Skip to main content

Secure spatial modulation based on two-dimensional generalized weighted fractional Fourier transform encryption

Abstract

In this paper, a two-dimensional generalized weighted fractional Fourier transform (2DGWFRFT) and constellation scrambling (CS)-based secure spatial modulation (SM) scheme, called 2DGWFRFT-CS-SM, is proposed to enhance the physical layer security (PLS) of the wireless communication system. The proposed scheme is executed by two steps. In the first step, 2DGWFRFT is implemented as the security kernel for PLS provision. In the second step, the parameters of 2DGWFRFT, regarded as the encryption core, control the antenna number rotation to further enhance the security of the SM modulation symbol. Both the 2DGWFRFT signal generation strategy and the SM system including the transfer process have been elaborated to depict the security mechanism of the proposed scheme. Moreover, we give a key extraction algorithm utilized to generate the parameters, which can help scramble the antenna serial number. From the perspective of signal characteristics, the uniqueness of variation in the constellation has been investigated to outperform other cryptography-based encryption algorithms. Finally, the secrecy rates and the energy efficiency of our proposed scheme are theoretically analyzed and evaluated via Monte Carlo simulations, demonstrating that the proposed scheme can achieve a much higher secrecy capacity than artificial noise schemes without requiring additional jamming power consumption and myriad costs of hardware.

1 Introduction

Due to the broadcast nature of the wireless channel, confidential messages can be easily wiretapped by illegitimate receivers, making wireless communications more vulnerable. Traditionally, cryptographic algorithms are the most common way for communication security. However, considering the uniqueness and the inherent security superiority associated with the wireless signal propagation, physical layer security (PLS) is emerging as a promising paradigm to complement the higher layer encryptions for security enhancement [1]. Without relying on upper layers encryption, the inherent randomness of the legitimate link is exploited to prevent eavesdroppers from wiretapping the confidential information [2]. The current development of wireless physical layer security technology has two main directions: one is to generate, manage and distribute keys based on the physical characteristics of the wireless channel, and the other is based on the secrecy capacity and wiretap channel model proposed by Wyner on the basis of Shannon information theory. Specifically, they can be divided into the following aspects: (a) the corresponding security coding strategy is proposed according to the analysis of various types of wiretap channel models and secrecy capacity performance in different wireless channels based on the information theory [3]; (b) beamforming, artificial noise (AN), and cooperative jamming are used in physical layer security schemes [4]; (c) spatial diversity techniques can improve physical layer security, which takes advantage of multi-antenna diversity, multiuser diversity, and cooperative diversity [5]; and (d) the key generated by the wireless channel characteristics can be exploited to encrypt the message [6].

By taking advantage of signal processing in multiple antenna systems, techniques have been developed to explore the extra degrees of freedom for physical layer security [7]. However, issues such as inter-channel interference, inter-antenna synchronization, and multiple radio frequency (RF) chains make the implementation of these schemes unpractical. Recently, spatial modulation (SM) [8] has drawn gradual attention due to its unique structure and it has been introduced to increase energy efficiency and overcome the issues therein compared with the spatial multiplexing multiple-input multiple-output (MIMO) technique [9]. SM works by mapping a block of information bits into two information-carrying units. The first information-carrying unit is an amplitude/phase modulation (APM) symbol chosen from the signal constellation diagram. The second information-carrying unit is a transmit antenna index chosen, while other transmit antennas are not activated [10].

In the SM PLS literature, precoding techniques are always applied for secure communications. The authors in [11,12,13,14] generalized precoding schemes to secure SM with good security performance, which will be described in more detail below. For most conventional precoding-aided SM (PSM) schemes, the antenna indices at the receiver are utilized to carry bits rather than the antenna indices of the transmitter as spatial bits. The optimization of the precoding matrix at the transmitter was to address the issues of preprocessing and detection of PSM signals at the receiver in order to improve bit-error-rate (BER) performance [15]. Additionally, the authors in [11] have proposed a time-varying precoder for the secret PSM, which generated a time-varying interference to the eavesdropper and retained all advantages of PSM at the legal receiver. Then, they also derived the upper bounds for BERs at legal receiver and eavesdropper in the massive MIMO systems in [12] and designed a precoder by jointly minimizing the received power at eavesdropper and maximizing the received power at legal receiver in [13]. The kind of PSM was also extended to secure multiuser MIMO downlink scenario by introducing a scrambling matrix to disturb the eavesdropper [14].

Against this backdrop, conventional PSM schemes’ drawbacks are also reflected. On the one hand, many of them merely rely on AN, which may result in low energy efficiency since a fraction of the transmit power has to be allocated to the AN. On the other hand, some assumptions, such as the perfect channel state information at the transmitter or the transmitter’s antennas outnumber eavesdroppers’ to create a null space for jamming, that are adopted in the information-theoretic secrecy schemes but are not pragmatic to be implemented. Last but not least, the precoding embedded AN scheme demands that all antennas must be turned on at the same time, which is contrary to the original design intention of only one active transmit antenna for SM at each time instant. Meanwhile, this also makes SM directly no different from traditional MIMO, losing its advantages in energy efficiency and material hardware.

One potential solution to address the preceding issues is weighted fractional Fourier transform (WFRFT). WFRFT, known as a novel time–frequency analyzing tool, has been widely applied to wireless PLS transmissions [16,17,18]. Instead of dissipating additional transmission power for friendly jamming, by leveraging the features of WFRFT, the information-bearing signal itself can create an identical AN effect at the eavesdropper while causing no performance degradation on the legitimate receiver. The WFRFT-based system was pioneeringly proposed in [19] and then extended into multi-parameter WFRFT in [20]. Despite multiple versions of WFRFT, e.g., multiple parameters WFRFT and general multifractional FRFT, which have been defined to meet different security requirements, the core security mechanism is identically derived from [21]. In particular, the security parameters of existing WFRFT-based PLS schemes are determined by a single parameter \(\alpha\) only, which significantly limits the security performance of existing schemes.

A novel two-dimensional generalized weighted fractional Fourier transform (2DGWFRFT) and constellation beguiling-based secure SM scheme is proposed in this paper. In the first stage, compared with the traditional WFRFT, by multiple times transformations with different horizontal and vertical dimensions, 2DGWFRFT can further enhance its anti-scanning ability. Inspired by the generalized weighted fractional Fourier transform (GWFRFT) proposed in [22, 23], we remove all frequency-domain components on the basis of WFRFT to form the 2DGWFRFT that only contains time-domain components and thereby adapts the traditional single-link single-carrier spatial modulation. In the second stage, the parameter of the 2DGWFRFT, as the security crux, is generated by the instantaneous channel state over the legitimate link and then exploited to randomize the antenna serial number. Simulation results show that the 2DGWFRFT has all of the desired advantages of the WFRFT, such as requiring no extra jamming signals and confounding the eavesdropper while imposing no impact on the communication of the partner.

The novelty and contribution of this paper are highlighted as follows:

  • We propose a novel 2DGWFRFT scheme for SM with antenna encryption. This scheme uses the antenna index rotation created by 2DGWFRFT parameters to protect the spatial constellation diagram, the invertibility, and uniqueness of which effectively protect the confidential messages from being intercepted by the eavesdroppers while imposing no performance degradation on the legitimate receiver.

  • Combining the technique of secret keys extraction based on the wireless channel, in the antenna index rotation stage an algorithm for secret keys generation is proposed.

  • We study the constellation rotation law about GWFRFT and give the special constellation of 2DGWFRFT for constellation deception.

  • We conduct simulations and give a detailed analysis of security rate and efficiency to illustrate the merits of our scheme.

The rest of this paper is organized as follows. Section 2 presents the definition of WFRFT and the generation method of GWFRFT. In the sequel, Sect. 3 depicts the theoretical model of our proposed system. The secure strategy including 2DGWFRFT and antenna number rotation is described in Sect. 4. We analyze the secrecy mutual information and constellation rotation pattern in Sect.  5. In Sect. 6, the numerical results are shown. Finally, Sect. 7 contains the conclusion.

2 Preliminaries

2.1 Definition of the WFRFT

First of all, we give the definition of one-dimensional 4-WFRFT here. An \(\alpha\) order WFRFT of any complex vector \({\textbf{b}}\) of length N can be expressed as [19]

$$\begin{aligned} {\mathscr {F}}^\alpha [{\textbf{b}}]={\textbf{F}}^\alpha {\textbf{b}}=(\omega _0^\alpha {\textbf{I}}_N + \omega _1^\alpha {\textbf{F}} + \omega _2^\alpha {\textbf{T}} + \omega _3^\alpha {\textbf{T}}{\textbf{F}}){\textbf{b}}, \end{aligned}$$
(1)

where \({\textbf{F}}^\alpha\) is the \(\alpha\) order \(N\times N\) WFRFT matrix and \({\textbf{F}}\) denotes the \(N\times N\) unitary Fourier matrix satisfying \([{\textbf{F}}]_{k,m}:=(1/\sqrt{N}) {\text {exp}}(-2\pi km\sqrt{-1}/N)\). \({\textbf{I}}_N\) is the \(N\times N\) identity matrix and \({\textbf{T}}\) is the shift matrix satisfying \([{\textbf{T}}]_{k,m}=\delta (\langle k+m\rangle _N)\), where \(\langle \cdot \rangle _N\) denotes modulo-N calculation. The weighting coefficients \(\omega _l^\alpha (l = 0,1,2,3)\) are defined as [19]

$$\begin{aligned} \omega _l^\alpha = \frac{1}{4}\sum _{m=0}^3 \exp \left[ \frac{2\pi (\alpha - l)m\sqrt{-1}}{4}\right] \quad (l = 0,1,2,3). \end{aligned}$$
(2)

2.2 GWFRFT

GWFRFT is equivalent to a generalization of the classical WFRFT-based hybrid carrier system whose purpose is to achieve equal component power. As (1) shows, the classical WFRFT signal can be expressed as a weighted sum of four state functions. Likewise, GWFRFT can be seen as a relaxed version of WFRFT, which is described in [23] as

$$\begin{aligned} {\mathscr {F}}^\pm [{\textbf{b}}]=(\omega _0^\pm {\textbf{I}}_N + \omega _1^\pm {\textbf{F}} + \omega _2^\pm {\textbf{T}} + \omega _3^\pm {\textbf{T}}{\textbf{F}}){\textbf{b}}, \end{aligned}$$
(3)

where,

$$\begin{aligned} {\left\{ \begin{array}{ll} \omega _0^\pm =\frac{1}{4}(e^{\pm \phi _0i}+e^{\pm \phi _1i}+e^{\pm \phi _2i}+e^{\pm \phi _3i})\\ \omega _1^\pm =\frac{1}{4}(e^{\pm \phi _0i}-e^{\pm \phi _1i}-e^{\pm \phi _2i}+e^{\pm \phi _3i})\\ \omega _2^\pm =\frac{1}{4}(e^{\pm \phi _0i}-e^{\pm \phi _1i}+e^{\pm \phi _2i}-e^{\pm \phi _3i})\\ \omega _3^\pm =\frac{1}{4}(e^{\pm \phi _0i}+e^{\pm \phi _1i}-e^{\pm \phi _2i}-e^{\pm \phi _3i}), \end{array}\right. } \end{aligned}$$
(4)

\({\textbf{I}}_N\), \({\textbf{F}}\), \({\textbf{T}}\) and \({\textbf{b}}\) have the same physical meaning as the variables in (1); \(\phi _l\) is a eigenvalue whose value is specified in [22]; and \(\omega _l(l=0,1,2,3)\) is the weighted coefficient of the basis function. \(+\) and − present positive and inverse transformation, respectively. Note that GHC could be reduced to the 4-WFRFT when \(\phi _l=\pi l \alpha /2\).

For the frequency selected channels, if the frequency-domain components are suppressed and two time-domain components are retained, the transmitted signal power will be better averaged in the time domain, which is beneficial to suppress selective fading in the frequency domain. In order to achieve the above purpose, GWFRFT is introduced into the diversity method design [22, 23]. For the time dispersion channel, the weighted coefficient of the frequency-domain signal is set to be zero by adjusting \(\phi _l\), i.e., \(\omega ^\pm _l=\omega ^\pm _3=0\). In the period \([0,2\pi )\), the solution is \({\phi _0=\phi _2, \phi _1=\phi _3}\), and the weighting coefficients are expressed as \(\omega _0^\pm =(e^{\pm \phi _0i}+e^{\pm \phi _1i})/2\) and \(\omega _2^\pm =(e^{\pm \phi _0i}-e^{\pm \phi _1i})/2\). In this way, the formulas of the generalized hybrid carrier (GHC) system signals containing only time-domain components are obtained. In our case, this method contributes to us stifling frequency-domain components and provides us opportunities to design signals other than AN to better fit SM’s single-link structures.

3 2DGWFRFT-CS-SM system

We consider the communication model that a transmitter (Alice) sends information to an intended receiver (Bob) in the presence of a passive eavesdropper (Eve). The numbers of antennas equipped by Alice, Bob, and Eve are Nt, Nr, and Ne, respectively. Alice can use the index of transmit antenna (TA) combination to convey \(k_1=\lfloor {\log _2(|{\mathfrak {C}}|)}\) bits, where the set \({\mathfrak {C}}\) includes all combinations associated with choosing 1 TA from Nt TAs. Furthermore, we use \({\mathfrak {C}}(l)\) to represent the \(l\)th combination pattern, \(l\le l \le L=2^{k_1}\). In addition, another \(k_2=\log _2M\) bits are conveyed by M-ary APM symbols \(b_{m}\in {\mathfrak {B}}={b_1,b_2,...,b_M}\), where \({\mathfrak {B}}\) denotes the symbol set and \({\mathbb {E}}[|b_m|^2]=1,\forall m\in [1,M]\).

3.1 System model

The original symbol can then be represented by [11]

$$\begin{aligned} s_m^l=\Omega _lb_m, \end{aligned}$$
(5)

where \(\Omega _l=I[:,{\mathfrak {C}}(l)]\in {\mathbb {C}}^{Nr\times 1}\) is composed of specific columns contained in \({\mathfrak {C}}(l)\) extracted from the identity matrix \({\textbf{I}}\). Note that the antenna rotation begins after each SM symbol performs 2DGWFRFT, of which a specific security strategy will be described in detail in the next section. Therefore, the transmit block can be

$$\begin{aligned} {\textbf{X}}=[s^{l_r}_{1m},s^{l_r}_{2m},...,s^{l_r}_{K m}]= \Omega _{l_r}{\mathscr {F}}_{\textrm{2DGWFRFT}}(b_m), \end{aligned}$$
(6)

where K is the number of subcarriers. l represents the original antenna serial number, while \(l_r\) represents the antenna serial number after encryption and rotation.

As shown in Fig. 1, the received signals are sent into the symbol detector, where the optimal ML criterion is applied in our analysis. The outputs of the detector are operated by spatial demodulation, and further, the transmitted bit information is recovered. The inverse 2DGWFRFT is run in the ML detector.

Fig. 1
figure 1

Basic structure of the proposed system model

For the legitimate receiver Bob and the eavesdropper Eve, the received signals are, respectively, expressed as

$$\begin{aligned} {\textbf{Y}}_{b}= {\textbf{H}}_{b}{\textbf{X}}+{\textbf{W}}_{b}, \end{aligned}$$
(7)
$$\begin{aligned} {\textbf{Y}}_{e}= {\textbf{H}}_{e}{\textbf{X}}+{\textbf{W}}_{e}, \end{aligned}$$
(8)

where \({\textbf{H}}_{b}\in {\mathbb {C}}^{Nr\times Nt}\) and \({\textbf{H}}_{e}\in {\mathbb {C}}^{Ne\times Nt}\) represent the Rayleigh flat fading channel matrices from Alice to Bob and Eve, respectively.\({\textbf{W}}_{b}=[\epsilon _{b1},\epsilon _{b2},...,\epsilon _{bK}]\) \({\textbf{W}}_{e}=[\epsilon _{e1},\epsilon _{e2},...,\epsilon _{eK}]\), where \(\epsilon _{bi}\in {\mathbb {C}}^{Nb \times 1}\) and \(\epsilon _{ei}\in {\mathbb {C}}^{Ne \times 1}\) are complex Gaussian noise vectors with zero mean and covariance matrix \(\sigma _b^2{\textbf{I}}_{Nr}\) and \(\sigma _e^2{\textbf{I}}_{Ne}\) , respectively. In this case, as Bob shares the parameter information with Alice, Bob can recover the information through the optimal maximum likelihood (ML) algorithm as follows:

$$\begin{aligned} \langle \hat{l},\hat{m_1},...,\hat{m_K}\rangle =\mathop {\arg \min }_{\forall m_i\in [1,M],l\in [1,L]}\Big \{ \big \Vert {\textbf{Y}}_{b}-{\textbf{H}}_{b}{\textbf{X}}\big \Vert ^2 \Big \}. \end{aligned}$$
(9)

For the eavesdropper, here we assume: (a) Eve has already obtained the channel state information between Alice and Bob whilst Eve can steal the feedback link or Eve is located very close to Bob. (b) Eve is familiar with 2DGWFRFT but not the accurate parameter. Therefore, Eve may employ the ML algorithm:

$$\begin{aligned} \langle \hat{l},\hat{m_1},...,\hat{m_K}\rangle =\mathop {\arg \min }_{\forall m_i\in [1,M],l\in [1,L]}\Big \{ \big \Vert {\textbf{Y}}_e-{\textbf{H}}_{e}{\textbf{X}}\big \Vert ^2 \Big \}. \end{aligned}$$
(10)

4 Secure strategy

4.1 2DGWFRFT

Since the SM system is suitable for the system characteristics of a single carrier and a large bandwidth [24, 25], in the previous section, in order to adapt this characteristic, we eliminated the frequency-domain component in the WFRFT to form the GWFRFT, which is described as:

$$\begin{aligned} {\mathscr {F}}_{\textrm{GWFRFT}}[{\textbf{b}}]={\textbf{G}}_{\textrm{GHC}}{\textbf{b}}=(\omega _0^+ {\textbf{I}}_N + \omega _2^+ {\textbf{T}}){\textbf{b}}, \end{aligned}$$
(11)

Fully utilizing the structural characteristics of GWFRFT time-domain dual signals, AN injection caused by full-antenna transmission can be avoided, thereby improving energy efficiency. At the same time, it also provides the possibility for the extension of parameter degrees for security and confidentiality. This is where we come up with the 2DGWFRFT.

As shown in Fig. 2, 2DGWFRFT can be regarded as a mathematical transformation of GWFRFT for each row and column of the data matrix. It should be noted that it’s extremely difficult to get the expression for the 2DGWFRFT with arbitrary vector \(W_0\),\(W_2\),\({\overline{W}_{0}}\),\({\overline{W}_{2}}\). However, if the weighted transformation parameters of each row and each column have the same value, i.e.,

$$\begin{aligned} {\left\{ \begin{array}{ll} W_0^1=W_0^2=\cdots =W_0^M=\frac{1}{2}(e^{\phi _0i}+e^{\phi _1i})\\ W_2^1=W_2^2=\cdots =W_2^M=\frac{1}{2}(e^{\phi _0i}-e^{\phi _1i})\\ {\overline{W_0^1}}={\overline{W_0^2}}=\cdots ={\overline{W_0^N}}=\frac{1}{2}(e^{{\overline{\phi _0}}i}+e^{{\overline{\phi _1}}i})\\ {\overline{W_2^1}}={\overline{W_2^2}}=\cdots ={\overline{W_2^N}}=\frac{1}{2}(e^{{\overline{\phi _0}}i}-e^{{\overline{\phi _1}}i}), \end{array}\right. } \end{aligned}$$
(12)

the 2DGWFRFT has a simple expression similar to (11). Assume the 2DGWFRFT signal as \({\textbf{k}}=[k_0,k_1,...,k_{K-1}]^T\). Define the \(K\times K\) permutation matrix as

$$\begin{aligned} {\textbf{P}}_{N,M} = \begin{bmatrix} {\textbf{I}}_{N} \otimes i^T_M(0) \\ {\textbf{I}}_{N} \otimes i^T_M(1) \\ \vdots \\ {\textbf{I}}_{N} \otimes i^T_M(M-1) \\ \end{bmatrix}, \end{aligned}$$

where \({\textbf{I}}_N\) denotes the \(N\times N\) identity matrix, \(\otimes\) denotes the Kronecker product, and \(i^T_M(m)\) denotes the mth column vector of \({\textbf{I}}_M\). Then, the transmitted signal \({\textbf{k}}\) can be expressed as

$$\begin{aligned} {\textbf{k}}&={\mathscr {F}}_{\textrm{2DGWFRFT}}({\textbf{b}})\\&={\textbf{P}}^H_{N,M}({\textbf{I}}_{M}\otimes {\textbf{G}}^{\overline{\phi} _0,\overline{\phi} _1}_{\textrm{GHC-N}}){\textbf{P}}_{N,M}({\textbf{I}}_{N}\otimes {\textbf{G}}^{\phi _0,\phi _1}_{\textrm{GHC-M}}){\textbf{b}}\\&=({\textbf{G}}^{\overline{\phi} _0,\overline{\phi} _1}_{\textrm{GHC-N}}\otimes {\textbf{I}}_M)({\textbf{I}}_N\otimes {\textbf{G}}^{\phi _0,\phi _1}_{\textrm{GHC-M}}){\textbf{b}}\\&=({\textbf{G}}^{\overline{\phi} _0,\overline{\phi} _1}_{\textrm{GHC-N}}\otimes {\textbf{G}}^{\phi _0,\phi _1}_{\textrm{GHC-M}}){\textbf{b}}. \end{aligned}$$
(13)

where \(({\textbf{I}}_{N}\otimes {\textbf{G}}^{\phi _0,\phi _1}_{\textrm{GHC-M}})\), \({\textbf{P}}_{N,M}\), \(({\textbf{I}}_{M}\otimes {\textbf{G}}^{\overline{\phi} _0,\overline{\phi} _1}_{\textrm{GHC-N}})\) and \({\textbf{P}}^H_{N,M}\) correspond to the row-wise precoding of \({\textbf{G}}^{\phi _0,\phi _1}_{\textrm{GHC-M}}\), the row-wise write, the column-wise precoding of \({\textbf{G}}^{\overline{\phi} _0,\overline{\phi} _1}_{\textrm{GHC-N}}\) and the row-wise read operations, respectively.

Fig. 2
figure 2

Schematic of the proposed 2DGWFRFT

Similarly, the inverse transformation expression is:

$$\begin{aligned} {\textbf{b}}&={\mathscr {F}}_{\textrm{2DGWFRFT}}({\textbf{k}})\\&=({\textbf{I}}_{N}\otimes {\textbf{G}}^{-(\phi _0,\phi _1)}_{\textrm{GHC-M}}){\textbf{P}}^H_{N,M}({\textbf{I}}_{M}\otimes {\textbf{G}}^{-(\overline{\phi} _0,\overline{\phi} _1)}_{\textrm{GHC-N}}){\textbf{P}}_{N,M}{\textbf{k}}\\&=({\textbf{I}}_N\otimes {\textbf{G}}^{-(\phi _0,\phi _1)}_{\textrm{GHC-M}})({\textbf{G}}^{-(\overline{\phi} _0,\overline{\phi} _1)}_{\textrm{GHC-N}}\otimes {\textbf{I}}_M){\textbf{k}}\\&=({\textbf{G}}^{-(\overline{\phi} _0,\overline{\phi} _1)}_{\textrm{GHC-N}}\otimes {\textbf{G}}^{-(\phi _0,\phi _1)}_{\textrm{GHC-M}}){\textbf{b}}. \end{aligned}$$
(14)

4.2 Antenna number rotation

Herein, we elaborate on the antenna scrambling process with reference to Fig. 3. We denote the original antenna index vector without antenna scrambling as \(\Omega _l\), which is the lth column of the identity matrix \({\textbf{I}}\), and hence the process of selecting a new antenna index vector is as follows:

Step 1:

First, we can extract the secret key by channel probing [26], measurements quantization [27, 28], information reconciliation [29], and privacy amplification [30]. Bits with common information are subsequently utilized to create parameters that dominate the 2DGWFRFT for secure communication. And the parameters will be updated in real-time as the channel detection changes.

Step 2:

It is necessary to select Nt pairs from the \(M+N\) pairs applied to Fig. 2 as the parameter keys, and this set can be expressed as \((\Phi _0^1,\Phi _1^1),...,(\Phi _0^l,\Phi _1^l),...,(\Phi _0^{Nt},\Phi _1^{Nt})\).

Step 3:

Calculate their numerical parameters separately and sort them by size, rename them to \(\left| \lambda _1 \right| ^2,...,\left| \lambda _l \right| ^2,...,\left| \lambda _{Nt} \right| ^2\), i.e.,\(\left| \lambda _1 \right| ^2=\min \left\{\left| \frac{\Phi _0^1}{\Phi _1^1}\right| ^2,...,\left| \frac{\Phi _0^l}{\Phi _1^l}\right| ^2,...,\left| \frac{\Phi _0^{Nt}}{\Phi _1^{Nt}}\right| ^2\right\}\), \(\left| \lambda _{Nt} \right| ^2=\max \left\{\left| \frac{\Phi _0^1}{\Phi _1^1}\right| ^2,...,\left| \frac{\Phi _0^l}{\Phi _1^l}\right| ^2,...,\left| \frac{\Phi _0^{Nt}}{\Phi _1^{Nt}}\right| ^2\right\}\). So that we have \(\left| \lambda _1 \right| ^2\leqslant \cdots \leqslant \left| \lambda _l \right| ^2\leqslant \cdots \leqslant \left| \lambda _{Nt} \right| ^2\).

Step 4:

The scrambling mapping is performed in the form of \(\Omega _l\rightarrow \left| \frac{\Phi _0^l}{\Phi _1^l}\right| ^2\rightarrow \left| \lambda _l \right| ^2 \rightarrow \Omega _{lr}\). For example, the original antenna index information bit is 00, the original antenna index activation vector is \(\Omega _l=[1,0,0,0]^T\) (that means the first antenna is activated for transmission), and \(\left| \frac{\Phi _0^l}{\Phi _1^l}\right| ^2\) is ranked second according to the selected key. Hence, the new index vector after scrambling mapping is \(\Omega _{lr}=[0,1,0,0]^T\).

Fig. 3
figure 3

Scrambling mapping design

Unlike the physical layer security schemes with precoding or artificial noise injection, the proposed mapping-varied spatial modulation does not engage the random channel properties of the legitimate link in the transmitted signal shaping but utilizes the randomness of channel state patterns over the legitimate link to vary the information parameter key at the transmitter. The fundamental advantages behind this scheme are twofold: (1) No artificial noise is injected at the transmitter. As such, the transmit power is fully taken by useful information and high energy efficiency is achieved, which will be formulated in Sect. 5.3. (2) The decoding complexity at the legitimate receiver is the same as that of the classical SM. Therefore, the confidentiality of information transmission can be further improved while the advantages of the existing SM system have been retained without requiring more physical resources or computational complexity.

5 Performance evaluation

5.1 Analysis of secrecy capacity

According to (9), the proposed scheme viewed from Bob represents a special channel, the input symbols \({\textbf{X}}\) of which are discrete with finite alphabets, and the output signals \({\textbf{Y}}_b\) of which are continuous. Such discrete-input continuous-output memoryless channels, although lacking a closed-form expressions for evaluation of their capacity, can be readily satisfied in a practical communication system [31]. First, the conditional probability distribution function (PDF) of \(y_b\) can be expressed as

$$\begin{aligned} p(y_b|s^{l_r}_{km})=\frac{1}{(\pi \sigma _b^2)^{Nr}}\exp \left( \frac{-\Vert y_b-s^{l_r}_{km} \Vert ^2}{\sigma _b^2} \right) . \end{aligned}$$
(15)

Since \(l_r\) and km are uniform distributed, the PDF of \(y_b\) can be expressed as

$$\begin{aligned} p(y_b)=\frac{1}{NtM}\sum _{n=0}^{Nt-1}\sum _{m=0}^{M-1}\\&\times \left[ \frac{1}{(\pi \sigma _b^2)^{Nr}}\exp \left( \frac{-\Vert y_b-s^{l_r}_{km} \Vert ^2}{\sigma _b^2} \right) \right] . \end{aligned}$$
(16)

Let \(s_{m,l}^{n,k}=s_{km}^{l_r}-s_{kn}^{k_r},n\in [1,M^{Ns}],k\in [1,L]\). Then, we obtain Bob’s mutual information as

$$\begin{aligned} &I(y_b;s^{l_r}_{km})\\&\quad =\int \sum _{n=0}^{Nt-1}\sum _{m=0}^{M-1}p(y_b,s^{l_r}_{km})\log _2\frac{p(y_b,s^{l_r}_{km})}{p(y_b)p(s^{l_r}_{km})}{\text {d}}y_b\\&\quad = \frac{1}{MNt}\sum _{n=0}^{Nt-1}\sum _{m=0}^{M-1}\int p(y_b|s^{l_r}_{km})\log _2\frac{p(y_b|s^{l_r}_{km})}{p(y_b)}{\text {d}}y_b\\&\quad = \log _2MNt-\frac{1}{MNt}\sum _{n=0}^{Nt-1}\sum _{m=0}^{M-1}\int p(y_b|s^{l_r}_{km}){\text {d}}y_b\\&\quad \times \log _2 \left( \frac{\sum _{n=0}^{Nt-1}\sum _{m=0}^{M-1}p(y_b|s^{l_r}_{km})}{p(y_b|s^{l_r}_{km})}{\text {d}}y_b \right) \\&\quad =\log _2MNt-\frac{1}{MNt}\sum _{n=0}^{Nt-1}\sum _{m=0}^{M-1}{\mathbb {E}}_{{\textbf{H}}_b,\varepsilon _b}\\&\quad \times \left[ \log _2 \left( \sum _{n=0}^{Nt-1}\sum _{m=0}^{M-1}\exp \left( \frac{-\Vert s_{m,l}^{n,k}+\varepsilon _b \Vert ^2+\Vert \varepsilon _b \Vert ^2}{\sigma _b^2}\right) \right) \right] \\. \end{aligned}$$
(17)

As stated in Sect. 3, since Eve does not know the parameter, she cannot get the correct antenna rotation value and constellation rotation value. Therefore, we have

$$\begin{aligned} p(h_b=h_e|y_e)= p(l=\hat{l_e})=p(h_b)=\frac{1}{Nt}, \end{aligned}$$
(18)
$$\begin{aligned} p(s_m=s_e|y_e)= p(m=\hat{m_e})=p(s_m)=\frac{1}{M}, \end{aligned}$$
(19)

Considering (8) and (10), it is easy to get

$$\begin{aligned} p(s^{l_r}_{km}|y_e)&=p(l=\hat{l_e},m=\hat{m_e}|y_e)\\&=p(l=\hat{l_e})p(m=\hat{m_e})\\&=\frac{1}{NtM}=p(s^{l_r}_{km}), \end{aligned}$$
(20)

Multiplying both sides of (20) by \(p(y_e)\) yields

$$\begin{aligned} p(y_e,s^{l_r}_{km})=p(y_e)p(s^{l_r}_{km}), \end{aligned}$$
(21)

Then, we have Eve’s mutual information as

$$\begin{aligned} &I(y_e;s^{l_r}_{km})\\&\quad =\int \sum _{n=0}^{Nt-1}\sum _{m=0}^{M-1}p(y_e,s^{l_r}_{km})\log _2\frac{p(y_e,s^{l_r}_{km})}{p(y_e)p(s^{l_r}_{km})}{\text {d}}y_e\\&\quad =\int \sum _{n=0}^{Nt-1}\sum _{m=0}^{M-1}p(y_e,s^{l_r}_{km})\log _2\frac{p(y_e)p(s^{l_r}_{km})}{p(y_e)p(s^{l_r}_{km})}{\text {d}}y_e\\&\quad =0. \end{aligned}$$
(22)

Consequently, the ergodic secrecy rate (SR) can be expressed as [32]

$$\begin{aligned} R_s&=\max \{0,I(y_b;s^{l_r}_{km})-I(y_e;s^{l_r}_{km})\}=I(y_b;s^{l_r}_{km})\\&=I(y_b;s^l_m). \end{aligned}$$
(23)

5.2 Constellation rotation pattern

As shown in [33], WFRFT is capable of declining the recognition probability of the eavesdropper due to change signal characteristics by adjusting the transform order, which has high potential in anti-recognition. However, some limitations of the existing hybrid carrier systems have emerged. On the one hand, the parameters that can be selected for the disguise of the signal characteristics are limited, which has an adverse effect on the promotion of security. On the other hand, there is no specific analytical solution to the constellation transformation general rules in the literature, thus lacking guidance in practical signal concealment applications. To illustrate the constellation pattern features and improve the performance, in this subsection, three propositions are proved and we introduce the special constellations into the field of anti-recognition.

Let the constellation set of the original symbols be \(\Omega =\{r_0e^{j\varphi _0}\}\), and we take non-normalized 4 phase shift keying (PSK) or quadrature amplitude modulation (QAM) as an example to analyze the regular pattern of the constellation. In this case, the initial constellation set is \(\Omega _{\mathrm{4-QAM}}=\{\sqrt{2}e^{j\frac{\pi }{4}},\sqrt{2}e^{j\frac{3\pi }{4}},\sqrt{2}e^{-j\frac{3\pi }{4}},\) \(\sqrt{2}e^{-j\frac{\pi }{4}}\}\). As shown in Fig. 4, the constellation can be expressed as \(\Omega _{\textrm{GWRFT}}=\{ \omega _0^+x_1+\omega _2^+x_2| x_1,x_2\in \Omega _{\mathrm{4-QAM}} \}\). In the sequel, we use Euler’s formula to rewrite the numerical results in Table 1, and we can obtain the coordinate expression in Table 2 with rotation angle \(\theta _1,\theta _2\) as independent variables, where \(a_1=\sin \theta _1\), \(a_2=\sin \theta _2\), \(b_1=\cos \theta _1\), \(b_2=\cos \theta _2\).

Fig. 4
figure 4

Constellation pattern of GWFRFT

Table 1 Coordinate expression in Euler’s formula
Table 2 Coordinate expression with \(\theta _1, \theta _2\)

Proposition 1

Four groups of three points \((O,x_{12},x_{14})\), \((O,x_{21},x_{23})\),\((O,x_{32},x_{34})\),\((O,x_{41},x_{43})\) are collinear, respectively.

Proof

To prove the three points are collinear, according to the knowledge of plane geometry, we only need to verify the slope relationship satisfies \(k_{Ox_{12}}=k_{Ox_{14}}\).

Case 1 Suppose that \(\theta _1+\theta _2\ne \frac{\pi }{2}\). Then, we need attest \(k_{Ox_{12}}=\frac{\sin \theta _2+\cos \theta _1}{\cos \theta _2-\sin \theta _1}=\frac{\sin \theta _1+\cos \theta _2}{\cos \theta _1-\sin \theta _2}=k_{Ox_{14}}\), i.e., \(\cos ^2\theta _2-\sin ^2\theta _1=\cos ^2\theta _1-\sin ^2\theta _2\), Based on Pythagorean identity

$$\begin{aligned} \cos ^2\theta _2+\sin ^2\theta _2=\cos ^2\theta _1+\sin ^2\theta _1=1, \end{aligned}$$
(24)

Thus, \(k_{Ox_{12}}=k_{Ox_{14}}\) is proved.

Case 2 Suppose that \(\theta _1+\theta _2=\frac{\pi }{2}\), we have \(\cos \theta _2-\sin \theta _1=0\), then we have

$$\begin{aligned} {\overrightarrow{Ox_{12}}}&=(\cos \theta _2-\sin \theta _1,\sin \theta _2+\cos \theta _1)\\&=(0,\sin \theta _2+\cos \theta _1), \end{aligned}$$
(25)

Meanwhile,

$$\begin{aligned} {\overrightarrow{Ox_{14}}}&=(\cos \theta _2-\sin \theta _1,\sin \theta _1+\cos \theta _2)\\&=(0,\sin \theta _1+\cos \theta _2). \end{aligned}$$
(26)

That means \(O,x_{12},x_{14}\) are all on axis Y.

Similarly, the other three groups are collinear as well and thus the proof is complete. \(\square\)

Proposition 2

Parallelograms x11x12x13x14, x21x22x23x24, x31x32x33x34, x41x42x43x44 are squares.

Proof

Given that x11x12x13x14 is a parallelogram, to prove that it is a square, we only need to validate that its adjacent sides are equal and two adjacent internal angles are \(90^{\circ }\).

$$\begin{aligned}{} & {} {\overrightarrow{x_{11}x_{12}}}=(\cos \theta _2-\cos \theta _1,\sin \theta _2-\sin \theta _1), \end{aligned}$$
(27)
$$\begin{aligned}{} & {} {\overrightarrow{x_{11}x_{14}}}=(-\sin \theta _2+\sin \theta _1,\cos \theta _2-\cos \theta _1), \end{aligned}$$
(28)
$$\begin{aligned}{} & {} {\overrightarrow{x_{13}x_{14}}}=(\cos \theta _1-\cos \theta _2,\sin \theta _1-\sin \theta _2), \end{aligned}$$
(29)
$$\begin{aligned}{} & {} {\overrightarrow{x_{11}x_{12}}}\cdot {\overrightarrow{x_{11}x_{14}}} \\{} & {} \quad =-\cos \theta _2\sin \theta _2+\sin \theta _2\cos \theta _1+\sin \theta _1\cos \theta _2 \\{} & {} \quad -\sin \theta _1\cos \theta _1+\cos \theta _2\sin \theta _2-\sin \theta _2\cos \theta _1 \\{} & {} \quad -\sin \theta _1\cos \theta _2+\sin \theta _1\cos \theta _1=\vec {0}, \end{aligned}$$
(30)

Similarly, we have \({\overrightarrow{x_{11}x_{12}}} \cdot {\overrightarrow{x_{13}x_{14}}}=\vec {0}\), i.e., \(\angle x_{12}x_{11}x_{14}=\angle x_{13}x_{14}x_{11}=90^{\circ }\). At the same time,

$$\begin{aligned} |{\overrightarrow{x_{11}x_{12}}}|&=\sqrt{(\cos \theta _2-\cos \theta _1)^2+(\sin \theta _2-\sin \theta _1)^2}\\&=|{\overrightarrow{x_{11}x_{14}}}|, \end{aligned}$$
(31)

Thus, x11x12x13x14 is a square. In the same way, that x21x22x23x24, x31x32x33x34, x41x42x43x44 are squares can be verified. \(\square\)

Proposition 3

\(\angle x_{13}Ox_{11}=\angle x_{22}Ox_{24}x_{11}= \angle x_{31}Ox_{33}=\angle x_{42}Ox_{44}=\theta _1-\theta _2\).

Proof

We can calculate the cosine value to determine these angles.

$$\begin{aligned} \cos \angle x_{11}Ox_{13}&=\frac{{\overrightarrow{x_{11}x_{12}}}\cdot \overrightarrow{x_{11}x_{13}}}{|{\overrightarrow{x_{11}x_{12}}}| |{\overrightarrow{x_{11}x_{13}}}|}\\&=\frac{\Psi _1\Psi _2+\Psi _3\Psi _4}{\sqrt{\Psi _1^2+\Psi _3^2}\cdot \sqrt{\Psi _2^2+\Psi _4^2}}\\&=\cos \theta _1\cos \theta _2+\sin \theta _1\sin \theta _2\\&=cos(\theta _1-\theta _2), \end{aligned}$$
(32)

where \(\Psi _1=\cos \theta _1-\sin \theta _1\),\(\Psi _2=\cos \theta _2-\sin \theta _2\),\(\Psi _3=\sin \theta _1+\cos \theta _1\),\(\Psi _4=\sin \theta _2+\cos \theta _2\). \(\square\)

From the proofs of Propositions 1–3, it can be seen that the rotated constellation is only determined by two rotation factors \(\theta _1\),\(\theta _2\). Combined with Fig. 4, \(\theta _1\) is the rotation angle of the initial constellations, and \(\theta _2\) is the split angle of the initial constellations. In a nutshell, the original QPSK can be split into 9-point pattern or a 16-point constellation similar to 16QAM, due to GWFRFT.

Since the constellation after 2DGWFRFT is very complicated when the row and column coefficients of each row and column transformation are not uniform, unless otherwise stated, the following only considers the regular pattern that is satisfied whilst the row and column coefficient transformation is unified, \(\Omega _{\textrm{2DGWRFT}}=\{ \omega _0^+x_1+\omega _2^+x_2| x_1,x_2\in \Omega _{\textrm{GWFRFT}} \}\). Therein, we define that as the transformed constellation set. It can be seen from Fig. 5 that the two rotation splitting processes also follow Propositions 1–3, but the more complicated phenomenon is that the second round parameters continue to split and rotate the GWFRFT pattern. Table 3 shows the parameters’ selection under different scenarios, where \(\mu\) describes the number of points in constellation diagrams. GWFRFT pattern can only provide 4-, 9-, and 16-point constellation features, while 2DGWFRFT can provide \(5^2-16^2\) point constellation features, which is more abundant and free in the number of split points of confusing constellation diagrams. The simulation results show that, on the one hand, the signal can be hidden by changing the physical layer characteristics through the 2DGWFRFT, which makes it difficult to be detected accurately. On the other hand, it can be disguised as a specific signal through parameters design, so that the eavesdropper will misjudge the modulation mode and transform parameters.

Fig. 5
figure 5

Special constellation diagrams of 2DGWFRFT

The comparison of our scheme with the traditional SM is shown in Fig. 6. In the traditional SM, illustrated in Fig. 6a, a fixed number of information bits are mapped into constellation panels in the 3D signal domain through conventional modulation techniques, thus making the interception of the modulation type a tractable task. Unlike the traditional SM system, as is depicted in Fig. 6b, the proposed 2DGWFRFT-SC-SM preserves the single-link structure without consuming additional artificial perturbation power compared to AN schemes. Furthermore, the active antennas and modulation type change dynamically according to different parameters, which makes it hard for the eavesdropper to know the right constellation mapping design and can guarantee the security of the wireless communication.

Fig. 6
figure 6

Constellation diagram comparison between the proposed scheme and the traditional SM

Table 3 Parameter selection under different scenarios in Fig. 5

5.3 Energy efficiency

In MIMO systems, the capacity is directly proportional to the number of antennas. Each antenna is connected to its own RF chain which leads to unnecessary dissipation of power in MIMO communication and incurs additional system costs. SM can be applied to alleviate this issue. By choosing different activation patterns at the transmitter, various SM members provide a flexible design to meet different specific requirements and trade-offs among spectral efficiency, energy efficiency, deployment cost, and system performance [34, 35]. We define the spectral efficiency (SE) as

$$\begin{aligned} \eta _{\textrm{SE}}=\frac{R_b}{W}, \end{aligned}$$
(33)

where W represents the bandwidth and the energy efficiency (EE) is given by

$$\begin{aligned} \Omega _{\textrm{EE}}=\frac{\eta _{\textrm{SE}}}{\omega N_F}, \end{aligned}$$
(34)

where \(\omega\) represents the energy consumption of a transmitting symbol and \(N_F\) represents the number of RF chains.

In order to make the analysis more comprehensive, we consider the SM-MIMO PLS scheme mentioned in [32, 36, 37] as a contrast. Compared with the scheme in [32], except for Eve’s capacity, the rest of the simulation parameters are the same, which means, our algorithm can achieve a higher secrecy capacity. In the sequel, we will only focus on the comparison between [36, 37] and our scheme. From Table 4, we can see all the simulation parameters. To compare the energy efficiency, we define \(r_{\textrm{EE}}\), \(r_{\textrm{SE}}\) and \(r_{\textrm{EC}}\) are the ratio of the energy efficiency, spectral efficiency, and energy consumption, respectively, between our scheme and [36]. In [36], all TAs are utilized to transmit modulated signals plus jamming signals. Note that the secrecy enhancement comes at the cost of multiple active RF antennas and excess jamming power. The simulation parameters are the same as our scheme. Obviously, the maximum effective information bits of our scheme (\(R_1\)) and the scheme proposed in [36] (\(R_2\)) are identical, which are given by

$$\begin{aligned} R_2=R_1=\log _2M+\log _2Nt, \end{aligned}$$
(35)

For this scheme, the secrecy rate increases with the growth of the excess jamming power. Here, we assume that the excess jamming power is equal to the modulated signal power. Assuming there is no error in the transmission process, \(r_{\textrm{SE}}\), \(r_{\textrm{EC}}\), and \(r_{\textrm{EE}}\) should be calculated as:

$$\begin{aligned} r_{\textrm{SE}}= \frac{R_1W}{R_2W}=1, \end{aligned}$$
(36)
$$\begin{aligned} r_{\textrm{EC}}= \frac{PT_s}{NtPT_s}=\frac{1}{Nt}, \end{aligned}$$
(37)
$$\begin{aligned} r_{\textrm{EE}}= \frac{r_{\textrm{SE}}}{r_{\textrm{EC}}}=Nt. \end{aligned}$$
(38)

Different from the proposed [36], the novel scheme in [37] only use half of the N antennas to transmit symbols, where the maximum effective information bits \((R_3)\) are given by

$$\begin{aligned} R_3=\frac{Nt}{2}(\log _2M+1), \end{aligned}$$
(39)

We define \(r^{\prime }_{\textrm{SE}}\), \(r^{\prime }_{\textrm{EC}}\), and \(r^{\prime }_{\textrm{EE}}\) as the ratio of the spectral efficiency, energy consumption, and energy efficiency, respectively, between the 2DGWFRFT-CS-SM scheme and the scheme proposed in [37]. Assuming there is no error in the transmission process, \(r^{\prime }_{\textrm{SE}}\), \(r^{\prime }_{\textrm{EC}}\) and \(r^{\prime }_{\textrm{EE}}\) should be calculated as:

$$\begin{aligned} r^{\prime }_{\textrm{SE}}= & {} \frac{R_1W}{R_3W}=\frac{2(\log _2M+\log _2Nt)}{Nt(\log _2M+1)}, \end{aligned}$$
(40)
$$\begin{aligned} r^{\prime }_{\textrm{EC}}= & {} \frac{PT_s}{\frac{Nt}{2}PT_s}=\frac{2}{Nt}, \end{aligned}$$
(41)
$$\begin{aligned} r^{\prime }_{\textrm{EE}}= & {} \frac{r^{\prime }_{\textrm{SE}}}{r^{\prime }_{\textrm{EC}}}=\frac{\log _2M+\log _2Nt}{\log _2M+1}. \end{aligned}$$
(42)

where P represents the energy required for transmitting each symbol.

The result of \(r_{\textrm{SE}}\), \(r_{\textrm{EE}}\), \(r^{\prime }_{\textrm{SE}}\), and \(r^{\prime }_{\textrm{EE}}\) with different modulation order and \(N=8\) is depicted in Fig. 7. Compared with the conventional PLS SM system, \(r_{\textrm{SE}}\) and \(r_{\textrm{EE}}\) remain as modulation order decreases. Note that the \(r_{\textrm{EE}}\) is always 8, which means the 2DGWFRFT-CS-SM scheme has a significant advantage in saving energy at no cost of SE. Compared with the SM-MIMO physical-layer encryption scheme proposed in [37], \(r^{\prime }_{\textrm{SE}}\) and \(r^{\prime }_{\textrm{EE}}\) decrease as modulation order increases. Note that \(r^{\prime }_{\textrm{EE}}\) is always between 1 and 2, while \(\eta _{\textrm{SE}}\) of the 2DGWFRFT-SM scheme is just a little bit lower than the scheme’s proposed in [37]. That is to say, our scheme sacrifices a little cost of SE to improve EE, which balances a trade-off between SE and EE.

Fig. 7
figure 7

\(r_{\textrm{SE}}\), \(r_{\textrm{EE}}\), \(r^{\prime }_{\textrm{SE}}\), \(r^{\prime }_{\textrm{EE}}\) with different modulation order

Table 4 Comparison of conventional SM security algorithms

6 Simulation results

In this section, numerical results are provided to evaluate the proposed method. Without loss of generality, we suppose Bob and Eve have equal noise energy in their received signals, i.e., \(\sigma ^2_b=\sigma ^2_e\). Additionally, PSK or QAM constellation symbol is adopted and signal-to-noise ratio (SNR) is defined as \(1/\sigma ^2_b\).

Figures 8 and 9 manifest a comparison of BER performance between legitimate users and eavesdroppers of the proposed scheme. Firstly, in Figs. 8 and 9, Bob’s BER decreases rapidly with SNR while Eve’s BER is nearly 0.5 for all SNRs, which indicates that there is no information leaked to Eve from both of the spatial and constellation bits under various numbers of transmit antennas. Secondly, the BER of Bob is very close to that of [38], whereas, for Eve, only about 0.5 BER performance is attained, which means our proposed scheme can drastically increase Eve’s BER at the cost of Bob’s hardly performance loss. Finally, we can observe that in high SNRs, 0.18 for Eve with mapping information and 0.05 for Eve with 2DGWFRFT are achieved, respectively. BER of Eve with mapping information is always worse than the other’s due to the fact that GHC serves more contributions to further deteriorating the signal reception, which has evidently illustrated the inherent PHY security of 2DGWFRFT.

Fig. 8
figure 8

Performance of BER versus SNR of Bob and Eve for \(Nr=Ne=4\)

Fig. 9
figure 9

BER performance of the proposed scheme with analytical result and simulation

From the perspective of mutual information theory, Fig. 10 depicts the SR comparison of the proposed scheme and WFRFT with different parameters. An interesting phenomenon is observed that except \(\Delta \alpha =0.1\), in other cases the SR is monotonic under low SNR conditions. This phenomenon indicates that in most scenarios the effect of WFRFT parameters is more obvious than SNR. In other words, when parameter difference is minimal, the parameter dominates at low SNRs, while the channel gain takes precedence at high SNRs. What’s more, the 2DGWFRFT curve is always at a high position as a consequence that the SR under this scheme is equal to Bob’s capacity regardless of the parameters.

Fig. 10
figure 10

Secrecy rate comparison of the proposed scheme and WFRFT with \(Ne=1\) under different parameters

Figure 11 shows the SR comparison between our proposed scheme and the existing SM-based physical layer security solutions. All schemes are guaranteed to have the same transmission rate of \(3\,{\text {bp/s/Hz}}\). Compared with [39], our proposed approach can achieve an upper bound more quickly at low SNR. We can see that the SR of [11] deteriorates as the number of Eve’s receive antennas increases, contrary to this, our proposed scheme remains constant. The reason for this phenomenon lies in the fact that the SR obtained by the proposed scheme depends on the superiority provided by 2DGWFRFT, rather than the secrecy of channel gains.

Fig. 11
figure 11

Secrecy rate comparison with different schemes versus Ne

7 Conclusions

We consider the problem of secure communication in the presence of passive eavesdroppers in this paper. In order to enhance the PHY security, we proposed a novel physical layer security scheme based on spatial modulation, whereby both 2DGWFRFT and constellation scrambling method are implemented. The constellation scrambling method can ensure the security, while compared with WFRFT, GWFRFT is extended into a 2D paradigm to provide more freedom of degree in constellation pattern design for the enhanced PHY security provision. Analysis of SR verifies that the proposed scheme can effectively confound the eavesdropper while imposing no impact on the legitimate receivers. Both the theoretical analysis and numerical simulations show that the proposed scheme can achieve a much higher secrecy capacity than AN schemes without requiring additional jamming power consumption.

Availability of data and materials

Not applicable.

Abbreviations

AN:

Artificial noise

APM:

Amplitude/phase modulation

BER:

Bit error rate

CS:

Constellation scrambling

EE:

Energy efficiency

GHC:

Generalized hybrid carrier

GWFRFT:

Generalized weighted fractional Fourier transform

MIMO:

Multiple-input multiple-output

ML:

Maximum likelihood

PDF:

Probability distribution function

PLS:

Physical layer security

PSK:

Phase shift keying

PSM:

Precoding-aided spatial modulation

QAM:

Quadrature amplitude modulation

RF:

Radio frequency

SE:

Spectral efficiency

SM:

Spatial modulation

SNR:

Signal-to-noise radio

SR:

Secrecy rate

TA:

Transmit antenna

2DGWFRFT:

Two-dimensional generalized weighted fractional Fourier transform

WFRFT:

Weighted fractional Fourier transform

References

  1. C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949). https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

    Article  MATH  Google Scholar 

  2. S. Leung-Yan-Cheong, M. Hellman, The gaussian wire-tap channel. IEEE Trans. Inf. Theory 24(4), 451–456 (1978). https://doi.org/10.1109/TIT.1978.1055917

    Article  MATH  Google Scholar 

  3. A.D. Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355–1387 (1975). https://doi.org/10.1002/j.1538-7305.1975.tb02040.x

    Article  MATH  Google Scholar 

  4. M. Pei, J. Wei, K.-K. Wong, X. Wang, Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI. IEEE Trans. Wirel. Commun. 11(2), 544–549 (2012). https://doi.org/10.1109/TWC.2011.120511.110567

    Article  Google Scholar 

  5. L. Dong, Z. Han, A.P. Petropulu, H.V. Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010). https://doi.org/10.1109/TSP.2009.2038412

    Article  MATH  Google Scholar 

  6. K. Zeng, Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun. Mag. 53(6), 33–39 (2015). https://doi.org/10.1109/MCOM.2015.7120014

    Article  Google Scholar 

  7. Y. Liu, H.-H. Chen, L. Wang, Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun. Surv. Tutor. 19(1), 347–376 (2017). https://doi.org/10.1109/COMST.2016.2598968

    Article  Google Scholar 

  8. R.Y. Mesleh, H. Haas, S. Sinanovic, C.W. Ahn, S. Yun, Spatial modulation. IEEE Trans. Veh. Technol. 57(4), 2228–2241 (2008). https://doi.org/10.1109/TVT.2007.912136

    Article  Google Scholar 

  9. M.D. Renzo, H. Haas, P.M. Grant, Spatial modulation for multiple-antenna wireless systems: a survey. IEEE Commun. Mag. 49(12), 182–191 (2011). https://doi.org/10.1109/MCOM.2011.6094024

    Article  Google Scholar 

  10. N. Ishikawa, S. Sugiura, L. Hanzo, 50 years of permutation, spatial and index modulation: from classic RF to visible light communications and data storage. IEEE Commun. Surv. Tutor. 20(3), 1905–1938 (2018). https://doi.org/10.1109/COMST.2018.2815642

    Article  Google Scholar 

  11. F. Wu, L.-L. Yang, W. Wang, Z. Kong, Secret precoding-aided spatial modulation. IEEE Commun. Lett. 19(9), 1544–1547 (2015). https://doi.org/10.1109/LCOMM.2015.2453313

    Article  Google Scholar 

  12. F. Wu, C. Dong, L.-L. Yang, W. Wang, Secure wireless transmission based on precoding-aided spatial modulation, in IEEE Global Communications Conference (GLOBECOM) (2015), pp. 1–6. https://doi.org/10.1109/GLOCOM.2015.7417389

  13. F. Wu, R. Zhang, L.-L. Yang, W. Wang, Transmitter precoding-aided spatial modulation for secrecy communications. IEEE Trans. Veh. Technol. 65(1), 467–471 (2016). https://doi.org/10.1109/TVT.2015.2395457

    Article  Google Scholar 

  14. Y. Chen, L. Wang, Z. Zhao, M. Ma, B. Jiao, Secure multiuser mimo downlink transmission via precoding-aided spatial modulation. IEEE Commun. Lett. 20(6), 1116–1119 (2016). https://doi.org/10.1109/LCOMM.2016.2549014

    Article  Google Scholar 

  15. L.-L. Yang, Transmitter preprocessing aided spatial modulation for multiple-input multiple-output systems, in IEEE 73rd Vehicular Technology Conference (VTC Spring) (2011), pp. 1–5. https://doi.org/10.1109/VETECS.2011.5956573

  16. X. Fang, N. Zhang, S. Zhang, D. Chen, X. Sha, X. Shen, On physical layer security: weighted fractional Fourier transform based user cooperation. IEEE Trans. Wirel. Commun. 16(8), 5498–5510 (2017). https://doi.org/10.1109/TWC.2017.2712158

    Article  Google Scholar 

  17. Q. Cheng, V. Fusco, J. Zhu, S. Wang, F. Wang, WFRFT-aided power-efficient multi-beam directional modulation schemes based on frequency diverse array. IEEE Trans. Wirel. Commun. 18(11), 5211–5226 (2019). https://doi.org/10.1109/TWC.2019.2934462

    Article  Google Scholar 

  18. X. Fang, X. Wu, N. Zhang, X. Sha, X. Shen, Safeguarding physical layer security using weighted fractional Fourier transform, IEEE Global Communications Conference (GLOBECOM) (2016), pp. 1–6. https://doi.org/10.1109/GLOCOM.2016.7842239

  19. L. Mei, X. Sha, N. Zhang, The approach to carrier scheme convergence based on 4-weighted fractional Fourier transform. IEEE Commun. Lett. 14(6), 503–505 (2010). https://doi.org/10.1109/LCOMM.2010.06.092413

    Article  Google Scholar 

  20. J. Lang, R. Tao, Q. Ran, Y. Wang, The multiple-parameter fractional Fourier transform. Sci. China Ser. F Inf. Sci. 51(8), 1010–1024 (2008). https://doi.org/10.1007/s11432-008-0073-6

    Article  MATH  Google Scholar 

  21. C.-C. Shih, Fractionalization of Fourier transform. Opt. Commun. 118(5), 495–498 (1995). https://doi.org/10.1016/0030-4018(95)00268-D

    Article  Google Scholar 

  22. C. Ma, X. Sha, L. Mei, X. Fang, An equal component power-based generalized hybrid carrier system. IEEE Commun. Lett. 23(2), 378–381 (2019). https://doi.org/10.1109/LCOMM.2018.2887382

    Article  Google Scholar 

  23. Y. Feng, X. Sha, Y. Li, X. Fang, Y. Zhang, Time-domain dual component computation diversity based on generalized hybrid carrier. China Commun. 18(10), 148–157 (2021). https://doi.org/10.23919/JCC.2021.10.010

    Article  Google Scholar 

  24. P. Yang, Y. Xiao, Y.L. Guan, K.V.S. Hari, A. Chockalingam, S. Sugiura, H. Haas, M. Di Renzo, C. Masouros, Z. Liu, L. Xiao, S. Li, L. Hanzo, Single-carrier SM-MIMO: a promising design for broadband large-scale antenna systems. IEEE Commun. Surv. Tutor. 18(3), 1687–1716 (2016). https://doi.org/10.1109/COMST.2016.2533580

    Article  Google Scholar 

  25. Q. Li, M. Wen, M. Di Renzo, Single-RF MIMO: from spatial modulation to metasurface-based modulation. IEEE Wirel. Commun. 28(4), 88–95 (2021). https://doi.org/10.1109/MWC.021.2000376

    Article  Google Scholar 

  26. U.M. Maurer, Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733–742 (1993). https://doi.org/10.1109/18.256484

    Article  MATH  Google Scholar 

  27. N. Patwari, J. Croft, S. Jana, S.K. Kasera, High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mob. Comput. 9(1), 17–30 (2010). https://doi.org/10.1109/TMC.2009.88

    Article  Google Scholar 

  28. C. Chen, M.A. Jensen, Secret key establishment using temporally and spatially correlated wireless channel coefficients. IEEE Trans. Mob. Comput. 10(2), 205–215 (2011). https://doi.org/10.1109/TMC.2010.114

    Article  Google Scholar 

  29. H. Liu, J. Yang, Y. Wang, Y. Chen, C.E. Koksal, Group secret key generation via received signal strength: protocols, achievable rates, and implementation. IEEE Trans. Mob. Comput. 13(12), 2820–2835 (2014). https://doi.org/10.1109/TMC.2014.2310747

    Article  Google Scholar 

  30. S.N. Premnath, S. Jana, J. Croft, P.L. Gowda, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013). https://doi.org/10.1109/TMC.2012.63

    Article  Google Scholar 

  31. H. Wang, W.-Q. Wang, S. Ji, Joint precoding spatial and rotating symbol modulation for physical-layer security. IEEE Commun. Lett. 23(12), 2150–2153 (2019). https://doi.org/10.1109/LCOMM.2019.2944910

    Article  Google Scholar 

  32. Y. Yang, M. Guizani, Mapping-varied spatial modulation for physical layer security: transmission strategy and secrecy rate. IEEE J. Sel. Areas Commun. 36(4), 877–889 (2018). https://doi.org/10.1109/JSAC.2018.2824598

    Article  Google Scholar 

  33. G. Song, X. Fang, X. Sha, Design and analysis of the EWFRFT-based extended hybrid carrier system, in International Wireless Communications and Mobile Computing (IWCMC) (2021), pp. 1162–1167. https://doi.org/10.1109/IWCMC51323.2021.9498899

  34. M. Wen, B. Zheng, K.J. Kim, M. Di Renzo, T.A. Tsiftsis, K.-C. Chen, N. Al-Dhahir, A survey on spatial modulation in emerging wireless systems: research progresses and applications. IEEE J. Sel. Areas Commun. 37(9), 1949–1972 (2019). https://doi.org/10.1109/JSAC.2019.2929453

    Article  Google Scholar 

  35. D. Sinanović, G. Šišul, A.S. Kurdija, Ž Ilić, Multiple transmit antennas for low PAPR spatial modulation in SC-FDMA: single vs. multiple streams. EURASIP J. Wirel. Commun. Netw. 2020(9), 1–15 (2020). https://doi.org/10.1186/s13638-020-01669-6

    Article  Google Scholar 

  36. L. Wang, S. Bashar, Y. Wei, R. Li, Secrecy enhancement analysis against unknown eavesdropping in spatial modulation. IEEE Commun. Lett. 19(8), 1351–1354 (2015). https://doi.org/10.1109/LCOMM.2015.2440353

    Article  Google Scholar 

  37. S. Wang, W. Li, J. Lei, Physical-layer encryption in massive MIMO systems with spatial modulation. China Commun. 15(10), 159–171 (2018). https://doi.org/10.1109/CC.2018.8485478

    Article  Google Scholar 

  38. R. Mesleh, A. Alhassi, Space Modulation Techniques (Wiley, Hoboken, 2018)

    Book  Google Scholar 

  39. X.-Q. Jiang, M. Wen, H. Hai, J. Li, S. Kim, Secrecy-enhancing scheme for spatial modulation. IEEE Commun. Lett. 22(3), 550–553 (2018). https://doi.org/10.1109/LCOMM.2017.2783955

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to acknowledge all the participants for their contributions to this research study.

Funding

The research activities described in this paper have been conducted within the Natural Science Foundation of China under Grant 61901140, in part by the National Key Research and Development Program of China under Grant 2022YFB2902404, in part by the Natural Science Foundation of China under Grant 62171151, in part by the Natural Science Foundation of Heilongjiang Province of China under Grant YQ2021F003, and in part by the Fundamental Research Funds for the Central Universities under Grant HIT.OCEF.2021012.

Author information

Authors and Affiliations

Authors

Contributions

YH wrote and edited this manuscript. YH and XS conceptualized this study. XF and GS refined the idea. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Xiaojie Fang.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

The manuscript does not contain any individual person data in any form (including individual details, images, or videos), and therefore the consent to publish is not applicable to this article.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, Y., Sha, X., Fang, X. et al. Secure spatial modulation based on two-dimensional generalized weighted fractional Fourier transform encryption. J Wireless Com Network 2023, 13 (2023). https://doi.org/10.1186/s13638-022-02206-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-022-02206-3

Keywords