1. Introduction
The goal of 6G is to revolutionize wireless systems with more enhanced requirements, such as very high data rates, very low latency, always-on broadband global network coverage, and intelligence [
1]. To achieve these goals, several advanced wireless technologies, such as massive multiple-input and multiple-output (MIMO) transmission, cooperative communications, and cognitive radio, have been proposed. However, these techniques focus on processing signals to adapt to the wireless environment and are, in some ways, affected by the random and negative effects caused by the propagation environment. Recently, a reconfigurable intelligent surface (RIS) was introduced, and it has gained wide attention due to its ability to control the wireless environment. An RIS is a low-cost uniform array of passive reflecting elements where each element can adjust the amplitude and/or phase of any incident signal to make the propagation medium controllable. This characteristic can be exploited to constructively (or destructively) add different signals to enhance (or weaken) the overall signal received [
2,
3].
In effect, an RIS can be used to enhance the data rate and security, increase coverage, and improve the signal-to-noise ratio (SNR). There are existing RIS-related technologies, such as traditional reflecting surfaces [
4], amplify-and-forward (AF) relays [
5], and backscatter communication [
6,
7]. Compared to these techniques, an RIS has the following benefits. Firstly, the traditional reflecting surfaces have fixed phase shifts that cannot be changed, while the RIS is able to continuously change its phase shift. Secondly, while AF relays require a certain amount of power for signal propagation, an RIS passively reflects incident signals without any transmission power consumption. This makes RISs green and energy efficient. Thirdly, even though both RISs and backscatter communication implement the idea of passive communication, an RIS can be equipped with a large number of reflecting elements, while backscatter communication is usually equipped with few antennas due to cost and complexity limitations [
8]. These significant advantages have gained the attention of researchers. RISs have been applied in several communication scenarios, such as massive device-to-device communications, secure communications in wireless networks, and wireless information and power transfer, and they have achieved interesting results.
Additionally, RISs have been implemented to tackle physical-layer security (PLS) issues in wireless systems, which make up one of the main research areas in wireless communications. Wireless signals pose broadcasting characteristics during transmission. Hence, security is one of the major concerns in future 6G networks, and with the advent of quantum computing, eavesdroppers have been poised to pose huge threats to wireless systems [
9]. Several works integrating RISs and PLS have been introduced [
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24]. However, these studies considered an RIS-assisted system in which all reflecting/refracting elements were activated and employed in transmission (a so-called ‘regular RIS’). With a regular RIS, the system capacity can mainly be improved by increasing the total number of RIS elements [
10]. However, this leads to very high channel estimation and feedback overhead, as well as complex beam design. Further, most existing works assumed that the power consumption of an RIS element is negligible. However, with a large number of RIS elements, RIS power consumption could not be negligible. In this regard, the number of RIS elements cannot be too large in real-world systems. Accordingly, in [
25,
26,
27,
28], an irregular RIS (IRIS), which significantly improved the system capacity with the limited number of active RIS elements, was introduced. An IRIS guarantees relatively low channel feedback and estimation overhead and a lower power consumption. To the best of our knowledge, the application of the notion of the IRIS to secure communication has been less investigated and studied compared to security problems in regular RIS-assisted systems, as discussed. Accordingly, we tackled a physical-layer security problem in an IRIS environment. Our main contributions are summarized as follows:
We investigate a secure communication scenario in which, with the help of an IRIS, a multi-antenna base station wants to transmit data to a legitimate single-antenna receiver in the presence of a single-antenna eavesdropper. Our aim is to guarantee secrecy by designing an effective precoder at the BS and the reflecting beamformer via the phase shifters at the IRIS.
We formulate a secrecy rate maximization problem to jointly design the precoder at the BS and the reflection coefficients at the IRIS in order to maximize the secrecy rate for given constraints.
We then propose a Tabu-search-based algorithm that can design the topology and precoders for the IRIS to heuristically achieve the maximum performance by efficiently avoiding the local maximum issue for a given formulated non-convex optimization problem.
