Next Article in Journal
Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks
Previous Article in Journal
A Robust Routing Protocol in Cognitive Unmanned Aerial Vehicular Networks
Previous Article in Special Issue
Terahertz Meets AI: The State of the Art
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Covert Information Mapped Generalized Spatial and Direction Modulation toward Secure Wireless Transmission

1
Institute of Electronic Engineering, China Academy of Engineering Physics, Mianyang 621999, China
2
Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu 611731, China
3
The First School, Rocket Force University of Engineering, Xi’an 710025, China
4
Guangdong Communications and Networks Institute, Guangzhou 510289, China
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(19), 6333; https://doi.org/10.3390/s24196333
Submission received: 18 December 2022 / Revised: 14 February 2023 / Accepted: 21 February 2023 / Published: 30 September 2024
(This article belongs to the Special Issue System Design and Signal Processing for 6G Wireless Communications)

Abstract

:
In this paper, for the sake of enhancing the security of wireless transmission, we proposed a novel system based on spatial and direction modulation (SDM) combined with generalized spatial modulation (GSM) which is aided by covert information mapping (CIM), termed as the CIM-GSDM system. In such a system, the legitimated user is equipped with distributed receivers so as to demodulate the conveyed signal by exploiting its indices while disturbing eavesdroppers for information security. More specifically, part of the information is modulated into the indices of the legitimated distributed receiver subsets with the aid of the mapped covert information and the interference matrix, while another part of the message is arranged by conventional amplitude-phase modulation. The proposed system can reap the benefits from both GSM and CIM to make eavesdropper suffer great mixture. Furthermore, the detection scheme and theoretical analysis of error performance are discussed as well. The simulation results exhibit that the bit error rate (BER) performance of legitimate user is much better than that of the eavesdropper while the proposed scheme improves the security compared to the original CIM-SDM system at the same spectral efficiency.

1. Introduction

Due to the rapid development of communications, mobility adaptation has shown its importance in modern communication systems. In this case, the transmit signal is exposed in the wireless environment, which leads to severe security problems due to the lack of physical layer security (PLS) [1]. In order to gain effective security protection through wireless transmission, directional modulation (DM) has been proposed [2,3,4] which exploits spatial characteristics of the transmitter (Alice), legitimate receiver (Bob), and eavesdropper (Eve), so as to transmit information to Bob while interfering Eve. Unfortunately, although DM has been widely researched, it is unwise to adopt DM directly if Eve happens to locate in the same receive direction as Bob [5,6]. Because information can be extracted by Eve. Bob has no more obvious advantages in such a configuration, leading to the loss of wireless security [7,8].
For the sake of further improving the achievable security, spatial and directional modulation (SDM) was designed with the aid of DM and spatial modulation (SM) [9], attempting to enhance the security weakened by the aforementioned traditional schemes. By utilizing multiple distributed receivers, it can not only convey part of information using the index of the activated receiver at Bob, but also keep considerable transmission security offered by DM [10,11]. Therefore, SDM is capable to provide improved transmission security where some information is concealed in the receiver indices. However, Eve will make every effort to achieve eavesdropping, then the security enhancement will suffer potential challenge whenever Eve performs numerous distributed receivers and some of them are close to Bob’s [12].
Recently, Refs. [13,14] constituted an attractive security-enhanced scheme that combines SDM with covert information mapping (CIM) in the context of distributed receivers, called CIM-SDM, as integrating the idea of secret modulation to SDM. On the one hand, SDM can hide the information in the receiver indices. On the other hand, CIM is able to insert the covert information into the space-time antenna index mapping with a careful design and make Eve suffer from severe interference [15]. Hence, significant improvement of transmission security can be achieved by this approach, even if Eve has exactly the same multiple receiver distribution as Bob. Nevertheless, though SDM can prevent eavesdropping validly, it has an unavoidable limitation in low spectral efficiency due to activating only one receiver at a time.
Moreover, the work of [16] has conceived a novel generalized spatial modulation (GSM) scheme for SM systems. Instead activating one receiver at a time, GSM can deliver multiple symbols by activating multiple activated receivers simultaneously [16,17] while the conveyed information is hidden in indices of receiver subsets leading to a hybrid of SM and spatial multiplexing [18,19]. The application of GSM will increase the spectral efficiency and rate effectively and it can improve the transmission obviously with the rising of the scale of distributed receivers [20,21]. From a cross-layer point of view, it is appealing to combine GSM and SDM for making full use of both advantages.
Against this backdrop, in this paper, we aim to enhance the security of transmission while improving transmission rate efficiently by jointly considering current CIM-SDM and GSM (CIM-GSDM), which is realized by the interference factor with the assistance of embedding the covert information, as well as concealing indices of receivers subsets, where multiple eavesdroppers exist. In particular, SDM and GSDM are both based on direction modulation, but SDM activates only one receiver in each transmission while GSDM can activate multiple receivers simultaneously which improves the transmission rate. In this scenario, CIM-GSDM can enhance transmission security effectively at Bob while decreasing unexpected eavesdropping at Eve simultaneously. Specifically, the basic model of GSDM will be described at first, then integrated by CIM to finish the whole structure building. What is more, the theoretical analysis of the average bit error rate (ABER) at both Bob and Eve are exhibited for clearer performance comparison. Finally, the simulation results are presented to investigate the benefits of the proposed scheme, even if Eve is equipped with the identical distributed receivers as Bob’s, which supports the theoretical analysis.
The rest of this paper is organized as follows. Section 2 describes the system model used in this paper thoroughly, which is constructed by GSDM in conjunction with CIM. In Section 3, the theoretical analysis of ABER at both Bob and Eve are derived for further comparison. Our simulation results and performance analysis are presented in Section 4 and we conclude our discourse in Section 5 finally.
Notation: In this paper, · H and · represent the conjugate transpose of a matrix and the Frobenius norm, respectively. What is more, R · indicates the real operators and C N denotes circularly symmetric complex Gaussian distribution.

2. Convert Information Mapping Aided GSDM

As shown in Figure 1, a directional modulation system which transmits in free space is considered in this paper. The transmitter Alice is equipped with N t antennas and the legitimate Bob is equipped with N r cooperative single-antenna receivers, which are located in different spatial directions and are linked through optical fibers. In addition, there are N u receivers at Bob activated in communication where N u < N r . That is to say, only part of receivers at Bob are participated in transmission. Meanwhile, it is assumed that Eve is equipped with N e cooperative single-antenna receivers linked through optical fibers as well, which sends nothing to hide itself and try its best to eavesdrop. In this section, the GSDM system will be introduced at first and followed by the proposed CIM-GSDM system in details.

2.1. The GSDM System Model

In order to take both transmission rate and security performance into consideration, one of functions of GSM, receiver subset selection (RRS), is introduced to SDM where multiple eavesdroppers exist. Based on RSS, in such a case that Bob is equipped with N r receivers and only N u of them are activated, the number of total single-antenna receivers combinations is C N r N u . For the sake of convenience for information mapping, the number of receivers combinations chosen to use should be the power of two. Hence, there are f 1 = 2 log 2 C N r N u combinations allowed for modulation and k 1 = log 2 f 1 bits are delivered by RRS. Apart from information carried by indices of receiver subsets, N u receivers are activated and each of them is able to deliver single M-ary amplitude-phase modulation (APM) symbol. Therefore, other k 2 = N u × log 2 M bits are transmitted by conventional APM symbols though N u activated receivers. As a result, the GSDM system is capable to convey k = k 1 + k 2 bits a time so the transmission rate is improved efficiently.
For simplicity, assume that Alice is equipped with uniform linear array (ULA), where the phase center is the geometric center of array. Then the channel vector between Alice and the receiver located in direction of angle θ is expressed as
h H ( θ ) = e j N t 1 2 2 π λ d cos θ , e j N t 1 2 1 2 π λ d cos θ , , e j N t 1 2 2 π λ d cos θ ,
where λ denotes the signal wavelength and d λ / 2 is the antennas spacing at Alice. Thus, the channel matrix between Alice and Bob can be expressed as
H Θ B = h θ 1 , h θ 2 , , h θ N r H ,
where H Θ B C N r × N t , Θ B = θ 1 , θ 2 , , θ N r and h θ i , i = 1 , 2 , , N r represent the set of directional angles at Bob and the channel vector between Alice and i-th receiver at Bob, respectively.
For the purpose of transmission security, the beamforming vector should provide the maximum power to Bob. Then the corresponding beamforming vector w i to i-th receiver at Bob is given by
w i = h θ i / N t .
When taking all receivers at Bob into consideration, the beamforming matrix W C N t × N r of the channel can be represented by
W = w 1 , w 2 , , w N r .
As aforementioned, k = k 1 + k 2 bits can be modulated at a time. More specifically, symbol vector x l , s produced by Alice can be formulated as
x l , s = I l b s ,
where I l ( l = 1 , 2 , , 2 k 1 ) denotes matrix which consists of N u column vector chosen from identity matrix I N r × N r , as N u activated receivers. In addition, b s ( s = 1 , 2 , , 2 k 2 ) is a column vector built up by N u symbols selected from conventional APM symbols. It is noteworthy that the symbol vector x l , s involves information of activated receiver subset in conjunction with APM symbols which both are able to influence the performance.
For the sake of security enhancement, an interference matrix is proposed here. The interference matrix is known to Bob but unknown to Eve. Therefore, the transmit signal at Alice can be detailed as
s l , s = W Λ x l , s ,
where Λ = diag λ 1 , λ 2 , , λ N r C N r × N r is interference matrix and λ i = e j φ i , i = 1 , 2 , N r denotes interference factors. Every receiver at Bob has a corresponding interference factor, which is relatively big for efficient phase disturbance. Moreover, Bob can set different interference factors to prevent eavesdropping of single legitimate receiver at Bob for further security.
Transmitting through the channel in free space, the receive signal at Bob can be represented as
r B = H Θ B s l , s + n B = H Θ B W Λ x l , s + n B .
With regards to Eve, the receive signal can be expressed as
r E = H Θ E s l , s + n E = H Θ E W Λ x l , s + n E ,
where H Θ E C N e × N t denotes the channel matrix between Alice and Eve, Θ E = θ 1 , θ 2 , , θ N e is the set of directional angles at Eve. Additionally, n B and n E are noise vectors to Bob and Eve, which obey n B C N 0 , σ B 2 I N r × N r and n E C N 0 , σ E 2 I N o × N s , respectively. According to [13], the diagonal elements of matrix H Θ B W are all equal to 1 and diagonal elements of matrix H Θ E W are all less than or equal to 1, which indicates the amplitude or power of the receive signal at Eve decreases. Hence, it is undeniable that the receive signal at Eve are extremely disturbed while Bob can receive successfully as usual, so the security of transmission gains great enhancement.

2.2. Proposed CIM-GSDM Scheme

For the sake of further improvement, the GSDM system is able to combine with CIM in which covert information is mapped with a deliberate design in the GSDM system. In the proposed CIM-GSDM scheme, the non-covert information and the covert information are considered together at Alice. The proposed scheme are still based on the GSDM system, and the difference and novelty lie in that the information delivered by receiver subsets are not only designed by indices, but also the covert information added in. Since the covert information is related to the past message, Bob can demodulate correctly owing to knowing the rule while Eve falls into confusion from the beginning. Therefore, it is distinct to the GSDM system and improve the security of transmission to a next level in the presence of CIM.
Under this scenario, the data bits to send at a time are separated into three parts, as k = k 1 + k 2 + k 3 , which are exploited to design as the covert message and APM symbols. Specifically, k 1 + k 2 bits are employed as selection of receiver subset indices with the aid of CIM design and remaining k 3 bits are applied for APM symbols. Based on CIM, all receivers are divided into two groups I 1 and I 2 , in which I 1 = 1 , 2 , , N r 2 and I 2 = N r 2 + 1 , N r 2 + 2 , , N r include the former half receivers and the latter half receivers, respectively. In this case, there are only f 2 = 2 log 2 C N r / 2 N u receiver combinations in each group at Bob with k 2 = log 2 f 2 . Thus, 2 f 2 groups can be modulated in total. The main idea of CIM-GSDM is to use k 1 bits to choose the receiver group in conjunction with message at last slot and use k 2 bits to select the receivers combination index in the group. In detail, if K 1 = [ 1 ] , the current receiver group is the same as the previous one. Otherwise, the current receiver group is different from the previous one if K 1 = [ 0 ] , that is to say, choosing another receiver group. Supposing that the receiver group index selected to modulate at the ( k 1 )-th slot is I 1 , the receiver group index I g k chosen at the k-th slot can be represented as
I g k = I 2 , if K 1 = [ 0 ] and I g k 1 = I 1 I 1 , if K 1 = [ 1 ] and I g k 1 = I 1 .
Analogously, if the receiver group index selected to modulate at ( k 1 ) -th slot is I 2 , then I g k can be represented as
I g k = I 1 , if K 1 = [ 0 ] and I g k 1 = I 2 I 2 , if K 1 = [ 1 ] and I g k 1 = I 2 .
For instance, an example with N r = 4 for the proposed CIM-GSDM scheme is shown in Figure 2. In a nutshell, the design of selection for receiver groups at Bob takes the message of the former and the latter into consideration together and provide further security. After the receiver group is fixed, k 2 bits are employed to determine the receive subset index in the certain group I g k as I g k ( p ) , ( p = 1 , 2 , , f 2 ) . Then the symbol vector produced by Alice can be expressed as
x I g k s = I I g k b s ,
where I I g k consists of N u column vector chosen from identity matrix I N r × N r corresponding to I g k , b s ( s = 1 , 2 , , 2 k 3 ) is a column vector built up by N u symbols selected from conventional M-ary APM symbols. Therefore, the transmit signal at Alice can be represented as
s I g k s = W Λ x I g k s .
Furthermore, the transmission rate of the CIM-GSDM system can be formulated as
R p = log 2 2 f 2 + N u log 2 ( M ) ( bpcu ) .
In general, due to the covert information mapped in transmission, Eve suffers extremely interference even if receivers at Eve are located in exactly the same direction as Bob’s. The reason why the proposed system is capable to hold such reliable transmission is that Eve has no idea about the covert information related to the last slot so the message it can catch is only the current one. In addition, keeping the interference matrix is beneficial to enhance the security of transmission as well. Thus, until now, employment of CIM-GSDM has at least two layers of protection for security of transmission as improving the transmission rate and spectral efficiency obviously, which gains considerable enhancement compared to the original SDM system as a novelty.

2.3. Detection Algorithm for the Proposed Scheme

Based on (12), the receive signal at Bob aided by CIM at the k-th slot can be expressed as
r B k = H Θ B s I g k s + n B = H Θ B W Λ x I g k s + n B .
Assume that the optimal detector of maximum likelihood (ML) is adopted to detect the composition of unit column vectors corresponding to the receiver subset l and the combination of APM symbols s, which can be formulated as
l ^ , s ^ = arg min l ^ L , s S r B k H Θ B W Λ x I g k s 2 ,
where L = 1 , 2 , , 2 f 2 and S = 1 , 2 , , 2 k 3 denotes the set of the indices of receivers subsets at Bob and the set of constellations combinations of M-ary APM symbols, respectively.
Furthermore, the index of receiver group can be set as
g ^ k = 0 , if l ^ f 2 1 , if l ^ > f 2 .
In particular, the bit K 1 for determining the receive group index is decided by g ^ k and g ^ k 1 , which can be given by
K 1 = 1 , g ^ k = g ^ k 1 0 , g ^ k g ^ k 1 .
In addition, the index of receiver subset p ^ in the receive group I g k can be detailed as follows:
p ^ = MOD f 2 l ^ 1 + 1 ,
where MOD a b returns the remainder after division of b by a. As a result, p ^ can be exploited to demodulating the index bits k 2 of the receive subset.
With respect to Eve, the receive signal at Eve at the k-th slot can be expressed as
r E k = H Θ E s I g k s + n E = H Θ E W Λ x I g k s + n E .
Eve is possible to obtain channel state information (CSI) of the system and achieves to calculate the beamforming matrix W. However, the interference matrix is still hard to confirm. As a result, the ML detector employed at Eve can be represented as
l ^ , s ^ = arg min l ^ L , s S r E k H Θ E W Λ x I g k s 2 .
In general, the CIM-GSDM system are much more safe than the original system. On the one hand, only part of the disturbed receivers at Bob are activated and adjusted by the covert information, which is hard to be ensured at Eve. On the other hand, due to the interference matrix added based on (19) and (20), the accuracy of detection performance of APM symbols suffers reduction significantly. That is to say, except to k 1 and k 2 bits, Eve can hardly obtain k 3 bits neither. By contrast, Bob is able to demodulate all the bits successfully since Bob knows the rules. As a benefit, the proposed strategy of CIM-GSDM can let Alice communicate with Bob smoothly while disturbing Eve, which enhances the security of transmission effectively.

3. Performance Analysis

In this section, the theoretical upper bound of ABER at both Bob and Eve in the proposed CIM-GSDM system over free space channels will be derived and analyzed, which jointly considers the influence of mapped covert information and disturbed receivers subset selection.

3.1. Bob’S Average Bit Error Probability

Based on assumption of (15), the upper bound of ABER at Bob can be formulated as
P B k 1 R p 2 R p x I g k s X x I m k n X x I g k s d x I g k s x I m k n P x I g k s x I m k n ,
where R p denotes the transmission rate based on (13), d x I g k s x I m k n represents the Hamming distance between vectors x I g k s and x I m k n , P x I g k s x I m k n is the pairwise Error probability (PEP).
In particular, the PEP in (21) can be given by
P x I g k s x I m k n = P r B k H Λ x I g k s 2 > r B k H Λ x I m k n 2 = P R n B H H Λ x I m k n H Λ x I g k s > 1 2 H Δ x I m k n H Λ x I g k s 2 ,
where H Λ = H Θ B W Λ is defined and n B C N 0 , σ B 2 I N r × N r .
Noting that R n B H H Λ x I m k n H Λ x I g k s is a Gaussian random variable obeying CN 0 , 1 2 σ n 2 H Λ x I g k s x I m k n 2 , PEP can be obtained as
P x I g k s x I m k n = Q H Λ x I g k s x I m k n 2 2 σ n 2 .
After that, the upper bound of ABEP of Bob at the k-th slot can be obtained by substituting (23) to (21). However, the signal conveyed at Bob is associated with the mapped covert information and it will affect the practical ABEP. As a result, it should take influence of CIM into consideration jointly while calculating the upper bound of ABER.
Against this scenario, the influence of CIM should be considered in the analysis of ABEP. Noticing that the mapped covert information will not affect the Hamming distance and PEP between x I g k s and x I m k n , but may influence mapping of the k 1 bits in which covert information embeds. According to (17), if the former k 1 bit is determined wrongly, the latter one is likely to be misjudged. In other words, the accuracy of the latter k 1 bit is depended on the former one in some extent. Therefore, the average error probability of the bit for receiver group selection can be approximated by:
P r = P B k 1 × 1 P B k + 1 P B k 1 × P B k ,
which illustrates that the misjudgment of the original k 1 bit is caused by the misjudgment of the receiver group at the ( k 1 )-th or k-th slot, even though the remaining data bits is correctly obtained. It can be used that P B k 1 = P B k , (24) can be arranged as
P r = 2 P B k 1 P B k .
Furthermore, the ABEP should be adjusted as the influence of the mapped covert information discussed aforementioned, which is considered the ( k 1 ) -th slot and the k-slot jointly and can be detailed as
P ¯ B = 1 R p × P r + R p 1 R p × P B k = R p + 1 2 P B k R p .
In a nutshell, the upper bound of ABEP at Bob is obtained at last.

3.2. Eve’s Average Bit Error Probability

Analogously, the upper bound of ABEP at Eve in the CIM-GSDM system at k-slot based on (20) can be formulated as
P E k 1 R p 2 R p x I g k s X x I m k n X x I g k s d x I g k s x I m k n P H Θ E x I g k s x I m k n ,
where P H Θ E x I g k s x I m k n denotes the PEP for Eve under the channel matrix H Θ E . In this scenario, the PEP in (27) is given by
P H Θ E x I g k s x I m k n = P r E k H E x I g k s 2 > r E k H E x I m k n 2 = P H E Λ x I g k s + n E H E x I g k s 2 > H E Λ x I g k s + n E H E x I m k n 2 = P R n E H H E x I m k n H E x I g k s > H E Λ x I g k s H E x I m k n 2 H E Λ x I g k s H E x I g k s 2 2 ,
where H E = H Θ E W and n E C N 0 , σ B 2 I N r × N r . Moreover, R n E H H E x I m k n H E x I g k s is a Gaussian random variable obeying C N 0 , 1 2 σ E 2 H E x I g k s x I m k n 2 . Therefore, the PEP for Eve can be formulated as
P H Θ E x I g k s x I m k n = Q H E Λ x I g k s H E x I m k n 2 H E Λ x I g k s H E x I g k s 2 2 σ E H E x I g k s H E x I m k n .
By substituting (29) to (27), the theoretical upper bound of ABEP for Eve can be calculated. By contrast, Eve can not recognize the correct covert information and its corresponding bit since Eve has no idea about the rule of CIM. In this case, the average error probability of the bit for receiver group selection at Eve can be approximated by P r = 0.5 . Specifically, the ABEP which is considered the ( k 1 )-th slot and the k-slot jointly can be detailed as
P ¯ r = 1 R p × P r + R p 1 R p × P E k = 0.5 + R p 1 P E k R p .
Finally, the upper bound of ABEP at Eve is obtained.
It should be noted that the theoretical bound of ABEP of Eve only can be attained in high SNR region due to its robust.

4. Simulation Results

In this section, we verify the simulation results and the theoretical performance of the proposed CIM-GSDM system in terms of Bob and Eve. Moreover, the comparison between the original CIM-SDM system and the proposed CIM-GSDM system is exhibited as well under the same spectral efficiency. More specifically, theoretical and simulated BER performance at both Bob and Eve is obtained and compared in details. In the process of simulations, assume that Alice is equipped with N t = 8 antennas and the distance between each antennas is d = λ / 4 . The signals are transmitted over free space channels. Considering Eve desires eavesdropping, it is assumed that the receivers at Eve are close to the Bob’s ones due to the characteristic of direction modulation. The interference matrix and the number of receivers at Bob and Eve are different in simulations. The assumptions are the same as theoretical analysis. More details about simulations are shown in Table 1 as follows.
As shown in Figure 3, Bob’s and Eve’s BER performances of proposed CIM-GSDM scheme employing N t = 8 , N r = 6 , N e = 6 and QPSK are compared. The interference matrix is Λ = d i a g { e j Θ Λ } ( Θ Λ = { 28 ° , 32 ° , 45 ° , 55 ° , 60 ° , 65 ° } ) . Observed in Figure 3, the theoretical curves of Bob both approximate well to the simulated curves at high signal noise radio (SNR). The BER performance of Bob are significantly better than that of Eve with the employment of the proposed CIM-GSDM system at both middle and high SNR even if the receivers at Eve are located near to Bob’s. The theoretical and simulation results perform better in high SNR region since the interference caused by noise relatively decreases with SNR increasing. More explicitly, it implies that the proposed CIM-GSDM system causes interference to Eve while achieves transmission to Bob, which develop the security of transmission as a benefit of employing the proposed CIM-GSDM scheme.
Figure 4 suggests Bob’s and Eve’s BER performances of proposed CIM-GSDM scheme in comparison to the traditional CIM-SDM counterparts employing N t = 8 , N r = 6 , N e = 6 and QPSK at the same spectral efficiency. Specifically, the BER performance of Eve suffers great interference at both the CIM-SDM and CIM-GSDM scheme, which implies these two scheme can improve the security as it needs. Apart from this, another advantage ensured is the BER performance of Bob has much development in the proposed scheme than that of the original CIM-SDM scheme with nearly 10 dB gains. Therefore, the proposed CIM-GSDM system provides more enhancement than the conventional CIM-SDM system in terms of security of transmission.
Figure 5 shows Bob and Eve’s BER performances of proposed CIM-GSDM scheme employing N t = 8 , N r = 8 , N e = 8 and QPSK. The interference matrix is Λ = d i a g { e j Θ Λ } ( Θ Λ = { 28 ° , 32 ° , 40 ° , 45 ° , 50 ° , 55 ° , 60 ° , 65 ° } ) . From the results, it can be observed that the theoretical results have considerable approximation to the simulation results at high SNR, which convinces that the theoretical analysis are correct. Furthermore, the performance of Eve is much worse than Bob at middle and high SNR even if the receivers at Eve are located near to Bob’s, which means the proposed CIM-GSDM system decreases performance of Eve while keeping Bob unaffected. The theoretical and simulation results match better in high SNR region since the interference caused by noise relatively decreases with SNR becoming higher. As a result, the proposed CIM-GSDM system is able to enhance the security of transmission.
Figure 6 exhibits Bob and Eve’s BER performances of proposed CIM-GSDM scheme in comparison to the traditional CIM-SDM counterparts employing N t = 8 , N r = 8 , N e = 8 and QPSK at the same spectral efficiency. The results illustrated the proposed CIM-GSDM system enhances the BER performance at both middle and high SNR compared to the original CIM-SDM system at the same spectral efficiency. Analogously, the BER performance of Eve is still worse in both the CIM-GSDM system and the CIM-SDM system even if the receivers at Bob are located near to Bob’s. However, the BER performance of Bob is improved obviously in the CIM-GSDM system, which has almost 12 dB gains. In short, CIM-GSDM system can improve the BER performance strongly at the same spectral efficiency.

5. Conclusions

In this paper, a novel CIM-GSDM system is proposed for enhancement of security of transmission in a free space. More specifically, the GSM system is combined with the SDM system for higher transmission rate as a benefit. Furthermore, the design of CIM is taken into consideration as well for the sake of embedding the covert information into the system, which is able to reap their advantages for further improvement of security. Hence, Eve can hardly eavesdrop the transmitted message whether a covert transmission happens. The theoretical analysis of performance of the proposed scheme is also detailed. Our simulation results shows that the BER performance of Bob is much better compared to that of Eve, even if the receivers at Eve are located near to Bob’s. Moreover, the proposed scheme enhances the BER performance compared to original CIM-SDM systems at the same spectral efficiency. In a nutshell, our proposed CIM-GSDM scheme is capable to improve the security of transmission significantly.

Author Contributions

Conceptualization, Y.Z. and J.T.; Formal analysis, D.H. and Z.W.; Investigation, Z.J., X.L., P.F., Z.W. and D.H.; Methodology, Y.Z. and J.T.; Project administration, J.T.; Supervision, X.L. and P.F.; Validation, Y.Z., Z.J. and J.T.; Visualization, Z.J., D.H. and Z.W.; Writing—original draft, Y.Z. and J.T.; Writing—review and editing, Y.Z., Z.J., X.L., P.F. and D.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by CAEP Foundation under Grant CX20200010, National Natural Science Foundation of China under grant number 61871084, National Natural Science Foun-dation of China under grant number 62271109, and Key-Area Research and Development Program of Guangdong Province under grant number 2018B010124001.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, R.; Li, C.; Yan, S.; Malaney, R.; Yuan, J. Physical layer security for ultra-reliable and low-latency communications. IEEE Wirel. Commun. 2019, 26, 6–11. [Google Scholar] [CrossRef]
  2. Ding, Y.; Fusco, V.F. MIMO-inspired synthesis of directional modulation systems. IEEE Antennas Propag. Lett. 2015, 15, 580–584. [Google Scholar] [CrossRef]
  3. Babakhani, A.; Rutledge, D.B.; Hajimiri, A. Near-field direct antenna modulation. IEEE Microw. Mag. 2009, 10, 36–46. [Google Scholar] [CrossRef]
  4. Hamamreh, M.; Furqan, H.; Arslan, H. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2018, 21, 1773–1828. [Google Scholar] [CrossRef]
  5. Wang, W.-Q.; Zheng, Z. Hybrid MIMO and phased-array directional modulation for physical layer security in mmWave wireless communications. IEEE J. Sel. Areas Commun. 2018, 36, 1383–1396. [Google Scholar] [CrossRef]
  6. Daly, M.P.; Bernhard, J.T. Directional modulation technique for phased arrays. IEEE Trans. Antennas Propag. 2009, 57, 2633–2640. [Google Scholar] [CrossRef]
  7. Ding, Y.; Fusco, V.F. A vector approach for the analysis and synthesis of directional modulation transmitters. IEEE Trans. Antennas Propag. 2014, 62, 361–370. [Google Scholar] [CrossRef]
  8. Qiu, B.; Wang, L.; Yang, X.; Xie, J. Security enhancement of directional modulation scheme against hybrid eavesdroppers. In Proceedings of the 2021 XXXIVth General Assembly and Scientific Symposium of the International Union of Radio Science (URSI GASS), Rome, Italy, 28 August–4 September 2021; pp. 1–4. [Google Scholar]
  9. Wei, X.; Xiao, Y.; Xiao, Y.; You, Q.; Chen, W. Spatial and directional modulation with random frequency diverse array. In Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2018; pp. 976–979. [Google Scholar]
  10. Wang, H.M.; Yin, Q.; Xia, X.-G. Distributed beamforming for physical-layer security of two-way relay networks. IEEE Trans. Signal Process. 2012, 60, 3532–3545. [Google Scholar] [CrossRef]
  11. Zhang, H.; Xiao, Y.; Xiao, Y.; Xiang, W. Impact of imperfect angle estimation on spatial and directional modulation. IEEE Access 2020, 8, 7081–7092. [Google Scholar] [CrossRef]
  12. Hafez, M.; Yusuf, M.; Khattab, T.; Elfouly, T.; Arslan, H. Secure spatial multiple access using directional modulation. IEEE Trans. Wireless Commun. 2018, 17, 563–573. [Google Scholar] [CrossRef]
  13. Li, X.; Chen, H.; Xiao, Y.; Tian, J. Covert Information Mapping for Spatial and Direction Modulation. In Proceedings of the 2021 IEEE 21st International Conference on Communication Technology (ICCT), Online, 13–16 October 2021; pp. 1320–1324. [Google Scholar]
  14. Tian, J.; Chen, H.; Wang, Z.; Shi, X.; Ji, Z.; Li, X. Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission. Sensors 2021, 21, 7646. [Google Scholar] [CrossRef] [PubMed]
  15. Wu, C.; Xiao, Y.; Yang, P. Covert information embedded spatial modulation. IEEE Commun. Lett. 2020, 24, 2426–2430. [Google Scholar] [CrossRef]
  16. Mesleh, R.Y.; Haas, H.; Sinanovic, S.; Ahn, C.W.; Yun, S. Spatial modulation. IEEE Trans. Veh. Technol. 2008, 57, 2228–2241. [Google Scholar] [CrossRef]
  17. Narasimhan, T.L.; Raviteja, P.; Chockalingam, A. Generalized spatial modulation in large-scale multiuser MIMO systems. IEEE Trans. Wireless Commun. 2015, 14, 3764–3779. [Google Scholar] [CrossRef]
  18. Wang, J.; Jia, S.; Song, J. Generalised spatial modulation system with multiple active transmit antennas and low complexity detection scheme. IEEE Trans. Wireless Commun. 2012, 11, 1605–1615. [Google Scholar] [CrossRef]
  19. Renzo, M.D.; Haas, H.; Ghrayeb, A.; Sugiura, S.; Hanzo, L. Spatial modulation for generalized MIMO: Challenges opportunities and implementation. Proc. IEEE 2014, 102, 56–103. [Google Scholar] [CrossRef]
  20. He, L.; Wang, J.; Song, J. Spatial modulation for more spatial multiplexing: RF-chain-limited generalized spatial modulation aided MM- wave MIMO with hybrid precoding. IEEE Trans. Commun. 2018, 66, 986–998. [Google Scholar] [CrossRef]
  21. Guo, S.; Zhang, H.; Zhang, P.; Dang, S.; Liang, C.; Alouini, M. Signal shaping for generalized spatial modulation and generalized quadrature spatial modulation. IEEE Trans. Wireless Commun. 2019, 18, 4047–4059. [Google Scholar] [CrossRef]
Figure 1. The system of generalized spatial and direction modulation.
Figure 1. The system of generalized spatial and direction modulation.
Sensors 24 06333 g001
Figure 2. An example with N r = 4 for the proposed CIM-GSDM scheme.
Figure 2. An example with N r = 4 for the proposed CIM-GSDM scheme.
Sensors 24 06333 g002
Figure 3. Bob’s and Eve’s BER performances of proposed CIM-GSDM scheme employing N t = 8 , N r = 6 , N e = 6 and QPSK.
Figure 3. Bob’s and Eve’s BER performances of proposed CIM-GSDM scheme employing N t = 8 , N r = 6 , N e = 6 and QPSK.
Sensors 24 06333 g003
Figure 4. Bob’s and Eve’s BER performances of proposed CIM-GSDM scheme in comparison to the traditional CIM-SDM counterparts employing N t = 8 , N r = 6 , N e = 6 and QPSK at the same spectral efficiency.
Figure 4. Bob’s and Eve’s BER performances of proposed CIM-GSDM scheme in comparison to the traditional CIM-SDM counterparts employing N t = 8 , N r = 6 , N e = 6 and QPSK at the same spectral efficiency.
Sensors 24 06333 g004
Figure 5. Bob and Eve’s BER performances of proposed CIM-GSDM scheme employing N t = 8 , N r = 8 , N e = 8 and QPSK.
Figure 5. Bob and Eve’s BER performances of proposed CIM-GSDM scheme employing N t = 8 , N r = 8 , N e = 8 and QPSK.
Sensors 24 06333 g005
Figure 6. Bob’s and Eve’s BER performances of proposed CIM-GSDM scheme in comparison to the traditional CIM-SDM counterparts employing N t = 8 , N r = 8 , N e = 8 and QPSK at the same spectral efficiency.
Figure 6. Bob’s and Eve’s BER performances of proposed CIM-GSDM scheme in comparison to the traditional CIM-SDM counterparts employing N t = 8 , N r = 8 , N e = 8 and QPSK at the same spectral efficiency.
Sensors 24 06333 g006
Table 1. Parameters of simulations.
Table 1. Parameters of simulations.
FigureScheme N t N r N u Θ B N e Θ E M
Figure 3CIM-GSDM862 { 15 ° , 60 ° , 120 ° ,
160 ° , 215 ° , 285 ° }
6 { 30 ° , 75 ° , 135 ° ,
175 ° , 230 ° , 300 ° }
4
Figure 4CIM-GSDM882 { 15 ° , 55 ° , 90 ° , 130 ° ,
170 ° , 210 ° , 250 ° , 290 ° }
8 { 30 ° , 70 ° , 105 ° , 145 ° ,
185 ° , 235 ° , 265 ° , 305 ° }
4
Figure 5CIM-GSDM CIM-SDM862 { 15 ° , 60 ° , 120 ° ,
160 ° , 215 ° , 285 ° }
6 { 30 ° , 75 ° , 135 ° ,
175 ° , 230 ° , 300 ° }
4
Figure 6CIM-GSDM CIM-SDM882 { 15 ° , 55 ° , 90 ° , 130 ° ,
170 ° , 210 ° , 250 ° , 290 ° }
8 { 30 ° , 70 ° , 105 ° , 145 ° ,
185 ° , 235 ° , 265 ° , 305 ° }
4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhong, Y.; Ji, Z.; Li, X.; Fei, P.; Hou, D.; Wang, Z.; Tian, J. Covert Information Mapped Generalized Spatial and Direction Modulation toward Secure Wireless Transmission. Sensors 2024, 24, 6333. https://doi.org/10.3390/s24196333

AMA Style

Zhong Y, Ji Z, Li X, Fei P, Hou D, Wang Z, Tian J. Covert Information Mapped Generalized Spatial and Direction Modulation toward Secure Wireless Transmission. Sensors. 2024; 24(19):6333. https://doi.org/10.3390/s24196333

Chicago/Turabian Style

Zhong, Yuan, Zhengyu Ji, Xianglu Li, Peng Fei, Dong Hou, Zhigang Wang, and Jie Tian. 2024. "Covert Information Mapped Generalized Spatial and Direction Modulation toward Secure Wireless Transmission" Sensors 24, no. 19: 6333. https://doi.org/10.3390/s24196333

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop