Abstract

In this paper, we investigate an innovative physical layer security (PLS) scheme for an uncertain reconfigurable intelligent surface- (RIS-) assisted communication system under eavesdropping attack. Specifically, in our proposed system, we consider that the uncertain RIS is known to the legitimate user while not to the eavesdropper (Eve). In this manner, the reflective elements of the uncertain RIS are adjusted to strengthen the keen signals for the legitimate user while suppressing the signals for Eve via jamming. We analyze the system by assuming legitimate and wiretap channels, respectively, where the secrecy capacity maximization problem is formulated and its exact closed-form expression is derived. Simulation results verifying the accuracy of our analysis demonstrate the validity and superiority of the uncertain RIS-assisted communication system against its counterparts.

1. Introduction

Due to the fast development of the mobile communication network, the continuous emergence of new services, and the fulminic growth of information interaction, the fifth-generation (5G) wireless communications are anticipated to provide massive data transmissions and wide-area coverage as a new type of communication network [1]. For the upcoming applications of 5G, future wireless communication systems are anticipated to support more efficient, lower latency, more reliable, and secure designs. With the rapid evolution of science, lots of technologies have been implemented in 5G communication network to satisfy its diverse application scenarios, e.g., multiple access technology [2], deep learning (DL) [3], and beamforming [4]. Meanwhile, due to the explosive growth of information dissemination and massive information interaction, public communication networks and private communication networks are often mixed, which makes information security issues more important [5].

Physical layer security (PLS) enhancement has aroused extensive attentions in both industry and academia thanks to its superb capability of light-weight authentication on received signals against eavesdropping attacks [6]. Since the PLS takes advantage of the natural peculiarities and physical properties of propagation environment to promote the security performance of 5G communication network and secure the data transmission, it has attracted extensive attention in the academia and industry circles [7]. Several dimensions of designing PLS schemes have been identified in the literature, via nonorthogonal multiple access (NOMA) [8], artificial noise (AN), and cooperative interference [9]. Although effective, they may consume extra power and/or incur additional hardware cost, thus forming significant barriers in the real implementations.

Fortunately, with the rapid evolution of metamaterial technology, a low cost and energy efficient device named reconfigurable intelligent surface (RIS) offers an available way to strengthen the PLS [10]. The RIS is an artificial electromagnetic surface consisting a great many cheap passive reflecting elements governed by a preprogrammed controller, which can skillfully change the amplitude and/or phase shift of arriving galvanomagnetic signals to make the direction and strength of the signal greatly controllable at the destination. Thus, the RIS cannot only strengthen the required signals and restrain the undesirable signals by befittingly tuning the phase shifts of all reflecting components but also effectively improves the radio transmission environment leading to the random channel state information (CSI) controllable [11, 12]. Therefore, it can be anticipated that the RIS will occupy an important position in the 5G wireless communication network [13].

With such characteristics, RIS has recently been considered to enable the PLS of wireless communication system to promote the secrecy capacity [1418]. In [14], the minimum secrecy rate maximization problem of one downlink multiple-input single-output (MISO) broadcasting communication model was formulated and optimized via alternating optimization (AO) and path tracing algorithm. The authors in [15] introduced an RIS-based secure transmission framework aiming to obtain the minimum value of its communication network energy consumption within the scenarios of two different access point- (AP-) RIS channel models. In [16], the joint optimization of transmitter beamforming and RIS phase shifts by block coordinate descending (BCD) and majorization-minimization (MM) methods was studied to maximize the system security capacity for the secure wireless communication assisted with RIS. Cui et al. [17] considered a stronger eavesdropping channel than the legal one, where the AO and semidefinite relaxation (SDR) algorithms were explored to derive the maximum value of the security capacity in the secure wireless communication system. Wang et al. [18] investigated an RIS-aided MISO communication network with the unknown eavesdropping CSI, where the oblique manifold (OM) and MM algorithms were designed to promote the security of the communication network.

Note that the above mentioned studies [1418] simply focused their attention on one function of RIS, i.e., enhancing or jamming, but the unknown situation of RIS was not considered. This paper investigates RIS-assisted secure wireless communication with the main contributions listed as follows: (i)We propose a novel PLS communication system with an uncertain RIS aiming to enhance the secrecy rate, where the components of RIS are separated into two functional parts, one assisting the legitimate user and the other suppressing the achievable rate of eavesdropper as a jammer.(ii)The optimal result of elements allocation for RIS is analyzed, and its exact closed-form expression is concluded to confirm the superiority of our proposed scheme.(iii)Numerical results verifying the correctness of the derived expression show the advantage and validity of the designed scheme compared with its counterparts, especially under a great many reflecting elements.

2. System Model

An uncertain RIS-assisted secure communication system is considered, which consists of a source (), a legitimate user (), an eavesdropper (Eve), and an RIS, as depicted in Figure 1. To improve the secure wireless communication, the RIS with reflecting elements is placed near by , , and Eve which are equipped with a single antenna. For the uncertain RIS, the size of each element is considered a lot smaller than the wavelength of RF signals resulting in that the reflecting element scatters the received signal in whole directions with approximately constant gain [19], and the phase shift of each passive units is controlled dynamically by RIS via an intelligent controller. It is also supposed that both and have the knowledge of the location information of RIS, while Eve is unable to acquire the location information of RIS, and that the CSI of the uncertain RIS is entirely known to and , but not for the Eve.

The direct links of and are considered, which are expressed by and , respectively. Considering that the number of components is fixed to , we divide the surface of RIS into two sectors, in which the one with elements is used to serve as a jammer to Eve and the other with elements is applied to promote the information signals from to via high-quality virtual links. The source transmits the signal to legitimate user via the RIS to promote the information transmission for the legitimate user, and the channel coefficients of the links and are expressed by and , respectively. Since the eavesdropper attempts to wiretap the signal from , it is assumed that the eavesdropper does not know the location of RIS, and hence, the reflected signals from RIS will be treated as jamming signals for the Eve, with the available links and denoted as and , respectively. Furthermore, it is assumed that each channel of the system follows independent Rayleigh fading distribution. Thus, the received signals at and Eve are separately expressed as where and mean the data symbol and the transmit power for and . and stand for the channel coefficient matrix of the RIS sector serving and the amplitude of the reflection coefficient, where represents the lossless reflection; is the phase-shift produced by the -th element for . stands for the channel coefficients matrix of the RIS sector allocated for Eve, is the phase-shift produced by the -th element for . In addition, and are the additive white Gaussian noise (AWGN).

Since the signal from RIS will be treated as interference by the Eve because of the unknown CSI of RIS, the achievable SNR at and SINR at Eve can be, respectively, obtained from

For any given and , the data rate expressions for and Eve can be achieved from the Shannon theory as and .

From above observations, the secrecy capacity (SC) in our proposed scheme can be expressed as where . Considering that the deterministic channels for and Eve are fully known for , with the optimized phase shift variables, the SC optimization of the proposed uncertain RIS-assisted communication system is formulated as

Clearly, it is quite challenging to solve this optimization problem straightforwardly. Thus, we turn to analyze its security performance with optimal elements allocation and derive the corresponding optimal solutions.

3. Performance Analysis

In the section, the optimization problem of maximizing SC for the proposed system is analyzed under the optimal elements allocation of RIS, and then we derive the optimal solution for such problem. Since the maximum SC must be nonnegative, the operation can be omitted without loss of optimality. With the monotonic function log, the objective function in is reexpressed as

For simplicity, the reflective passive beamforming with perfect CSI of RIS is taken into account, and we also assume entire elements of the RIS are with the same reflection amplitude [20]. Thus, we have and . In the case that knows the CSI of all channels completely, the optimal reflection phase shift can be obtained through channels. In addition, the optimal phase shift can be derived via the proposition as follows.

Proposition 1. The optimal RIS phase shift of the communication network is expressed as where and represent the -th element of and , respectively. and represent the links from BS and RIS to user, respectively, and denotes the phase operator.

Proof. Note that the function can be rewritten as From Equation (9), it can be easily verified that achieves its maximum value for , which means that the phase shifts of both direct and cascaded links between the and are identical, i.e. . Therefore, Equation (8) can be derived, which completes this proof.

As a result, the maximum achievable SNR can be obtained if the phase shifts satisfy and , which means that the cascaded links via RIS are with the same phase as the corresponding direct links [21]. Therefore, we have

From Equations (10) and (11), it is easy to see that the SNR of and SINR of Eve only rely on the amplitudes of the reflective elements, not on their phases. Therefore, we can reformulate the optimization problem as

Clearly, is nonconvex and hard to obtain its optimal result. Therefore, we turn to derive its closed form in an approximate way. Assuming the equivalent size for each RIS element, thus, it follows that all elements in , , and have the same magnitude, respectively. For brevity, we have , , , and . In addition, and , where , , and are the channel coefficients of , , and Eve related to a single element of RIS, respectively [22]. It is known that, for a small number of components, the channel gain provided by RIS should be smaller than that of the direct channel. However, as the amount of reflective components grows, the channel gain provided by RIS significantly improves and becomes much larger than that of direct channel. Then, we can reformulate Equations (10) and (11) in the more compact forms as

Since , letting and with Equations (13) and (14), the secrecy capacity maximization problem can be obtained from where , , , and . Since the term has no influence on solving the optimization problem in Equation (15) and the approximation holds due to , the above maximization problem can be simplified as

Since the function in Equation (16) is continuous, we can derive the following expression by its first-derivations as

It is quite difficult to analyze its trend directly from the above formula; then, the second-derivation is derived and simplified as

Through the positive and negative judgment in Equation (18), we can acquire the monotonicity of the first-derivation expression and further determine whether it has a zero point in the value range. For simplicity let , , and . Due to the positive characteristic of , Equation (18) can be simplified as

Clearly, , , and are monotonically decreasing with , where , , , , and are always smaller than 0 with the increase of . Therefore, one can conclude that and have zero points in their effective domain, which are denoted by and , respectively. For the sake of illustration, letting , we have

Since is always smaller than 0 with the increase of , it can be regarded as a constant and has no effect on the trend of , but it determines their zero points. According to Equation (18), . However, the positive or negative of Equation (18) cannot be determined; thus we discuss each case separately. For the case , the monotonicity of Equation (18) is similar to that of . However, when , the zero point of Equation (18) denoted by exists, and hence, we can conclude

Through observing the positive and negative of , we know that the first-derivation of tends to increase and then decreases and then maybe increase again with the increase of , where and . Therefore, there exists a maximum value of the secrecy rate for the formulated optimization problem, within the scope of its first derivative in solving extreme result. Thus, we can derive the optimal solution by calculating the equation of , and the maximum secrecy capacity is also determined. Letting , the objective function can be simplified as

Since , we can eliminate the coefficient of the first term in Equation (22) and obtain the following equation:

Clearly, Equation (23) is a special cubic equation, which can be solved by the Cardano formula method. From Equation (23), we can find that and , it can be converted into the form of where and . In addition, due to and , letting , we have

Comparing the coefficients of Equations (24) and (25) and after some mathematical manipulations, we can obtain

According to , and are two roots of the equation , which can be found by the root formula; the corresponding closed-form expressions can be obtained from

In this manner, the optimal solution of Equation (15) can be finally expressed as where is the ceiling function. Thus, from the closed-form expression of , can thus be obtained as the optimal number of elements allocated for serving .

4. Numerical Result Comparison

In the section, we validate the expression of the analysis and evaluate the performance of our considered system with the assistance of the uncertain RIS via simulation results. All links in the system are assumed to follow independent Rayleigh fading with the path loss exponent of 2.2, and the noise variance is -94 dBm. For simplicity, the following node locations are considered: , , , and .

Figure 2 illustrates the variation of achieved rate as the number of elements for Eve with the fixed transmit power W varies, and the total number of elements is set to . The achievable rates of and Eve are decreasing when the number of the elements for Eve increases, as shown in the figure. However, the achievable rate at Eve decreases significantly than that of the one at . It also illustrates that the achievable secrecy rate is first increasing and then decreasing with an increasing number of elements for Eve. Thus, there exits an optimal value of elements for and Eve as the result of 10.0392 bps/Hz. Through observation, it is known that is the optimal value in the simulation results which are equal to the optimal value obtained from our analysis in Equation (28).

In Figure 3, we compare different schemes of elements allocation versus the transmit power with the power from 1 W to 30 W. By means of the simulation, we compare several models including the proposed scheme, all elements of RIS to enhance secure communication at , all elements of RIS to interfere Eve, and the model without RIS. For the system without RIS, its achievable secrecy rate is 0 since the achievable rate at Eve is higher than that at . And when all the components of RIS are used to improve the legitimate communication, the secrecy rate is determined by the CSI instead of the transmission power of base station; thus, the secrecy rate keeps constant under varying transmit power. The achievable secrecy capacity for our considered scheme and the one that all elements to interfere Eve monotonically increase with the increasing transmit power, and our proposed scheme achieves better results. Moreover, it also verifies that our proposed scheme has a higher secrecy capacity than other schemes, which makes it superior compared with than other schemes.

Figure 4 demonstrates the variation of achievable secrecy rate with total number of elements for RIS, in which is set to be , , and . According to the figure, the achievable secrecy capacity is increasing as the transmit power increases. In addition, it reveals that the secrecy rate in the uncertain RIS-assisted communication network increases with an increasing number of components.

5. Conclusions

This paper investigated uncertain RIS-assisted PLS, with the presence of an eavesdropper. The uncertain RIS can enhance the signal for the legitimate user while jamming the eavesdropper by separating the components of RIS into two functional sections. The optimal element allocation and achievable secrecy rate can be obtained in their closed forms by solving the formulated problem. Numerical results verifying the accuracy of the derived expression show the advantage of our considered scheme compared with its counterparts.

Data Availability

The simulation data used to support the findings of this study are available from the author upon request, who can be contacted at [email protected]

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grants 61971245 and 61801249.