scholarly journals Ergodic Secrecy Rate of RIS-Assisted Communication Systems in the Presence of Discrete Phase Shifts and Multiple Eavesdroppers

Author(s):  
Peng Xu ◽  
Gaojie Chen ◽  
Gaofeng Pan ◽  
Marco Di Renzo
Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 18
Author(s):  
João Praia ◽  
João Pedro Pavia ◽  
Nuno Souto ◽  
Marco Ribeiro

Terahertz (THz) band communications are considered a crucial technology to support future applications, such as ultra-high bit rate wireless local area networks, in the next generation of wireless communication systems. In this work, we consider an ultra-massive multiple-input multiple-output (UM-MIMO) THz communication system operating in a typical indoor scenario where the direct link between the transmitter and receiver is obstructed due to surrounding obstacles. To help establish communication, we assume the aid of a nearby reconfigurable intelligent surface (RIS) whose phase shifts can be adjusted. To configure the individual phase shifts of the RIS elements, we formulate the problem as a constrained achievable rate maximization. Due to the typical large dimensions of this optimization problem, we apply the accelerated proximal gradient (APG) method, which results in a low complexity algorithm that copes with the non-convex phase shift constraint through simple element-wise normalization. Our numerical results demonstrate the effectiveness of the proposed algorithm even when considering realistic discrete phase shifts’ quantization and imperfect channel knowledge. Furthermore, comparison against existing alternatives reveals improvements between 30% and 120% in terms of range, for a reference rate of 100 Gbps when using the proposed approach with only 81 RIS elements.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


2020 ◽  
Author(s):  
jie yang ◽  
Xinsheng Ji ◽  
Kaizhi Huang ◽  
Xiaoli Sun ◽  
Xiaoming Xu

Pilot spoofing attack brings challenges to the physical layer secure transmission. However, since the inherent characteristics of wireless environment have not changed, active eavesdropping can be detected based on prior information. Intelligent reflecting surface (IRS), with the real-time programmable characteristics for wireless environment, provides new possibilities for effective pilot spoofing. In this paper, the IRS is deployed near the legitimate users and the control strategy is embeded into the legitimate communication process under time-division duplex (TDD) mode to assist eavesdroppers to implement pilot spoofing. By designing different phase shifts at the IRS during the uplink phase and downlink phase, the channel reciprocity between uplink and downlink disappears, and thus the secure beamforming vector is biased towards the eavesdropper. Furthermore, in order to obtain more information, the average secrecy rate based on the statistical channel state information is established by carefully designing the phase shifts. The formulated problem is non-trivial to solve. By using alternating optimization and Charnes-Cooper transformation technique, the original problem is transformed into convex form and a sub-optimal solution is achieved. Finally, simulation results show that our proposed scheme poses serious secure threat for TDD systems.


2019 ◽  
Vol 68 (12) ◽  
pp. 12025-12039
Author(s):  
Ye Fan ◽  
Xuewen Liao ◽  
Zhenzhen Gao ◽  
Tong-Xing Zheng ◽  
Victor C. M. Leung

2021 ◽  
Author(s):  
jie yang ◽  
Xinsheng Ji ◽  
Feihu Wang ◽  
Kaizhi Huang ◽  
You Zhou

Pilot spoofing attack brings challenges to the physical layer secure transmission. However, since the inherent characteristics of wireless environment have not changed, active eavesdropping can be detected based on prior information. Intelligent reflecting surface (IRS), with the real-time programmable characteristics for wireless environment, provides new possibilities for effective pilot spoofing. In this paper, the IRS is deployed near the legitimate users and the control strategy is embeded into the legitimate communication process under time-division duplex (TDD) mode to assist eavesdroppers to implement pilot spoofing. By designing different phase shifts at the IRS during the uplink phase and downlink phase, the channel reciprocity between uplink and downlink disappears, and thus secure beamforming vector is biased towards the eavesdropper. Furthermore, in order to obtain more information, the average secrecy rate minimization based on statistical channel state information is established by carefully designing the phase shifts. The formulated problem is non-trivial to solve. By using alternating optimization and Charnes-Cooper transformation technique, the original problem is transformed into convex form and a sub-optimal solution is achieved. Finally, simulation results show that our proposed scheme poses serious secure threat without any energy footprint especially for TDD systems.


2014 ◽  
Vol 18 (1) ◽  
pp. 50-53 ◽  
Author(s):  
Minyan Pei ◽  
A. Lee Swindlehurst ◽  
Dongtang Ma ◽  
Jibo Wei

Sign in / Sign up

Export Citation Format

Share Document