Next Article in Journal
Importance Measure for Fuzzy Structural Systems from the Probabilistic Perspective and Its Solving Algorithms
Previous Article in Journal
Fractal Dimension of the Condylar Bone Structure in Patients with Unilateral Condylar Hyperplasia: Cross-Sectional Retrospective Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems

1
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2
School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
3
School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(7), 4064; https://doi.org/10.3390/app15074064
Submission received: 7 March 2025 / Revised: 29 March 2025 / Accepted: 3 April 2025 / Published: 7 April 2025

Abstract

:
The precoder obtained using the traditional singular value decomposition (SVD) method for legitimate user’s channel, while achieving the highest spectral efficiency for the legitimate user, cannot defend against eavesdropping attacks, thus posing a security vulnerability. This paper investigates the millimeter wave (mmWave) secure beam hybrid precoding technology and proposes a generalized singular value decomposition (GSVD)-based secure beam hybrid precoding algorithm, termed GSVD-Sparsity, leveraging the sparsity of the mmWave beamspace channel. The algorithm selects the most powerful paths from the legitimate user’s beamspace channel representation and utilizes their corresponding angle information to construct a radio frequency (RF) precoder. It then constructs a hybrid precoder that closely approximates the optimal digital precoder derived from the GSVD-based scheme in a fully digital system. The simulation results indicate that, compared to the SVD-based scheme that focuses on spectral efficiency, the GSVD-based precoding scheme can form secure beams in a fully digital system. Under the condition that the legitimate user experiences a certain loss in the received signal-to-noise ratio (SNR), the eavesdropper is unable to correctly reconstruct the original constellation diagram, ensuring the scheme has strong anti-eavesdropping capabilities. In a hybrid precoding system, the low-complexity GSVD-Sparsity algorithm can achieve a spectral efficiency close to that of the GSVD-based scheme in a fully digital system while maintaining anti-eavesdropping capabilities.

1. Introduction

Wireless communication systems based on mmWave massive hybrid arrays offer higher network security, as the line-of-sight transmission and high directionality of the mmWave create a wired-like environment, while array antenna systems provide greater flexibility for physical layer network security technologies. Through the appropriate configuration and the use of beamforming technologies, users and intruders can receive entirely different signals. This approach can even achieve physical layer security without any prior knowledge of intruder information. For single-user access, transmission security depends on the magnitude of the sidelobe beams. In the case of multi-user spatial division access, where multiple beams are used simultaneously, the magnitude of the sidelobe beams becomes more challenging to characterize, making the description of the secure capacity extremely complex.
Beamforming is primarily carried out from two aspects: one is the design based on secrecy capacity, which ensures that system communication efficiency is maximized under the condition that eavesdroppers cannot intercept, with the main goal being to maximize the secrecy rate during communication; the other is the design based on SNR, which aims to weaken the eavesdropper’s interception capability as much as possible while ensuring the normal communication efficiency of the main channel. The authors of [1] design a low-complexity beamforming scheme in reconfigurable intelligent surface (RIS)-assisted communication systems to enhance physical layer security. The security performance of quasi-orthogonal space-time block codes with power scaling in MIMO Rayleigh fading eavesdropping channels is investigated in [2]. By employing moment matching approximation technology, a closed-form approximation of the secrecy outage probability is derived.
As a commonly used auxiliary method, artificial noise (AN) is often combined with beamforming to implement secure transmission strategies. The channel covariance matrix is used for beam design in [3]. By performing eigenvalue decomposition on the channel covariance matrix, beam domain information is obtained, which serves as the basis for jointly optimizing beam selection and artificial noise power allocation. The optimization problem of eavesdropping prevention and the main lobe bit error rate (BER) under the constrained AN power is investigated in [4]. The spatial and frequency domains are combined in [5] and redundant AN is introduced to interfere with the eavesdropper. Under the condition where only the statistical channel state information (CSI) of the legitimate user and the eavesdropper is available, an AN-aided transmission strategy can be used to enhance the security of single-cell massive MIMO systems [6]. Moreover, beamforming technology can also be applied to multi-user systems. An RIS-assisted multi-user massive MIMO system is considered in [7], utilizing AN for secure communication. The system’s secrecy rate in spatially correlated channels is derived, and the power allocation of AN and phase shifts of the RIS are further optimized. In [8], a transmission method combining space-time line coding and AN is proposed for the multi-user MIMO downlink, and the lower bound of the secrecy sum rate is derived. For the downlink multi-user generalized spatial modulation system, block diagonalization is first employed to eliminate inter-user interference and then AN is used to prevent eavesdropping [9]. Similarly, in the context of multi-user interference, a more powerful eavesdropper with more antennas than the legitimate users is considered in [10]. User utility is defined as the secrecy rate minus the inter-user interference, and the study focuses on optimizing the total utility of all users.
On the other hand, security schemes based on the GSVD have also garnered widespread attention in communications. Employing a GSVD-based beamforming scheme and allocating corresponding transmission power to spatial streams can optimize the secrecy rate [11,12]. The authors of [13] propose a low-complexity security precoding scheme based on GSVD for the visible light communication wiretap model. Secure transmission in relay communication wiretap models is studied in [14], where the base station uses GSVD to diagonalize the relay and user channels, generating independent parallel channels. In multi-user systems, a MIMO downlink communication scenario involving a base station and two users is considered in [15]. To make full use of spectral resources, a transmission protocol combining GSVD and non-orthogonal multiple access (NOMA) is proposed. In Ref. [16], a highly efficient precoding method leveraging GSVD and vector perturbation is proposed. In Ref. [17], a GSVD-based multi-user MIMO precoding scheme is studied, which transforms the multi-user MIMO channel into precoding weights to enhance the separability of effective channels among users.
Compared to the microwave frequency band, the mmWave can provide a larger bandwidth to meet the communication demands for ultra-high transmission rates. Moreover, the hybrid beamforming (HBF) architecture used in mmWave communication enables a trade-off between system power consumption and spectral efficiency. The authors of [18] study secure transmission in unmanned aerial vehicle (UAV) scenarios and propose an HBF architecture based on generalized eigenvalue decomposition (GEVD) and SVD. When the ideal CSI of users is unknown, a neural network is constructed to learn the statistical features of the wireless channel for beamforming design. Even in the absence of the eavesdropper’s CSI, this method can still achieve a positive secrecy rate. The secure design of intelligent reflecting surface (IRS)-assisted mmWave systems is studied in [19], where the base station simultaneously transmits information signals and AN. The IRS performs passive beamforming (PB) to reconstruct the wireless channel and optimize the secrecy rate. For IRS-assisted mmWave MISO systems, secure transmission in the scenario with multiple distributed eavesdroppers is investigated in [20]. Under the condition of unknown perfect cascaded eavesdropping channels, a robust secure beamforming design is proposed.
It can be seen that, although some studies on the physical layer security of mmWave communication have been conducted, they mostly rely on methods such as beamforming or AN without exploring the inherent characteristics of mmWave channels. In fact, due to high path loss and limited propagation paths, mmWave channels exhibit inherent sparsity, which is perfectly reflected in the beamspace channel matrix. Additionally, wireless channels possess uniqueness, distinguishing legitimate user’s channel from the eavesdropping channel, forming the foundation for secure beam design. On the other hand, unlike traditional microwave communication, mmWave communication relies on large-scale arrays to counteract path loss. To reduce the power consumption and hardware costs associated with large-scale arrays, hybrid precoding architectures are employed, requiring the design of both a baseband precoder in the digital domain and an RF precoder in the analog domain. Inspired by the sparsity of mmWave channels, we selected the array response vectors corresponding to the dominant paths in the beamspace channel representation to construct the RF precoder. The transmit beams generated by these array response vectors exhibit significant power. Furthermore, by linearly combining these array response vectors using a baseband precoder, the security performance of the hybrid precoder can approximate that of the optimal digital precoder obtained through the GSVD-based scheme.
The main contributions of this paper are as follows:
  • A mmWave massive MIMO analog–digital hybrid precoding model was constructed and the sparsity characteristic of mmWave channels was investigated. This sparsity was validated in the beamspace channel matrix, which contains only a few dominant propagation paths. Furthermore, we analyzed the eavesdropping channel model and provided its secrecy capacity expression.
  • In a fully digital system, we investigated a secure beam precoding scheme based on GSVD, providing the optimal digital precoder and its corresponding combiner design. As a comparison, an SVD-based precoder design aimed at optimizing spectral efficiency was also presented. The GSVD-based scheme, at the cost of sacrificing some transmission efficiency, can effectively prevent eavesdropping even at a low SNR. In contrast, the SVD-based scheme fails to offer any eavesdropping protection.
  • In a hybrid precoding system, the GSVD-Sparsity algorithm is proposed to achieve secure beams. Peak search was performed in the beamspace channel matrix to identify several optimal propagation paths, and their array response vectors were used to construct the RF precoder. The baseband precoder was then obtained using a simple minimum mean square error (MMSE) method. The low-complexity GSVD-Sparsity algorithm ensures secure communication while approximating the transmission efficiency of the optimal digital precoder.
The rest of the paper is organized as follows. Section 2 introduces the mmWave massive MIMO system model and channel sparsity, providing a general expression for the secrecy capacity in the eavesdropping channel model. Section 3 explores the GSVD-based secure beam digital precoding scheme and proposes the GSVD-Sparsity mmWave secure beam hybrid precoding algorithm. Simulation evaluations of the security performance and transmission efficiency of the GSVD-based digital precoding scheme and the GSVD-Sparsity algorithm are conducted in Section 4. Section 5 concludes the paper.

2. System Model

2.1. mmWave Massive MIMO System Model

Consider the Massive MIMO analog–digital hybrid precoding system model as shown in Figure 1.
Assume there are N s data streams in the system, and the base station Alice and the user Bob are equipped with N t and N r antennas, respectively. To facilitate multi-stream communication, Alice has N R F t RF chains, satisfying N s N R F t N t . Under this hardware architecture, a baseband precoder F B B of size N R F t × N s and an RF precoder F R F of size N t × N R F t are adopted. The RF precoder F R F is implemented using phase shifters, where the elements have equal magnitude. By adjusting F B B , Alice normalizes the transmit power, ensuring F R F F B B F 2 = N s . On the receiving side, a baseband combiner W B B of size N R F r × N s and an RF combiner W R F of size N R F r × N s are used.
In a fully digital communication system, the digital precoder is denoted as F . In a hybrid precoding system, where the number of RF chains is smaller than the number of transmit antennas, F needs to be decomposed into an RF precoder F R F and a baseband precoder F B B using algorithms such as orthogonal matching pursuit (OMP). The relationship is expressed as
F F R F F B B .

2.2. Sparsity of mmWave MIMO Channels

The construction of mmWave channels adopts a clustered ray-based model, assuming that the channel contains N c l clusters, each cluster comprising N r a y paths. The physical channel is determined in a nonlinear manner by the angle of departure (AoD) and angle of arrival (AoA) of each path. It can be expressed as
H = N t N r N c l N r a y i = 1 N c l l = 1 N r a y α i l a r ( ϕ i l r ) a t H ( ϕ i l t ) ,
where ϕ i l t and ϕ i l r represent the AoD and AoA for the l -th path in the i -th cluster, respectively, and α i l denotes the path gain. Figure 2 illustrates the propagation of scattering paths in mmWave channels.
The mmWave MIMO channel representation in the beamspace can be expressed as
H = N t N r N c l N r a y i = 1 N r j = 1 N t H b i , j a r ( ϕ ¯ i r ) a t H ( ϕ ¯ j t )   = U r H b U t H ,
where H b is referred to as the beamspace channel matrix. ϕ ¯ i r = arc sin λ ϑ ¯ i r d and ϕ ¯ j t = arc sin λ ϑ ¯ j t d represent the AoA and AoD in the beamspace channel representation, corresponding to the uniformly spaced spatial angles ϑ ¯ i r and ϑ ¯ j t , respectively. λ is the mmWave wavelength, and d is the antenna spacing.
ϑ ¯ i r = i 1 N r 1 / 2 N r           i { 1 , 2 , , N r } , ϑ ¯ j t = j 1 N t 1 / 2 N t           j { 1 , 2 , , N t } ,
U r and U t are unitary discrete Fourier transform (DFT) matrices, whose columns are orthogonal array response vectors.
U r = 1 N r a ( ϕ ¯ 1 r ) , a ( ϕ ¯ 2 r ) , , a ( ϕ ¯ N r r ) , U t = 1 N t a ( ϕ ¯ 1 t ) , a ( ϕ ¯ 2 t ) , , a ( ϕ ¯ N t t ) .
Thus, we have
H b = U r H H U t .
The beamspace channel matrix H b is a unitary equivalent representation of the antenna domain channel matrix H , meaning that H b is the projection of H onto the Fourier orthogonal basis. Due to the significant propagation loss and limited number of propagation paths in mmWave transmission, the channel exhibits a low-rank (sparse) characteristic. It is important to note that the channel H itself is not sparse. The sparsity of the mmWave channel becomes evident in H b .
Figure 3a illustrates the response characteristics of the antenna domain channel H , which consists of six scattering clusters, each containing eight propagation paths. Figure 3b displays the response characteristics of the beamspace channel H b . The sparsity of H b is clearly evident.
In fact, the sparse beamspace channel H b has a property that it is only related to the position of the legitimate user, reflecting the uniqueness of the channel. When an eavesdropper deviates from the legitimate user’s position, he cannot obtain the beamspace channel H b . This property can be leveraged to generate a secure beam hybrid precoder/combiner pair ( F R F F B B , W R F W B B ) for the legitimate user.

2.3. Eavesdropping Channel Model and Secrecy Capacity

Assuming the presence of an eavesdropper in the system, as shown in Figure 4, the eavesdropper Eve is equipped with N e antennas.
Alice needs to transmit confidential information x to Bob. The received signals at Bob and Eve are, respectively, expressed as
y b = H x + n b , y e = G x + n e ,
where H N r × N t and G N e × N t represent the channel matrices of the legitimate user and the eavesdropper, respectively. x N t × 1 represents the signal transmitted by Alice, with its covariance matrix given by E { x x H } = Q x . The total transmission power is constrained by Tr ( Q x ) P t . n b N r × 1 and n e N e × 1 represent the additive complex Gaussian noise vectors for Bob and Eve, respectively, with n b C N ( 0 , σ b 2 I ) and n e C N ( 0 , σ e 2 I ) .
Assuming that Alice has perfect CSI for the channel matrices H and G . Under the assumption of a single receive antenna, the spectral efficiencies of the legitimate user’s channel and the eavesdropping channel can be expressed based on Shannon’s theorem as follows:
R b = log 2 det ( I + H Q x H H ) , R e = log 2 det ( I + G Q x G H ) .
The system’s secrecy rate can be expressed as the difference between the spectral efficiency of the legitimate user’s channel and that of the eavesdropping channel. Considering the non-negativity of the secrecy rate, we have
R s = R b R e , R b > R e ,   0 ,   R b R e .  
The secrecy capacity of the eavesdropping channel can be expressed as
C s ( P t ) = max Q x 0 , Tr ( Q x ) P t R s .

3. mmWave Secure Beam Hybrid Precoding

3.1. GSVD-Based Secure Beam Digital Precoding Scheme

We first consider a fully digital system and assume that the input signal x has the following form:
x = F s ,
where F N t × N s is Alice’s precoder, W b N r × N s is Bob’s combiner, W e N e × N s is Eve’s combiner, and s is the source signal, satisfying E { s s H } = 1 N s I N s .
Then, (7) can be rewritten as
y b = W b H H F s , + W b H n b , y e = W e H G F s , + W e H n e .
The secrecy rate is
R s = log 2 det ( I + 1 N s R b 1 W b H H F F H H H W b H )   log 2 det ( I + 1 N s R e 1 W e H G F F H G H W e ) ,
where R b = σ b 2 W b H W b , R e = σ e 2 W e H W e .
The secure beam can now be implemented through digital precoder F o p t , i.e., F = F o p t . F o p t is obtained using the GSVD of ( H , G ) [11]. The detailed procedure is presented in Algorithm 1. By utilizing GSVD and the appropriate power allocation of the initial input data streams, the secrecy capacity of the multiple-input multiple-output multiple-eavesdropper (MIMOME) system can be achieved [21]. To simulate a typical communication system scenario, this paper assumes equal power allocation for the input data streams, i.e., E [ s s H ] = 1 N s I N s . Under this condition, the GSVD-based precoding can still achieve a relatively high secrecy rate.
Algorithm 1. GSVD-based secure beam digital precoding.
Input:
  legitimate user’s channel H ;
  eavesdropping channel G ;
1: GSVD
   [ U , V , X , C , S ] = g s v d ( H , G ) ;

2: pseudo-inverse
   P = p i n v ( X H ) ;
3: Extraction
   c = c o l u m n ( P ) ;
   F o p t = P ( : , c : 1 : c N s + 1 ) ;
4: Normalization
F o p t = N s F o p t F o p t F
Output:
  digital precoder F o p t
The channel matrices H N r × N t and G N e × N t have the same number of columns. In the first step, GSVD is performed on ( H , G )
[ U , V , X , C , S ] = g s v d ( H , G ) ,
where U N r × N r and V N e × N e are unitary matrices, C N r × q and S N e × q are non-negative diagonal matrix. We also obtain X N t × q , with q = min ( N t , N r + N e ) .
The matrices above satisfy the following equations:
H = U C X H , G = V S X H .
Furthermore, the matrices C and S satisfy
C T C + S T S = I .
GSVD is designed to extract the dominant directions of two matrices and align them within a unified coordinate system for comparison. For the legitimate user’s channel H and the eavesdropper’s channel G , GSVD is performed on the matrix pair ( H , G ) , simultaneously diagonalizing them. The decomposition yields two unitary matrices U and V , a matrix X , and two non-negative diagonal matrices C and S . GSVD can be viewed as a generalization of SVD. It projects both H and G onto the common basis X , allowing them to be represented in a decoupled form. In this basis, matrix H exhibits strong responses along the directions corresponding to large generalized singular values, whereas matrix G exhibits weak responses along these same directions.
In step 2, the pseudo-inverse of matrix X H is computed, X p i n v ( X H ) = I . In step 3, F o p t is composed of the rightmost N s columns of pinv ( X H ) , corresponding to the N s largest generalized singular values. Here, c denotes the number of columns in matrix p i n v ( X H ) , and N s represents the number of data streams. Step 4 performs normalization on F o p t to satisfy the transmit power constraint.
After obtaining the precoder F o p t , the MMSE algorithm can be used to compute the receiver combiner matrix  W o p t [22]. The MMSE-based combiner minimizes the mean square error (MSE) of the signal estimation in the presence of Gaussian noise and interference.
W o p t = E [ y y H ] 1 [ y s H ]   = ( H F o p t F o p t H H H + N s σ b 2 I N r ) 1 H F o p t .
Thus, we obtain the optimal secure beam precoder/combiner pair ( F o p t , W o p t ) based on GSVD.
Additionally, as a comparison to the GSVD-based digital precoding scheme, we describe the SVD-based digital precoding scheme, as shown in Algorithm 2. Assuming the eavesdropping channel is not considered and only the legitimate channel undergoes SVD decomposition, we have
[ U ¯ , S ¯ , V ¯ ] = s v d ( H ) ,
where U ¯ N r × N r is the left singular matrix, V ¯ N t × N t is the right singular matrix, and S ¯ N r × N t is the diagonal matrix composed of singular values.
Algorithm 2. SVD-based digital precoding.
Input:
  legitimate user’s channel H ;
1: SVD
   [ U ¯ , S ¯ , V ¯ ] = s v d ( H ) ,
   H = U ¯ S ¯ V ¯ H
2: Extraction
   F ¯ = V ¯ ( : , 1 : N s ) ;
3: Normalization
   F ¯ = N s F ¯ F ¯ F
Output:
  digital precoder F ¯
By selecting the N s leftmost column vectors from V ¯ , the precoder F ¯ is formed, i.e., F = F ¯ . The combiner W = W ¯ is still calculated using the MMSE method. The resulting precoder/combiner pair ( F ¯ , W ¯ ) maximizes the spectral efficiency for the legitimate user.
R = log 2 ( | I N s + 1 N s R ¯ b 1 W ¯ H H F ¯ F ¯ H H H W ¯ | ) ,
where R ¯ b = σ b 2 W ¯ H W ¯ is the covariance matrix of the received noise.

3.2. The Proposed Secure Beam Hybrid Precoding Algorithm: GSVD-Sparsity

In the fully digital architecture, the optimal secure beam can be formed by solving the precoder/combiner pair ( F o p t , W o p t ) based on GSVD. However, in the mmWave hybrid precoding architecture, matrix operations are required to decompose F o p t ( W o p t ) into F R F and F B B ( W R F and W B B ). However, in general mmWave communication systems, the number of RF chains is not equal to the number of transmit (receive) antennas. Typically, the number of RF chains is much smaller than the number of transmit (receive) antennas. In this case, the decomposition problem becomes an optimization problem, which requires F R F F B B ( W R F W B B ) to infinitely approach F o p t ( W o p t ), i.e.,
F R F F B B F o p t , W R F W B B W o p t .
Studies have shown that for the mmWave channel model, the antenna array response vectors a t ( ϕ i l t ) , i , l can form a finite spanning set for the row space of the channel. Moreover, when N c l N r a y N t , the antenna array response vectors are linearly independent with probability 1. Specifically, when N c l N r a y min ( N t , N r ) , a t ( ϕ i l t ) can form the minimal basis for the row space of the channel [22].
Additionally, the modulus of the elements in a t ( ϕ i l t ) remains constant, with only the phase varying, which perfectly matches the characteristic of analog phase shifters in antenna arrays. Therefore, the base station can select N R F t elements from the dictionary matrix A t = [ a t ( ϕ 1 , 1 t ) , a t ( ϕ 1 , 2 t ) , , a t ( ϕ N c l , N r a y t ) ] , which consists of the transmit array response vectors, to construct the RF precoder F R F . Subsequently, the selected array response vectors can be linearly combined through baseband precoder F B B , ensuring that F R F F B B approximates F o p t . Similarly, on the user side, N R F r elements can be selected from the dictionary matrix A r = [ a r ( ϕ 1 , 1 r ) , a r ( ϕ 1 , 2 r ) , , a r ( ϕ N c l , N r a y r ) ] , which consists of the receive array response vectors, to construct the RF combiner W R F .
In such a hybrid precoding system, the hybrid precoder/combiner pair ( F R F F B B , W R F W B B ) corresponding to the optimal secure beam that maximizes the secrecy rate R s can be obtained by performing an exhaustive search over all RF precoder/combiner pairs and selecting the pair that achieves the maximum secrecy rate. However, since both the base station and user sides utilize large-scale arrays, the dimensionality of ( F R F , W R F ) is high, making it infeasible to bear the substantial computational cost and increased system processing time caused by exhaustive search.
To address this issue, the OMP algorithm is proposed [22]. In this method, F o p t is orthogonally projected onto the matrix A t formed by the transmit array response vectors. The algorithm quickly selects N R F t elements with the highest correlation to F o p t from A t to construct F R F , and then obtains F B B using the least squares method. Similarly, on the user side, W o p t is orthogonally projected onto A r , and N R F r elements with the highest correlation to W o p t are selected from A r to construct W R F . Algorithm 3 presents the procedure for solving hybrid precoding using the OMP algorithm.
Algorithm 3. OMP.
Input:
  optimal digital precoder F o p t ;
  dictionary matrix A t ;
  number of RF chains N R F t ;
1: Initiation
   F R F = ;
   F r e s = F o p t ;
2: Iteration
  for i = 1 : N R F t do
  (a) Projection
      G = A t H F r e s ;
  (b) Support set update
      j = arg max l = 1 ,     ,   N c l N r a y   ( G G H ) l , l ;
      F R F = [ F R F | A t ( j ) ] ;
  (c) Least squares
      F B B = ( F R F H F R F ) 1 F R F H F o p t ;
  (d) Update residual
      F r e s = F o p t F R F F B B F o p t F R F F B B F
  end for

3: Normalization
   F B B = N s F B B F R F F B B F ;
Output:
  baseband precoder F B B and RF precoder F R F
Inspired by the sparsity of the beamspace channel H b , F R F is not limited to being constructed from the dictionary matrix A t formed by the array response vectors of the antenna domain channel H . It can also be constructed from the dictionary matrix A t , b = [ a t ( ϕ ¯ 1 t ) , a t ( ϕ ¯ 2 t ) , , a t ( ϕ ¯ N t t ) ] formed by the array response vectors of the beamspace channel representation. In the beamspace channel, the number of dominant propagation paths is relatively small, and these dominant paths correspond to higher transmission power. Therefore, the array response vectors a t ( ϕ ¯ j t ) corresponding to the AoDs of the N R F t optimal propagation paths can be selected from A t , b to construct F R F , which is known as the peak search method. Each a t ( ϕ ¯ j t ) in F R F can form a transmission beam. The angles of these beams are aligned with the N R F t optimal propagation paths in the beamspace channel, which exhibit significant transmission power. Thus, when F B B performs a linear combination of these array response vectors, high transmission efficiency can still be achieved. Similarly, by selecting the array response vectors a r ( ϕ ¯ i r ) corresponding to the AoAs of the N R F r optimal propagation paths from A r , b = [ a r ( ϕ ¯ 1 r ) , a r ( ϕ ¯ 2 r ) , , a r ( ϕ ¯ N r r ) ] , W R F can be constructed, and ( F R F , W R F ) can be determined accordingly.
Given that ( F R F , W R F ) has been solved, ( F B B , W B B ) can be obtained using the least squares method.
F B B = ( F R F H F R F ) 1 F R F H F o p t , W B B = ( W R F H W R F ) 1 W R F H W o p t .
Finally, the secure beam precoder/combiner pair ( F R F F B B , W R F W B B ) is obtained. The pseudo-code for computing the hybrid precoder using GSVD-Sparsity is provided in Algorithm 4.
Algorithm 4. GSVD-Sparsity.
Input:
  optimal digital precoder F o p t ;
  dictionary matrix A t , b ;
  number of RF chains N R F t ;
  beamspace channel H b ;

1: Initiation
   F R F = ;

2: Perform quick select on the elements of matrix H b
   q u i c k   s e l e c t ( H b ) [ α b , 1 , α b , 2 , , α b , N R F t ] ;
3: Iteration
  for i = 1 : N R F t do
      j = c o l u m n _ i n d e x ( α b , i ) ;
      F R F = [ F R F | A t , b ( j ) ] ;
  end for
4: Least squares
   F B B = ( F R F H F R F ) 1 F R F H F o p t ;
5: Normalization
   F B B = N s F B B F R F F B B F ;
Output:
  baseband precoder F B B and RF precoder F R F
Therefore, to address the non-convex optimization problem in the decomposition of F o p t ( W o p t ) , the GSVD-Sparsity algorithm selects the strongest power paths from the sparse channel matrix of the legitimate user to construct the RF precoder. Based on this, the hybrid precoder at the transmitter and the hybrid combiner at the receiver are then derived. Since the sparse channel matrix is location-dependent, only the legitimate user located at a specific position possesses the corresponding sparse matrix. The eavesdropper, being at a different location, does not have access to such position-specific information. Consequently, the selection of the strongest power paths is inherently location-dependent, and so is the resulting hybrid precoder, thereby enhancing the security of the proposed algorithm.
Precoding, as a physical layer security technique, aims to provide strong signal reception for the legitimate user while suppressing the signal strength at unauthorized users as much as possible. The GSVD-based secure beam precoding enhances security by suppressing the signal received by the eavesdropper, though at the cost of spectral efficiency loss for the legitimate user. The proposed GSVD-Sparsity algorithm exploits the sparsity of the channel space and the strongest propagation paths to maximize energy efficiency while maintaining the required level of security.

4. Numerical Simulations and Analysis

Consider a mmWave MIMO system in the downlink, operating at a frequency of 28 GHz. The base station is equipped with 64 antennas, while the user terminal is equipped with 16 antennas. Both adopt a uniform linear array (ULA) with an antenna spacing of λ 2 . The number of RF chains is N R F t = N R F r = 4 , and the number of data streams is 1. Assuming that both the base station and the user terminal have perfect knowledge of the channel state information, the mmWave channel H is modeled as consisting of six scattering clusters, with each cluster contributing eight propagation paths. For the i -th cluster, the departure (arrival) azimuth angles ϕ i l t ( ϕ i l r ) of the eight paths are assumed to follow a Laplace distribution with a mean of ϕ i t ( ϕ i r ) and an angular spread of σ ϕ i t ( σ ϕ i r ). ϕ i t ( ϕ i r ) are uniformly distributed within [ π 3 , π 3 ] , and σ ϕ i t = σ ϕ i r = 5 ° . Considering practical scenarios, the departure azimuth angles are constrained within the range [ π 3 , π 3 ] , while the arrival azimuth angles are restricted to the range [ π 2 , π 2 ] .

4.1. Full Digital System

First, we compare the performance of the GSVD-based scheme and the SVD-based scheme in a fully digital system. Figure 5a,b show the constellation diagrams of the legitimate user and the eavesdropper, respectively, formed by ( F ¯ , W ¯ ) when SNR = 0   dB , where ( F ¯ , W ¯ ) is obtained through SVD (Equation (18)). Figure 5c,d depict the constellation diagrams formed by ( F o p t , W o p t ) , which is obtained through GSVD (Equation (14)). The signal modulation scheme is 16QAM. Figure 6 illustrates the scenario where SNR = 15   dB .
When the GSVD-based scheme is used to design the precoder, a comparison between Figure 5c and Figure 6c shows that the constellation points for the legitimate user cluster together when the SNR is low, making proper demodulation impossible. However, when the SNR is high, proper demodulation becomes achievable. From Figure 5d and Figure 6d, it can be observed that all received signals fall at the ( 0 , 0 ) point, rendering the eavesdropper completely unable to obtain a valid constellation diagram. Therefore, the GSVD-based scheme effectively prevents the eavesdropper from receiving useful signals. This is achieved at the cost of reducing the received SNR for legitimate users, ensuring that the eavesdropper is completely unable to demodulate correctly.
When using an SVD-based scheme for precoder design, a comparison of Figure 6a,b shows that, although the eavesdropper’s received SNR is lower than that of the legitimate user, it does not affect the eavesdropper’s ability to correctly demodulate. Comparing Figure 5b and Figure 6b, it is evident that even at a low SNR level, the eavesdropper can still demodulate the constellation diagram, with only a slight increase in the bit error rate (BER). Therefore, the SVD-based scheme cannot prevent the eavesdropper from receiving useful signals and fails to meet the requirements for secure transmission. Figure 5a and Figure 6a illustrate the constellation diagrams received by the legitimate user, where normal demodulation is achievable.
Figure 7 illustrates the spectral efficiency variations for both the legitimate user and the eavesdropper under the SVD-based scheme and GSVD-based scheme as the SNR changes. The optimal curve in the figure represents the channel capacity of the system, serving as a benchmark. The solid line with indicates the spectral efficiency of the eavesdropper under the GSVD-based scheme, with most values being 0 or close to 0. This is consistent with the constellation diagram results shown in Figure 5d and Figure 6d, where the eavesdropper is unable to correctly demodulate the received signals. Compared to the SVD-based scheme, although the GSVD-based scheme sacrifices part of the transmission efficiency, it ensures transmission security. On the other hand, the SVD-based scheme, while maintaining a higher user rate, completely fails to prevent eavesdropping.
Compared to the SVD-based scheme, the GSVD-based scheme incurs a certain spectral efficiency loss. Specifically, at SNR = 0   dB , the spectral efficiency loss for the legitimate user is approximately 5 bits/s/Hz, and within the SNR range of [ 5 , 50 ] , the loss increases to about 6.5 bits/s/Hz. However, in the GSVD-based scheme, the spectral efficiency of the eavesdropper is suppressed to zero, which demonstrates the security capability of the scheme.
Figure 8 compares the secrecy rate performance of the GSVD-based secure beam precoding scheme with that of AN and zero-forcing (ZF) secure precoding in a fully digital system. Both AN and ZF precoding are widely used techniques in physical layer security. The principle of AN is to embed noise into the transmitted signal in such a way that it does not affect the legitimate user’s ability to decode the information, but degrades the signal quality at the eavesdropper [23]. In contrast, the ZF projects the transmitted signal into the null space of the eavesdropper’s channel, thereby ensuring that the eavesdropper receives no useful information [24]. In this simulation, the number of antennas at the eavesdropper is set to 60, since for the ZF secure precoding to be feasible, the system must satisfy certain conditions (e.g., N t > rank ( H e ) ) to ensure that a non-trivial null space exists at the eavesdropper’s side, enabling the design of ZF precoding.
As shown in the figure, the secrecy rate achieved by the GSVD-based precoding is lower than that of the AN scheme. This is because the performance of GSVD is highly dependent on the structural differences between the legitimate user’s channel and the eavesdropping channel, such as rank and singular value disparities. When the differences between the two channels are not significant, GSVD is less effective in providing strong secrecy performance. In contrast, even when the legitimate user’s channel and the eavesdropping channel are similar, the AN can still exploit spatial degrees of freedom to enhance secrecy, thus exhibiting greater robustness. It is worth noting that, unlike the AN scheme, the GSVD-based precoding does not allocate any transmit power to artificial noise; instead, the entire transmit power is dedicated to the information signal. Furthermore, to ensure a fair comparison, equal power allocation is applied to the initial data streams in the GSVD-based precoding. When power is properly allocated among the data streams, the GSVD-based precoding is capable of achieving the secrecy capacity [21].
The figure also shows that the GSVD-based precoding outperforms the ZF secure precoding. This is because ZF secure precoding requires the transmitted signal to be completely projected into the null space of the eavesdropping channel. When the eavesdropping channel has a large dimension or significantly overlaps with the legitimate user’s channel, there may be insufficient degrees of freedom, making it impossible to construct a valid null space. In contrast, the GSVD-based approach jointly decomposes the legitimate user’s channel and the eavesdropping channel and projects the signal onto subchannels that are strong for the legitimate user and weak for the eavesdropper. In this way, even when there is partial overlap between the legitimate user’s channel and the eavesdropping channel, the GSVD-based method can still optimize the level of information leakage.

4.2. Hybrid Precoding System

Next, the performance of the proposed algorithm in a hybrid precoding system is discussed. Figure 9 verifies the sparsity of the beamspace channel H b in the GSVD-Sparsity algorithm. Figure 9a shows a 3D beam pattern, while Figure 9b presents the 2D planar beam pattern. In Figure 9a, only a few prominent peaks can be observed, and in Figure 9b, the red-colored elements indicate beams with relatively high power. It is clearly shown that there are only a few strong paths, demonstrating that the sparse beamspace channel H b exhibits high directionality.
Figure 10 compares the spectral efficiency of the legitimate user under two secure beam hybrid precoding algorithms, GSVD-Sparsity and OMP, in a hybrid precoding system. In the fully digital system, the optimal precoder/combiner pair obtained is ( F o p t , W o p t ) . Both the GSVD-Sparsity and OMP algorithms decompose F o p t and W o p t to derive the hybrid precoder ( F R F F B B , W R F W B B ) . The optimal curve in the figure represents the spectral efficiency of the legitimate user achieved by the GSVD-based scheme in the fully digital system, serving as the benchmark for comparison. In the GSVD-Sparsity algorithm, F R F and W R F are determined by the sparsity of H b . From the figure, it can be observed that the GSVD-Sparsity algorithm closely approximates the performance of the optimal digital precoding scheme based on GSVD. This is because the beams constructed by F R F and W R F are aligned with the paths in the beamspace channel that have the highest power, thereby enhancing the transmission rate. Moreover, the sparsity-based beam selection is location-dependent. Only when the legitimate user is located at a specific position can the corresponding sparse beams at that location be obtained. The power paths are also location-dependent, which ensures the uniqueness of the transmission path.
The OMP algorithm performs a search over the entire RF precoder (combiner) candidate set A t ( A r ) , selecting the optimal N R F t ( N R F r ) basis vectors, such that F o p t ( W o p t ) can be best projected onto these basis vectors. The OMP only selects the column vectors that contribute most to approximating F o p t , which reflects its greedy nature in numerical approximation. Specifically, F R F and W R F are constructed from the array response vectors that have the highest correlation with F o p t and W o p t , respectively. This algorithm only approximates F R F F B B ( W R F W B B ) to F o p t ( W o p t ) as closely as possible from a numerical perspective, without leveraging the inherent sparsity of mmWave channels.
Compared with the OMP algorithm, one of the key advantages of the proposed GSVD-Sparsity approach lies in its lower computational complexity. The following presents a comparative analysis of the computational complexity of GSVD-Sparsity, OMP, and exhaustive search algorithms. To ensure a fair comparison, the number of data streams was set to N s = 1 . For the OMP algorithm, the complexity of step 2(a) in Algorithm 3, which involves the matrix projection operation, was O ( N c l N r a y N t ) ; the complexity of step 2(b), which updates the support set, was O ( N c l N r a y ) ; the least squares solution in step 2(c) required a complexity of O ( N t i 2 + i 3 ) ; and the residual update in step 2(d) had a complexity of O ( N t i ) . After N R F t iterations, the total complexity of OMP was O ( N R F t N c l N r a y N t + N t ( N R F t ) 3 + ( N R F t ) 4 ) . For the GSVD-Sparsity algorithm, in step 2, the fast selection algorithm was used to find the top N R F t largest elements (peak search) in the beamspace channel H b , with a complexity of O ( N t N r ) ; in step 4, the least-squares solution required O ( N t ( N R F t ) 2 + ( N R F t ) 3 ) . Hence, the overall complexity of GSVD-Sparsity was O ( N t N r + N t ( N R F t ) 2 + ( N R F t ) 3 ) . In the exhaustive search algorithm, the analog precoder F R F was constructed by selecting N R F t columns from the dictionary matrix with N c l N r a y candidates, resulting in a total of C N cl N ray N RF possible combinations. The complexity of solving the least squares problem for each combination was O ( N t ( N R F t ) 2 + ( N R F t ) 3 ) , and thus, the overall complexity of the exhaustive search algorithm was C N c l N r a y N R F t O ( N t ( N R F t ) 2 + ( N R F t ) 3 ) .
Clearly, the proposed GSVD-Sparsity algorithm demonstrates a significant advantage in time complexity. This is because, unlike the OMP algorithm which requires iterative updates to construct F RF and F BB , GSVD-Sparsity uses a fast selection method to directly identify the top N R F t strongest beam paths in the beamspace channel, and uses the corresponding array response vectors to construct F RF . This eliminates the need for complex iterative procedures, resulting in a considerable reduction in complexity. Moreover, selecting the strongest paths for transmission also aligns with the physical layer goal of improving transmission efficiency. Table 1 summarizes the computational complexity of the three algorithms.
Figure 11a,b show the constellation diagrams obtained by the legitimate user in a hybrid precoding system using the GSVD-Sparsity algorithm under SNR = 0   dB and SNR = 15   dB , respectively. Compared to Figure 5c and Figure 6c, it can be observed that the hybrid precoder obtained using the GSVD-Sparsity algorithm achieved a BER performance comparable to the optimal precoder ( F o p t , W o p t ) in a fully digital system.
To verify the robustness of the proposed GSVD-Sparsity algorithm under different channel conditions, Figure 12 presents the symbol error rate (SER) performance under both additive white Gaussian noise (AWGN) and multipath fading channels, with 16QAM modulation employed at the legitimate user. The figure includes four curves, corresponding to GSVD-OMP with AWGN, GSVD-Sparsity with AWGN, GSVD-OMP with a fading channel, and GSVD-Sparsity with a fading channel. It can be observed that under AWGN channel conditions, the two curves on the left (i.e., GSVD-OMP and GSVD-Sparsity under AWGN) are almost overlapping, indicating that both methods achieved a similar SER performance when the channel was ideal. Under multipath fading conditions, the two curves on the right begin to diverge after 15 dB, showing that in worse channel conditions, GSVD-OMP achieved a slightly lower SER than GSVD-Sparsity. However, as the SNR increases, the SER for both methods drops rapidly to zero. Therefore, GSVD-Sparsity maintained high reliability under high SNR conditions and can be extended to various channel models.

5. Conclusions

This paper investigates a secure beam hybrid precoding algorithm for mmWave communications. Based on Shannon’s theorem, an eavesdropping channel model is established along with its secrecy capacity expression. The masking characterization of the sparse mmWave MIMO channel is studied. The sparse beamspace channel H b is uniquely determined by the receiver’s location. A secure beam digital precoding scheme based on GSVD is analyzed. Building on GSVD-based scheme, a secure beam hybrid precoding algorithm, GSVD-Sparsity, is proposed, which fully exploits the sparsity of H b . Simulation results validate the security performance and spectral efficiency of digital precoding schemes based on SVD and GSVD, as well as the hybrid precoding algorithm GSVD-Sparsity. The analysis indicates that, in a fully digital system, employing the GSVD-based digital precoding scheme can effectively prevent the eavesdropper from correctly receiving signals at the cost of sacrificing part of the transmission efficiency of the legitimate user, rendering the eavesdropper unable to demodulate the constellation diagram. In a hybrid precoding system, the low-complexity GSVD-Sparsity algorithm can approximate the spectral efficiency of the optimal digital precoding scheme based on GSVD while ensuring transmission security. Massive MIMO and hybrid precoding are key technologies in mmWave communications. Accordingly, the demand for security and privacy protection is also increasing. This work investigates a secure hybrid precoding algorithm based on GSVD and the sparsity of mmWave channels. As a physical layer security technique, it holds promising potential for a wide range of applications.

Author Contributions

Conceptualization, M.W.; methodology, M.W. and B.C.; software, B.C. and L.Y.; validation, M.W., L.Y. and B.C.; formal analysis, L.Y.; investigation, M.W.; resources, B.C.; data curation, L.Y. and B.C.; writing—original draft preparation, M.W., L.Y. and B.C.; writing—review and editing, M.W., L.Y. and B.C.; visualization, M.W.; supervision, L.Y.; project administration, M.W.; funding acquisition, M.W. and L.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of China, grant number 62372244, 62172235; the National Key Research and Development Program of China, grant number 2021YFB3101100; the Primary Research & Development Plan of Jiangsu Province, grant number BE2023025; the Natural Science Foundation of Nanjing University of Posts and Telecommunications grant number NY222132; the ZTE Industry-university Research Fund, grant number 2023ZTE08-02; the Postgraduate Research & Practice Innovation Program of Jiangsu Province, grant number 46004CX17781.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Cheng, Z.; Li, N.; Zhu, J.; She, X.; Ouyang, C.; Chen, P. RIS-Assisted Secure Communications: Low-Complexity Beamforming Design. IEEE Wirel. Commun. Lett. 2023, 12, 1012–1016. [Google Scholar] [CrossRef]
  2. Chae, S.H.; Bang, I.; Lee, H. Physical Layer Security of QSTBC with Power Scaling in MIMO Wiretap Channels. IEEE Trans. Veh. Technol. 2020, 69, 5647–5651. [Google Scholar]
  3. Zhang, X.; Lu, Y.; Fu, H.; Zheng, K. Artificial Noise assisted Secure Transmission using Novel Beamforming Scheme based on Statistical CSI. In Proceedings of the 2023 IEEE 23rd International Conference on Communication Technology (ICCT), Wuxi, China, 16–18 October 2023. [Google Scholar]
  4. Zeng, J. Power-Efficient Artificial-Noise Optimization for Secure Multi-Beam Wireless Communication. In Proceedings of the 2023 5th International Conference on Intelligent Control, Measurement and Signal Processing (ICMSP), Chengdu, China, 22–24 July 2023. [Google Scholar]
  5. Romero-Zurita, N.; Ghogho, M.; McLernon, D. Physical layer security of MIMO frequency selective channels by beamforming and noise generation. In Proceedings of the 2011 19th European Signal Processing Conference, Barcelona, Spain, 29 August–2 September 2011. [Google Scholar]
  6. Wang, W.; Chen, X.; You, L.; Yi, X.; Gao, X. Artificial Noise Assisted Secure Massive MIMO Transmission Exploiting Statistical CSI. IEEE Commun. Lett. 2019, 23, 2386–2389. [Google Scholar]
  7. Yang, D.; Xu, J.; Xu, W.; Huang, Y.; Lu, Z. Secure Communication for Spatially Correlated RIS-Aided Multiuser Massive MIMO Systems: Analysis and Optimization. IEEE Commun. Lett. 2023, 27, 797–801. [Google Scholar]
  8. Choi, J.; Joung, J.; Cho, Y.S. Artificial-Noise-Aided Space–Time Line Code for Enhancing Physical Layer Security of Multiuser MIMO Downlink Transmission. IEEE Syst. J. 2022, 16, 1289–1300. [Google Scholar]
  9. Yang, P.; Qiu, X.; Mu, F. Artificial Noise-Aided Secure Generalized Spatial Modulation for Multiuser Transmission. IEEE Commun. Lett. 2020, 24, 2416–2420. [Google Scholar]
  10. Kong, Z.; Song, J.; Yang, S.; Gan, L.; Meng, W.; Huang, T.; Chen, S. Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels. IEEE Trans. Inf. Forensics Secur. 2024, 19, 10130–10140. [Google Scholar]
  11. Fakoorian, S.A.A.; Swindlehurst, A.L. Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel. In Proceedings of the 2012 IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012. [Google Scholar]
  12. Jyothsna, S.; Theagarajan, L.N. Improving MIMO Secrecy Rate through Efficient Power Allocation. In Proceedings of the the 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall), London, UK, 29 August–1 September 2022. [Google Scholar]
  13. Arfaoui, M.A.; Ghrayeb, A.; Assi, C.M. Secrecy Performance of the MIMO VLC Wiretap Channel with Randomly Located Eavesdropper. IEEE Trans. Wirel. Commun. 2020, 19, 265–278. [Google Scholar]
  14. Jilani, M.; Ohtsuki, T. Joint SVD-GSVD Precoding Technique and Secrecy Capacity Lower Bound for the MIMO Relay Wire-Tap Channel. In Proceedings of the 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), Yokohama, Japan, 6–9 May 2012. [Google Scholar]
  15. Chen, Z.; Ding, Z.; Dai, X.; Schober, R. Asymptotic Performance Analysis of GSVD-NOMA Systems with a Large-Scale Antenna Array. IEEE Trans. Wirel. Commun. 2019, 18, 575–590. [Google Scholar] [CrossRef]
  16. Park, J.; Chun, J.; Jeong, B.J. Efficient multi-user MIMO precoding based on GSVD and vector perturbation. Signal Process 2012, 92, 611–615. [Google Scholar] [CrossRef]
  17. Park, J.; Chun, J.; Park, H. Efficient GSVD Based Multi-User MIMO Linear Precoding and Antenna Selection Scheme. In Proceedings of the 2009 IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009. [Google Scholar]
  18. Dong, R.; Wang, B.; Cao, K.; Tian, J. Hybrid Beamforming for Secure Transmission of Massive MIMO UAV Communication Networks. IEEE Syst. J. 2023, 17, 4200–4211. [Google Scholar]
  19. Yang, L.; Wang, J.; Xue, X.; Shi, J.; Wang, Y. Secure Hybrid Beamforming for IRS-Assisted Millimeter Wave Systems. IEEE Trans. Wirel. Commun. 2023, 22, 5111–5128. [Google Scholar] [CrossRef]
  20. Lu, X.; Yang, W.; Guan, X.; Wu, Q.; Cai, Y. Robust and Secure Beamforming for Intelligent Reflecting Surface Aided mmWave MISO Systems. IEEE Wirel. Commun. Lett. 2020, 9, 2068–2072. [Google Scholar]
  21. Khisti, A.; Wornell, G.W. Secure Transmission with Multiple Antennas—Part II: The MIMOME Wiretap Channel. IEEE Trans. Inf. Theory 2010, 56, 5515–5532. [Google Scholar]
  22. Ayach, O.E.; Rajagopal, S.; Abu-Surra, S.; Pi, Z.; Heath, R.W. Spatially Sparse Precoding in Millimeter Wave MIMO Systems. IEEE Trans. Wirel. Commun. 2014, 13, 1499–1513. [Google Scholar]
  23. Goel, S.; Negi, R. Guaranteeing Secrecy using Artificial Noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  24. Li, J.; Petropulu, A.P.; Weber, S. On Cooperative Relaying Schemes for Wireless Physical Layer Security. IEEE Trans. Signal Process. 2011, 59, 4985–4997. [Google Scholar]
Figure 1. Typical mmWave analog–digital hybrid precoding system model.
Figure 1. Typical mmWave analog–digital hybrid precoding system model.
Applsci 15 04064 g001
Figure 2. The diagram of mmWave scattering paths.
Figure 2. The diagram of mmWave scattering paths.
Applsci 15 04064 g002
Figure 3. Response characteristics of the channel: (a) the antenna domain channel H ; (b) the beamspace channel H b .
Figure 3. Response characteristics of the channel: (a) the antenna domain channel H ; (b) the beamspace channel H b .
Applsci 15 04064 g003
Figure 4. Eavesdropping channel model.
Figure 4. Eavesdropping channel model.
Applsci 15 04064 g004
Figure 5. Received constellation diagrams in a fully digital system when SNR = 0   dB : (a) constellation diagram of the legitimate user using the SVD-based scheme; (b) constellation diagram of the eavesdropper using the SVD-based scheme; (c) constellation diagram of the legitimate user using the GSVD-based scheme; (d) constellation diagram of the eavesdropper using the GSVD-based scheme.
Figure 5. Received constellation diagrams in a fully digital system when SNR = 0   dB : (a) constellation diagram of the legitimate user using the SVD-based scheme; (b) constellation diagram of the eavesdropper using the SVD-based scheme; (c) constellation diagram of the legitimate user using the GSVD-based scheme; (d) constellation diagram of the eavesdropper using the GSVD-based scheme.
Applsci 15 04064 g005
Figure 6. Received constellation diagrams in a fully digital system when SNR = 15   dB : (a) constellation diagram of the legitimate user using the SVD-based scheme; (b) constellation diagram of the eavesdropper using the SVD-based scheme; (c) constellation diagram of the legitimate user using the GSVD-based scheme; (d) constellation diagram of the eavesdropper using the GSVD-based scheme.
Figure 6. Received constellation diagrams in a fully digital system when SNR = 15   dB : (a) constellation diagram of the legitimate user using the SVD-based scheme; (b) constellation diagram of the eavesdropper using the SVD-based scheme; (c) constellation diagram of the legitimate user using the GSVD-based scheme; (d) constellation diagram of the eavesdropper using the GSVD-based scheme.
Applsci 15 04064 g006
Figure 7. The spectral efficiency of both the legitimate user and the eavesdropper under the SVD-based scheme and the GSVD-based scheme in a fully digital system.
Figure 7. The spectral efficiency of both the legitimate user and the eavesdropper under the SVD-based scheme and the GSVD-based scheme in a fully digital system.
Applsci 15 04064 g007
Figure 8. Secrecy rate comparison among GSVD-based secure beam precoding, AN, and ZF secure precoding.
Figure 8. Secrecy rate comparison among GSVD-based secure beam precoding, AN, and ZF secure precoding.
Applsci 15 04064 g008
Figure 9. Sparsity of beam patterns: (a) 3D beam pattern; (b) 2D beam pattern.
Figure 9. Sparsity of beam patterns: (a) 3D beam pattern; (b) 2D beam pattern.
Applsci 15 04064 g009
Figure 10. Spectral efficiency of the legitimate user when using the GSVD-Sparsity algorithm in a hybrid precoding system.
Figure 10. Spectral efficiency of the legitimate user when using the GSVD-Sparsity algorithm in a hybrid precoding system.
Applsci 15 04064 g010
Figure 11. The received constellation diagrams of the legitimate user employing the GSVD-Sparsity algorithm in a hybrid precoding system: (a) SNR = 0   dB ; (b) SNR = 15   dB .
Figure 11. The received constellation diagrams of the legitimate user employing the GSVD-Sparsity algorithm in a hybrid precoding system: (a) SNR = 0   dB ; (b) SNR = 15   dB .
Applsci 15 04064 g011
Figure 12. The SER of the legitimate user employing 16QAM under AWGN and multipath channel conditions.
Figure 12. The SER of the legitimate user employing 16QAM under AWGN and multipath channel conditions.
Applsci 15 04064 g012
Table 1. Complexity comparison.
Table 1. Complexity comparison.
AlgorithmComputational Complexity
GSVD-Sparsity O ( N t N r + N t ( N R F t ) 2 + ( N R F t ) 3 )
OMP O ( N R F t N c l N r a y N t + N t ( N R F t ) 3 + ( N R F t ) 4 )
Exhaustive search C N c l N r a y N R F t O ( N t ( N R F t ) 2 + ( N R F t ) 3 )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, B.; Yang, L.; Wu, M. Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems. Appl. Sci. 2025, 15, 4064. https://doi.org/10.3390/app15074064

AMA Style

Chen B, Yang L, Wu M. Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems. Applied Sciences. 2025; 15(7):4064. https://doi.org/10.3390/app15074064

Chicago/Turabian Style

Chen, Boqing, Lijun Yang, and Meng Wu. 2025. "Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems" Applied Sciences 15, no. 7: 4064. https://doi.org/10.3390/app15074064

APA Style

Chen, B., Yang, L., & Wu, M. (2025). Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems. Applied Sciences, 15(7), 4064. https://doi.org/10.3390/app15074064

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop