Secrecy Analysis of SSK Modulation: Adaptive Antenna Mapping and Performance Results

Ugrasen Singh, Manav R. Bhatnagar, Theodoros A. Tsiftsis

Research output: Contribution to journalArticlepeer-review


In this paper, we investigate the physical layer security based on space shift keying (SSK) in which bit-to-spatial mapping of antenna indices dynamically adapts according to the partial channel state information (CSI) of the legitimate channel at the transmitter (Tx). Further, the Tx also adapts transmit power allocation to each transmit antenna according to partial CSI. Since an eavesdropper (Eve) is not (usually) aware of the legitimate CSI, it cannot successfully decode the antenna index; thus, transmission over the legitimate channel is secured from the wiretapping of Eve. An important virtue of the proposed scheme is that the Tx does not require full CSI of the legitimate and eavesdropper channels to secure the confidential information. The proposed work focuses on the secrecy rate (SR) and bit error rate (BER) of the considered multiple-input single-output system over Rayleigh fading channels. Approximate expressions of Bob’s data rate for 2-ary and 4-ary SSK modulations are derived in closed-form. Furthermore, an upper-bound of Bob’s data rate for Na-ary SSK modulation is also derived. In order to obtain the secrecy rate for the proposed scheme, we also evaluate Eve’s data rate. Analytical results of SR and BER demonstrate the robustness of the proposed scheme. All numerical results are thoroughly verified by using extensive Monte Carlo simulations.

Original languageEnglish
JournalIEEE Transactions on Wireless Communications
Publication statusAccepted/In press - 2021


  • Artificial intelligence
  • Bit error rate
  • Communication system security
  • feedback
  • Jamming
  • ML–detection
  • multiple-input single-output
  • Precoding
  • Rayleigh fading
  • secrecy rate
  • Security
  • space shift keying
  • Transmitting antennas
  • Wireless communication

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Secrecy Analysis of SSK Modulation: Adaptive Antenna Mapping and Performance Results'. Together they form a unique fingerprint.

Cite this