1. Introduction
The vision of sixth-generation (6G) wireless communications [
1,
2,
3] heralds an era of truly pervasive and intelligent connectivity, where massive numbers of heterogeneous devices, sensors, and users are seamlessly integrated into a unified cyber–physical–digital continuum. Enabled by disruptive physical-layer technologies such as extremely large-scale multiple-input multiple-output (XL-MIMO), 6G networks fundamentally reshape conventional propagation assumptions by operating deep into the electromagnetic near-field regime [
4,
5,
6]. This paradigm shift profoundly alters the spatial characteristics of wireless channels and, in turn, the design philosophy of communication systems.
While such unprecedented connectivity promises transformative gains in spectral efficiency, reliability, and service diversity, it simultaneously amplifies the exposure of sensitive information to sophisticated eavesdropping threats inherent in densely connected and highly dynamic 6G environments [
7]. Consequently, ensuring information confidentiality can no longer rely solely on traditional security mechanisms. Instead, there is a compelling need to develop robust and intrinsically secure transmission strategies that explicitly account for the unique challenges posed by near-field propagation in MIMO-enabled 6G systems [
8].
Although significant advancements have been realized in the domain of far-field physical-layer secure communications, these solutions face fundamental limitations when extrapolated to the near-field regime. In far-field settings, directional modulation (DM) represents a cornerstone innovation, leveraging sophisticated beamforming techniques to confine signal energy within narrowly defined spatial regions [
9]. This targeted approach mitigated interception risks, as demonstrated in studies such as [
10,
11], which illustrated efficacy of DM in multi-user environments. Furthermore, efficiency-optimized designs, exemplified by the work in [
12], have underscored the critical role of phase shifter sequence engineering in augmenting security. Nevertheless, these methodologies presuppose planar wavefront characteristics, inherently constraining their utility to far-field conditions.
Augmenting DM techniques, artificial noise (AN) has emerged as a robust adjunct for far-field secure communication systems [
13]. AN disrupts eavesdroppers by introducing structured interference into null spaces of legitimate channels, thereby preserving the performance of authorized users. Research by [
14] highlighted the effectiveness of AN in thwarting eavesdropping attempts, while the work of [
15] has explored its integration with DM to bolster security. Furthermore, the authors of [
16] extended these frameworks through the joint incorporation of spatial and directional modulation alongside AN, achieving significant security and spectral efficiency gains under realistic channel conditions. However, such approaches remain intrinsically bounded by far-field approximations, rendering them inapplicable to the complex propagation characteristics of the near-field regime.
The deployment of ultra-large-scale antenna arrays introduces pronounced near-field effects, characterized by spherical wavefront propagation [
17]. These effects necessitate novel security paradigms, as traditional far-field algorithms fail to adequately address the challenges posed by near-field environments. Initial research efforts have sought to adapt DM and AN to exploit near-field spatial characteristics, achieving enhanced selectivity and robust eavesdropping resilience. For instance, the study in [
18] investigated the potential of near-field hybrid beamforming for secure communications, while the authors of ref. [
19] demonstrated the efficacy and security of combined DM-AN techniques in short-range scenarios. However, existing methodologies predominantly target point-to-point scenarios, neglecting the potential of multi-point collaboration and often experiencing degraded security when eavesdropping receivers operate in close proximity of legitimate receivers.
To address these gaps, this paper proposes a novel artificial noise-aided spatial and directional modulation for near-field (SDMN-AN) system, specifically applied for secure communications within near-field contexts. Unlike conventional far-field schemes, the proposed design explicitly exploits the angle–distance coupling induced by near-field spherical wavefronts, enabling distance-dependent spatial discrimination and receiver-index modulation (IM) that are infeasible under plane-wave assumptions. This near-field property fundamentally enhances AN effectiveness and secure signal separation even when legitimate and illegitimate receivers are closely aligned in angle. The proposed SDMN-AN framework is particularly applicable to cooperative sensor networks and indoor short-range sensing systems, where near-field propagation and distributed receivers are inherent characteristics.
The primary contributions of this work are delineated as follows:
Multi-point collaborative architecture: The proposed SDMN-AN framework integrates a multi-point cooperative receiver strategy at the legitimate user, Bob, while the transmitter, Alice, employs a combination of receiver indices and modulation symbols to significantly enhance spectral efficiency. By explicitly operating in the near-field regime, the proposed architecture exploits the inherent angle–distance coupling of spherical wavefronts, which enables distance-dependent spatial discrimination among distributed receivers. The inclusion of AN further disrupts the adversarial eavesdropper Eve’s signal reconstruction capabilities due to near-field-induced null-space mismatch, thereby ensuring robust physical-layer security even when Eve is closely aligned with Bob in angle under hostile conditions.
Dual precoding and detection strategies: Two distinct configurations are examined—(i) maximum-ratio transmission (MRT) precoding paired with joint maximum-likelihood (ML) detection, optimized for minimal hardware complexity at the transmitter, and (ii) zero-forcing (ZF) precoding coupled with joint ML detection, aimed at alleviating computational demands at the receiver.
Analytical and empirical validation: Closed-form expressions for the bit error rate (BER) upper bounds of both the legitimate receiver and the eavesdropper are derived. Simulation results confirm superior performance of the proposed system in achieving multi-point cooperative security gains for near-field regions, significantly surpassing the security and communication efficiency of existing DM-AN systems.
The structure of this paper is organized as follows:
Section 2 and
Section 3 delineate the system model for the proposed SDMN-AN framework, detailing its two distinct precoding schemes.
Section 4 rigorously derives the upper bounds of the BER for both Bob and Eve.
Section 5 provides a comprehensive performance evaluation, supported by simulation results and analytical insights. Finally,
Section 6 encapsulates the primary findings and offers concluding remarks.
Notation: In this paper, bold lowercase and uppercase symbols are used to represent column vectors and matrices, respectively, while the transpose and conjugate transpose operators are denoted by and . The Frobenius norm and the real part of a scalar are expressed as and , respectively. Furthermore, denotes the circularly symmetric complex Gaussian distribution, while represents the Gaussian Q-function. The identity matrix of dimension N is symbolized by .
2. System Model
As illustrated in
Figure 1, we consider a downlink transmission scenario in which the transmitter, referred to as Alice, is equipped with
antennas arranged in a uniform linear array (ULA). The intended receiver, Bob, employs
spatially distributed single-antenna nodes, whereas the passive eavesdropper, Eve, is equipped with
distributed single-antenna receivers. Notably, both Bob’s and Eve’s receivers operate within Alice’s near-field propagation region. Additionally, the distributed receivers at Bob and Eve are interconnected via optical fiber links, enabling inter-receiver communication within their respective domains.
Referring to
Figure 2, the position of the
n-th antenna at Alice is characterized by the coordinates
, where
. Considering the steering angle
and the distance
of the
l-th receiver relative to the center of Alice’s ULA, the coordinates of the
l-th receiver are given by
.
In practical near-field environments, the Alice-to-receiver link typically exhibits a mixed LoS/NLoS propagation structure. Accordingly, the near-field channel vector
between Alice and the
l-th receiver is modeled as a superposition of a deterministic LoS component and a scattered NLoS component, i.e.,
where
denotes the Rician factor controlling the power ratio between the LoS and NLoS components,
represents the angle and distance of the LoS path, and
characterize the
NLoS paths. Moreover,
denotes the complex gain of the
p-th NLoS path, and
is the corresponding path-loss coefficient with
being the carrier wavelength.
The near-field steering vector
associated with the
p-th propagation path of the
l-th receiver is given by
where
denotes the propagation distance between the
n-th transmit antenna and the
l-th receiver along the
p-th path. According to the geometric relationship illustrated in
Figure 2,
can be expressed as
with
. Unlike conventional far-field planar-wave models, the spherical-wave formulation in (
1)–(
3) introduces distance-dependent phase variations across the transmit array, which break the shift-invariant channel structure and alter spatial orthogonality. As a result, receivers with similar angles but different distances exhibit distinct channel responses in the near-field regime, enabling distance-selective transmission and enhanced physical-layer security.
Although a mixed LoS/NLoS near-field propagation model is considered, we focus on an LoS-dominant scenario, which is commonly encountered in short-range near-field communications. In this case, the overall channel structure is primarily governed by the direct LoS path, and thus the channel can be effectively parameterized by the geometric parameters of the LoS component. Assuming that the receivers at Bob are located at
for
, the channel matrix
between Alice and Bob accounting for all receivers at Bob is cast as
Similarly, assuming that the receivers at Eve are positioned at
for
, the channel matrix
between Alice and Eve considering all receivers at Eve is represented as
3. Proposed Transmission Design of Near-Field SDMN-AN
The core concept of SDMN-AN is to exploit both the indices of distributed receivers and traditional
M-ary amplitude–phase modulation (APM) symbols with
, this design allows part of the information bits to be conveyed through receiver indices rather than constellation symbols. In total,
bits are transmitted during each time slot, thereby enhancing spectral efficiency. These
bits are organized into an SDMN-AN super symbol, denoted as
for
and
, which is expressed as
where
is the
j-th column of
and
denotes a traditional APM symbol.
Furthermore, near-field channel estimation for the Alice-Bob link is performed by Alice through the application of a specific transformation matrix to generate the precoder matrix. To leverage the intrinsic sparsity of near-field channels, a polar-domain transformation was proposed in [
20], where a dedicated transformation matrix, denoted by
, is employed to project the near-field channel
into the polar domain. The resulting transformation matrix is given by
Each column of the polar-domain transformation matrix
corresponds to a near-field array response vector evaluated at a specific polar grid point
, where
. Here,
denotes the number of discretized distance samples associated with the angular grid
. Consequently, the total number of polar sampling points that jointly span the entire propagation region can be expressed as
Using the transformation matrix , the channel can be approximated as , where represents the sparse polar-domain channel representation, obtained through the corresponding polar-domain compressed sensing algorithm. Based on this approximation, the precoder matrix and associated detection mechanisms can be derived from . However, due to the constraints on hardware overhead and detection complexity at Alice and Bob, two distinct transmission and detection schemes are considered.
3.1. MRT Precoding and Joint ML Detection
To mitigate the hardware overhead at Alice, the proposed scheme employs MRT precoding. The precoding matrix is expressed as
where the matrix
operates in the analog domain, thereby significantly reducing hardware requirements and power consumption. To enhance transmission security, especially in scenarios where Eve is in close vicinity to Bob, AN is injected into the null space of
. To this end, the singular value decomposition (SVD) of
is given by
where
and
denote the left and right singular vector matrices, respectively. The diagonal matrix
collects the nonzero singular values of
, while
spans the null space of
, satisfying
. It is worth noting that this orthogonality property generally no longer holds when Eve is located at a position different from Bob, i.e.,
.
Accordingly, the transmitted signal can be expressed as
where
denotes the power scaling factor and
represents the AN vector whose entries are zero-mean random variables with variance
. By defining
as the proportion of transmit power allocated to
, the corresponding expressions for
and
can be readily obtained as
and
For Bob, the received signal is given by
For Eve, the received signal is expressed as
where
and
represent complex Gaussian noise vectors at Bob and Eve, respectively. Assuming that
, when the joint ML detector is employed, Bob’s detection process can be represented as
Similarly, the detection procedure at Eve can be expressed as
In particular, from Equation (
14), it is evident that AN has no effect on Bob’s received signal. In contrast, the terms
and
in Equation (
15) both distort the transmitted signal in terms of both amplitude and phase, resulting in a highly degraded signal at Eve. Even though Eve has accurately estimated its near-field channel, the presence of the AN precludes it from reliably recovering the transmitted signal. Thus, this approach reduces Alice’s hardware overhead while simultaneously ensuring robust security performance and considered spectral efficiency. However, the detection complexity at Bob cannot be neglected, and a solution to alleviate this detection complexity is discussed in the subsequent section.
3.2. ZF Precoding and Joint ML Detection
The proposed scheme employs a ZF precoding matrix to mitigate the detection complexity on Bob’s side. In particular, the precoding matrix is expressed as
Subsequently, the transmitted signal is given by
where
and
are analogous to the terms in Equation (
11), while
is defined as in Equations (
12) and (
13). The received signal for Bob can then be represented as
while the received signal for Eve can be written as
Under the assumption that
, and with a joint ML detector adopted, the detection process at Bob can be formulated as
Similarly, the corresponding detection rule at Eve is given by
It can be observed from (
20) that the injected AN has no effect on Bob’s received signal. By contrast, the term
in (
21) is purely real-valued and therefore only modifies the signal amplitude at Eve [
16], which may lead to a potential security vulnerability when Eve possesses sufficiently high detection sensitivity. In comparison, the component
induces random phase perturbations in Eve’s observation, thereby significantly degrading its detection capability. As a result, the deliberate injection of AN plays a vital role in strengthening the overall transmission security of the proposed scheme.
In this scenario, on the one hand, the receiver Bob is not required to perform near-field channel estimation or compute the precoding matrix. On the other hand, when employing joint ML detection, Bob achieves a significant reduction in computational complexity while preserving optimal performance. However, as digital precoding is adopted on Alice’s side, the associated computational complexity and hardware cost are inevitably higher. The aforementioned two schemes each present distinct advantages and trade-offs. Consequently, Alice and Bob must select and implement the most suitable approach based on the specific operating conditions.
3.3. Overall Algorithm
The overall operation of the SDMN-AN system is depicted in
Figure 3. Both Bob’s and Eve’s receivers are positioned within Alice’s near-field. Initially, Alice performs near-field channel estimation on the Alice–Bob link. Utilizing the estimation results, Alice generates the corresponding precoding matrix. Simultaneously, the transmitted signal is constructed, incorporating the antenna indices, APM symbols, and AN, before being transmitted. Upon reception, Bob employs joint ML detection to estimate the antenna index and demodulate the APM symbol, thereby recovering the transmitted information. Throughout this process, the selection of antenna indices and the incorporation of AN significantly disrupt Eve’s ability to accurately intercept the transmission, thereby reducing its eavesdropping efficacy and ensuring the overall security of the system. Even if Eve applies advanced signal processing, near-field channel mismatch prevents perfect null-space alignment, leading to unavoidable AN leakage in Eve’s received signal.
3.4. Complexity Analysis
At the transmitter side, two precoding strategies are considered. For MRT precoding, the precoding matrix is obtained via conjugate channel processing, which requires complex multiplications. In contrast, ZF precoding involves the computation of a matrix inverse of size , leading to a computational complexity on the order of . Therefore, MRT precoding offers lower computational and hardware complexity at the transmitter, while ZF precoding incurs higher processing cost in exchange for simplified receiver-side detection.
At the receiver side, Bob employs joint ML detection over both the receiver index and the modulation symbol. The detection complexity scales with the size of the SDMN-AN symbol set, resulting in a computational complexity of per detection, where M denotes the modulation order. This complexity is comparable to that of conventional spatial modulation schemes and remains moderate for small to medium numbers of distributed receivers.
Overall, the proposed SDMN-AN framework provides a flexible trade-off between transmitter-side and receiver-side complexity. MRT-based designs favor low-complexity transmission at the cost of higher detection burden, whereas ZF-based designs shift computational complexity to the transmitter while enabling simplified and efficient detection at the receiver.
4. BER Performance Analysis
This section investigates the BER performance of the proposed SDMN-AN scheme. In particular, analytical upper bounds on the BERs experienced by both Bob and Eve are derived under the assumption that a joint ML detector is employed.
Based on the analytical framework developed in [
16], the BER upper bound for Bob in the SDMN-AN system can be expressed as
where
denotes the set of all possible transmitted symbol vectors under the SDMN-AN scheme. The function
represents the Hamming distance between the symbol vectors
and
, while
denotes the corresponding pairwise error probability (PEP), which characterizes the probability of erroneously detecting
when
is transmitted.
In particular, the PEP can be evaluated as
where
denotes the effective channel under perfect channel estimation with
for MRT precoding and
for ZF precoding. Moreover,
satisfies
. Therefore, the PEP can be expressed as
In a nutshell, the BER upper bound of Bob can be derived using Equation (
24) in conjunction with Equation (
26).
Subsequently, similar to BER upper bound of Bob, BER upper bound of Eve can be given by
where
is the PEP corresponding to Eve’s estimated channel
, which can be derived as
where
denotes the effective channel under perfect channel estimation with
for MRT precoding and
for ZF precoding. Moreover, it can be derived that
and
. Therefore, the PEP
can be formulated as
Hence, the BER upper bound of Eve can be derived by combining Equations (
27) and (
29).
It is worth noting that, unlike the far-field case, the near-field channel exhibits distance-dependent phase curvature across the transmit array, which causes Eve’s received signal components to experience severe phase misalignment even under perfect channel estimation. Combined with the residual AN leakage induced by near-field channel mismatch, this effect results in significant amplitude and phase uncertainty at Eve, thereby fundamentally degrading its detection performance.
5. Simulation Results
In this section, the security performance of the proposed SDMN-AN scheme is evaluated by comparing its BER with that of the DM-AN scheme presented in [
19]. Unless otherwise specified, the comparison is conducted over a line-of-sight (LoS)-dominated near-field channel under the assumption of perfect channel estimation. For both theoretical and Monte Carlo simulation results, the following parameters were used:
,
,
, and
. The positions of Bob and Eve are provided in
Table 1. The quadrature phase shift keying (QPSK) scheme was employed, and the BER for each simulation was averaged over
realizations. For convenience, it is assumed that the noise power is identical at both Bob and Eve, i.e.,
, where SNR denotes the signal-to-noise ratio.
Figure 4 presents the performance comparison of both theoretical and simulated BER for Bob and Eve, utilizing the SDMN-AN method with ZF precoding under various values of
. The modulation scheme is QPSK with a spectral efficiency of 3 bits/Hz/s. Analysis reveals that as the SNR increases, both the theoretical and simulated BER for Bob gradually decrease, with the simulated BER converging to the theoretical value. Conversely, the BER for Eve remains elevated. Specifically, for Bob, the case with
offers a 2 dB improvement over the case with
at a BER level of
. Meanwhile, variations in
have minimal impact on the BER for Eve. The change in
alters the distribution of power between the precoded signal and AN. A larger
leads to more power being allocated to the precoded signal, thereby improving Bob’s performance. However, the presence of AN ensures that Eve’s performance remains poor, demonstrating the security of the SDMN-AN scheme, even when Eve is in close proximity to Bob.
Figure 5 illustrates the theoretical and simulated BER performance for both Bob and Eve using the SDMN-AN method with MRT precoding across various values of
. Similar to the results presented in
Figure 4, the SNR increase results in a decrease in both theoretical and simulated BER for Bob, with the simulated BER approaching the theoretical BER. Notably, when
, a 2 dB performance gain is observed for Bob compared to the
case at a BER level of
. Due to the use of AN, the BER of Eve remains high, with minimal impact from changes in
. Furthermore, MRT precoding offers the advantage of reducing Alice’s hardware requirements. These results confirm that by modulating
, the SDMN-AN scheme can achieve varied security performance, even with Eve positioned closely to Bob.
Figure 6 compares the BER performance of the SDMN-AN and DM-AN schemes using ZF precoding at
. The modulation scheme for SDMN-AN is QPSK, while DM-AN uses 8PSK, with both schemes having the same spectral efficiency of 3 bits/Hz/s. As the SNR increases, the BER performance for both schemes improves for Bob, but Eve’s performance remains poor. Particularly, when the BER is
, Bob’s performance using SDMN-AN method exhibits a 3 dB improvement over DM-AN method. This is attributed to the fact that SDMN-AN encodes some bits into receiver indices, which enhances the accuracy of joint ML detection. Conversely, DM-AN encodes all bits into constellation points, thus increasing the demodulation complexity. These results validate that SDMN-AN not only enhances spectral efficiency but also improves Bob’s performance while maintaining security.
As illustrated in
Figure 7, it compares the BER performance between SDMN-AN and DM-AN schemes using ZF precoding at
. The modulation scheme for SDMN-AN is QPSK, while DM-AN utilizes 8PSK, and both schemes maintain the same spectral efficiency. Although different modulation orders are used, joint ML detection is applied to both schemes to ensure a fair comparison under the same detection criterion. Similar to
Figure 6, as the SNR increases, the BER for both schemes decreases for Bob, with Eve’s performance remaining poor. However, at a BER of
, SDMN-AN outperforms DM-AN by 3.5 dB gains. This improvement is attributable not only to the modulation of bits into receiver indices but also to the increased power allocated to the precoded signal as
increases, further enhancing Bob’s performance. These results show that increasing
improves both spectral efficiency and security, further protecting against Eve’s eavesdropping.
Figure 8 compares the BER performance of SDMN-AN and DM-AN schemes using MRT precoding at
. The modulation scheme for SDMN-AN is QPSK, while DM-AN employs 8PSK, with both schemes having the same spectral efficiency. Compared to ZF precoding, MRT precoding reduces Alice’s hardware overhead but increases the detection complexity at Bob’s side. In this case, the SDMN-AN scheme demonstrates good performance. Specifically, for a BER level of
, SDMN-AN outperforms DM-AN by 3 dB gains, confirming that MRT precoding still ensures system security and spectral efficiency while reducing hardware overhead.
As shown in
Figure 9, it presents the BER comparison of SDMN-AN and DM-AN schemes using MRT precoding at
. The modulation for SDMN-AN is QPSK, while for DM-AN, it is 8PSK. Notably, when Bob’s BER is
, SDMN-AN method achieves a 3.5 dB improvement over DM-AN method, surpassing the performance seen at
. This performance gain is attributed to the increased power allocated to the precoded signal. Both schemes effectively prevent Eve’s successful reception and demodulation, ensuring robust security against eavesdropping.
Figure 10 illustrates the BER performance of the proposed SDMN-AN scheme using MRT precoding under imperfect channel estimation for different values of
. The channel estimation error is modeled as a phase perturbation of
, which is incorporated as a multiplicative factor
with
. It is observed that, in the presence of channel estimation errors, the BER performance of Bob degrades compared to the perfect channel estimation case. However, the performance loss remains within an acceptable range. Meanwhile, Eve consistently experiences a significantly degraded BER performance, thereby ensuring the communication security of the proposed scheme.
Figure 11 depicts the rate performance of the proposed SDMN-AN scheme for different numbers of receive antennas
and values of
. As shown in
Figure 11, the achievable rate and secrecy rate vary with different choices of
. Specifically, as
decreases, the SNR at which the secrecy rate attains its peak shifts to a higher value. In practical implementations, the parameter
can be properly selected according to system requirements to achieve the desired secrecy performance. These results further indicate that the secrecy advantage of the proposed SDMN-AN scheme is not solely attributed to power allocation or modulation order, but fundamentally arises from the near-field propagation characteristics, which enable distance-dependent signal discrimination and persistent AN leakage at the eavesdropper.
Figure 12 shows the BER performance of the proposed SDMN-AN scheme using MRT precoding under different numbers of receive antennas
and values of
. The locations are specified in
Table 2 for
. It can be observed that, as
increases, although the spectral efficiency is improved, the BER performance of the intended receiver degrades. Moreover, for a given
, the BER performance improves with increasing
. In contrast, Eve consistently suffers from severe interference, thereby maintaining the communication security of the proposed scheme. In addition, a smaller value of
corresponds to a higher proportion of AN, which, although slightly degrades Bob’s BER performance, further suppresses Eve’s interception capability, highlighting the practical trade-off between reliability and security.