Next Article in Journal
A Period Training Method for Heterogeneous UUV Dynamic Task Allocation
Next Article in Special Issue
NOMA or OMA in Delay-QoS Limited Satellite Communications: Effective Capacity Analysis
Previous Article in Journal
An Entanglement-Based Protocol for Simultaneous Reciprocal Information Exchange between 2 Players
Previous Article in Special Issue
Design of Regenerating Code Based on Security Level in Cloud Storage System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT

1
The Sixty-Third Research Institute, National University of Defense Technology, Nanjing 210007, China
2
Guangxi Key Laboratory of Ocean Engineering Equipment and Technology, Qinzhou 535011, China
3
College of Communication Engineering, Army Engineering University of PLA, Nanjing 210007, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(11), 2507; https://doi.org/10.3390/electronics12112507
Submission received: 28 April 2023 / Revised: 26 May 2023 / Accepted: 31 May 2023 / Published: 2 June 2023

Abstract

:
Reconfigurable intelligent surface (RIS)-assisted unmanned aerial vehicles (UAV) have been extensively studied on the Internet of Things (IoT) systems to improve communication performance. In this paper, we aimed to counter simultaneous jamming and eavesdropping attacks by jointly designing an active beamforming vector at the base station (BS) and reflect phase shifts at the RIS. Specifically, considering imperfect angular channel state information (CSI), the sum secrecy rate maximization problem in the worst case could be formulated, which is NP-hard and non-convex. To address this problem, we improved the robust enhanced signal-to-leakage-and-noise ratio (E-SLNR) beamforming to reduce the computational complexity and mitigate the impact of interference, eavesdropping and jamming. Furthermore, a genetic algorithm with a tabu search (GA-TS) method was proposed to efficiently obtain an approximate optimal solution. The simulation results demonstrated that the proposed GA-TS method converged faster with better results than conventional GA, while the proposed robust scheme could achieve higher sum secrecy rates than the zero-forcing (ZF) and SLNR schemes.

1. Introduction

Recently, the Internet of Things (IoT) technology has been widely studied in fields such as smart homes, smart cities, smart grids, and autonomous vehicles due to its ability to connect a massive number of wireless devices [1]. According to a recent study by Ericsson, more than 25 billion IoT connections will be reached in 2025 [2]. Considering the limited spectral resources and energy constraints of IoT devices, fixed terrestrial base stations (BSs) face significant challenges in providing services to an increasing number of IoT devices and networks. Fortunately, unmanned aerial vehicles (UAVs) have been widely discussed for their ability to quickly deploy as air relays to boost the capacity and coverage of existing terrestrial networks and enhance the quality of wireless communication [3,4,5]. Due to the heterogeneity and geographical dispersion of IoT devices, several security issues have arisen. Particularly, sensitive information is generally sent as a type of plaintext by IoT devices, which is easily susceptible to eavesdropping attacks [6]. Furthermore, jamming is also a common attack on IoT to compromise data privacy, integrity and security [7,8]. However, the traditional UAV relay requires a large transmit power to forward signals and is vulnerable to counter eavesdropping and malicious jamming [9].
The reconfigurable intelligent surface (RIS) is a promising technology that can overcome these aforementioned shortcomings [10]. RIS is constituted of many passive low-cost reflectors whose phase and amplitude can be intelligently adjusted by a controller to reconfigure the wireless propagation environment [11]. It has been verified in [12] that RIS-assisted transmission can outperform the decode-and-forward (DF) relay protocol in terms of energy efficiency (EE) for high-speed transmission. Thus, RIS has attracted a lot of interest in improving the security and performance of wireless communications while saving power consumption [10,11,12,13,14,15].

1.1. Related Works

Over the past few years, the UAV and RIS have been explored as assisting wireless communication in IoT. Many studies have introduced UAVs to increase the coverage and network capacity of wireless networks. For instance, in [16], a fast and efficient heuristic algorithm was proposed to address the UAV flight optimization problem, which aimed to provide an optimal throughput for a set of locations while considering the battery constraints of the UAVs and energy costs. In [17], the optimal 3D deployment problem of UAVs was solved to maximize the downlink coverage performance with a minimum transmit power. In [18], a 3D beamforming was designed to increase the coverage of the wireless communication system, in which UAVs were distributed at different heights and equipped with Multiple-Input-Multiple-Output (MIMO). In [19], a scenario of UAVs with imperfect beam alignment was considered, and an analytical framework was proposed to analyze the coverage probability of UAV-assisted networks under cluster users. In these aforementioned works, the position/trajectory and transmit power of UAVs were mainly studied to enhance wireless communication capabilities.
As an emerging technology, RIS adds a new dimension to the optimization of wireless communication performance and can effectively increase the performance of traditional UAV relay systems [9,20,21,22]. In [9], the RIS-UAV relaying communication system was proposed, and the system throughput was maximized by jointly optimizing the UAV trajectory, RIS passive beamforming and source power allocation for each time slot. In [21], the UAV-mounted RIS was utilized in the IoT network to enhance data collection, and an energy model was designed which took into account the weight of the UAV and RIS, as well as the environmental conditions and UAV’s velocity. An air-to-ground downlink communication network with UAV-mounted RIS was proposed in [22] to improve the system’s energy efficiency by jointly optimizing the trajectory of the UAV, phase shifts of RIS, and transmit power of BS. A block coordinate descent (BCD) method was used to solve the nonconvex inequality constraint, and the resource allocation problem of the BS transmit power was addressed by the Dinkelbach algorithm.
Furthermore, wireless communication scenarios with malicious nodes have also been discussed [23,24,25,26]. In [23], an aerial RIS was proposed against jamming attacks to enhance legitimate transmissions by jointly designing the deployment and passive beamforming of the aerial RIS through an alternating optimization algorithm with successive convex optimization. Reference [24] explored a communication scenario in which RIS was mounted on the UAV to resist malicious jamming attacks. A dueling double deep Q networks multi-step learning algorithm was proposed to jointly optimize the trajectory and passive beamforming. In [25], a RIS-assisted UAV secure communication scheme was proposed to counter eavesdropping and a maximum average secrecy rate was achieved through joint optimization of the BS’s beamforming power, RIS’s reflect phase shift, and UAV’s trajectory. Additionally, the proposed non-convex optimization problem was decomposed into three sub-optimization problems, which could be solved efficiently. In [26], the distribution of eavesdroppers was modeled by the stochastic geometry theory, and novel expressions were proposed for a legitimate receiver and eavesdropper to analyze the impact of the number of reflecting units of RIS and the location of UAV on the secrecy outage probability performance. However, previous studies either did not consider malicious nodes or only considered eavesdropping or malicious jamming.
Moreover, it is noteworthy that these works concentrated on obtaining optimal solutions but inevitably resulted in high computational complexity and a heavy hardware burden. Recently, zero-forcing (ZF) beamforming and signal-to-leakage-plus-noise ratio (SLNR) beamforming have been proposed to reduce computational complexity and improve the security of communication [27,28]. ZF beamforming focus on nulling out the inter-user interference with brute force [28]. Compared to ZF beamforming, SLNR beamforming can achieve higher secrecy rates [29,30]. Nevertheless, in order to implement these methods, the transmitter requires a perfect CSI. However, this is unrealistic considering the noncooperation between the transmitter and illegitimate nodes.

