Next Article in Journal
E²VRP-CPP: An Energy-Efficient Approach for Multi-UAV Multi-Region Coverage Path Planning Optimization in the Enhanced Vehicle Routing Problem
Next Article in Special Issue
Enhancing Physical-Layer Security in UAV-Assisted Communications: A UAV-Mounted Reconfigurable Intelligent Surface Scheme for Secrecy Rate Optimization
Previous Article in Journal
Secure Transmission for RIS-Assisted Downlink Hybrid FSO/RF SAGIN: Sum Secrecy Rate Maximization
Previous Article in Special Issue
Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Physical-Layer Security Enhancement for UAV Downlink Communication Using Joint Precoding and Artificial Noise Design in Generalized Spatial Directional Modulation

1
Institute of Electronic Engineering, China Academy of Engineering Physics, Mianyang 621999, China
2
College of Information Engineering, Southwest University of Science and Technology, Mianyang 621010, China
3
The School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Drones 2025, 9(3), 199; https://doi.org/10.3390/drones9030199
Submission received: 17 January 2025 / Revised: 25 February 2025 / Accepted: 10 March 2025 / Published: 11 March 2025
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)

Abstract

:
This paper proposes a novel joint precoding and artificial noise design framework for generalized spatial directional modulation (AN-GSDM) in unmanned aerial vehicle (UAV) communications, aimed at enhancing the physical-layer security of downlink UAV communication systems. The key innovation lies in the dynamic co-optimization of multi-beam control and artificial noise (AN) power allocation under mobility constraints, enabling real-time adaptation to varying channel conditions. This approach jointly optimizes the precoding matrix and power-control factor, facilitating the effective management of multi-beams and AN to maximize the secrecy rate. The secrecy rate expression is derived, and the corresponding joint optimization problem is formulated. Due to the non-convex nature of the problem and the lack of a closed-form solution, an alternating iterative algorithm is proposed. This algorithm alternates between optimizing the precoding matrix using gradient descent and deriving a suboptimal closed-form solution for the power-control factor. Simulation results confirm that the proposed algorithm significantly enhances security by maximizing the secrecy rate, reducing eavesdroppers’ achievable rate to near zero, while simultaneously maintaining legitimate user’s rate. The approach not only strengthens security but also preserves system effectiveness, demonstrating robust convergence properties. This makes it a practical and promising solution for secure UAV communication.

1. Introduction

Anticipating future advancements in mobile communications, unmanned aerial vehicle (UAV) communication systems are expected to play a pivotal role in the development of space–air–ground integrated networks (SAGINs) for sixth-generation (6G) communications [1,2,3]. As emphasized in [1], UAVs have become indispensable for the realization of SAGINs due to their remarkable versatility and adaptability. In particular, references [4,5] highlight their extensive applications across various domains, such as surveillance and disaster management. In the context of secure communication, UAVs offer significant potential as nodes for enhancing data confidentiality, providing innovative solutions to safeguard sensitive information during transmission.
Nevertheless, the openness inherent in wireless communication environments—especially in air-to-ground channels—introduces significant vulnerabilities. In particular, waveform leakage increases the risk of signal interception, making secure and reliable communication within UAV networks an urgent research priority. To mitigate interception risks, significant advancements have been made in the realm of physical layer security (PLS) technologies [6]. Unlike conventional encryption techniques, these approaches leverage the unique characteristics of wireless channels to enhance data security [7]. Specifically, the use of artificial noise (AN) and directional modulation (DM) has garnered considerable attention as effective strategies for enhancing the security of wireless communication systems. For instance, AN, as proposed in [8], manipulates the null space of the legitimate receiver’s channel to effectively jam the eavesdropper’s reception without imposing an additional burden on the legitimate receiver. Additionally, the integration of UAV trajectory design and AN to thwart eavesdropping from multiple colluding curious users was introduced in [9]. Another significant contribution was presented in [10], where an optimal power allocation strategy was investigated to maximize secrecy rates in the presence of AN, ensuring that the legitimate receiver’s signal strength remains adequately protected. Despite these advancements, several challenges persist in the effective application of AN, particularly regarding the efficiency of AN in dynamic, multi-user environments. The fundamental trade-off between interference power and effective signal energy remains a critical area of exploration, underscoring the need for further optimization to improve the practical implementation of AN in secure communication systems.
On the other hand, DM has attracted considerable attention for its potential to enhance communication security [11]. In particular, the study in [12] introduced a novel approach by combining DM with beamforming to focus the transmitted signal toward a specific receiver, thus reducing the likelihood of interception by unauthorized users. Additionally, the integration of DM with multiple antennas was explored in [13] to improve the robustness of secure communications in multipath environments. This strategy enhanced the transmission’s security by mitigating the effects of eavesdroppers situated in diverse spatial regions. Furthermore, the work presented in [14] proposed a dynamic directional modulation (DDM) technique to enhance the privacy of wireless transmissions, which was evaluated using information leakage measures. Despite the effectiveness of these techniques, the security performance of DM approaches is significantly compromised when eavesdroppers are in close proximity to legitimate users. This limitation underscores the ongoing challenges in optimizing DM strategies to ensure robust security in dynamic and adversarial environments.
While both AN and DM techniques have shown promise in enhancing communication security, their combined application has also been investigated. As highlighted in [15,16,17], integrating AN with DM has the potential to improve the secrecy rate and overall security of the system by exploiting spatial diversity and effective interference management, thus offering stronger protection against eavesdropping. However, these approaches still face significant challenges in optimizing key system parameters, such as power control and beamforming design, to achieve an optimal balance between security enhancement and system efficiency. Moreover, transmission rates are often constrained, further complicating the implementation of these techniques in practical scenarios.
To address these limitations, several advanced solutions have been proposed, with a particular focus on the utilization of cooperative receivers. Specifically, DM with cooperative receivers (DM-CR), introduced in [18], secures transmissions by utilizing cooperative receivers and incorporating a predefined distortion factor to ensure robust performance regardless of the eavesdropper’s location. Building on this, spatial DM (SDM), as presented in [19], combined DM with spatial modulation (SM) to bolster resilience against distributed eavesdroppers and enhance transmission rates. To further improve transmission rates, generalized SDM (GSDM) [20] employed distributed receivers to encode information through signal indices, thereby reinforcing security. Additionally, the work in [21] proposed a DM with distributed receiver selection (DM-DRS) technique, which activated a specific subset of receivers to modulate information using receiver indices, complemented by a scrambling matrix to obstruct interception attempts. Furthermore, SDM integrated with AN [22] combined the strengths of SM, DM, and AN to achieve concurrent improvements in both security and transmission rates. Collectively, these advancements exploit the unique properties of wireless channels, significantly enhancing information security in UAV communication systems.
Despite these achievements, existing research on DM and AN technologies predominantly focuses on static channel conditions, precoding schemes, or power allocation, often neglecting the benefits of joint optimization across multiple parameters, such as precoding matrices and power-control factors, in dynamic UAV scenarios. This oversimplification poses challenges, as it prevents the full utilization of potential security enhancements. Additionally, the non-convex nature of the associated optimization problems complicates the design of efficient algorithms. Therefore, overcoming these limitations is crucial for achieving optimal performance in UAV communications under practical deployment conditions.
In this paper, we propose an AN-GSDM framework to enhance the security of downlink UAV communication systems. Specifically, we derive the secrecy rate expression for the AN-GSDM system and formulate a joint optimization problem. To address the non-convex nature of this problem, we develop an alternating iterative algorithm. The key contributions of this work are as follows: (1) We introduce artificial noise (AN) into the generalized spatial directional modulation (GSDM) system to further enhance its security. We analyze the impact of multiple parameters, including the precoding matrix and power-control factors, on the secrecy rate of the AN-GSDM system. (2) The proposed method jointly optimizes the precoding matrix and power-control factors to efficiently manage multi-beam transmissions and artificial noise. By leveraging approximation techniques and alternating optimization, we solve the non-convex joint optimization problem, making the approach more applicable to real-world systems. (3) Simulation results validate the superior security performance and robust convergence properties of the proposed approach. Moreover, the method demonstrates strong performance even under high dynamic conditions and with localization errors, highlighting its practical viability in real-world UAV communication scenarios.
Compared to traditional systems, the AN-GSDM framework, combined with the proposed joint optimization algorithm, maximizes security and offers numerous practical applications, including UAV military confidential communications, UAV private information image transmission, and UAVs serving as relay stations for private information transmission. For instance, in widely used 5G and upcoming 6G systems, UAVs acting as relay stations can transmit private information. Some distributed receiving stations may be compromised by external intrusions, turning them into eavesdroppers. In such cases, UAVs can obtain the location and channel information of legitimate receivers and, to some extent, the information of eavesdroppers. By introducing the AN-GSDM system and jointly optimizing the precoding matrix and power allocation factor, this approach enhances the spatial distribution of resources—such as the precoding matrix controlling the power and beam distribution of the useful signal, and the power allocation factor controlling the distribution of noise power. This ensures that sensitive information is protected from interception by eavesdroppers, thereby safeguarding the security of private information transmission. This approach aligns with the advancements in integrating UAVs into 5G and beyond networks, as discussed in the recent literature [23]. By incorporating the AN-GSDM framework, UAVs can efficiently manage multi-beam transmissions and artificial noise, optimizing power resources to ensure secure communication channels even in the presence of potential eavesdroppers.
The remainder of this paper is organized as follows: Section 2 introduces the system model for AN-GSDM. Section 3 presents the proposed iterative algorithm for jointly optimizing the precoding matrix and power-control factor to maximize the secrecy rate. Section 4 provides simulation results to validate the analytical findings and illustrate the effectiveness of the proposed scheme. Finally, Section 5 concludes this paper, summarizing its key contributions and potential implications.

2. System Model

As shown in Figure 1, consider a downlink UAV communication system employing AN-GSDM, where the mobile UAV transmitter, Alice, is equipped with N t antennas, and the legitimate user, Bob, is equipped with N r ( N r < N t ) cooperative single-antenna receivers, which are located in different spatial directions and interconnected via optical fiber links. Additionally, Bob activates N u receivers for communication in a single time slot, where N u < N r , meaning that only a subset of Bob’s receivers participate in the transmission. Meanwhile, the eavesdropper, Eve, is equipped with N e ( N e < N t ) cooperative single-antenna receivers, which are also interconnected via optical fiber links.
Unlike the single-beam transmission in SDM, GSDM introduces receiver subset selection (RSS), which allows information to be transmitted through N u activated beams selected from N r available beams. This enables the transmission of k 1 = log 2 C N r N u bits of information. Note that k 1 might be a fractional value. In practical system design, it is typically rounded down to meet encoding requirements. However, for performance analysis, such as the security rate, the exact value of k 1 can be used. The N u activated antennas use traditional M-dimensional amplitude and phase modulation (APM), allowing for the transmission of k 2 = N u log 2 M bits of information. Furthermore, the total number of transmitted bits is k = k 1 + k 2 . The multiple beams are used to transmit information in GSDM to Bob’s multiple distributed receivers, which serve to enhance both the secrecy rate and transmission performance.
The transmitted symbol vector s l m is s l m = I l b m , where I l l = 1 , 2 , , 2 k 1 , is a matrix consisting of N u column vectors selected from the identity matrix I N r , corresponding to the N u activated receivers. b m m = 1 , 2 , , 2 k 2 denotes a column vector constructed from N u symbols selected from conventional APM symbols.
Without loss of generality, assume that Alice is equipped with a uniform linear array (ULA), where the phase center is the geometric center of the array. The channel vector between Alice and the receiver located in the direction of angle θ is then expressed as
h ( θ ) = 1 N t e j N t 1 2 2 π λ d cos θ , e j N t 1 2 1 2 π λ d cos θ , , e j N t 1 2 2 π λ d cos θ H ,
where λ is wavelength and d is is the antenna spacing of ULA. Let Θ b = θ b 1 , , θ b N r be the set of arrival angles for Bob’s receivers, and let Θ e = θ e 1 , , θ e N e be the set of arrival angles for Eve’s receivers. The legitimate downlink channel between Alice and Bob, as well as the eavesdropping downlink channel between Alice and Eve, can be represented, respectively, as follows:
H Θ b = h θ b 1 , , h θ b N r H , H Θ e = h θ e 1 , , h θ e N e H .
To enhance the security, multi-beam precoding and AN are introduced to obscure the eavesdropper’s ability. The transmitted symbol with precoding and AN is
x l m = ζ P s l m + V 0 n a ,
where P is a precoding matrix with power constrain tr P P H = P t , ζ is the power-control factor, and  V 0 n a is random AN. Consider designing the AN in the null space of Bob’s channel, ensuring that it does not affect the signal received by Bob but interferes with the signal received by Eve. Thus, V 0 can be obtained by performing singular value decomposition on H Θ b , such that it satisfies H = U D , 0 V 1 , V 0 H . n a is complex Gaussian white noise with a mean of 0 and element-wise variance σ a 2 = 1 ζ 2 P t N t N r .
The received signals for Bob and Eve are, respectively,
y b = ζ H Θ b P s l m + H Θ b V 0 n a 0 + n b = ζ H Θ b P s l m + n b ,
y e = ζ H Θ e P s l m + H Θ e V 0 n a + n e n ,
where n r and n e are zero-mean complex Gaussian white noise with element-wise variances of σ b 2 and σ e 2 , respectively. n consists of AN-caused interference and thermal noise with variance Σ = σ a 2 H Θ e V 0 V 0 H H H Θ e + σ e 2 I N e . It is noted that 0 ζ 1 , when ζ = 1 , with the above two models representing the case without AN.
Due to the inherent mobility of the UAV, the relative positions between Alice, Bob, and Eve are continuously changing. This dynamic movement leads to variations in the angles of arrival (AoAs) of the transmitted signals at both the legitimate receiver and the eavesdropper. Consequently, the fluctuations in these AoAs introduce challenges in maintaining a secure communication link, as the UAV must adapt its transmission strategy in real time to mitigate eavesdropping risks. To address this, it becomes essential to optimize the precoding matrix and power-control factor based on the constantly changing arrival angles. By doing so, the system can effectively manage the interference on Eve introduced by the AN while simultaneously ensuring the reliable reception of data by the legitimate receiver, thus enhancing the overall transmission security.

3. Enhancing Security Through Joint Precoding and Artificial Noise Design

The precoding matrix P is responsible for controlling multiple beams, while the power-control factor ζ governs both the AN power and beam gain. These two parameters are tightly coupled and jointly contribute to secure transmission. Optimizing only one of them in isolation would be insufficient to enhance security. Specifically, through joint optimization of these parameters, the multi-beam parameters and artificial noise power (i.e., the interference caused to Eve) can be controlled under different positions and signal-to-noise ratios (SNRs), thereby maximizing the enhancement of transmission security. In this section, we take the secrecy rate as the objective for security enhancement and conduct a thorough analysis and optimization.

3.1. Problem Formulation

Suppose that the joint maximum likelihood detector is employed for both Bob and Eve; the achievable rates between Alice and both Bob and Eve can be computed separately. Define S as the set of all transmitted symbols and · as the Frobenius norm, with Bob’s rate R b being [22,24]
R b = k 1 2 k s l m S E n r log 2 s i m S exp Ω b ,
where Ω b = ζ H Θ b P s l m s i m + n b 2 + n b 2 σ b 2 .
The AN makes the rate calculation for Eve slightly more complex. In order to derive Eve’s rate, we multiple Σ 1 / 2 on both sides of Equation (5), and then we can similarly obtain the expression of Eve’s rate as
R e = k 1 2 k s l m S E n log 2 s i m S exp Ω e ,
where Ω e = ζ Σ 1 / 2 H Θ e P s l m s i m + Σ 1 / 2 n 2 + Σ 1 / 2 n 2 .
The secrecy rate R is defined as the difference between the achievable rates of Bob and Eve, and it can be written as
R = 1 2 k s l m S E n b , n log 2 s i m S exp Ω e s i m S exp Ω b + ,
where · + = max · , 0 .
As a result, the secrecy rate optimization problem through joint precoding and power-control factor design is formulated as
max P , ζ R P , ζ s . t tr P P H P t 0 ζ 1 ,
Note that the optimization problem is non-convex and contains highly complex terms, making it intractable to derive a globally optimal closed-form solution. Furthermore, the expectation operator requires averaging over multiple noise realizations, which adds significant computational complexity. For this optimization problem, a more efficient approach is necessary to avoid the difficulties associated with solving explicit expressions.
In this scenario, both Eve and Bob are assumed to have identical reception capabilities, representing the “worst-case” scenario in practical systems. Under these conditions, Eve’s achievable rate serves as an “upper bound”, while the system’s secrecy rate represents the “lower bound” of secure communication. The optimization design aims to maximize the “lower bound” of the secrecy rate while minimizing (approaching zero) the “upper bound” of Eve’s achievable rate. By developing an optimization algorithm in this context, even if Eve has weaker reception capabilities than Bob (e.g., if Eve does not fully understand the GSDM symbol mapping rules), the actual achievable secrecy rate will exceed the optimized value, thus enhancing the system’s security. This approach ensures that the system’s security rate exceeds the optimized security rate derived in this paper under practical scenarios where Eve possesses limited or incomplete information.

3.2. Secrecy Rate Optimization Through Joint Precoding and Artificial Noise Design

In this subsection, we propose a low-complexity approach to solve the optimization problem in (9). We consider an alternating optimization method. When ζ is fixed, we derive a lower bound for the secrecy rate and optimize this bound to enhance the secrecy rate. When P is fixed, we use a method based on maximizing the product of the SNR at Bob and the interference-to-signal-plus-noise ratio (ISNR) at Eve to obtain a suboptimal solution for ζ . This alternating optimization approach is commonly used in many classical algorithms, such as variational Bayesian methods. Since each alternating optimization step guarantees an increase in the secrecy rate, the convergence of the algorithm is naturally ensured.
In the following, we are committed to solving the optimization problems for the two parameters separately.
(1) Optimizing P with fixed ζ : For fixed ζ , combining [25] with Jensen’s inequality, and through a tedious yet straightforward derivation, we obtain the lower bound of Bob’s rate R b and Eve’s rate R e as
R b k 1 2 k s l m S log 2 s i m S E n r exp Ω b = k N b log 2 e 1 1 2 k s l m S log 2 s i m S exp Ω b ,
R e k 1 2 k s l m S log 2 s i m S E n exp Ω e = k N b log 2 e 1 1 2 k s l m S log 2 s i m S exp Ω e
with Ω b = ζ H Θ b P s l m s i m 2 2 σ b 2 and Ω e = 1 2 ζ Σ 1 / 2 H Θ e P s l m s i m 2 . According to [25], the lower bound of those two secrecy rate expressions, when increased by a constant N b log 2 e 1 and N e log 2 e 1 , respectively, provide a tighter lower bound that can be approximated as the secrecy rate. Therefore, we have the following:
R b , L = k 1 2 k s l m S log 2 s i m S exp Ω b ,
R e , L = k 1 2 k s l m S log 2 s i m S exp Ω e .
Thus, we can obtain the lower bound R L ( P ) for the secrecy rate R ( P ) as
R L P = R b , L R e , L + = 1 2 k s l m S log 2 s i m S exp Ω e s i m S exp Ω b +
The subproblem centers around finding the optimal P that maximizes the lower bound of the secrecy rate R L P , which is formulated as
max P R L P s . t tr P P H P t .
We resort to a gradient descent to solve the above problem, and we further need to compute the gradient of the objective function with respect to P , which is given by
P R L P = log 2 e 2 k s l m S s i m S Ξ b P s l m s i m s l m s i m H exp Ω b σ b 2 s i m S exp Ω b log 2 e 2 k s l m S s i m S Ξ e P s l m s i m s l m s i m H exp Ω e s i m S exp Ω e
with Ξ b = ζ 2 H H Θ b H Θ b and Ξ e = ζ 2 H H Θ e Σ 1 / 2 H Σ 1 / 2 H Θ e .
The proposed algorithm-based gradient descent to solve (15) is summarized in Algorithm 1.
Algorithm 1 An iterative algorithm based on gradient descent to solve P for maximizing the secrecy rate with fixed ζ
initialization:
  • Set the initial step size δ , the minimum step size δ min , the iteration index t = 0 , and the maximum iteration number t max .
  • Set the fixed power-control factor ζ .
  • Set the initial precoding matrix P 0 with constrain tr P 0 P 0 H P t .
while  t < t max  do
  • Set t = t + 1 .
  • Compute R L , t 1 = R L ( P t 1 ) based on (14).
  • If δ δ min , go to the next step. Otherwise, output P t 1 and stop.
  • Compute the gradient P R L P t 1 based on (16).
  • Set P t = P t 1 + δ P R L P t 1 .
  • P t = P t P t tr ( P t ( P t ) H ) .
  • Compute R L , t = R L ( P t ) based on (14).
  • If R L , t > R L , t 1 , set R L , t = R L , t , P t = P t . Otherwise, set δ = δ / 2 and return to Step 3.
end
Output:  P = P t .
(2) Optimizing ζ with fixed P : For a fixed precoding matrix P , the optimization problem in (9) centers around finding a ζ that maximizes the secrecy rate. Based on the approach proposed in [26], we maximize the product of the SNR at Bob and the ISNR at Eve to obtain a suboptimal closed-form solution for ζ . Intuitively, the physical meaning of this approach is to adjust the value of ζ in order to maximize the SNR at Bob while increasing the interference at Eve and reducing the signal strength at Eve, thereby enhancing the secrecy rate. Specifically, the product of the SNR at Bob and the ISNR at Eve is
F ζ = ζ 2 tr H Θ b P P H H H Θ b σ b 2 SNR at Bob × 1 ζ 2 P t tr H Θ e V 0 V 0 H H H Θ e N t N r σ e 2 + ζ 2 tr H Θ e P P H H H Θ e ISNR at Eve
Let ζ 2 = κ , and then the first derivative of the function F κ with respect to κ is
F κ κ = P t tr H Θ b P P H H H Θ b tr H Θ e V 0 V 0 H H H Θ e σ b 2 × tr H Θ e P P H H H Θ e κ 2 2 σ e 2 κ + σ e 2 N t N r σ e 2 + ζ 2 tr H Θ e P P H H H Θ e
Solving the equation F κ κ = 0 under the condition 0 κ 1 , we obtain the closed-form solution for κ , which is
κ o p t = σ e 2 + σ e 4 + σ e 2 tr H Θ e P P H H H Θ e tr H Θ e P P H H H Θ e
It can be noticed that when κ < κ o p t , we have F κ κ > 0 , and when κ > κ o p t , we have F κ κ < 0 . Thus, κ o p t is the largest value in 0 κ 1 , and the closed-form solution for ζ is
ζ = σ e 2 + σ e 4 + σ e 2 tr H Θ e P P H H H Θ e tr H Θ e P P H H H Θ e
Finally, we obtain the algorithm for joint optimization of P and ζ , as shown in Algorithm 2. When the UAV is moving, there may be inaccuracies in the acquisition of Bob’s and Eve’s channel state information. During secrecy rate optimization, the actual channel matrices used for Bob and Eve are H Θ b and H Θ e , respectively, where Θ b and Θ e represent the estimated arrival angle information of Bob and Eve by the UAV.
Note that in the previous section, we only presented the system model for a ULA configuration with a Line-of-Sight (LOS) channel. This model is applicable to scenarios with high flight altitudes and open ground areas, covering many practical applications. Although we have provided only this specific channel model, the AN-GSDM framework is actually applicable to any channel model, as long as the channel matrix for both the legitimate receiver and the eavesdropper can be accurately (or approximately) obtained. The system optimization design can then proceed based on this information.
In the following simulations, we will introduce various types of channel models, including Rician [27], Kronecker [28], Saleh–Valenzuela (SV) [29], and CDL channels [30]. The Rician channel model represents rich scattering channels, considering multipath interference (both LOS and Non-Line-of-Sight (NLOS) paths), as well as the Kronecker channel correlation. The SV and CDL channels provide a detailed description of multipath structures.
The physical meaning of the precoding matrix varies across different channel models. For example, in rich scattering models, traditional beamforming becomes ineffective (due to the lack of directionality), and the precoding matrix controls the spatial power distribution rather than the physical beam directions. In the SV model, precoding may optimize several angle clusters, forming multiple beams that cover the main directions of these clusters, or it may focus on interference suppression. In the LOS model, Eve’s location and angle are directly related, and precoding controls the beams to degrade the signal quality in Eve’s direction. In the multipath model, Eve might receive signals through multiple paths, and the precoding needs to consider all possible paths to design more complex interference strategies. Although the implementation of these objectives changes with different channel characteristics, the essence of precoding remains the same: it is a spatial resource optimization strategy aimed at enhancing physical-layer security.
Algorithm 2 An iterative algorithm for the joint optimization of P and ζ for maximizing the secrecy rate.
initialization:
  • Set the iteration index d = 0 , and the maximum iteration number d max .
  • Set the initial power-control factor ζ 0 , and the error tolerance ε .
while  d < d max and R L , d R L , d 1 2 > ε  do
  • Set d = d + 1 .
  • Compute P t by substituting ζ d 1 into Algorithm 1, and set P d = P t .
  • Compute ζ d by substituting P d into (20).
  • Compute R L , d = R L ( P d , ζ d ) based on (14).
end
Output:  P = P d , ζ = ζ d .

4. Simulation and Discussion

Simulations are conducted to evaluate the effectiveness of the proposed security optimization (denoted as ‘Proposed’) algorithm for the GDSM system. During the simulations, we set N t = 4 , N r = 3 , N u = 2 , N e = 2 and P t = N r . The angles of Bob’s distributed receivers are Θ b = 30 , 50 , 70 , and the angles of Eve’s distributed receivers are Θ e = 20 , 45 . Quadrature Phase Shift Keying (QPSK) is employed for APM realization, and each simulated secrecy rate is obtained through 10 4 Monte Carlo realizations. When executing the proposed algorithm, we set d m a x = 20 , ζ 0 = 0.8 , ε = 10 4 , δ = 0.5 , δ m i n = 10 4 , and t m a x = 50 . We assume identical noise power at both Bob and Eve, and the SNR is defined as 1 / σ b 2 . The channel data are generated based on the models provided in Equation (2), which defines the channel matrices for Bob and Eve, respectively.
Both mobile and stationary UAV scenarios are considered, corresponding to cases with and without processing delay. When there is no processing delay, the angles of Bob and Eve used for the joint design of precoding and power-control factors at the UAV are accurate. Conversely, in the presence of processing delay, the angles of Bob and Eve at the UAV are obtained from the previous time step, leading to deviations from the current angle values. In addition, conventional zero-forcing (ZF) precoding [22] ( P = H Θ b ( H Θ b H H Θ b ) 1 , denoted as ‘ZF’) and the precoding method ( P = H Θ b / N t , denoted as ‘Maxbeam’) that maximize the power in Bob’s direction [20], combined with different power control factors ζ , are used as benchmarks.
Figure 2 and Figure 3 present the system’s secrecy rate, and Figure 4 and Figure 5 present the achievable rates at Bob and Eve, under various precoding and power-control factors. The secrecy rate is defined as the difference between Bob’s and Eve’s achievable rates. Although maximizing this relative difference is critical, minimizing Eve’s absolute achievable rate is equally important. By reducing Eve’s achievable rate to the greatest extent possible, we can fundamentally restrict its ability to intercept information, even when Bob’s rate remains constant or decreases slightly. In addition, we show the secrecy rate when N e = 1 and Θ e = 25 in Figure 2 and Figure 3.
The results in Figure 2, Figure 3, Figure 4 and Figure 5 demonstrate that the proposed optimization algorithm significantly outperforms the benchmarks in terms of the secrecy rate. Unlike the benchmarks, which fail to consider Eve’s location when controlling multiple beams and do not jointly optimize the precoding matrix and power-control factor, the proposed algorithm successfully mitigates information leakage. By employing a joint design approach, the algorithm balances the trade-off between maintaining Bob’s achievable rate and suppressing Eve’s interception capabilities. As the number of eavesdroppers increases, the secrecy rate decreases under low SNR conditions due to enhanced interference from multiple eavesdroppers. However, this decline is more pronounced in the low-SNR regime, where the number of eavesdroppers has a larger relative impact due to weaker signal strength. At this stage, the system faces higher interference from Eve, and further optimizations may be needed to counteract the increased noise levels. However, at a high SNR, the optimized secrecy rate eventually saturates, indicating the effectiveness of the proposed scheme in mitigating information leakage even in the presence of multiple eavesdroppers. Interestingly, this saturation suggests that the algorithm is nearing the optimal operating point, where increasing the SNR no longer provides substantial benefits in terms of secrecy rate improvement. Thus, while a high SNR is crucial for system performance, it does not lead to unlimited improvement in secrecy, implying that a careful balance of parameters is required.
Figure 6 and Figure 7 demonstrate the performance of the proposed algorithm under the Rician, Kronecker, SV, and CDL channel models. Similar to the results under the LOS channel, the optimization performance of the proposed algorithm significantly outperforms the baseline algorithms. Whether in the rich scattering Rician channel or the Kronecker channel with channel correlation, the proposed algorithm consistently delivers a substantial improvement in the system’s secrecy rate. This indicates that the proposed multi-beam optimization and power allocation strategy effectively suppresses the eavesdropper’s reception capability while ensuring the communication quality for the legitimate receiver across different channel environments. From the simulation results, although the secrecy rate in complex channel models (such as the Rician and Kronecker channels) is impacted by multipath interference, the proposed algorithm still maintains its advantage over traditional methods. In the SV and CDL channels, despite the additional challenges introduced by multipath propagation, the proposed precoding optimization strategy effectively handles interference suppression and maintains high security performance. In conclusion, regardless of the channel model, the proposed algorithm demonstrates strong advantages in enhancing physical-layer security and can adapt to dynamic variations in different propagation environments.
In Figure 8 and Figure 9, we analyze the performance of the proposed algorithm under the scenario of a moving UAV, considering processing delay and angular estimation errors. In Figure 8, the UAV height is set to h = 100 m and the speed is v = 40 m / s . The curves show the secrecy rate performance under different SNRs with a processing delay. As the SNR increases, the impact of processing delay on secrecy rate becomes more significant. At higher SNRs, the impact of processing delay is amplified because the UAV’s position and angle estimates are increasingly sensitive to delay, leading to greater angular inaccuracies for both Bob and Eve. This results in a decline in the secrecy rate. The increase in processing delay results in increasingly inaccurate angular information for Bob and Eve, leading to a decline in the secrecy rate. Therefore, the processing delay should be minimized to improve security. In Figure 9, we present the secrecy rate when there are estimation biases in the arrival angles of Bob and Eve, assuming positive biases for both. Again, the secrecy rate is more sensitive to errors under high SNRs. Under higher SNR conditions, even small biases in the angle estimates lead to significant performance degradation, as the accuracy of angle information directly influences the alignment of the beams and the power distribution across the system. Additionally, the results indicate that the relative bias in Bob and Eve’s angle information significantly impacts the secrecy rate. This further suggests that the accuracy of the relative positions of Bob and Eve, as obtained by UAV Alice, has a greater effect on the secrecy rate than the absolute angular information. Therefore, ensuring that Alice accurately measures the relative angles between Bob and Eve becomes critical. This information should be continuously updated to mitigate the effects of angular errors.
Figure 10 shows the convergence behavior of the proposed algorithm under different SNRs. Over a wide range of SNRs, the proposed algorithm exhibits good convergence, with convergence achieved within two to six iterations. However, as the SNR increases, the number of iterations required for convergence also increases, suggesting that higher SNR scenarios are more computationally demanding. This may result in longer processing times; thus, real-time applications may require adjustments to optimize for convergence time. As the SNR increases, the number of iterations required for convergence increases, due to the fixed choice of the initial iteration value. Therefore, in practical applications, the initial iteration value can be flexibly chosen based on the SNR to accelerate convergence.
The proposed algorithm, while effective in improving the secrecy rate and enhancing the physical layer security, does have certain limitations. Firstly, the algorithm requires iterative optimization, as there is no closed-form analytical expression available for the problem. This iterative process increases the computational complexity, especially when the number of iterations or system parameters is large. Additionally, the algorithm necessitates the availability of partial channel state information (CSI) of both the legitimate user (Bob) and the eavesdropper (Eve), which may not always be feasible in practical systems due to limited feedback or imperfect channel estimation. Furthermore, the algorithm’s performance might degrade under extreme conditions, such as a very low SNR, high mobility scenarios, or when the system operates with inaccurate angle of arrival (AoA) estimations.
Future research will focus on addressing these limitations. One direction is to develop more efficient optimization techniques, potentially by leveraging machine learning approaches or adopting adaptive methods that reduce the dependency on iterative processes. Additionally, efforts will be made to enhance the algorithm’s robustness against incomplete or imperfect CSI, including the development of robust estimation and feedback protocols. Another avenue for improvement is extending the algorithm to handle dynamic environments, such as fast-moving UAVs or networks with fluctuating channel conditions, to ensure reliable security performance across diverse real-world applications.

5. Conclusions

This paper proposed a joint optimization framework designed to enhance the security of downlink UAV communication systems by integrating AN-GSDM. The proposed algorithm alternates between optimizing the precoding matrix and the power-control factor, effectively managing multi-beam transmissions and artificial noise (AN) to maximize the secrecy rate. Simulation results demonstrate the algorithm’s superior performance in improving transmission security by both maximizing the secrecy rate and ensuring robust protection against eavesdropping. Specifically, the algorithm minimizes Eve’s achievable rate to near zero, effectively rendering eavesdropping infeasible, while maintaining the achievable rate for Bob. Additionally, the proposed method successfully tackles the challenges posed by non-convex optimization and dynamic UAV communication environments, exhibiting strong convergence properties and offering a practical, efficient solution. The findings underscore the potential of this optimization framework to significantly enhance security in UAV communication systems, particularly in scenarios with increasing numbers of eavesdroppers or dynamic channel conditions. Future work will focus on refining the algorithm to improve scalability and performance in more complex multi-user environments, as well as exploring the integration of additional channel models and further optimization techniques.

Author Contributions

Conceptualization, X.L., Y.X. and J.T.; methodology, X.L. and Y.X.; software, X.L., Y.X. and J.T.; validation, X.L., Y.X., J.Z., J.T. and Y.L.; formal analysis, D.H.; investigation, X.L., Y.X. and J.T.; resources, X.L.; data curation, Y.L. and J.T.; writing—original draft preparation, X.L., Y.X., J.Z. and Q.D.; writing—review and editing, J.T.; visualization, Y.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the CAEP Foundation (grants YZJJZL2024076 and YZJJZQ2023012), the National Natural Science Foundation of China under grant 62441111, and the Sichuan Science and Technology Program under grants 2024NSFSC0476 and 2025YFHZ0199.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Xiao, Y.; Ye, Z.; Wu, M.; Li, H.; Xiao, M.; Alouini, M.-S.; Al-Hourani, A.; Cioni, S. Space-air-ground integrated wireless networks for 6G: Basics, key technologies, and future trends. IEEE J. Sel. Areas Commun. 2024, 42, 3327–3354. [Google Scholar] [CrossRef]
  2. Zhang, P.; Zhang, Y.; Kumar, N.; Guizani, M. Dynamic sfc embedding algorithm assisted by federated learning in space–air–ground-integrated network resource allocation scenario. IEEE Internet Things J. 2023, 10, 9308–9318. [Google Scholar] [CrossRef]
  3. Li, H.; Ota, K.; Dong, M. Ai in sagin: Building deep learning service-oriented space-air-ground integrated networks. IEEE Netw. 2023, 37, 154–159. [Google Scholar] [CrossRef]
  4. Li, R.; Xiao, Y.; Yang, P.; Tang, W.; Wu, M.; Gao, Y. Uav-aided two-way relaying for wireless communications of intelligent robot swarms. IEEE Access 2020, 8, 56141–56150. [Google Scholar] [CrossRef]
  5. Wu, M.; Xiao, Y.; Gao, Y.; Xiao, M. Digital twin for uav-ris assisted vehicular communication systems. IEEE Trans. Wirel. Commun. 2024, 23, 7638–7651. [Google Scholar] [CrossRef]
  6. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.-K.; Gao, X. A survey of physical layer security techniques for 5g wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef]
  7. Sun, X.; Ng, D.W.K.; Ding, Z.; Xu, Y.; Zhong, Z. Physical layer security in uav systems: Challenges and opportunities. IEEE Wirel. Commun. 2019, 26, 40–47. [Google Scholar] [CrossRef]
  8. Gu, Y.; Wu, Z.; Yin, Z.; Zhang, X. The secrecy capacity optimization artificial noise: A new type of artificial noise for secure communication in mimo system. IEEE Access 2019, 7, 58353–58360. [Google Scholar] [CrossRef]
  9. Wen, Y.; Chen, G.; Fang, S.; Wen, M.; Tomasin, S.; Renzo, M.D. Ris-assisted uav secure communications with artificial noise-aware trajectory design against multiple colluding curious users. IEEE Trans. Inf. Forensics Secur. 2024, 19, 3064–3076. [Google Scholar] [CrossRef]
  10. Li, N.; Tao, X.; Xu, J. Artificial noise assisted communication in the multiuser downlink: Optimal power allocation. IEEE Commun. Lett. 2015, 19, 295–298. [Google Scholar] [CrossRef]
  11. Jian, J.; Wang, W.-Q.; Chen, H.; Huang, B. Physical-layer security for multi-user communications with frequency diverse array-based directional modulation. IEEE Trans. Veh. Technol. 2023, 72, 10133–10145. [Google Scholar] [CrossRef]
  12. Huang, G.; Chen, S.; Ding, Y.; Li, X.; Nallanathan, A.; Mumtaz, S. Security-enhanced directional modulation symbol synthesis using high efficiency time-modulated arrays. IEEE Trans. Veh. Technol. 2024, 73, 1418–1423. [Google Scholar] [CrossRef]
  13. Cheng, Q.; Fusco, V.; Wang, S.; Zhu, J. A two-ray multipath model for frequency diverse array-based directional modulation in misome wiretap channels. In Proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–5. [Google Scholar]
  14. Silva, P.E.G.; Narbudowicz, A.; Marchetti, N.; Nardelli, P.H.J.; de Souza, R.A.A.; Moualeu, J.M. Low-complexity dynamic directional modulation: Vulnerability and information leakage. IEEE Internet Things J. 2024, 11, 6290–6300. [Google Scholar] [CrossRef]
  15. Maneiro-Catoira, R.; Brégains, J.; García-Naya, J.A.; Castedo, L. Directional modulation with artificial-noise injection into time-modulated arrays. IEEE Antennas Wirel. Propag. Lett. 2024, 23, 2336–2340. [Google Scholar] [CrossRef]
  16. Xie, T.; Zhu, J.; Li, Y. Artificial-noise-aided zero-forcing synthesis approach for secure multi-beam directional modulation. IEEE Commun. Lett. 2018, 22, 276–279. [Google Scholar] [CrossRef]
  17. Christopher, R.M.; Borah, D.K. Iterative convex optimization of multi-beam directional modulation with artificial noise. IEEE Commun. Lett. 2018, 22, 1712–1715. [Google Scholar] [CrossRef]
  18. Xiao, Y.; Tang, W.; Xiao, Y.; Zhang, H.; Wu, G.; Xiang, W. Directional modulation with cooperative receivers. IEEE Access 2018, 6, 34992–35000. [Google Scholar] [CrossRef]
  19. Wei, X.; Xiao, Y.; Xiao, Y.; You, Q.; Chen, W. Spatial and directional modulation with random frequency diverse array. In Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2018; pp. 976–979. [Google Scholar]
  20. Zhong, Y.; Ji, Z.; Li, X.; Fei, P.; Hou, D.; Wang, Z.; Tian, J. Covert information mapped generalized spatial and direction modulation toward secure wireless transmission. Sensors 2024, 24, 6333. [Google Scholar] [CrossRef]
  21. Zhang, H.; Xiao, Y.; Tang, W.; Wu, G.; Niu, H.; Zhou, X. Directional modulation with distributed receiver selection for secure wireless communications. Sci. China Inf. Sci. 2021, 64, 1–11. [Google Scholar] [CrossRef]
  22. Zhang, H.; Xiao, Y.; Fu, B.; Zhou, X. Artificial noise-aided spatial and directional modulation systems for secure transmission. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 20–22 October 2020; pp. 1–5. [Google Scholar]
  23. Ghadi, F.R.; Kaveh, M.; Wong, K.K.; Martín, D. Physical Layer Security Performance of Cooperative Dual-RIS-Aided V2V NOMA Communications. IEEE Syst. J. 2024, 18, 2074–2084. [Google Scholar] [CrossRef]
  24. Wu, F.; Yang, L.-L.; Wang, W.; Kong, Z. Secret precoding-aided spatial modulation. IEEE Commun. Lett. 2015, 19, 1544–1547. [Google Scholar] [CrossRef]
  25. Wu, Y.; Wen, C.K.; Xiao, C.; Gao, X.; Schober, R. Linear Precoding for the MIMO Multiple Access Channel with Finite Alphabet Inputs and Statistical CSI. IEEE Trans. Wirel. Commun. 2015, 14, 983–997. [Google Scholar] [CrossRef]
  26. Luo, J.; Wang, H.; Wang, F.; Wang, S. Secure spatial modulation via radio frequency mirrors. IEEE Trans. Veh. Technol. 2020, 69, 9168–9173. [Google Scholar] [CrossRef]
  27. Ciuonzo, D.; Aubry, A.; Carotenuto, V. Rician MIMO Channel- and Jamming-Aware Decision Fusion. IEEE Trans. Signal Process. 2017, 65, 3866–3880. [Google Scholar] [CrossRef]
  28. Shariati, N.; Bengtsson, M. On the performance of Kronecker MIMO channel models: A semi-definite relaxation approach. In Proceedings of the 2011 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 9–11 November 2011; pp. 1–6. [Google Scholar]
  29. Hemadeh, I.A.; Satyanarayana, K.; El-Hajjar, M.; Hanzo, L. Millimeter-Wave Communications: Physical Channel Models, Design Considerations, Antenna Constructions, and Link-Budget. IEEE Commun. Surv. Tuts. 2018, 20, 870–913. [Google Scholar] [CrossRef]
  30. Altheeb, F.; Elshafiey, I.; Altamimi, M.; Sheta, A.F. Customized millimeter wave channel model for enhancement of next-generation UAV-aided internet of things networks. Sensors 2024, 24, 1528. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The downlink UAV system employing AN-GSDM.
Figure 1. The downlink UAV system employing AN-GSDM.
Drones 09 00199 g001
Figure 2. The secrecy rate of AN-GSDM under different precoding and power-control factors.
Figure 2. The secrecy rate of AN-GSDM under different precoding and power-control factors.
Drones 09 00199 g002
Figure 3. The secrecy rate of AN-GSDM under different precoding and power-control factors.
Figure 3. The secrecy rate of AN-GSDM under different precoding and power-control factors.
Drones 09 00199 g003
Figure 4. The achievable rates at Bob and Eve under different precoding and power-control factors for AN-GSDM.
Figure 4. The achievable rates at Bob and Eve under different precoding and power-control factors for AN-GSDM.
Drones 09 00199 g004
Figure 5. The achievable rates at Bob and Eve under different precoding and power-control factors for AN-GSDM.
Figure 5. The achievable rates at Bob and Eve under different precoding and power-control factors for AN-GSDM.
Drones 09 00199 g005
Figure 6. The secrecy rate of AN-GSDM under different channel models: Rician channel and Kronecker channel.
Figure 6. The secrecy rate of AN-GSDM under different channel models: Rician channel and Kronecker channel.
Drones 09 00199 g006
Figure 7. The secrecy rate of AN-GSDM under different channel models: SV channel with ULA and CDL channel.
Figure 7. The secrecy rate of AN-GSDM under different channel models: SV channel with ULA and CDL channel.
Drones 09 00199 g007
Figure 8. The secrecy rate under the scenario of a moving UAV with processing delay and angular estimation errors.
Figure 8. The secrecy rate under the scenario of a moving UAV with processing delay and angular estimation errors.
Drones 09 00199 g008
Figure 9. The secrecy rate under the scenario of a moving UAV with processing delay and angular estimation errors.
Figure 9. The secrecy rate under the scenario of a moving UAV with processing delay and angular estimation errors.
Drones 09 00199 g009
Figure 10. The secrecy rate achieved by the proposed algorithm under different iteration numbers.
Figure 10. The secrecy rate achieved by the proposed algorithm under different iteration numbers.
Drones 09 00199 g010
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, X.; Xiang, Y.; Zhou, J.; Luo, Y.; Du, Q.; Hou, D.; Tian, J. Physical-Layer Security Enhancement for UAV Downlink Communication Using Joint Precoding and Artificial Noise Design in Generalized Spatial Directional Modulation. Drones 2025, 9, 199. https://doi.org/10.3390/drones9030199

AMA Style

Li X, Xiang Y, Zhou J, Luo Y, Du Q, Hou D, Tian J. Physical-Layer Security Enhancement for UAV Downlink Communication Using Joint Precoding and Artificial Noise Design in Generalized Spatial Directional Modulation. Drones. 2025; 9(3):199. https://doi.org/10.3390/drones9030199

Chicago/Turabian Style

Li, Xianglu, Youyang Xiang, Jie Zhou, Ying Luo, Qilong Du, Dong Hou, and Jie Tian. 2025. "Physical-Layer Security Enhancement for UAV Downlink Communication Using Joint Precoding and Artificial Noise Design in Generalized Spatial Directional Modulation" Drones 9, no. 3: 199. https://doi.org/10.3390/drones9030199

APA Style

Li, X., Xiang, Y., Zhou, J., Luo, Y., Du, Q., Hou, D., & Tian, J. (2025). Physical-Layer Security Enhancement for UAV Downlink Communication Using Joint Precoding and Artificial Noise Design in Generalized Spatial Directional Modulation. Drones, 9(3), 199. https://doi.org/10.3390/drones9030199

Article Metrics

Back to TopTop