Directional Modulation Technique Using a Polarization Sensitive Array for Physical Layer Security Enhancement

Directional modulation (DM), as an emerging promising physical layer security (PLS) technique at the transmitter side with the help of an antenna array, has developed rapidly over decades. In this study, a DM technique using a polarization sensitive array (PSA) to produce the modulation with different polarization states (PSs) at different directions is investigated. A PSA, as a vector sensor, can be employed for more effective DM for an additional degree of freedom (DOF) provided in the polarization domain. The polarization information can be exploited to transmit different data streams simultaneously at the same directions, same frequency, but with different PSs in the desired directions to increase the channel capacity, and with random PSs off the desired directions to enhance PLS. The proposed method has the capability of concurrently projecting independent signals into different specified spatial directions while simultaneously distorting signal constellation in all other directions. The symbol error rate (SER), secrecy rate, and the robustness of the proposed DM scheme are analyzed. Design examples for single- and multi-beam DM systems are also presented. Simulations corroborate that (1) the proposed method is more effective for PLS; (2) the proposed DM scheme is more power-efficient than the traditional artificial noise aided DM schemes; and (3) the channel capacity is significantly improved compared with conventional scalar antenna arrays.


Introduction
Wireless communication technologies are increasingly gaining popularity in both military and civil applications due to their inherent flexibility, low installation cost and scalable nature. However, the broadcast nature of the wireless media makes the confidential information transmitted wirelessly vulnerable to interception. Therefore, information security is emerging into a hot research field [1].
Traditionally, the security issues have always been handled by high-layer encryption techniques. However, malicious users can still decrypt the complex cipher text with large amount of computation resources. To this end, researchers have turned their interests towards physical layer security (PLS) as a potential way to complement the traditional cryptographic techniques [2,3]. PLS enables the confidential transmissions by only exploiting the intrinsic properties of a wireless environment, e.g., node spatial distribution [4], aggregate interference [5,6], wireless propagation medium [7,8].

Related Works
Directional modulation (DM), as an emerging PLS technology for wireless communication systems, has attracted lots of attention of researchers over the last decade. The fundamental concept efficiency. Meanwhile, that also can provide a more secure communication link for transmitted data streams. Overall, the main contributions of the article can be summarized as follows: (1) Based on a PSA, we realize the multi-beam DM synthesis using a precoding matrix to send independent data streams with different PSs to further increase the channel capacity.
(2) The proposed DM scheme utilizes the directional polarization formation to enhance PLS, which outperforms the conventional multi-beam AN-aided DM schemes in power-efficient.
(3) The symbol error rate (SER), secrecy rate, and robustness of the proposed DM scheme are deduced and corroborated with simulations. Design examples are also provided to verify the effectiveness of the proposed DM method.
The proposed DM technique can be typically applied to the future line-of-sight (LoS) communication networks. The potential application scenarios include future Internet of things (IoT), vehicular communications, smart transportation, military communications, satellite communications, unmanned aerial vehicle (UAV) networks [29], and mm-wave communications [8,37].
The rest of the article is organized as follows: Section 2 presents the system model. Section 3 provides the review of polarized beamforming. Section 4 elaborates the principle of the proposed multi-beam DM technique using a PSA from the perspective of sampling and signal processing, respectively. Section 5 deduces the security performance of the proposed DM scheme, and further compares different multi-beam DM schemes. Section 6 gives simulation results and discussions and Section 7 concludes the article. The notations used in this article is summarized in Table 1. Table 1. Notations used throughout the article.

System Model
Consider a multiple-input single-output (MISO) system with N transmitting antennas for the base station (BS), (i.e., source transmitter) and one single receiving antenna for a legitimate user (LU) or an eavesdropper (Eve) as depicted in Figure 1. Meanwhile, the BS sends confidential messages to K LUs along the LoS paths in the presence of an Eve. Here, the BS has a-priori information about the directions of the K LUs, but not of the potential Eve. Specifically, in order to utilize the polarization information, a PSA is adopted for the proposed system. However, the idea proposed in this article can also be extended to a MIMO system for multiple LUs and Eves. Unless note otherwise, a narrow-band linear PSA is assumed for the BS in this article. A PSA structure with N crossed dipole antennas is shown in Figure 2. However, other polarization sensitive antennas also work. The N crossed dipole antennas are evenly distributed with an appropriate adjacent spacing distance d to avoid spatial aliasing and antenna coupling. For each polarization sensitive antenna, there are two orthogonally oriented dipoles. One is parallel to the x-axis and the other is parallel to the y-axis. The spacing from the first antenna to itself and its subsequent antennas is represented by d n for n = 1, 2, · · · , N. Also shown is a desired LU with its accurate DOA (direction of arrival) defined by the elevation angles θ ∈ [−π/2, π/2] and the azimuth angles φ ∈ [−π, π] .

Review of Polarized Beamforming
In this system, there are K different desired directions, and 1 ≤ K < N . A plane-wave model is assumed, i.e., the LUs are located in the far-field region. The spatial steering vector for the given array geometry is expressed as where β = 2π/λ is the intrinsic propagation constant, the parameter λ is the wavelength at the carrier frequency of interest, and d n is given by Furthermore, for polarization sensitive antennas, the spatial-polarization coherent vector contains spatial information and polarization information of the signal. This vector is given by [38] s pol (θ, φ, γ, η) = − sin φ cos γ + cos θ cos φ sin γe jη cos φ cos γ + cos θ sin φ sin γe jη where γ ∈ [0, π/2] represents the auxiliary polarization angle and η ∈ [−π, π) is the polarization phase difference. The polarization constellation point which denotes a polarization state is given by P n = cos γ n sin γ n e jη n = w Hn w Vn .
For the sake of description and analysis, we first define where Θ and Γ denote spatial information and polarization information, respectively. Then, the PSA can be split into two sub-arrays, one parallel to each axis. Thus, the steering vectors of the two sub-arrays are given by Finally, the overall steering vector of the PSA is given by The beam response of the PSA is given by where w, a 2N × 1 vector denoting the overall complex valued weight coefficients of the full array, is given by Figure 3 shows a schematic diagram of the amplitude-phase and polarization independent control algorithm for a PSA. For the polarization control portion, each antenna element is separately weighted firstly. After the element weighting is completed, the array factor is controlled by the classical array factor control method. Then, we have w n,H = w n · w Hn w n,V = w n · w Vn , n = 1, 2, · · · , N. Figure 3. A schematic diagram of the amplitude-phase and polarization independent control.

Principle of the Proposed Multi-Beam DM Technique Using a PSA
In this section, we formulate the design to achieve DM for K desired directions for the same data stream or independent data streams. Aiming at each desired direction, PM can be adopted to convey independent data streams simultaneously using a PSA. We will propose two methods to achieve multi-beam DM synthesis from the perspective of sampling in the spatial and the polarization domain, and from the perspective of signal processing, respectively.

From a Sampling Perspective
The essence of the DM design for a PSA is to find a set of weight coefficients that give directional responses. In doing so, a certain constellation with low SER can be realized in desired directions, while the constellation will be scrambled in other undesired directions to result in high SER for illegal users.
Take M-ary signaling, like multiple phase shift keying (MPSK) for example, there are M sets of desired array response across a diversity polarization channel in one anticipant direction. Therefore, for DM across a polarization diversity channel in K different desired directions, i.e., there exist K beams, the total number of sets of desired response p i (Θ, Γ) is given by where M j denotes that M j -PSK signaling is transmitting in the jth direction. Furthermore, each desired response p i (Θ, Γ), i = 1, 2, · · · , T, can be viewed as a function of (Θ, Γ). From the spatial domain prospective, each desired response p i (Θ, Γ) can be split into two regions: the spatial mainlobe and the spatial sidelobe according to the azimuthal points of interest or not. Without loss of generality, we assume that r (r ≥ 1 ) points are sampled in each desired direction and R (R 1 ) points in the sidelobe region. In order to narrow the information beam width to enhance the security, r is always set to be 1, and R is usually set to be a large number.
Meanwhile, from the polarization domain prospective, each desired response p i (Θ, Γ) can also be split into two regions: the polarization mainlobe and the polarization sidelobe according to the polarization points of interest or not. Like the spatial sampling, we designate fixed PSs for different polarization diversity channels, for all sampled responses in the desired directions. While, the expected responses at different sidelobe directions with different PSs are generated randomly.
Then, the corresponding responses in the mainlobe range and sidelobe region are given by and respectively. Moreover, before proceeding to the next step, we define a 2N × Kr matrix S ML and a 2N × R matrix S SL , given by and respectively. Next, for the ith constellation point, its corresponding weight coefficients can be obtained by The objective function enables a minimum difference between the intended and designated responses in the sidelobe for the different polarization diversity channels. And the constraint condition in Equation (16) ensures to maintain desired polarization constellation points in desired directions. In order to enhance the security performance of the system, we have to distort the constellation points in the sidelobe. The amplitude, phase and the polarization information of the desired response at different directions in the sidelobe are all generated at random for every constellation point.
The optimization problem in Equation (16) can be solved by using the method of Lagrange multipliers. The optimal solution for the weight coefficient vector w i can be expressed as The proof is seen in Appendix A.
In Figure 4, the numbers of the Lagrangian multiplier method computations for the proposed DM scheme is shown. It is easy to observe that the computational complexity is extremely high when the number of the desired directions and the modulation order are large. Therefore, in a practical system, there is a tradeoff between the computational complexity, the number of the desired directions, and the modulation orders for performance gain.

From a Signal Processing Perspective
As we all know, besides the carrier's amplitude and phase, the carrier's PS can also be used as the information bearing parameter, which can further improve the conventional DM methods' spectrum efficiency. A schematic diagram of joint the time-polarization-spatial domain is shown in Figure 5. Each direction can have two desired data streams with the same or different modulation modes by using different PSs, and also sharing the same resources of time slots, frequency bands. Therefore, the spectrum efficiency is significantly improved in our methods. Due to the introduction of polarization information, we can consider a scenario where the BS is trying to transmit confidential messages to K different directions, and each direction with two different PSs, as shown in Figure 1. For clarity, only one PS is analyzed in this part. Assuming that the BS has a-priori knowledge of the desired directions and polarization information of all LUs. Before transmitting, the data streams should be processed with a pre-coding matrix P to match the N transmit antennas. In order to obtain the precoding matrix P, the spatial positions and polarization information of all LUs are specified, the combined set of which can be expressed as , is the specified spatial direction and polarization information of the kth LU. Then, the steering vectors of all LUs can compose a steering matrix, i.e., Using the steering matrix in Equation (19), the precoding matrix P at the BS can be designed as [39,40] which is normalized to the steering matrix, i.e., The radiating signal x = [x 1 , · · · , x N ] T after precoding for the N dipole antenna elements can be obtained by where u= [u 1 , u 2 , · · · , u K ] T is the transmitting symbol vector by the N polarization sensitive antennas, i.e., the different data streams, P t is the total transmitting power.

Security Performance Analysis for the Proposed DM Scheme
In this section, we will firstly analyze the security performance for the proposed DM scheme when Eves with and without polarization information. Then, we will analyze the security performance from a signal signal processing perspective. Finally, we will analyze three measurements, including the SER, secrecy rate, and robustness of the proposed DM scheme.

Security Performance Analysis When Eves with Polarization Information
In this part, assuming that the LUs and Eves all know the used PSs and the path loss is neglected. The signal vector transmitted by an N-element PSA across one polarization diversity channel at discrete time i is given by Through the LoS channel, the received signal vector y is where y is a K × 1 vector representing the received signals, H = [s 1 , · · · , s j , · · · , s K ] T is a K × 2N matrix denoting the channel matrix from transmitter to receiver, s j is a 2N × 1 vector denoting the steering vector. W = [w 1 , · · · , w j , · · · , w K ] is a 2N × K matrix denoting the antenna weights. The variable ξ with distribution CN (0, σ 2 I K ) is the normalized additive white Gauss noise (AWGN), where CN denotes a complex and circularly symmetric random variable. Meanwhile, in order to guarantee that the LUs receive the exact information, the jth user should receive the jth symbol. Then, letting x(i) = [x 1 (i), · · · , x j (i), · · · , x K (i)] T , and neglecting the noise, we have Because K ≥ N, Equation (25) is an overdetermined equation with no exact solution. Therefore, we only consider the scenario K < N, i.e., the number of LUs is less than that of transmit antennas. If the receivers with the same DOA and polarization parameters want to receive different information, and Equation (25) becomes a nonuniform equation with no solution. Therefore, the different receivers with different spatial and polarization parameters are requested. The minimum norm solution for Equation (25), i.e., the signal transmitted by the antenna array, is given by In an arbitrary desired direction Θ j , (j ∈ {1, 2, · · · , K} ), the steering vector can be expressed as where e j ∈ R 1×K denotes a unit vector, the jth term of which is one. Then, the received signal for desired receiver is given by Therefore, an arbitrary desired receiver can recover the exact confidential information.
For an Eve in the direction Θ e with a polarization sensitive antenna, the steering vector can be written as where r ∈ R 1×K , which is given by Then, the received signal for undesired receiver is given by Assuming that the Eve expects to intercept the confidential information for the lth (l ∈ {1, 2, · · · , K} ) LU. For the Eve, the information of other LUs can be regarded as noise interference or artificial interference. Then, the received signal for the eavesdropper can be rewritten as Obviously, the modulated signal x l (i), that the eavesdroppers intend to crack, is seriously affected by the variables r l and K ∑ j=1,j =l r j · x j (i). This results in that Eves cannot demodulate the exact confidential information. Therefore, PLS is enhanced.

Security Performance Analysis When Eves without Polarization Information
Assuming that PM is adopted for information transmission for the K LUs using a PSA. Then, we can decompose the signals transmitted into two parts in the polarization domain: the horizontal component (x H (i) ) and the vertical component (x V (i) ). They are given by and respectively. When the receiver in the direction Θ uses a polarization sensitive antenna, the channel matrix is given by When the receiver in the direction Θ uses horizontally polarized antenna, the channel matrix is given by Similarly, when the receiver in the direction Θ uses vertically polarized antenna, the channel matrix is given by Therefore, the signal vector transmitted can be rewritten as where If the receiver located in the desired direction Θ j (j ∈ {1, 2, · · · , K} ) uses a polarization sensitive antenna, the received signal can be expressed as Therefore, the K LUs can receive the exact signal.
Assuming that an Eve wants to intercept the confidential information for the lth (l ∈ {1, 2, · · · , K}) LU. When the Eve does not know what antenna is used by the lth user, the eavesdropper receiver is likely to utilize a polarization sensitive antenna or a single polarized antenna. If the receiving antenna used by the Eve is different from the lth user, the information intercepted cannot be accurately demodulated.
When the Eve adopts a polarization sensitive antenna to receive the confidential information and does polarization demodulation, the PS received by the Eve can be given by ). Thereinto, Therefore, the received signal by the Eve is distorted in the polarization domain by the equivalent So, it is a very hard task for an Eve to demodulated the useful information without a-prior knowledge of polarization parameters, and PLS can also be guaranteed.

Security Performance Analysis from a Signal Processing Perspective
In this part, we will analyze the security performance of the proposed DM scheme from a signal processing perspective.
After passing through the LoS channel, the received signal of the kth LU is obtained by where ξ LU k ∼ CN (0,σ 2 ξ LU ) is the AWGN with zero mean and variance σ 2 ξ LU . Then, we can express their received signals as a vector, i.e., where is the AWGN vector. Substituting Equation (20) and Equation (22) into Equation (50), the received signals can be simplified as which is simply the summation of the useful information and AWGN. Then, Equation (49) can be rewritten as From Equation (52), each LU can easily recover the confidential information transmitted from the BS.
However, for the Eve with the spatial domain and the polarization domain information (Θ EVE , Γ EVE ), the received signal can be calculated by where is the steering vector of the Eve.
When the Eve is far away from the kth LU, we have Then, regardless of whether or not Γ EVE = Γ LU k , k ∈ {1, 2, · · · , K}, we have Obviously, we can obtain that Therefore, we can come to a conclusion that the Eve cannot recover the confidential messages when it is far away from the LU.
Next, we consider that an Eve is located at the same position as the kth LU's as the worst situation. Here, we have In this scenario, the security can also be guaranteed for our method due to the introduction of polarization information. The Eve has no a-prior knowledge of the PS Γ LU k for the kth user, i.e., Γ EVE = Γ LU k , k ∈ {1, 2, · · · , K}. Then, we still have The received signal for the Eve is given by Therefore, the Eve still cannot recover the confidential information even if it is located at the same position as the kth LU's. Therefore, PLS is significantly enhanced.

Metrics
SER, secrecy rate, and robustness are three key measurements to evaluate the security performance of DM systems [40][41][42]. Next, the SER, secrecy rate, and robustness of the proposed DM scheme will be analyzed.

A. SER
For clarity, without loss of generality, assuming that all AWGNs have the same distribution with zero mean and variance σ 2 ξ throughout the article, i.e., σ 2 ξ LU = σ 2 ξ EVE = σ 2 ξ . Meanwhile, all the transmitted baseband symbols are normalized. Therefore, using Equation (52), the signal-to-noise ratio (SNR) of the kth LU can be obtained by By contrast, the SNR of the conventional AN-aided DM scheme can be expressed as where β (0 < β < 1) is the power allocation factor for the confidential information. Meanwhile, the received signals of the Eve are scrambled by the eavesdropping steering matrix s(Θ EVE , Γ EVE ) in both the spatial and the polarized domains. By means of Equation (53), the SNR of the Eve which wants to intercept the useful information of the kth LU can be calculated by In this article, binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK) modulation will be utilized by the proposed DM scheme. The theoretical closed-form expressions for the SER of BPSK and QPSK modulated signals over the AWGN channel can be given by and respectively, where r denotes the SNR per bit, and er f c(x) = 2 √ π · ∞ x e −t 2 dt is the complementary error function.
Therefore, using Equation (60) to Equation (64), the related SER of the proposed DM scheme can be easily calculated.

B. Secrecy Rate
By means of Equation (52), the signal-to-interference-plus-noise ratio (SINR) of the kth LU can be expressed as Since the normalized narrow-band AWGN channel is assumed, using Equation (65), the achievable secure rate of the link from the transmitter to the kth LU can be calculated by According to Equation (53), the SINR of the Eve which expects to intercept the confidential information of the kth LU can be given by In the light of (67), the achievable rate of the link between the base station and the Eve can be obtained as Therefore, the secrecy rate of the proposed DM scheme can be defined as [3,40] where [·] † refers to max(0, ·).

C. Robustness
In this part, the robustness of the proposed DM scheme including the impacts of imperfect estimation of the LUs' directions and the depolarization effect of the received signals will be investigated.

Imperfect Estimation of the LUs' Directions
In the proposed DM scheme, the directions of K LUs are assumed to be a-priori known for the BS. However, in practical applications, the directions of the LUs are usually obtained by utilizing high-resolution direction of arrival (DOA) estimation algorithms such as [43][44][45]. Even though, there still exits an estimated error in the directional information inevitably.
The estimated directional angle of the kth LU can be assumed as where ∆Θ LU k is the estimated angle error. The estimated angle error will impose adverse impact on the precoding matrix P, which will severely degrade the security performance of the proposed DM scheme. In this case, the precoding matrix with estimation errors should be replaced by where H( Θ LU , Γ LU ) is the estimated steering matrix composed by the K estimated steering vectors, which is given by According to Equation (72), it is not hard to see that the normalization characteristic in Equation (21) will be affected by the estimation errors. Simulations will be provided in next Section to demonstrate that the security of the proposed DM scheme can also be guaranteed as long as the estimation errors of the LUs' direction are in an acceptable range. In practical applications, some robust DM synthesis methods can be used to fight against the imperfect estimations of the LUs' directions [25,46].

Depolarization Effect of the Received Signals
In time-varying multi-path channels, the depolarization effect of the wireless channel mainly includes polarization mode dispersion (PMD) and polarization-dependent loss (PDL). While the PMD effect will cause different damage to the PDL effect suffered by the DM scheme on different carriers. For the proposed single-carrier wireless communication in this article, the carrier frequency is much larger than the bandwidth, so the frequency difference within the bandwidth range is small. Therefore, the PMD effect is not obvious. The PDL effect is the main factor that impairs the performance of the DM scheme.
The degree of depolarization effect of wireless channels is determined by the difference in the eigenvalues of the channel matrix. In order to reduce or eliminate the influence of the wireless channel depolarization effect on a DM system, the degree of difference in the eigenvalues of the channel matrix should be reduced as much as possible. To this end, when the scatterers between transmitter and receiver depolarize the signals, this issue can be effectively solved by pre-compensating the polarization distortion of the transmitted signals at the transmitting side. It is assumed that the transmitter can obtain perfect channel state information (CSI), and the CSI remains unchanged during the channel coherence time. Based on the CSI obtained, the transmitting polarization state can be pre-compensated, i.e., multiplying each polarization state by a pre-compensation matrix. Some other depolarization suppression methods can be used to fight against the depolarization effect of the received signals [47,48].

