2019
DOI: 10.3390/s19224833
|View full text |Cite
|
Sign up to set email alerts
|

Directional Modulation-Enhanced Multiple Antenna Arrays for Secure and Precise Wireless Transmission

Abstract: Directional modulation (DM) technique has the ability to enhance the physical layer security (PLS) of wireless communications. Conventional DM schemes are usually based on a single antenna array with the basic assumption that eavesdroppers (Eves) and legitimate users (LUs) are in different directions. However, it is possible that Eves are in the same direction as LUs in practical applications. As a result, signals received by Eves will be approximately the same or even in better quality than those received by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 60 publications
1
9
0
Order By: Relevance
“…In Figure 6, we compare the SINR of the proposed scheme with the method in [18]. The signal models in Figure 6 are both three antenna arrays (AAs).…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In Figure 6, we compare the SINR of the proposed scheme with the method in [18]. The signal models in Figure 6 are both three antenna arrays (AAs).…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The projection matrix of AN can be constructed by zero-forcing [9], null-space projection [10], or iteration convex optimization methods [11]. Directional modulation for different types of arrays is also a research hotspot, including the switched antenna array [12], the intelligent reflecting surfaces (IRS) [13], the 4-D antenna array [14,15], the frequency diverse array (FDA) [16,17], and the multiple antenna arrays (MAAs) [18]. A spread-spectrum directional modulation technique based on a switched antenna array is proposed in [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…• [29]- [31]: From the {secrecy capacity definition in (21) to (23) in [29]; secrecy rate definition in (42) to (46) in [30]; secrecy rate definition in (60) to (65) in [31]}, it is realized that the authors assumed that legitimate and eavesdropping receivers sample the signals at the same time instant.…”
Section: Secure Reception Regions 'Propagate' In Range As Time Elamentioning
confidence: 99%
“…To this end, researchers have turned their interests towards physical layer security (PLS) as a potential way to complement the traditional cryptographic techniques [2,3]. PLS enables the confidential transmissions by only exploiting the intrinsic properties of a wireless environment, e.g., node spatial distribution [4], aggregate interference [5,6], wireless propagation medium [7,8].…”
Section: Introductionmentioning
confidence: 99%