Authentication and Secrecy of Multicast Communication Scenario: Artificial Noise-Aided Costas Sequence Matrix FDA Approach

In multicast communication scenario, the desired users are decomposed intoM groups to receive privateM useful data from the transmitter, while eavesdroppers (Eves) group tries to intercept. Since wireless security system consists of authentication and secure transmission, we propose directional modulation (DM) artificial noise (AN) matrix-aided Costas sequence (CS) matrix frequency diverse array (FDA) in multicast precoding systems in this paper. Specifically, we utilize the CS matrix for desired groups authentication (i.e., group identity), and it is shared via a low-speed forward link in advance. Next, we design AN matrixaided FDA to offer robust antieavesdropping method based on leakage concept. Furthermore, we devise secrecy metrics, namely, secrecy outage probability (SOP), asymptotic Eve’s detectability error probability, and average useful data leakage rate, based on the scenario where Eve’s instantaneous channel state information (CSI) is unavailable. In addition, we numerically analyze the proposed energy beamforming focusing and evaluate the secrecy energy efficiency. Via simulation results, the proposed scheme gives important insights into how to design and measure secrecy performances in multicast scenarios.


Introduction
e exponential growth of wireless communication services has attracted an emerging technology as well as a lot of researches, primarily focusing on wireless design transmission techniques, particularly to provide security for the useful information that needs to be transmitted via wireless channels. Because of the feature of wireless channels (i.e., broadcasting nature), eavesdroppers may have the ability to receive the useful information. In order to offer perfect security, we need to prevent eavesdroppers from intercepting the useful information intended to the desired receiver(s). Existing security techniques have been implemented using higher layers based on traditional cryptographic methods using encryption techniques [1]. Over recent years, physical layer security (PLS) has attracted a lot of attention from both industry and academia [2][3][4][5][6][7][8][9][10] over its counterpart traditional cryptographic methods. e PLS employs information theoretic method to provide information confidentiality without encryption techniques [3,4,7]. One main performance metric employed for PLS is the secrecy rate, at which the useful data can be transmitted secretly. Normally, the secrecy rate is determined by the difference between desired channel and eavesdropper capacities. Several authors have proposed different PLS methods, for example, directional modulation (DM) [11] and AN-aided methods [12][13][14][15].
Recently, secure communication in millimeter wave (mmWave) is being put forward. For instance, the authors in [16] proposed two secure transmission algorithms using polygon construction approach, specifically for general multipath fading channels. In this scheme, all antennas are activated and no on-off switching circuit is needed. In [17], antenna subset modulation was investigated, which introduces artificial randomness in the received constellation via antenna subset selection. is scheme combines the advantages of security and directional transmission. Reference [18] studied secure transmissions under slow fading channels with multipath propagation in millimeter wave systems. Due to propagation features of millimeter wave, the authors discussed three transmission schemes, namely, maximum ratio transmitting (MRT) beamforming, artificial noise (AN) beamforming, and partial MRT (PMRT) beamforming. In [19], the authors investigated secure communication of mmWave relaying networks in the presence of multiple spatial randomly eavesdroppers, which are modelled under a stochastic geometry framework. Reference [20] studied physical layer security in a multi-input single-output (MISO) millimeter wave system, where multiple singleantenna eavesdroppers are randomly located. Moreover, two secure transmission schemes, namely, maximum ratio transmitting (MRT) beamforming and artificial noise (AN) beamforming, are investigated and closed-form expressions of the connection probability are derived for the two techniques.
In [21], the authors proposed symbol-level precoder to improve security. is scheme adopted constructive interference in DM with the aim to reduce the transmitter energy consumption. In [22,23], the authors put forward a PLS for multicasting cochannel groups. In this scheme, independent data streams are sent to the groups of users for communication purposes employing multiple transmit antennas. In this context, an open research issue is how to secure the data transmission, in case eavesdropper group appears. Very recently, an interesting technique was proposed in [15] to provide security for the independent data streams in multicast precoding systems employing AN-aided DM method based on leakage concept. Nevertheless, the above-mentioned schemes may fail to guarantee better secrecy, especially in the case where the statistical independence assumption of the desired group reception and Eves group reception may not be held. For instance, in PLS, we normally make this assumption that the Eve location information is unavailable at the transmitter side. In real case, Eve is passive. is means that Eve never sends signals; thus, obtaining such location information will be difficult to realize. In practical scenario, an Eve group may be exactly located closed and/or may have knowledge of the desired group(s) directions. In this context, the DM-based phased array (PA) in the literature and also DM PA multicast method [15] may not offer better security performance for the desired group. is is because, using PA antennas, signals can be distorted at the direction(s) different from the intended one.
Most PLS literature only considered secure transmission of useful information towards the desired user(s) directions and neglected authentication procedure between the transmitter and desired users. It should be mentioned that, in wireless security, authentication and secure transmission are very essential [24]. In this case, the authentication is meant for user identification and prevents Eves from accessing the transmission, while secure transmission provides protection for the useful information so that Eves cannot intercept. us, it is necessary to exploit new array schemes for authentication and secure transmissions.
Frequency diverse array (FDA) in [25][26][27][28] has distinct possibilities to realize DM to further improve PLS system as mentioned in the above scenario, where the desired group and Eve group are located in the same direction but distinct ranges [29]. is is because FDA can create anglerange beamforming focusing due to the tiny frequency increment across the element index, which is completely different from PA beamforming. Adopting standard FDA with linear frequency increment, creating angle-range coupling beamforming issues will certainly compromise the secure transmission towards the desired group. Recently, the authors in [30] devised CS matrix to design frequency increment for FDA. is proposed FDA owns two unique features, namely, (1) low probability of detection (LPD) beamforming, which is randomly distributed beamforming without obvious peak, and this means that only the desired receiver can retrieve the information with specified CS matrix and (2) decoupling the correlation between angle-range dependent profiles. In fact, the CS matrix properties are more suitable for providing authentication in wireless communication applications.
Inspired by the above potential benefits, this paper investigates FDA in multicast precoding scenarios. Specifically, we adopt AN matrix-aided DM design for secure communication. In FDA, the frequency increment plays a vital role in angle-range focusing transmission. So, we utilize CS matrix to design the frequency increment which provides authentication characteristics for the desired groups before secure transmission. Next, we take the advantage of the leakage concept to devise the proposed scheme precoding vector and AN matrix. Also, secrecy metrics such as secrecy outage probability (SOP), asymptotic Eve's detectability error probability, and average useful data leakage rate are derived based on the scenario where Eve's instantaneous CSI is unavailable at the transmitter side. e theoretical analysis reveals significant insights into the design of AN matrix-aided FDA multicast secure communications. Finally, we evaluate the energy focusing capability and secrecy energy efficiency of the proposed scheme.
Actually, our proposed scheme is different from [15,29]. Firstly, in [15], the authors employed leakage concept to design signal-to-leakage-noise ratio (SLNR) and artificial noise (AN) to leakage-and-noise ratio (ANLNR) in multicast precoding. However, they can offer only one-dimensional angular-dependent PLS communications; that is, they can project information along a secure corridor but not to a particular position in free space. Also, authenticating the desired group(s) was not taken into account. In [29], the frequency increments are selected randomly for each antenna element and employed AN to provide PLS without also authenticating desired user. In addition, instability is created because of the randomly selected frequency increments.
e proposed scheme's major contributions are listed as follows: (1) We investigate a multicast precoding scenario based on frequency diverse array (FDA) to achieve desired group(s) PLS in two-dimensional angle-range-dependent direction. Since a secure wireless transmission system comprises authentication and secure transmission, firstly, we utilize the Costas sequence (CS) matrix to design the frequency increment that provides authentication characteristics for the desired group(s) in order to prevent any malicious receiver(s) from accessing the system before secure transmission. (2) We take the advantage of the leakage concept to devise the proposed scheme precoding vector by minimizing the confidential information power leakage at the FDA transmitter towards Eve group(s), namely, maximizing signal-to-leakage-noise ratio (SLNR). Afterwards, artificial noise (AN) projection matrix is developed and sent to eavesdropper (Eve) group in angle-range direction, with maximizing AN to leakage-and-noise ratio (ANLNR). (3) Since in wireless communication security system it is useful to have a great insight into the desired group(s) confidential information leakage and Eve group(s) decodability along the angle-range direction when an outage has occurred, we analyze the proposed scheme using the following metrics: secrecy outage probability (SOP), asymptotic Eve's detectability error probability, and average useful data leakage rate based on the scenario where Eve group(s) instantaneous CSI is unavailable at the transmitter side. e proposed scheme can also provide secure transmission in millimeter wave (mmWave) communication applications.

