Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 97 tok/s
Gemini 2.5 Pro 49 tok/s Pro
GPT-5 Medium 21 tok/s Pro
GPT-5 High 18 tok/s Pro
GPT-4o 92 tok/s Pro
GPT OSS 120B 468 tok/s Pro
Kimi K2 175 tok/s Pro
2000 character limit reached

Movable Antennas in Wireless Systems: A Tool for Connectivity or a New Security Threat? (2411.06028v2)

Published 9 Nov 2024 in math.OC

Abstract: The emergence of movable antenna (MA) technology has marked a significant advancement in the field of wireless communication research, paving the way for enhanced connectivity, improved signal quality, and adaptability across diverse environments. By allowing antennas to adjust positions dynamically within a finite area at transceivers, this technology enables more favourable channel conditions, optimizing performance across applications like mobile telecommunications and remote sensing. However, throughout history, the introduction of every new technology has presented opportunities for misuse by malicious individuals. Just as MAs can enhance connectivity, they may also be exploited for disruptive purposes such as jamming. In this paper, we examine the impact of an MA-enhanced jamming system equipped with $M$ antennas in a downlink multi-user communication scenario, where a base station (BS) with $N$ antennas transmits data to $K$ single-antenna users. Simulation results show that an adversary equipped with MAs reduce the system sum rate by $30\%$ more effectively than fixed-position antennas (FPAs). Additionally, MAs increase the outage probability by $25\%$ over FPAs, leading to a $20\%$ increase in the number of users experiencing outages. The highlighted risks posed by unauthorized use of this technology, underscore the urgent need for effective regulations and countermeasures to ensure its secure application.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Ai Generate Text Spark Streamline Icon: https://streamlinehq.com

Paper Prompts

Sign up for free to create and run prompts on this paper using GPT-5.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-up Questions

We haven't generated follow-up questions for this paper yet.