期刊文献+

Security-Enhanced Directional Modulation Based on Two-Dimensional M-WFRFT

下载PDF
导出
摘要 Directional modulation(DM)is one of the most promising secure communication techniques.However,when the eavesdropper is co-located with the legitimate receiver,the conventional DM has the disadvantages of weak anti-scanning capability,anti-deciphering capability,and low secrecy rate.In response to these problems,we propose a twodimensional multi-term weighted fractional Fourier transform aided DM scheme,in which the legitimate receiver and the transmitter use different transform terms and transform orders to encrypt and decrypt the confidential information.In order to further lower the probability of being deciphered by an eavesdropper,we use the subblock partition method to convert the one-dimensional modulated signal vector into a twodimensional signal matrix,increasing the confusion of the useful information.Numerical results demonstrate that the proposed DM scheme not only provides stronger anti-deciphering and anti-scanning capabilities but also improves the secrecy rate performance of the system.
出处 《China Communications》 SCIE CSCD 2024年第5期229-248,共20页 中国通信(英文版)
基金 supported by National Natural Science Foundation of China(No.62171445)。
  • 相关文献

参考文献5

二级参考文献25

  • 1MENG XiangYi TAO Ran WANG Yue.Fractional Fourier domain analysis of decimation and interpolation[J].Science in China(Series F),2007,50(4):521-538. 被引量:15
  • 2Cariolaro G, Erseghe T, Kraniauskas P, et al. A unified framework for the fractional Fourier transforms. IEEE Trans Signal Process, 1998, 46:3206-3219.
  • 3Cariolaro C, Erseghe T, Kraniauskas P, et al. Multiplicity of fractional Fourier transforms and their relationships. IEEE Trans Signal Process, 2000, 48:227- 241.
  • 4Ran Q W, Yeung D S, E. Tsang C C, et al. General multifractional Fourier transform method based on the generalized permutation matrix group. IEEE Trans Signal Process, 2005, 53:83-98.
  • 5Shih C C. Fractionalization of Fourier transform. Opt Commun, 1995, 118:495-498.
  • 6Liu S, Zhang J, Zhang Y. Properties of the fractionalization of a Fourier transform. Opt Commun, 1997, 133:50-54.
  • 7Proakis J G. Digital Communications. 4th ed. Beijing: Publishing House of Electronics Industry, 2006. 147-151.
  • 8BLOCH M, BARROS J, RODRIGUES M R D, et al. Wireless Information Theoretic Security[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2515-2534.
  • 9SHAFiEE S, ULUKUS S. Achievable Rates in Gaussian MISO Channels with Secrecy Con- straints[C]// Proceedings of IEEE Internation- al Symposium on Information Theory: June 24-29, 2007. Nice, France, 2007: 2466-2470.
  • 10KHISTI A, WORNELL G W. Secure Transmis- sion with Multiple Antennas: The MISOME Wiretap Channel[J]. IEEE Transactions on In- formation Theory, 2009, 56(7): 3088-3104.

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部