2020
DOI: 10.1109/mnet.001.1900258
|View full text |Cite
|
Sign up to set email alerts
|

Directional Modulation: A Physical-Layer Security Solution to B5G and Future Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(27 citation statements)
references
References 12 publications
0
27
0
Order By: Relevance
“…There are few studies regarding secure DM transmission for a multiple antenna arrays model. In [40], the authors presented a concept of secure and precise wireless transmission by using DM, random subcarrier selection with randomization procedure, and phase alignment at the DM transmitter for PLS. Inspired by the multiple antenna arrays idea presented in [40,41,42], we are dedicated to achieving secure and precise DM transmissions based on a multiple antenna arrays model for the purpose of addressing the neighbor security issue that exists in traditional DM schemes.…”
Section: Introductionmentioning
confidence: 99%
“…There are few studies regarding secure DM transmission for a multiple antenna arrays model. In [40], the authors presented a concept of secure and precise wireless transmission by using DM, random subcarrier selection with randomization procedure, and phase alignment at the DM transmitter for PLS. Inspired by the multiple antenna arrays idea presented in [40,41,42], we are dedicated to achieving secure and precise DM transmissions based on a multiple antenna arrays model for the purpose of addressing the neighbor security issue that exists in traditional DM schemes.…”
Section: Introductionmentioning
confidence: 99%
“…During offpeak time, contents are distributed to the small base station and satisfied the requests via edge network at peak time. In our further work, we will study how to insure physical-layer security [45][46][47] or use SE (searchable encryption) [48], [49] for the considered system. In addition, the application of the considered caching strategy in this paper into the IIoT [50], [51] should be studied in the future.…”
Section: Discussionmentioning
confidence: 99%
“…The proposed DM technique can be typically applied to the future line-of-sight (LoS) communication networks. The potential application scenarios include future Internet of things (IoT), vehicular communications, smart transportation, military communications, satellite communications, unmanned aerial vehicle (UAV) networks [29], and mm-wave communications [8,37].…”
Section: Our Contributionmentioning
confidence: 99%
“…To this end, researchers have turned their interests towards physical layer security (PLS) as a potential way to complement the traditional cryptographic techniques [2,3]. PLS enables the confidential transmissions by only exploiting the intrinsic properties of a wireless environment, e.g., node spatial distribution [4], aggregate interference [5,6], wireless propagation medium [7,8].…”
Section: Introductionmentioning
confidence: 99%