1 Physical Layer Security of Generalised Pre-coded Spatial Modulation with Antenna Scrambling arXiv:1706.02494v1 [cs.IT] 8 Jun 2017 Rong Zhang, Lie-Liang Yang and Lajos Hanzo Communications, Signal Processing and Control, School of ECS, University of Southampton, SO17 1BJ, UK Email: rz,lly,
[email protected], http://www-mobile.ecs.soton.ac.uk I. I NTRODUCTION In the last decade or so, physical layer security had been an active research area drawing substantial attentions and collaborative efforts across different societies. Complementary to the conventional application layer security approach dominantly based on cryptography that is potentially vulnerable to quantum computationally capable eavesdropper, physical layer security was envisioned of providing the ultimate security from the information theoretical point of view. This area of research was pioneered by Shannon’s foundation work on secrete communications [1], where the ’one-time pad’ was proposed in order to achieve the perfect security. This landmark finding inspired further intriguing research on the physical layer security of ’wire-tap’ channel [2], where the eavesdropper’s channel between Alice and Eve constitutes a degraded version of the main channel between Alice and Bob. In particular, the important notion of security capacity was formally defined as the capacity difference between the main channel and the eavesdropper’s channel, where a positive security capacity enables physical layer security. The research of physical layer security became much more complicated yet interesting when wireless communications is considered, where the eavesdropper’s channel becomes not necessarily degraded [3], [4], [5] in comparison to the main channel owing to the fast variations of the wireless channel propagation. As a benefit, the classic solution exploited the fast varying Channel State Information (CSI) of the main channel as the security key [6], which was assumed to be only privately known between Alice and Bob. This solution became naturally inappropriate in the graver condition, where the CSI of the main channel became also publicly known to Eve. In this challenging scenario, various signal processing advances appeared particularly in the so-called Multiple Input Multiple Output Multiple Eavesdropper (MIMOME) physical layer security model [7], [8]. More explicitly, when eavesdropper’s channel is optimistically assumed to be known to Alice having multiple antennas, intelligent beam-forming constituted effective solutions. On the other hand, when eavesdropper’s channel is unknown to Alice but its dimension (number of antennas) is known, the technique of generating artificial noise [9] by Alice was found to be powerful, where the artificial noise was pre-processed to lie in the null space of the The financial support of the EPSRC under the India-UK Advanced Technology Centre (IU-ATC), that of the EU under the Concerto project as well as that of the European Research Council’s (ERC) Advanced Fellow Grant is gratefully acknowledged. main channel so as to only affect Eve adversely 1 . However, one common limitation of the above two distinct approaches was the stringent dimensionality requirement, where Alice must have more antennas than Eve. In contrast to the above two design philosophies, we propose a physical layer security solution, without the necessity of obeying the dimensionality requirement, based on our previously proposed Generalised Pre-coded Spatial Modulation (GPSM) scheme [12], [13]. Let us now briefly introduce the background of GPSM scheme before embarking on our novel design. Spatial Modulation (SM) constituted novel Multiple Input Multiple Output (MIMO) technique, which conveys extra information by appropriately activating the Transmit Antenna (TA) indices, in addition to the classic modulation schemes used on each activated TAs, as detailed in [14], [15]. By contrast, the GPSM scheme is capable of conveying extra information by appropriately selecting the Receive Antenna (RA) indices in addition to the classic modulation schemes loaded on each activated RAs, as detailed in [13]. To elaborate a little more, in [13], comprehensive performance comparisons were carried out between the GPSM scheme as well as the conventional MIMO scheme and the associated detection complexity issues were discussed. Furthermore, a range of practical issues were investigated, namely the detrimental effects of realistic imperfect Channel State Information at the Transmitter (CSIT), followed by a low-rank approximation invoked for large-dimensional MIMOs. As a further exploitation, error probability, achievable rate and capacity analysis were conducted in [16]. When physical layer security is considered, early work on SM considered its straightforward use, where the security capacity is firstly reported under various SNRs [17] and then compared to that of the single input single output fading channel [18]. We now advocate a novel physical layer security solution that is unique to our previously proposed GPSM scheme with the aid of the proposed antenna scrambling. The novelty and contribution of our paper lies in three aspects: principle: we introduce a ’security key’ generated at Alice that is unknown to both Bob and Eve, where the design goal is that the publicly unknown security key only imposes barrier for Eve. • approach: we achieve it by conveying useful information only through the activation of RA indices, which is in • 1 Similarly, exploiting helper to generate artificial interference towards Eve in the cooperative communications scenario is also found effective [10], [11]. turn concealed by the unknown security key in terms of the randomly scrambled symbols used in place of the conventional modulated symbols in GPSM scheme. • design: we consider both Circular Antenna Scrambling (CAS) and Gaussian Antenna Scrambling (GAS) in detail and the resultant security capacity of both designs are quantified and compared. As a design merit, we find that the proposed physical layer security solution imposes great challenge on Eve and provides positive security capacity under both the conventional setting of having less antennas at Eve than at Alice as well as the disadvantageous setting that Alice is less equipped than Eve, which is largely neglected in the literature. The organisation of the paper is as follows. In Section II, we introduce the physical layer security model considered, along with the brief introduction of GPSM for self completeness in addition to the straightforward use of GPSM scheme in terms of physical layer security. This motivates our proposed antenna scrambling in Section III, where both CAS and GAS are discussed in detail together with their security capacity expressions. We present numerical results in Section IV and conclude in Section V. II. P HYSICAL L AYER S ECURITY OF GPSM Consider a typical physical layer security scenario with Nt TAs at Alice and Nr RAs at Bob in the presence of Ne RAs at Eve, where we assume Nt ≥ Nr with no constraints put on Ne . Throughout the paper, we further assume that the MIMO channel between Alice and Bob H B ∈ CNr ×Nt is known between each other and is also publicly available at Eve, while the MIMO channel between Alice and Eve H E ∈ CNe ×Nt is only known at Eve, where both H B and H E are frequencyflat Rayleigh fading with each entry being independent. In this MIMOME set-up, we have the following typical system of equations constituted by the coexistence of legal and illegal communications y B = H Bx + w B , y E = H Ex + w E , (1) (2) where w B ∈ CNr ×1 and w E ∈ CNe ×1 are the circularly symmetric complex Gaussian noise vector with each entry 2 2 having a zero mean and a variance of σB and σE , i.e. we 2 2 2 2 w B || ] = Nr σB and E[||w w E || ] = Ne σE . The noise have E[||w w B and w E are independent between each other and are also independent from the transmit signal x ∈ CNt ×1 . Finally, the security capacity CS of the above MIMOME set-up is defined as the capacity difference between Alice and Bob CB and Alice and Eve CE , which is formerly expressed as CS = CB − CE . (3) A. Transceiver Structure of GPSM Let us now elaborate more on our previously proposed GPSM scheme. 1) Conceptual Description: In our GPSM scheme, a total of Na < Nr RAs are activated at Bob so as to facilitate the simultaneous transmission of Na data streams between Alice and Bob, where the particular pattern of the Na RAs activated conveys extra information in form of so-called spatial symbols in addition to the information carried by the conventional modulated symbols mapped to them. Hence, the number of bits in GPSM conveyed by a spatial symbol becomes kant = ⌊log2 (|Ct |)⌋, where the set Ct contains all the combinations associated with choosing Na activated RAs out of Nr RAs. As a result, the total number of bits transmitted by the GPSM scheme is kef f = kant + Na kmod , where kmod = log2 (M ) denotes the number of bits per symbol of a conventional M ary modulation scheme and its alphabet is denoted by A. Finally, it is plausible that the conventional MIMO scheme between Alice and Bob with multiplexing of Na = Nr data streams conveys a total of kef f = Nr kmod bits altogether. For assisting further discussions, we also let C ⊂ Ct be the set of selected activation patterns, C(k) and C(k, i) denote the kth RA activation pattern and the ith activated RA in the kth activation pattern, respectively. 2) Mathematical Description: Let s km be an explicit representation of a so-called super-symbol s ∈ CNr ×1 , indicating that the RA pattern k at Bob is activated and Na conventional modulated symbols b m = [bm1 , . . . , bmNa ]T ∈ CNa ×1 are transmitted, where we have bmi ∈ A and E[|bmi |2 ] = 1, ∀i ∈ [1, Na ]. In other words, we have the relationship s = s km = Ω kb m , (4) where Ω k = I [:, C(k)] is constituted by the specifically selected columns determined by C(k) of an identity matrix of I Nr . Following pre-coding of P ∈ CNt ×Nr , the resultant transmit signal x from Alice may be written as p (5) x = β/NaP s , x ||2 ] = 1. The where β is designed for maintaining E[||x conventional design of GPSM allows no energy leaks into the unintended RA patterns at Bob. Hence, the classic linear Channel Inversion (CI)-based pre-coding [19], [20] may be used, which is formulated as −1 H BH H P = HH , B (H B) (6) where the power-normalisation factor of the output power after −1 H BH H pre-coding is β = Nr /Tr[(H ]. B) As a result, the signal observed at the Nr RAs of Bob may be written as p y B = β/NaH B P s km + w B . (7) Consequently, the joint detection of both the conventional modulated symbols b m and of the spatial symbol k obeys the Maximum Likelihood (ML) criterion, which is formulated as r β H B P s ℓn ||2 , (8) [m̂1 , . . . , m̂Na , k̂] = arg min ||yy B − Na s ℓn ∈S where S = C × ANa denotes the super-alphabet. Alternatively, decoupled or separate detection may also be employed, which treats the detection of the conventional modulated symbols b m and the spatial symbol k separately. In this reduced-complexity variant, we have k̂ = arg max ℓ∈[1,|C|] Na X B |2 , |yC(ℓ,i) (9) r β B h p bn |2 , (10) Na C(k̂,i) C(k̂,i) i i=1 B m̂i = arg min |yC( − k̂,i) n ∈[1,M] i where h B C(k̂,i) is the C(k̂, i)th row of H B representing the channel between the C(k̂, i)th RA at Bob and the transmitter at Alice, while p C(k̂,i) is the C(k̂, i)th column of P . Thus, correct detection is declared, when we have k̂ = k and m̂i = mi , ∀i 2 . B. Security Capacity of GPSM Since the MIMO channel H E is intentionally and practically assumed unknown to Alice, we now investigate the security capacity of GPSM scheme dispensing with the knowledge of H E at Alice. 1) DCMC Capacity: The security capacity as expressed in (3) for GPSM scheme relies on the Discrete input Continuous output Memoryless Channel (DCMC) capacity calculations of CB and CE , respectively. It is known that Shannon’s channel capacity is obtained, when the input signal obeys a Gaussian distribution [21]. Our GPSM scheme is special in the sense that the spatial symbol conveys integer values constituted by the RA pattern index, which does not obey the shaping requirements of Gaussian signalling. This implies that the channel capacity of the GPSM scheme depends on a mixture of a continuous and a discrete input. Hence, for simplicity’s sake, we discuss the DCMC capacity in the context of discrete-input signalling for both the spatial symbol and for the conventional modulated symbols mapped to it. Before calculating CB and CE for (1) and (2) employing GPSM scheme, we first provide a general expression of calculating the DCMC capacity that will be used throughout the paper. The DCMC capacity is obtained by maximizing the mutual information between discrete input u ∈ B and continuous output z , where we have u; z ) C = max I(u u τ ),∀τ p(u ∞ = max u τ ),∀τ p(u |B| Z X p(zz , u τ ) log2 τ =1−∞ furthermore, we have uτ ) p(zz |u ! uτ ) p(zz |u P|B| z , u ǫ) ǫ=1 p(z uτ ) p(zz |u ! dzz , (11) ! = log2 P|B| P|B| z , u ǫ) z |u uǫ )p(u uǫ ) ǫ=1 p(z ǫ=1 p(z |B| |B| X uǫ ) 1 X p(zz |u = − log2 = log2 (|B|) − log2 Θǫ,τ , uτ ) |B| ǫ=1 p(zz |u ǫ=1 log2 (12) 2 Although our security capacity discussion later does not rely on a particular detection scheme, we include them for self-completeness. u ǫ )/p(zz |u u τ ). By substituting (12) where we let Θǫ,τ = p(zz |u into (11) and exploiting that (11) is maximized when we have u τ ), we have equal probable p(u |B| |B| X X 1 E log2 C = log2 (|B|) − (13) Θǫ,τ . |B| τ =1 ǫ=1 2) Security Capacity: By substituting (5) into (1) and (2), we have the explicit relation p (14) y B = β/NaH B P s + w B , p y E = β/NaH E P s + w E . (15) p Hence, withpperfect knowledge of G B = β/NaH B P and G E = β/NaH E P being the equivalent channels, the conditional probability of receiving y B and y E given that s τ was transmitted are formulated as −||yy B − G B s τ ||2 y s , (16) p(y B |s τ ) ∝ exp 2 σB −||yy E − G E s τ ||2 . (17) p(yy E |ssτ ) ∝ exp 2 σE As a result, we have GB (ssτ − s ǫ ) + w B ||2 + ||w w B ||2 −||G ΘB = exp , (18) ǫ,τ 2 σB GE (ssτ − s ǫ ) + w E ||2 + ||w w E ||2 −||G ΘE = exp , (19) ǫ,τ 2 σE and hence the DCMC capacity of CB and CE for (14) and (15) may be obtained upon substituting (18) and (19) into (13), respectively and also by letting |B| = |C|M Na in (13). Finally, the security capacity is obtained by evaluating (3) as a difference between CB and CE . 3) Performance: Fig 1 shows the security capacity of GPSM scheme employing CI based pre-coding when [Nt , Nr ] = [8, 4] and using QPSK modulation having different number of activated RAs NA = [1, 2, 3] when Ne = Nr = 4 (dash) and Ne = Nt = 8 (solid). It is clearly shown in Fig 1 that when Ne = Nr = 4, the security capacity is positive for all Na considered and activating more RAs results into higher security capacity. On the other hand, no positive security capacity is found when Ne = Nt = 8 for all Na considered as shown by solid curves. Indeed, Ne = Nt constitutes a challenge setting in the physical layer security literature, where typically Ne < Nt was considered. This is because even though the eavesdropper’s channel is known by Alice mysteriously, the celebrated strategies of transmitting in the null space of Eve or of minimizing the signal leakage towards Eve leave no degree of freedom for communicating between Alice and Bob if Ne < Nt was violated. This is also true for the typical strategy of generating artificial noise by Alice, where the underlining assumption of Ne < Nt was also explicitly imposed. III. S ECURITY V IA A NTENNA S CRAMBLING We now propose a novel physical layer security scheme exclusive to GPSM scheme with the aid of antenna scrambling. [Nt,Nr] = [8,4] [Na,Ne] = [1,8] [Na,Ne] = [2,8] [Na,Ne] = [3,8] [Na,Ne] = [1,4] [Na,Ne] = [2,4] [Na,Ne] = [3,4] Security Capacity (bits/s/Hz) 1.5 1 0.5 0 −0.5 −1 −20 −10 0 10 20 30 SNR [dB] Fig. 1: Security capacity of GPSM scheme employing CI based pre-coding when [Nt , Nr ] = [8, 4] and using QPSK modulation having different number of activated RAs NA = [1, 2, 3] when Ne = Nr = 4 (dash) and Ne = Nt = 8 (solid). A. Motivation and Principle In the security capacity of GPSM analysed in Section II-B and showed in Fig 1, we found that the explicit and complete knowledge of B known to both Bob and Eve constitutes one potential source of confidentiality leakage, which allows Eve to perform exhaustive search over B when Eve has unbounded computational capability. Based on this backdrop, we propose to only convey useful information through the RA patterns in terms of spatial symbols, while the conventional modulated symbols b m belonging to a finite alphabet of ANa are purposely replaced by randomly generated scrambled symbols, which are changed at symbol rate and are unknown to both Bob and Eve. In other words, the useful information in spatial domain is concealed by the timedomain scrambled symbols with infinite possibilities, which are in turn acted as security key. Thus, the aim is to investigate proper scrambled symbols that result in significant barriers only for Eve to retrieve the useful information in spatial domain, but not for Bob. In this light, we consider both Circular Antenna Scrambling (CAS) and Gaussian Antenna Scrambling (GAS), where the scrambled symbols in the former and in the latter are drawn from a unit circle with uniformly distributed phases and from a complex Gaussian distribution with zero-mean and (normalised) unity variance, respectively. B. Security Capacity of GPSM with CAS When CAS is considered, we rewrite (4) with conventional modulated symbols b m replaced by random symbols e = [ejθ1 , . . . , ejθNa ]T ∈ CNa ×1 drawn from a unit circle with uniformly distributed phase θi , ∀i ∈ [1, Na ], namely we have s = Ωτ e, (20) when the τ th RA pattern is activated at Bob. It is thus clear that the useful information is contained in Ω τ only and is concealed by the phase rotations of e . Now, if we followed the same procedure as in Section II-B2 and adopted the same equations as expressed in (14) and (15) by treating s as a whole in order to obtain the DCMC capacity of CB and CE , the conditional probability calculations of (16) and (17) become problematic. This is because the symbol s of (20) belongs to an infinite alphabet in CAS, where its enumeration is impossible. On the other hand, we may only consider the spatial domain information contained in Ω τ with finite alphabet of C. However, the unknown randomly scrambled symbols of e , which is also changed at symbol rate, analogously contribute to strong channel uncertainty to both Bob and Eve. This makes the conditional probability calculations of (16) and (17) become again intractable since coherent detection is not allowed with unknown e . We thus discuss the security capacity of GPSM scheme with CAS replying on non-coherent DCMC capacity calculations of CB and CE based on the non-coherent transformation of (14) and (15) with (20) been substituted, which are given as follows G B Ω τ e + w B |2 = | r B = |G G E Ω τ e + w E |2 = | r E = |G XN a v=1 XN a v=1 jθv + w B |2 , (21) gB C(τ,v) e jθv + w E |2 , (22) gE C(τ,v) e E where we have g B C(τ,v) and g C(τ,v) stand for the C(τ, v)th G G column of B and E respectively. Let us further elaborate a bit more on two cases as follows. 1) Na = 1: In this special case, we have a simplified expression of (21) and (22) given as jθ1 + w B |2 , r B = |gg B C(τ,1) e (23) jθ1 + w E |2 , r E = |gg E C(τ,1) e (24) 2 2 Hence, by normalising with respect to σB,0 = σB /2 and 2 2 σE,0 = σE /2, it is clear that for the ith entry of r B and r E , we have h i 2 B 2 rB,i /σB,0 ∼ χ22 λB,i = |gC(τ,1),i |2 /σB,0 , (25) i h 2 E 2 , (26) |2 /σE,0 rE,i /σE,0 ∼ χ22 λE,i = |gC(τ,1),i where χ22 (λB,i ) and χ22 (λE,i ) stand for the non-central chisquare distribution with degree of freedom of two and nonB 2 E 2 centrality given by |gC(τ,1),i |2 /σB,0 and |gC(τ,1),i |2 /σE,0 as jθ1 2 a result of |e | = 1, respectively. In particular, when CI pre-coding of (6) is employed, where GB = p p β/NaH B P = β/NaI Nr , (27) we have λB,i = 0, ∀i 6∈ C(τ ) for inactivated RAs and λB,i = 2 β/Na σB,0 , ∀i ∈ C(τ ) for activated RAs. Thus the conditional probability of receiving r B and r E given that Ω τ was transmitted and subjected to the knowledge of equivalent channels G B and G E but dispensing with the knowledge of e are formulated as ! Nr Y r B,i i Ωτ ) = , (28) fχ2 h|gB p(rr B |Ω 2 2 |2 /σB,0 2 σB,0 C(τ,1),i i=1 ! Ne Y rE,i h i Ωτ ) = . (29) fχ2 |gE p(rr E |Ω 2 2 |2 /σE,0 2 σE,0 C(τ,1),i i=1 As a result, we have YNr 2 i r fχ2 h|gB B,i /σB,0 2 /σ 2 | i=1 2 B,0 C(ǫ,1),i ΘB , ǫ,τ = YNr 2 i r h /σ fχ2 |gB B,i 2 B,0 |2 /σ i=1 YNe 2 i=1 fχ2 |gE i=1 fχ2 h|gE ΘE ǫ,τ = YNr 2 2 B,0 C(τ,1),i h 2 rE,i /σE,0 , 2 i r /σ E,i E,0 2 |2 /σE,0 C(ǫ,1),i C(τ,1),i (30) 2 |2 /σE,0 i (31) and hence when Na = 1, the non-coherent DCMC capacity of CB and CE for (23) and (24) may be obtained by letting |B| = |C| and substituting (30) and (31) into (13). Finally, the security capacity is obtained by evaluating (3). 2) Na > 1: Now we consider (21) and (22) when Na > 1, where in this case we have XNa 2 B 2 , (32) ejθv |2 /σB,0 gC(τ,v),i rB,i /σB,0 ∼ χ22 λB,i = | v=1 XN a 2 2 E rE,i /σE,0 ∼ χ22 λE,i = | . (33) gC(τ,v),i ejθv |2 /σE,0 v=1 In contrast to Na = 1, since e is unknown to both Bob and Eve, the non-centrality of both λB,i and λE,i of (32) and (33) become also unavailable in general. This is because the impact of the unknown e adds extra constructive and destructive fading. As a result, the conditional probability calculations similar to (28) and (29) may be intractable. In particular, when the CI pre-coding of (6) is employed with the beneficial structure of (27), we have λB,i = 0, ∀i 6∈ 2 C(τ ) for inactivated RAs and λB,i = β/Na σB,0 , ∀i ∈ C(τ ) for activated RAs. Hence, the knowledge of e becomes unnecessary for Bob in order to evaluate (32). However, the beneficial structure similar to (27) is not seen for Eve as H E P ∈ C Ne ×Nr , so the knowledge of e becomes crucial for Eve in order to evaluate (33), resulting into a barrier. Consequently, with the knowledge of both H B and H E , Eve is forced to be ’pretended’ as Bob by conducting postprocessing on y E of (15) as −1 H HH ỹ E = H B (H E H E) H E yE, −1 H HH = G B Ω τ e + H B (H E H E) H E wE, (34) −1 H HH where by letting w̃ E = H B (H E H E ) H E w E , the noncoherent transformation of (34) is XN a jθv G B Ω τ e + w̃ E |2 = | r̃ E = |G + w̃ E |2 . (35) gB C(τ,v) e v=1 Hence, by being forced to equip higher number of antennas than Alice (Ne ≥ Nt ) in order to perform the above postprocessing of (34), Eve finally becomes also capable of retrieving the information concealed in the spatial domain dispensing with the knowledge of e at the cost of noise amplification 2 provided σE > 0. More explicitly, by normalising with 2 2 2 respect to σ̃E,0 = σ̃E /2, we have r̃E,i /σ̃E,0 ∼ χ22 (λ̃E,i ) with λ̃E,i = 0, ∀i 6∈ C(τ ) for inactivated RAs and λ̃E,i = 2 β/Na σ̃E,0 , ∀i ∈ C(τ ) for activated RAs. Thus, when the CI pre-coding of (6) is employed and Ne ≥ Nt , the conditional probability of receiving r B and r̃ E given that Ω τ was transmitted and subjected to the knowledge of equivalent channels G B and G E but dispensing with the knowledge of e are formulated as ! Nr Y rB,i Ωτ ) = , (36) fχ2 [1[i∈C(τ )]β/Na σ2 ] p(rr B |Ω 2 2 B,0 σB,0 i=1 ! Nr Y r̃E,i Ωτ ) = fχ2 [1[i∈C(τ )]β/Na σ̃2 ] p(r̃r̃ E |Ω , (37) 2 2 E,0 σ̃E,0 i=1 where 1[·] is the indicator function that returns one (zero) when the entry is true (false). As a result, we have YNr 2 fχ2 [1[i∈C(ǫ)]β/Na σ2 ] rB,i /σB,0 2 B,0 i=1 ΘB , (38) ǫ,τ = YNr 2 fχ2 [1[i∈C(τ )]β/Na σ2 ] rB,i /σB,0 2 B,0 i=1 YNr 2 fχ2 [1[i∈C(ǫ)]β/Na σ̃2 ] r̃E,i /σ̃E,0 2 E,0 i=1 ΘE , (39) ǫ,τ = YNr 2 fχ2 [1[i∈C(τ )]β/Na σ̃2 ] r̃E,i /σ̃E,0 i=1 2 E,0 and hence when Na > 1 and CI pre-coding is employed with Ne ≥ Nt , the non-coherent DCMC capacity of CB and CE for (21) and (35) may be obtained by letting |B| = |C| and substituting (38) and (39) into (13). Then, the security capacity is obtained by evaluating (3). Finally, note that when Ne < Nt , Eve becomes not capable of gaining any information contained 2 in the RA patterns without knowing e even though σE 7→ 0. C. Security Capacity of GPSM with GAS When GAS is considered, we rewrite (4) with conventional modulated symbols b m replaced by random symbols n = [n1 , . . . , nNa ]T ∈ CNa ×1 drawn from a complex Gaussian distribution with zero-mean and (normalised) unity variance, i.e. ni ∈ CN (0, 1), namely we have s = Ωτ n , (40) when the τ th RA pattern is activated at Bob. Now, when compared with the CAS case, the uncertainties arise from both phase and amplitude. From certain perspective, we may treat GAS as introducing multiplicative artificial noise. Similar to CAS, since the symbol s belongs to an infinite alphabet in GAS, we may consider the finite alphabet of C for the spatial domain information contained in Ω τ . But unlike in CAS, now coherent DCMC capacity calculations of CB and CE are possible. By substituting (40) into (14) and (15), we have XN a y B = G BΩ τ n + w B = gB nv + w B , (41) v=1 C(τ,v) XN a y E = GEΩτ n + w E = gE (42) C(τ,v) nv + w E . v=1 Then it is clear that for the ith entry of y B and y E as expressed in (41) and (42), we have XN a 2 yB,i ∼ CN (0, |g B |2 + σB ), (43) v=1 C(τ,v),i XN a 2 E yE,i ∼ CN (0, |2 + σE ), (44) |gC(τ,v),i v=1 where without the explicit knowledge of n , the conditional probability of receiving y B and y E given that Ω τ was transmitted and subjected to the knowledge of equivalent channels G B and G E are formulated as ) ( N r X |yB,i |2 Ωτ ) ∝ exp − , (45) p(yy B |Ω PNa B 2 2 v=1 |gC(τ,v),i | + σB i=1 ) ( N e X |yE,i |2 Ωτ ) ∝ exp − . (46) p(yy E |Ω PNa E 2 2 v=1 |gC(τ,v),i | + σE i=1 As a result, we have !) (N Na r X X 2 2 2 B |yB,i | / exp |gC(τ,v),i | + σB i=1 ΘB ǫ,τ = exp (N r X 2 |yB,i | / exp |yE,i |2 / i=1 ΘE ǫ,τ = exp (N e X 2 B |2 + σB |gC(ǫ,v),i v=1 i=1 (N e X v=1 Na X 2 |yE,i | / Na X v=1 Na X 2 E |2 + σE |gC(τ,v),i 2 E |2 + σE |gC(ǫ,v),i v=1 i=1 !) , !) !) , (47) (48) (49) and we further expand the following term as # " |C| X 1 E log2 Θǫ,τ = E − log2 P|C| ǫ=1 ǫ=1 Θǫ,τ # " 1 1 ≥ − log2 P|C| ≥ − log2 E P|C| ǫ=1 Θǫ,τ ǫ=1 E [Θǫ,τ ] = log2 X ǫ=1 ≥ log2 1 + X ǫ=1 |C| X ǫ=1,ǫ6=τ e E[A−B] , i=1 E [Υi ] E [Υi ] 2 − σ2 . β/Na + σB B (52) where we have Υi = |yCBu (τ,i) |2 − |yCBu (ǫ,i) |2 and E [Υi ] = 2 β/Na . Now, when σB 7→ 0, the summation of (52) approaches −∞, so (50) approaches zero and (51) results into CB ≤ 2 log2 (|C|). On the other hand, when σB 7→ ∞, the summation of (52) approaches zero, so (50) approaches log2 (|C|) and (51) results into CB ≤ 0. Since we also must have CB ≥ 0, we end up with CB = 0. Overall, we have 0 ≤ CB ≤ log2 (|C|). 2) To see CE = 0, it is simple to see from (48) that Ne X |yE,i |2 |yE,i |2 −E = 0, (53) E E [A − B] = 2 2 A′ + σE B ′ + σE i=1 PNa E PNa E where A′ = v=1 |gC(τ,v),i |2 and B ′ = v=1 |gC(ǫ,v),i |2 and ′ ′ we have E [A ] = E [B ]. As a result, (50) approaches log2 (|C|) and hence (51) results into CE ≤ 0. Since we also must have CE ≥ 0, we end up with CE = 0. Lemma III.1 suggests that Eve cannot follow the same approach to retrieve the useful information as Bob. Thus, similarly to the context of CAS, by being forced to equip more antennas than Alice (Ne ≥ Nt ) and at the cost of noise 2 amplification provided σE > 0, Eve is again tried to be ’pretended’ as Bob by conducting post-processing on y E of (42) to arrive at (54) Hence, we have ỹE,i ∼ CN (0, XN r v=1 2 B |2 + σ̃E ), |gC(τ,v),i and after a few manipulations, we arrive at !) (N Na r X X 2 2 2 B |ỹE,i | / exp |gC(τ,v),i | + σ̃E E eA−B X −1 H ỹ E = GB Ωτ n + H B (H HH H E wE . E HE) |C| E [Θǫ,τ ] = log2 1) When CB is considered, let us first define Cc = C(τ ) ∩ C(ǫ) as the set containing the commonly activated RAs of two different activation patterns and thus Cd = C¯c denotes the complementary set containing the activated RAs in difference. We further define C u (τ ) = C(τ ) ∩ Cd and C u (ǫ) = C(ǫ) ∩ Cd as the set containing the activated RAs uniquely found in C(τ ) and C(ǫ), respectively. With the above definitions and by exploiting the beneficial property of (27), we have |Cd |/2 Lemma III.1. The DCMC capacity calculation of CB based on (47) for Bob is 0 ≤ CB ≤ log2 (|C|), but the DCMC capacity calculation of CE based on (48) returns zero capacity for Eve, i.e. we have CE = 0. |C| ǫ=1,ǫ6=τ E [A − B] = and hence dispensing with the knowledge of n , the DCMC capacity of CB and CE for (41) and (42) may be obtained by letting |B| = |C| and substituting (47) and (48) into (13). Finally, the security capacity is obtained by evaluating (3). However, a further look results into the following Lemma Proof. Let us rewrite (13) here by setting |B| = |C| as |C| |C| X 1 X E log2 C = log2 (|C|) − Θǫ,τ , |C| τ =1 ǫ=1 where the inequities involved during the above derivations are followed from Jensen’s inequality. Further, A and B are shorthand for the inner term in the exponential operator of both the numerator and denominator, respectively, either of (47) or of (48). Substituting (50) into (49), we have |C| |C| X X 1 C ≤ log2 (|C|) − log 1 + eE[A−B] (51) |C| τ =1 2 i=1 ΘE ǫ,τ = (50) exp (N r X i=1 |ỹE,i |2 / v=1 Na X v=1 2 B |2 + σ̃E |gC(ǫ,v),i (55) !) , (56) GAS −1 0 −1 −0.5 −1 −1 −0.5 0 Re(y −1 1 0 −1 1 1 0.5 0.5 0 −0.5 −1 −1 0 Re(y 1 −1 ) B,3 0 Re(y 1 −1 1 −2 −2 2 −1 ) 1 1 E,3 Im(y −1 ) B,3 0 Re(y 1 −2 −2 −4 −4 −2 0 Re(y 2 −1 2 −2 −2 −4 −4 −2 0 Re(y 2 ) B,3 2 Im(yE,2) −5 0 Re(y ) 5 −5 E,1 (e) GAS (Bob) 2 ) B,4 5 0 Re(y ) 5 5 ) E,3 0 Re(y 0 Re(y ) E,2 0 −5 −2 0 −5 5 −4 1 5 ) Im(y ) 0 B,4 2 Im(y Im(yB,3) 4 −4 0 ) E,4 0 B,2 0 −1 ) −2 Re(y 2 1 ) (d) Na > 1 CAS (Eve) E,1 −4 0 Re(y 0 E,3 −5 ) 4 0 Re(y 5 B,1 1 −1 ) Im(y ) 0 B,2 2 0 Im(y Im(yB,1) 4 2 ) 1 B,4 4 0 Re(y E,2 0 (c) Na > 1 CAS (Bob) −4 −1 −1 −2 −2 2 1 ) 1 0 −1 0 Re(y 0 Re(y E,1 ) B,4 −1 −1 ) −1 ) 1 0 −2 −2 E,2 2 ) ) 1 Im(y B,3 Im(y 0 Re(y 0 −1 B,2 2 ) D. Further Discussions Im(y E,1 Im(y −1 B,1 1 1 0 E,4 0 Re(y 2 0.5 ) E,4 Im(y −1 1 1 0 −1 −2 −2 −1 −0.5 0 Re(y 0 (b) Na = 1 CAS (Eve) ) B,2 Im(y B,1 Im(y 0 0.5 ) ) 1 ) 2 1 1 −0.5 E,3 (a) Na = 1 CAS (Bob) 2 0.5 ) −1 −1 −0.5 0 Re(y ) B,4 −1 −0.5 0 Re(y E,2 ) Im(yE,3) ) B,4 Im(y 0 0.5 ) E,1 1 ) B,3 1 ) B,2 1 Im(y 0 Re(y −1 E,4 1 ) 0 −0.5 Im(y 0 Re(y B,1 1) Example: We now provide an example to better aid the conceptual understanding of our proposed physical layer security of GPSM with antenna scrambling. Fig 2 shows the plot of 1000 samples of the received signal y B at Bob and y E at Eve when CI pre-coding aided GPSM is employed at Alice with [Nt , Nr , Ne ] = [8, 4, 4] under a particular MIMO channel realisation of H B and H E when SNR is set to 30dB to remove the disturbance of noise. Thus we focus on the effect of CAS and GAS on the realisations of y B and y E . In Fig 2, we include three different cases correspond to three rows of subplots in pair for y B (left) and y E (right), respectively. On each subplot, the received signal samples of each individual RA are detailed in four miniplots, each with horizontal axis and vertical axis represent real and imaginary part of yB,i , ∀i ∈ [1, Nr ] or yE,i , ∀i ∈ [1, Ne ]. The first row of Fig 2 illustrate the scenario, where Na = 1 and employing CAS with first RA been activated. It can be seen from Fig 2a that the received signal samples of the first RA at Bob is clearly distinguishable with respect to that of the rest RAs. Moreover, being a circle at the first RA implies that its non-coherent transformation (magnitude) constitutes a constant value. On the other hand, the four distinguishable circles observed at Eve from Fig 2b imply that Eve is also unaffected by CAS, but failing to capture the correct pattern as compared to Bob. When the second row of Fig 2 is considered, where Na > 1 and employing CAS with first and second RAs been activated. It can be seen from Fig 2c that the received signal samples of the first two RAs are stand-out clearly from the rest, being unaffected by the unknown knowledge of e . However, Eve is completely messed up by the confusion of CAS as seen from Fig 2d, where a large overlap can be found in these four miniplots. Finally, we consider the third row of Fig 2 when GAS is employed. Again, clear patterns are observed at Bob as seen in Fig 2e but indistinguishable clouds are found at Eve as seen in Fig 2f. 2) Remarks: We infer that the effect of CAS is analogously to introduce artificial phase ambiguity at Eve, while the effect of GAS is analogously to introduce artificial multiplicative noise. It is also worth noting that the proposed antenna scrambling is different from the so-called directional modulation [22], [23], [24], although the useful information is also 1 0.5 0 −1 −1 and hence dispensing with the knowledge of n , the DCMC capacity of CE for (54) may be obtained by letting |B| = |C| and substituting (56) into (13). Then, the security capacity is obtained by evaluating (3). Finally, again note that when Ne < Nt , Eve becomes not capable of gaining any information contained in the RA patterns without knowing e even though 2 σE 7→ 0, since the operation of (54) is not allowed. 1 0.5 ) ) B,2 Im(y B,1 Im(y 0 E,2 1 ) 1 E TABLE I: Summarized findings of {ΘB ǫ,τ , Θǫ,τ }. Im(y (47), (56) Im(yE,4) (18),(19) CAS Na = 1 Na > 1 (30), (31) (38), (39) Im(yE,1) GPSM E ΘB ǫ,τ , Θǫ,τ 0 −5 −5 0 Re(y ) E,3 5 −5 E,4 (f) GAS (Eve) Fig. 2: Plot of 1000 samples of the received signal y B at Bob and y E at Eve when CI pre-coding aided GPSM is employed at Alice with [Nt , Nr , Ne ] = [8, 4, 4] under a particular MIMO channel realisation of H B and H E when SNR is set to 30dB. Three different cases correspond to three rows of subplots in pair for y B (left) and y E (right), respectively. On each subplot, the received signal samples of each individual RA are detailed in four miniplots, each with horizontal axis and vertical axis represent real and imaginary part. carried only the antenna level. Without using antenna scrambling as we proposed at the baseband, by varying the antenna near-field electromagnetic boundary in analogy domain, the desired phase and amplitude of the far-filed electromagnetic boundary is modulated at the intended direction, which is indistinguishable to undesired directions. Finally, for clarity, we summarize the main findings of E {ΘB ǫ,τ , Θǫ,τ } for calculating the DCMC capacity {CB , CE } and security capacity CS of our physical layer security for GPSM scheme with both CAS and GAS in Table I. We also emphasize that our proposed design imposes tough requirement on Eve by enforcing it to equip with Ne ≥ Nt antennas in order to start intercepting and even in this challenging setting, substantial positive security capacity can still be observed as shown in next Section. 1) Na = 1: The upper subplot of Fig 3 shows the security capacity of GPSM scheme with both CAS (solid) and GAS (dash) employing CI based pre-coding when Na = 1 having different combinations of [Nt , Nr ] and Ne = Nt . It is clear that the security capacity is higher when employing GAS for all different combinations considered, although the higher the ratio of Nt /Nr , the lower the difference of security capacity. Also, as expected, along with increasing the ratio of Nt /Nr , the security capacity increases in general for both CAS and GAS schemes. 2) Na > 1 and CAS: The lower subplot of Fig 3 shows the security capacity of GPSM with CAS employing CI based pre-coding when [Nt , Nr ] = [16, 8] having different number of activated RAs Na = [2, 3, 4, 5, 6, 7] and Ne = Nt . Firstly, when including Na = 1 for bench-marker, the lower subplot of Fig 3 shows that activating more RAs provides higher and wider security capacity region than opting for larger ratio of Nt /Nr as indicated by the apparent comparisons between solid curves and dashed curves, despite that they are operated on different SNR ranges. Further, we can also see that along with increasing Na = [2, 3, 4], the security capacity increases. In particular, the security capacity region of activating Na = 2 and Na = 3 RAs at Bob constitute an approximately horizontal shifted security capacity region of activating Na = 6 and Na = 5 RAs. This is intuitively true since activating Na = 6 (Na = 5) RAs at Bob is conceptually equivalent to deactivating Nt − Na = 2 (Nt − Na = 3) RAs at Bob, where in both cases, we have the maximum security capacity being CS = kef f = 4 bits/s/Hz (CS = kef f = 5 bits/s/Hz). Finally, we observe that the highest security capacity is achieved when Na = 4 with the maximum security capacity being CS = kef f = 6 bits/s/Hz. 3) Na > 1 and GAS: Fig 4 shows the security capacity of GPSM with GAS employing CI based pre-coding when [Nt , Nr ] = [16, 8] (upper) having different number of activated RAs Na = [2, 3, 4, 5, 6, 7] and Ne = Nt as well as its security capacity difference with respect to that of CAS (lower). It can be seen from the upper subplot of Fig 4 that the security capacity offered by GAS is also substantial, which is similar to the case of CAS. Again, along with increasing Na = [1, 2, 3, 4], the security capacity increases and the mirroring effects also appear between Na = [1, 2, 3] and Na = [7, 6, 5] accordingly. It is thus interesting to investigate the security Security Capacity (bits/s/Hz) 2 1.5 1 Na = 1 [Nt,Nr,Ne] = [16,8,16] [Nt,Nr,Ne] = [24,8,24] [Nt,Nr,Ne] = [32,8,32] Solid: CAS Dash: GAS 0.5 0 −0.5 −20 Security Capacity (bits/s/Hz) A. Performance with Antenna Scrambling 2.5 −15 −10 −5 0 SNR [dB] 5 10 15 20 6 [Nt,Nr,Ne] = [16,8,16] Na = 2 Na = 3 Na = 4 Na = 5 Na = 6 Na = 7 4 2 Nt/Nr = 4,3 Na = 1 0 −20 −10 0 10 20 SNR [dB] 30 40 50 Fig. 3: (Upper) Security capacity of GPSM scheme with both CAS (solid) and GAS (dash) employing CI based pre-coding when Na = 1 having different combinations of [Nt , Nr ] and Ne = Nt . (Lower) Security capacity of GPSM with CAS employing CI based pre-coding when [Nt , Nr ] = [16, 8] having different number of activated RAs Na = [2, 3, 4, 5, 6, 7] and Ne = Nt . Security Capacity (bits/s/Hz) Let us now illustrate the numerical results of our advocated physical layer security of GPSM scheme with antenna scram2 2 bling. Throughout the simulations, we let σB = σE > 0 and also Ne = Nt without loss of generosity. As discussed, when Ne < Nr , Eve is not capable of intercepting the communications between Alice and Bob, resulting into CE = 0 and hence perfect security may be guaranteed by our design even 2 when σE 7→ 0. Thus, we focus on the challenging scenario of Ne = Nt that was largely neglected in the literature. Note that this is the least number of antennas required for Eve to perform (34) and (54). Cs Difference (bits/s/Hz) IV. N UMERICAL R ESULTS 6 Na = 2 Na = 3 Na = 4 Na = 5 Na = 6 Na = 7 4 2 0 −20 −10 0 10 20 SNR [dB] 30 40 50 2 Na = 2 Na = 3 Na = 4 Na = 5 Na = 6 Na = 7 1 0 −1 −2 −20 −10 0 10 20 SNR [dB] 30 40 50 Fig. 4: Security capacity of GPSM with GAS employing CI based pre-coding when [Nt , Nr ] = [16, 8] (upper) having different number of activated RAs Na = [2, 3, 4, 5, 6, 7] and Ne = Nt and its security capacity difference with respect to that of CAS (lower). capacity difference between CAS and GAS, which is shown in the lower subplot of Fig 4, where we can see that the security capacity differences when Na > 1 alternate around zero. This indicates no dominant superiority between CAS and GAS, where both offer substantial security capacity with different regions of operation under the setting of Ne = Nt . B. Further Investigations 1) Robustness to CSIT Error: Like in all pre-coding schemes, an important aspect related to GPSM is its resilience 1 0 −20 −10 0 10 20 SNR [dB] 30 40 50 Security Capacity (bits/s/Hz) 2 [Nt,Nr,Na] = [16,8,2] 3 Ne = 16 Ne = 18 Ne = 20 Ne = 22 Ne = 24 2 1 0 −20 −10 0 10 20 SNR [dB] 30 40 50 1 no Correlation ρ = 0.3 ρ = 0.4 ρ = 0.5 3 2 Prob(Cs < Xaxis) Security Capacity (bits/s/Hz) Security Capacity (bits/s/Hz) no CSIT error error var = 0.3 error var = 0.4 error var = 0.5 3 1 0 0.8 0.6 0.2 [Nt,Nr,Na] = [16,8,2] 0 −20 Ne = 16 Ne = 18 Ne = 20 Ne = 22 Ne = 24 0.4 −10 0 10 20 SNR [dB] 30 40 50 0 1 2 3 Security Capacity (bits/s/Hz) 4 5 Fig. 5: Security capacity of GPSM with GAS employing CI based pre-coding when [Nt , Nr , Na ] = [16, 8, 2] and Ne = Nt under CSIT error of σi = [0.3, 0.4, 0.5] (upper) and antenna correlations of ρ = [0.3, 0.4, 0.5] (lower). Fig. 6: Security capacity (upper) and outage security capacity (lower) when SN R = 10dB of GPSM with GAS employing CI based pre-coding when [Nt , Nr , Na ] = [16, 8, 2] and Ne = [16, 18, 20, 22, 24]. to CSIT inaccuracies. In this paper, we let H B = H B,a + H B,i , where H B,a represents the matrix hosting the average CSI, with each entry obeying the complex Gaussian distribu2 tion of hB,a ∼ CN (0, σB,a ) and H B,i is the instantaneous CSI error matrix obeying the complex Gaussian distribution 2 2 2 of hB,i ∼ CN (0, σB,i ), where we have σB,a + σB,i = 1. As a result, only H B,a is available at Alice for pre-processing, while we assume perfect H B at Bob and Eve. The upper subplot of Fig 5 shows the security capacity of GPSM with GAS employing CI based pre-coding when [Nt , Nr , Na ] = [16, 8, 2] and Ne = Nt under CSIT error of σi = [0.3, 0.4, 0.5]. It is clear from the upper subplot of Fig 5 that, as expected, the higher the CSIT error imposed, the lower security capacity exhibited. 2) Robustness to Channel Correlations: Another typical impairment is antenna correlation. The correlated MIMO channels are modelled by the widely-used Kronecker model [25], T H B,0 (R R 1/2 R 1/2 which are written as H B = (R B,r ) and H E = A,t )H 1/2 1/2 T R A,t )H H E,0 (R R E,r ) , with H B,0 and H E,0 representing the (R original MIMO channel imposing no correlation, while R A,t , R B,r and R E,r represent the correlations at the transmitter of Alice and receiver of Bob and Eve, respectively, with the |i−j| correlation entries given by RA,t (i, j) = ρA,t , RB,r (i, j) = |i−j| |i−j| ρB,r , RE,r (i, j) = ρE,r . In this paper, we assume ρA,t = ρB,r = ρE,r = ρ. The lower subplot of Fig 5 shows the security capacity of GPSM with GAS employing CI based pre-coding when [Nt , Nr , Na ] = [16, 8, 2] and Ne = Nt under antenna correlations of ρ = [0.3, 0.4, 0.5]. We can see from the lower subplot of Fig 5 that the security capacity of GPSM with GAS is not necessarily reduced or improved by increasing the degree of channel correlations. Rather, the positive security capacity region is shifted towards higher SNR range, whilst increasing the value of channel correlations. 3) Ne > Nt : Fig 6 shows the security capacity (upper) and outage security capacity (lower) when SN R = 10dB of GPSM with GAS employing CI based pre-coding when [Nt , Nr , Na ] = [16, 8, 2] and Ne = [16, 18, 20, 22, 24]. It is clear from the upper subplot of Fig 6 that the higher the number of receive antennas Ne at Eve, the lower and narrower positive security capacity exhibited, as Eve’s capability is naturally improved. Also, we can see from the lower subplot of Fig 6 that the higher the number of receive antennas Ne at Eve, the lower the span of positive security capacity values. For example, when Ne = 22, the security capacity ranges upto 1 bits/s/Hz, while when Ne = 16, the security capacity ranges upto nearly 4 bits/s/Hz. Both figures suggest that our proposed physical layer security of GPSM with antenna scrambling works reasonably well even under Ne > Nt . V. C ONCLUSION VI. L IST OF P UBLICATIONS R EFERENCES [1] C. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, Oct 1949. [2] A. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, Oct 1975. [3] I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–348, May 1978. [4] Y. Liang, H. Poor, and S. Shamai, “Secure communication over fading channels,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2470–2492, June 2008. [5] P. K. Gopala, L. Lai, and H. El-Gamal, “On the secrecy capacity of fading channels,” IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687–4698, Oct 2008. [6] A. Hero, “Secure space-time communication,” IEEE Transactions on Information Theory, vol. 49, no. 12, pp. 3235–3249, Dec 2003. [7] A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas - part I: The MISOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 3088–3104, July 2010. [8] ——, “Secure transmission with multiple antennas - part II: The MIMOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5515–5532, July 2010. [9] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180–2189, June 2008. [10] L. Lai and H. El Gamal, “The relay-eavesdropper channel: Cooperation for secrecy,” IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005–4019, Sept 2008. [11] E. Ekrem and S. Ulukus, “Secrecy in cooperative relay broadcast channels,” IEEE Transactions on Information Theory, vol. 57, no. 1, pp. 137–155, Jan 2011. [12] L.-L. Yang, “Transmitter preprocessing aided spatial modulation for multiple-input multiple-output systems,” in IEEE 73rd Vehicular Technology Conference (VTC Spring), 2011, pp. 1–5. [13] R. Zhang, L.-L. Yang, and L. Hanzo, “Generalised pre-coding aided spatial modulation,” IEEE Transactions on Wireless Communications, vol. 12, no. 11, pp. 5434–5443, Nov 2013. [14] R. Mesleh, H. Haas, S. Sinanovic, C. W. Ahn, and S. Yun, “Spatial modulation,” IEEE Transactions on Vehicular Technology, vol. 57, no. 4, pp. 2228–2241, 2008. [15] M. Di Renzo, H. Haas, A. Ghrayeb, S. Sugiura, and L. Hanzo, “Spatial modulation for generalized MIMO: Challenges, opportunities, and implementation,” Proceedings of the IEEE, vol. 102, no. 1, pp. 56–103, Jan 2014. [16] R. Zhang, L.-L. Yang, and L. Hanzo, “Error probability and capacity analysis of generalised pre-coding aided spatial modulation,” submitted to IEEE Transactions on Wireless Communications. [Online]. Available: http://eprints.soton.ac.uk/id/eprint/360422 [17] S. Sinanovic, N. Serafimovski, M. Di Renzo, and H. Haas, “Secrecy capacity of space keying with two antennas,” in 2012 IEEE Vehicular Technology Conference (VTC Fall), Sept 2012, pp. 1–5. [18] S. Sinanovic, M. Di Renzo, and H. Haas, “Secrecy rate of time switched transmit diversity system,” in 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), May 2011, pp. 1–5. [19] C. Peel, B. Hochwald, and A. Swindlehurst, “A vector-perturbation technique for near-capacity multiantenna multiuser communicationPart I: channel inversion and regularization,” IEEE Transactions on Communications, vol. 53, no. 1, pp. 195–202, Jan 2005. [20] Q. Spencer, A. Swindlehurst, and M. Haardt, “Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels,” IEEE Transactions on Signal Processing, vol. 52, no. 2, pp. 461–471, Feb 2004. [21] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed. Wiley-Interscience, 2006. [22] A. Babakhani, D. Rutledge, and A. Hajimiri, “Transmitter architectures based on near-field direct antenna modulation,” IEEE Journal of SolidState Circuits, vol. 43, no. 12, pp. 2674–2692, Dec 2008. [23] ——, “Near-field direct antenna modulation,” IEEE Microwave Magazine, vol. 10, no. 1, pp. 36–46, Feb. 2009. [24] M. Daly and J. Bernhard, “Directional modulation technique for phased arrays,” IEEE Transactions on Antennas and Propagation, vol. 57, no. 9, pp. 2633–2640, Sept 2009. [25] J. Kermoal, L. Schumacher, K. Pedersen, P. Mogensen, and F. Frederiksen, “A stochastic MIMO radio channel model with experimental validation,” IEEE Journal on Selected Areas in Communications, vol. 20, no. 6, pp. 1211–1226, Aug 2002. [26] L. Varshney, “On energy/information cross-layer architectures,” in 2012 IEEE International Symposium on Information Theory, 2012, pp. 1356– 1360. [27] R. Zhang, Y. Cui, H. Claussen, H. Haas, and L. Hanzo, “Anticipatory association for indoor visible light communications: Light, follow me !” IEEE Transactions on Wireless Communications, submitted. [28] R. Zhang, M. Biagi, L. Lampe, T. D. Little, S. Mangold, and Z. Xu, “Localisation, communication and networking with VLC: Challenges and opportunities,” IEEE Journal on Selected Areas in Communications, submitted. [29] R. Zhang, A. F. A. Rawi, L. D. Humphrey, and L. Hanzo, “Expanded constellation mapping for enhanced far-end-cross-talk cancellation in G.fast,” IEEE Communications Letters, vol. 21, no. 1, pp. 56–59, Jan 2017. [30] R. Zhang, L. L. Yang, and L. Hanzo, “Performance analysis of non-linear generalized pre-coding aided spatial modulation,” IEEE Transactions on Wireless Communications, vol. 15, no. 10, pp. 6731– 6741, Oct 2016. [31] R. Zhang, H. Claussen, H. Haas, and L. Hanzo, “Energy efficient visible light communications relying on amorphous cells,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 4, pp. 894–906, April 2016. [32] R. Zhang, J. Wang, Z. Wang, Z. Xu, C. Zhao, and L. Hanzo, “Visible light communications in heterogeneous networks: Paving the way for user-centric design,” IEEE Wireless Communications, vol. 22, no. 2, pp. 8–16, April 2015. [33] R. Zhang, L. L. Yang, and L. Hanzo, “Energy pattern aided simultaneous wireless information and power transfer,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 8, pp. 1492–1504, Aug 2015. [34] R. Zhang, R. G. Maunder, and L. Hanzo, “Wireless information and power transfer: from scientific hypothesis to engineering practice,” IEEE Communications Magazine, vol. 53, no. 8, pp. 99–105, August 2015. [35] R. Zhang, L. L. Yang, and L. Hanzo, “Error probability and capacity analysis of generalised pre-coding aided spatial modulation,” IEEE Transactions on Wireless Communications, vol. 14, no. 1, pp. 364– 375, Jan 2015. [36] R. Zhang and L. Hanzo, “Multi-layer modulation for intensitymodulated direct-detection optical OFDM,” IEEE/OSA Journal of Optical Communications and Networking, vol. 5, no. 12, pp. 1402– 1412, Dec 2013. [37] ——, “Advances in base- and mobile-station aided cooperative wireless communications: An overview,” IEEE Vehicular Technology Magazine, vol. 8, no. 1, pp. 57–69, March 2013. [38] ——, “Cooperative downlink multicell preprocessing relying on reduced-rate back-haul data exchange,” IEEE Transactions on Vehicular Technology, vol. 60, no. 2, pp. 539–545, 2011. [39] ——, “Multiple-source cooperation: From code-division multiplexing to variable-rate network coding,” IEEE Transactions on Vehicular Technology, vol. 60, no. 3, pp. 1005–1015, March 2011. [40] ——, “A unified treatment of superposition coding aided communications: Theory and practice,” IEEE Communications Surveys Tutorials, vol. 13, no. 3, pp. 503–520, Third 2011. [41] ——, “Superposition-aided delay-constrained hybrid automatic repeat request,” IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp. 2109–2115, May 2010. [42] ——, “Cochannel interference mitigation: passive and active techniques,” IEEE Vehicular Technology Magazine, vol. 5, no. 4, pp. 31–39, 2010. [43] R. Zhang, L. Xu, S. Chen, and L. Hanzo, “EXIT-chart-aided hybrid multiuser detector for multicarrier interleave-division multiple access,” IEEE Transactions on Vehicular Technology, vol. 59, no. 3, pp. 1563– 1567, March 2010. [44] R. Zhang and L. Hanzo, “Interleaved random space time coding for multisource cooperation,” IEEE Transactions on Vehicular Technology, vol. 58, no. 4, pp. 2120–2125, May 2009. [45] ——, “Superposition-coding-aided multiplexed hybrid ARQ scheme for improved end-to-end transmission efficiency,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4681–4686, Oct 2009. [46] ——, “Coding schemes for energy efficient multi-source cooperation aided uplink transmission,” IEEE Signal Processing Letters, vol. 16, no. 5, pp. 438–441, May 2009. [47] ——, “Iterative multiuser detection and channel decoding for DSCDMA using harmony search,” IEEE Signal Processing Letters, vol. 16, no. 10, pp. 917–920, Oct 2009. [48] ——, “Three design aspects of multicarrier interleave division multiple access,” IEEE Transactions on Vehicular Technology, vol. 57, no. 6, pp. 3607–3617, Nov 2008. [49] ——, “Space-time coding for high-throughput interleave division multiplexing aided multi-source co-operation,” Electronics Letters, vol. 44, no. 5, pp. 367–368, Feb 2008. [50] J. Zhang, R. Zhang, R. G. Maunder, S. Chen, and L. Hanzo, “Adaptive coding and modulation for large-scale antenna array based aeronautical communications in the presence of co-channel interference,” IEEE Transactions on Wireless Communications, submitted. [51] Q. Wang, R. Zhang, L. L. Yang, and L. Hanzo, “Non-orthogonal multiple access: A unified perspective,” IEEE Wireless Communications, submitted. [52] S. Gupta, R. Zhang, and L. Hanzo, “Energy harvesting aided device-todevice communication in the heterogeneous two-tier downlink,” IEEE Transactions on Communications, submitted. [53] Y. Wang, Y. Xu, Y. Yang, X. Gao, B. Zhu, W. Cai, J. Yuan, R. Zhang, and H. Zhu, “Simultaneous light emission and detection of InGaN/GaN multiple quantum well diodes for in-plane visible light communication,” Optics Communications, (early access), 2016. [54] X. Li, Y. Huo, R. Zhang, and L. Hanzo, “User-centric visible light communications for energy-efficient scalable video streaming,” IEEE Transactions on Green Communications and Networking, vol. 1, no. 1, pp. 59–73, March 2017. [55] S. Gupta, R. Zhang, and L. Hanzo, “Energy harvesting aided deviceto-device communication underlaying the cellular downlink,” IEEE Access, (early access), 2016. [56] F. Jin, X. Li, R. Zhang, C. Dong, and L. Hanzo, “Resource allocation under delay-guarantee constraints for visible-light communication,” IEEE Access, vol. 4, pp. 7301–7312, 2016. [57] J. Wang, Y. Xu, X. Ling, R. Zhang, Z. Ding, and C. Zhao, “PAPR analysis for OFDM visible light communication,” Optics Express, vol. 24, no. 24, pp. 27 457–27 474, Nov 2016. [58] B. Li, R. Zhang, W. Xu, C. Zhao, and L. Hanzo, “Joint dimming control and transceiver design for MIMO-aided visible light communication,” IEEE Communications Letters, vol. 20, no. 11, pp. 2193–2196, Nov 2016. [59] S. Gupta, S. Kumar, R. Zhang, S. Kalyani, K. Giridhar, and L. Hanzo, “Resource allocation for D2D links in the FFR and SFR aided cellular downlink,” IEEE Transactions on Communications, vol. 64, no. 10, pp. 4434–4448, Oct 2016. [60] S. Gupta, R. Zhang, and L. Hanzo, “Throughput maximization for a buffer-aided successive relaying network employing energy harvesting,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6758–6765, Aug 2016. [61] J. Jiang, P. Zhang, R. Zhang, S. Chen, and L. Hanzo, “Aperture selection for ACO-OFDM in free-space optical turbulence channel,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6089– 6100, Aug 2016. [62] S. Feng, X. Li, R. Zhang, M. Jiang, and L. Hanzo, “Hybrid positioning aided amorphous-cell assisted user-centric visible light downlink techniques,” IEEE Access, vol. 4, pp. 2705–2713, 2016. [63] C. Zhu, Y. Huo, J. Jiang, H. Sun, C. Dong, R. Zhang, and L. Hanzo, “Hierarchical colour-shift-keying aided layered video streaming for the visible light downlink,” IEEE Access, vol. 4, pp. 3127–3152, 2016. [64] C. Zhu, Y. Huo, B. Zhang, R. Zhang, M. El-Hajjar, and L. Hanzo, “Adaptive-truncated-HARQ-aided layered video streaming relying on interlayer fec coding,” IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1506–1521, March 2016. [65] X. Li, F. Jin, R. Zhang, J. Wang, Z. Xu, and L. Hanzo, “Users first: User-centric cluster formation for interference-mitigation in visiblelight networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 39–53, Jan 2016. [66] X. Li, R. Zhang, and L. Hanzo, “Cooperative load balancing in hybrid visible light communications and WiFi,” IEEE Transactions on Communications, vol. 63, no. 4, pp. 1319–1329, April 2015. [67] F. Jin, R. Zhang, and L. Hanzo, “Resource allocation under delayguarantee constraints for heterogeneous visible-light and RF femtocell,” IEEE Transactions on Wireless Communications, vol. 14, no. 2, pp. 1020–1034, Feb 2015. [68] B. Li, J. Wang, R. Zhang, H. Shen, C. Zhao, and L. Hanzo, “Multiuser MISO transceiver design for indoor downlink visible light communication under per-LED optical power constraints,” IEEE Photonics Journal, vol. 7, no. 4, pp. 1–15, Aug 2015. [69] J. Jiang, R. Zhang, and L. Hanzo, “Analysis and design of threestage concatenated color-shift keying,” IEEE Transactions on Vehicular Technology, vol. 64, no. 11, pp. 5126–5136, Nov 2015. [70] F. Wu, R. Zhang, L. L. Yang, and W. Wang, “Transmitter precodingaided spatial modulation for secrecy communications,” IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 467–471, Jan 2016. [71] J. Feng, R. Zhang, L. Hanzo, and S. X. Ng, “Cooperative medium access control based on spectrum leasing,” IEEE Transactions on Vehicular Technology, vol. 63, no. 1, pp. 297–307, Jan 2014. [72] J. Zhang, F. Jin, R. Zhang, G. Li, and L. Hanzo, “Analysis and design of distributed antenna-aided twin-layer femto- and macrocell networks relying on fractional frequency reuse,” IEEE Transactions on Vehicular Technology, vol. 63, no. 2, pp. 763–774, Feb 2014. [73] F. Jin, R. Zhang, and L. Hanzo, “Fractional frequency reuse aided twinlayer femtocell networks: Analysis, design and optimization,” IEEE Transactions on Communications, vol. 61, no. 5, pp. 2074–2085, May 2013. [74] J. Zhang, R. Zhang, G. Li, and L. Hanzo, “Distributed antenna systems in fractional-frequency-reuse-aided cellular networks,” IEEE Transactions on Vehicular Technology, vol. 62, no. 3, pp. 1340–1349, March 2013. [75] L. Li, X. Zhou, R. Zhang, D. Zhang, and L. Hanzo, “Performance and capacity analysis of poisson photon-counting based iter-PIC OCDMA systems,” Optics Express, vol. 21, no. 22, pp. 25 954–25 967, Nov 2013. [76] X. Zhou, X. Zheng, R. Zhang, and L. Hanzo, “Chip-interleaved optical code division multiple access relying on a photon-counting iterative successive interference canceller for free-space optical channels,” Optics Express, vol. 21, no. 13, pp. 15 926–15 937, Jul 2013. [77] X. Zhou, D. Zhang, R. Zhang, and L. Hanzo, “A photon-counting spatial-diversity-and-multiplexing MIMO scheme for poisson atmospheric channels relying on Q-ary PPM,” Optics Express, vol. 20, no. 24, pp. 26 379–26 393, Nov 2012. [78] J. Zhang, R. Zhang, G. Li, and L. Hanzo, “Remote coalition network elements for base station cooperation aided multicell processing,” IEEE Transactions on Vehicular Technology, vol. 61, no. 3, pp. 1406–1415, March 2012. [79] J. Feng, R. Zhang, and L. Hanzo, “A spectrum leasing cooperative medium access protocol and its stability analysis,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3718–3730, Oct 2012. [80] X. Xu, R. Zhang, S. Ghafoor, and L. Hanzo, “Imperfect digitalfiber-optic-link-based cooperative distributed antennas with fractional frequency reuse in multicell multiuser networks,” IEEE Transactions on Vehicular Technology, vol. 60, no. 9, pp. 4439–4449, Nov 2011. [81] N. Bonello, R. Zhang, S. Chen, and L. Hanzo, “Channel code-division multiple access and its multilevel-structured LDPC-based instantiation,” IEEE Transactions on Vehicular Technology, vol. 58, no. 5, pp. 2549–2553, Jun 2009. [82] ——, “Reconfigurable rateless codes,” IEEE Transactions on Wireless Communications, vol. 8, no. 11, pp. 5592–5600, November 2009. [83] X. Li, F. Jin, R. Zhang, and L. Hanzo, “Joint cluster formation and user association under delay guarantees in visible-light networks,” in 2016 IEEE Global Telecommunications Conference, Dec (early access) 2016. [84] X. Li, R. Zhang, J. Wang, and L. Hanzo, “Cell-centric and user-centric multi-user scheduling in visible light communication aided networks,” in 2015 IEEE International Conference on Communications, June 2015, pp. 5120–5125. [85] J. Zhang, R. Zhang, G. Li, and L. Hanzo, “Coalition network elements for base station cooperation,” in 2012 IEEE Vehicular Technology Conference Fall, Sept 2012, pp. 1–5. [86] F. Jin, R. Zhang, and L. Hanzo, “Frequency-swapping aided femtocells in twin-layer cellular networks relying on fractional frequency reuse,” in 2012 IEEE Wireless Communications and Networking Conference, April 2012, pp. 3097–3101. [87] J. Zhang, R. Zhang, X. Xu, G. Li, and L. Hanzo, “Effects of practical impairments on cooperative distributed antennas combined with fractional frequency reuse,” in 2012 IEEE Wireless Communications and Networking Conference, April 2012, pp. 1088–1092. [88] X. Xu, R. Zhang, and L. Hanzo, “Digital RoF aided cooperative distributed antennas with FFR in multicell multiuser networks,” in 2011 IEEE Vehicular Technology Conference Fall, Sept 2011, pp. 1–5. [89] J. Feng, R. Zhang, and L. Hanzo, “Auction-style cooperative medium access control,” in 2011 IEEE Vehicular Technology Conference Fall, Sept 2011, pp. 1–5. [90] J. Feng, R. Zhang, S. X. Ng, and L. Hanzo, “Relay selection for energyefficient cooperative media access control,” in 2011 IEEE Wireless Communications and Networking Conference, March 2011, pp. 287– 292. [91] R. Zhang and L. Hanzo, “Variable-rate network coding for multi-source cooperation,” in 2011 IEEE Wireless Communications and Networking Conference, March 2011, pp. 1517–1522. [92] R. Zhang, K. Giridhar, and L. Hanzo, “Distributed downlink multi-cell processing requiring reduced-rate back-haul data exchange,” in 2011 IEEE Wireless Communications and Networking Conference, March 2011, pp. 1277–1281. [93] R. Zhang, X. Xu, and L. Hanzo, “Co-channel interference mitigation capability of fixed relays connected by optical fibre,” in 2010 IEEE Vehicular Technology Conference Fall, Sept 2010, pp. 1–5. [94] X. Xu, R. Zhang, and L. Hanzo, “Imperfect radio over fibre aided distributed antennas with fractional frequency reuse,” in 2010 IEEE Vehicular Technology Conference Fall, Sept 2010, pp. 1–5. [95] R. Zhang and L. Hanzo, “Joint and distributed linear precoding for centralised and decentralised multicell processing,” in 2010 IEEE Vehicular Technology Conference Fall, Sept 2010, pp. 1–5. [96] ——, “Harmony search aided iterative channel estimation, multiuser detection and channel decoding for DS-CDMA,” in 2010 IEEE Vehicular Technology Conference Fall, Sept 2010, pp. 1–5. [97] ——, “Multiplexed hybrid ARQ for energy efficient transmissions under delay constraints,” in 2010 IEEE International Conference on Communications, May 2010, pp. 1–5. [98] M. F. U. Butt, R. Zhang, S. X. Ng, and L. Hanzo, “Superposition coding aided bi-directional relay transmission employing iteratively decoded self-concatenated convolutional codes,” in 2010 IEEE Vehicular Technology Conference Spring, May 2010, pp. 1–5. [99] R. Zhang and L. Hanzo, “Superposition-coding aided multiplexed hybrid ARQ scheme for improved link-layer transmission efficiency,” in 2009 IEEE International Conference on Communications, June 2009, pp. 1–5. [100] N. Bonello, R. Zhang, S. Chen, and L. Hanzo, “Reconfigurable rateless codes,” in 2009 IEEE Vehicular Technology Conference Spring, April 2009, pp. 1–5. [101] R. Zhang and L. Hanzo, “Physical-layer algebraic network coding and superposition coding for the multi-source cooperation aided uplink,” in 2009 IEEE Vehicular Technology Conference Spring, April 2009, pp. 1–5. [102] ——, “High-throughput non-orthogonal interleaved random space-time coding for multi-source cooperation,” in 2008 IEEE Global Telecommunications Conference, Nov 2008, pp. 1–5. [103] N. Bonello, R. Zhang, S. Chen, and L. Hanzo, “Channel code division multiple access and its multilevel structured LDPC based instantiation,” in 2008 IEEE Vehicular Technology Conference Fall, Sept 2008, pp. 1–5. [104] R. Zhang, L. Xu, S. Chen, and L. Hanzo, “Repeat accumulate code division multiple access and its hybrid detection,” in 2008 IEEE International Conference on Communications, May 2008, pp. 4790– 4794. [105] L. Xu, R. Zhang, S. Chen, and L. Hanzo, “EXIT-chart aided hybrid multiuser detector design for frequency-domain-spread chip-interleaved MC-CDMA,” in 2008 IEEE Vehicular Technology Conference Spring, May 2008, pp. 1816–1820. [106] R. Zhang and L. Hanzo, “Interleave division multiplexing aided spacetime coding for high-throughput uplink cooperative communications,” in 2008 IEEE Wireless Communications and Networking Conference, March 2008, pp. 465–469. [107] ——, “EXIT chart based joint code-rate and spreading-factor optimisation of single-carrier interleave division multiple access,” in 2007 IEEE Wireless Communications and Networking Conference, March 2007, pp. 735–739.