Abstract
Industrial wireless sensor networks (IWSNs) provide intelligent factory management with a new dimension. Reliable intelligent industrial wireless sensing systems play a vital role in ensuring the reliability and security of IWSNs. Therefore, improving the confidentiality of real-time communication of intelligent industrial wireless sensing systems and making IWSNs more intelligent has attracted widespread attention. This paper proposes two high-performance antenna selection (AS) schemes along with friendly jamming to protect the confidentiality of real-time communication of intelligent industrial wireless sensing systems based on space shift keying (SSK). Additionally, two AS schemes named the generalized Euclidean distance antenna selection (GEDAS) and the leakage-based antenna selection (LBAS) are proposed for maximizing the difference in average mutual information (AMI) between D and E. In this way, the physical layer security (PLS) of the system is further improved. Moreover, the algorithmic complexity of the two proposed AS schemes is thoroughly analyzed in this paper. The simulation results demonstrate that the performance of the proposed joint schemes is superior to the traditional random selection scheme in terms of secrecy rate (SR), secrecy capacity (SC), and bit error rate (BER). Thus, the security enhancement benefits the real-time communication of the intelligent industrial wireless sensing systems and prevents data transmission leakage.
Supported by organization Macao Polytechnic University.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yang, D., et al.: Assignment of segmented slots enabling reliable real-time transmission in industrial wireless sensor networks. IEEE Trans. Ind. Electron. 62(6), 3966ā3977 (2015)
Wang, H., Yu, F., Li, M., Zhong, Y.: Clock skew estimation for timestamp-free synchronization in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 17(1), 90ā99 (2021)
Hang, N.T.T., Trinh, N.C., Ban, N.T., Raza, M., Nguyen, H.X.: Delay and reliability analysis of p-persistent carrier sense multiple access for multi-event industrial wireless sensor networks. IEEE Sens. J. 20(20), 12402ā12414 (2020)
Farag, H., Sisinni, E., Gidlund, M., Ćsterberg, P.: Priority-aware wireless fieldbus protocol for mixed-criticality industrial wireless sensor networks. IEEE Sens. J. 19(7), 2767ā2780 (2018)
Mietzner, J., Schober, R., Lampe, L., Gerstacker, W.H., Hoeher, P.A.: Multiple-antenna techniques for wireless communications-a comprehensive literature survey. IEEE Commun. Surv. Tutor. 11(2), 87ā105 (2009)
Zhang, J., Bjƶrnson, E., Matthaiou, M., Ng, D.W.K., Yang, H., Love, D.J.: Prospective multiple antenna technologies for beyond 5G. IEEE J. Sel. Areas Commun. 38(8), 1637ā1660 (2020)
Mesleh, R., Haas, H., Ahn, C.W., Yun, S.: Spatial modulation-a new low complexity spectral efficiency enhancing technique. In: 2006 First International Conference on Communications and Networking, pp. 1ā5. IEEE, China (2006)
Mesleh, R.Y., Haas, H., Sinanovic, S., Ahn, C.W., Yun, S.: Spatial modulation. IEEE Trans. Veh. Technol. 57(4), 2228ā2241 (2008)
Jeganathan, J., Ghrayeb, A., Szczecinski, L., Ceron, A.: Space shift keying modulation for MIMO channels. IEEE Trans. Wirel. Commun. 8(7), 3692ā3703 (2009)
Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16(3), 1550ā1573 (2014)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656ā715 (1949)
Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355ā1387 (1975)
Shafiee, S., Ulukus, S.: Achievable rates in Gaussian MISO channels with secrecy constraints. In: 2007 IEEE International Symposium on Information Theory, pp. 2466ā2470. IEEE, France (2007)
Mirzaee, M., Akhlaghi, S.: Achievable secrecy rate of wiretap channels incorporating multi-input-multi-output amplify and forward relaying. IET Commun. 10(3), 300ā308 (2016)
Yu, X., Hu, Y., Pan, Q., Dang, X., Li, N., Shan, M.H.: Secrecy performance analysis of artificial-noise-aided spatial modulation in the presence of imperfect CSI. IEEE Access 6, 41060ā41067 (2018)
Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7(6), 2180ā2189 (2008)
Wang, L., Bashar, S., Wei, Y., Li, R.: Secrecy enhancement analysis against unknown eavesdropping in spatial modulation. IEEE Commun. Lett. 19(8), 1351ā1354 (2015)
Guan, X., Cai, Y., Yang, W.: On the mutual information and precoding for spatial modulation with finite alphabet. IEEE Wirel. Commun. Lett. 2(4), 383ā386 (2013)
Ding, Z., Ma, Z., Fan, P.: Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise. IEEE Trans. Wirel. Commun. 13(4), 2189ā2203 (2014)
Huang, Z., Peng, Y., Li, J., Tong, F., Zhu, K., Peng, L.: Secrecy enhancing of SSK systems for IoT applications in smart cities. IEEE Internet Things J. 8(8), 6385ā6392 (2021)
Zhu, H., Peng, Y., Xu, H., Tong, F., Jiang, X.Q., Mirza, M.M.: Secrecy enhancement for SSK-based communications in wireless sensing systems. IEEE Sens. J. 22(18), 18192ā18201 (2022)
Shang, P., Yu, W., Zhang, K., Jiang, X.Q., Kim, S.: Secrecy enhancing scheme for spatial modulation using antenna selection and artificial noise. Entropy 21(7), 626 (2019)
Aghdam, S.R., Duman, T.M.: Physical layer security for space shift keying transmission with precoding. IEEE Wirel. Commun. Lett. 5(2), 180ā183 (2016)
Zhu, H., Peng, Y.: Secrecy enhancing for SSK-based communications in the presence of imperfect CSI estimation. IEEJ Trans. Electr. Electron. Eng. 16(11), 1544ā1546 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xu, H., Ng, B.K., Wang, H., Yang, B., Lam, CT. (2023). Two High-Performance Antenna Selection Schemes for Secure SSK Modulation in Intelligent Industrial Wireless Sensing Systems. In: Hsu, CH., Xu, M., Cao, H., Baghban, H., Shawkat Ali, A.B.M. (eds) Big Data Intelligence and Computing. DataCom 2022. Lecture Notes in Computer Science, vol 13864. Springer, Singapore. https://doi.org/10.1007/978-981-99-2233-8_33
Download citation
DOI: https://doi.org/10.1007/978-981-99-2233-8_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-2232-1
Online ISBN: 978-981-99-2233-8
eBook Packages: Computer ScienceComputer Science (R0)