Recognition: 2 theorem links
· Lean TheoremRobust and Secure Near-Field Communication via Curved Caustic Beams
Pith reviewed 2026-05-15 00:48 UTC · model grok-4.3
The pith
Partitioning the transmit array into caustic and focusing subarrays enables robust near-field secure communication by avoiding eavesdropper regions despite location errors.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The central claim is that partitioning the transmit array into a caustic subarray and a focusing subarray, together with piece-wise closed-form phase profiles derived from the phase-gradient to departure-angle relation, simultaneously bypasses the potential eavesdropping region and illuminates the legitimate user, yielding up to an 80 percent reduction in the worst-case eavesdropping rate under a 0.25 m localization error.
What carries the argument
The electromagnetic caustic effect realized through array partitioning and piece-wise phase profiles that create curved wavefronts to steer power away from uncertain eavesdropper locations while focusing on the legitimate receiver.
If this is right
- Only phase shifts are required, removing the need for per-element amplitude control.
- The same array geometry can serve both security and communication functions without extra hardware.
- Worst-case eavesdropping rate remains low even when location estimates contain meter-scale errors.
- The piece-wise phase solution allows direct implementation on large aperture arrays without iterative optimization.
Where Pith is reading between the lines
- The partitioning idea may extend to time-varying channels if the subarray assignment can be updated periodically from fresh location estimates.
- Similar curved-beam constructions could be tested in acoustic or optical near-field settings where wavefront curvature is also controllable.
- Integration with coarse direction-of-arrival sensing might further reduce reliance on precise location data.
Load-bearing premise
The transmit array can be partitioned into caustic and focusing subarrays that reliably bypass the eavesdropper region and illuminate the user, assuming the electromagnetic caustic model and array geometry are sufficiently accurate.
What would settle it
A simulation or measurement in which the eavesdropping rate at the true location fails to drop by at least 50 percent relative to conventional focusing when the eavesdropper is displaced 0.25 m from its estimated position would falsify the claimed robustness.
Figures
read the original abstract
Near-field beamfocusing with extremely large aperture arrays can effectively enhance physical layer security. Nevertheless, even small estimation errors of the eavesdropper's location may cause a pronounced focal shift, resulting in a severe degradation of the secrecy rate. In this letter, we propose a physics-informed robust beamforming strategy that leverages the electromagnetic (EM) caustic effect for near-field physical layer security provisioning, which can be implemented via phase shifts only. Specifically, we partition the transmit array into caustic and focusing subarrays to simultaneously bypass the potential eavesdropping region and illuminate the legitimate user, thereby significantly improving the robustness against the localization error of eavesdroppers. Moreover, by leveraging the connection between the phase gradient and the EM wave departing angle, we derive the corresponding piece-wise closed-form array phase profile for the subarrays. Simulation results demonstrate that the proposed scheme achieves up to an 80% reduction of the worst-case eavesdropping rate for a localization error of 0.25 m, highlighting its superiority for providing robust and secure communication.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes a physics-informed robust beamforming strategy for near-field physical layer security that partitions the transmit array into caustic and focusing subarrays. Closed-form phase profiles are derived from the connection between phase gradient and EM wave departing angle to produce curved caustics that bypass the estimated eavesdropper location while focusing on the legitimate user. Simulations claim up to an 80% reduction in worst-case eavesdropping rate for 0.25 m localization error, implemented via phase shifts only.
Significance. If the EM caustic model holds under realistic conditions, the approach offers a hardware-efficient (phase-only) way to improve secrecy robustness in near-field XL-array systems, where standard focusing is highly sensitive to location errors. The physics-informed partitioning and closed-form profiles are a potentially useful contribution to secure beamforming literature.
major comments (2)
- [Simulation results] Simulation results (as described in the abstract and skeptic note): the 80% reduction in worst-case eavesdropping rate is shown only in simulations with no error bars, no baseline comparisons to standard near-field beamfocusing or other robust methods, and no sensitivity analysis on the subarray partition ratio (a free parameter) or model mismatch for 0.25 m localization error. This leaves the central robustness claim under-supported.
- [Proposed scheme / phase profile derivation] Array partitioning and phase-profile derivation: the claim that caustic and focusing subarrays simultaneously bypass the eavesdropper region relies on the accuracy of the analytic EM caustic model matching actual near-field propagation, but no analytic bounds, finite-aperture corrections, or mutual-coupling analysis are supplied to confirm the caustic curve remains effective under the stated localization error.
minor comments (2)
- [Abstract] The abstract and manuscript would benefit from explicit statements of array size, carrier frequency, and exact simulation parameters to allow reproducibility.
- [Phase profile section] Notation for the piece-wise phase profile could be clarified with a single equation block rather than descriptive text.
Simulated Author's Rebuttal
We thank the referee for the constructive comments. We address each major point below and outline the revisions that will be incorporated to strengthen the manuscript.
read point-by-point responses
-
Referee: [Simulation results] Simulation results (as described in the abstract and skeptic note): the 80% reduction in worst-case eavesdropping rate is shown only in simulations with no error bars, no baseline comparisons to standard near-field beamfocusing or other robust methods, and no sensitivity analysis on the subarray partition ratio (a free parameter) or model mismatch for 0.25 m localization error. This leaves the central robustness claim under-supported.
Authors: We agree that the simulation results require additional support. In the revised manuscript we will add error bars obtained from 1000 Monte Carlo realizations of the localization error, include direct comparisons against standard near-field beamfocusing and at least one existing robust beamforming baseline, and provide sensitivity curves for the subarray partition ratio (0.2–0.8) and localization errors up to 0.5 m. These additions will better substantiate the reported 80 % reduction. revision: yes
-
Referee: [Proposed scheme / phase profile derivation] Array partitioning and phase-profile derivation: the claim that caustic and focusing subarrays simultaneously bypass the eavesdropper region relies on the accuracy of the analytic EM caustic model matching actual near-field propagation, but no analytic bounds, finite-aperture corrections, or mutual-coupling analysis are supplied to confirm the caustic curve remains effective under the stated localization error.
Authors: The phase-profile derivation follows directly from the established relationship between phase gradient and electromagnetic wave departing angle, which is standard in the caustic-beam literature. We acknowledge the absence of analytic bounds. The revision will add a short discussion of finite-aperture effects and the validity range of the caustic approximation for the considered 0.25 m error. Mutual coupling is neglected under the ideal phase-only assumption common to such analyses; a full-wave treatment lies outside the scope of this letter, but the assumption and its implications will be stated explicitly. revision: partial
Circularity Check
No significant circularity: phase profiles derived from standard EM relations and validated externally
full rationale
The paper's central derivation uses the established connection between phase gradient and EM wave departing angle to obtain closed-form piece-wise phase profiles for the partitioned subarrays. This is a direct application of wave physics, not a fit to the secrecy rate or eavesdropper metric. The subarray partitioning is an explicit design choice proposed to bypass the eavesdropper region, with performance quantified via independent simulations rather than by construction. No load-bearing self-citations, uniqueness theorems, or ansatzes imported from prior author work are invoked to close the argument. The reported 80% reduction is a simulation outcome, not a tautological prediction. The derivation chain is therefore self-contained against external electromagnetic principles.
Axiom & Free-Parameter Ledger
free parameters (1)
- subarray partition ratio
axioms (1)
- domain assumption The electromagnetic caustic effect can be realized by appropriate phase gradients on array elements.
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
the solution to (17) with the quadratic trajectory... reduces to the well-known Airy beam
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Beam focusing for near-field multiuser MIMO communications,
H. Zhang, N. Shlezinger, F. Guidi, D. Dardari, M. F. Imani, and Y . C. Eldar, “Beam focusing for near-field multiuser MIMO communications,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 7476–7490, Sept. 2022
work page 2022
-
[2]
Near-field wideband secure communications: An analog beamfocusing approach,
Y . Zhang, H. Zhang, S. Xiao, W. Tang, and Y . C. Eldar, “Near-field wideband secure communications: An analog beamfocusing approach,” IEEE Trans. Signal Process., vol. 72, pp. 2173–2187, Apr. 2024. 6
work page 2024
-
[3]
Near- field communications: Research advances, potential, and challenges,
J. An, C. Yuen, L. Dai, M. Di Renzo, M. Debbah, and L. Hanzo, “Near- field communications: Research advances, potential, and challenges,” IEEE Wireless Commun., vol. 31, no. 3, pp. 100–107, Jun. 2024
work page 2024
-
[4]
Constant modulus secure beamforming for multicast massive MIMO wiretap channels,
Q. Li, C. Li, and J. Lin, “Constant modulus secure beamforming for multicast massive MIMO wiretap channels,”IEEE Trans. Inf. Forensics Security, vol. 15, pp. 264–275, May 2020
work page 2020
-
[5]
Robust beamforming design for secure near-field ISAC systems,
Z. Chen, F. Wang, G. Han, X. Wang, and V . K. N. Lau, “Robust beamforming design for secure near-field ISAC systems,”IEEE Wireless Commun. Lett., vol. 14, no. 10, pp. 3089–3093, Oct. 2025
work page 2025
-
[6]
Dynamic precoding for near-field secure communications: Implementa- tion and performance analysis,
Z. Teng, J. An, C. Masouros, H. Li, L. Gan, and D. Wing Kwan Ng, “Dynamic precoding for near-field secure communications: Implementa- tion and performance analysis,”IEEE Internet Things J., vol. 12, no. 15, pp. 29 427–29 442, Aug. 2025
work page 2025
-
[7]
Intelligent surface-aided transmitter architectures for millimeter-wave ultra massive MIMO systems,
V . Jamali, A. M. Tulino, G. Fischer, R. R. M ¨uller, and R. Schober, “Intelligent surface-aided transmitter architectures for millimeter-wave ultra massive MIMO systems,”IEEE Open J. Commun. Soc., vol. 2, pp. 144–167, 2021
work page 2021
-
[8]
RIS-based steerable beamforming antenna with near-field eigenmode feeder,
K. K. Tiwari and G. Caire, “RIS-based steerable beamforming antenna with near-field eigenmode feeder,” inIEEE Int. Conf. Commun. (ICC), 2023, pp. 1293–1299
work page 2023
-
[9]
Sensing- enhanced channel estimation for near-field XL-MIMO systems,
S. Liu, X. Yu, Z. Gao, J. Xu, D. W. K. Ng, and S. Cui, “Sensing- enhanced channel estimation for near-field XL-MIMO systems,”IEEE J. Sel. Areas Commun., vol. 43, no. 3, pp. 628–643, Mar. 2025
work page 2025
-
[10]
Robust and secure wireless communications via intelligent reflecting surfaces,
X. Yu, D. Xu, Y . Sun, D. W. K. Ng, and R. Schober, “Robust and secure wireless communications via intelligent reflecting surfaces,”IEEE J. Sel. Areas Commun., vol. 38, no. 11, pp. 2637–2652, Nov. 2020
work page 2020
-
[11]
Light propagation with phase discontinuities: Generalized laws of reflection and refraction,
N. Yuet al., “Light propagation with phase discontinuities: Generalized laws of reflection and refraction,”Science, vol. 334, no. 6054, pp. 333– 337, Sept. 2011
work page 2011
-
[12]
Arbitrary accelerating micron-scale caustic beams in two and three dimensions,
L. Froehlyet al., “Arbitrary accelerating micron-scale caustic beams in two and three dimensions,”Opt. Express, vol. 19, no. 17, pp. 16 455– 16 465, Aug. 2011
work page 2011
-
[13]
Curving THz wireless data links around obstacles,
H. Guerboukha, B. Zhao, Z. Fang, E. Knightly, and D. M. Mittleman, “Curving THz wireless data links around obstacles,”Comms. Eng., vol. 3, no. 1, p. 58, Mar. 2024
work page 2024
-
[14]
Secure transmission with multiple antennas I: The MISOME wiretap channel,
A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas I: The MISOME wiretap channel,”IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, July 2010
work page 2010
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.