1. Introduction
Reconfigurable intelligent surfaces (RISs), which can be thought of as enablers to configure wireless propagation environments smartly, have been proposed and extensively developed for radar sensing and communications [
1,
2,
3]. In particular, composed of a number of metasurface elements, RISs are capable of reflecting and refracting incident electromagnetic (EM) waves and imposing specified phases, which results in various EM functions, such as beamforming or interference nulling, by smartly configuring each element’s amplitude and phase shift [
4,
5,
6]. With the abundant spatial degree of freedom (DoF) provided by the RIS, the information security performance can be enhanced from the physical-layer security (PLS) perspective [
7,
8], and the received signal-to-interference-plus-noise ratio (SINR) is also improved [
9]. In comparison with traditional communication systems with radio frequency (RF) chains, RISs are expected to play a key role and to be one of the major technologies in future energy and spectrum-efficient wireless communications due to their straightforward structure. Also, the upcoming sixth-generation (6G) wireless networks regard RIS as a promising technology to facilitate massive connections [
10].
In conventional passive RISs (PRISs), the metasurface elements are configured with low-power RF switches, allowing the noise to be ignored and resulting in relatively high power efficiency. It has been shown that implementing PRISs with large apertures and high array gains enhanced the performance of wireless communication systems [
11]. Unfortunately, a PRIS brings only minimal performance improvement due to the “multiplicative fading” effect [
12]. Even if large-scale PRISs with high array gain are employed, they are still ineffective to enlarge coverage ranges of wireless communication systems. To overcome the limitations of PRISs and extend their applications, the idea of active RIS (ARIS) has been introduced recently to scatter the incident signals with both amplifications and adjusted phase shifts [
13,
14,
15,
16]. Through amplifying incident waves, the strengths of the scattered signals are comparable to scenarios of direct link transmissions where the “multiplicative fading” effect is significant. Furthermore, an ARIS not only achieves an enhanced array gain and the required signal-to-noise ratio (SNR) at the receiver, but also becomes a PRIS when its amplifiers are turned off, making an ARIS more generalized than a PRIS.
Different from amplify-and-forward (AF) relays that also receive and radiate the amplified signals, ARISs have distinct architectures using a phase-reconfigurable reflection-type amplifier for metasurface elements [
17,
18]. Currently, ARISs can be implemented in several ways. For example, the incident waves can be reflected with orthogonal polarization by using an amplifying reflection array [
19,
20,
21,
22,
23,
24]. Furthermore, by using a two-layer patch antenna and a phase-reconfigurable reflection amplifier to formulate an active element, the ARIS is capable of beam-scanning and amplification [
25]. In addition, both ARISs and PRISs operate in the full-duplex transmission model with full-band response, which is more attractive than half-duplex AF relays equipped with costly RF chains.
Recently, non-orthogonal multiple access (NOMA) technology has been incorporated as part of the upcoming 6G wireless networks [
26]. In 6G wireless networks, NOMA plays a pivotal role in facilitating spectrally efficient massive wireless connections [
27]. However, due to the open propagation of wireless signals, novel risks associated with information leakage and communication behavior exposure are introduced to the emerging NOMA systems. Ensuring the covertness of NOMA, especially preventing the exposure of NOMA communication behaviors, presents a significant and formidable challenge. In this context, covert communication emerges as a solution to address the security concerns in NOMA systems [
10,
28]. In [
29], covert communications in a PRIS-aided NOMA system were investigated. It was shown that employing a PRIS significantly enhanced the covert communication performance of NOMA systems. Also, ARISs were utilized to maximize the covert communication rate in [
30,
31].
Since a large number of the metasurface elements are fabricated on a RIS, different functions could be allocated to different elements, and several element grouping schemes were proposed for RIS-aided wireless communication systems [
32,
33,
34]. For example, the incident signal at the grouped PRIS elements could be adjusted to generate the jamming signal in the desired direction [
32]. In [
33], through element grouping, the incident signal on each PRIS element was amplified for information transmission or modulated into jamming, which effectively improved the PLS performance. On the other hand, using all ARIS elements to reflect the information signal led to certain security risks, whereas using all the ARIS elements to generate the jamming signal led to a decrease in reception quality for legitimate receivers. Therefore, the ARIS’s elements were divided into two groups, one working in the reflecting mode and the other in the jamming mode to improve the PLS performance [
34]. It was shown that the element grouping scheme effectively improved the minimum secrecy rate among the NOMA users in an ARIS-aided NOMA system, achieving an enlarged channel gain difference between the legitimate and eavesdropping channels [
34].
