Next Article in Journal
Explainable Fault Classification and Severity Diagnosis in Rotating Machinery Using Kolmogorov–Arnold Networks
Previous Article in Journal
Local Equilibrium Approximation in Non-Equilibrium Thermodynamics of Diffusion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Wireless Communication for Correlated Legitimate User and Eavesdropper Channels via Movable-Antenna Enhanced Frequency Diverse Array

1
School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
2
Laboratory of Electromagnetic Space Cognition and Intelligent Control, Beijing 100083, China
3
Tianfu Jiangxi Laboratory, Chengdu 641419, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(4), 401; https://doi.org/10.3390/e27040401
Submission received: 2 March 2025 / Revised: 23 March 2025 / Accepted: 28 March 2025 / Published: 9 April 2025
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
Physical-layer (PHY) security is widely used as an effective method for ensuring secure wireless communications. However, when the legitimate user (LU) and the eavesdropper (Eve) are in close proximity, the channel coupling can significantly degrade the secure performance of PHY. Frequency diverse array (FDA) technique addresses channel coupling issues by introducing frequency offsets among array elements. However, FDA’s ability to secure communication relies mainly on frequency domain characteristics, lacking the spatial degrees of freedom. The recently proposed movable antenna (MA) technology serves as an effective approach to overcome this limitation. It offers the flexibility to adjust antenna positions dynamically, thereby further decoupling the channels between LU and Eve. In this paper, we propose a novel MA-FDA approach, which offers a comprehensive solution for enhancing PHY security. We aim to maximize the achievable secrecy rate through the joint optimization of all antenna positions at the base station (BS), FDA frequency offsets, and beamformer, subject to the predefined regions for antenna positions, frequency offsets range, and energy constraints. To solve this non-convex optimization problem, which involves highly coupled variables, the alternating optimization (AO) method is employed to cyclically update the parameters, with the projected gradient ascent (PGA) method and block successive upper-bound minimization (BSUM) method being employed to tackle the challenging subproblems. Simulation results demonstrate that the MA-FDA approach can achieve a higher secrecy rate compared to the conventional phased array (PA) or fixed-position antenna (FPA) schemes.

1. Introduction

Physical-layer (PHY) security techniques have been extensively researched as an effective approach to achieve secure wireless communications [1]. Unlike traditional cryptographic methods, PHY security techniques provide confidentiality at the PHY level without relying on mathematical encryption [2]. Transmit beamforming is one of the most widely used methods for ensuring PHY security [3,4,5]. The security is achieved by improving the reception quality for legitimate user (LU) or jamming the reception of eavesdropper (Eve) through beamforming [6]. However, when the LU and the Eve are in close proximity, the angle of them are nearly the same. In such cases, conventional beamforming techniques, such as phased array (PA), encounter significant challenges, as the LU and Eve experience highly correlated channels [7], since the beampattern of conventional beamforming techniques is angle-dependent.
In contrast, the characteristics of frequency diverse array (FDA) are inherently suited to addressing channel coupling issues [8]. FDA introduces small frequency offsets across the array elements, resulting in cumulative phase lags among the array antennas [9]. Unlike the fixed lags in PA, FDA generates an angle–range–time-dependent beampattern, which facilitates channel decoupling between LU and Eve when their angles are similar [10]. By exploiting this capability, we can effectively differentiate the received signal levels of the LU and Eve, even when they are geographically close. However, the array configuration of FDA is fixed, limiting the system’s ability to dynamically adjust spatial correlation across different steering angles. This spatial limitation reduces its effectiveness in maintaining a high secrecy rate, as the spatial correlation between desired and undesired users cannot be easily mitigated by altering the antenna positions. To overcome this challenge, the recently proposed movable antenna (MA) technology is employed in this system. It is an effective method to utilize channel variation in a continuous spatial field [11]. Specifically, an MA is connected to the radio frequency (RF) chain via a flexible cable [12]. By allowing the flexible adjustment of antenna positions within a specified area, MA introduces an additional spatial degree of freedom [13]. This flexibility enables the modification of steering vectors for different angles, reconfiguring wireless channels to further decouple them and enhance PHY security [14]. FDA decouples the channels of the LU and Eve by the frequency domain capabilities, while MA achieves decoupling by leveraging spatial flexibility. By employing both FDA and MA technologies, it is possible to tackle the channel coupling challenges through multidimensional channel reconstruction.
This paper explores the utilization of the MA-FDA approach to enhance secure communication from an MA-FDA-enabled base station (BS) to a single-antenna user, considering the presence of a single-antenna eavesdropper. We aim to maximize the achievable secrecy rate through the joint optimization of antenna positions at the BS, the FDA frequency offsets and beamformer. An alternating optimization (AO) algorithm is developed to solve the formulated highly non-convex problem.
The main contributions of this work can be summarized as follows:
  • We propose the idea of employing MA and FDA to achieve PHY security. FDA can decouple the channels between the proximal LU and Eve through frequency domain capabilities. MA further enhances the decoupling performance by providing spatial degrees of freedom that compensate for the limitations of FDA. The proposed MA-FDA approach maximizes PHY security through multidimensional channel reconstruction, thereby achieving a higher secrecy rate.
  • To address this idea, we formulate a secrecy rate maximization problem by jointly optimizing the positions of antennas, FDA frequency offsets, and beamforming vectors, subject to the predefined regions for antenna positions, frequency offsets range and energy constraints. The proposed formulation fully exploits the spatial and frequency degrees of freedom in the MA-FDA system, thereby significantly enhancing PHY security.
  • The secrecy rate maximization problem is a non-convex problem involving coupled variables. To solve this difficult problem, the proposed problem is partitioned into several subproblems. An algorithm is then designed using the AO method [15] to iteratively update the parameters, specifically the antenna positions, FDA frequency offsets, and beamformers. However, as these subproblems remain difficult to solve, we employ the projected gradient ascent (PGA) method and block a successive upper-bound minimization (BSUM) method to handle them.

