Skip to main content

Regional robust secure precise wireless transmission design for multi-user UAV broadcasting system

Abstract

In this paper, two regional robust secure precise wireless transmission (SPWT) schemes for multi-user unmanned aerial vehicle (UAV), (1)regional signal-to-leakage-and-noise ratio (SLNR) and artificial-noise-to-leakage-and-noise ratio (ANLNR) (R-SLNR-ANLNR) maximization and (2) point SLNR and ANLNR (P-SLNR-ANLNR) maximization, are proposed to tackle with the estimation errors of the target users’ location. In the SPWT system, the estimation error for SPWT cannot be ignored. However, the conventional robust methods in secure wireless communications optimize the beamforming vector in the desired positions only in statistical means and cannot guarantee the security for each symbol. The proposed regional robust schemes are designed for optimizing the secrecy performance in the whole error region around the estimated location. Specifically, with the known maximal estimation error, we define the target region and wiretap region. Then, we design an optimal beamforming vector and an artificial noise projection matrix, which achieve the confidential signal in the target area having the maximal power while only few signal power is conserved in the potential wiretap region. Instead of considering the statistical distributions of the estimated errors into optimization, we optimize the SLNR and ANLNR of the whole target area, which significantly decreases the complexity. Moreover, the proposed schemes can ensure that the desired users are located in the optimized region, which are more practical than the conventional methods. Simulation results show that our proposed regional robust SPWT design is capable of substantially improving the secrecy rate compared to the conventional non-robust method. The P-SLNR-ANLNR maximization-based method has the comparable secrecy performance with lower complexity than that of the R-SLNR-ANLNR maximization-based method.

1 Introduction

In the past decade, physical layer security (PLS) in wireless communications [110] have explosively developed because it is an alternative to encryption in the higher layer. In [11], Goel et al. first proposed artificial noise (AN) to improve the security performance in PLS. In [1214], AN-aided secure transmissions were proposed for enhancing the security performance in wireless transmission. In [15], a secure wireless transmission with multiple assisting jammers by maximizing the secrecy rate and optimizing power allocation was proposed. A physical layer approach for secure green communication was proposed by untrusted two-way relaying in [16, 17]. In [18], the authors proposed an intelligent reflecting surface invoked simultaneous wireless information and power transfer aided system for enhancing the energy harvesting performance. The authors in [19] proposed a secure unmanned aerial mobile edge computing system where multiple ground users offload large computing tasks to a nearby legitimate UAV in the presence of multiple eavesdropping UAVs with imperfect locations. As another promising PLS technique, direction modulation (DM) [2023] has attracted extensive attention since it is capable of projecting useful signals only into a predetermined direction, while making the constellation of the signal in other directions distort. For instance, Daly et al. of [20] presented a DM technique for modulation based upon a phased array. As a further extension, Yuan et al. proposed an orthogonal vector approach in [2123], which allows the imposed artificial orthogonal noise to bear on the DM analysis and synthesis. Additionally, by taking estimation error into consideration, some robust DM algorithms are proposed in various distributions of estimation error for PLS. For instance, in [24], Hu et al. considered the direction angle estimation error in uniform distribution and proposed a robust algorithm in a single-user DM scenario. Then, Shu et al. in [25] proposed a multi-user robust scheme in the DM system with the direction angle estimation error with a Gaussian distribution, while Gui et al. of [26] proposed a robust DM method with Von Mises distributed direction angle estimation error in multi-cast scenario. Another interesting proposal is a novel robust DM scheme of [27] based on main lobe-integration maximization. However, the security of these DM techniques is guaranteed only in the direction dimension, while the eavesdroppers in the desired direction may also receive the confidential messages from the channel, even if in different distances, which may bring a serious challenging security problem.

To address the aforementioned problem, the authors of [2831] proposed DM based secure precise wireless transmission (SPWT) techniques which transmit confidential messages to the users with exact direction and distance. To elaborate, Liu et al. in [28] proposed a novel DM scheme with random frequency diverse array (RFDA) which can produce a joint direction and distance controllable beam-pattern. In [29], Hu et al. proposed a RFDA scheme combined with AN, which can impose the interference to the undesired receivers. Moreover, Zhu et al. in [30] also proposed another SPWT scheme with the aid of cooperative relays. As a further advance, in [31], Shu et al. proposed a SPWT scheme by using random subcarrier selection and orthogonal frequency division multiplexing (OFDM), which has a low system complexity and reduce budget. Nevertheless, all the aforementioned SPWT schemes above assume precise direction angle and distance or precise channel state information (CSI) between the transmitter and desired receivers. However, in practical scenarios, the precise position information or CSI is intractable to obtain, no matter which estimation method is utilized, including the most widely used direction estimation algorithm, MUSIC and Capon, or the distance estimation algorithm of received signal strength indication (RSSI), all of which still exist estimation error. To the best of our knowledge, research on the practical SPWT which considers the estimation error are still in its infancy. Although there are some robust algorithms proposed in the DM system, most are not practical, since they assume that the estimation error distributions are known. And in vehicular networks, the communication requires high accuracy for each transmitted symbol; a statistical average optimal beamforming cannot guarantee SPWT for each transmitted symbol.

Against the above backdrop, in this paper, for the first time, we consider a robust SPWT design for a multi-user unmanned aerial vehicle (UAV) broadcasting scenario and propose two regional robust multi-users SPWT schemes. Explicitly, both methods consider the direction angle and distance estimation error relying on the knowledge of their maximal estimation error range of direction angle and distance, rather than on the knowledge of their distributions. Then, by maximizing the confidential message energy in the estimation error region, the receivers, who are still in the estimation error region, can obtain the confidential message, regardless of the existing estimation errors. The proposed methods are more practical compared to the algorithm with estimation error in a statistical distribution. Our main contributions are summarized as follows:

  1. 1

    A regional signal-to-leakage-noise ratio and artificial-noise-to-leakage-and-noise ratio (R-SLNR-ANLNR) maximization-based robust SPWT scheme is proposed with the aim of maximizing the region SLNR and ANLNR. And this is the first time that a robust scheme is proposed in the UAV SPWT system. As the desired users must be located in the estimation error region, they can receive the more energy of the confidential message. Otherwise, they may receive rare signal energy even though with the aid of beamforming and AN. In this scheme, a maximizing the minimal SLNR problem is considered for guaranteeing the security performance of each user.

  2. 2

    Considering the facts of a large amount of calculations and high complexity in the above scheme, we propose a low-complexity point SLNR and ANLNR (P-SLNR-ANLNR) maximization-based scheme by maximizing the performance of the sampled points. We first assume the main lobe range is larger than the estimation error range, due to the fact that the lobe width is dependent on the antenna number and on the sub-carrier bandwidth. Then, we choose to sample several points in the estimation error region of each user. Through calculating the point energy sum rather than the whole region energy sum, the proposed P-SLNR-ANLNR maximization-based scheme can significantly decrease the complexity.

  3. 3

    Through numerical simulations, our proposed schemes are capable of achieving the transmitted confidential message energy mapped only in the specific estimation error regions of the desired users. Moreover, we observe that the secrecy performance of the P-SLNR-ANLNR maximization-based scheme is related to the estimation error and the main lobe width.

The rest of the paper is organized as follows: In Section 2, the system model is introduced. In Section 3, a regional robust SPWT scheme based on maximizing the SLNR of the desired user region is proposed. In Section 4, a low complexity regional robust SPWT method based on P-SLNR maximization is presented. Simulation results are shown in Section 5. Finally, our conclusions are drawn in Section 6.

Notations: In this paper, we utilize letters of bold upper case, bold lower case, and lower case to denote matrices, vectors, and scalars, respectively. Given a complex vector or matrix, (·)T,(·)H, and tr(·) denote the transpose, conjugate transpose, and trace, respectively. IN refers to the N×N identity matrix. For a given set, \(\overline {(\cdot)}\) denotes the complement set.

