Abstract

Recently, unmanned aerial vehicles (UAVs) have been widely used in various industries. However, the communication links of UAVs are also threatened by eavesdropping. To enhance physical layer security (PLS) for UAV communications, a time-division multiarray beamforming (TDMB) scheme is proposed. Multiple antenna arrays steer their beamforming vectors based on their position relative to the legitimate user (LU). Thus, angle-distance-dependent directional modulation (DM) can be achieved. Time-division means multiple antenna arrays take turns transmitting different symbols from a same packet. The receiver in undesired directions suffers from intersymbol interference (ISI) because of the path differences between the receiver and different antenna arrays. This paper shows the signal-to-interference-plus-noise ratio (SINR) distribution with the proposed method in a 2-dimensional plane. Also, the improvement of the secrecy rate with the proposed method under different total antennas and artificial noise power is studied. Overall, these results indicate that the security rate has improved more with the proposed method, where the numbers of antennas and the power of AN are limited. Therefore, this method is suitable for UAV security communication.

1. Introduction

The number of unmanned aerial vehicles (UAVs) has experienced explosive growth in the past decade, whether for agriculture, industrial, or civilian use. Wireless communication is a key technique for UAVs. It is used for wireless control and broadcasting data from the sensor network. Nevertheless, information disclosure is inevitable due to the openness of wireless channels. This might lead to property loss. In severe cases, people can be injured. A widely adopted approach to alleviating this problem is encryption. However, it may not be straightforward to use in UAV communications due to the complexity of key distribution and management. In recent decades, physical layer security (PLS) has aroused great research interest among researchers [1]. The basic idea of PLS is to utilize the randomness of the wireless channel to realize secure communication [2]. Since the PLS technique is primarily a signal processing technology, it can be used in conjunction with encryption.

Directional modulation (DM) is one of the most important PLS techniques. It can transmit digital modulated signals to intended spatial directions while twisting the constellations of these signals in all other directions [3]. A method named dual-beam DM was introduced in [4]. In this technique, I and Q data are transmitted by different antennas. However, the synchronization of the I and Q data from different antennas is not taken into consideration. An antenna subset modulation scheme was introduced in [5], where different antenna subsets transmit different symbols from a same packet. However, this method only achieves angle-dependent DM. Artificial noise (AN) can also be employed in DM for a further improvement of the security. The use of AN is to reduce the signal-to-interference-to-noise ratio (SINR) in undesired directions. The AN was used in DM for the first time in [6]. Taking into account the imperfect channel state information (CSI), robust AN-based methods for single-beam and multibeam DM were proposed in [7, 8], respectively. The projection matrix of AN can be constructed by zero-forcing [9], null-space projection [10], or iteration convex optimization methods [11]. Directional modulation for different types of arrays is also a research hotspot, including the switched antenna array [12], the intelligent reflecting surfaces (IRS) [13], the 4-D antenna array [14, 15], the frequency diverse array (FDA) [16, 17], and the multiple antenna arrays (MAAs) [18]. A spread-spectrum directional modulation technique based on a switched antenna array is proposed in [12]. With the spread-spectrum technique, a low probability of detection is achieved. In [13], a new secure transmission scheme aided by the IRS is proposed. This method can reduce costs and save energy. Another cost-saving method is proposed in [14, 15], which replaces the phase shifter with high-speed RF switches. At the same time, the accuracy of phase shift becomes higher. An FDA scheme is proposed to achieve angle-distance-dependent DM in [16, 17]. In [18], the author also realized angle-distance-dependent DM by MAAs. However, the signals from different arrays will interfere with each other at the receiver, when MAAs transmit in the same frequency band simultaneously. A recent study in [21] proposed a PLS algorithm for UAV communication using linear virtual antenna array (VAA). The random location perturbations of the VAA elements were used to randomize radiation patterns at eavesdroppers (Eves).

In conclusion, despite the various advantages of the aforementioned DM schemes, some problems need to be overcome. (1)The methods proposed in [415] only work when Eves and legitimate users (LUs) are not in the same direction. In other words, when Eves and LUs lie on the same line, the transmission will be unsafe(2)Most of the above-mentioned methods are complex in the calculation. To improve security performance, the number of antennas and the power of AN need to be increased. It is not suitable for UAV scenarios

Aiming at addressing these problems, we propose a time-division multiarray beamforming (TDMB) scheme to achieve secure and precise transmission. Multiple antenna arrays steer their beamforming vectors based on their position relative to the LU. Time-division means multiple antenna arrays take turns transmitting different symbols from a same packet. The path differences between the receiver and different antenna arrays will cause intersymbol interference (ISI) at the receiver. However, with the knowledge of the LU’s precise location, the ISI at LU can be completely removed. Therefore, the received signals of Eves will not only suffer from constellation distortion but also be affected by ISI. In this way, we narrow the unsafe area from “lines” to “points.” The main contributions of this paper can be summarized as follows: (1)We propose a time-division multiarray beamforming scheme, which realizes angle-distance-dependent DM(2)We improve security performance through ISI rather than increasing the number of antennas or the power of AN(3)The proposed method has low computational complexity. And it has better security performance with a small number of antennas or low power of AN

Hereafter, the paper is organized as follows. In Section 2, an MAA model is introduced. Section 3 proposes a TDMB scheme. Section 4 analyses the secrecy rate and the symbol error rate (SER). The secrecy performance is evaluated by several numerical results in Section 5. Finally, Section 6 concludes the paper. Tables 1 and 2 summarize the abbreviations and notations of symbols in this paper.

2. System Model

The application scenario of the proposed method is shown in Figure 1. There are three types of UAV, namely, the transmitter, the LU, and Eves. The transmitter sends information through multiple antenna arrays to the LU. Meanwhile, the transmitter transmits AN to interfere with Eves. Eves could be anywhere in the space and try to intercept the information from the transmitter.

We consider the case where a transmitter is equipped with () non-collocated antenna arrays, of which the spacing is . Each antenna array is an -element isotropic uniform linear array (ULA) with spacing (). is the wavelength of the carrier. The MAA system model in the XOY plane is presented in Figure 2. All antennas are on the -axis. The first antenna of the first array is at the origin of the coordinate axis. Without loss of generality, the first antenna element of each ULA is selected as the reference antenna for that ULA. The coordinates of the receiver are . and are the distance and direction angle between the nth transmit antenna array and the receiver, respectively. For the far-field model, it is reasonable to adopt the approximation . As depicted in Figure 2, we can obtain the geometric relationship

The far-field beam pattern of the MAA model with beamforming factor in the location can be expressed as where is the speed of light, is the carrier frequency, is the propagation time, is the beamforming factor for the th () antenna at the th () transmit antenna array. refers to the path loss factor from the nth array to the receiver. The path loss factor decreases slowly when the distance is far enough. Then, we can approximate that . For simplicity, we define . Equation (3) can be written as

The normalized steering vector of the nth transmit antenna array in position can be expressed as where is given by

To simplify the expression, we define . The far-field beam pattern of the MAA model is actually a superposition of radiation from multiple arrays, i.e., where is the transmit beamforming vector.

3. The Proposed TDMB Scheme

In this section, we propose a TDMB scheme, where different antenna arrays take turns to transmit different symbols of a same packet, as illustrated in Figure 3. In this way, the message transmitted by each array is incomplete. Only in the intersection area of different beams can complete information be obtained, while other places suffer from severe ISI.

3.1. Transmitted Signal Model

As shown in Figure 3, the baseband signal of the th antenna array is given by where and are the power for transmitting symbols and AN, respectively. is the symbol duration, and is the normalized M-tuple AN waveform, which is given by where is a waveform following distribution, refers to the projection matrix of AN. Since obeys a Gaussian distribution at any moment, it can be regarded as a time-independent additive noise. We are more concerned with the statistical properties of and such as variance rather than the exact value at a given moment. Therefore, the subsequent part of the paper abbreviates and as and , respectively. Define as the coordinate of LU, which can be transferred to angle and distance relative to the th antenna array. The time difference between the signals transmitted from the th array and from the first array to LU is denoted as . in (8) represents the quadrature phase-shift keying (QPSK) modulated symbol of the th array at time instant , given by where represents the indexes of symbols transmitted by the th antenna array, e.g., the first antenna array transmits with , , representing the normalized QPSK constellation mapping, is the total number of symbols in a packet. is divisible by . The ideal sinc pulse is expressed as

From (10), we can obtain the relationship between the transmitted symbols of each array and the total symbols. This describes how to do time division in the proposed TDMB scheme.

Next, we discuss how to design the transmit beamforming vector and the projection matrix of AN . After being transmitted through a wireless line-of-sight (LOS) channel, LU will receive mixed signals from different arrays. For notational simplicity, we use to denote the steering vector from LU to the th antenna array, i.e., . Since the positions of Eves are unknown, to maximize the signal-to-noise ratio (SNR) at LU, the transmit beamforming vector is designed as

For a further improvement of transmission security, AN is employed. To prevent the LU from being interfered by AN, we project the AN into the null space of the steering vector . Therefore, the projection matrix of AN is given by

According to (5), the projection matrix and the steering vector are orthogonal, as shown by

3.2. Received Signal Model

According to (7) and (8), the signal received at LU can be given by where is the additive white Gaussian noise (AWGN) at LU with and denotes the noise variance received by LU. Supposing the carrier is perfectly removed and timing synchronization is well done, the received baseband signal is given by

Substituting (8), (10), and (14) into (16), can be simplified as where is the index of symbols in a packet. A detailed derivation of the (17) is provided in Appendix. Since the path delay from the antenna arrays to LU is considered at the transmitter, the received symbol interval is equal to symbol duration time , which means there is no ISI at the LU.

Similarly, the received signal at Eve is given by where is the AWGN at Eve with and denotes the noise variance received by Eve; and , respectively, refer to the distance and steering vector from the th antenna array to Eve. The time difference between the signals transmitted from the th array and from the first array to Eve is denoted as . Under this circumstance, the carrier and delay time are and , respectively. Thus, the baseband signal of Eve is given by where represents the time differences between the propagation time from the antenna arrays to the Eve and LU. Indeed, the ISI at Eve is caused by .

It can be observed from (17) and (19) that symbols received by Eve are disturbed by three factors: (1)Amplitude and phase of received signals vary because of multiarray DM. indicates that the constellation diagram of the received signal in the nondesired direction will be distorted. represents that only in the intersection area of different beams can signals be correctly obtained. These results show that the MAA model can realize angle-distance-dependent DM(2)Received signals suffer from ISI because of time division. indicates that the interval between adjacent sinc pulses is not equal to when . This will cause ISI, as shown in Figure 4. Meanwhile, is determined by the position of receivers(3)AN. Similar to multiarray DM, only the receiver at the desired location is free from AN

4. Performance Analysis

In this section, the secrecy rate and SER for the proposed beamforming scheme are analysed. To facilitate analysis, we assume that all AWGNs are normalized and have the same distribution with zero mean and variance for both LUs and Eves.

4.1. Secrecy Rate

According to (17), the SINR of LU can be expressed as

In light of (19), the interference of Eve consists of AN and ISI. The power of received AN can be expressed as

Assume that Eves know the positions of LU and antenna arrays, which means Eves can sample at the best time by calculating the path difference, i.e., sample time. Since the transmit period can be regarded as NT, we only need to analyse the aliasing of symbols, i.e., the 2nd symbol to the ()th symbol. For simplicity, we only consider the interference from the immediately preceding and following symbols, since that from the rest symbols is negligible. Then, the power of ISI for the th symbol can be expressed as where , , , , , and , because of cyclicity. Considering that the ISI is different for each symbol, we calculate the average SINR of Eve, which is given by

According to (20) and (23), the achievable rates of LU and Eve can be calculated, respectively, by Then, the secrecy rate can be defined as

4.2. SER

To evaluate the communication performance, we are interested in bit error rate (BER) and SER. The BER with the best detection and perfect recovery for QPSK is given by [19] where is the tail distribution function of the standard normal distribution and represents the SNR per bit. The relationship between and the SNR per symbol for M-PSK modulation leads to the approximations

Substituting (28) into (27), we get for QPSK as

In systems with interference, we use SINR instead of SNR to calculate the BER. Then, we can obtain for LU and Eve, respectively, as The SER is equal to the error probability of any bit in a symbol, which is given by

5. Simulation Results

In this section, the proposed TDMB scheme is evaluated in terms of SINR distribution, secrecy rate, and SER. The carrier frequency is set as . Consider a scenario with limited resources, i.e., UAV, which means large-scale antenna arrays are not permitted. Assume that there is transmit antenna arrays with elements for each ULA. The spacing of the array elements and antenna arrays are and , respectively. Thus, the coordinates of arrays are (0 m, 0 m), (0.75 m, 0 m), and (1.5 m, 0 m). The coordinates of LU and Eve are (1 m, 20 m) and (0.3 m, 7 m), respectively, as shown in Figure 5. The baseband modulation is QPSK with symbol rate , which satisfies the narrow-band assumption. The required SNR for the received signals at LU is 15 dB, which remains unchanged in the simulations. We assume that the noise power is -100 dBm. By means of the radio wave propagation loss in the free space [20], the path loss factor is given by

Based on the location of LU, it can be calculated that needs to be 3.07 dBm. Considering that there is not much power for AN, the power of AN is set to be . Unless otherwise stated, the default simulation parameters are summarized in Table 3.

