Skip to main content

Table 4 Comparison of conventional SM security algorithms

From: Secure spatial modulation based on two-dimensional generalized weighted fractional Fourier transform encryption

Parameter

Our scheme

[32]

[36]

[37]

Eve capacity

\(R_e\approx 0\)

\(R_{e1}/Nt+R_{e1}/N\)

\(R_e\)

–

NF chain

1

1

\(N_t\)

\(N_t/2\)

\(\eta _{\textrm{SE}}\)

\(\log _2NtM/W\)

\(\log _2NtM/W\)

\(\log _2NtM/W\)

\(Nt\log _2M/2W\)

\(\Omega _{\textrm{EE}}\)

\(\log _2NtM/\omega W\)

\(\log _2NtM/\omega W\)

\(\log _2NtM/\omega WN_F\)

\(Na\log _2M/2\omega WN_F\)