Next Article in Journal
Numerical Study of Flow Separation Control over a Hump Airfoil Using a Novel Sweeping Jet Actuator
Previous Article in Journal
The Latest Advances in the Use of Nanoparticles in Endodontics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Weighted Secrecy Sum Rate Optimization for Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface-Assisted Multiple-Input Single-Output Systems

Department of Electronic and Information Engineering, Anhui University of Finance and Economics, Bengbu 233030, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(17), 7932; https://doi.org/10.3390/app14177932
Submission received: 3 August 2024 / Revised: 30 August 2024 / Accepted: 2 September 2024 / Published: 5 September 2024

Abstract

:
The study investigates the effectiveness of a novel Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface (STAR-RIS) technology in enhancing the physical layer security of Multiple-Input Single-Output (MISO) systems. To address the complexity of the security challenge, we examine two distinct phase shift strategies, namely, the coupled phase scheme and the independent phase scheme. The coupled paradigm focuses on optimizing weighted sum secrecy rate (WSSR) through a customized Block Coordinate Descent (BCD) approach integrated with path tracking, aiming to achieve a balanced security enhancement. Furthermore, for the independent phase shift paradigm, an optimization algorithm based on the Concave–Convex Procedure (CCCP) is explored to provide a flexible security solution. The numerical results validate the superior performance of STAR-RIS, confirming its potential as a robust security enhancer for MISO systems.

1. Introduction

In the era of global 5G deployment, research attention is now turning toward B5G and 6G networks. These next-generation networks necessitate enhanced spectral and energy efficiencies, ultra-low latency in the microsecond range, and extensive network coverage [1]. Furthermore, 6G networks are anticipated to facilitate superior wireless communications and simultaneous high-precision radio sensing, which are critical for emerging applications such as smart cities and the Internet of Vehicles (IoV). Consequently, integrated sensing and communication (ISAC) has emerged as a mainstream trend and a focal point of research in recent years within the context of 6G technology [2]. Nevertheless, private data are exposed to the communication environment when electromagnetic waves are transmitted over open wireless channels, making them highly susceptible to security threats such as jamming and eavesdropping [3]. However, 6G networks provide more security challenges across various communication scenarios. First, in multi-user environments characteristic of the 6G era, the proximity of communication nodes and users increases the likelihood of inter-user interference and potential eavesdroppers, significantly heightening security risks in multi-user communication scenarios. This is due to the increase in network connection density. Physical layer security (PLS) has emerged as a critical driver for the development of 6G networks. PLS enables safe communication by using wireless channel natural qualities and characteristics [4]. Unlike traditional encryption methods, PLS avoids the high complexity of encryption procedures while requiring minimal hardware resources. Ref. [5] utilized some of the power available from the transmitter to generate artificial noise (AN) to interfere with the eavesdropper’s channel. This technique enhances the confidentiality of communications by diminishing the quality of the signal received by the eavesdropper. Ref. [6] investigated two different eavesdropping channel models and proposed cooperative jamming to improve the system’s secrecy rate. However, many physical security methods, such as traditional beamforming and directional modulation, are inadequate for ensuring complete communication security [7].
To address current limitations, it is crucial to develop cost-effective approaches for wireless systems. By leveraging advancements in metasurfaces and fabrication technologies, Reconfigurable Intelligent Surfaces (RISs) have emerged as promising innovations [8,9,10]. RISs are two-dimensional planar arrays composed of multiple sub-wavelength electromagnetic metamaterial components [11]. The electromagnetic response of these RIS units can be precisely controlled by adjusting their microstructure, which includes the amplitude, phase, polarization, and frequency of incident electromagnetic waves. With the assistance of RISs, signals from various links can be coherently combined with legitimate users (Bobs) to enhance the signal constructively and suppress information leakage to eavesdroppers (Eves). This capability positions RISs as a key technology in advancing physical layer security [12].
Nevertheless, RISs are designed solely to reflect incident signals, providing a 180-degree semi-plane reflection. Consequently, users must be located on the same side as both the RISs and the base station (BS), resulting in relatively limited coverage. For instance, consider a challenging scenario with multiple Bobs and Eves distributed on both sides of the RISs. In this situation, there will always be some Bobs and Eves in the communication dead zone that are not supported by the RISs. This leads to undesirable security threats and energy loss [13].
In response to this limitation, the concept of Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface (STAR-RIS) has been introduced [14,15,16]. In contrast to conventional RISs, the wireless signal incident on the STAR-RIS is divided into transmitted and reflected signals that propagate to both sides of the surface, realizing a fully spatially reconfigurable wireless environment. STAR-RIS consists of a large number of low-cost elements whose transmission and reflection coefficients (TARCs) are adjusted in real-time within the elemental units using control circuits, typically implemented by microcontrollers or field-programmable gate arrays (FPGAs). The output of the optimization algorithm is converted into specific control commands, which are sent to the hardware control circuit to control the STAR-RIS. For passive-lossless design, the elements can possess independent TARCs or coupled TARCs, depending on the electrical and magnetic characteristics of the STAR-RIS. Existing studies on STAR-RIS assume that the phase-shift coefficients for transmission and reflection are independently tunable, presupposing that the electric and magnetic impedances, which are confined to purely imaginary values, can be arbitrarily selected. However, this may not be feasible for entirely passive STAR-RIS [17]. In the recent study referenced as [18], it was demonstrated that within low-cost passive lossless STAR-RIS, there exists an intrinsic coupling between the phase-shift coefficients of transmission and reflection. This interdependency poses novel design challenges, as it necessitates a joint consideration of both transmission and reflection characteristics during the optimization process. The coupling effect complicates the system design but also opens avenues for the development of advanced optimization algorithms and the enhancement of communication system performance. This discovery underscores the need for a holistic approach to the design and analysis of STAR-RIS to fully harness their potential in cost-effective communication networks. To solve the coupling phase shift problem, ref. [19] proposes an efficient cell alternating optimization (AO) algorithm to find high-quality suboptimal solutions. In the work presented by the authors in reference [20], they introduce the AO algorithm. This algorithm performs an exhaustive search over discrete amplitude and phase shift sets, resulting in a high computational complexity.
STAR-RIS has significant potential in ISAC technology, which is the fundamental pillar of future 6G. Ref. [21] focuses on outage-based beamforming design for dual-functional radar-communication systems in 6G networks. The beamforming techniques discussed in [22,23] are related to the beamform optimization in the STAR-RIS-assisted MISO system. Both papers aim to enhance the security and efficiency of wireless communication systems through advanced beamforming strategies.
Motivated by the above, we investigate a downlink MISO communication system enhanced by STAR-RIS in this system, in which BS provides service to two legitimate users located around the STAR-RIS, while two illegitimate users are also present. Based on this model, we jointly design an optimization problem for active beamforming (BF) at the BS and passive BF at the STAR-RIS. Our objective is to maximize WSSR while adhering to direct link conditions and quality of service (QoS) constraints. We consider two phasing schemes: the coupled phase (CP) scheme and the independent phase (IP) scheme. In this paper, we focus on maximizing WSSR for the CP scheme. We first approximate the optimal value of WSSR using the Successive Convex Approximation (SCA) method. To address the non-convexity of the QoS constraints, we transform them into solvable convex constraints using the Second-Order Cone Programming (SOCP) method. For the multivariate optimization of the CP scheme, we employ the Block Coordinate Descent (BCD) algorithm, which divides the variables into three blocks and optimizes the beam variables, coupled phase shift variables, and auxiliary variables sequentially in an alternating manner. For optimizing the coupled phase-shift variables, we utilize the existing Penalized Dyadic Decomposition (PDD) framework to update them alternately in closed form. For the IP scheme, the non-convex phase shift constraints are approximated as tractable convex constraints using the Concave–Convex Procedure (CCCP) method. Numerical results compare the performance of the proposed algorithms, which are validated against four benchmark schemes for both coupled and independent phase-shift models. To the best of our knowledge, similar algorithms in this specific area have not been examined in this study. This research provides new ideas and methods to enhance the security of MISO PLS systems and promote their development and application.
We organize the remainder of this paper in the following order: Section 2 presents the STAR-RIS-assisted MISO system model and formulates the optimization problem for various phase shift schemes. Section 3 shows the analysis of the proposed algorithms. Section 4 presents the simulation results of the algorithms and compares the performance of different schemes. Section 5 summarizes the thesis work.
Notations: Bold letters represent vectors. C represents the set of complex numbers. E x represents the mathematical expectation about x. CN ( μ , σ 2 ) stands for the complex Gaussian distribution with mean μ and variance σ 2 . D i a g ( · ) is for constructing a triangular matrix. R · and I · denote the real and imaginary parts of the complex variable, respectively. ‖ ‖ denotes the Euclidean norm of a vector or the Frobenius of a matrix. T r ( A ) represents the trace of matrix A .

2. System Model and Problem Formulation

2.1. System Model

As illustrated in Figure 1, we investigate a multicast downlink MISO communication system equipped with a four-node STAR-RIS. An N-antenna BS exploits an M-element STAR-RIS to transmit the confidential signals to two single-antenna receivers, which are called BobT and BobR, in presence of two single-antenna eavesdroppers, namely, EveT and EveR. We consider that the STAR-RIS concurrently serves both the transmission and reflection regions. Specifically, the receiver situated in the l - th region is designated as the l - th Bob, where l T , R . The baseband equivalent channels from STAR-RIS to BS, Bob, and Eve are represented as h B S C M × N , h S l C M × 1 , g l C M × 1 . It is assumed that the direct channel between the BS and the user, denoted by h B l C N × 1 , h l C N × 1 . Assuming the availability of perfect channel state information (CSI) of these links is obtained by BS [24], the STAR-RIS is configured via a controller, typically realized through a field-programmable gate array. For CP scheme, where each transmitting and reflecting coefficients element m M 1 , 2 , , M , its reflection and transmission coefficients are given by β m T e j ϕ m T and β m R e j ϕ m R , respectively, where β m T , β m R 0 , 1 and ϕ m T , ϕ m R 0 , 2 π denote the amplitude and phase configurations, respectively. Due to energy conservation, passive lossless STAR-RISs have to meet the following constraints ( β m T ) 2 + ( β m R ) 2 = 1 . In the case of a passive and lossless STAR-RIS, the electrical and magnetic impedances manifest as purely imaginary values, i.e., β m T β m R cos ( ϕ m T ϕ m R ) = 0 which ϕ m T and ϕ m R are coupled by the condition ϕ m T ϕ m R = π 2 , 3 π 2 . For the IP scheme, the transmission and reflection phases are independent of each other.
Θ l = D i a g β 1 l e j ϕ 1 l , , β M l e j ϕ M l C M × M denotes the coefficient for the l-th Bob. BS exploits the multiple beamforming vectors w T , w R C N × 1 to send the confidential signals x T and x R with E s T 2 = E s R 2 = 1 to B o b T and B o b R , respectively. Neglecting the signals reflected by the STAR-RIS twice or more due to severe path loss, the received signals at the user and the eavesdropper can be, respectively, expressed as
y B , l = ( h B l H + h S l H Θ l h B S ) i w i x i + n B , l
y E , l = ( h l H + g l H Θ l h B S ) i w i x i + n E , l
where n B , l , n E , l CN ( 0 , σ 2 ) represent the additive white Gaussian noise (AWGN) at both reflection and transmission, i T , R denote reflection and transmission areas. Using θ H = d i a g ( Θ ) T , we have h B l H + h S l H Θ l h B S = h B l H + θ H H l and h l H + g l H Θ l h B S = h l H + θ H G l , where H l = Diag ( h S l H ) h B S , and G l = Diag ( g l H ) h B S , respectively. It is presumed that the l-th Eve is solely intercepting the data intended for Bob, who is situated within the same vicinity. Then, for the independent or coupled phase scheme, the signal-to-interference-plus-noise ratio (SINR) at the Bobl and Evel can be expressed as
SINR B o b l = ( h B l H + θ H H l ) w l 2 ( h B l H + θ l H H l ) w l 2 + σ 2
SINR E v e l = ( h l H + θ l H G l ) w l 2 ( h l H + θ l H G l ) w l 2 + σ 2
respectively, where l = r , l = t , and vice versa. Thus, for the independent or coupled phase scheme, the secrecy rate for the l-th Bob is represented as
R l S E C = [ ln ( 1 + SINR B o b l ) ln ( 1 + SINR E v e l ) ] + .
where [ x ] + m a x x , 0 .

2.2. Problem Formulation

In this paper, our objective is to enhance WSSR for the Bobs through the collective optimization of BF and TARCs, i.e., w l and θ l . Specifically, the optimization problem can be formulated as follows:
max θ l , w l l φ l R l S E C
s . t . l w l 2 P m a x ,
θ l m = β m l e j θ m l , l β l = 1 , m M ,
θ m l 0 , 2 π , β l m 0 , 1 , m M ,
SINR B o b l Γ m i n ,
θ m T θ m R = π 2 or 3 π 2 , m M .
where φ l [ 0 , 1 ] , l φ l = 1 represent the weighting factor for the l-th Bob. Note that (6b) denotes the total power constraint for the BS with the maximum power P m a x , (6c)–(6d) denote the phase shift and amplitude constraints for the STAR-RIS, (6e) ensures the minimum QoS requirement of each legitimate user, which Γ m i n denotes the minimum rate requirement of legitimate users. Constraint (6f) is only valid when the CP scheme is employed.

3. Proposed Algorithms

3.1. The BCD Method for the CP Scheme

The transmission and reflection phase shifts of STAR-RIS’s CP scheme are coupled, introducing complex nonlinear constraints. This coupling complicates the optimization problem and hinders the direct application of traditional optimization methods. The BCD framework is widely used to solve non-convex problems, which can guarantee an approximately optimal solution by solving multiple convex subproblems derived from the original non-convex problem in chunks. This is particularly important for the CP scheme. Therefore, we propose a BCD-based method to solve the CP scheme. We decompose the variables into two blocks, i.e., w l and θ T , θ R , and perform iterative optimization in an alternating form. Specifically, the sub-problem of optimizing the reflection and transmission coefficients (i.e., θ T , θ R ) is addressed using the PDD framework. In this framework, the solved subproblems are transformed into augmented Lagrangian (AL) problems by incorporating penalty terms. The variables and the introduced penalty factors are optimized iteratively until convergence is achieved.
To start with, we first decouple problem (6a) in tractable subproblem, and iteratively derive solutions for these subproblems.
First of all, in the vicinity of point w l * , θ l * , we have constants d l 1 , d l 2 , d l 3 , d l 4 , given by
d l 1 = 1 / h B l H + θ l * H H l w l * 2 + σ 2 ,
d l 2 = d l 1 h B l H + θ l * H H l w l * 2 h B l H + θ l * H H l w l * 2 + h B l H + θ l * H H l w l * 2 + σ 2 ,
d l 3 = h l H + θ l * H G l w l * 2 / h l H + θ l * H G l w l * 2 + σ 2 ,
d l 4 = h l H + θ l * H G l w l * 2 + σ 2 ,
Based on the given equations and neglecting the constant terms, around the specified point w l * , θ l * , R l S E C can be reformulated as follows:
R l S E C = d l 1 2 R w l H h B l + H l H θ l h B l H + θ l * H H l w l * + d l 2 h B l H + θ l H H l w l 2 + h B l H + θ l H H l w l 2 + 1 1 + d l 3 h l H + θ l H G l w l 2 2 R w l H h l + G l H θ l h l H + θ l * H G l w l * + d l 4
It is obvious that (8) is convex in the interest of maintaining conciseness and clarity, refer to [25] for comprehensive details.
To address the non-convex QoS constraints, method of SOCP is employed to effectuate a further transformation of the constraint condition (6e) into:
I h B l H + θ H H l w l = 0 ,
1 + 1 Γ m i n R h B l H + θ H H l w l h B l H + θ H H l W σ 2 ,
where W = w T , w R . Upon holding constant any value within the set of parameters w l or θ l , the aforementioned constraint assumes the form of an elliptical constraint.
Based on the above equation, with fixed θ l we can reformulate (6a)–(6f) as
min θ l , w l l ϕ l R l S E C
s . t . θ m T θ m R = π 2 or 3 π 2 , m M , ( 6 b ) ( 6 d ) , ( 9 ) , ( 10 ) .
with fixed θ l , (11a) and (11b) as w.r.t w l is convex which can be solved by the optimization toolbox CVX [26]. The primary distinction lies in the fact that, at this juncture, the phase of the STAR-RIS is in a state of coupling. According to the [27], we introduce auxiliary variables θ l = β 1 l e j ϕ 1 l , , β M l e j ϕ M l T , l T , R , satisfying θ l = θ l . By incorporating the above equality constraint into the objective function through the introduction of a penalty term, then, following the idea of PDD, problem (11a) and (11b) can be recast as
min θ l , w l l ϕ l R l S E C + 1 2 ρ θ l θ l + ρ λ l 2
s . t . ( β m T ) 2 + ( β m R ) 2 = 1 , m M ,
β m T β m R c o s θ T , m θ R , m = 0 , m M , ( 6 b ) , ( 9 ) , ( 10 ) .
where ρ is a nonnegative penalty factor, λ l represents the Lagrangian dual variables and l T , R . It is established that as λ 0 approaches zero, we set the objective function to zero to ensure the satisfaction of constraint θ l = θ l . The alternating update of w l , θ T , θ R , θ T , θ R , λ l and ρ satisfy the Karush–Kuhn–Tucker (KKT) conditions. The optimal solution can be obtained On this basis. Following the ideas of BCD, problem (12a)–(12c) can be divided into two sub-problems, respectively.

3.1.1. Optimization of w l , θ T , θ R

Given θ T , θ R , λ l , and ρ l , l T , R , it is noteworthy that the objective function of Equations (11a) and (11b) exhibits convexity w.r.t w l and θ T , θ R , which can be solved by CVX.

3.1.2. Optimization of θ T , θ R

The variables w l , θ T , θ R exclusively appear in the constraints and the penalty term of the objective function, the resulting problem can be expressed as follows
min θ l θ l θ l + ρ λ l 2
s . t . ( β m T ) 2 + ( β m R ) 2 = 1 , m M ,
β m T β m R c o s θ T , m θ R , m = 0 , m M .
We decompose θ l to amplitude vector β l = β 1 l , , β M l T and phase-shift vector ψ l = e j ϕ 1 l , , e j ϕ M l T , define ϑ l = d i a g β l H θ l + ρ λ l , φ m + = ϑ T , m * + j ϑ R , m * , φ m = ϑ T , m * j ϑ R , m * . Consequently, with given β T and β R , we can obtain a closed-form solution for ψ T and ψ R :
ψ T , m * , ψ R , m * = arg min ψ T , m , ψ R , m κ m R ψ T , m * , ψ T , m + R ψ R , m * , ψ R , m
where κ m denotes a set of a pair of closed-form solutions:
κ m = e j π φ m + , e j 3 2 π φ m + , e j π φ m , e j 1 2 π φ m
Nextly, we define ϑ l = d i a g ψ l H θ l + ρ λ l , a n = ϑ T * c o s ϑ T * , b n = ϑ R * s i n ϑ R * , ξ n = s g n b n a r c c o s a n a n 2 + b n 2 , then, for any given ψ T and ψ R , the optimal solutions for the elements of β T and β R are given by
β T , m * = s i n ω n , β R , m * = c o s ω n .
where
ω n = 1 2 π ξ n , if ξ n π , 1 2 π , 0 , if ξ n 1 2 π , 1 4 π , 1 2 π , ohterwise .
Finally, in accordance with the PDD framework, the dual variables { λ T , λ R } and the penalty factor ρ are subject to iterative updating.
The overall procedure is given in Algorithm 1, where R ( q ) denotes the obtained WSSR in the q-th iteration, and η denotes the stopping threshold, δ = m a x θ T θ T , θ R θ R denotes the constraint violation function.
Algorithm 1 Algorithm of Problem (11a) and (11b)
1: 
Set feasible variables w l ( 0 ) , θ l ( 0 ) and q = 0 .
2: 
repeat
3:
   repeat
4:
    (a) Obtain w T ( q ) , w R ( q ) via solving (11a) and (11b) using CVX, with fixed θ l ( q 1 ) , w l ( q 1 ) .
    (b) Obtain θ T ( q ) , θ R ( q ) via solving (12a)–(12c) using CVX, with fixed w l ( q ) , θ l ( q 1 ) .
     (c) update ψ l by (14).
     (d) update β l by (16).
     (e) q q + 1 .
     (f) Calculate WSSR R ( q ) by (6a).
5:
   until  R ( q ) R ( q 1 ) < κ .
6:
   if  δ < η  then
7:
      set λ l = λ l + 1 ρ θ l θ l
8:
   else
9:
      set ρ = c ρ
10:
 end if set η = 0.9 δ
11:
until  δ below threshold.
12:
return Outputs

3.2. Extension to the IP Scheme

The objective function and constraints of the STAR-RIS’s IP scheme may contain multiple locally optimal solutions, making it challenging for traditional optimization methods to guarantee the identification of a globally optimal solution. The CCCP method can be used as an iterative algorithm for solving non-convex optimization problems, and its basic idea is to decompose a complex non-convex problem into a series of easier-to-solve convex optimization subproblems. The CCCP method ensures the convergence of the algorithm by constructing a discrete-time dynamical system that guarantees a monotonically decreasing value of the objective function at each iteration. This is particularly important for complex optimization problems in IP schemes, where the optimal solution can be achieved within a reasonable number of iterations. Specifically, we use the CCCP method to decompose the non-convex independent phase shift constraints into a series of convex sub-constraints to gradually approximate the global optimal solution.
With given θ l , the optimization of w l is as the same as CP scheme. The main difference is without the constraint (6f). In accordance with CCCP, the constraint (6c) and (6d) is decomposed into the subsequent expression:
T r ( D 1 , l ) 2 T r ( θ l ( n ) θ l H ) T r ( θ l ( n ) ( θ l ( n ) ) H ) ,
D 1 , l Θ l θ l Θ l H D 2 , l θ l θ l H θ l H 1 0 ,
where n denotes the number of iterations, D 1 , l H M × M and D 2 , l H M × M are slack variables. With fixed w l , the optimization of θ l can be solved by CVX. More details can be referred to [28]. Then, optimization of IP scheme can be formulated as follows:
min θ l , w l l ϕ l R l S E C
s . t . ( 6 b ) , ( 9 ) , ( 10 ) , ( 18 ) , ( 19 ) .
The overall process of the CCCP method is illustrated in Algorithm 2 below.
Algorithm 2 CCCP Method to Solve Problem (20a) and (20b)
1:
Set feasible variables w l ( 0 ) , θ l ( 0 ) and q = 0 .
2:
repeat
3:
   (a) Obtain w T ( q ) , w R ( q ) via solving (6a)–(6f) using CVX, with fixed θ l ( q 1 ) , w l ( q 1 ) .
   (b) Obtain θ T ( q ) , θ R ( q ) via solving (20a) and (20b) using CVX, with fixed w l ( q ) , θ l ( q 1 ) .
   (c) q q + 1 .
   (d) Calculate WSSR R ( q ) by (6a).
4:
until  R ( q ) R ( q 1 ) < κ .
5:
return Outputs

4. Numerical Results

In this section, we present numerical results to compare the performance of the proposed algorithm with four benchmark scenarios. WSSR is a crucial performance metric for PLS. Next, we discuss the impact of various variables on the performance of WSSR. The three-dimensional (3D) simulation setup is illustrated in Figure 2, where BS and STAR-RIS are positioned at ( 0 , 0 , 5 ) and ( 145 , 0 , 0 ) meters, respectively. Bobl and Evel are randomly distributed along a semicircle centered on STAR-RIS with a radius of d T = d R = 5 m. The STAR-RIS is located at the center of this semicircle. In the simulations conducted, the narrow-band quasi-static fading channels extending from the BS to the STAR-RIS are characterized as Rician fading channels in the ensuing manner [29].
h B S = ρ 0 d B S α B S ( K B S K B S + 1 h B S L O S + 1 K B S + 1 h B S N L O S )
where K B S is the Rician factor set as 5 dB, α B S = 2.2 denotes the corresponding path loss exponents, d B S denotes the distances between the BS and the STAR-RIS, ρ 0 = 1 represents the path loss at a reference distance of 1 m, h B S L O S = a b H is the normalized line-of-sight (LoS) component, with a = [ a 1 , , a N ] T and b = [ b 1 , , b M ] T denote the steering vectors, and h B S N L O S is the Rayleigh fading representing the non-line-of-sight (NLOS) component, the other indirect link channels are modeled similarly. It is assumed that the direct channel between the BS and Bobl, Evel is Rayleigh channel with the distance-dependent path loss which all direct links set α = 3.6 . The path loss factor for direct links is higher than that for indirect links, which allows for a more accurate simulation and validation of the benefits of STAR-RIS in enhancing communication performance.
The STAR-RIS is a uniform rectangular array (URA) whose size is M = X × Y , where X is the element of the x-axis (vertical) and Y is the element of the y-axis (horizontal). We set M = 30 . The BS is a large uniform linear array (ULA), which is comprised of N elements. The number of antennas is set to N = 4 and the noise power is set to σ 2 = 80 dBm . P t = 0 dBm is the transmit power budget and the minimum rate requirement of legitimate users is set to Γ m i n = 5 dBm . The weight parameter and the algorithm convergence factor are set to ϕ l = 0.5 , l . and κ = 10 3 , respectively. For the parameters of the PDD method, we set c = 0.1 , η = 10 3 . The initial value of ρ = 0.1 . Moreover, each result is averaged over 150 independent Monte-Carlo trials.
Figure 3 depicts the convergence performance of the proposed algorithm with different M and N. From this figure, we observe that the WSSR stabilizes within approximately 5 iterations. An intuitive explanation for this result is that the direct link offers improved initial channel conditions, allowing the optimization algorithm to identify a superior solution more quickly during the initial stage, which accelerates the overall convergence process. Additionally, the reasonable setting of channel parameters and the low computational complexity of the proposed algorithm further enhance its rapid convergence. It is discerned that the WSSR exhibits a monotonic augmentation concomitant with the iterative process and culminates in equilibrated solutions after a finite number of iterations, and the iterative process converges more quickly. In addition, larger M, N achieves a higher WSSR at the cost of slower convergence speed, since more variables need to be optimized. Due to coupling constraints, the WSSR with independent phase shift is slightly larger than the WSSR with coupled phase shift.
Next, we consider the following benchmark scenarios for performance comparison, i.e., (1) IP scheme. (2) CP scheme. (3) Mode switching (MS): in this mode, all elements of the STAR-RIS are divided into two groups which β l 0 , 1 . (4) Time switching (TS): in this mode, the STAR-RIS utilizes temporal variation to alternate element states between T and R modes across distinct orthogonal time slots. (5) Conventional wiretap channel, i.e., without using STAR-RIS (W-RIS). (6) Conventional RIS (C-RIS): the two conventional RISs are deployed adjacent to each other at the same location as the STAR-RIS. The above benchmark scheme is a comparison of common STAR-RIS optimization algorithms in the field [29].
Figure 4 evaluates the WSSR attained by various methodologies in relation to the allocated transmit power budget, TS surpasses IP and CP in security at low power due to its inherent wiretap avoidance and clear decoding. However, as power rises, IP and CP’s efficient time use prevails, which diminishes the reception capability of eavesdroppers, leading to greater secrecy at high power levels. IP scheme exhibits higher WSSR at all transmit power levels, which shows that the IP scheme is more efficient in exploiting the transmit power to enhance the secrecy rate, specifically because its phase shifts can be adjusted independently with higher design freedom to achieve higher secrecy rates. However, in exchange for complex hardware implementations that increase the difficulty and cost of implementing the system. The CP scheme outperforms C-RIS and MS in secrecy efficacy. The WSSR of CP is slightly lower than that of IP due to the effect of coupling phase shift. The CP scheme may not perform as well as the IP scheme, especially in scenarios where elaborate beamforming and high secrecy performance are required. Calculations show that the average error in confidentiality rates for the CP and IP schemes is under 3 percent.
In Figure 5, we can find that the WSSR increases with M for all these schemes. C-RIS lag due to limited degrees-of-freedom (DoFs) from their fixed transmission/reflection choice, widening the performance gap with STAR-RIS as M grows. This comparison validates STAR-RIS’s utility in wireless networks. TS naturally avoids mutual eavesdropping between users through time switching, which is particularly important in multi-user scenarios. The advantage becomes much more apparent as the amount of factors increases. MS outperforms the C-RIS. This is due to the fact that in a broadcast communication scenario, MS experiences no inter-user interference and can leverage the entire available communication time to enhance WSSR. The WSSR of MS and C-RIS, while also increasing with M, is not as significant as that of the CP and IP schemes. This is because their phase shift strategies are more rigid and lack the flexibility needed to fully optimize the signal transmission path. The performance of CP is slightly lower than that of IP as the number of elements increases. This is because the phase shifts of neighboring units in the CP scheme are constrained, resulting in fewer degrees of freedom in the system. Consequently, IP can manage and reduce interference more efficiently, especially in multi-user scenarios. Due to phase-shift constraints, CP may not eliminate interference, thereby affecting the WSSR.
Figure 6 illustrates the convergence behavior of the PDD procedure to update θ l . The value of the penalty pair function δ decreases with iterations for different numbers of STAR-RIS elements. The PDD algorithm demonstrates good convergence within twenty iterations, with a threshold set at 10 5 . Additionally, the convergence is not sensitive to variations in M.

5. Conclusions

In this paper, we investigate algorithms for both independent and coupled phase shift scenarios, focusing on weight optimization and secrecy rate enhancement in STAR-RIS-aided MISO systems. We mainly discuss the coupled phase-shift scheme, employing a PDD-based optimization algorithm for BCD. This algorithm finds high-quality suboptimal solutions by performing an exhaustive search on the set of magnitude and phase offsets. By integrating the transmission and reflection characteristics with the algorithm for solving the coupled phase-shift problem, this approach offers a comprehensive method for the design and analysis of STAR-RIS systems. Our simulations demonstrate the superior WSSR of STAR-RIS and the algorithm outperforms the existing methods. STAR-RIS can effectively enhance PLS by intelligently adjusting the paths of reflected and transmitted signals. It dynamically adjusts the direction and strength of signals so that legitimate users receive stronger signals and eavesdroppers receive weaker signals, thus improving the confidentiality of communications.
In the future, the deployment of the STAR-RIS and hardware impairments will be discussed in more detail. These two aspects are important because the physical location of STAR-RIS, as well as hardware impairments, will directly affect the quality of the transmission/reflection links. Additionally, the PDD-based BCD algorithm would be enhanced by incorporating a deep learning (DL) model, which can be integrated with a PDD framework to optimize the coupled phase-shift subproblem. By alternately optimizing the coupled phase-shift coefficients, the algorithm can achieve rapid convergence. The CP scheme has the potential for practical applications, especially in scenarios where security and system performance need to be balanced. Many research directions for the CP scheme are worth pursuing, including the Internet of Medical Things (IoMT), unmanned aerial vehicle (UAV) communications, and massive MIMO systems. In addition, the IP scheme applied to STAR-RIS-enhanced robotic communications and STAR-RIS-assisted visible light communications (VLC) has potential for future research.

Author Contributions

Conceptualization, B.W. and Y.W.; methodology, Y.W.; software, B.W.; validation, B.W. and Y.W.; formal analysis, B.W.; investigation, Y.W. and B.W.; resources, Y.W.; data curation, Y.W.; writing—original draft preparation, B.W.; writing—review and editing, B.W. and Y.W.; visualization, Y.W.; supervision, B.W.; project administration, Y.W.; funding acquisition, Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Natural Science Foundation of the Higher Education Institutions of Anhui Province grant number 2022AH050591 and by Science Research Foundation of Anhui University of Finance and Economics grant number ACKYB22022.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zhang, Z.; Xiao, Y.; Ma, Z.; Xiao, M.; Ding, Z.; Lei, X.; Karagiannidis, G.K.; Fan, P. 6G wireless networks: Vision, requirements, architecture, and key technologies. IEEE Veh. Technol. Mag. 2019, 14, 28–41. [Google Scholar] [CrossRef]
  2. Dong, F.; Liu, F.; Cui, Y.; Wang, W.; Han, K.; Wang, Z. Sensing as a service in 6G perceptive networks: A unified framework for ISAC resource allocation. IEEE Trans. Wirel. Commun. 2022, 22, 3522–3536. [Google Scholar] [CrossRef]
  3. Tataria, H.; Shafi, M.; Molisch, A.F.; Dohler, M.; Sjöland, H.; Tufvesson, F. 6G wireless systems: Vision, requirements, challenges, insights, and opportunities. Proc. IEEE 2021, 109, 1166–1199. [Google Scholar] [CrossRef]
  4. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
  5. Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  6. Tekin, E.; Yener, A. The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Trans. Inf. Theory 2008, 54, 2735–2751. [Google Scholar] [CrossRef]
  7. Krikidis, I.; Thompson, J.S.; McLaughlin, S. Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 2009, 8, 5003–5011. [Google Scholar] [CrossRef]
  8. Wu, Q.; Zhang, R. Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network. IEEE Commun. Mag. 2019, 58, 106–112. [Google Scholar] [CrossRef]
  9. Di Renzo, M.; Zappone, A.; Debbah, M.; Alouini, M.S.; Yuen, C.; De Rosny, J.; Tretyakov, S. Smart radio environments empowered by reconfigurable intelligent surfaces: How it works, state of research, and the road ahead. IEEE J. Sel. Areas Commun. 2020, 38, 2450–2525. [Google Scholar] [CrossRef]
  10. Tang, W.; Chen, M.Z.; Dai, J.Y.; Zeng, Y.; Zhao, X.; Jin, S.; Cheng, Q.; Cui, T.J. Wireless communications with programmable metasurface: New paradigms, opportunities, and challenges on transceiver design. IEEE Wirel. Commun. 2020, 27, 180–187. [Google Scholar] [CrossRef]
  11. Huang, C.; Hu, S.; Alexandropoulos, G.C.; Zappone, A.; Yuen, C.; Zhang, R.; Renzo, M.D.; Debbah, M. Holographic MIMO surfaces for 6G wireless networks: Opportunities, challenges, and trends. IEEE Wirel. Commun. 2020, 27, 118–125. [Google Scholar] [CrossRef]
  12. Li, Z.; Chen, W.; Zhang, Z.; Wu, Q.; Cao, H.; Li, J. Robust sum-rate maximization in transmissive RMS transceiver-enabled SWIPT networks. IEEE Internet Things J. 2022, 10, 7259–7271. [Google Scholar] [CrossRef]
  13. ElMossallamy, M.A.; Zhang, H.; Song, L.; Seddik, K.G.; Han, Z.; Li, G.Y. Reconfigurable intelligent surfaces for wireless communications: Principles, challenges, and opportunities. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 990–1002. [Google Scholar] [CrossRef]
  14. Liu, Y.; Mu, X.; Xu, J.; Schober, R.; Hao, Y.; Poor, H.V.; Hanzo, L. STAR: Simultaneous transmission and reflection for 360° coverage by intelligent surfaces. IEEE Wirel. Commun. 2021, 28, 102–109. [Google Scholar] [CrossRef]
  15. Xu, J.; Liu, Y.; Mu, X.; Dobre, O.A. STAR-RISs: Simultaneous transmitting and reflecting reconfigurable intelligent surfaces. IEEE Commun. Lett. 2021, 25, 3134–3138. [Google Scholar] [CrossRef]
  16. Mu, X.; Liu, Y.; Guo, L.; Lin, J.; Schober, R. Simultaneously transmitting and reflecting (STAR) RIS aided wireless communications. IEEE Trans. Wirel. Commun. 2021, 21, 3083–3098. [Google Scholar] [CrossRef]
  17. Xu, J.; Liu, Y.; Mu, X.; Zhou, J.T.; Song, L.; Poor, H.V.; Hanzo, L. Simultaneously transmitting and reflecting intelligent omni-surfaces: Modeling and implementation. IEEE Veh. Technol. Mag. 2022, 17, 46–54. [Google Scholar] [CrossRef]
  18. Xu, J.; Liu, Y.; Mu, X.; Schober, R.; Poor, H.V. STAR-RISs: A correlated T&R phase-shift model and practical phase-shift configuration strategies. IEEE J. Sel. Top. Signal Process. 2022, 16, 1097–1111. [Google Scholar]
  19. Liu, Y.; Mu, X.; Schober, R.; Poor, H.V. Simultaneously transmitting and reflecting (STAR)-RISs: A coupled phase-shift model. In Proceedings of the ICC 2022-IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; IEEE: Piscataway Township, NJ, USA, 2022; pp. 2840–2845. [Google Scholar]
  20. Niu, H.; Liang, X. Weighted sum-rate maximization for STAR-RISs-aided networks with coupled phase-shifters. IEEE Syst. J. 2022, 17, 1083–1086. [Google Scholar] [CrossRef]
  21. Wu, C.; Liu, Y.; Mu, X.; Gu, X.; Dobre, O.A. Coverage characterization of STAR-RIS networks: NOMA and OMA. IEEE Commun. Lett. 2021, 25, 3036–3040. [Google Scholar] [CrossRef]
  22. Chafii, M.; Bariah, L.; Muhaidat, S.; Debbah, M. Twelve scientific challenges for 6G: Rethinking the foundations of communications theory. IEEE Commun. Surv. Tutor. 2023, 25, 868–904. [Google Scholar] [CrossRef]
  23. Bazzi, A.; Chafii, M. On outage-based beamforming design for dual-functional radar-communication 6G systems. IEEE Trans. Wirel. Commun. 2023, 22, 5598–5612. [Google Scholar] [CrossRef]
  24. Zhang, Z.; Wang, Z.; Liu, Y.; He, B.; Lv, L.; Chen, J. Security enhancement for coupled phase-shift STAR-RIS networks. IEEE Trans. Veh. Technol. 2023, 72, 8210–8215. [Google Scholar] [CrossRef]
  25. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z. Simultaneous transmission and reflection reconfigurable intelligent surface assisted secrecy MISO networks. IEEE Commun. Lett. 2021, 25, 3498–3502. [Google Scholar] [CrossRef]
  26. Grant, M.; Boyd, S. CVX: Matlab Software for Disciplined Convex Programming, Version 2.1; 2014. Available online: http://cvxr.com/cvx (accessed on 1 March 2024).
  27. Wang, Z.; Mu, X.; Liu, Y.; Schober, R. Coupled phase-shift STAR-RISs: A general optimization framework. IEEE Wirel. Commun. Lett. 2022, 12, 207–211. [Google Scholar] [CrossRef]
  28. Niu, H.; Chu, Z.; Zhou, F.; Xiao, P.; Al-Dhahir, N. Weighted sum rate optimization for STAR-RIS-assisted MIMO system. IEEE Trans. Veh. Technol. 2021, 71, 2122–2127. [Google Scholar] [CrossRef]
  29. Mu, X.; Liu, Y.; Guo, L.; Lin, J.; Schober, R. Joint deployment and multiple access design for intelligent reflecting surface assisted networks. IEEE Trans. Wirel. Commun. 2021, 20, 6648–6664. [Google Scholar] [CrossRef]
Figure 1. STAR-RIS-aided secure communication from a BS to a user in the presence of an eavesdropper.
Figure 1. STAR-RIS-aided secure communication from a BS to a user in the presence of an eavesdropper.
Applsci 14 07932 g001
Figure 2. Simulation setup for the considered network.
Figure 2. Simulation setup for the considered network.
Applsci 14 07932 g002
Figure 3. Convergence performance of the proposed algorithm.
Figure 3. Convergence performance of the proposed algorithm.
Applsci 14 07932 g003
Figure 4. The WSSR versus P t with M = 30 .
Figure 4. The WSSR versus P t with M = 30 .
Applsci 14 07932 g004
Figure 5. The WSSR versus M with P t = 0 dBm .
Figure 5. The WSSR versus M with P t = 0 dBm .
Applsci 14 07932 g005
Figure 6. Convergence of the proposed PDD algorithm.
Figure 6. Convergence of the proposed PDD algorithm.
Applsci 14 07932 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, B.; Wu, Y. Weighted Secrecy Sum Rate Optimization for Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface-Assisted Multiple-Input Single-Output Systems. Appl. Sci. 2024, 14, 7932. https://doi.org/10.3390/app14177932

AMA Style

Wu B, Wu Y. Weighted Secrecy Sum Rate Optimization for Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface-Assisted Multiple-Input Single-Output Systems. Applied Sciences. 2024; 14(17):7932. https://doi.org/10.3390/app14177932

Chicago/Turabian Style

Wu, Baoliang, and Yue Wu. 2024. "Weighted Secrecy Sum Rate Optimization for Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface-Assisted Multiple-Input Single-Output Systems" Applied Sciences 14, no. 17: 7932. https://doi.org/10.3390/app14177932

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop