Premium
Secure transmission via random quadrature spatial modulation
Author(s) -
Qi Xuanzhe,
Luo Junshan,
Wang Hao,
Wang Shilian
Publication year - 2020
Publication title -
transactions on emerging telecommunications technologies
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.366
H-Index - 47
ISSN - 2161-3915
DOI - 10.1002/ett.4002
Subject(s) - eavesdropping , computer science , jamming , secure transmission , spatial modulation , spatial correlation , channel (broadcasting) , decorrelation , transmission (telecommunications) , quadrature (astronomy) , channel state information , mimo , topology (electrical circuits) , algorithm , electronic engineering , computer network , wireless , telecommunications , mathematics , physics , engineering , combinatorics , thermodynamics
In this article, we propose a random quadrature spatial modulation (RQSM) scheme to achieve secure transmission in multiple‐input multiple‐output multiantenna eavesdropper channels. We consider the case in which the eavesdropper has more antennas than that of the legitimate receiver, leading to a strong wiretap channel. In this case, the conventional secure quadrature spatial modulation schemes based on the artificially interfering signals are vulnerable to eavesdropping. On the contrary, the proposed RQSM scheme is able to achieve the physical‐layer security without transmitting artificial noises. Specifically, the bits‐to‐symbol mapping of the proposed RQSM is randomized according to the instantaneous channel state information of the legitimate link. Since in a rich scattering environment, the legitimate and the wiretap channels are generally independent of each other due to the spatial decorrelation property. Thus, the eavesdropper can be considered ignorant of the legitimate channel and cannot decode the confidential messages correctly. We derive the ergodic secrecy rate of the proposed RQSM scheme and show that the secrecy performance does not degrade as the number of antennas at the eavesdropper increases, which also outperforms the conventional jamming strategies. In addition, the bit error rate of the RQSM is also analyzed, which shows that security is achieved without sacrificing the system's reliability. Numerical results validate the theoretical derivations and demonstrate the effectiveness of the proposed RQSM scheme.