 Research
 Open Access
 Published:
Regional robust secure precise wireless transmission design for multiuser UAV broadcasting system
EURASIP Journal on Wireless Communications and Networking volume 2020, Article number: 209 (2020)
Abstract
In this paper, two regional robust secure precise wireless transmission (SPWT) schemes for multiuser unmanned aerial vehicle (UAV), (1)regional signaltoleakageandnoise ratio (SLNR) and artificialnoisetoleakageandnoise ratio (ANLNR) (RSLNRANLNR) maximization and (2) point SLNR and ANLNR (PSLNRANLNR) maximization, are proposed to tackle with the estimation errors of the target users’ location. In the SPWT system, the estimation error for SPWT cannot be ignored. However, the conventional robust methods in secure wireless communications optimize the beamforming vector in the desired positions only in statistical means and cannot guarantee the security for each symbol. The proposed regional robust schemes are designed for optimizing the secrecy performance in the whole error region around the estimated location. Specifically, with the known maximal estimation error, we define the target region and wiretap region. Then, we design an optimal beamforming vector and an artificial noise projection matrix, which achieve the confidential signal in the target area having the maximal power while only few signal power is conserved in the potential wiretap region. Instead of considering the statistical distributions of the estimated errors into optimization, we optimize the SLNR and ANLNR of the whole target area, which significantly decreases the complexity. Moreover, the proposed schemes can ensure that the desired users are located in the optimized region, which are more practical than the conventional methods. Simulation results show that our proposed regional robust SPWT design is capable of substantially improving the secrecy rate compared to the conventional nonrobust method. The PSLNRANLNR maximizationbased method has the comparable secrecy performance with lower complexity than that of the RSLNRANLNR maximizationbased method.
Introduction
In the past decade, physical layer security (PLS) in wireless communications [1–10] have explosively developed because it is an alternative to encryption in the higher layer. In [11], Goel et al. first proposed artificial noise (AN) to improve the security performance in PLS. In [12–14], ANaided secure transmissions were proposed for enhancing the security performance in wireless transmission. In [15], a secure wireless transmission with multiple assisting jammers by maximizing the secrecy rate and optimizing power allocation was proposed. A physical layer approach for secure green communication was proposed by untrusted twoway relaying in [16, 17]. In [18], the authors proposed an intelligent reflecting surface invoked simultaneous wireless information and power transfer aided system for enhancing the energy harvesting performance. The authors in [19] proposed a secure unmanned aerial mobile edge computing system where multiple ground users offload large computing tasks to a nearby legitimate UAV in the presence of multiple eavesdropping UAVs with imperfect locations. As another promising PLS technique, direction modulation (DM) [20–23] has attracted extensive attention since it is capable of projecting useful signals only into a predetermined direction, while making the constellation of the signal in other directions distort. For instance, Daly et al. of [20] presented a DM technique for modulation based upon a phased array. As a further extension, Yuan et al. proposed an orthogonal vector approach in [21–23], which allows the imposed artificial orthogonal noise to bear on the DM analysis and synthesis. Additionally, by taking estimation error into consideration, some robust DM algorithms are proposed in various distributions of estimation error for PLS. For instance, in [24], Hu et al. considered the direction angle estimation error in uniform distribution and proposed a robust algorithm in a singleuser DM scenario. Then, Shu et al. in [25] proposed a multiuser robust scheme in the DM system with the direction angle estimation error with a Gaussian distribution, while Gui et al. of [26] proposed a robust DM method with Von Mises distributed direction angle estimation error in multicast scenario. Another interesting proposal is a novel robust DM scheme of [27] based on main lobeintegration maximization. However, the security of these DM techniques is guaranteed only in the direction dimension, while the eavesdroppers in the desired direction may also receive the confidential messages from the channel, even if in different distances, which may bring a serious challenging security problem.
To address the aforementioned problem, the authors of [28–31] proposed DM based secure precise wireless transmission (SPWT) techniques which transmit confidential messages to the users with exact direction and distance. To elaborate, Liu et al. in [28] proposed a novel DM scheme with random frequency diverse array (RFDA) which can produce a joint direction and distance controllable beampattern. In [29], Hu et al. proposed a RFDA scheme combined with AN, which can impose the interference to the undesired receivers. Moreover, Zhu et al. in [30] also proposed another SPWT scheme with the aid of cooperative relays. As a further advance, in [31], Shu et al. proposed a SPWT scheme by using random subcarrier selection and orthogonal frequency division multiplexing (OFDM), which has a low system complexity and reduce budget. Nevertheless, all the aforementioned SPWT schemes above assume precise direction angle and distance or precise channel state information (CSI) between the transmitter and desired receivers. However, in practical scenarios, the precise position information or CSI is intractable to obtain, no matter which estimation method is utilized, including the most widely used direction estimation algorithm, MUSIC and Capon, or the distance estimation algorithm of received signal strength indication (RSSI), all of which still exist estimation error. To the best of our knowledge, research on the practical SPWT which considers the estimation error are still in its infancy. Although there are some robust algorithms proposed in the DM system, most are not practical, since they assume that the estimation error distributions are known. And in vehicular networks, the communication requires high accuracy for each transmitted symbol; a statistical average optimal beamforming cannot guarantee SPWT for each transmitted symbol.
