 Research
 Open access
 Published:
Secure spatial modulation based on twodimensional generalized weighted fractional Fourier transform encryption
EURASIP Journal on Wireless Communications and Networking volumeÂ 2023, ArticleÂ number:Â 13 (2023)
Abstract
In this paper, a twodimensional generalized weighted fractional Fourier transform (2DGWFRFT) and constellation scrambling (CS)based secure spatial modulation (SM) scheme, called 2DGWFRFTCSSM, is proposed to enhance the physical layer security (PLS) of the wireless communication system. The proposed scheme is executed by two steps. In the first step, 2DGWFRFT is implemented as the security kernel for PLS provision. In the second step, the parameters of 2DGWFRFT, regarded as the encryption core, control the antenna number rotation to further enhance the security of the SM modulation symbol. Both the 2DGWFRFT signal generation strategy and the SM system including the transfer process have been elaborated to depict the security mechanism of the proposed scheme. Moreover, we give a key extraction algorithm utilized to generate the parameters, which can help scramble the antenna serial number. From the perspective of signal characteristics, the uniqueness of variation in the constellation has been investigated to outperform other cryptographybased encryption algorithms. Finally, the secrecy rates and the energy efficiency of our proposed scheme are theoretically analyzed and evaluated via Monte Carlo simulations, demonstrating that the proposed scheme can achieve a much higher secrecy capacity than artificial noise schemes without requiring additional jamming power consumption and myriad costs of hardware.
1 Introduction
Due to the broadcast nature of the wireless channel, confidential messages can be easily wiretapped by illegitimate receivers, making wireless communications more vulnerable. Traditionally, cryptographic algorithms are the most common way for communication security. However, considering the uniqueness and the inherent security superiority associated with the wireless signal propagation, physical layer security (PLS) is emerging as a promising paradigm to complement the higher layer encryptions for security enhancement [1]. Without relying on upper layers encryption, the inherent randomness of the legitimate link is exploited to prevent eavesdroppers from wiretapping the confidential information [2]. The current development of wireless physical layer security technology has two main directions: one is to generate, manage and distribute keys based on the physical characteristics of the wireless channel, and the other is based on the secrecy capacity and wiretap channel model proposed by Wyner on the basis of Shannon information theory. Specifically, they can be divided into the following aspects: (a) the corresponding security coding strategy is proposed according to the analysis of various types of wiretap channel models and secrecy capacity performance in different wireless channels based on the information theory [3]; (b) beamforming, artificial noise (AN), and cooperative jamming are used in physical layer security schemes [4]; (c) spatial diversity techniques can improve physical layer security, which takes advantage of multiantenna diversity, multiuser diversity, and cooperative diversity [5]; and (d) the key generated by the wireless channel characteristics can be exploited to encrypt the message [6].
By taking advantage of signal processing in multiple antenna systems, techniques have been developed to explore the extra degrees of freedom for physical layer security [7]. However, issues such as interchannel interference, interantenna synchronization, and multiple radio frequency (RF) chains make the implementation of these schemes unpractical. Recently, spatial modulation (SM) [8] has drawn gradual attention due to its unique structure and it has been introduced to increase energy efficiency and overcome the issues therein compared with the spatial multiplexing multipleinput multipleoutput (MIMO) technique [9]. SM works by mapping a block of information bits into two informationcarrying units. The first informationcarrying unit is an amplitude/phase modulation (APM) symbol chosen from the signal constellation diagram. The second informationcarrying unit is a transmit antenna index chosen, while other transmit antennas are not activated [10].
In the SM PLS literature, precoding techniques are always applied for secure communications. The authors in [11,12,13,14] generalized precoding schemes to secure SM with good security performance, which will be described in more detail below. For most conventional precodingaided SM (PSM) schemes, the antenna indices at the receiver are utilized to carry bits rather than the antenna indices of the transmitter as spatial bits. The optimization of the precoding matrix at the transmitter was to address the issues of preprocessing and detection of PSM signals at the receiver in order to improve biterrorrate (BER) performance [15]. Additionally, the authors in [11] have proposed a timevarying precoder for the secret PSM, which generated a timevarying interference to the eavesdropper and retained all advantages of PSM at the legal receiver. Then, they also derived the upper bounds for BERs at legal receiver and eavesdropper in the massive MIMO systems in [12] and designed a precoder by jointly minimizing the received power at eavesdropper and maximizing the received power at legal receiver in [13]. The kind of PSM was also extended to secure multiuser MIMO downlink scenario by introducing a scrambling matrix to disturb the eavesdropper [14].
Against this backdrop, conventional PSM schemesâ€™ drawbacks are also reflected. On the one hand, many of them merely rely on AN, which may result in low energy efficiency since a fraction of the transmit power has to be allocated to the AN. On the other hand, some assumptions, such as the perfect channel state information at the transmitter or the transmitterâ€™s antennas outnumber eavesdroppersâ€™ to create a null space for jamming, that are adopted in the informationtheoretic secrecy schemes but are not pragmatic to be implemented. Last but not least, the precoding embedded AN scheme demands that all antennas must be turned on at the same time, which is contrary to the original design intention of only one active transmit antenna for SM at each time instant. Meanwhile, this also makes SM directly no different from traditional MIMO, losing its advantages in energy efficiency and material hardware.
One potential solution to address the preceding issues is weighted fractional Fourier transform (WFRFT). WFRFT, known as a novel timeâ€“frequency analyzing tool, has been widely applied to wireless PLS transmissions [16,17,18]. Instead of dissipating additional transmission power for friendly jamming, by leveraging the features of WFRFT, the informationbearing signal itself can create an identical AN effect at the eavesdropper while causing no performance degradation on the legitimate receiver. The WFRFTbased system was pioneeringly proposed in [19] and then extended into multiparameter WFRFT in [20]. Despite multiple versions of WFRFT, e.g., multiple parameters WFRFT and general multifractional FRFT, which have been defined to meet different security requirements, the core security mechanism is identically derived from [21]. In particular, the security parameters of existing WFRFTbased PLS schemes are determined by a single parameter \(\alpha\) only, which significantly limits the security performance of existing schemes.
A novel twodimensional generalized weighted fractional Fourier transform (2DGWFRFT) and constellation beguilingbased secure SM scheme is proposed in this paper. In the first stage, compared with the traditional WFRFT, by multiple times transformations with different horizontal and vertical dimensions, 2DGWFRFT can further enhance its antiscanning ability. Inspired by the generalized weighted fractional Fourier transform (GWFRFT) proposed in [22, 23], we remove all frequencydomain components on the basis of WFRFT to form the 2DGWFRFT that only contains timedomain components and thereby adapts the traditional singlelink singlecarrier spatial modulation. In the second stage, the parameter of the 2DGWFRFT, as the security crux, is generated by the instantaneous channel state over the legitimate link and then exploited to randomize the antenna serial number. Simulation results show that the 2DGWFRFT has all of the desired advantages of the WFRFT, such as requiring no extra jamming signals and confounding the eavesdropper while imposing no impact on the communication of the partner.
The novelty and contribution of this paper are highlighted as follows:

