Conference PaperPDF Available

Secrecy Performance of RIS Aided NOMA Networks

Authors:
Secrecy Performance of RIS Aided NOMA
Networks
Yingjie Pei, Xinwei Yue, Wenqiang Yi, Yuanwei Liu, Xuehua Liand Zhiguo Ding
Beijing Information Science and Technology University, Beijing, China
Queen Mary University of London, London, UK
University of Manchester, Manchester, UK
Abstract—Reconfigurable intelligent surface (RIS) has been
regarded as a promising technology since it has ability to create
the favorable channel conditions. This paper investigates the
secrecy performance of RIS aided non-orthogonal multiple access
(NOMA) networks, where the internal eavesdropping scenario
is taken into consideration. More specifically, novel closed-form
and asymptotic expressions of secrecy outage probability for
the k-th user are derived. According to the analytical results,
the secrecy diversity orders at users are acquired in the high
signal-to-noise ratio region. Simulation results show that the
applying of RIS in NOMA networks can remarkably improve
the performance of secrecy outage behaviour and secrecy system
throughput compared to RIS aided orthogonal multiple access
networks.
I. INTRODUCTION
As one of pivotal technologies for the next generation
communication networks, non-orthogonal multiple access (NO-
MA) has attracted extensive attention due to its remarkable
spectral efficiency and superiority for massive connectivity
compared to orthogonal multiple access (OMA) [1–3]. The
authors of [4] investigated the performance of NOMA networks
in terms of outage probability and ergodic rate. The cooperative
NOMA scheme was survey in [5], where the nearby user
with better channel conditions was regarded as the relaying.
To ensure the secure transmission in NOMA networks. The
authors of [6] evaluated the secrecy performance of large-
scale downlink NOMA networks with the presence of an
eavesdropper (Eve). In addition, the superimposed signal is
transmitted simultaneously to all users in NOMA networks,
which makes it possible for users with poor channel condition
to wiretap others’ information as internal Eves [7]. Triggered
by this, the authors of [8] researched the secrecy performance
of unified NOMA framework by taking into account stochastic
geometry under external and internal eavesdropping scenarios.
Additionally, the secure communications of cooperative NOMA
networks was revealed in [9], where the secrecy throughput was
improved greatly.
Reconfigurable intelligent surface (RIS) has been widely
considered an effective approach to improve the reliability
of wireless communication networks [10–12]. Compared with
traditional active relaying, the authors of [13] highlighted the
achievable rate of RIS-enhanced networks. In [14], the ergodic
capacity of RIS aided single-input single-output system were
analyzed in detail. For further exploration, researchers have
dived into surveying the integrate of RIS to NOMA networks
[15–17]. The coherent phase shifting and random phase shifting
of RIS-NOMA were proposed in [18], which achieves the
tradeoff between complexity and reliability. In [19], the on-
off control scheme is proposed in NOMA networks to simply
reconfigure phase shifting elements at RIS. The ergodic rate
of RIS-NOMA for multiple users were evaluated in-depth
with imperfect/perfect successive interference cancellation in
[20], where the 1-bit scheme was utilized at RIS. Further,
the authors of [21] analyzed the required power and outage
performance by introducing continuous/discrete phase shifting
in RIS-NOMA networks with multiple antennas. In [22], the
authors synthetically investigated uplink and downlink RIS-
NOMA scenarios, where the closed-form expression of outage
probability for the cell-edge user was derived. The authors of
[23] proposed a multiple RISs-assisted NOMA scheme and
each RIS was assumed to serve a targeted user precisely.
RIS is able to be explored for ensuring the secure com-
munication of wireless networks and have been blended with
physical layer security. A RIS aided secure wireless transmis-
sion system was considered in [24], where the secrecy rate
was maximized to protect the privacy of users. In [25], the
authors evaluated secrecy performance of RIS aided multiple-
input single-output system by designing phase shift and beam-
forming. To further explore the secrecy performance of RIS-
NOMA networks, the authors of [26] focused on defending
eavesdropping by employing artificial noise. In [27] deployed
RIS to achieve higher channel gains and protect users from
vicious external Eves in NOMA networks. On this basis, further
investigation was processed in [28] to analyze the negative
effect caused by external/internal Eve on the secrecy outage
probability (SOP) as well as effective secrecy throughput of
RIS-NOMA. In [29], RIS was introduced to achieve reli-
able communication for two dead zone NOMA users with a
single/multiple-antenna base station (BS). To better understand
the benefits brought by multiple RISs, a secure NOMA trans-
mission scheme with distributed RISs was proposed in [30],
where transmitting power and phase shifters were optimized
jointly for maximal secrecy rate.
The previously mentioned theoretical literature has laid a sol-
id foundation for the comprehension of RIS-NOMA networks.
With regard to urban secure communication, the authors of [8]
highlighted the secrecy outage behaviour in an unified NOMA
network without utilizing RIS. Additionally, the authors of
[28] analyzed the secure performance of RIS-NOMA networks,
where only two users are taken into account. Inspired by the
treatises above, we specifically investigate secrecy performance
of RIS-NOMA networks, where the superimposed wireless sig-
nals are delivered from BS to multiple non-orthogonal users via
the assistance of RIS in the presence of Eves. More specifically,
the internal eavesdropping scenario is fully discussed. The on-
off control is selected to design the phase shifts of RIS because
of the finite resolution of practical IRS phase shifters.
II. SYSTEM MO DE L
A. System Descriptions
Considering a RIS-aided NOMA secure communication s-
cenario, where a base station transmits the superposed signals
to Kusers via the assistance of a RIS. For the purpose of
intuitive analysis, we assume that each node in the system is
equipped with single antenna. The RIS is mounted with M
reconfigurable reflecting elements, which can be controlled by
a programmable logic device. The complex channel coefficient
from the BS to RIS and from the RIS to k-th user are
represented by hbr CM×1,hrk CM×1, respectively.
Given that obstacles can scatter a great deal of radio signals
in practical urban district scenarios, all wireless links from
BS to RIS and to users are supposed to be Rayleigh fading
channels. The direct links between BS and users experience
severe attenuation, and thus the communication can be only
established through the RIS. Without loss of generality, the
cascade channel gains of BS-RIS and-users are ordered as
hH
r1Θhbr
26·· · 6hH
rk Θhbr
26·· · 6hH
rK Θhbr
2,
where Θ=βdiag e1, ejθ2..., eMCM×Mrepresents the
reflecting parameters matrix of RIS, β[0,1] and θm[0,2π)
are the reflecting amplitude parameter and the phase shift of
the m-th reflecting element, respectively.
B. Signal Model
In RIS-NOMA communication networks, the signal streams
of users are broadcast to each user by using the superposition
coding scheme. Hence the received signal at the k-th user is
shown as
yk=hH
rk Θhbr
K
i=1 aiPsxi+nk,(1)
where xiis supposed to be unity power signal for the i-th
user, i.e., E{|xi|2}= 1. The Psis the normalized transmission
power at BS. To ensure user fairness, aidenotes the power
allocation factor of the i-th user, which meets the relationship
a1>·· · >ak>·· · >aKwith
K
i=1
ai= 1.hbr =
h1
br ·· ·hm
br ···hM
br H, where hm
br CN (0, Nbr)denotes the
complex channel coefficient between BS and the m-th reflecting
element of RIS. The hrk =h1
rk ···hm
rk ···hM
rk H, where
hm
rk CN (0, Nrk )denotes the complex channel coefficient
between the m-th reflecting element of RIS and the k-th user.
The nkdenotes the additive white Gaussian noise (AWGN)
with mean power parameter NU. The αis path loss exponent.
dbr and drk denote the distance between BS and RIS, between
RIS and the k-th user, respectively.
According to the NOMA principle, the received signal-to-
interference-plus-noise ratio (SINR) for the k-th user to detect
the g-th user information (k>g) can be given by
γkg=ρhH
rk Θhbr
2ag
ρhH
rk Θhbr
2νg+ 1,(2)
where νg=K
i=g+1 ai,ρ=Ps
NUdenotes the transmit SNR of
channels between the BS and legitimate users.
After striking out the previous (K-1) users’ messages with
SIC, the received SINR for the K-th user to detect its own
information can be shown as
γK=ρhH
rK Θhbr
2aK.(3)
The broadcast characteristics are capable of increasing the
susceptibility to potential eavesdropping during the propagation
of wireless signals. In the case of internal eavesdropping
scenario, the most distant user, i.e., user 1, is regarded as
an internal Eve since it has the worst channel condition.
As a result, the received signal at internal Eve is given by
yIE =hH
r1Θhbr
K
i=1
aiPsxi+ne, where nerepresents the
AWGN of internal Eve with mean power parameter NE. In
this case, the SINR for internal Eve to detect the k-th user
information (1 <k<K) is given as follows
γIE k=hH
r1Θhbr
2akρe
ρehH
r1Θhbr
2νk+ 1,(4)
where νk=K
i=k+1 ai,ρe=Ps
NErepresents the transmit SNR
of eavesdropping channel from BS to internal Eve.
Similarly, the SINR for internal Eve to decode the K-th user’s
information can be given by
γIE K=hH
r1Θhbr
2aKρe.(5)
C. RIS-NOMA with On-off Control
As revealed in the aforementioned analysis, choosing an
appropriate phase shift design is pivotal to evaluating the secure
performance of RIS-NOMA networks. Hence, a typical type of
phase shift design, i.e., on-off control, is considered in this
paper, where each diagonal element of RIS is regarded as
1 (on) or 0 (off) [19, 20]. More specifically, suppose that M
=PQ, where Pand Qare both positive integers. We define
V=IP1QCM×Pand the p-th column of Vis denoted
by vp, where Iµdenotes a µ×µidentity matrix, 1µdenotes a
µ×1all-ones column vector and means Kronecker product.
As a result, the the cascaded Rayleigh channels hH
rk Θhbr
can be defined as Hk,hH
rk Θhbr =vH
pDrk hbr with
k= 1,2,·· · , K, where Dr k is diagonal matrices with its
diagonal elements composed from hH
rk .
With the design of on-off control, equation (2) and (3) can
be rewritten as
˜γkg=ρ|Hk|2ag
ρ|Hk|2νg+ 1,(6)
and
˜γK=ρ|HK|2aK,(7)
respectively. For the sake of facilitating subsequent analysis,
several channel statistical formulas are derived in the following.
