期刊文献+

波动双径衰落信道下的圆阵方向调制方法 被引量:1

Circular array directional modulation over fluctuating two-ray fading channel
下载PDF
导出
摘要 为了实现对三维空间中任意期望方向的物理层安全通信,提出了一种基于均匀圆阵的方向调制发射机系统模型,使用迫零波束形成发射有用信号的同时用零空间映射法发射随机的人工噪声干扰非期望方向.针对当前对毫米波信号小尺度衰落刻画较好的波动双径(fluctuating two-ray,FTR)衰落信道,推导了本文模型的平均安全容量(average secrecy capacity,ASC)下界、安全中断概率(secrecy outage probability,SOP)上界的闭合表达式,对比了系统安全性能关于信噪比的变化曲线.仿真结果表明,阵元数为64,信噪比为10 dB,圆阵方向调制在期望方向可以无失真地恢复信号,非期望方向误差向量幅度(error vector magnitude,EVM)高达100%,误比特率高于40%.本文方法能在三维空间实现无需密钥的定向安全传输,提高信噪比可改善其在FTR衰落信道下的安全性能. To achieve the physical layer security communication towards any desired direction in 3D space,a directional modulation transmitter model based on uniform circular array is proposed.Zero-forcing beamforming and null space projection are used for useful signals and artificial noise(AN)transmission.Closed-form expressions of lower bound for average secrecy capacity(ASC)and upper bound for secrecy outage possibility(SOP)under fluctuating two-ray(FTR)fading channel are derived.Curves of system security performance against signal-to-noise ratio(SNR)are contrasted.Computer simulations show that the proposed directional modulation achieves undistorted modulated signal in desired direction for circular array with 64 elements and SNR with 10 dB,as well as that the error vector magnitudes(EVM)are up to 100%and BERs are higher than 40%in most undesired directions.Our method can realize secure transmission in 3D space without encryption and its security performance can be improved by larger SNR under FTR fading channel.
作者 周雪涛 赖鹏辉 程骞 王世练 郑林华 ZHOU Xuetao;LAI Penghui;CHENG Qian;WANG Shilian;ZHENG Linhua(School of Electronic Science,National University of Defense Technology,Changsha 410073,China)
出处 《电波科学学报》 EI CSCD 北大核心 2020年第5期656-665,共10页 Chinese Journal of Radio Science
关键词 方向调制 物理层安全 波动双径(FTR)衰落信道 平均安全容量(ASC) 安全中断概率(SOP) directional modulation physical layer security fluctuating two-ray(FTR)fading channel average secrecy capacity(ASC) secrecy output possibility(SOP)
  • 相关文献

参考文献2

二级参考文献11

  • 1Wu Shu-hua, Zhu Yne-fei, and Pu Qiong. Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS [J]. IEEE Communications Letters, 2010, 14(4): 366-368.
  • 2Cheon J H, Hopper N, and Kim Y. Provably secure timed- release public key encryption [J]. ACM Transactions on Information and Systems Security, 2008, 11(2): 1-44.
  • 3Pereira M, Postolache O, and Girao P. Spread spectrum techniques in wireless communication Instrumentation & Measurement Magazine [J]. IEEE 2009, 12(6):21-24.
  • 4Pereira M. Spread spectrum techniques in wireless communication Part 2: transmission issues in free space [J].IEEE Instrumentation & Measurement Magazine, 2010, 13(1): 8-14.
  • 5Jovic B and Unsworth C P. Fast synchronisation of chaotic maps for secure chaotic communications [J]. Electronics Letters, 2010, 46(1): 49-50.
  • 6Li Ke-zan, Zhao Ming-chao, and Fu Xin-chu. Projective synchronization of driving-response systems and its application to secure communication [J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2009, 56(10): 2280-2291.
  • 7Daly M P and Bernhard J T. Beamsteering in pattern reconfigurable arrays using directional modulation [J]. IEEE Transactions on Antennas and Propagation, 2010, 58(7): 2259-2265.
  • 8Daly M P and Bernhard J T. Directional modulation technique for phased arrays [J]. IEEE Transactions on Antennas and Propagation, 2009, 57(9): 2633-2640.
  • 9Daly M P, Daly E L, and Bernhard J T. Demonstration of directional modulation using a phased array [J]. IEEE Transactions on Antennas and Propagation, 2010, 58(5): 1545-1550.
  • 10Babakhani A, Rutledge D B, and Hajimiri A. Transmitter architectures based on near-field direct antenna modulation [J]. IEEE J. Solid-State Circuits, 2008, 43(12): 2674-2692.

共引文献14

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部