{"id":"https://openalex.org/W7134961508","doi":"https://doi.org/10.1109/tcomm.2026.3672592","title":"TFTS-Obfuscation: A Combinatorial Spatial-Mapping Framework for Key-Free Physical-Layer Concealment in MIMO Systems","display_name":"TFTS-Obfuscation: A Combinatorial Spatial-Mapping Framework for Key-Free Physical-Layer Concealment in MIMO Systems","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7134961508","doi":"https://doi.org/10.1109/tcomm.2026.3672592"},"language":null,"primary_location":{"id":"doi:10.1109/tcomm.2026.3672592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2026.3672592","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128698985","display_name":"Raed Mesleh","orcid":null},"institutions":[{"id":"https://openalex.org/I230091363","display_name":"German Jordanian University","ror":"https://ror.org/02jgpyd84","country_code":"JO","type":"education","lineage":["https://openalex.org/I230091363"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Raed Mesleh","raw_affiliation_strings":["German Jordanian University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"German Jordanian University, Amman, Jordan","institution_ids":["https://openalex.org/I230091363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028818862","display_name":"Khadiga Eltira","orcid":null},"institutions":[{"id":"https://openalex.org/I31439502","display_name":"University of Benghazi","ror":"https://ror.org/03fh7t044","country_code":"LY","type":"education","lineage":["https://openalex.org/I31439502"]}],"countries":["LY"],"is_corresponding":false,"raw_author_name":"Khadiga Eltira","raw_affiliation_strings":["Faculty of Engineering, University of Benghazi, Benghazi, Libya"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, University of Benghazi, Benghazi, Libya","institution_ids":["https://openalex.org/I31439502"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049312709","display_name":"Mohammad Abudayah","orcid":"https://orcid.org/0000-0001-9671-4961"},"institutions":[{"id":"https://openalex.org/I230091363","display_name":"German Jordanian University","ror":"https://ror.org/02jgpyd84","country_code":"JO","type":"education","lineage":["https://openalex.org/I230091363"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Abudayah","raw_affiliation_strings":["German Jordanian University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"German Jordanian University, Amman, Jordan","institution_ids":["https://openalex.org/I230091363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125564112","display_name":"Manal Ghanem","orcid":null},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Manal Ghanem","raw_affiliation_strings":["Department of Mathematics, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128704756","display_name":"Saud Althunibat","orcid":null},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Saud Althunibat","raw_affiliation_strings":["Communications Engineering Department, King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Communications Engineering Department, King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012850481","display_name":"Abdelhamid Younis","orcid":"https://orcid.org/0000-0002-2499-8536"},"institutions":[{"id":"https://openalex.org/I31439502","display_name":"University of Benghazi","ror":"https://ror.org/03fh7t044","country_code":"LY","type":"education","lineage":["https://openalex.org/I31439502"]}],"countries":["LY"],"is_corresponding":false,"raw_author_name":"Abdelhamid Younis","raw_affiliation_strings":["Faculty of Engineering, University of Benghazi, Benghazi, Libya"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, University of Benghazi, Benghazi, Libya","institution_ids":["https://openalex.org/I31439502"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5128698985"],"corresponding_institution_ids":["https://openalex.org/I230091363"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7712458,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"74","issue":null,"first_page":"6107","last_page":"6116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9125999808311462,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9125999808311462,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.03280000016093254,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.008500000461935997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5995000004768372},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5691999793052673},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49320000410079956},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.45890000462532043},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4099999964237213},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.3986000120639801},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.38940000534057617},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.3887999951839447},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.36320000886917114}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6916000247001648},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5995000004768372},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5691999793052673},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5551999807357788},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49320000410079956},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.45890000462532043},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4357999861240387},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4099999964237213},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.3986000120639801},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.38940000534057617},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.3887999951839447},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.36320000886917114},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.3580000102519989},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.335999995470047},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.31610000133514404},{"id":"https://openalex.org/C30463267","wikidata":"https://www.wikidata.org/wiki/Q1422682","display_name":"Hadamard matrix","level":3,"score":0.3000999987125397},{"id":"https://openalex.org/C195251586","wikidata":"https://www.wikidata.org/wiki/Q1185939","display_name":"Demodulation","level":3,"score":0.2937999963760376},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.2854999899864197},{"id":"https://openalex.org/C115908005","wikidata":"https://www.wikidata.org/wiki/Q2668364","display_name":"Combinatorial explosion","level":2,"score":0.28029999136924744},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.27900001406669617},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.274399995803833},{"id":"https://openalex.org/C122451846","wikidata":"https://www.wikidata.org/wiki/Q5150824","display_name":"Combinatorial design","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.2533999979496002},{"id":"https://openalex.org/C60292330","wikidata":"https://www.wikidata.org/wiki/Q1014065","display_name":"Hadamard transform","level":2,"score":0.2524000108242035}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcomm.2026.3672592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2026.3672592","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,94],"article":[1],"proposes":[2],"a":[3,11,23,45,50,62,84,147,199,205],"two-fold":[4],"triple":[5,81],"system":[6,216],"(TFTS)-based":[7],"obfuscation":[8,201,212],"scheme":[9,43,248],"as":[10,146,198,232,234],"structured":[12],"physical-layer":[13,200],"transmission":[14],"technique":[15],"for":[16,99,102,252],"multiple-input":[17],"multiple-output":[18],"(MIMO)":[19],"systems.":[20],"TFTS":[21,51,71,114,126,158],"is":[22,74,129,144,195,217],"class":[24],"of":[25,52,112,214,258],"combinatorial":[26,72],"block":[27],"designs":[28],"that":[29,87,154,244],"enables":[30],"index-based":[31],"spatial":[32],"signaling":[33],"without":[34],"cryptographic":[35,208],"keys":[36],"or":[37,207],"additional":[38],"computational":[39],"overhead.":[40],"The":[41,70,125,211],"proposed":[42,193,246],"constructs":[44],"space-modulation":[46],"matrix":[47,128],"derived":[48],"from":[49],"order":[53],"<italic":[54,91,105],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[55,92,106,118],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">v</i>,":[56],"where":[57],"each":[58],"row":[59],"corresponds":[60],"to":[61,131,174],"unique":[63],"antenna":[64],"activation":[65],"pattern":[66],"transmitting":[67],"unmodulated":[68],"carriers.":[69],"space":[73,86],"generated":[75],"by":[76],"merging":[77],"two":[78],"non-isomorphic":[79],"Steiner":[80],"systems,":[82],"yielding":[83],"mapping":[85,159],"grows":[88],"super-exponentially":[89],"with":[90],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">v</i>.":[93],"growth":[95],"becomes":[96],"extreme":[97],"even":[98],"moderate":[100],"dimensions;":[101],"example,":[103],"at":[104,137,273],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">v</i>":[107],"=":[108],"40,":[109],"the":[110,138,156,192,215,223,245,253,274],"number":[111],"valid":[113],"realizations":[115],"exceeds":[116],"10<sup":[117],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">10258</sup>,":[119],"rendering":[120],"exhaustive":[121],"reconstruction":[122],"computationally":[123,151],"infeasible.":[124],"constellation":[127],"assumed":[130],"be":[132],"pre-shared":[133],"and":[134,150,160,187,229,262,270],"securely":[135],"stored":[136],"legitimate":[139],"transceivers,":[140],"while":[141,265],"an":[142,179],"eavesdropper":[143],"modeled":[145],"fully":[148],"informed":[149],"unbounded":[152],"adversary":[153,168],"lacks":[155],"correct":[157],"therefore":[161],"operates":[162],"under":[163],"mismatched":[164],"decoding.":[165],"Under":[166],"this":[167],"model,":[169],"Eve\u2019s":[170,230],"demodulation":[171],"decisions":[172],"degrade":[173],"random":[175],"guesses,":[176],"resulting":[177],"in":[178,256],"average":[180],"bit":[181],"error":[182],"rate":[183],"(ABER)":[184],"approaching":[185],"0.5":[186],"negligible":[188],"exploitable":[189],"information.":[190],"Accordingly,":[191],"framework":[194],"explicitly":[196],"positioned":[197],"mechanism":[202],"rather":[203],"than":[204],"secrecy-capacity":[206],"security":[209],"scheme.":[210],"strength":[213],"evaluated":[218],"through":[219],"information-leakage":[220],"analysis,":[221],"quantifying":[222],"mutual":[224,260],"information":[225,268],"between":[226],"transmitted":[227],"indices":[228],"observations,":[231],"well":[233],"detectability":[235,272],"analysis":[236],"based":[237],"on":[238],"hypothesis":[239],"testing.":[240],"Simulation":[241],"results":[242],"demonstrate":[243],"TFTS-obfuscation":[247],"preserves":[249],"strong":[250],"performance":[251],"intended":[254],"receiver":[255],"terms":[257],"ABER,":[259],"information,":[261],"achievable":[263],"rate,":[264],"maintaining":[266],"minimal":[267],"leakage":[269],"low":[271],"eavesdropper.":[275]},"counts_by_year":[],"updated_date":"2026-03-24T05:59:24.953642","created_date":"2026-03-12T00:00:00"}
