Next Article in Journal
Proposing an Efficient Deep Learning Algorithm Based on Segment Anything Model for Detection and Tracking of Vehicles through Uncalibrated Urban Traffic Surveillance Cameras
Previous Article in Journal
A Method for Predicting Transformer Oil-Dissolved Gas Concentration Based on Multi-Window Stepwise Decomposition with HP-SSA-VMD-LSTM
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Covert Communications in Active-RIS-Aided NOMA Systems: Element Grouping or Not?

1
School of Information Science and Electrical Engineering, Shandong Jiaotong University, Jinan 250357, China
2
College of Astronautics, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(14), 2882; https://doi.org/10.3390/electronics13142882
Submission received: 25 June 2024 / Revised: 17 July 2024 / Accepted: 21 July 2024 / Published: 22 July 2024

Abstract

:
This paper investigates the impacts of element grouping on the covert communication performance of an active reconfigurable intelligent surface (ARIS)-aided uplink non-orthogonal multiple access (NOMA) system. Through element grouping, each element of the ARIS works in either the reflecting mode to reflect the information signal or the jamming mode to generate a jamming signal. Optimizing the NOMA transmit power, ARIS beamforming, and receive beamforming jointly is necessary to maximize the covert communication rate. To tackle the unsolvable covert communication rate maximization problem, we decouple the original problem into three sub-problems of optimizing the NOMA transmit power, ARIS beamforming, and receive beamforming, respectively. To tackle the mixed-integer non-linear programming for the element grouping, we introduce the arithmetic- and geometric-mean-based penalty term and apply the Dinkelbach transform to reformulate the optimization problem. Next, we propose an alternating optimization algorithm to optimize the system parameters. The numerical results demonstrate the effectiveness of the element grouping in improving the covert communication rate. However, the element grouping scheme achieves a lower covert communication rate performance compared to the scheme without element grouping, indicating that using element grouping for covert communications in the ARIS-aided uplink NOMA system is not the preferred option.

1. Introduction

Reconfigurable intelligent surfaces (RISs), which can be thought of as enablers to configure wireless propagation environments smartly, have been proposed and extensively developed for radar sensing and communications [1,2,3]. In particular, composed of a number of metasurface elements, RISs are capable of reflecting and refracting incident electromagnetic (EM) waves and imposing specified phases, which results in various EM functions, such as beamforming or interference nulling, by smartly configuring each element’s amplitude and phase shift [4,5,6]. With the abundant spatial degree of freedom (DoF) provided by the RIS, the information security performance can be enhanced from the physical-layer security (PLS) perspective [7,8], and the received signal-to-interference-plus-noise ratio (SINR) is also improved [9]. In comparison with traditional communication systems with radio frequency (RF) chains, RISs are expected to play a key role and to be one of the major technologies in future energy and spectrum-efficient wireless communications due to their straightforward structure. Also, the upcoming sixth-generation (6G) wireless networks regard RIS as a promising technology to facilitate massive connections [10].
In conventional passive RISs (PRISs), the metasurface elements are configured with low-power RF switches, allowing the noise to be ignored and resulting in relatively high power efficiency. It has been shown that implementing PRISs with large apertures and high array gains enhanced the performance of wireless communication systems [11]. Unfortunately, a PRIS brings only minimal performance improvement due to the “multiplicative fading” effect [12]. Even if large-scale PRISs with high array gain are employed, they are still ineffective to enlarge coverage ranges of wireless communication systems. To overcome the limitations of PRISs and extend their applications, the idea of active RIS (ARIS) has been introduced recently to scatter the incident signals with both amplifications and adjusted phase shifts [13,14,15,16]. Through amplifying incident waves, the strengths of the scattered signals are comparable to scenarios of direct link transmissions where the “multiplicative fading” effect is significant. Furthermore, an ARIS not only achieves an enhanced array gain and the required signal-to-noise ratio (SNR) at the receiver, but also becomes a PRIS when its amplifiers are turned off, making an ARIS more generalized than a PRIS.
Different from amplify-and-forward (AF) relays that also receive and radiate the amplified signals, ARISs have distinct architectures using a phase-reconfigurable reflection-type amplifier for metasurface elements [17,18]. Currently, ARISs can be implemented in several ways. For example, the incident waves can be reflected with orthogonal polarization by using an amplifying reflection array [19,20,21,22,23,24]. Furthermore, by using a two-layer patch antenna and a phase-reconfigurable reflection amplifier to formulate an active element, the ARIS is capable of beam-scanning and amplification [25]. In addition, both ARISs and PRISs operate in the full-duplex transmission model with full-band response, which is more attractive than half-duplex AF relays equipped with costly RF chains.
Recently, non-orthogonal multiple access (NOMA) technology has been incorporated as part of the upcoming 6G wireless networks [26]. In 6G wireless networks, NOMA plays a pivotal role in facilitating spectrally efficient massive wireless connections [27]. However, due to the open propagation of wireless signals, novel risks associated with information leakage and communication behavior exposure are introduced to the emerging NOMA systems. Ensuring the covertness of NOMA, especially preventing the exposure of NOMA communication behaviors, presents a significant and formidable challenge. In this context, covert communication emerges as a solution to address the security concerns in NOMA systems [10,28]. In [29], covert communications in a PRIS-aided NOMA system were investigated. It was shown that employing a PRIS significantly enhanced the covert communication performance of NOMA systems. Also, ARISs were utilized to maximize the covert communication rate in [30,31].
Since a large number of the metasurface elements are fabricated on a RIS, different functions could be allocated to different elements, and several element grouping schemes were proposed for RIS-aided wireless communication systems [32,33,34]. For example, the incident signal at the grouped PRIS elements could be adjusted to generate the jamming signal in the desired direction [32]. In [33], through element grouping, the incident signal on each PRIS element was amplified for information transmission or modulated into jamming, which effectively improved the PLS performance. On the other hand, using all ARIS elements to reflect the information signal led to certain security risks, whereas using all the ARIS elements to generate the jamming signal led to a decrease in reception quality for legitimate receivers. Therefore, the ARIS’s elements were divided into two groups, one working in the reflecting mode and the other in the jamming mode to improve the PLS performance [34]. It was shown that the element grouping scheme effectively improved the minimum secrecy rate among the NOMA users in an ARIS-aided NOMA system, achieving an enlarged channel gain difference between the legitimate and eavesdropping channels [34].
Different from PLS transmissions, proper randomness is needed to balance between the required covertness and legitimate transmission performance in NOMA systems. In particular, the superimposed signal of the NOMA users has already been regarded as a natural shield to conceal covert communication behaviors. When element grouping is applied in ARIS-aided NOMA systems, how to balance the covertness and legitimate transmission performance becomes critical in the presence of the NOMA superimposed signal. Although the element grouping has been investigated for the PLS, the applications of the element grouping in covert communications have never been investigated. Furthermore, although element grouping can improve the secrecy communication performance for the PLS, whether element grouping enhances the covert communication performance is still unknown. To the best of our knowledge, how to employ element grouping to realize covert communications in ARIS-aided NOMA systems has not been tackled.
In this work, the impacts of element grouping on covert communication performance are investigated for an ARIS-aided uplink NOMA system. In the element grouping scheme, each element of the ARIS works in at least one mode, i.e., information signal reflection or jamming signal reflection. By adjusting the reflection coefficient and working mode for each element, a trade-off between the covertness and legitimate transmission performance can be optimized. By jointly optimizing the NOMA transmit power, ARIS beamforming, and receive beamforming at the base-station (BS), our design goal is to maximize the covert communication rate. To tackle the intractable optimization problem, we decouple the original problem into three sub-problems of optimizing the NOMA transmit power, ARIS beamforming, and receive beamforming, respectively. We then derive closed-form expression for the sub-problem of the NOMA transmit power optimization. Mixed-integer non-linear programming for element grouping is effectively addressed by an arithmetic and geometric mean (AGM)-based penalized Dinkelbach transform approach. Then, an efficient alternating optimization (AO) algorithm is proposed to solve the formulated non-convex covert communication rate maximization problem [35,36]. Various simulation results are provided to verify whether element grouping enhances covert communication performance or not. Our work shows that the scheme without element grouping achieves a better covert communication performance than the scheme with element grouping, which is a valuable and novel finding that has never been reported before. Also, the findings in this paper are valuable and meaningful for a practical design of the ARIS-aided covert communications.
The remaining sections of the paper are organized as follows: Section 2 presents the system model, including the ARIS-aided transmission scheme with element grouping (denoted as the w-EG scheme in the following) and the ARIS-aided transmission scheme without element grouping (denoted as the w/o-EG scheme in the following). The problem formulation and the proposed solutions are presented in Section 3. Simulation results are illustrated in Section 4. Finally, Section 5 concludes the work.
Notations: Throughout the paper, scalars are represented by italic letters, and vectors and matrices are represented by boldfaced lowercase and uppercase letters, respectively. Pr { · } denotes probability, and · denotes the Euclidean norm of a complex vector. Superscript ( · ) T , ( · ) * , and ( · ) H denote vector/matrix transpose, conjugate, and Hermitian transpose, respectively. C M × N denotes the spaces of M × N complex-valued matrices. A 0 indicates that A is a positive semi-definite matrix. The symbols rank ( A ) and tr ( A ) denote the rank and trace of matrix A , respectively. 0 N and 1 N denote the N-dimensional all-zero and all-ones vectors, respectively. I N denote the N × N identity matrix. diag ( a ) denotes the N × N diagonal matrix with diagonal elements a 1 , , a N . The notation C N ( ν , σ 2 ) denotes a circular symmetric complex Gaussian (CSCG) random distribution with mean ν and variance σ 2 .

