Next Article in Journal
Adaptive Kalman Filter-Based SLAM in LiDAR-Degenerated Environments
Previous Article in Journal
Design and Implementation of a Wave Measurement System Based on Millimeter-Wave Radar Array
Previous Article in Special Issue
Butler-Matrix Beamspace Front-Ends for Massive MIMO: Architecture, Loss Budget, and Capacity Impact
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Secure Spatial Multiplexing Transmission Scheme in MIMO Amplify-and-Forward Wiretap Relaying Systems Using Deliberate Precoder Randomization

Department of Electronic Engineering, Korea National University of Transportation, 50 Daehak-ro, Chungju-si 27469, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2026, 26(3), 860; https://doi.org/10.3390/s26030860
Submission received: 27 November 2025 / Revised: 26 January 2026 / Accepted: 26 January 2026 / Published: 28 January 2026
(This article belongs to the Special Issue Advanced MIMO Antenna Technologies for Intelligent Sensing Networks)

Abstract

Physical-layer security offers low probability of interception (LPI) in wireless communication systems. While prior methods such as the directional beamforming and secrecy coding schemes require knowledge of the eavesdropper (Eve)’s channel, passive eavesdropping limits their practicality. Artificial additive noise and artificial fast fading (AFF) schemes address the issue by degrading detection ability of a potential Eve without knowing its channel information. In particular, AFF achieves LPI by effectively shortening the coherence time of Eve’s channel using a random precoder while keeping the legitimate receiver (Bob)’s channel deterministic. In this paper, we propose a novel AFF design for spatial multiplexing multi-input multi-output (MIMO) amplify-and-forward (AF) relay systems. First, we formulate an optimization problem to achieve minimum mean squared error (MMSE) of Bob’s signals while guaranteeing LPI conditions from Eve, which is generally non-convex. To tackle the non-convexity of the problem, we apply a convex set approximation technique and thereby derive a simple closed-form design. Finally, we evaluated the performance of both Bob and Eve via computer simulations to demonstrate the effectiveness of our proposed design.

1. Introduction

With the rapid proliferation of wireless radio technologies, security in wireless communications has become a critical challenge in both personal and professional domains. Unlike wired communication systems, wireless links inherently lack physical boundaries, allowing any nearby receiver to potentially intercept transmitted signals. Physical-layer security aims to safeguard the radio interface by achieving low probability of interception (LPI) while remaining independent of, yet fully compatible with, upper-layer encryption techniques.
Since the pioneering work of Wyner [1], the concept of a secrecy rate has widely been utilized to measure secrecy performance and derive a rate bound for secure transmission in the physical layer. Although designs and analyses based on the secrecy rate provide useful insight into the secrecy behavior of a communication system, they entail several practical limitations. Primarily, the secrecy rate is required for the transmitter (Alice) to have perfect or statistical knowledge of the eavesdropper’s (Eve’s) channel state information (CSI). However, this is generally unrealizable in practice since passive Eve cannot cooperate with Alice to perform the channel feedback. In addition, a positive secrecy rate is only achievable with relative signal-to-noise ratio (SNR) advantage at the legitimate receiver (Bob) compared to Eve, which is difficult to guarantee in practice. Moreover, the transmit signal is usually required to follow a Gaussian distribution, which hardly captures the effect of practical modulation and coding schemes. It has been shown that the information leakage to Eve can be driven to zero without the aid of Gaussian codewords, either by transmitting the signals in the orthogonal direction of Eve’s channel via multi-antenna beamforming [2] or by employing random binning-based secrecy coding schemes [3,4]. However, such schemes still demand Eve’s CSI at Alice.
To address this issue, artificial noise (AN) transmission schemes have been actively investigated in recent years [5,6]. Unlike the aforementioned approaches, the primary objective of AN is to degrade the detection capability of potential Eves with the absence of the Alice-to-Eve link CSI, while minimizing its impact on Bob’s reception, rather than to completely eliminate the information leakage to Eve. One way to implement such a scheme is to transmit AN in the orthogonal direction of Bob’s channel using extra degrees of freedom in the transmit antenna dimension and thereby degrade Eve’s received SNR while allowing Bob to effectively extract information.
Since orthogonal AN was first theoretically established by Goel and Negi [7], a variety of AN methods have been developed in the literature. For example, the authors in [8,9] proposed non-orthogonal AN techniques that can further interfere with Eve by sacrificing Bob’s communication quality, thereby increasing the secrecy rate. However, such a scheme requires Alice to know the CSI of Eve. In [10,11], the authors proposed the constructive AN schemes that can be designed at a symbol-rate to be constructive to Bob while being destructive to Eve. The AN-aided on–off transmission scheme was developed in [12] considering the limited training and feedback overhead. In [13], the authors addressed data carrying AN, in which encrypted message symbols with pre-shared secret keys act as interference to the unintended users like Eve. From Eve’s point of view, the artificial noise elimination (ANE) schemes have also been actively investigated to counteract AN with and without knowing the Alice-to-Bob link CSI [14,15,16,17]. The previous studies have shown that Eve with a sufficiently large antenna array and adequate channel knowledge can significantly suppress the impact of AN.
In the meantime, there has been growing interest in the artificial fast fading (AFF) designs as a countermeasure against Eve’s advanced ANE techniques. In the AFF strategy, Alice basically transmits no downlink training to prevent Eve from estimating its own channel and noise distribution, which are essential knowledge for coherent detection, whereas Alice obtains the Alice-to-Bob link CSI through the uplink training from Bob. In this situation, a primary goal of AFF is to effectively shorten the coherence time of Eve’s channels in order to invalidate Eve’s non-coherent blind estimation schemes. To this end, one can design a random precoder which deliberately enhances fluctuation of Eve’s channel while making Bob’s channel deterministic over a channel coherence duration by exploiting the excess degrees of freedom (DoFs) at Alice. Since AFF was first developed in multiple-input single-output (MISO) wiretap channels [18], it has been extended to multi-carrier [19], MIMO [20], and multi-user MISO environments [21]. In addition, the authors in [22] analyzed the performance of AFF and compared the results with AN in terms of the secrecy rate. It has been further demonstrated in [23] that even if Eve has full knowledge of CSI of all nodes, information leakage to Eve can be effectively prevented as long as the AFF precoder remains fully random.
Cooperative relaying has also been considered as a promising technique to improve the security performance in the physical layer [24]. To further enhance security and practical feasibility, cooperative jamming techniques based on AN have widely been investigated in the literature. For example, the authors in [25] studied orthogonal AN in secure MIMO amplify-and-forward (AF) relaying systems, where both Alice (or the source) and the relay broadcasts multi-dimensional AN while simultaneously transmitting a single data stream to Bob (or the destination). In [26,27], it was shown that we can further interfere with Eve by allowing the destination to transmit jamming signals concurrently with the message transmission from Alice. In [28], various AN-aided transmission schemes were developed in a two-way MIMO AF relaying system with different security–complexity trade-offs. Cooperative jamming is also useful for impairing potential eavesdropping at untrusted relays [29,30]. In [31,32], the authors exploited cooperative jamming to proactively wiretap the communication between two suspicious users.
In wireless relaying systems, downlink training is inevitable even in time division duplexing operation. This is because no downlink training from Alice would require pre-equalization of the Alice-to-relay channel, which becomes highly inefficient when the number of relay antennas exceeds that of Alice. Also, the uplink training from the relay immediately serves as the downlink training to both Bob and Eve due to the nature of wireless transmission. For these reasons, most existing studies on relay-assisted physical-layer security typically presume the use of downlink training at both Alice and the relay and further assume that Bob and Eve are aware of all CSI associated with themselves. As discussed before, such channel knowledge provides Eve with useful information for performing ANE to mitigate the effect of jamming. Nevertheless, studies addressing ANE issues in the secure MIMO relay systems remain scarce in the literature.
In this paper, we highlight the vulnerability of AN-based jamming to ANE in the relaying systems and propose a novel AFF design as an effective alternative. Specifically, we investigate AFF-based relay transceiver designs for secure spatial multiplexing MIMO AF relaying systems, where Alice transmits multiple data streams simultaneously to Bob with the aid of a trusted multi-antenna relay at the presence of a potential Eve at each hop. The proposed design aims to satisfy two conditions simultaneously, which we refer to as the LPI conditions. One condition is to maintain Bob’s channel constant over a channel coherence block length, while the remaining condition is to enhance the security by incurring unresolvable randomness in Eve’s channels. To achieve these two conditions simultaneously, first we apply the random AFF precoding scheme [23] at Alice to secure the first-hop channel. Then, we design the relay transceiver such that the randomness of the first-hop channel is propagated to the relay-to-Eve channel while having no impact on Bob’s detection behavior.
To further enhance the performance of Bob, we shape Bob’s effective channel such that the total mean squared error (MSE) between the signals and its estimates is minimized under the LPI constraints. Such a minimum MSE (MMSE) problem is generally non-convex and thus is difficult to solve. To solve the problem, we first propose a gradient descent (GD)-based iterative optimization method that can provide near optimal performance. To address the high computational complexity of such an iterative algorithm and provide useful insights into the system, we also identify a low-complexity closed-form solution based on a convex-hull relaxation technique. It is worth noting that both AFF designs provide security without requiring disruptive changes to the training structure of the conventional unsecured MMSE relaying systems [33,34].
In contrast to conventional secrecy-rate-based frameworks, we adopt a signal processing oriented approach that focuses on the error performance of Bob and Eve. This approach enables the evaluation of the security gain even in the presence of a powerful eavesdropper equipped with a large number of antennas and capable of performing ANE, with which a positive secrecy rate is generally not guaranteed. Note that such an approach provides insights from a practical implementation perspective and is particularly useful in hardware-constrained environments, such as sensor networks and Internet of Things (IoT) networks, where assessing the reliability of data reception at Bob and Eve is often more critical than characterizing the theoretical limits on transmission rates [35,36]. In light of this, extensive simulation results are provided in terms of bit error rate (BER) performance of Bob and Eve to demonstrate the effectiveness of the proposed design. Our simulation results effectively capture the influence of pragmatic system parameters, including modulation schemes, detection strategies, and the amount of CSI at the receivers. We also confirm from the results that while conventional AN-based jamming techniques are highly vulnerable to ANE attacks, the proposed AFF scheme is inherently robust against such attacks.
Organization: The remainder of the paper is organized as follows. In Section 2, we describe the wiretap relay channel model considered in this paper. In Section 3, we provide preliminary remarks, and in Section 4, we describe the design outline and propose a closed-form transceiver design. Section 5 provides the simulation results, and Section 6 concludes the paper.
Notations: Throughout the paper, normal letters represent scalar quantities, boldface letters indicate vectors, and boldface uppercase letters designate matrices. The superscripts ( · ) T , ( · ) * , and ( · ) H stand for the transpose, conjugate, and conjugate transpose operations. We define ⊗ as a Kronecker product, and E [ · ] and E x [ · ] denote the expectation operators taken over all random variables and a specific random variable x, respectively, while R and C designate sets of real and complex numbers, respectively. Also, we define A F and Tr A as the Frobenius norm and trace of a matrix A , respectively, and blkdiag [ A 1 , , A K ] stands for the block-wise diagonal matrix with sub-matrices { A k } k = 1 K on its main diagonal. The N × N identity and zero matrices are denoted by I N and 0 N , respectively. A notation x CN ( p , q ) represents that all elements of x are the independent and identically distributed (i.i.d.) circularly symmetric complex Gaussian with mean p and variance q. Finally, we denote x ( n ) the n-th realization of a random variable x.

2. System Model

As described in Figure 1, we consider a cooperative relaying system, where a multi-antenna AF relay helps secure communications between the source (Alice) and the destination (Bob) given the existence of a passive eavesdropper. We assume that the direct path between Alice and Bob can be ignored due to large path loss (Extension of our work to the scenarios of non-negligible direct link remains open for future works). However, all the links to Eve cannot be ignored as we have no information on Eve’s location. Alice, the relay, Bob, and Eve are equipped with N a , N r , N b , and N e antennas, which implies that in the base-band representation and the Alice-to-relay, Alice-to-Eve, relay-to-Bob, and relay-to-Eve channels are denoted by complex matrices H C N r × N a , F C N e × N a , G C N b × N r , and T C N e × N r , respectively.
We consider a block-wise fading scenario, where all channel coefficients remain invariant over a coherent fading block-length N, after which they may change to new random values. Considering an inter-element spacing of at least half a wavelength among all antennas, all channel matrices and their elements are assumed to be independent of each other. In this paper, we adopt the spatial multiplexing transmission scheme, where Alice transmits N s data streams at the same time with N s min ( N a , N r , N b , N ) . However, to avoid the loop interference at the relay, each data transmission at Alice and the relay occurs in two separate time slots.
In this paper, we assume that one time slot equals channel coherence block length N, but the results can be applied to more general scenarios. In the first time slot, Alice generates an input sequence S = [ s ( 1 ) , , s ( N ) ] , where s ( n ) C N s represents a message symbol vector in the n-th symbol interval, which meets E [ s ] = 0 and Tr ( R s ) = N s for transmit signal covariance R s E [ s s H ] and then transmits a precoded signal x A ( n ) = P Ω ( n ) s ( n ) C N s which is constrained by its maximum power budget as E [ x A 2 ] P A . Here, P C N a × N s denotes a precoding matrix that is customized to the Alice-to-relay channel H , whereas Ω ( n ) C N s × N s indicates a random AFF precoder, which is designed to artificially shorten coherence time of Eve’s effective channels. We assume that each coefficient of Ω varies in every T 1 symbol periods under the condition that E [ Ω Ω H ] = I N s . Then, the received signals at the relay and Eve are expressed by
y R ( n ) = H x A ( n ) + n R ( n )
and y E 1 ( n ) = F x A ( n ) + n E 1 ( n ) ,
where n R ( n ) C N r and n E 1 ( n ) C N e designate the noise vectors at the relay and Eve in the n-th symbol interval, respectively.
In the next time slot, the relay received signal y R ( n ) in (1) is linearly amplified by a relay transceiver Q ( n ) C N r × N r and then forwarded to Bob with a power constraint E [ x R 2 ] P R where x R ( n ) = Q ( n ) y R ( n ) signifies the relay transmit signal. Then, the received signals at Bob and Eve in the n-th symbol interval are, respectively, written as
y B ( n ) = G x R ( n ) + n B ( n )
and y E 2 ( n ) = T x R ( n ) + n E 2 ( n ) ,
where n B ( n ) C N b and n E 2 ( n ) C N e designate the noise vectors at Bob and Eve in the second time slot, respectively. Without loss of generality, we assume that all elements of the noise vectors n R , n B , n E 1 , and n E 2 are independent and identically distributed complex Gaussian, i.e., CN ( 0 , σ n 2 ) , throughout the paper. Finally, the estimated signal waveform at Bob is expressed as z ( n ) = W y B ( n ) C N s with a linear receiver W C N s × N b . In the remainder of this paper, we omit the symbol index n whenever the corresponding signal is treated as a random variable.
All legitimate nodes are allowed to transmit training (or pilot) signals for channel estimation, as in conventional systems. Accordingly, the relay acquires full CSI of both H and G through uplink and downlink training with Alice and Bob. In contrast, Bob and Eve can access only the CSI of their respective links, i.e., G and { F , T } , since the relay does not forward any information about H to subsequent nodes. Similarly, Alice is assumed to know only the first-hop channel H . As the passive eavesdropper may not transmit any signals, it is reasonable to assume that Eve’s channels F and T are unknown to all legitimate nodes. The amount of CSI at each node is summarized in Table 1. In addition, a potential eavesdropper, whose location is unknown to the legitimate nodes, is typically away from the legitimate nodes. Thus, we assume that Eve’s eavesdropping channels F and T are statistically uncorrelated with the legitimate link channels H and G , respectively.
In this paper, we consider a trusted and dedicated relay system, in which a secret key-based cryptographic system can facilitate secure communication between Alice and Bob. In contrast, for Bob, which represents a relatively lightweight device such as an IoT node, we assume that secret key sharing is not feasible due to the high overhead required for the key distribution process. In this circumstance, it is difficult for Alice to directly encrypt the messages using a secret key, but such a key can still be exploited to enhance physical-layer security. In this paper, we assume that a shared secret key between Alice and the relay enables each node to locally and securely generate an identical random precoder sequence { Ω ( n ) } n = 1 N in advance.
To implement this process, the public-key methods such as the elliptic curve Diffie-Hellman algorithm can provide an assistance to share secret information such as the session key between Alice and the relay as conducted in the current transport layer security protocols. Although the AF relay usually operates at the physical layer for signal forwarding, higher-layer protocols can be implemented for control and management purposes. We can also consider the secret-key agreement methods from wireless measurements between Alice and the relay, which are mainly performed in the physical layer [13]. Once a secret key has been agreed upon, Alice and the relay can locally produce the same sequence of AFF precoders through a cryptographically secure pseudo-random number generator [37] by exploiting the shared secret key as a seed number.

3. Preliminaries

This section provides a brief overview of the secure and non-secure transceiver designs that are most relevant to the proposed approach in spatial multiplexing MIMO AF relaying systems. As we consider non-AFF scenarios in this section, we temporarily assume that Ω ( n ) = I N s .

3.1. Unsecured MMSE Designs

In non-secure transmission scenarios, joint optimization of the source, the relay, and the destination in terms of the MMSE criterion has been extensively studied in the literature [38,39]. However, a common drawback of such optimal designs is that they require CSI of all hops at both the source and the destination. To this end, the relay must forward the channel information of the previous hop to the next node in addition to transmitting its own pilot signals, which leads to increased system overhead. A solution to such a problem was later addressed in [33,34], whose main idea is succinctly summarized in the following lemma.
Lemma 1. 
From the MMSE point of view, the optimal relay transceiver employs a structure of Q = B L , where L = ( P H H H H P + σ n 2 R s 1 ) 1 P H H H represents the Wiener filter receiver that equalizes the first hop effective channel H P and B C N r × N s serves as a relay precoder. Then, the MMSE problem between s and z can be decomposed into two separate problems as
min P , Q , W E [ z s 2 ] = ( a ) min P , B , W { E y s 2 + E z y 2 } = ( b ) min P , B T r [ ( σ n 2 P H H H H P + R s 1 ) 1 ] + T r ( σ n 2 B H G H G B + R y 1 ) 1 min P T r [ ( σ n 2 P H H H H P + R s 1 ) 1 ] + min B T r [ ( σ n 2 B H G H G B + R s 1 ) 1 ] ,
where y ( n ) L y R ( n ) and R y E [ y y H ] . The equality (a) follows from the orthogonality principle, and (b) is obtained by applying the optimal destination receiver
W = ( B H G H G B + σ n 2 R y 1 ) 1 B H G H , ( B H G H G B + σ n 2 R s 1 ) 1 B H G H
which is approximated as in (6) due to the fact that R y R s in the high SNR regime. As a result, we have (5).
It has been shown that the approximation R y R s is fairly accurate even in the low-to medium SNR range, which implies that the destination can detect the signals exploring only the second-hop CSI G . Also, the CSI of the first hop channel is sufficient for the source precoder design. In this case, the relay only needs to transmit its own pilots without having to forward the previous link CSI to the next hop, and thus we can substantially reduce the overall training overhead. Finally, the source and relay precoders P and B can be separately optimized with respective power constraints E [ x A 2 ] P A and E [ x R 2 ] P R as detailed in prior studies [33].

3.2. AN-Based Secure MMSE Designs

AN-based secure relaying systems have been investigated in [25] assuming a single stream transmission. Although it is not difficult to generalize this to the spatial multiplexing scenarios, such a generalization has not yet been explicitly discussed from the MMSE point of view in the literature. In the following, we briefly describe how AN can be integrated to the MMSE-based MIMO AF relaying systems and how it can be vulnerable to ANE attack from Eve.
Considering orthogonal AN that does not require Eve’s CSI at the transmitter sides, we can simply inject the AN jamming vectors d a C N a N s and d r C N r N s into the source and relay transmit signals as
x A ( n ) = ν a P s ( n ) + 1 ν a P n d a ( n ) x R ( n ) = ν r B y ( n ) + 1 ν r B n d r ( n ) ,
where 0 ν a 1 and 0 ν r 1 imply the power allocation factors between the information bearing signals and artificial jamming noise at Alice and the relay, respectively. Note that we consider i.i.d. Gaussian jamming, i.e., d a CN ( 0 , P A ) and d r CN ( 0 , P R ) , as it is known as the worst possible interference in terms of Eve. Here, P n C N a × ( N a N s ) and B n C N r × ( N r N s ) denote the orthonormal beamforming matrices that steer the jamming signals into the null-space of the effective channel matrices L H C N s × N a and W G C N s × N r , respectively, such that they do not appear in the MMSE estimate process at both the relay and Bob. Therefore, the remaining procedure of the transceiver designs of P , Q , and W simply follow the approach in Lemma 1 under the modified power constraints E [ x A 2 ] ν a P A and E [ x R 2 ] ν r P R without considering AN. Note that this scheme includes the unsecured MMSE design in Section 3.1 as a special case with ν = 0 .
In contrast, the received signals at Eve are adversely affected by the jamming signals in both time slots as
y E , 1 ( n ) = F x A ( n ) + n E 1 ( n ) = ν a F P s ( n ) + 1 ν a F P n d a ( n ) + n E 1 ( n ) y E , 2 ( n ) = T x R ( n ) + n E 2 ( n ) = ν r T B y ( n ) + 1 ν r T B n d r ( n ) + n E 2 ( n ) , = ν r T Q H P s ( n ) + ν r T Q n R ( n ) + 1 ν r T B n d r ( n ) + n E 2 ( n ) .
Eve may combine these two vectors into a single stacked vector to enhance its detection capability, given by
y E ( n ) [ y E , 1 y E , 2 ] = T an s ( n ) + n an ( n ) ,
where
T an [ ν a F P ν r T Q H P ] and n an ( n ) T n d ( n ) + [ n E 1 ( n ) ν r T Q n R ( n ) + n E 2 ( n ) ] C 2 N e
denote Eve’s effective channel and noise, respectively, with a stacked AN vector d ( n ) = [ d a T ( n ) d r T ( n ) ] T C M and the corresponding channel
T n = [ 1 ν a F P n 0 0 1 ν r T B n ] C 2 N e × M ,
where M = N a + N r 2 N s signifies the effective AN dimension.
It follows from (7) that compared to Bob, Eve’s SNR may deteriorate due to the jamming noise T w d ( n ) . Under certain conditions, however, Eve can substantially mitigate the effect of the jamming noise, thereby increasing the probability of message interception. Further details are discussed in the subsequent subsection.

3.3. ANE Attack from Eve

In order to counteract the influence of AN, several ANE techniques have been proposed in terms of Eve’s perspective [14,15,16,17]. In this subsection, we employ the minor component analysis (MCA) technique, which is known as a powerful ANE method in the situation where Eve can estimate its effective noise covariance (ENC), i.e., R an E [ n an n an H ] , and is equipped with a sufficiently large number of antennas such that N e 1 2 ( M E + N s ) . Here, M E denotes Eve’s choice for the AN dimension, which may or may not differ from M.
Specifically, let us define the ED of R an as
R an = [ U ma U mi ] [ Λ ma 0 0 Λ mi ] [ U ma H U mi H ] ,
where U ma C 2 N e × M E and U mi C 2 N e × ( 2 N e M E ) denote the unitary eigenvector matrices corresponding to the M E largest and 2 N e M E smallest eigenvalues arranged in a descending order in the diagonal eigenvalue matrices Λ ma C M E × M E and Λ mi C ( 2 N e M E ) × ( 2 N e M E ) , respectively.
Then, the MCA attempts to eliminate AN by projecting the observed vectors y E ( n ) in (7) to the direction of the 2 N e M E smallest eigenvalues of ENC by left-multiplying a projection matrix W mca = Λ mi 1 / 2 U mi H to y E ( n ) as
y E ( n ) = W mca y E ( n ) = T ¯ an , eff s ( n ) + n w ( n ) ,
where T ¯ an W mca T an and n w ( n ) W mca n an ( n ) stand for the projected effective channel and noise, respectively. It can be observed that U mi H provides an orthonormal projection onto the subspace corresponding to the 2 N e M E smallest eigenvalues, and Λ mi 1 / 2 renders the projected effective noise white Gaussian, i.e., n w CN ( 0 , 1 ) . Such a noise whitening operation further simplifies the estimation process at Eve.
It is noteworthy that the noise covariance may be estimated by Eve using noise-only samples collected during signal-free intervals or from the residual signals after subtracting the estimated signal components. However, both approaches are challenging to implement in practice in the aforementioned training and jamming strategies since Eve can access only the wiretap channels F and T , which is not sufficient for coherent signal estimation, and further noise-only intervals are unlikely to occur. Nevertheless, from a conservative perspective, it is still crucial to investigate the detection capability of such strong Eve to account for the worst-case scenario. Although Eve still lacks complete knowledge of the effective channel T ¯ an , the channel stability over a coherence time enables signal detection via blind estimation techniques.

4. Proposed AFF-Based Secure MMSE Designs

In this section, we propose an AFF-based secure design for MMSE-based MIMO AF relaying systems as an effective alternative to AN. One of our design goals is to achieve two LPI conditions simultaneously in the two-hop relaying channels, i.e., to generate random fluctuation on both of Eve’s channels while maintaining Bob’s effective channel constant over a coherence block length. Then, we further aim to design transmit and receive filters in each legitimate node in terms of the MMSE criterion under the LPI conditions.
As we adopt the AFF precoder Ω at Alice, which remains fully random in the first hop link, the remaining problem is to achieve the LPI in the second hop link via well-designed relay transceivers. According to the LPI condition, the randomness of the first-hop channel should propagate to Eve’s channel in the second hop while having no impact on Bob’s channel, which implies that Bob must be able to perform coherent detection using only the second-hop CSI. To address such an issue, we have to generalize the idea in Section 3.1 to a secured version in terms of AFF.
Before we proceed further, let us evolve some notations in more detail. First, we define the effective channel in the n-th symbol interval of the first hop link as H ¯ ( n ) H P Ω ( n ) . Then, we can evolve the notations as H ¯ ( n ) = [ H ¯ 1 T ( n ) , , H ¯ K T ( n ) ] T and y R ( n ) = [ y R 1 T ( n ) , , y R K T ( n ) ] T , where H ¯ k ( n ) C N r K × N s and y R k ( n ) C N r K denote the k-th sub-matrix(or -vector) of H ¯ ( n ) and y R ( n ) , respectively. Note that the number of sub-matrices K 1 serves as a system parameter for adjusting the security level, which is chosen among the factors of N r in the range of 1 K N r N b . As will be shown later, the security level improves as K increases, whereas the system reduces to the non-secure design [33] when K = 1 . Thus, the proposed work generalizes the previous unsecured design to a secured version. Similarly, we define the k-th sub-matrices of G = [ G 1 , , G K ] and T = [ T 1 , , T K ] as G k C N b × N r K and T k C N e × N r K , respectively.

4.1. Problem Formulation

To achieve the LPI conditions for both Bob and Eve, the relay transceiver must be configured to vary in accordance with the update period of the AFF precoder. Also, we need to set the relay transceiver to be a block-diagonal form as
Q ( n ) = B bd L bd ( n ) ,
where B bd blkdiag { B bd , 1 , , B bd , K } and L bd ( n ) blkdiag { L bd , 1 ( n ) , , L bd , K ( n ) } denote the relay transmitter and the receiver with B bd , k C N r K × N s and L bd , k ( n ) ( H ¯ H ( n ) H ¯ ( n ) + σ n 2 I N s ) 1 H ¯ k H ( n ) C N s × N r K being their k-th diagonal sub-blocks, respectively. Based on the aforementioned definitions, we can, respectively, rewrite the received signals at Bob and Eve as
y B ( n ) = k = 1 K G k B bd , k L bd , k ( n ) y R k ( n ) + n B ( n )
y E , 2 ( n ) = k = 1 K T k B bd , k L bd , k ( n ) y R k ( n ) + n E ( n ) .
Now, we design the relay precoder such that B bd , k = G k K for an arbitrary matrix K C N b × N s to satisfy the following equations
G 1 B bd , 1 = = G K B bd , K = K ,
where G k G k H ( G k G k H ) 1 denotes the pseudo inverse of G k . Then, one can easily verify that Bob’s received signal in (11) is alternatively expressed as a multiplication of the precoded second hop channel K , the instantaneous Wiener filter receiver L ¯ ( n ) = ( H ¯ H ( n ) H ¯ ( n ) + σ n 2 R s 1 ) 1 H ¯ H ( n ) that equalizes the first hop effective channel H ¯ ( n ) , and the relay received signal y R ( n ) as
y B ( n ) = K k = 1 K L bd , k ( n ) y R k ( n ) + n B ( n ) = K y ¯ ( n ) + n B ( n ) ,
where y ¯ ( n ) = L ¯ ( n ) y R ( n ) .
Now, we observe that the proposed design in (10) with a condition in (13) enables the propagation of random AFF in H ¯ ( n ) towards Bob’s channel is effectively blocked by the Wiener filter receiver L ( n ) . In contrast, it is still conveyed to Eve’s channel as the fast faded channel H ¯ ( n ) remains unequalized in Eve’s signal y E , 2 in () as we have T i B bd , i T j B bd , j , i j with probability 1.
To be more specific, let us define R ¯ y E y ¯ y ¯ H | Ω . Then, based on the result in (14), and following a similar approach to that in Lemma 1, we can formulate the MMSE problem for given the relay transceiver in (10) as
min P , Q , W E [ z s 2 ] = min P , Q , W E Ω E [ z s 2 | Ω = min P , K , W E Ω [ E y ¯ s 2 | Ω + E z y ¯ 2 | Ω ] = min P , K , W E Ω [ E L ¯ ( H ¯ s + n R ) s 2 | Ω + E W ( K y ¯ + n B ) y ¯ 2 | Ω ] = ( a ) min P , K E Ω Tr ( σ n 2 H ¯ H H ¯ + R s 1 ) 1 + E Ω Tr ( σ n 2 K H K + R ¯ y 1 ) 1 ,
where the equality (a) is obtained by applying the optimal destination receiver for a given random precoder Ω ( n ) as
W ( n ) = ( K H K + σ n 2 R ¯ y 1 ( n ) ) 1 K H .
The optimal receiver in (16) is prohibited in our system as it requires Bob to have knowledge on the random precoder sequence Ω ( n ) as well as the first hop channel H P . Nevertheless, we can devise a suboptimal receiver by invoking the high SNR approximation R ¯ y ( n ) R s as
W ( K H K + σ n 2 R s 1 ) 1 K H ,
which remains constant over a coherence block length. Note that the approximation R ¯ y ( n ) R s holds in each symbol index n as we have
lim σ n 2 0 R ¯ y ( n ) = lim σ n 2 0 L ¯ ( n ) ( H ¯ ( n ) R s H ¯ H ( n ) + σ n 2 I N r ) L ¯ H ( n ) = lim σ n 2 0 R s H ¯ H ( n ) ( H ¯ ( n ) R s H ¯ H ( n ) + σ n 2 I N r ) 1 H ¯ ( n ) R s = lim σ n 2 0 ( H ¯ H ( n ) H ¯ ( n ) + σ n 2 R s 1 ) 1 H ¯ H ( n ) H ¯ ( n ) R s = R s ,
where the second and third equalities follow from the well-known Woodbury matrix identity [40].
It is seen from (17) that with the proposed design, Bob is still able to estimate the input signal s without being affected by the first hop AFF channel H ¯ . However, it is noteworthy that this is not the case for Eve. In the same manner, we can show that the joint MMSE problem in (15) can be reformulated as
min P , Q , W E [ z s 2 ] min P E Ω Tr ( σ n 2 H ¯ H H ¯ + R s 1 ) 1 + min K Tr ( σ n 2 K H K + R s 1 ) 1 ,
which is a sum of two independent problems with respect to the source and relay precoders P and K , respectively.
For security reasons, the source precoder P should be designed so as not to compromise the randomness of the AFF precoder Ω , which implies that P remains constant over time while possibly being customized to H . There is currently no known analytical solution for this problem. However, with this condition and considering the source power constraint E [ x A 2 ] P A , we can invoke the eigen-beamforming method P = P A N s V h as an effective source precoder, where V h C N a × N s denotes the right singular matrix corresponding to the N s largest singular values of H . Such a precoder can be particularly useful when N a > N s as it prevents power from being wasted on the channel paths having the smallest gains.
In the meantime, as for the design of K , we can formulate an MMSE problem as
( P - 1 ) min K Tr ( ( σ n 2 K H K + R s 1 ) 1 ) s . t . k = 1 K T r G k K R y k K H G k H P R ,
where R y k E [ y k y k H ] with y k L bd , k y R k . Note that the constraint of (P-1) follows from the maximum power limit at the relay, i.e., E [ Q y R 2 ] P R .
The problem (P-1) is generally non-convex, and thus it is difficult to find the globally optimal solution. In the subsequent subsections, we propose two distinct approaches to address this problem. The first is a GD-based iterative method that yields a locally optimal solution, while the second is a convex relaxation method which provides an insightful closed-form solution. Note that the GD-based solution can be close to the global optimum with multiple initial points, whereas the closed-form solution exhibits sub-optimal performance with significantly reduced computational complexity.
Without loss of optimality, we can set K = β K ¯ , where β denotes a power-normalizing coefficient, which is given by
β = P R k = 1 K Tr G k K ¯ R y k K ¯ H G k H .
Then, the problem (P-1) can be reformulated as an unconstrained optimization problem as
( P - 2 ) min K ¯ Ξ
where Ξ is defined by Ξ Tr R K 1 with R K = σ n 2 β 2 K ¯ H K ¯ + R s 1 .

4.2. GD-Based Optimal Design

Now, we apply a GD algorithm to solve the unconstrained optimization problem (P-2). Using some rules for the differential d Tr ( Y ) = Tr ( d Y ) and d Y 1 = Y 1 d Y Y 1 , we can compute the differential of the MSE Ξ with respect to K ¯ * as
d Ξ = Tr R K 1 d R k R K 1 = Tr β 2 σ n 2 R k 2 d K ¯ H K ¯ + d β 2 σ n 2 R K 2 K ¯ H K ¯ = Tr β 2 σ n 2 K ¯ R k 2 d K ¯ H + β 4 P R σ n 2 Tr R K 2 K ¯ K ¯ H Tr k = 1 K ( G k G k H ) 1 K ¯ R y k d K ¯ H .
For a real valued function f ( · ) , the gradient of f with respect to a complex matrix Z is defined by a partial derivative Z f 2 f Z * . Also, when the differential of f is given by d f = Tr ( A 0 d Z + A 1 d Z H ) , the gradient can be computed as f Z * = A 1 [41]. By invoking these rules, the gradient of the MSE Ξ with respect to K ¯ can be derived as
K ¯ Ξ = 2 β 2 σ n 2 K ¯ R k 2 + 2 β 4 P R σ n 2 Tr R K 2 K ¯ K ¯ H k = 1 K ( G k G k H ) 1 K ¯ R y k .
Now, we can solve the problem (P-2) using the proposed gradient descent algorithm, which is summarized in Algorithm 1. In this algorithm, N g initial points are employed to prevent the optimization process from being stuck in undesirable local minima, and ϵ denotes the tolerance factor for terminating the iteration. We determine the step size δ by using the Armijo’s rule, which is shown to provide probable convergence [42].
Algorithm 1 Proposed GD algorithm
  • for  n = 1 : N g  do
  •    Initialize K ¯ = K ¯ ( n ) for a set of N g initial points { K ¯ ( 1 ) , , K ¯ ( N g ) }
  •    repeat
  •      Compute the gradient K ¯ Ξ from (20).
  •      Determine a step size δ .
  •      Update K ¯ K ¯ δ K ¯ Ξ .
  •    until  K ¯ Ξ F ϵ
  • end for
  • Select the best one among the N G solutions.

4.3. Closed-Form Design

Although the aforementioned GD method provides a near optimal solution, the iterative approach may incur excessive computational complexity at the relay. In this subsection, we propose a simple closed-form solution by applying the convex-hull relaxation technique to the feasible domain. The resulting approach achieves significantly lower complexity, comparable to that of the AN-based jamming schemes and thus is practically more meaningful than GD.
To this end, let us first examine the following lemma.
Lemma 2. 
The consumed power at the relay in (P-1) is bounded below as
k = 1 K T r G k K R y k K H G k H α T r K H A K ,
where we have A k = 1 K ( G k G k H ) 1 C N b × N b and α min k λ min ( R y k ) with λ min ( R y k ) denoting the minimum eigenvalue of R y k , and the resulting lower-bound in (21) is a convex function of K .
Proof. 
Since R y k is a positive-definite matrix, we can establish Loewner’s order as R y k λ min ( R y k ) I N s . Then, it simply follows that
k = 1 K Tr G k K R y k K H G k H k = 1 K λ min ( R y k ) Tr K H G k H G k K α Tr K H A K .
The resulting lower-bound is a convex function of K since its Hessian is given by K 2 Tr K H A K = I N b A , which is positive-definite, and thus the proof is concluded. □
The result in Lemma 2 indicates that R y k in (P-1) can be replaced with α I N s , thereby relaxing the non-convex feasible domain to its nearest convex hull and rendering the problem tractable. However, the resulting solution does not necessarily satisfy the relay transmit power constraint P R since such a direct substitution enlarges the feasible region of K compared to the original problem. Therefore, an additional power normalization factor must be applied to the derived solution to ensure compliance with the power constraint. To address this issue, we set K = β K ¯ as in the previous subsection, where β serves as a power-normalizing factor as illustrated in (19). Based on the above arguments, the problem (P-1) is can then be reformulated as
( P - 3 ) min K ¯ Tr [ ( σ n 2 K ¯ H K ¯ + R s 1 ) 1 ] s . t . Tr ( K ¯ H A K ¯ ) P R / α .
The above problem is now easy to solve as it is reducible to a simple scalar convex optimization problem. To see this, let us define the eigenvalue decomposition (ED) A = U a Λ a U a H , where U a C N b × N b and Λ a R N b × N b represent a unitary eigenvector matrix of A and a diagonal matrix with N b non-zero eigenvalues { λ a , 1 , , λ a , N b } on its main diagonal with a descending order, respectively. Similarly, we define R s = U s Λ s U s H , where U s C N s × N s and Λ s R N s × N s represent the eigenvector and eigenvalue matrices with N s non-zero eigenvalues { λ a , 1 , , λ a , N s } with a descending order, respectively.
Then, one can easily verify that the optimal solution of (P-3) diagonalizes both the objective and constraint functions simultaneously [33], which gives rise to a solution
K ¯ = U ¯ a Φ U s H ,
where U ¯ a C N b × N s and Φ C N s × N s denote a unitary beamforming matrix composed of the first N s columns of U a and a diagonal power allocation matrix with its i-th element being denoted by ϕ i 0 , respectively. Thus, the remainder is a scalar optimization problem of { ϕ i , i } , which is easily solved through the Karush–Kuhn–Tucker (KKT) conditions as
ϕ i = ( μ σ n λ a , i 1 / 2 σ n 2 λ s , i 1 ) + 1 / 2 for i = 1 , , N s .
Here, μ 0 represents the Lagrange multiplier that can be chosen to satisfy the constraint in problem (P-3) with equality. Finally, for given K ¯ , we apply β in order to adjust the relay transmit power to its maximum value P R . Finally, we attain a complete solution for the relay transceiver in (10) as
Q bd , k ( n ) = β G k U ¯ a Φ U s H ( H ¯ H ( n ) H ¯ ( n ) + σ n 2 R s 1 ) 1 H ¯ k ( n ) H , k .

4.4. Detection Process at Bob

First of all, Bob can readily estimate the desired effective channel K = β U ¯ a Φ U s H by exploring the information of the second-hop channel G . Then, Bob applies the approximated receiver in (17) to the received signal y B ( n ) and detects the messages through a simple symbol-by-symbol distance-based metric
s ^ i = arg min s i M | z i s i | 2 , for i = 1 , , N s
without being affected by the random fluctuation of the first-hop effective channel H ¯ ( n ) . Here, z i and s i denote the i-th element of z and s , respectively, and M represents a set of modulation symbols.

4.5. Detection Process at Eve

By combining the received signals over the two time slots, Eve effectively obtains
y E ( n ) = T aff ( n ) s ( n ) + n aff ( n ) ,
where we have
T aff ( n ) = F P T Q ( n ) H P Ω ( n ) and n aff ( n ) = n E , 1 ( n ) T Q ( n ) n R ( n ) + n E , 2 ( n ) .
Also, as in the case of AN, we assume that Eve can accurately estimate its ENC. Then, we apply the MCA technique to y E ( n ) in order to mitigate the effect of possible noise and interference terms as
y E ( n ) = W mca y E ( n ) = T ¯ aff ( n ) s ( n ) + n w ( n ) ,
where T ¯ aff ( n ) = W mca T aff ( n ) with W mca being obtained from the estimated ENC as in (8).
It is easily inferred from (25) that the proposed AFF design is inherently robust to ANE attacks because the jamming noise is multiplied to the information bearing signals rather than being added as interference. It is also noteworthy that even if the CSI of the wiretap channels F and T is known to Eve, Eve is still impaired by the absence of knowledge regarding the random precoder sequence { Ω ( n ) } n = 1 N as well as the legitimate link CSI H and G . In this situation, the best strategy available at Eve is to adopt the blind estimation schemes. Unlike the case of AN, however, the random precoder Ω varying over short intervals will continuously hinder Eve’s blind estimation even after the MCA is applied. In particular, if Ω changes in every symbol time, i.e., T = 1 , Eve’s error rate can be non-negligibly high, although it may increase the short-term computational complexity at the relay.
In terms of maximum likelihood (ML), the blind estimation is performed as [43,44]
S ^ = arg min S M N N s min T ¯ aff Y E T ¯ aff S F 2 = arg max S M N N s Tr Y E S H ( S S H ) 1 S Y E H ,
which can be found by an exhaustive search over the entire symbol space | M | N N s with | M | denoting the number of symbols in M . This incurs high search complexity, but the use of sphere decoding may alleviate the computational burden to some extent [43]. Such a blind technique works well in the case where Eve’s effective channel T ¯ aff remains constant over a relatively long period of time, e.g., T N . In contrast, as T decreases, the accuracy of signal detection gradually degrades. Our statement so far will be demonstrated in Section 5 via simulation results.

4.6. Complexity Analysis

In this subsection, we briefly analyze the required computational complexity of the non-secure, AN-based secure, and the proposed AFF-based secure MMSE relaying designs at each node. Note that for fair comparison and practical relevance, the computational complexity of all three techniques is analyzed based on their respective closed-form solutions. In general, a single real-valued addition or multiplication is counted as one floating point operation (flop). As a result, a complex addition and a complex multiplication require 2 and 6 flops, respectively, which implies that the number of multiplications in the complex domain dominates overall complexity.
For simplicity, in this paper, we count each complex multiplication as one flop with any additive and real valued operations being omitted. For operations such as ED and matrix inversion (MI), it is also cumbersome to precisely quantify the exact computational cost. Thus, the associated complexity is characterized in terms of the order of growth O ED ( · ) and O MI ( · ) with respect to the matrix dimension, respectively. In addition, some transmit and receive filters need to be updated only once over the channel coherence time. Therefore, the computational complexity can be evaluated from two perspectives, namely, symbol-level short-term and coherence-time-level long-term complexity.
The results of our complexity analysis are summarized in Table 2. It can be observed that compared with the conventional non-secure and AN-based secure designs, the proposed AFF exhibits a noticeable complexity increase at the relay, particularly from the short-term perspective. A major part of the complexity increase stems from the symbol-level computation of the relay receiver L bd ( n ) , including a matrix computation H ¯ H ( n ) H ¯ ( n ) and a N s × N s matrix inversion. However, performing these computations within a symbol duration, which is usually several tens of μ s [45], could be challenging. It is also worth noting that the proposed relay-side receiver assumes perfect synchronization of the random precoders between Alice and the relay.
One notable feature of the proposed AFF scheme is that the source and the relay can locally generate and pre-share a set of the random precoder sequence in advance. In this case, the relay does not need to compute filters at every symbol interval. Instead, all transmit and receive filters to be used over the coherence time can be pre-computed at the beginning of each coherence block. Then, at each symbol time, the relay simply selects and applies the corresponding pre-computed filter. In this manner, the proposed approach can further reduce the short-term complexity to the level of non-secure designs. Such a characteristic is distinguished from existing symbol-level precoding approaches [36,46], which requires symbol-level precoder computation depending on the modulated symbols. Meanwhile a rigorous robustness analysis under imperfect or delayed precoding conditions would require explicit modeling of precoder mismatch and synchronization errors. Thus, the development of robust receiver designs that can tolerate such impairments remains an open and meaningful extension of the proposed framework.

5. Simulation Results

In this section, we present numerical simulation results to demonstrate the effectiveness of the proposed AFF designs. For ease of exposition, we set P A = P R = P 0 and define SNR = P 0 / σ n 2 throughout the section. We adopted a Rayleigh block fading channel model, where all channel coefficients are generated according to a complex Gaussian distribution CN ( 0 , 1 ) for each coherence block, which implies that all inter-node distances are considered to be identical. Further, Eve observes the same signals redundantly over two time slots unlike Bob, which effectively doubles the number of antennas. Thus, the model configures a channel environment that is favorable to Eve rather than Bob.
We consider uncoded transmission from Alice with R s = I N s in order to isolate the impact of the proposed design on the detection performance. Also, we use the binary phase shift keying (BPSK) modulation scheme with K = 2 , N = 25 , and T = 1 unless stated otherwise. With regard to the AFF precoder, we choose each element of Ω from the i.i.d. Gaussian distribution such that Ω CN ( 0 , σ ω 2 ) , which was shown to minimize the leakage information to Eve [23]. Here, we set σ ω 2 = 1 / N s to meet the design condition E [ Ω Ω H ] = I N s .
In our simulation, it is assumed that Eve attains prior knowledge on the first U symbol vectors, i.e., U = [ s ( 1 ) , , s ( U ) ] out of N symbols in S in each coherence block. Such an assumption captures a realistic threat model where Eve leverages prior knowledge of the underlying communication protocol or standard. For example, when Eve is aware of the signal field or control channel structures in a data packet, it may be able to infer certain messages such as control information contained within it. Therefore it is important to observe Eve’s detection behavior according to the amount of messages leaked to Eve.
With this prior knowledge, Eve first estimates its ENC by invoking the ML-based ENC estimation process. Further, we consider that Eve is equipped with a sufficiently large number of antennas such that N e 1 2 ( M E + N s ) to perform ANE. Note that it can be numerically verified that in terms of Eve, M E = M and 2 N s exhibit the best performance for AN and AFF schemes, respectively. Based on these capabilities, Eve applies MCA to the received signals as in (9) and (25) to attenuate the effect of noise. Finally, it attempts to intercept the messages from N observed signals Y E = [ y E ( 1 ) , , y E ( N ) ] through the blind estimation method in (26). All BER results in this section were obtained by averaging over 10 6 Monte Carlo trials and employ a fixed error-count stopping criterion of 1000 observed errors, resulting in consistent confidence interval widths across different scenarios.
Figure 2 depicts the BER performance of the proposed AFF scheme at Bob in N a = N b = N e = N s = 4 and N r = 8 wiretap relay channels. From this figure, we confirm that the proposed optimization schemes such as the GD and closed-form (CL) methods achieve substantial performance gains compared to a naive solution K = β I N b × N s . While the performance gain gradually diminishes as N r increases, a diversity gain is observed for all schemes. It is also demonstrated that over the entire SNR range, the suboptimal receiver in (17) achieves performance close to the optimal scheme in (16) despite being independent of the first-hop channel. For this reason, in the following, we consider the CL with a suboptimal receiver as a representative AFF scheme, which is more practical than the optimal designs and achieves a performance gain over the naive scheme.
Figure 3 illustrates the BER performance of the AN and AFF schemes at Eve in N a = N b = N e = 4 and N r = 8 wiretap relay channels. In this figure, we assumed that Eve has U = 20 prior knowledge, which enables Eve to estimate its ENC with sufficient accuracy to perform ANE. In addition, we consider N s = 3 and 4 spatial multiplexing transmission scenarios with and without ANE at Eve. As for the AN-based design, we set ν = 0.1 and 0.05 , which implies that 90 % and 95 % of the transmit power is allocated to the artificial noise, respectively. The simulation results demonstrate that while the proposed AFF is robust to ANE attack, the AN-based jamming scheme is highly vulnerable to such an attack even in the case of high AN power. In contrast, as the signal power ratio, i.e., ν , increases, this vulnerability deteriorates more rapidly. From the BER plots obtained without ANE, one can observe slight fluctuations with increasing SNR. This behavior is explained by the absence of ANE, whereby higher SNR levels also amplify the effect of interference.
In Figure 4, we examine the effect of Eve’s prior knowledge U on the detection probability in N a = N r = N e = 4 and N b = N s = 2 wiretap channels. As observed in the figure, when the amount of leaked a priori information U is relatively small, both the AN and AFF schemes appear to be secure. However, as U increases, the probability of information leakage gradually increases. This behavior is attributed to the improved accuracy of ENC estimation with increasing U. One notable point is that as both U and ν increase, the detection probability of the AN scheme rises more rapidly than that of the AFF scheme.
Figure 5 illustrates the BER performance of Bob and Eve in N a = N e = 4 and N b = N s = 2 wiretap relay channels with various N r . We see that U = 10 and ν = 0.02 for the AN-based design. This figure shows that, for the AN-based design, up to 98 % of the maximum transmit power must be allocated to AN in order to achieve a security level comparable to that of the proposed AFF scheme. Moreover, it can be observed that, at the same security level, the proposed AFF scheme provides improved detection performance for Bob compared to the AN scheme.
Figure 6 compares the BER performance of the proposed AFF scheme at Eve in N a = N b = N s = 2 and N r = 24 wiretap relay channels. Here, we examine how the security performance of the proposed AFF scheme varies with the parameter K. It is confirmed from the figure that as K increases, the security level enhances regardless of the number of Eve’s antennas N e . However, it is noteworthy that security comes at the cost of diversity loss of Bob due to reduced degrees of freedom at the relay.
Figure 7 exhibits the BER performance of the proposed AFF scheme at Eve with respect to the effective channel coherence time T. In this figure, we set U = 1 considering a typical Eve that captures little priory information from the received data frame. In this case, the accuracy of ENC estimation is significantly degraded, and thus ANE hardly operates effectively. To exclude the malfunction of ANE, this figure examines the variation in Eve’s error rate with respect to the rate of the AFF precoder in the absence of ANE. It can be observed that the system remains highly secure when T is small, whereas the security threat to the proposed AFF scheme increases as T grows. As discussed in the complexity analysis in Section 4.6, reducing the variation interval T may increase the computational complexity at the relay. However, in scenarios where the AFF precoder can be generated locally in advance, all the required filters can be precomputed, thereby alleviating the implementation complexity to some extent even for small values of T. In this figure, the confidence intervals are illustrated as error bars to demonstrate the statistical reliability of the Monte Carlo simulation results. Specifically, 95% confidence intervals were computed based on the total number of transmitted bits and observed errors using the exact Clopper–Pearson method [47] for binomial distribution. Although not presented in the previous figures, all other BER results exhibit confidence intervals of comparable width for the same simulation settings.

6. Conclusions and Future Works

In this paper, we have proposed a novel AFF design for MMSE-based spatial multiplexing MIMO AF relay systems to enhance physical-layer security. The key idea is to introduce a random precoder at the transmitter that deliberately randomizes the relay channel, thereby inducing artificial fast fading at the eavesdropper while maintaining reliable communication for the legitimate user. By jointly optimizing the transmit and receive filters at each node for the MMSE criterion, the proposed scheme effectively mitigates the impact of precoder randomness on Bob’s reception while significantly deteriorating Eve’s detection performance. The proposed approach achieves LPI without requiring modification to the standard training structure of conventional MMSE-based relaying systems, making it readily applicable to existing frameworks. Simulation results confirm that the designed AFF-based scheme successfully suppresses information leakage to the eavesdropper while guaranteeing communication quality for the legitimate receiver.
Future work will focus on extending the analysis toward theoretical evaluation of the secrecy rate, providing a quantitative measure of the achievable secure throughput. One may also extend this framework to more practical scenarios such as the existence of partial correlation between the legitimate and wiretap channels, channel estimation and synchronization errors, and user mobility, thereby further strengthening its robustness against advanced eavesdropping strategies. It is also noteworthy that the proposed AFF scheme is primarily designed for relay-assisted scenarios, where the direct path between Alice and Bob does not exist due to high path loss. As we assume that Bob does not share a secret key with Alice, Bob is unable to leverage the direct signals from Alice, even if there exists a non-negligible direct link. An extension of our scheme to the scenarios of utilizing the direct link will also be an interesting topic for future works.

Author Contributions

Conceptualization, C.S.; methodology, K.K. and C.S.; software, K.K.; validation, C.S. and K.K.; formal analysis, C.S.; investigation, K.K.; resources, K.K.; data curation, C.S.; writing—original draft preparation, K.K.; writing—review and editing, C.S.; visualization, K.K.; supervision, C.S.; project administration, C.S.; funding acquisition, C.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2021R1A2C2012558).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Wyner, A.D. The wiretap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  2. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Trans. Inf. Theory 2010, 56, 3088–3104. [Google Scholar] [CrossRef]
  3. Csiszar, I.; Korner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef]
  4. Ling, C.; Luzzi, L.; Belfiore, J.-C.; Stehle, D. Semantically secure lattice codes for the Gaussian wiretap channel. IEEE Trans. Inf. Theory 2014, 60, 6399–6416. [Google Scholar] [CrossRef]
  5. Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tutor. 2019, 21, 2734–2771. [Google Scholar] [CrossRef]
  6. Niu, H.; Xiao, Y.; Chen, J.; Xiao, Z.; Li, M.; Yuen, C. A survey on artificial noise for physical layer security: Opportunities, technologies, guidelines, advances, and trends. IEEE Commun. Surv. Tutor. 2025, 28, 341–381. [Google Scholar] [CrossRef]
  7. Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  8. Lin, P.H.; Lai, S.H.; Lin, S.C.; Su, H.J. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J. Sel. Areas Commun. 2013, 31, 1728–1740. [Google Scholar] [CrossRef]
  9. Yun, S.; Kang, J.M.; Kim, I.M.; Ha, J. Deep artificial noise: Deep learning-based precoding optimization for artificial noise scheme. IEEE Trans. Veh. Technol. 2020, 69, 3465–3469. [Google Scholar] [CrossRef]
  10. Khandaker, M.R.A.; Masouros, C.; Wong, K.-K. Constructive interference based secure precoding: A new dimension in physical layer security. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2256–2268. [Google Scholar] [CrossRef]
  11. Niu, H.; Lei, X.; Xiao, Y.; Liu, D.; Li, Y.; Zhang, H. Power minimization in artificial noise aided generalized spatial modulation. IEEE Commun. Lett. 2020, 14, 961–965. [Google Scholar] [CrossRef]
  12. Hu, J.; Cai, Y.; Yang, N.; Zhou, X.; Yang, W. Artificial-noise-aided secure transmission scheme with limited training and feedback overhead. IEEE Trans. Wirel. Commun. 2017, 16, 193–205. [Google Scholar] [CrossRef]
  13. Harper, A.D.; Ma, X. MIMO wireless secure communication using data-carrying artificial noise. IEEE Trans. Wirel. Commun. 2016, 15, 8051–8062. [Google Scholar] [CrossRef]
  14. Liu, S.; Hong, Y.; Viterbo, E. Artificial noise revisited. IEEE Trans. Inf. Theory 2015, 61, 3901–3911. [Google Scholar] [CrossRef]
  15. Wen, Y.; Yoshida, M.; Zhang, J.; Chu, Z.; Xiao, P.; Tafazolli, R. Machine learning based attack against artificial noise-aided communication. In Proceedings of the 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019. [Google Scholar]
  16. Niu, H.; Xiao, Y.; Lei, X.; Xiao, M. Artificial noise elimination: From the perspective of eavesdropper. IEEE Trans. Commun. 2022, 70, 4745–4754. [Google Scholar] [CrossRef]
  17. Niu, H.; Wu, G.; Wang, C.; Yuen, C.; Adachi, F. Artificial noise elimination without the transmitter-receiver CSI. IEEE Trans. Veh. Technol. 2024, 73, 13206–13218. [Google Scholar] [CrossRef]
  18. Li, X.; Hwu, J.; Ratazzi, E.P. Using antenna array redundancy and channel diversity for secure wireless transmissions. J. Commun. 2007, 2, 24–32. [Google Scholar] [CrossRef]
  19. Li, Z.; Xia, X.G. A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of interception. IEEE Trans. Wirel. Commun. 2009, 8, 3372–3379. [Google Scholar] [CrossRef]
  20. Kozai, Y.; Saba, T. An artificial fast fading generation scheme for physical layer security of MIMO-OFDM system. In Proceedings of the 9th International Conference on Signal Processing and Communication Systems (ICSPCS), Cairns, QLD, Australia, 14–16 December 2015. [Google Scholar]
  21. Song, C.; Lee, K.-J. Regularized artificial fast fading designs for secure transmission in multi-user MIMO wiretap channels. ICT Express 2022, 8, 569–574. [Google Scholar] [CrossRef]
  22. Wang, H.M.; Zheng, T.; Xia, X.G. Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. artificial fast fading. IEEE Trans. Wirel. Commun. 2015, 14, 94–106. [Google Scholar] [CrossRef]
  23. Song, C. Achievable Secrecy rate of artificial fast-fading techniques and secrect-key assisted design for MIMO wiretap channels with multiantenna passive eavesdropper. IEEE Trans. Veh. Technol. 2018, 67, 10059–10063. [Google Scholar] [CrossRef]
  24. Akhtar, A.M.; Behnad, A.; Wang, X. On the secrecy rate achievability in dual-hop amplify-and-forward relay networks. IEEE Wirel. Commun. Lett. 2014, 3, 493–496. [Google Scholar] [CrossRef]
  25. Li, B.; Zhang, M.; Rong, Y.; Han, Z. Artificial noise-aided secure relay communication with unknown channel knowledge of eavesdropper. IEEE Trans. Wirel. Commun. 2021, 20, 3168–3179. [Google Scholar] [CrossRef]
  26. Kim, S.-I.; Kim, I.-M.; Heo, J. Secure transmission for multi-user relay networks. IEEE Trans. Wirel. Commun. 2015, 14, 3724–3737. [Google Scholar] [CrossRef]
  27. Park, K.-H.; Wang, T.; Alouini, M.-S. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming. IEEE J. Sel. Areas Commun. 2013, 31, 1741–1750. [Google Scholar] [CrossRef]
  28. Ding, Z.; Ma, Z.; Fan, P. Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise. IEEE Wirel. Commun. 2014, 13, 2189–2203. [Google Scholar] [CrossRef]
  29. Atapattu, S.; Ross, N.; Jing, Y.; Premaratne, M. Source-based jamming for physical layer security on untrusted full-duplex relay. IEEE Commun. Lett. 2019, 23, 842–846. [Google Scholar] [CrossRef]
  30. Lee, K.; Hong, J.-P.; Choi, H.-H. Adaptive jamming power control for untrusted relay networks with imperfect channel reciprocity. IEEE Syst. J. 2020, 14, 4217–4220. [Google Scholar] [CrossRef]
  31. Moon, J.; Lee, H.; Song, C.; Kang, S.; Lee, I. Relay-assisted proactive eavesdropping with cooperative jamming and spoofing. IEEE Trans. Wirel. Commun. 2018, 17, 6958–6971. [Google Scholar] [CrossRef]
  32. Moon, J.; Lee, H.; Song, C.; Lee, S.; Lee, I. Proactive eavesdropping with full-duplex relay and cooperative jamming. IEEE Trans. Wirel. Commun. 2018, 17, 6707–6719. [Google Scholar] [CrossRef]
  33. Song, C.; Lee, K.-J.; Lee, I. MMSE based transceiver designs in closed-loop non-regenerative MIMO relaying systems. IEEE Trans. Wirel. Commun. 2010, 9, 2310–2319. [Google Scholar] [CrossRef]
  34. Song, C. Designs of MIMO amplify-and-forward wireless relaying networks: Practical challenges and solutions based on MSE decomposition. IEEE Access 2017, 5, 9223–9234. [Google Scholar] [CrossRef]
  35. Liu, S.; Hong, Y.; Viterbo, E. Practical secrecy using artificial noise. IEEE Commun. Lett. 2013, 17, 1483–1486. [Google Scholar] [CrossRef]
  36. Kalantari, A.; Soltanalian, M.; Maleki, S.; Chatzinotas, S.; Ottersten, B. Directional modulation via symbol-level precoding: A way to enhance security. IEEE J. Sel. Top. Signal Process. 2016, 10, 1478–1493. [Google Scholar] [CrossRef]
  37. Mauro, J.D.; Salazar, E.; Scolnik, H.D. Design and implementation of a novel cryptographically secure pseudorandom number generator. arXiv 2025, arXiv:2503.17767. [Google Scholar] [CrossRef]
  38. Guan, W.; Luo, H. Joint MMSE transceiver design in non-regenerative MIMO relay systems. IEEE Commun. Lett. 2008, 12, 517–519. [Google Scholar] [CrossRef]
  39. Rong, Y.; Tang, X.; Hua, Y. A unified framework for optimizing linear non-regenerative multi-carrier MIMO relay communication systems. IEEE Trans. Signal Process. 2009, 57, 4837–4851. [Google Scholar] [CrossRef]
  40. Golub, G.H.; Loan, C.F.V. Matrix Computations, 4th ed.; Johns Hopkins University Press: Baltimore, MD, USA, 2013. [Google Scholar]
  41. Hjorungnes, A.; Gesbert, D. Complex-valued matrix differentiation: Technniques and key results. IEEE Trans. Signal Process. 2007, 55, 2740–2746. [Google Scholar] [CrossRef]
  42. Bazaraa, M.S.; Sherali, H.D.; Shetty, C.M. Nonlinear Programming: Theory and Algorithms, 3rd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2006. [Google Scholar]
  43. Vikalo, H.; Hassibi, B.; Stoica, P. Efficient joint maximum likelihood channel estimation and signal detection. IEEE Trans. Wirel. Commun. 2006, 5, 1838–1845. [Google Scholar] [CrossRef]
  44. Chi, Y. Regularized blind detection for MIMO communications. In Proceedings of the 2010 IEEE International Symposium of Information Theory (ISIT), Austin, TX, USA, 13–18 June 2010. [Google Scholar]
  45. Lin, X. An overview of 5G advanced evolution in 3GPP release 18. IEEE Commun. Stand. Mag. 2022, 6, 77–83. [Google Scholar] [CrossRef]
  46. Li, A.; Spano, D.; Krivochiza, J.; Domouchtsidis, S.; Tsinos, C.G.; Masouros, C. A tutorial on interference exploitation via symbol-level precoding: Overview, state-of-the-art and future directions. IEEE Commun. Sur. Tutor. 2020, 22, 796–839. [Google Scholar] [CrossRef]
  47. Clopper, C.J.; Pearson, E.S. The use of confidence or fiducial limits illustrated in the case of the binomial. Biometrika 1934, 26, 404–413. [Google Scholar] [CrossRef]
Figure 1. A schematic diagram for MIMO AF relaying systems with wiretap channels and deliberate precoder randomization (Red arrows indicate wiretap channels to Eve).
Figure 1. A schematic diagram for MIMO AF relaying systems with wiretap channels and deliberate precoder randomization (Red arrows indicate wiretap channels to Eve).
Sensors 26 00860 g001
Figure 2. BER performance comparison of the proposed AFF schemes at Bob with respect to SNR (dashed lines: suboptimal receiver, solid lines: optimal receiver).
Figure 2. BER performance comparison of the proposed AFF schemes at Bob with respect to SNR (dashed lines: suboptimal receiver, solid lines: optimal receiver).
Sensors 26 00860 g002
Figure 3. BER performance comparison of the proposed AFF and AN schemes at Eve with respect to SNR (dashed lines: with ANE, solid lines: without ANE).
Figure 3. BER performance comparison of the proposed AFF and AN schemes at Eve with respect to SNR (dashed lines: with ANE, solid lines: without ANE).
Sensors 26 00860 g003
Figure 4. BER performance comparison of the proposed AFF and AN schemes at Eve with respect to Eve’s prior knowledge U.
Figure 4. BER performance comparison of the proposed AFF and AN schemes at Eve with respect to Eve’s prior knowledge U.
Sensors 26 00860 g004
Figure 5. BER performance comparison of the proposed AFF and AN schemes at both Bob and Eve with respect to SNR (dashed lines: Eve, solid lines: Bob).
Figure 5. BER performance comparison of the proposed AFF and AN schemes at both Bob and Eve with respect to SNR (dashed lines: Eve, solid lines: Bob).
Sensors 26 00860 g005
Figure 6. BER performance comparison of the proposed AFF scheme at Eve with respect to SNR (dashed lines: N e = 4 , solid lines: N e = 2 ).
Figure 6. BER performance comparison of the proposed AFF scheme at Eve with respect to SNR (dashed lines: N e = 4 , solid lines: N e = 2 ).
Sensors 26 00860 g006
Figure 7. BER performance comparison of the proposed AFF scheme at Eve with respect to the effective coherence time T.
Figure 7. BER performance comparison of the proposed AFF scheme at Eve with respect to the effective coherence time T.
Sensors 26 00860 g007
Table 1. The amount of CSI at each node.
Table 1. The amount of CSI at each node.
AliceRelayBobEve
H H , G G F , T
Table 2. Computational complexity comparison.
Table 2. Computational complexity comparison.
SourceRelay
Short-TermLong-TermShort-TermLong-Term
Unsecured N a N s O ED ( N a 3 ) 2 N r N s O MI ( N s 3 ) + O ED ( N r 3 ) + N r ( N s 2 + N r N s )
AN-based N a 2 N r ( N r + N s ) O MI ( N s 3 ) + O ED ( N r 3 ) + N r ( N s 2 + N r N s )
AFF-based N s ( N a + N s ) O MI ( N s 3 ) + N s ( 2 N r + N s ) + N s 2 N r K O MI ( N b 3 ) + O ED ( N b 3 ) + N r ( 3 N b 2 + N b N s + N r N s + N s 2 + N s )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ko, K.; Song, C. A Secure Spatial Multiplexing Transmission Scheme in MIMO Amplify-and-Forward Wiretap Relaying Systems Using Deliberate Precoder Randomization. Sensors 2026, 26, 860. https://doi.org/10.3390/s26030860

AMA Style

Ko K, Song C. A Secure Spatial Multiplexing Transmission Scheme in MIMO Amplify-and-Forward Wiretap Relaying Systems Using Deliberate Precoder Randomization. Sensors. 2026; 26(3):860. https://doi.org/10.3390/s26030860

Chicago/Turabian Style

Ko, Kyunbyoung, and Changick Song. 2026. "A Secure Spatial Multiplexing Transmission Scheme in MIMO Amplify-and-Forward Wiretap Relaying Systems Using Deliberate Precoder Randomization" Sensors 26, no. 3: 860. https://doi.org/10.3390/s26030860

APA Style

Ko, K., & Song, C. (2026). A Secure Spatial Multiplexing Transmission Scheme in MIMO Amplify-and-Forward Wiretap Relaying Systems Using Deliberate Precoder Randomization. Sensors, 26(3), 860. https://doi.org/10.3390/s26030860

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop