{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2026:L6U73D3VWCWHSSAC2BF4N4NQLV","short_pith_number":"pith:L6U73D3V","schema_version":"1.0","canonical_sha256":"5fa9fd8f75b0ac794802d04bc6f1b05d5f27fcccc5068bb53c0ea793f57bb349","source":{"kind":"arxiv","id":"2605.14272","version":1},"attestation_state":"computed","paper":{"title":"Joint Transmit and Receive Antenna Orientation Design for Secure MIMO Communications","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"Dynamically optimizing rotatable antenna orientations in MIMO systems enhances secrecy rates by reshaping channels to favor legitimate users over eavesdroppers.","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Ailing Zheng, Qiaoyan Peng, Qingqing Wu, Wen Chen, Xingxiang Peng, Yuxuan Chen, Ziyuan Zheng","submitted_at":"2026-05-14T02:15:56Z","abstract_excerpt":"Physical layer security (PLS) is a promising paradigm for safeguarding 6G wireless networks by exploiting the inherent characteristics of wireless channels. However, the efficiency of conventional PLS is often limited by fixed orientation antennas. This paper investigates a rotatable antenna (RA)-aided secure multiple-input multiple-output (MIMO) communication system, where both the transmitter and the receiver are equipped with RAs in the presence of an eavesdropper. By dynamically optimizing the orientations of RAs, we can proactively reshape the effective MIMO channels to enhance legitimate"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":true,"formal_links_present":false},"canonical_record":{"source":{"id":"2605.14272","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2026-05-14T02:15:56Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"bbbaf5c57b212407dbf13c55e1c9ab1c0fb6d782b4443edab5e058668187f3c9","abstract_canon_sha256":"7585d7d81a8e7cb2a2e5802dbba75336a16e0db7f1ba519454de55050f91f423"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:39:10.382787Z","signature_b64":"joevjGsEH7qzoARs0DomflQhTJfsmB6A7LGfElXaYwTJ2XjGamxh9T7knAEHD/Gvbf5OyoCBWIOfgsGAUynBAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"5fa9fd8f75b0ac794802d04bc6f1b05d5f27fcccc5068bb53c0ea793f57bb349","last_reissued_at":"2026-05-17T23:39:10.382287Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:39:10.382287Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Joint Transmit and Receive Antenna Orientation Design for Secure MIMO Communications","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"Dynamically optimizing rotatable antenna orientations in MIMO systems enhances secrecy rates by reshaping channels to favor legitimate users over eavesdroppers.","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Ailing Zheng, Qiaoyan Peng, Qingqing Wu, Wen Chen, Xingxiang Peng, Yuxuan Chen, Ziyuan Zheng","submitted_at":"2026-05-14T02:15:56Z","abstract_excerpt":"Physical layer security (PLS) is a promising paradigm for safeguarding 6G wireless networks by exploiting the inherent characteristics of wireless channels. However, the efficiency of conventional PLS is often limited by fixed orientation antennas. This paper investigates a rotatable antenna (RA)-aided secure multiple-input multiple-output (MIMO) communication system, where both the transmitter and the receiver are equipped with RAs in the presence of an eavesdropper. By dynamically optimizing the orientations of RAs, we can proactively reshape the effective MIMO channels to enhance legitimate"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"Simulation results show that the proposed scheme converges rapidly and achieves significant secrecy rate gains over the conventional fixed-orientation scheme.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"The optimization assumes perfect knowledge of all channel matrices (legitimate and eavesdropper) at the transmitter so that the secrecy-rate objective can be evaluated exactly; the abstract does not discuss estimation error or feedback delay.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"Jointly optimizing rotatable-antenna orientations with transmit beamforming and artificial-noise covariance in MIMO systems yields higher secrecy rates than fixed-orientation baselines.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"Dynamically optimizing rotatable antenna orientations in MIMO systems enhances secrecy rates by reshaping channels to favor legitimate users over eavesdroppers.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"4778341711f666a0244e6a3868585f6b784a373ac8d6ac8e4061f91927347139"},"source":{"id":"2605.14272","kind":"arxiv","version":1},"verdict":{"id":"0e2ee325-6a82-412d-b221-878535ddac41","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-15T02:12:48.765137Z","strongest_claim":"Simulation results show that the proposed scheme converges rapidly and achieves significant secrecy rate gains over the conventional fixed-orientation scheme.","one_line_summary":"Jointly optimizing rotatable-antenna orientations with transmit beamforming and artificial-noise covariance in MIMO systems yields higher secrecy rates than fixed-orientation baselines.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"The optimization assumes perfect knowledge of all channel matrices (legitimate and eavesdropper) at the transmitter so that the secrecy-rate objective can be evaluated exactly; the abstract does not discuss estimation error or feedback delay.","pith_extraction_headline":"Dynamically optimizing rotatable antenna orientations in MIMO systems enhances secrecy rates by reshaping channels to favor legitimate users over eavesdroppers."},"references":{"count":35,"sample":[{"doi":"","year":2023,"title":"On the road to 6G: Visions, requirements, key technologies, and testbeds,","work_id":"b79864ad-e86b-4cd5-998a-4308f8585642","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2021,"title":"Security and privacy for 6G: A survey on prospective technologies and challenges,","work_id":"1da89a45-b7f0-4a37-9e8e-27ea3d063932","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2010,"title":"Stallings,Cryptography and Network Security: Principles and Prac- tice","work_id":"f223f870-e29f-4346-bb47-ec3fa0dadc43","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2011,"title":"Physical layer security in wireless networks: A tutorial,","work_id":"439212ba-5496-45b3-a415-1d59a958ee1e","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2010,"title":"Secure transmission with multiple antennas I: The MISOME wiretap channel,","work_id":"67a2d158-3cb2-4546-9309-1100bb74473f","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":35,"snapshot_sha256":"be39cf1eaee57404715ea15aeeacfcf23172bdbd821627a12c8ab4853ffa653b","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"2605.14272","created_at":"2026-05-17T23:39:10.382373+00:00"},{"alias_kind":"arxiv_version","alias_value":"2605.14272v1","created_at":"2026-05-17T23:39:10.382373+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.14272","created_at":"2026-05-17T23:39:10.382373+00:00"},{"alias_kind":"pith_short_12","alias_value":"L6U73D3VWCWH","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_16","alias_value":"L6U73D3VWCWHSSAC","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_8","alias_value":"L6U73D3V","created_at":"2026-05-18T12:33:37.589309+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV","json":"https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV.json","graph_json":"https://pith.science/api/pith-number/L6U73D3VWCWHSSAC2BF4N4NQLV/graph.json","events_json":"https://pith.science/api/pith-number/L6U73D3VWCWHSSAC2BF4N4NQLV/events.json","paper":"https://pith.science/paper/L6U73D3V"},"agent_actions":{"view_html":"https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV","download_json":"https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV.json","view_paper":"https://pith.science/paper/L6U73D3V","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=2605.14272&json=true","fetch_graph":"https://pith.science/api/pith-number/L6U73D3VWCWHSSAC2BF4N4NQLV/graph.json","fetch_events":"https://pith.science/api/pith-number/L6U73D3VWCWHSSAC2BF4N4NQLV/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV/action/timestamp_anchor","attest_storage":"https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV/action/storage_attestation","attest_author":"https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV/action/author_attestation","sign_citation":"https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV/action/citation_signature","submit_replication":"https://pith.science/pith/L6U73D3VWCWHSSAC2BF4N4NQLV/action/replication_record"}},"created_at":"2026-05-17T23:39:10.382373+00:00","updated_at":"2026-05-17T23:39:10.382373+00:00"}