Different from PLS transmissions, proper randomness is needed to balance between the required covertness and legitimate transmission performance in NOMA systems. In particular, the superimposed signal of the NOMA users has already been regarded as a natural shield to conceal covert communication behaviors. When element grouping is applied in ARIS-aided NOMA systems, how to balance the covertness and legitimate transmission performance becomes critical in the presence of the NOMA superimposed signal. Although the element grouping has been investigated for the PLS, the applications of the element grouping in covert communications have never been investigated. Furthermore, although element grouping can improve the secrecy communication performance for the PLS, whether element grouping enhances the covert communication performance is still unknown. To the best of our knowledge, how to employ element grouping to realize covert communications in ARIS-aided NOMA systems has not been tackled.
In this work, the impacts of element grouping on covert communication performance are investigated for an ARIS-aided uplink NOMA system. In the element grouping scheme, each element of the ARIS works in at least one mode, i.e., information signal reflection or jamming signal reflection. By adjusting the reflection coefficient and working mode for each element, a trade-off between the covertness and legitimate transmission performance can be optimized. By jointly optimizing the NOMA transmit power, ARIS beamforming, and receive beamforming at the base-station (BS), our design goal is to maximize the covert communication rate. To tackle the intractable optimization problem, we decouple the original problem into three sub-problems of optimizing the NOMA transmit power, ARIS beamforming, and receive beamforming, respectively. We then derive closed-form expression for the sub-problem of the NOMA transmit power optimization. Mixed-integer non-linear programming for element grouping is effectively addressed by an arithmetic and geometric mean (AGM)-based penalized Dinkelbach transform approach. Then, an efficient alternating optimization (AO) algorithm is proposed to solve the formulated non-convex covert communication rate maximization problem [
35,
36]. Various simulation results are provided to verify whether element grouping enhances covert communication performance or not. Our work shows that the scheme without element grouping achieves a better covert communication performance than the scheme with element grouping, which is a valuable and novel finding that has never been reported before. Also, the findings in this paper are valuable and meaningful for a practical design of the ARIS-aided covert communications.
The remaining sections of the paper are organized as follows:
Section 2 presents the system model, including the ARIS-aided transmission scheme with element grouping (denoted as the w-EG scheme in the following) and the ARIS-aided transmission scheme without element grouping (denoted as the w/o-EG scheme in the following). The problem formulation and the proposed solutions are presented in
Section 3. Simulation results are illustrated in
Section 4. Finally,
Section 5 concludes the work.
Notations: Throughout the paper, scalars are represented by italic letters, and vectors and matrices are represented by boldfaced lowercase and uppercase letters, respectively. denotes probability, and denotes the Euclidean norm of a complex vector. Superscript , , and denote vector/matrix transpose, conjugate, and Hermitian transpose, respectively. denotes the spaces of complex-valued matrices. indicates that is a positive semi-definite matrix. The symbols and denote the rank and trace of matrix , respectively. and denote the N-dimensional all-zero and all-ones vectors, respectively. denote the identity matrix. denotes the diagonal matrix with diagonal elements . The notation denotes a circular symmetric complex Gaussian (CSCG) random distribution with mean and variance .
2. System Model
The considered uplink NOMA system consists of a multi-antenna BS (Bob), a pair of NOMA users (Alice and Carol), and a warden (Willie), as shown in
Figure 1. We assume that Alice is a covert user who has high-level of privacy and security requirements and Carol is a public user who only has transmission reliability requirements. For instance, Alice is a law enforcement node needing to hide its transmission pattern, while Carol transmits live streams possessing low or no confidential requirements. The ARIS is deployed between the NOMA users and Bob to not only aid the uplink transmissions from Alice and Carol, but also reflect jamming signals towards Willie to enhance the covert communication performance. In the considered system, the ARIS consists of
N reflecting elements, Bob is equipped with
M receive antennas, and the remaining nodes (Alice, Carol, and Willie) are each equipped with a single antenna. All the links associated with the ARIS are modeled to experience Rician fading, while all the direct links from the NOMA users (Alice and Carol) to Bob and Willie are modeled to experience Rayleigh fading. We assume that all the links follow quasi-statistic block fading. By exploiting the existing channel estimation methods for RIS-aided systems [
37,
38,
39], Alice and Carol acquire the channel state information (CSI) associated with the ARIS and that of the direct links. To characterize the performance limit of the considered system, we further ignore the channel estimation error and assume that Bob has perfect CSI of Alice and Carol [
29,
30,
31,
37,
38,
39].
Let
and
denote the direct links from node
i to Bob and Willie, respectively, with
representing Alice and Carol, respectively. Similarly, the channels from node
i to the ARIS are denoted by
, and the channels from the ARIS to Bob and Willie are denoted by
and
, respectively. If Alice and Carol transmit the information signals simultaneously in a transmission block, the arrived signal at the ARIS can be written as:
where
is the signal transmitted by node
i with
,
is the transmit power of node
i satisfying
with
denoting the maximum transmit power, and
is additive noise at the ARIS with zero mean and variance
. After the amplitude and phase-shift adjustments, the departure signal from the ARIS can be expressed as:
where
is the amplitude–phase-shift coefficient matrix of the ARIS.
The power of the departure signal at the ARIS is constrained by
where
is the maximum power budget at the ARIS with
and
denoting the total power of the ARIS and the power consumption per circuit element, respectively [
34]. In the rest of this section, we present two ARIS-aided transmission schemes in detail, namely, the w-EG scheme and the w/o-EG scheme. Each scheme is discussed separately in the following two subsections.
2.1. w-EG Scheme
In this section, we investigate the impacts of the w-EG scheme on the covert communication performance of an ARIS-aided NOMA system. For the w-EG scheme, is the amplitude–phase-shift coefficient matrix of the ARIS with the reflecting matrix and jamming matrix . Specifically, and are the mode selection matrices with , , and . With the aid of the mode selection matrices, each element of the ARIS works in either the reflection mode or the jamming mode. The matrices and contain the reflection coefficients for enhancing the NOMA transmission quality and deteriorating Willie’s detection performance, respectively, where and denote the nth element’s reflecting amplitude and phase shift, respectively, with denoting the allowed maximum reflecting amplitude.
At Bob, the received signal can be expressed as:
where
is the composite transmission channel from node
i (
) to Bob,
is the composite jamming channel from node
i (
) to Bob, and
is additive noise at Bob with zero mean and variance
. Then, a beamformer
is applied at Bob to obtain
for further processing. In the considered ARIS-aided uplink NOMA system, the user ordering is conducted based on the channel gains [
29,
40]. Specifically, the two users, Alice and Carol, are paired based on their channel gains. At Bob, to guarantee the successful successive interference cancellation (SIC), the signal of the user with the stronger channel gain is decoded first. Then, the signal of the user with the weaker channel gain is decoded at the last stage of the SIC processing. To facilitate SIC at Bob, we assume that
is guaranteed by not only
, but also the amplitude–phase-shift coefficient matrix
as optimized in the next section. Consequently,
is decoded at the last stage of SIC without suffering from inter-user interference. The achievable rates of decoding of
and
are given by
and
, respectively, where
and
are the received SINRs given by
and
, respectively.
In order to judge whether Alice transmits an information signal to Bob or not, Willie performs a binary decision according to the Neyman–Pearson criterion [
41], which results in two hypotheses as follows:
where
with
,
with
, and
denotes additive noise at Willie with zero mean and variance
. The likelihood functions of the received signals under
and
can be written as
and
, respectively, with
and
. Under the Neyman–Pearson criterion, Willie makes the likelihood ratio test
to minimize the detection error probability (DEP), where
and
denote the binary decisions endorsing
and
, respectively. In practice, Willie utilizes its average received power
as the decision statistic with
denoting the transmission block index. Then, the optimal decision rule for Willie can be rewritten as
, where
is the optimal detection threshold for Willie’s decision, which results in the following minimum DEP [
41]:
where
and
denote the false alarm and missed detection probabilities, respectively. To facilitate a feasible covert communication design, we introduce a lower bound on
as [
41]:
where
is the Kullback–Leibler (KL) divergence, which can be evaluated as:
To guarantee the transmission covertness from Alice to Bob, the minimum DEP of Willie should satisfy
with
being a small value to represent the required covertness level. By using the KL divergence and the lower bound on
in (
8), a tighter covertness constraint can be formulated as
. Due to the fact that the monotonically increasing function
with respect to
in addition to
and
, the covertness constraint can be reformulated as:
where
is the unique solution of
in the range
.