Costas Sequence (CS) Matrix Authentication Based on
Frequency Diverse Array. As demonstrated in Figure 1, we assume N element linear transmit antenna array. As opposed to PA antennas, FDA utilizes tiny frequency increments across the antenna indexes. Particularly, the radiated frequency of the nth element is described as where Δf n (t) � c s n Δf(t), n � 0, 1, ..., N − 1. f 0 is the carrier frequency, Δf(t) denote the frequency increments, and c s n is the utilized Costas sequence (CS) matrix for nth element.
Herein and without loss of generality, we consider CS matrix, that is, N � 11, namely {1, 3, 7, 2, 5, 11, 10, 8, 4, 9, 6} [31]. In Figures 2(a) and 2(b), we have depicted CS matrix for N � 11 and its difference matrix, respectively. e difference matrix shown in Figure 2 Note that α i denotes the ith coding element and i + j > M locations are left blank. It should be noted that the computed difference matrix reveals that the adopted CS matrix is feasible for the proposed scheme. With the chosen CS matrix, we design the array elements with frequency increments indexed as 3, 7, 2, 5, 11, 10, 8, 4, 9, 6} and Δf(t) is the frequency hopping step. Note that the transmitter exchanges the utilized CS matrix via a low-speed forward link in advance [32] to facilitate group identification as well as decoding of the useful information during transmission. Moreover, without the specific CS matrix for identification, the transmitter remains silent, since the transmitter cannot identify the desired groups.

Signal Model Formulation.
Generally, we select the first array element to be the reference. en, we give the FDA normalized steering vector at certain time t for ith user of the mth desired group at the location of (θ d,mi , r d,mi ) as (1) where with c being the light speed and d being the element spacing, and r n � r d,mi − n d sin θ d,mi . e frequency increment vector For the sake of simplicity, let h dm (f, t) ≜ h(f, t, θ dm , r dm ) denote mth desired group and Eve group is denoted as h e (f, t) ≜ h(f, t, θ e , r e ) at time t. Hence, we can define the steering channel matrix for mth desired group as

Security and Communication Networks
where T m is the number of intended/desired users in mth Likewise, the Eve steering channel matrix is expressed as As depicted in Figure 1, the radiated baseband signal is given as where P t denotes the total available power at the transmitter, x m (t) is the useful secret information sent to the mth desired group, and w m (t) is the mth desired group beamforming vector at time t. e AN projection matrix is given as A N t r a n s m i s s i o n Herein, the matrix ( . ϕ 1 and ϕ 2 represent power allocation factors for useful secret information and AN matrix, respectively. Note that the power constraint is ϕ 2 1 + ϕ 2 2 � 1. A large value of ϕ1 implies that more power can be allocated to send the secret information and less power is utilized for secure protection. Importantly, how to select the optimal values of ϕ 1 and ϕ 2 is a hard problem and may depend on the type of secrecy applications. Also, α 1 and α 2 , respectively, denote the normalized power factors for useful secret information and AN matrix. Note that, in order to achieve a maximum constructive combination at the mth desired group, we have w m (t) � h m (f, t). Additionally, we utilize AN matrix P AN (t) to force AN towards Eve group location at time t. e signals vectors received at desired group m and Eve group are, respectively, expressed in equations (6) and (7), where n dm ∼ CN(0, σ 2 d I T m ) and n e ∼ CN(0, σ 2 e I K ) .

Design of Precoding Vector and Artificial Noise (AN)
Matrix Based on Leakage Concept. In this section, we design the precoding vector w m (t) for the useful information and AN matrix P AN (t) based on the concept of leakage analysis. e maximized signal-to-leakage-noise ratio (SLNR) optimization problem corresponding to the precoding vector w m (t) is where SLNR (w m (t)) is expressed as Utilizing the generalized Rayleigh theorem [33], we can obtain the maximum SLNR solution from the eigenvector which corresponds to the largest eigenvalue of matrix as Next, we design the AN matrix P AN (t), which is considered as useful signal towards the Eve group to create interference and prevent useful information from being intercepted. We also consider that the AN matrix P AN (t) should not be leaked towards the M desired groups. e optimization problem for maximizing AN matrix leakageto-noise ratio (ANLNR) is where ANLNR (P AN (t)) is given as Security and Communication Networks 5 Based on Rayleigh theorem [33] and similar to equation (10), we can also determine the eigenvalue matrix as Important remarks: since the proposed transmitter should acquire prior knowledge of the intended angle-range direction before beamforming, the source localization techniques or direction of arrival (DOA) estimation in [34,35] can be employed to estimate the angle-range direction parameters. It is important to mention that these two factors, namely, noise and interference in the channel, may affect the measurement of DOAs, that is, introducing errors. Improving the DOAs measurement is out of the scope of this paper, but certainly this will be a future work.

Theoretical Performance Evaluation
In this section, we devise the proposed scheme secrecy metrics to give insights into secure communication transmission. Furthermore, we formulate the energy focusing capability and also evaluate the energy efficiency of the proposed scheme.

Secrecy Outage Probability.
We express the achievable rate from the proposed scheme transmitter to the mth desired group as where is defined as the received instantaneous signal-to-noise ratio (SNR) at a particular time t. In equation (15), w(t) denotes the transmitter weight vector in a generic way (for convenience sake), σ 2 dm is the desired group variance, and r dm /c represents the confidential information emitted at particular time t which will arrive at the desired group receiver.
Similarly, we can determine the achievable rate from the proposed transmitter to Eve group as where Note that equation (17) has the same physical meaning as equation (15). According to [36], we can determine the secrecy sum rate (SSR) of the proposed scheme as where [τ] + � max τ, 0 { }. e channel fading adopted is quasi-static Rayleigh. e exponential distributions of the desired group and Eve group at particular time t can be presented, respectively, as follows: e reader can refer to [37] for better understanding of equations (19) and (20). For the sake of simplicity, the received average SNRs along the desired group and Eve group are given, respectively, as c dm (t) � P t σ −2 dm and c e (t) � P t σ −2 e . Wiretap encoding technique [3] is adopted at the proposed transmitter to facilitate secure transmission to the mth desired group.
Herein, the proposed transmitter needs to choose two rates, namely, codeword rate R dm and secrecy data rate R s . e difference R e ≜ R dm − R s is the rate cost that offers antieavesdropping. In this scheme, we consider reality scenario, where the Eve group is passive. us, instantaneous CSI of the Eve's channel is unavailable at the proposed transmitter. In this case, the proposed transmitter assumes C e (f, t) as the Eve's channel capacity. e wiretap codes can be designed as R dm � C dm (f, t) and R s � C dm (f, t) − C e (f, t). It is important to mention that, in passive Eve scenario, achieving perfect secrecy is not always guaranteed, because it is realized that some useful information transmitted by the transmitter is likely to be leaked along the Eve angle-range direction(s).
To provide a great insight into the desired group(s) confidential information leakage and the Eve group(s) decodability along the angle-range direction when an outage has occurred, we follow the secrecy outage probability P sop guidelines of [38]. However, P sop in [38] can achieve only one-dimensional angle dependence. Hence, we investigate P sop in two dimensions, namely, angle-range dimension. e proposed scheme's wiretap code maximum achievable fractional equivocation can be written as t).
erefore, P sop is equivalently expressed as From equation (22), we can be able to provide an insight into how to achieve different secrecy requirement performances using the relation 0 < ξ ≤ 1. Note that when ξ � 1, it means perfect secrecy is attained; thus, the classical SOP is realized as seen in many studies (see [39] and the references therein).

Asymptotic Eve's Detectability Error Probability (β).
In this subsection, we devise an expression that gives insight of the lower bound on Eve's detecting error probability asymptotically. In other words, since it is hard for the desired group to identify which information is securely transmitted, we devise this performance metric as where E i (τ) � τ −∞ exp(t)/t dt is defined as the exponential integral. It is important to mention that equation (23) can be utilized to analyze the error probability of Eve in angle-range direction to ascertain how the private information can be detected.

Average Useful Data Leakage Rate (A leakage ).
By adopting fixed transmission rate, we can determine how the private information can be leaked towards Eve's group angle-range direction and the expression is described as (24) Note that the desired group is unable to know which useful information is leaked along the angle-range direction of Eve group. Hence, equation (24) can highlight how the transmitted private information can be leaked towards Eve location during the transmission process, especially in passive Eve scenarios.

Energy Beamforming Focusing Analysis.
As stated before, the FDA depends on some parameters, namely, range, angular direction, time, and even frequency diverse increment, to offer energy beamforming focusing. For the sake of simplicity, we derive the energy beamforming focusing in a general way. Referring to equation (1), we can reformulate it as Now, the energy beamforming focusing can be analyzed numerically as follows: df dθ dr dt, (26) where Ω f ≜ 0 ≤ f ≤ Δf r with Δf r denoting the frequency diverse increment resolution, Ω θ ≜ 0 ≤ θ � θ in ≤ Ξ θ with Ξ θ being the angular resolution, Ω r ≜ 0 ≤ r ≤ Ξ r with Ξ r being the range resolution, and Ω t ≜ 0 ≤ t ≤ T in with T in being the time frame interval. Note that ‖w(t)‖ 2 � 1. Accordingly, we can write w(t) � h(f, θ, r, t); and w(t) can be decomposed as where ⊙ denotes Hadamard product operator. Using equation (26), we can rewrite the energy beamforming focusing as Supposing that phased array has been utilized, the energy beamforming focusing can be likewise given as By inspecting equations (28) and (29), we can see that using FDA offers better energy beamforming focusing capability than phased array.

Secrecy Energy Efficiency Analysis.
In order to create a balance between the power consumed by the proposed transmitter and SSR, we resort to secrecy energy efficiency (SEE) metric, which can be written as [40] η EES (bit/joule/Hz) � C sec P T , where C sec is expressed in equation (18) and P T � ℓ‖w‖ 2 F + NP C + P B with P T denoting the total consumed power at the proposed transmitter and ℓ ≥ 1 representing the power amplifier inefficiency factor. P c is defined as the antenna circuit power, P B is the power consumption of the baseband, and ‖ · ‖ 2 F denotes Frobenius norm.

Simulation Analysis
We consider similar simulation parameters in [15] unless otherwise stated. Additionally, the following parameters were assumed: in desired group 1, the respective users are located at 70°, 300 m and 110°, 800 m. e radiated signals will arrive at t 1 � 1 μs and t 2 � 2.66 μs, respectively. f 0 � 30 GHz, Δf � 20 kHz, and R s � 6. Note that we adopted R s � 6 to capture quality of service (QoS) during transmission with the wiretap code, because the actual rate of the information is the secrecy data rate, while codeword rate is the total rate of the information and rate cost to achieve secrecy. For instance, desired group with high codeword rate transmission with low secrecy data rate actually gets the confidential information slowly, which affects QoS. Simulation parameters and their values are given in Table 1. Note that line of propagation channel is assumed. Since we employ Costas sequence (CS) matrix to design the frequency increments, which offers authentication procedure, Figure 3 shows beamforming performances for distinct CS matrix adopted for desired group(s) authentication process. From Figure 3(a) to 3(c), it can be noticed that, by employing the CS matrix for the frequency increment, it will be very difficult for any Eve group to have the knowledge of the sequence used, since there are no obvious peaks along angle-range direction in the figures. Hence, the CS matrix adopted is more suitable for the desired group(s) authentication before the useful information transmission.
In Figure 4, we have depicted the BER curves as a function of angle and range dimension of the proposed scheme considering one desired group. Also, leakage-based method in [15,41] was employed as a benchmark. From Figure 4(a), it was observed that the three schemes offer better performances along the desired two main angle beams dimensions. But outside the two main angle beams dimensions, the performance of BER curves is seriously degraded. is implies that it will be difficult for Eve to retrieve the useful information successfully outside the two main angle beam dimensions. Moreover, the proposed scheme and [15] have narrower main beamwidth than that of [41] in angle focusing directions. In Figure 4(b), we only show the two main range beams dimensions for the proposed scheme since the leakage-based method in [15,41] has no range-dependent beamforming capability as this certainly limits the benefit in security. Again, it can be noticed that better BER curves towards the two main range beams have been achieved. is means that the proposed scheme can provide security in both angle and range dimensions and not just angle dimension in the leakage-based method in [15,41].
As stated before, since it is hard to offer perfect security, in Figure 5, we have shown the SOP curves for different values of secrecy performances for the proposed scheme. It can be seen from the figure that as SOP increases, the useful information data rate increases. is means that the more the values of ξ are increased, the more the proposed scheme can achieve better system secrecy. More importantly, the figure gives insight into how to design different secrecy performance requirement for the proposed scheme. Note that when ξ � 1 has been attained, perfect secrecy is ensured. Figure 6 depicts the asymptotic Eve's detectability error probability β for distinct values of c e (t). From the figure, we find that Eve achieved relatively high error decoding probability values, for instance, around 0.71 when c e (t) � 1, 0.53 when c e (t) � 2, and 0.43 when c e (t) � 3. Figure 7 plotted average useful data leakage rate A leakage for different values of c e (t). We observed that both A leakage and R s increase. is means that not all the useful information is leaked along Eve's angle-range directions. It is worth pointing out that, to provide good secrecy performances, the wireless channel has a great influence.     We illustrate the SSR of the desired group for the proposed scheme and compare it with that of leakage-based method in [15,41] and random FDA technique (RFDA) [29] in Figure 8. e SSR curve of the proposed scheme exceeds the leakage-based method in [15] and [41] in both low and high SNR regimes. Also, it exceeds RFDA technique [29] in low and medium SNR regions. is is due to the fact that RFDA technique has randomly selected frequency increments, making it unstable. On the other hand, the proposed Costas sequence matrix is presented in a concise way with better stability than the RFDA technique. Moreover, the values of SSR in the figure for the proposed scheme, using RFDA technique [15,29,41], respectively, are around 13.5     (bps/Hz), 13.5 (bps/Hz), 11.3 (bps/Hz), and 8.3 (bps/Hz). e result of the proposed scheme is very promising. In Figure 9, secrecy energy efficiency (SEE) versus SNR has been illustrated. In Figure 9(a), we show SEE curves for distinct values of ∆f. In FDA analysis [27,28], as ∆f increases, we achieve better resolution. erefore, with increasing ∆f, it is evident that SEE curves get better (higher SEE). In Figure 9(b), we compare the SEE performances of the proposed scheme, random FDA (RFDA) [29], and leakage-based method in [15,41]. e proposed scheme has better SEE performance than leakage-based method in [15,41] in low and high SNR regions. In addition, it is easily noticed that the proposed scheme exceeds the RFDA [29] from around 0 dB to 10 dB in SNR regions. is is because the employment of Costas sequence (CS) matrix has narrow peak and low sidelobes [31], which can improve the energy efficiency than randomly selected frequency increments (RFDA) [29].   [15], and RFDA [29,41].

Conclusions
is paper proposes authentication and secrecy metrics in multicast scenarios using Costas sequence (CS) matrix FDA directional modulation aided with AN matrix. We formulate authentication technique using CS matrix and analyze secrecy metrics for the proposed scheme. Further, we derive the energy beamforming focusing and evaluate secrecy energy efficiency (SEE). From simulation analysis, the proposed scheme has potential advantages compared to leakage-based method in [15,41]. More importantly, the secrecy metrics provide us with useful insights, namely, distinct levels of secrecy performances requirement to ensure perfect secrecy, Eve's error decoding probability (i.e., Eve detectability), and, finally, how likely the private data can be leaked towards Eve's angle-range directions. It is realized that, in several realistic cases, the transmitter may be unable to acquire the angle-range direction information.
erefore, in the future work, this problem will be addressed.

Data Availability
No data were used to support this study.

Conflicts of Interest
e author declares that there are no conflicts of interest regarding the publication of this paper.