Next Article in Journal
Metaheuristic Optimisation Algorithms for Tuning a Bioinspired Retinal Model
Next Article in Special Issue
Directional Modulation Technique Using a Polarization Sensitive Array for Physical Layer Security Enhancement
Previous Article in Journal
Detection of Structural Vibration with High-Rate Precise Point Positioning: Case Study Results Based on 100 Hz Multi-GNSS Observables and Shake-Table Simulation
Previous Article in Special Issue
A MIMO Radar-Based DOA Estimation Structure Using Compressive Measurements
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Directional Modulation-Enhanced Multiple Antenna Arrays for Secure and Precise Wireless Transmission

School of Information Science and Technology, Northwest University, Xi’an 710127, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(22), 4833; https://doi.org/10.3390/s19224833
Submission received: 15 October 2019 / Revised: 2 November 2019 / Accepted: 4 November 2019 / Published: 6 November 2019

Abstract

:
Directional modulation (DM) technique has the ability to enhance the physical layer security (PLS) of wireless communications. Conventional DM schemes are usually based on a single antenna array with the basic assumption that eavesdroppers (Eves) and legitimate users (LUs) are in different directions. However, it is possible that Eves are in the same direction as LUs in practical applications. As a result, signals received by Eves will be approximately the same or even in better quality than those received by LUs. To address the neighbor security issue, we introduce a multiple antenna arrays model at the transmitter side with the help of the artificial noise (AN)-aided DM technique to achieve secure and precise DM transmission in this paper. Meanwhile, to recover the mixed useful signals, two novel DM schemes based on single- and multi-carrier multiple antenna arrays model are proposed, respectively. In addition, the symbol error rate (SER), secrecy rate, and robustness performance of the proposed DM schemes were analyzed and simulated. Simulations validate the effectiveness of the proposed DM schemes and demonstrate that multiple antenna arrays model based DM methods outperform single antenna array model aided DM methods in security.

1. Introduction

Information security has always been an important problem for wireless communications, which provide a wide coverage at the cost of exposing information to undesired users with eavesdroppers (Eves) amongst them [1]. Traditionally, the higher-layer encryption techniques have been widely adopted to handle the security problem. However, with the explosive development of mobile Internet, the key-based methods need a secure channel to exchange the private key, which may be insufficient or even not suitable [2,3]. Fortunately, physical layer security (PLS) exploiting the characteristics of wireless channels, e.g., interferences, noise, and fading, enables the secure communications without extra resources and signaling overhead, which can be considered as a significant complement to traditional cryptographic techniques [4,5].
Directional modulation (DM), as an emerging promising physical layer wireless security technique, has attracted widespread concern and attention from many researchers globally over the past decade [6]. The initial concept of DM can be traced back to the near-field direct antenna modulation (NFDAM) techniques in [7,8], where direction-dependent signals are formed by a transmit beam and a reflected beam at the radio frequency (RF) frontend. An angle-dependent DM technique for phased arrays was proposed in [9]. By changing the phase shift of each element, a symbol with desired amplitude and phase for generating a standard constellation can be projected along a pre-specified direction, while purposely scrambling the constellation to be very hard to demodulate in other unintended directions. In [10], the authors further demonstrated a DM transmitter to verify the feasibility of the proposed DM technique. A dual-beam antenna array excited by the I and Q signals was put forward to perform secure wireless DM transmission in [11]. Pattern synthesis approach was applied to DM systems in [12,13]. This technique has been further extended to antenna subset modulation (ASM) technique in [14] for PLS communications. Bit error rate (BER) driven DM synthesis approaches were demonstrated in [9,10,15] to secure wireless communications. A switched antenna array [16], a linear sparse array [17], a sparse linear array [18], and a 4-D antenna array [19] were proposed to perform wireless DM transmission at the RF frontend. Afterwards, the artificial noise (AN) and DM concepts were first linked in [20], and further extended via the orthogonal vector approach in [21], which transferred the DM synthesis method from the RF frontend to the baseband. Furthermore, the orthogonal vector approach for an angle-dependent multi-beam DM system was implemented in [22]. Then, robust synthesis methods based on AN for secure single-beam and multi-beam DM were demonstrated by Hu et al. [23] and Shu et al. [24], respectively. The AN was also employed in [25,26,27] to secure DM transmission using the zero-forcing, precoding vector, and iteration convex optimization methods, respectively.
However, the above-mentioned single- and multi-beam DM schemes can only achieve angle-dependent secure transmission, the security of which cannot be guaranteed once an Eve is aligned with the desired direction or very close to the desired user. To solve this neighbor security problem, one solution is to adopt a frequency diverse array (FDA) to synthesize both angle and range dependent DM [28,29,30,31]; another solution is to utilize a multi-path model, where signals via both line of sight (LOS) and reflected paths are combined at the receiver side [32,33,34,35,36,37,38,39]. The above solutions are all based on a single antenna array model. There are few studies regarding secure DM transmission for a multiple antenna arrays model. In [40], the authors presented a concept of secure and precise wireless transmission by using DM, random subcarrier selection with randomization procedure, and phase alignment at the DM transmitter for PLS. Inspired by the multiple antenna arrays idea presented in [40,41,42], we are dedicated to achieving secure and precise DM transmissions based on a multiple antenna arrays model for the purpose of addressing the neighbor security issue that exists in traditional DM schemes. This is the main motivation and goal of our paper.
Overall, the main novelties and contributions of our work can be summarized as follows.
(1) A multiple antenna arrays model combined with AN technique is introduced into DM designs to settle the neighbor security problem in traditional single antenna array based DM schemes for PLS enhancement.
(2) Due to the introduction of the multiple antenna arrays model, the useful signals are mixed together at the receiver side. To recover the intact useful signals, two secure and precise DM transmission schemes based on single- and multi-carrier multiple antenna arrays model are proposed, respectively. For each scheme, the architectures of the transmitter and the legitimate receiver are elaborately designed, individually. In single-carrier DM scheme, the receive multi-beamforming method is adopted at the receiver side. In multi-carrier DM scheme, the multi-carrier method is utilized at the transmitter side, and the mixed useful signals can be easily recovered by using multiple band-pass filters at the receiver side.
(3) Three important metrics for the proposed DM schemes, namely the symbol error rate (SER), secrecy rate, and robustness, were deduced and verified with simulations. The comparisons among the proposed DM schemes and the traditional AN-aided single antenna array DM schemes were also performed.
The proposed schemes can be typically applied to the future LOS communication environments. Their major application scenarios include secure military communications, satellite communications, unmanned aerial vehicle (UAV) networks, Internet of Things (IoT), and millimeter communications [43].
The remaining part of the paper is organized as follows. The principle of multiple antenna arrays based DM transmission is briefly introduced in Section 2. Section 3 and Section 4 illustrate the principles of the proposed DM schemes based on single-carrier multiple antenna arrays model and multi-carrier multiple antenna arrays model, respectively. Section 5 presents the SER, secrecy rate, and the robustness performance of the proposed DM schemes, and further compares the proposed DM schemes with the traditional AN-aided single antenna array DM schemes. Then, performance simulations and discussions are shown in Section 6. Section 7 concludes this paper and points out the future research directions.
Throughout this paper, boldface uppercase, boldface lowercase, and lowercase letters are used for matrices, vectors, and scalars, respectively. The superscripts ( · ) * , ( · ) T , ( · ) H , and ( · ) 1 denote complex conjugate, transpose, complex conjugate transpose, and inverse operators, respectively. The function card ( · ) represents the cardinality of a set. The operator E ( · ) means the statistical expectation. The sign · denotes the absolute value of a scalar. The notation [ · ] refers to max { 0 , · } . 0 is the all zero vector, R is the set of all real numbers, and C is the set of all complex numbers. I N represents an N × N identity matrix. The expression x C N ( 0 , σ 2 ) means that random variable x obeys a circularly symmetric complex Gaussian (normal) distribution with zero mean and variance σ 2 . The abbreviations “Tx”, “mc”, “sc”, “sa” in the figures of this paper refer to the symbol stream transmitted by transmitter, the multi-carrier multiple antenna arrays DM scheme, the single-carrier multiple antenna arrays DM scheme, and the single antenna array DM scheme, respectively.