In Figure 6, we compare the SINR of the proposed scheme with the method in [18]. The signal models in Figure 6 are both three antenna arrays (AAs). Figure 6(b) shows the SINR of the proposed TDMB scheme which exploits the ISI, while Figure 6(a) shows the SINR of the method in [18]. Deeper red indicates higher SINR. As expected, the SINR at LU is 15 dB, which meets our requirement. It can be seen from Figure 6 that the deepest red area is an ellipse rather than a line. This shows that the MAA scheme performs well against eavesdroppers close to the transmitter. In other words, it proves that angle-distance-dependent DM is achieved with MAA. Comparing Figures 6(a) and 6(b), it can be observed that with the help of time-division scheme, the SINR for the region far from LU decreases more significantly; e.g., the area with SINR greater than 10 decreased from 55 m2 to 29 m2, which indicates that the proposed scheme can further improve the secrecy performance.

In Figure 7, we investigate the secrecy rate versus the power of AN for different numbers of antenna arrays and methods. We compared the TDMB scheme with the method in [18, 21]. The total number of antennas is set as (applies also to VAA). The position of Eve is chosen as (0.3,7), which has a similar direction angle as LU. The secrecy rate of the method in [21] increases monotonically with increasing distribution length . So, we set the of VAA to be 1.5 m in agreement with the 3AAs. Since the method in [21] does not use AN, we assume that the total transmit power is consistent with the TDMB scheme; i.e., the transmit power of VAA is (). The following simulation of the method in [21] is the same. When the number of antenna arrays is 1, the TDMB scheme is degraded to normal single-beam DM. As shown in Figure 7, the secrecy rate for one antenna array is zero. This indicates that a single array cannot achieve secrecy transmission when the Eves and LU are in the same direction. Conversely, when the number of arrays is greater than one, partial secrecy transmission can be achieved even if Eves and LU are in the same direction of a given array. In addition, it can be observed that the ISI caused by the time-division scheme can significantly improve the secrecy rate when AN is unused. Meanwhile, the interference caused by the random location perturbations of the VAA elements is between the ISI of 3AAs and 2AAs. When is greater than 0.5, the secrecy rate of the TDMB scheme with 2AAs is greater than the method in [21]. With the increase of the power for AN, the secrecy rate tends to be constant. Because is a variable independent of the power of AN, the ISI remains unchanged for the same position. Therefore, with increasing AN power, the impact of ISI on the secrecy rate gradually decreases. Moreover, the upper bound of the secrecy rate improves with the enhancement of the number of antenna arrays. Figure 7 proves that the time-division scheme contributes to the enhancement of the secrecy rate, especially when there is not enough power for AN.

In Figure 8, we investigate the secrecy rate versus the total number of antennas MN for different numbers of antenna arrays and methods. As shown in Figure 8, for a fixed small number of total antennas, the performance gap between the method in [18] and the TDMB scheme is larger for the case “3AAs” than “2AAs”. When the total number of antennas is fixed and limited, the number of antennas per array decreases as the number of antenna arrays increases, which means that the beamwidth for each antenna array becomes wider. With a wider beamwidth, i.e., a larger numerator in (23), ISI plays a more important role in reducing Eve’s SINR. When the total number of antennas is the same, the greater the number of arrays, the higher the upper bound of the secrecy capacity. Meanwhile, the greater the number of arrays, the greater the improvement from the time-division scheme. This is because when the number of arrays increases, the scale of MAA will become larger. This results in larger values of as well. With an increasing total number of antennas, the impact of ISI on the secrecy rate gradually decreases. Surprisingly, the secrecy rate using VAA in [21] decreases as the number of antennas increases. According to Equation (24) [21], when the total power is fixed, the SINR of the Eves increase as the number of antennas increases. When the number of antennas reaches 36, the beamwidth of the single antenna array is narrow enough to avoid the Eves. At this point, the secrecy rate starts to be greater than 0. Therefore, the proposed scheme is more suitable for the situation that the number of antennas is limited.

In Figure 9, we investigate the SER versus the SNR for different numbers of antenna arrays and methods. Since we assume the noise power is the same throughout the space, the SNR is determined by the transmit power . The SER level reflects SINR. First, we note that since Eve and LU are basically in the same direction, Eve does not suffer from interference in the case with 1AA. The curve of Eve of the TDMB scheme with 1AA coincides with that of LU. According to Equations (21), (22), (23), and (24) [21], each factor of the numerator and denominator in the SINR formula contains except for the noise power (simplified as ). This indicates that as increases, the impact of noise power reduces. Eventually, the SINR will converge to a constant . When the number of antenna arrays is the same, the TDMB scheme has a higher SER than the method in [18]. Factor of the two methods is the same, while factor of the TDMB scheme is greater than that of the method in [18] because of the ISI caused by the time-division scheme. Similarly, the greater the number of arrays, the higher the SER. The SER of the method in [21] is first higher than 2AAs but eventually less than 2AAs. The reason is that the method in [21] has a greater factor . When is insufficient, factor plays a more important role. However, the interference caused by random location perturbations of the VAA elements is less than AN and ISI; i.e., the method in [21] has a greater factor . As a result, the method in [21] has a lower SER. Theoretically, the TDMB scheme with 3AAs should have a lower SINR than that with 2AAs, but their SER is the same when the SNR is 10. The reason is that the upper limit of SER, 0.75, is reached.

Figure 10 compares the SER performance surface of the proposed TDMB scheme and the method in [18]. Consistent with the SINR distribution in Figure 6, the regions near LU enjoy a low SER. Note that the effects of path differences on the SER performance are asymmetric, although the path differences are symmetric. The ISI caused by increasing the received symbol interval is less than the ISI caused by decreasing the symbol interval. For example, we can see from Figure 4 that the second symbol moves closer to the first one when . Assuming a new case with , the second symbol will be further away from the first. It is easy to find that the first symbol receives more interference in the first case. Suppose that when the SER is greater than 10-5, the Eves cannot eavesdrop on the information normally. Then, we can define an unsafe area, where the SER is lower than 10-3. When the Eves are in an unsafe area, confidential transmission is not possible. We can use some physical methods to ensure that there are no Eves in unsafe areas, such as establishing cordon areas. Finally, as illustrated in Figure 10, the proposed method can improve security performance by utilizing ISI in the undesired directions with only limited resources.

6. Conclusions

In this paper, we investigated the PLS problem for UAV communications using the TDMB scheme. In the TDMB scheme, multiple antenna arrays steer their beamforming vectors based on their position relative to the legitimate user (LU). Meanwhile, multiple antenna arrays take turns transmitting different symbols from a same packet. We studied both analytically and through simulation the secrecy rate and SER of the received signals at different positions. We also simulated the secrecy rate under different total antennas and artificial noise power. These results suggested that the proposed method can achieve angle-distance-dependent DM. Moreover, the path differences between the receiver and different antenna arrays can cause ISI for receivers in undesired directions. Hence, the security performance is further enhanced. These results also suggested that the security rate has a greater improvement with the proposed method, where the number of antennas and the power of AN are limited. Therefore, this method is suitable for UAV security communication. Many UAVs are now equipped with antenna arrays. Although there is a loss in performance, MAAs can be implemented using subarrays. This does not require changes to the structure of the existing UAV, only modifications to the programmable part of the hardware, such as the field programmable gate array (FPGA). Alternatively, clustered UAV systems can be used to achieve MAAs, which requires the cluster to complete the networking first. The proposed method also has some drawbacks. First, it is only effective for phase-shift keying modulated. Second, when resources are sufficient, this method does not improve security performance much.

Further research is needed to investigate the beamforming scheme based on a uniform planar array. It is closer to practical application. The research scene will change from a 2-dimensional plane to a 3-dimensional space. Additional analysis of highly dynamic UAVs or mobile communications is also required.

Appendix

Here, we show the mathematical derivation of (17). By substituting (10), (12), and (14) into (17), we can get

We expand the double summation to obtain each addend

It can be seen from (A.3) that (A.2) can be rewritten as

Substituting (A.4) into (A.1), (17) can be obtained as which completes the derivation.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare no conflicts of interest.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant Nos. 61901390 and 61901382.