2. System Model

The considered uplink NOMA system consists of a multi-antenna BS (Bob), a pair of NOMA users (Alice and Carol), and a warden (Willie), as shown in Figure 1. We assume that Alice is a covert user who has high-level of privacy and security requirements and Carol is a public user who only has transmission reliability requirements. For instance, Alice is a law enforcement node needing to hide its transmission pattern, while Carol transmits live streams possessing low or no confidential requirements. The ARIS is deployed between the NOMA users and Bob to not only aid the uplink transmissions from Alice and Carol, but also reflect jamming signals towards Willie to enhance the covert communication performance. In the considered system, the ARIS consists of N reflecting elements, Bob is equipped with M receive antennas, and the remaining nodes (Alice, Carol, and Willie) are each equipped with a single antenna. All the links associated with the ARIS are modeled to experience Rician fading, while all the direct links from the NOMA users (Alice and Carol) to Bob and Willie are modeled to experience Rayleigh fading. We assume that all the links follow quasi-statistic block fading. By exploiting the existing channel estimation methods for RIS-aided systems [37,38,39], Alice and Carol acquire the channel state information (CSI) associated with the ARIS and that of the direct links. To characterize the performance limit of the considered system, we further ignore the channel estimation error and assume that Bob has perfect CSI of Alice and Carol [29,30,31,37,38,39].
Let h i b C M × 1 and h i w C denote the direct links from node i to Bob and Willie, respectively, with i { a , c } representing Alice and Carol, respectively. Similarly, the channels from node i to the ARIS are denoted by h i r C N × 1 , and the channels from the ARIS to Bob and Willie are denoted by H r b C M × N and h r w H C 1 × N , respectively. If Alice and Carol transmit the information signals simultaneously in a transmission block, the arrived signal at the ARIS can be written as:
y r = P a h a r x a + P c h c r x c + n r ,
where x i C N ( 0 , 1 ) is the signal transmitted by node i with i { a , c } , P i is the transmit power of node i satisfying 0 P i P i max with P i max denoting the maximum transmit power, and n r C N ( 0 N , σ r 2 I N ) is additive noise at the ARIS with zero mean and variance σ r 2 . After the amplitude and phase-shift adjustments, the departure signal from the ARIS can be expressed as:
y ^ r = P a Θ h a r x a + P c Θ h c r x c + Θ n r ,
where Θ is the amplitude–phase-shift coefficient matrix of the ARIS.
The power of the departure signal at the ARIS is constrained by
P a Θ h a r 2 + P c Θ h c r 2 +   Θ F 2 σ r 2 P r max ,
where P r max = P ris N P circuit is the maximum power budget at the ARIS with P ris and P circuit denoting the total power of the ARIS and the power consumption per circuit element, respectively [34]. In the rest of this section, we present two ARIS-aided transmission schemes in detail, namely, the w-EG scheme and the w/o-EG scheme. Each scheme is discussed separately in the following two subsections.

2.1. w-EG Scheme

In this section, we investigate the impacts of the w-EG scheme on the covert communication performance of an ARIS-aided NOMA system. For the w-EG scheme, Θ = Θ r + Θ j is the amplitude–phase-shift coefficient matrix of the ARIS with the reflecting matrix Θ r = M r Θ ¯ r and jamming matrix Θ j = M j Θ ˜ j . Specifically, M r = diag ( [ α ¯ 1 , α ¯ 2 , , α ¯ N ] T ) and M j = diag ( [ α ˜ 1 , α ˜ 2 , , α ˜ N ] T ) are the mode selection matrices with α ¯ n , α ˜ n { 0 , 1 } , α ¯ n + α ˜ n = 1 , and n N { 1 , 2 , , N } . With the aid of the mode selection matrices, each element of the ARIS works in either the reflection mode or the jamming mode. The matrices Θ ¯ r = diag ( [ β ¯ 1 e j ϕ ¯ 1 , β ¯ 2 e j ϕ ¯ 2 , , β ¯ N e j ϕ ¯ N ] T ) and Θ ˜ j = diag ( [ β ˜ 1 e j ϕ ˜ 1 , β ˜ 2 e j ϕ ˜ 2 , , β ˜ N e j ϕ ˜ N ] T ) contain the reflection coefficients for enhancing the NOMA transmission quality and deteriorating Willie’s detection performance, respectively, where β ¯ n , β ˜ n [ 0 , η n ] and ϕ ¯ n , ϕ ˜ n [ 0 , 2 π ) denote the nth element’s reflecting amplitude and phase shift, respectively, with η n > 1 denoting the allowed maximum reflecting amplitude.
At Bob, the received signal can be expressed as:
y b = P a x a ( g a b + z a b ) + P c x c ( g c b + z c b ) + H r b Θ n r + n b ,
where g i b = h i b + H r b Θ r h i r is the composite transmission channel from node i ( i { a , c } ) to Bob, z i b = H r b Θ j h i r is the composite jamming channel from node i ( i { a , c } ) to Bob, and n b C N ( 0 M , σ b 2 I M ) is additive noise at Bob with zero mean and variance σ b 2 . Then, a beamformer w C M × 1 is applied at Bob to obtain y b = w H y b for further processing. In the considered ARIS-aided uplink NOMA system, the user ordering is conducted based on the channel gains [29,40]. Specifically, the two users, Alice and Carol, are paired based on their channel gains. At Bob, to guarantee the successful successive interference cancellation (SIC), the signal of the user with the stronger channel gain is decoded first. Then, the signal of the user with the weaker channel gain is decoded at the last stage of the SIC processing. To facilitate SIC at Bob, we assume that g c b 2 > g a b 2 is guaranteed by not only h c b 2 h a b 2 , but also the amplitude–phase-shift coefficient matrix Θ as optimized in the next section. Consequently, x a is decoded at the last stage of SIC without suffering from inter-user interference. The achievable rates of decoding of x a and x c are given by R a = log 2 ( 1 + γ a ) and R c = log 2 ( 1 + γ c ) , respectively, where γ a and γ c are the received SINRs given by γ a = P a | w H g a b | 2 P a | w H z a b | 2 + w H H r b Θ 2 σ r 2 + σ b 2 and γ c = P c | w H g c b | 2 P a | w H ( g a b + z a b ) | 2 + P c | w H z c b | 2 + w H H r b Θ 2 σ r 2 + σ b 2 , respectively.
In order to judge whether Alice transmits an information signal to Bob or not, Willie performs a binary decision according to the Neyman–Pearson criterion [41], which results in two hypotheses as follows:
H 0 : y w = P c x c ( g c w + z c w ) + h r w H Θ n r + n w ,
H 1 : y w = P a ( g a w + z a w ) + P c ( g c w + z c w ) + h r w H Θ n r + n w ,
where g i w = h i w + h r w H Θ r h i r with i { a , c } , z i w = h r w H Θ j h i r with i { a , c } , and n w C N ( 0 , σ w 2 ) denotes additive noise at Willie with zero mean and variance σ w 2 . The likelihood functions of the received signals under H 0 and H 1 can be written as p 0 ( y w ) = e | y w | 2 / σ 0 2 / π σ 0 2 and p 1 ( y w ) = e | y w | 2 / σ 1 2 / π σ 1 2 , respectively, with σ 0 2 = P c | g c w + z c w | 2 + h r w H Θ 2 σ r 2 + σ w 2 and σ 1 2 = P a | g a w + z a w | 2 + P c | g c w + z c w | 2 + h r w H Θ 2 σ r 2 + σ w 2 . Under the Neyman–Pearson criterion, Willie makes the likelihood ratio test p 1 ( y w ) p 0 ( y w ) D 0 D 1 1 to minimize the detection error probability (DEP), where D 0 and D 1 denote the binary decisions endorsing H 0 and H 1 , respectively. In practice, Willie utilizes its average received power P w = M ¯ 1 M ¯ m ¯ = 1 M ¯ | y w ( m ¯ ) | 2 as the decision statistic with m ¯ denoting the transmission block index. Then, the optimal decision rule for Willie can be rewritten as P w D 0 D 1 ϕ * , where ϕ * = σ 0 2 σ 1 2 σ 1 2 σ 0 2 ln σ 1 2 σ 0 2 is the optimal detection threshold for Willie’s decision, which results in the following minimum DEP [41]:
ξ * = Pr ( D 1 | H 0 ) + Pr ( D 0 | H 1 ) = Pr ( P w ϕ * | H 0 ) + Pr ( P w ϕ * | H 1 ) = 1 + σ 1 2 σ 0 2 σ 1 2 σ 1 2 σ 0 2 σ 1 2 σ 0 2 σ 0 2 σ 1 2 σ 0 2 ,
where Pr ( D 1 | H 0 ) and Pr ( D 0 | H 1 ) denote the false alarm and missed detection probabilities, respectively. To facilitate a feasible covert communication design, we introduce a lower bound on ξ * as [41]:
ξ * 1 1 2 D p 0 ( y w )   p 1 ( y w ) ,
where D p 0 ( y w )   p 1 ( y w ) is the Kullback–Leibler (KL) divergence, which can be evaluated as:
D p 0 ( y w )   p 1 ( y w ) = ln σ 1 2 σ 0 2 + σ 0 2 σ 1 2 1 .
To guarantee the transmission covertness from Alice to Bob, the minimum DEP of Willie should satisfy ξ * 1 ε with ε > 0 being a small value to represent the required covertness level. By using the KL divergence and the lower bound on ξ * in (8), a tighter covertness constraint can be formulated as D p 0 ( y w )   p 1 ( y w ) 2 ε 2 . Due to the fact that the monotonically increasing function f ( λ ) = ln λ + 1 λ 1 with respect to λ [ 1 , ) in addition to f ( 1 ) = 0 and f ( ) = , the covertness constraint can be reformulated as:
P a | g a w + z a w | 2 + ( 1 κ ) P c | g c w + z c w | 2 + ( 1 κ )     h r w H Θ 2 σ r 2 ( κ 1 ) σ w 2 ,
where κ is the unique solution of f ( λ ) = 2 ε 2 in the range [ 1 , ) .

