1. Introduction
The broadcast nature of wireless channels gives rise to a significant concern regarding security in wireless communication systems. Typically, security is ensured through encryption algorithms implemented in higher layers of the Open Systems Interconnection (OSI) stack, such as key cryptography protocols [
1]. The inherent broadcast nature of wireless communications poses challenges in preventing the unauthorized interception of transmitted signals, and the phenomenon of superposition can result in the overlap of multiple signals at the receiver [
2]. Nevertheless, security can be augmented with alternative approaches, such as physical layer security (PLS) schemes [
3]. Given their independence from higher layers, PLS techniques can be employed on top of existing security schemes. Common techniques in PLS involve the use of coding or precoding schemes and leverage channel state information to maintain confidentiality across a wireless medium [
4].
Multiple-input, multiple-output (MIMO) systems offer extensive spatial multiplexing capabilities due to their impressive ability to filter signals in the spatial domain, demonstrating high spatial selectivity. Indeed, MIMO arrays can efficiently transmit and/or receive signals in a specific direction and with very narrow beamwidth [
5]. Consequently, the array gain experiences a rapid decrease outside the receive/transmit direction, which promotes PLS. Among the various PLS techniques proposed for sixth generation (6G), the utilization of large antenna systems stands out as one of the most promising approaches, particularly through the application of narrow beamforming facilitated by extremely large antenna array (ELAA) [
6]. The huge aperture of ELAAs and/or the adoption of higher carrier frequencies gives rise to a larger near-field region. As a result, the communication channels to/with ELAAs should consider spherical wave propagation, and cannot rely on the far-field plane-wave channel modeling of conventional MIMO. Recent findings have demonstrated that beamforming in the near field not only produces narrow beams but also results in beams with finite depth. This is fundamentally different from the conventional beamforming associated with the far-field region, which is characterized by infinite depth [
7,
8,
9]. Therefore, an ELAA can potentially concentrate its large gain in a specific zone, which gives rise to a beamfocusing effect [
9,
10]. This effect can be used to increase PLS features [
11,
12,
13].
Spectrally efficient wireless communications are based on single-carrier multilevel Quadrature Amplitude Modulation (QAM) constellations and/or on multicarrier signals. In both cases, the transmitted signals exhibit a large peak-to-average power ratio (PAPR) and lead to amplification issues because the power amplifier must adopt a large input back-off to avoid nonlinear distortion [
14]. A solution to this problem is to employ a parallel amplification technique with constellation decomposition [
15]. In this technique, multi-level constellations are divided into multiple Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK), or Offset Quadrature Phase Shift Keying (OQPSK) components, and each component is individually amplified and transmitted by an antenna. The different components are combined at the channel level to generate the desired data symbols. Phase rotations between Radio Frequency (RF) branches can be selected to optimize the transmitted constellation in a specific direction. Consequently, PLS is achieved through the shaping of the constellation, which ensures that unauthorized users cannot decode the data transmitted to the legitimate user [
16,
17].
1.1. Related Work
In recent years, extensive research has focused on the PLS features within MIMO systems. As detailed in [
18], various techniques have been proposed to enhance PLS in massive MIMO, including artificial noise [
19], deep learning [
20], and power allocation [
21]. Those works share the plane-wave assumption for channel modeling. However, increasing focus on near-field communications, particularly in the context of large antenna arrays for 6G, has prompted the need for channel models that account for spherical wave propagation. The PLS gains associated with near-field beamforming were firstly addressed in [
22], where authors focus on spatial domain characteristics in extra-large scale MIMO (XL-MIMO) systems. Their study emphasized the impact of near-field beamforming on PLS, particularly in conjunction with the spherical-wavefront model. In [
11,
12], the authors considered the PLS features in radiative near-field communication for ELAAs, demonstrating that beamfocusing with Matched Filtering (MF) beamforming substantially improves jamming rejection and secrecy rates. In [
16], the focus lies on achieving PLS through constellation shaping. Note the proposed approach necessitates each user’s knowledge of the transmitter configuration parameters related to constellation shaping. In [
17], the authors proposed a PLS approach that combines constellation shaping with a MIMO transmission in the plane-wave regime.
Table 1 summarizes the related work described above, highlighting the underlying PLS technique and the main differences relatively to the proposed PLS scheme.
1.2. Major Contributions
This paper considers a novel transmission scheme where an ELAA is combined with a multi-level QAM decomposition technique to provide energy-efficient and secure downlink transmissions. The major contributions are summarized as follows:
Contrary to the approach of [
17], which considered a MIMO system operating in the far field and a group of antennas to transmit each constellation component, we considered constellation decomposition at the ELAA level, and that each component is transmitted by an individual sub-array operating in the near-field.
We consider a near-field channel model for each sub-array and compare its particularities relative to a common far-field channel model.
We studied the PLS aspects resulting from the combination of near-field beamforming and constellation shaping, namely by analyzing the achievable mutual information (MI) and secrecy rate (SR) under various scenarios.
By investigating factors such as field region, relative distance, beamforming direction, and the transmitted constellation configuration, this work aims to provide insights into how the integration of these techniques contributes to improved SR and MI. It is demonstrated that in the near-field, the PLS features of the QAM constellation decomposition scheme can be better than the ones observed in the far field, which is explained by the beamfocusing effect available in this field region
1.3. Organization
This work is structured into distinct sections:
Section 2 provides details on the adopted communication scenario under consideration. It also delves into channel modeling within the near field.
Section 3 describes the decomposition of the
M-QAM constellation and also presents the PLS features of this decomposition technique achieved both in the far field and in the near field. Lastly,
Section 4 outlines the conclusions drawn from this work.
1.4. Notation
The notation used in this context is as follows: Boldface lowercase letters stand for vectors, and the nth element of a vector is denoted as The norm of is denoted as , and represents the direction of . The symbol represents the Hermitian operator, which is equivalent to the transpose conjugate. The function yields the remainder of the integer division , the division operation, denoted as , yields the quotient when a is divided by b, and represents the floor function. The imaginary unit is denoted as .
3. Constellation Decomposition Using Antenna Arrays
One approach to increase the spectral efficiency of communication systems is to use large QAM constellations. However, multilevel QAM constellations lead to amplification issues, thanks to the resulting high PAPR. These issues are due to the need to adopt a high input back-off (IBO) to assure a linear amplification of the transmitted signal, which strongly reduces the power efficiency of the power amplifier (PA) [
23]. In this section, we follow a strategy to increase the power efficiency of the communication based on the one proposed in [
17]. The main idea is to decompose the large-PAPR signal into a set of constant-envelope signals such as BPSK or QPSK signals. Each signal is transmitted by a strongly nonlinear, energy-efficient PA [
24]. In this work, we consider a decomposition with BPSK components, since in this case, we have more spatial degrees of freedom to focus the constellation.
Let us consider 64-QAM constellations, which can be decomposed into
BPSK components. Each BPSK component is transmitted individually using an arbitrary antenna structure (as will be clarified later in the manuscript, each BPSK component can be transmitted by a single antenna or by a large sub-array). The data bits are mapped into the 64-QAM constellation, characterized by the ordered set
following the rule
, with
denoting the binary representation (i.e., 0 or 1) of
with
bits. The decomposition rule for the particular case of 64-QAM can be obtained as [
17], where
with
denoting the binary polar representation (i.e.,
) of the symbol
and
,
,
,
,
and
. For the considered 64-QAM constellation, the different BPSK components are defined in
Table 2.
As can be observed, each of the BPSK components can be transmitted efficiently using a nonlinear PA, given that we are employing BPSK modulation, which maintains a constant envelope, allowing for the use of nonlinear and efficient PAs without experiencing Non-Linear (NL) distortion. It should also be highlighted that a given receiver (either the legitimate user or the eavesdropper) receives a complex data symbol that results from the combination of all the BPSK components in the channel. Naturally, since the different signals are precoded to combine coherently at the location of the legitimate user, PLS features can be explored with this transmission scheme since an eavesdropper located at a different position has difficulties decoding the received constellation.
To analyze and evaluate the PLS benefits of the constellation decomposition technique, we consider the SR between the legitimate user and the eavesdropper. The MI for the combined symbol is denoted by
and can be calculated as [
17]
where
represents the expected value,
represents the noise,
stands for the noise power spectral density, and
represents the symbol of the original 64-QAM. The SR is defined as the difference between the MIs of the legitimate and malicious user, i.e.,
where
represents MI of the legitimate user and
represents the MI of the eavesdropper.
In the next subsections, we present an analysis of the PLS features of this decomposition technique considering both the transmission with a uniform linear array (ULA) with
K antenna elements (
Section 3.1) and an ELAA with
K sub-arrays with arbitrary dimensions (
Section 3.2).
3.1. Transmission with ULAs
A ULA is a type of antenna array configuration where the antennas are arranged in a straight line with equal spacing between adjacent antennas. In this section, we consider an ULA with
antennas to transmit the BPSK components of a 64-QAM constellation defined in
Table 2. The considered ULA is represented in
Figure 3.
This ULA can be seen as a particular case of the general antenna array characterized in
Section 2, with
and
, which results in
and
, yielding a total of
antennas. Note that since the ULA is physically small, it is very likely that both the legitimate user and the eavesdropper are located in the far-field region. As a result, channel modeling can be simplified thanks to the fact that the phase variations across the antennas of the ULA can be defined as a function of the angle-of-departure (AoD)
(see
Figure 3). More concretely, the complex-valued channel response of the
kth antenna can be written as
Each BPSK component is transmitted to the legitimate user using MF beamforming. In this context, the beamforming weights for the
kth sub-array are defined as
Under these conditions, the received complex data symbol is
Let us now evaluate the PLS performance of this technique. More concretely, we present a set of results regarding the MI and the SR computed using Equations (
6) and (
7). Rate formulas are presented as a function of
, where
represents the noise variance, and
corresponds to the average energy of the transmitted bits. It is assumed that the transmitter employs linear power amplification, and also a perfect time and frequency synchronization. Let us start by considering a scenario where the legitimate user at a distance
(i.e., in the far-field region of the ULA), whilst the malicious user is at
with
. Both users are located at the array’s boresight,
(i.e.,
).
As it can be noted from
Figure 4, both legitimate and eavesdropper MI follow the same behavior and saturate at 6 bits/s/Hz. As a consequence, the SR remains close to zero as both MI values increase equally with the signal-to-noise ratio (SNR). Both users experience similar normalized beamforming gain as both are in the far field and similar constellation shapes as there is no angular difference between both users (
).
Let us now consider a scenario where both users are at the same propagation distance to the ULA
(i.e.,
), but located at different directions.
Figure 5 presents the MI and SR considering a scenario where
with
.
From the figure, it can be noted there is a horizontal shift in the MI of the eavesdropper, which is explained by its different angular location to the legitimate user. This leads to an increase in the SR, which is due to the distortion associated with the received constellation of the malicious user. This distortion effect is shown in
Figure 6, which shows the constellation received by the malicious eavesdropper overlapped with a standard 64-QAM constellation.
Figure 7 presents the MI and SR in a scenario where both users are located in the far field (
), with
,
and
.
From the figure, it can be observed that the eavesdropper’s MI does not align with that of the legitimate user, consequently leading to an enhancement in the SR. This shift in MI can once again be attributed to constellation distortion in the far field, given that the normalized beamforming gain is reasonably the same for both users’ directions. As a result, it can be noted that PLS can only be obtained in scenarios where the directivity of the transmission is explored (i.e., when users are misaligned).
3.2. Transmission with ELAAs
Aiming to explore the focusing effect available in the near-field region, we propose the use of an ELAA to transmit the different BPSK components. More concretely, we investigate the transmission of a 64-QAM signal subdivided into
BPSK components. By following the array geometry described in
Section 2.1, we considered that each BPSK signal is transmitted by a given sub-array of the ELAA. Each sub-array has
antennas (resulting from
and
) and employs MF beamforming to optimize the signal transmission for the legitimate user.
To evaluate the PLS features of this technique, let us start by defining the received signal as
where
is the channel response of the
qth antenna of the
kth sub-array and
is the corresponding beamforming weight used in that antenna (see Equation (
4)).
In the following, we present a set of results regarding the MI and the SR.
Figure 8 shows the MI and SR considering that both users are at the boresight (with
with
) and in the near field of the ELAA (with
and
with
).
As it can be analyzed from the figure and in contrast with was observed in
Figure 4, we have a clear growth in SR together with the legitimate user’s MI. This showcases the focusing effects in the near field since the malicious user no longer experiences maximum beamforming gain at
. In fact, the SR gain can be attributed solely to the normalized beamforming gain disparity between both users’ locations, as the constellation received by both is not distorted but only attenuated. This constellation attenuation can be seen in
Figure 9, which shows the constellation received by the malicious eavesdropper, overlapped with a standard 64-QAM constellation. This is the case because of the lower normalized beamforming gain attained at a distance
with
.
In
Figure 10, a near-field scenario is considered where the focal point remains unchanged, but the eavesdropper is now situated
in front of the legitimate user. As it can be seen from the figure, a parallel analysis to the preceding figure reveals that the SR closely aligns with the MI of legitimate users. Furthermore, it can be observed that the eavesdropper MI remains null. This can be explained due to the sharp nature of the focal point in the near field.
From
Figure 11 a scenario where the eavesdropper is positioned at an angle relative to the legitimate user.
The figure depicts a similar scenario to the one presented in
Figure 5, where both users are in the near field. Here, both users are at a distance
, with
and
. As can be observed and contrary to what happens in the far field, a more significant growth in SR can be attributed not only to a smaller beamwidth in the near field compared to the far-field counterpart but also a distortion in the received constellation due to the angle deviation [
17].