Broadcasting Directional Modulation Based on Random Frequency Diverse Array

Frequency diverse array(FDA-) based directional modulation (DM) is a promising technique for physical layer security, due to its angle-range dependent transmit beampattern. However, the existing schemes are not suitable for the broadcasting scenario, where there are multiple legitimate users (LUs) to receive the confidential message. In this paper, we propose a novel random frequency diverse array(RFDA-) based DM scheme to realize the point to multi-point broadcasting secure transmission in both angle and range dimension. In the first stage, the beamforming vector is designed to maximize the artificial noise (AN) power, while satisfying the power requirement of LUs for transmitting the confidential message simultaneously. In the second stage, the AN projection matrix is obtained by maximizing signal-to-interference-plus-noise ratio (SINR) at the LUs. The proposed scheme only broadcasts the confidential message to the locations of LUs while the other regions are covered by AN, which promotes the security of the wireless broadcasting system. Moreover, it is energy efficient since the power of each LU is under accurate control. Numerical simulations are presented to validate the performance of the proposed scheme.


Introduction
Compared with wired communication, the evolution of wireless technology has brought many advancements with its effective features, such as flexibility, scalability, and low cost.However, the openness nature of wireless communication also makes it vulnerable to interception.Unintended receivers may also receive the confidential information, with eavesdroppers (Eves) amongst them.Therefore, the security problem of physical layer wireless transmission has attracted considerable attention in recent years.
Directional modulation (DM), as a new type of physical layer wireless security technology, allows preserving the signal format along a predefined secure communication direction while disturbing the constellation of the signal along other directions.Therefore, the low probability of interception (LPI) and low probability of detection (LPD) can be obtained for security wireless transmission.In [1,2], based on near-field direct antenna modulation, an analogue transmit architecture was proposed, which can prevent the eavesdroppers from correctly demodulating the signal.For the far-field scenario, a similar modulation scheme was demonstrated by adjusting each element's phase shift properly [3,4], so that the constellation of each symbol can be obtained in the derided direction and purposely distorted in other directions.However, these synthesis schemes require high speed radio frequency switches or phase shifters to be switched at the modulation rate, which limits their realization and application.In [5,6], the authors proposed novel orthogonal vector synthesis approaches based on the combination of excitation signal and artificial noise (AN) vectors, which can be realized digitally at baseband.Note that AN-aided DM can guarantee the signal-to-noise-ratio (SNR) at the legitimate user (LU) location and impose AN at the location of eavesdropper.To enhance the robustness against direction measurement error, Hu et al. proposed a DM synthesis algorithm based on conditional minimum mean square error [7].In [8], an orthogonal projection (OP) scheme was generalized for the synthesis of multibeam DM systems.In [9], the authors proposed an AN-aided zero-forcing synthesis approach for multi-beam DM, which is efficient and simple in realization.Shu et al. in [10] proposed a robust multi-beam DM synthesis algorithm by considering imperfect and unknown eavesdropper directions, respectively.In [11], the robust scheme has been generalized for the multi-user multiple-input and multiple output (MU-MIMO) scenario.To maximize the secrecy rate of the AN-based DM systems, Yu et al. [12] and Wan et al. [13] proposed two novel optimization schemes: general power iterative based beamforming scheme and secrecy rate based power allocation strategy.Moreover, Zhou et al. [14] proposed a robust and secure DM technique for amplify-and-forward relaying networks.
However, all of these DM methods are based on phased array.Accordingly, the physical layer transmission security is not guaranteed when the LUs and Eves are located along an identical direction.Therefore, it is natural to investigate other schemes that can achieve secure wireless communications at joint range-angle dimension.
As a promising technique, frequency diverse array (FDA) delivers new opportunities for secure wireless communications and has received abundant attention recently.Even though FDA can be deemed as a special transmit beamforming on phased array, there are some differences between them.The essential difference between phased array and FDA lies in that there are small frequency increments across FDA's elements [15][16][17], while the phased array's elements share the same carrier frequency.Consequently, the beampattern of phased array is only dependent on the angle, while FDA's beampattern depends on both angle and range parameters [18][19][20][21].Due to this property, FDA has promising potentials in the applications of radar [22][23][24], sensing [25], and wireless communication systems [26].However, the coupling of angle and range in FDA's beampattern still limits its capability in some specific applications.To address this problem, several non-linearly increasing frequency offsets approaches have been investigated to decouple FDA's range-angle beampattern [27][28][29].In [27], a logarithmic frequency increments scheme has been proposed, but its range dimension performance is not satisfactory.In [28], square and cubic frequency increments are proposed, which performs better in both decoupled transmit beamforming and target localization.Furthermore, by assigning FDA's each element with a random carrier frequency, the authors in [29] proposed a random frequency diverse array (RFDA).Its beampattern is thumbtack-like, which means the angle-range correlation can be effectively decoupled in active sensing.
Based on these properties, FDA has become an efficacious technique for DM to achieve LPI and LPD at joint range-angle dimension.Specifically, utilizing the uniform linear array and symmetrical configuration of frequency increments, the authors in [26] proposed an FDA-based DM scheme.By scrambling the constellation at undesired regions in both range and angle dimensions, the solution can provide secure point-to-point communications.In [30], the authors extended their previous work to secure QPSK and 16-ary wireless communications by using 2-bit phase controls across the array elements.Furthermore, Hu et al. [31] first and normally propose to combine RFDA and DM for secure wireless communication.By maximizing the SNR at the desired user location and transmitting AN at Eve's location, its secrecy capacity is superior to phased array-based DM and linear FDA.Unfortunately, the phase shifters are synthesized by complicated optimization algorithms, which cause the optimal position to be time-variant.Therefore, by utilizing nonlinear logarithmically increasing frequency offsets, the authors in [32] developed a time-invariant angle-range dependent DM based on FDA.In [33], an AN-based DM technique with RFDA was proposed to address the physical layer security problem for closely located legitimate user and eavesdropper.In [34], the authors further proposed a multi-beam DM synthesis scheme based on FDA, where the beamforming vector and frequency offsets are obtained by maximizing the signal-to-leakage-noise ratio (Max-SLNR) from the transmitter to Eves.Taking the receiver complexity into consideration, Shu et al. [35] proposed a secure and precise wireless transmission scheme by replacing RFDA with random subcarrier selection based on OFDM, which can effectively reduce the hardware budget in the medium-scale and large-scale systems.
Despite the various advantages of FDA-based DM scheme that were manifested in the approaches cited above, there are some fundamentally inherent problems to be overcome in view of the previous analyses.
(1) Most of the above-mentioned RFDA-based DM schemes focus on the point to point communication; the broadcasting point to multipoint scenario without any prior knowledge of the Eves' location has not been addressed.
(2) The received power of the legitimate user cannot be precisely controlled according to its link budget; thus the percentage of total transmission energy used for legitimate user's confidential message is not optimized.
Aiming at addressing the above-mentioned problems for wireless broadcasting systems, in this paper, we propose a novel energy-efficient multi-beam DM scheme based on RFDA.More specifically, we consider the scenario that multiple legitimate users are located at different positions known a priori, while the locations of Eves are unavailable at the transmitter.Consequently, the main objective of our synthesis method is to broadcast the confidential message towards different legitimate users with each power under control and impose AN at other regions to avoid the interception by Eves.First, the beamforming vector of the confidential message is designed by maximizing the AN transmit power budget (Max-ATP).Then, the AN projection matrix is obtained by maximizing signal-to-interference-plus-noise ratio (Max-SINR) at the LUs.The main contributions in this paper can be summarized as follows: (1) We proposed an energy efficient broadcasting DM scheme based on RFDA, in which the power of each LU is under accurate control.Particularly, the link budget of each LU can be taken into account to assure that the power of the confidential message at each legitimate receiver is large enough for a satisfactory communication performance.Consequently, the proposed approach has the ability to accurately control the efficiency of the total radiated energy.
(2) It does not require any prior knowledge of the Eves' location, which is more suitable for the practical applications.

... Eve
Transmit array And the corresponding secrecy capacity of the proposed broadcasting system has been evaluated theoretically.

System Model
As is shown in Figure 1(a), the secure multi-beam broadcasting system is composed of one transmitter with an -element uniform linear array (ULA) antenna and  LUs as receivers.Unlike the traditional phased array-based broadcasting system, in RFDA, the radiation frequency of the th element is where   is the carrier frequency and Δ  =   Δ is a random frequency increment.It is assumed that   ,  = 0, . . .,  − 1, are independent and identically distributed random variables.Therefore, the distribution of   determines a random mapping rule for the radiating frequencies of each array elements.Even though the methods in [31] are applicable for any mapping rule, in this paper, we utilize the continuous uniform frequency allocation algorithm.Thus,   is a random variable with its probability density function (PDF) being (  ) = 1 and   ∈ [−0.5, 0.5].
In the far-field scenario, the range between a receiver and the -th element can be expressed as where (,) is a specific angle and range parameter pair of the receiver's location with the first element being the reference point,  is the inter-element spacing of the ULA.AN-aided DM beamforming scheme has been widely utilized in the context of secure wireless communication owing to its robustness and secrecy performance.In view of these previous works, we establish a unified framework for AN-aided broadcasting DM system based on RFDA.Considering the DM scheme for secure wireless transmission, as shown in Figure 1(b), the broadcasting message at the antenna array is given by where () is the symbol of complex transmitting confidential message with average power ]  is the beamforming vector for broadcasting the message to desired LUs.  is the power of AN, n  () is the normalized AN, which can be expressed as where T  () is the projection matrix for controlling the spatial distribution of AN, z is the artificial noise vector with its PDF being z ∼ CN(0, I  ).
To simplify, we assume that the channels between transmitter and receivers are line of sight (LOS).Therefore, the instantaneous steering vector of a LU located at (,) is written as where (  ) is the path loss factor due to the free space propagation from the -th element to the receiver.Based on the fact that  ≫ ( − 1), we can have a reasonable approximation () = ( 0 ) = . . .= ( −1 ).To simplify the expression, h   () is denoted as the instantaneous steering vector of the -th LU, i.e., h   () ≜ h(   ,    , ).Since all DM transmitters should know the desired direction angle (position) of the legitimate users in advance before beamforming, the DOA estimation or source localization methods in [36,37] can be utilized for the estimation of these parameters.
Consider that there are  LUs at different locations; therefore, the broadcasting channel steering matrix can be defined as Without loss of generality, we assume that all LUs are corrupted by additive white Gaussian noise (AWGN).Therefore, the received signal vector of the LUs can be expressed as where n  () = [  0 (),   1 (), . . .,   −1 ()]  is the complex AWGN noises vector with the distribution   () ∼ CN(0,  2  ).Based on the system and signal model of RFDA-DM presented above, an efficient synthesis scheme is prposed in the next section for secure multi-beam DM in broadcasting systems.

Proposed Broadcasting RFDA-DM Scheme
3.1.Synthesis Scheme for the RFDA-DM.In this section, our major goal is to design or optimize the beamforming vector such that high secrecy performance can be achieved for broadcasting the confidential message to multiple LUs while the location of Eve is unknown.Without loss of generality, for a given total transmit power budget   , the proposed scheme first maximizes the AN transmit power (Max-ATP) to allocate power to AN as much as possible while satisfying the power requirement of LUs.Consequently, the instantaneous beamforming vector w() can be synthesized by the following optimization problem: max w()   () where  ≜ [√ 0 , √ 1 , . . ., √  , . . ., √ −1 ].   is the minimum required receiving power of the th LU, for  = 0, 1, .. − 1.Actually, due to the fixed total transmit power, less useful signal transmit power means more allocation of AN allocation power, which makes Eve hard to detect the broadcasting useful signals.
Utilizing the allocation power of AN, we can rewrite (8) as max w() where   is the power of the broadcasting signal and   = ‖w()‖ 2  2 ,   is the total transmit power.Therefore, the optimization problem in ( 9) is equivalent to the following problem: Actually, the problem in (10) can be solved by the method of Lagrange multipliers [38].For simplicity, we can omit the arguments of () in the following derivation.The cost function can be constructed as where  is the Lagrange multiplier vector.Based on the Lagrange multiplier theorem [38], the optimum solution of w * can be obtained when the gradient of  equals 0, i.e., Therefore, we have Inserting ( 13) into w  H  = , the Lagrange multiplier vector can be calculated as Therefore, the Max-ATP problem ( 8) can be solved by In the following stage, our objective is to design the AN projection matrix T  ().Based on the null-space projection rule and assuming that  ≥ , the AN projection matrix can be calculated by maximizing the average receive SINR at the desired receivers max ).Following the derivation presented in [38], it can be converted to the following equivalent problem: min Note that E[zz  ] = I  .Given the beamforming vector, the denominator of objective function is constant, then the minimization of the objective function means that tr {T   () H  () H   () T  ()} = 0.
Therefore, the AN projection matrix is given by [38] T

Analysis of Average Secrecy Capacity.
In this section, we analyze the secrecy performance of the proposed broadcasting RFDA-DM scheme.Specifically, we adopt the secrecy capacity as the main performance metric to evaluate the secrecy performance.Firstly, as the locations of Eves are unavailable at the transmitter, all locations outside the main lobes of the LUs' locations are defined as the potential location of Eve, which can be expressed as where denote the main lobes of the th LU, for  = 0, 1, . . .,  − 1, with   and   being the beamwidth of angle and range, respectively.To simplify the expression, we define the wiretap area as   ≜ [Θ  , Ω  ].Then we define the instantaneous secrecy capacity as where   is the average achievable capacity of LUs, and   () is the achievable capacity of Eve at the time , which is of the following form: ) . (23)

Simulation Results and Analysis
In this section, numerical simulations are conducted to illustrate the secrecy performance of the proposed broadcasting RFDA-DM scheme.The geometry of the RFDA-DM array is illustrated in Figure 1.The carrier frequency is   = 1GHz.
where   is carrier frequency in megahertz (MHz), and  is the range in kilometer.
In the first experiment, we investigate the spatial power distribution of the AN.The number of array elements is set as  = 64, and the total power of the transmitter is   = 40dBm.According to Figure 2, it is clear that power of the AN is uniformly distributed in the joint angle-range spatial dimension.This is because that, without priori knowledge of Eves' location, it is reasonable to impose AN uniformly to prevent the confidential message from interception as much as possible, since Eves could exist anywhere in the 2D spatial dimension.However, note that, from Figures 2(b) and 2(c), there are four deep nulls at the the locations of LUs, which means the LUs will not be affected by the artificial noise.Moreover, it is obvious from Figure 2(b) that the power of the AN attenuates as the distance increases from the transmitter, which is more suitable for the practicable applications.
In the second experiment, the spatial power distribution of the confidential broadcasting signal is explored.The same parameters as the first experiment are adopted, and the four LUs have the same minimum required receiving power, which is set as In Figure 3(a), we illustrate the power distribution of useful signal in the angle-range dimension, (i.e., without AN).It is clear that, due to the free space path loss of radio wave propagation, the power of useful signal decreases as the distance increases from the transmitter.Moreover, from Figure 3(b), one can observe that there are four sharp peaks corresponding to each of the LU.Moveover, all of these power values almost equal −90dBm, which confirms the accurate control of each broadcasting signal and therefore, the energy efficiency can be effectively improved.
In the third experiment, the SINR distribution is studied with different parameter settings.We consider three scenarios with different values of array elements  and total transmit power   .It is assumed that  = 16 and   = 40dBm for scenario 1,  = 64 and   = 40dBm for scenario 2, and  = 16 and   = 50dBm for scenario 3. The four LUs have the same minimum required receiving power, which is set as √ 0 = √ 1 = √ 2 = √ 3 = −90dBm in all of the three scenarios.The SINR distributions of the three scenarios are illustrated in Figures 4(a), 4(b), and 4(c), respectively.In Figure 4(c), it can be seen that there are only four SINR peaks values at the locations of LUs, which means (1) the LUs can receive the confidential message effectively; (2) in the other locations, it is hard for the interceptors to detect the message; (3) the angle and range correlation have been successfully decoupled.From the comparison between Figures 4(a) and 4(b), we can conclude that, with the increment of the array elements, the secrecy of the proposed RFDA-DM scheme improves.This phenomenon is in agreement with the theoretical analyses that the transmit array has a narrower beam and the degree of freedom (DoF) for the weight vector has increased.From the comparison between Figures 4(a) and 4(c), it is clear that as the total transmit power increases, the secrecy of the proposed scheme also enhances.This can be explained that, for a given receiver power constraint, more transmit power can be assigned to AN, and therefore, the SINR of non-LU locations can be effectively suppressed to promote the secrecy.In the fourth experiment, we investigate the SINR distribution of different receiving power requirement for each LU.The same parameters as the first experiment are adopted except that   = 50dBm and the minimum required receive  it is clear that there are four sharp peaks corresponding to each of the LU, while the SINR is low in other regions where Eve potentially exists.Moveover, the different receive power requirement is satisfied for each LU, which confirms the accurate control of each broadcasting signal and therefore, the energy efficiency can be effectively improved.
In the fifth experiment, we compare the SINR distribution of the Max-SLNR scheme and the proposed method.The same parameters as the first experiment are adopted except that the number of array elements is set as  = 16.From Figures 6 and 7, we can observe that, for the proposed method, the power of each LU is under accurate control, which can guarantee the reception performance at the LUs.However, for the Max-SLNR scheme, the SINRs at the LUs are different, which implies inefficient power allocation.
Moreover, compared with the Max-SLNR scheme, the proposed one achieves lower SINR at all locations outside the main lobes of the locations of LUs.Therefore, the proposed scheme can promote the wireless communication security performance without prior information of the Eve's location, since more power can be allocated to AN for the undesired communication region.
In the sixth experiment, we compare the BER performance of the Max-SLNR scheme and the proposed method.The same parameters as the first experiment are adopted except that   varies from 35dBm to 55dBm.Figure 8 shows the BER curves of the LUs versus total power budget for the proposed method and the max-SLNR method.It is obvious that the BER at each LU of the proposed methods remains nearly constant which is about 10 −5 .Therefore, it can ensure  the effective reception of the LUs.On the contrary, the BERs of different LUs for the Max-SLNR method vary from each other.Thus, for the max-SLNR method, the power of each LU cannot be accurately controlled.Figure 9 shows the BER curves of Eve versus total power budget for the proposed method and the max-SLNR method.It is obvious that, for the proposed method, the BER of Eve increases as the increment of the total transmit power   since more power can be assigned to AN.However, for the Max-SLNR method, the average BER of Eve decreases with the increment of the total transmit power.This is because the fact that the objective function of the max-SLNR method is to maximize the signalto-leakage noise ratio.Consequently, the receiver power at Eve also increases with the total transmit power budget, which causes the decrement of Eve's BER.Therefore, we can conclude that the proposed approach can accurately control the efficiency of the total radiated energy, and its security performance is superior to that of max-SLNR.
In the last experiment, the secrecy capacity of the proposed scheme is explored as a function of the total transmit power   .The same parameters as the first experiment are adopted except that   varies from 35dBm to 55dBm, and the number of elements varies from 16 to 128.From Figure 10, it is clear that the increment of array elements can promote the secrecy capacity.Similarly, with the increment of total transmit power, the secrecy capacity can be enhanced and secrecy capacity curves with different elements get closer, since more power can be assigned to AN.

Conclusions
In this paper, we proposed a RFDA-based DM scheme for secure wireless broadcasting system.The operation mode was extended from previous point to point communication to the point to multipoint mode.It does not require any prior knowledge of the Eves' location, which is more suitable for practical applications.In addition, it can effectively promote the security of the broadcasting system since the confidential message is only broadcasted to the locations of LUs.Moreover, the proposed approach is energy efficient because the power of each LU is under accurate control.The secrecy capacity of the proposed broadcasting system has been evaluated theoretically and verified by simulation results.

Figure 2 :Figure 3 : 7 SINR
Figure 2: The power distribution of the AN versus (a) angle-range dimension, (b) range dimension, and (c) angle dimension.

BERFigure 8 :BERFigure 9 :
Figure 8: The BERs at each LU for the proposed method and Max-SLNR.

Figure 10 :
Figure 10: The secrecy capacity comparison for different parameters versus total power   .