Subverting Flexible Multiuser Communications via Movable Antenna-Enabled Jammer

📅 2025-10-17
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
In suspicious multi-user downlink communications, an adversary—termed the suspicious transmitter (ST)—dynamically adapts its transmit power to counteract jamming, leading to a non-cooperative interaction with the legitimate jammer. Method: This paper proposes a mobile-antenna-based intelligent jammer (MAJ) that jointly optimizes antenna placement and interference beamforming to minimize either the sum rate or the minimum rate of the suspicious users. A Stackelberg game model is formulated to capture the hierarchical interaction between the MAJ (leader) and the ST (follower). Contribution/Results: We analytically characterize optimal antenna deployment patterns and derive a tight lower bound on system capacity, along with the corresponding ideal deployment strategy. Simulation results demonstrate that, compared to conventional fixed-antenna jamming, the proposed MAJ reduces the sum rate and minimum rate by up to 32.7% and 41.5%, respectively. This work establishes a deployable, analytically tractable paradigm for physical-layer security.

Technology Category

Application Category

📝 Abstract
Movable antenna (MA) is an emerging technology which can reconfigure wireless channels via adaptive antenna position adjustments at transceivers, thereby bringing additional spatial degrees of freedom for improving system performance. In this paper, from a security perspective, we exploit the MAenabled legitimate jammer (MAJ) to subvert suspicious multiuser downlink communications consisting of one suspicious transmitter (ST) and multiple suspicious receivers (SRs). Specifically, our objective is to minimize the benefit (the sum rate of all SRs or the minimum rate among all SRs) of such suspicious communications, by jointly optimizing antenna positions and the jamming beamforming at the MAJ. However, the key challenge lies in that given the MAJ's actions, the ST can reactively adjust its power allocations to instead maximize its benefit for mitigating the unfavorable interference. Such flexible behavior of the ST confuses the optimization design of the MAJ to a certain extent. Facing this difficulty, corresponding to the above two different benefits: i) we respectively determine the optimal behavior of the ST given the MAJ's actions; ii) armed with these, we arrive at two simplified problems and then develop effective alternating optimization based algorithms to iteratively solve them. In addition to these, we also focus on the special case of two SRs, and reveal insightful conclusions about the deployment rule of antenna positions at the MAJ. Furthermore, we analyze the ideal antenna deployment scheme at the MAJ for achieving the globally performance lower bound. Numerical results demonstrate the effectiveness of our proposed schemes compared to conventional fixed-position antenna (FPA) and other competitive benchmarks.
Problem

Research questions and friction points this paper is trying to address.

Minimizing suspicious multiuser communication benefits using movable antenna jammers
Optimizing antenna positions and jamming beamforming against reactive transmitters
Developing algorithms to counteract adaptive power allocation in suspicious networks
Innovation

Methods, ideas, or system contributions that make the work stand out.

Movable antenna reconfigures channels via position adjustments
Joint optimization of antenna positions and jamming beamforming
Alternating optimization algorithms solve simplified problems iteratively
🔎 Similar Papers
No similar papers found.
G
Guojie Hu
Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China, and also with the College of Communication Engineering, Rocket Force University of Engineering, Xi’an 710025, China
Q
Qingqing Wu
Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
L
Lipeng Zhu
Department of Electrical and Computer Engineering, National University of Singapore, Singapore 117583
K
Kui Xu
College of Communications Engineering, Army Engineering University of PLA, Nanjing 210007, China
Guoxin Li
Guoxin Li
Nanfang Hospital, Southern Medical University
gastric cancer
J
Jiangbo Si
Integrated Service Networks Lab of Xidian University, Xi’an 710100, China
J
Jian Ouyang
Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Tong-Xing Zheng
Tong-Xing Zheng
Xi'an Jiaotong University
Wireless CommunicationsPhysical Layer SecurityStochastic Geometry Theory