Finally, through simulations, we verify that exploiting an IRIS with a limited number of reflecting elements can significantly improve the secrecy rate compared to that achieved with a regular RIS.
The rest of this paper is outlined as follows.
Section 2 summarizes several related studies and compares them with our work. In
Section 3, we describe our system model, including the eavesdropping scenario. We formulate the optimization problem to maximize the secrecy rate between the transmitter and receiver while considering the IRIS in
Section 4. We discuss our proposed algorithm for solving the optimization problem in
Section 5. The simulation results are provided in
Section 6, and conclusions are finally drawn in
Section 7.
2. Related Works
RISs have become some of the essential candidates for 6G wireless communication systems due to their ability to control random wireless environments by manipulating their reflecting coefficients and their potential for various 6G applications. In this regard, extensive research has been conducted in which several RIS-aided secure communication scenarios have been considered. In [
10], Yang et al. assessed the secrecy performance by using the secrecy outage probability against eavesdropping threats in an RIS-aided single-input and single-output (SISO) environment. They showed that the secrecy rate increased with the number of reflecting elements on the RIS. Chu et al. [
11] considered an RIS-assisted multiple-input and single-output (MISO) wiretap environment, designed a power-efficient secure transmission scheme, and showed that the transmitter could use low power to meet secrecy requirements. In [
12], Dong et al. considered RIS-aided multi-input, multi-output, and multi-antenna eavesdropper (MIMOME) systems. The authors proposed an alternating-based algorithm to maximize the secrecy rate and showed that secrecy could be achieved in a non-line-of-sight environment when perfect channel state information (CSI) of the receiver and eavesdropper was available at the base station (BS) and the RIS, respectively. Sun et al. investigated an RIS-assisted and unmanned aerial vehicle (UAV)-secured network in which a single UAV BS transmitted data to a receiver in the presence of an eavesdropper [
13]. The authors proposed algorithms that maximized the secrecy rate by carefully designing the positioning of the UAV BS and the beamforming of the RIS.
The authors of [
8,
14] considered a scenario in which multiple legitimate users were attacked by multiple eavesdroppers. Specifically, in [
14], a novel deep-reinforcement-learning-based algorithm was designed to jointly optimize the beamforming at the BS and the RIS while considering different quality of service (QoS) requirements and time-varying channel conditions. Chen et al. [
8] investigated a downlink MISO broadcast system in which the BS transmitted an independent data stream to multiple legitimate receivers against multiple eavesdroppers. In particular, the authors considered a special case in which the receivers and the eavesdroppers were in the same direction as the transmitter, with a high correlation between the channels of the receivers and eavesdroppers. They also considered both continuous and discrete reflecting coefficients for the RIS’s elements. Then, they formulated an optimization problem to maximize the minimum secrecy rate. To this end, they proposed an algorithm based on a path-following algorithm to solve the non-convex problem. The authors of [
15] proposed a novel artificial noise (AN)-based jamming protocol via an RIS, which showed that AN could enhance the secrecy rate in RIS-aided networks. Dong et al. [
16] studied a more robust AN-aided transmission scheme that guaranteed secrecy performance without any knowledge of the eavesdropping CSI. To increase the flexibility of RIS deployment, the concept of the refracting RIS was introduced, where all incident signals could pass through the RIS’s surface, which could effectively reconstruct the channels for blocked users and significantly improve the system performance. In [
17], Lin et al. implemented a refracting RIS to improve the quality of service (QoS) in a blocked hybrid satellite–terrestrial relay network (HSTRN). The main goal was to minimize the total transmission power of the satellite and base station while satisfying the rate requirements of multiple users. Furthermore, Niu et al. [
18] focused on improving the secrecy rate among users by sending signals through an active refracting RIS-based transmitter and a passive reflecting RIS in the presence of multiple eavesdroppers. In this work, the authors proposed an optimization framework that considered jointly designed the power allocation, the transmission beamforming of the refractive RIS, and the phase shifts of the reflective RIS in order to maximize the weighted-sum secrecy rate. The authors of [
19] investigated a secure multibeam satellite system in which a satellite user in each beam was surrounded by an eavesdropper attempting to intercept confidential data. They proposed an alternating optimization scheme that maximized the secrecy energy efficiency under a transmission power constraint.