1.2. Contributions

Motivated by these aforementioned observations, this paper investigated the RIS-assisted UAV secure communication in the IoT network system to ensure the quality of wireless transmissions under eavesdropping and jamming attacks. Moreover, a robust optimization problem was proposed to maximize the sum secrecy rate by jointly optimizing the transmit beamforming of BS and the reflect phase shift of RIS. In order to efficiently solve the proposed optimization problem, many heuristic methods were proposed, such as Genetic Algorithms (GA) [31], Particle Swarm Optimization [32] and Tabu Search [33]. In this study, we introduced the TS algorithm into the traditional GA algorithm. The main contributions of this paper are summarized as follows:
(1)
An RIS-assisted UAV secure communication in the IoT network system is proposed, in which UAV can be equipped with RIS to relay source signals and counter interference, eavesdropping and malicious jamming attacks simultaneously. Due to the imperfect angular channel state information of illegitimate nodes, we formulated a robust optimization problem to maximize the sum secrecy rate by jointly optimizing the active beamforming of BS and the reflection phase shift of RIS.
(2)
We improved the robust E-SLNR beamforming of BS to counter interference, eavesdropping and malicious jamming simultaneously and reduced computational complexity and the impact of imperfect angular channel state information. For the non-convex optimization problem, a GA-TS method was proposed to efficiently obtain an approximate optimal solution.
(3)
The numerical results indicate that the proposed GA-TS method can converge faster than the conventional GA method, and the robustness of this proposed scheme was demonstrated. Compared to traditional ZF and SLNR beamforming, our improved E-SLNR beamforming provides better performance in security transmission. As a larger number of RIS units is set, the higher sum secrecy rate of the proposed scheme can be obtained.
The remainder of the paper is organized as follows. In Section 2, the system model of the RIS-assisted UAV secure communication in IoT and the optimization problem formulation is presented. Section 3 investigates the robust E-SLNR beamforming and the GA-TS method. Numerical results are shown in Section 4. Finally, we conclude this paper in Section 5.

2. System Model and Problem Formulation

2.1. System Model

As shown in Figure 1, we considered a multi-output single-input IoT communication network with a RIS-assisted UAV, which boosted information security. Meanwhile, there existed a jammer with L = L 1 × L 2 antennas attempting to interrupt the legitimate transmissions and a single-antenna eavesdropper attempting to intercept the intended signals. Furthermore, it was assumed that BS equipped with M = M 1 × M 2 antennas transmitted the desired data to K single-antenna users. In addition, uniform planar arrays (UPAs) with N = N 1 × N 2 units were applied in the RIS. We considered UAV hovering in the air to provide a relay service, in other words, its position did not change. We let G B R C M × N , h R U , k C N × 1 , h B U , k C M × 1 , h B E C M × 1 , h R E C N × 1 , G J R C L × N , h J U , k C L × 1 denote the channel coefficients between the BS and the RIS, between the RIS and the device k , between the BS and the device k , between the BS and the eavesdropper, between the RIS and the eavesdropper, between the jammer and the RIS, and between the jammer and the device k , respectively. Due to the limited transmit power, the transmit beamforming vector w k C M × 1 satisfied k = 1 K w k P M a x , and the jamming beamforming vector w J , k C L × 1 satisfied k = 1 K w J , k P J , M a x , in which P M a x , P J , M a x was the maximum of BS’s transmitting power and the maximum jamming power, respectively. Thus, the desired signal sent by BS could be written as k = 1 K w k s T , k C M × 1 , and the jamming signal sent by the jammer could be represented as k = 1 K w J , k s J , k C L × 1 . In addition, due to hardware limitations, we considered the controllable number of RIS elements to be b. Specifically, we let v = ( v 1 , v 2 , , v N ) T denote the reflect phase shift matrix of RIS, in which v i = e j θ i and θ i { 0 , 2 π 2 b , , ( 2 b 1 ) 2 π 2 b } .
Due to the potential cooperation between the eavesdropper and jammer, it was assumed that the jammer signals received by the eavesdropper could be eliminated. Hence, the signals received at the device k from the BS could be given by:
y U ,   k = i = 1 K H B U ,   k T w i s i + i = 1 K H J U ,   k T w J ,   i s J ,   i + n U ,   k
and the signals received by the eavesdropper could be expressed as:
y E = k = 1 K H B E T w k s k + n E
in which H B E = h B E + G B R P h R E , H B U , k = h B U ,   k + G B R P h R U ,   k , H J U ,   k = h J U ,   k + G J R P h R U ,   k , P = d i a g ( v ) . The symbol n U ,   k ~ C N ( 0 , σ U ,   k 2 ) , n E ~ C N ( 0 , σ E 2 ) represented the thermal noise of the device k and eavesdropper, respectively, in which CN denoted the distribution of a circularly symmetric complex gaussian random vector. Hence, the desired signal rate of the device k and the wiretap signal rate at the eavesdropper for the device k were, respectively, given by:
R U ,   k = log 2 ( 1 + | H B U ,   k T w k | 2 i k K | H B U ,   k T w i | 2 + i = 1 K | H J U ,   k T w J ,   i | 2 + σ U ,   k 2 )
R E ,   k = log 2 ( 1 + | H BE , k T w k | 2 i k | H BE T w i | 2 + σ E 2 )
Regarding the definition in [34], the secrecy rate of the device k could be expressed as:
R S ,   k = R U ,   k R E ,   k

2.2. Channel Model

In the discussed system model, the channel that was considered consisted of two components: the line-of-sight (LoS) channel and the single-bounce non-LoS (NLoS) channel [35,36]. This was the same as that described in [35], where the channel vector could be modeled as:
G / h = g 0 a P ( θ 0 R X , φ 0 R X ) a P H ( θ 0 T X , φ 0 T X ) + 1 M p d = 1 M p g d a P ( θ d R X , φ d R X ) a P H ( θ d T X , φ d T X )
h = g 0 a P ( θ 0 T X , φ 0 T X ) + 1 M P d = 1 M p g d a P ( θ d T X , φ d T X )
in which M P denotes the number of multiple paths, θ T X ( φ T X ) denotes the vertical (horizontal) Angle of Departure (AoD), and θ R X ( φ R X ) denotes the vertical (horizontal) Angle of Arrival (AoA), respectively. Moreover, g is the large-scale fading coefficients, in which we could assume that g ~ C N ( 0 , 10 P L / 10 ) , P L = 30.18 26 log 10 ( d s ) , and d s is the distance between the transmitter and receiver. Furthermore, a P ( θ , φ ) represents the steering vectors of UPA, which can be expressed by:
a P ( θ , φ ) = [ 1 , e j 2 π d 1 λ sin θ cos φ , , e j 2 π d 1 ( N 1 1 ) λ sin θ cos φ ] T [ 1 , e j 2 π d 2 λ cos θ , , e j 2 π d 2 ( N 2 1 ) λ cos θ ] T
in which N 1 , N 2 represents the number of array elements along the UPA side, respectively. d 1 , d 2 is the inter-element spacing along the UPA side, respectively. In this paper, the inter-element spacing was set as the half-wavelength, i.e., d 1 = d 2 = λ / 2 .
As we know, the CSI of the RIS-assisted systems could be accurately obtained through several channel estimation techniques in recent works, e.g., [37]. Hence, it was assumed that the CSI of legitimate channels ( G B R , h I U ,   k and h B U ,   k ) could be accurately obtained. However, the CSI of illegitimate channels ( h B E , h R E , G J R , h J U ,   k ) were unavailable for accurate estimation by BS due to its lack of cooperation with the illegitimate nodes. To account for this effect on the system, a given angle-based range was adopted to characterize the illegitimate CSI [38]. The coupled angular uncertainties were defined as { Δ E , Δ J } , which was modeled as:
Δ E = { h i | θ i E [ θ i , L E , θ i , U E ] , φ i E [ φ i , L E , φ i , U E ] , | g i E | [ | g i , L E | , | g i , U E | ] , i ( R E , B E ) }
Δ J , h = { h J U , k | θ k J [ θ k , L J , θ k , U J ] , φ k J [ φ k , L J , φ k , U J ] , | g k J | [ | g k , L J | , | g k , U J | ] , k }
Δ J , G = { G J R | θ G J , T [ θ G , L J , T , θ G , U J , T ] , φ G J , T [ φ G , L J , T , φ G , U J , T ] , θ G J , R [ θ G , L J , R , θ G , U J , R ] , φ G J , R [ φ G , L J , R , φ G , U J , R ] , | g G J | [ | g G , L J | , | g G , U J | ] , k }
in which Δ J = { Δ J , h , Δ J , G } , θ L and θ U denote the lower and upper bounds of vertical AoA, respectively. φ L and φ U denote the lower and upper bounds of horizontal AoA, respectively. g L and g U denote the lower and upper bounds of the channel gain amplitude, respectively.

2.3. Problem Formulation

In order to ensure the security of IoT wireless communication, a sum secrecy rate maximization problem in the worst-case was formulated in this section. Namely, we aimed to maximize the sum achievable secrecy rate by jointly designing BS’s active beamforming vector { w k } k = 1 K and RIS’s reflect phase shift matrix v to mitigate the impact of jamming and eavesdropping attacks, with the imperfect angular CSI Δ E , Δ J and no knowledge of the jamming beamforming. Furthermore, the BS’s maximum transmits power constraint, and the RIS unit-modulus constraint (UMC) was considered. Hence, the optimization problem could be formulated as follows:
max w , v min Δ J , Δ E k R S ,   k ( w , v ) s . t . C 1 : k w k 2 P m a x C 2 : | v i | = 1 , i
in which W = { w 1 , w 2 , , w K } represents BS’s active beamforming matrix. Obviously, the formulated optimization problem was non-convex and NP-hard, which was complex and challenging to be directly solved. Accordingly, robust E-SLNR beamforming was proposed to reduce the computational complexity and the impact of imperfect angular channel state information in the following section. Moreover, the GA-TS method was improved for handling the formulated complex optimization problem to design active beamforming and the reflect phase shift.

3. Robust Scheme

3.1. Robust Transmit Beamforming Design

Differing from the conventional SLNR beamforming, this paper proposes E- SLNR beamforming, which takes the malicious jamming power and the eavesdropped signal power into account. The specific expression for this is as follows:
E - SLNR k = | H B U ,   k T w k | 2 i k K | H B U ,   i T w k | 2 + | H B E w k | 2 + i = 1 K | H J U ,   k T w J ,   i | 2 + σ k 2
in which the numerator in Equation (13) represents the desired signal power received by the device k, the first term of the denominator in Equation (13) denotes the inter-user interference power, the second term of the denominator in Equation (13) represents the signal power received by the eavesdropper, the third term of the denominator in Equation (13) denotes the malicious jamming power, and the final term of the denominator in Equation (13) represents the thermal noise of the device k.
Based on fairness, it was assumed that the transmit power for each device was equal. When the reflect phase shift matrix v was given, according to the E-SLNR beamforming, the formulated optimization problem in (12) could approximately be relaxed into the following E-SLNR maximization problem:
max w   min Δ J , Δ E E - SLNR k = w k H H B U , k * H B U , k T w k w k H [ i k K H B U , i * H B U , i T + H B E * H B E T + ( D j , k + σ k 2 ) / P k ] w k   s . t . w k 2 = P k
in which D j ,   k = i = 1 K | H J U ,   k T w J ,   i | 2 represents the jamming power received by device k and P k = P max / M denotes the transmit power for device k. However, due to the imperfect CSI, D j , k and H B E * H B E T could not be obtained accurately. Hence, active beamforming could not be solved directly. The upper bound of D j , k could be obtained by the Cauchy–Schwarz inequality as:
D j , k i = 1 K p ^ J , i H J U , k T H J U , k *
in which p ^ J , i represents the estimation of the jamming power for device i, which can be estimated by the rotational invariance techniques [39]. Furthermore, H J U , k T H J U , k * could be expanded as:
H J U , k T H J U , k * = h J U , k T h J U , k * + 2 Re { h R U , k T P G J R T h J U , k * } + h R U , k T P G J R T G J R * P * h R U , k * = H J U , k + 2 Re { h R U , k T P G R U , k } + h R U , k T P Φ J R P * h R U , k *
in which H J U , k = h J U , k T h J U , k * ,   G R U , k = G J R T h J U , k * ,   Φ J R = G J R T G J R * . Moreover, the coupled angular uncertainties Δ J could be rewritten as:
Λ J = { H J U , k , G R U , k , Φ J R | Δ J }
According to [40], any imperfect CSI in the angular uncertainty set could be expressed as the combination of discrete elements. Thus, when the uncertainty region based on angular information was known, we could uniformly sample the angles in a set of Λ J as:
θ ( i 1 ) = θ L + ( i 1 1 ) Δ θ , i 1 = 1 , , Q 1 φ ( i 2 ) = φ L + ( i 2 1 ) Δ φ , i 2 = 1 , , Q 2
in which Q 1 M 1 and Q 2 M 2 represent the sample number of θ and φ , respectively. Δ θ = ( θ U θ L ) / ( Q 1 1 ) , and Δ φ = ( φ U φ L ) / ( Q 2 1 ) .
As proved in [41], the robust form of H ˜ JU , k , G ˜ R U , k , Φ ˜ JR could be expressed as:
H ˜ J U , k = i 1 = 1 L 1 i 2 = 1 L 2 ( 1 / L ) h J U , k ( i 1 , i 2 ) , T h J U , k ( i 1 , i 2 ) , *
G ˜ R U , k = i 1 = 1 L 1 i 2 = 1 L 2 i 3 = 1 N 1 i 4 = 1 N 2 ( 1 / L N ) G J R ( i 1 , i 2 , i 3 , i 4 ) , T h J U , k ( i 1 , i 2 ) , *
Φ ˜ J R = i 1 = 1 L 1 i 2 = 1 L 2 i 3 = 1 N 1 i 4 = 1 N 2 ( 1 / L N ) G J R ( i 1 , i 2 , i 3 , i 4 ) , T G J R ( i 1 , i 2 , i 3 , i 4 ) , *
Hence, the robust upper bound of D j , k could be obtained as:
D ˜ j , k = i = 1 K p ^ J , i ( H ˜ J U , k + 2 Re { h R U , k T P G ˜ R U , k } + h R U , k T P Φ ˜ J R P * h R U , k * )
Similarly, the robust form of H BE * H BE T could be expressed as:
Ψ ˜ = Φ ˜ B E + 2 Re { G B R * P * G ˜ R E } + G B R * P * Φ ˜ R E P G B R T
in which:
Φ ˜ B E = i 1 = 1 M 1 i 2 = 1 M 2 ( 1 / L ) h B E ( i 1 , i 2 ) , * h B E ( i 1 , i 2 ) , T
G ˜ R E = i 3 = 1 N 1 i 4 = 1 N 2 ( 1 / N ) h R E ( i 3 , i 4 ) , * h B E ( i 1 , i 2 ) , T
Φ ˜ R E = i 3 = 1 N 1 i 4 = 1 N 2 ( 1 / N ) h R E ( i 3 , i 4 ) , * h R E ( i 3 , i 4 ) , T
Thus, by substituting D ˜ j , k and Ψ ˜ into the optimization problem in (14), the worst-case E-SLNR maximization problem could be rewritten as:
max w   E - SLNR k = w k H H B U , k * H B U , k T w k w k H [ i k K H B U , i * H B U , i T + Ψ ˜ + ( D ˜ j , k + σ k 2 ) / P k ] w k   s . t . w k 2 = P k
According to [42], the problem could be resolved as:
w k = P k max . eigenvector ( [ i k K H B U , i * H B U , i T + Ψ ˜ + ( D ˜ j , k + σ k 2 ) / P k ] 1 H B U , k * H B U , k T )
in which the E-SLNR beamforming w k is proportional to the eigenvector corresponding to the maximum eigenvalue of the matrix. This could be directly solved using tools in MATLAB, such as the function eigs [43].

