Wei, Z;
Masouros, C;
Liu, F;
(2020)
Secure Directional Modulation with Few-Bit Phase Shifters: Optimal and Iterative-Closed-Form Designs.
IEEE Transactions on Communications
p. 1.
10.1109/tcomm.2020.3032459.
(In press).
Preview |
Text
DM20191203.pdf - Accepted Version Download (4MB) | Preview |
Abstract
In this paper, directional modulation (DM) is investigated to enhance physical layer security. Practical transmitter designs are exploited under imperfect channel state information (CSI) and hardware constraints, such as finite-resolution phase shifters (PSs) and per-antenna power budget. Tailored for the practical issues in realizing DM, a series of practical scenarios are investigated. Starting from the scenario where eavesdroppers (Eve)s’ information is completely unknown, corresponding designs are proposed to optimize legitimate users (LU)s’ receiving performance while randomizing the Eves’ received signal. When the Eves’ CSI is imperfectly known, in the second scenario, the Eves’ receiving performance is further deteriorated by imposing destructive interference to the Eves. For each scenario, three algorithms are proposed under hardware constraints and imperfect CSI, i.e. one direct-mapping algorithm suitable for high/moderate number of bits in PSs, one heuristic algorithm with improved receiving performance at the cost of complexity, and one iterative-closed-form algorithm with enhanced practicality of symbol-level based DM. Simulation demonstrates that the algorithms achieve lower symbol error rate (SER) at the LUs while significantly deteriorating the Eves’ SER, leading to an improved secrecy throughput over the benchmarks.
Type: | Article |
---|---|
Title: | Secure Directional Modulation with Few-Bit Phase Shifters: Optimal and Iterative-Closed-Form Designs |
Open access status: | An open access version is available from UCL Discovery |
DOI: | 10.1109/tcomm.2020.3032459 |
Publisher version: | https://doi.org/10.1109/tcomm.2020.3032459 |
Language: | English |
Additional information: | This version is the author accepted manuscript. For information on re-use, please refer to the publisher’s terms and conditions. |
Keywords: | Directional modulation, Hardware impairments, Imperfect channel estimation, Interference exploitation, Iterativeclosed-form precoding, Physical layer security |
UCL classification: | UCL UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Electronic and Electrical Eng |
URI: | https://discovery.ucl.ac.uk/id/eprint/10113672 |
Archive Staff Only
View Item |