2. Principle of Multiple Antenna Arrays based DM Transmission

2.1. System Model

In this paper, we take a multiple-input multiple-output (MIMO) downlink system into account, as depicted in Figure 1. The system mainly comprises a base station (BS) with K ( K 2 ) non-collocated transmit antenna arrays, each of which is an N-element isotropic uniform linear array (ULA) with an interelement spacing of d, one LU with multiple receive antennas, and one passive Eve wishing to intercept the confidential information sent from the BS to the LU.
For the sake of analysis, path loss is normalized and neglected. The direction angle between the kth ( k = 1 , 2 , , K ) transmit antenna array and the LU is denoted by θ d k . Following Hu et al. [23] and Shu et al. [24], the normalized steering vector for the kth transmit antenna array can be calculated by
h ( θ d k ) = 1 N e j 2 π φ θ d k ( 1 ) h 1 ( θ d k ) , , e j 2 π φ θ d k ( n ) h n ( θ d k ) , , e j 2 π φ θ d k ( N ) h N ( θ d k ) H ,
where φ θ d k ( n ) is given by
φ θ d k ( n ) = ( n 1 ) d cos θ d k λ k ,
where λ k is the carrier wavelength at the frequency f c k of interest for the kth transmit antenna array.
Likewise, the direction angle between the kth ( k = 1 , 2 , , K ) transmit antenna array and the Eve is denoted by θ e k .

2.2. The Principle of Secure and Precise DM Transmission

Without loss of generality, three antenna arrays at the transmitter side are taking as an example to elaborate the principle of secure and precise DM transmission, as shown in Figure 2.
Assume that three antenna arrays are utilized to transmit symbol streams s 1 , s 2 , and s 3 with AN-aided DM technique simultaneously. The green (solid line), purple (dashed line), and blue (dot dash line) areas represent the main information beam of the three antenna arrays, respectively.
As we know, in traditional AN-aided DM schemes using a single antenna array model, only signals in the main beam region can be demodulated perfectly, while signals outside the main beam region will be seriously polluted by inserted AN.
In our multiple antenna arrays based DM schemes, at first, we consider the symbol stream transmitted by the first antenna array. Obviously, the radiation region of the first antenna array can be divided into three parts. The first is the region outside the main beam region. The second is the main beam except the controlled region for the LU, as shown in Figure 2. The last is the controlled region for the LU, which is the overlap of main beams of the three transmit antenna arrays. Different from a single antenna array based AN-aided DM schemes, in our proposed DM schemes, signals in the previous two parts are both seriously polluted by the inserted AN and the AWGN (additive white Gaussian noise), while observations for the LU are a simple summation of useful signals and the AWGN. Thus, the LU can easily recover the useful signals transmitted from the first antenna array. Likewise, the symbol streams transmitted by the second and the third antenna array except the controlled area for the LU are all seriously polluted by the inserted AN. Therefore, we can employ multiple antenna arrays to transmit useful signals to a specified small neighborhood without any pollution. That is the principle to achieve secure and precise wireless transmission using a multiple antenna arrays model with the help of AN-aided DM technique.
Owing to the introduction of the multiple antenna arrays model, the useful signals are mixed together at the receiver side. Therefore, two secure and precise DM transmission schemes based on a single-carrier multiple antenna arrays model in Section 3 and a multi-carrier multiple antenna arrays model in Section 4 are proposed to recover the mixed useful signals, respectively.

3. Secure and Precise DM Scheme Based on A Single-Carrier Multiple Antenna Arrays Model

In this section, a case where the BS is trying to transmit confidential messages to the LU at a predetermined position using a single-carrier multiple antenna arrays model is considered. The BS is assumed to be able to communicate with the LU, and the direction angles between K transmit antenna arrays and the LU are known. Moreover, we assume there only exists a passive eavesdropper.

3.1. The Architecture of BS Based on a Single-Carrier Multiple Antenna Arrays Model

The architecture of the BS is shown in Figure 3, which employs K ULAs with all antenna arrays emitting the same carrier to steer the K confidential information beams towards the LU simultaneously.
Unlike traditional beamforming, the AN-aided beamforming technique has been adopted extensively under the background of secure wireless communications due to its perfect security performance. The received information in the desired direction will not be affected by AN, while the messages in other directions will be seriously interfered, which is beneficial for PLS enhancement. Therefore, AN-aided beamforming technique is introduced to achieve DM in the proposed scheme to achieve secure and precise wireless transmission.
Let s = [ s 1 , s 2 , , s K ] denote the symbol vector formed by combining the K pre-transmitting baseband symbols via multiple antenna arrays. From another perspective, s can also be regarded as a K-element symbol frame. The kth symbol s k is valued from the set B = { b 1 , b 2 , , b M } with c a r d ( B ) = M , which comprises all symbols belonging to an M-ary amplitude and phase modulation, such as PSK (phase shift keying) or QAM (quadrature amplitude modulation), i.e., s k B . Suppose each baseband symbol is normalized, i.e., satisfies E [ | s k * s k | ] = 1 .
At first, do serial-to-parallel conversion for each symbol vector s to match K transmit antenna arrays.
Next, before transmitting, the kth symbol s k should be processed by AN-aided beamforming to match the N elements of the kth transmit antenna array. The transmitted signal vector u k = [ u 1 k , u 2 k , , u N k ] T for the N antenna elements can be given by
u k = β 1 P s v k s k + β 2 P s T k z k ,
where P s is the total transmit power for each symbol; z k is an N-tuple vector consisting of independent and identically distributed (i.i.d.) complex Gaussian random variables with the probability density function (PDF) being C N ( 0 N × 1 , I N ) , i.e., the inserted AN for the kth antenna array; β 1 ( 0 , 1 ] and β 2 [ 0 , 1 ) are information and AN power allocation factors, respectively, satisfying β 1 2 + β 2 2 = 1 ; v k C N × 1 is the transmit beamforming vector, which projects the useful signal s k to the desired direction; and T k C N × N is the projection matrix for controlling the direction of AN.
Then, our primary task is to find the transmit beamforming vector v k and the AN projection matrix T k for the kth transmit antenna array. Here, the AN projection matrix T k enforces the AN into null-space of the desired steering vector or the eavesdropper steering vector with a slight or no leakage of AN power to the desired steering space, while the precoding vector for the useful information is to convey the major power of useful information to the desired steering space with a small fraction or no leakage to its null-space.
Different from traditional beamforming, here, DM signals are synthesized in the baseband. The excitation signal vector of the useful signal corresponds to the steering vector of the desired direction. Therefore, the transmit beamforming vector v k can be designed as
v k = h ( θ d k ) .
Obviously, the transmit beamforming vector v k has the normalization characteristic, i.e.,
h H ( θ d k ) v k = 1 .
To prevent the inserted AN to interfere the confidential information s k , we project the AN onto the null space of the steering vector h ( θ d k ) for the desired direction. Therefore, the projection matrix T k can be devised as
T k = I N h ( θ d k ) h H ( θ d k ) .
Apparently, the projection matrix T k has the orthogonal property, i.e.,
h H ( θ d k ) T k = h H ( θ d k ) { I N h ( θ d k ) h ( θ d k ) } = h H ( θ d k ) h H ( θ d k ) = 0 .
After up-converting to RF using the same carrier f c for all transmit antenna arrays, the radiating signal x k = [ x 1 k , x 2 k , , x N k ] T for the kth N-element antenna array at time t can be given by
x k ( t ) = u k ( t ) · e j 2 π f c t .
Finally, all radiating signals for each symbol vector s can compose a transmitted signal vector, i.e.,
x ( t ) = k = 1 K x k ( t ) = e j 2 π f c t · k = 1 K β 1 P s h ( θ d k ) s k + β 2 P s T k z k .
It is noted that the BS transmits every symbol of s to the LU from different directions with the same carrier simultaneously. Evidently, only the LU can receive all the useful signals, while the Eve cannot receive any useful information at all.

3.2. The Architecture of the LU Based on a Single-Carrier Multiple Antenna Arrays Model

The architecture of the LU based on a single-carrier multiple antenna arrays model is demonstrated in Figure 4. To fairly compare the proposed DM technique and other DM techniques, without loss of generality, the normalized narrow-band LOS AWGN channel with perfect symbol-rate sampling and synchronization in free space is assumed throughout the paper.
After down-converting to baseband using the same carrier f c , the received signal y = [ y 1 , , y N ] T of the LU at time t can be written as
y ( t ) = e j 2 π f c t k = 1 K x k ( t ) + n ,
where n = [ n 1 , , n N ] T C N ( 0 N × 1 , σ n 2 I N ) is the complex AWGN vector.
Substituting Equations (3), (4) and (8) into Equation (10), the received signal y can be further simplified as
y = k = 1 K ( β 1 P s h ( θ d k ) s k + β 2 P s T k z k ) + n .
As we can see from Equation (11), the K symbols in each symbol frame are mixed together at the receiver side. We have to design a receive multi-beamforming scheme to recover the K symbols. Each set of weight coefficients corresponds to a receive beam for the recovery of one symbol.
For example, to obtain the lth ( l { 1 , 2 , , K } ) symbol s l from the direction θ d l , it is necessary to steer the array nulls precisely to the other K 1 directions. The subspace of the K 1 interference directions is given by
A = [ h ( θ d 1 ) , , h ( θ d ( l 1 ) ) , h ( θ d ( l + 1 ) ) , , h ( θ d K ) ] .
The orthogonal complement space of A is denoted by P A , which is given by
P A = I N A ( A H A ) 1 A H .
Obviously, P A is a Hermitian matrix. We have
P A = ( P A ) H .
Therefore, the weight vector of the lth receive beam can be designed as
w l = P A h ( θ d l ) .
As is well known from matrix theory, if subspace A is orthogonal to subspace B , then the vector projected in subspace A is also perpendicular to subspace B . Hence, arbitrary vector h ( θ d k ) , k = { 1 , , l 1 , l + 1 , , K } will satisfy that
w l H h ( θ d k ) = 0 .
In other words, the beam formed by the weight vector w l can result in null steering in other K 1 desired directions.
Let ξ = h H ( θ d l ) A ( A H A ) 1 A H h ( θ d l ) and n l = w l H n . Therefore, the lth ( l { 1 , 2 , , K } ) received symbol y l after the receive multi-beamforming processing can be expressed as
y l = w l H y = s l β 1 P s ( 1 ξ ) + n l ,
where ξ is a tiny real-valued scaling factor and n l is the AWGN with zero mean and variance σ n l 2 .
Proof. 
Please refer to Appendix A. □
It is noted that the received symbol y l is a simple summation of the useful signal s l and AWGN n l . From Equation (17), the LU can easily recover the lth ( l { 1 , 2 , , K } ) symbol transmitted from the BS.
Finally, we can represent the K received symbols as a received vector, i.e., a received symbol frame,
y = [ y 1 , , y K ] T = [ w 1 , , w K ] H y .
However, for the Eve, we consider two scenarios. One case is that the Eve is not in the same direction as the LU for any antenna arrays. The other worse case is that the Eve is in the same direction as the desired receiver for one antenna array and not in the same direction for another antenna array.
In Case 1, the assumption condition is denoted as θ d l θ e k for arbitrary l , k { 1 , 2 , , K } . The received message can be written as Equation (19), where n l E = h H ( θ e l ) n C N ( 0 , σ n l E 2 ) is the AWGN with zero mean and variance σ n l E 2 .
y l = h H ( θ e l ) y = h H ( θ e l ) [ k = 1 K ( β 1 P s h ( θ d k ) s k + β 2 P s T k z k ) + n ] = β 1 P s h H ( θ e l ) h ( θ d l ) s l Scrambled signal + β 1 P s k = 1 , k l K h H ( θ e l ) h ( θ d k ) s k Equivalent AN + β 2 P s k = 1 K h H ( θ e l ) T k z k AN + n l E AWGN .
It can be seen from Equation (19) that the received signal is made up of four components. The first is the scrambled signal. When θ d l θ e k , we have h H ( θ e l ) h ( θ d l ) = δ · e j Δ φ . It is obvious that there exists an amplitude difference δ β 1 P s and a phase difference Δ φ between the received symbol and the original signal s l for the first part, which can disrupt the standard constellation format. The second component is the equivalent AN caused by the other K 1 symbols in each symbol frame, which results in a high interference level for the recovery of symbol s l . The third part is the superimposed AN from the K transmit antenna arrays. The fourth component is the AWGN. Therefore, the Eve can hardly recover the confidential information from the seriously interfered signals, which indicates that the transmission security can be guaranteed in the first scenario.
In Case 2, a worse case, the assumption condition can be described as θ e l = θ d l , for a fixed l, ( l { 1 , 2 , , K } ), and θ e l θ d k , for arbitrary k, k { 1 , , l 1 , l + 1 , , K } . Then, the received signal from the lth ( l { 1 , 2 , , K } ) transmit antenna array can be expressed as Equation (20).
y l = h H ( θ e l ) y = β 1 P s s k Information + β 1 P s k = 1 , k l K h H ( θ d l ) h ( θ d k ) s k Equivalent AN + β 2 P s k = 1 , k l K h H ( θ d l ) T k z k AN + n l AWGN .
Likewise, the other received signal from the kth ( k { 1 , , l 1 , l + 1 , , K } ) transmit antenna array can be expressed as Equation (21), where n k = h H ( θ e k ) n is the AWGN with PDF being C N ( 0 , σ n k E 2 ) .
y k = h H ( θ e k ) y = h H ( θ e k ) [ m = 1 K ( β 1 P s h ( θ d m ) s m + β 2 P s T m z m ) + n ] = β 1 P s h H ( θ e k ) h ( θ d k ) s k Scrambled information + β 1 P s m = 1 , m k K h H ( θ e k ) h ( θ d m ) s m Equivalent AN + β 2 P s m = 1 K h H ( θ e k ) T m z m AN + n k AWGN ,
It can also be observed from Equation (20) that the received signal from the lth ( l { 1 , 2 , , K } ) antenna array is severely contaminated by the other K 1 data streams, K 1 inserted AN and the AWGN. Similarly, from Equation (21), we can find that the received signal from the kth ( k { 1 , , l 1 , l + 1 , , K } ) antenna array is also scrambled by the term h H ( θ e k ) h ( θ d k ) , contaminated by the equivalent AN, inserted AN, and the AWGN. Therefore, even if the Eve is aligned with or very close to one transmit direction, the transmission security can also be ensured owing to K symbols emitting simultaneously from different directions, which outperforms traditional AN-aided DM schemes using a single antenna array.

4. Secure and Precise DM Scheme Based on A Multi-Carrier Multiple Antenna Arrays Model

In this section, a scenario where the BS intends to send the confidential information to the LU at a fixed position using a multi-carrier multiple antenna arrays model is considered. The assumptions are the same as the case in Section 3. In addition, there exists only a passive Eve.

4.1. The Architecture of the BS Based on a Multi-Carrier Multiple Antenna Arrays Model

The architecture of the BS based on a multi-carrier multiple antenna arrays model is shown in Figure 5. Compared with the architecture in Section 3.1, the difference is that K transmit antenna arrays emitting different carriers. For the kth transmit antenna array, the carrier frequency can be expressed as ( f c k ( k = 1 , 2 , , K )).
Before up-converting to RF, the modulated symbols are processed with the same manner in Section 3.1. Therefore, for the kth transmitted symbol, we still have
u k = β 1 P s h ( θ d k ) s k + β 2 P s ( I N h ( θ d k ) h H ( θ d k ) ) z k .
Then, for the purpose of matching the N antenna elements for the kth transmit antenna array with carrier f c k , the radiating signal x k = [ x 1 k , x 2 k , , x N k ] T at time t can be obtained by
x k ( t ) = u k ( t ) · e j 2 π f c k t .
Eventually, all K radiating signal vectors for each symbol frame s can be expressed as
x ( t ) = k = 1 K x k ( t ) = k = 1 K u k ( t ) · e j 2 π f c k t .
It is also noted that the BS sends each symbol of s towards the LU from distinct directions with different carriers concurrently. Obviously, just the LU can receive the complete information without contamination. Meanwhile, due to the introduction of AN, the Eve can hardly intercept any useful signals seriously interfered by AN.

4.2. The Architecture of the LU Based on a Multi-Carrier Multiple Antenna Arrays Model

To match the architecture of the BS, the architecture of the LU based on a multi-carrier multiple antenna arrays model is redesigned in Figure 6. In practical applications, the receive antenna array for the proposed DM scheme can be replaced by a single antenna to further simplify the DM system.
After passing through the LOS channel in free space, all symbols of each symbol frame with different carriers are mixed together at the receiver side. For the recovery of the kth ( k = 1 , , K ) symbol, at first, the mixed signals should be processed with a band-pass filter with a specified center frequency f c k and an appointed bandwidth B W .
Without loss of generality, a narrow-band channel with perfect symbol synchronization and symbol-rate sampling is assumed. Then, after the down conversion, the kth received baseband signal at time t can be expressed as
y k ( t ) = h H ( θ d k ) x k ( t ) · e j 2 π f c k t + n k ( t ) ,
where n k ( t ) is the complex AWGN between the kth transmitter and the LU with the distribution being n k ( t ) C N ( 0 , σ k 2 ) .
Substituting Equations (22)–(24) into Equation (25), and digitizing the kth received signal during the symbol period, we have
y k = h H ( θ d k ) u k + n k = β 1 P s s k + n k ,
where the random variable n k denotes the AWGN for the kth received symbol, which is i.i.d. with n k C N ( 0 , σ 2 ) .
Obviously, each symbol is a simple summation of the useful signal and the AWGN. Therefore, the LU can easily recover the kth confidential symbol transmitted from the kth transmitter using Equation (26).
After receiving all of the transmitted symbols of an intact symbol frame during the symbol period, the received symbol frame can be written as
y = [ y 1 , y 2 , , y K ] = β 1 P s [ s 1 , s 2 , , s K ] + n = β 1 P s s + n ,
where n = [ n 1 , n 2 , , n K ] C N ( 0 1 × K , σ 2 I K ) is the AWGN vector.
From Equation (27), each symbol frame transmitted from the BS can be easily recovered.
Similarly, for the Eve, the two scenarios in Section 3.2 are also considered in the following.
In Case 1, let the Eve be located at θ e , and θ e θ d k , k { 1 , , K } . Specifically, if the Eve is intended to eavesdrop the lth ( l { 1 , , K } ) symbol, its received signal at time t can be given by
y l E ( t ) = h H ( θ e ) x ( t ) · e j 2 π f c l t + n l E ( t ) = h H ( θ d l ) k = 1 K u k ( t ) · e j 2 π f c k t · e j 2 π f c l t + n l E ( t ) = h H ( θ d l ) u l ( t ) + h H ( θ d l ) k = 1 , k l K u k ( t ) · e j 2 π f c k t · e j 2 π f c l t + n l E ( t ) = h H ( θ d l ) [ β 1 P s h ( θ d l ) s l + β 2 P s T l z l ] + h H ( θ d l ) k = 1 , k l K u k ( t ) · e j 2 π f c k t · e j 2 π f c l t + n l E ( t ) = β 1 P s s l useful Signal + h H ( θ d l ) k = 1 , k l K u k ( t ) · e j 2 π f c k t · e j 2 π f c l t Equivalent Mixed Noise + n l E ( t ) AWGN .
where n l E ( t ) is the complex AWGN with the distribution n l E ( t ) C N ( 0 , σ e 2 ) .
From Equation (28), the lth received signal of the Eve is composed of four components. The first is the lth distorted signal, the second is the inserted AN, the third is the equivalent mixed noise from the other transmitters, and the last is the AWGN.
Furthermore, in Case 2, let the Eve be located at θ e , and θ e = θ d l , l { 1 , , K } . Specifically, when the Eve is meant to eavesdrop the lth symbol, the received signal at time t in Equation (28) can be further reorganized as
y l E ( t ) = h H ( θ e ) x ( t ) · e j 2 π f c l t + n l E ( t ) = h H ( θ e ) k = 1 K u k ( t ) · e j 2 π f c k t · e j 2 π f c l t + n l E ( t ) = h H ( θ e ) u l ( t ) + h H ( θ e ) k = 1 , k l K u k ( t ) · e j 2 π f c k t · e j 2 π f c l t + n l E ( t ) = h H ( θ e ) h ( θ d l ) β 1 P s s l Distorted Signal + β 2 P s h H ( θ e ) T l z l AN + h H ( θ e ) k = 1 , k l K u k ( t ) · e j 2 π f c k t · e j 2 π f c l t Equivalent Mixed Noise + n l E ( t ) AWGN .
From Equation (29), it is observed that the lth symbol is interfered by the equivalent mixed noise and the AWGN. The Eve wants to intercept it requiring a higher signal-to-noise ratio (SNR). What is more, if the Eve is intended to eavesdrop the other K 1 symbols, e.g., the mth symbol ( m { 1 , , l 1 , l + 1 , , K } ), the received signal in Equation (28) can be further converted into
y m E ( t ) = h H ( θ e ) x ( t ) · e j 2 π f c m t + n m E ( t ) = h H ( θ e ) k = 1 K u k ( t ) · e j 2 π f c k t · e j 2 π f c m t + n m E ( t ) = h H ( θ e ) u m ( t ) + h H ( θ d l ) u l ( t ) e j 2 π ( f c l f c m ) t + h H ( θ e ) k = 1 , k l , k m K u k ( t ) · e j 2 π f c k t · e j 2 π f c m t + n m E ( t ) = β 1 P s s m h H ( θ e ) h ( θ d m ) Distorted Signal + β 2 P s h H ( θ e ) T m z m AN + β 1 P s s l e j 2 π ( f c l f c m ) t Equivalent Noise + k = 1 , k l , m K ε k Equivalent Mixed Noise + n m E ( t ) AWGN .
where ε k = u k ( t ) e j 2 π ( f c k f c m ) t h H ( θ e ) .
It can be observed from Equation (30) that each of the other K 1 received symbols includes five parts. The first is the distorted signal, the second is the injected AN, the third is equivalent noise caused by the lth rotated symbol, the fourth is the equivalent mixed noise introduced by the other K 2 symbols, and the last is the AWGN. Therefore, even if the Eve is aligned with or very close to one of the transmit directions, it still cannot recover the confidential information. Obviously, the transmission security is enhanced significantly owing to the use of multiple antenna arrays, which outperforms the traditional single antenna array based DM schemes.

5. Performance Analysis

The SER, secrecy rate, and robustness are three primary metrics for assessing the performance of DM systems [44]. Next, the SER, secrecy rate, and robustness of the proposed DM schemes are analyzed. Finally, the comparisons among the multiple antenna arrays DM schemes and the traditional single antenna array DM schemes are also provided.

5.1. SER

For the sake of simplicity, assume that all AWGNs are normalized and have the same distribution with zero mean and variance σ 2 for both LUs and Eves throughout the paper. Meanwhile, all the baseband symbols are normalized.
In the single-carrier case, using Equation (17), the SNR per symbol of the LU can be written as
r s c , L U = P s β 1 2 ( 1 ξ ) 2 σ 2 .
Likewise, in the multi-carrier case, by means of Equation (26), the SNR per symbol of the LU can be expressed as
r m c , L U = P s β 1 2 σ 2 .
By contrast, the SNR per symbol of the traditional single antenna array AN-aided DM schemes can be given by
r s a = P s β 1 2 σ 2 .
In this paper, quadrature phase-shift keying (QPSK) modulation is used by the proposed schemes. A closed-form expression for the SER of QPSK modulated signals in AWGN channel can be given by [45]
P e = 1 ( 1 1 2 e r f c r r 2 2 ) 2 = e r f c r r 2 2 1 4 e r f c 2 r r 2 2 ,
where e r f c ( x ) = 2 2 π · π · x exp ( t 2 ) d t is the complementary error function of the standard normal distribution.
Meanwhile, the received signals for the Eve are scrambled by the eavesdropper steering vector.
At this time, for the single-carrier case, the SNR per symbol for the Eve can be transformed into
r s c , E = P s β 1 2 h H ( θ e l ) h ( θ d l ) h H ( θ d l ) h ( θ e l ) σ 2 .
Likewise, the SNR per symbol for the Eve in the multi-carrier case can be rewritten as
r m c , E = P s β 1 2 | h H ( θ e ) h ( θ d l ) | 2 σ 2 .
It is easy to see that the SER for the LU for the proposed DM schemes is primarily affected by the information power splitting factor β 1 , while the SER for the Eve is dependent on the information power splitting factor β 1 and the eavesdropper steering vector both.

5.2. Secrecy Rate

5.2.1. Single-Carrier DM Scheme

Using Equation (17), the signal-to-interference-plus-noise ratio (SINR) of the LU for the lth transmit antenna array can be obtained by
γ l s c , L U = P s β 1 2 ( 1 ξ ) 2 σ 2 = r s c , L U .
Since the normalized narrow-band AWGN channel is assumed, by means of Equation (37), the achievable rate of the link from the lth transmit antenna array to the LU can be expressed as
R l s c , L U = log 2 ( 1 + γ l s c , L U ) .
In light of Equation (19), the SINR of the Eve for the lth transmit antenna array can be calculated by Equation (39).
γ l s c , E = P s β 1 2 | h H ( θ e l ) h ( θ d l ) | 2 P s β 1 2 k = 1 , k l K | h H ( θ e l ) h ( θ d k ) | 2 + P s β 2 2 k = 1 K | h H ( θ e l ) T k z k | 2 + σ 2 .
According to Equation (39), the achievable rate of the link between the lth transmit antenna array and the Eve can be given by
R l s c , E = log 2 ( 1 + γ l s c , E ) .
Therefore, the secrecy rate of the proposed single-carrier DM scheme can be defined as [24]
R s c = l = 1 K [ R l s c , L U R l s c , E ] .

5.2.2. Multi-Carrier DM Scheme

Likewise, according to Equation (26), the SINR of the LU for the lth transmit antenna array in the multi-carrier DM scheme can be calculated by
γ l m c , L U = P s β 1 2 σ 2 = r m c , L U .
By means of Equation (42), the achievable rate of the link from the lth transmit antenna array to the LU in the multi-carrier DM scheme can be written as
R l m c , L U = log 2 ( 1 + γ l m c , L U ) .
Using Equation (28), the SINR of the Eve for the lth transmit antenna array in the multi-carrier DM scheme can be derived as
γ l m c , E = P s β 1 2 | h H ( θ e ) h ( θ d l ) | 2 P s β 2 2 | h H ( θ e ) T l z l | 2 + k = 1 , k l K | h H ( θ e ) u k | 2 + σ 2 .
Furthermore, from Equation (44), the achievable rate of the link between the lth transmit antenna array and the Eve in the multi-carrier DM scheme can be expressed as
R l m c , E = log 2 ( 1 + γ l m c , E ) .
Therefore, the secrecy rate of the proposed multi-carrier DM Scheme can be defined as [24]
R m c = l = 1 K [ R l m c , L U R l m c , E ] .

5.3. Robustness

In this section, the robustness of the proposed DM schemes about the impacts of imperfect estimation of the directions from all transmit antenna arrays to the LU is investigated.
In a general way, the implementation of DM is based on the assumption that the a priori directional information is known for the BS. However, in a practical DM system, there always exists an estimated error in the directional information even by adopting accurate direction of arrival (DOA) estimation methods (see, e.g., [46,47,48,49]) and in the range information even by using high-resolution range estimation algorithm (see, e.g., [50]). Therefore, the estimated angle error would result in angle mismatch including the transmit pre-coding vector, i.e., the excitation signal vector v k and the AN projection matrix T k for the kth transmit antenna array, which severely degrades the performance of the proposed DM schemes.
Here, the estimated directional angle of the kth transmit array can be expressed as
θ ^ d k = θ d k + Δ θ d k ,
where Δ θ d k is the estimated directional angle error.
It is noted that the angle estimation errors impose negative impact not only on the precoding vector v k , but also on the AN projection matrix T k , while the architectures of the BS and the LU remain unchanged. For both proposed DM schemes, the precoding vector vector v k and the AN projection matrix T k with estimation errors should be rewritten as
v ^ k = h ( θ ^ d k ) ,
and
T ^ k = I N h ( θ ^ d k ) h H ( θ ^ d k ) ,
respectively.
According to Equation (48), it is easy to obtain that the normalization characteristic in Equation (5) will be affected by the estimation error. Likewise, from Equation (49), it is effortless to derive that the orthogonal property in Equation (7) will also be influenced when an estimation error exists, as analyzed in [51]. Simulations are provided in next Section to illustrate that the security can also be ensured on condition that the estimation errors of the desired directions are within an acceptable limit for the proposed DM schemes.

5.4. Comparisons for Multiple Antenna Arrays DM and Single Antenna Array DM Schemes

The comparisons for multiple antenna arrays DM and single antenna array DM schemes [7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27] are given in Table 1, from which the main features of the proposed DM schemes can be summarized as follows:
(1) Because the AN is inserted into the transmitting signals, both the pre-coding vector for the confidential information and the orthogonal projection matrix for the AN are required for all AN-aided DM schemes.
(2) Although multiple transmit antenna arrays are utilized in the proposed DM schemes, the computation complexity at the transmitter side doesn’t increase when transmitting K symbols each time. Obviously, the cost of the BS for the proposed schemes is more than that of the traditional single antenna array DM schemes.
(3) The proposed DM schemes can achieve precise transmission, i.e., projecting the confidential information to the LU located at the designated location. More importantly, transmission security of the proposed schemes can also be guaranteed even if the Eve is located close to the LU or the same direction as the LU.
As for the differences between the two proposed DM schemes, on the one hand, at the receiver side, the computation complexity of the single-carrier DM scheme is much higher than that of the multi-carrier DM scheme. On the other hand, the cost of the receiver for the proposed single-carrier DM scheme is much lower. Because the receive multi-beamforming method is adopted to recover the useful signal in the single-carrier DM scheme. In the multi-carrier DM scheme, the useful signals are obtained by using different band-pass filters. Therefore, the compromise of the computation complexity and the cost should be considered when choosing between these two different schemes to perform secure and precise wireless transmission.

6. Simulation Results and Discussions

Three important metrics, namely the SER, secrecy rate, and the robustness of the proposed DM systems, were simulated. The detailed simulation parameters are provided in Table 2. Meanwhile, the locations of the LU, the potential Eve, and multiple transmit antenna arrays in the Cartesian coordinate system are shown in Figure 7.
To simplify the model and analysis, assuming that there exist K = 3 transmit antenna arrays with N = 21 antennas for each array. As mentioned in Table 1, cost, receiver complexity and transmitter complexity of the proposed DM schemes all depend on the number K of the ULA. Therefore, the choosing of the number K of the ULA is a compromise between the security performance and the cost in practical applications. To avoid grating lobe effect and mutual coupling between the array elements, the inter-element spacing is set one-half of a wavelength for each ULA [52,53,54,55,56,57,58,59,60,61]. For mm-wave system, applications for B5G and future wireless networks, the carrier frequencies can be set as 30 GHz and more. To distinguish different direction information for different antenna arrays, the antenna arrays should be away from each other, thus we set the inter-array spacing as far as 100 λ . In the setup, one LU and one Eve in two potential locations are considered. In detail, for the first scenario, we assume for three transmit antenna arrays, the desired location B and eavesdropper E 1 are all located in different directions, where θ B A 1 = 95.7392 , θ B A 2 = 90 , θ B A 3 = 84.2608 , θ E 1 A 1 = 90 , θ E 1 A 2 = 84.2608 , θ E 1 A 3 = 78.6346 , with the distance d B A 1 = 1000 λ , d B A 2 = 994.9874 λ , d B A 3 = 1000 λ , d E 1 A 1 = 994.9874 λ , d E 1 A 2 = 1000 λ , d E 1 A 3 = 1014.9 λ . Likewise, for the second scenario, we assume for the third transmit antenna array, the desired location B and eavesdropper E 2 are located in the same direction, where θ B A 1 = 95.7392 , θ B A 2 = 90 , θ B A 3 = 84.2608 , θ E 2 A 1 = 106.7787 , θ E 2 A 2 = 95.7932 , θ E 2 A 3 = 84.2608 , with the distance d B A 1 = 1000 λ , d B A 2 = 994.9874 λ , d B A 3 = 1000 λ , d E 2 A 1 = 519.6152 λ , d E 2 A 2 = 500 λ , d E 2 A 3 = 500 λ . It is noted that all transmit antenna arrays in Figure 7 can also be distributed to other appropriate locations. Here, we just provide a setup case to evaluate the performance of the proposed DM schemes.
Since the maximal channel delay for different transmit antenna arrays is far less than symbol duration, all transmitted symbols can be thought of as being simultaneously received by the LU or the Eve.

6.1. SER

Figure 8 illustrates the SER performance of the LU and the Eve in two positions with various power allocation factors for the proposed multiple antenna arrays DM schemes and the conventional single antenna array DM schemes, where the baseband modulation modes are all set as QPSK, respectively.
Several conclusions can be summarized from Figure the results in Figure 8a: (1) For the LU, when the signal power allocation factor is set as β 1 = 0.9 , to achieve the same SER level (e.g., S E R = 10 4 ), the SNR per bit needed is approximately 1 dB less than that of the standard QSPK modulation, which indicates that the inserted AN will cause some degree of SNR loss. (2) Given a fixed SNR per bit (e.g., 10 log 10 ( E b / N 0 ) = 10 dB ), the SERs for the LU increase as the signal power allocation factors decrease. (3) The SER performance of the single antenna array DM schemes is the same as the multi-carrier multiple antenna arrays DM scheme, while the SER performance for the single-carrier multiple antenna arrays scheme is slightly worse than other two DM schemes.
From the results in Figure 8b, the SERs of three symbol streams for the Eve in Location 1 are approximate to the worst theoretical value, which indicates that the transmission security can be guaranteed when the Eve is not located in any desired directions.
From Figure the results in Figure 8c, the SERs of the symbol stream 1 and 2 for the Eve are as worse as the idea value, while SERs of the symbol stream 3 are as good as that of the LU, because the Eve is in the desired direction of the third transmit array. However, the transmission security can also be guaranteed because the confidential information received by the Eve is not intact.
The SER performance versus azimuth angle for the two proposed DM schemes is shown in Figure 9. In this scenario, the baseband modulation is also set as QPSK, the SNR per bit is 10 dB, and the signal power splitting factor is set as β 1 = 0.9 .
As we can see, the information beam-width ( S E R = 1 0 4 ) of the two proposed schemes for each symbol stream is almost the same. Meanwhile, the information beam-width ( S E R = 1 0 4 ) for different symbol streams is also the same because each transmitter can be regarded as a single antenna array DM transmitter. Obviously, only the receiver located at the intersection of three desired directions can recover the full confidential information. By contrast, the receiver located in other positions will be interfered by AN and the mixed signals. Therefore, the security of the proposed DM schemes can be hold even if part of the useful information is intercepted.

6.2. Secrecy Rate

Figure 10a demonstrates the achievable rate of the LU versus SNR per bit for the proposed DM schemes. As might have been expected, the achievable rate of the LU for each antenna array is almost at the same level. Owing to the introduction of AN, the achievable rates are lower than the upper bound of the achievable rate using a single antenna without AN. Especially, the achievable rates of the LU decrease as the information power splitting factors decrease.
Figure 10b,c shows the achievable rate of the Eve at two different potential positions. As expected, the achievable rates are approximate to 0 bps/Hz when the Eve is not in any desired directions. Once the Eve is in one of the desired directions, the achievable rates for the Eve are just a little lower than that of the LU.
Furthermore, Figure 10d illustrates the secrecy rate versus SNR per bit for the proposed DM schemes and the traditional single antenna array DM schemes. Whatever value the SNR per bit and the power allocation factor β 1 take, the secrecy rates of the proposed DM schemes are much higher than those of traditional single antenna array transmission schemes with the same fixed total transmitting power. As expected, the secrecy rates of the proposed DM schemes are almost twice those of the traditional single antenna array schemes due to the use of multiple antenna array simultaneously. By contrast, the secrecy rates are always positive wherever the Eve is located. Therefore, the proposed DM schemes are very secure and reliable.

6.3. Robustness

The SER performance versus SNR per bit with different imperfect estimation errors of the desired directions for three transmit antenna arrays is displayed in Figure 11. For clarity, the signal power allocation factor is set as β 1 = 0.9 , and only the curves for the first antenna array are analyzed, from which the same conclusions can also hold for other two antenna arrays. It is easy to observe that there is only approximately 0.5 dB loss of SNR per bit when the estimated direction error is Δ θ = 1 for a fixed SER performance (e.g., S E R = 10 4 ). As long as the estimated direction errors for one desired direction are within Δ θ = 1 , at most 0.5 dB extra SNR per bit is needed to realize the same SER as the ideal case. Therefore, to achieve secure and precise transmission for the LU, the estimated direction errors for all antenna arrays should be less than Δ θ = 1 .

7. Conclusions

Based on a multiple antenna arrays transmission model at the transmitter side for DM, where all signals from multiple antenna arrays are mixed at the receiver side, two secure and precise AN-aided DM schemes with single carrier and multiple carriers were proposed, respectively. Then, the SER, secrecy rate, and the robustness performance of the proposed schemes were analyzed and simulated. Simulation results demonstrate the advantages of precise transmission and neighbor security for the proposed schemes over the traditional AN-aided DM scheme using a single antenna array. Meanwhile, it is of considerable interest to extend to a multi-user and multi-eavesdropper DM system over multi-path fading channels. Moreover, the robust DM designs for the proposed schemes are also well worth considering. One future work is to investigate and validate the security performance of the proposed DM schemes in practical LOS communication scenarios.

Author Contributions

All authors contributed extensively to the study presented in this manuscript. W.Z. designed the main idea, methods and experiments, interpreted the results and wrote the paper. M.L. and B.L. supervised the main idea, edited the manuscript and provided many valuable suggestions to this study. J.W. and J.P. carried out the experiments.

Funding

This work was supported by Natural Science Basic Research Program of Shaanxi under Grant No. 2019JM-591, and by National Key R&D Program of China under Grant Nos. 2017YFB1402103 and 2017YFB10203104. It was also funded by Open Research Fund of CAS Key Laboratory of Spectral Imaging Technology, Program for Changjiang Scholars and Innovative Research Team in University under Grant No. IRT17R87.

Acknowledgments

The authors would like to thank Feng Liu from Northwestern Polytechnical University for his many constructive suggestions and comments that helped to improve the quality of the paper. The authors would also like to thank the anonymous reviewers and editors for their efforts in reviewing the manuscript and providing many insightful comments and suggestions, which helped greatly in improving the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Equation (15).
From Equation (11), we can rewrite Equation (15) as
y l = w l H [ k = 1 K ( β 1 P s h ( θ d k ) s k + β 2 P s T k z k ) + n ] = w l H β 1 P s h ( θ d l ) s l p 1 + w l H k = 1 , k l K β 1 P s h ( θ d k ) s k p 2 + w l H k = 1 K β 2 P s T k z k p 3 + w l H n p 4 .
Here, for p 1 , using Equations (13) and (15), we have
p 1 = ( P A h ( θ d l ) ) H β 1 P s h ( θ d l ) s l = h H ( θ d l ) ( P A ) H β 1 P s h ( θ d l ) s l = β 1 P s s l [ h H ( θ d l ) h ( θ d l ) h H ( θ d l ) A ( A H A ) 1 A H h ( θ d l ) ] = β 1 P s s l ( 1 ξ ) .
For p 2 , using Equation (16), we have
p 2 = β 1 P s s k k = 1 , k l K w l H h ( θ d k ) = 0 .
Substituting Equations (14) and (15) into p 3 in Equation (A1) and using Equation (7), we have
p 3 = β 2 P s k = 1 K w l H T k z k = β 2 P s k = 1 K [ h H ( θ d l ) T k z k h H ( θ d l ) A ( A H A ) 1 A H ) T k z k ] = β 2 P s k = 1 K [ 0 z k h H ( θ d l ) A ( A H A ) 1 0 z k ] = 0 .
Therefore, by Equations (A2)–(A4), Equation (A1) can be transformed into
y l = β 1 P s s l ( 1 ξ ) + n l .
The proof is completed. □

References

  1. Zou, Y.L.; Zhu, J.; Wang, X.B.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
  2. Stallings, W. Cryptography and Network Security: Priciples and Practice; Prentice Hall: Upper Saddle River, NJ, USA, 2006. [Google Scholar]
  3. Mollin, R.A. An Introduction to Cryptography; CRC Press: Boca Raton, FL, USA, 2006. [Google Scholar]
  4. Chen, X.M.; Ng, D.W.K.; Gerstacker, W.H.; Chen, H.S. A survey on multiple-antenna techniques for physical layer security. IEEE Commun. Surv. Tutor. 2016, 19, 1027–1053. [Google Scholar] [CrossRef]
  5. Trappe, W. The challenges facing physical layer security. IEEE Commun. Mag. 2015, 53, 16–20. [Google Scholar] [CrossRef]
  6. Ding, Y.; Fusco, V. A review of directional modulation technology. Int. J. Microw. Wirel. Technol. 2016, 8, 981–993. [Google Scholar] [CrossRef]
  7. Babakhani, A.; Rutledge, D.B.; Hajimiri, A. Transmitter architectures based on near-field direct antenna modulation. IEEE J. Solid-State Circuits 2008, 43, 2674–2692. [Google Scholar] [CrossRef]
  8. Babakhani, A.; Rutledge, D.B.; Hajimiri, A. Near-field direct antenna modulation. IEEE Microw. Mag. 2009, 10, 36–46. [Google Scholar] [CrossRef]
  9. Daly, M.P.; Bernhard, J.T. Directional modulation technique for phased arrays. IEEE Trans. Antennas Propag. 2009, 57, 2633–2640. [Google Scholar] [CrossRef]
  10. Daly, M.P.; Daly, E.L.; Bernhard, J.T. Demonstration of directional modulation using a phased array. IEEE Trans. Antennas Propag. 2010, 58, 1545–1550. [Google Scholar] [CrossRef]
  11. Hong, T.; Song, M.Z.; Liu, Y. Dual-beam directional modulation technique for physical-layer secure communication. IEEE Antennas Wirel. Propag. Lett. 2011, 10, 1417–1420. [Google Scholar] [CrossRef]
  12. Ding, Y.; Fusco, V. Directional modulation transmitter radiation pattern considerations. IET Microw. Antennas Propag. 2013, 7, 1201–1206. [Google Scholar] [CrossRef]
  13. Ding, Y.; Fusco, V. Constraining directional modulation transmitter radiation patterns. IET Microw. Antennas Propag. 2014, 8, 1408–1415. [Google Scholar] [CrossRef] [Green Version]
  14. Valliappan, N.; Lozano, A.; Heath, R.W. Antenna subset modulation for secure millimeter-wave wireless communication. IEEE Trans. Commun. 2013, 61, 3231–3245. [Google Scholar] [CrossRef]
  15. Ding, Y.; Fusco, V. BER-driven synthesis for directional modulation secured wireless communication. Int. J. Microw. Wirel. Technol. 2013, 6, 139–149. [Google Scholar] [CrossRef] [Green Version]
  16. Hong, T.; Song, M.Z.; Liu, Y. RF Directional modulation technique using a switched antenna array for communication and direction-finding applications. Prog. Electromagn. Res. 2011, 120, 195–213. [Google Scholar] [CrossRef]
  17. Liu, F.; Wang, L.; Xie, J. Directional modulation technique for linear sparse arrays. IEEE Access 2019, 7, 13230–13240. [Google Scholar] [CrossRef]
  18. Hong, T.; Shi, X.P.; Liang, X.S. Synthesis of sparse linear array for directional modulation via convex optimization. IEEE Trans. Antennas Propag. 2018, 66, 3959–3972. [Google Scholar] [CrossRef]
  19. Zhu, Q.J.; Yang, S.W.; Yao, R.L. Directional modulation based on 4-D antenna arrays. IEEE Trans. Antennas Propag. 2013, 62, 621–628. [Google Scholar] [CrossRef]
  20. Alrabadi, O.N.; Pedersen, G.F. Directional space-time modulation: A novel approach for secured wireless communication. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; pp. 3554–3558. [Google Scholar]
  21. Ding, Y.; Fusco, V. A vector approach for the analysis and synthesis of directional modulation transmitters. IEEE Trans. Antennas Propag. 2014, 62, 361–370. [Google Scholar] [CrossRef]
  22. Ding, Y.; Fusco, V. Orthogonal vector approach for synthesis of multi-beam directional modulation transmitters. IEEE Antennas Wirel. Propag. Lett. 2015, 14, 1330–1333. [Google Scholar] [CrossRef]
  23. Hu, J.S.; Shu, F.; Li, J. Robust synthesis method for secure directional modulation with imperfect direction angle. IEEE Commun. Lett. 2016, 20, 1084–1087. [Google Scholar] [CrossRef]
  24. Shu, F.; Wu, X.M.; Li, J.H.; Chen, R.Q.; Vucetic, B. Robust synthesis scheme for secure multi-beam directional modulation in broadcasting systems. IEEE Access 2016, 4, 6614–6623. [Google Scholar] [CrossRef]
  25. Xie, T.; Zhu, J.; Li, Y. Artificial-noise-aided zero-forcing synthesis approach for secure multi-beam directional modulation. IEEE Commun. Lett. 2018, 22, 276–279. [Google Scholar] [CrossRef]
  26. Shu, F.; Xu, L.; Wang, J.Z.; Zhu, W.; Zhou, X.B. Artificial-noise-aided secure multicast precoding for directional modulation systems. IEEE Trans. Veh. Technol. 2018, 67, 6658–6662. [Google Scholar] [CrossRef]
  27. Christopher, R.M.; Borah, D.K. Iterative convex optimization of multi-beam directional modulation with artificial noise. IEEE Commun. Lett. 2018, 22, 1712–1715. [Google Scholar] [CrossRef]
  28. Wang, W.Q. DM using FDA antenna for secure transmission. IET Microw. Antennas Propag. 2017, 11, 336–345. [Google Scholar] [CrossRef]
  29. Cheng, Q.; Zhu, J.; Xie, T.; Luo, J.; Xu, Z. Time-invariant angle-range dependent directional modulation based on time-modulated frequency diverse arrays. IEEE Access 2017, 5, 26279–26290. [Google Scholar] [CrossRef]
  30. Hu, J.S.; Yan, S.H.; Shu, F.; Wang, J.Z.; Li, J.; Zhang, Y.J. Artificial-noise-aided secure transmission with directional modulation based on random frequency diverse arrays. IEEE Access 2017, 5, 1658–1667. [Google Scholar] [CrossRef]
  31. Lin, J.R.; Li, Q.; Yang, J.T.; Shao, H.Z.; Wang, W.Q. Physical-Layer security for proximal legitimate user and eavesdropper: A frequency diverse array beamforming approach. IEEE Trans. Inf. Forensics Secur. 2018, 13, 671–684. [Google Scholar] [CrossRef]
  32. Hafez, M.; Yusuf, M.; Khattab, T. Secure spatial multiple access using directional modulation. IEEE Trans. Wirel. Commun. 2018, 17, 563–573. [Google Scholar] [CrossRef]
  33. Shi, H.Z.; Alan, T. Secure physical-layer communication based on directly modulated antenna arrays. In Proceedings of the 2012 Loughborough Antennas & Propagation Conference (LAPC), Loughborough, UK, 12–13 November 2012; pp. 1–4. [Google Scholar]
  34. Ding, Y.; Fusco, V. A synthesis-free directional modulation transmitter using retrodirective array. IEEE J. Sel. Top. Signal Process. 2017, 11, 428–441. [Google Scholar] [CrossRef]
  35. Hafez, M.; Khattab, T.; Elfouly, T. Secure multiple-users transmission using multi-path directional modulation. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–5. [Google Scholar]
  36. Ding, Y.; Fusco, V. MIMO-inspired synthesis of directional modulation systems. IEEE Antennas Wirel. Propag. Lett. 2016, 15, 580–584. [Google Scholar] [CrossRef]
  37. Kalantari, A.; Soltanalian, M.; Maleki, S. Directional modulation via symbol-level precoding: A way to enhance security. IEEE J. Sel. Top. Signal Process. 2016, 10, 1478–1493. [Google Scholar] [CrossRef]
  38. Ding, Y.; Fusco, V. Directional modulation enhanced retrodirective array. Electron. Lett. 2015, 51, 118–120. [Google Scholar] [CrossRef]
  39. Zhang, B.; Liu, W. Antenna array based positional modulation with a two-ray multi-path model. In Proceedings of the IEEE Sensor Array and Multichannel Signal Process, Workshop (SAM), Sheffield, UK, 8–11 July 2018; pp. 203–207. [Google Scholar]
  40. Shu, F.; Shen, T.; Xu, L.; Qin, Y.L.; Wang, S.M.; Jin, S.; You, X.H.; Wang, J.Z. Directional Modulation: A Physical-Layer Security Solution to B5G and Future Wireless Networks. IEEE Netw. 2019, 1–6. [Google Scholar] [CrossRef]
  41. Singh, J.; Ramakrishna, S. On the feasibility of codebook-based beamforming in millimeter wave systems with multiple antenna arrays. IEEE Trans. Wirel. Commun. 2015, 14, 2670–2683. [Google Scholar] [CrossRef]
  42. Zhang, B.; Liu, W. Positional modulation design based on multiple phased antenna arrays. IEEE Access 2019, 7, 33898–33905. [Google Scholar] [CrossRef]
  43. Wang, W.Q.; Zheng, Z. Hybrid MIMO and phased-array directional modulation for physical layer security in mmWave wireless communications. IEEE J. Sel. Areas Commun. 2018, 36, 1383–1396. [Google Scholar] [CrossRef]
  44. Ding, Y. Establishing metrics for assessing the performance of directional modulation systems. IEEE Trans. Antennas Propag. 2014, 62, 2745–2755. [Google Scholar] [CrossRef]
  45. Cahn, C. Performance of digital phase-modulation communication systems. IRE Trans. Commun. Syst. 1959, 7, 3–6. [Google Scholar] [CrossRef]
  46. Zhou, C.W.; Gu, Y.; Zhang, Y.D.; Shi, Z.; Jin, T.; Wu, X. Compressive sensing-based coprime array direction-of-arrival estimation. IET Commun. 2017, 11, 1719–1724. [Google Scholar] [CrossRef]
  47. Shu, F.; Qin, Y.; Liu, T.; Gui, L.; Zhang, Y.; Li, J.; Han, Z. Low-complexity and high-resolution DOA estimation for hybrid analog and digital massive MIMO receive array. IEEE Trans. Commun. 2018, 66, 2487–2501. [Google Scholar] [CrossRef]
  48. Zhou, C.W.; Gu, Y.; Fan, X.; Shi, Z.; Mao, G.; Zhang, Y.D. Direction-of-arrival estimation for coprime array via virtual array interpolation. IEEE Trans. Signal Process. 2018, 66, 5956–5971. [Google Scholar] [CrossRef]
  49. Zhou, C.W.; Gu, Y.; Shi, Z.; Zhang, Y.D. Off-grid direction-of-arrival estimation using coprime array interpolation. IEEE Signal Process. Lett. 2018, 25, 1710–1714. [Google Scholar] [CrossRef]
  50. Coluccia, A.; Fascista, A. On the hybrid TOA/RSS range estimation in wireless sensor networks. IEEE Trans. Wirel. Commun. 2018, 17, 361–371. [Google Scholar] [CrossRef]
  51. Zhou, C.W.; Gu, Y.; He, S.; Shi, Z. A robust and efficient algorithm for coprime array adaptive beamforming. IEEE Trans. Veh. Technol. 2018, 67, 1099–1112. [Google Scholar] [CrossRef]
  52. Farahani, H.S.; Veysi, M.; Kamyab, M.; Tadjalli, A. Mutual coupling reduction in patch antenna arrays using a UC-EBG superstrate. IEEE Antennas Wirel. Propag. Lett. 2010, 9, 57–59. [Google Scholar] [CrossRef]
  53. Alibakhshikenari, M.; Khalily, M.; Virdee, B.S.; See, C.H.; Abd-Alhameed, R.A.; Limiti, E. Mutual coupling reduction in patch antenna arrays using a UC-EBG superstrate. IEEE Access 2019, 7, 5182–51840. [Google Scholar]
  54. Yang, X.; Liu, Y.; Xu, Y.X. Isolation enhancement in patch antenna array with fractal UC-EBG structure and cross slot. IEEE Antennas Wirel. Propag. Lett. 2017, 16, 2175–2178. [Google Scholar] [CrossRef]
  55. Alibakhshikenari, M.; Khalily, M.; Virdee, B.S. Mutual coupling suppression between two closely placed microstrip patches using EM-bandgap metamaterial fractal loading. IEEE Access 2019, 7, 23606–23614. [Google Scholar] [CrossRef]
  56. Alibakhshikenari, M.; Virdee, B.S.; See, C.H. High-isolation leaky-wave array antenna based on CRLH-metamaterial implemented on SIW with 30 frequency beam-scanning capability at millimetre-waves. Electronics 2019, 8, 642. [Google Scholar] [CrossRef]
  57. Qamar, Z.; Park, H.C. Compact waveguided metamaterials for suppression of mutual coupling in microstrip array. Prog. Electromagn. Res. 2014, 149, 183–192. [Google Scholar] [CrossRef]
  58. Alibakhshikenari, M.; Virdee, B.S.; Shukla, P. Interaction between closely packed array antenna elements using meta-surface for applications such as MIMO systems and synthetic aperture radars. Radio Sci. 2018, 53, 1368–1381. [Google Scholar] [CrossRef]
  59. Alibakhshikenari, M.; See, C.H.; Virdee, B.S. Meta-surface wall suppression of mutual coupling between microstrip patch antenna arrays for THz-band applications. Prog. Electromagn. Res. Lett. 2018, 75, 105–111. [Google Scholar] [CrossRef]
  60. Alibakhshikenari, M.; Virde, B.S.; Shukla, P. Antenna mutual coupling suppression over wideband using embedded periphery slot for antenna arrays. Electronics 2018, 7, 198. [Google Scholar] [CrossRef]
  61. Farsi, S.; Aliakbarian, H.; Schreurs, D. Mutual coupling reduction between planar antennas by using a simple microstrip U-Section. IEEE Antennas Wirel. Propag. Lett. 2012, 11, 1501–1503. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Sensors 19 04833 g001
Figure 2. The principle of secure and precise wireless transmission for three antenna arrays with the help of AN-aided DM technique.
Figure 2. The principle of secure and precise wireless transmission for three antenna arrays with the help of AN-aided DM technique.
Sensors 19 04833 g002
Figure 3. The architecture of the BS for the proposed DM scheme based on a single-carrier multiple antenna arrays model.
Figure 3. The architecture of the BS for the proposed DM scheme based on a single-carrier multiple antenna arrays model.
Sensors 19 04833 g003
Figure 4. The architecture of the LU for the proposed DM based on a single-carrier multiple antenna arrays.
Figure 4. The architecture of the LU for the proposed DM based on a single-carrier multiple antenna arrays.
Sensors 19 04833 g004
Figure 5. The architecture of the BS for the proposed DM based on a multi-carrier multiple antenna arrays model.
Figure 5. The architecture of the BS for the proposed DM based on a multi-carrier multiple antenna arrays model.
Sensors 19 04833 g005
Figure 6. The architecture of the LU for the proposed DM based on a multi-carrier multiple antenna arrays model.
Figure 6. The architecture of the LU for the proposed DM based on a multi-carrier multiple antenna arrays model.
Sensors 19 04833 g006
Figure 7. The locations of the LU, the potential Eve, and three transmit antenna arrays.
Figure 7. The locations of the LU, the potential Eve, and three transmit antenna arrays.
Sensors 19 04833 g007
Figure 8. SER performance versus SNR per bit (dB) with various power allocation factors for the proposed DM schemes and the conventional DM scheme: (a) the LU; (b) the Eve in Location 1; and (c) the Eve in Location 2.
Figure 8. SER performance versus SNR per bit (dB) with various power allocation factors for the proposed DM schemes and the conventional DM scheme: (a) the LU; (b) the Eve in Location 1; and (c) the Eve in Location 2.
Sensors 19 04833 g008
Figure 9. SER performance versus azimuth angle for the proposed DM schemes, where β 1 = 0.9 and 10 log 10 ( E b / N 0 ) = 10 dB .
Figure 9. SER performance versus azimuth angle for the proposed DM schemes, where β 1 = 0.9 and 10 log 10 ( E b / N 0 ) = 10 dB .
Sensors 19 04833 g009
Figure 10. Achievable rate of the proposed DM schemes: (a) achievable rate of the LU versus SNR; (b) achievable rate of the Eve in Location 1 versus SNR; (c) achievable rate of the Eve in Location 2 versus SNR; and (d) secrecy rate performance of the proposed DM schemes.
Figure 10. Achievable rate of the proposed DM schemes: (a) achievable rate of the LU versus SNR; (b) achievable rate of the Eve in Location 1 versus SNR; (c) achievable rate of the Eve in Location 2 versus SNR; and (d) secrecy rate performance of the proposed DM schemes.
Sensors 19 04833 g010
Figure 11. Robustness of the proposed DM schemes with various estimation errors of the desired directions.
Figure 11. Robustness of the proposed DM schemes with various estimation errors of the desired directions.
Sensors 19 04833 g011
Table 1. Comparisons for multiple antenna arrays DM and single antenna array DM schemes.
Table 1. Comparisons for multiple antenna arrays DM and single antenna array DM schemes.
ItemsSingle-Carrier DMMulti-Carrier DMSingle Array DM [7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27]
Multiple antenna arraysYesYesNo
Multiple carriersNoYesNo
Artificial noiseYesYesYes
Precoding vectorYesYesYes
Orthogonal matrixYesYesYes
Receiver complexity 1 O ( ς 1 ) O ( 2 ς 2 ) O ( 2 ς 2 )
Transmitter complexity O ( ς 2 ) O ( ς 2 ) O ( ς 2 )
CostHighHigherLow
Precise transmission 2 YesYesNo
Neighbor security 3 YesYesNo
1 ς 1 = ( 2 N K + K 2 ) ( K 1 ) + N K ( K 1 ) 2 + K ( K 1 ) 2 and ς 2 = K N 2 + N K . 2 The case where the confidential information is transmitted to a preassigned position. 3 The scenario where the Eve is close to the information beam-width region [7].
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParametersValue
Number of ULA, K3
Number of ULA elements, N21
Single carrier frequency, f c 30 GHz
Inter-array spacing, D 100 λ
Inter-element spacing, d 0.5 λ
Multiple carrier frequencies, f c 1 , f c 2 , f c 3 30 GHz, 30.1 GHz, 30.2 GHz
Total transmit power per symbol, P s 1
Number of LU1
Number of Eve1
Location of the 1st array * , ( r 1 , θ 1 ) ( 1000 λ , 95.7392 )
Location of the 2nd array * , ( r 2 , θ 2 ) ( 994.9874 λ , 90 )
Location of the 3rd array * , ( r 3 , θ 3 ) ( 1000 λ , 84.2608 )
Location 1 for the Eve * 1 , ( r 1 E , θ 1 E ) ( 100 λ , 180 )
Location 2 for the Eve * 2 , ( r 1 E , θ 1 E ) ( 500 λ , 84.2608 )
Modulation modeQPSK
Information rate20 Mbps
* The location of the LU is regarded as the reference point. 1 The case where the Eve is not in the same direction as the LU for any arrays. 2 The case where the Eve is located in the same direction as the LU for the 3rd array.

Share and Cite

MDPI and ACS Style

Zhang, W.; Le, M.; Li, B.; Wang, J.; Peng, J. Directional Modulation-Enhanced Multiple Antenna Arrays for Secure and Precise Wireless Transmission. Sensors 2019, 19, 4833. https://doi.org/10.3390/s19224833

AMA Style

Zhang W, Le M, Li B, Wang J, Peng J. Directional Modulation-Enhanced Multiple Antenna Arrays for Secure and Precise Wireless Transmission. Sensors. 2019; 19(22):4833. https://doi.org/10.3390/s19224833

Chicago/Turabian Style

Zhang, Wei, Mingnan Le, Bin Li, Jun Wang, and Jinye Peng. 2019. "Directional Modulation-Enhanced Multiple Antenna Arrays for Secure and Precise Wireless Transmission" Sensors 19, no. 22: 4833. https://doi.org/10.3390/s19224833

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop