On Multiple-Antenna Techniques for Physical-Layer Range Security in the Terahertz Band
Abstract
Terahertz (THz) communications have naturally promising physical layer security (PLS) performance in the angular domain due to the high directivity feature brought by the ultra-massive multiple-antenna techniques. However, traditional multiple-antenna techniques fail to combat eavesdroppers residing in the THz beam sector, even when the communication distances of legitimate users and eavesdroppers are different. This THz range security challenge motivates us to study new multiple-antenna techniques to provide THz range and angular security. In this paper, we first conduct a theoretical analysis of the secrecy capacity of the multiple antenna channel under the range security scenario. Based on this, the frequency diverse array, as a candidate multiple-antenna technique, is proven ineffective in addressing the range security problem. Then, motivated by the theoretical analysis, a novel widely-spaced array and beamforming design for THz range security are proposed, which realize communications in the near-field regions. A non-constrained optimum approaching (NCOA) algorithm is developed to achieve the optimal secrecy rate. Simulation results illustrate that under the range security scenario where the eavesdropper is inside the beam sector, our proposed widely-spaced antenna communication scheme can ensure a 6 bps/Hz secrecy rate when the transmit power is 10 dBm and the propagation distance is 10 m.
I Introduction
I-A Background
With an increasing demand for high-speed, reliable, and private information exchange, a new spectrum and advanced security technologies are awaited to be developed for next-generation wireless networks. The Terahertz (THz) band, with frequencies ranging from 0.1 to 10 THz, is envisioned to realize multi-Gbps or even Tbps data rates owing to the abundant bandwidth resource [1, 2, 3]. In addition to the bandwidth merit, the potential of THz communications to improve information security is envisioned in [4, 5, 6]. As an essential technique in addition to the conventional encryption-based methods, physical layer security (PLS) ensures information privacy at the physical layer of the wireless networks by exploiting transceiver and channel properties, including beamforming, fading, noise, and interference [7]. Compared with the encryption-based methods, the PLS has the advantage of owning reduced overhead for secret key distribution. Moreover, PLS can ensure information secrecy even with an eavesdropper having infinite computational power.
With the equipment of ultra-massive multiple-input multiple-output (UM-MIMO) arrays for THz communications, the narrow and directional beams powered by multiple-antenna techniques bring substantial benefits to PLS [5, 8, 9]. Typically, a THz beam is directed towards the legitimate user through the beam training and tracking processes. With an eavesdropper being located outside or inside the beam, the THz PLS can be divided into two categories, namely, angle security and range security, as illustrated in Fig. 1. On the one hand, for the angle security, the aim is to prevent the eavesdropper from being located inside the beam sector, which improves the PLS in the angular domain. On the other hand, the range security aims at enhancing the secrecy rate when the legitimate user and the eavesdropper are both located inside the beam sector, i.e. when their propagation angles are the same while their ranges differ. Although the traditional multiple-antenna techniques of THz communications can enhance angle security, it fails to provide range security. Fortunately, there is a high probability that we only need to address the angle security problem since the THz beam width is narrow, e.g., approximately for a array,.
Despite the promising confidentiality of THz angle security, solutions to the THz range security problem are still awaited to be explored for the following challenges [5]. First, the signals received by the eavesdropper inside the beam benefit from the same antenna gain as legitimate users, which suggests that the THz directivity and traditional multiple-antenna techniques are ineffective in enhancing the range security. Second, due to the sparsity feature of the THz channel, the PLS technique using multi-paths to aid the security proposed in [10] might not be helpful. More critically, when Eve inside the beam sector is located nearer than the legitimate receiver, i.e., in close proximity, secure communication is significantly jeopardized since the secret codewords decodable by Bob are even easier decodable by the eavesdropper who has an even higher received signal-to-noise ratio (SNR) [9]. This research gap motivates this work aiming at addressing the range security for THz communications.

I-B Related Work
The fundamental limit of a wiretap channel model has been analyzed in [11] including a transmitter Alice (A), a legitimate receiver Bob (B), and an eavesdropper Eve (E). The key metric is characterized by the secrecy rate, defined as the maximum data rate that can be transmitted reliably and confidentially. Traditional multiple-antenna technologies can only improve the secrecy rate in the angular domain. For example, the secrecy capacity with the multiple antennas is calculated in [12], while the multi-antenna-based secure beamforming techniques are proposed in [13], which controls the beamforming pattern to enlarge Bob’s channel capacity while mitigating Eve’s capacity. In [14, 15, 16, 17], as an extension to secure beamforming, the authors develop the artificial noise (AN)-aided beamforming technique to combat eavesdroppers in close proximity, where the AN signals are signals without carrying any information. In particular, AN signals are designed to be injected into the transmitted confidential signal to jam Eve’s channel and enhance the secrecy rate.
Range security technologies, however, are rarely investigated for micro-wave band communications. Since the micro-wave channel contains rich scattering, angle security techniques can utilize the spatial degree of freedoms (SDoF) to mitigate eavesdropping attacks. However, the feature of limited SDoFs in THz communications makes the range security problem essential to be addressed. One useful range security technique in the literature is the receiver AN technique, where the receiver side sends the jamming signals while receiving the confidential signals [18, 19, 20]. On the downside, this technique requires a high-complexity self-interference cancellation (SIC) to transmit the AN signal and receive the information signal simultaneously. Another range security technique is the distance-adaptive molecular absorption modulation (DA-APM) scheme, which hides the signal under the molecular absorption peaks in the THz band [8]. This technique does not work when Eve is farther than Bob from Alice.
In recent years, frequency diverse array (FDA) has been recognized as a good candidate to address the range security problem [21]. By introducing a small frequency offset among different antennas in the antenna array, the FDA shows a periodical range-, angle-, and time-varying beam pattern. FDA has been widely used in radar, navigation, and security applications by taking advantage of the time-varying property. For example, The FDA beamforming approach is proposed in[21] to safeguard wireless transmission for proximal Bob and Eve, where the FDA is used to distinguish two proximal receivers to increase the secrecy rate. For the range security problem, FDA is recently envisioned as a potential technique to enhance information security thanks to its range-varying beam pattern. The effectiveness of the FDA-based techniques in providing THz range security requires investigation.
I-C Motivations and Contributions
The goals of this paper are two-fold. First, we lay out a theoretical analysis of the multiple-antenna techniques under the range security condition and stress that multiple-antenna techniques operating in the far-field regions cannot enhance range security. We revisit the FDA communication model as one particular design of multiple-antenna techniques and prove that previous FDA models in the literature [14, 15, 16, 17] draw a wrong conclusion on its effectiveness on range security by missing the synchronization between array factor and symbol. Second, motivated by the failure of multiple-antenna techniques operating in far-field regions, we propose a THz widely-spaced array (WSA) and a hybrid beamforming design as a near-field THz range security solution. Specifically, we present a multiple-antenna-assisted THz range security system model and develop the secrecy capacity, based on which the FDA system model is revisited and revised. Moreover, we propose a THz WSA and beamforming design to enhance the THz range security. An ultra-massive uniform planar array (UM-UPA) with widely-spaced antennas, instead of densely-packed antennas, is applied to provide THz range security. The trade-off analysis between the antenna size and the secrecy rate demonstrates that the THz WSA phased array can achieve an acceptable secrecy performance with a reasonable size thanks to the sub-millimeter wavelengths of THz waves. The contributions of this paper are summarized as follows:
-
•
We perform theoretical analysis on multiple-antenna techniques for THz range security. The secrecy capacity is derived based on which multiple-antenna techniques operating in the far-field regions are proven ineffective in providing range security. As a traditional candidacy for range security, the FDA communication model is analyzed and revised.
-
•
We propose a novel THz WSA and hybrid beamforming scheme to enhance the THz range security. A non-constrained optimum approaching (NCOA) algorithm is developed to solve the non-convex secrecy rate maximization problem, which determines the optimal hybrid beamformer design. Moreover, the trade-off between array size and secrecy rate enhancement of WSA is investigated.
-
•
We evaluate our proposed scheme against the existing PLS techniques. Monte-Carlo simulation demonstrates the convergence of the proposed NCOA algorithm. Extensive numerical results show that for a propagation distance at and transmit power of , the proposed method can achieve a secrecy rate of , while the conventional antenna array fails to guarantee range security.
The remainder of the paper is organized as follows. Sec. II presents multiple-antenna-assisted THz secure communication system model. Sec. III conducts a theoretical analysis on multiple-antenna techniques for THz range security, where the FDA technique is proven ineffective in providing range security. This conclusion is extended to the general multiple-antenna techniques operating in the far-field region. The proposed WSA communication and hybrid beamforming scheme are proposed in Sec. IV, where the NCOA hybrid beamforming algorithm is elaborated, and the trade-off between array size and maximum secrecy rate is investigated. Numerical results are described in Sec. V to verify the convergence of the proposed algorithm and the secrecy rate enhancement compared with existing methods. The paper is concluded in Sec. VI.
Notations: matrices and vectors are denoted by boldface upper and lower case letters, respectively. . denotes inner product. is the convolution operation with respect to time . , and are the transpose, and conjugate transpose of the matrix , respectively.

II System Model
In this section, we present a multiple-antenna-assisted THz secure communication model in Fig 2, which consists of a transmitter Alice (A), a legitimate receiver Bob (B), and an eavesdropper Eve (E). Thanks to the small wavelength of the THz signal in the order of millimeter down to sub-millimeter, an ultra-massive uniform planar array (UM-UPA) is equipped at Alice to overcome the large propagation loss. Bob and Eve are assumed to be equipped with a single antenna. The UM-UPA is comprised of antennas placed uniformly in a rectangular shape, with antennas in each row and antennas in each column. The antenna spacing between neighboring antennas is denoted by . A three-dimensional Cartesian coordinate system is adopted, where the antenna in the row and the column is located at . The antenna index is represented by . The distance from the antenna at Alice to the receiver are denoted by . The receiving nodes including Bob and Eve, denoted by B and E, are assumed to be located at , where , represents the propagation distance between Alice and , and defines the propagation angle of the receiver U.
The normalized transmitted symbol stream is denoted by satisfying , where represents the symbol index and returns the expectation. The symbols are modulated into a baseband waveform given by
(1) |
where denotes transmit power, represents time, represents a normalized pulse shape, and denotes a symbol time. We consider that the baseband bandwidth is smaller than the coherence bandwidth, which implies narrowband communications. For simplicity, we adopt the rectangular pulse waveform, which is given by
(2) |
By substituting (2) into (1), the baseband signal is expressed as
(3) |
where returns the largest integer smaller or equal to . The baseband waveform is first precoded by a linear time-varying precoder , satisfying . The carrier frequency of the antenna is denoted by , and the transmit signal represented by is therefore expressed as
(4) | ||||
where denotes the signal transmitted by the antenna of Alice. Due to the sparsity of the THz channel and the high directivity, the path gains of the reflected, scattered, and diffracted paths are negligibly weak compared to the line-of-sight (LoS) path. Thus, we consider to model the THz channel impulse response from the antenna of Alice to node as the result of the LoS path only [22, 23, 24], which is represented as
(5) |
where denotes the free-space LoS path gain according to Friis’ law. denotes the speed of light. The delay is and stands for the Dirac Delta function. To simplify the notations, we use to represent . The superimposed received signal at node U from the transmit antenna array is thus given by
(6) |
where stands for the additive Gaussian white noise (AWGN) noise variance . In this work, we assume that the noise variances for Bob and the Eve are the same and both equal to , i.e., .
According to the relationship between the antenna array size and the communication distance, multiple-antenna communications can be classified into near-field and far-field communications. If the propagation distance of the receiving node U is larger than the Fraunhofer distance [25, 26], i.e., , the node U is considered to be in the far-field region of the transmitter. This distance relationship determines how we could further simplify the expression of the received signal represented in (3)-(6). In general, we represent the distance as
(7) |
where denotes the residual propagation distance of the antenna to the receiver. This residual term depends on the antenna index , the propagation angle , and the propagation distance . If the receiver is located in the far-field region of the transmitter antenna array, the following far-field approximation is satisfied by neglecting the high-order term related to as
(8) |
where is range-invariant and only depends on the antenna index and the angle . For example, if the uniform space satisfies , the residual term of a linear antenna array can be expressed as and that of a planar antenna array can be represented by . The counterpart of the far-field communication is defined as near-field communication, where the approximation (8) does not apply. Since the THz antenna array is in the order of several millimeters, most THz communication systems are far-field communications.
III Theoretical Analysis of Multiple-antenna Techniques for Terahertz Range Security
In this section, we theoretically investigate how multiple-antenna techniques can address the THz range security problem. To reach this goal, we first analyze the secrecy capacity of the multiple-antenna secure channel under the THz range security scenario. This secrecy capacity analysis provides an upper-bound secrecy performance of general multiple-antenna techniques. Then, we demonstrate that the FDA technique, as an advocated multiple-antenna technique in the literature for range security, is ineffective in enhancing THz range security.

III-A Secrecy Capacity Analysis Under Range Security Scenario
We first theoretically derive the secrecy capacity of the multiple-antenna secure communication system under the range security scenario. Instead of assuming any specific precoding or up-converting method at the transmitter or receiver side, we focus on the original multiple-antenna secure channel. The original channel block diagram is shown in (a) of Fig. 3, where nodes represent the antennas in the transmit antenna array. Node B and E represent the single-antenna Bob and Eve, respectively. The channel impulse response from to is expressed by . By substituting , the system block diagram in Fig. 3(a) can be simplified to the block diagram in Fig. 3(b), due to the following relationship
(9a) | ||||
(9b) |
where represents the transmitted signal at node , and denotes the received signal at node U. Two intermediate nodes representing the superimposed signals at Bob and Eve in Fig. 3(b) are defined as and , respectively. As the basic assumption for the range security problem, the propagation angles of Bob and Eve are equal, i.e., . Additionally, as described in Sec.II, we assume that the receiving nodes and are in the far-field region of the antenna array. Therefore, , and the signals at node and are equal. We can superimpose the two nodes and their corresponding overlapped parts in (b), as depicted in Fig. 3(c). Fig. 3(c) shows a cascaded wiretap channel which exhibits as two Markov chains, e.g., and .
Based on the system transformation from Fig. 3(a) to Fig. 3(c), the secrecy capacity of the multiple-antenna secure communication system can be derived according to the property of Markov chains, as
(10) | ||||
where denotes the maximum signal power of the combined signals at node A. (10) implies that the secrecy rate from node is upper-bounded by the secrecy rate from node A and
(11) |
whose secrecy capacity is equal to that of a fully-digital beamforming scheme. This result proves that any signal processing and multiple antenna techniques operating in the far-field regions cannot provide THz range security since the traditional fully-digital beamforming technique can reach the secrecy capacity.

Further explanation from the electromagnetic wave propagation perspective is provided as follows. In Fig. 3(c), the intermediate node A can be interpreted as the wavefront of the transmitted beam. The THz LoS signal propagation from the source to far-field regions can be divided into two phases, as depicted in Fig. 4. In the first phase, the transmitted signal propagates from each antenna to the plane perpendicular to the direction of propagation in the near-field region, i.e., the wavefront . In the second phase, the combined signal further propagates and enters the far-field regions. According to the Markov chain theory, for all receiving nodes located in the far-field regions with the same propagation angle, the secrecy capacity of a MIMO channel is upper bounded by the SISO channel from the wavefront to the receiving node. This wavefront acts like a bottleneck of the wiretap channel, preventing multiple-antenna techniques from distinguishing Bob and Eve in the far-field region. Therefore, any multiple-antenna schemes operating in the far-field region cannot enhance THz range security.
III-B Can Frequency Diverse Array Provide Terahertz Range Security?
FDA introduces different small frequency offsets on each antenna to obtain a range-, angle-, and time-dependent array factor, which can steer the beam automatically [27]. The range-dependency of the beam can simultaneously enhance the received SNR at Bob while mitigating the received SNR at Eve since the antenna gain of FDA periodically changes with the distance [21]. Based on this phenomenon, researchers explore FDA-based multiple-antenna techniques to achieve range security, and they assume that Bob and Eve are in the far-field regions of the FDA. However, this idea contradicts our secrecy capacity analysis in Sec. III-A since their derived data rate exceeds our derived secrecy capacity. Therefore, we rigorously revisit the traditional FDA range security model and revise the model to demonstrate that the FDA cannot provide THz range security.
III-B1 Traditional Frequency Diverse Array Range Security Model
In the traditional FDA model adopted in [28, 29, 30, 31, 32], the carrier frequency of the antenna is assumed to be , where . By assuming the all-one matrix for the precoding matrix and far-field condition , the equivalent antenna gain, i.e., the array factor (AF), is given by [28]
(12) |
and the secrecy rate is given by
(13) |
where for range security scenario. Since (12) depends on range parameter , it can be designed that the AF at Bob can be larger than AF at the Eve, which seems to be beneficial to range security.
However, the derivation from the array factor in (12) to the secrecy rate in (13) adopts an inappropriate assumption. it is incorrectly assumed that the array factor and at the same time refer to the same symbol. Suppose Alice transmits a secret symbol at time , then Bob and Eve can receive this symbol at time and , respectively. Therefore, when we analyze the array factor at the receiver sides, represents the AF of the symbol transmitted at while stands for the AF of the symbol transmitted at . These two AFs do not refer to the same symbol transmitted from Alice, and therefore it is incorrect to compute the secrecy capacity based on them.

This example is illustrated in Fig. 5. The blue line captures the derived traditional AF at Alice, Bob, and Eve, and we observe that it refers to different symbols. The correct way to study the secrecy rate is to track one secret symbol and focus on the AF of the same symbol received by Bob and Eve at different times, as the yellow line illustrates. Specifically in this example, we should compare the AF of the symbol at Bob and Eve at and , respectively, which leads to the following observation that
(14) |
Therefore, the AF of one symbol created by the FDA is the same at Bob and Eve, which cannot provide range security.
The illustration from the beam pattern point of view is provided as follows. Since the confidential message is modulated on the EM wave, which travels at the speed of light, we should investigate the joint range-time beam pattern of FDA instead of a “snapshot” one. Unfortunately, although the FDA has a range-varying and time-varying beam pattern, the joint range-time beam pattern propagating at the speed of light is constant, as depicted in Eq. (2) of [21], where the FDA beam pattern is only dependent on the term . The interpretation of the FDA beam pattern in previous related studies neglects the synchronization between symbol and array factor, and therefore their secrecy rate analysis is problematic.
III-B2 Revised Frequency Diverse Array Range Security Model
We first rigorously derive the end-to-end received signals at Bob and Eve. The superimposed signal at the receiver U can be computed by
(15a) | |||
(15b) | |||
(15c) | |||
(15d) |
In (15a), represents the channel gain and the superimposed signal is expressed by the summation of signals transmitted from each antenna . In (15b), the convolution with the Dirac delta function can be simplified by replacing as . The approximation in (15c) applies the assumption that the symbol, the precoding matrix, and the path loss are uniform for all the antenna pairs, i.e., , , and . Finally, (15d) is derived by expanding according to (8) and then ignoring the second-order small term .
According to (15), the term discarding the symbol index term is the same as the array factor computed by previous FDA security work [28]. However, omitting the the term is inappropriate it shows that the received symbol by Bob and Eve at time are different. Instead, we focus on one specific symbol transmitted Alice, and analyze how it is received by Bob and Eve. For a symbol , Alice transmits the symbol at time , while Bob and Eve receive this symbol at time and , respectively. Therefore, the corresponding received signals and can be expressed as
(16a) | ||||
(16b) |
We observe that except for the distance-dependent path loss term in (16a) and (16b), the other terms are exactly the same. Furthermore, since the precoding matrix satisfies , the array factor term is upper-bounded by , which is given by
(17) |
Therefore, the maximum equivalent array gain of FDA is no difference from that of a conventional antenna array, i.e., by setting . This leads to the conclusion that the FDA does not enhance the range security, which suggests the incorrect conclusion of previous studies on FDA [14, 15, 16, 17].
This conclusion can be further explained intuitively according to the principle of electromagnetic wave propagation. The carried symbols propagate at the speed of light, which has the same motion as the wavefront of the transmitted signal. Therefore, the beamforming gain corresponding to a symbol is determined by the beamforming pattern superimposed at the wavefront. An important fact about wavefronts is that the frequency of EM waves only determines the speed of phase shift between consecutive wavefronts, but the phase of one wavefront does not change. Without loss of generality, we suppose the phase of the wavefront emitted at time is zero. Then, the wavefront phase emitted at time is given by . This phase of the wavefront does not change as it propagates outwards, which implies that changing the frequency of the antenna array, as FDA does, cannot affect the beamforming pattern superimposed by the wavefront. The signals superimposed at Bob can superimpose in the same pattern at Eve, and therefore it is useless to introduce a frequency offset among different antennas.
From the perspective of communication system, it is worth noticing that a synchronizer is a fundamental part of the receiver in a communication system. Unlike time-invariant channels, the FDA system is not time-invariant, which makes it necessary to treat the synchronization problem carefully. Moreover, based on (15), we discover that the addition of a frequency offset is equivalent with replacing as , i.e., adding the phase of the antenna by . This reminds us of the equivalence of adding a constant frequency and a time-varying phase from the perspective of an EM wave. Therefore, except for the different hardware implementation methods, a constant-frequency antenna array with time-variable phase shifters is equivalent to an FDA. Therefore, FDA cannot address the range security problem that the traditional phase-shifter-based multiple-antenna techniques cannot address.
IV Widely-Spaced Antenna Communications for Terahertz Range Security
Motivated by our conclusion that multiple antenna techniques operating in the far-field regions fail to provide THz range security in Sec. III, we discover multiple-antenna techniques operating in near-field regions. In this section, we propose a THz WSA communication scheme to safeguard the THz range security. Specifically, We first develop the WSA model with hybrid beamforming and formulate a secrecy rate maximization problem. Then, we provide a hybrid beamforming design strategy for our WSA transmission scheme based on an NCOA algorithm. Finally, we analyze the trade-off between the enlarged antenna array size and the enhanced secrecy rate, which clarifies that the proposed scheme is realistic yet unique for THz band communications.

IV-A Widely-Spaced Array and Hybrid Beamforming
The THz WSA model is illustrated in Fig. 6, where the spacing between antennas in the antenna array is widened such that the Alice-Bob distance and the Alice-Eve is comparable to the antenna size. The goal is that Bob and Eve can be located in the near-field region of the transmitter antenna array, and the closed-form expression for the residual propagation distance term in (7) can be expressed as
(18a) | ||||
(18b) |
where and . Remarkably, (18b) is the ground-truth model, since it considers the spherical-wave propagation nature for EM waves.
For the beamformer design at the transmitter side, since traditional fully-digital beamformer requires the same number of radio frequency (RF) chains as antennas [33], which brings tremendous hardware cost for THz communications, hybrid beamforming technology is therefore proposed as a promising yet lower-complexity structure for UM-UPA [34]. Specifically, the fully-connected hybrid beamforming structure is composed of a digital beamformer represented by and an analog beamformer expressed as . Each element of the matrices and represents the complex gain from the baseband signal to the RF chain, and from the RF chain to the antenna via phase shifters, respectively. denotes the number of RF chains. The analog beamformer matrix is expressed in the form of
(19) |
where denotes the phase output of the phase shifter which connects the RF chain with the antenna. We assume that the hybrid beamforming does not affect the transmit power, i.e., . The overall beamforming vector is denoted by
(20) |
We assume that the carrier frequency of each antenna in the WSA is uniform and denoted as . The received signal at the receiving node after down-converting and synchronization of symbol can be expressed as
(21) |
or equivalently we can express the received signal in matrix form as
(22) |
where the channel combining matrix is expressed as
(23) |
IV-B Problem Formulation: Secrecy Rate Maximization
The secrecy rate, defined as the capacity difference between Bob’s and Eve’s channels, is used as the performance metric of our THz system model. As the focus of our THz secure communication system, the aim is to design transmit power , hybrid beamformer, i.e., and , to maximize the secrecy rate. Thus, we formulate the hybrid secure beamforming design problem as a secrecy rate maximization (SRM) optimization problem as
(24a) | ||||
s.t. | (24b) | |||
(24c) | ||||
(24d) |
where (24a) denotes the secrecy rate of the THz secure communication system, and the operation . (24b) states the transmit power constraint with the maximum power . describes the normalization constraint of a hybrid beamformer. The maximal secrecy rate is denoted by and the optimal transmit beamformer is represented by . Solving the problem yields the optimal hybrid beamforming strategy achieving maximum secrecy. Due to the non-convexity of (24a) with respect to , the optimization problem is non-convex and cannot be tackled directly. Remarkably, according to (23), for the range security problem where , if the far-field approximation is applied, we have . In such case, Bob’s and Eve’s channels are perfectly correlated, i.e., . As a result, their beamforming gains satisfy . Therefore, by considering that , the maximum secrecy rate is upper bounded by , which is exactly the maximum secrecy rate without adopting any security technique.
IV-C Hybrid Beamforming Design: NCOA Algorithm
We design a hybrid beamformer to maximize the secrecy rate in (24a) for our WSA transmission scheme. Given the transmission distances and , solving the SRM problem yields our hybrid beamformer design. We propose an NCOA algorithm to solve this non-convex problem. First, we temporarily relax the non-convex constraint to transform into a convex optimization problem . A globally optimal solution to is then derived, referred to as the non-constrained optimum. Finally, by reconsidering the non-convex constraint, an epsilon-convergent sub-optimal solution is achieved by approaching .
IV-C1 Problem Transformation and Non-constrained Optimal Solution
We first temporarily neglect the constraint . As a result, the remaining problem is converted to a convex optimization problem where a global optimum can be derived in a closed form. By maximizing the transmit power and allowing the condition that , the secrecy rate in (24a) is calculated as
(25) |
where represents a identity matrix. Let and , maximizing is equivalent to maximizing the generalized Rayleigh quotient . The transformation of the optimization problem from to is depicted in the following theorem.
Theorem 1: The SRM problem without the non-convex constraint (24c) is equivalent to the problem
(26a) | ||||
(26b) |
where , and denote the only two non-zero eigenvalues of the matrix with . and represent their corresponding normalized eigenvectors, respectively.
Proof: The detailed proof is provided in Appendix A.
Since , the non-constraint optimal solution to is achieved when coincides with the eigenvector of the maximum eigenvalue . This leads the non-constrained optimal solution as
(27) |
where setting the beamforming matrix as achieves the maximum secrecy rate, which is an upper bound for the secrecy rate maximization problem .
IV-C2 NCOA Algorithm
Given the non-constrained optimal solution obtained in (27), our aim is to approach to under the analog beamforming constraint (24d). In [34], it is shown that when , there exists a solution and that satisfies . Therefore, we divide the two cases, (i) the hybrid beamforming case where , and (ii) the fully-analog (FA) beamforming case where , as follows.
Case (i): For the hybrid beamforming case , fortunately, it is possible to discover a feasible solution satisfying the constraint (24d) and , which is expressed as
(28a) | ||||
(28b) |
where returns the angle of the input complex element. By setting the hybrid beamformer as (28), the non-constrained optimal solution can be achieved, and the secrecy rate performance of the hybrid beamforming is maximized. According to (28), it is worth noticing that by using the first two RF chains, the hybrid beamforming achieves the optimal performance, and using more than two RF chains cannot further improve the secrecy rate. This is consistent with an intuitive understanding that for one Tx and two single-antenna Bob and Eve with LoS transmissions, there are two SDoFs, which are equal to the DoF between Alice and Bob plus the DoF between Alice and Eve. Therefore, with two or more RF chains exceeding the number of SDoFs, the WSA communication system cannot further benefit from the increased RF chains.
Case (ii): For the fully-analog beamforming case with , since is a scalar number, we set without loss of generality. Then, the solution does not satisfy the constraint in (24d). We use a gradient descent algorithm to recursively approach the optimal solution, where the gradient of the term (26a) versus is represented by
(29) |
where the term is expressed as
(30) |
where , and the vector with the one in the column, returns the real part of a complex number. By recursively updating via computing the gradient in each step, a near-optimal solution for the fully-analog case can be achieved.
By combining the two solutions for the hybrid beamforming () and fully-analog beamforming () cases, the NCOA algorithm for the hybrid beamforming design is summarized in Algorithm 1. denotes the step parameter controlling the convergence speed, and is the convergence threshold determining the convergence destination. In this work, we choose and , which results in good convergence performance. By applying WSA communications for range security and considering the narrow beam nature with a UM-UPA, the range security for THz communications is thereby ensured.
Input:
, , ,
Output:
,
, ,
IV-D Design Trade-off Between Array Size and Optimal Secrecy Rate
For a traditional antenna array where the antennas are not widely spaced, the far-field approximation is satisfied, which leads that the secrecy rate is upper-bounded by the secrecy capacity derived in (10). Our WSA design widens the antenna spacing to ensure near-field communications. However, an ensuing drawback is that the array size becomes larger as the spacing between neighboring antennas increases, which makes the WSA design less attractive for practical applications.
Thanks to the millimeter down to sub-millimeter THz wavelength, we clarify that THz communications can maintain a reasonable array size even when the antenna spacing is wide enough to enhance the secrecy rate. A sample comparison between mmWave and THz WSA design is provided as follows. For a micro-wave communication system where the wavelength is on the order of sub-meters, e.g., for the system, the near-field expression in (18b) is valid when the side length of the array , which is an impractically large antenna array. However, for THz communications, with a wavelength on the order of millimeter, e.g., for a system, the near-field expression is valid when . Therefore, a THz antenna array can well accommodate the near-field communication requirement.
V Numerical Results
In this section, we evaluate the numerical results of the THz WSA scheme. First, we conduct Monte Carlo simulations on our recursion-based NCOA algorithm and demonstrate its convergence performance. Second, we analyze how system parameters, including the maximum transmit power, antenna spacing, and transmission distances affect the maximum secrecy rate. Moreover, the robustness of the proposed WSA scheme is studied, i.e., how the maximum secrecy rate degrades with the estimation error of the location of the Eve. Finally, the proposed scheme is compared with existing algorithms to demonstrate its improved range security performance. Unless specified, the system parameters used in the simulation are described in Table I.
Notation | Definition | Value | Unit |
---|---|---|---|
Maximum transmit power | 10 | dBm | |
Number of row antennas | 32 | - | |
Number of column antennas | 32 | - | |
Total number of antennas | 1024 | - | |
Noise variance | -80 | dBm | |
Propagation angle | rad | ||
Carrier frequency | 300 | GHz | |
Alice-Bob distance | 10 | m | |
Alice-Eve distance | 5 | m | |
Step parameter | 10 | rad | |
Convergence threshold | 0.003 | - |


V-A Convergence Analysis of the NCOA Algorithm
To demonstrate the feasibility of the NCOA algorithm, we need to verify the convergence performance of the used gradient descent method. First, to verify the convergence, we perform Monte Carlo simulations on the initial value of in step 9 of Algorithm 1. By setting different random initial values over 1,000 times, we plot the secrecy rates achieved by the solution versus the number of iterations, as depicted in Fig. 7. Fig. 7 plots 100 realizations randomly chosen from 1,000 realizations for illustration, where we observe that all simulations achieve nearly the same maximum secrecy rate within 20 iterations. This implies good convergence performance. Fig. 7 presents statistical analysis on the distribution of the total number of iterations until convergence. Among 1,000 simulations, a Gaussian distribution with a mean of 20 is fitted, while no alias effect occurs.

In Fig. 8, we explore how the step parameter in step 12 in Algorithm 1 affects the maximum secrecy rate and the total iteration step reaching the termination condition. For each , 100 Monte Carlo simulations are performed to calculate the mean secrecy rate. We can observe that when , the mean secrecy rate approximately reaches the maximum value. By contrast, when , the mean secrecy rate decays rapidly. This is due to the fact that a large iteration step leads to an early convergence before the secrecy rate approaches the maximum. Moreover, the number of total iteration steps decreases as increases, as the right y-axis of Fig. 8 presents. The numerical results demonstrate that setting within [10, 20] results in a good balance between performance and complexity.





V-B Maximum Secrecy Rate
We compute the maximum secrecy rate versus different system parameters for our proposed WSA scheme for THz range security. The maximum secrecy rates with different maximum transmit power values are shown in Fig. 9 for the different antenna spacing, in Fig. 9 for the different eavesdropping distances, and in Fig. 9 for the different antenna array sizes. In general, the secrecy rate increases with a wider antenna spacing, a nearer Eve distance, and larger array size. Moreover, with , , and , the secrecy rate with maximum transmit power of is . An interesting phenomenon captured in Fig. 9 is that as becomes smaller, i.e., Eve approaches the Tx, the secrecy shows an increasing trend. This is explained that when Eve is nearer to Alice or, equivalently, farther from the B, Eve’s channel is more uncorrelated with Bob’s channel, which enhances the secrecy rate though Eve’s channel gain increases.
V-C Robustness to Location Estimation Error of Eavesdroppers
The proposed NCOA algorithm needs to acquire Eve’s location, i.e., the Alice-Eve distance and angle, and we estimate these two values as the input of our beamformer design. Therefore, We need to study the robustness of our scheme to the location estimation error of Eve, i.e., the robustness of the Alice-Eve distance and angle. The estimation error is defined as the difference between the estimated value and the nominal value, and the estimation errors of the Alice-Eve distance and angle are denoted as and , respectively. The maximum secrecy rates versus and are plotted in Fig. 10. In our simulations, denotes the true Alice-Eve distance. In Fig. 10, we observe that the secrecy rate degrades dramatically as the Alice-Eve distance estimation error increases. Moreover, as decreases, the degradation becomes severer with the estimation error at short transmission distances. This can be explained that at short distances, a small distance estimation error leads to a large phase error on each antenna. In Fig. 10, we observe that for the different Alice-Eve distances, the maximum secrecy rate degrades by 10% when the Alice-Eve angle has a error. This result implies that the robustness of the WSA communication scheme to the Alice-Eve estimation error is highly dependent on the Alice-Eve distance. Moreover, it is suggested that the estimation error of the Alice-Eve angle should be less than to ensure a less than 10% secrecy rate degradation.
V-D Performance Comparison With Different Methods


We evaluate and compare the maximum secrecy rate achieved by our proposed WSA scheme with existing schemes in the literature. Specifically, the transmit AN scheme [16], the SIC-free receiver AN scheme [9], and traditional antenna array hybrid beamforming method [34] are compared in Fig. 11. The transmit power of the receiver AN signal for the SIC-free receiver AN scheme is 10 dBm. In Fig. 11, the secrecy rate versus the Alice-Bob distance is plotted. Moreover, the hybrid beamforming () and fully-analog beamforming () cases of our WSA secure beamforming scheme are computed to demonstrate the sub-optimal performance of fully-analog beamforming structure for the optimal hybrid beamforming case. For the case, the maximum secrecy rate decreases as increases. At , the secrecy rate achieves . The secrecy rate of the case, as an inferior but low-complexity architecture of the case, can achieve near-optimal performance when is larger than . This implies that the performance degradation due to the sub-optimality of hybrid beamforming becomes severer when the distance between Alice and Bob is small. Moreover, compared with the SIC-free receiver AN scheme [9], the proposed WSA scheme can double the secrecy rate at . This significant improvement originates from the different security-enhancing strategies used by the two schemes. Specifically, the WSA scheme directly mitigates the received power by Eve, while the SIC-free receiver AN is to jam Eve’s signal. We observe that the secrecy rates achieved by the transmit AN scheme and traditional hybrid beamforming are nearly zero, which is consistent with our analysis in Sec. IV-B that the secure communication in the far field fails to achieve a positive secrecy rate.
In Fig. 11, we plot the maximum secrecy rate versus the different Alice-Eve distances varying from to , where the Alice-Bob distance is . We see that when increases from to , the secrecy rate of WSA scheme decreases as increases. Moreover, the secrecy rate increases as increases when is larger than . This is due to the fact that as approaches 10 m, Bob’s channel and the Eve’s channel become correlated, which leads that the WSA scheme cannot distinguish the two receivers in the range domain. Moreover, the WSA scheme with two RF chains can achieve the secrecy rate of approximately , as approaches zero. However, this does not imply that the proposed scheme can effectively combat the extremely near eavesdropping since the robustness against the Alice-Eve distance estimation error degrades significantly as approaches zero.
VI Conclusion
This paper investigates the multiple-antenna technologies for THz range security, including the FDA and WSA. Specifically, we first present a multiple-antenna-assisted THz range security model and theoretically derive the secrecy capacity of multiple antenna channels. We prove that the secrecy capacity for Bob and Eve in the far-field region is equal to the secrecy rate achieved by traditional beamforming schemes. Based on this conclusion, we revisited and revised the FDA range security model. Then, we proposed a WSA scheme and a hybrid beamforming design to enhance the secrecy rate. The WSA transmission is realized by increasing the antenna spacing to place Bob and Eve in the near-field region of the antenna array. For the optimal hybrid beamformer design, we develop an NCOA algorithm to achieve the closed-form optimal solution for the hybrid beamforming case and an epsilon-convergent sub-optimal solution for the fully-analog beamforming case, respectively. Numerical results verify the outstanding convergence of the NCOA algorithm and demonstrate that under the range security condition, the secrecy rate of the WSA communication scheme reaches with transmit power.
Appendix A Proof of Theorem 1
Due to the monotonicity of the logarithmic function, Maximizing in (24a) is equivalent to maximizing . First, we prove the existence of the matrix . Since for any non-zero vector x, we have , B is positive definite, and exists. Thus, we can assume and , we have . We first prove that , which implies that C only has two non-zero eigenvalues. First, since the ranks of vector and are 1, . Therefore, . Second, since the identity matrix has full rank and is a Hermitian matrix, the matrix B as well as have full rank. As a result, C is a rank-2 matrix, and there are two non-zero eigenvalues. We denote the two eigenvalues as and with their corresponding eigenvectors and .
Next, we decompose the vector onto the orthonormal basis, composed of all normalized eigenvectors of C denoted by . As , we can write
(31) | ||||
which completes the proof.
References
- [1] M. Giordani, M. Polese, M. Mezzavilla, S. Rangan, and M. Zorzi, “Toward 6G networks: Use cases and technologies,” IEEE Communications Mag., vol. 58, no. 3, pp. 55–61, 2020.
- [2] T. S. Rappaport, Y. Xing, O. Kanhere, S. Ju, A. Madanayake, S. Mandal, A. Alkhateeb, and G. C. Trichopoulos, “Wireless communications and applications above 100 GHz: Opportunities and challenges for 6G and beyond,” IEEE Access, vol. 7, pp. 78 729–78 757, 2019.
- [3] I. F. Akyildiz, C. Han, Z. Hu, S. Nie, and J. M. Jornet, “Terahertz band communication: An old problem revisited and research directions for the next decade,” IEEE Transactions on Communications, vol. 70, no. 6, pp. 4250–4285, 2022.
- [4] I. F. Akyildiz, J. M. Jornet, and C. Han, “Terahertz band: Next frontier for wireless communications,” Phys. Communications, vol. 12, pp. 16 – 32, 2014.
- [5] J. Ma, R. Shrestha, J. Adelberg, C.-Y. Yeh, Z. Hossain, E. Knightly, J. M. Jornet, and D. M. Mittleman, “Security and eavesdropping in terahertz wireless links,” Nature, vol. 563, no. 7729, pp. 89–93, 2018.
- [6] C. Han, W. Gao, N. Yang, and J. M. Jornet, “Molecular absorption effect: A double-edged sword of terahertz communications,” to appeal in IEEE Wireless Communications, 2022.
- [7] S. R. Aghdam, A. Nooraiepour, and T. M. Duman, “An overview of physical layer security with finite-alphabet signaling,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1829–1850, 2018.
- [8] W. Gao, Y. Chen, C. Han, and Z. Chen, “Distance-adaptive absorption peak modulation (DA-APM) for terahertz covert communications,” IEEE Trans. on Wireless Communications, vol. 20, no. 3, pp. 2064–2077, 2020.
- [9] W. Gao, C. Han, and Z. Chen, “DNN-powered sic-free receiver artificial noise aided terahertz secure communications with randomly distributed eavesdroppers,” IEEE Trans. on Wireless Communications, vol. 21, no. 1, pp. 563–576, 2022.
- [10] V. Petrov, D. Moltchanov, J. M. Jornet, and Y. Koucheryavy, “Exploiting multipath terahertz communications for physical layer security in beyond 5g networks,” in Proc. IEEE INFOCOM, 2019, pp. 865–872.
- [11] A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, 1975.
- [12] A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas—part ii: The MIMOME wiretap channel,” IEEE Trans. on Information Theory, vol. 56, no. 11, pp. 5515–5532, 2010.
- [13] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H.-H. Chen, “A survey on multiple-antenna techniques for physical layer security,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1027–1053, 2016.
- [14] T.-X. Zheng, H.-M. Wang, J. Yuan, D. Towsley, and M. H. Lee, “Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers,” IEEE Trans. on Communications, vol. 63, no. 11, pp. 4347–4362, 2015.
- [15] T.-X. Zheng, H.-M. Wang, J. Yuan, Z. Han, and M. H. Lee, “Physical layer security in wireless ad hoc networks under a hybrid full-/half-duplex receiver deployment strategy,” IEEE Trans. on Wireless Communications, vol. 16, no. 6, pp. 3827–3839, 2017.
- [16] L. Lv, Z. Ding, Q. Ni, and J. Chen, “Secure MISO-NOMA transmission with artificial noise,” IEEE Trans. on Vehicular Technology, vol. 67, no. 7, pp. 6700–6705, 2018.
- [17] B. Ning, Z. Chen, Z. Tian, X. Wang, C. Pan, J. Fang, and S. Li, “Joint power allocation and passive beamforming design for IRS-assisted physical-layer service integration,” IEEE Trans. on Wireless Communications, vol. 20, no. 11, pp. 7286–7301, 2021.
- [18] G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, “Improving physical layer secrecy using full-duplex jamming receivers,” IEEE Trans. on Signal Processing, vol. 61, no. 20, pp. 4962–4974, 2013.
- [19] G. Chen, J. P. Coon, A. Mondal, B. Allen, and J. A. Chambers, “Performance analysis for multihop full-duplex IoT networks subject to poisson distributed interferers,” IEEE Int. of Things Journal, vol. 6, no. 2, pp. 3467–3479, 2018.
- [20] S. Yan, X. Zhou, N. Yang, T. D. Abhayapala, and A. L. Swindlehurst, “Secret channel training to enhance physical layer security with a full-duplex receiver,” IEEE Trans. on Inf. Forensics and Security, vol. 13, no. 11, pp. 2788–2800, 2018.
- [21] J. Lin, Q. Li, J. Yang, H. Shao, and W.-Q. Wang, “Physical-layer security for proximal legitimate user and eavesdropper: A frequency diverse array beamforming approach,” IEEE Trans. on Inf. Forensics and Security, vol. 13, no. 3, pp. 671–684, 2018.
- [22] C. Han, A. O. Bicen, and I. F. Akyildiz, “Multi-ray channel modeling and wideband characterization for wireless communications in the terahertz band,” IEEE Trans. on Wireless Communications, vol. 14, no. 5, pp. 2402–2412, 2015.
- [23] B. Peng, K. Guan, A. Kuter, S. Rey, M. Patzold, and T. Kuerner, “Channel modeling and system concepts for future terahertz communications: Getting ready for advances beyond 5G,” IEEE Vehicular Technology Magazine, vol. 15, no. 2, pp. 136–143, 2020.
- [24] Y. Chen, L. Yan, C. Han, and M. Tao, “Millidegree-level direction-of-arrival estimation and tracking for terahertz ultra-massive MIMO systems,” to appeal in IEEE Trans. on Wireless Communications, 2022.
- [25] N. J. Myers and R. W. Heath, “Infocus: A spatial coding technique to mitigate misfocus in near-field los beamforming,” IEEE Transactions on Wireless Communications, vol. 21, no. 4, pp. 2193–2209, 2022.
- [26] Y. Chen, L. Yan, and C. Han, “Hybrid spherical- and planar-wave modeling and dcnn-powered estimation of terahertz ultra-massive mimo channels,” IEEE Transactions on Communications, vol. 69, no. 10, pp. 7063–7076, 2021.
- [27] W.-Q. Wang, “Frequency diverse array antenna: New opportunities,” IEEE Antennas and Propagation Magazine, vol. 57, no. 2, pp. 145–152, 2015.
- [28] Q. Cheng, V. Fusco, J. Zhu, S. Wang, and F. Wang, “WFRFT-aided power-efficient multi-beam directional modulation schemes based on frequency diverse array,” IEEE Transactions on Wireless Communications, vol. 18, no. 11, pp. 5211–5226, 2019.
- [29] Q. Cheng, V. Fusco, J. Zhu, S. Wang, and C. Gu, “Svd-aided multi-beam directional modulation scheme based on frequency diverse array,” IEEE Wireless Communications Letters, vol. 9, no. 3, pp. 420–423, 2019.
- [30] B. Qiu, M. Tao, L. Wang, J. Xie, and Y. Wang, “Multi-beam directional modulation synthesis scheme based on frequency diverse array,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2593–2606, 2019.
- [31] S. Ji, W.-Q. Wang, H. Chen, and S. Zhang, “On physical-layer security of FDA communications over rayleigh fading channels,” IEEE Trans. on Cognitive Communications and Networking, vol. 5, no. 3, pp. 476–490, 2019.
- [32] S. Wang, S. Yan, J. Zhang, N. Yang, R. Chen, and F. Shu, “Secrecy zone achieved by directional modulation with random frequency diverse array,” IEEE Transactions on Vehicular Technology, vol. 70, no. 2, pp. 2001–2006, 2021.
- [33] I. Ahmed, H. Khammari, A. Shahid, A. Musa, K. S. Kim, E. De Poorter, and I. Moerman, “A survey on hybrid beamforming techniques in 5G: Architecture and system model perspectives,” IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3060–3097, 2018.
- [34] L. Yan, C. Han, and J. Yuan, “A dynamic array-of-subarrays architecture and hybrid precoding algorithms for terahertz wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 9, pp. 2041–2056, 2020.