ArticlePDF Available

On the Ergodic Secrecy Capacity of Intelligent Reflecting Surface Aided Wireless Powered Communication Systems

Authors:

Abstract and Figures

This letter studies physical layer security (PLS) of an intelligent reflecting surface (IRS) aided wireless powered communication (WPC) system in the presence of a passive eavesdropper, and proposes three secure IRS-WPC modes. In mode-I, the IRS is deployed between hybrid access point (HAP) and wireless user (U) for co-located power station (PS) and access point (AP). In mode-II, the IRS is deployed between AP and U for separate PS and AP, while in mode-III, the IRS is deployed between PS and U for separate PS and AP. For each mode, the optimal phase shift is designed to maximize the reception of energy and information at legitimate receiver. The accurate and asymptotic ergodic secrecy capacity (ESC) of each mode is analyzed, and various new closed-form expressions are obtained. The results reveal that mode-I and mode-II significantly outperform benchmark without IRS, while mode-III outperforms benchmark without IRS under lower transmission power or small number of IRS elements.
Content may be subject to copyright.
1
On the Ergodic Secrecy Capacity of Intelligent Reflecting
Surface Aided Wireless Powered Communication Systems
Kunrui Cao, Haiyang Ding, Wei Li, Lu Lv, Mei Gao, Fengkui Gong, and Buhong Wang
Abstract—This letter studies physical layer security (PLS) of
an intelligent reflecting surface (IRS) aided wireless powered
communication (WPC) system in the presence of a passive
eavesdropper, and proposes three secure IRS-WPC modes. In
mode-I, the IRS is deployed between hybrid access point (HAP)
and wireless user (U) for co-located power station (PS) and
access point (AP). In mode-II, the IRS is deployed between
AP and U for separate PS and AP, while in mode-III, the IRS
is deployed between PS and U for separate PS and AP. For
each mode, the optimal phase shift is designed to maximize the
reception of energy and information at legitimate receiver. The
accurate and asymptotic ergodic secrecy capacity (ESC) of each
mode is analyzed, and various new closed-form expressions are
obtained. The results reveal that mode-I and mode-II significantly
outperform benchmark without IRS, while mode-III outperforms
benchmark without IRS under lower transmission power or small
number of IRS elements.
Index Terms—Reconfigurable intelligent surface, wireless pow-
ered communication, physical layer security.
I. INTRODUCTION
The recent advance of microwave wireless power transfer
technology enables wireless powered communication (WPC)
systems to be built, which eliminates the need for frequent
manual battery replacement/recharging, and achieves higher
throughput, longer device lifetime and lower system oper-
ating cost than conventional battery-powered communication
systems. Meanwhile, intelligent reflecting surface (IRS), also
termed reconfigurable intelligent surface, is a novel technique
to create smart radio environments to improve the performance
of wireless communications and mitigate the negative effects
introduced by natural wireless propagation. Thanks to the
advantages of IRS in terms of improving the reception quality
of signals, applying IRS into WPC (i.e., IRS-WPC) has
recently drawn increasing attention [1]–[4].
On the other hand, due to the openness of wireless commu-
nications, the WPC systems are vulnerable to eavesdropping
attacks, which makes information security an important con-
cern. Physical layer security (PLS), from the perspective of
information theory, provides a secure information transmission
against eavesdropping attacks without keys or complicated
encryption/decryption algorithms. Particularly, IRS has a great
potential in improving the physical layer security of the
This work was supported in part by the National Natural Science Foundation
of China under Grants 62101560, 61871387 and 61901313, in part by the
Natural Science Basic Research Program of Shaanxi under Grant 2022JQ-
619, in part by the National University of Defense Technology Research Fund
under Grant ZK21-44, in part by the Open Research Fund of the State Key
Laboratory of ISN under Grant ISN23-04, and in part by the China Post-
doctoral Science Foundation under Grants BX20190264 and 2019M650258.
(Corresponding authors: Haiyang Ding; Buhong Wang)
Kunrui Cao, Haiyang Ding, Wei Li, and Mei Gao are with the School of In-
formation and Communications, National University of Defense Technology,
Wuhan 430035, China, and Kunrui Cao is also with the State Key Laboratory
of Integrated Services Networks, Xidian University, Xi’an 710071, China.
Lu Lv and Fengkui Gong are with the State Key Laboratory of Integrated
Services Networks, Xidian University, Xi’an 710071, China. Buhong Wang
is with the School of Information and Navigation, Air Force Engineering
University, Xi’an 710077, China.
systems as it can reconfigure the wireless channels of legit-
imate receivers and malicious eavesdroppers to enhance the
reception of legitimate receivers and weaken the reception of
eavesdroppers [5], which motivates the research on PLS of
IRS-WPC.
However, the investigation on PLS of IRS-WPC is in its
infancy currently [6], and there is still a major research gap in
the investigation of the IRS’s effects on the PLS of WPC. In
particular, in the presence of eavesdropping attacks, a secrecy
performance study for IRS-WPC system is not reported in the
literature yet, and the impacts of key system parameters on
ergodic secrecy capacity (ESC) of the system are still far from
being understood, which motivates this work. In this paper, we
focus on the PLS of a typical IRS-WPC system in the presence
of an eavesdropper, and analyze the accurate and asymptotic
ESC for the system to obtain valuable insights. Moreover, the
effects of key system parameters are revealed.
II. SY ST EM MO DE L
We consider a typical WPC system consisting of a power
station (PS), an access point (AP), a wireless device (U) and a
passive eavesdropper (E), where PS and AP can be co-located
or integrated as a hybrid AP (HAP). The energy-constrained
U harvests the radio frequency energy from HAP (or PS), and
then exploits the harvested energy to transmit the information
to HAP (or AP). As shown in Fig. 1, we propose three IRS-
WPC modes: 1) In mode-I, an IRS is deployed between HAP
and U for co-located PS and AP to enhance the communication
link between HAP and U; 2) In mode-II, an IRS is deployed
between U and AP for separate PS and AP to enhance the
communication link between U and AP; 3) In mode-III, an
IRS is deployed between PS and U for separate PS and AP
to enhance the communication link between PS and U. In the
above three modes, it is assumed that the IRS has Nlow-cost
reconfigurable reflecting elements and each element can reflect
a phase shifted version of the incident signal independently to
enhance the signal reception power at receivers. There is no
direct link between nodes with the aid of the IRS, due to
the obstacles, which motivates the deployment of an IRS to
establish reliable communication links. Particularly, E attempts
to intercept the wireless information from U.1
In mode-I, the channel vectors between HAP/U and IRS
are denoted by har and hur, respectively. In mode-II, the
denotations of the channel vectors between AP/U and IRS
are the same as mode-I, and the channel coefficient between
PS and U is denoted by hpu. In mode-III, the channel
vectors between PS/U and IRS are denoted by hpr and hur,
respectively, and the channel coefficient between U and AP is
denoted by hua. In the above three modes, the channel vector
and coefficient between IRS/U and E are denoted by hre and
hue, respectively. Each entry of har,hur ,hpr and hre, as well
1In addition to PLS, covert communication technique can provide stealth or
low probability fo detection for secure communications. Several recent studies
have exploited the IRS to facilitate covert communication, e.g., [7], [8].
2
Information transmission
Energy transfer
Eavesdropping link
Energy transfer Information transmission HAP
U
E
IRS PS U
E
AP PS U
E
AP
Mode-I Mode-II Mode-III
IRS IRS
Fig. 1: System model.
as hpu,hua and hue are assumed to be independent complex
Gaussian distribution with zero mean and unit variance.
A. Transmission Schemes
During a time frame T, the communication is accomplished
over two phases, i.e., energy transfer (ET) and information
transmission (IT) phases. Specifically, during the time θT (0<
θ < 1), the HAP (or PS) transfers wireless energy to U via IRS
in mode-I (or mode-III), while PS directly transfers wireless
energy to U in mode-II. Mathematically, the energy harvested
by U in each mode is expressed, respectively, as
HI=ηθT PshT
urΘ1har
2βaru,(1)
HII =η θT Psβpu|hpu|2,(2)
HII I =ηθT Psβpr u hT
urΘ3hpr
2,(3)
where Θ1= diag[eI ,1, ..., eI,N ]and Θ3=
diag[eI II,1, ..., ej φII I,N ]are N×Ndiagonal reflecting
matrices of IRS in mode-I and mode-III, respectively, ηis
the energy conversion efficiency, and Psis the transmission
power of HAP (or PS) at the ET phase. Furthermore,
βaru =GaGuS2
dτ
ardτ
ur is the path loss from HAP to U via the nth
element of IRS, where Gaand Guare the antenna gains of
HAP and U, respectively, Sis the size of each element, dar
and dur are the distances from HAP to IRS and from IRS
to U, and τis path loss exponent. Similarly, βpu =GpGu
dτ
pu is
the path loss from PS to U, Gpis the antenna gain of PS,
dpu is the distance from PS to U, βpru =GpGuS2
dτ
prdτ
ru is the path
loss from PS to U via IRS, and dpr and dru are the distances
from PS to IRS and from IRS to U, respectively.
In the remaining time (1θ)T, U uses the energy harvested
from ET phase to transmit its information to HAP (or AP) via
IRS in mode-I (or mode-II), while U uses the harvested energy
to directly transmit its information to AP in mode-III. In IT
phase, the transmission power of U in three modes can be
written as
PI
u=HI
(1 θ)T=PthT
urΘ1har
2βaru,(4)
PII
u=HII
(1 θ)T=Pt|hpu|2βpu ,(5)
PII I
u=HII I
(1 θ)T=PthT
urΘ3hpr
2βpru,(6)
where Pt=Psηθ
1θ. Then, the received signal at HAP (or AP)
in three modes can be given by
yI
a=qPI
uβaruhT
arΘ1hur s+na,(7)
yII
a=qPII
uβaruhT
arΘ2hur s+na,(8)
yII I
a=qPIII
uβuahua s+na,(9)
where Θ2= diag[eII,1, ..., eI I,N ],nais the additive white
Gaussian noise (AWGN) at HAP (or AP), sis the intended
signal, and βua =GuGa
dτ
ua . As a result, the signal-to-noise ratio
(SNR) of the received signal at HAP (or AP) in three modes
can be given by
SNRI
a=ρtβ2
aru hT
arΘ1hur
2hT
urΘ1har
2,(10)
SNRII
a=ρt|hpu|2hT
arΘ2hur
2βpuβaru ,(11)
SNRII I
a=ρthT
urΘ3hpr
2|hua|2βpru βua,(12)
where ρt=Pt
σ2and σ2is the variance of the AWGN.
On the other hand, the received signal at E in three modes
can be expressed as
yI
e=qPI
upβurehT
reΘ1hur +pβue hues+ne,(13)
yII
e=qPII
upβurehT
reΘ2hur +pβue hues+ne,(14)
yIII
e=qPIII
upβurehT
reΘ3hur +pβue hues+ne,(15)
where βure =GuGeS2
dτ
urdτ
re ,βue =GuGe
dτ
ue ,Geis the antenna gain
of E, dre and due are the distances from IRS to E and from
U to E, respectively, and neis the AWGN at E. As such,
the SNR of the received signal at E for three modes can be
respectively given by
SNRI
e=ρtβaru hT
urΘ1har
2pβurehT
reΘ1hur+pβuehue
2
,
(16)
SNRII
e=ρtβpu|hpu|2pβure hT
reΘ2hur +pβue hue
2
,(17)
SNRII I
e=ρtβpru hT
urΘ3hpr
2pβurehT
reΘ3hur+pβuehue
2
.
(18)
B. Optimal Phase Shift Designs
In this subsection, the inherent beamforming gain of IRS
is exploited to improve the communication quality of IRS-
WPC systems and simultaneously reduce the information
leakages from IRS to E. It is assumed that the channel state
information of all legitimate channels is known, which can
be obtained by using some channel estimation approaches in
IRS aided communication systems [1], [7]. But the channel
state information of E is unknown. Hence, the phase shifts at
the IRS are matched with the phases of legitimate channels
to maximize the harvested energy of U or (and) the reception
quality of AP (HAP) in three modes. It needs to be pointed
out that this letter focuses on continuous phase shifts, and the
design of discrete phase shifts [9] is left for our future work.
To be specific, the SNR to receive signal at HAP (or AP)
in three modes can be rewritten as
SNRI
a=ρtβ2
aru
N
X
n=1
har,nhur,nej φI,n
4
,(19)
3
SNRII
a=ρtβaruβpu |hpu|2
N
X
n=1
hur,nhar,nej φII,n
2
,(20)
SNRIII
a=ρtβpruβua |hua|2
N
X
n=1
hur,nhpr,nej φIII ,n
2
.(21)
To maximize the received SNR, the optimal phase shifts
φopt
I,n (or φopt
II ,n) should be perfectly matched with the phases
of har,n =|har,n|ehar,n and hur,n =|hur,n|ejφhur,n ,
i.e., φopt
I,n =φopt
II ,n =φhar,n +φhur,n, where φhar,n
and φhur,n are the phases of har,n and hur,n, respectively.2
Meanwhile, the optimal phase shifts φopt
II I,n should be designed
as φopt
II I,n =φhur,n +φhpr,n , where φhur,n and φhpr,n are
the phases of hur,n and hpr,n, respectively. With the optimal
phase shifts, the SNR at HAP (or AP) can be given by
SNRI
a=ρtβ2
aru N
X
n=1 |har,n||hur,n|!4
,(22)
SNRII
a=ρtβaruβpu |hpu|2 N
X
n=1 |hur,n||har,n|!2
,(23)
SNRIII
a=ρtβpruβua |hua|2 N
X
n=1 |hur,n||hpr,n|!2
.(24)
III. ERGODIC SEC RE CY CA PACITY ANA LYSIS
The ergodic secrecy capacity denotes the statistical aver-
age of the secrecy rate over fading channels, which can be
mathematically expressed as
Ei=Eh(1θ) log21+SNRi
a(1θ) log21 +SNRi
e+i,
(25)
where E[x]is the expectation of x,i {I, I I, I II }, and
{x}+= max{x, 0}.
A. Accurate Analysis
In order to derive the ESC of three modes, the statistics of
IRS cascaded channels with optimal phase shifts need to be
obtained first, which is given in the following lemma.
Lemma 1: The probability density function (PDF) of IRS
cascaded channel Z=PN
n=1 |har,n||hur,n|can be given by
fZ(z) = zv1
Γ(v)ϕvez
ϕ,(26)
where v= 2
16π2,ϕ=16π2
4π, and Γ(·)is the Gamma
function [10, Eq. (8.31)].
Proof: Generally, it is quite challenging to obtain an exact
PDF for Z. To overcome this difficulty, we use the Gamma
distribution to find a quite tight approximation for the PDF of
Z. In particular, by using [11, Lemma 1], it is concluded that
the product |har,n||hur,n|can be approximated as a Gamma
distribution with parameters π2
16π2and 16π2
4π. Then, a sum
of Nindependent and identically distributed Gamma random
variables still follows a Gamma distribution with parameters
2
16π2and 16π2
4π. After some variable transformation, fZ(z)
in (26) can be obtained.
2In this paper, the channel reciprocity of the uplink (UL) and downlink
(DL) is assumed, which means that the UL and DL have the same optimal
phase shifts of IRS in mode-I. In fact, the same phase shifts lead to lower
feedback overhead and the reduction of implementation complexity [2].
With the help of Lemma 1, the ESC of the proposed three
modes is given as follows.
Theorem 1: The ESC of mode-I is given by
EI=(π2(1 θ)
4KΓ(v) ln 2
K
X
k=1 q1ω2
ksec2uk Γv, 1
ϕ4
qtan uk
ρtβ2
aru
1 + tan uk
+(tan uk)v1
ϕvexp 1
ρtβaru(N βure +βue) tan2uk
tan uk
ϕEi1
ρtβaru(N βure +βue) tan2uk!)+
,(27)
where uk=π(ωk+1)
4,ωk= cos 2k1
2Kπ,Kis the accuracy
versus complexity parameter, Γ(·,·)is the upper incomplete
Gamma function [10, Eq. (8.35)], and Ei is the exponential
integral function [10, Eq. (8.211)].
Proof: See Appendix A.
Theorem 2: The ESC of mode-II is derived as
EII =(π2(1 θ)
4Kln 2
K
X
k=1 q1ω2
ksec2uk (tan uk)v1
Γ(v)ϕv
×exp 1
ρtβaruβpu tan2uktan uk
ϕEi 1
ρtβaruβpu tan2uk
+s4 tan uk
ρtβpu(N βur e +βue)
K1q4 tan uk
ρtβpu(N βure +βue)
1 + tan uk!)+
,
(28)
where K1(·)is the first order modified Bessel function of the
second kind [10, Eq. (8.432)], and the definitions of other
parameters are the same as (27).
Proof: See Appendix B.
Theorem 3: The ESC of mode-III is derived as
EII I =(π2(1 θ)
4Kln 2
K
X
k=1 q1ω2
ksec2uk
(tan uk)v1
Γ(v)ϕve
tan uk
ϕ
× e
1
ρtβpru(N βure
+βue) tan2ukEi 1
ρtβpru(N βure+βue) tan2uk
e
1
ρtβpruβua tan2ukEi 1
ρtβpruβua tan2uk!)+
.(29)
Proof: With the optimal phase shift design of Θ3, one can
obtain hurΘ3hpr =PN
n=1 |hur,n||hpr,n|, where the PDF of
PN
n=1 |hur,n||hpr,n|is the same as Zin Lemma 1. Following
similar steps in the proof of Theorem 1, and with the helps of
Gaussian-Chebyshev quadrature and [10, Eq. (3.352.4)], the
theorem can be proved.
B. Asymptotic Analysis
In the following, the asymptotic ESC is analyzed for three
modes to obtain more intuitive insights into the impacts of key
system parameters. Specifically, when the transmission power
at HAP/PS is sufficiently large, i.e., Ps , the asymptotic
ESC of three modes can be given as follows.
Proposition 1: The asymptotic ESC of mode-I can be
expressed as
EI
asy =1θ
ln 2 ln βaruϕ2
Nβure +βue
+2ψ(v)+C+
,(30)
4
where ψ(·)is the psi function [10, Eq. (8.36)] and C=
0.5772... is Euler’s constant [10, Eq. (8.367)].
Proof: By substituting (10) and (16) into (25), when
Ps , we have EI'En(1 θ) log2βaruZ2
Ye,1o+
, where
Ye,1=hT
reΘ1hur βure +hue βue
2. Then, by using [10,
Eq. (4.352.1)] and [10, Eq. (4.331.1)], Eq. (30) is obtained.
Proposition 2: The asymptotic ESC of mode-II EII
asy is the
same as EI
asy.
Proof: Similar to the analysis of (37), Ye,2=
hT
reΘ2hur βure +hue βue
2subjects to an exponential
random variable with parameter Nβure +βue. Then, following
similar steps in the proof of (30), the proposition can be
proved.
Proposition 3: The asymptotic ESC of mode-III can be
given by
EII I
asy =(1 θ) log2
βua
Nβure +βue +
.(31)
Proof: Following similar steps as in the proof of Propo-
sition 1, the proposition can be readily proved.
Corollary 1: When Ps and N , it is ob-
tained that EI=EII ' {(1 θ) log2N}+and EI II '
(1 θ) log2(N1)+.
Proof: We have ψ(v)ln v[10, Eq. (8.362.2)] when
v= . Hence, when N ,EI
asy in (30) can be further
expressed as
EI
asy '1θ
ln 2 (ln N1+ln N2)+
={(1θ) log2N}+.(32)
Owing to EII
asy =EI
asy, one can obtain EI I
asy ' {(1
θ) log2N}+when N . Following similar steps, EII I
asy '
{(1 θ) log2(N1)}+can be derived when N . The
proof is completed.
Remark 1: It is observed from these propositions that
the asymptotic ESC of three modes is independent of the
transmission power Ps, indicating that the ESC of each mode
converges to a performance floor with the increase of Ps. This
is due to the fact that in addition to improving the information
reception at the legitimate receiver, a higher transmission pow-
er is helpful to the information reception at the eavesdropper.
Remark 2: It is concluded from Corollary 1 that the ESC
of mode-I and mode-II can be continuously improved by
increasing the number of IRS elements N. This means that
when the performance floor of ESC appears under a high Ps,
the ESC of mode-I and mode-II is still improved by increasing
N, showing the effectiveness of IRS with optimal phase shift.
In particular, the asymptotic ESC of mode-III is deteriorated
as Nincreases. This is because the increased Nenhances the
link from U to E but not enhances the link from U to AP in
information transmission phase of mode-III.
IV. SIMULATION RESULTS AN D DISCUSSION
This section presents numerical results to verify the theoret-
ical analysis. Without loss of generality, we assume dua = 20
m, dpu = 20 m, dur =dar = 10 m, dpr =dur = 10 m,
due =dre = 30 m, τ= 2.7,T= 1,θ= 0.4,η= 0.8,
Gu=Ga=Gp=Ge= 10 dBi, S= 0.1 m2,σ2=58
dBm and K= 50. The traditional WPC without the aid of an
IRS is considered as a benchmark for comparison.