1.1. Related Works

Previous studies have highlighted the significant potential of MA array-enabled communications [16]. The authors in [17] demonstrated that the angle estimation performance in wireless sensing is fundamentally dictated by array geometry and proposes a system with a MA array, allowing flexible antenna positioning to enhance performance. Ref. [18] introduces MA technology to wireless surveillance for the first time and proposes two schemes to determine locally optimal and suboptimal antenna positions. Ref. [19] proposes an RIS-assisted MA system to enhance the sum-rate performance and employs an adaptive fractional programming quadratic transform algorithm based on a genetic algorithm (FPQT-GA) to analyze the system. In [12], the authors investigated the MA-enhanced multiple-access channel (MAC) for the uplink transmission from multiple users and optimizes it using the proposed multi-directional descent (MDD) framework. Additionally, several related studies in the field of secure communications are worth mentioning. In [20], the authors proposed a joint optimization of beamforming and MA positioning at the BS to minimize total transmit power, subject to each user meeting the required minimum signal-to-interference-plus-noise ratio (SINR). In [21], a novel MA-enhanced multiple-input–multiple-output (MIMO) system was proposed to leverage the associated spatial degrees of freedom to improve wireless communication performance. Additionally, there are a few related works on MA-based secure communication. In [22], MA array-assisted PHY security was achieved through jointly optimizing the transmit beamforming and positions of all antennas. Ref. [23] proposed an MA-enabled secure transmission scheme with power consumption minimization and secrecy rate maximization. In [24], a covert communication system empowered by MA array is proposed, and the transmit beamforming and antenna position design problem is solved by an alternative algorithm. However, these works did not address the case that the channels of the LU and Eve exhibit a strong correlation, such as when the LU and Eve are in close proximity.
The angle–range–time-dependent characteristics of FDA can be employed for PHY secure communication [25,26,27]. Several studies on FDA-based secure communication are noteworthy.The authors in [28,29,30] studied the artificial noise (AN)-aided techniques that impose AN on Eve without adversely affecting the signal-to-noise-ratio (SNR) at LU. In [31], the authors employed FDA to develop an orthogonal frequency-division multiplexing (OFDM) transmitter that has the capability to achieve PHY security. Direction-dependent communications proposed in [32] used two-bit phase control across a two-element FDA antenna, which offers PHY security for wireless communications. In [33], a covert wireless communication scheme was proposed utilizing a random frequency diverse array, considering two scenarios in which the user’s location is either known or unknown to eavesdropper. In [34], the authors proposed a 3D directional modulation (DM) scheme utilizing randomized radiation with FDSA to enhance PLS. The approach employs a planar array, and a genetic algorithm (GA)-based optimization strategy is applied. However, the use of FDA with fixed-position antenna (FPA) still limits secure communication performance, due to the inherent spatial correlation across different steering angles [22]. Consequently, the proposed MA-FDA approach addresses the significant channel coupling challenges of proximal LU and Eve case, which is completely different from existing works.

1.2. Organization and Notations

The remainder of this paper is organized as follows. In Section 2, we describe the MA-FDA system model, and formulate the secrecy rate maximization problem. The proposed AO algorithm is presented in Section 3. Section 4 provides numerical simulations to validate the efficacy of the proposed AO algorithm. Finally, we conclude this paper in Section 5.
Notations: Italic letters represent scalars, Boldface uppercase denote matrices, and lowercase letters indicate vectors. ( · ) and ( · ) H represent transpose and Hermitian of ( · ) , respectively. C M × N and R M × N are used to indicate complex and real M × N matrices, respectively. · and · round the argument to the nearest integer towards and , respectively.

2. System Model and Problem Statement

2.1. System Model

We consider a secure transmission system consisting of an MA-FDA-enabled BS, a single-antenna LU, and a single-antenna Eve, as shown in Figure 1. The position of Eve can be obtained through sensing techniques such as beamforming scanning and direction estimation. To enhance the quality of secure communications, the BS employs a multi-antenna linear MA and FDA technologies to ensure the secure transmission of confidential information to the LU despite the presence of Eve.
The position of the mth antenna at BS is defined as x m , m = 1 , 2 , , M , where M denotes the total number of antennas. Unlike traditional PA, FDA utilizes small frequency offsets Δ f m m = 1 M across the array antennas. We assume that 0 Δ f m Δ F and Δ F f c , with Δ F and f c representing the frequency offsets upper bound and carrier frequency, respectively. As illustrated in Figure 1, the radiation frequency for the mth antenna is f m = f c + Δ f m , m = 1 , 2 , , M . To prevent aliasing effects, the distance between antennas should satisfy d m d m , m i n = c / ( 2 f m ) for frequency f m , where c represents the speed of light in free space. Taking comprehensive consideration, the upper bound of antenna spacing is d m i n = min m d m = c / [ 2 ( f c + max m Δ f m ) ] c / ( 2 f c ) . Consequently, we deploy a linear MA array with an applicable antenna space, i.e., x m x k d m i n = c / ( 2 f c ) , 1 m k M .
Without loss of generality, we assume that the first antenna is positioned at the origin of the coordinate system. The response of the directional channel associated with the mth FDA antenna for the receiver in position ( r , θ ) at time t can be expressed as [35]
h m ( f m , r , θ , t , x m ) = e j 2 π f m t r x m s i n ( θ ) c ,
The FDA beampattern at time t is calculated by combining the channel responses of the M elements,
B ( f , r , θ , t , x m ) = m = 1 M h m ( f m , r , θ , t , x m ) = m = 1 M e j 2 π f m t r x m s i n ( θ ) c = e j 2 π f c t m = 1 M e j [ Φ m 0 ( r , θ , x m ) + Φ m 1 ( Δ f m , r , θ , t , x m ) ] .
where Φ m 0 ( r , θ , x m ) = 2 π f c r x m s i n ( θ ) c , Φ m 1 ( Δ f m , r , θ , t , x m ) = 2 π Δ f m t r x m s i n ( θ ) c , m , and f ( f 1 , f 2 , , f M ) .
It can be seen from Equation (2) that FPA is a particular case of the MA under consideration, i.e., when antenna positions { x m } m = 1 M are fixed, MA reduces to traditional FPA, consequently generating inherent spatial correlation across different angles. The flexibility of { x m } m = 1 M introduces additional spatial degrees of freedom, enabling better spatial diversity and multiplexing performance, thus having the potential to achieve a higher secrecy rate. Additionally, considering the characteristic imparted by the frequency offsets { Δ f m } m = 1 M of FDA, Equation (2) indicates that { Φ m 1 ( Δ f m , r , θ , t ) } m = 1 M depends on the frequency offsets { Δ f m } m = 1 M , the location ( r , θ ) , and the time t, besides { x m } m = 1 M . Consequently, the FDA beampattern exhibits angle–range–time-dependence for non-zero frequency offsets { Δ f m } m = 1 M due to the distinct accumulating phase lags among different antennas. When Δ f m = 0 for all m, FDA reverts to traditional PA, which is range–time-independent. Consequently, it is unable to effectively distinguish between the LU and Eve when their angles are similar, i.e., θ u θ e , where θ u and θ e represent the angles of LU and Eve, respectively, due to the strong correlation between channels. By introducing frequency offsets, the strong correlation between the channels of LU and Eve is mitigated. In the FDA beampattern, LU and Eve are effectively separated, thereby having the capacity to enhance PHY security. However, it is noteworthy that the selection of appropriate antenna positions and frequency offsets to ensure secure communication is a significant challenge. The beampattern peak and valley are influenced by antenna positions and frequency offsets, as shown in the complex Equation (2). Random choice often lead to unsatisfactory results, thus necessitating a deliberate selection of antenna positions and frequency offsets.

2.2. Problem Formulation

In order to fully explore the potential of the antenna array in ensuring PHY security, a novel MA-FDA beamforming strategy is devised by integrating MA with FDA. It should be emphasized that the time-dependent characteristics of the FDA channel and beampattern result in a time-varying beamforming solution, including the transmit beamformer.
The digital transmit beamforming of the BS for the confidential information at time t is defined as w ( t ) [ w 1 ( t ) , w 2 ( t ) , , w M ( t ) ] C M × 1 . The channel vector between the array and the receiver is h ( f , r , θ , t , x ) = [ h 1 ( f 1 , r , θ , t , x 1 ) , h 2 ( f 2 , r , θ , t , x 2 ) , , h M ( f M , r , θ , t , x M ) ] C M × 1 , where x = [ x 1 , x 2 , , x M ] R M × 1 . The SNR of the MA-FDA at time t is derived as
SNR ( f , x , w ) = σ 2 | h H ( f , r , θ , t , x ) w ( t ) | 2 .
Define ( r u , θ u ) and ( r e , θ e ) as the coordinates of the proximal LU and Eve, respectively. For convenience, we denote h u ( f , t , x ) and h e ( f , t , x ) as the response of the corresponding channels, i.e., h u ( f , t , x ) h ( f , r u , θ u , t , x ) and h e ( f , t , x ) h ( f , r e , θ e , t , x ) . For the signal transmitted at time t, the achievable rates at LU and Eve are defined as
R u ( f , x , w ) = log ( 1 + σ u 2 | h u H ( f , t , x ) w ( t ) | 2 ) ,
R e ( f , x , w ) = log ( 1 + σ e 2 | h e H ( f , t , x ) w ( t ) | 2 ) ,
where σ u and σ e are the noise powers corresponding to LU and Eve, respectively. Based on Equations (4a) and (4b), the achievable secrecy rate is given by
R sec ( f , x , w ) = log ( 1 + σ u 2 | h u H ( f , t , x ) w ( t ) | 2 ) log ( 1 + σ e 2 | h e H ( f , t , x ) w ( t ) | 2 ) + ,
where [ · ] + = max ( · , 0 ) . When R sec ( f , x , w ) < 0 , the system stops information transmission. Therefore, in the following analysis, we focus on the case that R sec ( f , x , w ) > 0 , i.e., the communication quality of LU is better than Eve.
We aim to maximize the secrecy rate through the joint optimization of the positions of the MA { x m } m = 1 M , FDA frequency offsets { Δ f m } m = 1 M and the transmit beamformer w . Consequently, the secrecy rate maximization problem leveraging MA-FDA beamforming can be expressed as
max f , x , w R sec ( f , x , w )
s . t . | x m x k | d m i n , 1 m k M
{ x m } m = 1 M [ 0 , L ] ,
f c Δ F f m f c + Δ F , m ,
w 2 2 P ,
where [ 0 , L ] is the range of MA, and L ( M 1 ) d must be satisfied, P is the power budget of BS. In the next section, an optimization algorithm is proposed to address the non-convex problem (6a)–(6e).

3. AO Algorithm for Problem (6a)–(6e)

Problem (6a)–(6e) is a challenge due to the beampattern gain being a complex non-convex function with coupled variables, namely f , x , w .
It is important to note that constraints (6b) and (6c) only involve the variable x for the antenna position optimization, constraint (6d) involves only the variable f for frequency offsets optimization, and constraint (6e) involves only the variable w for FDA beamformer design. Consequently, we can divide the optimization variables into three separate components, i.e., { f } , { x } , and { w } . By employing this division, an iterative algorithm can be designed to solve the problem (6a)–(6e). Specifically, we optimize problem (6a)–(6e) by iteratively solving three subproblems: i.e., update one of the three blocks while keeping the other two fixed, which are referred to as the { f } -subproblem, { x } -subproblem, and { w } -subproblem, respectively. This approach falls within the framework of the AO algorithm.

3.1. { f } -Subproblem

We update the frequency offsets f with given x and w .
max f R sec ( f ) s . t . ( 6 d ) is satisfied .
According to reference [36], the optimal secrecy rate for the multi-input, single-output, single-eavesdropper (MISOSE) secrecy design problem can be obtained using the method of generalized eigendecomposition, i.e.,
R sec * ( f ) = log ( 1 + max ( 0 , λ ( f , t ) ) ) ,
where λ ( f , t ) is the principal eigenvalue of Ψ ( f , t ) , and Ψ ( f , t ) = ( H e 1 2 ( f , t ) + 1 P I ) [ H u ( f , t ) H e ( f , t ) ] ( H e 1 2 ( f , t ) + 1 P I ) , H u ( f , t ) = σ u 2 h u ( f , t , x ) h u ( f , t , x ) , H e ( f , t ) = σ e 2 h e ( f , t , x ) h e ( f , t , x ) . Therefore, maximizing the principal eigenvalue λ ( f , t ) enables the achievement of PHY security. As a result, problem (7) is equivalent to the following formulation:
max f λ ( f , t ) s . t . ( 6 d ) is satified .
By analyzing the structure of the matrix Ψ ( f , t ) , we find that problem (9) is equivalent to decorrelating the channels of LU and Eve, represented by | h e ( f , t ) h u ( f , t ) | 2 . Consequently, the corresponding optimization problem for f can be formulated as
min f | h e H ( f , t ) h u ( f , t ) | 2 s . t . ( 6 d ) is satisfied .
And the objective can be written as
h e H ( f , t ) h u ( f , t ) 2 = m = 1 M e j 2 π ( f m ( m 1 ) x m ( sin θ e sin θ u ) c ) ) 2 = m = 1 M n = 1 N e j 2 π ( f m τ m f n τ n ) ,
where τ m = ( m 1 ) x m ( sin θ e sin θ u ) c , m . Utilizing Euler’s formula, the sum of two conjugate complex exponential terms can be reformulated as the sum of two cosine terms, i.e.,
h e H ( f , t ) h u ( f , t ) 2 = m = 1 M n = 1 N cos 2 π ( f m τ m f n τ n ) .
The corresponding problem is finally expressed as
min f m = 1 M n = 1 N cos 2 π ( f m τ m f n τ n ) s . t . ( 6 d ) is satified ,
Problem (13) is challenging due to its non-convex objective function. By exploiting the separability in Equation (6d), the subproblem of f can be further divided into M smaller problems, each associated with updating f m ,   f o r m = 1 , 2 , , M , respectively. According to the BSUM framework, each block is firstly approximated by a tight upper bound, and then optimized iteratively, with the other blocks held constant.
Without loss of generality, we focus on updating f m during the ith iteration. By fixing the remaining frequency variables, i.e., f n , n m , we have the corresponding subproblem,
min f m n = 1 n m M cos [ 2 π ( f m τ m f n i 1 τ n ) ] s . t . ( 6 d ) is satified ,
where f n i 1 denotes the value of f n in the previous iteration, with the superscript indicates the number of iterations.
The non-concave objective in problem (14) should be approximated by a tight upper bound. To this end, we first express the objective in problem (14) as
g m ( f m ; f m i 1 ) n = 1 n m M g ˜ m , n ( f m ; f n i 1 ) ,
g ˜ m , n ( f m ; f n i 1 ) cos [ 2 π ( f m τ m f n i 1 τ n ) ] , n m ,
where f m i 1 [ f 1 i 1 , , f m 1 i 1 , f m + 1 i 1 , , f M i 1 ] represents the remaining subvector of f i 1 after deleting f m i 1 from it. Next, the non-concave cos ( · ) function in g ˜ m , n ( f m ; f n i 1 ) is approximated using a concave quadratic function η ˜ m , n ( f m ; f m i 1 , f n i 1 ) , which is expressed as
η m ( f m ; f i 1 ) n = 1 n m M η ˜ m , n ( f m ; f m i 1 , f n i 1 ) ,
η ˜ m , n ( f m ; f m i 1 , f n i 1 ) κ m , n ( f m ζ m , n ) 2 + δ m , n , n m ,
where κ m , n R , ζ m , n R , and δ m , n R , n m , are the parameters of the quadratic function which must be carefully selected to ensure that η m ( f m ; f i 1 ) serves as a tight upper bound of g m ( f m ; f m i 1 ) . To this end, we require that
η ˜ m , n ( f m i 1 ; f m i 1 , f n i 1 ) = g ˜ m , n ( f m i 1 ; f n i 1 ) ,
η ˜ m , n ( f m i 1 ; f m i 1 , f n i 1 ) = g ˜ m , n ( f m i 1 ; f n i 1 ) ,
g ˜ m , n ( ζ m , n ; f n i 1 ) g ˜ m , n ( f m i 1 ; f n i 1 ) ,
g ˜ m , n ( ζ m , n ; f n i 1 ) { 1 , 1 } ,
ζ m , n f m i 1 < 1 2 τ m ,
where (17a) and (17b) ensure that η ˜ m , n ( f m i 1 ; f m i 1 , f n i 1 ) and g ˜ m , n ( f m i 1 ; f n i 1 ) are tight with each other and have the same derivative at f m = f m i 1 ; (17c) guarantees the upper bound condition; (17d) demonstrates that the quadratic function and the cos ( · ) function such that η ˜ m , n ( f m i 1 ; f m i 1 , f n i 1 ) is the optimal quadratic upper bound of g ˜ m , n ( f m i 1 ; f n i 1 ) ; (17e) restricts the distance between f m i 1 and ζ m , n to further satisfy the upper bound requirement.
Adhering to these constraints, { κ m , n , ζ m , n , δ m , n } should be selected based on the value of g ˜ m , n ( f m i 1 ; f n i 1 ) 2 π τ m sin [ 2 π ( f m i 1 τ m f n i 1 τ n ) ] . Specifically, the solution can be expressed as
if g ˜ m , n ( f m i 1 ; f n i 1 ) = 0 κ m , n = ( 1 + δ m , n ) π 2 τ m 2 , ζ m , n = f m i 1 , δ m , n = cos [ 2 π ( f m i 1 τ m f n i 1 τ n ) ] { 1 , 1 } ,
else κ m , n = π τ m sin [ 2 π ( f m i 1 τ m f n i 1 τ n ) ] f m i 1 ζ m , n , ζ m , n = ( f m i 1 τ m f n i 1 τ n ) + f n i 1 τ n τ m , if g ˜ m , n ( f m i 1 ; f n i 1 ) > 0 , ( f m i 1 τ m f n i 1 τ n ) + f n i 1 τ n τ m , if g ˜ m , n ( f m i 1 ; f n i 1 ) < 0 , δ m , n = cos [ 2 π ( f m i 1 τ m f n i 1 τ n ) ] κ m , n ( f m i 1 ζ m , n ) 2 ,
It is more clearly illustrated in Figure 2. There are four cases in which the c o s ( · ) is approximated:
  • Case 1: When g ˜ m , n ( f m i 1 ; f n i 1 ) = 0 and g ˜ m , n ( f m i 1 ; f n i 1 ) = 1 as shown in Figure 2a, η ˜ m , n ( f m ; f m i 1 , f n i 1 ) = 1 is a straight line;
  • Case 2: When g ˜ m , n ( f m i 1 ; f n i 1 ) = 0 and g ˜ m , n ( f m i 1 ; f n i 1 ) = 1 as shown in Figure 2b, η ˜ m , n ( f m ; f m i 1 , f n i 1 ) is formed as a quadratic function, symmetrical along f m i 1 ;
  • Case 3: When g ˜ m , n ( f m i 1 ; f n i 1 ) < 0 as shown in Figure 2c, η ˜ m , n ( f m ; f m i 1 , f n i 1 ) is formed as a quadratic function, which is symmetric about the first-right valley point of g ˜ m , n ( f m i 1 ; f n i 1 ) beside the tangential point;
  • Case 4: When g ˜ m , n ( f m i 1 ; f n i 1 ) > 0 as shown in Figure 2d, η ˜ m , n ( f m ; f m i 1 , f n i 1 ) is formed as a quadratic function, which is symmetric about the first-left valley point of g ˜ m , n ( f m i 1 ; f n i 1 ) beside the tangential point.
By substituting g m ( f m ; f m i 1 ) with η m ( f m ; f i 1 ) , problem (14) is approximated by
min f m n = 1 n m M κ m , n ( f m ζ m , n ) 2 + δ m , n s . t . ( 6 d ) is satified ,
which exhibits strong concavity, and thus f m has a unique solution given by
f m = n = 1 n m M κ m , n ζ m , n n = 1 n m M κ m , n f c Δ F f c + Δ F ,
where [ · ] f c Δ F f c + Δ F represents the projection onto [ f c Δ F , f c + Δ F ] . The complexity of the proposed approach is low, as each step involves a simple closed-form solution.

3.2. { x } -Subproblem

To facilitate the subsequent analysis, we adopt the real-valued form for the construction of our algorithm. The real-valued channel corresponding to the mth FDA antenna is defined as
k m real ( h m ( f m , r , θ , t , x m ) ) = cos ( 2 π f m t r x m sin ( θ ) c ) ,
q m imag ( h m ( f m , r , θ , t , x m ) ) = sin ( 2 π f m t r x m sin ( θ ) c ) ,
and weighting vector is defined as
v s . real ( w ( t ) ) ,
s imag ( w ( t ) ) .
Thus, the signal | h H ( f , r , θ , t , x ) w ( t ) | 2 can be derived as
h H ( f , r , θ , t , x ) w ( t ) 2 = k C k + q C q + 2 k D q y ( k , q ) ,
where C = v v + s s , D = v s s v , k = [ k 1 , k 2 , , k M ] , and q = [ q 1 , q 2 , , q M ] . To simplify the notations, we use k u , q u , y u ( k u , q u ) to represent the corresponding variable of LU, and k e , q e , y e ( k e , q e ) to represent the corresponding variable of Eve. Accordingly, the secrecy rate can be formulated as
Γ ( k u , q u , k e , q e ) log 2 ( 1 + σ u 2 y u ( k u , q u ) ) log 2 ( 1 + σ e 2 y e ( k e , q e ) ) .
As a result, for a given w and f , the { x } -subproblem can be expressed as
max x Γ ( k u , q u , k e , q e ) s . t . ( 6 d ) and ( 6 c ) are satisfied .
Notice that problem (25) remains non-convex because of the complexity of the objective function. In order to address the problem (25) and ensure that MA position solutions in each iteration are guaranteed to satisfy the constraint (6b) and (6c), we employ the PGA method to find a locally optimal solution [37]. Specifically, employing the PGA, the update rule for x is derived as
x i + 1 = x i + ρ x i Γ ( k u , q u , k e , q e ) ,
x i + 1 = P { x i + 1 , d , L } ,
where the superscript denotes the iteration number, i.e., x i represents the antenna positions in ith iteration, and x i + 1 is in ( i + 1 ) th iteration. P represents the projection operation, which ensures that the constraints (6b) and (6c) are satisfied. x i Γ ( k u , q u , k e , q e ) denotes the gradient of Γ ( k u , q u , k e , q e ) with respect to x i . ρ is the step size for gradient ascent.
Then, we compute the gradient x i Γ ( k u , q u , k e , q e ) , which is derived as
x i Γ ( k u , q u , k e , q e ) = 1 ln 2 × σ u 2 x i y u ( k u , q u ) 1 + σ u 2 y u ( k u , q u ) σ e 2 x i y e ( k e , q e ) 1 + σ e 2 y e ( k e , q e ) ,
where x i y u ( k u , q u ) and x i y e ( k e , q e ) are the gradient of y u ( k u , q u ) and y e ( k e , q e ) with respect to x i , which can be derived as
x m i y u ( k u , q u ) = y u ( k u , q u ) k u , m k u , m x m + y u ( k u , q u ) q u , m q u , m x m = 2 π f m sin ( θ u ) c sin ( 2 π f m t r u x m sin ( θ u ) c ) y u ( k u , q u ) k u , m + 2 π f m sin ( θ u ) c cos ( 2 π f m t r u x m sin ( θ u ) c ) y u ( k u , q u ) q u , m ,
x m i y e ( k e , q e ) = y e ( k e , q e ) k e , m k e , m x m + y e ( k e , q e ) q e , m q e , m x m = 2 π f m sin ( θ e ) c sin ( 2 π f m t r e x m sin ( θ e ) c ) y e ( k e , q e ) k e , m + 2 π f m sin ( θ e ) c cos ( 2 π f m t r e x m sin ( θ e ) c ) y e ( k e , q e ) q e , m ,
based on which we denote
Z u = diag 2 π f m sin ( θ u ) c sin ( 2 π f m t r u x m sin ( θ u ) c ) m = 1 M ,
Z e = diag 2 π f m sin ( θ e ) c sin ( 2 π f m t r e x m sin ( θ e ) c ) m = 1 M ,
G u = diag π f m sin ( θ u ) c cos ( 2 π f m t r u x m sin ( θ u ) c ) m = 1 M ,
G e = diag 2 π f m sin ( θ e ) c cos ( 2 π f m t r e x m sin ( θ e ) c ) m = 1 M ,
where diag ( · ) denote the diagonal operation. And it is easy to verify that
y u ( k u , q u ) k u , 1 , y u ( k u , q u ) k u , 2 , , y u ( k u , q u ) k u , M = 2 C k u + 2 D q u ,
y u ( k u , q u ) q u , 1 , y u ( k u , q u ) q u , 2 , , y u ( k u , q u ) q u , M = 2 C q u 2 D k u ,
y e ( k e , q e ) k e , 1 , y e ( k e , q e ) k e , 2 , , y e ( k e , q e ) k e , M = 2 C k e + 2 D q e ,
y e ( k e , q e ) q e , 1 , y e ( k e , q e ) q e , 2 , , y e ( k e , q e ) q e , M = 2 C q e 2 D k e .
Based on the above analysis, the following result is finally derived
x i y u ( k u , q u ) = Z u ( 2 C k u + 2 D q u ) + G u ( 2 C q u 2 D k u ) ,
x i y e ( k e , q e ) = Z e ( 2 C k e + 2 D q e ) + G e ( 2 C q e 2 D k e ) .
Next, x i Γ ( k u , q u , k e , q e ) can be computed as
x i Γ ( k u , q u , k e , q e ) = 1 ln 2 × σ u 2 ( Z u ( 2 C k u + 2 D q u ) + G u ( 2 C q u 2 D k u ) ) 1 + σ u 2 y u ( k u , q u ) σ e 2 ( Z e ( 2 C k e + 2 D q e ) + G e ( 2 C q e 2 D k e ) ) 1 + σ e 2 y e ( k e , q e ) .
To guarantee that the MA positions obtained in each iteration consistently satisfy the constraints (6b) and (6c), we employ the projection operation after performing gradient ascent. Without loss of generality, we assume that 0 x 1 x 2 x M L . Then, according to constraint (6b), we have x 2 x 1 d m i n , , x M 1 x M 2 d m i n , x M x M 1 d m i n . It is easy to verify that
x N x N 1 + d m i n x 1 + ( M 1 ) d m i n .
Furthermore, considering the constraint (6c), we have x m + ( M m ) d m i n L , m = 1 , 2 , , M . As a result, the feasible range for each x m can be expressed as
x 1 [ 0 , L ( M 1 ) d m i n ] ,
x m [ x m 1 + d m i n , L ( M m ) d m i n ] , m = 2 , , M .
In summary, the projection function is
P { x i + 1 , d m i n , L } : x 1 i + 1 = max ( 0 , min ( L ( M 1 ) d m i n , x 1 i + 1 ) ) , x m i + 1 = max ( x m 1 i + 1 + d m i n , min ( L ( M m ) d m i n , x m i + 1 ) ) , m = 2 , 3 , , M .
Utilizing x i Γ ( k u , q u , k e , q e ) and P { x i + 1 , d m i n , L } , the PGA method iteratively updates x i according to Equations (26a) and (26b) until problem (25) converges to a constant value.

3.3. { w } -Subproblem

We update the beamformer w with given x and f
max w R sec ( w ) s . t . ( 6 e ) is satisfied .
The { w } -subproblem can be rewritten as
max w 1 + w H A w 1 + w H O w
s . t . w 2 2 = P ,
where A = σ u 2 h u ( f , t , x ) h u H ( f , t , x ) and O = σ e 2 h e ( f , t , x ) h e H ( f , t , x ) .
Proposition 1.
We propose that (37a), (37b) and (36a) are equivalent.
Proof. 
The proof is relegated to Appendix A.    □
The optimal solution can be calculated as [36]
w * = P E m a x ,
where E m a x is the normalized eigenvector associated with the largest eigenvalue of the matrix ( O + 1 P I N ) 1 ( A + 1 P I N ) , I N represents the N × N identity matrix, and ( · ) 1 denotes the inverse operation.

3.4. Algorithm Summary

The AO algorithm to problem (6a)–(6e) is summarized as Algorithm 1. For the ith iteration, the complexity is detailed as follows:
  • { f m } -subproblem: O ( 2 M ) .
  • { x } -subproblem: the complexity of gradient computation and projection are O ( M 2 ) and O ( M ) , respectively.
  • { w } -subproblem: O ( M 3 ) .
As a result, the per-iteration computational complexity of Algorithm 1 is O ( 2 ( s 1 + 1 ) M + ( s 2 + 1 ) ( M 2 + M ) + M 3 ) .
Proposition 2.
Each step of Algorithm 1 generates a stationary point.
Proof. 
The proof is relegated to Appendix B.    □
Algorithm 1 AO approach for solving problem (6a)–(6e)
Initialize: 
f 0 , x 0 , w 0 , i = 0 .
  1:
Repeat:
  2:
i = i + 1 , s 1 = 0 , s 2 = 0 .
  • Updating { f }
  3:
      Repeat:
  4:
       s 1 = s 1 + 1 , m = ( s 1 mod M ) + 1 .
  5:
      Compute { κ m , n , k , ζ m , n , k , δ m , n , k } according to (18a) and (18b).
  6:
       f m s 1 n = 1 n m M κ m , n ζ m , n n = 1 n m M κ m , n f c Δ F f c + Δ F .
  7:
       f n s 1 f n s 1 1 , n m .
  8:
      Until converge
  9:
       { f i } = { f s 1 } .
  • Updating { x }
10:
      Repeat:
11:
       s 2 = s 2 + 1 .
12:
      Compute x s 2 Γ ( k u , q u , k e , q e ) according to (32).
13:
      Update { x s 2 } according to (26a) and (26b)
14:
      Until converge
15:
       { x i } = { x s 2 }
  • Updating { w }
16:
      Optimize the beamformer w i by (38).
17:
Until converge
Output: 
R

4. Numerical Simulations

In this section, we present numerical simulations to validate the effectiveness of our proposed MA-FDA approach in enhancing the secrecy performance. We validate the superiority of the proposed FDA approach over the PA approach and FPA schemes that lack optimized frequency offsets or antenna positions. These benchmark schemes include the following: (1) FPA with frequency offsets optimization (op-FDA), where the antenna positions is uniform linear distribution, i.e., x m = ( m 1 ) d , m ; (2) MA with random frequency offsets within the range of [ Δ F , Δ F ] ; (3) MA-PA approach; and (4) traditional PA approach, i.e., FPA-PA approach.
Unless stated otherwise, the following simulations assume that the carrier frequency is f c = 1 GHz, the maximum frequency offsets is Δ F = 10 5 f c = 10 KHz, and the coverage area of the MA array is [ 0 , L ] = [ 0 , 20 d ] . The noise power is set as σ u 2 = σ e 2 = 1 to normalize the power of large-scale channel fading. The positions of LU and Eve are given by ( r u , θ u ) = ( 1000 m, 30 ) and ( r e , θ e ) = ( 1000 m, 32 ) , respectively. Additionally, we set the step size for the PGA method as ρ = 0.01 , and the PGA stopping criterion as Γ ( k u i , q u i , k e i , q e i ) Γ ( k u i 1 , q u i 1 , k e i 1 , q e i 1 ) μ , and set μ = 10 3 . The BSUM stopping criterion is set as | h e ( f i , t ) h u ( f i , t ) | 2 | h e ( f i 1 , t ) h u ( f i 1 , t ) | 2 μ . The termination condition of Algorithm 1 is R s e c i R s e c i 1 ε , and ε = 10 3 .
Figure 3 illustrates the optimized positions of the MA array. It can be observed that, as opposed to the FPA array with immovable positions given by x FPA = [ 0 , d , , ( M 1 ) d ] , where d = c / ( 2 f c ) = 0.15 m, the spatial distribution of the MA array deviates from a simple uniform pattern. Although the movement region is larger for the MA array, it is crucial to recognize that the signal wavelength λ is quite small, particularly in mmWave frequency bands. As a result, the increase in distance is small, suggesting that the additional manufacturing costs are insignificant or even negligible.
Figure 4 shows the relationship between the secrecy rate and the antenna number M. It can be observed that a larger M results in higher secrecy rate, due to the improved angle discrimination capability of the array. Furthermore, the proposed MA-FDA approach outperforms other methods. In addition, when M is small, i.e., the array minimum range requirement ( M 1 ) d is smaller than L, and the mobility of the antenna is fully utilized. Consequently, the MA approaches outperform the FPA approaches. As the number of antennas M increase, the secrecy rates of FPA and MA approaches are becoming increasingly similar. And when M increases so that L is equal to the minimum required range for the antennas, the secrecy rates of FPA and MA are the same, since the mobility of the antenna can not be fully utilized.
Figure 5 shows a comparison of the secrecy rates for various Eve angles θ e . We fix r u = r e = 1000 m , θ u = 30 . When θ e = θ u = 30 , h u ( f , t , x ) and h e ( f , t , x ) exhibit linear correlation regardless of the value of f . Consequently, neither the FDA nor the conventional PA approach ensures PHY security. As θ e moves away from θ u , the effectiveness of both approaches begins to improve. Notably, the MA-FDA beamforming method surpasses the other approaches when θ e θ u . This enhanced performance is due to the optimization of frequency offsets and antenna positions, which effectively decouples the channels of the LU and Eve, regardless of their close positioning, thereby enhancing the secrecy rate.
Figure 6 provides a comparison of secrecy rates for the different upper bounds of frequency offset Δ F . The results indicate that the secrecy rate of the PA approach remains unchanged with different Δ F . In contrast, the secrecy rates of all FDA approaches increase as the frequency offset upper bound grows. However, achieving a large Δ F in practical applications is challenging owing to the necessity of phase coherence, gain anti-degradation, and signal decorrelation. Fortunately, the proposed MA-FDA approach still achieves strong performance even with a relatively small Δ F , such as Δ F = 10 5 f c .
Figure 7 depicts a comparison of secrecy rates for various antenna movement upper bound L. Notably, the FPA method is independent of L. In addition, the movement upper bound L constrains the antenna mobility in the MA approach. As L increases, the mobility of MA is improved. However, a larger L incurs additional costs. Therefore, L cannot be increased indefinitely, and it is necessary to select L reasonably to balance the cost and effectiveness.
The convergence performance of the AO algorithm is illustrated in Figure 8. Notably, the objective in the outer layer exhibits rapid increases in the first few iterations, converging to a constant without exceeding 25 iterations in all cases, demonstrating the computational efficiency of the proposed algorithms.

5. Conclusions

In this paper, we propose a novel approach to improve PHY security through multidimensional channel reconstruction. The main idea is to employ MA and FDA technologies within the system and jointly optimize the antenna positions of the MA, FDA frequency offsets and beamformer to decouple the channels of LU and Eve. We first formulate a secrecy rate maximization problem subject to physical and energy constraints. Then, we propose an AO algorithm that employs PGA and BSUM method to iteratively update parameters, and leads to a stationary solution as the final outcome. Simulation results demonstrate that the MA-FDA approach outperforms other related schemes that use only FDA or MA technology.

Author Contributions

Conceptualization, X.W., H.S. and J.L.; methodology, X.W., H.S. and J.L; software, X.W., Y.P. and W.X.; validation, X.W. and Y.P.; formal analysis, X.W. and J.L.; investigation, X.W. and W.X.; resources, X.W. and J.L.; data curation, X.W.; writing—original draft preparation, X.W.; writing—review and editing, X.W., H.S. and J.L.; visualization, H.S.; supervision, J.L.; project administration, X.W.; funding acquisition, J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Natural Science Foundation of China (NSFC) under Grant 62171110.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Acknowledgments

Thanks to the editor and all reviewers for their valuable comments.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
PHYPhysical-Layer
LULegitimate User
EveEavesdropper
BSBase Station
AOAlternating Optimization
PGAProjected Gradient Ascent
BSUMBlock Successive Upper-Bound Minimization
FDAFrequency Diverse Arrays
MAMovable Antenna
PAPhased Array
SINRSignal-to-Interference-Plus-Noise Ratio
FPAFixed Position Antenna

Appendix A. Proof of Proposition 1

Since the logarithmic function is monotonic, it is straightforward to demonstrate that maximizing (36a) is equivalent to maximizing (37a). Next, we prove that the optimal solution is attained when constraint (6e) holds with equality, i.e., w 2 2 = P . We prove it by contradiction. Define a ( w ) = Δ w H A w and o ( w ) = Δ w H O w . It is easy to verify that
1 + a ( w ) 1 + o ( w ) = 1 + o ( w ) + ( a ( w ) o ( w ) ) 1 + o ( w ) = 1 + a ( w ) o ( w ) 1 + o ( w ) .
Suppose the optimal solution is w * 2 2 < P , let w = w * , > 1 , and w 2 2 P , the objective value is
1 + a ( w ) o ( w ) 1 + o ( w ) = 1 + 2 a ( w ) 2 o ( w ) 1 + 2 o ( w ) > 1 + 2 a ( w ) 2 o ( w ) 2 + 2 o ( w ) = 1 + a ( w ) o ( w ) 1 + o ( w ) .
As a result, if w * 2 2 < P , we can increase w to improve the objective value. Therefore, the equalities in constraints (6e) must hold at the optimal solution of problem (36a), otherwise we can increase w to improve the objective value. Hence, (37a), (37b) and (36a) are equivalent.

Appendix B. Proof of Proposition 2

w is the optimal solution of the w -subproblem. In the following, we primarily analyze the convergence of the updates for the f -subproblem and x -subproblem.
According to (17a)–(17e), the convex quadratic function is designed to satisfy three key conditions: (i) concavity, (ii) adherence to the BSUM assumption, including tightness, identical-derivative, and continuity; and (iii) uniqueness of the solution. Additionally, the regularity condition holds naturally due to the smoothness of g m ( f m ; f m i 1 ) , while the upper bound condition can be verified by comparing derivatives. As a result, the requirements of [[38], Theorem 2] are all satisfied, ensuring that every limit point of the iterates produced by the BSUM algorithm is a stationary point.
Since the x -subproblem (25) is smooth and the gradient of Γ ( k u , q u , k e , q e ) is Lipschitz-continuous, applying the optimality condition of the projection yields:
Γ s 2 + 1 Γ s 2 β Γ s 2 2 ,
where β > 0 . This demonstrates that the objective function value decreases monotonically, i.e.,
Γ 1 > Γ 2 > > Γ ,
where Γ is a lower bound of Γ . Since Γ decreases monotonically and has a lower bound, it follows that
lim s 2 ( Γ s 2 + 1 Γ s 2 = 0 ) ,
combined with (A3), we have
lim s 2 ( Γ s 2 + 1 = 0 ) ,
This implies that the algorithm eventually converges to a stationary point.

References

  1. Liu, Y.; Chen, H.H.; Wang, L. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges. IEEE Commun. Surv. Tutor. 2017, 19, 347–376. [Google Scholar]
  2. Khan, W.U.; Lagunas, E.; Ali, Z.; Javed, M.; Ahmed, M.; Chatzinotas, S.; Ottersten, B.; Popovski, P. Opportunities for Physical Layer Security in UAV Communication Enhanced with Intelligent Reflective Surfaces. IEEE Wirel. Commun. 2022, 29, 22–28. [Google Scholar]
  3. Nguyen, V.D.; Duong, T.; Dobre, O.; Shin, O.S. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2609–2623. [Google Scholar]
  4. Li, X.; Wang, W.; Zhang, M.; Zhou, F.; Al-Dhahir, N. Robust Secure Beamforming for SWIPT-Aided Relay Systems with Full-Duplex Receiver and Imperfect CSI. IEEE Trans. Veh. Technol. 2020, 69, 1867–1878. [Google Scholar]
  5. Zhao, S.; Liu, J.; Shen, Y.; Jiang, X.; Shiratori, N. Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3775–3790. [Google Scholar] [CrossRef]
  6. Fu, H.; Feng, S.; Tang, W.; Ng, D.W.K. Robust Secure Beamforming Design for Two-User Downlink MISO Rate-Splitting Systems. IEEE Trans. Wirel. Commun. 2020, 19, 8351–8365. [Google Scholar]
  7. Lin, J.; Li, Q.; Yang, J.; Shao, H.; Wang, W.-Q. Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach. IEEE Trans. Inf. Forensics Secur. 2018, 13, 671–684. [Google Scholar]
  8. Bang, H.; Yan, Y.S.; Basit, A.; Wang, W.-Q.; Cheng, J. Radar Cross Section Characterization of Frequency Diverse Array Radar. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 460–471. [Google Scholar]
  9. Cheng, J.; Juhlin, M.; Jakobsson, A.; Wang, W.-Q. Designing Optimal Frequency Offsets for Frequency Diverse Array MIMO Radar. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 8104–8118. [Google Scholar]
  10. Liao, Y.; Zeng, G.; Luo, Z.; Liu, Q. Time-Variance Analysis for Frequency-Diverse Array Beampatterns. IEEE Trans. Antennas Propag. 2023, 71, 6558–6567. [Google Scholar]
  11. Zheng, J.; Zhang, J.; Du, H.; Niyato, D.; Sun, S.; Ai, B.; Letaief, K. Flexible-Position MIMO for Wireless Communications: Fundamentals, Challenges, and Future Directions. IEEE Wirel. Commun. 2023, 31, 18–26. [Google Scholar] [CrossRef]
  12. Zhu, L.; Ma, W.; Ning, B.; Zhang, R. Movable-Antenna Enhanced Multiuser Communication via Antenna Position Optimization. IEEE Trans. Wirel. Commun. 2024, 23, 7214–7229. [Google Scholar] [CrossRef]
  13. Zhu, L.; Ma, W.; Zhang, R. Movable-Antenna Array Enhanced Beamforming: Achieving Full Array Gain with Null Steering. IEEE Commun. Lett. 2023, 27, 3340–3344. [Google Scholar] [CrossRef]
  14. Ma, W.; Zhu, L.; Zhang, R. Multi-Beam Forming with Movable-Antenna Array. IEEE Commun. Lett. 2023, 28, 697–701. [Google Scholar] [CrossRef]
  15. Li, R.; Sun, S.; Tao, M. Ergodic Achievable Rate Maximization of RIS-Assisted Millimeter-Wave MIMO-OFDM Communication Systems. IEEE Trans. Wirel. Commun. 2023, 22, 2171–2184. [Google Scholar] [CrossRef]
  16. Zhu, L.; Ma, W.; Zhang, R. Movable Antennas for Wireless Communication: Opportunities and Challenges. IEEE Commun. Mag. 2023, 62, 114–120. [Google Scholar] [CrossRef]
  17. Ma, W.; Zhu, L.; Zhang, R. Movable Antenna Enhanced Wireless Sensing via Antenna Position Optimization. IEEE Trans. Wirel. Commun. 2024, 23, 16575–16589. [Google Scholar] [CrossRef]
  18. Liao, J.; Zhu, F.; Hu, G. Jamming-Assisted Wireless Information Surveillance with Movable Antenna. IEEE Commun. Lett. 2024, 28, 2739–2743. [Google Scholar] [CrossRef]
  19. Zhang, B.; Xu, K.; Xia, X.; Hu, G.; Wei, C.; Li, C.; Cheng, K. Sum-Rate Enhancement for RIS-Assisted Movable Antenna Systems: Joint Transmit Beamforming, Reflecting Design, and Antenna Positioning. IEEE Trans. Veh. Technol. 2025, 74, 4376–4392. [Google Scholar] [CrossRef]
  20. Wu, Y.; Xu, D.; Ng, D.W.K.; Gerstacker, W.; Schober, R. Movable Antenna-Enhanced Multiuser Communication: Jointly Optimal Discrete Antenna Positioning and Beamforming. In Proceedings of the GLOBECOM 2023—2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 4–8 December 2023; pp. 7508–7513. [Google Scholar]
  21. Chen, X.; Feng, B.; Wu, Y.; Ng, D.W.K.; Schober, R. Joint Beamforming and Antenna Movement Design for Moveable Antenna Systems Based on Statistical CSI. In Proceedings of the GLOBECOM 2023—2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 4–8 December 2023; pp. 4387–4392. [Google Scholar]
  22. Hu, G.; Wu, Q.; Xu, K.; Si, J.; Al-Dhahir, N. Secure Wireless Communication via Movable-Antenna Array. IEEE Signal Process. Lett. 2023, 31, 516–520. [Google Scholar] [CrossRef]
  23. Cheng, Z.; Li, N.; Zhu, J.; She, X.; Ouyang, C.; Chen, P. Enabling Secure Wireless Communications via Movable Antennas. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Seoul, Republic of Korea, 14–19 April 2023. [Google Scholar]
  24. Liu, P.; Si, J.; Cheng, Z.; Li, Z.; Hu, H. Movable-Antenna Enabled Covert Communication. IEEE Wirel. Commun. Lett. 2025, 14, 280–284. [Google Scholar] [CrossRef]
  25. Gui, R.; Huang, B.; Wang, W.; Sun, Y. Generalized Ambiguity Function for FDA Radar Joint Range, Angle and Doppler Resolution Evaluation. IEEE Geosci. Remote Sens. Lett. 2020, 19, 1–5. [Google Scholar] [CrossRef]
  26. Hasheminasab, M.; Cheldavi, A.; Kishk, A. Investigating Discular Frequency Diverse Arrays for Scanning Applications. In Proceedings of the 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Canary Islands, Spain, 19–21 July 2023; pp. 1–4. [Google Scholar]
  27. qin Wang, W. Frequency Diverse Array Auto-Scanning Beam Characteristics and Potential Radar Applications. IEEE Access 2022, 10, 85278–85288. [Google Scholar] [CrossRef]
  28. Gao, J.; Yuan, Z.; Zhou, J.; Qiu, B. Artificial-Noise-Aided Energy-Efficient Secure Multibeam Wireless Communication Schemes Based on Frequency Diverse Array. Wirel. Commun. Mob. Comput. 2020, 2020, 4715929. [Google Scholar] [CrossRef]
  29. Hu, J.; Yan, S.; Shu, F.; Wang, J.; Li, J.Y.; Zhang, Y. Artificial-Noise-Aided Secure Transmission with Directional Modulation Based on Random Frequency Diverse Arrays. IEEE Access 2016, 5, 1658–1667. [Google Scholar] [CrossRef]
  30. Ji, S.; Wang, W. Physical-Layer Security for Frequency Diverse Array Communication System over Nakagami-m Fading Channels. IEEE Syst. J. 2020, 14, 2370–2381. [Google Scholar] [CrossRef]
  31. Ding, Y.; Zhang, J.; Fusco, V. Frequency diverse array OFDM transmitter for secure wireless communication. Electron. Lett. 2015, 51, 1374–1376. [Google Scholar] [CrossRef]
  32. Nusenu, S.Y.; Wang, W.Q.; Ji, S. Secure directional modulation using frequency diverse array antenna. In Proceedings of the 2017 IEEE Radar Conference (RadarConf), Seattle, WA, USA, 8–12 May 2017; pp. 0378–0382. [Google Scholar] [CrossRef]
  33. Li, L.; Chen, Z.; Chen, R.; Yang, L.; Yan, S. Covert Wireless Communication with Random Frequency Diverse Array. IEEE Trans. Veh. Technol. 2024, 73, 1473–1478. [Google Scholar] [CrossRef]
  34. You, B.; Lee, I.H.; Jung, H.; Duong, T.Q.; Shin, H. Secure 3D Directional Modulation Using Subarrays Based on Planar Frequency Diverse Array with Nonuniform Frequency Offsets. IEEE Trans. Commun. 2024; early access. [Google Scholar] [CrossRef]
  35. Chen, K.; Yang, S.; Chen, Y.; Qu, S. Accurate Models of Time-Invariant Beampatterns for Frequency Diverse Arrays. IEEE Trans. Antennas Propag. 2019, 67, 3022–3029. [Google Scholar] [CrossRef]
  36. Khisti, A.; Wornell, G. Secure Transmission with Multiple Antennas I: The MISOME Wiretap Channel. IEEE Trans. Inf. Theory 2007, 56, 3088–3104. [Google Scholar]
  37. Ranjan, R.; Bhattacharya, A.; Mukhopadhyay, S.; Mishra, H.B. A Gradient Ascent Based Low Complexity Rate Maximization Algorithm for Intelligent Reflecting Surface-Aided OFDM Systems. IEEE Commun. Lett. 2023, 27, 2083–2087. [Google Scholar]
  38. Tseng, P. Convergence of a Block Coordinate Descent Method for Nondifferentiable Minimization. J. Optim. Theory Appl. 2001, 109, 475–494. [Google Scholar]
Figure 1. System model: (a) Close-proximity LU and Eve; (b) MA-FDA-based beamforming for PHY security.
Figure 1. System model: (a) Close-proximity LU and Eve; (b) MA-FDA-based beamforming for PHY security.
Entropy 27 00401 g001
Figure 2. Use a concave quadratic function to approximate cos ( · ) .
Figure 2. Use a concave quadratic function to approximate cos ( · ) .
Entropy 27 00401 g002
Figure 3. Optimized positions of the MA array.
Figure 3. Optimized positions of the MA array.
Entropy 27 00401 g003
Figure 4. Secrecy rate performance across different antenna number M.
Figure 4. Secrecy rate performance across different antenna number M.
Entropy 27 00401 g004
Figure 5. Secrecy rate performance across different Eve angle θ e .
Figure 5. Secrecy rate performance across different Eve angle θ e .
Entropy 27 00401 g005
Figure 6. Secrecy rate performance across different frequency offset upper bounds Δ F .
Figure 6. Secrecy rate performance across different frequency offset upper bounds Δ F .
Entropy 27 00401 g006
Figure 7. Secrecy rate performance across different antenna range L.
Figure 7. Secrecy rate performance across different antenna range L.
Entropy 27 00401 g007
Figure 8. Typical converging traces of AO algorithm.
Figure 8. Typical converging traces of AO algorithm.
Entropy 27 00401 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, X.; Shao, H.; Lin, J.; Pan, Y.; Xiong, W. Secure Wireless Communication for Correlated Legitimate User and Eavesdropper Channels via Movable-Antenna Enhanced Frequency Diverse Array. Entropy 2025, 27, 401. https://doi.org/10.3390/e27040401

AMA Style

Wu X, Shao H, Lin J, Pan Y, Xiong W. Secure Wireless Communication for Correlated Legitimate User and Eavesdropper Channels via Movable-Antenna Enhanced Frequency Diverse Array. Entropy. 2025; 27(4):401. https://doi.org/10.3390/e27040401

Chicago/Turabian Style

Wu, Xuehan, Huaizong Shao, Jingran Lin, Ye Pan, and Weijie Xiong. 2025. "Secure Wireless Communication for Correlated Legitimate User and Eavesdropper Channels via Movable-Antenna Enhanced Frequency Diverse Array" Entropy 27, no. 4: 401. https://doi.org/10.3390/e27040401

APA Style

Wu, X., Shao, H., Lin, J., Pan, Y., & Xiong, W. (2025). Secure Wireless Communication for Correlated Legitimate User and Eavesdropper Channels via Movable-Antenna Enhanced Frequency Diverse Array. Entropy, 27(4), 401. https://doi.org/10.3390/e27040401

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop