pith. sign in
Pith Number

pith:L6U73D3V

pith:2026:L6U73D3VWCWHSSAC2BF4N4NQLV
not attested not anchored not stored refs resolved

Joint Transmit and Receive Antenna Orientation Design for Secure MIMO Communications

Ailing Zheng, Qiaoyan Peng, Qingqing Wu, Wen Chen, Xingxiang Peng, Yuxuan Chen, Ziyuan Zheng

Dynamically optimizing rotatable antenna orientations in MIMO systems enhances secrecy rates by reshaping channels to favor legitimate users over eavesdroppers.

arxiv:2605.14272 v1 · 2026-05-14 · cs.IT · math.IT

Add to your LaTeX paper
\usepackage{pith}
\pithnumber{L6U73D3VWCWHSSAC2BF4N4NQLV}

Prints a linked badge after your title and injects PDF metadata. Compiles on arXiv. Learn more · Embed verified badge

Record completeness

1 Bitcoin timestamp
2 Internet Archive
3 Author claim open · sign in to claim
4 Citations open
5 Replications open
Portable graph bundle live · download bundle · merged state
The bundle contains the canonical record plus signed events. A mirror can host it anywhere and recompute the same current state with the deterministic merge algorithm.

Claims

C1strongest claim

Simulation results show that the proposed scheme converges rapidly and achieves significant secrecy rate gains over the conventional fixed-orientation scheme.

C2weakest assumption

The optimization assumes perfect knowledge of all channel matrices (legitimate and eavesdropper) at the transmitter so that the secrecy-rate objective can be evaluated exactly; the abstract does not discuss estimation error or feedback delay.

C3one line summary

Jointly optimizing rotatable-antenna orientations with transmit beamforming and artificial-noise covariance in MIMO systems yields higher secrecy rates than fixed-orientation baselines.

References

35 extracted · 35 resolved · 0 Pith anchors

[1] On the road to 6G: Visions, requirements, key technologies, and testbeds, 2023
[2] Security and privacy for 6G: A survey on prospective technologies and challenges, 2021
[3] Stallings,Cryptography and Network Security: Principles and Prac- tice 2010
[4] Physical layer security in wireless networks: A tutorial, 2011
[5] Secure transmission with multiple antennas I: The MISOME wiretap channel, 2010
Receipt and verification
First computed 2026-05-17T23:39:10.382287Z
Builder pith-number-builder-2026-05-17-v1
Signature Pith Ed25519 (pith-v1-2026-05) · public key
Schema pith-number/v1.0

Canonical hash

5fa9fd8f75b0ac794802d04bc6f1b05d5f27fcccc5068bb53c0ea793f57bb349

Aliases

arxiv: 2605.14272 · arxiv_version: 2605.14272v1 · doi: 10.48550/arxiv.2605.14272 · pith_short_12: L6U73D3VWCWH · pith_short_16: L6U73D3VWCWHSSAC · pith_short_8: L6U73D3V
Agent API
Verify this Pith Number yourself
curl -sH 'Accept: application/ld+json' https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV \
  | jq -c '.canonical_record' \
  | python3 -c "import sys,json,hashlib; b=json.dumps(json.loads(sys.stdin.read()), sort_keys=True, separators=(',',':'), ensure_ascii=False).encode(); print(hashlib.sha256(b).hexdigest())"
# expect: 5fa9fd8f75b0ac794802d04bc6f1b05d5f27fcccc5068bb53c0ea793f57bb349
Canonical record JSON
{
  "metadata": {
    "abstract_canon_sha256": "7585d7d81a8e7cb2a2e5802dbba75336a16e0db7f1ba519454de55050f91f423",
    "cross_cats_sorted": [
      "math.IT"
    ],
    "license": "http://arxiv.org/licenses/nonexclusive-distrib/1.0/",
    "primary_cat": "cs.IT",
    "submitted_at": "2026-05-14T02:15:56Z",
    "title_canon_sha256": "bbbaf5c57b212407dbf13c55e1c9ab1c0fb6d782b4443edab5e058668187f3c9"
  },
  "schema_version": "1.0",
  "source": {
    "id": "2605.14272",
    "kind": "arxiv",
    "version": 1
  }
}