Conference PaperPDF Available

Physical Layer Security in RIS-assisted Networks in Fisher-Snedecor Composite Fading

Authors:

Abstract and Figures

In this study, we investigate the physical layer security (PLS) of a reconfigurable intelligent surface (RIS) enabled system over generalized fading channels. The RIS concept is becoming an essential technology for the achievement of smart radio environments, where large number of passive, miniature cells, are designed to influence incident signal. Key benefits have been demonstrated for RIS-assisted PLS purposes, due to the flexibility of simultaneously enhancing or suppressing signal beams to different users. Due to the potential of such RIS-assisted systems as reported in the literature, we study a system with a RIS-based access point for transmission, at the source node. The system is modelled with reference to a receiver transmitter pair in the presence of an eavesdropper. The Fisher-Snedecor model is adopted to analyse the composite fading and shadowing channel. Expressions are derived for the average secrecy capacity and secrecy outage probability of the network. The derived expressions can be adopted for the PLS analysis of RIS-assisted networks for several common distributions such as Rayleigh, Nakagami-m and the one-sided Gaussian distributions. The results were validated using Monte-Carlo simulations. The results indicate the clear secrecy benefit of employing a RIS enabled access point for various fading and shadowing conditions.
Content may be subject to copyright.
Physical Layer Security in RIS-assisted Networks in
Fisher-Snedecor Composite Fading
Abubakar Makarfi1,Khaled Rabie1, Omprakash Kaiwartya2, Osamah Badarneh3, Galymzhan Nauryzbayev4, Rupak Kharel1
1Faculty of Science and Engineering, Manchester Metropolitan University, UK
2School of Science and Technology, Nottingham Trent University, UK
3Electrical and Communication Engineering Department, German-Jordanian University, Jordan
4School of Engineering and Digital Sciences, Nazarbayev University, Kazakhstan
Emails:{a.makarfi, r.kharel, k.rabie}@mmu.ac.uk; omprakash.kaiwartya@ntu.ac.uk; Osamah.Badarneh@gju.edu.jo;
galymzhan.nauryzbayev@nu.edu.kz.
Abstract—In this study, we investigate the physical layer secu-
rity (PLS) of a reconfigurable intelligent surface (RIS) enabled
system over generalized fading channels. The RIS concept is
becoming an essential technology for the achievement of smart
radio environments, where large number of passive, miniature
cells, are designed to influence incident signal. Key benefits
have been demonstrated for RIS-assisted PLS purposes, due
to the flexibility of simultaneously enhancing or suppressing
signal beams to different users. Due to the potential of such
RIS-assisted systems as reported in the literature, we study a
system with a RIS-based access point for transmission, at the
source node. The system is modelled with reference to a receiver
transmitter pair in the presence of an eavesdropper. The Fisher-
Snedecor model is adopted to analyse the composite fading and
shadowing channel. Expressions are derived for the average
secrecy capacity and secrecy outage probability of the network.
The derived expressions can be adopted for the PLS analysis of
RIS-assisted networks for several common distributions such as
Rayleigh, Nakagami-m and the one-sided Gaussian distributions.
The results were validated using Monte-Carlo simulations. The
results indicate the clear secrecy benefit of employing a RIS-
enabled access point for various fading and shadowing conditions.
Index Terms—Fisher-Snedecor fading channels, physical layer
security, reconfigurable intelligent surfaces, secrecy capacity,
secrecy outage probability.
I. INT ROD UC TI ON
Recent research trends in wireless communications have
shifted towards beyond 5G capabilities, with an ambition of
ultra-high data rate transmissions up to 1 Tbps per user. This
will be possible through the efficient utilization of the extended
spectrum in the terahertz (THz) band (0.1 – 10 THz). A
consequence of this ambitious objective is the requirement for
new paradigms for transceiver architecture and computing. A
potential enabling technology in realising THz communication
is reconfigurable intelligent surfaces (RISs), also known as
reflector-arrays or intelligent walls.
The RIS concept a technology envisaged as an integral
part of next generation beyond 5G and 6G networks. The
aim is to enable a controllable smart radio environment, with
This work is a direct result of research on the European Regional Develop-
ment Fund (ERDF) Greater Manchester Cyber Foundry, which is part funded
by the ERDF.
improved coverage, spectrum efficiency and signal quality
[1], [2]. RISs have thus been defined as man-made surfaces
of electromagnetic materials that are electronically controlled
with integrated electronics and have unique wireless commu-
nication capabilities [3]. RIS-based transmission schemes have
several key features, such as full-band response, nearly passive
with dedicated energy sources, easy deployability on different
surfaces like buildings, vehicles or indoor spaces, as well as
being nearly unaffected by receiver noise [3], [4].
Several configurations have been investigated, because RISs
have the flexibility to be deployed in several shapes, locations
and sizes, from tens to hundreds of cells [3]. Also, existing
RIS-related literature have shown that while most RIS-enabled
applications are designed with the RIS as a reflector [3],
[5], some research have studied the RIS as a transmitter (or
access point) [3], [4] or RIS as a signal receiver [6]. These
configurations enable several benefits such as signal-to-noise
ratio (SNR) maximisation, improved spectral efficiency and
beamforming optimisation as discussed extensively in [3],
[4], [7]–[13]. Benefits have also been demonstrated for RIS-
assisted physical layer security (PLS) [14]–[18] purposes.
The main attraction of RIS-assisted PLS technologies is due
to the flexibility of simultaneously enhancing or suppressing
signal beams to different users [5]. It is worth noting that,
through PLS we can accomplish secure key-less transmission
by exploiting the fundamental features of the radio environ-
ment, such as noise, fading and interference. PLS in wireless
communication networks has remained an issue of importance,
more so due to the increasing shift towards inter-connected
systems. PLS has been widely studied for various network
types as reported in [19]–[24], as well as for RIS-assisted PLS
for wireless applications [5].