Xu et al. [
20] introduced a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS), a flexible RIS design that was able to reflect and transmit incident signals. Unlike a conventional RIS, which only reflects and requires users to be on the same side as the transmitter, the STAR-RIS had the ability to achieve
coverage. The authors showed that the STAR-RIS achieved a higher diversity order on both sides of the surfaces compared to that of a traditional RIS. Accordingly, the STAR-RIS was investigated further in many studies, including PLS-related studies [
21,
22,
23]. In [
21], Niu et al. considered a multiuser MISO STAR-RIS-aided secure communication in which energy-splitting, time-splitting, and mode-selection transmission protocols were investigated. In each instance, the authors maximized the weighted-sum secrecy rate by jointly optimizing the beamforming and the transmitting and reflecting coefficients of the STAR-RIS. In [
22], the authors focused on a STAR-RIS-assisted uplink-secure non-orthogonal multiple-access (NOMA) communication, where they considered both full and statistical eavesdropping CSI. Han et al. [
23] introduced AN into secure NOMA communication in STAR-RIS networks. The authors proposed an alternating optimization (AO)-based algorithm that derived the optimal AN model and the RIS parameters for maximizing the secrecy rate.
The concept of using a limited number of RIS elements (IRIS) was introduced by Su et al. in [
25]. In this work, an IRIS was implemented to improve the system capacity with a limited number of RIS elements. The main idea was to irregularly configure a given number of RIS elements on an enlarged surface. To this end, they formulated a topology and beamforming design problem to maximize the system capacity. The authors extended their work in [
26] by considering several communication scenarios involving time-varying channels, but they still focused on maximizing the system capacity. Chen reformulated the joint IRIS topology and beamforming design problem as an equivalent reflecting beamforming design problem in which the RIS element selection mechanism was embedded into the coefficient of each RIS element [
27]. Then, the author proposed a probability-learning algorithm to solve the formulated problem. The author of [
28] investigated the capacity maximization problem in an IRIS-aided multiuser MISO downlink system by jointly optimizing the phases of all RIS elements, the transmission beamforming at the base station, and the RIS topology. The author further considered activating only a small portion of elements in order to reduce the complexity and power consumption. In summary, IRIS-assisted systems have been investigated less than RIS-assisted systems. In addition, to the best of our knowledge, physical-layer security issues have not been investigated in detail while considering IRIS-assisted systems, although wireless security becomes more important than ever in 6G networks.
3. System Model
Figure 1 describes an existing regular RIS network and the considered irregular RIS network. For both, we consider three nodes in the network: a base station, a legitimate user (Bob), and an eavesdropper (Eve). The existing regular RIS-assisted system, in which a BS with
M antennas and a regular RIS with
elements transmit data to a receiver (i.e., Bob) in the presence of an eavesdropper, is shown in
Figure 1a. The regular RIS has all active reflecting elements arranged with a constant spacing on a regular surface. We consider an IRIS-assisted secure communication system.
Figure 1b shows an example of an irregular RIS with
N active elements selected out of
elements
. Let
denote the
matrix representing the topology of the RIS, where
. We define
as an indicator to represent the state of the
n-th reflecting element in the IRIS, where ‘1’ indicates the active state (i.e., the corresponding RIS element is activated) and ‘0’ is used otherwise.
The reflection coefficient matrix for
grid points of the IRIS is given by
where
and
represent the reflection amplitude and phase shift of the
n-th RIS element in the IRIS.
For practical hardware implementation, we assume a constant reflection amplitude and finite discrete phase-shift constraint at the RIS [
24]. Specifically,
,
, and
takes discrete values from the quantized phase-shift set given by
where
b is the number of bits used to quantize the finite discrete phase shifts.
The received signal at the legitimate receiver (i.e., Bob) is expressed as
where
x denotes the transmitted signal at the BS with the power constraint
,
indicates additive white Gaussian noise (AWGN) with zero mean and variance
,
is the channel coefficient matrix between the BS and RIS,
denotes the RIS–Bob channel coefficient vector, and
indicates the precoding vector.
Similarly, the received signal at the eavesdropper (i.e., Eve) is expressed as
where
indicates additive white Gaussian noise (AWGN) with zero mean and variance
and
.
Note that the precoding vector
in (
3) and (
4), the reflection coefficient matrix
, and the topology of the IRIS
(i.e., activation and inactivation pattern of the RIS elements) are our main design factors for maximizing the secrecy performance for the given system environment.
Thus, the secrecy rate of the IRIS-assisted secure communication is a function of
,
, and
, and it is given by
where
.
4. Problem Formulation for IRIS-Assisted Secure Communication
In this section, we introduce the problem formulation for IRIS-assisted secure communications. Note that the secrecy performance of the proposed IRIS-assisted system in (
5) is a function of the IRIS topology and precoding. Thus, the topology and precoding should be carefully designed. In the following, we formulate the secrecy rate maximization. Let
denote the fully digital precoder at the BS. The transmission power at the BS is
in (
6) should be lower than or equal to the maximum allowable transmission power
P. The secrecy rate maximization problem can be formulated as
where (
C1) denotes the transmission power constraint, (
C2) denotes discrete phase-shift constraint, and (
C3) and (
C4) denote the constraint for the topology of the irregular RIS activation, where there are
N ones (i.e., activation of the element) and
zeros (i.e., deactivation of the element) in the topology matrix
.
Note that the objective function in (12), the phase-shift constraint (
C2), and the IRIS topology constraints (
C3) and (
C4) are non-convex. Hence, directly solving (
P1) is a non-trivial task. To address this issue, we reformulate (
P1) for a given IRIS topology by separating the precoding design and the IRIS topology design. Then, for a particular topology
, the original problem (
P1) reduces to
where (
C1’) and (
C2’) denote the transmission power constraint and discrete phase-shift constraint, respectively, and (
C3’) denotes the given IRIS topology.
Note that irregular RIS-assisted systems can be considered as regular RIS-assisted systems by assuming that and . In other words, the activated elements in the irregular RIS are all assumed to be elements in the regular RIS. Fortunately, we can efficiently solve (P2) by using our proposed algorithm and can suboptimally solve (P1) for given IRIS topology candidates, which will be discussed in detail in the next section.
5. Proposed Algorithm for IRIS-Assisted Secure Communication
In this section, we introduce our proposed algorithm for solving (
P1). In order to efficiently solve (P1), we propose an adaptive algorithm based on the Tabu search algorithm [
29]. Tabu search is a metaheuristic searching algorithm that can efficiently avoid local minima (or maxima) for given optimization problems by exploiting diversification rules to drive the search into new regions of the searching space.
Figure 2 briefly illustrates the main idea of our proposed algorithm, and the details are summarized in Algorithm 1.
In Algorithm 1, for the given RIS elements, the RIS topology is irregularly initialized with a random selection of N active elements and inactive elements at line 2 (i.e., ). Note that we consider random topology initializations, and each initialization dynamically changes the active and inactive elements together. After the IRIS topology initialization at line 2, we consider minor topology changes for the given IRIS topology. For this, we randomly swap v ones for v zeros in the given at line 5. At line 5, denotes an instance of the IRIS topology at a given initialization and a given swap. We try these random swaps for times for the given . Unlike an initialization, has only minor changes compared with .
Note that (
P1) is reduced to (
P2) for a given
. We solve (
P2) by using
K samples of
at line 7. The effective channels for all candidates are calculated at line 8. At lines 9 and 10, the maximum ratio of transmission precoding is assumed, and the secrecy rates are calculated for all
K samples. We then select the candidate with the maximum secrecy rate (
) and compare
with
, which is updated at every iteration in the second for-loop after the initialization. After the second for-loop, we update the topology set
T to avoid duplication. Finally, we select the best topology in the topology list with the maximum secrecy rate and use this one for the IRIS operation.
Algorithm 1 Adaptive IRIS Operation for Secrecy Enhancement |
Require:, number of iterations and , number of samples K, swap value v, phase-shift set , topology set |
Ensure: RIS Topology |
- 1:
fordo - 2:
Initialize the RIS topology by randomly selecting N ones and zeros: - 3:
Initialize - 4:
for do - 5:
Randomly swap v ones for v zeros among the diagonal elements of : - 6:
/* We are ready to solve (P2) for the given */ - 7:
Randomly generate K samples - 8:
Calculate the effective channel for Bob and Eve - 9:
Calculate the precoder’s coefficients - 10:
Calculate the secrecy rate - 11:
- 12:
if then - 13:
- 14:
- 15:
end if - 16:
end for - 17:
Set , , - 18:
Add with in /* */ - 19:
end for - 20:
for - 21:
Return
|
Computational Complexity Analysis
It is important to discuss the computational complexity when we consider non-convex optimizations such as (P1). By using the proposed Algorithm 1, we can find the best IRIS topology for the given parameters.
We solve (
P1) by considering sub-problem (
P2), and solving (
P2) requires
computations. We repeat this to solve (
P2) for
IRIS topology candidates. Thus, it requires an approximate total of
computations to solve (
P1). Practically, it is important to analyze the complexity based on the number of RIS elements
, since the size of the RIS is a critical issue for system performance and deployment. Our proposed algorithm can provide constant computational complexity
in the best case when we set
,
,
K, and
N to be independent of
, where
represents big
notation for computational complexity analysis [
30]. However, it is worth noting that the computational complexity can be
in the worst case if we consider all of the possible topology candidates (i.e.,
).
Remark 1. Note that our proposed algorithm is designed based on Tabu search, a metaheuristic searching algorithm that is commonly used to solve non-convex optimizations [29]. In the proposed algorithm, we exploit the diversification to explore a new searching space and, thus, heuristically approach the suboptimum by avoiding local maxima. Our algorithm searches possible RIS topologies and swap cases. Thus, for a given topology and a swap case, we have candidates in each iteration. Therefore, the total number of candidates in our proposed algorithm is , and it can be set by manually adjusting and . The proposed algorithm reaches an exponential computational complexity in the worst case, but usually, we can achieve better performance compared with that of a regular RIS, even for constant values of and and a small value for N. Thus, the proposed algorithm can even be applicable to the hundreds of reflecting elements in an RIS, since we only activate a limited number of reflecting elements in the RIS. Further, the proposed algorithm requires less computation and power consumption during channel estimation and overall operation, respectively, compared to an RIS. 7. Conclusions
In this paper, we investigated guaranteeing secure communications by using an IRIS. The secrecy rate of traditional RIS systems is restricted by the number of elements in the RIS. Specifically, in order to increase the secrecy rate, the number of elements should be increased. However, this might not be practical. To tackle this issue, we analyzed an irregular RIS (i.e., IRIS) with a limited number of elements to enhance the secrecy performance. To this end, we formulated a secrecy rate maximization problem and proposed an optimization framework to solve it. Through simulations, we validated that an IRIS that used only a limited number of elements could sufficiently enhance the secrecy rate past that of a regular RIS. We observed that by using a lower number of reflecting elements that were randomly distributed on an RIS, we could achieve an extra degree of freedom, which could enhance the secrecy performance. For example, the secrecy rate of an irregular RIS increased by at a 40 dBm transmission power with eight transmission antennas. This was achievable with relatively low channel estimation and feedback overhead if we used the proposed algorithm. We also noticed that the number of active elements should be carefully selected during system design. Several open problems exist and are left for future work. For example, increasing the quantization bits, considering continuous phase shifts, and designing MAC layer protocols for IRIS-assisted secure communication systems can be some of the possible future research directions.