skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Secure Outage Analysis for RIS-Aided MISO Systems with Randomly Located Eavesdroppers
In this paper, we consider the physical layer security of an RIS-assisted multiple-antenna communication system with randomly located eavesdroppers. The exact distributions of the received signal-to-noise-ratios (SNRs) at the legitimate user and the eavesdroppers located according to a Poisson point process (PPP) are derived, and a closed-form expression for the secrecy outage probability (SOP) is obtained. It is revealed that the secrecy performance is mainly affected by the number of RIS reflecting elements, and the impact of the transmit antennas and transmit power at the base station is marginal. In addition, when the locations of the randomly located eavesdroppers are unknown, deploying the RIS closer to the legitimate user rather than to the base station is shown to be more efficient. We also perform an analytical study demonstrating that the secrecy diversity order depends on the path loss exponent of the RIS-to-ground links. Finally, numerical simulations are conducted to verify the accuracy of these theoretical observations.  more » « less
Award ID(s):
2107182 2030029
PAR ID:
10517895
Author(s) / Creator(s):
; ; ; ; ; ;
Publisher / Repository:
IEEE
Date Published:
Journal Name:
Proc. IEEE Globecom Workshops (GC Wkshps)
ISBN:
979-8-3503-7021-8
Page Range / eLocation ID:
1445 to 1450
Format(s):
Medium: X
Location:
Kuala Lumpur, Malaysia
Sponsoring Org:
National Science Foundation
More Like this
  1. Reconfigurable intelligent surface (RIS) technology is emerging as a promising technique for performance enhancement for next-generation wireless networks. This paper investigates the physical layer security of an RIS-assisted multiple-antenna communication system in the presence of random spatially distributed eavesdroppers. The RIS-to-ground channels are assumed to experience Rician fading. Using stochastic geometry, exact distributions of the received signal-to-noise-ratios (SNRs) at the legitimate user and the eavesdroppers located according to a Poisson point process (PPP) are derived, and closed-form expressions for the secrecy outage probability (SOP) and the ergodic secrecy capacity (ESC) are obtained to provide insightful guidelines for system design. First, the secrecy diversity order is obtained as 2α2 , where α2 denotes the path loss exponent of the RIS-to-ground links. Then, it is revealed that the secrecy performance is mainly affected by the number of RIS reflecting elements, N, and the impact of the number of transmit antennas and transmit power at the base station is marginal. In addition, when the locations of the randomly located eavesdroppers are unknown, deploying the RIS closer to the legitimate user rather than to the base station is shown to be more efficient. Moreover, it is also found that the density of randomly located eavesdroppers, λe , has an additive effect on the asymptotic ESC performance given by log2(1/λe) . Finally, numerical simulations are conducted to verify the accuracy of these theoretical observations. 
    more » « less
  2. null (Ed.)
    Recently, there has been a flurry of research on the use of Reconfigurable Intelligent Surfaces (RIS) in wireless networks to create dynamic radio environments. In this paper, we investigate the use of an RIS panel to improve bi-directional communications. Assuming that the RIS will be located on the facade of a building, we propose to connect it to a solar panel that harvests energy to be used to power the RIS panel’s smart controller and reflecting elements. Therefore, we present a novel framework to optimally decide the transmit power of each user and the number of elements that will be used to reflect the signal of any two communicating pair in the system (user-user or base station-user). An optimization problem is formulated to jointly minimize a scalarized function of the energy of the communicating pair and the RIS panel and to find the optimal number of reflecting elements used by each user. Although the formulated problem is a mixed-integer nonlinear problem, the optimal solution is found by linearizing the non-linear constraints. Besides, a more efficient close to the optimal solution is found using Bender decomposition. Simulation results show that the proposed model is capable of delivering the minimum rate of each user even if line-of-sight communication is not achievable. 
    more » « less
  3. In this paper, we investigate the potential of employing reconfigurable intelligent surface (RIS) in integrated sensing and communication (ISAC) systems. In particular, we consider an RIS-assisted ISAC system in which a multi-antenna base station (BS) simultaneously performs multi-user multi-input single-output (MU-MISO) communication and target detection. We aim to jointly design the transmit beamforming and receive filter of the BS, and the reflection coefficients of the RIS to maximize the sum-rate of the communication users, while satisfying a worst-case radar output signal-to-noise ratio (SNR), the transmit power constraint, and the unit modulus property of the reflecting coefficients. An efficient iterative algorithm based on fractional programming (FP), majorization-minimization (MM), and alternative direction method of multipliers (ADMM) is developed to solve the complicated non-convex problem. Simulation results verify the advantage of the proposed RIS-assisted ISAC scheme and the effectiveness of the developed algorithm. 
    more » « less
  4. Non-orthogonal multiple access (NOMA) has become a promising technology for next-generation wireless communications systems due to its capability to provide access for multiple users on the same resource. In this paper, we consider an uplink power-domain NOMA system aided by a reconfigurable intelligent surface (RIS) in the presence of a jammer that aims to maximize its interference on the base station (BS) uplink receiver. We consider two kinds of RISs, a regular RIS whose elements can only change the phase of the incoming wave, and an RIS whose elements can also attenuate the incoming wave. Our aim is to minimize the total power transmitted by the user terminals under quality-of-service constraints by controlling both the propagation from the users and the jammer to the BS with help of the RIS. The resulting objective function and constraints are both non-linear and non-convex, so we address this problem using numerical optimization. Our numerical results show that the RIS can help to dramatically reduce the per user required transmit power in an interference-limited scenario. 
    more » « less
  5. Cooperative jamming is deemed as a promising physical layer based approach to secure wireless transmissions in the presence of eavesdroppers. In this paper, we investigate cooperative jamming in a two-tier 5G heterogeneous network (HetNet), where the macro base stations (MBSs) at the macrocell tier are equipped with large-scale antenna arrays to provide space diversity and the local base stations (LBSs) at the local cell tier adopt non-orthogonal multiple access (NOMA) to accommodate dense local users. In the presence of imperfect channel state information, we propose three robust secrecy transmission algorithms that can be applied to various scenarios with different security requirements. The first algorithm employs robust beamforming (RBA) that aims to optimize the secrecy rate of a marco user (MU) in a macrocell. The second algorithm provides robust power allocation (RPA) that can optimize the secrecy rate of a local user (LU) in a local cell. The third algorithm tackles a robust joint optimization (RJO) problem across tiers that seeks the maximum secrecy sum rate of a target MU and a target LU robustly. We employ convex optimization techniques to find feasible solutions to these highly non-convex problems. Numerical results demonstrate that the proposed algorithms are highly effective in improving the secrecy performance of a two-tier HetNet. 
    more » « less