Inspired by the promising potential of RIS-based tech-
nologies for PLS in wireless communication networks, this
paper is therefore dedicated to studying the PLS of RIS-
enabled networks over composite fading. The Fisher-Snedecor
Fcomposite fading model was selected for the composite
analysis, because it provides accurate modeling and character-
ization of the simultaneous occurrence of multipath fading and
shadowing. Moreover, the Fisher-Snedecor Fmodel, while
being more mathematically tractable, encompasses numerous
2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing
(CSNDSP)
fading distributions of interest to wireless communications.
Special cases include the Nakagami-m(ms→ ∞), Rayleigh
(ms→ ∞, m = 1) and one-sided Gaussian distribution
(ms→ ∞, m =1
/2). Thus, a key motivation for this study.
The network model assumes a transmitter-receiver pair in the
presence of an eavesdropper. The performance of the proposed
system is evaluated in terms of the average secrecy capacity
(ASC) and the secrecy outage probability (SOP).
From the aforementioned, the main contributions of this
paper is as follows. The PLS of a RIS-assisted system is
analyzed over composite fading and shadowing. The Fisher-
Snedecor model is employed. A reference source node em-
ploys a RIS-based access point (AP) for transmission. This
allows for the derivation of expressions for the ASC and SOP
of the system. To the best of our knowledge, this is the first
analysis of PLS of a RIS-based network over composite fading
and shadowing. Closed-form expressions are derived and the
accuracy of the analysis verified with Monte Carlo simulations.
The results indicate the versatility of the derived expressions
in analysing the effects of fading and shadowing, as well as
other parameters in the network.
The paper is organised as follows. In Section II, the system
model under investigation is described. Thereafter, in Section
III, we derive expressions for efficient computation of the
ASC and SOP of the system. Lastly, in Sections IV and
V, the results are presented and main conclusions outlined,
respectively.
II. SY ST EM MO DE L
We consider a network of IoT nodes, as illustrated in Fig.
1. Each transmitter-receiver pair consists of a source node
(S) and a legitimate destination node (D) for the transmitted
information. We assume a classic Wyner’s wiretap model in
our analysis [25], such that Ssends confidential information to
D, while a passive eavesdropper1node (E) attempts to receive
and decode the confidential information. It is assumed that S
uses a RIS-based AP for trasnmission, as shown in the block
diagram. The RIS configuration allows transmission from S
without RF processing through direct wired connections (such
as with optic fibre). The system further assumes a smart AP
with full channel state information (CSI) at RIS. The RIS-
induced phases can be adjusted to maximise the received SNR
through appropriate phase cancellations and proper alignment
of reflected signals from the intelligent surface.
For a RIS consisting of Nelements, the received signal at
Dand Ecan respectively be represented as
yD="N
X
n=1
hD,nej φn#x+wD,(1)
yE="N
X
n=1
hE,n en#x+wE,(2)
where xrepresents the transmitted signal by Swith power
Ps, while the terms wDand wEare the respective additive
white Gaussian noise (AWGN) at Dand E. The term φnis
1We define a passive node as one that only receives the signal, but makes
no active attempt to disrupt. For e.g. through jamming.
Figure 1: Illustration of the system model with two legitimate nodes (S
and D) and one eavesdropper E.
Figure 2: RIS configured as an AP for transmission.
the reconfigurable phase induced by the nth reflector of the
RIS, which through phase matching, the SNR of the received
signals can be maximised2.
The terms hi,n =qgi,nrβ
i, i ∈ {D, E}, are the coeffi-
cients of the channel links from S, with distances ri, path-loss
exponent βand channel gain gi,n, modelled as independently
distributed Fisher-Snedecor FRVs with the following PDF
and CDF respectively [26]
f(gn)=Υng1
nG1,1
1,1Λngn
1msn
mn, msn>1,(3)
and
Fgn(v)=ΥnG1,2
2,2Λnv
1msn,1
mn,0,(4)
where n∈ {1,2, . . . , N },Υn=1
Γ(mn)Γ(msn)and Λn=
mn
(msn1)¯gn. The terms Gs,t
u,v [·]is the Meijer’s G-function [27,
Eq. (8.3.1.1)], Γ (z) = ´
0tz1etdt is the gamma function
[28, Eq. (8.310)]and ¯gn=E[gn]is the mean of g. The
notation E[·]is the expectation operator. The terms mnand
msnare the fading and shadowing parameters of the n-th path,
respectively.
From (1) and (2), the SNRs at Dand Eare
γD=PN
n=1 Ps|hD,n |2
N0
,(5)
and
γE=PN
n=1 Ps|hE,n |2
N0
,(6)
where N0is the power spectral density of the AWGN, assumed
to be equal at both links.
2Phase cancellation methods in RIS are discussed in [4]. For brevity, details
are not reproduced here.
2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing
(CSNDSP)
III. PER FO RM AN CE ANA LYSIS
In this section, we derive analytical expressions for the ASC
and SOP of the system.
A. Average Secrecy Capacity
Here we derive expressions for the ASC of the system. The
achievable ASC is given by [29]
Cs=(CDCE, γD> γE,
0, γD< γE,(7)
where CD=E[log2(1 + γD)] and CE=E[log2(1 + γE)]
are the average capacities of the main and eavesdropping links,
respectively. The terms γDand γDare given in (5) and (6),
while E[·]is the expectation operator.
First, we compute the average capacity at D, given by
CD=E[log2(1 + γD)]
=
ˆ
0
log2 1 + Psrβ
d
N0
gD!f(gD)dgD,(8)
where gD=PN
n=1 gd,n. As can be observed, the RV gD
is a sum of independent Fisher-Snedecor Fdistributed RVs,
therefore, from (3) and [30, Eq. (7)], the PDF is given by
f(g) = 1
gB (N m, Nms)gm
NmsN m
×2F1N(m+ms), N m;Nm;gm
Nms,(9)
where 2F1(α;β;γ;z)is the Gauss hypergeometric function
[28, Eq. (9.111)] and B(., .)is the Beta function [28, Eq.
(8.384.1)]. To proceed, we express the PDF (9) in a more
tractable form.
Using the relation B(x, y) = Γ(x)Γ(y)
Γ(x+y)[28, Eq. (8.384.1)]
and 2F1(α;β;γ;z) = Γ(γ)z
Γ(α)Γ(β)G1,2
2,2 z
α, β
1,γ![28, Eq.
(9.34.7)] with some algebraic manipulations, the PDF in (9)
can be rewritten as
f(g) = gNm
Γ (Nm) Γ (Nms)m
NmsN m+1
×G1,2
2,2 gm
Nms
N(m+ms),Nm
1,Nm !.(10)
With the appropriate change of variables and representing
the logarithmic function in terms of the Meijer G-function with
the aid of [31, Eq. (11)], i.e.,
ln (1 + z) = G1,2
2,2hz
1,1
1,0i,(11)
we can re-express (8) as
CD=Λd
ln (2)
ˆ
0
(ξdgD)NmdG1,2
2,2ηdgD
1,1
1,0
×G1,2
2,2 ξdgD
N(md+ms,d),Nmd
1,Nmd!dgD
(a)
=Λd
ln (2)
ˆ
0
G1,2
2,2ηdgD
1,1
1,0
×G1,2
2,2 ξdgD
Nms,d,0
Nmd1,0!dgD,(12)
where (a)was obtained using [28, Eq. (9.31.5)]. Also, ξd=
md
Nms,d,ηd=Psrβ
d
N0and Λd=ξd
Γ(Nmd)Γ(N ms,d).
The integral in (12) can be evaluated using [28, Eq.
(7.811.1)], to obtain the average capacity as3
CD=Λd
ξdln (2) G3,3
4,4ηd
ξd
1Nmd,0,1,1
Nms,d,0,1,0.(13)
Using analysis similar to the derivation of (13), the average
capacity of the eavesdropper link can be represented as
CE=Λe
ξeln (2) G3,3
4,4ηe
ξe
1Nme,0,1,1
Nms,e,0,1,0,(14)
where ηe=Psrβ
e
N0,ηe=Psrβ
e
N0and Λe=ξe
Γ(Nme)Γ(N ms,e).
From (7), (13) and (14), the ASC can be represented as
Cs=1
ln (2) Λd
ξd
G3,3
4,4ηd
ξd
1Nmd,0,1,1
Nms,d,0,1,0
Λe
ξe
G3,3
4,4ηe
ξe
1Nme,0,1,1
Nms,e,0,1,0.(15)
B. Secrecy Outage Probability
In this section, we derive analytical expressions for the SOP
in Fisher-Snedecor Fcomposite fading. The SOP is defined
as the probability that the secrecy capacity falls below a target
secrecy rate [32]. This can be represented as
Po=Pr [Cs< Rs],(16)
where Rsis the pre-determined target secrecy rate. From (7)
and (16), we obtain
Po=Pr log21 + γD
1 + γE< Rs
=Pr 1 + γD
1 + γE
<2Rs
(a)
Pr [γD< νγE]
'Pr [gD< νrgE],(17)
where gD=PN
n=1 gd,n,gE=PN
n=1 ge,n,νr= 2Rsrβ
drβ
e,
while γDand γEare defined in (5) and (6) respectively. The
3Given the Meijer G-function Gs,t
u,v [x| · ], then the solution in (13) con-
verges if the first G-function in the integrand is subject to the constraint
|arg x|<s+t1
2u1
2vπ[28, Eq. (7.811.1)].
2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing
(CSNDSP)
line (a)in (17) follows from the approximation, 1+x
1+y'x
y
[21].4
Thus, the average SOP can be defined as
Po=
ˆ
0
νrgE
ˆ
0
f(gD)f(gE)dgDdgE
=
ˆ
0
FD(νrgE)f(gE)dgE,(18)
where f(gE)is the PDF of gE, defined in (10) and FD(.)is
the CDF of gD, which follows the distribution of the sum of
independent Fisher-Snedecor Fdistributed RVs. This can be
evaluated using [30, Eq. (9)] as
FD(νrgE) = Γ (Nmd+Nms,d)
Γ (1 + Nmd) Γ (Nms,d)νrgEmd
Nms,dN md
×2F1N(md+ms,d), N md; 1 + N md;νrgEmd
Nms,d,
(19)
where it is worth noting that (19) converges if |νrgEmd
Nms,d|<1.
Using [28, Eq. (8.384.1)] and [28, Eq. (9.34.7)] with similar
algebraic manipulations to the derivation of (10), the CDF can
be rewritten as
FD(νrgE) = Λd
ξd
G1,2
2,2 νrgEξd
1Nms,d,1
Nmd,0!,(20)
where ξd=md
Nms,dand Λd=ξd
Γ(Nmd)Γ(N ms,d).
From (10), (18) and (20), we can express the average SOP
as
Po=ΛdΛe
ξd
ˆ
0
(ξegE)NmeG1,2
2,2 νrgEξd
1Nms,d,1
Nmd,0!
×G1,2
2,2 ξegE
N(me+ms,e),Nme
1,Nme!dgE
(b)
=ΛdΛe
ξd
ˆ
0
G1,2
2,2 νrgEξd
1Nms,d,1
Nmd,0!
×G1,2
2,2 ξegE
Nms,e,0
Nme1,0!dgE,
(c)
=ΛdΛe
νrξdξd
G3,3
4,4ξe
νrξd
Nmd,Nms,e,0,0
Nms,d1,1, N me1,0,
(21)
where (b)was obtained using [28, Eq. (9.31.5)] and (c)was
obtained with the aid of [28, Eq. (7.811.1)].
After further simplication with the help of [28, Eq. (9.31.1)]
and [28, Eq. (9.31.5)], we can re-write the average SOP as5
4This approximation is commonly used in the literature for such analysis
(see [21], [23] and the references therein). The approximation becomes more
accurate as x and y become larger, and is justified because the SNR for a
RIS-enabled system is maximised.
5The solution in (21) holds subject to similar constraints imposed in (13).
12345678910
Source Transmit Power, Ps
1.52
1.54
1.56
1.58
1.6
1.62
1.64
1.66
1.68
Average Secrecy Capacity
Simulation
N = 8, md = 1.5 (analytical)
N = 8, md = 5.5 (analytical)
N = 16, md = 1.5 (analytical)
N = 16, , md = 5.5 (analytical)
Figure 3: Impact of RIS-to-Dlink fading severity mdon ASC versus
source transmit power Ps, for different number of RIS cells N.
12345678910
Source Transmit Power, Ps
1.5
1.52
1.54
1.56
1.58
1.6
1.62
1.64
1.66
1.68
Average Secrecy Capacity
Simulation
N = 8, me = 1.5 (analytical)
N = 8, me = 5.5 (analytical)
N = 16, me = 1.5 (analytical)
N = 16, , me = 5.5 (analytical)
Figure 4: Impact of RIS-to-Elink fading severity meon ASC versus
source transmit power Ps, for different number of RIS cells N.
Po=ΛdΛe
ξdξe
G3,2
3,3ξe
νrξd
1Nmd,1Nms,e,1
Nms,d,0, N me.(22)
IV. NUM ER IC AL RE SU LTS AND DISCUSSIONS
This section discusses results of mathematical analysis from
earlier expressions derived in the paper, by studying the
effects of key system parameters. Monte Carlo simulations
are conducted on MATLAB to validate the mathematical
analysis. Unless otherwise stated, we have assumed source
power Ps= 10 W, RIS-to-Enormalized distance rE= 1 m,
RIS-to-Ddistance rD= 0.75rEand pathloss exponent β= 4
to represent a lossy environment, given the high attenuation
in higher THz frequencies [33]6.
The impact of the multipath fading parameters mdand meof
the main legitimate channel and eavesdropper’s channel on the
6Path-loss at lower LTE bands (900 MHz, 1800MHz) at a distance of 1
Km, could be experienced in 1 m for the THz spectrum.
2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing
(CSNDSP)
ASC performance is illustrated in Figs. 3 and 4, respectively. It
can be observed that the ASC improves when Psincreases for
all parameters, however, the number of RIS cells is not directly
proportional to the ASC performance when Psincreases,
because the SNR is already maximized. This means that within
the regions investigated, the fading parameters have greater
effect. In Fig. 3, we can observe that for fixed number of cells
and shadowing severity, the ASC improves as mdincreases.
This is because lower mddepicts a higher fading severity,
which in turn means that the number of multipath clusters
arriving at Dincreases, and thus, the received SNR increases.
On the other hand, in Fig. 4, we observe that the ASC increases
as the fading severity of the eavesdropper’s link increasess (i.e
fading parameter is reduced). This means that mdand megive
counter effects, though mdhas a much more positive effect on
the ASC as demonstrated by the higher secrecy rates in Fig.
3.
In Fig. 5, we study the impact of shadowing on the SOP,
where we consider two values for the shadowing parameter
of the RIS-to-Dlink i.e. ms,d= 1 (severe) and ms,d= 10
(light). It can be noted that, there is a higher probability of
outage when Nis lower, due to the lower SNR received at D.
Furthermore, for a given number of RIS cells, a more severe
shadowing effect results in a higher SOP, because of the lower
SNR received at D. Similar performance can be demonstrated
when the impact of shadowing on the eavesdropper’s link is
analyzed, although not presented for the sake of brevity.
V. CO NC LU SI ON S
In this paper, we investigated the PLS performance of a
RIS-based network over Fisher-Snedecor Fcomposite fading
and shadowing channels. Particularly, exact expressions were
derived for the ASC and SOP of the system. The results
highlight the effect of varying the severity of multipath fading
and shadowing on the secrecy performance of the system.
Specifically, the results have shown that increasing the severity
of the multipath fading in the legitimate link or the shadowing
of the eavesdropper’s link improve the secrecy performance.
REF ER EN CE S
[1] M. D. Renzo, M. Debbah, D.-T. Phan-Huy, A. Zappone, M.-S.
Alouini, C. Yuen, V. Sciancalepore, G. C. Alexandropoulos, J. Hoydis,
H. Gacanin, J. d. Rosny, A. Bounceur, G. Lerosey, and M. Fink, “Smart
radio environments empowered by reconfigurable AI meta-surfaces:
An idea whose time has come,” EURASIP J. Wireless Commun.
Netw., vol. 2019, no. 1, p. 129, May 2019. [Online]. Available:
https://doi.org/10.1186/s13638-019-1438-9
[2] C. Liaskos, S. Nie, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, and
I. Akyildiz, “A new wireless communication paradigm through software-
controlled metasurfaces,” IEEE Commun. Mag., vol. 56, no. 9, pp. 162–
169, Sep. 2018.
[3] E. Basar, M. D. Renzo, J. D. Rosny, M. Debbah, M.-S. Alouini, and
R. Zhang, “Wireless communications through reconfigurable intelligent
surfaces,” IEEE Access, vol. 7, pp. 116 753–116 773, 2019.
[4] E. Basar, “Transmission Through Large Intelligent Surfaces: A New
Frontier in Wireless Communications,” in 2019 European Conf. Netw.
Commun. (EuCNC), Jun. 2019, pp. 112–117.
[5] S. Gong, X. Lu, D. T. Hoang, D. Niyato, L. Shu, D. I. Kim,
and Y.-C. Liang, “Towards smart radio environment for wire-
less communications via intelligent reflecting surfaces: A compre-
hensive survey,” arXiv:1912.07794, Dec. 2019. [online]. Available:
https://arxiv.org/abs/1912.07794.
0 0.5 1 1.5
Secrecy capacity threshold, R s
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
Secrecy outage probability
Simulation
N = 8, msd = 1 (analytical)
N = 8, msd = 10 (analytical)
N = 16, msd = 1 (analytical)
N = 16, , msd = 10 (analytical)
Figure 5: Impact of RIS-to-Dlink shadowing severity ms,don SOP
versus secrecy capacity threshold, Rs, for different number of RIS cells
N.
[6] M. Jung, W. Saad, Y. R. Jang, G. Kong, and S. Choi, “Performance
Analysis of Large Intelligence Surfaces (LISs): Asymptotic Data Rate
and Channel Hardening Effects,ArXiv, vol. abs/1810.05667, 2018.
[7] L. Subrt and P. Pechac, “Controlling propagation environments using
intelligent walls,” in 6th European Conf. Antennas Propag. (EUCAP),
Mar. 2012, pp. 1–5.
[8] S. Hu, F. Rusek, and O. Edfors, “Beyond Massive MIMO: The Potential
of Data Transmission With Large Intelligent Surfaces,” IEEE Trans. Sig.
Process., vol. 66, no. 10, pp. 2746–2758, May 2018.
[9] Q. Wu and R. Zhang, “Beamforming optimization for intelligent re-
flecting surface with discrete phase shifts,” in IEEE Int. Conf. Acoust.,
Speech and Sig. Process. (ICASSP), May 2019, pp. 7830–7833.
[10] ——, “Intelligent reflecting surface enhanced wireless network: Joint
active and passive beamforming design,” in IEEE Global Commun. Conf.
(GLOBECOM), Dec. 2018, pp. 1–6.
[11] X. Tan, Z. Sun, J. M. Jornet, and D. Pados, “Increasing indoor spectrum
sharing capacity using smart reflect-array,” in IEEE Int. Conf. Commun.
(ICC), May 2016, pp. 1–6.
[12] C. Huang, A. Zappone, M. Debbah, and C. Yuen, “Achievable Rate
Maximization by Passive Intelligent Mirrors,” in IEEE Int. Conf. Acoust.
Speech Sig. Process. (ICASSP), Apr. 2018, pp. 3714–3718.
[13] A. U. Makarfi, K. M. Rabie, O. Kaiwartya, O. S. Badarneh, X. Li, and
R. Kharel, “Reconfigurable intelligent surface enabled IoT networks in
generalized fading channels,” arXiv:1912.06250, Dec. 2019. [online].
Available: https://arxiv.org/abs/1912.06250.
[14] M. Cui, G. Zhang, and R. Zhang, “Secure wireless communication via
intelligent reflecting surface,” IEEE Wireless Commun. Lett., pp. 1–1,
2019.
[15] J. Chen, Y.-C. Liang, Y. Pei, and H. Guo, “Intelligent Reflecting Surface:
A Programmable Wireless Environment for Physical Layer Security,
IEEE Access, vol. 7, pp. 82 599–82 612, 2019.
[16] X. Yu, D. Xu, and R. Schober, “Enabling secure wireless communica-
tions via intelligent reflecting surfaces,” in IEEE Global Commun. Conf.
(GLOBECOM), Dec 2019, pp. 1– 6.
[17] Z. Chu, W. Hao, P. Xiao, and J. Shi, “Intelligent reflecting surface aided
multi-antenna secure transmission,” IEEE Wireless Commun. Lett., pp.
1–1, 2019, Early Access.
[18] H. Shen, W. Xu, S. Gong, Z. He, and C. Zhao, “Secrecy rate
maximization for intelligent reflecting surface assisted multi-antenna
communications,” IEEE Commun. Lett., vol. 23, no. 9, pp. 1488–1492,
Sep. 2019.
[19] Y. Ai, M. Cheffena, A. Mathur, and H. Lei, “On Physical Layer Security
of Double Rayleigh Fading Channels for Vehicular Communications,”
IEEE Wireless Commun. Lett., vol. 7, no. 6, pp. 1038–1041, Dec. 2018.
[20] A. U. Makarfi, R. Kharel, K. M. Rabie, O. Kaiwartya, and G. Nau-
ryzbayev, “Physical Layer Security in Vehicular Communication Net-
2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing
(CSNDSP)
works in the Presence of Interference,” in IEEE Global Commun. Conf.
(GLOBECOM), Dec. 2019, pp. 1–6.
[21] A. Pandey and S. Yadav, “Physical Layer Security in Cooperative AF
Relaying Networks With Direct Links Over Mixed Rayleigh and Double-
Rayleigh Fading Channels,” IEEE Trans. Veh. Tech., vol. 67, no. 11, pp.
10 615–10 630, Nov. 2018.
[22] L. Xu, X. Yu, H. Wang, X. Dong, Y. Liu, W. Lin, X. Wang, and J. Wang,
“Physical layer security performance of mobile vehicular networks,
Mobile Netw. Appl., pp. 1–7, Apr. 2019.
[23] A. Pandey and S. Yadav, “Performance evaluation of amplify and
forward relaying cooperative vehicular networks under physical layer
security,Trans. Emerging Telecommun. Technol., vol. 29, no. 12, p.
e3534, Oct. 2018.
[24] A. U. Makarfi, K. M. Rabie, O. Kaiwartya, X. Li, and R. Kharel,
“Physical Layer Security in Vehicular Networks with Reconfigurable
Intelligent Surfaces,” in accepted for IEEE Veh. Technol. Conf. (VTC),
Spring 2020, pp. 1–6.
[25] H. Lei, I. S. Ansari, G. Pan, B. Alomair, and M. Alouini, “Secrecy
Capacity Analysis Over α-µFading Channels,IEEE Commun. Lett.,
vol. 21, no. 6, pp. 1445–1448, Jun. 2017.
[26] S. K. Yoo, S. L. Cotton, P. C. Sofotasios, M. Matthaiou, M. Valkama,
and G. K. Karagiannidis, “The Fisher–Snedecor F distribution: A simple
and accurate composite fading model,” IEEE Commun. Lett., vol. 21,
no. 7, pp. 1661–1664, Jul. 2017.
[27] A. P. Prudnikov, Y. A. Brychkov, and O. I. Marichev, Integrals, and
Series: More Special Functions, Gordon and Breach Sci. Publ., New
York, 1990, vol. 3.
[28] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and
Products. Califonia: Academic Press, 7th ed., 2007.
[29] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wire-
less information-theoretic security,IEEE Trans. Inf. Theory, vol. 54,
no. 6, pp. 2515–2534, Jun. 2008.
[30] O. S. Badarneh, D. B. da Costa, P. C. Sofotasios, S. Muhaidat, and S. L.
Cotton, “On the sum of fisher-snedecor F variates and its application to
maximal-ratio combining,” 2019.
[31] V. S. Adamchik and O. I. Marichev, “The algorithm for calculating
integrals of hypergeometric type functions and its realization in reduce
systems,” in Proc. Int. Conf. on Symbolic and Algebraic Comput., 1990,
pp. 212–224.
[32] A. Salem, K. A. Hamdi, and E. Alsusa, “Physical Layer Security
Over Correlated Log-Normal Cooperative Power Line Communication
Channels,” IEEE Access, vol. 5, pp. 13909–13 921, 2017.
[33] R. Singh and D. Sicker, “Beyond 5G: THz Spectrum Futures and
Implications for Wireless Communication,” in 30th European Conf. of
the Int. Telecommun. Society (ITS), Jun. 2019, pp. 1–30.
2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing
(CSNDSP)
... The physical layer security using different coding techniques was evaluated in [14,15]. The physical layer security using Reconfigurable Intelligent Surfaces (RIS) was studied in [16][17][18][19]. The Secrecy Outage Probability (SOP) and the Strictly Positive Secrecy Capacity (SPSC) were derived for RIS using NOMA in [20]. ...
... Energy efficient tethered UAV deployment was studied in [23]. The physical layer security has been extensively evaluated for a fixed transmit power [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. In Cognitive Radio Networks (CRN), the power of the secondary source is adaptive to generate low interference at primary users. ...
... In Cognitive Radio Networks (CRN), the power of the secondary source is adaptive to generate low interference at primary users. However, the SOP and SPSC were not yet evaluated when the power of the source is adaptive [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. Besides, the physical layer security was not studied when the source harvests energy using the signals received over multiple antennas and adapts its power to generate low interference. ...
Article
Full-text available
In this article, we compute the Secrecy Outage Probability (SOP) and the Probability of Strictly Positive Secrecy Capacity (SPSC) for Cognitive Radio Networks with Adaptive Transmit Power and energy harvesting using multiple antennas. The secondary source harvests power using multiple antennas using node A signal. Node A is a node transmitting Radio Frequency signals. Then, it adapts its power to generate interference at primary receiver PR\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_R$$\end{document} less than T. Our analysis takes into consideration the interference between primary and secondary nodes. In fact, the Signal to Interference plus Noise Ratio is analyzed at the secondary destination in the presence of interference from the primary transmitter. We derive the SOP and SPSC when the secondary source and destination have multiple antennas. The transmission is made from the best antenna of the secondary source to the best receiving antenna at the secondary destination.
... Generally, optimizing transmitted power and controlling phase shift can enhance the security and the QoS of the perceived signal [119]. In a RISassisted network, Fisher-Snedecor framework is employed to investigate composite fading and shadowing channels in the presence of eavesdroppers [66]. The average secrecy performance showed that deploying the RIS-based access point for the abovementioned scenario has a beneficial impact on the impact of eavesdropping. ...
Chapter
Cognitive security and privacy management are required to address the vulnerabilities of 6G networks. This chapter demonstrates a brief discussion of various potential attacks/threats in 6G networks. There are different potential attacks to compromise the physical layer, connection layer, and processing layer operations of a network including access control attack, eavesdropping, jamming, data modification, attack on internet of things devices, malicious code injection, location tracking, distributed denial of service, man-in-the-middle attack, poisoning, evasion, Sybil attack, etc. A successful Privilege Escalation Attacks is launched inside the Linux container mechanism, which is able to disable the protection methods of the system. In cell-free Massive Multiple Input Multiple Output networks, pilot spoofing attacks are the most frequent attacks. In contrast to traditional communication technology, reconfigurable intelligent surface can have a unique feature of controlling the propagation environment that ensures secure transmission.
... Without loss of generality, we consider the channel capacity with unit bandwidth, which could also be treated as spectral efficiency. According to equation (18) and referring to the [34] we can obtain the expression for the capacity of the system as equation (19) on the top of the next page. ...
Article
Full-text available
Reconfigurable Intelligent Surface (RIS) can intelligently control the wireless propagation environment by adjusting the signal phase and amplitude in real time, which is considered as one of the key technologies of 6G. Although RIS-assisted wireless communication systems greatly improve transmission efficiency under ideal conditions, there are various uncertainties in actual communication systems. In this paper, RIS-assisted communication system is investigated where the RIS cannot completely eliminate the phase error and the user location is randomly distributed with uncertainty. In addition, there are some interference sources around the user, which are simplified as co-channel interference (CCI). Then we study the performance of RIS-assisted communication system, and derive the closed-form expressions for the outage probability (OP) and channel capacity of the system. Furthermore, we analyze the effects of various parameters on the OP and channel capacity. Finally Monte Carlo simulation is carried out which verify the accuracy of the derivation.
... By applying the variable substitution, k = m m1 x 2 + z 2 F2 (m s1 − 1)Ω 1 and then by applying the binomial formula (14) on the next page. Similarly, the closed-form SNR CDF expression F γ F d (γ F d ), whereγ i =Ω i is given as (15). In [35], authors introduced N -FS F CFM and provided the PDF and CDF of N -FS F distribution in terms of the Meijer's G functions. ...
Article
Full-text available
An advantage of using the composite fading models (CFMs) is their ability to concurrently address the impact of multi-path and shadowing phenomena on the system performance in wireless communications. A Fisher-Snedecor (FS) F CFM has been recently proposed as an experimentally verified and tractable fading model that can be efficiently applied for 5G and beyond 5G wireless communication systems. This paper provides second-order (s-order) performance analysis of the product of N independent but not identically distributed (i.n.i.d) FS F random variables (RVs). In particular, accurate and closed-form approximations for level crossing rate (LCR) and average fade duration (AFD) of the product of N i.n.i.d FS F ( N-FS F) RVs are successfully derived by exploiting a general property of a Laplace approximation method for evaluation of the N-folded integral-form LCR expression. Based on the obtained s-order statistical results, the burst error rate and maximum symbol rate of the N-FS F distribution are addressed and thoroughly examined. The numerical results of the considered performance measures are discussed in relation to the N-FS F multi-path and shadowing severity parameters. Moreover, the impact of the number of hops ( N) of the N-FS F CFM on the s-order metrics, the burst error rate and maximum symbol rate are numerically evaluated and investigated. The derived s-order statistical results can be used to address the cooperative relay-assisted (RA) communications for vehicular systems. Monte-Carlo (M-C) simulations for the addressed statistical measures are developed in order to confirm the provided theoretical results.
... Generally, PLS exploits the inherent properties and characteristics of the wireless channels, such as fading, interference, and noise, to secure the data transmission [10]- [14]. With LIS's ability to control the transmission environment, LIS-assisted PLS systems were recently investigated in [15]- [19] to enhance the security of communication systems. In [20], the authors studied a RIS-aided multiple-input-singleoutput system with the consideration of highly correlated direct links of the eavesdropper and user. ...
Conference Paper
Full-text available
Intelligent surfaces have recently been presented as a revolutionary technique and recognized as one of the candidates for beyond fifth-generation wireless networks. This paper investigates the physical layer security of a large intelligent surface (LIS) aided wireless system over Nakagami-m channels. We propose a phase-based adaptive modulation scheme, where LIS’s phase-shift optimization process is effectively utilized to enhance the system’s security. Moreover, the effect of the Nakagami-m fading parameter (m), correlation parameter (ρ), and a number of passive LIS elements (M) on the system performance are examined. The significant improvement in confidentiality is shown while evaluating the bit error rate performance of the proposed scheme.
Article
This article considers a reconfigurable intelligent surface (RIS) enhanced multi-antenna secure transmission system in the presence of both active eavesdroppers (AEves) and passive eavesdroppers (PEves). We propose a zero-forcing (ZF) beamforming strategy that can steer transmit beam to the null space of AEves' channel, while simultaneously enhancing the SNRs for a legitimate user equipment (UE) and PEves without perfect channel state information (CSI). The design goal is to maximize the SNR of UE subject to the transmit power constraint at the BS, SNR limitations on PEves, and reflection constraints at RIS. Due to the complexity of modeling, we first introduce a homogeneous Poisson point process (HPPP) to imitate the distribution of spatially random PEves, which derives a complicated non-convex problem. We then develop an efficient alternating algorithm where the transmit beamforming vector and the reflective beamforming vector are obtained by convex-concave procedure (CCP) and semi-definite relaxation (SDR) technique, respectively. Simulation results validate the performance advantages of the proposed optimized design.
Article
In this paper, we investigate the physical layer security in the reconfigurable intelligent surface (RIS)-aided cell-free networks. A maximum weighted sum secrecy rate problem is formulated by jointly optimizing the active beamforming (BF) at the base stations and passive BF at the RISs. To handle this non-trivial problem, we adopt the alternating optimization to decouple the original problem into two sub-ones, which are solved using the semidefinite relaxation and continuous convex approximation theory. To decrease the complexity for obtaining overall channel state information (CSI), we extend the proposed framework to the case that only requires part of the RIS’ CSI. This is achieved via deliberately discarding the RIS that has a small contribution to the user’s secrecy rate. Based on this, we formulate a mixed integer non-linear programming problem, and the linear conic relaxation is used to obtained the solutions. Meanwhile, we also study the system performance under the imperfect CSI. Finally, the simulation results show that the proposed schemes can obtain a higher secrecy rate than the existing ones.
Conference Paper
Full-text available
This paper studies the physical layer security (PLS) of a vehicular network employing a reconfigurable intelligent surface (RIS). RIS technologies are emerging as an important paradigm for the realisation of smart radio environments, where large numbers of small, low-cost and passive elements, reflect the incident signal with an adjustable phase shift without requiring a dedicated energy source. Inspired by the promising potential of RIS-based transmission, we investigate two vehicular network system models: One with vehicle-to-vehicle communication with the source employing a RIS-based access point, and the other model in the form of a vehicular adhoc network (VANET), with a RIS-based relay deployed on a building. Both models assume the presence of an eavesdropper to investigate the average secrecy capacity of the considered systems. Monte-Carlo simulations are provided throughout to validate the results. The results show that performance of the system in terms of the secrecy capacity is affected by the location of the RIS-relay and the number of RIS cells. The effect of other system parameters such as source power and eavesdropper distances are also studied.