Against the above backdrop, in this paper, for the first time, we consider a robust SPWT design for a multiuser unmanned aerial vehicle (UAV) broadcasting scenario and propose two regional robust multiusers SPWT schemes. Explicitly, both methods consider the direction angle and distance estimation error relying on the knowledge of their maximal estimation error range of direction angle and distance, rather than on the knowledge of their distributions. Then, by maximizing the confidential message energy in the estimation error region, the receivers, who are still in the estimation error region, can obtain the confidential message, regardless of the existing estimation errors. The proposed methods are more practical compared to the algorithm with estimation error in a statistical distribution. Our main contributions are summarized as follows:

1
A regional signaltoleakagenoise ratio and artificialnoisetoleakageandnoise ratio (RSLNRANLNR) maximizationbased robust SPWT scheme is proposed with the aim of maximizing the region SLNR and ANLNR. And this is the first time that a robust scheme is proposed in the UAV SPWT system. As the desired users must be located in the estimation error region, they can receive the more energy of the confidential message. Otherwise, they may receive rare signal energy even though with the aid of beamforming and AN. In this scheme, a maximizing the minimal SLNR problem is considered for guaranteeing the security performance of each user.

2
Considering the facts of a large amount of calculations and high complexity in the above scheme, we propose a lowcomplexity point SLNR and ANLNR (PSLNRANLNR) maximizationbased scheme by maximizing the performance of the sampled points. We first assume the main lobe range is larger than the estimation error range, due to the fact that the lobe width is dependent on the antenna number and on the subcarrier bandwidth. Then, we choose to sample several points in the estimation error region of each user. Through calculating the point energy sum rather than the whole region energy sum, the proposed PSLNRANLNR maximizationbased scheme can significantly decrease the complexity.

3
Through numerical simulations, our proposed schemes are capable of achieving the transmitted confidential message energy mapped only in the specific estimation error regions of the desired users. Moreover, we observe that the secrecy performance of the PSLNRANLNR maximizationbased scheme is related to the estimation error and the main lobe width.
The rest of the paper is organized as follows: In Section 2, the system model is introduced. In Section 3, a regional robust SPWT scheme based on maximizing the SLNR of the desired user region is proposed. In Section 4, a low complexity regional robust SPWT method based on PSLNR maximization is presented. Simulation results are shown in Section 5. Finally, our conclusions are drawn in Section 6.
Notations: In this paper, we utilize letters of bold upper case, bold lower case, and lower case to denote matrices, vectors, and scalars, respectively. Given a complex vector or matrix, (·)^{T},(·)^{H}, and tr(·) denote the transpose, conjugate transpose, and trace, respectively. I_{N} refers to the N×N identity matrix. For a given set, \(\overline {(\cdot)}\) denotes the complement set.
System model
As shown in Fig. 1, we consider a multiuser broadcasting system. A transmitter Alice is a UAV equipped with a linear N_{T} transmit antenna array, and there are M desired vehicular users equipped with single antenna, while the number and the location of eavesdroppers are unknown for Alice. We assume that the channel is the lineofsight (LoS) channel which can be justified in UAV communication, and the receivers are far from the transmit antenna array. Furthermore, eavesdroppers only exist out of the receivers’ secure regions, which can be justified when eavesdroppers are convert and they need to keep enough distance from users to prevent detection.
Thus, the signal transmitted by antenna n can be represented by
where x is the modulated transmitting data symbol with \(\mathbb {E}\left \{ {{x^{*}}x} \right \} = 1, w_{n}\) is the AN mapped to the nth antenna, P is the total transmit power of all antennas, α_{1} and α_{2} are the power allocation (PA) factors which satisfy the identity equation constraint α_{1}+α_{2}=1, and ϕ_{n} is the initial phase which we have to design. In this paper, we assume α_{1} and α_{2} are predesigned [32]. We choose the first antenna of the array on the UAV as the reference antenna. All desired users and eavesdroppers are assumed to be on the ground and have the same height while the height of the UAV is d_{h}.
Establish the circular coordinate system with the projection of the first antenna on the ground as the origin; the location of an arbitrarily receiver is given by (θ,r). Then, the distance from the receiver to the first antenna of the UAV can be expressed as \(r^{'}=\sqrt {{r}^{2}+d^{2}_{h}}\). The direction between the ray from the user to the first antenna of the UAV and the antenna array is expressed as
since
Then, the distance r_{n} from the nth antenna to the receiver can be expressed as
where d denotes the elements spacing. As the reference antenna is the first element of the antenna array, we have r_{1}=r. The reference phase at the first antenna to be received is given by
where f_{c} is the central carrier frequency. Similarly, the phase of the transmit signal at the nth antenna received by the mth user can be expressed as
where f_{c}+k_{n}Δf is the subcarrier mapped into the nth antenna and selected from a subcarriers set
Herein, N is the number of the total subcarriers, and the total bandwidth is B=NΔf. Then, the phase shifting corresponding to the reference phase of the nth element is expressed as
Note that the subcarriers are randomly selected with randomization processing [33] which includes the following steps: integer mod, ordering, blocking, and block interleaving (BI) where BI is repeated until the random metric is greater than the predefined value. With this scheme, the randomness of the subcarriers array can be guaranteed and decouple the direction angle and distance. Then, the received signal at (θ,r) can be represented as
where h is the normalized steering vector given by
Furthermore, v, where v^{H}v=1, is the beamforming vector designed to achieve phase alignment, and n is the additive white Gaussian noise (AWGN) distributed as \(n\sim \mathcal {CN}\left (0,\sigma ^{2}\right)\).
Accordingly, the received signals along the mth desired user can be expressed as
where d_{m} denotes the mth desired user, and \(\mathbf {h_{d_{m}}}\) is obtained by replacing (θ,r) with \(\left ({\theta _{d_{m}},r_{d_{m}}} \right)\) in (8), \(n_{{d_{m}}}\) is the AWGN distributed as \(n_{{d_{m}}}\sim \mathcal {CN}\left (0,\sigma _{d_{m}}^{2}\right)\). Additionally, the received signals along the undesired position where eavesdropper may be located can be expressed as
where e_{k} denotes the kth eavesdropper, and \(\mathbf {h_{e_{k}}}\) is obtained by replacing (θ,r) with \(\left ({\theta _{e_{k}},r_{e_{k}}} \right)\) in (10), and \(n_{{e_{k}}}\sim \mathcal {CN}\left (0,\sigma _{e_{k}}^{2}\right)\). For simplicity, we assume \(\sigma _{d_{m}}^{2}=\sigma _{e_{k}}^{2}=\sigma ^{2}\). Then, our aim is to find the optimal v and w for achieving the best secrecy performance. However, in general, the transmitter does not have the perfect knowledge of the desired receivers and neither have that of the eavesdroppers. All the knowledge of direction and distance is measured by diverse estimation methods and hence results in estimation errors. Let us define the estimated position of the mth user \(\left (\theta _{d_{m}},r_{d_{m}}\right)\) as \(\left (\hat {\theta }_{d_{m}},\hat {r}_{d_{m}}\right)\), but our designed v and w with the estimated knowledge which may bring performance loss. Thus, we describe a robust scenario in the following.
Consider that the positions of the legitimate users can be obtained by some wellknown estimation methods. For instance, the direction angle can be estimated by some classical direction estimation methods such as multiple signal classification (MUSIC) [34, 35], and the distance, from the transmitter to the receivers, may be estimated by some typical methods such as channel state information (CSI)based localization method [36], which is available in both indoor and outdoor scenarios with highdistanceresolution. Practically, the estimation error and its corresponding error distribution have to be considered in the system, which may increase the complexity of the SPWT algorithm. In this paper, we propose the regional robust methods to simplify the algorithm with only the maximal estimation errors; this scheme maps the useful information into a region around the estimated position.
First, we assume that the maximal estimation errors of angle and distance are defined as Δθ_{max} and Δr_{max}. The maximal estimation errors are depend on the measurement method we chooses. In this paper, we assume that with these measurement schemes, the maximal estimation errors are known. Then we define the mth desired region given by
Generally, the position of eavesdroppers are usually unknown, which means a potential eavesdropper may exist in everywhere out of the desired regions. Since eavesdroppers usually choose a hidden location to prevent detections, we assume eavesdroppers will not locate in the desired regions where are exposed to the receivers that lead to the failure of eavesdropping. Thus, we can define the area out of the desired regions as the wiretap region, given by
In the following sections, we will design a feasible beamforming vector v and an artificial noise vector w to make the transmitted confidential signal energy mainly concentrate on the desired region as a regional robust SWPT.
Method based on regional SLNR maximization
This section is to propose a regional robust method based on optimizing the product of SLNR and ANLNR. This is due to the fact that the problem of maximizing SR can be approximated as maximizing the product of SLNR and ANLNR in the medium and high SNR regions The SLNR refers to the ratio between the confidential message energy at desired user and the confidential message energy at eavesdroppers. The ANLNR refers to the ratio between the artificial noise energy at eavesdroppers and the artificial noise energy at desired users. A higher SLNR means the more confidential message energy concentrate on the desired user and a higher ANLNR means artificial noise more concentrate on eavesdroppers and less effect to desired users. The SLNR for the mth user is defined as
where K is the number of eavesdroppers. And the ANLNR is defined as
For single user and eavesdropper, in the medium and high SNR region, log(SLNR·ANLNR)≈ log(SINR_{B})− log(SINR_{E})≈SR, where SR is the secrecy rate. In other words, maximizing the product is equivalent to maximizing SR. In order to improve the security performance, both the SLNR at Bob and the ANLNR at Eve need to be maximized. First, we optimize the beamforming vector v by maximizing the SLNR of the SLNRminimum desired user.
Taking the estimation errors into consideration, we define the mth user’s regional SLNR as
where
and
To guarantee all users have a good secrecy performance, we maximize the SLNR of the user having the worst performance. Thus, the designing of beamforming vector becomes an optimization problem as follows
and it can be converted into an equivalent problem given by
Next, to transform the problem into a convex problem, first, we substitute the numerator and denominator of the fraction in the objective function by exponential variables
and
with
Then, according to the basic properties of the exponential and logarithmic functions, the objective function in (21) can be rewritten as
Meanwhile, a_{m} and b are constrained by the right hand sides of equation in (22) and (23). Accordingly, the optimization problem can be transformed as
Here, the set \(\mathbb {S}\) refers to {a_{1},…,a_{m},b,R_{v}}. And v is obtained by the decomposition of \(\tilde {R}_{v}[n]=vv^{H}\) in the case of rank\((\tilde {R}_{v}[n])=1\); otherwise, the randomization technology [37] would be utilized to get a rankone approximation. It can be observed that the objective function is a concave function but the constraint (26c) is nonconvex. Therefore, we linearize e^{b} based on the firstorder Taylor approximation to transform the constraint into a convex one as follows
where
is the point around which the approximation are made. Thus, the problem becomes
Clearly, the original problem (20) is approximately transformed into an equivalent convex problem [38]; it can be solved iteratively and converges by Algorithm 1 using optimization software such as CVX. It is noteworthy that R_{v} has to satisfy rank(R_{v})=1. Otherwise, the randomization technology would be utilized to get a rankone approximation.
The specifical process of the maximize minimumSR scheme is shown in Algorithm 2. First, we give initialized v[0] randomly, and then obtain \(\bar {b}[1]\) by Eq. (28). Next, we obtain the optimal solution \(\tilde {R}_{v}[1]\) by solving problem (29) with optimization software, such as CVX. Thus, after a number of iterations, the algorithm converge, and the optimal solutions of \(\tilde {R}_{v}[n]\) are obtained. Last, a rankone approximation is given by the randomization technology.
Based upon the feasible solution of the beamforming vector v, due to the fact that the expression of SLNR does not involve w in the next step, the AN matrix can be obtained by maximizing the minimal ANLNR. The optimization problem for w can be write as
Similar to Eq. (29), the optimization problem can be transformed as
where R_{w}=ww^{H}, and
Hence, we can obtain the optimal w by Algorithm 2. Since problem (29) and (31) both have one N_{T}×N_{T} matrix variable, these methods need at most O((N_{T})^{3.5}log(1/ε)) calculations at each inner iteration [39]. As \({\hat {\mathbf {R}}_{{d_{m}}}}\) is calculated by a integration, which needs \(O\left (\frac {r_{max}\theta _{max}}{\Delta r \Delta \theta }(2N_{T}1)\right)\) calculations, where Δθ and Δr are the integral precision, and generally, they are set to be very small. We define \(N_{p}=\frac {r_{max}\theta _{max}}{\Delta r \Delta \theta }\) as the integral points. Thus, the per iteration complexity of the proposed RSLNRANLNR maximizationbased scheme can be approximately calculated as O(2((N_{T})^{3.5}log(1/ε)+N_{p}(2N_{T}−1))).
Method based on point SLNR maximization
Although the robust method based on regional SLNR and ANLNR maximization has guaranteed a stable performance for users in the whole error region, a sum of confidential signal energy in the error region has to be calculated, which may bring a huge amount of calculation complexity. To reduce complexity, we propose a scheme based on maximizing the point secrecy capacity which is capable of significantly reducing the algorithm complexity with comparable performance.
First, we define the width of the main lobe in the angle and distance dimension as [40],
and
where
Clearly, it is reasonable that the estimate error range is smaller than the mainbeam range. Consider the scenario with 16 antennas and 5 MHz total bandwidth; the conditions that
with d=λ/2 is easy to be satisfied. Thus, we assume a scenario where the estimate error of the direction angle and the distance is sufficiently small that we have
where Area_{MB}(θ,r) is the main lobe region, and this means the mainbeam always contains the estimate error region. In this case, the optimization point in the estimation error region occupies most of the main lobe, so as to improve the performance. Next, we find several points in estimate regions of each user as desired points and several points in wiretap region as eavesdrop points. Then, maximize the secrecy performance in those points positions. In this context, we choose four points for instance as follows:
and
where
are the maximum values corresponding to the first side lobes along direction angle and distance dimensions [31]. Then, we maximize the SLNR with these points instead of all the region.
