2019
DOI: 10.1109/jsyst.2019.2918168
|View full text |Cite
|
Sign up to set email alerts
|

Power Allocation Strategies for Secure Spatial Modulation

Abstract: In secure spatial modulation (SM) networks, power allocation (PA) strategies are investigated in this paper under the total power constraint. Considering that there is no closed-form expression for secrecy rate (SR), an approximate closed-form expression of SR is presented, which is used as an efficient metric to optimize PA factor and can greatly reduce the computation complexity. Based on this expression, a convex optimization (CO) method of maximizing SR (Max-SR) is proposed accordingly. Furthermore, a meth… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

5
3

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 15 publications
(20 reference statements)
0
9
0
Order By: Relevance
“…As the total power is constrained, elaborately splitting the power allocated to the CM and allocated to the AN has a great impact on improving the SR performance. In [49] and [50], the approximation of SR based on cut-off rate was invoked to substitute the non-closed SR expression for secure SM systems. Using the approximation as the objection function, the authors in [49] proposed a gradient-based PA method which approached the optimal PA method based on ES.…”
Section: A Typical Sm Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…As the total power is constrained, elaborately splitting the power allocated to the CM and allocated to the AN has a great impact on improving the SR performance. In [49] and [50], the approximation of SR based on cut-off rate was invoked to substitute the non-closed SR expression for secure SM systems. Using the approximation as the objection function, the authors in [49] proposed a gradient-based PA method which approached the optimal PA method based on ES.…”
Section: A Typical Sm Systemmentioning
confidence: 99%
“…Using the approximation as the objection function, the authors in [49] proposed a gradient-based PA method which approached the optimal PA method based on ES. In [50], a novel criterion that maximizes the ratio of Bob's SLNR and of Eve's AN-to-leakage plus noise ratio (ANLNR) was conceived which was close to the optimal PA factor and also reduced some computational complexity. To further reduce the computational complexity and approach the optimal SR performance, the authors in [51] proposed a deep-neuralnetwork (DNN)-based PA strategy whose key idea was to treat the input and output of ES algorithm as an unknown nonlinear mapping and used a DNN to approximate it.…”
Section: A Typical Sm Systemmentioning
confidence: 99%
“…As how to achieve a secure transmission is becoming a hot research topic in wireless networks, physical layer security [7], [8] in MIMO systems has been widely investigated. There are several ways to improve the performance of SM including transmit antenna selection [9]- [13], linear precoding [14], [15], power allocation [16], [17] and so on. In [18], the author enhanced the legitimate security by jointly precoding optimization with and without eavesdroppong channel state information (CSI).…”
Section: Introductionmentioning
confidence: 99%
“…There are several ways to improve the performance of SM including transmit antenna selection [6]- [8], linear precoding [9], [10], power allocation [11], [12] and so on. The physical layer security of conventional SM is an urgent problem.…”
Section: Introductionmentioning
confidence: 99%
“…The problem of power allocation (PA) between confidential message and artificial noise (AN) [18], [19] was addressed in [11]. And the authors in [11], [12] have proposed two PA strategies with performance approaching that of the optimal PA factor.…”
Section: Introductionmentioning
confidence: 99%