Skip to Content
SensorsSensors
  • Article
  • Open Access

7 February 2023

Physical-Layer Security with Irregular Reconfigurable Intelligent Surfaces for 6G Networks †

,
,
and
1
Department of Intelligence Media Engineering, Hanbat National University, Daejeon 34158, Republic of Korea
2
School of Internet of Things, Xi’an Jiaotong-Liverpool University, No. 111, Taicang Avenue, Taicang, Suzhou 215488, China
3
Department of Computer Engineering, Hanbat National University, Daejeon 34158, Republic of Korea
*
Authors to whom correspondence should be addressed.

Abstract

The goal of 6G is to make far-reaching changes in communication systems with stricter demands, such as high throughput, extremely low latency, stronger security, and ubiquitous connectivity. Several promising techniques, such as reconfigurable intelligent surfaces (RISs), have been introduced to achieve these goals. An RIS is a 2D low-cost array of reflecting elements that can adjust the electromagnetic properties of an incident signal. In this paper, we guarantee secrecy by using an irregular RIS (IRIS). The main idea of an IRIS is to irregularly activate reflecting elements for a given number of RIS elements. In this work, we consider a communication scenario in which, with the aid of an IRIS, a multi-antenna base station establishes a secure link with a legitimate single-antenna user in the presence of a single-antenna eavesdropper. To this end, we formulate a topology-and-precoding optimization problem to maximize the secrecy rate. We then propose a Tabu search-based algorithm to jointly optimize the RIS topology and the precoding design. Finally, we present simulation results to validate the proposed algorithm, which highlights the performance gain of the IRIS in improving secure transmissions compared to an RIS. Our results show that exploiting an IRIS can allow additional spatial diversity to be achieved, resulting in secrecy performance improvement and overcoming the limitations of conventional RIS-assisted systems (e.g., a large number of active elements).

1. Introduction

The goal of 6G is to revolutionize wireless systems with more enhanced requirements, such as very high data rates, very low latency, always-on broadband global network coverage, and intelligence [1]. To achieve these goals, several advanced wireless technologies, such as massive multiple-input and multiple-output (MIMO) transmission, cooperative communications, and cognitive radio, have been proposed. However, these techniques focus on processing signals to adapt to the wireless environment and are, in some ways, affected by the random and negative effects caused by the propagation environment. Recently, a reconfigurable intelligent surface (RIS) was introduced, and it has gained wide attention due to its ability to control the wireless environment. An RIS is a low-cost uniform array of passive reflecting elements where each element can adjust the amplitude and/or phase of any incident signal to make the propagation medium controllable. This characteristic can be exploited to constructively (or destructively) add different signals to enhance (or weaken) the overall signal received [2,3].
In effect, an RIS can be used to enhance the data rate and security, increase coverage, and improve the signal-to-noise ratio (SNR). There are existing RIS-related technologies, such as traditional reflecting surfaces [4], amplify-and-forward (AF) relays [5], and backscatter communication [6,7]. Compared to these techniques, an RIS has the following benefits. Firstly, the traditional reflecting surfaces have fixed phase shifts that cannot be changed, while the RIS is able to continuously change its phase shift. Secondly, while AF relays require a certain amount of power for signal propagation, an RIS passively reflects incident signals without any transmission power consumption. This makes RISs green and energy efficient. Thirdly, even though both RISs and backscatter communication implement the idea of passive communication, an RIS can be equipped with a large number of reflecting elements, while backscatter communication is usually equipped with few antennas due to cost and complexity limitations [8]. These significant advantages have gained the attention of researchers. RISs have been applied in several communication scenarios, such as massive device-to-device communications, secure communications in wireless networks, and wireless information and power transfer, and they have achieved interesting results.
Additionally, RISs have been implemented to tackle physical-layer security (PLS) issues in wireless systems, which make up one of the main research areas in wireless communications. Wireless signals pose broadcasting characteristics during transmission. Hence, security is one of the major concerns in future 6G networks, and with the advent of quantum computing, eavesdroppers have been poised to pose huge threats to wireless systems [9]. Several works integrating RISs and PLS have been introduced [8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24]. However, these studies considered an RIS-assisted system in which all reflecting/refracting elements were activated and employed in transmission (a so-called ‘regular RIS’). With a regular RIS, the system capacity can mainly be improved by increasing the total number of RIS elements [10]. However, this leads to very high channel estimation and feedback overhead, as well as complex beam design. Further, most existing works assumed that the power consumption of an RIS element is negligible. However, with a large number of RIS elements, RIS power consumption could not be negligible. In this regard, the number of RIS elements cannot be too large in real-world systems. Accordingly, in [25,26,27,28], an irregular RIS (IRIS), which significantly improved the system capacity with the limited number of active RIS elements, was introduced. An IRIS guarantees relatively low channel feedback and estimation overhead and a lower power consumption. To the best of our knowledge, the application of the notion of the IRIS to secure communication has been less investigated and studied compared to security problems in regular RIS-assisted systems, as discussed. Accordingly, we tackled a physical-layer security problem in an IRIS environment. Our main contributions are summarized as follows:
  • We investigate a secure communication scenario in which, with the help of an IRIS, a multi-antenna base station wants to transmit data to a legitimate single-antenna receiver in the presence of a single-antenna eavesdropper. Our aim is to guarantee secrecy by designing an effective precoder at the BS and the reflecting beamformer via the phase shifters at the IRIS.
  • We formulate a secrecy rate maximization problem to jointly design the precoder at the BS and the reflection coefficients at the IRIS in order to maximize the secrecy rate for given constraints.
  • We then propose a Tabu-search-based algorithm that can design the topology and precoders for the IRIS to heuristically achieve the maximum performance by efficiently avoiding the local maximum issue for a given formulated non-convex optimization problem.
  • Finally, through simulations, we verify that exploiting an IRIS with a limited number of reflecting elements can significantly improve the secrecy rate compared to that achieved with a regular RIS.
The rest of this paper is outlined as follows. Section 2 summarizes several related studies and compares them with our work. In Section 3, we describe our system model, including the eavesdropping scenario. We formulate the optimization problem to maximize the secrecy rate between the transmitter and receiver while considering the IRIS in Section 4. We discuss our proposed algorithm for solving the optimization problem in Section 5. The simulation results are provided in Section 6, and conclusions are finally drawn in Section 7.