3.2. GA-TS Method

In this section, the method for obtaining the reflect phase shift matrix v and the joint optimization algorithm is studied. According to (28), the close-form solution of v could not be obtained. Namely, when the E-SLNR beamforming w was given, the reflect phase shift matrix v could not be obtained directly. Due to the discreteness of the phase shifts, we propose utilizing the GA to solve this problem.
We took the discrete phase shifts of RIS as the individual gene of the population and the sum secrecy rate of the IoT system as the fitness. Through a continuous iterative crossover and mutation, we could obtain the fittest individual that maximized the sum secrecy rate. Compared to traditional GA [31], a tabu search (TS) was introduced to accelerate the convergence speed of the algorithm. In each generation, the fittest individual gene of the population was recorded in the tabu table if the gene had not been recorded yet. In other words, the tabu table recorded the local optimal solutions. With a continuous iteration, the fitness of the genes recorded in the tabu table became better and better. Furthermore, after the process of the crossover and mutation, the child genes could be mutated if the child genes already existed in the tabu table. Specifically, only a small portion of the child genes underwent mutations to explore better solutions. In addition, the length of the tabu table was fixed. Thus, when the tabu table was full, the initial value could be overwritten by the new value. Through the TS, the algorithm could avoid falling into local optima and converge faster. The specific process of the GA-TS is shown in Algorithm 1.
Algorithm 1: The Proposed GA-TS Algorithm
1: Initialize the GA parameters: Population size N p , Crossover probability p c , Mutation probability p m u t , Number of generations N g , Number of elites N f , Number of participants in tournament N t ;
2: Randomly generate the reflect phase shift matrix v as the individuals of the first generation;
3: Compute the robust beamforming w by (28);
4: Compute the achievable sum secrecy rate as fitness of each individual;
5: repeat
6: Elitism: Select the N f fittest individual genes directly as the child genes;
7: Tournament: Randomly select the N t individual to compare their fitness, use the fittest individual as a parent, and repeat until N p - N f parents are selected;
8: Crossover Operator: Randomly match parents genes, and generate the child genes by crossing the selected parents with probability p c ;
9: Mutation Operator: Randomly select child genes for mutation with probability p m u t ;
10: Tabu Search: Compare the child genes on the tabu table. If the gene is found in the tabu table, mutate the gene;
11: Compute the w and the fitness of each individual;
12: Record the fittest v * into the tabu table;
13: until the maximum number of generations is reached.
14: Return the fittest w * , v * .

4. Simulation Results

In this section, simulation results are provided to evaluate the performance of the improved GA-TS method and proposed robust scheme. We assumed that the BS served two users, namely K = 2, in which the antenna number of BS was set as M = 8 × 8 . Moreover, the antenna number of the jammer was set as L = 4 × 4 , and the reflect units’ number of RIS was set as N = 8 × 8 . In addition, the position of BS was set as (0,0,0), the position of users was set as (20,15,0) and (25,5,0), the position of RIS was set as (20,0,30), while the position of eavesdropper was set as (60,−15,0) and the position of jammer was set as (300,0,0), respectively. As shown in [10], the carrier frequency was considered at 5.8 GHz, the noise power was set as σ U , k 2 = σ E 2 = 80   dBm . Furthermore, the transmitting power of BS was set as, P M a x = 30   dBm , and the jamming power of the jammer was set as P J , M a x = 40   dBm .
Figure 2 depicts the comparison of the proposed GA-TS and the conventional GA for convergence [31]. As shown, the population size was set as 30, 60 and 100, respectively. In addition, the crossover probability was set as p c = 0.6 , the mutation probability was set as p m u t = 0.8 , the number of elites was set as N f = 2 , and the number of participants in the tournament was set as N t = 5 . As shown in Figure 2, under the same population size, the proposed GA-TS converged faster and achieved better fitness compared to the conventional method. Because of the introduction to TS, this population could escape from the local optimal solution faster and accelerate the convergence. Meanwhile, with the population size increasing, the convergence speed of the method was faster, and better fitness could be obtained. Furthermore, the increase in the population size corresponded to an increase in attempts to the optimal solution, which led to a decrease in the gain of TS.
Figure 3 shows the comparison of the sum desired signal rate, sum wiretap signal rate and sum secrecy rate of the proposed E-SLNR, using the uncertainty angular region Δ E = Δ J = 2 , 4 , 6 , 8 . Due to the uncertainty angular region, the direction of the sum rate (i.e., sum desired signal rate, sum wiretap signal rate and sum secrecy rate) change was unknown. As shown, with the uncertainty angular region increasing, there was no significant change in the sum rate. Due to the adoption of the robust form, although the sum rate generally showed a downward trend when the uncertainty angular region increased, there was no sharp fluctuation. Namely, the robustness of the proposed scheme was demonstrated.
Figure 4 shows the comparison of the sum secrecy rate versus the number of RIS units with a different scheme. The uncertainty angular region was set at 4 . We compare dthe performance of the proposed scheme with the following scheme: (1) ZF with RIS: under the assistance of RIS, BS was set as the ZF beamforming with an estimated illegitimate CS; (2) SLNR with RIS: under the assistance of RIS, BS was set as the traditional SLNR beamforming with an estimated illegitimate CS; (3) Ideal E-SLNR with RIS: under the assistance of RIS, BS was set as the proposed E-SLNR beamforming with an exact illegitimate CS; (4) E-SLNR with random RIS: BS was set as the proposed E-SLNR beamforming with a random reflect phase shift matrix of RIS and an estimated illegitimate CSI. As expected, the numerical results of the proposed robust scheme were better compared to the ZF with RIS and the SLNR with RIS. Because ZF beamforming requires accurate channel information to null out the wiretap rate, and traditional SLNR does not consider the impact of interference. As the larger number of RIS units was set, the higher sum secrecy rate of the proposed scheme could be obtained. This can be explained be the fact that more RIS units exploit more degrees of freedom to enhance the desired signal and reduce the impact of malicious nodes. Compared to the E-SLNR with random RIS, the validity of the optimization method of the proposed robust scheme was verified. Due to the impact of the random reflect phase shift matrix of RIS, which caused RIS not to enhance the desired signal, the sum secrecy rate of E-SLNR with random RIS could not be improved with the increase in the number of RIS units. Moreover, due to the fact that traditional SLNR did not consider jamming power, its sum secrecy rate was very low and was not affected by the number of RIS units.

5. Conclusions

In this paper, to counter simultaneous jamming and eavesdropping attacks, we investigated a robust scheme for IoT’s secure communication with support from UAV-assisted RIS. Specifically, considering the impact of imperfect angular CSI, a sum secrecy rate maximization problem in the worst case was formulated subject to the maximum transmission power constraint of BS and the UMC of RIS. Furthermore, we improved a robust E-SLNR beamforming for the reduction in the computation complexity and the impact of interference, eavesdropping and jamming simultaneously. Finally, a GA-TS method was proposed to jointly optimize the active beamforming of BS and the phase shift matrix of the RIS. The numerical results suggested that the proposed GA-TS method had a better performance compared to the conventional GA method. Moreover, the robustness of the proposed scheme was demonstrated.
For future works, the IoT wireless communication network assisted by multiple UAVs with RISs was researched. In this system, a higher performance of anti-jamming and anti-eavesdropping could be obtained. However, the channel model became more complex, and computational complexity exponentially increased. Thus, traditional heuristic algorithms might not be able to provide results promptly, and artificial intelligence methods, such as neural networks, deep learning, reinforcement learning, etc., need to be introduced.

Author Contributions

Conceptualization, Y.C., Y.Z. and P.Q.; methodology, P.Q. and Y.S.; validation, P.Q., Y.S.; investigation, P.Q. and X.Y.; writing—original draft preparation, P.Q.; writing—review and editing Y.C., Y.Z., X.Y. and Y.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

Description of the parameters
ParameterDefinition
L M Antenna numbers of jammer/BS
L 1 / L 2 Antenna numbers of jammer along the X/Y axis
M 1 / M 2 Antenna numbers of BS along the X/Y axis
N Unit numbers of RIS
N 1 / N 2 Unit number of array elements along the X/Y axis
w k Transmit beamforming vector of the BS
w J , k Jamming beamforming vector to k -th device
v Reflect phase shift matrix of RIS
n U ,   k / n E Thermal noise of k -th device/eavesdropper
G B R / h B U , k / h B E Channel vector between BS and RIS/ k -th device/eavesdropper
h R U , k / h R E Channel vector between RIS and k -th device/eavesdropper
G J R / h J U , k Channel vector between jammer and RIS/ k -th device

References

  1. Tran, D.H.; Nguyen, V.D.; Chatzinotas, S.; Vu, T.X.; Ottersten, B. UAV Relay-Assisted Emergency Communications in IoT Networks: Resource Allocation and Trajectory Optimization. IEEE Trans. Wirel. Commun. 2022, 21, 1621–1637. [Google Scholar] [CrossRef]
  2. Ericsson. Ericsson Mobility Report: November 2019; Ericsson: Stockholm, Sweden, 2019. [Google Scholar]
  3. Wang, W.; Li, X.; Zhang, M.; Cumanan, K.; Ng, D.W.K.; Zhang, G.; Tang, J.; Dobre, O.A. Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming. IEEE Trans. Commun. 2020, 68, 4476–4489. [Google Scholar] [CrossRef]
  4. Liao, N.; He, P.; Du, Y.; Zhang, Y.; Chen, Y.; Liang, T. Joint mission planning and spectrum resources optimization for multi-UAV reconnaissance. IET Commun. 2023, 17, 324–335. [Google Scholar] [CrossRef]
  5. Wu, D.; Zhang, Y.; Chen, Y. Joint Optimization Method of Spectrum Resource for UAV Swarm Information Transmission. Electronics 2022, 11, 3372. [Google Scholar] [CrossRef]
  6. Liu, G.; Quan, W.; Cheng, N.; Gao, D.; Lu, N.; Zhang, H.; Shen, X. Softwarized IoT Network Immunity Against Eavesdropping With Programmable Data Planes. IEEE Internet Things J. 2021, 8, 6578–6590. [Google Scholar] [CrossRef]
  7. Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. Accelerated IoT Anti-Jamming: A Game Theoretic Power Allocation Strategy. IEEE Trans. Wirel. Commun. 2022, 21, 10607–10620. [Google Scholar] [CrossRef]
  8. D’Andreagiovanni, F. Revisiting wireless network jamming by SIR-based considerations and multiband robust optimization. Optim. Lett. 2014, 9, 1495–1510. [Google Scholar] [CrossRef] [Green Version]
  9. Liu, X.; Yu, Y.; Li, F.; Durrani, T.S. Throughput Maximization for RIS-UAV Relaying Communications. IEEE Trans. Intell. Transp. Syst. 2022, 23, 19569–19574. [Google Scholar] [CrossRef]
  10. Sun, Y.; An, K.; Zheng, G.; Wong, K.K.; Chatzinotas, S.; Yin, H.; Liu, P. RIS-Assisted Robust Hybrid Beamforming Against Simultaneous Jamming and Eavesdropping Attacks. IEEE Trans. Wirel. Commun. 2022, 21, 9212–9231. [Google Scholar] [CrossRef]
  11. Mondal, A.; Junaedi, A.M.A.; Singh, K.; Biswas, S. Spectrum and Energy-Efficiency Maximization in RIS-Aided IoT Networks. IEEE Access 2022, 10, 103538–103551. [Google Scholar] [CrossRef]
  12. Björnson, E.; Özdogan, O.; Larsson, E.G. Intelligent reflecting surface versus decode-and-forward: How large surfaces are needed to beat relaying? IEEE Wirel. Commun. Lett. 2020, 9, 244–248. [Google Scholar] [CrossRef] [Green Version]
  13. Sun, Y.; An, K.; Luo, J.; Zhu, Y.; Zheng, G.; Chatzinotas, S. Intelligent Reflecting Surface Enhanced Secure Transmission Against Both Jamming and Eavesdropping Attacks. IEEE Trans. Veh. Technol. 2021, 70, 11017–11022. [Google Scholar] [CrossRef]
  14. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z.; Zhen, L.; Wong, K.-K. Robust Design for Intelligent Reflecting Surface-Assisted Secrecy SWIPT Network. IEEE Trans. Wirel. Commun. 2022, 21, 4133–4149. [Google Scholar] [CrossRef]
  15. An, K.; Chatzinotas, S.; Hu, Y.; Lin, Z.; Niu, H.; Wang, Y.; Zheng, G. Refracting RIS Aided Hybrid Satellite-Terrestrial Relay Networks: Joint Beamforming Design and Optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar]
  16. Chiaraviglio, L.; d’Andreagiovanni, F.; Choo, R.; Cuomo, F.; Colonnese, S. Joint Optimization of Area Throughput and Grid-Connected Microgeneration in UAV-Based Mobile Networks. IEEE Access 2019, 7, 69545–69558. [Google Scholar] [CrossRef]
  17. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Efficient Deployment of Multiple Unmanned Aerial Vehicles for Optimal Wireless Coverage. IEEE Commun. Lett. 2016, 20, 1647–1650. [Google Scholar] [CrossRef]
  18. Alkama, D.; Ouamri, M.A.; Alzaidi, M.S.; Shaw, R.N.; Azni, M.; Ghoneim, S.S.M. Downlink Performance Analysis in MIMO UAV-Cellular Communication With LOS/NLOS Propagation Under 3D Beamforming. IEEE Access 2022, 10, 6650–6659. [Google Scholar] [CrossRef]
  19. Ouamri, M.A.; Alkanhel, R.; Gueguen, C.; Alohali, M.A.; Ghoneim, S.S.M. Modeling and analysis of uav-assisted mobile network with imperfect beam alignment. Comput. Mater. Contin. 2023, 74, 453–467. [Google Scholar] [CrossRef]
  20. Pogaku, A.C.; Do, D.T.; Lee, B.M.; Nguyen, N.D. UAV-Assisted RIS for Future Wireless Communications: A Survey on Optimization and Performance Analysis. IEEE Access 2022, 10, 16320–16336. [Google Scholar] [CrossRef]
  21. Taniya, S.; Hina, T.; Ekram, H. Optimization of Wireless Relaying With Flexible UAV-Borne Reflecting Surfaces. IEEE Trans. Commun. 2021, 69, 309–325. [Google Scholar]
  22. Yao, Y.; Lv, K.; Huang, S.; Li, X.; Xiang, W. UAV Trajectory and Energy Efficiency Optimization in RIS-Assisted Multi-User Air-to-Ground Communications Networks. Drones 2023, 7, 272. [Google Scholar] [CrossRef]
  23. Tang, X.; Wang, D.; Zhang, R.; Chu, Z.; Han, Z. Jamming Mitigation via Aerial Reconfigurable Intelligent Surface: Passive Beamforming and Deployment Optimization. IEEE Trans. Veh. Technol. 2021, 70, 6232–6237. [Google Scholar] [CrossRef]
  24. Hou, Z.; Chen, J.; Huang, Y.; Luo, Y.; Wang, X.; Gu, J.; Xu, Y.; Yao, K. Joint Trajectory and Passive Beamforming Optimization in IRS-UAV Enhanced Anti-Jamming Communication Networks. China Commun. 2022, 19, 191–205. [Google Scholar] [CrossRef]
  25. Wang, D.; Zhao, Y.; He, Y.; Tang, X.; Li, L.; Zhang, R.; Zhai, D. Passive Beamforming and Trajectory Optimization for Reconfigurable Intelligent Surface-Assisted UAV Secure Communication. Remote Sens. 2021, 13, 4286. [Google Scholar] [CrossRef]
  26. Wang, W.; Tian, H.; Ni, W. Secrecy Performance Analysis of IRS-Aided UAV Relay System. IEEE Wirel. Commun. Lett. 2021, 10, 2693–2697. [Google Scholar] [CrossRef]
  27. Zheng, G.; Arapoglou, P.D.; Ottersten, B. Physical layer security in multibeam satellite systems. IEEE Trans. Wirel. Commun. 2012, 11, 852–863. [Google Scholar] [CrossRef]
  28. Lin, Z.; An, K.; Niu, H.; Hu, Y.; Chatzinotas, S.; Zheng, G.; Wang, J. SLNR-based Secure Energy Efficient Beamforming in Multibeam Satellite Systems. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 2085–2088. [Google Scholar] [CrossRef]
  29. Piya, P.; Simon, A.; Angela, D. On the equivalence between SLNR and MMSE precoding schemes with single-antenna receivers. IEEE Commun. Lett. 2012, 16, 1034–1037. [Google Scholar]
  30. Lee, D.; Jang, Y.; Jung, M.; Choi, S. SCLNR-based precoding scheme for multi-user MIMO SWIPT systems. IEEE Trans. Veh. Technol. 2019, 68, 12392–12395. [Google Scholar] [CrossRef]
  31. Souto, V.D.P.; Souza, R.D.; Uchoa-Filho, B.; Li, Y. Intelligent Reflecting Surfaces Beamforming Optimization with Statistical Channel Knowledge. Sensors 2022, 22, 2390. [Google Scholar] [CrossRef]
  32. Wu, Q.; Zhang, R. Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming. IEEE Trans. Wirel. Commun. 2019, 18, 5394–5409. [Google Scholar] [CrossRef] [Green Version]
  33. Khanduzi, R.; Sangaiah, A.K. Tabu search based on exact approach for protecting hubs against jamming attacks. Comput. Electr. Eng. 2019, 79, 106459. [Google Scholar] [CrossRef]
  34. An, K.; Lin, M.; Ouyang, J.; Zhu, W. Secure Transmission in Cognitive Satellite Terrestrial Networks. IEEE J. Sel. Areas Commun. 2016, 34, 3025–3037. [Google Scholar] [CrossRef]
  35. Sun, Y.; An, K.; Zhu, Y.; Zheng, G.; Wong, K.-K.; Chatzinotas, S.; Ng, D.W.K.; Guan, D. Energy-efficient hybrid beamforming for multi-layer RIS-assisted secure integrated terrestrial-aerial networks. IEEE Trans. Commun. 2022, 70, 4189–4210. [Google Scholar] [CrossRef]
  36. An, K.; Liang, T.; Zheng, G.; Yan, X.; Li, Y.; Chatzinotas, S. Performance Limits of Cognitive-Uplink FSS and Terrestrial FS for Ka-Band. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 2604–2611. [Google Scholar] [CrossRef]
  37. Zhou, G.; Pan, C.; Ren, H.; Wang, K.; Di Renzo, M.; Nallanathan, A. Robust beamforming design for intelligent reflecting surface aided miso communication systems. IEEE Wirel. Commun. Lett. 2020, 9, 1658–1662. [Google Scholar] [CrossRef]
  38. Sun, Y.; An, K.; Luo, J.; Zhu, Y.; Zheng, G.; Chatzinotas, S. Outage Constrained Robust Beamforming Optimization for Multiuser IRS-Assisted Anti-Jamming Communications With Incomplete Information. IEEE Internet Things J. 2022, 9, 13298–13314. [Google Scholar] [CrossRef]
  39. Schmidt, R. Multiple emitter location and signal parameter estimation. IEEE Trans. Antennas Propag. 1986, 34, 276–280. [Google Scholar] [CrossRef] [Green Version]
  40. Lin, Z.; Lin, M.; Huang, Y.; Cola, T.d.; Zhu, W.-P. Robust multi-objective beamforming for integrated satellite and high altitude platform network with imperfect channel state information. IEEE Trans. Signal Process. 2019, 67, 6384–6396. [Google Scholar] [CrossRef]
  41. Shi, W.; Ritcey, J. Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity. In Proceedings of the 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 7–10 November 2010; pp. 300–304. [Google Scholar]
  42. Sadek, M.; Tarighat, A.; Sayed, A.H. A leakage-based precoding scherne for downlink multi-user MIMO channels. IEEE Trans. Wirel. Commun. 2007, 6, 1711–1721. [Google Scholar] [CrossRef]
  43. Mathworks. Available online: https://www.mathworks.com/help/matlab/ref/eigs.html?s_tid=doc_ta (accessed on 20 February 2023).
Figure 1. System model.
Figure 1. System model.
Electronics 12 02507 g001
Figure 2. Convergence of the algorithms.
Figure 2. Convergence of the algorithms.
Electronics 12 02507 g002
Figure 3. Sum achievable rate versus uncertainty angular region Δ .
Figure 3. Sum achievable rate versus uncertainty angular region Δ .
Electronics 12 02507 g003
Figure 4. Sum secrecy rate versus the number of RIS units.
Figure 4. Sum secrecy rate versus the number of RIS units.
Electronics 12 02507 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qian, P.; Zhang, Y.; Yan, X.; Chen, Y.; Sun, Y. A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT. Electronics 2023, 12, 2507. https://doi.org/10.3390/electronics12112507

AMA Style

Qian P, Zhang Y, Yan X, Chen Y, Sun Y. A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT. Electronics. 2023; 12(11):2507. https://doi.org/10.3390/electronics12112507

Chicago/Turabian Style

Qian, Pengzhi, Yu Zhang, Xiaojuan Yan, Yong Chen, and Yifu Sun. 2023. "A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT" Electronics 12, no. 11: 2507. https://doi.org/10.3390/electronics12112507

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop