2015
DOI: 10.1109/lcomm.2015.2440353
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Enhancement Analysis Against Unknown Eavesdropping in Spatial Modulation

Abstract: In multiple-input-multiple-output (MIMO) wireless communications, spatial modulation (SM) has recently emerged as a new transmission method. This letter explores the physical-layer security in typical SM systems. We present a secrecy rate analysis for multiple antenna destination and eavesdroppers receivers. Targeting against passive eavesdroppers in unknown locations, we study the efficacy of active security measure through joint signal and jamming transmission without the typical requirement of eavesdropper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
78
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 106 publications
(78 citation statements)
references
References 17 publications
0
78
0
Order By: Relevance
“…How to enable SM to transmit confidential messages securely is an attractive and significantly important problem [5]- [7]. In [8], the authors analyzed the secrecy rate (SR) of SM for multiple-antenna destination and eavesdropper receivers. Instead of typical requirements for eavesdropper channel information, they investigated the security performance through joint signal and interference transmissions.…”
Section: Introductionmentioning
confidence: 99%
“…How to enable SM to transmit confidential messages securely is an attractive and significantly important problem [5]- [7]. In [8], the authors analyzed the secrecy rate (SR) of SM for multiple-antenna destination and eavesdropper receivers. Instead of typical requirements for eavesdropper channel information, they investigated the security performance through joint signal and interference transmissions.…”
Section: Introductionmentioning
confidence: 99%
“…How to make SM have a capability to achieve a secure transmission become an important issue for SM networks. In [8], without the knowledge of Eve's location, the confidential messages are securely transmitted from the SM transmitter to the desired receiver by projecting artificial noise (AN) onto the null-space of the desired channel. In [9], the authors proposed a full-duplex desired receiver, where the confidential messages is received and meanwhile AN is emitted to corrupt the illegal receiver (Eve).…”
Section: Introductionmentioning
confidence: 99%
“…The user access is based on NOMA, combined with SM. Although there is literature proposing multi-user SM schemes [26], [27], we use a classical SM designed for point-to-point transmission [6], [28] in vehicular environments. In what follows, we first elaborate on the principles of the proposed NOMA-SM scheme.…”
Section: Introductionmentioning
confidence: 99%