Performance Analysis of Artificial Noise-Assisted Location-Based Beamforming in Rician Wiretap Channels

This paper studies the performance of location-based beamforming with the presence of artificial noise (AN). Secure transmission can be achieved using the location information of the user. However, the shape of the beam depends on the number of antennas used. When the scale of the antenna array is not sufficiently large, it becomes difficult to differentiate the performance between the legitimate user and eavesdroppers nearby. In this paper, we leverage AN to minimize the area near the user with eavesdropping risk. The impact of AN is considered for both the legitimate user and the eavesdropper. Closed-form expressions are derived for the expectations of the signal to interference plus noise ratios (SINRs) and the bit error rates. Then, a secure beamforming scheme is proposed to ensure a minimum SINR requirement for the legitimate user and minimize the SINR of the eavesdropper. Numerical results show that, even with a small number of antennas, the proposed beamforming scheme can effectively degrade the performance of eavesdroppers near the legitimate user.


Introduction
Due to the broadcast nature of wireless networks, they face a variety of security threats.Passive eavesdropping is difficult to detect and prevent in wireless communication systems.Although legitimate users can engage in encrypted communication, the cost of secret key distribution is also significant.Physical layer security is promising to achieve secure transmission without key distribution.Physical layer security techniques include artificial noise, security-oriented beamforming, diversity-assisted security approaches, etc. [1][2][3].Their security is independent of the computational capability of eavesdroppers.The multiple-input multiple-output (MIMO) technique can be used to enhance transmission security thanks to the diversity gain of beamforming.
Based on the channel state information (CSI) of the legitimate user, beamforming can be achieved towards the desired user, with a power gain higher than that of other users in different locations [4,5].As more antennas are used at the base station, the beam becomes more concentrated.Moreover, artificial noise (AN) can be applied in the null space of the channel of the legitimate user to prevent potential eavesdropping [6][7][8][9].Closed-form expressions for the secure transmission probability and the effective secrecy throughput are derived in [10] for a Rayleigh fading channel.The impact of the imperfect CSI is considered in [11].A two-phase transmission scheme with AN injection is proposed in [12] to achieve zero secrecy outage probability under imperfect channel estimation.By assuming that the statistical CSI of the eavesdropper is also available at the base station [13][14][15][16], secure beamforming schemes have been proposed where the secrecy rate is maximized.Moreover, under the assumption that the CSIs of both the legitimate user and the eavesdropper are available at the base station, a secrecy capacity optimization artificial noise is proposed in [17], which is not aligned into the null space of the legitimate channel.
However, the CSI of the user is difficult to obtain by the base station in certain scenarios, such as when the user has not yet connected to the network.In addition, after the user has connected to the network, an eavesdropper can also disrupt beamforming and achieve eavesdropping through pilot contamination attacks [18][19][20].For millimeter wave (mmWave) systems, the estimation of CSI requires a huge overhead for channel training [21].
Therefore, some works consider using alternative user information for beamforming, such as statistical CSI [13,15,16] and location information [21][22][23][24][25].In certain scenarios, the location information of the user could be available.For example, the legitimate user is within a confidential area and dedicated networks can only be accessed within this area.We hope that users outside the confidential area cannot eavesdrop on the information of the dedicated network, because attackers can launch jamming, spoofing [26], or distributed denial-of-service attacks based on the network information.Location-based beamforming can be used to protect the dedicated networks.
The performance of location-based beamforming has been studied in [22] in Rician wiretap channels.Based on the location information of the legitimate user and the eavesdropper, the optimal location-based beamformer has been determined for the legitimate user through a grid search algorithm, which minimizes the secrecy outage probability of the system.Due to the absence of AN, eavesdroppers near legitimate users have a high secrecy outage probability when the number of antennas at the base station is small.The authors in [23] considered a wiretap system with the presence of a jammer.By assuming that the CSI of the legitimate user is known to the base station and the jammer, while the location of the eavesdropper is also available at the base station, the optimal beamformer that minimizes the secrecy outage probability has been proposed.Because the CSI between the legitimate user and the jammer is known, the AN signal is transmitted in the null space of the channel of the legitimate user.The authors of [25] studied the covert threat region of three-dimensional (3D) location-based beamforming, and the covertness performance for resisting detection from a location-unknown warden has been evaluated and compared with that of the conventional maximal ratio transmitting scheme.
In this paper, we study the performance of location-based beamforming with the assistance of AN.Based on the location information of the legitimate user, we minimize the area near the user that has eavesdropping risks.Hence, the eavesdropping performance of eavesdroppers at different locations next to the user has been studied.The impact of AN has been considered for both the legitimate user and the eavesdropper.The main contributions of this paper can be summarized as follows: 1.
Based on the location information of the legitimate user and the eavesdropper, the signal to interference plus noise ratio (SINR) expressions have been derived for both the user and the eavesdropper, and the impact of AN has been considered.Close approximations of the probability density functions (PDFs) of SINRs have been proposed for Rician channels.

2.
The expectations of SINRs have been derived in closed-form expressions.Moreover, the bit error rate (BER) expressions are derived using Gaussian-Laguerre (GL) approximation.

3.
A quality of service (QoS)-based beamforming scheme is proposed to minimize the SINR of the eavesdropper and ensure the minimum SINR requirement of the legitimate user.Simulation results show that, when eight antennas are used at the base station, the block error rate (BLER) of eavesdroppers located 5 • away from the legitimate user reaches 1.
Some works in the literature considered using ergodic secrecy rate [16,27] or secrecy outage probability [22,28] to design a secure transmission strategy.The ergodic secrecy rate refers to the difference in ergodic rate between the legitimate user and the eavesdropper.Ref. [16] proposed a power allocation algorithm for a discrete Fourier transform (DFT) beamforming matrix to maximize the ergodic secrecy rate.A deep neural network (DNN)-based secure precoding scheme is proposed in [29] to jointly design the precoder and AN signal when the channel estimation is imperfect and the channels are spatially correlated.Because the secrecy rate cannot be arbitrary values in real systems, the authors in [22,28] minimize the secrecy outage probability when a specific target secrecy rate is chosen.However, maximizing the secrecy rate does not imply that the capacity of the eavesdropper is sufficiently small.Due to the application of error correcting code (ECC) in the communication systems, an eavesdropper can successfully decode the information when the minimum SINR requirement is satisfied.To reduce the risk of eavesdropping, we consider maximizing the BLER of the eavesdropper by minimizing the SINR of the eavesdropper.QoS-based transmit beamforming has proven to be a viable and versatile approach [30].The QoS is measured by the average SINR.Two design formulations are proposed in [30] for AN-aided secret transmit beamforming, namely a total power minimization formulation and a user's SINR maximization formulation.The signal-to-noise ratio (SNR) outage probability criterion is proposed in [31].In this paper, based on the error correction capability of ECC, a beamforming design scheme is proposed to minimize the SINR of an eavesdropper and maintain the minimum SINR requirement of the legitimate user.The performance of the proposed scheme is verified through simulations using Polar code [32].
Location-based beamforming can be implemented with low-cost at an analog beamforming module.Analog circuits can significantly improve the power efficiency of the device compared to digital circuits [33].Due to the non-linear characteristics of power amplifiers, it is not suggested to adjust the amplitude of the signals for beamforming use at the radio frequency (RF) module [34].The location-based beamformer only shifts the phase of the signal without changing its modulus, which can be considered as a phaseadjusted DFT beamformer.DFT codebook can be embedded on field-programmable analog arrays [33] with reduced power consumption.We note that when the system operates at mmWave band with an extremely large-scale antenna array (ELAA), near-field propagation needs to be considered [35].Due to the spherical wavefront of near-field radiation, the DFT type beamforming is no longer applicable [36,37].Secure beamforming with ELAA can be considered for our future work.
The rest of this paper is organized as follows.Section 2 introduces the system model, where the SINR expressions of the legitimate user and the eavesdropper are derived.In Section 3, the approximate PDFs of the SINRs are derived, and then the expectations of the SINRs and the BERs are deduced.In Section 4, the beamforming design scheme is proposed to minimize the SINR of the eavesdropper.The simulation results are presented in Section 5. Section 6 concludes this paper.

System Model
We consider a typical wiretap scenario, where a base station Alice and an eavesdropper Eve are equipped with uniform linear arrays (ULA) with M and N antenna elements, respectively.A legitimate user Bob is equipped with a single antenna.To facilitate the presentation of location for the users, we adopt the polar coordinate system and Alice is considered as the origin [22].Then, the locations of Bob and Eve can be denoted as (d ab , θ b ) and (d ae , θ e ), respectively.We assume that the location of Bob is known to Alice.To investigate the impact of Eve's location on eavesdropping performance, we assume that the location of Eve is also known to Alice.Then, an optimal beamforming scheme can be designed using AN.In the case where the location of Eve is unknown to Alice, the beamforming scheme can still be used to minimize the area with eavesdropping risk.We note that the CSIs of Bob and Eve are unknown to Alice.Based on the location information of Bob, Alice is able to transmit confidential information via a beam aiming to Bob.Moreover, Alice may transmit a jamming signal via another beam aiming to Eve.We assume that all of the channels are subject to quasi-static independent and identically distributed (i.i.d) Rician fading with different Rician K-factors, and that the K-factors are known to Alice via some a priori measurement campaigns.Hence, the channel vector from Alice to Bob, denoted as H b ∈ C 1×M , can be written as where K b is the Rician K-factor of H b , H o b ∈ C 1×M denotes the LOS component, and H r b ∈ C 1×M denotes the scattered component, the elements of which are assumed to be i.i.d.complex Gaussian random variables with zero mean and unit variance, i.e., H r b ∼ CN (0, I M ).Moreover, H o b can be written as where , f 0 is the carrier frequency, ρ a is the space between two adjacent antenna elements of the ULA of Alice, and c is the speed of propagation of the plane wave.When ρ a is equal to a half wavelength, i.e., ρ a = c 2 f 0 , we have τ a = π.Likewise, the channel matrix from Alice to Eve, denoted as H e ∈ C N×M , can be written as where K e is the Rician K-factor of H e , H o e ∈ C N×M denotes the LOS component, and H r e ∈ C N×M denotes the scattered component with i.i.d circularly-symmetric complex Gaussian random variables with zero mean and unit variance.Moreover, H o e can be written as where h e and h ae are the array responses at Eve and Alice, respectively, which can be written as h e = 1, e −jτ e cos(φ e ) , ..., e −j(N−1)τ e cos(φ e ) h ae = 1, e jτ a cos(θ e ) , ..., e j(M−1)τ a cos(θ e ) where τ e = 2π f 0 ρ e c , ρ e is the space between two adjacent antenna elements of the ULA of Eve and φ e is the direction of arrival from Alice to Eve.
The signal transmitted at Alice can be expressed as where s b is the normalized information signal, s AN is the normalized jamming signal, i.e., is the normalized beamformer for jamming signal, i.e., w b 2 = w AN 2 = 1, g b is the power allocated to the information signal, and g AN is the power allocated to the jamming signal.Without loss of generality, the total transmit power of Alice is normalized to 1 and hence we have Therefore, the signal received at Bob can be expressed as where n b represents the complex baseband thermal noise at Bob, such that n b ∼ CN 0, σ 2 b .Likewise, the signal received at Eve can be expressed as where n e represents the complex baseband thermal noise at Eve, such that n e ∼ CN 0, σ 2 e I N .
Then, the SINR at Bob can be written as • 2 denotes the square of the norm of a vector.

Performance Analysis
In this section, we first derive the PDF of the SINR for Bob and Eve, and then the expectation of the SINR and the BER performance can be deduced.

Distribution of the SINR
According to (1), we have The distribution of |H b w b | has been analyzed in [22] for a general w b .It has been shown that H o b w b is deterministic and H r b w b is a complex Gaussian random variable with zero mean and unit variance.Hence, |H b w b | follows a Rician distribution with the parameters [22]: The PDF of the Rician distribution involves the modified Bessel function of the first kind, which is difficult to derive.However, the Rician distribution can be closely approximated by Nakagami distribution [38], with the parameters m b = ( Kb + 1) 2 /(2 Kb + 1) and ω b = Ωb .Hence, ḡb |H b w b | 2 can be approximated by a gamma distribution with the PDF written as where ḡb ω b and Γ(•) is the gamma function.Furthermore, we have Because w b and w AN are independent, |H b w b | and |H b w AN | can be considered as independent.Hence, the PDF of SINR b can be obtained following a similar derivation as in [39] where U(a; b; x) is the confluent hypergeometric function of the second kind, which is defined as [39] U(a; b; For the case g AN = 0, we have For the SINR of the eavesdropper in (11), we have where H e,n is the n th row of H e which can be written as H o e,n + where h e,n is the n th element of h e , i.e., h e,n = e −j(n−1)τ e cos(φ e ) and H r e,n is the n th row of H  23) Because the rows of H e are independent from each other, the PDF of term  25) Therefore, the PDF of SINR e , denoted as p SINR e (γ), can be expressed by replacing α b , β b , α b,AN , and β b,AN with α e , β e , α e,AN , and β e,AN in (19).

Expectation of SINR
The expectation of SINR can be used to design a QoS-based beamforming scheme [30].Using the PDF of SINR in (19), the expectation of SINR for Bob can be derived as According to [40], we have the equation where For the case g AN = 0, the expectation of SINR for Bob can be derived using ([41], 3.326), such that Moreover, the expectation of SINR for Eve can be obtained by replacing α b , β b , α b,AN , and β b,AN with α e , β e , α e,AN , and β e,AN in ( 29) and (30).

BER Analysis
BER is an important metric for transmission performance.Based on the PDF of SINR in (19), the BER expression of Bob can be written as [39] The closed-form BER expression has been derived in [39] when the parameters α b and α b,AN are integers.Otherwise, the integration P e,b cannot be expressed in closed-form.In this paper, we use GL quadrature sum [43] to approximate the value of P e,b .GL quadrature sum approximation can be expressed as where t n and w n are the abscissas and weight factors for the GL integration, which can be tabulated ( [44], eq. ( 25.4.45)) or can be generated efficiently in software such as MATLAB R2020b.The accuracy of the GL quadrature sum increases with the number of terms N GL [44].Hence, with a change of variable γ = t β b , the integration P e,b can be expressed as The integration P e,b can be approximated by P e,b,GL , which can be expressed as ). (34)   It is shown in Section 5 that the approximation curves perfectly match numerical results for N GL = 300.
For the case g AN = 0, the BER expression can be derived using [45], such that where 2 F 1 (a, b; c; x) is the hypergeometric function ( [41], Ch. 9.1).
In this paper, the beamforming scheme is designed based on the QoS of Bob and Eve.Because ECC has been widely used in wireless communication systems, the redundancy of code allows the receiver to correct a limited number of error bits.Hence, the receiver can successfully decode the message when the minimum SINR requirement is satisfied.On the other hand, AN needs to be strong enough at the eavesdropper side to make the BLER of the eavesdropper close to 1.When the scale of the antenna array is not sufficiently large at Alice, it is difficult to differentiate the performance between Bob and Eve nearby.In order to minimize the area near Bob with eavesdropping risk, it is necessary to increase the AN at Eve as much as possible without affecting the BLER of Bob.Hence, the beamforming design formulation ensures a minimum SINR requirement of Bob, denoted as γb , while minimizing the SINR of Eve.In this case, the BLER of Eve is maximized.
We note that for each (ψ b , ψ AN ) pair, the resulted E[SINR b ] monotonically increases with g b .Hence, when there exists values of (ψ b , ψ AN , g b ) such that the corresponding E[SINR b ] ≥ γb , the values of ψ * b , ψ * AN , g * b can be approached through Algorithm 1. calculate w b and w AN using (36).calculate E[SINR b ] using (29)   5: g b,tmp = g b 7: calculate E[SINR e ] using ( 29) and the parameters of Eve end while 12: end for 13: Choose ψ * b , ψ * AN that achieve the minimum γ e,tmp , g * b takes the value of the corresponding g b,tmp .

Simulation Results
In this section, we first verify the analytical expressions derived above through simulations.Then, the performance of the proposed beamforming scheme Algorithm 1 is simulated for different θ e and M values.The channel parameters are set as K b = 10 dB and K e = 7 dB and the SNR of the system is SNR = 30 dB for both Bob and Eve.
The SINR expectation expression in ( 29) is tested at first assuming that θ b = 45 • and θ e = 46 • .Without beamforming optimization, we align the signal beam towards Bob and the AN beam towards Eve, i.e., w b = w(θ b ) and w AN = w(θ e ).The expectation of SINR b and SINR e is simulated for different M and g AN values and the results are presented in Figure 1.The theoretical values of the expectation of SINR are also displayed in lines.It can be seen that the theoretical curves perfectly match the simulation results.Additionally, due to the close proximity of Bob and Eve, it can be observed that when the number of antennas is small, i.e., M ≤ 16, the performance of Bob and Eve is almost the same, regardless of whether AN is used.This is because the beam is wide for these cases.As the number of antennas increases, the beam becomes more focused, and even without using AN, the performance of Bob and Eve becomes distinguishable.When AN is added, the performance of both Bob and Eve decreases, but the performance of Eve decreases more significantly.The simulation results show that, without beam optimization, a large number of antennas is required to differentiate the performance of Bob and Eve.
Moreover, based on the above assumptions, the BER performance of Eve is simulated for M = 64 and the results are presented in Figure 2 for different g AN values.The approximate BERs using GL quadrature sum with N GL = 300 are presented as continuous lines, which exhibit good accuracy compared to the simulation results.Moreover, it can be seen that as g AN increases, the BER of Eve increases rapidly.
Then, we test the performance of the proposed Algorithm 1 in preventing eavesdropping with a small scale of antennas.The locations of Bob and Eve remain unchanged.We set δ ψ = 1 • , δ g = 0.01 and γb = 10 dB.We test the performance of Eve at different locations, such that θ e ∈ [46 • , • • • , 50 • ].Assuming M = 8 and N ∈ {1, 2, 4, 8}, the expectations of SINR b and SINR e are simulated and the results are presented in Figure 3.We can see that the performance of Bob remains above the threshold γb = 10 dB, while the performance of Eve decreases when increasing the distance between Eve and Bob.Moreover, we note that when the number of antennas of Eve increases, the SINR of Eve actually decreases.This is because as the number of antennas N increases, the power of the desired signal and AN received by Eve both increase proportionally, resulting in a decrease in overall SINR.To clarify this point, the expectation of the power of the desired signal and AN received by Eve are displayed in Figure 4.It can be observed that as the number of receiving antennas doubles, the received power is also doubled.However, since the power of the desired signal and AN follow different distributions, the expected SINR changes with the number of receiving antennas.The corresponding BERs are also simulated and the results are presented in Figure 5.It is shown that the BER of Bob fluctuates around 10 −2 and the BER of Eve increases when increasing the distance between Eve and Bob.When there is 5 • difference between Eve and Bob, the BER of Eve reaches 0.37.Particularly, we note that the BER of the case N = 8 is lower than that of the case N = 1.This is in contrast to the trend exhibited by the expectation of SINR e in Figure 3.This is because when a MRC receiver is used at Eve, an increase in the number of receive antennas reduces the fading of the equivalent channel.Therefore, even though the average SINR of the case N = 8 is smaller than that of the case N = 1, its BER is still better than that of the N = 1 case, due to the diversity gain of the receive antenna array.For comparison purposes, the expectation of SINR e without using AN is simulated in the function of the location of Eve θ e , as shown in Figure 6.The shape of the beam can be observed for different M values.We note that as more antennas are used, the beam becomes narrower and the sidelobes become smaller.The BER performance of Eve without using AN is also simulated and the results are presented in Figure 7.It can be observed that when the number of antennas is relatively small, even if Bob and Eve are far apart, the BER of Eve remains at a low level, especially when Eve is on the peaks of the sidelobes.The results of this figure demonstrate the necessity of using AN to prevent eavesdropping.Moreover, the strategy for maximizing the ergodic secrecy rate [16] has also been simulated.The power allocation factors are optimized.The expectations of SINR b and SINR e are presented in Figure 8 and the BER results are shown in Figure 9.It can be observed that the difference in SINR between Bob and Eve has increased compared to Figure 3, but the BER of Eve decreases as the location of Eve becomes farther.This is because this strategy does not directly degrade the SINR of Eve.To clarify the impact of the Rician parameter, the case where K b = 14.8 dB is simulated to compare with the results of K b = 10 dB.The expectations of SINR b and SINR e are presented in Figure 10.We note that a higher K b value leads to a degradation in the performance of Eve.However, the trend of the eavesdropper's SINR decreasing as the location moves away from the user remains unchanged.Hence, the proposed algorithm can be applied for LoS channels with different K-factors to degrade the SINR performance of an eavesdropper.An example of the K-factor for different scenarios can be found in ( [46], Table 7.5-6).To illustrate the effectiveness of the proposed algorithm for minimizing the QoS of the eavesdropper, the BLER of Bob and Eve are simulated in Figure 11 using Polar code as the ECC.Polar code [32] is an emerging channel coding technique for 5 th generation (5G) mobile communication systems [47].Polar code has been adopted for enhanced mobile broadband (eMBB) control channels.We set the rate of the code R = 4, = 0.15, and the length of information as 128.It can be seen from Figure 11 that the BLER of Bob remains 0 and the BLER of Eve increases with θ e .When M = 8, the BLER of Eve reaches 1 for θ e = 50 • , which means that eavesdroppers beyond 5 • cannot decode the information.When the number of antennas reaches 32, eavesdroppers beyond 1 • also cannot decode the message.In the case where the location of Eve is unknown to Alice, Alice can design beamforming schemes using the location of Eve that results in a sufficiently low BLER for Eve.In this way, the chosen location of Eve and more distant areas are protected.For the region between Bob and the chosen location of Eve, additional surveillance measures can be employed to prevent eavesdropping.

Conclusions
This work investigated the performance of AN-assisted location-based beamforming in Rician wiretap channels.Assuming that the location information of the legitimate user and the eavesdropper is available at the base station, AN is used to interfere with eavesdroppers.The influence of the AN has been considered for both the legitimate user and the eavesdropper.Closed-form PDF approximations of the SINRs are derived.Moreover, the expressions of the expectations of the SINRs and the BERs are deduced.A secure beamforming scheme is proposed to ensure a minimum SINR requirement for the legitimate user and minimize the SINR of the eavesdropper.Numerical results show that the proposed beamforming scheme can effectively degrade the performance of nearby eavesdroppers even with a small number of antennas.When the base station has eight antennas, the BLER of the eavesdropper reaches 1 when the eavesdropper is located 5 • away from the legitimate user, while the BLER of the legitimate user remains 0. In the case where the location of the eavesdropper is unknown to the base station, the proposed beamforming scheme can still be used to minimize the area near the legitimate user with eavesdropping risk.When more antennas are used at the base station, the area with eavesdropping risk can be further reduced.

2 g= g b H e w b 2 g 1 ( 11 ) where g b = g b σ 2 e
Eve applies maximum ratio combining (MRC) to combine the signals received from different antennas, the SINR at Eve can be written as SINR e = g b H e w b AN H e w AN 2 + σ 2 e AN H e w AN 2 + and g AN = g AN σ 2 e , ) Similarly, we can obtain that ḡAN |H b w AN | 2 can also be approximated by a gamma distribution, with the parameters α b,AN = m b,AN and β b,AN = m b,AN ḡAN ω bAN where m r e .Hence, |h e,n h ae w b | = |h ae w b |, the PDF of |H e,n w b | 2 can be approximated by a gamma distribution with the parameters α e,n = m e and β e,n = m e /ω e where m e = (K e |h ae w b | 2 + 1) 2 2K e |h ae w b | 2 + 1 (

g b H e w b 2 can
also be approximated by a gamma distribution with the parameters α e = Nm e and β e = m e g e ω e .Moreover, the PDF of term g AN H e w AN 2 can also be approximated by a gamma distribution with the parameters α e,AN = Nm e,AN and β e,AN = m e,AN g e ω e,AN where m e,AN = (K e |h ae w AN | 2 + 1) 2 2K e |h ae w AN | 2 + 1 (

Figure 2 .
Figure 2. The simulated and approximate BERs of Eve for M = 64.

Figure 3 .
Figure 3.The expectation of SINR b and SINR e with optimal beamforming in the function of the location of Eve θ e .

Figure 4 .
Figure 4.The expectation of the power of the desired signal and AN received by Eve, with different numbers of receive antennas at Eve.

Figure 5 .
Figure 5.The simulated BERs of Eve in the function of the location of Eve θ e .

Figure 6 .
Figure 6.The expectation of SINR e without using AN in the function of the location of Eve θ e .

Figure 7 .
Figure 7.The simulated BERs of Eve without using AN in the function of the location of Eve θ e .

Figure 8 .
Figure 8.The expectations of SINR b and SINR e when the ergodic secrecy rate is maximized in the function of the location of Eve θ e .

Figure 9 .
Figure 9.The simulated BERs when the ergodic secrecy rate is maximized in the function of the location of Eve θ e .

Figure 10 .
Figure 10.The expectation of SINR b and SINR e for K b = {10, 14.8} dB in the function of the location of Eve θ e .

Figure 11 .
Figure 11.The simulated BLERs of Bob and Eve in the function of the location of Eve θ e .