Next Article in Journal
Cohomology and Crossed Modules of Modified Rota–Baxter Pre-Lie Algebras
Previous Article in Journal
Stability Analysis, Modulation Instability, and Beta-Time Fractional Exact Soliton Solutions to the Van der Waals Equation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

STAR-RIS-Assisted Millimeter-Wave Secure Communication with Multiple Eavesdroppers

1
School of Information Science and Engineering, Shandong Normal University, Jinan 250358, China
2
School of Software, Shandong University, Jinan 250100, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(14), 2259; https://doi.org/10.3390/math12142259
Submission received: 25 June 2024 / Revised: 15 July 2024 / Accepted: 17 July 2024 / Published: 19 July 2024
(This article belongs to the Special Issue Data-Driven Decentralized Learning for Future Communication Networks)

Abstract

:
Aiming to address the limited coverage of conventional reconfigurable intelligent surfaces (RISs), this study proposes a millimeter-wave secure communication scheme based on the simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). It uses the transmission and reflection functions of the STAR-RIS to achieve multiple users’ full-area communication coverage and meet the security communication needs of different users. To maximize the system sum rate under the security communication requirements of users in the transmission and reflection regions, this study proposes a joint optimization design scheme consisting of transmit beamforming at the base station (BS) and transmitting and reflecting coefficients at the STAR-RIS based on the energy-splitting protocol, and it models the rate optimization problem with information leakage constraints under imperfect eavesdroppers’ channel state information (ECSI). First, a series of transformations is proposed to solve the coupling between the optimization variables, and then, an efficient iterative algorithm based on successive convex approximation (SCA) and semi-definite relaxation (SDR) is proposed. Aiming to address the amplitude and phase constraints of the STAR-RIS, an optimization method comprising a penalty concave–convex procedure is adopted. The simulation results show that, compared with the conventional RIS, the proposed STAR-RIS assistance scheme can achieve the full coverage of the communication system and effectively improve the system sum rate while ensuring the safe transmission of information. The combination of STAR-RIS and millimeter-wave can promote the efficient and safe transmission of information in dense cities.

1. Introduction

Millimeter-wave communication is considered a promising technology with the potential to support multi-gigabit wireless applications [1]. Millimeter-wave technology adopts a line-of-sight (LOS) transmission mode. It transmits in space in the form of direct beamforming, with a narrow beam and strong directivity. Because the frequency band is relatively high and there are not many interference sources, the reliability and stability of its propagation are excellent. However, millimeter-wave signals are easily blocked by obstacles [2], especially in indoor or densely populated urban environments [3]. Regarding this problem, the reconfigurable intelligent surface (RIS) has become a promising and cost-effective solution, as it can establish a reliable connection even when the LOS link is blocked by obstacles [4]. In recent years, the RIS has emerged as a promising technology to realize the propagation link in the next-generation configured wireless network [5]. RISs can dynamically change the wireless channel by using many low-cost passive reflective components integrated into the plane to subtly change the reflected signal, thus improving the system’s performance [6]. The conventional RIS only has the reflection function. The transmitter communicates with the user through the RIS, and the eavesdroppers try to intercept confidential information in a non-colluding way. Ref. [7] focuses on the secure transmission of millimeter-wave and terahertz systems assisted by the RIS, in which the base station (BS) communicates with the destination through the RIS in the presence of passive eavesdroppers. Ref. [8] focuses on the security issues of confidential communication in a multiple RIS-assisted terahertz system, where potential eavesdroppers can intercept the communication link.
However, conventional RISs can only reflect the incident wireless signals. In this case, the transmitter and receiver must be on the same side of the RIS [9], resulting in smart radio environments (SREs) in half space. However, this location restriction may not always be satisfied in practice and severely limits the flexibility and effectiveness of RISs, because the users may be on both sides of the RIS. To overcome this limitation, Ref. [10] proposed the new concept of a simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). This technology can achieve full space coverage because the STAR-RIS can transmit and reflect incident waves at the same time.
On the other hand, security is also an important aspect of wireless networks [11]. The authors of [12] studied the secure beamforming and phase-shifting design of an RIS-assisted multiple-input single-output (MISO) downlink channel and proposed an algorithm based on an alternating-direction multiplier. Meanwhile, Ref. [13] studied the secure precoding and phase shifting design of RIS-assisted multiple-input multiple-output (MIMO) channels and developed a maximization–minimization (MM) optimization method. The authors of [14] studied secure communication assisted by a STAR-RIS to maximize the secrecy rate of the system under perfect channels. Moreover, Ref. [15] studied a penalty-based secure beamforming algorithm developed to solve the resulting non-convex optimization problem. The authors of [16] studied secure transmission in a STAR-RIS-assisted uplink non-orthogonal multiple access system. According to the availability of eavesdropping channel state information (CSI), the minimum security capacity is maximized by considering the eavesdroppers’ complete CSI and statistical CSI.
The above security communication scheme achieves superior security performance. However, the introduction of STAR-RIS also brings additional eavesdropping challenges. The most recent studies [17,18] have focused on STAR-RIS-assisted communication with perfect CSI. In general, it is difficult to obtain perfect CSI due to the unreliable behavior of eavesdroppers and the feedback delay or channel estimation error, so eavesdroppers in millimeter-wave systems can intercept the transmission of confidential information, causing serious security issues. However, in the case of multiple eavesdroppers, imperfect channels’ impact on millimeter-wave communication has not yet been explored.
Based on the above problems, this study evaluates the STAR-RIS-assisted secure transmission in millimeter-wave systems, where eavesdroppers can eavesdrop on the confidential information transmitted and reflected by the STAR-RIS. Under the assumption of imperfect ECSI and information leakage constraints, the system sum rate of the legitimate receivers is defined to measure the transmission performance. The main purpose of this work is to study the security transmission problem in the millimeter-wave system, define the transmitting and reflecting coefficients of the STAR-RIS, and examine the transmit beamforming of the BS, seeking to reduce the information leakage caused by imperfect eavesdroppers’ channel state information (ECSI) and improve the security performance of millimeter-wave communication. Specifically, the main contributions of this study can be summarized as follows.
By jointly designing the transmitting and reflecting coefficients at the STAR-RIS and the transmit beamforming at the BS, the sum rate of legitimate users is maximized under the information leakage constraints. Owing to the coupled variables and non-convexity of the objective function, the formulated problem is non-convex and difficult to solve. To overcome these obstacles, the problem is transformed into a solvable formula.
To solve the current design problems, this study proposes an iterative suboptimal algorithm with high computational efficiency. We first propose a series of transformations to solve the coupling between the optimization variables, which paves the way for the development of efficient iterative algorithms based on successive convex approximation (SCA) and semi-definite relaxation (SDR). For the amplitude and phase shift constraints at the STAR-RIS, an optimization method based on the penalty concave–convex procedure is adopted. Unlike the traditional alternative optimization method, which is prone to falling into a low-efficiency stationary point during the iterative process in practice, our algorithm can jointly optimize all optimization variables at each iteration and has a higher system sum rate.
Notations: The scalars, vectors, and matrices are represented by lowercase letter x, boldface lowercase letter x , and boldface uppercase letter X , respectively. C N × M denotes the space of N × M matrices with complex entries. The modulus of a complex-valued scalar is denoted by | · | . The Euclidean norm, spectral norm, nuclear norm, and Frobenius norm of a matrix are denoted by | | · | | , | | · | | 2 , | | · | | * , and | | · | | F , respectively. The conjugate transpose, conjugate, expectation, rank, and trace of a matrix are denoted as ( · ) H , ( · ) * , E { } , Rank ( · ) , and Tr ( · ) , respectively. The maximum eigenvalue of a matrix is denoted by λ max ( · ) , and the eigenvector associated with the maximum eigenvalue is denoted by λ max ( · ) . X 0 mean that the matrix is positive semi-definite. stands for the real part of a complex number. diag ( x ) denotes a diagonal matrix with its diagonal elements given by the vector. Diag ( X ) denotes a vector whose elements are extracted from the main diagonal elements of the matrix. f ( · ) represents the gradient. I N denotes an N × N identity matrix.

2. System Model

2.1. Signal Model

This study considers secure communication under multiple users. Since multiple users exist in different locations, the transmitter needs to send information to these multiple users at the same time. Therefore, this study introduces STAR-RIS to ensure secure communication. A STAR-RIS is capable of independently controlling the transmitted and reflected signals, which introduces additional degrees of freedom. To characterize this unique feature, for a STAR-RIS with M elements, let s m represent the signal incident on the m-th element, where m M { 1 , 2 , , M } . After reconfiguration with the corresponding transmission and reflection coefficients, the signal transmitted and reflected by the m-th element is given as t m = ( α m t e j ϕ m t ) s m , r m = ( α m r e j ϕ m r ) s m , where α m t , α m r [ 0 , 1 ] , ϕ m t , ϕ m r [ 0 , 2 π ) describes the amplitude and phase shift adjustment of the incident signal by the m-th element during transmission and reflection, respectively.
The adjustments of the phase shifts of transmission and reflection can usually be implemented independently of one another. However, the transmission and reflection amplitude coefficients must comply with the law of the conservation of energy: the sum of the energy of the transmission and reflection signals must be equal to the energy of the incident signal. Therefore, the sum of α m t and α m r should be equal to 1. Thus, after adjusting the amplitude coefficients for transmission and reflection, each element can operate in full transmission mode, full reflection mode, or a simultaneous transmission and reflection mode. Based on the above basic signal model, an energy-splitting protocol for a STAR-RIS in wireless networks is proposed.
All elements of the STAR-RIS that transmit and reflect simultaneously work in both modes. Therefore, the transmission and reflection coefficients are modeled as Φ t = diag ( α 1 t e j ϕ 1 t , , α M t e j ϕ M t ) , Φ r = diag ( α 1 r e j ϕ 1 r , , α M r e j ϕ M r ) , where α m t , α m r [ 0 , 1 ] , α m t + α m r = 1 , ϕ m t , ϕ m r [ 0 , 2 π ) , m M . For the energy splitting protocol, since the transmission coefficient and reflection coefficient of each element can be optimized, higher system design flexibility can be achieved.
However, the unique ability of the STAR-RIS to reconfigure the whole space’s radio propagation environment will inevitably lead to eavesdropping. In other words, eavesdroppers near the STAR-RIS can access the confidential information transmitted through the STAR-RIS, which poses a serious security challenge from the perspective of information theory. Fortunately, physical-layer security technology is expected to protect STAR-RIS-assisted communication by utilizing the inherent characteristics of wireless channels (such as fading, noise, and interference).
Figure 1 shows a MISO system consisting of a BS, a STAR-RIS, two users, and 2K eavesdroppers. The BS and the STAR-RIS are, respectively, equipped with N antennas and M elements; Bob t and Bob r are legitimate receivers; Eve t , k and Eve r , k are eavesdroppers, where k K { 1 , 2 , , K } , and each of them is a single-antenna node. In Figure 1, it is assumed that the STAR-RIS serves both the transmission and reflection regions. Bob t and Bob r are located in the transmission and reflection regions, respectively. Eve t , k and Eve r , k are located in the transmission and reflection regions, respectively. Due to a serious blockage, the direct links between the BS and the users can be ignored. The distances from the BS to the STAR-RIS, from the STAR-RIS to Bob t , from the STAR-RIS to Eve t , k , from the STAR-RIS to Bob r , and from the STAR-RIS to Eve r , k are denoted by H C M × N , h t C M × 1 , g t , k C M × 1 , h r C M × 1 , and g r , k C M × 1 , respectively.
The BS simultaneously sends independent signals to each user at the same frequency. s t and s r are represented as the signals sent to Bob t and Bob r , where E { | s t | 2 } = E { | s r | 2 } = 1 . Then, the signals received by Bob t , Bob r , Eve t , k , and Eve r , k are
y b , t = h t H Φ t H ( w t s t + w r s r ) + n b , t
y b , r = h r H Φ r H ( w t s t + w r s r ) + n b , r
y e , t , k = g t , k H Φ t H ( w t s t + w r s r ) + n e , t
y e , r , k = g r , k H Φ r H ( w t s t + w r s r ) + n e , r
where w t C N × 1 and w r C N × 1 represent the beamforming of Bob t and Bob r ; Φ t C M × M and Φ r C M × M represent the transmission and reflection coefficients of Bob t and Bob r ; n b , t , n b , r are the Gaussian noise at Bob t and Bob r , both with a mean of zero and variance σ b 2 . n e , t , n e , r are the Gaussian noise at Eve t , k and Eve r , k , both with a mean of zero and variance σ e 2 . Accordingly, the received signal-to-interference-plus-noise ratio (SINR) at Bob t and Bob r is given by
Γ b , t = | h t H Φ t H w t | 2 | h t H Φ t H w r | 2 + σ b 2
Γ b , r = | h r H Φ r H w r | 2 | h r H Φ r H w t | 2 + σ b 2
The achievable rates (bits/s/Hz) of Bob t and Bob r are given by R b , t = log 2 ( 1 + Γ b , t ) , R b , r = log 2 ( 1 + Γ b , r ) . Since multiple eavesdroppers are arbitrarily distributed to nearby users, non-colluding eavesdropping is considered. In non-colluding eavesdropping, the eavesdroppers are independent and individually overhear private information. Here, we assume that the eavesdroppers only eavesdrop on the information sent to users who are located in the same region. As a result, the received SINR of Eve t , k and Eve r , k can be expressed as
Γ e , t , k = | g t , k H Φ t H w t | 2 | g t , k H Φ t H w r | 2 + σ e 2
Γ e , r , k = | g r , k H Φ r H w r | 2 | g r , k H Φ r H w t | 2 + σ e 2
The achievable rates of Eve t , k and Eve r , k are given by R e , t , k = log 2 ( 1 + Γ e , t , k ) , R e , r , k = log 2 ( 1 + Γ e , r , k ) . Hence, the secrecy rate between the BS and Bob t is R s , t = R b , t max k K R e , t , k , the secrecy rate between the BS and Bob r is R s , r = R b , r max k K R e , r , k , and the system sum secrecy rate is given by R s = R s , t + R s , r .

2.2. Channel State Information

We consider a scenario where the BS adopts a uniform linear array (ULA) with N antennas, and the STAR-RIS consists of a uniform rectangular array (URA) with M = M x M z elements, where M x and M z represent the number of elements along the horizontal and vertical axes, respectively. In our simulation, the STAR-RIS-user and STAR-RIS-eavesdropper channels are both generated based on the following geometric channel model [19]:
h = M L l = 1 L α l λ r λ t a t ( ϕ a l , ϕ e l )
where L is the number of paths, α l is the complex gain associated with the l-th path, ϕ a l ( ϕ e l ) is the relevant azimuth (elevation) deviation angle, and a t C M × 1 is the normalized emission array response vector, while λ r and λ t represent the gains of the receiving and transmitting antenna units. According to [20,21], for the STAR-RIS-user and STAR-RIS-eavesdropper links, λ r and λ t are set to 0 dBi and 9.82 dBi. The complex gain α l is generated based on the complex Gaussian distribution [22] α l CN ( 0 , 10 0.1 κ ) , where κ is given as κ = e + 10 f log 10 ( d ) + ζ and d represents the distance between the transmitter and receiver, ζ N ( 0 , σ ζ 2 ) . We set the values of e = 72 ,   f = 2.92 , and σ ζ = 8.7 dB , as shown in real channel measurements in a 28 GHz Non-Line-of-Sight (NLOS) scenario. The BS-STAR-RIS channel has the characteristics of the rank-one geometric channel model, which provides the following:
H = N M α λ r λ t a r ( ϑ a , ϑ e ) a t H ( ϕ )
Here, ϑ a ( ϑ e ) represents the azimuth (elevation) arrival angle related to the BS-STAR-RIS path. ϕ is the relevant departure angle, where a r C M × 1 and a t C N × 1 represent the normalized receiving and transmitting array response vectors, respectively. Both λ r and λ t are the antenna gains.
In considering the impact of the imperfect eavesdropper channel on secure communication, the bounded CSI error models are used for the cascaded BS-STAR-RIS- Eve t , k channel, the cascaded BS-STAR-RIS- Eve r , k channel, the direct STAR-RIS- Eve t , k channel, and the direct STAR-RIS- Eve r , k channel. Specifically, we denote the cascaded BS-STAR-RIS- Eve t , k channel as
G t , k = diag ( g t , k H ) H = G ¯ t , k + Δ G t , k , k
with Υ t , k = { Δ G t , k C M × N : | | Δ G t , k | | F ρ t , k } , k , where G ¯ t , k , k , is the estimation of the corresponding channel G t , k . The channel estimation error of G t , k , k , is denoted by Δ G t , k . The continuous set Υ t , k , k , collects all possible channel estimation errors, while constant ρ t , k , k , denotes the maximum value of the norm of the CSI estimation error Δ G t , k , k .
Since passive eavesdroppers typically hide their presence from the BS, they interact less frequently with the desired communication system. It is more practical to assume that only partial eavesdroppers’ CSI is available to legitimate users. The direct STAR-RIS- Eve t , k channel can be estimated by exploiting conventional uplink pilot transmission. We denote the direct STAR-RIS- Eve t , k channel as
g t , k = g ¯ t , k + Δ g t , k , k
with Ω t , k = { Δ g t , k C M × 1 : | | Δ g t , k | | 2 μ t , k } , k , where g ¯ t , k is the estimate of the corresponding channel g t , k and the corresponding channel estimation error is Δ g t , k . The continuous set Ω t , k collects all possible channel estimation errors, while constant μ t , k is the maximum value of the norm of the CSI estimation error. Similarly, the BS-STAR-RIS- Eve r , k channel and the STAR-RIS- Eve r , k channel are denoted as G r , k = diag ( g r , k H ) H = G ¯ r , k + Δ G r , k with Υ r , k = { Δ G r , k C M × N : | | Δ G r , k | | F ρ r , k } , k and g r , k = g ¯ r , k + Δ g r , k with Ω r , k = { Δ g r , k C M × 1 : | | Δ g r , k | | 2 μ r , k } , k , respectively.

3. Problem Formulation

Here, we aim to maximize legitimate users’ sum rate by jointly designing beamforming at the BS and transmission and reflection coefficients at the STAR-RIS. Specifically, for the energy-splitting protocol, the problem can be expressed as
max w t , w r , Φ t , Φ r R b , t + R b , r
s . t . C 1 : | | w t | | 2 + | | w r | | 2 P C 2 : ϕ m t , ϕ m r [ 0 , 2 π ) , m M C 3 : α m t + α m r = 1 , α m t , α m r [ 0 , 1 ] , m C 4 : max Δ G t , k R e , t , k τ t , k , max Δ G r , k R e , r , k τ r , k , k
The objective function in (13) maximizes the system sum rate. Constraint C1 ensures that the transmit power at the BS does not exceed its maximum transmit power budget P. Constraint C2 represents the phase shift response of the m-th element, while constraint C3 represents the amplitude response of the m-th element. Constants τ t , k and τ r , k in C4 are the maximum tolerable information leakage to Eve t , k and Eve r , k for the wiretapping of the signal transmitted to B o b t and B o b r considering the CSI error. In particular, C4 can guarantee that the system secrecy rate R s is bounded from below, i.e., R s R b , t τ t , k + R b , r τ r , k .
Remark 1.
The formula in (13) for the maximization of the system sum rate considering the information leakage constraints proposed is more flexible in resource allocation than the formula for the direct maximization of the system secrecy rate (such as [23,24]). In particular, the proposed problem formula can be adjusted with τ t , k , τ r , k , k , to control the secrecy performance level of a single eavesdropper, offering a more flexible formula to determine the communication security level in heterogeneous practical applications. This is widely used in the literature [25,26,27,28].

4. System Sum Rate Maximization

4.1. Problem Transformation

Before solving the formulation problem, we first rewrite the problem in (13). Defining θ t = [ α 1 t e j ϕ 1 t , , α M t e j ϕ M t ] H and θ r = [ α 1 r e j ϕ 1 r , , α M r e j ϕ M r ] H , we have h t H Φ t H = θ t H F t , g t , k H Φ t H = θ t H G t , k , h r H Φ r H = θ r H F r , and g r , k H Φ r H = θ r H G r , k , where the matrices F t = diag ( h t H ) H , G t , k = diag ( g t , k H ) H , F r = diag ( h r H ) H , and G r , k = diag ( g r , k H ) H . Hence, the received rates ( R b , t , R b , r ) and information leakages at eavesdroppers ( R e , t , k , R e , r , k ) in the constraint C4 can be equivalently rewritten as
R b , t = log 2 ( 1 + Tr ( F t W t F t H Θ t ) T r ( F t W r F t H Θ t ) + σ b 2 )
R b , r = log 2 ( 1 + Tr ( F r W r F r H Θ r ) Tr ( F r W t F r H Θ r ) + σ b 2 )
R e , t , k = log 2 ( 1 + Tr ( G t , k W t G t , k H Θ t ) Tr ( G t , k W r G t , k H Θ t ) + σ e 2 )
R e , r , k = log 2 ( 1 + Tr ( G r , k W r G r , k H Θ r ) Tr ( G r , k W t G r , k H Θ r ) + σ e 2 )
in which we define the beamforming matrices as W t = w t w t H and W r = w r w r H , denote Θ t = θ t θ t H satisfying Θ t 0 and Rank ( Θ t ) = 1 , and denote Θ r = θ r θ r H satisfying Θ r 0 and Rank ( Θ r ) = 1 . W t , W r , Θ t , Θ r are Hermitian matrices.
By solving the following optimization problem, the performance lower bound of the problem can be obtained:
max W t , W r , Θ t , Θ r , ξ t , ξ r , ι t , ι r log 2 ( 1 + ξ t ι t + σ b 2 ) + log 2 ( 1 + ξ r ι r + σ b 2 )
s . t . C 1 : Tr ( W t ) + Tr ( W r ) P C 2 , C 3 , C 4 C 5 : W t 0 , W r 0 C 6 : Rank ( W t ) 1 , Rank ( W r ) 1 C 7 : ξ t Tr ( F t W t F t H Θ t ) 0 , ξ r Tr ( F r W r F r H Θ r ) 0 C 8 : Tr ( F t W r F t H Θ t ) ι t , Tr ( F r W t F r H Θ r ) ι r C 9 : Θ t = θ t θ t H , Θ r = θ r θ r H
where ξ t , ξ r , ι t , and ι r are slack variables. Moreover, the non-convex constraint in C9 in (14) can be replaced with the following constraints:
C 9 a : Y t = Θ t θ t θ t H 1 0 , Y r = Θ r θ r θ r H 1 0
C 9 b : Rank ( Y t ) = 1 , Rank ( Y r ) = 1
Therefore, the optimization problem in (14) is equivalent to the following problem:
max W t , W r , Θ t , Θ r , Y t , Y r , ξ t , ξ r , ι t , ι r log 2 ( 1 + ξ t ι t + σ b 2 ) + log 2 ( 1 + ξ r ι r + σ b 2 )
s . t . C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 a , C 9 b

4.2. Optimization Variable Decoupling

For the optimization problem in (17), the non-convexity arises from constraints C4, C7, and C8 and the objective function due to severely coupled variables. In particular, there are two types of variable coupling, i.e., the fractional form of two continuous variables in the SINR and the multiplication between W t , W r , Θ t , Θ r , e.g., Tr ( F t W t F t H Θ t ) and Tr ( F r W r F r H Θ r ) . To address the first type of coupling, we rewrite the SINR in (14) in its equivalent form, namely the difference of convex (D.C.) form:
max W t , W r , Θ t , Θ r , Y t , Y r , ξ t , ξ r , ι t , ι r N o b j ( ξ t , ξ r , ι t , ι r ) D o b j ( ι t , ι r )
where N o b j ( ξ t , ξ r , ι t , ι r ) = log 2 ( ξ t + ι t + σ b 2 ) + log 2 ( ξ r + ι r + σ b 2 ) and D o b j ( ι t , ι r ) = log 2 ( ι t + σ b 2 ) + log 2 ( ι r + σ b 2 ) are two functions that are both concave with respect to ξ t , ξ r , ι t , ι r .
We take the term Tr ( F t W t F t H Θ t ) as an example to explain the construction of a convex constraint approximating the non-convex quality-of-service constraint C7. The term is rewritten as
Tr ( F t W t F t H Θ t ) = 1 2 | | W t F t H Θ t F t | | F 2 1 2 Tr ( W t H W t ) 1 2 Tr ( F t H Θ t H F t F t H Θ t F t )
Now, the last two terms in (19) are non-convex with respect to W t and Θ t , respectively. We construct a global underestimator for the non-convex terms via first-order Taylor approximation. Specifically, we have
Tr ( W t H W t ) | | W t ( i ) | | F 2 + 2 Tr ( ( W t ( i ) ) H W t )
Tr ( F t H Θ t H F t F t H Θ t F t ) | | F t H Θ t ( i ) F t | | F 2 + 2 Tr ( ( F t F t H Θ t ( i ) F t F t H ) H Θ t )
where i denotes the iteration index. Using the above transformation, C4, C7, and C8 can be written in the following form:
C 4 1 : min Δ G t , k [ 1 2 | | W t + G t , k H Θ t G t , k | | F 2 1 2 Tr ( W t H W t ) 1 2 Tr ( G t , k H Θ t H G t , k G t , k H Θ t G t , k ) + ( 2 τ t , k 1 ) { 1 2 | | W r G t , k H Θ t G t , k | | F 2 1 2 Tr ( W r H W r ) 1 2 Tr ( G t , k H Θ t H G t , k G t , k H Θ t G t , k ) } ] ( 2 τ t , k 1 ) σ e 2 0 , k
C 4 2 : min Δ G r , k [ 1 2 | | W r + G r , k H Θ r G r , k | | F 2 1 2 Tr ( W r H W r ) 1 2 Tr ( G r , k H Θ r H G r , k G r , k H Θ r G r , k ) + ( 2 τ r , k 1 ) { 1 2 | | W t G r , k H Θ r G r , k | | F 2 1 2 Tr ( W t H W t ) 1 2 Tr ( G r , k H Θ r H G r , k G r , k H Θ r G r , k ) } ] ( 2 τ r , k 1 ) σ e 2 0 , k
C 7 1 : ξ t + 1 2 | | W t F t H Θ t F t | | 2 Tr ( ( W t ( i ) ) H W t ) + 1 2 | | W t ( i ) | | F 2 + 1 2 | | F t H Θ t ( i ) F t | | F 2 Tr ( ( F t F t H Θ t ( i ) F t F t H ) H Θ t ) 0
C 7 2 : ξ r + 1 2 | | W r F r H Θ r F r | | 2 Tr ( ( W r ( i ) ) H W r ) + 1 2 | | W r ( i ) | | F 2 + 1 2 | | F r H Θ r ( i ) F r | | F 2 Tr ( ( F r F r H Θ r ( i ) F r F r H ) H Θ r ) 0
C 8 1 : ι t + 1 2 | | W r + F t H Θ t F t | | 2 Tr ( ( W r ( i ) ) H W r ) + 1 2 | | W t ( i ) | | F 2 + 1 2 | | F t H Θ t ( i ) F t | | F 2 Tr ( ( F t F t H Θ t ( i ) F t F t H ) H Θ t ) 0
C 8 2 : ι r + 1 2 | | W t + F r H Θ r F r | | 2 Tr ( ( W t ( i ) ) H W t ) + 1 2 | | W t ( i ) | | F 2 + 1 2 | | F r H Θ r ( i ) F r | | F 2 Tr ( ( F r F r H Θ r ( i ) F r F r H ) H Θ r ) 0

4.3. S -Procedure

On the other hand, due to the CSI uncertainty, there are infinite possibilities for constraint C4. As a result, we adopt the S -procedure to tackle these issues. Then, for constraint C4, there is an infinite number of quadratic matrix inequalities (QMIs) due to the CSI uncertainty set. To overcome this problem, we first introduce slack optimization variables Ψ t , k and Ψ r , k to replace G t , k H Θ t G t , k and G r , k H Θ r G r , k . Hence, constraint C4 can be equivalently rewritten as
C 4 a 1 : 1 2 | | W t + Ψ t , k | | F 2 1 2 Tr ( W t H W t ) 2 τ t , k 1 Tr ( Ψ t , k H Ψ t , k ) + ( 2 τ t , k 1 ) { 1 2 | | W r Ψ t , k | | F 2 1 2 Tr ( W r H W r ) } ( 2 τ t , k 1 ) σ e 2 0 , k
C 4 a 2 : 1 2 | | W r + Ψ r , k | | F 2 1 2 Tr ( W r H W r ) 2 τ r , k 1 Tr ( Ψ r , k H Ψ r , k ) + ( 2 τ r , k 1 ) { 1 2 | | W t Ψ r , k | | F 2 1 2 Tr ( W t H W t ) } ( 2 τ r , k 1 ) σ e 2 0 , k
C 4 b : Ψ t , k max Δ G t , k G t , k H Θ t G t , k , k , Ψ r , k max Δ G r , k G r , k H Θ r G r , k , k
Note that constraint C4b still involves an infinite number of inequality constraints. To circumvent this difficulty, we use the Generalized S -Procedure to convert the infinite constraint C4b to an equivalent form with a finite number of constraints by applying Lemma 1.
Lemma 1
(Generalized S -Procedure [29]). Let f ( X ) = X H D X + X H B + B H X + E and J 0 . For some ϵ 0 ,   f ( X ) 0 , X { X | Tr ( J X X H ) 1 } is equivalent to
E B H B D ϵ I 0 0 J 0
On the basis of the above Lemma 1, we can express the first term of the constraint C4b as
C 4 b 1 : Δ G t , k H Θ t Δ G t , k Δ G t , k H Θ t G ¯ t , k G ¯ t , k H Θ t Δ G t , k G ¯ t , k H Θ t G ¯ t , k + Ψ t , k 0 , k
Then, applying Lemma 1, the first term of constraint C4b is equivalently transformed as
C 4 b ¯ 1 : S C 4 b ( Θ t , ϵ t , k C 4 b ¯ ) = G ¯ t , k H Θ t G ¯ t , k + Ψ t , k ϵ t , k C 4 b ¯ I N G ¯ t , k H Θ t Θ t G ¯ t , k ϵ t , k C 4 b ¯ ρ t , k 2 I M Θ t 0 , k
C 4 c ¯ 1 : ϵ t , k C 4 b ¯ 0 , k
Similarly, the second term of constraint C4b can be equivalently represented as
C 4 b ¯ 2 : S C 4 b ( Θ r , ϵ r , k C 4 b ¯ ) = G ¯ r , k H Θ r G ¯ r , k + Ψ r , k ϵ r , k C 4 b ¯ I N G ¯ r , k H Θ r Θ r G ¯ r , k ϵ r , k C 4 b ¯ ρ r , k 2 I M Θ r 0 , k
C 4 c ¯ 2 : ϵ r , k C 4 b ¯ 0 , k

4.4. SCA- and SDR-Based Iterative Algorithm

Next, to tackle the non-convexity of constraints C4a and C9b and the objective function in (17), we first transform them into the D.C. form such that SCA can be applied to obtain a suboptimal solution. Firstly, the rank-one constraint C9b is rewritten using Lemma 2:
Lemma 2.
The rank-one constraint in the first term of C9b is equivalent to the following D.C. form constraint:
C 9 b ˜ : | | Y t | | * | | Y t | | 2 0
Proof. 
Since Y t is a Hermitian matrix, the inequality | | Y t | | * = i ρ i | | Y t | | 2 = max i { ρ i } holds, where the i-th singular value of Y t is denoted by ρ i . Thus, the inequality in (37) holds if and only if Y t has a unit rank.    □
Aiming to tackle the D.C. form constraint C 9 b ˜ , a lower bound of | | Y t | | 2 is given by the first-order Taylor approximation for any feasible point Y t ( i ) during the i-th iteration
| | Y t | | 2 | | Y t ( i ) | | 2 + Tr ( λ max ( Y t ( i ) ) × λ max H ( Y t ( i ) ) ( Y t Y t ( i ) ) )
On the basis of the SCA method, C9b can be obtained, which is given by
C 9 b ¯ 1 : | | Y t | | * | | Y t ( i ) | | 2 Tr ( λ max ( Y t ( i ) ) λ max H ( Y t ( i ) ) × ( Y t Y t ( i ) ) ) 0 C 9 b ¯ 2 : | | Y r | | * | | Y r ( i ) | | 2 Tr ( λ max ( Y r ( i ) ) λ max H ( Y r ( i ) ) × ( Y r Y r ( i ) ) ) 0
Since C 9 b ¯ C 9 b , replacing C9b with C 9 b ¯ can ensure that the former is satisfied when the proposed algorithm converges. On the other hand, it can be observed that, for the non-convex objective function in (18), the non-convex constraint is in a D.C.-differentiable form. Similarly, after deriving the first-order Taylor expansions corresponding to the non-convex component, for any feasible point ι t ( i ) , ι r ( i ) , we have the following inequalities:
D o b j ( ι t , ι r ) ι t H D o b j ( ι t ( i ) ) ( ι t ι t ( i ) ) + ι r H D o b j ( ι r ( i ) ) ( ι r ι r ( i ) ) + D o b j ( ι t ( i ) , ι r ( i ) )
where ι t H D o b j ( ι t ) = 1 ( l n 2 ) ( σ b 2 + ι t ) , ι r H D o b j ( ι r ) = 1 ( l n 2 ) ( σ b 2 + ι r ) . As such, the lower bound of the objective function (18) is given by
N o b j ( ξ t , ξ r , ι t , ι r ) ι t H D o b j ( ι t ( i ) ) ( ι t ι t ( i ) ) ι r H D o b j ( ι r ( i ) ) ( ι r ι r ( i ) ) D o b j ( ι t ( i ) , ι r ( i ) )
Similarly, to overcome the non-convexity of C4a, we can use the inequality in (20) to obtain
C 4 a ¯ 1 : | | W t + Ψ t , k | | F 2 + | | W t ( i ) | | F 2 2 Tr ( ( W t ( i ) ) H W t ) + 2 τ t , k | | Ψ t , k ( i ) | | F 2 2 τ t , k + 1 Tr ( ( Ψ t , k ( i ) ) H Ψ t , k ) ( 2 τ t , k + 1 2 ) σ e 2 + ( 2 τ t , k 1 ) { | | W r Ψ t , k | | F 2 + | | W r ( i ) | | F 2 2 Tr ( ( W r ( i ) ) H W r ) } 0 C 4 a ¯ 2 : | | W r + Ψ r , k | | F 2 + | | W r ( i ) | | F 2 2 Tr ( ( W r ( i ) ) H W r ) + 2 τ r , k | | Ψ r , k ( i ) | | F 2 2 τ r , k + 1 Tr ( ( Ψ r , k ( i ) ) H Ψ r , k ) ( 2 τ r , k + 1 2 ) σ e 2 + ( 2 τ r , k 1 ) { | | W t Ψ r , k | | F 2 + | | W t ( i ) | | F 2 2 Tr ( ( W t ( i ) ) H W t ) } 0
Next, we focus on the optimization of θ t , θ r . We rewrite constraints C2 and C3 as C 10 : Diag ( θ t θ t H + θ r θ r H ) = 1 . It is obvious that the above constraint C 10 is non-convex. To cope with this, we introduce auxiliary vectors x t = [ x t , 1 , , x t , M ] T , x r = [ x r , 1 , , x r , M ] T to linearize C10, and x t , m = [ θ t ] m * [ θ t ] m , x r , m = [ θ r ] m * [ θ r ] m .
Following the principles of the penalty concave–convex procedure, we relax x t , m , x r , m by x t , m [ θ t ] m * [ θ t ] m x t , m , x r , m [ θ r ] m * [ θ r ] m x r , m . x t , m [ θ t ] m * [ θ t ] m , x r , m [ θ r ] m * [ θ r ] m are approximated by x t , m 2 { [ θ t ] m * [ θ ˜ t ] m } [ θ ˜ t ] m * [ θ ˜ t ] m , x r , m 2 { [ θ r ] m * [ θ ˜ r ] m } [ θ ˜ r ] m * [ θ ˜ r ] m . Thus, we obtain problem (42), as shown at the bottom of the page, where y t , m 0 , y r , m 0 are the slack variables for the modulus constraints; m = 1 2 M y t , m , m = 1 2 M y r , m are the penalty terms added into the objective function, which is scaled by the multiplier η ( i ) in the i-th iteration. In addition, η ( i ) is updated with η ( i ) = min { γ η ( i 1 ) , η max } , where the upper bound η max is used to avoid numerical problems. The original problem can be obtained from the following optimization problem:
max W t , W r , Y t , Y r , Θ t , Θ r , Ψ t , k , Ψ r , k , x t , x r , y t , y r , ϵ t , k C 4 b ¯ , ϵ r , k C 4 b ¯ ξ t , ξ r , ι t , ι r N o b j ( ξ t , ξ r , ι t , ι r ) ι t H D o b j ( ι t ( i ) ) ( ι t ι t ( i ) ) ι r H D o b j ( ι r ( i ) ) ( ι r ι r ( i ) ) D o b j ( ι t ( i ) , ι r ( i ) ) η ( i ) ( m = 1 2 M y t , m + m = 1 2 M y r , m )
s . t . C 1 , C 4 a ¯ , C 4 b ¯ , C 4 c ¯ , C 5 , C 6 , C 7 , C 8 , C 9 a , C 9 b ¯ C 10 a ¯ : [ θ t ] m * [ θ t ] m x t , m + y t , m , [ θ r ] m * [ θ r ] m x r , m + y r , m C 10 b ¯ : [ θ ˜ t ] m * [ θ ˜ t ] m 2 { [ θ t ] m * [ θ ˜ t ] m } y t , m + M x t , m , [ θ ˜ r ] m * [ θ ˜ r ] m 2 { [ θ r ] m * [ θ ˜ r ] m } y r , m + M x r , m C 10 c ¯ : x t , m + x r , m = 1 , x t , m 0 , x r , m 0
Since the rank-one constraint in C6 is the only non-convex part of the optimization problem (42), we apply the SDR technique to drop the rank constraint in C6, such that the relaxed rank constraint version of (42) can be solved by using a standard numerical solver for convex programming. In the following theorem, the tightness of the adopted SDR is revealed.
Theorem 1.
For P > 0 and if (42) is feasible, the rank-one constraint of C6 in (42) can always be obtained.
Proof. 
Please refer to Appendix A for the proof of Theorem 1.    □
Due to the use of SCA, solving the problem in (42) provides a lower bound. To tighten the lower bound of performance, we iteratively update the feasible solution by solving the problem in (42). The proposed algorithm is shown in Algorithm 1.
Algorithm 1: Main loop: SCA
1:
Input the maximum number of iterations i max , the initial iteration index i = 0, and variables W t ( 0 ) , W r ( 0 ) , Y t ( 0 ) , Y r ( 0 ) , Θ t ( 0 ) , Θ r ( 0 ) , Ψ t , k ( 0 ) , Ψ r , k ( 0 ) , ι t ( 0 ) , ι r ( 0 ) , η ( 0 ) .
2:
Output the optimal variables W t , W r , Y t , Y r , Θ t , Θ r , Ψ t , k , Ψ r , k , x t , x r , y t , y r , ϵ t , k C 4 b ¯ , ϵ r , k C 4 b ¯ , ξ t , ξ r , ι t , ι r .
3:
repeat
4:
 Solve the problem (42) with W t ( i ) , W r ( i ) , Y t ( i ) , Y r ( i ) , Θ t ( i ) , Θ r ( i ) , Ψ t , k ( i ) , Ψ r , k ( i ) , ι t ( i ) , ι r ( i ) , η ( i ) to obtain W t , W r , Y t , Y r , Θ t , Θ r , Ψ t , k , Ψ r , k , x t , x r , y t , y r , ϵ t , k C 4 b ¯ , ϵ r , k C 4 b ¯ , ξ t , ξ r , ι t , ι r .
5:
 Set i = i + 1 , and η ( i ) is updated with η ( i ) = min { γ η ( i 1 ) , η max } .
6:
 Replace W t ( i ) , W r ( i ) , Y t ( i ) , Y r ( i ) , Θ t ( i ) , Θ r ( i ) , Ψ t , k ( i ) , Ψ r , k ( i ) , ι t ( i ) , ι r ( i ) with W t , W r , Y t , Y r , Θ t , Θ r , Ψ t , k , Ψ r , k , ι t , ι r .
7:
until convergence or i = i max .
The computational complexity of each iteration of the proposed algorithm is given by O ( ( V 1 I 1 3 + I 1 2 V 1 2 + V 1 3 ) × I 1 log 1 ϱ ) , where I 1 = 11 + 6 K + 6 M and V 1 = 16 + 4 K are the number of inequalities and the number of variables of the proposed scheme, respectively. Besides, ϱ is the threshold of convergence tolerance. The computational complexity of each iteration of the conventional RIS algorithm is given by O ( ( V 2 I 2 3 + I 2 2 V 2 2 + V 2 3 ) × I 2 log 1 ϱ ) , where I 2 = 10 + 6 K + 6 M and V 2 = 14 + 4 K are the number of inequalities and the number of variables of the conventional RIS scheme, respectively. Although the complexity of conventional RIS is lower, it needs to use multiple RISs to achieve full space coverage, so it is not as flexible and cost-effective as the deployment of STAR-RIS.

5. Simulation Results and Analysis

We assume that the BS and the STAR-RIS are deployed at (0, 0, 10) and (5, 20, 10) meters, and Bob t and Bob r are deployed at (6, 21, 10) and (4, 19, 10) meters. The number of antennas at the BS is 36, and the maximum transmit power is 10 mW. Eve t , k and Eve r , k are deployed on half-circles centered at the STAR-RIS with a radius of 5 m. We assume that the STAR-RIS is composed of M = M x M z elements, and we define ν G t , k , ν g t , k , ν G r , k , ν g r , k as the maximum normalized estimation error for the channel G t , k , g t , k , G r , k , g r , k , i.e., ν G t , k = ρ t , k | | G t , k | | F , ν g t , k = μ t , k | | g t , k | | 2 , ν G r , k = ρ r , k | | G r , k | | F , ν g r , k = μ r , k | | g r , k | | 2 . Unless further specified, we fix ν = ν G t , k = ν g t , k = ν G r , k = ν g r , k and ν 2 = 0.1 , which is the normalized mean square error based on the channel estimation method in [30]. The maximum tolerable channel capacity of potential eavesdroppers is τ t , k = τ r , k = 2.1 bits/s/Hz. The noise power for users and eavesdroppers is σ b 2 = σ e 2 = 80 dBm. For the parameters of the penalty concave–convex procedure method, we set η max = 10 and γ = 0.8 .
For the millimeter-wave secure communication system assisted by a STAR-RIS, this study proposes a joint optimization design scheme considering the transmission beamforming vector of the BS and the transmission and reflection coefficients of the STAR-RIS to maximize the system sum rate. The power budget of the BS is an important factor affecting the system sum rate. As shown in Figure 2, with an increase in the power budget, the system sum rate also increases. By increasing the power, the signal strength of the receiving user can be improved, but at this time, the signal strength of the eavesdropper will also be increased. Therefore, the power of the BS should be set reasonably. When the transmission power is small, such as 0 dbm or 5 dBm, the performance improvement of STAR-RIS is not obvious. When the transmitting power is large, such as 20 dbm or 25 dbm, the performance improvement of STAR-RIS is more obvious. It can also be seen from the figure that the sum rate of STAR-RIS is greater than the sum rate of the conventional RIS under the same power of the BS.
Figure 3 shows the impact of the number of elements of the two RISs on the system sum rate. It can be seen from the figure that increasing the number of elements of the RIS can increase the system sum rate. As the number of RIS elements increases, for the STAR-RIS, the signal strength transmitted to the transmission region increases, and the signal strength reflected in the reflection region also increases. For a conventional RIS, the signal strength reflected in the reflection region increases. Therefore, for both RISs, the system sum rate increases. It can also be seen from the figure that, with the same number of elements, the sum rate of STAR-RIS is greater than the sum rate of the conventional RIS. With the increase of the number of elements, the relative value of the performance increase of STAR-RIS is almost unchanged.
Figure 4 shows the impact of the number of antennas of the BS on the system sum rate. By increasing the number of antennas of the BS, the system sum rate can be improved. As the number of antennas in the BS increases, the strength of the transmitted signal increases, as do the signal transmitted to the RIS and the strength of the received signal at the user side. With the same number of BS antennas, the sum rate of STAR-RIS is greater than the sum rate of the conventional RIS. As the number of antennas increases, the relative value of the performance increase of STAR-RIS is almost similar.

6. Conclusions

This study considers a millimeter-wave secure communication system assisted by a STAR-RIS, in which the BS realizes the requirements of secure communication with users in the transmission region and reflection region through the STAR-RIS. By jointly optimizing the transmit beamforming of the BS and the transmitting and reflecting coefficients of the STAR-RIS, the system sum rate is maximized. For the non-convex optimization problem, this study uses a series of transformations to decouple the optimization variables, uses the S -Procedure algorithm to solve the imperfect ECSI, and then, uses the SCA and SDR to design an iterative optimization algorithm. At this time, the problem is transformed into a convex problem, which can be solved using the standard convex programming numerical solver. The simulation results show that the millimeter-wave secure communication scheme assisted by a STAR-RIS proposed in this study can significantly improve the system sum rate and ensure the safe transmission of information. STAR-RIS can be installed in all parts of the city to achieve full coverage of the communication range. Besides, our proposed approach has the potential to improve data transmission speeds and security in various fields like autonomous vehicles, smart cities, and remote healthcare services. The combination of millimeter-wave and RIS can also minimize signal interference and reduce power consumption, making it more sustainable for long-term use.

Author Contributions

Conceptualization and methodology, J.Q.; algorithm implementation and draft preparation, B.Q.; writing—review and editing, J Q. and C.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Shandong Province Excellent Youth Science Fund Project (Overseas) under Grant No. 2024HWYQ-028 and by the Fundamental Research Funds of Shandong University under Grant No. 11480061330000.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proof of Theorem 1

Proof  of Theorem 1.
We first introduce the slack optimization variables C C 4 a ¯ , t , k and C C 4 a ¯ , r , k and the constraint C11 to facilitate the proof. Then, the relaxed rank constraint version of the problem (42) can be transformed into its equivalent form, i.e.,
max W t , W r , Y t , Y r , Θ t , Θ r , Ψ t , k , Ψ r , k , x t , x r , y t , y r ϵ t , k C 4 b ¯ , ϵ r , k C 4 b ¯ , ξ t , ξ r , ι t , ι r N o b j ( ξ t , ξ r , ι t , ι r ) ι t H D o b j ( ι t ( i ) ) ( ι t ι t ( i ) ) ι r H D o b j ( ι r ( i ) ) ( ι r ι r ( i ) ) D o b j ( ι t ( i ) , ι r ( i ) ) η ( i ) ( m = 1 2 M y t , m + m = 1 2 M y r , m )
s . t . C 1 , C 4 a ¯ , C 4 b ¯ , C 4 c ¯ , C 5 , C 7 , C 8 , C 9 a , C 9 b ¯ , C 10 a ¯ , C 10 b ¯ , C 10 c ¯ C 4 a ˜ 1 : | | C C 4 a ¯ , t , k | | F 2 + | | W t ( i ) | | F 2 2 Tr ( ( W t ( i ) ) H W t ) + 2 τ t , k | | Ψ t , k ( i ) | | F 2 2 τ t , k + 1 Tr ( ( Ψ t , k ( i ) ) H Ψ t , k ) ( 2 τ t , k + 1 2 ) σ e 2 + ( 2 τ t , k 1 ) { | | W r Ψ t , k | | F 2 + | | W r ( i ) | | F 2 2 Tr ( ( W r ( i ) ) H W r ) } 0 C 4 a ˜ 2 : | | C C 4 a ¯ , r , k | | F 2 + | | W r ( i ) | | F 2 2 Tr ( ( W r ( i ) ) H W r ) + 2 τ r , k | | Ψ r , k ( i ) | | F 2 2 τ r , k + 1 Tr ( ( Ψ r , k ( i ) ) H Ψ r , k ) ( 2 τ r , k + 1 2 ) σ e 2 + ( 2 τ r , k 1 ) { | | W t Ψ r , k | | F 2 + | | W t ( i ) | | F 2 2 Tr ( ( W t ( i ) ) H W t ) } 0 C 11 : C C 4 a ¯ , t , k W t + Ψ t , k , C C 4 a ¯ , r , k W r + Ψ r , k
L = δ C 1 , t W t δ C 1 , r W r + k K ( 2 δ C 4 a ˜ , t , k Tr ( ( W t ( i ) ) H W t ) + 2 δ C 4 a ˜ , r , k Tr ( ( W r ( i ) ) H W r ) )     + Tr ( M C 5 , t W t + M C 5 , r W r ) k K ( Tr ( M C 11 , t , k W t ) + Tr ( M C 11 , r , k W r ) ) + Δ
Since (A1) is jointly convex with the optimization variables and satisfies Slater’s constraint qualification, its strong duality holds. The Lagrangian function of problem (A1) in terms of W t and W r is given in (A2). Δ in (A2) denotes the collection of terms that are irrelevant to W t and W r . In (A2), δ C 1 , t , δ C 1 , r are the Lagrange multipliers for the constraint C1; δ C 4 a ˜ , t , k , δ C 4 a ˜ , r , k are the Lagrange multipliers for the constraint C 4 a ˜ , respectively. M C 5 , t , M C 5 , r are the Lagrange multiplier matrices corresponding to constraint C5. M C 11 , t , k , M C 11 , r , k are the Lagrange multiplier matrices corresponding to constraint C11. Then, examining the Karush–Kuhn–Tucker (KKT) conditions for problem (A1) yields
K 1 : M C 11 , t , k * 0 , M C 11 , r , k * 0 , δ C 1 , t 0 , δ C 1 , r 0 , δ C 4 a ¯ , t , k 0 , δ C 4 a ¯ , r , k 0
K 2 : M C 5 , t , k * W t * = 0 , M C 5 , r , k * W r * = 0 , M C 10 , t , k * W t * = 0 , M C 10 , r , k * W r * = 0
K 3 : w t L = 0 , w r L = 0
For the ease of presentation, K3 in (A5) can be recast as
δ C 1 , t * I N Υ t * = M C 5 , t * , δ C 1 , r * I N Υ r * = M C 5 , r *
where Υ t * = Υ r * = 2 ( k K δ C 4 a ¯ , t , k * W t ( i ) + k K δ C 4 a ¯ , r , k * W r ( i ) ) ( k K M C 11 , t , k * + k K M C 11 , r , k * ) .
From (A4), we know that matrix W t * lies in the null space of M C 5 , t * . To reveal the rank of W t * , we first investigate the structure of M C 5 , t * . When δ C 1 , t * = 0 , Υ t * 0 , which leads to the dual problem of the unbounded problem (A1). Thus, δ C 1 , t * > 0 holds. According to (A6), if λ max ( Υ t * ) > δ C 1 , t * , then λ max ( M C 5 , t * ) < 0 , which contradicts K1 in (A3). If λ max ( Υ t * ) < δ C 1 , t * , M C 5 , t * is a positive definite matrix with full rank, which yields the solution W t * = 0 and Rank ( W t * ) = 0 . If λ max ( Υ t * ) = δ C 1 , t * holds at the optimal solution, in order to have a bounded optimal dual solution, the null space of M C 5 , t * is spanned by vector r max C N + 1 , which is a unit-norm eigenvector of Υ t * associated with eigenvalue λ max ( Υ t * ) . Therefore, W t * = ν r max r max H is the optimal beamforming matrix, where ν is a parameter that enables the power of the transmitter to satisfy constraint C1. Similarly, the same analysis can be performed on W r * . □

References

  1. Ghosh, A.; Thomas, T.A.; Cudak, M.C.; Ratasuk, R.; Moorut, P.; Vook, F.W.; Rappaport, T.S.; MacCartney, G.R.; Sun, S.; Nie, S. Millimeter-Wave Enhanced Local Area Systems: A High-Data-Rate Approach for Future Wireless Networks. IEEE J. Sel. Areas Commun. 2014, 32, 1152–1163. [Google Scholar] [CrossRef]
  2. Abari, O.; Bharadia, D.; Duffield, A.; Katabi, D. Enabling high-quality untethered virtual reality. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27–29 March 2017; pp. 531–544. [Google Scholar]
  3. Tan, X.; Sun, Z.; Koutsonikolas, D.; Jornet, J.M. Enabling indoor mobile millimeter-wave networks based on smart reflect-arrays. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, USA, 15–19 April 2018; pp. 270–278. [Google Scholar]
  4. Nie, S.; Akyildiz, I.F. Beamforming in intelligent environments based on ultra-massive MIMO platforms in millimeter wave and terahertz bands. In Proceedings of the ICASSP 2020—2020 IEEE International Conference on Acoustics, Speech and Signal Processing, Barcelona, Spain, 4–8 May 2020; pp. 8683–8687. [Google Scholar]
  5. Wu, Q.; Zhang, R. Intelligent Reflecting Surface Enhanced Wireless Network: Joint Active and Passive Beamforming Design. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  6. Wu, Q.; Zhang, R. Towards Smart and Reconfigurable Environment: Intelligent Reflecting Surface Aided Wireless Network. IEEE Commun. Mag. 2020, 58, 106–112. [Google Scholar] [CrossRef]
  7. Qiao, J.; Alouini, M.-S. Secure Transmission for Intelligent Reflecting Surface-Assisted mmWave and Terahertz Systems. IEEE Wirel. Commun. Lett. 2020, 9, 1743–1747. [Google Scholar] [CrossRef]
  8. Qiao, J.; Zhang, C.; Dong, A.; Bian, J.; Alouini, M.-S. Securing Intelligent Reflecting Surface Assisted Terahertz Systems. IEEE Trans. Veh. Technol. 2022, 71, 8519–8533. [Google Scholar] [CrossRef]
  9. Mei, W.; Zhang, R. Cooperative beam routing for multi-IRS aided communication. IEEE Wirel. Commun. Lett. 2021, 10, 426–430. [Google Scholar] [CrossRef]
  10. Xu, J.; Liu, Y.; Mu, X.; Dobre, O.A. STAR-RISs: Simultaneous Transmitting and Reflecting Reconfigurable Intelligent Surfaces. IEEE Commun. Lett. 2021, 25, 3134–3138. [Google Scholar] [CrossRef]
  11. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secure and Energy Efficient Transmission for RSMA-Based Cognitive Satellite-Terrestrial Networks. IEEE Wirel. Commun. Lett. 2021, 10, 251–255. [Google Scholar] [CrossRef]
  12. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z.; Zhang, M.; Wong, K.-K. Weighted Sum Secrecy Rate Maximization Using Intelligent Reflecting Surface. IEEE Trans. Commun. 2021, 69, 6170–6184. [Google Scholar] [CrossRef]
  13. Chu, Z.; Hao, W.; Xiao, P.; Mi, D.; Liu, Z.; Khalily, M.; Kelly, J.R.; Feresidis, A.P. Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System. IEEE Trans. Inf. Forensics Secur. 2021, 16, 1655–1669. [Google Scholar] [CrossRef]
  14. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z. Simultaneous Transmission and Reflection Reconfigurable Intelligent Surface Assisted Secrecy MISO Networks. IEEE Commun. Lett. 2021, 25, 3498–3502. [Google Scholar] [CrossRef]
  15. Zhang, Z.; Wang, Z.; Liu, Y.; He, B.; Lv, L.; Chen, J. Security Enhancement for Coupled Phase-Shift STAR-RIS Networks. IEEE Trans. Veh. Technol. 2023, 72, 8210–8215. [Google Scholar] [CrossRef]
  16. Zhang, Z.; Chen, J.; Liu, Y.; Wu, Q.; He, B.; Yang, L. On the Secrecy Design of STAR-RIS Assisted Uplink NOMA Networks. IEEE Trans. Wirel. Commun. 2022, 21, 11207–11221. [Google Scholar] [CrossRef]
  17. Gao, Q.; Liu, Y.; Mu, X.; Jia, M.; Li, D.; Hanzo, L. Joint Location and Beamforming Design for STAR-RIS Assisted NOMA Systems. IEEE Trans. Commun. 2023, 71, 2532–2546. [Google Scholar] [CrossRef]
  18. Li, X.; Zheng, Y.; Zeng, M.; Liu, Y.; Dobre, O.A. Enhancing Secrecy Performance for STAR-RIS NOMA Networks. IEEE Trans. Veh. Technol. 2023, 72, 2684–2688. [Google Scholar] [CrossRef]
  19. Ayach, O.E.; Rajagopal, S.; Abu-Surra, S.; Pi, Z.; Heath, R.W. Spatially sparse precoding in millimeter wave MIMO systems. IEEE Trans. Wirel. Commun. 2014, 13, 1499–1513. [Google Scholar] [CrossRef]
  20. Wu, Q.; Zhang, R. Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming. IEEE Trans. Wirel. Commun. 2019, 18, 5394–5409. [Google Scholar] [CrossRef]
  21. Faisal, M.M.A.; Nabil, M.; Kamruzzaman, M. Design and simulation of a single element high gain microstrip patch antenna for 5G wireless communication. In Proceedings of the 2018 International Conference on Innovations in Science, Engineering and Technology (ICISET), Chittagong, Bangladesh, 27–28 October 2018; pp. 290–293. [Google Scholar]
  22. Akdeniz, M.R.; Liu, Y.; Samimi, M.K.; Sun, S.; Rangan, S.; Rappaport, T.S.; Erkip, E. Millimeter wave channel modeling and cellular capacity evaluation. IEEE J. Sel. Areas Commun. 2014, 32, 1164–1179. [Google Scholar] [CrossRef]
  23. Li, R.; Wei, Z.; Yang, L.; Ng, D.W.K.; Yuan, J.; An, J. Resource allocation for secure multi-UAV communication systems with multi-eavesdropper. IEEE Trans. Commun. 2020, 68, 4490–4506. [Google Scholar] [CrossRef]
  24. Zhao, P.; Zhang, M.; Yu, H.; Luo, H.; Chen, W. Robust beamforming design for sum secrecy rate optimization in MU-MISO networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1812–1823. [Google Scholar] [CrossRef]
  25. Yu, X.; Xu, D.; Sun, Y.; Ng, D.W.K.; Schober, R. Robust and secure wireless communications via intelligent reflecting surfaces. IEEE J. Sel. Areas Commun. 2020, 38, 2637–2652. [Google Scholar] [CrossRef]
  26. Ng, D.W.K.; Schober, R. Secure and green SWIPT in distributed antenna networks with limited backhaul capacity. IEEE Trans. Wireless Commun. 2015, 14, 5082–5097. [Google Scholar] [CrossRef]
  27. Zhou, F.; Chu, Z.; Sun, H.; Hu, R.Q.; Hanzo, L. Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT. IEEE J. Sel. Areas Commun. 2018, 36, 918–931. [Google Scholar] [CrossRef]
  28. Qin, H.; Chen, X.; Sun, Y.; Zhao, M.; Wang, J. Optimal power allocation for joint beamforming and artificial noise design in secure wireless communications. In Proceedings of the 2011 IEEE International Conference on Communications Workshops (ICC), Kyoto, Japan, 5–9 June 2011; pp. 1–5. [Google Scholar]
  29. Luo, Z.-Q.; Sturm, J.F.; Zhang, S. Multivariate nonnegative quadratic mappings. SIAM J. Optim. 2004, 14, 1140–1162. [Google Scholar] [CrossRef]
  30. Hu, C.; Dai, L.; Han, S.; Wang, X. Two-timescale channel estimation for reconfigurable intelligent surface aided wireless communications. IEEE Trans. Commun. 2021, 69, 7736–7747. [Google Scholar] [CrossRef]
Figure 1. The STAR-RIS-aided system model.
Figure 1. The STAR-RIS-aided system model.
Mathematics 12 02259 g001
Figure 2. System sum rate versus the power budget.
Figure 2. System sum rate versus the power budget.
Mathematics 12 02259 g002
Figure 3. System sum rate versus number of elements.
Figure 3. System sum rate versus number of elements.
Mathematics 12 02259 g003
Figure 4. System sum rate versus number of antennas.
Figure 4. System sum rate versus number of antennas.
Mathematics 12 02259 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qian, B.; Qiao, J.; Zhang, C. STAR-RIS-Assisted Millimeter-Wave Secure Communication with Multiple Eavesdroppers. Mathematics 2024, 12, 2259. https://doi.org/10.3390/math12142259

AMA Style

Qian B, Qiao J, Zhang C. STAR-RIS-Assisted Millimeter-Wave Secure Communication with Multiple Eavesdroppers. Mathematics. 2024; 12(14):2259. https://doi.org/10.3390/math12142259

Chicago/Turabian Style

Qian, Binghui, Jingping Qiao, and Chuanting Zhang. 2024. "STAR-RIS-Assisted Millimeter-Wave Secure Communication with Multiple Eavesdroppers" Mathematics 12, no. 14: 2259. https://doi.org/10.3390/math12142259

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop