Power Allocation Strategies for Secure Spatial Modulation

In this paper, power allocation (PA) strategies in secure spatial modulation networks, are investigated under the total power constraint. Considering that there is no closed-form expression for secrecy rate (SR), an approximate closed-form expression of SR is derived as an efficient metric to optimize PA factor, which can greatly reduce the computation complexity. Based on this expression, a convex optimization (CO) method of maximizing SR (Max-SR) is proposed accordingly. Furthermore, a method of maximizing the product of signal-to-leakage and noise ratio (SLNR) and artificial noise-to-leakage and noise ratio (Max-P-SAN) is proposed to provide an analytic solution for PA factor with extremely low complexity. Simulation results demonstrate that the SR performance of the proposed CO method is close to that of the optimal PA strategy with exhaustive search, and is better than that of Max-P-SAN in the high signal-to-noise ratio (SNR) region. However, in the low and medium SNR regions, the proposed Max-P-SAN slightly outperforms the proposed CO scheme in terms of SR performance.

[1]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[2]  Lie-Liang Yang,et al.  Secret Precoding-Aided Spatial Modulation , 2015, IEEE Communications Letters.

[3]  Michael Mao Wang,et al.  An Efficient Power Allocation Scheme for Leakage-Based Precoding in Multi-Cell Multiuser MIMO Downlink , 2011, IEEE Communications Letters.

[4]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.

[5]  Xianfu Chen,et al.  A Unified Performance Optimization for Secrecy Wireless Information and Power Transfer Over Interference Channels , 2017, IEEE Access.

[6]  Li Wang,et al.  Secrecy Enhancement Analysis Against Unknown Eavesdropping in Spatial Modulation , 2015, IEEE Communications Letters.

[7]  Robert Schober,et al.  Secure Transmission With Large Numbers of Antennas and Finite Alphabet Inputs , 2017, IEEE Transactions on Communications.

[8]  Geoffrey Ye Li,et al.  An Overview of Sustainable Green 5G Networks , 2016, IEEE Wireless Communications.

[9]  Harald Haas,et al.  Spatial Modulation , 2008, IEEE Transactions on Vehicular Technology.

[10]  Feng Shu,et al.  Two High-Performance Schemes of Transmit Antenna Selection for Secure Spatial Modulation , 2018, IEEE Transactions on Vehicular Technology.

[11]  Lie-Liang Yang,et al.  Secure Spatial Modulation With a Full-Duplex Receiver , 2017, IEEE Wireless Communications Letters.

[12]  Ali H. Sayed,et al.  A Leakage-Based Precoding Scheme for Downlink Multi-User MIMO Channels , 2007, IEEE Transactions on Wireless Communications.

[13]  Li Sun,et al.  Anti-Eavesdropping Scheme Based on Quadrature Spatial Modulation , 2017, IEEE Communications Letters.

[14]  Tolga M. Duman,et al.  Joint Precoder and Artificial Noise Design for MIMO Wiretap Channels With Finite-Alphabet Inputs Based on the Cut-Off Rate , 2017, IEEE Transactions on Wireless Communications.

[15]  Lajos Hanzo,et al.  Secure User-Centric Clustering for Energy Efficient Ultra-Dense Networks: Design and Optimization , 2018, IEEE Journal on Selected Areas in Communications.