Simulations and Discussions
In this section, we will provide several design examples based on a 10λ uniform linear PSA with a half-wavelength inter-element spacing to verify the SER performance of the proposed DM scheme. Then, the secrecy rate, and robustness of the proposed DM scheme are simulated.
Without loss of generality, we assume that the azimuth angles are fixed φ = 90 • for all design examples. 10 7 random symbols are used in the SER simulations, the AWGN power is the same for all directions, and signal-to-noise-ratio (SNR) = 12 dB.

A. Single beam with fixed polarization information
First, we will consider broadside and off-broadside design examples for single beam to transmit two independent data streams with different PSs to verify that the introduction of PS can increase the spectral efficiency. That can also be viewed as the polarization multiplexing. The capacity performance of our method is equal to the polarization multiplexing that two separate signals are transmitted by a PSA. We assume that the signals are Gray-coded QPSK modulated. The PSs are defined by Θ 1 = (45 • , 90 • ) for data stream 1 for a left-hand circular polarization, and Θ 2 = (45 • , −90 • ) for data stream 2 for a right-hand circular polarization at arbitrary directions. For each data stream, the desired beam pattern is a value of one with 90 • phase shift at the desired mainlobe, i.e., symbols "00", "01", "11", "10" correspond to 45 • , 135 • , −135 • , −45 • . Meanwhile, the desired beam patterns over the sidelobe region are random complex numbers with the amplitudes being approximate zero.
For broadside design example, the desired direction is set θ ML = 0 • ; for off-broadside design example, the desired direction is set θ ML = 30 • . The sidelobe regions are sampled every 1 • except the mainlobe direction.
The beam patterns for broadside for symbol pairs "00,00", "00,01", "00,11" and "00,10" are depicted in Figure 6, where all main beams are exactly pointed to 0 • with normalized magnitude 0 dB level, denoting that the amplitude of the desired data streams as expected. The phase patterns for broadside for those symbol pairs are shown in Figure 7. It is not hard to see that the phases of the two data streams in the desired direction are in line with the standard QPSK constellation, while in the sidelobe regions, phases are random enough. The beam and phase patterns for other twelve symbol pairs are not displayed here on account of the similar features as the four symbol pairs mentioned above. The resulting SER curves are demonstrated in Figure 8. It is indicated that the low SER is achieved in the desired direction, while in other undesired directions, the SER approximates the upper bound of a QPSK transmission system (0.75), representing that the directional modulation has been realized effectively.

B. Multiple beams with fixed polarization information
Next, we will consider design examples for multiple beams to transmit different or the same modulation information. Take two beams for example, one data stream transmits the QPSK modulation symbols in two desired directions with a horizontal polarization Θ 1 = (0 • , 0 • ), and another data stream transmits the BPSK modulation symbols in the same two directions with a vertical polarization Θ 1 = (90 • , 0 • ) . The simulated far-field (a) magnitude patterns and (b) phase patterns for 100 random symbols are shown in Figure 12.
Thus, from Figure 12, it can be observed that standard QPSK and BPSK constellation patterns are only along the prescribed directions, 0 • and 30 • as expected, with the signal IQ formats along all other directions being distorted, in such a manner to lower the possibility of interception by eavesdroppers located in these regions. Figure 13 shows the SER performance versus elevation angle for the two data streams transmitted when SNR equals 12 dB. It is obvious to find that the SER performance of the two data streams is the same as the traditional QPSK or BPSK signal at desired directions (0 • and 30 • ), while the SER performance is deteriorated seriously when the elevation angle is off the desired directions. Therefore, the channel capacity is double increased, and this characteristic of the designed signals is also beneficial for PLS enhancement.

C. Multiple beams with variable polarization information
In the following design example, it is assumed that a signal stream modulated with QPSK are projected along broadside 0 • , while another independent data stream modulated with BPSK, is transmitted along off-broadside 30 • by a 21-element uniform linear PSA. Meanwhile, we designate the polarization Θ 1 = (45 • , 45 • ) at the direction 0 • , the polarization Θ 2 = (45 • , −45 • ) at the direction 30 • , and the PSs are generated randomly at other undesired directions by the polarization control unit in Figure 3. The simulated far-field (a) magnitude patterns and (b) phase patterns for 100 random symbols are shown in Figure 14. In Figure 15, the SER simulation results versus elevation angle obtained for receivers using a polarization sensitive antenna and a single-polarized antenna are depicted. Two observations can be generalized from Figure 15: (1) the SERs of the LUs using a polarized sensitive antenna at the desired directions (0 • and 30 • ) are as good as the ideal case; (2) No matter where the Eve is located, it cannot intercept the exact confidential information using a single-polarized antenna due to the high SER. Further, the SER performance versus SNR for receivers at the desired direction 0 • utilizing a polarization sensitive antenna and a single-polarized antenna is displayed in Figure 16. From Figure 16, we can see that even if the eavesdroppers locate in the desired directions with high SNR enough, the confidential information still cannot be demodulated exactly, when the eavesdroppers use the antennas different from the LUs, i.e., Γ EVE = Γ LU k , k ∈ {1, 2, · · · , K}. Therefore, the DM technique based on a PSA is an effective approach to enhance PLS.  Figure 17a depicts the achievable rate versus SNR per bit of the LU for the proposed DM scheme and the conventional AN-aided DM schemes. As was expected, the achievable rates of the LU for the proposed DM scheme are much higher than that of the conventional AN-aided DM schemes, especially when the power allocation factor β of the AN-aided DM schemes is smaller. Figure 17b illustrates the achievable rate versus SNR per bit of the Eve for the proposed DM scheme and the conventional AN-aided DM schemes. As might have been expected, the achievable rates are approximate to 0 bps/Hz when the Eve is not in the desired directions. It is observed that the achievable rates of the Eve for the proposed DM scheme is a little higher than that of the conventional AN-aided DM schemes.

Secrecy Rate
It is demonstrated by Figure 17a,b that, due to without AN, the proposed DM scheme is more power-efficient than the traditional AN-aided DM schemes.
Furthermore, Figure 17c shows the secrecy rate versus SNR per bit for the proposed DM scheme and the conventional AN-aided DM schemes. Whatever the power allocation factor β takes, the secrecy rates of the LU for the proposed DM scheme are much higher than that of the conventional AN-aided DM schemes with a fixed normalized total transmitting power. Meanwhile, the secrecy rates of the proposed DM scheme are always positive wherever the Eve is located. Therefore, the proposed DM scheme is very secure and reliable. (c) Secrecy rate of the system.

Robustness
The SER performance versus SNR per bit with different imperfect estimation errors of the LU's directions is shown in Figure 18. For clarity, only the SER curves for one LU with QPSK modulation are presented, from which the same conclusions can also hold for other LUs.
It is not difficult to observed from Figure 18 that there is only about 0.5 dB loss of SNR when the estimated direction angle error is ∆θ d = 1 • for a given SER performance (e.g., SER = 10 −4 ) compared with the ideal case with no errors. Obviously, as long as the estimated angle errors are less than ∆θ d = 1 • , at most 0.5 dB additional SNR is required to achieve the same SER as the ideal case. Therefore, in order to achieve secure and reliable DM transmission for all LUs, the estimated direction errors for all LUs should be less than ∆θ d = 1 • .

Conclusions
DM technique based on a PSA has been proposed and further studied for PLS enhancement from the sampling perspective in spatial and polarization domain and from the signal processing perspective, respectively. We have formulated a design example to send two different independent data streams simultaneously at the same desired directions, same frequency, but with different PSs. It indicates that the channel capacity can be easily increased by the introduction of polarization information. Meanwhile, we have formulated another design example to send two different independent data streams simultaneously at two desired directions, with two fixed PSs, respectively, and off the desired directions, the PSs are distorted randomly. Simulation results verify that the security performance is significantly enhanced.