基于隐蔽信息映射的广义空间方向调制系统的物理层安全增强技术
作者:
作者单位:

1.中国工程物理研究院 电子工程研究所;2.西南科技大学 信息工程学院;3.电子科技大学自动化工程学院

中图分类号:

TP393

基金项目:

中国工程物理研究院院长基金(YZJJZL2024076, 441 YZJJZQ2023012);国家自然科学基金资助项目(62441111);四川省科技计划资助项目(2024NSFSC0476 and 2025YFHZ0199)。


Physical Layer Security Enhancement Techniques for Covert Information Mapped Generalized Spatial and Direction Modulation
Author:
Affiliation:

1.Institute of Electronic Engineering,China Academy of Engineering Physics;2.‌‌ College of Information Engineering,SouthWest University of Science and Technology;3.‌‌ School of Automation Engineering,University of Electronic Science and Technology of China

Fund Project:

the CAEP Foundation under Grant (YZJJZL2024076, YZJJZQ2023012), the National Natural Science Foundation of China under Grant (62441111), and the Sichuan Science and Technology Program (2024NSFSC0476 and 2025YFHZ0199)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [21]
  • | |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    针对无人机基站空对地通信链路易受窃听攻击的问题,本文提出了一种基于隐蔽信息映射的广义空间方向调制系统(Covert Information Mapped Generalized Spatial and Direction Modulation, CIM-GSDM),将信息隐藏于激活接收机子集的索引及其选择组合中,同时引入与合法方信道正交的人工噪声干扰窃听方。为进一步提升系统的传输安全性,本文提出了预编码矩阵和功率分配因子联合优化框架,通过有效管理多波束传输和人工噪声的功率分配,增强系统的安全速率。首先,推导了基于系统安全速率的物理层安全性指标,并以此为优化目标,联合优化预编码矩阵和人工噪声功率分配因子。为解决非凸的联合优化问题,考虑交替优化两个变量,提出了一种基于Nesterov下降的自然梯度下降,通过快速迭代更新预编码矩阵,解决了CIM-GSDM符号候选集规模较大带来的计算复杂度问题。基于合法方信噪比与窃听方干信噪比的乘积最大化准则,推导出功率分配因子的次优闭式解。仿真结果表明,所提优化算法在保证合法方可达速率的前提下,显著降低了窃听方的窃听速率,从而有效保证了CIM-GSDM系统的传输安全性。相比传统波束成形算法及固定功率分配因子的方法,本方法在安全性能上具有显著优势。

    Abstract:

    In response to the vulnerability of UAV-based air-to-ground communication links to eavesdropping attacks, this paper proposes a Covert Information Mapped Generalized Spatial and Direction Modulation (CIM-GSDM) system. The system hides information within the index of the activated receiver subset and their selection combinations, while introducing artificial noise that is orthogonal to the legitimate channel to interfere with the eavesdropper. To further enhance the transmission security of the system, a joint optimization framework for the precoding matrix and power allocation factors is proposed. This framework effectively manages multi-beam transmission and artificial noise power allocation, thereby improving the system"s secure rate. First, the physical layer security metric based on the system"s secure rate is derived, and this is used as the optimization objective for the joint optimization of the precoding matrix and artificial noise power allocation factors. To solve the non-convex joint optimization problem, alternating optimization of the two variables is considered, and a natural gradient descent algorithm based on Nesterov’s method is proposed. This method quickly iterates to update the precoding matrix and resolves the computational complexity issue caused by the large size of the CIM-GSDM symbol candidate set. Based on the criterion of maximizing the product of the legitimate receiver’s signal-to-noise ratio (SNR) and the eavesdropper’s interference-to-signal-plus-noise (ISNR), the suboptimal closed-form solution for the power allocation factor is derived. Simulation results show that the proposed optimization algorithm significantly reduces the eavesdropper’s interception rate while ensuring the legitimate receiver’s achievable rate, effectively securing the transmission in the CIM-GSDM system. Compared to traditional beamforming algorithms and methods with fixed power allocation factors, the proposed method demonstrates a significant advantage in security performance.

    参考文献
    [1] LI R, XIAO Y, YANG P, et al. UAV-aided two-way relaying for wireless communications of intelligent robot swarms [J]. IEEE Access, 2020, 8: 56141-50.
    [2] WU M, XIAO Y, GAO Y, et al. Digital twin for UAV-RIS assisted vehicular communication systems [J]. IEEE Transactions on Wireless Communications, 2023, 23(7): 7638-51.
    [3] WU Y, KHISTI A, XIAO C, et al. A survey of physical layer security techniques for 5G wireless networks and challenges ahead [J]. IEEE Journal on selected areas in communications, 2018, 36(4): 679-95.
    [4] GU Y, WU Z, YIN Z, et al. The secrecy capacity optimization artificial noise: A new type of artificial noise for secure communication in MIMO system [J]. IEEE Access, 2019, 7: 58353-60.
    [5] JIAN J, WANG W-Q, CHEN H, et al. Physical-layer security for multi-user communications with frequency diverse array-based directional modulation [J]. IEEE Transactions on Vehicular Technology, 2023, 72(8): 10133-45.
    [6] HUANG G, CHEN S, DING Y, et al. Security-enhanced directional modulation symbol synthesis using high efficiency time-modulated arrays [J]. IEEE Transactions on Vehicular Technology, 2023, 73(1): 1418-23.
    [7] LI X, CHEN H, XIAO Y, et al. Covert Information Mapping for Spatial and Direction Modulation; proceedings of the 2021 IEEE 21st International Conference on Communication Technology (ICCT), F, 2021 [C]. IEEE.
    [8] TIAN J, CHEN H, WANG Z, et al. Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission [J]. Sensors, 2021, 21(22): 7646.
    [9] ZHONG Y, JI Z, LI X, et al. Covert Information Mapped Generalized Spatial and Direction Modulation toward Secure Wireless Transmission [J]. Sensors, 2024, 24(19): 6333.
    [10] XIE T, ZHU J, LI Y. Artificial-noise-aided zero-forcing synthesis approach for secure multi-beam directional modulation [J]. IEEE Communications Letters, 2017, 22(2): 276-9.
    [11] CHRISTOPHER R M, BORAH D K. Iterative convex optimization of multi-beam directional modulation with artificial noise [J]. IEEE Communications Letters, 2018, 22(8): 1712-5.
    [12] XIAO Y, TANG W, XIAO Y, et al. Directional modulation with cooperative receivers [J]. IEEE Access, 2018, 6: 34992-5000.
    [13] WEN Y, CHEN G, FANG S, et al. RIS-assisted UAV secure communications with artificial noise-aware trajectory design against multiple colluding curious users [J]. IEEE Transactions on Information Forensics and Security, 2024, 19: 3064-76.
    [14] LI N, TAO X, XU J. Artificial noise assisted communication in the multiuser downlink: Optimal power allocation [J]. IEEE communications letters, 2014, 19(2): 295-8.
    [15] CHENG Q, FUSCO V, WANG S, et al. A two-ray multipath model for frequency diverse array-based directional modulation in misome wiretap channels; proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), F, 2019 [C]. IEEE.
    [16] SILVA P E G, NARBUDOWICZ A, MARCHETTI N, et al. Low-complexity dynamic directional modulation: Vulnerability and information leakage [J]. IEEE Internet of Things Journal, 2023, 11(4): 6290-300.
    [17] MANEIRO-CATOIRA R, BRéGAINS J, GARCíA-NAYA J A, et al. Directional Modulation With Artificial-Noise Injection Into Time-Modulated Arrays [J]. IEEE Antennas and Wireless Propagation Letters, 2024.
    [18] WU F, YANG L-L, WANG W, et al. Secret precoding-aided spatial modulation [J]. IEEE Communications Letters, 2015, 19(9): 1544-7.
    [19] ZHANG H, XIAO Y, FU B, et al. Artificial noise-aided spatial and directional modulation systems for secure transmission; proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), F, 2020 [C]. IEEE.
    [20] LUO J, WANG H, WANG F, et al. Secure spatial modulation via radio frequency mirrors [J]. IEEE Transactions on Vehicular Technology, 2020, 69(8): 9168-73.
    [21] Wu Y , Wen C , Xiao C ,et al.Linear Precoding for the MIMO Multiple Access Channel with Finite Alphabet Inputs and Statistical CSI[J].IEEE Transactions on Wireless Communications, 2015, 14(2):983-997.DOI:10.1109/TWC.2014.2363105.
    相似文献
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文
分享
文章指标
  • 点击次数:11
  • 下载次数: 0
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2025-02-25
  • 最后修改日期:2025-03-03
  • 录用日期:2025-03-25
文章二维码