To preserve the user with the worst performance, we have the following optimization problem by maximizing the minimal SLNR of the users, given by
where
and
Compared to (18), \(\hat {\mathbf {R}}_{s_{m}}\) is only a sum of several points instead of the integration in all error regions which significantly reduces the calculation and complexity. The following steps to solve the optimal R_{v} and R_{w} that satisfy rank(R_{v})=1 and rank(R_{w})=1 are similar as (20) in Section 3. To elaborate, we first transform the optimization problem (41) into an equivalent problem as
Next, we substitute both the numerators and denominators of the fraction in the objective function by exponential variables as
Then, we expend e^{b} by the firstorder Taylor approximation as
Consequently, the final optimization problem becomes a convex optimization problem, given by
where
Then, we can obtain the optimal R_{v} with Algorithm 1 by optimization software. Note that R_{v} has to satisfy rank(R_{v})=1; otherwise, the randomization technology would be utilized to get a rankone approximation.
Similarly, the AN matrix can be obtained by maximizing the ANLNR at the desired position with following optimization problem.
Accordingly, we can obtain the optimal w with Algorithm 2.
As \({\hat {\mathbf {R}}_{{s_{m}}}}\) is calculated by a summation, which needs O(M(2N_{T}−1)) calculations, where M is the number of point. Thus, the per iteration complexity of the proposed PSLNRANLNR maximization based scheme can be approximately calculated as O(2((N_{T})^{3.5}log(1/ε)+M(2N_{T}−1))). Compared to Algorithm 1, the complexity significantly reduces since we have N_{p}≫M, and the complexity superiority will increase with the improve of the integral precision Δr and Δθ which are usually tend to zero. Moreover, the smaller the selected sampling points are, the lower the method complexity will be. Figure 2 shows the complexity versus the integral points N_{p} of the RSLNRANLNR and PSLNRANLNR schemes with the number of antenna N_{T}=16. We can observe that the complexity of the RSLNRANLNR maximizationbased scheme increases a lot with the integral points grows, but of the PSLNRANLNR maximizationbased scheme is constant. In practice, the integral precision Δθ and Δr are very small, and thus, the integral points tend to be extremely large which lead the RSLNRANLNR maximizationbased scheme has a much larger complexity than PSLNRANLNR maximizationbased scheme.
Simulation results and analysis
In this section, we evaluate the performance of our proposed regional robust SPWT schemes by numerical simulations. The default system parameters are chosen as shown in Table 1, the position coordinates are referenced by the transmitter, and the measurement errors are modeled as independently identically distributed (i.i.d) random variables and distributed in truncated Gaussian. In this part, the secrecy rate (SR) is defined as
where \(C_{d_{m}}=\log _{2}\left (1+\text {SINR}_{d_{m}}\right)\), and \(C_{e_{k}}=\log _{2}\left (1+\text {SINR}_{e_{k}}\right)\).
Firstly, Fig. 3a and b illustrates the 3D performance surface of SINR versus direction angle θ and distance R of the proposed method. It can be observed that there are only two high signal energy peaks of confidential messages formed around the two desired positions. Outside the main peak or the estimation error region, the SINR is far lower than that of the two desired users. By our coarse measurement, the average SINR outside the estimation error region is only one tenth of that in the two desired users. Then, Fig. 4a and b illustrates the top view of Fig. 3a and b. We can clearly observe that the confidential energy concentrates on the estimation error region around the two users. From Figs. 2, 3, and 4, we observe that PSLNRANLNR maximizationbased scheme has a comparable secrecy performance to the RSLNRANLNR maximizationbased scheme while its complexity has significantly decreased in practice. Compared to the conventional direction modulation, which yield a high energy ridge or mountain chain in direction and distance dimensions, our proposed SPWT schemes can converge the confidential signal energy into a point and yield a energy peak around the point. Thus, SPWT has a higher energy efficiency.
In Fig. 5, the curve of secrecy rates versus SNR for the proposed schemes is plotted. Observing this figure, the secrecy performance of two proposed schemes significantly increases with SNR compared to nonrobust scheme. The RSLNRANLNR maximizationbased scheme outperforms all the other schemes in terms of the secrecy rate performance, and the secrecy rate of the PSLNRANLNR maximizationbased scheme increases as the number of points grows. When N_{T}=16,B=5MHz,Δθ_{max}=6^{∘} and Δr_{max}=50m, the secrecy rate of the 4,16 and 64 PSLNRANLNR maximizationbased scheme are very close. The reason behind this trend is that their main lobe is large enough compared to the estimation error region. It means that our proposed PSLNRANLNR maximizationbased scheme has the comparable performance with a lower complexity. As aforementioned, the width of the main lobe depends on the antenna number N_{T} and the total signal bandwidth B, and thus, we further simulate the secrecy rate of the proposed schemes under different numbers of antennas, signal bandwidth, and estimation error range.
Figure 6 draws the performance of the secrecy rate versus SNR under different number of antennas. Compared to Fig. 5, we observe the fact that the secrecy rate firstly increases from N_{T}=8 to N_{T}=16, but then decreases from N_{T}=16 to N_{T}=32, and meanwhile the performance of the PSLNRANLNR maximizationbased scheme with 4 points significantly deteriorates with the number of antennas. The reason is as follows: firstly, when N_{T} is small, the main lobe is sufficiently large to guarantee the optimized regions locating in the main lobe. Then, as the number of antennas increases, the secrecy rate increases from N_{T}=8 to N_{T}=16. Secondly, when N_{T} grows large, its main lobe is very small, and then some of the optimized regions run out of the main lobe, thus decreasing the secrecy performance from N_{T}=16 to N_{T}=32.
Figure 7 draws the secrecy rates versus SNR with different signal bandwidth. Compared with Fig. 5 of B=5MHz, it can be observed that with the increase of bandwidth B, the total secrecy rate decreases due to the main lobe become smaller, and the performance of the PSLNRANLNR maximizationbased scheme with 4 points decreases significantly.
We also discuss the secrecy rate performance with different estimation error range. Figures 8 and 9 depict the curve of secrecy rates versus SNR with different maximal estimation direction angle error Δθ_{max} and distance error Δr_{max}. With the increase of Δθ_{max} and Δr_{max}, the estimation error region becomes larger and even larger than the main lobe which may lead to the same results with that in Figs. 6 and 7. Figure 8b and 9b show that the secrecy rate decreases as the estimation error region becomes larger.
Note that when the antenna number, the band width, and the estimation error increases, the main lobe size will reduce; thus, the precision requirement have been increased; it is obvious that the 4point PSLNR cannot satisfy this precision requirement, which lead to performance decrease.
In summary, both the RSLNRANLNR maximizationbased scheme and the PSLNRANLNR maximizationbased scheme are feasible to achieve robust SPWT, and we can observe that the two schemes are related to the main lobe size and the estimation error range. Explicitly, when the main lobe size becomes smaller or the estimation error range becomes larger, the secrecy rate decreases. Besides, compared to the RSLNRANLNR maximizationbased scheme, the PSLNRANLNR maximizationbased scheme has a comparable secrecy performance but has a lower algorithm complexity, and the curves of the two proposed schemes are almost overlapped, when the main lobe is large enough or the estimation error is sufficient small.
Conclusion
In this paper, a RSLNR maximizationbased scheme and a PSLNR maximizationbased scheme are proposed to achieve a regional robust SPWT in a UAVbased multiuser scenario. Based upon these schemes, we obtain the following insights: (1) the proposed schemes can generate a high SINR peak only at the desired regions with the measurement errors, while result in a low flat SINR plane for other eavesdropper regions, which is far less than that at the desired positions formed. (2) The secrecy rate is related to the main lobe size and the estimation error region size; when antenna number N_{T} and signal bandwidth B increase which lead the main lobe to be smaller, the secrecy rate reduced. Also, when maximal errors Δθ_{max} and Δr_{max} increase which lead the error region to be larger, the secrecy rate reduced too. (3) Since the covariance matrix \(\hat {\mathbf {R}}_{{s_{m}}}\) is a sum for several points instead of an integration for the whole estimation region in the RSLNR maximizationbased scheme, the PSLNR maximizationbased scheme has low complexity, and the secrecy performance is comparable to that of the PSLNR maximizationbased scheme. As the main lobe size shrinks or the estimation error region size enlarges, more points are needed for the PSLNR maximizationbased scheme to guarantee the secrecy performance approaching the regional SLNR maximizationbased scheme. Due to the lowcomplexity and high security properties of proposed scheme, it will be potentially applied in the future scenarios such as unmanned aerial vehicle
Availability of data and materials
The data sets used and/or analyzed during the current study are available from the corresponding author on reasonable request.
Abbreviations
 SPWT:

Secure precise wireless transmission
 DM:

Directional modulation
 SLNR:

Signaltoleakageandnoise ratio
 ANLNR:

Artificialnoisetoleakageandnoise ratio
 SR:

Secrecy rate
References
 1
Y. Zou, J. Zhu, X. Li, L. Hanzo, Relay selection for wireless communications against eavesdropping: a securityreliability tradeoff perspective. IEEE Netw.30(5), 74–79 (2016).
 2
H. Wang, Q. Yin, X. Xia, Distributed beamforming for physicallayer security of twoway relay networks. IEEE Trans. Signal Proc.60(7), 3532–3545 (2012).
 3
Y. Wu, J. B. Wang, J. Wang, R. Schober, C. Xiao, Secure transmission with large numbers of antennas and finite alphabet inputs. IEEE Trans. Commun.65(8), 3614–3628 (2017).
 4
X. Chen, D. W. K. Ng, W. H. Gerstacker, H. H. Chen, A survey on multipleantenna techniques for physical layer security. IEEE Commun. Surv. Tutorials. 19(2), 1027–1053 (2017).
 5
J. Zhu, Y. Zou, B. Champagne, W. P. Zhu, L. Hanzo, Security–reliability tradeoff analysis of multirelayaided decodeandforward cooperation systems. IEEE Trans. Veh. Technol.65(7), 5825–5831 (2016).
 6
X. Zhou, Q. Wu, S. Yan, F. Shu, J. Li, UAVenabled secure communications: joint trajectory and transmit power optimization. IEEE Trans. Veh. Technol.68(4), 4069–4073 (2019). https://doi.org/10.1109/TVT.2019.2900157.
 7
X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, F. Shu, Joint optimization of a UAV’s trajectory and transmit power for covert communications. IEEE Trans. Signal Process.67(16), 4276–4290 (2019).
 8
J. Zhao, Q. Li, Y. Gong, K. Zhang, Computation offloading and resource allocation for cloud assisted mobile edge computing in vehicular networks. IEEE Trans. Veh. Technol.68(8), 7944–7956 (2019).
 9
S. Ni, J. Zhao, H. H. Yang, Y. Gong, Enhancing downlink transmission in MIMO HetNet with wireless backhaul. IEEE Trans. Veh. Technol.68(7), 6817–6832 (2019).
 10
J. Zhao, Y. Liu, Y. Gong, C. Wang, L. Fan, A duallink soft handover scheme for C/U plane split network in highspeed railway. IEEE Access. 6:, 12473–12482 (2018).
 11
S. Goel, R. Negi, Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun.7(6), 2180–2189 (2008). https://doi.org/10.1109/TWC.2008.060848.
 12
S. Yan, X. Zhou, N. Yang, B. He, T. Abhayapala, Artificialnoiseaided secure transmission in wiretap channels with transmitterside correlation. IEEE Trans. Wirel. Commun.15(12), 8286–8297 (2016).
 13
N. Zhao, F. R. Yu, M. Li, V. C. M. Leung, Antieavesdropping schemes for interference alignment (IA)based wireless networks. IEEE Trans. Wirel. Commun.15(8), 5719–5732 (2016).
 14
N. Zhao, F. R. Yu, M. Li, Q. Yan, V. C. M. Leung, Physical layer security issues in interferencealignmentbased wireless networks. IEEE Commun. Mag. 54(8), 162–168 (2016).
 15
H. Wu, X. Tao, Z. Han, N. Li, J. Xu, Secure transmission in MISOME wiretap channel with multiple assisting jammers: maximum secrecy rate and optimal power allocation. IEEE Trans. Commun.65(2), 775–789 (2017).
 16
D. Wang, B. Bai, W. Chen, Z. Han, Secure green communication via untrusted twoway relaying: a physical layer approach. IEEE Trans. Commun.64(5), 1861–1874 (2016).
 17
J. Chen, R. Zhang, L. Song, Z. Han, B. Jiao, Joint relay and jammer selection for secure twoway relay networks. IEEE Trans. Inf. Forensics Secur.7(1), 310–320 (2012).
 18
C. Pan, H. Ren, K. Wang, M. Elkashlan, A. Nallanathan, J. Wang, L. Hanzo, Intelligent reflecting surface aided MIMO broadcasting for simultaneous wireless information and power transfer. IEEE J. Sel. Areas Commun.38(8), 1719–1734 (2020).
 19
Y. Zhou, C. Pan, P. L. Yeoh, K. Wang, M. Elkashlan, B. Vucetic, Y. Li, Secure communications for UAVenabled mobile edge computing systems. IEEE Trans. Commun.68(1), 376–388 (2020).
 20
M. P. Daly, J. T. Bernhard, Directional modulation technique for phased arrays. IEEE Trans. Antennas Propag.57(9), 2633–2640 (2009).
 21
D. Yuan, V. F. Fusco, A vector approach for the analysis and synthesis of directional modulation transmitters. IEEE Trans. Antennas Propag.62(1), 361–370 (2014).
 22
D. Yuan, V. F. Fusco, Directional modulation farfield pattern separation synthesis approach. IET Microw. Antennas Propag.9(1), 41–48 (2015).
 23
D. Yuan, V. F. Fusco, Orthogonal vector approach for synthesis of multibeam directional modulation transmitters. IEEE Antennas Wirel. Propag. Lett.14(1), 1330–1333 (2014).
 24
J. Hu, F. Shu, J. Li, Robust synthesis method for secure directional modulation with imperfect direction angle. IEEE Commun. Lett.20(6), 1084–1087 (2016).
 25
F. Shu, X. Wu, J. Li, R. Chen, B. Vucetic, Robust synthesis scheme for secure multibeam directional modulation in broadcasting systems. IEEE Access. 4:, 6614–6623 (2016).
 26
L. Gui, M. Yang, X. Zhou, F. Shu, J. Li, J. Wang, J. Lu, Robust directional modulation design for secrecy rate maximization in multiuser networks. IEEE Syst. J.14(3), 3150–3160 (2020).
 27
F. Shu, W. Zhu, X. Zhou, J. Li, J. Lu, Robust secure transmission of using mainlobeintegrationbased leakage beamforming in directional modulation MUMIMO systems. IEEE Syst. J.12(4), 3775–3785 (2018). https://doi.org/10.1109/JSYST.2017.2764142.
 28
Y. Liu, R. Hang, L. Wang, A. Nehorai, The random frequency diverse array: a new antenna structure for uncoupled directionrange indication in active sensing. IEEE J. Sel. Top. Signal Process.11(2), 295–308 (2016).
 29
J. Hu, S. Yan, F. Shu, J. Wang, J. Li, Y. Zhang, Artificialnoiseaided secure transmission with directional modulation based on random frequency diverse arrays. IEEE Access. 5:, 1658–1667 (2017).
 30
W. Zhu, F. Shu, T. Liu, X. Zhou, J. Hu, G. Liu, L. Gui, J. Li, J. Lu, in 9th International Conference on Wireless Communications and Signal Processing (WCSP). Secure precise transmission with multirelayaided directional modulation (IEEENanjing, 2017).
 31
F. Shu, X. Wu, J. Hu, J. Li, R. Chen, J. Wang, Secure and precise wireless transmission for randomsubcarrierselectionbased directional modulation transmit antenna array. IEEE J. Sel. Areas in Commun.36(4), 890–904 (2018).
 32
S. Wan, F. Shu, J. Lu, G. Gui, J. Wang, G. Xia, Y. Zhang, J. Li, J. Wang, Power allocation strategy of maximizing secrecy rate for secure directional modulation networks. IEEE Access. 6:, 38794–38801 (2018).
 33
T. Shen, S. Zhang, J. Wang, J. Hu, F. Shu, J. Wang, Two practical randomsubcarrierselection methods for secure precise wireless transmissions. IEEE Trans. Veh. Technol.68(9), 9018–9028 (2019).
 34
R. Schmidt, Multiple emitter location and signal parameter estimation. IEEE Trans. Antennas Propag.34(3), 276–280 (1986).
 35
F. Shu, Y. Qin, T. Liu, L. Gui, Y. Zhang, J. Li, Z. Han, Lowcomplexity and highresolution DOA estimation for hybrid analog and digital massive MIMO receive array. IEEE Trans. Commun.66(6), 2487–2501 (2018).
 36
L. Gui, M. Yang, H. Yu, J. Li, F. Shu, F. Xiao, A Cramer–Rao lower bound of CSIbased indoor localization. IEEE Trans. Veh. Technol.67(3), 2814–2818 (2018).
 37
M. Zhang, R. Xue, H. Yu, H. Luo, W. Chen, in 2013 IEEE International Conference on Communications (ICC). Secrecy capacity optimization in coordinated multipoint processing, (2013), pp. 5845–5849.
 38
S. Boyd, L. Vandenberghe, Convex Optimization (Cambridge University Press, London, 2004).
 39
J. Ouyang, M. Lin, Y. Zou, W. P. Zhu, D. Massicotte, Secrecy energy efficiency maximization in cognitive radio networks. IEEE Access. 5:, 2641–2650 (2017).
 40
M. Sadek, A. Tarighat, A. H. Sayed, A leakagebased precoding scheme for downlink multiuser MIMO channels. IEEE Trans. Wirel. Commun.6(5), 171–1721 (2007).
Acknowledgements
The authors thank the person who provided meticulous and valuable suggestions for improving the paper.
Funding
This work was supported in part by the National Natural Science Foundation of China (Nos. 61771244, 61701234).
Author information
Affiliations
Contributions
Tong Shen came up with the proposed scheme and wrote the entire article. All authors read and approved this manuscript.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent for publication
All authors agree to submit this version and claim that no part of this manuscript has been published or submitted elsewhere.
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Shen, T., Liu, T., Lin, Y. et al. Regional robust secure precise wireless transmission design for multiuser UAV broadcasting system. J Wireless Com Network 2020, 209 (2020). https://doi.org/10.1186/s1363802001817y
Received:
Accepted:
Published:
Keywords
 Secure precise wireless transmission
 Directional modulation
 Regional robust
 Leakage
 Secrecy rate
 UAV