Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2026 Feb 6;26(3):1065. doi: 10.3390/s26031065

Spatial and Directional Modulation Systems for Near-Field Secure Transmission

Ji Liu 1,2, Yuan Zhong 3, Yong Wang 1, Dong Gong 3, Yue Xiao 3,*
Editor: Stephan Olariu
PMCID: PMC12900101  PMID: 41682580

Abstract

The proliferation of massive antenna arrays and the consequent intensification of near-field effects with 6G necessitate addressing critical security challenges in near-field communication environments. This paper presents a novel artificial noise-aided spatial and directional modulation (SDMN-AN) framework, specifically tailored for secure near-field communications. The proposed system integrates legitimate receiver indices, modulation symbols, and artificial noise (AN) confined to the null space of legitimate channels, thereby enhancing both spectral efficiency and communication security. Two precoding strategies—maximum-ratio transmission (MRT) and zero-forcing (ZF)—are investigated, offering trade-offs between hardware complexity and detection overhead. Analytical derivations of bit error rate (BER) bounds, corroborated by simulation results, underscore the superiority of the SDMN-AN framework in mitigating eavesdropping threats while significantly improving spectral efficiency, positioning it as a compelling solution for next-generation secure wireless networks.

Keywords: spatial and directional modulation (SDM), artificial noise (AN), near-field, bit error rate (BER)

1. Introduction

The vision of sixth-generation (6G) wireless communications [1,2,3] heralds an era of truly pervasive and intelligent connectivity, where massive numbers of heterogeneous devices, sensors, and users are seamlessly integrated into a unified cyber–physical–digital continuum. Enabled by disruptive physical-layer technologies such as extremely large-scale multiple-input multiple-output (XL-MIMO), 6G networks fundamentally reshape conventional propagation assumptions by operating deep into the electromagnetic near-field regime [4,5,6]. This paradigm shift profoundly alters the spatial characteristics of wireless channels and, in turn, the design philosophy of communication systems.

While such unprecedented connectivity promises transformative gains in spectral efficiency, reliability, and service diversity, it simultaneously amplifies the exposure of sensitive information to sophisticated eavesdropping threats inherent in densely connected and highly dynamic 6G environments [7]. Consequently, ensuring information confidentiality can no longer rely solely on traditional security mechanisms. Instead, there is a compelling need to develop robust and intrinsically secure transmission strategies that explicitly account for the unique challenges posed by near-field propagation in MIMO-enabled 6G systems [8].

Although significant advancements have been realized in the domain of far-field physical-layer secure communications, these solutions face fundamental limitations when extrapolated to the near-field regime. In far-field settings, directional modulation (DM) represents a cornerstone innovation, leveraging sophisticated beamforming techniques to confine signal energy within narrowly defined spatial regions [9]. This targeted approach mitigated interception risks, as demonstrated in studies such as [10,11], which illustrated efficacy of DM in multi-user environments. Furthermore, efficiency-optimized designs, exemplified by the work in [12], have underscored the critical role of phase shifter sequence engineering in augmenting security. Nevertheless, these methodologies presuppose planar wavefront characteristics, inherently constraining their utility to far-field conditions.

Augmenting DM techniques, artificial noise (AN) has emerged as a robust adjunct for far-field secure communication systems [13]. AN disrupts eavesdroppers by introducing structured interference into null spaces of legitimate channels, thereby preserving the performance of authorized users. Research by [14] highlighted the effectiveness of AN in thwarting eavesdropping attempts, while the work of [15] has explored its integration with DM to bolster security. Furthermore, the authors of [16] extended these frameworks through the joint incorporation of spatial and directional modulation alongside AN, achieving significant security and spectral efficiency gains under realistic channel conditions. However, such approaches remain intrinsically bounded by far-field approximations, rendering them inapplicable to the complex propagation characteristics of the near-field regime.

The deployment of ultra-large-scale antenna arrays introduces pronounced near-field effects, characterized by spherical wavefront propagation [17]. These effects necessitate novel security paradigms, as traditional far-field algorithms fail to adequately address the challenges posed by near-field environments. Initial research efforts have sought to adapt DM and AN to exploit near-field spatial characteristics, achieving enhanced selectivity and robust eavesdropping resilience. For instance, the study in [18] investigated the potential of near-field hybrid beamforming for secure communications, while the authors of ref. [19] demonstrated the efficacy and security of combined DM-AN techniques in short-range scenarios. However, existing methodologies predominantly target point-to-point scenarios, neglecting the potential of multi-point collaboration and often experiencing degraded security when eavesdropping receivers operate in close proximity of legitimate receivers.

To address these gaps, this paper proposes a novel artificial noise-aided spatial and directional modulation for near-field (SDMN-AN) system, specifically applied for secure communications within near-field contexts. Unlike conventional far-field schemes, the proposed design explicitly exploits the angle–distance coupling induced by near-field spherical wavefronts, enabling distance-dependent spatial discrimination and receiver-index modulation (IM) that are infeasible under plane-wave assumptions. This near-field property fundamentally enhances AN effectiveness and secure signal separation even when legitimate and illegitimate receivers are closely aligned in angle. The proposed SDMN-AN framework is particularly applicable to cooperative sensor networks and indoor short-range sensing systems, where near-field propagation and distributed receivers are inherent characteristics.