0 10 20 30 40 50 60
Ps (dBm)
0
0.5
1
1.5
2
2.5
3
3.5
4
Ergodic Secrecy Capacity (bps/Hz)
Mode-I
Mode-II
Mode-III
Benchmark without IRS
Asymptotic
Simulation
Fig. 2: The ESC versus Psfor different modes, where N= 32.
16 32 48 64 80 96 112 128 144 160 176
N
1
2
3
4
5
6
7
Ergodic Secrecy Capacity (bps/Hz)
Mode-I
Mode-II
Mode-III
Benchmark without IRS
Fig. 3: The ESC versus Nfor different modes, where Ps= 30 dBm.
Fig. 2 shows the ESC versus the transmission power of
HAP/PS Psfor different modes. It is seen that the derived
accurate expressions of ESC for three modes match well with
the simulation results, and the asymptotic ESC coincides with
the simulation results under high Ps, which demonstrates cor-
rectness of our ESC analysis. In particular, mode-I outperforms
mode-II with a low or moderate Ps, while mode-I and mode-II
achieve the same ESC floor with a high Ps. Moreover, both
mode-I and mode-II significantly outperform the benchmark
without the aid of IRS, indicating the superiority of the
IRS deployed over the information transmission link from
the perspective of enhancing ESC. And mode-III, deploying
the IRS to energy transfer link, outperforms the benchmark
without IRS under low and moderate Ps. But the increased
Psleads to more information leakage from the U-IRS-E link,
which makes the ESC in mode-III worse than that without IRS
under high Ps.
Fig. 3 shows the ESC versus the number of IRS elements N
based on different modes. It is observed that by increasing N,
the ESCs of mode-I and mode-II are continuously improved.
Note that the increased Nmakes the size and noise of IRS
larger in practice. The tradeoff between performance and cost
is an interesting investigation point, where Nis minimized
within an ESC constraint. In mode-III, the ESC is deteriorated
with the increase of N. This indicates that an IRS with optimal
phase shift should be deployed between U and HAP/AP, and
the beamforming gain of the IRS is helpful to the enhancement
of the ESC for IRS-WPC systems.
APPENDIX A
By using Jensen’s inequality (i.e., E[max{a, b}]
max{E[a],E[b]}), the ESC in (25) can be rewritten as
EI=En(1θ) log2(1 +SNRI
a)(1θ) log2(1 +SNRI
e)o+
nE[(1θ) log2(1 +SNRI
a)(1θ) log2(1 +SNRI
e)]o+
=nEI
aEI
eo+
,(33)
5
where EI
a=E[(1θ) log2(1+X1)],EI
e=E[(1θ) log2(1+
Y1)],X1= SNRI
a, and Y1= SNRI
e.
We first derive EI
ain (33), which can be written as
EI
a=Z
0
(1 θ) log2(1 + x1)fX1(x1)dx1
=1θ
ln 2 Z
0
1FX1(x1)
1 + x1
dx1.(34)
By substituting (22) into (34), and with the helps of Lemma
1 and [10, Eq. (3.381.3)], we have
1FX1(x1) = Pr ρtβ2
aruZ4> x1
=Z
4
rx1
ρtβ2
aru
zv1
Γ(v)ϕvez
ϕdz =
Γv, 1
ϕ4
qx1
ρtβ2
aru
Γ(v).(35)
After substituting (35) into (34), it is quite difficult to
obtain a closed-form expression for EI
a, and hence we apply
Gaussian-Chebyshev quadrature [7] to yield a close approxi-
mation. Specifically, by changing the variable of x1= tan uk,
EI
acan be further derived as
EI
a=1θ
Γ(v) ln 2 Z
0
Γv, 1
ϕ4
qx1
ρtβ2
aru
1 + x1
dx1
=π2(1 θ)
4KΓ(v) ln 2
K
X
k=1 q1ω2
ksec2uk
Γv, 1
ϕ4
qtan uk
ρtβ2
aru
1 + tan uk
.(36)
Similarly, we have
EI
e=1θ
ln 2 Z
0
1FY1(y1)
1 + y1
dy1
=1θ
ln 2 Z
0
Pr ρtβaruZ2Ye,1> y1
1 + y1
dy1,(37)
where Ye,1=hT
reΘ1hur βure +hue βue
2.
In order to derive EI
ein (37), we need to determine
the statistic of Ye,1. In particular, hT
reΘ1hur in Ye,1is the
sum of complex-valued random variables, and its real and
imaginary parts are correlated. Accordingly, we can take
hT
reΘ1hur as a complex Gaussian random distribution with
zero mean and variance of N. Based on this result, Ye,1=
hT
reΘ1hur βure +hue βue
2subjects to an exponential
random variable with parameter Nβure +βue. Hence, we have
Pr ρtβaruZ2Ye,1> y1=Z
0
FYe,1y1
ρtβaruz2fZ(z)dz
=Z
0
ey1
ρtβaru(N βure +βue)z2ez
ϕzv1
Γ(v)ϕvdz
=π2
4K
K
X
k=1 q1ω2
ksec2uk
(tan uk)v1
Γ(v)ϕvetan uk
ϕ
×ey1
ρtβaru(N βure +βue) tan2uk,(38)
where the last result in (38) is with the help of Gaussian-
Chebyshev quadrature. Substituting (38) into (37), and using
[10, Eq. (3.352.4)], we have
EI
e=π2(1 θ)
4Kln 2
K
X
k=1 q1ω2
ksec2uk
(tan uk)v1
Γ(v)ϕvetan uk
ϕ
×Z
0
ey1
ρtβaru(N βure +βue) tan2uk
1 + y1
dy1
=π2(1 θ)
4Kln 2
K
X
k=1 q1ω2
ksec2uk
(tan uk)v1
Γ(v)ϕvetan uk
ϕ
×e
1
ρtβaru(N βure +βue) tan2ukEi1
ρtβaru(N βur e+βue) tan2uk.
(39)
Substituting (36) and (39) into (33), the theorem is proved.
APPENDIX B
By using Jensen’s inequality, we have EII {EII
a
EII
e}+, where EII
a=E[(1 θ) log2(1 + SNRII
a)],EII
e=
E[(1 θ) log2(1 + SNRII
e)]. Similar to the derivation in
Theorem 1, with the helps of Gaussian-Chebyshev quadrature
and [10, Eq. (3.352.4)], EII
acan be derived as
EII
a=Z
0
(1 θ) log2(1 + x2)fX2(x2)dx2
=1θ
ln 2 Z
0
1FX2(x2)
1 + x2
dx2
=π2(1 θ)
4Kln 2
K
X
k=1 q1ω2
ksec2uk
(tan uk)v1
Γ(v)ϕvetan uk
ϕ
×Z
0
e
x2
ρtβaruβpu tan2uk
1 + x2
dx2
=π2(1 θ)
4Kln 2
K
X
k=1 q1ω2
ksec2uk
(tan uk)v1
Γ(v)ϕvetan uk
ϕ
×e
1
ρtβaruβpu tan2ukEi 1
ρtβaruβpu tan2uk,(40)
where X2= SNRII
ain (23).
Following similar steps in (37), and using [10, Eq. (3.324.1)]
and Gaussian-Chebyshev quadrature, we have
EII
e=1θ
ln 2 Z
0
1FY2(y2)
1 + y2
dy2
=1θ
ln 2 Z
0s4y2
ρtβpu(N βure+βue)
K1
q4y2
ρtβpu(N βure
+βue)
1 + y2
dy2
=π2(1 θ)
4Kln 2
K
X
k=1 q1ω2
ksec2uks4 tan uk
ρtβpu(N βure +βue )
×
K1q4 tan uk
ρtβpu(N βure +βue)
1 + tan uk
,(41)
where Y2= SNRII
ein (17).
Combining the results of EII
aand EII
e, the ESC of mode-II
in closed-form can be obtained. Hence, the proof is completed.
REFERENCES
[1] Q. Wu, X. Zhou, W. Chen, J. Li, and X. Zhang, “IRS-aided WPCNs: a new opti-
mization framework for dynamic IRS beamforming,” IEEE Trans. Wirel. Commun.,
vol. 21, no. 7, 4725–4739, Jul. 2022.
[2] Q. Wu, X. Zhou, and R. Schober, “IRS-assisted wireless powered NOMA: do we
really need different phase shifts in DL and UL?” IEEE Wirel. Commun. Lett., vol.
10, no. 7, 1493–1497, Jul. 2021.
[3] Z. Zhu, Z. Li, Z. Chu, G. Sun, W. Hao, P. Liu, and I. Lee, “Resource allocation
for intelligent reflecting surface assisted wireless powered IoT systems with power
splitting,” IEEE Trans. Wirel. Commun., vol. 21, no. 5, pp. 2987–2998, May 2022.
[4] Z. Chu, Z. Zhu, F. Zhou, M. Zhang, and N. Al-Dhahir, “Intelligent reflecting surface
assisted wireless powered sensor networks for Internet of Things,” IEEE Trans.
Commun.. vol. 69, no. 7, pp. 4877–4889, Jul. 2021.
[5] Z. Zhu, J. Xu, G. Sun, W. Hao, Z. Chu, C. Pan, and I. Lee, “Robust beamforming
design for IRS-aided secure SWIPT Terahertz systems with non-linear EH model”,
IEEE Wirel. Commun. Lett., vol. 11, no. 4, pp. 746–750, Apr. 2022.
[6] L. Zhai, Y. Zou, J. Zhu, and B. Li, “Improving physical layer security in IRS-
aided WPCN multicase systems via stackelberg game,” IEEE Trans. Commun., early
access, Jan. 2022.
[7] L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Covert communication
in intelligent reflecting surface-assisted NOMA systems: design, analysis, and
optimization,” IEEE Trans. Wirel. Commun., vol. 21, no. 3, 1735–1750, Mar. 2022.
[8] X. Zhou, S. Yan, Q. Wu, F. Shu, and D. W. K. Ng, “Intelligent reflecting surface
(IRS)-aided covert wireless communications with delay constraint,” IEEE Trans.
Wirel. Commun., vol. 21, no. 1, 532–547, Jan. 2022.
[9] Z. Sun, and Y. Jing, “On the performance of multi-antenna IRS-assisted NOMA
networks with continuous and discrete IRS phase shifting,” IEEE Trans. Wirel.
Commun., vol. 21, no. 5, 3012–3023, May 2022.
[10] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products. USA:
Academic Press, 2007.
[11] S. Atapattu, R. Fan, P. Dharmawansa, G. Wang, J. Evans, and T. A. Tsiftsis,
“Reconfigurable intelligent surface assisted two-way communications: Performance
analysis and optimization,” IEEE Trans. Commun., vol. 68, no. 10, pp. 6552–6567,
Oct. 2020.
... On the other side, the private permissioned network of blockchain is only used by individuals and enterprises to protect communication among others [4]. Generally, the network is not open to outsiders, and there is a certain degree of centralized control in terms of node identity verification and validation [5,6]. Whereas consortium chain means a collaborative feature with public permissionless and private permissioned structures that make the system able to restrict write-only and read-only transactions for the organization and other participating stakeholders [5]. ...
... Generally, the network is not open to outsiders, and there is a certain degree of centralized control in terms of node identity verification and validation [5,6]. Whereas consortium chain means a collaborative feature with public permissionless and private permissioned structures that make the system able to restrict write-only and read-only transactions for the organization and other participating stakeholders [5]. A multi-stream direction of consortium allows multi-companies and institutes to achieve substantial and strong integration. ...
... In the Small-medium enterprises (SMEs) environment, the role of a permissioned private network is envisioned to provide a closely protected chain environment with an access control layer infrastructure. This additional security layer only gives permission or authorization to those stakeholders who participate earlier/register to perform the transactional actions [5,6]. For Instance, a participating unit would need authorization from the expert of the SMEs network to become part of the chain. ...
Article
A private permissioned chain is typically considered a fully protected authorized blockchain. The concept of a permissioned chain has become better single-entity control operation over the network and allows entry only to selected nodes, which most probably supports different small-medium enterprises and government officials. It is one of the prominent features of blockchain technology that maintains transaction integrity and security throughout the deliverance. This paper initially highlights the benefits of a permissioned private chain. Present the current issues of the Proof-of-Elapsed Time consensus mechanism for the distributed applicational environment. In order to make blockchain systems more adaptive for private chains, this paper proposes a middleware lightweight consensus based on PoET, named "B-LPoET". Objecting to being improved as a lightweight PoET from the predefined PoET in terms of verifying transactions and creating more blocks, to decide the mining right, and participants allows to acknowledge their identities before joining. The design of B-LPoET reduces the cost of multi-node efficiency by establishing a lightweight topology for selecting and waiting time of winning node using multi-threading, which affects positively by increasing systems scalability. The experimental results of the B-LPoET illustrate that it performs better as compared with the existing PoET and other state-of-the-art consensus.
... This can easily lead to locally optimal clustering, which will affect the entire network. An energy-aware multi-hop routing (EAMR) method is proposed in [69]. During the setup phase, a permanent cluster is created by selecting the initial cluster leader, selecting the first relay nodes, and determining the cluster membership of the remaining sensor nodes. ...
Article
Full-text available
Wireless communications have lately experienced substantial exploitation because they provide a lot of flexibility for data delivery. It provides connection and mobility by using air as a medium. Wireless sensor networks (WSN) are now the most popular wireless technologies. They need a communication infrastructure that is both energy and computationally efficient, which is made feasible by developing the best communication protocol algorithms. The internet of things (IoT) paradigm is anticipated to be heavily reliant on a networking architecture that is currently in development and dubbed software-defined WSN. Energy-efficient routing design is a key objective for WSNs. Cluster routing is one of the most commonly used routing techniques for extending network life. This research proposes a novel approach for increasing the energy effectiveness and longevity of software-defined WSNs. The major goal is to reduce the energy consumption of the cluster routing protocol using the firefly algorithm and high-efficiency entropy. According to the findings of the simulation, the suggested method outperforms existing algorithms in terms of system performance under various operating conditions. The number of alive nodes determined by the proposed algorithm is about 42.06% higher than Distributed Energy-Efficient Clustering with firefly algorithm (DEEC-FA) and 13.95% higher than Improved Firefly Clustering IFCEER and 12.05% higher than another referenced algorithm.
... One such challenge is the inherent limitation of processing power and memory in edge devices, which can hinder their ability to handle large volumes of data or connect to multiple clusters simultaneously. Additionally, security emerges as a critical concern to prevent unauthorized access [24]. ...
Article
Full-text available
In the realm of the Internet of Things (IoT), the significance of edge devices within multi-cluster communication systems is on the rise. As the quantity of clusters and devices associated with each cluster grows, challenges related to resource optimization emerge. To address these concerns and enhance resource utilization, it is imperative to devise efficient strategies for resource allocation to specific clusters. These strategies encompass the implementation of load-balancing algorithms, dynamic scheduling, and virtualization techniques that generate logical instances of resources within the clusters. Moreover, the implementation of data management techniques is essential to facilitate effective data sharing among clusters. These strategies collectively minimize resource waste, enabling the streamlined management of networking and data resources in a multi-cluster communication system. This paper introduces an energy-efficient resource allocation technique tailored for edge devices in such systems. The proposed strategy leverages a higher-level meta-cluster heuristic to construct an optimization model, aiming to enhance the resource utilization of individual edge nodes. Emphasizing energy consumption and resource optimization while meeting latency requirements, the model employs a graph-based node selection method to assign high-load nodes to optimal clusters. To ensure fairness, resource allocation collaborates with resource descriptions and Quality of Service (QoS) metrics to tailor resource distribution. Additionally, the proposed strategy dynamically updates its parameter settings to adapt to various scenarios. The simulations confirm the superiority of the proposed strategy in different aspects.
... Researchers can gain a deeper understanding of the dynamics and drivers of global innovation networks [41,42]. This evaluation would assess the impact of different factors on the ergodic secrecy capacity and provide insights into system design and optimisation [43,44]. This may involve decision-making algorithms, automation rules, or machine learning models to optimise service allocation, resource utilisation, and response strategies in real time [45,46]. ...
Article
Full-text available
The smart applications development worldwide demands for ultra-reliable data communication to assure the richness of data and processing in time. These smart applications create massive amounts of data to be processed in 6G networks with advanced technologies. 6G big data analytics become the demand for next-generation data communication and smart city applications. Traditional data analytics algorithms lag in efficiency while processing big data due to huge volume, data dependency and timely processing. A deep learning model called reinforcement learning is promising for processing big data in smart applications. The proposed study, advanced big data Analytics using Deep learning (ABDAS-DL), gives a pioneering approach that combines Deep Reinforcement learning (DRL) based Deep Q network (DQN) with long-term, short-term memory (LSTM) for harnessing the vast capacity of 6G connectivity within the domain of advanced big data analytics. This study utilises smart transport-based data for taxi route optimisation by analysing climatic and surrounding factors. The look of 6G connectivity guarantees incredible facts of data transmission speeds and tremendously low latency, taking off new horizons for managing large datasets in real time. The performance of the proposed model is measured in terms of processing time, network, reliability and scalability. The proposed model takes 30 s to process the data and fix the taxi route, while another traditional model consumes more than an hour.
... The study likely provides empirical evidence or case studies demonstrating how 5G technology influences manufacturing enterprises, leveraging its high speed, low latency, and large capacity [34,35]. Contextual factors such as environmental conditions, user preferences, and device statuses play a crucial role in decision-making [36,37]. ...
Article
Full-text available
The proposed architecture for the 6G Edge of Things (EoT) system integrates two distinct networks: the EoT network and the digital twin (DT) network. The EoT network consists of interconnected smart devices and sensors organized into layers of things, edges, and clouds. Edge computing nodes facilitate low-latency services, emergency responses, and real-time decision-making, while the central cloud layer manages resource-intensive tasks. The DT network creates a digital replica of the EoT network’s edge layer, enabling real-time analysis and synchronization for enhanced security. A smart attack detection system is outlined, employing yang models for data representation, machine learning algorithms for threat detection, and an online learning module for continuous improvement. The system’s robustness is evaluated through performance metrics and comparisons with alternative methods, demonstrating superior efficacy in detecting and mitigating various attacks. The proposed solution, empowered by digital twin technology, offers proactive cybersecurity measures to fortify 6G EoT networks against evolving threats, showcasing its potential to enhance network security and incident response times while adapting to dynamic operational environments.
... In addition, in the event of a nondestructive earthquake, there will be such phenomena as an increase in communication volume at the epicenter and location changes due to the flow of people avoiding the disaster. The change and distribution of mobile communication big data play an indicative role in estimating the extent of devastation in the first instances [3]. After the Wenchuan earthquake in 2008, communication facilities in the disaster area were severely damaged, and many mobile base stations stopped service, resulting in communication outages in the areas where these stations are located. ...
Article
Full-text available
Smartphone location data provide the most direct field disaster distribution data with low cost and high coverage. The large-scale continuous sampling of mobile device location data provides a new way to estimate the distribution of disasters with high temporal–spatial resolution. On September 5, 2022, a magnitude 6.8 earthquake struck Luding County, Sichuan Province, China. We quantitatively analyzed the Ms 6.8 earthquake from both temporal and geographic dimensions by combining 1,806,100 smartphone location records and 4,856 spatial grid locations collected through communication big data with the smartphone data under 24-hour continuous positioning. In this study, the deviation of multidimensional mobile terminal location data is estimated, and a methodology to estimate the distribution of out-of-service communication base stations in the disaster area by excluding micro error data users is explored. Finally, the mathematical relationship between the seismic intensity and the corresponding out-of-service rate of communication base stations is established, which provides a new technical concept and means for the rapid assessment of post-earthquake disaster distribution.
... However, IRS technology can be expensive, particularly in large-scale deployments where numerous reflective elements are required. This cost may pose a barrier to widespread adoption, especially for smaller operators or in resource-constrained environments [9][10][11]. In [12] authors presented an IMS-based pattern and beam reconfigurable antenna designed for diverse IoT applications, including V2X communication and 5G Small Cell deployment, both indoors and outdoors. ...
Article
Full-text available
This study presents a planar dual-band multiple-input multiple-output (MIMO) antenna design for the prospective fifth-generation (5G) frequency bands of 28 and 38 GHz. The antenna element is designed by utilizing a rectangular patch with an offset microstrip feeding technique. A dual-band response is achieved by placing semi-circular slots on each side of the patch element. To tune the frequency response and improve impedance matching, vertical rectangular slits are etched in the rectangular patch and the ground plane, respectively. The results show that the single antenna element offers an impedance bandwidth of 2.52 GHz (26.32–28.84 GHz) and 7.5 GHz (34–41.5 GHz). In addition, a MIMO configuration based on pattern diversity using four antenna elements is designed and fabricated. The designed MIMO configuration achieves an impedance bandwidth of 3 GHz (27–30 GHz) and 5.46 GHz (35.54–41 GHz) at operating bands of 28 and 38 GHz. The peak realized gain for the single element at 28 and 38 GHz is noted to be 7.4 dBi and 7.5 dBi, respectively. Furthermore, the polarization diversity configuration illustrates an isolation of > 15 dB and > 25 dB for the 28 and 38 GHz frequency bands, respectively. Moreover, the MIMO configuration attains appropriate values for the envelope correlation coefficient (ECC) and diversity gain (DG), Total Active Reflection Co-efficient (TARC), Channel Capacity Loss (CCL) and Mean Effective Gain (MEG) for the operating frequency bands. The proposed MIMO system based on results seems to be potential choice for mmwave Ka Band Applications.
Article
Full-text available
The adoption of wireless charging for Electric Vehicles (EVs) is on the rise, promising enhanced user convenience. Concurrently, there is a pressing need for increased integration of renewable energy into the transportation sector to mitigate greenhouse gas emissions. However, wireless charging systems face challenges such as power transfer fluctuations under load and variations in coupling coefficients. This research introduces a novel solution: a Photovoltaic (PV)-integrated hybrid-compensated wireless charging system tailored for EV applications. The study addresses critical hurdles in achieving optimal efficiency and power delivery while accommodating significant misalignments inherent in Wireless Power Transfer (WPT) systems, particularly beneficial for EV charging. Compared to conventional compensation WPT systems, the proposed hybrid compensation approach significantly enhances transfer efficiency and reduces system current stress. The paper proposes the utilization of S-LCC/SP-compensated constant current (CC) and constant voltage (CV) system for PV-integrated static WPT systems. Experimental validation of the proposed system is conducted on a 3.3-kW laboratory-scale prototype. The findings demonstrate consistent power transfer across a 100–200 mm air gap, maintaining an efficiency of 91.3%. These results confirm the effectiveness of the proposed system in real-world applications.
Article
Full-text available
The intelligent internet of things (IoT) will become more valuable with introduction of 6G communication network, which is a sixth-sense next-generation communication network. It is certain that these two technologies will merge, opening the door for 6G wireless networks and the intelligent IoT. Ambient backscatter networks with machine learning (ML) capabilities have several applications, such as smart farming, industrial automation, and healthcare networks. Humans must provide for their own healthcare in order to thrive. A wide spectrum of disorders affecting heart as well as blood arteries are together referred to as cardiovascular disease. Novel optoelectronic materials have potential to revolutionise ongoing green shift by increasing efficiency of photovoltaic (PV) devices as well as decreasing energy consumption of devices such as LEDs as well as sensors. Both organic semiconductors, perovskites are the leading potential materials for these applications. This study suggests a unique method for detecting cardiovascular illness based on an investigation of blood artery blockages using machine learning algorithms with optoelectronic sensor analysis. Here, noise is removed from the input cardiac pictures, and the images are smoothed and normalised. The analysis of the blood artery obstruction in the right and left ventricles follows the processing of this picture. Utilising quantum dot-based Hopfield neural networks and convolutional ResNet gradient learning, the blood vessels are studied for the purpose of detecting cardiovascular illness. Different cardiac pictures are subjected to experimental investigation in terms of training accuracy, ROC, Precision, and recall. Proposed technique attained training accuracy of 98%, ROC of 86%, precision of 98%, recall of 67%.
Article
Full-text available
This paper proposes a new transmission policy for intelligent reflecting surface (IRS) empowered wireless powered internet of things systems. Particularly, an energy station (ES) wirelessly charges for multiple IoT devices during downlink wireless energy transfer (WET) and then these devices deliver their own message to an access point (AP) during uplink wireless information transfer (WIT). Also, an IRS is deployed to improve energy harvesting and data transmission capabilities. To enhance self-sustainability of the IRS, the IRS harvests energy from the ES based on the harvest-then-transmit protocol. In this paper, we maximize the sum throughput via optimizing the phase shifts of the IRS, the transfer time scheduling as well as the power splitting ratio. Due to the non-convexity of the formulated problem, we divide the problem into two sub-problems, each of which can be handled separately. Then, we adopt an alternating optimization (AO) algorithm with the semidefinite programming (SDP) relaxation. Also, we consider a special case where the circuit power consumption of IoT devices can be neglected. In this case, we derive a closed form solution for the optimal transmission time slots, power allocation and phase shift by the Lagrange dual method. Finally, numerical evaluations validate effectiveness of the proposed scheme, which significantly benefits from the IRS in improving network throughput.
Article
Full-text available
In this paper, we investigate covert communication in an intelligent reflecting surface (IRS)-assisted non-orthogonal multiple access (NOMA) system, where a legitimate transmitter (Alice) applies NOMA for downlink and uplink transmissions with a covert user (Bob) and a public user (Roy) aided by an IRS. Specifically, we propose new IRS-assisted downlink and uplink NOMA schemes to hide the existence of Bob’s covert transmission from a warden (Willie), which cost-effectively exploits the phase-shift uncertainty of the IRS and the non-orthogonal signal transmission of Roy as the cover medium without requiring additional uncertainty sources. Assuming the worst-case covert communication scenario where Willie can optimally adjust the detection threshold for his detector, we derive an analytical expression for the minimum average detection error probability of Willie achieved by each of the proposed schemes. To further enhance the covert communication performance, we propose to maximize the covert rates of Bob by jointly optimizing the transmit power and the IRS reflect beamforming, subject to given requirements on the covertness against Willie and the quality-of-service at Roy. Simulation results demonstrate the covertness advantage of the proposed schemes and confirm the accuracy of the derived analytical results. Interestingly, it is found that covert communication is impossible without using IRS or NOMA for the considered setup while the proposed schemes can always guarantee positive covert rates.
Article
Full-text available
This paper studies an intelligent reflecting surface (IRS) aided wireless powered sensor network (WPSN). Specifically, a power station (PS) provides wireless energy to multiple internet of thing (IoT) devices which supports them to deliver their own messages to an access point (AP). Moreover, we deploy an IRS to enhance the performance of the WPSN by intelligently adjusting the phase shift of each reflecting element. To evaluate the performance of the IRS assisted WPSN, we maximize its sum throughput to jointly optimize the phase shift matrices and the transmission time allocations. Due to the non-convexity of the formulated optimization problem, we first derive the optimal phase shifts of the wireless information transfer (WIT) in closed-form. Consequently, a semi-definite programming (SDP) relaxed approach is considered to jointly design the phase shift matrix of the wireless energy transfer (WET) and the transmission time allocations. In addition, we propose a low complexity scheme to gain insights and reduce the computational complexity incurred by the SDP relaxed scheme. Specifically, the optimal solutions of the phase shifts and the transmission time allocation are derived in closed-form by the Majorization-Minimization (MM) algorithm, the Lagrange dual method and the Karush-Kuhn-Tucker (KKT) conditions. Finally, numerical results are presented to validate the proposed schemes and confirm the beneficial role of the IRS in comparison to the benchmark schemes, where the proposed IRS assisted scheme achieves almost 100 % higher sum throughput, in comparison to the counterpart without IRS.
Article
This paper investigates an intelligent reflecting surface (IRS) aided secure wireless powered communication network (WPCN), where a transmitter first harvests energy from a power station (PS), and then uses the collected energy to transmit information to multiple internet of things (IoT) devices in the form of multicast in the presence of multiple eavesdroppers. An IRS is deployed to enhance the efficiency of wireless energy transfer (WET) and secure wireless information transfer (WIT). Considering that the PS and transmitter belong to different service providers, we model this energy interaction through a Stackelberg game and propose an IRS-aided energy trading and secure communication (IRS-ETSC) scheme, in which the transmitter needs to pay an energy price as an incentive for the PS energy service. Specifically, the transmitter as the leader can control the energy price, WET time, two-stage phase shifts, and beamforming vector, while the PS as the follower can adjust the transmit power. To solve the non-convex leader game problem, we propose a two-step approach to decompose the original problem into two subproblems. The first subproblem can be solved independently by an efficient alternating optimization (AO) based algorithm, in which the closed-form optimal beamforming vector and energy phase shifts are alternately optimized. Then, the second subproblem is relaxed by semidefinite relaxation (SDR) and solved by an iterative algorithm based on block coordinate descent (BCD), where the optimal energy price, optimal WET time, and suboptimal information phase shifts can be obtained by golden section method and successive convex approximation (SCA) respectively. Both subproblems can converge to a stationary point. Numerical results show that compared with the traditional non-IRS scheme, the proposed IRS-ETSC scheme achieves utility improvement for both the PS and transmitter.
Article
In this letter, we study intelligent reflecting surface (IRS) aided simultaneous wireless information and power transfer (SWIPT) terahertz secure systems under a non-linear energy harvesting (EH) model. Assuming that the cascaded channel state information is imperfect, we propose a robust beamforming design to minimize the total transmit power by jointly optimizing the transmit beamforming and phase shifts of IRS subject to the outage rate probability constraints. We first transform the outage constraints into deterministic forms by using the Bernstein-type inequality. Then, we applying semidefinite programming to change the original non-convex problem into an equivalent convex problem, and develope an alternate iterative optimization algorithm to obtain a feasible solution of the original problem. Finally, simulation results validate the effectiveness of our proposed scheme.
Article
In this paper, we propose a new dynamic IRS beamforming framework to boost the sum throughput of an intelligent reflecting surface (IRS) aided wireless powered communication network (WPCN). Specifically, the IRS phase-shift vectors across time and resource allocation are jointly optimized to enhance the efficiencies of both downlink wireless power transfer (DL WPT) and uplink wireless information transmission (UL WIT) between a hybrid access point (HAP) and multiple wirelessly powered devices. To this end, we first study three special cases of the dynamic IRS beamforming, namely user-adaptive IRS beamforming, UL-adaptive IRS beamforming, and static IRS beamforming , by characterizing their optimal performance relationships and proposing corresponding algorithms. Interestingly, it is rigorously proved that the latter two cases achieve the same throughput, thus helping halve the number of IRS phase shifts to be optimized and signalling overhead practically required for UL-adaptive IRS beamforming. Then, we propose a general optimization framework for dynamic IRS beamforming, which is applicable for any given number of IRS phase-shift vectors available. Despite of the non-convexity of the general problem with highly coupled optimization variables, we propose two algorithms to solve it and particularly, the low-complexity algorithm exploits the intrinsic structure of the optimal solution as well as the solutions to the cases with user-adaptive and static IRS beamforming. Simulation results validate our theoretical findings, illustrate the practical significance of IRS with dynamic beamforming for spectral and energy efficient WPCNs, and demonstrate the effectiveness of our proposed designs over various benchmark schemes.
Article
In this paper we study an intelligent reflecting surface (IRS) assisted non-orthogonal multiple access (NOMA) network where the direct link between the base station (BS) and one of the users is blocked and the IRS is deployed to serve the blocked user. The IRS designs under both the ideal IRS with continuous phase shifting and the non-ideal IRS with discrete phase shifting are considered. For both cases, by leveraging the isotropic random vector and the Laguerre series, we derive insightful results and closed-form expressions on the performance measures including the average required transmit power, the outage probability, and the diversity order. Our analytical results show that the transmit power scales down linearly with the BS antenna number and quadratically with the IRS element number. The diversity order equals the smaller of the BS antenna number and the IRS element number with a scaling coefficient. Our results also reveal the effect of the phase quantization resolution to the system performance when non-ideal IRS is used. Numerical results are provided to validate the accuracy of our analysis and the non-ideal IRS with four or more bits for quantization is shown to achieve nearly the same performance as the ideal IRS.
Article
This work examines the performance gain achieved by deploying an intelligent reflecting surface (IRS) in covert communications. To this end, we formulate the joint design of the transmit power and the IRS reflection coefficients by taking into account the communication covertness for the cases with global channel state information (CSI) and without a warden’s instantaneous CSI. For the case of global CSI, we first prove that perfect covertness is achievable with the aid of the IRS even for a single-antenna transmitter, which is impossible without an IRS. Then, we develop a penalty successive convex approximation (PSCA) algorithm to tackle the design problem. Considering the high complexity of the PSCA algorithm, we further propose a low-complexity two-stage algorithm, where analytical expressions for the transmit power and the IRS’s reflection coefficients are derived. For the case without the warden’s instantaneous CSI, we first derive the covertness constraint analytically facilitating the optimal phase shift design. Then, we consider three hardware-related constraints on the IRS’s reflection amplitudes and determine their optimal designs together with the optimal transmit power. Our examination shows that significant performance gain can be achieved by deploying an IRS into covert communications.
Article
Intelligent reflecting surface (IRS) is a promising technology to improve the performance of wireless powered communication networks (WPCNs) due to its capability to reconfigure signal propagation environments via smart reflection. In particular, the high passive beamforming gain promised by IRS can significantly enhance the efficiency of both downlink wireless power transfer (DL WPT) and uplink wireless information transmission (UL WIT) in WPCNs. Although adopting different IRS phase shifts for DL WPT and UL WIT, i.e., dynamic IRS beamforming , is in principle possible but incurs additional signaling overhead and computational complexity, it is an open problem whether it is actually beneficial. To answer this question, we consider an IRS-assisted WPCN where multiple devices employ a hybrid access point (HAP) to first harvest energy and then transmit information using non-orthogonal multiple access (NOMA). Specifically, we aim to maximize the sum throughput of all devices by jointly optimizing the IRS phase shifts and the resource allocation. To this end, we first prove that dynamic IRS beamforming is not needed for the considered system, which helps reduce the number of IRS phase shifts to be optimized. Then, we propose both joint and alternating optimization based algorithms to solve the resulting problem. Simulation results demonstrate the effectiveness of our proposed designs over benchmark schemes and also provide useful insights into the importance of IRS for realizing spectrum and energy efficient WPCNs.
Article
In this paper, we investigate the two-way communication between two users assisted by a reconfigurable intelligent surface (RIS). The scheme that two users communicate simultaneously over Rayleigh fading channels is considered. The channels between the two users and RIS can either be reciprocal or non-reciprocal. For reciprocal channels, we determine the optimal phases at the RIS to maximize the signal-to-interference-plus-noise ratio (SINR). We then derive exact closed-form expressions for the outage probability and spectral efficiency for single-element RIS. By capitalizing the insights obtained from the single-element analysis, we introduce a gamma approximation to model the product of Rayleigh random variables which is useful for the evaluation of the performance metrics in multiple-element RIS. Asymptotic analysis shows that the outage decreases at (log(ρ)/ρ) <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">L</sup> rate where L is the number of elements, whereas the spectral efficiency increases at log(ρ) rate at large average SINR p. For non-reciprocal channels, the minimum user SINR is targeted to be maximized. For single-element RIS, closed-form solution is derived whereas for multiple-element RIS the problem turns out to be non-convex. The latter one is solved through semidefinite programming relaxation and a proposed greedy-iterative method, which can achieve higher performance and lower computational complexity, respectively.