{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:13:53Z","timestamp":1767705233745,"version":"build-2065373602"},"reference-count":47,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"],"award-info":[{"award-number":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China","award":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"],"award-info":[{"award-number":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"]}]},{"name":"Guangdong Key Research and Development Program","award":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"],"award-info":[{"award-number":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"]}]},{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"],"award-info":[{"award-number":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"]}]},{"name":"Purple Mountain Laboratories for Network and Communication Security","award":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"],"award-info":[{"award-number":["2022YFB4300300","62001106","62171120","2020B0303010001","BM2003201"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>This paper studies the performance of location-based beamforming with the presence of artificial noise (AN). Secure transmission can be achieved using the location information of the user. However, the shape of the beam depends on the number of antennas used. When the scale of the antenna array is not sufficiently large, it becomes difficult to differentiate the performance between the legitimate user and eavesdroppers nearby. In this paper, we leverage AN to minimize the area near the user with eavesdropping risk. The impact of AN is considered for both the legitimate user and the eavesdropper. Closed-form expressions are derived for the expectations of the signal to interference plus noise ratios (SINRs) and the bit error rates. Then, a secure beamforming scheme is proposed to ensure a minimum SINR requirement for the legitimate user and minimize the SINR of the eavesdropper. Numerical results show that, even with a small number of antennas, the proposed beamforming scheme can effectively degrade the performance of eavesdroppers near the legitimate user.<\/jats:p>","DOI":"10.3390\/e25121626","type":"journal-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T03:48:41Z","timestamp":1701834521000},"page":"1626","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Performance Analysis of Artificial Noise-Assisted Location-Based Beamforming in Rician Wiretap Channels"],"prefix":"10.3390","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7863-2989","authenticated-orcid":false,"given":"Hua","family":"Fu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China"},{"name":"Purple Mountain Laboratories for Network and Communication Security, Nanjing 211111, China"}]},{"given":"Xiaoyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China"}]},{"given":"Linning","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China"},{"name":"Purple Mountain Laboratories for Network and Communication Security, Nanjing 211111, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,12,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","article-title":"A survey on wireless security: Technical challenges, recent advances, and future trends","volume":"104","author":"Zou","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","article-title":"A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead","volume":"36","author":"Wu","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sanenga, A., Mapunda, G.A., Jacob, T.M.L., Marata, L., Basutli, B., and Chuma, J.M. (2020). An Overview of Key Technologies in Physical Layer Security. Entropy, 22.","DOI":"10.3390\/e22111261"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3088","DOI":"10.1109\/TIT.2010.2048445","article-title":"Secure transmission with multiple antennas I: The MISOME wiretap channel","volume":"56","author":"Khisti","year":"2010","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1109\/TCOMM.2016.2530796","article-title":"Statistical 3-D beamforming for large-scale MIMO downlink systems over Rician fading channels","volume":"64","author":"Li","year":"2016","journal-title":"IEEE Trans. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","article-title":"Guaranteeing secrecy using artificial noise","volume":"7","author":"Goel","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2170","DOI":"10.1109\/TVT.2013.2238687","article-title":"On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels","volume":"62","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Shang, P., Yu, W., Zhang, K., Jiang, X.Q., and Kim, S. (2019). Secrecy enhancing scheme for spatial modulation using antenna selection and artificial noise. Entropy, 21.","DOI":"10.3390\/e21070626"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Joung, J., Choi, J., Jung, B.C., and Yu, S. (2019). Artificial noise injection and its power loading methods for secure space-time line coded systems. Entropy, 21.","DOI":"10.3390\/e21050515"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2170","DOI":"10.1109\/TVT.2015.2419318","article-title":"Optimal Transmission With Artificial Noise in MISOME Wiretap Channels","volume":"65","author":"Yang","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_11","first-page":"1023","article-title":"Coordinated Beamforming and Artificial Noise in the Downlink Secure Multi-Cell MIMO Systems Under Imperfect CSI","volume":"9","author":"Bai","year":"2020","journal-title":"IEEE Wireless Commun. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ta, H.Q., Cao, L., and Oh, H. (2023). Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI. Entropy, 25.","DOI":"10.3390\/e25121594"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1109\/JSTSP.2016.2607690","article-title":"Energy efficiency of confidential multi-antenna systems with artificial noise and statistical CSI","volume":"10","author":"Zappone","year":"2016","journal-title":"IEEE J. Sel. Topics Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Hu, L., Wu, B., Tang, J., Pan, F., and Wen, H. (2016, January 22\u201327). Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming. Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICC.2016.7511535"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1109\/TIFS.2016.2620279","article-title":"Secrecy throughput maximization for MISO multi-eavesdropper wiretap channels","volume":"12","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2386","DOI":"10.1109\/LCOMM.2019.2947520","article-title":"Artificial noise assisted secure massive MIMO transmission exploiting statistical CSI","volume":"23","author":"Wang","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"58353","DOI":"10.1109\/ACCESS.2019.2905764","article-title":"The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System","volume":"7","author":"Gu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2093","DOI":"10.1109\/TCOMM.2018.2797989","article-title":"Pilot spoofing attack detection and countermeasure","volume":"66","author":"Tugnait","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"6433","DOI":"10.1109\/TWC.2018.2859949","article-title":"Pilot spoofing attack by multiple eavesdroppers","volume":"17","author":"Huang","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1109\/TIFS.2016.2516825","article-title":"Secure transmission against pilot spoofing attack: A two-way training-based scheme","volume":"11","author":"Xiong","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"7676","DOI":"10.1109\/TWC.2023.3254526","article-title":"Location Information Assisted Beamforming Design for Reconfigurable Intelligent Surface Aided Communication Systems","volume":"22","author":"Xing","year":"2023","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2780","DOI":"10.1109\/TWC.2015.2510635","article-title":"Location-based beamforming for enhancing secrecy in Rician wiretap channels","volume":"15","author":"Yan","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"7847","DOI":"10.1109\/TWC.2016.2608895","article-title":"Location-based beamforming and physical layer security in Rician wiretap channels","volume":"15","author":"Liu","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/LCOMM.2017.2766629","article-title":"Location-Based Millimeter Wave Multi-Level Beamforming Using Compressive Sensing","volume":"22","author":"Abdelreheem","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/LWC.2022.3163518","article-title":"Covert Threat Region Analysis of 3-D Location-Based Beamforming in Rician Channel","volume":"11","author":"Lin","year":"2022","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Lichtman, M., Rao, R., Marojevic, V., Reed, J., and Jover, R.P. (2018, January 20\u201324). 5G NR jamming, spoofing, and sniffing: Threat assessment and mitigation. Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA.","DOI":"10.1109\/ICCW.2018.8403769"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"6750","DOI":"10.1109\/TVT.2021.3081803","article-title":"Artificial Noise Assisted Secure Transmission for Uplink of Massive MIMO Systems","volume":"70","author":"Xu","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/LCOMM.2019.2957121","article-title":"Minimization of Secrecy Outage Probability With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels","volume":"24","author":"Hu","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3465","DOI":"10.1109\/TVT.2020.2965959","article-title":"Deep Artificial Noise: Deep Learning-Based Precoding Optimization for Artificial Noise Scheme","volume":"69","author":"Yun","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1109\/TSP.2010.2094610","article-title":"QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach","volume":"59","author":"Liao","year":"2010","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1109\/JSYST.2022.3174914","article-title":"SNR-Outage-Based Robust Artificial Noise-Aided Beamforming for Correlated MISO Wiretap Channels Under Gaussian Channel Uncertainties","volume":"17","author":"Wang","year":"2023","journal-title":"IEEE Syst. J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3051","DOI":"10.1109\/TIT.2009.2021379","article-title":"Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels","volume":"55","author":"Arikan","year":"2009","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1109\/TCSI.2010.2071950","article-title":"Low-power discrete Fourier transform for OFDM: A programmable analog approach","volume":"58","author":"Suh","year":"2011","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1109\/JSTSP.2018.2821104","article-title":"DFT-based hybrid beamforming multiuser systems: Rate analysis and beam selection","volume":"12","author":"Han","year":"2018","journal-title":"IEEE J. Sel. Topics Signal Process."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MCOM.004.2200136","article-title":"Near-Field MIMO Communications for 6G: Fundamentals, Challenges, Potentials, and Future Directions","volume":"61","author":"Cui","year":"2023","journal-title":"IEEE Commun. Mag."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/LCOMM.2021.3129317","article-title":"Near-Field Modeling and Performance Analysis for Multi-User Extremely Large-Scale MIMO Communication","volume":"26","author":"Lu","year":"2022","journal-title":"IEEE Commun. Lett."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1542","DOI":"10.1109\/TGCN.2023.3259579","article-title":"Multi-Beam Design for Near-Field Extremely Large-Scale RIS-Aided Wireless Communications","volume":"7","author":"Shen","year":"2023","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Goldsmith, A. (2005). Wireless Communications, Cambridge University Press.","DOI":"10.1017\/CBO9780511841224"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/25.923061","article-title":"Performance analysis of maximal ratio combining in the presence of multiple equal-power cochannel interferers in a Nakagami fading channel","volume":"50","author":"Aalo","year":"2001","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_40","unstructured":"Wolfram (2023, October 18). HypergeometricU. Available online: http:\/\/functions.wolfram.com\/07.33.26.0007.01."},{"key":"ref_41","unstructured":"Gradshteyn, I.S., and Ryzhik, I.M. (2007). Table of Integrals, Series, and Products, Academic Press Inc.. [7th ed.]."},{"key":"ref_42","unstructured":"Wolfram (2023, October 19). MeijerG. Available online: http:\/\/functions.wolfram.com\/07.34.21.0085.01."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"4193","DOI":"10.1109\/TWC.2011.111210.102115","article-title":"A mixture Gamma distribution to model the SNR of wireless channels","volume":"10","author":"Atapattu","year":"2011","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_44","unstructured":"Abramowitz, M., and Stegun, I.A. (1972). Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematical Tables, Dover Publications."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/TCOMM.2004.826373","article-title":"On the error probability of binary and M-ary signals in Nakagami-m fading channels","volume":"52","author":"Shin","year":"2004","journal-title":"IEEE Trans. Commun."},{"key":"ref_46","unstructured":"3rd Generation Partnership Project (3GPP) (2019). Study on Channel Model for Frequencies from 0.5 to 100 GHz (Release 16), ETSI. Technical Specification Group Radio Access Network; Technical Report (TR) 38.901."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1109\/JSAC.2017.2710678","article-title":"Introduction on IMT-2020 5G trials in China","volume":"35","author":"Dong","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/12\/1626\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:33:51Z","timestamp":1760132031000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/12\/1626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":47,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["e25121626"],"URL":"https:\/\/doi.org\/10.3390\/e25121626","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2023,12,6]]}}}