Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
153 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Secure Outage Analysis for RIS-Aided MISO Systems with Randomly Located Eavesdroppers (2403.14911v1)

Published 22 Mar 2024 in cs.IT, eess.SP, and math.IT

Abstract: In this paper, we consider the physical layer security of an RIS-assisted multiple-antenna communication system with randomly located eavesdroppers. The exact distributions of the received signal-to-noise-ratios (SNRs) at the legitimate user and the eavesdroppers located according to a Poisson point process (PPP) are derived, and a closed-form expression for the secrecy outage probability (SOP) is obtained. It is revealed that the secrecy performance is mainly affected by the number of RIS reflecting elements, and the impact of the transmit antennas and transmit power at the base station is marginal. In addition, when the locations of the randomly located eavesdroppers are unknown, deploying the RIS closer to the legitimate user rather than to the base station is shown to be more efficient. We also perform an analytical study demonstrating that the secrecy diversity order depends on the path loss exponent of the RIS-to-ground links. Finally, numerical simulations are conducted to verify the accuracy of these theoretical observations.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (22)
  1. W. Shi, J. Xu, W. Xu, C. Yuen, A. L. Swindlehurst, and C. Zhao, “On secrecy performance of RIS-assisted MISO systems over Rician channels with spatially random eavesdroppers,” IEEE Trans. Wireless Commun., early access. doi: 10.1109/TWC.2023.3348591.
  2. F. Naeem, M. Ali, G. Kaddoum, C. Huang, and C. Yuen, “Security and privacy for reconfigurable intelligent surface in 6G: A review of prospective applications and challenges”, IEEE Open J. Commun. Soc., vol. 4, pp. 1196–1217, May 2023.
  3. W. Shi, W. Xu, X. You, C. Zhao, and K. Wei, “Intelligent reflection enabling technologies for integrated and green Internet-of-Everything beyond 5G: Communication, sensing, and security,” IEEE Wireless Commun., vol. 30, no. 2, pp. 147–154, Apr. 2023.
  4. H. Zhang, B. Di, L. Song, and Z. Han, “Reconfigurable intelligent surfaces assisted communications with limited phase shifts: How many phase shifts are enough?,” IEEE Trans. Veh. Technol., vol. 69, no. 4, pp. 4498–4502, Apr. 2020.
  5. C. Huang, A. Zappone, G. C. Alexandropoulos, M. Debbah, and C. Yuen, “Reconfigurable intelligent surfaces for energy efficiency in wireless communication,” IEEE Trans. Wireless Commun., vol. 18, no. 8, pp. 4157–4170, Aug. 2019.
  6. Z. Wan, Z. Gao, F. Gao, M. Di Renzo, and M.-S. Alouini, “Terahertz massive MIMO with holographic reconfigurable intelligent surfaces,” IEEE Trans. Commun., vol. 69, no. 7, pp. 4732–4750, Jul. 2021.
  7. J. Yao, J. Xu, W. Xu, D. W. K. Ng, C. Yuen, and X. You, “Robust beamforming design for RIS-aided cell-free systems with CSI uncertainties and capacity-limited backhaul,” IEEE Trans. Commun., vol. 71, no. 8, pp. 4636–4649, Aug. 2023.
  8. J. Yao, W. Xu, X. You, D. W. K. Ng, and J. Fu, “Robust beamforming design for reconfigurable intelligent surface-aided cell-free systems,” in Proc. IEEE Int. Symp. Wireless Commun. Syst. (ISWCS), Hangzhou, China, 2022, pp. 1–6.
  9. J. Xu, W. Xu, D. W. K. Ng, and A. L. Swindlehurst, “Secure communication for spatially sparse millimeter-wave massive MIMO channels via hybrid precoding,” IEEE Trans. Commun., vol. 68, no. 2, pp. 887–901, Feb. 2020.
  10. Y. Guo, R. Zhao, S. Lai, L. Fan, X. Lei, and G. K. Karagiannidis, “Distributed machine learning for multiuser mobile edge computing systems,” IEEE J. Sel. Topics Signal Process., vol. 16, no. 3, pp. 460–473, Apr. 2022.
  11. W. Shi, J. Xu, W. Xu, M. Di Renzo, and C. Zhao, “Secure outage analysis of RIS-assisted communications with discrete phase control,” IEEE Trans. Veh. Technol., vol. 72, no. 4, pp. 5435–5440, Apr. 2023.
  12. L. Wei, K. Wang, C. Pan, and M. Elkashlan, “Secrecy performance analysis of RIS-aided communication system with randomly flying eavesdroppers,” IEEE Wireless Commun. Lett., vol. 11, no. 10, pp. 2240–2244, Oct. 2022.
  13. W. Wang, H. Tian, and W. Ni, “Secrecy performance analysis of IRS-aided UAV relay system,” IEEE Wireless Commun. Lett., vol. 10, no. 12, pp. 2693–2697, Dec. 2021.
  14. J. Yao, J. Xu, W. Xu, C. Yuen, and X. You, “A universal framework of superimposed RIS-phase modulation for MISO communication,” IEEE Trans. Veh. Technol., vol. 72, no. 4, pp. 5413–5418, Apr. 2023.
  15. J. Yao, J. Xu, W. Xu, C. Yuen, and X. You, “Superimposed RIS-phase modulation for MIMO communications: A novel paradigm of information transfer,” IEEE Trans. Wireless Commun., early access. doi: 10.1109/TWC.2023.3304695.
  16. S. Zhou, W. Xu, K. Wang, M. Di Renzo and M.-S. Alouini, “Spectral and energy efficiency of IRS-assisted MISO communication with hardware impairments,” IEEE Wireless Commun. Lett., vol. 9, no. 9, pp. 1366–1369, Sept. 2020.
  17. M. Z. Bocus, C. P. Dettmann, and J. P. Coon, “An approximation of the first order Marcum Q𝑄Qitalic_Q-function with application to network connectivity analysis,” IEEE Commun. Lett., vol. 17, no. 3, pp. 499–502, Mar. 2013.
  18. Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656–1672, Mar. 2017.
  19. Wolfram Research, “The Wolfram functions site: Meijer G-function,” 2001. [Online]. Available: https://functions.wolfram.com/PDF/MeijerG.pdf
  20. R. W. Heath, M. Kountouris, and T. Bai, “Modeling heterogeneous network interference using poisson point processes,” IEEE Trans. Signal Process., vol. 61, no. 16, pp. 4114–4126, Aug. 2013.
  21. W. Xu, J. Liu, S. Jin, and X. Dong, “Spectral and energy efficiency of multi-pair massive MIMO relay network with hybrid processing,” IEEE Trans. Commun., vol. 65, no. 9, pp. 3794–3809, Sept. 2017.
  22. G. Chen, J. P. Coon, and M. Di Renzo, “Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 5, pp. 1195–1206, May 2017.
Citations (2)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com