3. System Model

Figure 1 describes an existing regular RIS network and the considered irregular RIS network. For both, we consider three nodes in the network: a base station, a legitimate user (Bob), and an eavesdropper (Eve). The existing regular RIS-assisted system, in which a BS with M antennas and a regular RIS with N s elements transmit data to a receiver (i.e., Bob) in the presence of an eavesdropper, is shown in Figure 1a. The regular RIS has all active reflecting elements arranged with a constant spacing on a regular surface. We consider an IRIS-assisted secure communication system. Figure 1b shows an example of an irregular RIS with N active elements selected out of N s elements ( N N s ) . Let Z = diag ( z ) denote the N s × N s matrix representing the topology of the RIS, where z = [ z 1 , z 2 , , z N s ] T . We define z n { 1 , 0 } as an indicator to represent the state of the n-th reflecting element in the IRIS, where ‘1’ indicates the active state (i.e., the corresponding RIS element is activated) and ‘0’ is used otherwise.
Figure 1. System model: RIS-assisted secure communication. (a) Regular RIS. (b) Irregular RIS.
The reflection coefficient matrix for N s grid points of the IRIS is given by
Θ = diag β 1 e j θ 1 , β 2 e j θ 2 , , β N s e j θ N s ,
where β n and θ n represent the reflection amplitude and phase shift of the n-th RIS element in the IRIS.
For practical hardware implementation, we assume a constant reflection amplitude and finite discrete phase-shift constraint at the RIS [24]. Specifically, n { 1 , 2 , , N s } , β n = 1 , and θ n takes discrete values from the quantized phase-shift set given by
F = 0 , 2 π 2 b , , 2 π 2 b ( 2 b 1 ) ,
where b is the number of bits used to quantize the finite discrete phase shifts.
The received signal at the legitimate receiver (i.e., Bob) is expressed as
y b = h b H Z Θ Gw x + n b ,
where x denotes the transmitted signal at the BS with the power constraint x 2 1 , n b indicates additive white Gaussian noise (AWGN) with zero mean and variance σ b 2 , G C N s × M is the channel coefficient matrix between the BS and RIS, h b C N s × 1 denotes the RIS–Bob channel coefficient vector, and w C M × 1 indicates the precoding vector.
Similarly, the received signal at the eavesdropper (i.e., Eve) is expressed as
y e = h e H Z Θ Gw x + n e ,
where n e indicates additive white Gaussian noise (AWGN) with zero mean and variance σ e 2 and h e C N s × 1 .
Note that the precoding vector w C M × 1 in (3) and (4), the reflection coefficient matrix Θ , and the topology of the IRIS Z (i.e., activation and inactivation pattern of the RIS elements) are our main design factors for maximizing the secrecy performance for the given system environment.
Thus, the secrecy rate of the IRIS-assisted secure communication is a function of w , Θ , and Z , and it is given by
R s w , Θ , Z = log 2 1 + h b H Z Θ Gw 2 σ b 2 log 2 1 + h e H Z Θ Gw 2 σ e 2 +
where [ · ] + = max { 0 , · } .

4. Problem Formulation for IRIS-Assisted Secure Communication

In this section, we introduce the problem formulation for IRIS-assisted secure communications. Note that the secrecy performance of the proposed IRIS-assisted system in (5) is a function of the IRIS topology and precoding. Thus, the topology and precoding should be carefully designed. In the following, we formulate the secrecy rate maximization. Let w denote the fully digital precoder at the BS. The transmission power at the BS is
P T = w 2 .
P T in (6) should be lower than or equal to the maximum allowable transmission power P. The secrecy rate maximization problem can be formulated as
( P 1 ) : max Z , w , Θ R s w , Θ , Z = max Z , w , Θ log 2 1 + h b H Z Θ Gw 2 σ b 2 log 2 1 + h e H Z Θ Gw 2 σ e 2 +
subject to   ( C 1 ) : P T P ,
( C 2 ) : θ n F , n = 1 , 2 , , N s ,
( C 3 ) : z n { 1 , 0 } , n = 1 , 2 , , N s ,
( C 4 ) : 1 T z = N ,
where (C1) denotes the transmission power constraint, (C2) denotes discrete phase-shift constraint, and (C3) and (C4) denote the constraint for the topology of the irregular RIS activation, where there are N ones (i.e., activation of the element) and N s N zeros (i.e., deactivation of the element) in the topology matrix Z .
Note that the objective function in (12), the phase-shift constraint (C2), and the IRIS topology constraints (C3) and (C4) are non-convex. Hence, directly solving (P1) is a non-trivial task. To address this issue, we reformulate (P1) for a given IRIS topology by separating the precoding design and the IRIS topology design. Then, for a particular topology Z p , the original problem (P1) reduces to
( P 2 ) : max w , Θ R s w , Θ , Z p = max w , Θ log 2 1 + h b H Z p Θ Gw 2 σ b 2 log 2 1 + h e H Z p Θ Gw 2 σ e 2 +
subject to   ( C 1 ) : P T P ,
( C 2 ) : θ n F , n = 1 , 2 , , N s ,
( C 3 ) : Z = Z p ,
where (C1’) and (C2’) denote the transmission power constraint and discrete phase-shift constraint, respectively, and (C3’) denotes the given IRIS topology.
Note that irregular RIS-assisted systems can be considered as regular RIS-assisted systems by assuming that N = N s and Z = I N . In other words, the activated elements in the irregular RIS are all assumed to be elements in the regular RIS. Fortunately, we can efficiently solve (P2) by using our proposed algorithm and can suboptimally solve (P1) for given IRIS topology candidates, which will be discussed in detail in the next section.

5. Proposed Algorithm for IRIS-Assisted Secure Communication

In this section, we introduce our proposed algorithm for solving (P1). In order to efficiently solve (P1), we propose an adaptive algorithm based on the Tabu search algorithm [29]. Tabu search is a metaheuristic searching algorithm that can efficiently avoid local minima (or maxima) for given optimization problems by exploiting diversification rules to drive the search into new regions of the searching space. Figure 2 briefly illustrates the main idea of our proposed algorithm, and the details are summarized in Algorithm 1.
Figure 2. Illustration of the proposed algorithm.
In Algorithm 1, for the given N s RIS elements, the RIS topology is irregularly initialized with a random selection of N active elements and N s N inactive elements at line 2 (i.e., Z i ). Note that we consider I N random topology initializations, and each initialization dynamically changes the active and inactive elements together. After the IRIS topology initialization at line 2, we consider I T minor topology changes for the given IRIS topology. For this, we randomly swap v ones for v zeros in the given Z i at line 5. At line 5, Z ( i , t ) denotes an instance of the IRIS topology at a given initialization and a given swap. We try these random swaps for I T times for the given Z i . Unlike an initialization, Z ( i , t ) has only minor changes compared with Z i .
Note that (P1) is reduced to (P2) for a given Z ( i , t ) . We solve (P2) by using K samples of Θ k at line 7. The effective channels for all candidates are calculated at line 8. At lines 9 and 10, the maximum ratio of transmission precoding is assumed, and the secrecy rates are calculated for all K samples. We then select the candidate with the maximum secrecy rate ( R temp ) and compare R temp with R max , which is updated at every iteration in the second for-loop after the initialization. After the second for-loop, we update the topology set T to avoid duplication. Finally, we select the best topology in the topology list with the maximum secrecy rate and use this one for the IRIS operation.
Algorithm 1 Adaptive IRIS Operation for Secrecy Enhancement
Require:   G , h b , h e , number of iterations I N and I T , number of samples K, swap value v,
  phase-shift set F , topology set T
Ensure: RIS Topology Z max
1:
for   i = 1 : I N do
2:
    Initialize the RIS topology Z by randomly selecting N ones and N s N zeros: Z i
3:
    Initialize R max = 0
4:
    for  t = 1 : I T  do
5:
        Randomly swap v ones for v zeros among the diagonal elements of Z i : Z ( i , t )
6:
        /* We are ready to solve (P2) for the given Z ( i , t ) */
7:
        Randomly generate K samples { Θ k } k = 1 K
8:
        Calculate the effective channel for Bob and Eve
9:
        Calculate the precoder’s coefficients { w k } k = 1 K
10:
      Calculate the secrecy rate R s ( w k , Θ k , Z ( i , t ) ) k = 1 K
11:
       R temp = max k R s ( w k , Θ k , Z ( i , t ) ) k = 1 K
12:
      if  R temp > R max  then
13:
            R max = R temp
14:
            k = arg max k R s ( w k , Θ k , Z ( i , t ) ) k = 1 K
15:
      end if
16:
    end for
17:
    Set Z i = Z ( i , k ) , w = w k , Θ = Θ k
18:
    Add Z i with R s ( w , Θ , Z i ) in T /* Z i , R s ( w , Θ , Z i ) T */
19:
end for
20:
i = arg max i R s ( w , Θ , Z i ) for Z i T
21:
Return Z max = Z i

Computational Complexity Analysis

It is important to discuss the computational complexity when we consider non-convex optimizations such as (P1). By using the proposed Algorithm 1, we can find the best IRIS topology for the given parameters.
We solve (P1) by considering sub-problem (P2), and solving (P2) requires K × 2 b N computations. We repeat this to solve (P2) for I N × I T IRIS topology candidates. Thus, it requires an approximate total of I N I T K × 2 b N computations to solve (P1). Practically, it is important to analyze the complexity based on the number of RIS elements N s , since the size of the RIS is a critical issue for system performance and deployment. Our proposed algorithm can provide constant computational complexity O ( 1 ) in the best case when we set I N , I T , K, and N to be independent of N s , where O ( · ) represents big O notation for computational complexity analysis [30]. However, it is worth noting that the computational complexity can be O ( 2 N s ) in the worst case if we consider all of the possible topology candidates (i.e., I N × I T = 2 N s ).
Remark 1. 
Note that our proposed algorithm is designed based on Tabu search, a metaheuristic searching algorithm that is commonly used to solve non-convex optimizations [29]. In the proposed algorithm, we exploit the diversification to explore a new searching space and, thus, heuristically approach the suboptimum by avoiding local maxima. Our algorithm searches I N possible RIS topologies and I T swap cases. Thus, for a given topology and a swap case, we have K × 2 b N candidates in each iteration. Therefore, the total number of candidates in our proposed algorithm is I N I T K × 2 b N , and it can be set by manually adjusting I N and I T . The proposed algorithm reaches an exponential computational complexity in the worst case, but usually, we can achieve better performance compared with that of a regular RIS, even for constant values of I N and I T and a small value for N. Thus, the proposed algorithm can even be applicable to the hundreds of reflecting elements in an RIS, since we only activate a limited number of reflecting elements in the RIS. Further, the proposed algorithm requires less computation and power consumption during channel estimation and overall operation, respectively, compared to an RIS.

6. Numerical Results

In this section, we numerically evaluate the performance of the proposed algorithm on irregular RIS-assisted communication systems. We first introduce our simulation setup and discuss simulation results in detail.

6.1. Simulation Setup

For the simulations, we considered an independent Rayleigh fading channel model to account for the small-scale fading of all channel coefficients, where each channel coefficient followed a Gaussian distribution with zero mean and unit variance. For the large-scale fading, we considered the effective path loss while considering antenna gain and distances together. The large-scale fading coefficients of BS–IRIS–Bob and BS–IRIS–Eve are expressed, respectively, as
L b = Γ b d BR α BR d RU α RU ,
L e = Γ e d BR α BR d RE α RE
where d B R , d R U , and d R E are the distance between BS and IRIS, the IRIS and Bob, and RIS and the eavesdropper respectively. Γ b and Γ e represent the effects of channel fading and antenna gain on Bob’s and Eve’s channels respectively. Additionally, we assume that CSI is available at the BS. The path loss exponent is denoted by α B R , α R U , and α R E . We set the parameters as follows: Γ b = Γ e = 60 dB, α B R = 2 , and α R U = α R E = 3 . We set the distances between the BS and Bob and the BS and Eve as d E = 145 m and d B = 150 m, respectively. The distance between the RIS and Eve was set to d R E = 5 m. Then, the distance between the BS and RIS was d BR = ( d E 2 + d R E 2 ) . We set the noise power to σ b 2 = σ e 2 = 80 dBm. We considered the quantized bit number b = 1 . For the proposed algorithm, we considered I N = 10 , I T = 40 , K = 200 , and v = 3 . During the simulations, we considered a regular RIS as a baseline scheme for comparison with our proposed algorithm for the irregular RIS (i.e., IRIS).

6.2. Secrecy Performance

In this subsection, we take a look at the secrecy rate performance of the IRIS-assisted secure communication system in comparison with that of a regular RIS.
Figure 3 shows the secrecy rate versus transmission power when the BS was equipped with multiple antennas. All elements (i.e., N s = 40 ) were activated for the regular RIS, but only half of the elements (i.e., N = 20 ) were activated for the irregular RIS (IRIS). In other words, we implemented the IRIS with N s = 40 elements, out of which we randomly activated N = 20 elements. We considered two cases in which the base station was equipped with multiple antennas: M = 4 and M = 8 (in Figure 3a) or M = 16 and M = 32 (in Figure 3b). The secrecy rate increased for both the regular RIS and irregular RIS as the transmission power increased. We observed in both cases that the IRIS outperformed the regular RIS in the high-transmission-power regime (≥30 dBm), even though we only considered half of the activated reflecting elements in the IRIS. This was because exploiting the IRIS allowed us to achieve additional spatial diversity in terms of reflecting elements; thus, it contributed to boosting the secrecy performance of the IRIS. In addition, these performance gains between the regular RIS and IRIS increased when the transmission power increased: 17 % (30 dBm) → 69 % (40 dBm) for M = 4 , 5 % (30 dBm) → 42 % (40 dBm) for M = 8 , 2 % (30 dBm) → 34 % (40 dBm) for M = 16 , and 10 % (30 dBm) → 37 % (40 dBm) for M = 32 . As the number of antennas increased, the performance gain between the regular RIS and IRIS decreased, since we only considered transmission beamforming [31]. Note that the IRIS could effectively improve the secrecy rate with a limited number of reflecting elements when we considered high transmission power and a lower number of antennas.
Figure 3. Secrecy rate versus transmission power when the BS was equipped with multiple antennas: M = 4 , M = 8 , M = 16 , and M = 32 . (a) Secrecy rate for M = 4 , M = 8 , N = 20 , and N s = 40 . (b) Secrecy rate for M = 16 , M = 32 , N = 20 , and N s = 40 .
Figure 4 shows the impact of the number of active elements on the secrecy rate. We set the transmission power to P T = 30 dBm. We set the swap value to v = 2 and reduced it to 1 after half of the number of iterations for fine-tuning. The regular RIS with all N s = 20 elements was used as a benchmark. In Figure 4a, we compare the secrecy rate performance of different regular RIS scenarios with that of the IRIS. We simulated the IRIS with M = 4 antennas. We also considered several regular RIS-based cases in which the BS was equipped with M = 4 and M = 8 antennas. We set the total number of RIS elements to N s = 20 and randomly activated N < N s reflecting elements. Firstly, we observed that exploiting the IRIS can be a solution for the improvement of secrecy performance by using a limited number of reflecting elements. In addition, we observed that the IRIS with M = 4 antennas underperformed when 2∼4 elements were randomly activated, but performed better when we activated more than six elements. Further, we observed that the secrecy performance of the IRIS with M = 4 was almost close to that of the RIS with M = 8 antennas. Specifically, if active elements in the IRIS with M = 4 were carefully selected (e.g., 18 out 20 elements are activated in Figure 4a), the secrecy performance could be maximized. Similarly, in Figure 4b, we simulated the IRIS with an increased number of antennas: M = 4 to M = 32 . We also reconsidered the baseline regular-RIS-based cases in which the BS was equipped with M = 32 and M = 64 antennas. In this simulation, we set the total number of RIS elements to N s = 20 and randomly activated N < N s reflecting elements. We can observe similar trends in Figure 4a,b. The secrecy rate of the IRIS with M = 32 antennas underperformed for 2∼8 active elements of the IRIS, but performed better when we activated more than 10 elements of the IRIS.
Figure 4. Secrecy rate versus the number of active reflecting elements at N s = 20 and P T = 30 dBm. (a) Secrecy rate of the irregular RIS with M = 4 and the regular RIS for reference with M = 4 , 8 . (b) Secrecy rate of the irregular RIS with M = 32 and the regular RIS for reference with M = 32 , 64 .
In Figure 4a,b, it can be observed that the secrecy rate was improved when the reflecting elements were selected randomly. As we increased the number of active elements in the IRIS, the secrecy rate increased, slowed down, and eventually dropped, approaching that of the regular RIS. Thus, in practice, an IRIS should be carefully designed to guarantee the desired secrecy rate. Even though the RIS with more antennas (e.g., M = 64 ) performed better compared with the IRIS with fewer antennas (e.g., M = 32 ), we could achieve almost the same secrecy rate as that of the RIS equipped with more antennas by using the IRIS with only a lower number of antennas. Note that, for given N s , the minimum required number of active elements needed to outperform the secrecy performance of the RIS increased when the number of antennas at the BS increased. This was because the performance gain between the regular RIS and IRIS decreased as the number of antennas increased, as we discussed in Figure 3.

6.3. Discussion

In this subsection, we briefly mention the channel estimation and scheduling issues of our work from the perspective of the medium access control (MAC) layer. In order to effectively exploit the advantages of irregular reconfigurable intelligent surfaces, it is important to accurately estimate the channels to and from the RIS. However, this is subject to challenge, since it requires advanced signal processing techniques, such as indirect estimation of channel coefficients due to the passive elements of the RIS. Recently, several studies investigated signal processing and channel estimation techniques for RISs [32,33]. In addition, from the perspective of the MAC layer, the frame structure should be carefully designed while relying on the duplexing mode, pilots, and multiuser scheduling [34]. Accordingly, designing advanced MAC layer protocols for jointly considering channel estimation, user scheduling, and the operation of irregular reconfigurable intelligent surfaces could be one of the possible future research directions of our work.

7. Conclusions

In this paper, we investigated guaranteeing secure communications by using an IRIS. The secrecy rate of traditional RIS systems is restricted by the number of elements in the RIS. Specifically, in order to increase the secrecy rate, the number of elements should be increased. However, this might not be practical. To tackle this issue, we analyzed an irregular RIS (i.e., IRIS) with a limited number of elements to enhance the secrecy performance. To this end, we formulated a secrecy rate maximization problem and proposed an optimization framework to solve it. Through simulations, we validated that an IRIS that used only a limited number of elements could sufficiently enhance the secrecy rate past that of a regular RIS. We observed that by using a lower number of reflecting elements that were randomly distributed on an RIS, we could achieve an extra degree of freedom, which could enhance the secrecy performance. For example, the secrecy rate of an irregular RIS increased by 42 % at a 40 dBm transmission power with eight transmission antennas. This was achievable with relatively low channel estimation and feedback overhead if we used the proposed algorithm. We also noticed that the number of active elements should be carefully selected during system design. Several open problems exist and are left for future work. For example, increasing the quantization bits, considering continuous phase shifts, and designing MAC layer protocols for IRIS-assisted secure communication systems can be some of the possible future research directions.

Author Contributions

Conceptualization, E.O.F. and I.B.; formal analysis, E.O.F.; investigation, E.O.F. and B.-H.O.; supervision, T.K. and I.B.; project administration, B.-H.O. and T.K.; writing—original draft preparation, E.O.F.; writing—review and editing, I.B. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by a National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. 2022R1F1A1076126).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors thank the support from National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. 2022R1F1A1076126).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
6GSixth Generation
AFAmplify-and-Forward
ANArtificial Noise
AOAlternating Optimization
BSBase Station
CSIChannel State Information
HSTRNHybrid Satellite–Terrestrial Relay Network
IoTInternet of Things
IRISIrregular Reconfigurable Intelligent Surfaces
MIMOMultiple-Input and Multiple-Output
MIMOMEMultiple-Input, Multiple-Output, and Multiple-Eavesdropper
MISOMultiple-Input and Single-Output
NOMANon-Orthogonal Multiple Access
PLSPhysical-Layer Security
QoSQuality of Service
RISReconfigurable Intelligent Surfaces
STAR-RISSimultaneously Transmitting And Reflecting RIS
SNRSignal-to-Noise Ratio
UAVUnmanned Aerial Vehicle

References

  1. Liu, Y.; Liu, X.; Mu, X.; Hou, T.; Xu, J.; Di Renzo, M.; Al-Dhahir, N. Reconfigurable intelligent surfaces: Principles and opportunities. IEEE Commun. Surv. Tutorials 2021, 23, 1546–1577. [Google Scholar] [CrossRef]
  2. Almohamad, A.; Tahir, A.M.; Al-Kababji, A.; Furqan, H.M.; Khattab, T.; Hasna, M.O.; Arslan, H. Smart and secure wireless communications via reflecting intelligent surfaces: A short survey. IEEE Open J. Commun. Soc. 2020, 1, 1442–1456. [Google Scholar] [CrossRef]
  3. Basharat, S.; Hassan, S.A.; Pervaiz, H.; Mahmood, A.; Ding, Z.; Gidlund, M. Reconfigurable intelligent surfaces: Potentials, applications, and challenges for 6G wireless networks. IEEE Wirel. Commun. 2021, 28, 184–191. [Google Scholar] [CrossRef]
  4. Ford, G.W.; Weber, W.H. Electromagnetic interactions of molecules with metal surfaces. Phys. Rep. 1984, 113, 195–287. [Google Scholar] [CrossRef]
  5. Zhang, R.; Liang, Y.C.; Chai, C.C.; Cui, S. Optimal beamforming for two-way multi-antenna relay channel with analogue network coding. IEEE J. Sel. Areas Commun. 2009, 27, 699–712. [Google Scholar] [CrossRef]
  6. Yang, G.; Liang, Y.C.; Zhang, R.; Pei, Y. Modulation in the air: Backscatter communication over ambient OFDM carrier. IEEE Trans. Commun. 2017, 66, 1219–1233. [Google Scholar] [CrossRef]
  7. Li, D.; Liang, Y.C. Adaptive ambient backscatter communication systems with MRC. IEEE Trans. Veh. Technol. 2018, 67, 12352–12357. [Google Scholar] [CrossRef]
  8. Chen, J.; Liang, Y.C.; Pei, Y.; Guo, H. Intelligent reflecting surface: A programmable wireless environment for physical layer security. IEEE Access 2019, 7, 82599–82612. [Google Scholar] [CrossRef]
  9. Porambage, P.; Gür, G.; Osorio, D.P.M.; Liyanage, M.; Gurtov, A.; Ylianttila, M. The roadmap to 6G security and privacy. IEEE Open J. Commun. Soc. 2021, 2, 1094–1122. [Google Scholar] [CrossRef]
  10. Yang, L.; Yang, J.; Xie, W.; Hasna, M.O.; Tsiftsis, T.; Di Renzo, M. Secrecy performance analysis of RIS-aided wireless communication systems. IEEE Trans. Veh. Technol. 2020, 69, 12296–12300. [Google Scholar] [CrossRef]
  11. Chu, Z.; Hao, W.; Xiao, P.; Shi, J. Intelligent reflecting surface aided multi-antenna secure transmission. IEEE Wirel. Commun. Lett. 2019, 9, 108–112. [Google Scholar] [CrossRef]
  12. Dong, L.; Wang, H.M. Secure MIMO transmission via intelligent reflecting surface. IEEE Wirel. Commun. Lett. 2020, 9, 787–790. [Google Scholar] [CrossRef]
  13. Sun, G.; Tao, X.; Li, N.; Xu, J. Intelligent reflecting surface and UAV assisted secrecy communication in millimeter-wave networks. IEEE Trans. Veh. Technol. 2021, 70, 11949–11961. [Google Scholar] [CrossRef]
  14. Yang, H.; Xiong, Z.; Zhao, J.; Niyato, D.; Xiao, L.; Wu, Q. Deep reinforcement learning-based intelligent reflecting surface for secure wireless communications. IEEE Trans. Wirel. Commun. 2020, 20, 375–388. [Google Scholar] [CrossRef]
  15. Guan, X.; Wu, Q.; Zhang, R. Intelligent reflecting surface assisted secrecy communication: Is artificial noise helpful or not? IEEE Wirel. Commun. Lett. 2020, 9, 778–782. [Google Scholar] [CrossRef]
  16. Dong, L.; Wang, H.M. Enhancing secure MIMO transmission via intelligent reflecting surface. IEEE Trans. Wirel. Commun. 2020, 19, 7543–7556. [Google Scholar] [CrossRef]
  17. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS aided hybrid satellite-terrestrial relay networks: Joint beamforming design and optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar] [CrossRef]
  18. Niu, H.; Lin, Z.; Chu, Z.; Zhu, Z.; Xiao, P.; Nguyen, H.X.; Lee, I.; Al-Dhahir, N. Joint beamforming design for secure RIS-assisted IoT networks. IEEE Internet Things J. 2023, 10, 1628–1641. [Google Scholar] [CrossRef]
  19. Lin, Z.; An, K.; Niu, H.; Hu, Y.; Chatzinotas, S.; Zheng, G.; Wang, J. SLNR-based secure energy efficient beamforming in multibeam satellite systems. IEEE Trans. Aerosp. Electron. Syst. 2022, 1–4. [Google Scholar] [CrossRef]
  20. Xu, J.; Liu, Y.; Mu, X.; Dobre, O.A. STAR-RISs: Simultaneous transmitting and reflecting reconfigurable intelligent surfaces. IEEE Commun. Lett. 2021, 25, 3134–3138. [Google Scholar] [CrossRef]
  21. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z. Simultaneous transmission and reflection reconfigurable intelligent surface assisted secrecy MISO networks. IEEE Commun. Lett. 2021, 25, 3498–3502. [Google Scholar] [CrossRef]
  22. Zhang, Z.; Chen, J.; Liu, Y.; Wu, Q.; He, B.; Yang, L. On the secrecy design of STAR-RIS assisted uplink NOMA networks. IEEE Trans. Wirel. Commun. 2022, 21, 11207–11221. [Google Scholar] [CrossRef]
  23. Han, Y.; Li, N.; Liu, Y.; Zhang, T.; Tao, X. Artificial noise aided secure NOMA communications in STAR-RIS networks. IEEE Wirel. Commun. Lett. 2022, 11, 1191–1195. [Google Scholar] [CrossRef]
  24. Wu, Q.; Zhang, R. Beamforming optimization for wireless network aided by intelligent reflecting surface with discrete phase shifts. IEEE Trans. Commun. 2019, 68, 1838–1851. [Google Scholar] [CrossRef]
  25. Su, R.; Dai, L.; Tan, J.; Hao, M.; MacKenzie, R. Capacity enhancement for irregular reconfigurable intelligent surface-aided wireless communications. In Proceedings of the IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
  26. Su, R.; Dai, L.; Tan, J.; Hao, M.; MacKenzie, R. Capacity enhancement for reconfigurable intelligent surface-aided wireless network: From regular array to irregular array. IEEE Trans. Veh. Technol. 2023, 1–12. [Google Scholar] [CrossRef]
  27. Chen, J.C. Capacity improvement for intelligent reflecting surface-assisted wireless systems with a limited number of passive elements. IEEE Wirel. Commun. Lett. 2022, 11, 801–805. [Google Scholar] [CrossRef]
  28. Chen, J.C. Capacity improvement for intelligent reflecting surface-assisted wireless systems with a small portion of active elements. IEEE Access 2022, 10, 100438–100445. [Google Scholar] [CrossRef]
  29. Gallego, R.A.; Romero, R.; Monticelli, A.J. Tabu search algorithm for network synthesis. IEEE Trans. Power Syst. 2000, 15, 490–495. [Google Scholar] [CrossRef]
  30. Knuth, D.E. Big omicron and big omega and big theta. ACM Sigact News 1976, 8, 18–24. [Google Scholar] [CrossRef]
  31. Zheng, L.; Tse, D.N.C. Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels. IEEE Trans. Inf. Theory 2003, 49, 1073–1096. [Google Scholar] [CrossRef]
  32. Swindlehurst, A.L.; Zhou, G.; Liu, R.; Pan, C.; Li, M. Channel estimation with reconfigurable intelligent surfaces–A general framework. Proc. IEEE 2022, 110, 1312–1338. [Google Scholar] [CrossRef]
  33. Pan, C.; Zhou, G.; Zhi, K.; Hong, S.; Wu, T.; Pan, Y.; Ren, H.; Di Renzo, M.; Swindlehurst, A.L.; Zhang, R.; et al. An overview of signal processing techniques for RIS/IRS-aided wireless systems. IEEE J. Sel. Top. Signal Process. 2022, 16, 883–917. [Google Scholar] [CrossRef]
  34. Cao, X.; Yang, B.; Huang, C.; Yuen, C.; Di Renzo, M.; Han, Z.; Niyato, D.; Poor, H.V.; Hanzo, L. AI-assisted MAC for reconfigurable intelligent-surface-aided wireless networks: Challenges and opportunities. IEEE Commun. Mag. 2021, 59, 21–27. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.