Lett. 2020, 24, 961–965. [Google Scholar] [CrossRef]
  10. Daly, M.P.; Bernhard, J.T. Directional Modulation Technique for Phased Arrays. IEEE Trans. Antennas Propag. 2009, 57, 2633–2640. [Google Scholar] [CrossRef]
  11. Ding, Y.; Fusco, V.F. A Vector Approach for the Analysis and Synthesis of Directional Modulation Transmitters. IEEE Trans. Antennas Propag. 2014, 62, 361–370. [Google Scholar] [CrossRef]
  12. Ding, Y.; Fusco, V. A review of directional modulation technology. Int. J. Microw. Wirel. Technol. 2016, 8, 981–993. [Google Scholar] [CrossRef] [Green Version]
  13. Ding, Y.; Fusco, V.; Zhang, J.; Wang, W.Q. Time-Modulated OFDM Directional Modulation Transmitters. IEEE Trans. Veh. Technol. 2019, 68, 8249–8253. [Google Scholar] [CrossRef]
  14. Zhang, Q.; Yang, Z.; Wang, W.; Ren, J.; Huang, W.; Zhang, N. A Dual-polarized Antennas Based Directional Modulation Scheme. In Proceedings of the 2019 26th International Conference on Telecommunications (ICT), Hanoi, Vietnam, 8–10 April 2019; pp. 468–473. [Google Scholar]
  15. Ding, Y.; Fusco, V. A Synthesis-Free Directional Modulation Transmitter Using Retrodirective Array. IEEE J. Sel. Top. Signal Process. 2017, 11, 428–441. [Google Scholar] [CrossRef]
  16. Shu, F.; Wu, X.; Hu, J.; Li, J.; Chen, R.; Wang, J. Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array. IEEE J. Sel. Areas Commun. 2018, 36, 890–904. [Google Scholar] [CrossRef]
  17. Qiu, B.; Tao, M.; Wang, L.; Xie, J.; Wang, Y. Multi-Beam Directional Modulation Synthesis Scheme Based on Frequency Diverse Array. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2593–2606. [Google Scholar] [CrossRef]
  18. Cheng, Q.; Zhu, J.; Xie, T.; Luo, J.; Xu, Z. Time-Invariant Angle-Range Dependent Directional Modulation Based on Time-Modulated Frequency Diverse Arrays. IEEE Access 2017, 5, 26279–26290. [Google Scholar] [CrossRef]
  19. Mesleh, R.Y.; Haas, H.; Sinanovic, S.; Ahn, C.W.; Yun, S. Spatial Modulation. IEEE Trans. Veh. Technol. 2008, 57, 2228–2241. [Google Scholar] [CrossRef]
  20. Di Renzo, M.; Haas, H.; Ghrayeb, A.; Sugiura, S.; Hanzo, L. Spatial Modulation for Generalized MIMO: Challenges, Opportunities, and Implementation. Proc. IEEE 2014, 102, 56–103. [Google Scholar] [CrossRef]
  21. Yang, P.; Di Renzo, M.; Xiao, Y.; Li, S.; Hanzo, L. Design Guidelines for Spatial Modulation. IEEE Commun. Surv. Tutor. 2015, 17, 6–26. [Google Scholar] [CrossRef] [Green Version]
  22. Tang, Q.; Xiao, Y.; Yang, P.; Yu, Q.; Li, S. A New Low-Complexity Near-ML Detection Algorithm for Spatial Modulation. IEEE Wirel. Commun. Lett. 2013, 2, 90–93. [Google Scholar] [CrossRef]
  23. Zhang, H.; Xiao, Y.; Xiao, Y.; Xiang, W. Impact of Imperfect Angle Estimation on Spatial and Directional Modulation. IEEE Access 2020, 8, 7081–7092. [Google Scholar] [CrossRef]
  24. Basar, E.; Wen, M.; Mesleh, R.; Di Renzo, M.; Xiao, Y.; Haas, H. Index Modulation Techniques for Next-Generation Wireless Networks. IEEE Access 2017, 5, 16693–16746. [Google Scholar] [CrossRef]
  25. Xiao, Y.; Tang, W.; Xiao, Y.; Zhang, H.; Wu, G.; Xiang, W. Directional Modulation with Cooperative Receivers. IEEE Access 2018, 6, 34992–35000. [Google Scholar] [CrossRef]
  26. Zhang, L.; Zhao, M. Secrecy Enhancement for Media-Based Modulation via Probabilistic Optimization. IEEE Commun. Lett. 2019, 23, 1149–1152. [Google Scholar] [CrossRef]
  27. Gao, Z.; Bai, S.; Liao, X.; Leung, V.C.M. Secure Quadrature Channel Modulation. IEEE Trans. Veh. Technol. 2019, 68, 9974–9987. [Google Scholar] [CrossRef]
  28. Wu, F.; Yang, L.L.; Wang, W.; Kong, Z. Secret Precoding-Aided Spatial Modulation. IEEE Commun. Lett. 2015, 19, 1544–1547. [Google Scholar] [CrossRef]
  29. Xiao, Y.; Wang, S.; Dan, L.; Lei, X.; Yang, P.; Xiang, W. OFDM with Interleaved Subcarrier-Index Modulation. IEEE Commun. Lett. 2014, 18, 1447–1450. [Google Scholar] [CrossRef]
  30. Datta, T.; Eshwaraiah, H.S.; Chockalingam, A. Generalized Space-and-Frequency Index Modulation. IEEE Trans. Veh. Technol. 2016, 65, 4911–4924. [Google Scholar] [CrossRef] [Green Version]
  31. Simon, M.K.; Alouini, M.S. Digital Communication over Fading Channels, 2nd ed.; Wiley: Newark, NJ, USA, 2005. [Google Scholar]
  32. Mailloux, R. Phased Array Antenna Handbook, 3rd ed.; Artech House Boston: Norwood, MA, USA, 2017. [Google Scholar]
  33. Trees, H.L.V. Optimum Array Processing: Part IV of Detection, Estimation, and Modulation Theory; Wiley: New York, NY, USA, 2003. [Google Scholar]
  34. Hansen, R. Phased Array Antennas; Wiley Series in Microwave and Optical Engineering; Wiley: New York, NY, USA, 2009. [Google Scholar]
  35. Wang, L.; Wu, H.; Stüber, G.L. Cooperative Jamming-Aided Secrecy Enhancement in P2P Communications with Social Interaction Constraints. IEEE Trans. Veh. Technol. 2017, 66, 1144–1158. [Google Scholar] [CrossRef]
  36. Wang, W.; Teh, K.C.; Li, K.H. Enhanced Physical Layer Security in D2D Spectrum Sharing Networks. IEEE Wirel. Commun. Lett. 2017, 6, 106–109. [Google Scholar] [CrossRef]
  37. Cepheli, O.; Karabulut Kurt, G. Physical layer security in cognitive radio networks: A beamforming approach. In Proceedings of the 2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom), Batumi, Georgia, 3–5 July 2013; pp. 233–237. [Google Scholar]
  38. Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Commun. Surv. Tutor. 2019, 21, 2734–2771. [Google Scholar] [CrossRef] [Green Version]
  39. Wang, T.; Jing, W.; Song, W. Hybrid prefix OFDM with spatial modulation toward terahertz broadband transmission. Sci. China Inf. Sci. 2020, 63, 1–3. [Google Scholar] [CrossRef]
  40. You, Q.; Xiao, Y. Spatial and directional modulation with scrambling. Phys. Commun. 2019, 35, 100694. [Google Scholar] [CrossRef]
Figure 1. Systematic scenario of directional modulation.
Figure 1. Systematic scenario of directional modulation.
Sensors 21 07646 g001
Figure 2. An example with N r = 2 for the traditional SDM activated process.
Figure 2. An example with N r = 2 for the traditional SDM activated process.
Sensors 21 07646 g002
Figure 3. An example with N r = 2 for the traditional SDM activated process.
Figure 3. An example with N r = 2 for the traditional SDM activated process.
Sensors 21 07646 g003
Figure 4. Flowchart depicting Bob’s detection algorithm adopted in the proposed CIM-SDM system.
Figure 4. Flowchart depicting Bob’s detection algorithm adopted in the proposed CIM-SDM system.
Sensors 21 07646 g004
Figure 5. The transceiver architecture of the proposed CIM-SDM scheme.
Figure 5. The transceiver architecture of the proposed CIM-SDM scheme.
Sensors 21 07646 g005
Figure 6. Bob’s and Eve’s theoretical and simulated BER performance for the proposed CIM-SDM scheme employing N t = 8 , N r = 2 , and QPSK.
Figure 6. Bob’s and Eve’s theoretical and simulated BER performance for the proposed CIM-SDM scheme employing N t = 8 , N r = 2 , and QPSK.
Sensors 21 07646 g006
Figure 7. Bob’s and Eve’s theoretical and simulated BER performance for the proposed CIM-SDM scheme employing N t = 8 , N r = 4 , and QPSK.
Figure 7. Bob’s and Eve’s theoretical and simulated BER performance for the proposed CIM-SDM scheme employing N t = 8 , N r = 4 , and QPSK.
Sensors 21 07646 g007
Figure 8. Bob’s and Eve’s BER performances for the proposed CIM-SDM scheme in comparison to the traditional SDM counterparts employing N t = 8 , N r = 2 , and QPSK.
Figure 8. Bob’s and Eve’s BER performances for the proposed CIM-SDM scheme in comparison to the traditional SDM counterparts employing N t = 8 , N r = 2 , and QPSK.
Sensors 21 07646 g008
Figure 9. Bob’s and Eve’s BER performances for the proposed CIM-SDM scheme in comparison to the traditional SDM counterparts employing N t = 8 , N r = 4 , and QPSK.
Figure 9. Bob’s and Eve’s BER performances for the proposed CIM-SDM scheme in comparison to the traditional SDM counterparts employing N t = 8 , N r = 4 , and QPSK.
Sensors 21 07646 g009
Figure 10. Bob’s and Eve’s constellation error rate performances for the proposed CIM-SDM scheme in comparison to the traditional SDM counterparts.
Figure 10. Bob’s and Eve’s constellation error rate performances for the proposed CIM-SDM scheme in comparison to the traditional SDM counterparts.
Sensors 21 07646 g010
Figure 11. Bob’s and Eve’s receiver index error rate performances for the proposed CIM-SDM scheme in comparison to the traditional SDM counterparts.
Figure 11. Bob’s and Eve’s receiver index error rate performances for the proposed CIM-SDM scheme in comparison to the traditional SDM counterparts.
Sensors 21 07646 g011
Table 1. System parameters.
Table 1. System parameters.
FigureScheme N t N r M Θ B N e Θ E
1CIM-SDM824{15°, 85°}2{20°, 60°}
2CIM-SDM844{15°, 85°, 120°, 210°}4{20°, 60°, 110°, 230°}
3CIM-SDM824{15°, 85°}2{20°, 60°}
SDM824{15°, 85°}2{20°, 60°}
4CIM-SDM844{15°, 85°, 120°, 210°}4{20°, 60°, 110°, 230°}
SDM844{15°, 85°, 120°, 210°}4{20°, 60°, 110°, 230°}
5, 6CIM-SDM102,44{15°, 85°}, {15°, 85°, 120°, 210°}2,4{20°, 60°}, {20°, 60°, 110°, 230°}
SDM102,44{15°, 85°}, {15°, 85°, 120°, 210°}2,4{20°, 60°}, {20°, 60°, 110°, 230°}
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Tian, J.; Chen, H.; Wang, Z.; Shi, X.; Ji, Z.; Li, X. Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission. Sensors 2021, 21, 7646. https://doi.org/10.3390/s21227646

AMA Style

Tian J, Chen H, Wang Z, Shi X, Ji Z, Li X. Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission. Sensors. 2021; 21(22):7646. https://doi.org/10.3390/s21227646

Chicago/Turabian Style

Tian, Jie, Hao Chen, Zhigang Wang, Xianhua Shi, Zhengyu Ji, and Xianglu Li. 2021. "Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission" Sensors 21, no. 22: 7646. https://doi.org/10.3390/s21227646

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop