Invited paper: Dual-Keying Hybrid Modulation for Physical Layer Security in 5G/6G Scalable Array

This paper presents new analysis of Time Modulated Arrays (TMAs) used for physical layer security (PLS) in wireless networks, considering the electronics hardware limitation compared to conventional methods, leakage of the off elements in the switched antenna arrays. Such leakage degrades the harmon...

Full description

Saved in:
Bibliographic Details
Published inConference proceedings : Midwest Symposium on Circuits and Systems pp. 146 - 151
Main Authors Li, Haoling, Ebrahimi, Najme
Format Conference Proceeding
LanguageEnglish
Published IEEE 11.08.2024
Subjects
Online AccessGet full text
ISSN1558-3899
DOI10.1109/MWSCAS60917.2024.10658902

Cover

Abstract This paper presents new analysis of Time Modulated Arrays (TMAs) used for physical layer security (PLS) in wireless networks, considering the electronics hardware limitation compared to conventional methods, leakage of the off elements in the switched antenna arrays. Such leakage degrades the harmonic power at the side-lobes, compromising security against eavesdropping. Addressing this challenge, the paper introduces an innovative design, Dual Keying Hybrid Modulation (DKHM), which combines a 1-bit direct modulator for Amplitude Shift Keying (ASK) modulation with time modulation. This approach significantly enhances security by improving the Bit Error Rate (BER) at side-lobes beyond 10 degrees with BER larger than 10^{-1} . The findings suggest a paradigm shift in physical layer security strategies, taking into consideration the nonidealities of electronic and hardware components in communication systems. The proposed Dual Keying Hybrid Modulation, encompassing both amplitude and time modulation, demonstrates effectiveness in mitigating the power leakage issue and enhancing physical layer security.
AbstractList This paper presents new analysis of Time Modulated Arrays (TMAs) used for physical layer security (PLS) in wireless networks, considering the electronics hardware limitation compared to conventional methods, leakage of the off elements in the switched antenna arrays. Such leakage degrades the harmonic power at the side-lobes, compromising security against eavesdropping. Addressing this challenge, the paper introduces an innovative design, Dual Keying Hybrid Modulation (DKHM), which combines a 1-bit direct modulator for Amplitude Shift Keying (ASK) modulation with time modulation. This approach significantly enhances security by improving the Bit Error Rate (BER) at side-lobes beyond 10 degrees with BER larger than 10^{-1} . The findings suggest a paradigm shift in physical layer security strategies, taking into consideration the nonidealities of electronic and hardware components in communication systems. The proposed Dual Keying Hybrid Modulation, encompassing both amplitude and time modulation, demonstrates effectiveness in mitigating the power leakage issue and enhancing physical layer security.
Author Li, Haoling
Ebrahimi, Najme
Author_xml – sequence: 1
  givenname: Haoling
  surname: Li
  fullname: Li, Haoling
  email: li.haoling@northeastern.edu
  organization: Northeastern University,Department of Electrical and Computer Engineering,Boston,MA,USA
– sequence: 2
  givenname: Najme
  surname: Ebrahimi
  fullname: Ebrahimi, Najme
  email: n.ebrahimi@northeastern.edu
  organization: Northeastern University,Department of Electrical and Computer Engineering,Boston,MA,USA
BookMark eNo1kEFLwzAYQKMo6Ob-gYf4A7p9SZqk8TambsMNhSoe55c01UhtR9oJ-fcK6ukdHrzDG5GTtms9IVcMpoyBmW1fysW8VGCYnnLg-ZSBkoUBfkQmRptCSBCFZtock3MmZZGJwpgzMur7DwAuNDPn5HXdfoXBV3SPex-v6c0Bm-zep9C-0VWyMVR021WHBofQtbTuIn18T31w2NANJh9p6d0hhiHR0FK5nKklLX8k2sbTeYyYLshpjU3vJ38ck-e726fFKts8LNeL-SYLTKshYxIs5NoaRAO1lFIjU8xJJSrlHWpXS2sdt0zkzAGCzo223mrFc8lRczEml7_d4L3f7WP4xJh2_0fENzWYV2M
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/MWSCAS60917.2024.10658902
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9798350387179
EISSN 1558-3899
EndPage 151
ExternalDocumentID 10658902
Genre orig-research
GroupedDBID 29B
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i176t-150b047b9aa90f5557a161c563d6eca7cf5bbc2b1341c0a07497beb762452a723
IEDL.DBID RIE
IngestDate Wed Aug 27 02:00:27 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i176t-150b047b9aa90f5557a161c563d6eca7cf5bbc2b1341c0a07497beb762452a723
PageCount 6
ParticipantIDs ieee_primary_10658902
PublicationCentury 2000
PublicationDate 2024-Aug.-11
PublicationDateYYYYMMDD 2024-08-11
PublicationDate_xml – month: 08
  year: 2024
  text: 2024-Aug.-11
  day: 11
PublicationDecade 2020
PublicationTitle Conference proceedings : Midwest Symposium on Circuits and Systems
PublicationTitleAbbrev MWSCAS
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0023719
Score 2.2643256
Snippet This paper presents new analysis of Time Modulated Arrays (TMAs) used for physical layer security (PLS) in wireless networks, considering the electronics...
SourceID ieee
SourceType Publisher
StartPage 146
SubjectTerms Amplitude shift keying
Bit error rate
dual-keying hybrid modulation (DKHM)
Harmonic analysis
Modulation
Physical layer security
Power system harmonics
Time modulated arrays
Wireless networks
Title Invited paper: Dual-Keying Hybrid Modulation for Physical Layer Security in 5G/6G Scalable Array
URI https://ieeexplore.ieee.org/document/10658902
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA66B9EXbxPvRPC1XW9JFt_GdJuXjcEc7m0m6RkMpRulFeav96TrvIHgSyktoSUn7fedJN93CLkMIkDQ4JGDwcUExQBzpPJCJ8axLOthHMjCp7vb451hdDdio1KsXmhhAKDYfAauPS3W8uOZye1UGX7hiJfSWkeu4zhbirU-s6tQ-HKDXJQmmrXu06DZGHCEQ4FZYBC5q8Y_yqgUKNLaJr3V85ebR17cPNOuef9lzfjvF9wh1S_BHu1_QtEuWYNkj2x98xrcJ8-3yZull3Su5pBe0etcvTr3YFVOtLOwui3ancVlMS-KVJb2yxDSB4W8nA7KSnd0mlDWrvE2HeBNq7yijTRViyoZtm4emx2nLK_gTH3BMwepoPYioaVS0pswxoRC-mcYD2MORgkzYVqbQFvLN-Mp5BpSaND494xYoEQQHpBKMkvgkNA6UxwmdnuWhwkjCMklHrBdHEd-oMURqdrOGs-XDhrjVT8d_3H9hGzamNm5W98_JZUszeEMwT_T50XQPwAYsKu2
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1ba8IwGA3DwS4vuzl2XwZ7be0tidmbuGmdVoQq880lbQTZqFLagfv1-1LrbjDYSyktgZCkPedLvnM-hG4dTwFoUM-AyYUAJVLE4MJyjRjWMq-7scMLn-6gT_2R9zgm41KsXmhhlFJF8pky9W1xlh_Po1xvlcEXDnjJtXXkJgC_R1Zyrc_4ymU230I3pY1mLXgKm42QAiAyiAMdz1w3_1FIpcCR1h7qr3uwSh95MfNMmtH7L3PGf3dxH1W_JHt48AlGB2hDJYdo95vb4BF67iRvmmDihVio9A7f5-LV6Cqtc8L-Uiu3cDCPy3JeGMgsHpSTiHsCmDkOy1p3eJZg0q7RNg7hpdZe4UaaimUVjVoPw6ZvlAUWjJnNaGYAGZSWxyQXgltTQggTQAAjQt2YqkiwaEqkjBypTd8iSwDb4EwqCf9PjziCOe4xqiTzRJ0gXCeCqqlO0LIgZFSMUw4XaBfHnu1IdoqqerAmi5WHxmQ9Tmd_PL9G2_4w6E16nX73HO3o-dM7ubZ9gSpZmqtLoAKZvCoWwAdHMa8D
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Conference+proceedings+%3A+Midwest+Symposium+on+Circuits+and+Systems&rft.atitle=Invited+paper%3A+Dual-Keying+Hybrid+Modulation+for+Physical+Layer+Security+in+5G%2F6G+Scalable+Array&rft.au=Li%2C+Haoling&rft.au=Ebrahimi%2C+Najme&rft.date=2024-08-11&rft.pub=IEEE&rft.eissn=1558-3899&rft.spage=146&rft.epage=151&rft_id=info:doi/10.1109%2FMWSCAS60917.2024.10658902&rft.externalDocID=10658902