2.2. w/o-EG Scheme
In this section, we investigate the impacts of the w/o-EG scheme on the covert communication performance of the ARIS-aided NOMA system. It is noted that for the w/o-EG scheme, the amplitude–phase-shift coefficient matrix can be simplified as with regarding the system model of the w-EG scheme. In the w/o-EG scheme, the ARIS selects only one reflection mode for all the elements to reflect the information signal. Similarly to the w-EG scheme, the w/o-EG scheme and the corresponding system model can be described as follows.
At Bob, the received signal can be expressed as:
Then, a beamformer is applied at Bob to obtain for further processing. Similarly, we decode at the last stage to guarantee a successful SIC at Bob. The achievable rates of decoding of and are given by and , respectively, where and are the received SINRs given by and , respectively.
In the w/o-EG scheme, the received signals at Willie under
and
, respectively, can be expressed as:
The likelihood functions of the received signals under
and
can be written as
and
, respectively, with
and
. Similar to the derivation of (
10), the covertness constraint under this setup can be formulated as:
4. Simulation Results
In this section, we present simulation results to evaluate the covert communication performance of the proposed scheme. We assumed that the ARIS-aided uplink NOMA system operated in the mmWave band with a carrier frequency of 28 GHz and a bandwidth of 251.1886 MHz [
42]. We set the simulation parameters as
,
with the size of the ARIS panel being 2 cm × 2 cm [
43],
dBm,
,
bps/Hz,
,
,
,
,
, and
[
29,
31]. The small-scale fading of all channels followed
. The distance-related path loss of each channel was modeled as
, where
dB,
m, and
d is the distance between two nodes. We considered the path-loss exponential factor
for the direct links and
for the channels associated with ARIS. The Rician factor for the links associated with the ARIS was set to 3 dB. The locations of Bob, ARIS, Alice, Carol, and Willie were set as
m,
m,
m,
m, and
m, respectively. In the following discussions, we compare the impacts of element grouping on the covert communication performance of an ARIS-aided NOMA system against those without element grouping. Specifically, the impacts of the transmit power, the horizontal position of the ARIS, the covertness level, and the number of ARIS elements on the covert communication rate are investigated, respectively.
To gain insights on the implementation of the proposed schemes, we recorded the running time of the AO algorithms for the w/o-EG and w-EG schemes, as shown in
Table 1. The simulation platform was a Lenovo Lecoo PC consisting of an Intel i5-12450H CPU and 16 G of memory. The operating system was Windows 11, and the software was Matlab R2023a. The results in
Table 1 show that the AO algorithms of both the w/o-EG and w-EG schemes could be performed within 0.35 s, which was acceptable regarding the applied general PC platform. As expected, if a specific hardware/software platform was applied, e.g., FPGA and DSP, the real-time running speed of the proposed AO algorithms would be faster than that of a general PC.
The results in
Figure 2 reveal the impacts of the transmit power budget on the covert communication rates for different schemes. From
Figure 2, we can see that the covert communication rates achieved by all the schemes increased with the increasing
. The curves in
Figure 2 confirmed that the proposed AO algorithm without employing element grouping achieved the highest covert communication rate in the whole transmit power regions. On the contrary, compared to the AO algorithm without employing element grouping, a decreased covert communication rate was achieved by the element grouping scheme. Furthermore, a higher
rendered a higher covert communication rate for the proposed schemes, which indicated that the constraints (
21) and (
37) were inactive, respectively. The achieved covert communication rates of the randomized
and
tended to overlap with the increasing
, while the two considered schemes achieved a higher covert communication rate than the AO algorithm with element grouping in the low-transmit-power regime.
In
Figure 3, the impacts of the ARIS’s location on the covert communication rate and Carol’s achievable rate were investigated, where we set
dBm,
dBm,
,
, and
.
Figure 3a shows the covert communication rate versus the ARIS’s horizontal position under different ARIS schemes, including the considered w-EG and w/o-EG schemes, where the vertical position of ARIS was fixed at 45 m. It shows that the covert communication rates achieved by the ARIS-aided NOMA system increased with the increasing horizontal position, until reaching about 45 m when they began to decrease, which indicated that when the ARIS was properly deployed close to Bob and the users, the highest covert communication rate could be achieved. Furthermore,
Figure 3a reveals that the covert communication performance of the w/o-EG scheme outperformed that of the w-EG scheme in an ARIS-aided NOMA system. On the contrary, the covert communication rates achieved by the randomized
and
changed slightly with the increase in the horizontal position of the ARIS, whereas the achieved covert communication rates were far less than those achieved by the w-EG and w/o-EG schemes. Also, a higher
rendered a higher covert rate for the proposed schemes. Furthermore,
Figure 3b presents the results of Carol’s achievable rate versus the ARIS’s horizontal position for the considered ARIS schemes. The curves in
Figure 3b show that the w/o-EG scheme obtained Carol’s highest achievable rate. Similarly to the covert communication rate, the location of the ARIS also affected Carol’s achievable rate. Carol’s highest achievable rate was obtained with a horizontal position of 45 m, which was the same position at which the maximum covert communication rate was obtained.
The covertness level
versus the covert communication rate and Carol’s achievable rate for different schemes were investigated in
Figure 4, where we set
dBm,
dBm,
, and
. As clearly shown by the curves in
Figure 4a, the covert communication rates achieved by all the considered schemes increased with the increasing
. This result is consistent with the theoretical analysis, i.e., when
becomes larger, the covertness constraint becomes loose, and the allocatable transmit power for Alice and the reflection beamforming power towards the BS increase, which leads to a higher covert communication rate for the ARIS-aided NOMA system. The covert communication rate achieved in the ARIS-aided NOMA system increased dramatically at first from
to
, and then increased smoothly with the continued increase in
. Moreover, the AO algorithm without employing element grouping achieved a higher covert communication rate than the AO algorithm with element grouping, while the achieved covert communication rate for the randomized
was lower than that of the randomized
. In
Figure 4b, the curves of Carol’s achievable rate are plotted. The curves in
Figure 4b show that Carol’s achievable rate increased with increasing
. Also, when
increased from 0.01 to 0.05, the achievable rate had a significant increase. After
surpassed 0.05, Carol’s achievable rate increased slowly, having a trend similar to that of the covert communication rate in
Figure 4a.
The curves in
Figure 5 compare the covert communication rate and Carol’s achievable rate versus the number of ARIS elements
N. In
Figure 5, we set
dBm,
dBm,
, and
. For the ARIS-aided NOMA system with the w/o-EG scheme, it is obvious that more reflecting elements of the ARIS provide a larger reflection beamforming gain and achieve a higher covert communication rate due to the exploitation of more DoFs to manipulate the propagation environments. Moreover, the covert communication rates achieved by the AO algorithm with element grouping increased with increasing
N, until reaching about
, when they began to decrease. However, the covert communication rates achieved by the randomized
and
continued to decrease. Similarly to
Figure 5a, the curves in
Figure 5b show that the w/o-EG scheme achieved Carol’s highest achievable rate under the considered
N range.
The trade-off between the covert communication rate performance of the w/o-EG and w-EG schemes was investigated in
Figure 6a, where we set
dBm,
dBm,
,
, and
. The results in
Figure 6a show that the covert communication rate decreased with the increasing number of elements in the grouping. When the number of elements in the grouping was zero, which corresponded to the w/o-EG scheme, the maximum covert communication rate was achieved. If all the elements worked in the grouping, i.e., the w-EG scheme, the minimum covert communication rate was obtained. Furthermore, the trade-off between Carol’s achievable rate performance of the w/o-EG and w-EG schemes is plotted in
Figure 6b. Similar to the results in
Figure 6a, Carol’s maximum and minimum achievable rates were obtained by the w/o-EG and w-EG schemes, respectively. With the increasing number of elements in the grouping, the achievable rates obtained by all the considered schemes decreased monotonically.