2.2. w/o-EG Scheme

In this section, we investigate the impacts of the w/o-EG scheme on the covert communication performance of the ARIS-aided NOMA system. It is noted that for the w/o-EG scheme, the amplitude–phase-shift coefficient matrix can be simplified as Θ = Θ r with M r = I N regarding the system model of the w-EG scheme. In the w/o-EG scheme, the ARIS selects only one reflection mode for all the elements to reflect the information signal. Similarly to the w-EG scheme, the w/o-EG scheme and the corresponding system model can be described as follows.
At Bob, the received signal can be expressed as:
y ^ b = P a x a g a b + P c x c g c b + H r b Θ n r + n b .
Then, a beamformer w is applied at Bob to obtain y ^ b = w H y ^ b for further processing. Similarly, we decode x a at the last stage to guarantee a successful SIC at Bob. The achievable rates of decoding of x a and x c are given by R ^ a = log 2 ( 1 + γ ^ a ) and R ^ c = log 2 ( 1 + γ ^ c ) , respectively, where γ ^ a and γ ^ c are the received SINRs given by γ ^ a = P a | w H g a b | 2 w H H r b Θ 2 σ r 2 + σ b 2 and γ ^ c = P c | w H g c b | 2 P a | w H g a b | 2 +   w H H r b Θ 2 σ r 2 + σ b 2 , respectively.
In the w/o-EG scheme, the received signals at Willie under H 0 and H 1 , respectively, can be expressed as:
H 0 : y ^ w = P c x c g c w + h r w H Θ n r + n w ,
H 1 : y ^ w = P a g a w + P c g c w + h r w H Θ n r + n w .
The likelihood functions of the received signals under H 0 and H 1 can be written as p 0 ( y w ) and p 1 ( y w ) , respectively, with σ 0 2 = P c | g c w | 2 + h r w H Θ 2 σ r 2 + σ w 2 and σ 1 2 = P a | g a w | 2 + P c | g c w | 2 + h r w H Θ 2 σ r 2 + σ w 2 . Similar to the derivation of (10), the covertness constraint under this setup can be formulated as:
P a | g a w | 2 + ( 1 κ ) ( P c | g c w | 2 + h r w H Θ 2 σ r 2 ) ( κ 1 ) σ w 2 .

3. Problem Formulation and Proposed Solutions

3.1. Problem Formulation

The aim of the covert communication design is to maximize the covert communication rate R a and R ^ a for the w-EG and w/o-EG schemes, respectively, by jointly optimizing the NOMA transmit power, ARIS beamforming, and receive beamforming subject to the constraint on the covertness level, quality-of-service (QoS) requirements of Carol, power budget at the ARIS, and SIC processing constraint at Bob.
For the w-EG scheme, we formulate the covert communication rate R a ’s maximization problem as follows:
( P 1 ) : max P a , P c , w , Θ R a
s . t . P i P i max , i { a , c } ,
g c b 2 > g a b 2 ,
R c R c min ,
α ¯ n + α ˜ n = 1 , n N ,
α ¯ n , α ˜ n { 0 , 1 } , n N ,
β ¯ n , β ˜ n [ 0 , η n ] , n N ,
w 2 = 1 ,
( 3 ) and ( 10 ) .
In problem (P1), constraint (15b) limits the maximum transmit power of node i, constraint (15c) guarantees a successful SIC at Bob, constraint (15d) ensures the minimum rate R c min of Carol, constraint (15e) and (15f) make each element work in at least one mode, i.e., information signal reflection or jamming signal reflection, constraint (15g) sets the maximum signal amplification for each element, (15h) sets the unit power constraint on the receive beamformer, and constraint (15i) ensures the maximum reflection power of the ARIS and the required covertness level, respectively.
For the w/o-EG scheme, the covert communication rate R ^ a ’s maximization problem is formulated as follows:
( P 2 ) : max P a , P c , w , Θ R ^ a
s . t . P i P i max , i { a , c } ,
g c b 2 > g a b 2 ,
R ^ c R ^ c min ,
β ¯ n [ 0 , η n ] , n N ,
w 2 = 1 ,
( 3 ) and ( 14 ) .
In problems (P1) and (P2), the optimization objectives (15a) and (16a) are non-concave, and the majority of the constraints are non-convex, so both problems (P1) and (P2) should be transformed into concave ones to be solved.

3.2. Proposed Solution to Problem (P1)

Due to the non-concave objective function and the highly coupled system parameters in the constraints, problem (P1) is intractable. Moreover, constraint (15f) formulates a mixed-integer non-linear programming problem. In the following, we first decouple the original problem into three sub-problems of optimizing the NOMA transmit power at Alice and Carol, ARIS beamforming, and receive beamforming, respectively. Then, the integer constraint and the rank-one constraint in the decoupled sub-problems are tackled, respectively, and a penalty-based AO algorithm is proposed to obtain the optimized solution for problem (P1).
With any given Θ and w , problem (P1) reduces to optimizing the NOMA transmit powers P a and P c , which can be formulated as:
( P 3 ) : max P a , P c γ a
s . t . γ c γ th ,
( 3 ) , ( 10 ) and ( 15 b ) .
In problem (P3), we replace the objective function R a with γ a , equivalently. Moreover, constraint (17b) represents the QoS requirements of Carol with γ th = 2 R c min 1 . Since the objective function γ a monotonically increases with P a , the equality in constraint (15b) holds when the objective function achieves its maximum value, which results in P a P a max . Furthermore, constraints (3), (10) and (17b) can be rewritten as P a Ξ 1 , P a Ξ 2 , and P a Ξ 3 , respectively.
Ξ 1 = P r max P c Θ h c r 2   Θ F 2 σ r 2 Θ h a r 2 ,
Ξ 2 = ( κ 1 ) ( σ w 2 + P c | g c w + z c w | 2 +   h r w H Θ 2 σ r 2 ) | g a w + z a w | 2 ,
Ξ 3 = P c | w H g c b | 2 γ th P c | w H z c b | 2 +   w H H r b Θ 2 σ r 2 + σ b 2 γ th | w H ( g a b + z a b ) | 2 .
Thus, the optimal solution of the NOMA transmit power at Alice and Carol can be derived as:
P a = min P a max , Ξ 1 , Ξ 2 , Ξ 3 and P c = P c max .
With any given P a , P c , and w , the sub-problem of optimizing Θ is formulated as:
( P 4 ) : max Θ γ a
s . t . ( 15 c ) , ( 15 e ) , ( 15 f ) , ( 15 g ) , ( 15 i ) and ( 17 b ) .
It can be seen that the reflecting and jamming matrices are always in the form of a product, which motivates us to define θ r = [ diag ( Θ r ) ; 1 ] and A r = θ r θ r H . Meanwhile, we have A r 0 , rank ( A r ) = 1 , and diag ( A r ) = a r , where a r = diag ( A r ) = [ γ 1 r , , γ N r , 1 ] T with γ n r = ( α ¯ n β ¯ n ) 2 , n N . Similarly, we define θ j = [ diag ( Θ j ) ; 0 ] and A j = θ j θ j H . Meanwhile, we have A j 0 , rank ( A j ) = 1 , and diag ( A j ) = a j , where a j = diag ( A j ) = [ γ 1 j , , γ N j , 0 ] T with γ n j = ( α ˜ n β ˜ n ) 2 , n N . Furthermore, we introduce the variables G i b = g ¯ i b g ¯ i b T v i g ¯ i b v i g ¯ i b T 0 , G i w = g ¯ i w g ¯ i w T , Z i b = z ¯ i b z ¯ i b T z ¯ i b z ¯ i b T 0 , and Z i w = z ¯ i w z ¯ i w T z ¯ i w z ¯ i w T 0 with g ¯ i b = diag ( w H H r b ) h i r , v i = w H h i b , g ¯ i w = [ diag ( h r w H ) h i r ; h i w ] , z ¯ i b = diag ( w H H r b ) h i r , and z ¯ i w = diag ( h r w H ) h i r for i { a , c } . Then, we can express the composite channel gains in the form of | w H g i b | 2 = Tr ( G i b A r ) + | v i | 2 , | w H z i b | 2 = Tr ( Z i b A j ) , | g i w | 2 = Tr ( G i w A r ) , and | z i w | 2 = Tr ( Z i w A j ) with i { a , c } . By introducing S = diag | [ s ] 1 | 2 , | [ s ] 2 | 2 , , | [ s ] N | 2 , 0 T with s = w H H r b and G k l = diag | [ h k l ] 1 | 2 , | [ h k l ] 2 | 2 , , | [ h k l ] N | 2 , 0 T with k l { r w , a r , c r } , we have h r w H Θ 2 = Tr ( G r w ( A r + A j ) ) , Θ h a r 2 = Tr ( G a r ( A r + A j ) ) , Θ h c r 2 = Tr ( G c r ( A r + A j ) ) , and w H H r b Θ 2 = Tr ( S ( A r + A j ) ) . Moreover, we have Θ F 2 = Tr ( Π ( A r + A j ) ) with Π = diag ( [ I 1 × N , 0 ] T ) . Then, we can rewrite problem (P4) as problem (P4.1):
( P 4.1 ) : max A m P a Tr ( G a b A r ) + | v a | 2 P a Tr ( Z a b A j ) + σ r 2 Tr ( S ( A r + A j ) ) + σ b 2
s . t . Tr ( G c b A r ) + | v c | 2 > Tr ( G a b A r ) + | v a | 2 , P a Tr ( G a r ( A r + A j ) ) + P c Tr ( G c r ( A r + A j ) )
+ σ r 2 Tr ( A r + A j ) P r max , P a ( Tr ( G a w A r ) + Tr ( Z a w A j ) ) + ( 1 κ ) ( P c ( Tr ( G c w A r )
+ Tr ( Z c w A j ) ) + Tr ( G r w ( A r + A j ) ) σ r 2 ) ( κ 1 ) σ w 2 , P c ( Tr ( G c b A r ) + | v c | 2 ) γ th ( P a ( Tr ( G a b A r ) + | v a | 2
+ Tr ( Z a b A j ) ) + P c Tr ( Z c b A j ) + Tr ( S ( A r + A j ) ) σ r 2 + σ b 2 ) ,
rank ( A m ) = 1 , A m 0 , m { r , j } ,
( 15 e ) , ( 15 f ) and ( 15 g ) .
Nevertheless, problem (P4.1) is a concave–convex fractional programming problem in addition to the challenges of the rank-one constraint in (23f), the binary integer constraint in (15f), and the coupling between the amplification factors and mode selection coefficients. To tackle problem (P4.1), the Dinkelbach transform is applied to tackle the objective function and the following specific process is introduced to deal with the non-convex constraints.
With the definition of γ n r and γ n j , constraint (15e) can be written as:
γ n m η n 2 , n N , m { r , j } .
Since the value of α ¯ n ( α ˜ n ) can only be 0 or 1, constraint (15f) is equivalent to
γ n r + γ n j η n 2 , n N .
To make the integrated variable γ n m contain the mode selection function shown in (15f), it should satisfy γ n r γ n j = 0 , which is a non-convex form. As an alternation, we consider a more general case, i.e., γ n r γ n j 0 . To make the equation hold if and only if γ n r and γ n j equal to 0, we add the following constraint to ensure that each element works in at least one mode:
γ n r + γ n j 1 , n N .
At the same time, it is necessary to penalize the part of γ n r γ n j > 0 , and we obtain its upper bound by the AGM inequality, which is given by
γ n r γ n j 1 2 φ n γ n r 2 + 1 2 γ n j φ n 2 = A γ n r , γ n j , n N ,
where the equality holds if and only if φ n = γ n j γ n j γ n r γ n r . Then, a penalty term n = 1 N A γ n r , γ n j is introduced into the objective function to deal with the binary integer constraint.
Let A m * and A m 2 denote the nuclear norm and spectral norm of A m , respectively. To deal with the rank-one constraint, we add a penalty term m { r , j } R A m , A m ( k ) into the objective function, where A m ( k ) is the solution obtained in the kth iteration and R A m , A m ( k ) = A m * + A ^ m ( k ) with A ^ m ( k ) = A m ( k ) 2 Tr ( v max ( k ) ( v max ( k ) ) H ( A m A m ( k ) ) ) and v max ( k ) denoting the eigenvector corresponding to the largest eigenvalue of A m ( k ) . Since rank ( A m ) = 1 ensures A m * A m 2 = 0 , the term A m * + A ^ m ( k ) forms an upper bound on A m * A m 2 . Let f 1 ( A m ) = P a Tr ( G a b A r ) + | v a | 2 and f 2 ( A m ) = P a Tr ( Z a b A j ) + σ r 2 Tr ( S ( A r + A j ) ) + σ b 2 ; a new objective function after the Dinkelbach transform is formulated as:
f ( A m ) = f 1 ( A m ) v 1 f 2 ( A m ) ρ 1 n = 1 N A ( γ n r , γ n j ) ρ 2 m { r , j } R A m , A m ( k ) ,
where ρ 1 and ρ 2 are the penalty factors, each starting with a small value to ensure the feasibility of the initial point and gradually increasing to make the solution tightly satisfy the constraints. Then, the complete sub-problem after transformation is formulated as:
( P 4.2 ) : max A m , a m f ( A m )
s . t . A m 0 , m { r , j } ,
diag ( A m ) = a m , m { r , j } ,
( 23 b ) , ( 23 c ) , ( 23 d ) , ( 23 e ) , ( 24 ) , ( 25 ) and ( 26 ) .
In problem (P4.2), the coefficient v 1 is updated by
v 1 ( k + 1 ) = f 1 ( A m ) ( k ) / f 2 ( A m ) ( k ) ,
where k is the iteration number with respect to the Dinkelbach transform coefficient v 1 . By using a convex problem solver such as CVX, we can now obtain the optimal solution of problem (P4.2).
With any given P a , P c , and Θ , we need to optimize the receive beamforming only. By introducing W = w w H , Ω i b = g i b g i b H , Ψ i b = z i b z i b H with i { a , c } , and F = F ¯ F ¯ H with F ¯ = H r b Θ , we can rewrite | w H g i b | 2 = Tr ( Ω i b W ) , | w H z i b | 2 = Tr ( Ψ i b W ) , and w H H r b Θ 2 = Tr ( F W ) . Now, the sub-problem of optimizing w can be formulated as:   
( P 5 ) : max w P a Tr ( Ω a b W ) P a Tr ( Ψ a b W ) + σ r 2 Tr ( F W ) + σ b 2 s . t . P c Tr ( Ω c b W ) γ th ( P a Tr ( ( Ω a b + Ψ a b ) W ) + Tr ( F W ) σ r 2
+ P c Tr ( Ψ c b W ) + σ b 2 ) ,
rank ( W ) = 1 , Tr ( W ) = 1 , W 0 .
To tackle the rank-one constraint in problem (P5), we add a penalty term ρ 3 R W , W ( k ) = ρ 3 W * + W ^ ( k ) into the objective function, where ρ 3 is the penalty factor, k is the iteration number with respect to the penalty term, and W ^ ( k ) = W ( k ) 2 Tr ( v ˜ max ( k ) ( v ˜ max ( k ) ) H ( W W ( k ) ) ) with W ( k ) denoting the solution obtained in the kth iteration and v ˜ max ( k ) denoting the eigenvector corresponding to the largest eigenvalue of W ( k ) . Let f 3 ( W ) = Tr ( Ω a b W ) and f 4 ( W ) = P a Tr ( Ψ a b W ) + σ r 2 Tr ( F W ) + σ b 2 . Then, with the introduced penalty term and applying the Dinkelbach transform, problem (P5) is reformulated as:
( P 5.1 ) : max W f 3 ( W ) v 2 f 4 ( W ) ρ 3 R W , W ( k )
s . t . Tr ( W ) = 1 , W 0 , and ( 31 b ) .
In problem (P5.1), the coefficient v 2 is updated by
v 2 ( k + 1 ) = f 3 ( W ) ( k ) / f 4 ( W ) ( k ) ,
where the Dinkelbach transform coefficient v 2 is updated by (33) in the kth iteration. Now, a convex problem solver can be applied to obtain the optimal solution of problem (P5.1).
Based on the optimized solutions for problems (P4.2) and (P5.1), the proposed AO algorithm to obtain the solution for problem (P1) is summarized in Algorithm 1. The complexity of solving problems (P4.2) and (P5.1) are O ( I a I d I p ( N + 1 ) 3.5 ) and O ( I a I d I p ( M ) 3.5 ) , where I a , I d , and I p are the number of iterations of the AO procedure, iteration numbers with respect to the penalty term, and Dinkelbach coefficients, respectively.
Algorithm 1 AO algorithm for optimizing { P a , P c , A m , W }
 1:
Initialize t 0 , P a ( 0 ) , P c ( 0 ) , φ ( 0 ) , A m ( 0 ) , and W ( 0 )
 2:
repeat  t t + 1
 3:
  Update P a ( t ) according to (21)
 4:
  Initialize ρ 1 > 0 , ρ 2 > 0 , v 1 ( 0 ) > 0 , k 0
 5:
  repeat  k k + 1
 6:
    Update A m ( k ) by solving (P4.2)
 7:
    Update φ n ( k + 1 ) = ( γ n j ) ( k ) / ( γ n r ) ( k )
 8:
    Update v 1 ( k + 1 ) according to (30)
 9:
    Update ρ 1 c 1 ρ 1 and ρ 2 c 2 ρ 2
10:
  until  ρ 1 n = 1 N A γ n r , γ n j ξ 2 and
11:
     ρ 2 m { r , j } R A m , A m ( k ) ξ 3
12:
   A m ( t ) A m ( k )
13:
  Initialize ρ 3 > 0 , v 2 ( 0 ) > 0 , k 0
14:
  repeat  k k + 1
15:
    Update W ( k ) by solving (P5.1)
16:
    Update v 2 ( k + 1 ) according to (33)
17:
    Update ρ 3 c 3 ρ 3
18:
  until  ρ 3 R W , W ( k ) ξ 4
19:
   W ( t ) W ( k )
20:
until  γ a ( t ) γ a ( t 1 ) ξ 1

3.3. Proposed Solution to Problem (P2)

The main challenge for solving problem (P2) is the intractable non-concave objective function and non-convex constraints. To address these challenges, we decouple problem (P2) into three sub-problems of optimizing the NOMA transmit power, ARIS beamforming, and receive beamforming, respectively. Similarly to Algorithm 1, we design an AO algorithm to obtain the optimal solution of problem (P2).
With any given Θ and w , problem (P2) reduces to optimizing the NOMA transmit power P a and P c , which can be formulated as:
( P 6 ) : max P a , P c γ ^ a
s . t . γ ^ c γ ^ th ,
( 3 ) , ( 14 ) and ( 16 b ) .
In problem (P6), we replace the objective function R ^ a with γ ^ a , equivalently. Moreover, constraint (34b) represents the QoS requirements of Carol with γ ^ th = 2 R ^ c min 1 . Similar to the approach adopted in problem (P3), constraints (14) and (34b) can be rewritten as P a Ξ 4 and P a Ξ 5 , respectively:
Ξ 4 = ( κ 1 ) ( σ w 2 + P c | g c w | 2 + h r w H Θ 2 σ r 2 ) | g a w | 2 ,
Ξ 5 = P c | w H g c b | 2 γ ^ th w H H r b Θ 2 σ r 2 + σ b 2 γ ^ th | w H g a b | 2 .
Thus, the optimal solution of the NOMA transmit power at Alice and Carol can be derived as:
P a * = min P a max , Ξ 1 , Ξ 4 , Ξ 5 and P c * = P c max .
With any given P a , P c , and w , the sub-problem of optimizing Θ is formulated as:
( P 7 ) : max Θ γ ^ a
s . t . ( 16 c ) , ( 16 e ) , ( 16 g ) and ( 34 b ) .
Similar to the approach adopted in problem (P4.1), we can rewrite problem (P7) as problem (P7.1):
( P 7.1 ) : max A r P a Tr ( G a b A r ) + | v a | 2 σ r 2 Tr ( S A r ) + σ b 2
s . t . Tr ( G c b A r ) + | v c | 2 > Tr ( G a b A r ) + | v a | 2 ,
P a Tr ( G a r A r ) + P c Tr ( G c r A r ) + σ r 2 Tr ( A r ) P r max , P a Tr ( G a w A r ) + ( 1 κ ) ( P c Tr ( G c w A r )
+ Tr ( G r w A r ) σ r 2 ) ( κ 1 ) σ w 2 , P c ( Tr ( G c b A r ) + | v c | 2 ) γ ^ th ( P a ( Tr ( G a b A r ) + | v a | 2 )
+ Tr ( S A r ) σ r 2 + σ b 2 ) ,
rank ( A r ) = 1 , A r 0 ,
( 16 e ) .
Nevertheless, problem (P7.1) is a concave–convex fractional programming problem in addition to the challenge of the rank-one constraint in (39f). Similar to the approach adopted in problem (P4.2), we transform problem (P7.1) into a concave one by applying the penalized Dinkelbach approach, which is formulated as:   
( P 7.2 ) : max A r , a r f 5 ( A r ) v 3 f 6 ( A r ) ρ 4 R A r , A r ( k )
s . t . A r 0 ,
diag ( A r ) = a r ,
( 39 b ) , ( 39 c ) , ( 39 d ) and ( 39 e ) .
In problem (P7.2), the coefficient v 3 is updated by
v 3 ( k + 1 ) = f 5 ( A r ) ( k ) / f 6 ( A r ) ( k ) ,
where the Dinkelbach transform coefficient v 3 is updated by (41) in the kth iteration.
With any given P a , P c , and Θ , we need to optimize the receive beamforming only. Now, the sub-problem of optimizing w can be formulated as:
( P 8 ) : max w P a Tr ( Ω a b W ) σ r 2 Tr ( F W ) + σ b 2
s . t . P c Tr ( Ω c b W ) γ th P a Tr ( Ω a b W ) + Tr ( F W ) σ r 2 + σ b 2 ,
rank ( W ) = 1 , Tr ( W ) = 1 , W 0 .
To tackle the rank-one constraint in problem (P8), we apply the same penalized Dinkelbach approach as in problem (P5.1), which is formulated as:
( P 8.1 ) : max W f 7 ( W ) v 4 f 8 ( W ) ρ 5 R W , W ( k )
s . t . Tr ( W ) = 1 , W 0 , and ( 42 b ) .
In problem (P8.1), the coefficient v 4 is updated by
v 4 ( k + 1 ) = f 7 ( W ) ( k ) / f 8 ( W ) ( k ) ,
where the Dinkelbach transform coefficient v 4 is updated by (44) in the kth iteration.
Utilizing the optimized solutions for problems (P7.2) and (P8.1), Algorithm 2 summarizes the proposed AO algorithm to obtain the solution for problem (P2). In addition, the overall computational complexity of the algorithm for solving problems (P7.2) and (P8.1) can be characterized by O I a I d I p ( N + 1 ) 3.5 and O I a I d I p ( M ) 3.5 .
Algorithm 2 AO algorithm for optimizing { P a , P c , A r , W }
 1:
Initialize t 0 , P a ( 0 ) , P c ( 0 ) , A r ( 0 ) , and W ( 0 )
 2:
repeat  t t + 1
 3:
  Update P a ( t ) according to (37)
 4:
  Initialize ρ 4 > 0 , v 3 ( 0 ) > 0 , k 0
 5:
  repeat  k k + 1
 6:
    Update A r ( k ) by solving (P7.2)
 7:
    Update v 3 ( k + 1 ) according to (41)
 8:
    Update ρ 4 c 4 ρ 4
 9:
   until  ρ 4 R A r , A r ( k ) ξ 5
10:
   A r ( t ) A r ( k )
11:
  Initialize ρ 5 > 0 , v 4 ( 0 ) > 0 , k 0
12:
  repeat  k k + 1
13:
    Update W ( k ) by solving (P8.1)
14:
    Update v 4 ( k + 1 ) according to (44)
15:
    Update ρ 5 c 5 ρ 5
16:
  until  ρ 5 R W , W ( k ) ξ 6
17:
   W ( t ) W ( k )
18:
until  γ a ( t ) γ a ( t 1 ) ξ 1

4. Simulation Results

In this section, we present simulation results to evaluate the covert communication performance of the proposed scheme. We assumed that the ARIS-aided uplink NOMA system operated in the mmWave band with a carrier frequency of 28 GHz and a bandwidth of 251.1886 MHz [42]. We set the simulation parameters as M = 4 , N = 16 with the size of the ARIS panel being 2 cm × 2 cm [43], σ b 2 = σ w 2 = σ r 2 = 90 dBm, ρ = 0 , R c min = R ^ c min = 1 bps/Hz, η n 2 = η 2 , n , ξ 1 = 10 1 , ξ 2 = ξ 3 = ξ 4 = 10 3 , ρ 1 = ρ 2 = ρ 3 = 10 6 , and c 1 = c 2 = c 3 = 3.6 [29,31]. The small-scale fading of all channels followed CN ( 0 , 1 ) . The distance-related path loss of each channel was modeled as L = L 0 ( d d 0 ) χ , where L 0 = 30 dB, d 0 = 1 m, and d is the distance between two nodes. We considered the path-loss exponential factor χ = 3.5 for the direct links and χ = 2.2 for the channels associated with ARIS. The Rician factor for the links associated with the ARIS was set to 3 dB. The locations of Bob, ARIS, Alice, Carol, and Willie were set as ( 0 , 15 ) m, ( 50 , 45 ) m, ( 80 , 30 ) m, ( 70 , 15 ) m, and ( 10 , 30 ) m, respectively. In the following discussions, we compare the impacts of element grouping on the covert communication performance of an ARIS-aided NOMA system against those without element grouping. Specifically, the impacts of the transmit power, the horizontal position of the ARIS, the covertness level, and the number of ARIS elements on the covert communication rate are investigated, respectively.
To gain insights on the implementation of the proposed schemes, we recorded the running time of the AO algorithms for the w/o-EG and w-EG schemes, as shown in Table 1. The simulation platform was a Lenovo Lecoo PC consisting of an Intel i5-12450H CPU and 16 G of memory. The operating system was Windows 11, and the software was Matlab R2023a. The results in Table 1 show that the AO algorithms of both the w/o-EG and w-EG schemes could be performed within 0.35 s, which was acceptable regarding the applied general PC platform. As expected, if a specific hardware/software platform was applied, e.g., FPGA and DSP, the real-time running speed of the proposed AO algorithms would be faster than that of a general PC.
The results in Figure 2 reveal the impacts of the transmit power budget on the covert communication rates for different schemes. From Figure 2, we can see that the covert communication rates achieved by all the schemes increased with the increasing P a max . The curves in Figure 2 confirmed that the proposed AO algorithm without employing element grouping achieved the highest covert communication rate in the whole transmit power regions. On the contrary, compared to the AO algorithm without employing element grouping, a decreased covert communication rate was achieved by the element grouping scheme. Furthermore, a higher η 2 rendered a higher covert communication rate for the proposed schemes, which indicated that the constraints (21) and (37) were inactive, respectively. The achieved covert communication rates of the randomized Θ and { Θ , W } tended to overlap with the increasing P a max , while the two considered schemes achieved a higher covert communication rate than the AO algorithm with element grouping in the low-transmit-power regime.
In Figure 3, the impacts of the ARIS’s location on the covert communication rate and Carol’s achievable rate were investigated, where we set P a max = P c max = 35 dBm, P r max = 30 dBm, M = 4 , N = 16 , and ϵ = 0.1 . Figure 3a shows the covert communication rate versus the ARIS’s horizontal position under different ARIS schemes, including the considered w-EG and w/o-EG schemes, where the vertical position of ARIS was fixed at 45 m. It shows that the covert communication rates achieved by the ARIS-aided NOMA system increased with the increasing horizontal position, until reaching about 45 m when they began to decrease, which indicated that when the ARIS was properly deployed close to Bob and the users, the highest covert communication rate could be achieved. Furthermore, Figure 3a reveals that the covert communication performance of the w/o-EG scheme outperformed that of the w-EG scheme in an ARIS-aided NOMA system. On the contrary, the covert communication rates achieved by the randomized Θ and { Θ , W } changed slightly with the increase in the horizontal position of the ARIS, whereas the achieved covert communication rates were far less than those achieved by the w-EG and w/o-EG schemes. Also, a higher η 2 rendered a higher covert rate for the proposed schemes. Furthermore, Figure 3b presents the results of Carol’s achievable rate versus the ARIS’s horizontal position for the considered ARIS schemes. The curves in Figure 3b show that the w/o-EG scheme obtained Carol’s highest achievable rate. Similarly to the covert communication rate, the location of the ARIS also affected Carol’s achievable rate. Carol’s highest achievable rate was obtained with a horizontal position of 45 m, which was the same position at which the maximum covert communication rate was obtained.
The covertness level ϵ versus the covert communication rate and Carol’s achievable rate for different schemes were investigated in Figure 4, where we set P a max = P c max = 35 dBm, P r max = 30 dBm, M = 4 , and N = 16 . As clearly shown by the curves in Figure 4a, the covert communication rates achieved by all the considered schemes increased with the increasing ϵ . This result is consistent with the theoretical analysis, i.e., when ϵ becomes larger, the covertness constraint becomes loose, and the allocatable transmit power for Alice and the reflection beamforming power towards the BS increase, which leads to a higher covert communication rate for the ARIS-aided NOMA system. The covert communication rate achieved in the ARIS-aided NOMA system increased dramatically at first from ϵ = 0.01 to ϵ = 0.05 , and then increased smoothly with the continued increase in ϵ . Moreover, the AO algorithm without employing element grouping achieved a higher covert communication rate than the AO algorithm with element grouping, while the achieved covert communication rate for the randomized { Θ , W } was lower than that of the randomized Θ . In Figure 4b, the curves of Carol’s achievable rate are plotted. The curves in Figure 4b show that Carol’s achievable rate increased with increasing ϵ . Also, when ϵ increased from 0.01 to 0.05, the achievable rate had a significant increase. After ϵ surpassed 0.05, Carol’s achievable rate increased slowly, having a trend similar to that of the covert communication rate in Figure 4a.
The curves in Figure 5 compare the covert communication rate and Carol’s achievable rate versus the number of ARIS elements N. In Figure 5, we set P a max = P c max = 35 dBm, P r max = 30 dBm, M = 4 , and ϵ = 0.1 . For the ARIS-aided NOMA system with the w/o-EG scheme, it is obvious that more reflecting elements of the ARIS provide a larger reflection beamforming gain and achieve a higher covert communication rate due to the exploitation of more DoFs to manipulate the propagation environments. Moreover, the covert communication rates achieved by the AO algorithm with element grouping increased with increasing N, until reaching about N = 12 , when they began to decrease. However, the covert communication rates achieved by the randomized Θ and { Θ , W } continued to decrease. Similarly to Figure 5a, the curves in Figure 5b show that the w/o-EG scheme achieved Carol’s highest achievable rate under the considered N range.
The trade-off between the covert communication rate performance of the w/o-EG and w-EG schemes was investigated in Figure 6a, where we set P a max = P c max = 35 dBm, P r max = 30 dBm, M = 4 , N = 16 , and ϵ = 0.1 . The results in Figure 6a show that the covert communication rate decreased with the increasing number of elements in the grouping. When the number of elements in the grouping was zero, which corresponded to the w/o-EG scheme, the maximum covert communication rate was achieved. If all the elements worked in the grouping, i.e., the w-EG scheme, the minimum covert communication rate was obtained. Furthermore, the trade-off between Carol’s achievable rate performance of the w/o-EG and w-EG schemes is plotted in Figure 6b. Similar to the results in Figure 6a, Carol’s maximum and minimum achievable rates were obtained by the w/o-EG and w-EG schemes, respectively. With the increasing number of elements in the grouping, the achievable rates obtained by all the considered schemes decreased monotonically.

5. Conclusions

In this paper, we proposed the w/o-EG and w-EG schemes to enhance the covert communication performance of an ARIS-aided uplink NOMA system. To reveal the impacts of element grouping on the covert communication performance of an ARIS-aided NOMA system, we formulated the covert communication rate maximization problem by jointly optimizing the NOMA transmit power, ARIS beamforming, and receive beamforming. To tackle the complicated non-concave objective function and highly coupled non-convex constraints, the original optimization problem was decoupled into the sub-problems of the NOMA transmit power allocation, ARIS beamforming, and receive beamforming, respectively. A closed-form expression for the optimal NOMA transmit power was derived. An AGM and penalized Dinkelbach transform based AO algorithm was proposed to tackle the mixed-integer non-linear programming for the element grouping-assisted covert communication rate maximization problem. The numerical results showed that while element grouping improved the covert communication performance, a decreased performance was observed compared to the scheme without employing element grouping. The simulation results also revealed that the number of elements in the grouping affected the trade-off in covert communication performance between the w/o-EG and w-EG schemes.

Author Contributions

Methodology, X.K., X.P. and H.L.; Validation, X.K. and F.L.; Formal analysis, X.K.; Resources, M.Z. and X.P.; Data curation, F.L. and M.Z.; Writing—original draft, X.K., H.L. and H.Y.; Writing—review & editing, X.K., H.L. and Q.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant 62071202.

Data Availability Statement

Data available in a publicly accessible repository.

Conflicts of Interest

The authors claim that there are no conflicts of interest.

References

  1. Basar, E.; Di Renzo, M.; De Rosny, J.; Debbah, M.; Alouini, M.S.; Zhang, R. Wireless Communications Through Reconfigurable Intelligent Surfaces. IEEE Access 2019, 7, 116753–116773. [Google Scholar] [CrossRef]
  2. Di Renzo, M.; Zappone, A.; Debbah, M.; Alouini, M.S.; Yuen, C.; de Rosny, J.; Tretyakov, S. Smart Radio Environments Empowered by Reconfigurable Intelligent Surfaces: How It Works, State of Research, and The Road Ahead. IEEE J. Sel. Areas Commun. 2020, 38, 2450–2525. [Google Scholar] [CrossRef]
  3. Huang, C.; Zappone, A.; Alexandropoulos, G.C.; Debbah, M.; Yuen, C. Reconfigurable Intelligent Surfaces for Energy Efficiency in Wireless Communication. IEEE Trans. Wirel. Commun. 2019, 18, 4157–4170. [Google Scholar] [CrossRef]
  4. Subrt, L.; Pechac, P. Intelligent walls as autonomous parts of smart indoor environments. IET Commun. 2012, 6, 1004–1010. [Google Scholar] [CrossRef]
  5. Kaina, N.; Dupré, M.; Lerosey, G.; Fink, M. Shaping complex microwave fields in reverberating media with binary tunable metasurfaces. Sci. Rep. 2014, 4, 6693. [Google Scholar] [CrossRef]
  6. Hu, S.; Rusek, F.; Edfors, O. Beyond Massive MIMO: The Potential of Data Transmission With Large Intelligent Surfaces. IEEE Trans. Signal Process. 2018, 66, 2746–2758. [Google Scholar] [CrossRef]
  7. Hong, S.; Pan, C.; Ren, H.; Wang, K.; Nallanathan, A. Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface. IEEE Trans. Commun. 2020, 68, 7851–7866. [Google Scholar] [CrossRef]
  8. Ai, Y.; de Figueiredo, F.A.P.; Kong, L.; Cheffena, M.; Chatzinotas, S.; Ottersten, B. Secure Vehicular Communications Through Reconfigurable Intelligent Surfaces. IEEE Trans. Veh. Technol. 2021, 70, 7272–7276. [Google Scholar] [CrossRef]
  9. Di, B.; Zhang, H.; Song, L.; Li, Y.; Han, Z.; Poor, H.V. Hybrid Beamforming for Reconfigurable Intelligent Surface based Multi-User Communications: Achievable Rates With Limited Discrete Phase Shifts. IEEE J. Sel. Areas Commun. 2020, 38, 1809–1822. [Google Scholar] [CrossRef]
  10. Yang, L.; Zhang, W.; Bithas, P.S.; Liu, H.; Hasna, M.O.; Tsiftsis, T.A.; Ng, D.W.K. Covert transmission and secrecy analysis of RS-RIS-NOMA-aided 6G wireless communication systems. IEEE Trans. Veh. Technol. 2023, 72, 10659–10670. [Google Scholar] [CrossRef]
  11. Huang, C.; Mo, R.; Yuen, C. Reconfigurable Intelligent Surface Assisted Multiuser MISO Systems Exploiting Deep Reinforcement Learning. IEEE J. Sel. Areas Commun. 2020, 38, 1839–1850. [Google Scholar] [CrossRef]
  12. Najafi, M.; Jamali, V.; Schober, R.; Poor, H.V. Physics-Based Modeling and Scalable Optimization of Large Intelligent Reflecting Surfaces. IEEE Trans. Commun. 2021, 69, 2673–2691. [Google Scholar] [CrossRef]
  13. Zhang, Z.; Dai, L.; Chen, X.; Liu, C.; Yang, F.; Schober, R.; Poor, H.V. Active RIS vs. Passive RIS: Which Will Prevail in 6G? IEEE Trans. Commun. 2023, 71, 1707–1725. [Google Scholar] [CrossRef]
  14. Long, R.; Liang, Y.C.; Pei, Y.; Larsson, E.G. Active Reconfigurable Intelligent Surface-Aided Wireless Communications. IEEE Trans. Wirel. Commun. 2021, 20, 4962–4975. [Google Scholar] [CrossRef]
  15. Khoshafa, M.H.; Ngatched, T.M.N.; Ahmed, M.H.; Ndjiongue, A.R. Active Reconfigurable Intelligent Surfaces-Aided Wireless Communication System. IEEE Commun. Lett. 2021, 25, 3699–3703. [Google Scholar] [CrossRef]
  16. Ndjiongue, A.R.; Ngatched, T.M.N.; Dobre, O.A.; Haas, H. Design of a Power Amplifying-RIS for Free-Space Optical Communication Systems. IEEE Wirel. Commun. 2021, 28, 152–159. [Google Scholar] [CrossRef]
  17. Peters, S.W.; Panah, A.Y.; Truong, K.T.; Heath, R.W. Relay Architectures for 3GPP LTE-Advanced. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 1–14. [Google Scholar] [CrossRef]
  18. Di Renzo, M.; Ntontin, K.; Song, J.; Danufane, F.H.; Qian, X.; Lazarakis, F.; De Rosny, J.; Phan-Huy, D.T.; Simeone, O.; Zhang, R.; et al. Reconfigurable Intelligent Surfaces vs. Relaying: Differences, Similarities, and Performance Comparison. IEEE Open J. Commun. Soc. 2020, 1, 798–807. [Google Scholar] [CrossRef]
  19. Wu, L.; Lou, K.; Ke, J.; Liang, J.; Luo, Z.; Dai, J.Y.; Cheng, Q.; Cui, T.J. A Wideband Amplifying Reconfigurable Intelligent Surface. IEEE Trans. Antennas Propag. 2022, 70, 10623–10631. [Google Scholar] [CrossRef]
  20. Kishor, K.K.; Hum, S.V. An Amplifying Reconfigurable Reflectarray Antenna. IEEE Trans. Antennas Propag. 2012, 60, 197–205. [Google Scholar] [CrossRef]
  21. Yang, X.; Xu, S.; Yang, F.; Li, M.; Fang, H.; Hou, Y. A Distributed Power-Amplifying Reflectarray Antenna for EIRP Boost Applications. IEEE Antennas Wirel. Propag. Lett. 2017, 16, 2742–2745. [Google Scholar] [CrossRef]
  22. Bialkowski, M.; Robinson, A.; Song, H. Design, development, and testing of X-band amplifying reflectarrays. IEEE Trans. Antennas Propag. 2002, 50, 1065–1076. [Google Scholar] [CrossRef]
  23. Clark, R.; Huff, G.; Bernhard, J. An integrated active microstrip reflectarray element with an internal amplifier. IEEE Trans. Antennas Propag. 2003, 51, 993–999. [Google Scholar] [CrossRef]
  24. Cabrìa, L.; García, J.Á.G.; Gutiérrez-Ríos, J.; Tazón, A.; Vassal’lo, J. Active Reflectors: Possible Solutions Based on Reflectarrays and Fresnel Reflectors. Int. J. Antennas Propag. 2009, 2009, 1–13. [Google Scholar] [CrossRef]
  25. Rao, J.; Zhang, Y.; Tang, S.; Li, Z.; Chiu, C.Y.; Murch, R. An Active Reconfigurable Intelligent Surface Utilizing Phase-Reconfigurable Reflection Amplifiers. IEEE Trans. Microw. Theory Tech. 2023, 71, 3189–3202. [Google Scholar] [CrossRef]
  26. Srivastava, S.; Dash, P.P. Non-Orthogonal Multiple Access: Procession towards B5G and 6G. In Proceedings of the 2021 IEEE 2nd International Conference on Applied Electromagnetics, Signal Processing, & Communication (AESPC), Bhubaneswar, India, 26–28 November 2021; pp. 1–4. [Google Scholar] [CrossRef]
  27. Lv, L.; Jiang, H.; Ding, Z.; Ye, Q.; Al-Dhahir, N.; Chen, J. Secure Non-Orthogonal Multiple Access: An Interference Engineering Perspective. IEEE Netw. 2021, 35, 278–285. [Google Scholar] [CrossRef]
  28. Ta, H.; Kim, S.W. Covert Non-Orthogonal Multiple Access. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 10–13 April 2020; pp. 1–6. [Google Scholar] [CrossRef]
  29. Lv, L.; Wu, Q.; Li, Z.; Ding, Z.; Al-Dhahir, N.; Chen, J. Covert Communication in Intelligent Reflecting Surface-Assisted NOMA Systems: Design, Analysis, and Optimization. IEEE Trans. Wirel. Commun. 2022, 21, 1735–1750. [Google Scholar] [CrossRef]
  30. Dong, L.; Wang, H.M.; Bai, J. Active Reconfigurable Intelligent Surface Aided Secure Transmission. IEEE Trans. Veh. Technol. 2022, 71, 2181–2186. [Google Scholar] [CrossRef]
  31. Wang, M.; Xu, Z.; Xia, B.; Guo, Y. Active Intelligent Reflecting Surface Assisted Covert Communications. IEEE Trans. Veh. Technol. 2023, 72, 5401–5406. [Google Scholar] [CrossRef]
  32. Xu, S.; Liu, J.; Cao, Y. Intelligent Reflecting Surface Empowered Physical-Layer Security: Signal Cancellation or Jamming? IEEE Internet Things J. 2022, 9, 1265–1275. [Google Scholar] [CrossRef]
  33. Arzykulov, S.; Celik, A.; Nauryzbayev, G.; Eltawil, A.M. Artificial Noise and RIS-Aided Physical Layer Security: Optimal RIS Partitioning and Power Control. IEEE Wirel. Commun. Lett. 2023, 12, 992–996. [Google Scholar] [CrossRef]
  34. Ji, M.; Chen, J.; Lv, L.; Ye, Y.; Luo, H.; Ding, Z. Securing NOMA by an Active RIS: Joint Reflection and Jamming Design. In Proceedings of the 12th IEEE/CIC lnternational Conference on Communications in China (ICCC 2023), Dalian, China, 10–12 August 2023; pp. 1–6. [Google Scholar] [CrossRef]
  35. Kang, X.; Lei, H.; Yang, L.; Pan, G.; Tsiftsis, T.A.; Liu, H. Active-RIS-Aided Covert Communications in NOMA Systems With Cooperative Jamming. IEEE Trans. Veh. Technol. 2024, 73, 7436–7440. [Google Scholar] [CrossRef]
  36. Zhang, G.; Lu, Y.; Ai, B.; Zhong, Z.; Ding, Z.; Quek, T.Q. Energy-Efficient Design in STAR-RIS Assisted Communication System with Antenna Selection. In Proceedings of the GLOBECOM 2023-IEEE Global Communications Conference (GLOBECOM), Kuala Lumpur, Malaysia, 4–8 December 2023; pp. 637–642. [Google Scholar] [CrossRef]
  37. Wu, C.; You, C.; Liu, Y.; Gu, X.; Cai, Y. Channel Estimation for STAR-RIS-Aided Wireless Communication. IEEE Commun. Lett. 2022, 26, 652–656. [Google Scholar] [CrossRef]
  38. Zheng, B.; Zhang, R. Intelligent Reflecting Surface-Enhanced OFDM: Channel Estimation and Reflection Optimization. IEEE Wirel. Commun. Lett. 2020, 9, 518–522. [Google Scholar] [CrossRef]
  39. Wei, L.; Huang, C.; Alexandropoulos, G.C.; Yuen, C.; Zhang, Z.; Debbah, M. Channel Estimation for RIS-Empowered Multi-User MISO Wireless Communications. IEEE Trans. Commun. 2021, 69, 4144–4157. [Google Scholar] [CrossRef]
  40. Tao, L.; Yang, W.; Yan, S.; Wu, D.; Guan, X.; Chen, D. Covert Communication in Downlink NOMA Systems With Random Transmit Power. IEEE Wirel. Commun. Lett. 2020, 9, 2000–2004. [Google Scholar] [CrossRef]
  41. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  42. Xiao, H.; Hu, X.; Li, A.; Wang, W.; Su, Z.; Wong, K.K.; Yang, K. STAR-RIS Enhanced Joint Physical Layer Security and Covert Communications for Multi-antenna mmWave Systems. IEEE Trans. Wirel. Commun. 2024, 1. [Google Scholar] [CrossRef]
  43. Popov, V.; Odit, M.; Gros, J.B.; Lenets, V.; Kumagai, A.; Fink, M.; Enomoto, K.; Lerosey, G. Experimental demonstration of a mmWave passive access point extender based on a binary reconfigurable intelligent surface. Front. Commun. Netw. 2021, 2, 733891. [Google Scholar] [CrossRef]
Figure 1. The ARIS-aided uplink NOMA system model.
Figure 1. The ARIS-aided uplink NOMA system model.
Electronics 13 02882 g001
Figure 2. Covert communication rate versus transmit power.
Figure 2. Covert communication rate versus transmit power.
Electronics 13 02882 g002
Figure 3. (a) Covert communication rate versus location of ARIS. (b) Carol’s achievable rate versus location of ARIS.
Figure 3. (a) Covert communication rate versus location of ARIS. (b) Carol’s achievable rate versus location of ARIS.
Electronics 13 02882 g003
Figure 4. (a) Covert communication rate versus ϵ . (b) Carol’s achievable rate of versus ϵ .
Figure 4. (a) Covert communication rate versus ϵ . (b) Carol’s achievable rate of versus ϵ .
Electronics 13 02882 g004
Figure 5. (a) Covert communication rate versus N. (b) Carol’s achievable rate versus N.
Figure 5. (a) Covert communication rate versus N. (b) Carol’s achievable rate versus N.
Electronics 13 02882 g005
Figure 6. (a) Covert communication rate versus number of elements in the grouping. (b) Achievable rate of Carol versus number of elements in the grouping.
Figure 6. (a) Covert communication rate versus number of elements in the grouping. (b) Achievable rate of Carol versus number of elements in the grouping.
Electronics 13 02882 g006
Table 1. Running time of the w/o-EG and w-EG schemes.
Table 1. Running time of the w/o-EG and w-EG schemes.
Running Time (s)System Parameters M = 4 , N = 16 M = 8 , N = 16 M = 8 , N = 32
Scheme
w-EG0.28210.29630.3212
w/o-EG0.28060.29540.3176
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kang, X.; Lu, F.; Zhu, M.; Liu, H.; Pang, X.; Yang, H.; Zeng, Q. Covert Communications in Active-RIS-Aided NOMA Systems: Element Grouping or Not? Electronics 2024, 13, 2882. https://doi.org/10.3390/electronics13142882

AMA Style

Kang X, Lu F, Zhu M, Liu H, Pang X, Yang H, Zeng Q. Covert Communications in Active-RIS-Aided NOMA Systems: Element Grouping or Not? Electronics. 2024; 13(14):2882. https://doi.org/10.3390/electronics13142882

Chicago/Turabian Style

Kang, Xueyu, Feng Lu, Miaomiao Zhu, Hongwu Liu, Xiyu Pang, Hai Yang, and Qingsheng Zeng. 2024. "Covert Communications in Active-RIS-Aided NOMA Systems: Element Grouping or Not?" Electronics 13, no. 14: 2882. https://doi.org/10.3390/electronics13142882

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop