3 research outputs found

    Physical Layer Security of Generalised Pre-coded Spatial Modulation with Antenna Scrambling

    Full text link
    We now advocate a novel physical layer security solution that is unique to our previously proposed GPSM scheme with the aid of the proposed antenna scrambling. The novelty and contribution of our paper lies in three aspects: 1/ principle: we introduce a `security key' generated at Alice that is unknown to both Bob and Eve, where the design goal is that the publicly unknown security key only imposes barrier for Eve. 2/ approach: we achieve it by conveying useful information only through the activation of RA indices, which is in turn concealed by the unknown security key in terms of the randomly scrambled symbols used in place of the conventional modulated symbols in GPSM scheme. 3/ design: we consider both Circular Antenna Scrambling (CAS) and Gaussian Antenna Scrambling (GAS) in detail and the resultant security capacity of both designs are quantified and compared

    Generalised Precoded Spatial Modulation for Integrated Wireless Information and Power Transfer

    Full text link
    Conventional wireless information transfer by modulating the amplitude, phase or frequency leads to an inevitable Rate-Energy (RE) trade-off in the presence of simultaneous Wireless Power Transfer (WPT). In echoing Varshney's seminal concept of jointly transmitting both information and energy, we propose the so-called Generalised Precoded Spatial Modulation (GPSM) aided Integrated Wireless Information and Power Transfer (IWIPT) concept employing a power-split receiver. The principle of GPSM is that a particular subset of Receive Antennas (RA) is activated and the activation pattern itself conveys useful information. Hence, the novelty of our GPSM aided IWIPT concept is that RA pattern-based information transfer is used in addition to the conventional waveform-based information carried by the classic M-ary modulation. Following the Radio Frequency (RF) to Direct Current (DC) power conversion invoked for WPT at the power-split receiver, the non-coherent detector simply compares the remaining received power accumulated by each legitimate RA pattern for the sake of identifying the most likely RA. This operation is then followed by down-conversion and conventional Base Band (BB) M-ary detection. Both our analysis and simulations show that the RA pattern based information transfer represented in the Spatial Domain (SD) exhibits a beneficial immunity to any potential power conversion induced performance degradation and hence improves the overall RE trade-off when additionally the waveform-based information transfer is also taken into account. Moreover, we investigate the impact of realistic imperfect Channel State Information at the Transmitter (CSIT) as well as that of the antenna correlations encountered. Finally, the system's asymptotic performance is characterised in the context of large-scale Multiple Input Multiple Output (MIMO) systems

    Localisation, Communication and Networking with VLC: Challenges and Opportunities

    Full text link
    The forthcoming Fifth Generation (5G) era raises the expectation for ubiquitous wireless connectivity to enhance human experiences in information and knowledge sharing as well as in entertainment and social interactions. The promising Visible Light Communications (VLC) lies in the intersection field of optical and wireless communications, where substantial amount of new knowledge has been generated by multi-faceted investigations ranging from the understanding of optical communications and signal processing techniques to the development of disruptive networking solutions and to the exploitation of joint localisation and communications. Building on these new understandings and exciting developments, this paper provides an overview on the three inter-linked research strands of VLC, namely localisation, communications and networking. Advanced recent research activities are comprehensively reviewed and intriguing future research directions are actively discussed, along with the identifications of a range of challenges, both for enhancing the established applications and for stimulating the emerging applications
    corecore