Lemma 1. Under the condition of on-off control, the CDF of
SINR for the k-th user to decode the g-th user’s information (1
6g6k) can be given by
F˜γkg(x)κ
Kk
l=0 Kk
l(1)l
k+l12
Γ (Q)
×1
(agνgx)
Q
2
KQ1
(agνgx)k+l
,
(8)
where κ=K!
(Kk)!(k1)! ,λ=ρNbrNr k,KQ(x)denotes
the modified Bessel function of the second kind and Γ (Q)
represents the gamma function with parameter Q.
Proof: See Appendix A.
Lemma 2. After striking out the previous K-1 users messages,
the CDF of SINR for the K-th user to decode its own informa-
tion can be given by
F˜γK(x)κ
Kk
l=0 Kk
l(1)l
k+l
×12
Γ (Q)x
λaKQ
2
KQ2x
λaKk+l
.
(9)
III. SEC RE CY PERFORMANCE EVALUATIO N
In this section, the SOP is selected as a crucial metric to
evaluate the security performance of RIS-NOMA networks with
the existence of internal Eves. In order to trace the approximate
security features, secrecy diversity order is obtained in the high
SNR region according to the analytic outcomes.
A. Statistical Models for Wiretap Channels
Considering on-off control, the cascaded internal eavesdrop-
ping channels can be transformed into the following
˜γIE k=|H1|2akρe
ρe|H1|2νkx+ 1,(10)
and
˜γIE K=|H1|2aKρe,(11)
respectively.
Lemma 3. Under the condition of on-off control, the PDF of
SINR for the internal Eve to decode the k-th users information
is given by (12), shown at the top of next page, where p(x) =
x
(akνkx)ρeNbrNr1.
B. Secrecy Outage Probability
In this subsection, the closed-form and asymptotic SOP
expressions for users are obtained. We suppose that the most
distant user is regarded as the internal Eve and tends to wiretap
other users’ information. The secrecy rate for the k-th user
(k= 2,3,·· · , K) can be expressed as
CIE
k= [log2(1 + ˜γk)log2(1 + ˜γIE k)]+.(13)
Hence, the secrecy outage event occurs when the secrecy rate
CIE
kis less than the target secrecy rate RIE
kand the SOP
expression for the k-th user is given as follows
PIE
out,k (Rk) = P˜γk<2RIE
k(1 + ˜γI Ek)1
=
0
f˜γI Ek(x)F˜γk2RIE
k(1 + x)1dx.
(14)
Theorem 1. Under the condition of on-off control, the closed-
form expression of SOP for the internal Eve to decode infor-
mation of the k-th user is shown as,
PIE
out,k =κ
Kk
l=0 Kk
l(1)l
k+l
×12
Γ (Q){u(ς)}Q
2KQ2u(ς)k+l
,(15)
where u(ς) = ςλ1
akςνkand ς= 2RI E
k1 + QNbrNr1akρe
ρeQNbrNr1νk+1 1.
C. Secrecy Diversity Order
To gain more insights, the asymptotic performance in the
high SNR region of SOP is investigated. The secrecy diversity
order is expressed as follows
div =lim
ρ→∞
log [Pasy
out (ρ)]
log ρ,(16)
where Pasy
out (ρ)denotes the asymptotic SOP with factor ρ. The
asymptotic behaviors for users in internal wiretap scenarios is
analyzed in the following.
Corollary 1. Under the condition of internal eavesdropping,
the asymptotic SOPs of the k-th user at the high SNR regime
for Q= 1 and Q>2 are expressed as
PIE
asy,k RIE
k=κ
k11
Γ (Q){1 + u(ς) ln [u(ς)]}k
,(17)
and
PIE
asy,k RIE
k=κ
kς
(Q1) (akνkς)λk
,(18)
respectively.
Proof: According to [19], in the cases of Q= 1 and Q>
2,KQ(x)can be rewritten approximately as
KQ(x)1
x+x
2ln x
2,(19)
f˜γIEk(x)κ
Kk
l=0 Kk
l(1)l{12
Γ (Q)[p(x)]Q
2KQ2p(x)}k+l1
×ak[p(x)]Q1
Γ (Q) (akνkx)xp(x){KQ12p(x)+KQ+1 2p(x)} QKQ2p(x).(12)
and
KQ(x)1
2(Q1)!
(x/2)Q(Q2)!
(x/2)Q2.(20)
By substituting (15) into (19) and (20), we can obtain (17) and
(18), respectively, and the proof is completed.
Remark 1. Upon plugging (17) and (18) into (16), we see that
the secrecy diversity order becomes k which is associated with
channel ordering.
D. System Secrecy Outage Probability
In order to characterize the holistic secrecy performance
of RIS-NOMA networks, the system SOP can be defined as
follows
PIE
sys = 1
K
k=1 1PIE
out,k,(21)
where PIE
out,k can be obtained from (15).
E. Delay-Limited Transmission
Given the delay-limited transmission mode, the superposed
messages are transmitted at a constant rate, which is limited
to the SOP on account of the malicious attack from Eve.
Therefore, the secrecy system throughput of RIS-NOMA net-
works under delay-limited transmission mode can be defined
as follows
RIE
T=
K
k=1 1PIE
out,kRI E
k,(22)
where Pout,k can be acquired from (15).
TABLE I: The table of Monte Carlo simulation parameters
Average SNR of Eve ρe= 10 dB
The power allocation coefficient for users
a1= 0.6
a2= 0.3
a3= 0.1
The target secrecy rates for users RIE
k= 0.04 BPCU
k {1,2,3}
The distance from BS to RIS dbr = 3 m
The distance from RIS to users
dr1= 6 m
dr2= 4 m
dr3= 2 m
IV. NUMERICAL RES ULT S
In this section, numerical results are provided to substantiate
the accuracy of theoretical expressions derived in the afore-
mentioned sections. For sake of notational simplicity, Monte
Carlo simulation parameters involved are summarized in Table
I, where BPCU is an abbreviation for bit per channel use,
and the number of Monte Carlo repetitions is 106. The path
loss exponent αis set to 2. Suppose that K= 3 and the
variances of complex channel fading coefficients are repre-
sented as Nbr =dα
br and Nrk =dα
rk , respectively. Without
loss of the generality, the secure performance of RIS-NOMA
and conventional OMA transmission schemes are considered
benchmarks for comparison purposes.
Fig. 1 plots the SOP versus transmitting SNR in internal
eavesdropping scenario, where M= 16 and RIE
1=RIE
2=
RIE
3= 0.04 BPCU. The analysis curves demonstrated can be
acquired by (15). Additionally, asymptotes of SOP converge
in the high SNR region based on (17) and (18), which also
confirms the correctness of derivation. It can be seen that
user 3 has a lower outage probability compared with user 2.
This is due to the fact that user 3 is equipped with higher
quality channel conditions, which gives it a greater advantage
in anti-eavesdropping. Furthermore, we can also observe that
the secrecy outage behaviours of users are becoming worse
since the setup of on-off control varies from P= 2, Q= 8 to
P=Q= 4. The reason is that a smaller value of Qmeans
fewer elements at RIS are set to 1 (on) for arbitrary vpand the
channel gains for users are degraded because of the reduction
of working elements.
Fig. 2 plots the system SOP versus power allocation with
fixed transmitting SNR under internal eavesdropping scenarios,
where ρ= 10 dB, M= 16, P= 2, Q= 8 and RIE
1=RIE
2=
0.04 BPCU. Note that we consider a pair of users (K= 2) in
RIS-NOMA networks while the power allocation coefficients
for user 1 and user 2 are set as a1=aTand a2= 1 aT,
where aTpresents the power offset parameter ranging from
0 to 1, i.e., aT[0,1]. It can be seen from this figure that
as the value of aTincreases, the secrecy outage behaviours
of RIS-NOMA networks become worse seriously. This can be
explained that user 1 with poor channel conditions is regarded
as an internal Eve, and allocating more power to user 1 can
inevitably strengthen its eavesdropping ability while weakening
the received signal quality of another user, thus reducing the
system SOP.
Fig. 3 plots the secrecy system throughput versus SNR in
delay-limited transmission mode under internal eavesdropping
case, where ρe= 10 dB, M= 16, P= 2 and Q= 8.
-10 0 10 20 30 40
SNR (dB)
10-6
10-4
10-2
100
Secrecy outage probability
Simulation
Asymptotic
RIS-OMA
User2-Exact analysis
User3-Exact analysis
P = 2, Q = 8
P = 4, Q = 4
Fig. 1: SOP versus transmit SNR under internal eavesdropping
scenario, with M= 16, P= 2, Q= 8, ρe= 10 dB, RIE
1=
RIE
2=RIE
3= 0.04 and RIE
OM A = 0.12 BPCU.
Fig. 2: System SOP versus power allocation with fixed trans-
mitting SNR under internal eavesdropping scenario, where ρe
= 10 dB, RIE
1=RIE
2= 0.04 BPCU, M= 16, P= 2 and Q=
8.
The analysis curves of secrecy system throughput for RIS-
NOMA are plotted according to (15). As can be observed from
the figure, the improvement of secrecy system throughput is
achieved by increasing the target secrecy rate. This is because
that larger amounts of data stream can be transmitted with
a higher default value of target secrecy rate as long as no
secrecy outage occurs in RIS-NOMA networks. Considering
the secrecy outage behaviors are becoming worse when larger
target secrecy rate is applied in RIS-NOMA networks [28],
there exists a tradeoff to balance the performance of SOP and
secrecy system throughput.
0 10 20 30 40 50
SNR (dB)
0
0.1
0.2
0.3
0.4
0.5
Secrecy system throughput
Asymptotic
RIS-OMA
SST-IE-pSIC
R1
IE=0.08, R2
IE=0.17, R3
IE=0.25 BPCU
R1
IE=0.08, R2
IE=0.08, R3
IE=0.15 BPCU
Fig. 3: Secrecy system throughput versus transmitting SNR for
RIS-NOMA under internal eavesdropping case, where ρe= 10
dB and M= 16.
V. CONCLUSION
In this paper, the secrecy performance of RIS-NOMA net-
works were investigated with on-off control. New closed-form
and asymptotic expressions of SOP for the k-th user were
derived in RIS-NOMA networks. On this basis, the secrecy
diversity order of the k-th user was acquired which can be
determined by the channel ordering. Referring to the analytical
results, it was shown that the RIS-NOMA networks can obtain
a superior secrecy outage behavior compared with RIS-OMA.
Furthermore, the expressions of secrecy system throughput
in delay-limited transmission mode were derived. The results
showed that the throughput performance of RIS-NOMA is
much greater than that of RIS-OMA communication schemes.
APPENDIX A: PROO F OF LE MM A 1
The SINR for the k-th user to decode the g-th user’s
information is shown as ˜γkg=ρ|Hk|2ag
ρ|Hk|2νg+1 . Hence, the CDF
of ˜γkgis given by
F˜γkg(x) = Pγkg< x)
=Pρ|Hk|2ag
ρ|Hk|2νg+ 1 < x
=F|Hk|2x
(agνgx)ρ,(A.1)
The PDF of the cascaded channels from BS to RIS and to users
can be expressed as follows [31]
f|Hk|2(z) = 2zQ1
2
Γ (Q)NbrNr kQ+1 KQ12z
NbrNr k .
(A.2)
Applying integration operation and some simple manipulations
to (A.2), it can be rewritten as
F|Hk|2(z) = 4
Γ (Q)z
NbrNr k Q+1
2
×1
0
yQKQ12z
NbrNr k
ydy. (A.3)
According to [32, Eq. (6.561.8)], F|Hk|2(z)can be further
rewritten as
F|Hk|2(z) = 1 2
Γ (Q)z
NbrNr k Q
2
KQ2z
NbrNr k .
(A.4)
Considering hH
r1Θhbr
26·· · 6hH
rk Θhbr
26·· · 6
hH
rK Θhbr
2, the CDF of cascaded channel with order is given
by [33, 34]
FORD
|Hk|2(z) = κ
Kk
l=0 Kk
l(1)l
k+l
×12
Γ (Q)z
NbrNr k Q
2
KQ2z
NbrNr k k+l
.
(A.5)
By substituting (A.5) into (A.1), we obtain (8) and the proof
is completed.
REF ER EN CE S
[1] L. Dai, B. Wang, Y. Yuan, S. Han, I. Chih-lin, and Z. Wang, “Non-
orthogonal multiple access for 5G: solutions, challenges, opportunities,
and future research trends,” IEEE Commun. Mag., vol. 53, no. 9, pp.
74–81, Sep. 2015.
[2] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo,
“Nonorthogonal multiple access for 5G and beyond,” Proc. IEEE, vol.
105, no. 12, pp. 2347–2381, Dec. 2017.
[3] X. You, C.-X. Wang, J. Huang, X. Gao, Z. Zhang, M. Wang, Y. Huang,
C. Zhang, Y. Jiang, J. Wang et al., “Towards 6G wireless communication
networks: Vision, enabling technologies, and new paradigm shifts,” SCI
CHINA INFORM SCI, vol. 64, no. 1, pp. 1–74, 2021.
[4] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-
orthogonal multiple access in 5G systems with randomly deployed users,”
IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
[5] X. Yue, Y. Liu, S. Kang, A. Nallanathan, and Z. Ding, “Exploiting
full/half-duplex user relaying in NOMA systems,” IEEE Trans. Commun.,
vol. 66, no. 2, pp. 560–575, Feb. 2018.
[6] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the
physical layer security of non-orthogonal multiple access in large-scale
networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656–1672,
Mar. 2017.
[7] Z. Ding, Z. Zhao, M. Peng, and H. V. Poor, “On the spectral efficiency and
security enhancements of NOMA assisted multicast-unicast streaming,”
IEEE Trans. Commun., vol. 65, no. 7, pp. 3151–3163, Jul. 2017.
[8] X. Yue, Y. Liu, Y. Yao, X. Li, R. Liu, and A. Nallanathan, “Secure
communications in a unified non-orthogonal multiple access framework,
IEEE Trans. Wireless Commun., vol. 19, no. 3, pp. 2163–2178, Mar. 2020.
[9] B. Su, W. Yu, H. Liu, A. Chorti, and H. V. Poor, “Secure transmission
design for cooperative NOMA in the presence of internal eavesdropping,
IEEE Wireless Commun. Lett., to appear in 2022.
[10] Q. Wu and R. Zhang, “Intelligent reflecting surface enhanced wireless
network via joint active and passive beamforming, IEEE Trans. Wireless
Commun., vol. 18, no. 11, pp. 5394–5409, Nov. 2019.
[11] ——, “Towards smart and reconfigurable environment: Intelligent reflect-
ing surface aided wireless network,” IEEE Commun. Mag., vol. 58, no. 1,
pp. 106–112, Jan. 2020.
[12] Q. Wu, S. Zhang, B. Zheng, C. You, and R. Zhang, “Intelligent reflecting
surface-aided wireless communications: A tutorial,” IEEE Trans. Com-
mun., vol. 69, no. 5, pp. 3313–3351, May 2021.
[13] Y. Yang, B. Zheng, S. Zhang, and R. Zhang, “Intelligent reflecting surface
meets OFDM: Protocol design and rate maximization,” IEEE Trans.
Commun., vol. 68, no. 7, pp. 4522–4535, Jul. 2020.
[14] T. Van Chien, L. T. Tu, S. Chatzinotas, and B. Ottersten, “Coverage
probability and ergodic capacity of intelligent reflecting surface-enhanced
communication systems,” IEEE Commun. Lett., vol. 25, no. 1, pp. 69–73,
2021.
[15] B. Zheng, Q. Wu, and R. Zhang, “Intelligent reflecting surface-assisted
multiple access with user pairing: NOMA or OMA?” IEEE Commun.
Lett., vol. 24, no. 4, pp. 753–757, Apr. 2020.
[16] J. Zuo, Y. Liu, Z. Qin, and N. Al-Dhahir, “Resource allocation in
intelligent reflecting surface assisted NOMA systems,” IEEE Trans.
Commun., vol. 68, no. 11, pp. 7170–7183, Nov. 2020.
[17] Y. Guo, Z. Qin, Y. Liu, and N. Al-Dhahir, “Intelligent reflecting surface
aided multiple access over fading channels, IEEE Trans. Commun.,
vol. 69, no. 3, pp. 2015–2027, Mar. 2021.
[18] Z. Ding, R. Schober, and H. V. Poor, “On the impact of phase shifting
designs on IRS-NOMA,” IEEE Wireless Commun. Lett., vol. 9, no. 10,
pp. 1596–1600, Oct. 2020.
[19] Z. Ding and H. Vincent Poor, “A simple design of IRS-NOMA transmis-
sion,” IEEE Commun. Lett., vol. 24, no. 5, pp. 1119–1123, May 2020.
[20] X. Yue and Y. Liu, “Performance analysis of intelligent reflecting surface
assisted NOMA networks,” IEEE Trans. Wireless Commun., vol. 21, no. 4,
pp. 2623–2636, Apr. 2022.
[21] Z. Sun and Y. Jing, “On the performance of multi-antenna IRS-assisted
NOMA networks with continuous and discrete IRS phase shifting,” IEEE
Trans. Wireless Commun., To appear in 2022.
[22] Y. Cheng, K. H. Li, Y. Liu, K. C. Teh, and H. Vincent Poor, “Downlink
and uplink intelligent reflecting surface aided networks: NOMA and
OMA,” IEEE Trans. Wireless Commun., vol. 20, no. 6, pp. 3988–4000,
Jun. 2021.
[23] Y. Cheng, K. H. Li, Y. Liu, K. C. Teh, and G. K. Karagiannidis, “Non-
orthogonal multiple access (NOMA) with multiple intelligent reflecting
surfaces,” IEEE Trans. Wireless Commun., vol. 20, no. 11, pp. 7184–7195,
Nov. 2021.
[24] M. Cui, G. Zhang, and R. Zhang, “Secure wireless communication via
intelligent reflecting surface,” IEEE Wireless Commun. Lett., vol. 8, no. 5,
pp. 1410–1414, Oct. 2019.
[25] X. Yu, D. Xu, and R. Schober, “Enabling secure wireless communications
via intelligent reflecting surfaces,” in IEEE Proc. of Global Commun.
Conf. (GLOBECOM), Dec. 2019, pp. 1–6.
[26] Z. Zhang, L. Lv, Q. Wu, H. Deng, and J. Chen, “Robust and secure com-
munications in intelligent reflecting surface assisted NOMA networks,”
IEEE Commun. Lett., vol. 25, no. 3, pp. 739–743, Mar. 2021.
[27] L. Yang, J. Yang, W. Xie, M. O. Hasna, T. Tsiftsis, and M. D. Renzo,
“Secrecy performance analysis of RIS-aided wireless communication
systems,” IEEE Trans. Veh. Technol., vol. 69, no. 10, pp. 12 296–12 300,
Oct. 2020.
[28] C. Gong, X. Yue, X. Wang, X. Dai, R. Zou, and M. Essaaidi, “Intelligent
reflecting surface aided secure communications for NOMA networks,”
IEEE Trans. Veh. Technol., vol. 71, no. 3, pp. 2761–2773, Mar. 2022.
[29] Z. Zhang, J. Chen, Q. Wu, Y. Liu, L. Lv, and X. Su, “Securing
NOMA networks by exploiting intelligent reflecting surface, IEEE Trans.
Commun., vol. 70, no. 2, pp. 1096–1111, Feb. 2022.
[30] Z. Zhang, C. Zhang, C. Jiang, F. Jia, J. Ge, and F. Gong, “Improving
physical layer security for reconfigurable intelligent surface aided NOMA
6G networks,” IEEE Trans. Veh. Technol., vol. 70, no. 5, pp. 4451–4463,
May 2021.
[31] H. Liu, H. Ding, L. Xiang, J. Yuan, and L. Zheng, “Outage and BER
performance analysis of cascade channel in relay networks,” vol. 34, pp.
23–30, Aug. 2014.
[32] I. Gradˇ
stejn and I. M. Ryˇ
zik, “Table of integrals, series, and products,
6th ed,” 2000.
[33] H. A. David and H. N. Nagaraja, Order statistics. John Wiley & Sons,
2004.
[34] F. Fang, Y. Xu, Q.-V. Pham, and Z. Ding, “Energy-efficient design of irs-
noma networks,” IEEE Trans. Veh. Technol., vol. 69, no. 11, pp. 14 088–
14 092, Nov. 2020.
Article
Full-text available
Intelligent reflecting surface (IRS) is deemed a promising technique for future wireless and mobile technologies due to its ability to reconfigure the radio propagation environment. In this paper, we analyze the physical layer security (PLS) of a downlink non-orthogonal multiple access (NOMA) network through an IRS intended for assisting the wireless transmission, taking into account the external and internal eavesdropping scenarios. Considering the hardware limitations, a 1-bit coding scheme is utilized to investigate the secrecy performance of the IRS-aided NOMA network. Exact and asymptotic expressions in terms of the secrecy outage probability (SOP) and the effective secrecy throughput (EST) are presented, which are in consideration of the imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC). Based on the analytical results, the secrecy diversity orders are related to the number of reflecting elements and EST ceilings are observed in the high SNR regime. Monte Carlo simulations are presented to corroborate the correctness of the analyses and illustrate that the IRS-aided NOMA scheme is superior in the secrecy outage performance to the IRS-aided orthogonal multiple access and conventional relaying schemes. In addition, the SOP performance enhancement through the increased number of reflecting elements and the improvement of EST through proper target secrecy rate are also evidenced by the simulations.
Article
Full-text available
Intelligent reflecting surface (IRS) is a promising technology to enhance the coverage and performance of wireless networks. We consider the application of IRS to non-orthogonal multiple access (NOMA), where a base station transmits superposed signals to multiple users by the virtue of an IRS. The performance of an IRS-assisted NOMA networks with imperfect successive interference cancellation (ipSIC) and perfect successive interference cancellation (pSIC) is investigated by invoking 1-bit coding scheme. In particular, we derive new exact and asymptotic expressions for both outage probability and ergodic rate of the m-th user with ipSIC/pSIC. Based on analytical results, the diversity order of the m-th user with pSIC is in connection with the number of reflecting elements and channel ordering. The high signal-to-noise radio (SNR) slope of ergodic rate for the m-th user is obtained. The throughput and energy efficiency of IRS-NOMA networks are discussed both in delay-limited and delay-tolerant transmission modes. Additionally, we derive new exact expressions of outage probability and ergodic rate for IRS-assisted orthogonal multiple access (IRS-OMA). Numerical results are presented to substantiate our analyses and demonstrate that: i) The outage behaviors of IRS-NOMA are superior to that of IRS-OMA and relaying schemes; ii) The M-th user has a larger ergodic rate than IRS-OMA and benchmarks. However, the ergodic performance of the m-th user exceeds relaying schemes in the low SNR regime; and iii) The IRS-assisted NOMA networks have ability to achieve the enhanced energy efficiency compared to conventional cooperative communications.
Article
Full-text available
The fifth generation (5G) wireless communication networks are being deployed worldwide from 2020 and more capabilities are in the process of being standardized, such as mass connectivity, ultra-reliability, and guaranteed low latency. However, 5G will not meet all requirements of the future in 2030 and beyond, and sixth generation (6G) wireless communication networks are expected to provide global coverage, enhanced spectral/energy/cost efficiency, better intelligence level and security, etc. To meet these requirements, 6G networks will rely on new enabling technologies, i.e., air interface and transmission technologies and novel network architecture, such as waveform design, multiple access, channel coding schemes, multi-antenna technologies, network slicing, cell-free architecture, and cloud/fog/edge computing. Our vision on 6G is that it will have four new paradigm shifts. First, to satisfy the requirement of global coverage, 6G will not be limited to terrestrial communication networks, which will need to be complemented with non-terrestrial networks such as satellite and unmanned aerial vehicle (UAV) communication networks, thus achieving a space-air-ground-sea integrated communication network. Second, all spectra will be fully explored to further increase data rates and connection density, including the sub-6 GHz, millimeter wave (mmWave), terahertz (THz), and optical frequency bands. Third, facing the big datasets generated by the use of extremely heterogeneous networks, diverse communication scenarios, large numbers of antennas, wide bandwidths, and new service requirements, 6G networks will enable a new range of smart applications with the aid of artificial intelligence (AI) and big data technologies. Fourth, network security will have to be strengthened when developing 6G networks. This article provides a comprehensive survey of recent advances and future trends in these four aspects. Clearly, 6G with additional technical requirements beyond those of 5G will enable faster and further communications to the extent that the boundary between physical and cyber worlds disappears.
Article
The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers. To address this potential security and reliability flaw, by assuming all users are untrusted, this letter investigates the effective secrecy throughput (EST) for a cooperative NOMA system, where a near user serves as an amplify-and-forward relay to help forward the information of a far user. Considering the inverse power allocation and SIC decoding order, a novel jamming strategy is proposed to enhance the security performance of the far user. Gauss-Chebyshev approximations of ESTs over Nakagami- ${m}$ channels are derived. Asymptotic EST expressions are proposed to provide further insights. Numerical results demonstrate that the proposed jamming strategy and the inverse power allocation and SIC decoding order are both essential for achieving positive secrecy rates for both users.
Article
This paper investigates the security enhancement of an intelligent reflecting surface (IRS) assisted non-orthogonal multiple access (NOMA) network, where a base station (BS) serves users securely with the assistance of distributed IRSs. Considering that eavesdropper’s instantaneous channel state information (CSI) is challenging to acquire in practice, we utilize secrecy outage probability (SOP) as the security metric. A problem of maximizing the minimum secrecy rate among users, by jointly optimizing transmit beamforming at the BS and phase shifts of the IRSs, is formulated. For a special case with a single-antenna BS, we derive the closed-form SOP expressions and propose a novel ring-penalty based successive convex approximation (SCA) algorithm to design transmit power and phase shifts jointly. For a general multi-antenna BS case, we develop a Bernstein-type inequality based alternating optimization (AO) algorithm to solve the challenging problem. Numerical results demonstrate the advantages of the proposed algorithms over the baseline schemes. The results also show that: 1) the maximum secrecy rate is achieved when distributed IRSs share the reflecting elements equally; and 2) the distributed IRS deployment does not always outperform the centralized IRS deployment, due to the tradeoff between the number of IRSs and the reflecting elements equipped at each IRS.
Article
In this paper we study an intelligent reflecting surface (IRS) assisted non-orthogonal multiple access (NOMA) network where the direct link between the base station (BS) and one of the users is blocked and the IRS is deployed to serve the blocked user. The IRS designs under both the ideal IRS with continuous phase shifting and the non-ideal IRS with discrete phase shifting are considered. For both cases, by leveraging the isotropic random vector and the Laguerre series, we derive insightful results and closed-form expressions on the performance measures including the average required transmit power, the outage probability, and the diversity order. Our analytical results show that the transmit power scales down linearly with the BS antenna number and quadratically with the IRS element number. The diversity order equals the smaller of the BS antenna number and the IRS element number with a scaling coefficient. Our results also reveal the effect of the phase quantization resolution to the system performance when non-ideal IRS is used. Numerical results are provided to validate the accuracy of our analysis and the non-ideal IRS with four or more bits for quantization is shown to achieve nearly the same performance as the ideal IRS.
Article
In this paper, non-orthogonal multiple access (NOMA) networks assisted by multiple intelligent reflecting surfaces (IRSs) with discrete phase shifts are investigated, in which each user device (UD) is served by an IRS to improve the quality of the received signal. Two scenarios are considered according to whether there is a direct link between the base station (BS) and each UD, and the outage performance is analyzed for each of them. Specifically, the asymptotic expressions for the upper and lower bounds of the outage probability in the high signal-to-noise ratio (SNR) regime are derived. Following that, the diversity order is obtained. It is shown that the use of discrete phase shifts does not degrade diversity order. More importantly, simulation results reveal that a 3-bit resolution for discrete phase shifts is sufficient to achieve near-optimal outage performance. Simulation results also imply the superiority of IRSs over full-duplex decode-and-forward relays.
Article
The intrinsic integration of the nonorthogonal multiple access (NOMA) and reconfigurable intelligent surface (RIS) techniques is envisioned to be a promising approach to significantly improve both the spectrum efficiency and energy efficiency for future wireless communication networks. In this paper, the physical layer security (PLS) for a RIS-aided NOMA 6G networks is investigated, in which a RIS is deployed to assist the two "dead zone" NOMA users and both internal and external eavesdropping are considered. For the scenario with only internal eavesdropping, we consider the worst case that the near-end user is untrusted and may try to intercept the information of far-end user. A joint beamforming and power allocation sub-optimal scheme is proposed to improve the system PLS. Then we extend our work to a scenario with both internal and external eavesdropping. Two sub-scenarios are considered in this scenario: one is the sub-scenario without channel state information (CSI) of eavesdroppers, and another is the sub-scenario where the eavesdroppers' CSI are available. For the both sub-scenarios, a noise beamforming scheme is {\blue introduced to be against} the external eavesdroppers. An optimal power allocation scheme is proposed to further improve the system physical security for the second sub-scenario. Simulation results show the superior performance of the proposed schemes. Moreover, it has also been shown that increasing the number of reflecting elements can bring more gain in secrecy performance than that of the transmit antennas.
Article
Intelligent reflecting surface (IRS) is an enabling technology to engineer the radio signal propagation in wireless networks. By smartly tuning the signal reflection via a large number of low-cost passive reflecting elements, IRS is capable of dynamically altering wireless channels to enhance the communication performance. It is thus expected that the new IRS-aided hybrid wireless network comprising both active and passive components will be highly promising to achieve a sustainable capacity growth cost-effectively in the future. Despite its great potential, IRS faces new challenges to be efficiently integrated into wireless networks, such as reflection optimization, channel estimation, and deployment from communication design perspectives. In this paper, we provide a tutorial overview of IRS-aided wireless communications to address the above issues, and elaborate its reflection and channel models, hardware architecture and practical constraints, as well as various appealing applications in wireless networks. Moreover, we highlight important directions worthy of further investigation in future work.
Article
Intelligent reflecting surfaces (IRSs) are envisioned to provide reconfigurable wireless environments for future communication networks. In this paper, both downlink and uplink IRS-aided non-orthogonal multiple access (NOMA) and orthogonal multiple access (OMA) networks are studied, in which an IRS is deployed to enhance the coverage by assisting a cell-edge user device (UD) to communicate with the base station (BS). To characterize system performance, new channel statistics of the BS-IRS-UD link with Nakagami- $m$ fading are investigated. For each scenario, the closed-form expressions for the outage probability and ergodic rate are derived. To gain further insight, the diversity order and high signal-to-noise ratio (SNR) slope for each scenario are obtained according to asymptotic approximations in the high-SNR regime. It is demonstrated that the diversity order is affected by the number of IRS reflecting elements and Nakagami fading parameters, but the high-SNR slope is not related to these parameters. Simulation results validate our analysis and reveal the superiority of the IRS over the full-duplex decode-and-forward relay.