Article
Full-text available
The concept of a large intelligent surface (LIS) has recently emerged as a promising wireless communication paradigm that can exploit the entire surface of man-made structures for transmitting and receiving information. An LIS is expected to go beyond massive multiple-input multiple-output (MIMO) system, insofar as the desired channel can be modeled as a perfect line-of-sight. To understand the fundamental performance benefits, it is imperative to analyze its achievable data rate, under practical LIS environments and limitations. In this paper, an asymptotic analysis of the uplink data rate in an LIS-based large antenna-array system is presented. In particular, the asymptotic LIS rate is derived in a practical wireless environment where the estimated channel on LIS is subject to estimation errors, interference channels are spatially correlated Rician fading channels, and the LIS experiences hardware impairments. Moreover, the occurrence of the channel hardening effect is analyzed and the performance bound is asymptotically derived for the considered LIS system. The analytical asymptotic results are then shown to be in close agreement with the exact mutual information as the number of antennas and devices increase without bounds. Moreover, the derived ergodic rates show that hardware impairments, noise, and interference from estimation errors and the non-line-of-sight path become negligible as the number of antennas increases. Simulation results show that an LIS can achieve a performance that is comparable to conventional massive MIMO with improved reliability and a significantly reduced area for antenna deployment.
Article
Full-text available
In this paper, we propose intelligent reflecting surface (IRS) aided multi-antenna physical layer security. We present a power efficient scheme to design the secure transmit power allocation and the surface reflecting phase shift. It aims to minimize the transmit power subject to the secrecy rate constraint at the legitimate user. Due to the non-convex nature of the formulated problem, we propose an alternative optimization algorithm and the semidefinite programming (SDP) relaxation to deal with this issue. Also, the closed-form expression of the optimal secure beamformer is derived. Finally, simulation results are presented to validate the proposed algorithm, which highlights the performance gains of the IRS to improve the secure transmission.
Article
Full-text available
The future of mobile communications looks exciting with the potential new use cases and challenging requirements of future 6th generation (6G) and beyond wireless networks. Since the beginning of the modern era of wireless communications, the propagation medium has been perceived as a randomly behaving entity between the transmitter and the receiver, which degrades the quality of the received signal due to the uncontrollable interactions of the transmitted radio waves with the surrounding objects. The recent advent of reconfigurable intelligent surfaces in wireless communications enables, on the other hand, network operators to control the scattering, reflection, and refraction characteristics of the radio waves, by overcoming the negative effects of natural wireless propagation. Recent results have revealed that reconfigurable intelligent surfaces can effectively control the wavefront, e.g., the phase, amplitude, frequency, and even polarization, of the impinging signals without the need of complex decoding, encoding, and radio frequency processing operations. Motivated by the potential of this emerging technology, the present article is aimed to provide the readers with a detailed overview and historical perspective on state-of-the-art solutions, and to elaborate on the fundamental differences with other technologies, the most important open research issues to tackle, and the reasons why the use of reconfigurable intelligent surfaces necessitates to rethink the communication-theoretic models currently employed in wireless networks. This article also explores theoretical performance limits of reconfigurable intelligent surface-assisted communication systems using mathematical techniques and elaborates on the potential use cases of intelligent surfaces in 6G and beyond wireless networks.
Article
This paper presents a literature review on recent applications and design aspects of the intelligent reflecting surface (IRS) in the future wireless networks. Conventionally, the network optimization has been limited to transmission control at two endpoints, i.e., end users and network controller. The fading wireless channel is uncontrollable and becomes one of the main limiting factors for performance improvement. The IRS is composed of a large array of scattering elements, which can be individually configured to generate additional phase shifts to the signal reflections. Hence, it can actively control the signal propagation properties in favor of signal reception, and thus realize the notion of a smart radio environment. As such, the IRS’s phase control, combined with the conventional transmission control, can potentially bring performance gain compared to wireless networks without IRS. In this survey, we first introduce basic concepts of the IRS and the realizations of its reconfigurability. Then, we focus on applications of the IRS in wireless communications. We overview different performance metrics and analytical approaches to characterize the performance improvement of IRS-assisted wireless networks. To exploit the performance gain, we discuss the joint optimization of the IRS’s phase control and the transceivers’ transmission control in different network design problems, e.g., rate maximization and power minimization problems. Furthermore, we extend the discussion of IRS-assisted wireless networks to some emerging use cases. Finally, we highlight important practical challenges and future research directions for realizing IRS-assisted wireless networks in beyond 5G communications.
Conference Paper
This paper studies the physical layer security of a vehicular communication network in the presence of interference constraints by analysing its secrecy capacity. The system considers a legitimate receiver node and an eavesdropper node, within a shared network, both under the effect of interference from other users. The double-Rayleigh fading channel is used to capture the effects of the wireless communication channel for the vehicular network. We present the standard logarithmic expression for the system capacity in an alternate form, to facilitate analysis in terms of the joint moment generating functions (MGF) of the random variables representing the channel fading and interference. Closed-form expressions for the MGFs are obtained and Monte-Carlo simulations are provided throughout to validate the results. The results show that performance of the system in terms of the secrecy capacity is affected by the number of interferers and their distances. The results further demonstrate the effect of the uncertainty in eavesdropper location on the analysis.
Article
We investigate transmission optimization for intelligent reflecting surface (IRS) assisted multi-antenna systems from the physical-layer security perspective. The design goal is to maximize the system secrecy rate subject to the source transmit power constraint and the unit modulus constraints imposed on phase shifts at the IRS. To solve this complicated non-convex problem, we develop an efficient alternating algorithm where the solutions to the transmit covariance of the source and the phase shift matrix of the IRS are achieved in closed form and semi-closed forms, respectively. The convergence of the proposed algorithm is guaranteed theoretically. Simulations results validate the performance advantage of the proposed optimized design.