Low-complexity and High-performance Receive Beamforming for Secure Directional Modulation Networks against an Eavesdropping-enabled Full-duplex Attacker
Abstract
In this paper, we present a novel scenario for directional modulation (DM) networks with a full-duplex (FD) malicious attacker (Mallory), where Mallory can eavesdrop the confidential message from Alice to Bob and simultaneously interfere Bob by sending a jamming signal. Considering that the jamming plus noise at Bob is colored, an enhanced receive beamforming (RBF), whitening-filter-based maximum ratio combining (MRC) (WFMRC), is proposed. Subsequently, two RBFs of maximizing the secrecy rate (Max-SR) and minimum mean square error (MMSE) are presented to show the same performance as WFMRC. To reduce the computational complexity of conventional MMSE, a low-complexity MMSE is also proposed. Eventually, to completely remove the jamming signal from Mallory and transform the residual interference plus noise to a white one, a new RBF, null-space projection (NSP) based maximizing WF receive power, called NSP-based Max-WFRP, is also proposed. From simulation results, we find that the proposed Max-SR, WFMRC, and low-complexity MMSE have the same SR performance as conventional MMSE, and achieve the best performance while the proposed NSP-based Max-WFRP performs better than MRC in the medium and high signal-to-noise ratio regions. Due to its low-complexity,the proposed low-complexity MMSE is very attractive. More important, the proposed methods are robust to the change in malicious jamming power compared to conventional MRC.
Index Terms:
Malicious attacker, secure, directional modulation, secrecy rate, receive beamforming, null-space projection (NSP).I Introduction
In the past decade, physical layer security (PLS) has attracted wide attention from academia [1, 2, 3, 4, 5, 6, 7, 8]. Directional modulation (DM), as an advanced PLS transmission technique, is suitable for line-of-sight (LoS) propagation channel. Beamforming technology with artificial noise (AN) has a capability of creating a secure transmission in the LoS propagation channel [9, 10, 11, 4].
In [12], the authors presented a DM technique that uses the phased arrays to generate modulation and provides security by deliberately distorting signals in other directions and making the signal independent of direction. An orthogonal vector approach was proposed in [9] for the synthesis of multi-beam DM transmitters. In [10, 13], the authors developed robust synthesis schemes, in which DM is able to enhance the security performance of desired directions and distort the constellation points of undesired directions. These systems have the capability of concurrently projecting independent data streams along different specified spatial directions while simultaneously distorting signal constellations in all other directions. A directional modulation technique using frequency diverse array (FDA) for secure communications was proposed in [14, 15, 16, 17, 18, 19, 20]. In [14, 15], the authors developed a novel DM scheme based on random frequency diverse arrays with artificial noise (RFDA-DM-AN) to enhance physical layer security of wireless communications. In order to address the limitations of the previous works and further enhance physical layer (PHY) security, an AN-aided index modulation (IM) scheme with cooperative LUs based on FDA beamforming was proposed in [16]. Multi-beam directional modulation schemes based on FDA were investigated in [16, 17, 18]. Different from the traditional directional modulation that only implements angle dependent directional modulation, the authors proposed some precise secure transmission schemes of achieving two-dimensional dependence on angle and range dimensions in [14, 19, 20]. In the multi-carrier based DM antenna array system design, to solve the problems of high peak-to-average-power ratio (PAPR) and phase pattern formation simultaneously, a method, called wideband beam and phase pattern formation by Newton’s (WBPFN), was proposed in [21]. In [22], the authors developed a multi-carrier based DM framework using antenna arrays, which can realize data transmission on multiple frequencies simultaneously, so as to obtain a higher data rate. A practical wireless transmission scheme was proposed in [11] to transmit the confidential message (CM) to the desired user securely and precisely by jointly exploiting multiple techniques, including artificial noise (AN) projection, phase alignment/beamforming, and random subcarrier selection (RSCS) based on orthogonal frequency division multiplexing (OFDM)[23, 24], and DM. Particularly, if a DM transmitter intends to transmit CM to Bob and to interfere eavesdropper (Eve) with AN, she needs to know the directions of Bob and Eve in advance. In [25], two phase alignment (PA) methods, hybrid analog and digital PA and hybrid digital and analog PA, were proposed to estimate direction of arrival (DOA) based on the parametric method. In [26], the authors proposed an improved hybrid analog-digital (HAD) estimation of signal parameters via rotational invariance techniques (ESPRIT) at HAD transceiver to measure the DOA of a desired user.
However, the aforementioned existing works focused on the scenarios with only a passive eavesdropper Eve having no active malicious attacking capacity. In such a situation, it is hard for Alice to obtain the channel state information (CSI) from Alice to Eve. This is an embarrassing issue usually raised by secure expert. How to address this challenging issue? If Eve behaves like Mallory, with an active malicious attacking ability, this problem naturally disappears. By channel estimating, Alice may obtain the CSI from Alice to Mallory and Bob can obtain the CSI from Mallory to Bob. In [27], the authors proposed a jamming detection method for non-coherent single input multiple output (SIMO) systems without CSI. A hybrid wiretapping wireless system with a half-duplex adversary was proposed in [28], where the adversary can decide to either jam or eavesdrop the transmitter-to-receiver channel. In the presence of a full-duplex eavesdropper having both eavesdropping and jamming capabilities, the authors in [29] proposed a novel secure transmission strategy against eavesdropping by the sophisticated adversary. The authors in [30] studied the secrecy outage probability and mean SR of the system to evaluate the security performance of the system. In this paper, our focus is on how to suppress the malicious jamming and improve the secure performance by designing receive beamforming (RBF) at Bob in the presence of the malicious jamming.
In this paper, we present a novel DM scenario with a full-duplex (FD) malicious attacker Mallory. Moreover, Mallory also eavesdrops the CM conveyed from Alice to Bob. To reduce the impact of jamming from Mallory on Bob and improve the secure performance, four RBF methods are proposed. Our main contributions are summarized as follows:
-
1.
To alleviate the jamming from Mallory on Bob and improve the secure performance, the conventional MRC RBF at Bob is presented to strengthen the confidential signal. To enhance its performance, a WFMRC RBF is proposed by converting the colored interference plus noise at Bob into a white one with its covariance matrix being a multiple of identity matrix. Then, two RBFs Max-SR and conventional MMSE are derived. From simulation results, the proposed two RBFs WFMRC and Max-SR obviously outperform the conventional MRC in the medium and high SNR regions and achieve the same performance as conventional MMSE in terms of SR and BER.
-
2.
To completely remove the jamming from Mallory, a new RBF of maximizing the WF-based receive power at Bob is proposed to force the malicious jamming onto the null-space (NSP) of the channel spanning from Alice to Bob. By exploiting the rank-one property of channel steering vector, a low-complexity MMSE is proposed to reduce the complexity of conventional MMSE without performance loss. According to simulation, we find that the proposed NSP-based Max-WFRP is slightly worse than Max-SR, WFMRC and low-complexity MMSE in terms of the SR performance. Its main advantage is that its SR performance is independent of the change in malicious jamming power. Moreover, the proposed low-complexity MMSE has achieved the same performance as three proposed high-performance RBFs WFMRC, conventional MMSE, and Max-SR with an extremely low-complexity.
The remainder of this paper is organized as follows. Section II presents the DM system model. In Section III, four schemes of design RBF vector is proposed and its closed-form expression is given. Simulation and numerical results are shown in Section IV. Finally, we draw our conclusions in Section V.
Notations: Throughout the paper, matrices, vectors, and scalars are denoted by letters of bold upper case, bold lower case, and lower case, respectively. Signs , , , , and represent transpose, inverse, Moore-Penrose, conjugate transpose, norm and trace, respectively. denotes the identity matrix. The notation represents the expectation operation.
II System Model

The proposed DM system is illustrated in Fig. 1. It consists of an -antennas base station (Alice), a legitimate -antennas user (Bob) and an illegal -antennas malicious attacker (Mallory). Here, the Alice sends CM to the Bob. In addition, there is an illegal malicious attacker Mallory trying to intercept the CM. Mallory operates on the FD model. That is, he/she can eavesdrop on CM, and simultaneously initiate an active attack on Bob. The baseband transmit signal can be expressed as
(1) |
where is the total transmit power, stands for the power allocation (PA) factor, denotes the transmit beamforming vector of the CM, and is the projection matrix for controlling AN to the undesired direction, where and . In addition, is defined as the transmit beamforming vector for the CM. In (1), is the CM with average power and denotes the AN vector with complex Gaussian distribution, i.e., . The malicious attacking signal at Mallory can be expressed as
(2) |
where is the projection matrix for forcing the jamming to Bob, . Herein, is the transmit power at Mallory, denotes the AN vector with complex Gaussian distribution, i.e., .
The corresponding received signal at Bob can be written as
(3) |
where and . denotes the channel matrix from Alice to Bob. denotes the channel matrix from Mallory to Bob. The normalized steering vector as
(4) |
where the phase function is defined by [31]
(5) |
where is the direction of arrival or departure, is the index of antenna, represents the element spacing in the transmit antenna array, and is the wavelength. In (II), is the complex additive white Gaussian noise (AWGN) vector, distributed as . Notably, represents the path loss from Alice to Bob. Here, is the distance between Alice and Bob, denotes the path loss exponent and means the path loss at reference distance . Moreover, represents the receive beamforming vector of Bob. Using the concept of the null-space projection, we can design
(6) |
Similarly, the receive signal at Mallory is given by
(7) |
where . denotes the channel matrix from Alice to Mallory. represents the corresponding path loss, and is the distance between Alice and Mallory. Additionally, represents the receive beamforming vector at Mallory. The complex AWGN at Mallory is denoted by . is the residual self-interference (RSI) channel matrix of Mallory, denotes the residual self-interference parameter of the Mallory after self-interference cancelation [29].
III Proposed Four RBF Methods
In this section, to improve the security rate performance and reduce the effect of jamming from Mallory on Bob, four RBF schemes are proposed. Additionally, the conventional MRC is also presented as a performance benchmark for the future comparison.
III-A Conventional MRC and Proposed WFMRC
From the definition of conventional MRC, we have
(17) |
under the approximation that is viewed as a white Gaussian noise vector with zero mean and covariance matrix being identity matrix multiplied by a scalar. However, is a sum of three terms including malicious interference from Mallory, and is colored. Its covariance matrix is
(18) |
which is a positive definite Hermitian matrix, i.e., a normal matrix, and has the eigenvalue-decomposition (EVD) form [32]
(19) |
where is a unitary matrix, is a diagonal matrix with being the i-th eigenvalue of matrix . We can construct the following WF matrix
(20) |
Left multiplication of by leads to
(21) |
where
(22) |
Obviously, the new noise vector becomes a white Gaussian vector with convariance matrix being an identity. Now, similar to (17), the WFMRC is directly given as
(23) |
III-B Proposed Max-SR Method
Now, we turn to the method of maximizing the SR in (16). Observing the SR in (16), it is evident that the available rate at Mallory is independent of . Thus, the optimization problem of the Max-SR
(24) |
reduces to
(25) |
which can be rewritten as
(26) |
which is the Max-SJNR. Let us define
(27) |
then SJNR can be expressed as follows
(28) |
Max-SJNR is rewritten as
(29) |
Let us differentiate the SJNR expression with respect to and set it to zero
(30) |
which means that the numerator equals zero and
(31) |
Observing the above equation, is the eigenvalue and is the eigenvector associated with . In other words, the maximum SJNR is achieved as is taken to be the eigenvector corresponding to the largest eigenvalue of . In particular, the semi-definite positive matrix is rank one, written as
(32) |
with
(33) |
Let us define
(34) |
and multiplying the equality from right by yields
(35) |
which means
(36) |
is the eigenvector corresponding to the largest eigenvalue of matrix . Clearly, we have
(37) |
which is in agreement with the expression in (23). Substituting the above back into (27), we have
(38) |
III-C Proposed low-complexity MMSE Method
In the following, we propose a low-complexity MMSE algorithm based on the minimum mean square error criterion to design receive beamforming. We can derive the by the following optimization formula
(39) |
where , and .
To obtain the optimal receive beamforming, we need to compute the derivative of with respect to ,
(40) |
It is easy to see from Eq.(III-C) that matrix is positive definite. Let , we have the conventional MMSE
(41) |
However, the complexity of the conventional MMSE method mentioned above is the cubic function of , which will become high as tends to large-scale. Interestingly, since the rank of matrix , , and in matrix are one, the Sherman-Morrison formula can be applied to provide a low-complexity way of computing the inverse of matrix . By exploiting the rank-one property of channel steering vector, a low-complexity MMSE is proposed in what follows.
By repeatedly making use of the Sherman-Morrison formula
(42) |
where , , and are invertible, and , we have the low-complexity MMSE method as follows
(43) |
where
(44) |
where
(45) |
where
(46) |
where
(47) |
where
(48) |
Proof: See Appendix for detailed deriving process.
After we complete the above derivation, the complexity of the proposed low-complexity MMSE is reduced to the quadratic function of .
III-D Proposed NSP-based Max-WFRP Method
We now trun our attention on solving the Max-RP problem, which can be cast as
(49) |
where constraint (C1) ensures the malicious jamming lying in the null-space of Bob. To simplify the above optimization problem, constraint (C1) implies , and
(50) |
where is defined as a new optimization variable. Since (C1) has projected Malicious jamming into the null-space of Bob’s channel, we obtain the new model,
(51) |
Similar to (III-A), the left multiplication of (III-D) by yields
(52) |
where is defined as
(53) |
and
(54) |
As such, the optimization problem of NSP-based Max-WFRP can be written as
(55) |
where
(56) |
Considering that the rank of the semi-definite positive matrix is unit, can be written as , with . Similar to (III-B), the optimal solution of is directly given by
(57) |
III-E Computational Complexity Analysis
In this subsection, we turn to analyze the computational complexities of the above-mentioned schemes. The computational complexities of MRC, WFMRC, Max-SR, NSP-based Max-WFRP, low-complexity MMSE and conventional MMSE are respectively given by
(58) | |||
(59) | |||
(60) | |||
(61) | |||
(62) | |||
(63) |
float-point operations (FLOPs). Obviously, their complexities have a decreasing order: NSP-based Max-WFRPConventional MMSEMax-SRWFMRCLow-complexity MMSEMRC. Observing equations from (56) to (62), we find the fact: as tends to large-scale, the complexities of MRC, low-complexity MMSE , and remaining methods have the orders ,, and . Clearly, the conventional MRC has the lowest complexity among six methods because its complexity is a linear function of . The proposed MMSE, Max-SR, and WFMRC have the highest same order complexity FLOPs. The proposed low-complexity MMSE is in between them because its complexity is a quadratic function of .
IV Simulation Results and discussions
In this section, simulations are done to evaluate the performance of the proposed RBF schemes. System parameters are set as follows: quadrature phase shift keying (QPSK) modulation, , , , , , , , , , , , , .


Fig. 2 plots the curves of SR versus SNR of the four proposed methods with W, where conventional MRC and MMSE are used as a performance benchmark. It can be seen from this figure that the proposed Max-SR, WFMRC, and low-complexity MMSE have the same SR performance as conventional MMSE, and achieve the best SR performance among all six methods. In the low SNR region, the SR performance of conventional MRC is close to those of the proposed Max-SR, WFMRC, and low-complexity MMSE and better than that of NSP-based Max-WFRP. The proposed NSP-based Max-WFRP performs much better than MRC and worse than the proposed WFMRC, Max-SR, and low-complexity MMSE in the medium and high SNR regions.
Fig. 3 demonstrates the curves of SR versus for the proposed five different methods with and fixed =10W, where conventional MRC and MMSE are still used as a performance benchmark. From Fig. 3, it is seen that regardless of the value of , the proposed WFMRC, Max-SR, and low-complexity MMSE still perform much better than the proposed NSP-based Max-WFRP and conventional MRC in terms of SR. As increases, the SR performance of the proposed WFMRC, Max-SR , and low-complexity MMSE degrade gradually and finally converge to a SR floor. However, this SR floor is still larger than that of NSP-based Max-WFRP with NSP. Interestingly, the SR of NSP-based Max-WFRP with NSP keeps constant and is independent of the change in value of due to the use of NSP operation. Additionally, the conventional MRC shows a dramatic reduction on SR as increases. This means that the proposed NSP-based Max-WFRP with NSP is the most robust one among six methods. The conventional MRC becomes non-robust as the jamming power increases. The proposed remaining methods are in between NSP-based Max-WFRP and MRC in accordance with robustiness.

Fig. 4 demonstrates the curves of BER versus SNR of the proposed five methods with W, where conventional MRC is still used as a BER performance benchmark. From Fig. 4, we can obtain the same performance tendency as Fig. 2. The proposed Max-SR, WFMRC, and low-complexity MMSE still have the best performance in our BER simulation. In the low SNR region, the NSP-based Max-WFRP has the worst BER performance, however when the SNR increases up to a certain level, for example SNR=20dB, its performance will be better than that of conventional MRC. Six RBF methods have an increasing order on BER performance: MRC, NSP-based Max-WFRP, Max-SR WFMRC conventional MMSE low-complexity MMSE.
V Conclusion
In this paper, we have investigated RBF schemes in a DM network with a FD attacker Mallory. Four high-performance RBF schemes, WFMRC, Max-SR, NSP-based Max-WFRP, and low-complexity MMSE were proposed to mitigate the impact of the jamming signal on Bob. First, the conventional MRC was presented to strengthen CM. Due to the colored the jamming plus noise at Bob, the WFMRC was proposed to convert the colored noise to a white one. Then, the Max-SR and low-complexity MMSE were proposed and shown to be equivalent to WFMRC. Eventually, to completely remove the jamming from Mallory, a NSP-based Max-WFRP was proposed. Moreover, their closed-form expressions were derived with extremely low-complexities. Simulation results show that the proposed four methods perform much better than the conventional MRC in the medium and high SNR regions, and their SR performances are in an increasing order: MRC, NSP-based Max-WFRP, and Max-SR=WFMRC=low-complexity MMSE. Compared with conventional MRC, the proposed five methods are more robust against the change of jamming power at Mallory. In particular, the proposed NSP-based Max-WFRP is independent of the change in jamming power at Mallory, and the most robust one among six methods. More importantly, the proposed low-complexity MMSE achieve the same optimal performance as WFMRC, Max-SR, and conventional MMSE while its complexity is one order of magnitude lower than those of the latter methods. This is very attractive.
[Appendix: Derivation of low-complexity MMSE] In order to reduce the complexity of the conventional MMSE in (41), let us first define a new matrix
(64) |
where the rank of matrix , , and in matrix are one. The receive beamforming at Bob can be rewritten as
(65) |
In order to compute the inverse of matrix , we rearrange its inverse in the following form
Observing the above expression, it is clear that and are the rank-one column vectors, using the Sherman-Morrison formula, we directly have
(67) |
Similarly, in the following, by repeatedly making use of the Sherman-Morrison formula four times, we get the inverse matrix
(68) |
where and are the rank-one column vectors, which yields
(69) |
where and are the rank-one column vectors, which yields
(70) |
where and are the rank-one column vectors, which yields
(71) |
where and are still the rank-one column vectors.
References
- [1] H. M. Wang, Q. Yin, and X.-G. Xia, “Distributed beamforming for physical-layer security of two-way relay networks,” IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532–3545, Jul. 2012.
- [2] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. Chen, “A survey on multiple-antenna techniques for physical layer security,” IEEE Communications Surveys Tutorials, vol. 19, no. 2, pp. 1027–1053, 2017.
- [3] N. Zhao, F. R. Yu, M. Li, and V. C. M. Leung, “Anti-eavesdropping schemes for interference alignment (ia)-based wireless networks,” IEEE Trans. Wirel. Commun., vol. 15, no. 8, pp. 5719–5732, 2016.
- [4] Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, “Secure massive mimo transmission with an active eavesdropper,” IEEE Trans. Inf. Theory, vol. 62, no. 7, pp. 3880–3900, Jul. 2016.
- [5] Y. Zou, J. Zhu, X. Li, and L. Hanzo, “Relay selection for wireless communications against eavesdropping: A security-reliability trade-off perspective,” IEEE Netw., vol. 30, no. 5, pp. 74–79, Oct. 2016.
- [6] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wirel. Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
- [7] L. Wang, Z. Zhang, M. Dong, L. Wang, Z. Cao, and Y. Yang, “Securing named data networking: Attribute-based encryption and beyond,” IEEE Commun Mag, vol. 56, no. 11, pp. 76–81, Nov. 2018.
- [8] F. Shu, T. Shen, L. Xu, Y. Qin, S. Wan, S. Jin, X. You, and J. Wang, “Directional modulation: A physical-layer security solution to b5g and future wireless networks,” IEEE Network, vol. 34, no. 2, pp. 210–216, 2020.
- [9] Y. Ding and V. Fusco, “Orthogonal vector approach for synthesis of multi-beam directional modulation transmitters,” IEEE Antennas Wirel. Propag. Lett., vol. 14, pp. 1330–1333, Feb. 2015.
- [10] F. Shu, X. Wu, J. Li, R. Chen, and B. Vucetic, “Robust synthesis scheme for secure multi-beam directional modulation in broadcasting systems,” IEEE Access, vol. 4, pp. 6614–6623, Oct. 2016.
- [11] F. Shu, X. Wu, J. Hu, J. Li, R. Chen, and J. Wang, “Secure and precise wireless transmission for random-subcarrier-selection-based directional modulation transmit antenna array,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 890–904, Apr. 2018.
- [12] M. P. Daly and J. T. Bernhard, “Directional modulation technique for phased arrays,” IEEE Trans. Antennas Propag., vol. 57, no. 9, pp. 2633–2640, Sep. 2009.
- [13] J. Hu, F. Shu, and J. Li, “Robust synthesis method for secure directional modulation with imperfect direction angle,” IEEE Communications Letters, vol. 20, no. 6, pp. 1084–1087, 2016.
- [14] J. Hu, S. Yan, F. Shu, J. Wang, J. Li, and Y. Zhang, “Artificial-noise-aided secure transmission with directional modulation based on random frequency diverse arrays,” IEEE Access, vol. 5, pp. 1658–1667, Jan. 2017.
- [15] B. Qiu, J. Xie, L. Wang, and Y. Wang, “Artificial-noise-aided secure transmission for proximal legitimate user and eavesdropper based on frequency diverse arrays,” IEEE Access, vol. 6, pp. 52 531–52 543, 2018.
- [16] B. Qiu, L. Wang, J. Xie, Z. Zhang, Y. Wang, and M. Tao, “Multi-beam index modulation with cooperative legitimate users schemes based on frequency diverse array,” IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11 028–11 041, 2020.
- [17] Q. Cheng, V. Fusco, J. Zhu, S. Wang, and C. Gu, “Svd-aided multi-beam directional modulation scheme based on frequency diverse array,” IEEE Wireless Communications Letters, vol. 9, no. 3, pp. 420–423, 2020.
- [18] Q. Cheng, V. Fusco, J. Zhu, S. Wang, and F. Wang, “Wfrft-aided power-efficient multi-beam directional modulation schemes based on frequency diverse array,” IEEE Transactions on Wireless Communications, vol. 18, no. 11, pp. 5211–5226, 2019.
- [19] J. Xiong, S. Y. Nusenu, and W.-Q. Wang, “Directional modulation using frequency diverse array for secure communications,” Wireless Personal Communications, vol. 95, pp. 2679–2689, 2017.
- [20] W. Wang, “Dm using fda antenna for secure transmission,” IET Microwaves, Antennas Propagation, vol. 11, no. 3, pp. 336–345, 2017.
- [21] B. Zhang, W. Liu, and Q. Li, “Multi-carrier waveform design for directional modulation under peak to average power ratio constraint,” IEEE Access, vol. 7, pp. 37 528–37 535, 2019.
- [22] B. Zhang and W. Liu, “Multi-carrier based phased antenna array design for directional modulation,” IET Microwaves, Antennas Propagation, vol. 12, no. 5, pp. 765–772, 2018.
- [23] H. Zhu and J. Wang, “Chunk-based resource allocation in ofdma systems - part i: chunk allocation,” IEEE Transactions on Communications, vol. 57, no. 9, pp. 2734–2744, 2009.
- [24] ——, “Chunk-based resource allocation in ofdma systems—part ii: Joint chunk, power and bit allocation,” IEEE Transactions on Communications, vol. 60, no. 2, pp. 499–509, 2012.
- [25] F. Shu, Y. Qin, T. Liu, L. Gui, Y. Zhang, J. Li, and Z. Han, “Low-complexity and high-resolution doa estimation for hybrid analog and digital massive mimo receive array,” IEEE Trans Commun, vol. 66, no. 6, pp. 2487–2501, Jun. 2018.
- [26] Z. Zhuang, L. Xu, J. Li, J. Hu, L. Sun, F. Shu, and J. Wang, “Machine-learning-based high-resolution doa measurement and robust directional modulation for hybrid analog-digital massive mimo transceiver,” Science China Information Sciences, vol. 63, 08 2020.
- [27] S. Xu, W. Xu, C. Pan, and M. Elkashlan, “Detection of jamming attack in non-coherent massive simo systems,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 9, pp. 2387–2399, Sep. 2019.
- [28] Y. O. Basciftci, O. Gungor, C. E. Koksal, and F. Ozguner, “On the secrecy capacity of block fading channels with a hybrid adversary,” IEEE Trans. Inf. Theory, vol. 61, no. 3, pp. 1325–1343, Mar. 2015.
- [29] A. Mukherjee and A. L. Swindlehurst, “A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures,” in Proc. Asilomar Conf. Sign. Syst. Comput., Nov. 2011, pp. 265–269.
- [30] H. Chen, X. Tao, N. Li, Y. Hou, J. Xu, and Z. Han, “Secrecy performance analysis for hybrid wiretapping systems using random matrix theory,” IEEE Trans. Wirel. Commun., vol. 18, no. 2, pp. 1101–1114, Feb. 2019.
- [31] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge University Press, 2005.
- [32] R. A. Horn and C. R. Johnson, Matrix Analysis, 2nd ed. Cambridge University Press, 2012.