The primary contributions of this work are delineated as follows:

  • Multi-point collaborative architecture: The proposed SDMN-AN framework integrates a multi-point cooperative receiver strategy at the legitimate user, Bob, while the transmitter, Alice, employs a combination of receiver indices and modulation symbols to significantly enhance spectral efficiency. By explicitly operating in the near-field regime, the proposed architecture exploits the inherent angle–distance coupling of spherical wavefronts, which enables distance-dependent spatial discrimination among distributed receivers. The inclusion of AN further disrupts the adversarial eavesdropper Eve’s signal reconstruction capabilities due to near-field-induced null-space mismatch, thereby ensuring robust physical-layer security even when Eve is closely aligned with Bob in angle under hostile conditions.

  • Dual precoding and detection strategies: Two distinct configurations are examined—(i) maximum-ratio transmission (MRT) precoding paired with joint maximum-likelihood (ML) detection, optimized for minimal hardware complexity at the transmitter, and (ii) zero-forcing (ZF) precoding coupled with joint ML detection, aimed at alleviating computational demands at the receiver.

  • Analytical and empirical validation: Closed-form expressions for the bit error rate (BER) upper bounds of both the legitimate receiver and the eavesdropper are derived. Simulation results confirm superior performance of the proposed system in achieving multi-point cooperative security gains for near-field regions, significantly surpassing the security and communication efficiency of existing DM-AN systems.

The structure of this paper is organized as follows: Section 2 and Section 3 delineate the system model for the proposed SDMN-AN framework, detailing its two distinct precoding schemes. Section 4 rigorously derives the upper bounds of the BER for both Bob and Eve. Section 5 provides a comprehensive performance evaluation, supported by simulation results and analytical insights. Finally, Section 6 encapsulates the primary findings and offers concluding remarks.

Notation: In this paper, bold lowercase and uppercase symbols are used to represent column vectors and matrices, respectively, while the transpose and conjugate transpose operators are denoted by (·)T and (·)H. The Frobenius norm and the real part of a scalar are expressed as · and R(·), respectively. Furthermore, CN(·) denotes the circularly symmetric complex Gaussian distribution, while Q(·) represents the Gaussian Q-function. The identity matrix of dimension N is symbolized by IN.

2. System Model

As illustrated in Figure 1, we consider a downlink transmission scenario in which the transmitter, referred to as Alice, is equipped with Nt antennas arranged in a uniform linear array (ULA). The intended receiver, Bob, employs Nr=2ξ1 spatially distributed single-antenna nodes, whereas the passive eavesdropper, Eve, is equipped with Ne distributed single-antenna receivers. Notably, both Bob’s and Eve’s receivers operate within Alice’s near-field propagation region. Additionally, the distributed receivers at Bob and Eve are interconnected via optical fiber links, enabling inter-receiver communication within their respective domains.

Figure 1.

Figure 1

The SDMN-AN model.

Referring to Figure 2, the position of the n-th antenna at Alice is characterized by the coordinates (δnD,0), where δn=n1Nt12. Considering the steering angle θl and the distance dl of the l-th receiver relative to the center of Alice’s ULA, the coordinates of the l-th receiver are given by (dl cosθl,dl sinθl).

Figure 2.

Figure 2

The near-field model in terms of the SDMN-AN system.

In practical near-field environments, the Alice-to-receiver link typically exhibits a mixed LoS/NLoS propagation structure. Accordingly, the near-field channel vector hlCNt between Alice and the l-th receiver is modeled as a superposition of a deterministic LoS component and a scattered NLoS component, i.e.,

hl=κl1+κlgl,0(dl,0)β(θl,0,dl,0)+11+κlp=1Llαl,pgl,p(dl,p)β(θl,p,dl,p), (1)

where κl denotes the Rician factor controlling the power ratio between the LoS and NLoS components, (θl,0,dl,0) represents the angle and distance of the LoS path, and {(θl,p,dl,p)}p=1Ll characterize the Ll NLoS paths. Moreover, αl,p denotes the complex gain of the p-th NLoS path, and gl,p(dl,p)=λc4πdl,p is the corresponding path-loss coefficient with λc being the carrier wavelength.

The near-field steering vector β(θl,p,dl,p)CNt associated with the p-th propagation path of the l-th receiver is given by

β(θl,p,dl,p)=1Ntej2πλc(dl,p(0)dl,p),,ej2πλc(dl,p(Nt1)dl,p)T, (2)

where dl,p(n) denotes the propagation distance between the n-th transmit antenna and the l-th receiver along the p-th path. According to the geometric relationship illustrated in Figure 2, dl,p(n) can be expressed as

dl,p(n)=dl,p2sin2θl,p+dl,pcosθl,pδnD2=dl,p2+δn2D22dl,pδnDcosθl,p, (3)

with δn=n1Nt12. Unlike conventional far-field planar-wave models, the spherical-wave formulation in (1)–(3) introduces distance-dependent phase variations across the transmit array, which break the shift-invariant channel structure and alter spatial orthogonality. As a result, receivers with similar angles but different distances exhibit distinct channel responses in the near-field regime, enabling distance-selective transmission and enhanced physical-layer security.

Although a mixed LoS/NLoS near-field propagation model is considered, we focus on an LoS-dominant scenario, which is commonly encountered in short-range near-field communications. In this case, the overall channel structure is primarily governed by the direct LoS path, and thus the channel can be effectively parameterized by the geometric parameters of the LoS component. Assuming that the receivers at Bob are located at (θlb,dlb) for l=1, 2, , Nr, the channel matrix HbCNr×Nt between Alice and Bob accounting for all receivers at Bob is cast as

Hb=[h(θ1b,d1b), h(θ2b,d2b), , h(θNrb,dNrb)]H. (4)

Similarly, assuming that the receivers at Eve are positioned at (θle,dle) for l=1, 2, , Ne, the channel matrix HeCNe×Nt between Alice and Eve considering all receivers at Eve is represented as

He=[h(θ1e,d1e), h(θ2e,d2e), , h(θNee,dNee)]H. (5)

3. Proposed Transmission Design of Near-Field SDMN-AN

The core concept of SDMN-AN is to exploit both the indices of distributed receivers and traditional M-ary amplitude–phase modulation (APM) symbols with M=2ξ2, this design allows part of the information bits to be conveyed through receiver indices rather than constellation symbols. In total, ξ=ξ1+ξ2 bits are transmitted during each time slot, thereby enhancing spectral efficiency. These ξ bits are organized into an SDMN-AN super symbol, denoted as xjm for 1jNr and 1mM, which is expressed as

xjm=vjαm, (6)

where vj is the j-th column of INr and αmA={α1,α2,,αM} denotes a traditional APM symbol.

Furthermore, near-field channel estimation for the Alice-Bob link is performed by Alice through the application of a specific transformation matrix to generate the precoder matrix. To leverage the intrinsic sparsity of near-field channels, a polar-domain transformation was proposed in [20], where a dedicated transformation matrix, denoted by Ψ, is employed to project the near-field channel H into the polar domain. The resulting transformation matrix is given by

Ψ=ψ(θ1,r11),,ψ(θ1,r1S1),,ψ(θN1,rN11),,ψ(θN1,rN1SN1), (7)

Each column of the polar-domain transformation matrix Ψ corresponds to a near-field array response vector evaluated at a specific polar grid point (θn1,rn1Sn1), where Sn1=1,2,,SN1. Here, SN1 denotes the number of discretized distance samples associated with the angular grid θn1. Consequently, the total number of polar sampling points that jointly span the entire propagation region can be expressed as

S=n1=1N1SN1. (8)

Using the transformation matrix Ψ, the channel Hb can be approximated as HbH¯b=(ΨHbP)H, where HbPCS×Nr represents the sparse polar-domain channel representation, obtained through the corresponding polar-domain compressed sensing algorithm. Based on this approximation, the precoder matrix and associated detection mechanisms can be derived from Hb. However, due to the constraints on hardware overhead and detection complexity at Alice and Bob, two distinct transmission and detection schemes are considered.

3.1. MRT Precoding and Joint ML Detection

To mitigate the hardware overhead at Alice, the proposed scheme employs MRT precoding. The precoding matrix is expressed as

WM=H¯bH. (9)

where the matrix WM operates in the analog domain, thereby significantly reducing hardware requirements and power consumption. To enhance transmission security, especially in scenarios where Eve is in close vicinity to Bob, AN is injected into the null space of H¯b. To this end, the singular value decomposition (SVD) of H¯b is given by

H¯b=U[Σ0][VVN]H, (10)

where UCNr×Nr and VCNt×Nr denote the left and right singular vector matrices, respectively. The diagonal matrix Σ=diag(σ1,σ2,,σNr) collects the nonzero singular values of H¯b, while VNCNt×(NtNr) spans the null space of H¯b, satisfying H¯bVN=0. It is worth noting that this orthogonality property generally no longer holds when Eve is located at a position different from Bob, i.e., H¯eVN0.

Accordingly, the transmitted signal can be expressed as

sjm=ρWMxjm+VNn0, (11)

where ρ denotes the power scaling factor and n0C(NtNr) represents the AN vector whose entries are zero-mean random variables with variance σr2. By defining γ as the proportion of transmit power allocated to WM, the corresponding expressions for ρ and σr2 can be readily obtained as

ρ=γNrtr(WMWMH), (12)

and

σr2=(1γ)NrNtNr. (13)

For Bob, the received signal is given by

yb=Hbsjm+nb=Hb(ρWMxjm+VNn0)+nb=ρHbWMxjm+nb. (14)

For Eve, the received signal is expressed as

ye=Hesjm+ne=He(ρWMxjm+VNn0)+ne=ρHeWMxjm+HeVNn0+ne. (15)

where nb𝒞𝒩(0,σb2INr) and ne𝒞𝒩(0,σe2INe) represent complex Gaussian noise vectors at Bob and Eve, respectively. Assuming that Nr=Ne, when the joint ML detector is employed, Bob’s detection process can be represented as

{j^,α^m}=argmin1jNr,αmAybρH¯bWMxjm2. (16)

Similarly, the detection procedure at Eve can be expressed as

{j^,α^m}=argmin1jNr,αmAyeρH¯eWMxjm2. (17)

In particular, from Equation (14), it is evident that AN has no effect on Bob’s received signal. In contrast, the terms ρHeWM and HeVNn0 in Equation (15) both distort the transmitted signal in terms of both amplitude and phase, resulting in a highly degraded signal at Eve. Even though Eve has accurately estimated its near-field channel, the presence of the AN precludes it from reliably recovering the transmitted signal. Thus, this approach reduces Alice’s hardware overhead while simultaneously ensuring robust security performance and considered spectral efficiency. However, the detection complexity at Bob cannot be neglected, and a solution to alleviate this detection complexity is discussed in the subsequent section.

3.2. ZF Precoding and Joint ML Detection

The proposed scheme employs a ZF precoding matrix to mitigate the detection complexity on Bob’s side. In particular, the precoding matrix is expressed as

WZF=H¯bH(H¯bH¯bH)1. (18)

Subsequently, the transmitted signal is given by

sjm=ρWZFxjm+VNn0, (19)

where VN and n0 are analogous to the terms in Equation (11), while ρ is defined as in Equations (12) and (13). The received signal for Bob can then be represented as

yb=Hbsjm+nb=Hb(ρWZFxjm+VNn0)+nb=ρxjm+nb. (20)

while the received signal for Eve can be written as

ye=Hesjm+ne=He(ρWZFxjm+VNn0)+ne=ρHeWZFxjm+HeVNn0+ne. (21)

Under the assumption that Nr=Ne, and with a joint ML detector adopted, the detection process at Bob can be formulated as

{j^,α^m}=argmin1jNrαmAybρxjm2. (22)

Similarly, the corresponding detection rule at Eve is given by

{j^,α^m}=argmin1jNrαmAyeρxjm2. (23)

It can be observed from (20) that the injected AN has no effect on Bob’s received signal. By contrast, the term ρHeWZF in (21) is purely real-valued and therefore only modifies the signal amplitude at Eve [16], which may lead to a potential security vulnerability when Eve possesses sufficiently high detection sensitivity. In comparison, the component HeVNn0 induces random phase perturbations in Eve’s observation, thereby significantly degrading its detection capability. As a result, the deliberate injection of AN plays a vital role in strengthening the overall transmission security of the proposed scheme.

In this scenario, on the one hand, the receiver Bob is not required to perform near-field channel estimation or compute the precoding matrix. On the other hand, when employing joint ML detection, Bob achieves a significant reduction in computational complexity while preserving optimal performance. However, as digital precoding is adopted on Alice’s side, the associated computational complexity and hardware cost are inevitably higher. The aforementioned two schemes each present distinct advantages and trade-offs. Consequently, Alice and Bob must select and implement the most suitable approach based on the specific operating conditions.

3.3. Overall Algorithm

The overall operation of the SDMN-AN system is depicted in Figure 3. Both Bob’s and Eve’s receivers are positioned within Alice’s near-field. Initially, Alice performs near-field channel estimation on the Alice–Bob link. Utilizing the estimation results, Alice generates the corresponding precoding matrix. Simultaneously, the transmitted signal is constructed, incorporating the antenna indices, APM symbols, and AN, before being transmitted. Upon reception, Bob employs joint ML detection to estimate the antenna index and demodulate the APM symbol, thereby recovering the transmitted information. Throughout this process, the selection of antenna indices and the incorporation of AN significantly disrupt Eve’s ability to accurately intercept the transmission, thereby reducing its eavesdropping efficacy and ensuring the overall security of the system. Even if Eve applies advanced signal processing, near-field channel mismatch prevents perfect null-space alignment, leading to unavoidable AN leakage in Eve’s received signal.

Figure 3.

Figure 3

Representation of overall operations with respect to the SDMN-AN system.

3.4. Complexity Analysis

At the transmitter side, two precoding strategies are considered. For MRT precoding, the precoding matrix is obtained via conjugate channel processing, which requires 𝒪(NtNr) complex multiplications. In contrast, ZF precoding involves the computation of a matrix inverse of size Nr×Nr, leading to a computational complexity on the order of 𝒪(Nr3+NtNr2). Therefore, MRT precoding offers lower computational and hardware complexity at the transmitter, while ZF precoding incurs higher processing cost in exchange for simplified receiver-side detection.

At the receiver side, Bob employs joint ML detection over both the receiver index and the modulation symbol. The detection complexity scales with the size of the SDMN-AN symbol set, resulting in a computational complexity of 𝒪(NrM) per detection, where M denotes the modulation order. This complexity is comparable to that of conventional spatial modulation schemes and remains moderate for small to medium numbers of distributed receivers.

Overall, the proposed SDMN-AN framework provides a flexible trade-off between transmitter-side and receiver-side complexity. MRT-based designs favor low-complexity transmission at the cost of higher detection burden, whereas ZF-based designs shift computational complexity to the transmitter while enabling simplified and efficient detection at the receiver.

4. BER Performance Analysis

This section investigates the BER performance of the proposed SDMN-AN scheme. In particular, analytical upper bounds on the BERs experienced by both Bob and Eve are derived under the assumption that a joint ML detector is employed.

Based on the analytical framework developed in [16], the BER upper bound for Bob in the SDMN-AN system can be expressed as

PB1ξ2ξxjm𝒳xkn𝒳xknxjme(xjm,xkn)P(xjmxkn), (24)

where 𝒳 denotes the set of all possible transmitted symbol vectors under the SDMN-AN scheme. The function e(xjm,xkn) represents the Hamming distance between the symbol vectors xjm and xkn, while P(xjmxkn) denotes the corresponding pairwise error probability (PEP), which characterizes the probability of erroneously detecting xkn when xjm is transmitted.

In particular, the PEP can be evaluated as

P(xjmxkn)=PybρHeffxjm2>ybρHeffxkn2=P{RρnbH(HeffxknHeffxjm)>12HeffxknHeffxjm2, (25)

where Heff denotes the effective channel under perfect channel estimation with Heff=H¯bWM for MRT precoding and Heff=INr for ZF precoding. Moreover, RρnbH(HeffxknHeffxjm) satisfies RρnbH(HeffxknHeffxjm)𝒞𝒩0,ρ2σb22HeffxknHeffxjm2. Therefore, the PEP can be expressed as

P(xjmxkn)=Qρ2HeffxknHeffxjm22σb2. (26)

In a nutshell, the BER upper bound of Bob can be derived using Equation (24) in conjunction with Equation (26).

Subsequently, similar to BER upper bound of Bob, BER upper bound of Eve can be given by

PE1ξ2ξxjm𝒳xkn𝒳xknxjme(xjm,xkn)P(xjmxkn), (27)

where P(xjmxkn) is the PEP corresponding to Eve’s estimated channel H¯e, which can be derived as

P(xjmxkn)=PyeρHeffxjm2>yeρHeffxkn2=PρHeffxjm+HeVNn0+neρHeffxjm2>ρHeffxkn+HeVNn0+neρHeffxkn2=PρHeVNn0H(xknxjm)+ρneH(xknxjm)>ρ22(Heffxjmxkn2Heffxjmxjm2). (28)

where Heff denotes the effective channel under perfect channel estimation with Heff=H¯eWM for MRT precoding and Heff=H¯eWZF for ZF precoding. Moreover, it can be derived that ρ(HeVNn0)H(xknxjm)𝒞𝒩0,ρ2σb22(HeVN)H(xknxjm)2 and ρneH(xknxjm)𝒞𝒩0,ρ2σe22xknxjm2. Therefore, the PEP P(xjmxkn) can be formulated as

P(xjmxkn)=QρHeffxjmxkn2ρHeffxjmxjm22σb2(HeVN)H(xknxjm)2+2σe2xknxjm2. (29)

Hence, the BER upper bound of Eve can be derived by combining Equations (27) and (29).

It is worth noting that, unlike the far-field case, the near-field channel exhibits distance-dependent phase curvature across the transmit array, which causes Eve’s received signal components to experience severe phase misalignment even under perfect channel estimation. Combined with the residual AN leakage induced by near-field channel mismatch, this effect results in significant amplitude and phase uncertainty at Eve, thereby fundamentally degrading its detection performance.

5. Simulation Results

In this section, the security performance of the proposed SDMN-AN scheme is evaluated by comparing its BER with that of the DM-AN scheme presented in [19]. Unless otherwise specified, the comparison is conducted over a line-of-sight (LoS)-dominated near-field channel under the assumption of perfect channel estimation. For both theoretical and Monte Carlo simulation results, the following parameters were used: Nt=256, Nr=2, Ne=1, and D=λc/2. The positions of Bob and Eve are provided in Table 1. The quadrature phase shift keying (QPSK) scheme was employed, and the BER for each simulation was averaged over 106 realizations. For convenience, it is assumed that the noise power is identical at both Bob and Eve, i.e., σb2=σe2=1SNR, where SNR denotes the signal-to-noise ratio.

Table 1.

Locations of Bob and Eve.

Steering Angles () Distance (m)
Bob {70, 110} {15, 30}
Eve {73} {15}

Figure 4 presents the performance comparison of both theoretical and simulated BER for Bob and Eve, utilizing the SDMN-AN method with ZF precoding under various values of γ. The modulation scheme is QPSK with a spectral efficiency of 3 bits/Hz/s. Analysis reveals that as the SNR increases, both the theoretical and simulated BER for Bob gradually decrease, with the simulated BER converging to the theoretical value. Conversely, the BER for Eve remains elevated. Specifically, for Bob, the case with γ=0.8 offers a 2 dB improvement over the case with γ=0.5 at a BER level of 103. Meanwhile, variations in γ have minimal impact on the BER for Eve. The change in γ alters the distribution of power between the precoded signal and AN. A larger γ leads to more power being allocated to the precoded signal, thereby improving Bob’s performance. However, the presence of AN ensures that Eve’s performance remains poor, demonstrating the security of the SDMN-AN scheme, even when Eve is in close proximity to Bob.

Figure 4.

Figure 4

Theoretical and simulated BER performance of the proposed SDMN-AN scheme with ZF precoding and different γ.

Figure 5 illustrates the theoretical and simulated BER performance for both Bob and Eve using the SDMN-AN method with MRT precoding across various values of γ. Similar to the results presented in Figure 4, the SNR increase results in a decrease in both theoretical and simulated BER for Bob, with the simulated BER approaching the theoretical BER. Notably, when γ=0.8, a 2 dB performance gain is observed for Bob compared to the γ=0.5 case at a BER level of 103. Due to the use of AN, the BER of Eve remains high, with minimal impact from changes in γ. Furthermore, MRT precoding offers the advantage of reducing Alice’s hardware requirements. These results confirm that by modulating γ, the SDMN-AN scheme can achieve varied security performance, even with Eve positioned closely to Bob.

Figure 5.

Figure 5

Theoretical and simulated BER performance of the proposed SDMN-AN scheme with MRT precoding and different γ.

Figure 6 compares the BER performance of the SDMN-AN and DM-AN schemes using ZF precoding at γ=0.5. The modulation scheme for SDMN-AN is QPSK, while DM-AN uses 8PSK, with both schemes having the same spectral efficiency of 3 bits/Hz/s. As the SNR increases, the BER performance for both schemes improves for Bob, but Eve’s performance remains poor. Particularly, when the BER is 102, Bob’s performance using SDMN-AN method exhibits a 3 dB improvement over DM-AN method. This is attributed to the fact that SDMN-AN encodes some bits into receiver indices, which enhances the accuracy of joint ML detection. Conversely, DM-AN encodes all bits into constellation points, thus increasing the demodulation complexity. These results validate that SDMN-AN not only enhances spectral efficiency but also improves Bob’s performance while maintaining security.

Figure 6.

Figure 6

BER performance comparison between the proposed SDMN-AN scheme with ZF precoding and DM-AN scheme when γ=0.5.

As illustrated in Figure 7, it compares the BER performance between SDMN-AN and DM-AN schemes using ZF precoding at γ=0.8. The modulation scheme for SDMN-AN is QPSK, while DM-AN utilizes 8PSK, and both schemes maintain the same spectral efficiency. Although different modulation orders are used, joint ML detection is applied to both schemes to ensure a fair comparison under the same detection criterion. Similar to Figure 6, as the SNR increases, the BER for both schemes decreases for Bob, with Eve’s performance remaining poor. However, at a BER of 102, SDMN-AN outperforms DM-AN by 3.5 dB gains. This improvement is attributable not only to the modulation of bits into receiver indices but also to the increased power allocated to the precoded signal as γ increases, further enhancing Bob’s performance. These results show that increasing γ improves both spectral efficiency and security, further protecting against Eve’s eavesdropping.

Figure 7.

Figure 7

BER performance comparison between the proposed SDMN-AN scheme with ZF precoding and DM-AN scheme when γ=0.8.

Figure 8 compares the BER performance of SDMN-AN and DM-AN schemes using MRT precoding at γ=0.5. The modulation scheme for SDMN-AN is QPSK, while DM-AN employs 8PSK, with both schemes having the same spectral efficiency. Compared to ZF precoding, MRT precoding reduces Alice’s hardware overhead but increases the detection complexity at Bob’s side. In this case, the SDMN-AN scheme demonstrates good performance. Specifically, for a BER level of 102, SDMN-AN outperforms DM-AN by 3 dB gains, confirming that MRT precoding still ensures system security and spectral efficiency while reducing hardware overhead.

Figure 8.

Figure 8

BER performance comparison between the proposed SDMN-AN scheme with MRT precoding and DM-AN scheme when γ=0.5.

As shown in Figure 9, it presents the BER comparison of SDMN-AN and DM-AN schemes using MRT precoding at γ=0.8. The modulation for SDMN-AN is QPSK, while for DM-AN, it is 8PSK. Notably, when Bob’s BER is 102, SDMN-AN method achieves a 3.5 dB improvement over DM-AN method, surpassing the performance seen at γ=0.5. This performance gain is attributed to the increased power allocated to the precoded signal. Both schemes effectively prevent Eve’s successful reception and demodulation, ensuring robust security against eavesdropping.

Figure 9.

Figure 9

BER performance comparison between the proposed SDMN-AN scheme with MRT precoding and DM-AN scheme when γ=0.8.

Figure 10 illustrates the BER performance of the proposed SDMN-AN scheme using MRT precoding under imperfect channel estimation for different values of γ. The channel estimation error is modeled as a phase perturbation of 10, which is incorporated as a multiplicative factor expjθerrorπ/180 with θerror=10. It is observed that, in the presence of channel estimation errors, the BER performance of Bob degrades compared to the perfect channel estimation case. However, the performance loss remains within an acceptable range. Meanwhile, Eve consistently experiences a significantly degraded BER performance, thereby ensuring the communication security of the proposed scheme.

Figure 10.

Figure 10

BER comparison using MRT precoding between perfect and imperfect channel estimation for the proposed SDMN-AN scheme.

Figure 11 depicts the rate performance of the proposed SDMN-AN scheme for different numbers of receive antennas Nr and values of γ. As shown in Figure 11, the achievable rate and secrecy rate vary with different choices of γ. Specifically, as γ decreases, the SNR at which the secrecy rate attains its peak shifts to a higher value. In practical implementations, the parameter γ can be properly selected according to system requirements to achieve the desired secrecy performance. These results further indicate that the secrecy advantage of the proposed SDMN-AN scheme is not solely attributed to power allocation or modulation order, but fundamentally arises from the near-field propagation characteristics, which enable distance-dependent signal discrimination and persistent AN leakage at the eavesdropper.

Figure 11.

Figure 11

Rate performance comparison of Bob, Eve, and the resulting secrecy rate under different γ values in the proposed SDMN-AN scheme.

Figure 12 shows the BER performance of the proposed SDMN-AN scheme using MRT precoding under different numbers of receive antennas Nr and values of γ. The locations are specified in Table 2 for Nr=4. It can be observed that, as Nr increases, although the spectral efficiency is improved, the BER performance of the intended receiver degrades. Moreover, for a given Nr, the BER performance improves with increasing γ. In contrast, Eve consistently suffers from severe interference, thereby maintaining the communication security of the proposed scheme. In addition, a smaller value of γ corresponds to a higher proportion of AN, which, although slightly degrades Bob’s BER performance, further suppresses Eve’s interception capability, highlighting the practical trade-off between reliability and security.

Figure 12.

Figure 12

BER comparison using MRT precoding between different Nr for the proposed SDMN-AN scheme.

Table 2.

Locations of Bob and Eve for Nr=4.

Steering Angles () Distance (m)
Bob {35, 70, 110, 155} {10, 15, 30, 20}
Eve {73} {15}

6. Conclusions

This paper introduced the SDMN-AN system, a novel approach for securing near-field communications by leveraging multi-point cooperative receivers and AN to mitigate eavesdropping risks. By integrating indices of Bob with modulation symbols, SDMN-AN significantly improved spectral efficiency. The incorporation of AN further impaired the ability of Eve to successfully reconstruct the transmitted signal. Two precoding strategies—MRT with joint ML detection and ZF precoding with joint ML detection—were utilized, offering a balanced trade-off between security and computational efficiency. The simulation results demonstrated that the SDMN-AN system enhances communication reliability for Bob while restricting Eve’s ability to intercept the transmitted signal. Compared to conventional DM-AN systems, SDMN-AN not only improves security but also optimizes spectral efficiency, making it a promising solution for secure near-field communications. In addition, the proposed SDMN-AN framework is well suited for application scenarios such as cooperative sensor networks, short-range secure sensing, and indoor near-field communication systems, where distributed receivers naturally arise and near-field propagation dominates. In these settings, the ability to exploit receiver indices and AN provides an effective and practical means for enhancing physical-layer security.

Author Contributions

Methodology, J.L. and Y.Z.; Software, Y.Z. and Y.W.; Formal analysis, Y.W.; Data curation, D.G.; Writing—original draft, J.L. and Y.Z.; Writing—review & editing, Y.X.; Supervision, Y.X. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Funding Statement

This research received no external funding.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Saad W., Bennis M., Chen M. A vision of 6G wireless systems: Applications, trends, technologies, and open research problems. IEEE Netw. 2020;34:134–142. doi: 10.1109/MNET.001.1900287. [DOI] [Google Scholar]
  • 2.Wang C.X., You X., Gao X., Zhu X., Li Z., Zhang C., Wang H., Huang Y., Chen Y., Haas H., et al. On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds. IEEE Commun. Surv. Tuts. 2023;25:905–974. doi: 10.1109/COMST.2023.3249835. [DOI] [Google Scholar]
  • 3.Alwis C.D., Kalla A., Pham Q.V., Kumar P., Dev K., Hwang W.J., Liyanage M. Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research. IEEE Open J. Commun. Soc. 2021;2:836–886. doi: 10.1109/OJCOMS.2021.3071496. [DOI] [Google Scholar]
  • 4.Wang Z., Zhang J., Du H., Niyato D., Cui S., Ai B., Debbah M., Letaief K.B., Poor H.V. A tutorial on extremely large-scale MIMO for 6G: Fundamentals, signal processing, and applications. IEEE Commun. Surv. Tutor. 2024;26:1560–1605. doi: 10.1109/COMST.2023.3349276. [DOI] [Google Scholar]
  • 5.Cui M., Wu Z., Lu Y., Wei X., Dai L. Near-field MIMO communications for 6G: Fundamentals, challenges, potentials, and future directions. IEEE Commun. Mag. 2023;61:40–46. doi: 10.1109/MCOM.004.2200136. [DOI] [Google Scholar]
  • 6.Zhang H., Shlezinger N., Guidi F., Dardari D., Eldar Y.C. 6G wireless communications: From far-field beam steering to near-field beam focusing. IEEE Commun. Mag. 2023;61:72–77. doi: 10.1109/MCOM.001.2200259. [DOI] [Google Scholar]
  • 7.Mao B., Liu J., Wu Y., Kato N. Security and privacy on 6G network edge: A survey. IEEE Commun. Surv. Tutor. 2023;25:1095–1127. doi: 10.1109/COMST.2023.3244674. [DOI] [Google Scholar]
  • 8.Zhong Y., Chen J., Xiao Y., Poulkov V., Yuen C. Movable Antennas for Terahertz Broadcast Beamforming in Hybrid-Field Scenarios. IEEE Wirel. Commun. Lett. 2025;14:2321–2325. doi: 10.1109/LWC.2025.3568430. [DOI] [Google Scholar]
  • 9.Kalantari A., Soltanalian M., Maleki S., Chatzinotas S., Ottersten B. Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security. IEEE J. Sel. Top. Signal Process. 2016;10:1478–1493. doi: 10.1109/JSTSP.2016.2600521. [DOI] [Google Scholar]
  • 10.Jian J., Wang W.Q., Chen H., Huang B. Physical-Layer Security for Multi-User Communications with Frequency Diverse Array-Based Directional Modulation. IEEE Trans. Veh. Technol. 2023;72:10133–10145. doi: 10.1109/TVT.2023.3254511. [DOI] [Google Scholar]
  • 11.Qiu B., Cheng W., Zhang W. Decomposed and Distributed Directional Modulation for Secure Wireless Communication. IEEE Trans. Wirel. Commun. 2024;23:5219–5231. doi: 10.1109/TWC.2023.3325042. [DOI] [Google Scholar]
  • 12.Huang G., Chen S., Ding Y., Li X., Nallanathan A., Mumtaz S. Security-Enhanced Directional Modulation Symbol Synthesis Using High Efficiency Time-Modulated Arrays. IEEE Trans. Veh. Technol. 2024;73:1418–1423. doi: 10.1109/TVT.2023.3305301. [DOI] [Google Scholar]
  • 13.Soltani R., Goeckel D., Towsley D., Bash B.A., Guha S. Covert Wireless Communication with Artificial Noise Generation. IEEE Trans. Wirel. Commun. 2018;17:7252–7267. doi: 10.1109/TWC.2018.2865946. [DOI] [Google Scholar]
  • 14.Gu Y., Wu Z., Yin Z., Zhang X. The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System. IEEE Access. 2019;7:58353–58360. doi: 10.1109/ACCESS.2019.2905764. [DOI] [Google Scholar]
  • 15.Maneiro-Catoira R., Brégains J., García-Naya J.A., Castedo L. Directional Modulation with Artificial-Noise Injection Into Time-Modulated Arrays. IEEE Antennas Wirel. Propag. Lett. 2024;23:2336–2340. doi: 10.1109/LAWP.2024.3389460. [DOI] [Google Scholar]
  • 16.Zhang H., Xiao Y., Fu B., Zhou X. 2020 International Symposium on Networks, Computers and Communications (ISNCC) IEEE; Piscataway, NJ, USA: 2020. Artificial Noise-aided Spatial and Directional Modulation Systems for Secure Transmission; pp. 1–5. [DOI] [Google Scholar]
  • 17.Cui M., Dai L. Channel Estimation for Extremely Large-Scale MIMO: Far-Field or Near-Field? IEEE Trans. Commun. 2022;70:2663–2677. doi: 10.1109/TCOMM.2022.3146400. [DOI] [Google Scholar]
  • 18.Zhang Z., Liu Y., Wang Z., Mu X., Chen J. Physical Layer Security in Near-Field Communications. IEEE Trans. Veh. Technol. 2024;73:10761–10766. doi: 10.1109/TVT.2024.3366115. [DOI] [Google Scholar]
  • 19.Chen J., Xiao Y., Liu K., Zhong Y., Lei X., Xiao M. Physical Layer Security for Near-Field Communications via Directional Modulation. IEEE Trans. Veh. Technol. 2024;73:12242–12246. doi: 10.1109/TVT.2024.3382324. [DOI] [Google Scholar]
  • 20.Lu Y., Dai L. Near-Field Channel Estimation in Mixed LoS/NLoS Environments for Extremely Large-Scale MIMO Systems. IEEE Trans. Commun. 2023;71:3694–3707. doi: 10.1109/TCOMM.2023.3260242. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES