pith. machine review for the scientific record. sign in

arxiv: 2603.24077 · v1 · submitted 2026-03-25 · 💻 cs.IT · eess.SP· math.IT

Recognition: 2 theorem links

· Lean Theorem

Robust and Secure Near-Field Communication via Curved Caustic Beams

Authors on Pith no claims yet

Pith reviewed 2026-05-15 00:48 UTC · model grok-4.3

classification 💻 cs.IT eess.SPmath.IT
keywords near-field beamformingphysical layer securitycaustic beamsrobust beamformingeavesdropper localizationphase-only controlarray partitioning
0
0 comments X

The pith

Partitioning the transmit array into caustic and focusing subarrays enables robust near-field secure communication by avoiding eavesdropper regions despite location errors.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper develops a beamforming approach that splits the transmit array so one subset generates curved beams to steer energy away from where an eavesdropper might be and the other focuses energy on the intended receiver. The method requires only phase adjustments at each antenna and uses the connection between phase gradients and wave departure angles to obtain explicit phase profiles for each subarray. This design targets the problem that small errors in estimating an eavesdropper's position can shift the focal spot and leak power to the wrong location in near-field systems. Simulations indicate the strategy lowers the worst-case eavesdropping rate by as much as 80 percent when the location error reaches 0.25 meters. The approach therefore supplies a practical way to maintain secrecy without needing precise eavesdropper tracking or amplitude control.

Core claim

The central claim is that partitioning the transmit array into a caustic subarray and a focusing subarray, together with piece-wise closed-form phase profiles derived from the phase-gradient to departure-angle relation, simultaneously bypasses the potential eavesdropping region and illuminates the legitimate user, yielding up to an 80 percent reduction in the worst-case eavesdropping rate under a 0.25 m localization error.

What carries the argument

The electromagnetic caustic effect realized through array partitioning and piece-wise phase profiles that create curved wavefronts to steer power away from uncertain eavesdropper locations while focusing on the legitimate receiver.

If this is right

  • Only phase shifts are required, removing the need for per-element amplitude control.
  • The same array geometry can serve both security and communication functions without extra hardware.
  • Worst-case eavesdropping rate remains low even when location estimates contain meter-scale errors.
  • The piece-wise phase solution allows direct implementation on large aperture arrays without iterative optimization.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The partitioning idea may extend to time-varying channels if the subarray assignment can be updated periodically from fresh location estimates.
  • Similar curved-beam constructions could be tested in acoustic or optical near-field settings where wavefront curvature is also controllable.
  • Integration with coarse direction-of-arrival sensing might further reduce reliance on precise location data.

Load-bearing premise

The transmit array can be partitioned into caustic and focusing subarrays that reliably bypass the eavesdropper region and illuminate the user, assuming the electromagnetic caustic model and array geometry are sufficiently accurate.

What would settle it

A simulation or measurement in which the eavesdropping rate at the true location fails to drop by at least 50 percent relative to conventional focusing when the eavesdropper is displaced 0.25 m from its estimated position would falsify the claimed robustness.

Figures

Figures reproduced from arXiv: 2603.24077 by Robert Schober, Shicong Liu, Xianghao Yu.

Figure 1
Figure 1. Figure 1: (a) Illustration of near-field secure communication and (b) table with [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: Illustration of (a) steering beam, (b) focusing beam, and (c) caustic [PITH_FULL_IMAGE:figures/full_fig_p003_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: The proposed piece-wise trajectory design. [PITH_FULL_IMAGE:figures/full_fig_p004_3.png] view at source ↗
Figure 5
Figure 5. Figure 5: Mean and worst-case rate performance versus transmit power [PITH_FULL_IMAGE:figures/full_fig_p005_5.png] view at source ↗
read the original abstract

Near-field beamfocusing with extremely large aperture arrays can effectively enhance physical layer security. Nevertheless, even small estimation errors of the eavesdropper's location may cause a pronounced focal shift, resulting in a severe degradation of the secrecy rate. In this letter, we propose a physics-informed robust beamforming strategy that leverages the electromagnetic (EM) caustic effect for near-field physical layer security provisioning, which can be implemented via phase shifts only. Specifically, we partition the transmit array into caustic and focusing subarrays to simultaneously bypass the potential eavesdropping region and illuminate the legitimate user, thereby significantly improving the robustness against the localization error of eavesdroppers. Moreover, by leveraging the connection between the phase gradient and the EM wave departing angle, we derive the corresponding piece-wise closed-form array phase profile for the subarrays. Simulation results demonstrate that the proposed scheme achieves up to an 80% reduction of the worst-case eavesdropping rate for a localization error of 0.25 m, highlighting its superiority for providing robust and secure communication.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper proposes a physics-informed robust beamforming strategy for near-field physical layer security that partitions the transmit array into caustic and focusing subarrays. Closed-form phase profiles are derived from the connection between phase gradient and EM wave departing angle to produce curved caustics that bypass the estimated eavesdropper location while focusing on the legitimate user. Simulations claim up to an 80% reduction in worst-case eavesdropping rate for 0.25 m localization error, implemented via phase shifts only.

Significance. If the EM caustic model holds under realistic conditions, the approach offers a hardware-efficient (phase-only) way to improve secrecy robustness in near-field XL-array systems, where standard focusing is highly sensitive to location errors. The physics-informed partitioning and closed-form profiles are a potentially useful contribution to secure beamforming literature.

major comments (2)
  1. [Simulation results] Simulation results (as described in the abstract and skeptic note): the 80% reduction in worst-case eavesdropping rate is shown only in simulations with no error bars, no baseline comparisons to standard near-field beamfocusing or other robust methods, and no sensitivity analysis on the subarray partition ratio (a free parameter) or model mismatch for 0.25 m localization error. This leaves the central robustness claim under-supported.
  2. [Proposed scheme / phase profile derivation] Array partitioning and phase-profile derivation: the claim that caustic and focusing subarrays simultaneously bypass the eavesdropper region relies on the accuracy of the analytic EM caustic model matching actual near-field propagation, but no analytic bounds, finite-aperture corrections, or mutual-coupling analysis are supplied to confirm the caustic curve remains effective under the stated localization error.
minor comments (2)
  1. [Abstract] The abstract and manuscript would benefit from explicit statements of array size, carrier frequency, and exact simulation parameters to allow reproducibility.
  2. [Phase profile section] Notation for the piece-wise phase profile could be clarified with a single equation block rather than descriptive text.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive comments. We address each major point below and outline the revisions that will be incorporated to strengthen the manuscript.

read point-by-point responses
  1. Referee: [Simulation results] Simulation results (as described in the abstract and skeptic note): the 80% reduction in worst-case eavesdropping rate is shown only in simulations with no error bars, no baseline comparisons to standard near-field beamfocusing or other robust methods, and no sensitivity analysis on the subarray partition ratio (a free parameter) or model mismatch for 0.25 m localization error. This leaves the central robustness claim under-supported.

    Authors: We agree that the simulation results require additional support. In the revised manuscript we will add error bars obtained from 1000 Monte Carlo realizations of the localization error, include direct comparisons against standard near-field beamfocusing and at least one existing robust beamforming baseline, and provide sensitivity curves for the subarray partition ratio (0.2–0.8) and localization errors up to 0.5 m. These additions will better substantiate the reported 80 % reduction. revision: yes

  2. Referee: [Proposed scheme / phase profile derivation] Array partitioning and phase-profile derivation: the claim that caustic and focusing subarrays simultaneously bypass the eavesdropper region relies on the accuracy of the analytic EM caustic model matching actual near-field propagation, but no analytic bounds, finite-aperture corrections, or mutual-coupling analysis are supplied to confirm the caustic curve remains effective under the stated localization error.

    Authors: The phase-profile derivation follows directly from the established relationship between phase gradient and electromagnetic wave departing angle, which is standard in the caustic-beam literature. We acknowledge the absence of analytic bounds. The revision will add a short discussion of finite-aperture effects and the validity range of the caustic approximation for the considered 0.25 m error. Mutual coupling is neglected under the ideal phase-only assumption common to such analyses; a full-wave treatment lies outside the scope of this letter, but the assumption and its implications will be stated explicitly. revision: partial

Circularity Check

0 steps flagged

No significant circularity: phase profiles derived from standard EM relations and validated externally

full rationale

The paper's central derivation uses the established connection between phase gradient and EM wave departing angle to obtain closed-form piece-wise phase profiles for the partitioned subarrays. This is a direct application of wave physics, not a fit to the secrecy rate or eavesdropper metric. The subarray partitioning is an explicit design choice proposed to bypass the eavesdropper region, with performance quantified via independent simulations rather than by construction. No load-bearing self-citations, uniqueness theorems, or ansatzes imported from prior author work are invoked to close the argument. The reported 80% reduction is a simulation outcome, not a tautological prediction. The derivation chain is therefore self-contained against external electromagnetic principles.

Axiom & Free-Parameter Ledger

1 free parameters · 1 axioms · 0 invented entities

The central claim rests on standard near-field propagation models plus the domain assumption that caustic beams can be realized with phase-only control; the subarray partition ratio is a design choice whose selection rule is not detailed in the abstract.

free parameters (1)
  • subarray partition ratio
    The division between caustic and focusing subarrays is a design parameter whose value is not specified in the abstract and is presumably chosen to balance the two regions.
axioms (1)
  • domain assumption The electromagnetic caustic effect can be realized by appropriate phase gradients on array elements.
    Invoked when deriving the piece-wise closed-form phase profile from the phase-gradient to wave-angle connection.

pith-pipeline@v0.9.0 · 5481 in / 1344 out tokens · 51785 ms · 2026-05-15T00:48:28.020762+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

14 extracted references · 14 canonical work pages

  1. [1]

    Beam focusing for near-field multiuser MIMO communications,

    H. Zhang, N. Shlezinger, F. Guidi, D. Dardari, M. F. Imani, and Y . C. Eldar, “Beam focusing for near-field multiuser MIMO communications,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 7476–7490, Sept. 2022

  2. [2]

    Near-field wideband secure communications: An analog beamfocusing approach,

    Y . Zhang, H. Zhang, S. Xiao, W. Tang, and Y . C. Eldar, “Near-field wideband secure communications: An analog beamfocusing approach,” IEEE Trans. Signal Process., vol. 72, pp. 2173–2187, Apr. 2024. 6

  3. [3]

    Near- field communications: Research advances, potential, and challenges,

    J. An, C. Yuen, L. Dai, M. Di Renzo, M. Debbah, and L. Hanzo, “Near- field communications: Research advances, potential, and challenges,” IEEE Wireless Commun., vol. 31, no. 3, pp. 100–107, Jun. 2024

  4. [4]

    Constant modulus secure beamforming for multicast massive MIMO wiretap channels,

    Q. Li, C. Li, and J. Lin, “Constant modulus secure beamforming for multicast massive MIMO wiretap channels,”IEEE Trans. Inf. Forensics Security, vol. 15, pp. 264–275, May 2020

  5. [5]

    Robust beamforming design for secure near-field ISAC systems,

    Z. Chen, F. Wang, G. Han, X. Wang, and V . K. N. Lau, “Robust beamforming design for secure near-field ISAC systems,”IEEE Wireless Commun. Lett., vol. 14, no. 10, pp. 3089–3093, Oct. 2025

  6. [6]

    Dynamic precoding for near-field secure communications: Implementa- tion and performance analysis,

    Z. Teng, J. An, C. Masouros, H. Li, L. Gan, and D. Wing Kwan Ng, “Dynamic precoding for near-field secure communications: Implementa- tion and performance analysis,”IEEE Internet Things J., vol. 12, no. 15, pp. 29 427–29 442, Aug. 2025

  7. [7]

    Intelligent surface-aided transmitter architectures for millimeter-wave ultra massive MIMO systems,

    V . Jamali, A. M. Tulino, G. Fischer, R. R. M ¨uller, and R. Schober, “Intelligent surface-aided transmitter architectures for millimeter-wave ultra massive MIMO systems,”IEEE Open J. Commun. Soc., vol. 2, pp. 144–167, 2021

  8. [8]

    RIS-based steerable beamforming antenna with near-field eigenmode feeder,

    K. K. Tiwari and G. Caire, “RIS-based steerable beamforming antenna with near-field eigenmode feeder,” inIEEE Int. Conf. Commun. (ICC), 2023, pp. 1293–1299

  9. [9]

    Sensing- enhanced channel estimation for near-field XL-MIMO systems,

    S. Liu, X. Yu, Z. Gao, J. Xu, D. W. K. Ng, and S. Cui, “Sensing- enhanced channel estimation for near-field XL-MIMO systems,”IEEE J. Sel. Areas Commun., vol. 43, no. 3, pp. 628–643, Mar. 2025

  10. [10]

    Robust and secure wireless communications via intelligent reflecting surfaces,

    X. Yu, D. Xu, Y . Sun, D. W. K. Ng, and R. Schober, “Robust and secure wireless communications via intelligent reflecting surfaces,”IEEE J. Sel. Areas Commun., vol. 38, no. 11, pp. 2637–2652, Nov. 2020

  11. [11]

    Light propagation with phase discontinuities: Generalized laws of reflection and refraction,

    N. Yuet al., “Light propagation with phase discontinuities: Generalized laws of reflection and refraction,”Science, vol. 334, no. 6054, pp. 333– 337, Sept. 2011

  12. [12]

    Arbitrary accelerating micron-scale caustic beams in two and three dimensions,

    L. Froehlyet al., “Arbitrary accelerating micron-scale caustic beams in two and three dimensions,”Opt. Express, vol. 19, no. 17, pp. 16 455– 16 465, Aug. 2011

  13. [13]

    Curving THz wireless data links around obstacles,

    H. Guerboukha, B. Zhao, Z. Fang, E. Knightly, and D. M. Mittleman, “Curving THz wireless data links around obstacles,”Comms. Eng., vol. 3, no. 1, p. 58, Mar. 2024

  14. [14]

    Secure transmission with multiple antennas I: The MISOME wiretap channel,

    A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas I: The MISOME wiretap channel,”IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, July 2010