Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = covert information mapping (CIM)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
14 pages, 498 KB  
Article
Covert Information Mapped Generalized Spatial and Direction Modulation toward Secure Wireless Transmission
by Yuan Zhong, Zhengyu Ji, Xianglu Li, Peng Fei, Dong Hou, Zhigang Wang and Jie Tian
Sensors 2024, 24(19), 6333; https://doi.org/10.3390/s24196333 - 30 Sep 2024
Cited by 2 | Viewed by 1118
Abstract
In this paper, for the sake of enhancing the security of wireless transmission, we proposed a novel system based on spatial and direction modulation (SDM) combined with generalized spatial modulation (GSM) which is aided by covert information mapping (CIM), termed as the CIM-GSDM [...] Read more.
In this paper, for the sake of enhancing the security of wireless transmission, we proposed a novel system based on spatial and direction modulation (SDM) combined with generalized spatial modulation (GSM) which is aided by covert information mapping (CIM), termed as the CIM-GSDM system. In such a system, the legitimated user is equipped with distributed receivers so as to demodulate the conveyed signal by exploiting its indices while disturbing eavesdroppers for information security. More specifically, part of the information is modulated into the indices of the legitimated distributed receiver subsets with the aid of the mapped covert information and the interference matrix, while another part of the message is arranged by conventional amplitude-phase modulation. The proposed system can reap the benefits from both GSM and CIM to make eavesdropper suffer great mixture. Furthermore, the detection scheme and theoretical analysis of error performance are discussed as well. The simulation results exhibit that the bit error rate (BER) performance of legitimate user is much better than that of the eavesdropper while the proposed scheme improves the security compared to the original CIM-SDM system at the same spectral efficiency. Full article
(This article belongs to the Special Issue System Design and Signal Processing for 6G Wireless Communications)
Show Figures

Figure 1

17 pages, 569 KB  
Article
Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission
by Jie Tian, Hao Chen, Zhigang Wang, Xianhua Shi, Zhengyu Ji and Xianglu Li
Sensors 2021, 21(22), 7646; https://doi.org/10.3390/s21227646 - 17 Nov 2021
Cited by 3 | Viewed by 2425
Abstract
Recently, the concept of spatial and direction modulation (SDM) has been developed to reap the advantages of both spatial modulation (SM) and directional modulation (DM). On the one hand, DM ensures the transmission security at the expected direction. On the other hand, the [...] Read more.
Recently, the concept of spatial and direction modulation (SDM) has been developed to reap the advantages of both spatial modulation (SM) and directional modulation (DM). On the one hand, DM ensures the transmission security at the expected direction. On the other hand, the structure of SM-aided distributed receivers can enhance the security even if the eavesdropper is located in the same direction as the legitimate receiver. However, the above advantages are achieved based on the assumption that the eavesdropper is not equipped with distributed receivers. On the other hand, the information security can no longer be guaranteed when the eavesdropper is also equipped with distributed receivers. To alleviate this problem, we considered a joint design of SDM and covert information mapping (CIM) in order to conceive of a more robust structure of CIM-SDM. Furthermore, both the detection performances at the eavesdropper and the legitimate user were quantified through theoretical derivation. In general, both the analysis and simulation results supported that the proposed CIM-SDM structure provides more robust secure performance compared to the original SDM, even if the extreme condition of distributed receivers at the eavesdropper is considered, at the cost of moderate performance loss at the legitimate user. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Back to TopTop