Secure Protected Regions (CPR) in Near-Field Systems
- CPR is a method that defines a protected zone around the receiver using precise geometric modeling and beamfocusing to counter eavesdropping.
- It employs advanced waveform design and artificial noise to optimize worst-case secrecy rates in near-field multiple-antenna systems.
- Practical implementations via SGDA and Equal-SINRs algorithms, along with full-duplex Bob, enable both physical and virtual protected zones for robust security.
A Secure Protected Region (CPR), with particular reference to receiver-centered protected zones in near-field beamfocusing, is a physical or virtual domain established around a legitimate receiver (“Bob”) wherein eavesdroppers (“Eve”) are either physically excluded or rendered effectively powerless to compromise the secrecy rate of wireless transmissions. In near-field multiple-antenna systems, such as those using ultra-large planar arrays (UPAs), the CPR paradigm exploits spatial geometry and advanced waveform design to enforce strong secrecy guarantees, even against worst-case adversarial positioning. The CPR concept and its algorithmic instantiation underpin a new class of physical-layer security strategies optimized for scenarios where conventional large-scale path loss and far-field beam steering are insufficient to repel closely situated eavesdroppers (Liu et al., 26 May 2025).
1. System Architecture and CPR Definition
The CPR is formally characterized as a spherical region of radius centered at the receiver Bob's known location . The secure communications model assumes a large -element UPA at Alice (the transmitter) and single-antenna Bob and Eve. The key geometric construct is the protected zone,
where Eve is precluded from entering either by physical constraints or, in virtual implementations, by active jamming and interference management. Line-of-sight (LoS) near-field channels are considered, requiring precise 3D geometric modeling for both (Alice-Bob) and (Alice-Eve), capturing the amplitude decay and phase rotation for each array element. The transmit signal is where is the analog beamfocusing vector, the unit-variance information symbol, and artificial noise (AN), covariance , such that (nulling AN at Bob). The total transmit power is constrained: (Liu et al., 26 May 2025).
2. Secrecy Rate Metrics and Max-Min Formulation
The secrecy rate framework considers both Bob’s achievable rate, , and Eve’s rate at arbitrary position , . Instantaneous secrecy rate at is .
The critical performance metric is the worst-case secrecy rate,
which underpins the max–min optimization problem:
This design ensures robust secrecy against any external eavesdropper with unknown location outside the protected region (Liu et al., 26 May 2025).
3. Algorithmic Solutions: Synchronous Descent-Ascent and Equal-SINRs
Two principal algorithmic approaches are established:
- Synchronous Gradient Descent-Ascent (SGDA): Handles the inherently non-convex, non-concave (NCNC) and NP-hard max–min secrecy rate problem. The procedure involves parametrizing by focal point along the Alice–Bob axis, fixing , and using a power-split parameter . Projected gradient ascent maximizes over , while the inner minimization over (Eve position) invokes an augmented Lagrangian method with synchronized line search (Armijo rule). Candidates for Eve’s position are tracked near the protected-zone boundary to approximate the global minimum.
- Equal-SINRs Solution: This low-complexity approach leverages the near-symmetry of the worst-case Eve positions—, —and reduces the problem to maximizing the minimum secrecy rate over . For each , closed-form splitting coefficients are computed, upper-bounding the rate at , and the optimal focal point is selected. The final step chooses to equalize the SINRs at both candidate Eve positions, forming and accordingly. The computational complexity is , offering performance within 1–2% of SGDA and 10x to 100x faster execution in typical parameter regimes (Liu et al., 26 May 2025).
| Approach | Optimization Domain | Key Characteristics |
|---|---|---|
| SGDA | (max), (min) | NP-hard, high accuracy |
| Equal-SINRs | , over two Eve positions | Low complexity, near-optimal |
The Equal-SINRs method is particularly suitable for real-time implementation in practical near-field secure systems.
4. Extensions: Virtual Protected Zones with Full-Duplex Bob
When physical enforcement of a protected region is infeasible, a virtual protected region is established via full-duplex Bob. Bob emits artificial noise while receiving, encountering residual self-interference (where models suppression). The effective rates are and
with , . The corresponding max–min optimization seeks over all under the same transmit constraints, using heuristic 1D ray search to locate “most-harmful” Eve points for tractability.
The effect of Bob’s AN is to “push” the worst-case Eve position away from Bob, thereby inducing a virtual protected radius where . Increasing grows until marginal gains abate, particularly as beam-nulling becomes negligible at greater distances (Liu et al., 26 May 2025).
5. Numerical Insights and Implementation Guidelines
Empirical results confirm several design principles. For example, in a 28 GHz, 128×128 UPA, and dBm, dBm:
- At m, both SGDA-Maximin and Equal-SINRs achieve –$1$ bps/Hz.
- Increasing to $4$ m rapidly boosts to ≈2 bps/Hz.
- Allocating $20$– of Alice’s power to AN () yields substantial gain at small , but the benefit diminishes for m.
- The Equal-SINRs design tracks within $1$– of SGDA but offers much faster computation.
For virtual protected zones, with (80–90 dB self-interference cancellation) and dBm, versus is unimodal with optimal AN power. Beyond $25$ dBm, Bob’s SI dominates, reducing . The induced scales with but saturates once Eve is sufficiently remote (Liu et al., 26 May 2025).
The following table summarizes key design and implementation steps:
| Step | Procedure | Applicable Scenario |
|---|---|---|
| 1 | Choose | Physical CPR |
| 2 | Precompute , | -- |
| 3 | Optimize , | Equal-SINRs/SGDA |
| 4 | Form , | All |
| 5 | Select for FD-Bob | Virtual zone |
| 6 | Transmit , | Physical/Virtual |
6. Practical Considerations and Recommendations
Several actionable guidelines arise:
- Even a modest physical protected-zone radius ($1$–$2$ m) materially improves near-field secrecy performance.
- At m, allocate $10$– of Alice’s transmit power to AN; decrease as increases.
- If a physical protected region is infeasible, moderate AN at Bob ( dBm) with 80 dB self-interference cancellation emulates a virtual protected region (–$3$ m).
- Low-complexity Equal-SINRs optimization is recommended for real-time secure communications implementations.
A plausible implication is that the CPR concept, whether enforced physically or virtually, provides a systematic means to achieve robust, worst-case secrecy rates in advanced near-field wireless systems, extending the security envelope beyond what is possible with far-field or purely coding-based approaches (Liu et al., 26 May 2025).