2 System model

As shown in Fig. 1, we consider a multi-user broadcasting system. A transmitter Alice is a UAV equipped with a linear NT transmit antenna array, and there are M desired vehicular users equipped with single antenna, while the number and the location of eavesdroppers are unknown for Alice. We assume that the channel is the line-of-sight (LoS) channel which can be justified in UAV communication, and the receivers are far from the transmit antenna array. Furthermore, eavesdroppers only exist out of the receivers’ secure regions, which can be justified when eavesdroppers are convert and they need to keep enough distance from users to prevent detection.

Fig. 1
figure 1

Schematic diagram of the proposed scheme

Thus, the signal transmitted by antenna n can be represented by

$$\begin{array}{*{20}l} {s_{n}} &= \sqrt {{\alpha_{1} {P}}} xe{}^{j {\phi_{n}}} + \sqrt {{\alpha_{2} {P}}} {w_{n}}, \end{array} $$
(1)

where x is the modulated transmitting data symbol with \(\mathbb {E}\left \{ {{x^{*}}x} \right \} = 1, w_{n}\) is the AN mapped to the nth antenna, P is the total transmit power of all antennas, α1 and α2 are the power allocation (PA) factors which satisfy the identity equation constraint α1+α2=1, and ϕn is the initial phase which we have to design. In this paper, we assume α1 and α2 are predesigned [32]. We choose the first antenna of the array on the UAV as the reference antenna. All desired users and eavesdroppers are assumed to be on the ground and have the same height while the height of the UAV is dh.

Establish the circular coordinate system with the projection of the first antenna on the ground as the origin; the location of an arbitrarily receiver is given by (θ,r). Then, the distance from the receiver to the first antenna of the UAV can be expressed as \(r^{'}=\sqrt {{r}^{2}+d^{2}_{h}}\). The direction between the ray from the user to the first antenna of the UAV and the antenna array is expressed as

$$\begin{array}{*{20}l} \theta^{'}=\arccos\left(\frac{r}{r^{'}}\cos \theta \right), \end{array} $$
(2)

since

$$\begin{array}{*{20}l} r^{'} \cos \theta^{'} = r \cos \theta. \end{array} $$
(3)

Then, the distance rn from the nth antenna to the receiver can be expressed as

$$\begin{array}{*{20}l} {r^{'}_{n}} = r^{'} - \left({n - 1} \right)d\cos \theta^{'}, \end{array} $$
(4)

where d denotes the elements spacing. As the reference antenna is the first element of the antenna array, we have r1=r. The reference phase at the first antenna to be received is given by

$$\begin{array}{*{20}l} {\varphi_{0}}\left({\theta,r} \right) =2\pi{f_{c}}\frac{{{r^{'}}}}{c}\ , \end{array} $$
(5)

where fc is the central carrier frequency. Similarly, the phase of the transmit signal at the nth antenna received by the mth user can be expressed as

$$\begin{array}{*{20}l} {\varphi_{n}}\left({\theta,r} \right) =2\pi\left({f_{c}+k_{n}\Delta f}\right)\frac{{{r^{'}_{n}}}}{c}\ . \end{array} $$
(6)

where fc+knΔf is the subcarrier mapped into the nth antenna and selected from a subcarriers set

$$\begin{array}{*{20}l} S_{sub}=\left\{f_{i}|f_{i}=f_{c}+i\Delta f,(i=0,1,\ldots,N-1)\right\}. \end{array} $$
(7)

Herein, N is the number of the total subcarriers, and the total bandwidth is B=NΔf. Then, the phase shifting corresponding to the reference phase of the nth element is expressed as

$$\begin{array}{*{20}l} {\psi_{n}}\left({\theta,r} \right) &= {\mathrm{ }}{{ 2\pi \left({{\mathrm{ }}{f_{c}} + {k_{n}}\Delta f} \right){\mathrm{ }}{{r^{'}_{n}}}/{c}}}-{\varphi_{0}}\left({\theta,r} \right), \end{array} $$
(8)

Note that the subcarriers are randomly selected with randomization processing [33] which includes the following steps: integer mod, ordering, blocking, and block interleaving (BI) where BI is repeated until the random metric is greater than the predefined value. With this scheme, the randomness of the subcarriers array can be guaranteed and decouple the direction angle and distance. Then, the received signal at (θ,r) can be represented as

$$\begin{array}{*{20}l} y\left({\theta,r} \right)=\sqrt {\alpha_{1} {P}}{\mathbf{h}^{H}}\mathbf{v}x + \sqrt {\alpha_{2} {P}}{\mathbf{h}^{H}}\mathbf{w} + n, \end{array} $$
(9)

where h is the normalized steering vector given by

$$\begin{array}{*{20}l} \mathbf{h} = \frac{1}{{{\sqrt{N_{T}}}}} {\left[ {{e^{j{\psi_{1}}\left({\theta,r} \right)}},{e^{j{\psi_{2}}\left({\theta,r} \right)}}, \cdots,{e^{j{\psi_{{N_{T}}}}\left({\theta,r} \right)}}} \right]^{T}}. \end{array} $$
(10)

Furthermore, v, where vHv=1, is the beamforming vector designed to achieve phase alignment, and n is the additive white Gaussian noise (AWGN) distributed as \(n\sim \mathcal {CN}\left (0,\sigma ^{2}\right)\).

Accordingly, the received signals along the mth desired user can be expressed as

$$\begin{array}{*{20}l} y\left({{\theta_{{d_{m}}}},{r_{{d_{m}}}}} \right) = \sqrt {{\alpha_{1}}{P}} \mathbf{h}_{{d_{m}}}^{H}\mathbf{v}x + \sqrt {{\alpha_{2}}{P}} \mathbf{h}_{{d_{m}}}^{H}\mathbf{w} + {n_{{d_{m}}}}, \end{array} $$
(11)

where dm denotes the mth desired user, and \(\mathbf {h_{d_{m}}}\) is obtained by replacing (θ,r) with \(\left ({\theta _{d_{m}},r_{d_{m}}} \right)\) in (8), \(n_{{d_{m}}}\) is the AWGN distributed as \(n_{{d_{m}}}\sim \mathcal {CN}\left (0,\sigma _{d_{m}}^{2}\right)\). Additionally, the received signals along the undesired position where eavesdropper may be located can be expressed as

$$\begin{array}{*{20}l} y\left({{\theta_{{e_{k}}}},{r_{{e_{k}}}}} \right) = \sqrt {{\alpha_{1}}{P}} \mathbf{h}_{{e_{k}}}^{H}\mathbf{v}x + \sqrt {{\alpha_{2}}{P}} \mathbf{h}_{{e_{k}}}^{H}\mathbf{w} + {n_{{e_{k}}}}, \end{array} $$
(12)

where ek denotes the kth eavesdropper, and \(\mathbf {h_{e_{k}}}\) is obtained by replacing (θ,r) with \(\left ({\theta _{e_{k}},r_{e_{k}}} \right)\) in (10), and \(n_{{e_{k}}}\sim \mathcal {CN}\left (0,\sigma _{e_{k}}^{2}\right)\). For simplicity, we assume \(\sigma _{d_{m}}^{2}=\sigma _{e_{k}}^{2}=\sigma ^{2}\). Then, our aim is to find the optimal v and w for achieving the best secrecy performance. However, in general, the transmitter does not have the perfect knowledge of the desired receivers and neither have that of the eavesdroppers. All the knowledge of direction and distance is measured by diverse estimation methods and hence results in estimation errors. Let us define the estimated position of the mth user \(\left (\theta _{d_{m}},r_{d_{m}}\right)\) as \(\left (\hat {\theta }_{d_{m}},\hat {r}_{d_{m}}\right)\), but our designed v and w with the estimated knowledge which may bring performance loss. Thus, we describe a robust scenario in the following.

Consider that the positions of the legitimate users can be obtained by some well-known estimation methods. For instance, the direction angle can be estimated by some classical direction estimation methods such as multiple signal classification (MUSIC) [34, 35], and the distance, from the transmitter to the receivers, may be estimated by some typical methods such as channel state information (CSI)-based localization method [36], which is available in both indoor and outdoor scenarios with high-distance-resolution. Practically, the estimation error and its corresponding error distribution have to be considered in the system, which may increase the complexity of the SPWT algorithm. In this paper, we propose the regional robust methods to simplify the algorithm with only the maximal estimation errors; this scheme maps the useful information into a region around the estimated position.

First, we assume that the maximal estimation errors of angle and distance are defined as Δθmax and Δrmax. The maximal estimation errors are depend on the measurement method we chooses. In this paper, we assume that with these measurement schemes, the maximal estimation errors are known. Then we define the mth desired region given by

$$\begin{array}{*{20}l} \text{Area}_{d_{m}}=\{(\theta,r)|\hat{\theta}_{d_{m}}-\Delta\theta_{\text{max}}\leq\theta\leq\hat{\theta}_{d_{m}}+\Delta\theta_{\text{max}},\\ \hat{r}_{d_{m}}-\Delta r_{\text{max}} \leq R \leq \hat{r}_{d_{m}}+\Delta r_{\text{max}}\}. \end{array} $$
(13)

Generally, the position of eavesdroppers are usually unknown, which means a potential eavesdropper may exist in everywhere out of the desired regions. Since eavesdroppers usually choose a hidden location to prevent detections, we assume eavesdroppers will not locate in the desired regions where are exposed to the receivers that lead to the failure of eavesdropping. Thus, we can define the area out of the desired regions as the wiretap region, given by

$$\begin{array}{*{20}l} \text{Area}_{e}=\overline{\bigcup\limits_{m = 1}^{M} \text{Area}_{d_{m}}}. \end{array} $$
(14)

In the following sections, we will design a feasible beamforming vector v and an artificial noise vector w to make the transmitted confidential signal energy mainly concentrate on the desired region as a regional robust SWPT.

3 Method based on regional SLNR maximization

This section is to propose a regional robust method based on optimizing the product of SLNR and ANLNR. This is due to the fact that the problem of maximizing SR can be approximated as maximizing the product of SLNR and ANLNR in the medium and high SNR regions The SLNR refers to the ratio between the confidential message energy at desired user and the confidential message energy at eavesdroppers. The ANLNR refers to the ratio between the artificial noise energy at eavesdroppers and the artificial noise energy at desired users. A higher SLNR means the more confidential message energy concentrate on the desired user and a higher ANLNR means artificial noise more concentrate on eavesdroppers and less effect to desired users. The SLNR for the mth user is defined as

$$\begin{array}{*{20}l} \text{SLNR}_{m} = \frac{{{{\alpha_{1}}P\mathbf{h}_{{d_{m}}}^{H}\mathbf{v}{\mathbf{v}^{H}}{\mathbf{h}_{{d_{m}}}}} }}{{\sum\limits_{k = 1}^{K} {\left({{\alpha_{1}}P\mathbf{h}_{{e_{k}}}^{H}\mathbf{v}{\mathbf{v}^{H}}{\mathbf{h}_{{e_{k}}}}} \right)+ \sigma^{2}} }}, \end{array} $$
(15)

where K is the number of eavesdroppers. And the ANLNR is defined as

$$\begin{array}{*{20}l} \mathrm{ANLNR_{m}}= \frac{\sum\limits_{k = 1}^{K}{{{\alpha_{2}}P\mathbf{h}_{{e_{k}}}^{H}\mathbf{w}{\mathbf{w}^{H}}{\mathbf{h}_{{e_{k}}}}} }}{{ { {{\alpha_{2}}P\mathbf{h}_{{d_{m}}}^{H}\mathbf{w}{\mathbf{w}^{H}}{\mathbf{h}_{{d_{m}}}}} + \sigma^{2}} }}, \end{array} $$
(16)

For single user and eavesdropper, in the medium and high SNR region, log(SLNR·ANLNR)≈ log(SINRB)− log(SINRE)≈SR, where SR is the secrecy rate. In other words, maximizing the product is equivalent to maximizing SR. In order to improve the security performance, both the SLNR at Bob and the ANLNR at Eve need to be maximized. First, we optimize the beamforming vector v by maximizing the SLNR of the SLNR-minimum desired user.

Taking the estimation errors into consideration, we define the mth user’s regional SLNR as

$$\begin{array}{*{20}l} \hat{\text{SLNR}}_{m}=\frac{{{\alpha_{1}}P\text{tr}\left\{ {{{\mathbf{v}}^{H}}\hat{\mathbf{R}}_{d_{m}}{{\mathbf{v}}}} \right\}}}{{\text{tr}\left\{ {{{\mathbf{v}}^{H}}\left({{\alpha_{1}}P\hat{\mathbf{R}}_{e} + \sigma^{2}{\mathbf{I}_{N}}} \right){{\mathbf{v}}}} \right\}}}, \end{array} $$
(17)

where

$$\begin{array}{*{20}l} \hat{\mathbf{R}}_{d_{m}}=\underset{Area_{d_{m}}}{{\int\!\!\!\!\!\int} \bigcirc} {\mathbf{h}\left({\theta,r} \right){\mathbf{h}^{H}}\left({\theta,r} \right)} d\theta dr, \end{array} $$
(18)

and

$$\begin{array}{*{20}l} \hat{\mathbf{R}}_{e}=\underset{Area_{e}}{{\int\!\!\!\!\!\int} \bigcirc} {\mathbf{h}\left({\theta,r} \right){\mathbf{h}^{H}}\left({\theta,r} \right)} d\theta dr. \end{array} $$
(19)

To guarantee all users have a good secrecy performance, we maximize the SLNR of the user having the worst performance. Thus, the designing of beamforming vector becomes an optimization problem as follows

$$\begin{array}{*{20}l} \begin{array}{l} \underset{\mathbf{v}}{\text{maximize}} ~\underset{m=1,\cdots,M}{\min } \left\{\hat{\text{SLNR}}_{m}\right\},\\ \mathrm{s.t.}~{\mathbf{v}^{H}}\mathbf{v} =1, \end{array} \end{array} $$
(20)

and it can be converted into an equivalent problem given by

$$\begin{array}{*{20}l} \begin{array}{l} \underset{\mathbf{v}}{\text{maximize}} ~\underset{m=1,\cdots,M}{\min } \left\{\ln\left(\hat{\text{SLNR}}_{m}\right)\right\},\\ \mathrm{s.t.}~{\mathbf{v}^{H}}\mathbf{v} = 1. \end{array} \end{array} $$
(21)

Next, to transform the problem into a convex problem, first, we substitute the numerator and denominator of the fraction in the objective function by exponential variables

$$\begin{array}{*{20}l} {e^{{a_{m}}}} = {\alpha_{1}}P\text{tr}\left\{ {\mathbf{R}_{v}{\hat{\mathbf{R}}_{{d_{m}}}}} \right\}, \end{array} $$
(22)

and

$$\begin{array}{*{20}l} {e^{{b}}} = \text{tr}\left\{ {\mathbf{R}_{v}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma_{e}^{2}{I_{N}}} \right)} \right\}, \end{array} $$
(23)

with

$$\begin{array}{*{20}l} \mathbf{R}_{v}=\mathbf{v}\mathbf{v}^{H}. \end{array} $$
(24)

Then, according to the basic properties of the exponential and logarithmic functions, the objective function in (21) can be rewritten as

$$\begin{array}{*{20}l} \underset{m=1,\cdots,M}{\min } \left\{a_{m}-b\right\}. \end{array} $$
(25)

Meanwhile, am and b are constrained by the right hand sides of equation in (22) and (23). Accordingly, the optimization problem can be transformed as

$$\begin{array}{*{20}l} &\underset{\mathbb{S}}{\mathrm{\max}} ~\underset{m=1,\cdots,M}{\min } \left\{a_{m}-b\right\}, \end{array} $$
(26a)
$$\begin{array}{*{20}l} &\mathrm{s.t.}\\ &{\alpha_{1}}P\text{tr}\left\{ {\mathbf{R}_{v}{\hat{\mathbf{R}}_{{d_{m}}}}} \right\}\geq {e^{{a_{m}}}},\forall m, \end{array} $$
(26b)
$$\begin{array}{*{20}l} &\text{tr}\left\{ {\mathbf{R}_{v}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma^{2}{I_{N}}} \right)} \right\}\leq e^{{b}}, \end{array} $$
(26c)
$$\begin{array}{*{20}l} &\text{tr}\left(\mathbf{R}_{v}\right)=1, \end{array} $$
(26d)
$$\begin{array}{*{20}l} &\mathbf{R}_{v}\succeq \mathbf{0}. \end{array} $$
(26e)

Here, the set \(\mathbb {S}\) refers to {a1,…,am,b,Rv}. And v is obtained by the decomposition of \(\tilde {R}_{v}[n]=vv^{H}\) in the case of rank\((\tilde {R}_{v}[n])=1\); otherwise, the randomization technology [37] would be utilized to get a rank-one approximation. It can be observed that the objective function is a concave function but the constraint (26c) is non-convex. Therefore, we linearize eb based on the first-order Taylor approximation to transform the constraint into a convex one as follows

$$\begin{array}{*{20}l} e^{b}=e^{\bar b}(b-\bar b+1), \end{array} $$
(27)

where

$$\begin{array}{*{20}l} \bar b=\ln\left(\text{tr}\left\{ {\mathbf{R}_{v}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma_{e}^{2}{I_{N}}} \right)} \right\}\right), \end{array} $$
(28)

is the point around which the approximation are made. Thus, the problem becomes

$$\begin{array}{*{20}l} &\underset{\mathbb{S}}{\mathrm{\max}} ~\underset{m=1,\cdots,M}{\min} \left\{a_{m}-b\right\} \end{array} $$
(29a)
$$\begin{array}{*{20}l} &\mathrm{s.t.}\\ &{\alpha_{1}}P\text{tr}\left\{ {\mathbf{R}_{v}{\hat{\mathbf{R}}_{{d_{m}}}}} \right\}\geq {e^{{a_{m}}}},\forall m, \end{array} $$
(29b)
$$\begin{array}{*{20}l} &\text{tr}\left\{ {\mathbf{R}_{v}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma_{e}^{2}{I_{N}}} \right)} \right\}\leq e^{\bar b}\left(b-\bar b+1\right), \end{array} $$
(29c)
$$\begin{array}{*{20}l} &\text{tr}\left(\mathbf{R}_{v}\right)=1, \end{array} $$
(29d)
$$\begin{array}{*{20}l} &\mathbf{R}_{v}\succeq \mathbf{0}. \end{array} $$
(29e)

Clearly, the original problem (20) is approximately transformed into an equivalent convex problem [38]; it can be solved iteratively and converges by Algorithm 1 using optimization software such as CVX. It is noteworthy that Rv has to satisfy rank(Rv)=1. Otherwise, the randomization technology would be utilized to get a rank-one approximation.

The specifical process of the maximize minimum-SR scheme is shown in Algorithm 2. First, we give initialized v[0] randomly, and then obtain \(\bar {b}[1]\) by Eq. (28). Next, we obtain the optimal solution \(\tilde {R}_{v}[1]\) by solving problem (29) with optimization software, such as CVX. Thus, after a number of iterations, the algorithm converge, and the optimal solutions of \(\tilde {R}_{v}[n]\) are obtained. Last, a rank-one approximation is given by the randomization technology.

Based upon the feasible solution of the beamforming vector v, due to the fact that the expression of SLNR does not involve w in the next step, the AN matrix can be obtained by maximizing the minimal ANLNR. The optimization problem for w can be write as

$$\begin{array}{*{20}l} &\underset{\mathbf{w}}{\mathrm{\max}} ~\underset{m=1,\cdots,M}{\min } \left\{\hat{\text{ANLNR}}_{m}\right\},\\ &\mathrm{s.t.}~\mathbf{w}^{H}\mathbf{w}=1. \end{array} $$
(30)

Similar to Eq. (29), the optimization problem can be transformed as

$$\begin{array}{*{20}l} &\underset{\mathbb{S}}{\mathrm{\max}} ~\underset{m=1,\cdots,M}{\min } \left\{c-d_{m}\right\} \end{array} $$
(31a)
$$\begin{array}{*{20}l} &\mathrm{s.t.}\\ &{\alpha_{1}}P\text{tr}\left\{ {\mathbf{R}_{w}{\hat{\mathbf{R}}_{{d_{m}}}}} \right\}\geq {e^{{c}}}, \end{array} $$
(31b)
$$\begin{array}{*{20}l} &\text{tr}\left\{ {\mathbf{R}_{w}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma_{e}^{2}{I_{N}}} \right)} \right\}\leq e^{\bar d_{m}}\left(d_{m}-\bar d_{m}+1\right),\forall m, \end{array} $$
(31c)
$$\begin{array}{*{20}l} &\text{tr}\left(\mathbf{R}_{w}\right)=1, \end{array} $$
(31d)
$$\begin{array}{*{20}l} &\mathbf{R}_{w}\succeq \mathbf{0}. \end{array} $$
(31e)

where Rw=wwH, and

$$\begin{array}{*{20}l} \bar d_{m}=\ln\left(\text{tr}\left\{ {\mathbf{R}_{w}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma_{e}^{2}{I_{N}}} \right)} \right\}\right), \end{array} $$
(32)

Hence, we can obtain the optimal w by Algorithm 2. Since problem (29) and (31) both have one NT×NT matrix variable, these methods need at most O((NT)3.5log(1/ε)) calculations at each inner iteration [39]. As \({\hat {\mathbf {R}}_{{d_{m}}}}\) is calculated by a integration, which needs \(O\left (\frac {r_{max}\theta _{max}}{\Delta r \Delta \theta }(2N_{T}-1)\right)\) calculations, where Δθ and Δr are the integral precision, and generally, they are set to be very small. We define \(N_{p}=\frac {r_{max}\theta _{max}}{\Delta r \Delta \theta }\) as the integral points. Thus, the per iteration complexity of the proposed R-SLNR-ANLNR maximization-based scheme can be approximately calculated as O(2((NT)3.5log(1/ε)+Np(2NT−1))).

4 Method based on point SLNR maximization

Although the robust method based on regional SLNR and ANLNR maximization has guaranteed a stable performance for users in the whole error region, a sum of confidential signal energy in the error region has to be calculated, which may bring a huge amount of calculation complexity. To reduce complexity, we propose a scheme based on maximizing the point secrecy capacity which is capable of significantly reducing the algorithm complexity with comparable performance.

First, we define the width of the main lobe in the angle and distance dimension as [40],

$$\begin{array}{*{20}l} {\Theta_{m}} = \left[ {{\theta_{{d_{m}}}} - \frac{{{\theta_{BW}}}}{2},{\theta_{{d_{m}}}} + \frac{{{\theta_{BW}}}}{2}} \right], \end{array} $$
(33)

and

$$\begin{array}{*{20}l} {{D}_{m}} = \left[ {{r_{{d_{m}}}} - \frac{c}{B},{r_{{d_{m}}}} + \frac{c}{B}} \right], \end{array} $$
(34)

where

$$\begin{array}{*{20}l} {\theta_{BW}} = \frac{{2\lambda }}{{Nd}}. \end{array} $$
(35)

Clearly, it is reasonable that the estimate error range is smaller than the main-beam range. Consider the scenario with 16 antennas and 5 MHz total bandwidth; the conditions that

$$\begin{array}{*{20}l} \frac{\lambda }{{Nd}} = \frac{1}{{8}} > \Delta {\theta_{\max }}, \frac{c}{B} = \frac{{3 \times {{10}^{8}}}}{{5 \times {{10}^{6}}}} = 60 > \Delta {r_{\max }}, \end{array} $$
(36)

with d=λ/2 is easy to be satisfied. Thus, we assume a scenario where the estimate error of the direction angle and the distance is sufficiently small that we have

$$\begin{array}{*{20}l} Area_{d_{m}}\subset Area_{MB}(\theta,r)~,~(\theta,r)\in Area_{d_{m}}, \end{array} $$
(37)

where AreaMB(θ,r) is the main lobe region, and this means the main-beam always contains the estimate error region. In this case, the optimization point in the estimation error region occupies most of the main lobe, so as to improve the performance. Next, we find several points in estimate regions of each user as desired points and several points in wiretap region as eavesdrop points. Then, maximize the secrecy performance in those points positions. In this context, we choose four points for instance as follows:

$$\begin{array}{*{20}l} \begin{array}{ll} {p_{dm}^{1} = \left(\hat \theta_{_{{s_{dm}}}}^{1},\hat r_{_{{s_{dm}}}}^{1}\right) = \left({{\hat \theta }_{{d_{m}}}} - \Delta {\theta_{{\text{max}}}},{{\hat r}_{{d_{m}}}}\right),}\\ {p_{dm}^{2} = \left(\hat \theta_{_{{s_{dm}}}}^{2},\hat r_{_{{s_{dm}}}}^{2}\right) = \left({{\hat \theta }_{{d_{m}}}} + \Delta {\theta_{{\text{max}}}},{{\hat r}_{{d_{m}}}}\right),}\\ {p_{dm}^{3} = \left(\hat \theta_{_{{s_{dm}}}}^{3},\hat r_{_{{s_{dm}}}}^{3}\right) = \left({{\hat \theta }_{{d_{m}}}},{{\hat r}_{{d_{m}}}} - \Delta {r_{{\text{max}}}}\right),}\\ {p_{dm}^{4} = \left(\hat \theta_{_{{s_{dm}}}}^{4},\hat r_{_{{s_{dm}}}}^{4}\right) = \left({{\hat \theta }_{{d_{m}}}},{{\hat r}_{{d_{m}}}} + \Delta {r_{{\text{max}}}}\right)}, \end{array} \end{array} $$
(38)

and

$$\begin{array}{*{20}l} \begin{array}{ll} {p_{em}^{1} = \left({{ \theta }_{{{{\text{sidelobe}}_{m}}}}^{1}},{{ r}_{{{{\text{sidelobe}}_{m}}}}^{1}}\right),}\\ {p_{em}^{2} = \left({{ \theta }_{{{{\text{sidelobe}}_{m}}}}^{2}},{{ r}_{{{{\text{sidelobe}}_{m}}}}^{2}}\right),}\\ {p_{em}^{3} = \left({{ \theta }_{{{{\text{sidelobe}}_{m}}}}^{1}},{{ r}_{{{{\text{sidelobe}}_{m}}}}^{1}} \right),}\\ {p_{em}^{4} = \left({{ \theta }_{{{{\text{sidelobe}}_{m}}}}^{2}},{{ r}_{{{{\text{sidelobe}}_{m}}}}^{2}} \right)}, \end{array} \end{array} $$
(39)

where

$$\begin{array}{*{20}l} &{\theta }_{{{{\text{sidelobe}}_{m}}}}^{1}=\arccos \left(\cos{{\hat \theta }_{{d_{m}}}}-\frac{3}{N_{T}} \right),\\ &{\theta }_{{{{\text{sidelobe}}_{m}}}}^{2}=\arccos \left(\cos{{\hat \theta }_{{d_{m}}}}+\frac{3}{N_{T}} \right),\\ &{ r}_{{{{\text{sidelobe}}_{m}}}}^{1}={{\hat r}_{{d_{m}}}}-\frac{3c}{2B},\\ &{ r}_{{{{\text{sidelobe}}_{m}}}}^{2}={{\hat r}_{{d_{m}}}}+\frac{3c}{2B}, \end{array} $$
(40)

are the maximum values corresponding to the first side lobes along direction angle and distance dimensions [31]. Then, we maximize the SLNR with these points instead of all the region.

To preserve the user with the worst performance, we have the following optimization problem by maximizing the minimal SLNR of the users, given by

$$\begin{array}{*{20}l} \begin{array}{l} \underset{\mathbf{v}}{\mathrm{\max}} ~\underset{m=1,\cdots,M}{\min } \left\{\left(\hat{\text{SLNR}}_{s_{m}}\right)\right\},\\ \mathrm{s.t.}~~~{\mathbf{v}^{H}}\mathbf{v} = 1, \end{array} \end{array} $$
(41)

where

$$\begin{array}{*{20}l} \hat{\text{SLNR}}_{s_{m}}=\frac{{{\alpha_{1}}P\text{tr}\left\{ {{{\mathbf{v}}^{H}}\hat{\mathbf{R}}_{s_{m}}{{\mathbf{v}}}} \right\}}}{{\text{tr}\left\{ {{{\mathbf{v}}^{H}}\left({{\alpha_{1}}P\hat{\mathbf{R}}_{e} + \sigma_{e}^{2}{\mathbf{I}_{N}}} \right){{\mathbf{v}}}} \right\}}}, \end{array} $$
(42)

and

$$\begin{array}{*{20}l} \hat{\mathbf{R}}_{s_{m}}=\sum\limits_{i = 1}^{4} {\mathbf{h}\left({\theta_{{s_{m}}}^{i},r_{{s_{m}}}^{i}} \right){\mathbf{h}^{H}}\left({\theta_{{s_{m}}}^{i},r_{{s_{m}}}^{i}} \right)}. \end{array} $$
(43)
$$\begin{array}{*{20}l} \hat{\mathbf{R}}_{e}=\sum\limits_{m = 1}^{M}\sum\limits_{i = 1}^{4} {\mathbf{h}\left({\theta_{{e_{m}}}^{i},r_{{e_{m}}}^{i}} \right){\mathbf{h}^{H}}\left({\theta_{{e_{m}}}^{i},r_{{e_{m}}}^{i}} \right)}. \end{array} $$
(44)

Compared to (18), \(\hat {\mathbf {R}}_{s_{m}}\) is only a sum of several points instead of the integration in all error regions which significantly reduces the calculation and complexity. The following steps to solve the optimal Rv and Rw that satisfy rank(Rv)=1 and rank(Rw)=1 are similar as (20) in Section 3. To elaborate, we first transform the optimization problem (41) into an equivalent problem as

$$\begin{array}{*{20}l} \begin{array}{l} \underset{\mathbf{v}}{\mathrm{\max}} ~\underset{m=1,\cdots,M}{\min } \left\{\text{ln}\left(\hat{\text{SLNR}}_{s_{m}}\right)\right\},\\ \mathrm{s.t.}~{\mathbf{v}^{H}}\mathbf{v} = 1. \end{array} \end{array} $$
(45)

Next, we substitute both the numerators and denominators of the fraction in the objective function by exponential variables as

$$\begin{array}{*{20}l} {e^{{a_{m}}}} = {\alpha_{1}}P\text{tr}\left\{ {\mathbf{R}_{v}{\hat{\mathbf{R}}_{{s_{m}}}}} \right\}, \end{array} $$
(46)
$$\begin{array}{*{20}l} {e^{{b}}} = \text{tr}\left\{ {\mathbf{R}_{v}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma_{e}^{2}{I_{N}}} \right)} \right\}. \end{array} $$
(47)

Then, we expend eb by the first-order Taylor approximation as

$$\begin{array}{*{20}l} e^{b}=e^{\bar b}\left(b-\bar b+1\right). \end{array} $$
(48)

Consequently, the final optimization problem becomes a convex optimization problem, given by

$$\begin{array}{*{20}l} &\underset{\mathbb{S}}{\mathrm{\max}} ~\underset{m=1,\cdots,M}{\min } \left\{a_{m}-b\right\}, \end{array} $$
(49a)
$$\begin{array}{*{20}l} &\mathrm{s.t.}\\ &{\alpha_{1}}P\text{tr}\left\{ {\mathbf{R}_{v}{\hat{\mathbf{R}}_{{s_{m}}}}} \right\}\geq {e^{{a_{m}}}},\forall m, \end{array} $$
(49b)
$$\begin{array}{*{20}l} &\text{tr}\left\{ {\mathbf{R}_{v}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma_{e}^{2}{I_{N}}} \right)} \right\}\leq e^{\bar b}\left(b-\bar b+1\right), \end{array} $$
(49c)
$$\begin{array}{*{20}l} &\text{tr}(\mathbf{R}_{v})=1, \end{array} $$
(49d)
$$\begin{array}{*{20}l} &\mathbf{R}_{v}\succeq \mathbf{0}, \end{array} $$
(49e)

where

$$\begin{array}{*{20}l} \bar b=\ln\left(\text{tr}\left\{ {\mathbf{R}_{v}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma_{e}^{2}{I_{N}}} \right)} \right\}\right). \end{array} $$
(50)

Then, we can obtain the optimal Rv with Algorithm 1 by optimization software. Note that Rv has to satisfy rank(Rv)=1; otherwise, the randomization technology would be utilized to get a rank-one approximation.

Similarly, the AN matrix can be obtained by maximizing the ANLNR at the desired position with following optimization problem.

$$\begin{array}{*{20}l} &\underset{\mathbb{S}}{\mathrm{\max}} ~\underset{m=1,\cdots,M}{\min } \left\{c-d_{m}\right\} \end{array} $$
(51a)
$$\begin{array}{*{20}l} &\mathrm{s.t.}\\ &{\alpha_{1}}P\text{tr}\left\{ {\mathbf{R}_{w}{\hat{\mathbf{R}}_{{s_{m}}}}} \right\}\geq {e^{{c}}}, \end{array} $$
(51b)
$$\begin{array}{*{20}l} &\text{tr}\left\{ {\mathbf{R}_{w}\left({{\alpha_{1}}P{\hat{\mathbf{R}}_{e}} + \sigma_{e}^{2}{I_{N}}} \right)} \right\}\leq e^{\bar d_{m}}\left(d_{m}-\bar d_{m}+1\right),\forall m, \end{array} $$
(51c)
$$\begin{array}{*{20}l} &\text{tr}\left(\mathbf{R}_{w}\right)=1, \end{array} $$
(51d)
$$\begin{array}{*{20}l} &\mathbf{R}_{w}\succeq \mathbf{0}. \end{array} $$
(51e)

Accordingly, we can obtain the optimal w with Algorithm 2.

As \({\hat {\mathbf {R}}_{{s_{m}}}}\) is calculated by a summation, which needs O(M(2NT−1)) calculations, where M is the number of point. Thus, the per iteration complexity of the proposed P-SLNR-ANLNR maximization based scheme can be approximately calculated as O(2((NT)3.5log(1/ε)+M(2NT−1))). Compared to Algorithm 1, the complexity significantly reduces since we have NpM, and the complexity superiority will increase with the improve of the integral precision Δr and Δθ which are usually tend to zero. Moreover, the smaller the selected sampling points are, the lower the method complexity will be. Figure 2 shows the complexity versus the integral points Np of the R-SLNR-ANLNR and P-SLNR-ANLNR schemes with the number of antenna NT=16. We can observe that the complexity of the R-SLNR-ANLNR maximization-based scheme increases a lot with the integral points grows, but of the P-SLNR-ANLNR maximization-based scheme is constant. In practice, the integral precision Δθ and Δr are very small, and thus, the integral points tend to be extremely large which lead the R-SLNR-ANLNR maximization-based scheme has a much larger complexity than P-SLNR-ANLNR maximization-based scheme.

Fig. 2
figure 2

The complexity versus the integral points Np of the proposed methods

5 Simulation results and analysis

In this section, we evaluate the performance of our proposed regional robust SPWT schemes by numerical simulations. The default system parameters are chosen as shown in Table 1, the position coordinates are referenced by the transmitter, and the measurement errors are modeled as independently identically distributed (i.i.d) random variables and distributed in truncated Gaussian. In this part, the secrecy rate (SR) is defined as

$$\begin{array}{*{20}l} \text{SR}=\min \limits_{m=1,\cdots,M}\left[\min \limits_{k=1,\cdots,K}\left(C_{d_{m}}-C_{e_{k}}\right) \right], \end{array} $$
(52)
Table 1 Simulation parameters setting

where \(C_{d_{m}}=\log _{2}\left (1+\text {SINR}_{d_{m}}\right)\), and \(C_{e_{k}}=\log _{2}\left (1+\text {SINR}_{e_{k}}\right)\).

Firstly, Fig. 3a and b illustrates the 3D performance surface of SINR versus direction angle θ and distance R of the proposed method. It can be observed that there are only two high signal energy peaks of confidential messages formed around the two desired positions. Outside the main peak or the estimation error region, the SINR is far lower than that of the two desired users. By our coarse measurement, the average SINR outside the estimation error region is only one tenth of that in the two desired users. Then, Fig. 4a and b illustrates the top view of Fig. 3a and b. We can clearly observe that the confidential energy concentrates on the estimation error region around the two users. From Figs. 2, 3, and 4, we observe that P-SLNR-ANLNR maximization-based scheme has a comparable secrecy performance to the R-SLNR-ANLNR maximization-based scheme while its complexity has significantly decreased in practice. Compared to the conventional direction modulation, which yield a high energy ridge or mountain chain in direction and distance dimensions, our proposed SPWT schemes can converge the confidential signal energy into a point and yield a energy peak around the point. Thus, SPWT has a higher energy efficiency.

Fig. 3
figure 3

The 3D surface of SINR versus the direction angle and the distance of the proposed methods

Fig. 4
figure 4

The top view of SINR versus the direction angle and the distance of the proposed methods

In Fig. 5, the curve of secrecy rates versus SNR for the proposed schemes is plotted. Observing this figure, the secrecy performance of two proposed schemes significantly increases with SNR compared to non-robust scheme. The R-SLNR-ANLNR maximization-based scheme outperforms all the other schemes in terms of the secrecy rate performance, and the secrecy rate of the P-SLNR-ANLNR maximization-based scheme increases as the number of points grows. When NT=16,B=5MHz,Δθmax=6 and Δrmax=50m, the secrecy rate of the 4,16 and 64 P-SLNR-ANLNR maximization-based scheme are very close. The reason behind this trend is that their main lobe is large enough compared to the estimation error region. It means that our proposed P-SLNR-ANLNR maximization-based scheme has the comparable performance with a lower complexity. As aforementioned, the width of the main lobe depends on the antenna number NT and the total signal bandwidth B, and thus, we further simulate the secrecy rate of the proposed schemes under different numbers of antennas, signal bandwidth, and estimation error range.

Fig. 5
figure 5

Secrecy rate versus SNR(\(10{log}_{10}(P/\sigma _{n}^{2})\)) of the proposed methods with NT=16,B=5MHz,Δθmax=6, and Δrmax=50m

Figure 6 draws the performance of the secrecy rate versus SNR under different number of antennas. Compared to Fig. 5, we observe the fact that the secrecy rate firstly increases from NT=8 to NT=16, but then decreases from NT=16 to NT=32, and meanwhile the performance of the P-SLNR-ANLNR maximization-based scheme with 4 points significantly deteriorates with the number of antennas. The reason is as follows: firstly, when NT is small, the main lobe is sufficiently large to guarantee the optimized regions locating in the main lobe. Then, as the number of antennas increases, the secrecy rate increases from NT=8 to NT=16. Secondly, when NT grows large, its main lobe is very small, and then some of the optimized regions run out of the main lobe, thus decreasing the secrecy performance from NT=16 to NT=32.

Fig. 6
figure 6

The curves of secrecy rate versus SNR(\(10{log}_{10}(P/\sigma _{n}^{2})\)) of the proposed methods with NT=8 and NT=32

Figure 7 draws the secrecy rates versus SNR with different signal bandwidth. Compared with Fig. 5 of B=5MHz, it can be observed that with the increase of bandwidth B, the total secrecy rate decreases due to the main lobe become smaller, and the performance of the P-SLNR-ANLNR maximization-based scheme with 4 points decreases significantly.

Fig. 7
figure 7

The curves of secrecy rate versus SNR(\(10{log}_{10}(P/\sigma _{n}^{2})\)) of the proposed methods with B=7.5MHz and N=10MHz

We also discuss the secrecy rate performance with different estimation error range. Figures 8 and 9 depict the curve of secrecy rates versus SNR with different maximal estimation direction angle error Δθmax and distance error Δrmax. With the increase of Δθmax and Δrmax, the estimation error region becomes larger and even larger than the main lobe which may lead to the same results with that in Figs. 6 and 7. Figure 8b and 9b show that the secrecy rate decreases as the estimation error region becomes larger.

Fig. 8
figure 8

Curves of secrecy rate versus SNR(\(10{log}_{10}(P/\sigma _{n}^{2})\)) of the proposed methods with Δθmax=3 and Δθmax=9

Fig. 9
figure 9

Curves of secrecy rate versus SNR(\(10{log}_{10}(P/\sigma _{n}^{2})\)) of the proposed methods with Δrmax=20m and Δrmax=100m

Note that when the antenna number, the band width, and the estimation error increases, the main lobe size will reduce; thus, the precision requirement have been increased; it is obvious that the 4-point P-SLNR cannot satisfy this precision requirement, which lead to performance decrease.

In summary, both the R-SLNR-ANLNR maximization-based scheme and the P-SLNR-ANLNR maximization-based scheme are feasible to achieve robust SPWT, and we can observe that the two schemes are related to the main lobe size and the estimation error range. Explicitly, when the main lobe size becomes smaller or the estimation error range becomes larger, the secrecy rate decreases. Besides, compared to the R-SLNR-ANLNR maximization-based scheme, the P-SLNR-ANLNR maximization-based scheme has a comparable secrecy performance but has a lower algorithm complexity, and the curves of the two proposed schemes are almost overlapped, when the main lobe is large enough or the estimation error is sufficient small.

6 Conclusion

In this paper, a R-SLNR maximization-based scheme and a P-SLNR maximization-based scheme are proposed to achieve a regional robust SPWT in a UAV-based multi-user scenario. Based upon these schemes, we obtain the following insights: (1) the proposed schemes can generate a high SINR peak only at the desired regions with the measurement errors, while result in a low flat SINR plane for other eavesdropper regions, which is far less than that at the desired positions formed. (2) The secrecy rate is related to the main lobe size and the estimation error region size; when antenna number NT and signal bandwidth B increase which lead the main lobe to be smaller, the secrecy rate reduced. Also, when maximal errors Δθmax and Δrmax increase which lead the error region to be larger, the secrecy rate reduced too. (3) Since the covariance matrix \(\hat {\mathbf {R}}_{{s_{m}}}\) is a sum for several points instead of an integration for the whole estimation region in the R-SLNR maximization-based scheme, the P-SLNR maximization-based scheme has low complexity, and the secrecy performance is comparable to that of the P-SLNR maximization-based scheme. As the main lobe size shrinks or the estimation error region size enlarges, more points are needed for the P-SLNR maximization-based scheme to guarantee the secrecy performance approaching the regional SLNR maximization-based scheme. Due to the low-complexity and high security properties of proposed scheme, it will be potentially applied in the future scenarios such as unmanned aerial vehicle

Availability of data and materials

The data sets used and/or analyzed during the current study are available from the corresponding author on reasonable request.

Abbreviations

SPWT:

Secure precise wireless transmission

DM:

Directional modulation

SLNR:

Signal-to-leakage-and-noise ratio

ANLNR:

Artificial-noise-to-leakage-and-noise ratio

SR:

Secrecy rate

References

  1. Y. Zou, J. Zhu, X. Li, L. Hanzo, Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective. IEEE Netw.30(5), 74–79 (2016).

    Article  Google Scholar 

  2. H. Wang, Q. Yin, X. Xia, Distributed beamforming for physical-layer security of two-way relay networks. IEEE Trans. Signal Proc.60(7), 3532–3545 (2012).

    Article  MathSciNet  Google Scholar 

  3. Y. Wu, J. B. Wang, J. Wang, R. Schober, C. Xiao, Secure transmission with large numbers of antennas and finite alphabet inputs. IEEE Trans. Commun.65(8), 3614–3628 (2017).

    Google Scholar 

  4. X. Chen, D. W. K. Ng, W. H. Gerstacker, H. H. Chen, A survey on multiple-antenna techniques for physical layer security. IEEE Commun. Surv. Tutorials. 19(2), 1027–1053 (2017).

    Article  Google Scholar 

  5. J. Zhu, Y. Zou, B. Champagne, W. P. Zhu, L. Hanzo, Security–reliability tradeoff analysis of multirelay-aided decode-and-forward cooperation systems. IEEE Trans. Veh. Technol.65(7), 5825–5831 (2016).

    Article  Google Scholar 

  6. X. Zhou, Q. Wu, S. Yan, F. Shu, J. Li, UAV-enabled secure communications: joint trajectory and transmit power optimization. IEEE Trans. Veh. Technol.68(4), 4069–4073 (2019). https://doi.org/10.1109/TVT.2019.2900157.

    Article  Google Scholar 

  7. X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, F. Shu, Joint optimization of a UAV’s trajectory and transmit power for covert communications. IEEE Trans. Signal Process.67(16), 4276–4290 (2019).

    Article  MathSciNet  Google Scholar 

  8. J. Zhao, Q. Li, Y. Gong, K. Zhang, Computation offloading and resource allocation for cloud assisted mobile edge computing in vehicular networks. IEEE Trans. Veh. Technol.68(8), 7944–7956 (2019).

    Article  Google Scholar 

  9. S. Ni, J. Zhao, H. H. Yang, Y. Gong, Enhancing downlink transmission in MIMO HetNet with wireless backhaul. IEEE Trans. Veh. Technol.68(7), 6817–6832 (2019).

    Article  Google Scholar 

  10. J. Zhao, Y. Liu, Y. Gong, C. Wang, L. Fan, A dual-link soft handover scheme for C/U plane split network in high-speed railway. IEEE Access. 6:, 12473–12482 (2018).

    Article  Google Scholar 

  11. S. Goel, R. Negi, Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun.7(6), 2180–2189 (2008). https://doi.org/10.1109/TWC.2008.060848.

    Article  Google Scholar 

  12. S. Yan, X. Zhou, N. Yang, B. He, T. Abhayapala, Artificial-noise-aided secure transmission in wiretap channels with transmitter-side correlation. IEEE Trans. Wirel. Commun.15(12), 8286–8297 (2016).

    Article  Google Scholar 

  13. N. Zhao, F. R. Yu, M. Li, V. C. M. Leung, Anti-eavesdropping schemes for interference alignment (IA)-based wireless networks. IEEE Trans. Wirel. Commun.15(8), 5719–5732 (2016).

    Article  Google Scholar 

  14. N. Zhao, F. R. Yu, M. Li, Q. Yan, V. C. M. Leung, Physical layer security issues in interference-alignment-based wireless networks. IEEE Commun. Mag. 54(8), 162–168 (2016).

    Article  Google Scholar 

  15. H. Wu, X. Tao, Z. Han, N. Li, J. Xu, Secure transmission in MISOME wiretap channel with multiple assisting jammers: maximum secrecy rate and optimal power allocation. IEEE Trans. Commun.65(2), 775–789 (2017).

    Article  Google Scholar 

  16. D. Wang, B. Bai, W. Chen, Z. Han, Secure green communication via untrusted two-way relaying: a physical layer approach. IEEE Trans. Commun.64(5), 1861–1874 (2016).

    Article  Google Scholar 

  17. J. Chen, R. Zhang, L. Song, Z. Han, B. Jiao, Joint relay and jammer selection for secure two-way relay networks. IEEE Trans. Inf. Forensics Secur.7(1), 310–320 (2012).

    Article  Google Scholar 

  18. C. Pan, H. Ren, K. Wang, M. Elkashlan, A. Nallanathan, J. Wang, L. Hanzo, Intelligent reflecting surface aided MIMO broadcasting for simultaneous wireless information and power transfer. IEEE J. Sel. Areas Commun.38(8), 1719–1734 (2020).

    Article  Google Scholar 

  19. Y. Zhou, C. Pan, P. L. Yeoh, K. Wang, M. Elkashlan, B. Vucetic, Y. Li, Secure communications for UAV-enabled mobile edge computing systems. IEEE Trans. Commun.68(1), 376–388 (2020).

    Article  Google Scholar 

  20. M. P. Daly, J. T. Bernhard, Directional modulation technique for phased arrays. IEEE Trans. Antennas Propag.57(9), 2633–2640 (2009).

    Article  Google Scholar 

  21. D. Yuan, V. F. Fusco, A vector approach for the analysis and synthesis of directional modulation transmitters. IEEE Trans. Antennas Propag.62(1), 361–370 (2014).

    Article  Google Scholar 

  22. D. Yuan, V. F. Fusco, Directional modulation far-field pattern separation synthesis approach. IET Microw. Antennas Propag.9(1), 41–48 (2015).

    Article  Google Scholar 

  23. D. Yuan, V. F. Fusco, Orthogonal vector approach for synthesis of multi-beam directional modulation transmitters. IEEE Antennas Wirel. Propag. Lett.14(1), 1330–1333 (2014).

    Google Scholar 

  24. J. Hu, F. Shu, J. Li, Robust synthesis method for secure directional modulation with imperfect direction angle. IEEE Commun. Lett.20(6), 1084–1087 (2016).

    Article  Google Scholar 

  25. F. Shu, X. Wu, J. Li, R. Chen, B. Vucetic, Robust synthesis scheme for secure multi-beam directional modulation in broadcasting systems. IEEE Access. 4:, 6614–6623 (2016).

    Article  Google Scholar 

  26. L. Gui, M. Yang, X. Zhou, F. Shu, J. Li, J. Wang, J. Lu, Robust directional modulation design for secrecy rate maximization in multiuser networks. IEEE Syst. J.14(3), 3150–3160 (2020).

    Article  Google Scholar 

  27. F. Shu, W. Zhu, X. Zhou, J. Li, J. Lu, Robust secure transmission of using main-lobe-integration-based leakage beamforming in directional modulation MU-MIMO systems. IEEE Syst. J.12(4), 3775–3785 (2018). https://doi.org/10.1109/JSYST.2017.2764142.

    Article  Google Scholar 

  28. Y. Liu, R. Hang, L. Wang, A. Nehorai, The random frequency diverse array: a new antenna structure for uncoupled direction-range indication in active sensing. IEEE J. Sel. Top. Signal Process.11(2), 295–308 (2016).

    Article  Google Scholar 

  29. J. Hu, S. Yan, F. Shu, J. Wang, J. Li, Y. Zhang, Artificial-noise-aided secure transmission with directional modulation based on random frequency diverse arrays. IEEE Access. 5:, 1658–1667 (2017).

    Article  Google Scholar 

  30. W. Zhu, F. Shu, T. Liu, X. Zhou, J. Hu, G. Liu, L. Gui, J. Li, J. Lu, in 9th International Conference on Wireless Communications and Signal Processing (WCSP). Secure precise transmission with multi-relay-aided directional modulation (IEEENanjing, 2017).

    Google Scholar 

  31. F. Shu, X. Wu, J. Hu, J. Li, R. Chen, J. Wang, Secure and precise wireless transmission for random-subcarrier-selection-based directional modulation transmit antenna array. IEEE J. Sel. Areas in Commun.36(4), 890–904 (2018).

    Article  Google Scholar 

  32. S. Wan, F. Shu, J. Lu, G. Gui, J. Wang, G. Xia, Y. Zhang, J. Li, J. Wang, Power allocation strategy of maximizing secrecy rate for secure directional modulation networks. IEEE Access. 6:, 38794–38801 (2018).

    Article  Google Scholar 

  33. T. Shen, S. Zhang, J. Wang, J. Hu, F. Shu, J. Wang, Two practical random-subcarrier-selection methods for secure precise wireless transmissions. IEEE Trans. Veh. Technol.68(9), 9018–9028 (2019).

    Article  Google Scholar 

  34. R. Schmidt, Multiple emitter location and signal parameter estimation. IEEE Trans. Antennas Propag.34(3), 276–280 (1986).

    Article  Google Scholar 

  35. F. Shu, Y. Qin, T. Liu, L. Gui, Y. Zhang, J. Li, Z. Han, Low-complexity and high-resolution DOA estimation for hybrid analog and digital massive MIMO receive array. IEEE Trans. Commun.66(6), 2487–2501 (2018).

    Article  Google Scholar 

  36. L. Gui, M. Yang, H. Yu, J. Li, F. Shu, F. Xiao, A Cramer–Rao lower bound of CSI-based indoor localization. IEEE Trans. Veh. Technol.67(3), 2814–2818 (2018).

    Article  Google Scholar 

  37. M. Zhang, R. Xue, H. Yu, H. Luo, W. Chen, in 2013 IEEE International Conference on Communications (ICC). Secrecy capacity optimization in coordinated multi-point processing, (2013), pp. 5845–5849.

  38. S. Boyd, L. Vandenberghe, Convex Optimization (Cambridge University Press, London, 2004).

    Book  Google Scholar 

  39. J. Ouyang, M. Lin, Y. Zou, W. P. Zhu, D. Massicotte, Secrecy energy efficiency maximization in cognitive radio networks. IEEE Access. 5:, 2641–2650 (2017).

    Article  Google Scholar 

  40. M. Sadek, A. Tarighat, A. H. Sayed, A leakage-based precoding scheme for downlink multi-user MIMO channels. IEEE Trans. Wirel. Commun.6(5), 171–1721 (2007).

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the person who provided meticulous and valuable suggestions for improving the paper.

Funding

This work was supported in part by the National Natural Science Foundation of China (Nos. 61771244, 61701234).

Author information

Authors and Affiliations

Authors

Contributions

Tong Shen came up with the proposed scheme and wrote the entire article. All authors read and approved this manuscript.

Corresponding author

Correspondence to Feng Shu.

Ethics declarations

Ethics approval and consent to participate

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent for publication

All authors agree to submit this version and claim that no part of this manuscript has been published or submitted elsewhere.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, T., Liu, T., Lin, Y. et al. Regional robust secure precise wireless transmission design for multi-user UAV broadcasting system. J Wireless Com Network 2020, 209 (2020). https://doi.org/10.1186/s13638-020-01817-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-020-01817-y

Keywords