We propose a novel 2DGWFRFT scheme for SM with antenna encryption. This scheme uses the antenna index rotation created by 2DGWFRFT parameters to protect the spatial constellation diagram, the invertibility, and uniqueness of which effectively protect the confidential messages from being intercepted by the eavesdroppers while imposing no performance degradation on the legitimate receiver.

Combining the technique of secret keys extraction based on the wireless channel, in the antenna index rotation stage an algorithm for secret keys generation is proposed.

We study the constellation rotation law about GWFRFT and give the special constellation of 2DGWFRFT for constellation deception.

We conduct simulations and give a detailed analysis of security rate and efficiency to illustrate the merits of our scheme.
The rest of this paper is organized as follows. SectionÂ 2 presents the definition of WFRFT and the generation method of GWFRFT. In the sequel, Sect.Â 3 depicts the theoretical model of our proposed system. The secure strategy including 2DGWFRFT and antenna number rotation is described in Sect.Â 4. We analyze the secrecy mutual information and constellation rotation pattern in Sect.Â 5. In Sect.Â 6, the numerical results are shown. Finally, Sect.Â 7 contains the conclusion.
2 Preliminaries
2.1 Definition of the WFRFT
First of all, we give the definition of onedimensional 4WFRFT here. An \(\alpha\) order WFRFT of any complex vector \({\textbf{b}}\) of length N can be expressed as [19]
where \({\textbf{F}}^\alpha\) is the \(\alpha\) order \(N\times N\) WFRFT matrix and \({\textbf{F}}\) denotes the \(N\times N\) unitary Fourier matrix satisfying \([{\textbf{F}}]_{k,m}:=(1/\sqrt{N}) {\text {exp}}(2\pi km\sqrt{1}/N)\). \({\textbf{I}}_N\) is the \(N\times N\) identity matrix and \({\textbf{T}}\) is the shift matrix satisfying \([{\textbf{T}}]_{k,m}=\delta (\langle k+m\rangle _N)\), where \(\langle \cdot \rangle _N\) denotes moduloN calculation. The weighting coefficients \(\omega _l^\alpha (l = 0,1,2,3)\) are defined as [19]
2.2 GWFRFT
GWFRFT is equivalent to a generalization of the classical WFRFTbased hybrid carrier system whose purpose is to achieve equal component power. AsÂ (1) shows, the classical WFRFT signal can be expressed as a weighted sum of four state functions. Likewise, GWFRFT can be seen as a relaxed version of WFRFT, which is described in [23] as
where,
\({\textbf{I}}_N\), \({\textbf{F}}\), \({\textbf{T}}\) and \({\textbf{b}}\) have the same physical meaning as the variables inÂ (1); \(\phi _l\) is a eigenvalue whose value is specified in [22]; and \(\omega _l(l=0,1,2,3)\) is the weighted coefficient of the basis function. \(+\) and âˆ’ present positive and inverse transformation, respectively. Note that GHC could be reduced to the 4WFRFT when \(\phi _l=\pi l \alpha /2\).
For the frequency selected channels, if the frequencydomain components are suppressed and two timedomain components are retained, the transmitted signal power will be better averaged in the time domain, which is beneficial to suppress selective fading in the frequency domain. In order to achieve the above purpose, GWFRFT is introduced into the diversity method design [22, 23]. For the time dispersion channel, the weighted coefficient of the frequencydomain signal is set to be zero by adjusting \(\phi _l\), i.e., \(\omega ^\pm _l=\omega ^\pm _3=0\). In the period \([0,2\pi )\), the solution is \({\phi _0=\phi _2, \phi _1=\phi _3}\), and the weighting coefficients are expressed as \(\omega _0^\pm =(e^{\pm \phi _0i}+e^{\pm \phi _1i})/2\) and \(\omega _2^\pm =(e^{\pm \phi _0i}e^{\pm \phi _1i})/2\). In this way, the formulas of the generalized hybrid carrier (GHC) system signals containing only timedomain components are obtained. In our case, this method contributes to us stifling frequencydomain components and provides us opportunities to design signals other than AN to better fit SMâ€™s singlelink structures.
3 2DGWFRFTCSSM system
We consider the communication model that a transmitter (Alice) sends information to an intended receiver (Bob) in the presence of a passive eavesdropper (Eve). The numbers of antennas equipped by Alice, Bob, and Eve are Nt, Nr, and Ne, respectively. Alice can use the index of transmit antenna (TA) combination to convey \(k_1=\lfloor {\log _2({\mathfrak {C}})}\) bits, where the set \({\mathfrak {C}}\) includes all combinations associated with choosing 1 TA from Nt TAs. Furthermore, we use \({\mathfrak {C}}(l)\) to represent the \(l\)th combination pattern, \(l\le l \le L=2^{k_1}\). In addition, another \(k_2=\log _2M\) bits are conveyed by Mary APM symbols \(b_{m}\in {\mathfrak {B}}={b_1,b_2,...,b_M}\), where \({\mathfrak {B}}\) denotes the symbol set and \({\mathbb {E}}[b_m^2]=1,\forall m\in [1,M]\).
3.1 System model
The original symbol can then be represented by [11]
where \(\Omega _l=I[:,{\mathfrak {C}}(l)]\in {\mathbb {C}}^{Nr\times 1}\) is composed of specific columns contained in \({\mathfrak {C}}(l)\) extracted from the identity matrix \({\textbf{I}}\). Note that the antenna rotation begins after each SM symbol performs 2DGWFRFT, of which a specific security strategy will be described in detail in the next section. Therefore, the transmit block can be
where K is the number of subcarriers. l represents the original antenna serial number, while \(l_r\) represents the antenna serial number after encryption and rotation.
As shown in Fig.Â 1, the received signals are sent into the symbol detector, where the optimal ML criterion is applied in our analysis. The outputs of the detector are operated by spatial demodulation, and further, the transmitted bit information is recovered. The inverse 2DGWFRFT is run in the ML detector.
For the legitimate receiver Bob and the eavesdropper Eve, the received signals are, respectively, expressed as
where \({\textbf{H}}_{b}\in {\mathbb {C}}^{Nr\times Nt}\) and \({\textbf{H}}_{e}\in {\mathbb {C}}^{Ne\times Nt}\) represent the Rayleigh flat fading channel matrices from Alice to Bob and Eve, respectively.\({\textbf{W}}_{b}=[\epsilon _{b1},\epsilon _{b2},...,\epsilon _{bK}]\) \({\textbf{W}}_{e}=[\epsilon _{e1},\epsilon _{e2},...,\epsilon _{eK}]\), where \(\epsilon _{bi}\in {\mathbb {C}}^{Nb \times 1}\) and \(\epsilon _{ei}\in {\mathbb {C}}^{Ne \times 1}\) are complex Gaussian noise vectors with zero mean and covariance matrix \(\sigma _b^2{\textbf{I}}_{Nr}\) and \(\sigma _e^2{\textbf{I}}_{Ne}\) , respectively. In this case, as Bob shares the parameter information with Alice, Bob can recover the information through the optimal maximum likelihood (ML) algorithm as follows:
For the eavesdropper, here we assume: (a) Eve has already obtained the channel state information between Alice and Bob whilst Eve can steal the feedback link or Eve is located very close to Bob. (b) Eve is familiar with 2DGWFRFT but not the accurate parameter. Therefore, Eve may employ the ML algorithm:
4 Secure strategy
4.1 2DGWFRFT
Since the SM system is suitable for the system characteristics of a single carrier and a large bandwidth [24, 25], in the previous section, in order to adapt this characteristic, we eliminated the frequencydomain component in the WFRFT to form the GWFRFT, which is described as:
Fully utilizing the structural characteristics of GWFRFT timedomain dual signals, AN injection caused by fullantenna transmission can be avoided, thereby improving energy efficiency. At the same time, it also provides the possibility for the extension of parameter degrees for security and confidentiality. This is where we come up with the 2DGWFRFT.
As shown in Fig.Â 2, 2DGWFRFT can be regarded as a mathematical transformation of GWFRFT for each row and column of the data matrix. It should be noted that itâ€™s extremely difficult to get the expression for the 2DGWFRFT with arbitrary vector \(W_0\),\(W_2\),\({\overline{W}_{0}}\),\({\overline{W}_{2}}\). However, if the weighted transformation parameters of each row and each column have the same value, i.e.,
the 2DGWFRFT has a simple expression similar toÂ (11). Assume the 2DGWFRFT signal as \({\textbf{k}}=[k_0,k_1,...,k_{K1}]^T\). Define the \(K\times K\) permutation matrix as
where \({\textbf{I}}_N\) denotes the \(N\times N\) identity matrix, \(\otimes\) denotes the Kronecker product, and \(i^T_M(m)\) denotes the mth column vector of \({\textbf{I}}_M\). Then, the transmitted signal \({\textbf{k}}\) can be expressed as
where \(({\textbf{I}}_{N}\otimes {\textbf{G}}^{\phi _0,\phi _1}_{\textrm{GHCM}})\), \({\textbf{P}}_{N,M}\), \(({\textbf{I}}_{M}\otimes {\textbf{G}}^{\overline{\phi} _0,\overline{\phi} _1}_{\textrm{GHCN}})\) and \({\textbf{P}}^H_{N,M}\) correspond to the rowwise precoding of \({\textbf{G}}^{\phi _0,\phi _1}_{\textrm{GHCM}}\), the rowwise write, the columnwise precoding of \({\textbf{G}}^{\overline{\phi} _0,\overline{\phi} _1}_{\textrm{GHCN}}\) and the rowwise read operations, respectively.
Similarly, the inverse transformation expression is:
4.2 Antenna number rotation
Herein, we elaborate on the antenna scrambling process with reference to Fig.Â 3. We denote the original antenna index vector without antenna scrambling as \(\Omega _l\), which is the lth column of the identity matrix \({\textbf{I}}\), and hence the process of selecting a new antenna index vector is as follows:
 Step 1:

First, we can extract the secret key by channel probing [26], measurements quantization [27, 28], information reconciliation [29], and privacy amplification [30]. Bits with common information are subsequently utilized to create parameters that dominate the 2DGWFRFT for secure communication. And the parameters will be updated in realtime as the channel detection changes.
 Step 2:

It is necessary to select Nt pairs from the \(M+N\) pairs applied to Fig.Â 2 as the parameter keys, and this set can be expressed as \((\Phi _0^1,\Phi _1^1),...,(\Phi _0^l,\Phi _1^l),...,(\Phi _0^{Nt},\Phi _1^{Nt})\).
 Step 3:

