1 Introduction
1.1 Existing surveys
Survey | Publication | Year of publication | Main focus |
---|---|---|---|
[8] | IEEE Communications Magazine | 2015 | Information-theoretic physical layer security for heterogeneous networks, massive MIMO and millimeter wave |
[9] | IEEE Communications Surveys and Tutorials | 2017 | Multiple antenna physical layer security techniques and transmit beamforming designs |
[10] | IEEE Communications Surveys and Tutorials | 2017 | Physical layer security technologies and challenges for next generation wireless networks |
[11] | IEEE Journal on Selected Areas in Communications | 2018 | Information-theoretic data confidentiality for massive MIMO, millimeter wave communication, heterogeneous networks and NOMA |
[12] | IEEE Communications Surveys and Tutorials | 2019 | Security vulnerabilities and threats in 5G and post-5G communication networks and future research directions |
[13] | IEEE Communications Surveys and Tutorials | 2019 | Framework of classification of security techniques based on SINR and complexity-based approaches |
[14] | IEEE Communications Surveys and Tutorials | 2019 | Optimization and signal processing techniques for physical layer security |
[15] | IEEE Internet of Things Journal | 2020 | Physical layer security techniques for satellite based internet-of-things |
[16] | International journal of microwave and wireless technologies | 2016 | Review of developments in directional modulation technologies |
This work | Survey and classification framework of directional modulation techniques for PLS of wireless communication networks |
1.2 Contributions
1.3 Organization of paper
2 Physical layer security—three different paradigms
2.1 Communications paradigm
2.2 Information-theoretic paradigm
2.3 Cryptographic paradigm
2.3.1 Physical layer randomness
S.No | PLR Rank | Range of p-values | Description |
---|---|---|---|
1 | ζ = 5 | p − value ≥ 0.5 | Extremely strongly passed |
2 | ζ = 4 | 0.4 ≤ p − value < 0.5 | Strongly passed |
3 | ζ = 3 | 0.3 ≤ p − value < 0.4 | Moderately passed |
4 | ζ = 2 | 0.2 ≤ p − value < 0.3 | Satisfactorily passed |
5 | ζ = 1 | 0.01 ≤ p − value < 0.2 | Barely passed |
6 | ζ = F | p − value < 0.01 | Failed |
3 Classification of DM security techniques
3.1 Angular (1D) DM techniques
Paper | Description | Communications parameters | Information-theoretic measures | Cryptographic strength |
---|---|---|---|---|
Spatial angular DM | ||||
[22] | DM as block ciphers | – | – | PLR |
[49] | Antenna subset modulation | SER | – | – |
[50] | Antenna subset modulation | SER | Secrecy capacity | – |
[51] | Low-complexity ASM | BER | Secrecy capacity | – |
[52] | Eavesdropper attack on ASM | SER, SNR | – | – |
[53] | Iterative FFT-based ASM | SER, beampatterns | – | – |
[54] | Random ASM for vehicular networks | – | Secrecy throughput | – |
[55] | Multi-antenna DM for vehicular networks | – | Secrecy rate | – |
[56] | ASM as block encryption cipher | SER | – | PLR |
[57] | Hamming distance maximization for ASM | – | – | PLR |
[58] | Switched-antenna array for DM | BER, RMSE | – | – |
[59] | Switched-phased array architecture | BER | Secrecy capacity | – |
[60] | Silent antenna hopping | BER | Secrecy capacity | – |
[61] | Linear sparse array based DM | SER, SLL | – | – |
[62] | Convex optimization assisted LSA | BER, pattern beamwidth | – | – |
[63] | Fourier network based circular array for DM | BER, power pattern | – | – |
[64] | DM using retrodirective antenna array | BER, power pattern | – | – |
[65] | Demonstration of 71 GHz directional PHY layer secure link | EVM, power measurements | – | – |
[66] | Near-field direct antenna modulation | BER | – | – |
[67] | Transmitter architecture demonstration of NFDAM | BER, data constellations | – | – |
[68] | Multiple antenna array based positional modulation | BER, beam pattern | – | – |
[69] | Metasurface based positional modulation | BER, beam pattern | – | – |
[70] | Intelligent reflecting surfaces for multipath DM | – | Secrecy rate | – |
Temporal angular DM | ||||
[78] | Time-modulated 4D array | BER, power patterns | – | – |
[79] | Hybrid DM and beamforming for 4D arrays | BER | – | – |
[80] | Time-modulation based vectors for 4D array | BER | – | – |
[81] | Pulse sequence optimization for TMA | Fidelity rate, BER | – | – |
[82] | Experimental assessment of time-modulated DM | Fidelity rate, BER | – | – |
[83] | Time-modulated DM for OFDM transmitter | BER | – | – |
[84] | Multi-carrier TMA | BER | – | – |
Frequency angular DM | ||||
[85] | Random sub-carrier selection for DM | SINR | Secrecy rate | – |
[86] | DFT-based multi-directional DM | Power pattern | Secrecy rate | – |
Phase angular DM | ||||
[87] | Phased array based directional modulation | BER | – | – |
[88] | Demonstration of phased array DM | BER, normalized pattern | – | – |
[89] | Pattern-reconfigurable DM | BER | – | – |
[90] | Dual-beam DM architecture | BER | – | – |
[91] | Hybrid MIMO and phased array DM | BER | Secrecy capacity | – |
[92] | Phased array transmitter using polygon construction | SER | – | – |
Polarization angular DM | ||||
[93] | Polarization state based PLS | SER | – | – |
[94] | Crossed-dipole array based DM | SER | – | – |
[95] | Directional polarization modulation | SER | – | – |
[96] | Angular DM using polarization sensitive array | SER | Secrecy capacity | – |
S.no | Description | Applications |
---|---|---|
Spatial angular DM | ||
1 | Switched-phased array DM architectures are well-suited for secure angular point-to-point wireless communication. Low-complexity and ease of implementation are two major advantages | |
2 | Focussed on cryptographic analysis and optimization of DM arrays. SLL optimization is shown to be ineffective. The need for an integrated security approach for PLS techniques is emphasized | |
3 | Fourier network based circular array for DM [63] | It provides an added advantage of secure beamsteering along two angular directions, i.e. along elevation and azimuth, for more precise and secure transmission at the expense of increased complexity |
4 | DM using retrodirective antenna array [64] | Feasible for more than one user positioned along different angular directions, providing multi-directional security |
5 | Recommended for single antenna based point-to-point secure angular directional communication. Requires switching control circuitry of varactors and switches placed in the near-field of antenna | |
6 | Multiple antenna arrays positioned at different angular directions are required. Overcomes the issue of security breach in case eavesdropper is spatially close to legitimate user, but at the expense of higher complexity. Not feasible for situations in which multiple arrays cannot be placed at multiple spatial positions | |
7 | Intelligent reflecting surfaces for multipath DM [70] | Intelligent reflecting surfaces are used to create multipath transmission. Suited for multipath DM applications |
Temporal angular DM | ||
8 | Antenna array is modulated with respect to sub-slots of time. Major advantage is that hardware level changes in conventional phased array transmitter architecture are not required | |
9 | ||
Frequency angular DM | ||
10 | Random sub-carrier selection for DM [85] | Secures OFDM architecture with respect to angular transmission |
11 | DFT-based multi-directional DM [86] | Provides multi-directional secure OFDM transmission capability |
Phase angular DM | ||
12 | Secures transmission by phase control of antenna array. Major drawback is compromised directivity due to misalignment of array phases | |
13 | Dual-beam phased array [90] | Uses two beams for directional transmission of data symbols. Provides better security than phased array transmitter with reduced antenna elements |
Polarization Angular DM | ||
14 | Transmission is both directionally secure and polarization sensitive. Useful for dual-polarized secure satellite applications |
3.1.1 Spatial angular DM
3.1.2 Temporal angular DM
3.1.3 Frequency angular DM
3.1.4 Phase angular DM
3.1.5 Polarization angular DM
3.2 Range-angular (2D) DM techniques
Paper | Description | Communications parameters | Information-theoretic measures | Cryptographic strength |
---|---|---|---|---|
Frequency range-angular DM | ||||
[97] | DM using frequency diverse array | SINR, probability of detection, BER | – | – |
[98] | Dot-shaped beampattern synthesis of FDA | Beampatterns | – | – |
[99] | WFRFT-aided multi-directional FDA | BER, robustness | Secrecy rate | – |
[100] | SVD-aided multi-directional FDA | BER | Secrecy rate | – |
[101] | FDA over Rayleigh fading channel | – | Secrecy capacity, secrecy outage probability | – |
[102] | Frequency diverse subarray for fixed region beamforming | – | Secrecy rate | – |
[103] | AN-aided FDA over Nakagami-m fading channel | – | Secrecy capacity | – |
[104] | Multi-beam FDA based DM | BER | – | – |
[105] | Multi-carrier FDA | BER | – | – |
[106] | FDA for OFDM transmitter | BER | – | – |
[107] | Genetic algorithm assisted beamforming for FDA | Peak-to-sidelobe ratio, MSE | – | – |
[108] | AN-aided random FDA | – | Secrecy capacity | – |
[109] | FDA using Butler matrix | BER | Secrecy capacity | – |
[110] | Frequency index modulation for FDA | Beampatterns | – | – |
[111] | Discular FDA | Beampatterns | – | – |
Temporal range-angular DM | ||||
[112] | Time-modulated FDA | BER | – | – |
[113] | Time-invariant time-modulated FDA | BER | – | – |
Spatial range-angular DM | ||||
[114] | Antenna index modulation for FDA | Beampatterns | – | – |
[115] | Quadrature spatial modulation based FDA | BER | Capacity analysis | – |
Polarization range-angular DM | ||||
[116] | Polarization sensitive beamforming for FDA | SINR, beampatterns | – | – |
S.no | Description | Applications |
---|---|---|
Frequency range-angular DM | ||
1 | Suitable for point-to-point applications in which both angular direction and range of the legitimate user are known to transmitter | |
2 | Enhanced directional capability of FDA is demonstrated. Particularly useful for multi-user FDA security applications | |
3 | Well-suited for integration with OFDM transmitters | |
4 | Frequency index modulation for FDA [110] | Decoupling of range and angle is achieved for better security compared to simple FDA |
5 | Discular FDA [111] | Two-dimensional array geometry for FDA has been proposed. Suitable for applications in which secure transmission is required in a very narrow region of interest |
Temporal range-angular DM | ||
6 | Time-modulated FDA [112] | Resolves the issue of range-angular coupling in traditional FDA by time-modulation of antenna array |
7 | Time-invariant time-modulated FDA [113] | Logarithmic frequency offsets has been proposed to mitigate the time-variance issue associated with conventional FDA |
Spatial range-angular DM | ||
8 | Antenna index modulation for FDA [114] | Antenna array is both spatially modulated and diversified in frequency. This scheme not only enhances security but also increases throughput at the expense of increased receiver complexity |
9 | Quadrature spatial modulation based FDA [115] | A combination of QSM and FDA for enhanced security has been proposed |
Polarization range-angular DM | ||
10 | Polarization sensitive beamforming for FDA [116] | Polarization sensitive FDA technique provides not only range-angular security but also polarization dependent beam. An added complexity is the polarization control of array |