2020 14th European Conference on Antennas and Propagation (EuCAP) 2020
DOI: 10.23919/eucap48036.2020.9135816
|View full text |Cite
|
Sign up to set email alerts
|

Multichannel Dynamic Directional Modulation with Software Defined Radio

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Conventional phased arrays use the suppression of the sidelobe level and formation of zero trap in the interference direction to achieve information transmission, but the effective information of signals in different directions is essentially the same. As an effective means of physical layer encryption, directional modulation [1][2][3][4][5] can achieve the desired direction transmits the correct communication signal and the signal in the non-desired direction is distorted irregularly. The transmitted signal is direction-dependent, which effectively prevents eavesdroppers in the non-desired direction from intercepting the communication signal.…”
Section: Introductionmentioning
confidence: 99%
“…Conventional phased arrays use the suppression of the sidelobe level and formation of zero trap in the interference direction to achieve information transmission, but the effective information of signals in different directions is essentially the same. As an effective means of physical layer encryption, directional modulation [1][2][3][4][5] can achieve the desired direction transmits the correct communication signal and the signal in the non-desired direction is distorted irregularly. The transmitted signal is direction-dependent, which effectively prevents eavesdroppers in the non-desired direction from intercepting the communication signal.…”
Section: Introductionmentioning
confidence: 99%
“…Although there are already works on FD jamming for secrecy purposes [ 18 , 19 ], as far as we are aware there is no practical proof-of-concept with a hardware/software implementation (the authors would like to disclose that this work has been presented, only in part, at the international conference CSNDSP2020 [ 20 ]). Rather, existing works with implementations of physical-layer security schemes tend to focus on secret-key agreement strategies [ 21 , 22 ], deriving security from signaling efforts such as beamforming, channel estimation and spread spectrum [ 23 , 24 , 25 ], or using the physical layer to authenticate users through radio signal analysis [ 26 , 27 , 28 ].…”
Section: Introductionmentioning
confidence: 99%