Calculate their numerical parameters separately and sort them by size, rename them to \(\left \lambda _1 \right ^2,...,\left \lambda _l \right ^2,...,\left \lambda _{Nt} \right ^2\), i.e.,\(\left \lambda _1 \right ^2=\min \left\{\left \frac{\Phi _0^1}{\Phi _1^1}\right ^2,...,\left \frac{\Phi _0^l}{\Phi _1^l}\right ^2,...,\left \frac{\Phi _0^{Nt}}{\Phi _1^{Nt}}\right ^2\right\}\), \(\left \lambda _{Nt} \right ^2=\max \left\{\left \frac{\Phi _0^1}{\Phi _1^1}\right ^2,...,\left \frac{\Phi _0^l}{\Phi _1^l}\right ^2,...,\left \frac{\Phi _0^{Nt}}{\Phi _1^{Nt}}\right ^2\right\}\). So that we have \(\left \lambda _1 \right ^2\leqslant \cdots \leqslant \left \lambda _l \right ^2\leqslant \cdots \leqslant \left \lambda _{Nt} \right ^2\).
 Step 4:

The scrambling mapping is performed in the form of \(\Omega _l\rightarrow \left \frac{\Phi _0^l}{\Phi _1^l}\right ^2\rightarrow \left \lambda _l \right ^2 \rightarrow \Omega _{lr}\). For example, the original antenna index information bit is 00, the original antenna index activation vector is \(\Omega _l=[1,0,0,0]^T\) (that means the first antenna is activated for transmission), and \(\left \frac{\Phi _0^l}{\Phi _1^l}\right ^2\) is ranked second according to the selected key. Hence, the new index vector after scrambling mapping is \(\Omega _{lr}=[0,1,0,0]^T\).
Unlike the physical layer security schemes with precoding or artificial noise injection, the proposed mappingvaried spatial modulation does not engage the random channel properties of the legitimate link in the transmitted signal shaping but utilizes the randomness of channel state patterns over the legitimate link to vary the information parameter key at the transmitter. The fundamental advantages behind this scheme are twofold: (1) No artificial noise is injected at the transmitter. As such, the transmit power is fully taken by useful information and high energy efficiency is achieved, which will be formulated in Sect.Â 5.3. (2) The decoding complexity at the legitimate receiver is the same as that of the classical SM. Therefore, the confidentiality of information transmission can be further improved while the advantages of the existing SM system have been retained without requiring more physical resources or computational complexity.
5 Performance evaluation
5.1 Analysis of secrecy capacity
According toÂ (9), the proposed scheme viewed from Bob represents a special channel, the input symbols \({\textbf{X}}\) of which are discrete with finite alphabets, and the output signals \({\textbf{Y}}_b\) of which are continuous. Such discreteinput continuousoutput memoryless channels, although lacking a closedform expressions for evaluation of their capacity, can be readily satisfied in a practical communication system [31]. First, the conditional probability distribution function (PDF) of \(y_b\) can be expressed as
Since \(l_r\) and km are uniform distributed, the PDF of \(y_b\) can be expressed as
Let \(s_{m,l}^{n,k}=s_{km}^{l_r}s_{kn}^{k_r},n\in [1,M^{Ns}],k\in [1,L]\). Then, we obtain Bobâ€™s mutual information as
As stated in Sect.Â 3, since Eve does not know the parameter, she cannot get the correct antenna rotation value and constellation rotation value. Therefore, we have
ConsideringÂ (8) andÂ (10), it is easy to get
Multiplying both sides ofÂ (20) by \(p(y_e)\) yields
Then, we have Eveâ€™s mutual information as
Consequently, the ergodic secrecy rate (SR) can be expressed as [32]
5.2 Constellation rotation pattern
As shown in [33], WFRFT is capable of declining the recognition probability of the eavesdropper due to change signal characteristics by adjusting the transform order, which has high potential in antirecognition. However, some limitations of the existing hybrid carrier systems have emerged. On the one hand, the parameters that can be selected for the disguise of the signal characteristics are limited, which has an adverse effect on the promotion of security. On the other hand, there is no specific analytical solution to the constellation transformation general rules in the literature, thus lacking guidance in practical signal concealment applications. To illustrate the constellation pattern features and improve the performance, in this subsection, three propositions are proved and we introduce the special constellations into the field of antirecognition.
Let the constellation set of the original symbols be \(\Omega =\{r_0e^{j\varphi _0}\}\), and we take nonnormalized 4 phase shift keying (PSK) or quadrature amplitude modulation (QAM) as an example to analyze the regular pattern of the constellation. In this case, the initial constellation set is \(\Omega _{\mathrm{4QAM}}=\{\sqrt{2}e^{j\frac{\pi }{4}},\sqrt{2}e^{j\frac{3\pi }{4}},\sqrt{2}e^{j\frac{3\pi }{4}},\) \(\sqrt{2}e^{j\frac{\pi }{4}}\}\). As shown in Fig.Â 4, the constellation can be expressed as \(\Omega _{\textrm{GWRFT}}=\{ \omega _0^+x_1+\omega _2^+x_2 x_1,x_2\in \Omega _{\mathrm{4QAM}} \}\). In the sequel, we use Eulerâ€™s formula to rewrite the numerical results in TableÂ 1, and we can obtain the coordinate expression in TableÂ 2 with rotation angle \(\theta _1,\theta _2\) as independent variables, where \(a_1=\sin \theta _1\), \(a_2=\sin \theta _2\), \(b_1=\cos \theta _1\), \(b_2=\cos \theta _2\).
Proposition 1
Four groups of three points \((O,x_{12},x_{14})\), \((O,x_{21},x_{23})\),\((O,x_{32},x_{34})\),\((O,x_{41},x_{43})\) are collinear, respectively.
Proof
To prove the three points are collinear, according to the knowledge of plane geometry, we only need to verify the slope relationship satisfies \(k_{Ox_{12}}=k_{Ox_{14}}\).
Case 1 Suppose that \(\theta _1+\theta _2\ne \frac{\pi }{2}\). Then, we need attest \(k_{Ox_{12}}=\frac{\sin \theta _2+\cos \theta _1}{\cos \theta _2\sin \theta _1}=\frac{\sin \theta _1+\cos \theta _2}{\cos \theta _1\sin \theta _2}=k_{Ox_{14}}\), i.e., \(\cos ^2\theta _2\sin ^2\theta _1=\cos ^2\theta _1\sin ^2\theta _2\), Based on Pythagorean identity
Thus, \(k_{Ox_{12}}=k_{Ox_{14}}\) is proved.
Case 2 Suppose that \(\theta _1+\theta _2=\frac{\pi }{2}\), we have \(\cos \theta _2\sin \theta _1=0\), then we have
Meanwhile,
That means \(O,x_{12},x_{14}\) are all on axis Y.
Similarly, the other three groups are collinear as well and thus the proof is complete. \(\square\)
Proposition 2
Parallelograms x_{11}x_{12}x_{13}x_{14}, x_{21}x_{22}x_{23}x_{24}, x_{31}x_{32}x_{33}x_{34}, x_{41}x_{42}x_{43}x_{44} are squares.
Proof
Given that x_{11}x_{12}x_{13}x_{14} is a parallelogram, to prove that it is a square, we only need to validate that its adjacent sides are equal and two adjacent internal angles are \(90^{\circ }\).
Similarly, we have \({\overrightarrow{x_{11}x_{12}}} \cdot {\overrightarrow{x_{13}x_{14}}}=\vec {0}\), i.e., \(\angle x_{12}x_{11}x_{14}=\angle x_{13}x_{14}x_{11}=90^{\circ }\). At the same time,
Thus, x_{11}x_{12}x_{13}x_{14} is a square. In the same way, that x_{21}x_{22}x_{23}x_{24}, x_{31}x_{32}x_{33}x_{34}, x_{41}x_{42}x_{43}x_{44} are squares can be verified. \(\square\)
Proposition 3
\(\angle x_{13}Ox_{11}=\angle x_{22}Ox_{24}x_{11}= \angle x_{31}Ox_{33}=\angle x_{42}Ox_{44}=\theta _1\theta _2\).
Proof
We can calculate the cosine value to determine these angles.
where \(\Psi _1=\cos \theta _1\sin \theta _1\),\(\Psi _2=\cos \theta _2\sin \theta _2\),\(\Psi _3=\sin \theta _1+\cos \theta _1\),\(\Psi _4=\sin \theta _2+\cos \theta _2\). \(\square\)
From the proofs of PropositionsÂ 1â€“3, it can be seen that the rotated constellation is only determined by two rotation factors \(\theta _1\),\(\theta _2\). Combined with Fig.Â 4, \(\theta _1\) is the rotation angle of the initial constellations, and \(\theta _2\) is the split angle of the initial constellations. In a nutshell, the original QPSK can be split into 9point pattern or a 16point constellation similar to 16QAM, due to GWFRFT.
Since the constellation after 2DGWFRFT is very complicated when the row and column coefficients of each row and column transformation are not uniform, unless otherwise stated, the following only considers the regular pattern that is satisfied whilst the row and column coefficient transformation is unified, \(\Omega _{\textrm{2DGWRFT}}=\{ \omega _0^+x_1+\omega _2^+x_2 x_1,x_2\in \Omega _{\textrm{GWFRFT}} \}\). Therein, we define that as the transformed constellation set. It can be seen from Fig.Â 5 that the two rotation splitting processes also follow PropositionsÂ 1â€“3, but the more complicated phenomenon is that the second round parameters continue to split and rotate the GWFRFT pattern. TableÂ 3 shows the parametersâ€™ selection under different scenarios, where \(\mu\) describes the number of points in constellationÂ diagrams. GWFRFT pattern can only provide 4, 9, and 16point constellation features, while 2DGWFRFT can provide \(5^216^2\) point constellation features, which is more abundant and free in the number of split points of confusing constellationÂ diagrams. The simulation results show that, on the one hand, the signal can be hidden by changing the physical layer characteristics through the 2DGWFRFT, which makes it difficult to be detected accurately. On the other hand, it can be disguised as a specific signal through parameters design, so that the eavesdropper will misjudge the modulation mode and transform parameters.
The comparison of our scheme with the traditional SM is shown in Fig.Â 6. In the traditional SM, illustrated in Fig.Â 6a, a fixed number of information bits are mapped into constellation panels in the 3D signal domain through conventional modulation techniques, thus making the interception of the modulation type a tractable task. Unlike the traditional SM system, as is depicted in Fig.Â 6b, the proposed 2DGWFRFTSCSM preserves the singlelink structure without consuming additional artificial perturbation power compared to AN schemes. Furthermore, the active antennas and modulation type change dynamically according to different parameters, which makes it hard for the eavesdropper to know the right constellation mapping design and can guarantee the security of the wireless communication.
5.3 Energy efficiency
In MIMO systems, the capacity is directly proportional to the number of antennas. Each antenna is connected to its own RF chain which leads to unnecessary dissipation of power in MIMO communication and incurs additional system costs. SM can be applied to alleviate this issue. By choosing different activation patterns at the transmitter, various SM members provide a flexible design to meet different specific requirements and tradeoffs among spectral efficiency, energy efficiency, deployment cost, and system performance [34, 35]. We define the spectral efficiency (SE) as
where W represents the bandwidth and the energy efficiency (EE) is given by
where \(\omega\) represents the energy consumption of a transmitting symbol and \(N_F\) represents the number of RF chains.
In order to make the analysis more comprehensive, we consider the SMMIMO PLS scheme mentioned in [32, 36, 37] as a contrast. Compared with the scheme in [32], except for Eveâ€™s capacity, the rest of the simulation parameters are the same, which means, our algorithm can achieve a higher secrecy capacity. In the sequel, we will only focus on the comparison between [36, 37] and our scheme. From TableÂ 4, we can see all the simulation parameters. To compare the energy efficiency, we define \(r_{\textrm{EE}}\), \(r_{\textrm{SE}}\) and \(r_{\textrm{EC}}\) are the ratio of the energy efficiency, spectral efficiency, and energy consumption, respectively, between our scheme and [36]. In [36], all TAs are utilized to transmit modulated signals plus jamming signals. Note that the secrecy enhancement comes at the cost of multiple active RF antennas and excess jamming power. The simulation parameters are the same as our scheme. Obviously, the maximum effective information bits of our scheme (\(R_1\)) and the scheme proposed in [36] (\(R_2\)) are identical, which are given by
For this scheme, the secrecy rate increases with the growth of the excess jamming power. Here, we assume that the excess jamming power is equal to the modulated signal power. Assuming there is no error in the transmission process, \(r_{\textrm{SE}}\), \(r_{\textrm{EC}}\), and \(r_{\textrm{EE}}\) should be calculated as:
Different from the proposed [36], the novel scheme in [37] only use half of the N antennas to transmit symbols, where the maximum effective information bits \((R_3)\) are given by
We define \(r^{\prime }_{\textrm{SE}}\), \(r^{\prime }_{\textrm{EC}}\), and \(r^{\prime }_{\textrm{EE}}\) as the ratio of the spectral efficiency, energy consumption, and energy efficiency, respectively, between the 2DGWFRFTCSSM scheme and the scheme proposed in [37]. Assuming there is no error in the transmission process, \(r^{\prime }_{\textrm{SE}}\), \(r^{\prime }_{\textrm{EC}}\) and \(r^{\prime }_{\textrm{EE}}\) should be calculated as:
where P represents the energy required for transmitting each symbol.
The result of \(r_{\textrm{SE}}\), \(r_{\textrm{EE}}\), \(r^{\prime }_{\textrm{SE}}\), and \(r^{\prime }_{\textrm{EE}}\) with different modulation order and \(N=8\) is depicted in Fig.Â 7. Compared with the conventional PLS SM system, \(r_{\textrm{SE}}\) and \(r_{\textrm{EE}}\) remain as modulation order decreases. Note that the \(r_{\textrm{EE}}\) is always 8, which means the 2DGWFRFTCSSM scheme has a significant advantage in saving energy at no cost of SE. Compared with the SMMIMO physicallayer encryption scheme proposed in [37], \(r^{\prime }_{\textrm{SE}}\) and \(r^{\prime }_{\textrm{EE}}\) decrease as modulation order increases. Note that \(r^{\prime }_{\textrm{EE}}\) is always between 1 and 2, while \(\eta _{\textrm{SE}}\) of the 2DGWFRFTSM scheme is just a little bit lower than the schemeâ€™s proposed in [37]. That is to say, our scheme sacrifices a little cost of SE to improve EE, which balances a tradeoff between SE and EE.
6 Simulation results
In this section, numerical results are provided to evaluate the proposed method. Without loss of generality, we suppose Bob and Eve have equal noise energy in their received signals, i.e., \(\sigma ^2_b=\sigma ^2_e\). Additionally, PSK or QAM constellation symbol is adopted and signaltonoise ratio (SNR) is defined as \(1/\sigma ^2_b\).
FiguresÂ 8 and 9 manifest a comparison of BER performance between legitimate users and eavesdroppers of the proposed scheme. Firstly, in Figs.Â 8 and 9, Bobâ€™s BER decreases rapidly with SNR while Eveâ€™s BER is nearly 0.5 for all SNRs, which indicates that there is no information leaked to Eve from both of the spatial and constellation bits under various numbers of transmit antennas. Secondly, the BER of Bob is very close to that of [38], whereas, for Eve, only about 0.5 BER performance is attained, which means our proposed scheme can drastically increase Eveâ€™s BER at the cost of Bobâ€™s hardly performance loss. Finally, we can observe that in high SNRs, 0.18 for Eve with mapping information and 0.05 for Eve with 2DGWFRFT are achieved, respectively. BER of Eve with mapping information is always worse than the otherâ€™s due to the fact that GHC serves more contributions to further deteriorating the signal reception, which has evidently illustrated the inherent PHY security of 2DGWFRFT.
From the perspective of mutual information theory, Fig.Â 10 depicts the SR comparison of the proposed scheme and WFRFT with different parameters. An interesting phenomenon is observed that except \(\Delta \alpha =0.1\), in other cases the SR is monotonic under low SNR conditions. This phenomenon indicates that in most scenarios the effect of WFRFT parameters is more obvious than SNR. In other words, when parameter difference is minimal, the parameter dominates at low SNRs, while the channel gain takes precedence at high SNRs. Whatâ€™s more, the 2DGWFRFT curve is always at a high position as a consequence that the SR under this scheme is equal to Bobâ€™s capacity regardless of the parameters.
FigureÂ 11 shows the SR comparison between our proposed scheme and the existing SMbased physical layer security solutions. All schemes are guaranteed to have the same transmission rate of \(3\,{\text {bp/s/Hz}}\). Compared with [39], our proposed approach can achieve an upper bound more quickly at low SNR. We can see that the SR of [11] deteriorates as the number of Eveâ€™s receive antennas increases, contrary to this, our proposed scheme remains constant. The reason for this phenomenon lies in the fact that the SR obtained by the proposed scheme depends on the superiority provided by 2DGWFRFT, rather than the secrecy of channel gains.
7 Conclusions
We consider the problem of secure communication in the presence of passive eavesdroppers in this paper. In order to enhance the PHY security, we proposed a novel physical layer security scheme based on spatial modulation, whereby both 2DGWFRFT and constellation scrambling method are implemented. The constellation scrambling method can ensure the security, while compared with WFRFT, GWFRFT is extended into a 2D paradigm to provide more freedom of degree in constellation pattern design for the enhanced PHY security provision. Analysis of SR verifies that the proposed scheme can effectively confound the eavesdropper while imposing no impact on the legitimate receivers. Both the theoretical analysis and numerical simulations show that the proposed scheme can achieve a much higher secrecy capacity than AN schemes without requiring additional jamming power consumption.
Availability of data and materials
Not applicable.
Abbreviations
 AN:

Artificial noise
 APM:

Amplitude/phase modulation
 BER:

Bit error rate
 CS:

Constellation scrambling
 EE:

Energy efficiency
 GHC:

Generalized hybrid carrier
 GWFRFT:

Generalized weighted fractional Fourier transform
 MIMO:

Multipleinput multipleoutput
 ML:

Maximum likelihood
 PDF:

Probability distribution function
 PLS:

Physical layer security
 PSK:

Phase shift keying
 PSM:

Precodingaided spatial modulation
 QAM:

Quadrature amplitude modulation
 RF:

Radio frequency
 SE:

Spectral efficiency
 SM:

Spatial modulation
 SNR:

Signaltonoise radio
 SR:

Secrecy rate
 TA:

Transmit antenna
 2DGWFRFT:

Twodimensional generalized weighted fractional Fourier transform
 WFRFT:

Weighted fractional Fourier transform
References
C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656â€“715 (1949). https://doi.org/10.1002/j.15387305.1949.tb00928.x
S. LeungYanCheong, M. Hellman, The gaussian wiretap channel. IEEE Trans. Inf. Theory 24(4), 451â€“456 (1978). https://doi.org/10.1109/TIT.1978.1055917
A.D. Wyner, The wiretap channel. Bell Syst. Tech. J. 54(8), 1355â€“1387 (1975). https://doi.org/10.1002/j.15387305.1975.tb02040.x
M. Pei, J. Wei, K.K. Wong, X. Wang, Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI. IEEE Trans. Wirel. Commun. 11(2), 544â€“549 (2012). https://doi.org/10.1109/TWC.2011.120511.110567
L. Dong, Z. Han, A.P. Petropulu, H.V. Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875â€“1888 (2010). https://doi.org/10.1109/TSP.2009.2038412
K. Zeng, Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun. Mag. 53(6), 33â€“39 (2015). https://doi.org/10.1109/MCOM.2015.7120014
Y. Liu, H.H. Chen, L. Wang, Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun. Surv. Tutor. 19(1), 347â€“376 (2017). https://doi.org/10.1109/COMST.2016.2598968
R.Y. Mesleh, H. Haas, S. Sinanovic, C.W. Ahn, S. Yun, Spatial modulation. IEEE Trans. Veh. Technol. 57(4), 2228â€“2241 (2008). https://doi.org/10.1109/TVT.2007.912136
M.D. Renzo, H. Haas, P.M. Grant, Spatial modulation for multipleantenna wireless systems: a survey. IEEE Commun. Mag. 49(12), 182â€“191 (2011). https://doi.org/10.1109/MCOM.2011.6094024
N. Ishikawa, S. Sugiura, L. Hanzo, 50 years of permutation, spatial and index modulation: from classic RF to visible light communications and data storage. IEEE Commun. Surv. Tutor. 20(3), 1905â€“1938 (2018). https://doi.org/10.1109/COMST.2018.2815642
F. Wu, L.L. Yang, W. Wang, Z. Kong, Secret precodingaided spatial modulation. IEEE Commun. Lett. 19(9), 1544â€“1547 (2015). https://doi.org/10.1109/LCOMM.2015.2453313
F. Wu, C. Dong, L.L. Yang, W. Wang, Secure wireless transmission based on precodingaided spatial modulation, in IEEE Global Communications Conference (GLOBECOM) (2015), pp. 1â€“6. https://doi.org/10.1109/GLOCOM.2015.7417389
F. Wu, R. Zhang, L.L. Yang, W. Wang, Transmitter precodingaided spatial modulation for secrecy communications. IEEE Trans. Veh. Technol. 65(1), 467â€“471 (2016). https://doi.org/10.1109/TVT.2015.2395457
Y. Chen, L. Wang, Z. Zhao, M. Ma, B. Jiao, Secure multiuser mimo downlink transmission via precodingaided spatial modulation. IEEE Commun. Lett. 20(6), 1116â€“1119 (2016). https://doi.org/10.1109/LCOMM.2016.2549014
L.L. Yang, Transmitter preprocessing aided spatial modulation for multipleinput multipleoutput systems, in IEEE 73rd Vehicular Technology Conference (VTC Spring) (2011), pp. 1â€“5. https://doi.org/10.1109/VETECS.2011.5956573
X. Fang, N. Zhang, S. Zhang, D. Chen, X. Sha, X. Shen, On physical layer security: weighted fractional Fourier transform based user cooperation. IEEE Trans. Wirel. Commun. 16(8), 5498â€“5510 (2017). https://doi.org/10.1109/TWC.2017.2712158
Q. Cheng, V. Fusco, J. Zhu, S. Wang, F. Wang, WFRFTaided powerefficient multibeam directional modulation schemes based on frequency diverse array. IEEE Trans. Wirel. Commun. 18(11), 5211â€“5226 (2019). https://doi.org/10.1109/TWC.2019.2934462
X. Fang, X. Wu, N. Zhang, X. Sha, X. Shen, Safeguarding physical layer security using weighted fractional Fourier transform, IEEE Global Communications Conference (GLOBECOM) (2016), pp. 1â€“6. https://doi.org/10.1109/GLOCOM.2016.7842239
L. Mei, X. Sha, N. Zhang, The approach to carrier scheme convergence based on 4weighted fractional Fourier transform. IEEE Commun. Lett. 14(6), 503â€“505 (2010). https://doi.org/10.1109/LCOMM.2010.06.092413
J. Lang, R. Tao, Q. Ran, Y. Wang, The multipleparameter fractional Fourier transform. Sci. China Ser. F Inf. Sci. 51(8), 1010â€“1024 (2008). https://doi.org/10.1007/s1143200800736
C.C. Shih, Fractionalization of Fourier transform. Opt. Commun. 118(5), 495â€“498 (1995). https://doi.org/10.1016/00304018(95)00268D
C. Ma, X. Sha, L. Mei, X. Fang, An equal component powerbased generalized hybrid carrier system. IEEE Commun. Lett. 23(2), 378â€“381 (2019). https://doi.org/10.1109/LCOMM.2018.2887382
Y. Feng, X. Sha, Y. Li, X. Fang, Y. Zhang, Timedomain dual component computation diversity based on generalized hybrid carrier. China Commun. 18(10), 148â€“157 (2021). https://doi.org/10.23919/JCC.2021.10.010
P. Yang, Y. Xiao, Y.L. Guan, K.V.S. Hari, A. Chockalingam, S. Sugiura, H. Haas, M. Di Renzo, C. Masouros, Z. Liu, L. Xiao, S. Li, L. Hanzo, Singlecarrier SMMIMO: a promising design for broadband largescale antenna systems. IEEE Commun. Surv. Tutor. 18(3), 1687â€“1716 (2016). https://doi.org/10.1109/COMST.2016.2533580
Q. Li, M. Wen, M. Di Renzo, SingleRF MIMO: from spatial modulation to metasurfacebased modulation. IEEE Wirel. Commun. 28(4), 88â€“95 (2021). https://doi.org/10.1109/MWC.021.2000376
U.M. Maurer, Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733â€“742 (1993). https://doi.org/10.1109/18.256484
N. Patwari, J. Croft, S. Jana, S.K. Kasera, Highrate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mob. Comput. 9(1), 17â€“30 (2010). https://doi.org/10.1109/TMC.2009.88
C. Chen, M.A. Jensen, Secret key establishment using temporally and spatially correlated wireless channel coefficients. IEEE Trans. Mob. Comput. 10(2), 205â€“215 (2011). https://doi.org/10.1109/TMC.2010.114
H. Liu, J. Yang, Y. Wang, Y. Chen, C.E. Koksal, Group secret key generation via received signal strength: protocols, achievable rates, and implementation. IEEE Trans. Mob. Comput. 13(12), 2820â€“2835 (2014). https://doi.org/10.1109/TMC.2014.2310747
S.N. Premnath, S. Jana, J. Croft, P.L. Gowda, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917â€“930 (2013). https://doi.org/10.1109/TMC.2012.63
H. Wang, W.Q. Wang, S. Ji, Joint precoding spatial and rotating symbol modulation for physicallayer security. IEEE Commun. Lett. 23(12), 2150â€“2153 (2019). https://doi.org/10.1109/LCOMM.2019.2944910
Y. Yang, M. Guizani, Mappingvaried spatial modulation for physical layer security: transmission strategy and secrecy rate. IEEE J. Sel. Areas Commun. 36(4), 877â€“889 (2018). https://doi.org/10.1109/JSAC.2018.2824598
G. Song, X. Fang, X. Sha, Design and analysis of the EWFRFTbased extended hybrid carrier system, in International Wireless Communications and Mobile Computing (IWCMC) (2021), pp. 1162â€“1167. https://doi.org/10.1109/IWCMC51323.2021.9498899
M. Wen, B. Zheng, K.J. Kim, M. Di Renzo, T.A. Tsiftsis, K.C. Chen, N. AlDhahir, A survey on spatial modulation in emerging wireless systems: research progresses and applications. IEEE J. Sel. Areas Commun. 37(9), 1949â€“1972 (2019). https://doi.org/10.1109/JSAC.2019.2929453
D. SinanoviÄ‡, G. Å iÅ¡ul, A.S. Kurdija, Å½ IliÄ‡, Multiple transmit antennas for low PAPR spatial modulation in SCFDMA: single vs. multiple streams. EURASIP J. Wirel. Commun. Netw. 2020(9), 1â€“15 (2020). https://doi.org/10.1186/s13638020016696
L. Wang, S. Bashar, Y. Wei, R. Li, Secrecy enhancement analysis against unknown eavesdropping in spatial modulation. IEEE Commun. Lett. 19(8), 1351â€“1354 (2015). https://doi.org/10.1109/LCOMM.2015.2440353
S. Wang, W. Li, J. Lei, Physicallayer encryption in massive MIMO systems with spatial modulation. China Commun. 15(10), 159â€“171 (2018). https://doi.org/10.1109/CC.2018.8485478
R. Mesleh, A. Alhassi, Space Modulation Techniques (Wiley, Hoboken, 2018)
X.Q. Jiang, M. Wen, H. Hai, J. Li, S. Kim, Secrecyenhancing scheme for spatial modulation. IEEE Commun. Lett. 22(3), 550â€“553 (2018). https://doi.org/10.1109/LCOMM.2017.2783955
Acknowledgements
The authors would like to acknowledge all the participants for their contributions to this research study.
Funding
The research activities described in this paper have been conducted within the Natural Science Foundation of China under Grant 61901140, in part by the National Key Research and Development Program of China under Grant 2022YFB2902404, in part by the Natural Science Foundation of China under Grant 62171151, in part by the Natural Science Foundation of Heilongjiang Province of China under Grant YQ2021F003, and in part by the Fundamental Research Funds for the Central Universities under Grant HIT.OCEF.2021012.
Author information
Authors and Affiliations
Contributions
YH wrote and edited this manuscript. YH and XS conceptualized this study. XF and GS refined the idea. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
Not applicable.
Consent for publication
The manuscript does not contain any individual person data in any form (including individual details, images, or videos), and therefore the consent to publish is not applicable to this article.
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisherâ€™s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Huang, Y., Sha, X., Fang, X. et al. Secure spatial modulation based on twodimensional generalized weighted fractional Fourier transform encryption. J Wireless Com Network 2023, 13 (2023). https://doi.org/10.1186/s13638022022063
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638022022063