Next Article in Journal
Embedding AI-Enabled Data Infrastructures for Sustainability in Agri-Food: Soft-Fruit and Brewery Use Case Perspectives
Previous Article in Journal
Synthesis of 2MP-CuNPs Fluorescent Probes and Their Application in Tetracycline Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Intelligent Reflecting Surfaces and Artificial Noise-Assisted Cell-Free Massive MIMO Against Simultaneous Jamming and Eavesdropping

PLA Army Engineering University, Nanjing 210007, China
*
Author to whom correspondence should be addressed.
Member, IEEE.
Sensors 2024, 24(22), 7326; https://doi.org/10.3390/s24227326
Submission received: 5 October 2024 / Revised: 25 October 2024 / Accepted: 1 November 2024 / Published: 16 November 2024
(This article belongs to the Section Physical Sensors)

Abstract

:
In a cell-free massive multiple-input multiple-output (MIMO) system without cells, it is assumed that there are smart jammers and disrupters (SJDs) that attempt to interfere with and eavesdrop on the downlink communications of legitimate users. A secure transmission scheme based on multiple intelligent reflecting surfaces (IRSs) and artificial noise (AN) is proposed. First, an access point (AP) selection strategy based on user location information is designed, which aims to determine the set of APs serving users. Then, a joint optimization framework based on the block coordinate descent (BCD) algorithm is constructed, and a non-convex optimization solution based on the univariate function optimization and semi-definite relaxation (SDR) is proposed with the aim of maximising the minimum achievable secrecy rate for users. By solving the univariate function maximisation problem, the multi-variable coupled non-convex problem is transformed into a solvable convex problem, obtaining the optimal AP beamforming, AN matrix and IRS phase shift matrix. Specifically, in a single-user scenario, the scheme of multiple intelligent reflecting surfaces combined with artificial noise can improve the user’s achievable secrecy rate by about 11% compared to the existing method (single intelligent reflective surface combined with artificial noise) and about 2% compared to the scheme assisted by multiple intelligent reflecting surfaces without artificial noise assistance.

1. Introduction

The natural openness and broadcast nature of the wireless channel pose a significant security risk to wireless transmissions. In wireless communication systems, interference and eavesdropping can cause serious practical harm, such as reducing communication quality, causing communication disruptions, leaking personal privacy, stealing trade secrets, hindering industrial production, and threatening national security. In the 6G network, anti-interference has many potential application scenarios, such as being used in intelligent transportation systems, the industrial Internet of Things, safeguarding military operations, protecting the core secrets of enterprises, the financial industry, and the government, and enhancing personal privacy communications. The jammer sends jamming information to the user by means of full duplex techniques and by adjusting its precoding [1] in order to reduce the signal-to-noise ratio (SINR) of the destination user. Active or passive Eve uses the propagation characteristics of the wireless channel to steal information from legitimate users, resulting in system information leakage. Traditional approaches focus on enhancing the physical layer security of the system by intelligently designing transmission coding strategies, developing keys on the common channel and establishing collaborative contract relays [2,3,4]. The literature [5] proposed to use the random fading property of the wireless channel to protect the information transmission and prevent the information access by illegal receivers. Based on Shannon’s information theory, Wyner was the first to propose the concept of secrecy capacity in [6] as a measure of system security performance. In [7], the authors proved that the secrecy capacity of the system in the Gaussian noise channel model is equal to the difference between the legitimate user channel and the eavesdropping channel. The authors in [8] extended this conclusion to broadcast channels and Rayleigh fading channels. Since then, the wire-tap model has been widely used to study secure communications in eavesdropping and jamming scenarios, mainly involving multiple-input single-output (MISO), multiple-input multiple-output (MIMO), millimeter-wave and terahertz scenarios.
Massive MIMO, a key technology for 5G mobile communications, has been a hot topic of research in academia. Massive MIMO uses the characteristics of “channel solidification” and “favorable propagation” to reduce the complexity of signal processing and significantly improve the spectral efficiency and energy efficiency of communication systems [9,10]. Massive MIMO has also been of concern in terms of physical layer security. On the one hand, an attacker can take advantage of the high array gain of massive MIMO, which is sensitive to channel estimation error, to send malicious pilot sequences to increase the channel estimation error and induce the base station beamforming to point at the attacker, thus reducing the security capacity of the system [11]. On the other hand, it is possible for attackers to observe the spectrum data of legitimate users by monitoring base stations continuously. They can then use machine learning, full-duplex technology and other techniques to disguise themselves more convincingly and employ intelligent interference methods, which makes secure transmission in large-scale MIMO scenarios even more challenging. With the rapid development of artificial intelligence, smart jamming techniques have been further studied. The existing intelligent interference technology is a multiple overlapping of cognitive interference and intelligent interference in terms of connotation and extension [12]. Most scholars study only from the theory of cognitive radio and jamming strategy, and there are fewer studies on smart jamming devices (intelligent devices integrating jamming and eavesdropping). Intelligent jamming devices can masquerade as legitimate users to steal information transmitted from the base station to legitimate users, and it can also send malicious messages to interfere with the reception of legitimate users. Current anti-jamming techniques only consider scenarios of jamming or eavesdropping, and rarely study secure transmission in harsh communication environments where both jamming and eavesdropping are present.
Cell-free massive MIMO is based on the idea of breaking the “cell-centric” architecture and adopting a “user-centric” network architecture, effectively avoiding the “edge effect” of cellular cells and the signaling interactions caused by cell switching [13,14]. The differentiated network architecture and incremental signal processing methods introduce novel security concerns at the physical layer of de-cellular massive MIMO.

1.1. Motivations

At present, research on cell-free massive MIMO secure transmission is still in its infancy. Ref. [15] addressed the secure transmission problem in cellular massive MIMO under Rayleigh channel conditions with multiple eavesdroppers. The authors derive a closed-form expression for the achievable secrecy rate based on an additive white Gaussian noise model. Ref. [16] studied secure transmission under Rician channel conditions in the presence of multiple antenna Eve in cell-free massive MIMO, relying on an additive quantized noise model to derive a closed-form expression for the achievable secrecy rate. Ref. [17] proposed a full-duplex based cell-free massive MIMO anti-eavesdropping method to maximize the system secrecy capacity by optimizing the duplex selection mode and secrecy transmission. Ref. [18] studied the downlink confidential transmission of the system under energy recovery constraints and proposed a transmission power optimization scheme based on semi-definite relaxation planning. Refs. [19,20,21] investigated the problem of secrecy optimization for resisting active eavesdropping attacks under the conditions of spatially correlated Riley fading, transceiver hardware damage, and identification of guided frequency spoofing attacks, respectively.
An Intelligent Reflecting Surface (IRS) is considered to be a key technology for 6G, and research into its relevance to wireless communications is in full swing. Ref. [22] investigated IRS-assisted single-input single-output (SISO) communication with multiple single-antenna users to minimize transmitted power by jointly optimizing the base station precoding matrix and the IRS reflected phase. Ref. [23] proposed to design the base station transmit power and IRS phase shift to improve the energy efficiency of the system while ensuring the direct link boundary between the user and the base station.The literature [24] proposes a signal beam routing methodology utilizing multiple IRS reflections with the objective of investigating wireless power transfer from a multiple-antenna base station to multiple energy users (EUs). The proposal set forth in the literature [25] is to provide support for disparate user groups through the deployment of multiple RSs. This approach effectively mitigates interference and leverages secondary reflections between IRSs, enhancing the data rate for each user. Research on IRS-assisted communications has become progressively more extensive and in-depth, focusing on IRS-assisted channel estimation [26,27], beamforming and reflection phase shift optimization [22,28,29], and deployment strategies [30,31].
The enhancement of wireless communication physical layer security by the IRS represents a promising avenue of research, although it is still in its nascent stages. Ref. [32] investigated single-antenna Eve scenarios in which IRS-assisted multi-antenna AP send confidential information to users. AP beamforming and IRS phase-shift are jointly designed to maximize the secrecy rate under the constraints that the channel space is highly correlated and the eavesdropping channel is stronger than the legitimate channel. Ref. [33] investigated the channel state information (CSI) of imperfectly known multi-antenna Eve and jointly optimized artificial noise (AN), beamforming and IRS reflection phase shift sent by base stations to build physical layer security in a radio environment. Refs. [34,35] reviewed the latest applications of IRS in future wireless networks and the design of secure transmissions, using IRS to modulate uncontrollable radio fading channels and build intelligent radio environments. Current research scenarios on IRS-assisted secure communication are dominated by MISO, MIMO, non-orthogonal multiple access (NOMA), and millimeter wave. Research combining IRS with cell-free massive MIMO has also only appeared in [36,37,38] but is also limited to assisted augmented communication, and exploration regarding secure transmission has yet to occur.

1.2. Contributions

For these reasons, this paper initially explores the potential of multi-IRS assisted cell-free massive MIMO secure transmission. The multi-IRS localization method of [39] is used to initially determine the legitimate user location information, and using a large-scale fading-based AP selection strategy, the user’s service AP set is determined. The AP emission precoding, AN matrix and IRS reflection phase shift are designed collaboratively to maximize the minimum secrecy rate of the user. The main work is as follows.
  • We construct a joint framework for multi-IRS and AN-assisted cell-free massive MIMO downlink robust and secure communication, proposing a model to resist transient interference and eavesdropping.
  • Determining the initial location information of legitimate users through IRS localization methods and determining the service AP set of users based on a large-scale fading AP selection strategy.
  • The joint design of AP beamforming, AN matrix and IRS reflection phase shift to maximize the minimum achievable secrecy rate of the user under the constraint of satisfying the total power and IRS unit modulus.
  • The numerical simulation experimental results demonstrate the effectiveness of the proposed multi-IRS joint AN scheme, which provides ideas for single-IRS to multi-IRS assisted physical layer security research.

1.3. Methods

In order to reduce the interference to downlink users, we propose to jointly design an intelligent reflecting phase and artificial noise matrix. A joint optimization framework based on the block coordinate descent algorithm is designed with the aim of maximizing the minimum achievable secrecy rate of the users, and a non-convex optimization solution method based on univariate function optimization and semi-definite relaxation is formulated. Specifically, based on the BCD algorithm, the optimal AP beamforming, AN matrix and IRS phase shift matrix are obtained by solving the single-variable function-maximum problem and transforming the multivariable coupled non-convex problem into a solvable convex problem.

1.4. Organizations

The main structure of this paper is as follows. Section 2 shows the system model for multi-IRS assisted cell-free massive MIMO secure transmission. In Section 3, we describe the problem and propose an objective function for optimization. In Section 4, we present a joint precoding and AN design framework for maximizing the minimum achievable secrecy rate for the user. The results of simulation experiments and discussion are presented in Section 5 to verify the performance of the proposed scheme. Finally, conclusions are drawn in Section 6.

1.5. Notations

In the paper, lowercase bold letters represent a vector, while uppercase bold letters represent a matrix. [ · ] 1 , [ · ] T , and  [ · ] H denote the inverse, transpose, and conjugate transpose operations, respectively. C M × N represents the set of all M × N complex-valued matrices. |a| denotes the Euclidean norm of a. A ⪰ 0 indicates that A is a positive semidefinite matrix. Tr(A) represents the trace of matrix A. E [ · ] is the expectation operator, and diag(·) represents the diagonal operation 0L denotes a column vector of length L with all elements equal to 0.

2. System Model

2.1. Channel Model

As shown in Figure 1, multiple IRSs assisted cell-free massive MIMO secure communication networks. L multi-antenna APs jointly serve K single-antenna legal users through I IRSs. There is a smart jamming device (SJD) integrating jamming and eavesdropping in the system, trying to interfere and eavesdrop on the information of legitimate users. Both APs and SJD can transmit information to users through two paths, direct channel or cascaded channel. Each AP is equipped with Q antennas, and the SJD is equipped with Q e + 1 antennas. The Q e antennas is used to jam users, and the other antenna is disguised as a single-antenna user to steal legitimate user information. Consider deploying I IRS, each with N antennas. The AP and IRS are connected to the central processing unit (CPU) through the fronthaul link, and the CPU jointly designs the AP beamforming, AN matrix and IRS phase-shift matrix to resist malicious interference and eavesdropping of SJD.
As shown in Figure 2, h k , l H C 1 × Q represents the direct channel between the l-th AP and the k-th user, g k , i H C 1 × N represents the channel between the i-th IRS and the k-th user, and  G i , q C N × Q represents the channel between the q-th AP and the i-th IRS. For the SJD, h E v e , l H C 1 × Q represents the channel between the q-th AP and the Eve, g E v e , i H C 1 × N represents the channel between the i-th IRS and the Eve,  G i , J a C N × Q e represents the channel between the jammer and the i-th IRS, and h k , J a H C 1 × Q e represents the channel between the jammer and the k-th user. Assuming that the integrated Eve is not affected by the information sent by the jammer, the interference of the jammer to the Eve can be counteracted by adopting self-interference cancellation technology [32].

2.2. Maximum Large-Scale Fading-Based AP Selection Strategy

Cell-free massive MIMO breaks the network architecture of the cellular and provides uniform signal coverage for users in the area with massive APs, and cooperative signal processing is completed by the CPU. Because the coverage area is wide and APs are not evenly distributed, as the number of users increases, the centralized signal processing method will bring huge backhaul link load, and the computational complexity of the CPU beamforming design will greatly increase [40]. Relying on the multi-IRS joint positioning method, it assumes that the rough location information of legitimate users is known [39]. Using the large-scale fading information between APs and users, an effective AP selection strategy is constructed for each user, and its service set is determined. The CPU collaboratively designs the beamforming according to the users served by each AP.
Let M k = L k < L represent the number of APs serving the k-th user, where M k 1 , 2 , , L represents the service set of the k-th user, which satisfies the following conditions:
l = 1 L k β ¯ l k m = 1 L β m k %
where { β 1 k , , β L k } represents the large-scale fading of each k-th user, L APs, { β ¯ 1 k , , β ¯ L k } represents the set in descending order, and represents the threshold limit. The service AP set of each user can be filtered by the above strategy.

2.3. Downlink Transmission

It can be seen from the above that the information received by the k-th legitimate user and the Eve can be written as
y k = l M k i = 1 I g k , i H Θ i G i , l + h k , l H w k , l d k , l + z k , l + j k K l M j i = 1 I g k , i H Θ i G i , l + h k , l H w j , l d j , l + z j , l + j = 1 K i = 1 I g k , i H Θ i G i , J a + h k , J a H w j , J a d j , J a + n k
y E v e k = l M k i = 1 I g E v e , i H Θ i G i , l + h E v e , l H w k , l d k , l + z k , l + j k K l M j i = 1 I g E v e , i H Θ i G i , l + h E v e , l H w j , l d j , l + z j , l + n E v e
where Θ i represents the reflection phase matrix of the i-th IRS, and Θ i = η d i a g e j θ i , 1 , e j θ i , 2 , e j θ i , N H , η is the IRS reflection coefficient. In practice, the effect of the IRS reflection amplitude on the system has been studied [41]. In this paper, only the influence of the IRS phase-shift matrix is considered. For the convenience of illustration, we set the reflection amplitude to 1. θ i , n is the phase shift of the n-th reflective element of the i-th IRS. w k , l C Q × 1 represents the precoding matrix of the l-th AP to the k-th user, z k , l C Q × 1 represents the AN matrix of the l-th AP to the k-th user, w k , J a C Q e × 1 represents the precoding matrix of the jammer to the k-th user. d j , l and d j , J a represent the information transmitted by the l-th AP and jammer to user j, respectively. Ξ d j , l 2 = Ξ d j , J a 2 = 1 . n k , n E v e C N 0 , N 0 represent the Gaussian additive white noise at the receiver of user k and the Eve, respectively, with the mean of 0 and the variance of N 0 . Considering that the jammer does not need to manage energy leakage and inter-user interference, the classical matched filter architecture is adopted, and its precoding matrix can be expressed as
w k J a = p J a , k H ^ k , J a H H ^ k , J a H , k { 1 , , K }
where H k , J a H = i = 1 I g k , i H Θ i G i , J a + h k , J a H is composed of a jammer-IRS-user cascade channel and direct channel, and H ^ k , J a H represents the channel estimation between the jammer and user.

3. Problem Formulation

Based on the AP selection strategy, in this section, we consider the joint design of AP beamforming, the AN matrix, and the IRS phase shift matrix under the constraints of AP transmit power, using an IRS unit modulus to maximize the minimum achievable secrecy rate. For convenience, we define f k , l H = i = 1 I g k , i H Θ i G i , l + h k , l H , f E v e , l H = i = 1 I g E v e , i H Θ i G i , l + h E v e , l H , f k , l H , f E v e , l H C 1 × Q , l M k . Equations (2) and (3) can be rewritten as
y k = l M k f k , l H w k , l d k , l + z k , l + j k K l M j f k , l H w j , l d j , l + z j , l + j = 1 K H k , J a H x k , J a + n k
y E v e k = l M k f E v e , l H w k , l d k , l + z k , l + j k K l M j f E v e , l H w j , l d j , l + z j , l + n E v e
From the above, the SINR of user k and Eve can be written as
S I N R k = l M k f k , l H w k , l 2 A
where
A = j k K l M j f k , l H w j , l 2 + j = 1 K l M j f k , l H z j , l 2 + j = 1 K H k , J a H w j , J a 2 + N 0
S I N R E v e k = l M k f E v e , l H w k , l 2 × j k K l M j f E v e , l H w j , l 2 + j = 1 K l M j f E v e , l H z j , l 2 + N 0 1
Defining f k H = f k , 1 H , , f k , L H , f E v e H = f E v e , 1 H , , f E v e , L H , w ˜ k = w k , 1 , w k , l , w k , L H , z ˜ k = z k , 1 , z k , l , z k , L H , Θ ˜ = Θ 1 , Θ 2 , , Θ I , where
w k , l = w k , l , l M k 0 Q , l M k
z k , l = z k , l , l M k 0 Q , l M k
Equations (9) and (10) characterize that each user is served by the selected AP set. When AP l does not belong to the serving set of user k, its corresponding precoding and artificial noise are 0 Q , and  0 Q represents a 0 vector with dimension Q × 1 .
Therefore, the SINR of user k and Eve can be further formulated as
S I N R k = T r F k W k j k K T r F k W j + k = 1 K T r F k Z k + J k
S I N R E v e k = T r F E v e W k j k K T r F E v e W j + k = 1 K T r F E v e Z k + N 0
where F k = f k f k H , F E v e = f E v e f E v e H , W k = w ˜ k w ˜ k H , Z k = z ˜ k z ˜ k H , J k = j = 1 K H k , J a H w j , J a 2 + N 0 . The downlink achievable rate of user k and Eve are R k d = log 2 ( 1 + S I N R k ) and R E ve , k d = log 2 ( 1 + S I N R E ve k ) , respectively. For user k, its security capacity is
R sec , k d = [ R k d R E ve , k d ] + = [ log 2 ( 1 + S I N R k 1 + S I N R E ve k ) ] +
In order to ensure the security requirements of each legitimate user in the system, it is necessary to prevent information leakage caused by the interference of SJD on a user beyond expectations. We aim to improve the worst performance of legitimate users in the system, that is, to maximize the minimum achievable secrecy rate for legitimate users. Jointly optimizing AP beamforming, an AN matrix, and an IRS phase shift matrix, the optimization problem can be expressed as
P 1 : max W , Θ ˜ , Z min k R sec , k d s . t . C 1 : T r W k + T r Z k P max W k 0 , Z k 0 , k 1 , 2 , , K C 2 : 0 θ n 2 π , e j θ n = 1 , n { 1 , , N }
where C 1 denotes the transmit power constraint, and C 2 represents the element unit modulus constraint of the IRS reflection.

4. Joint Precoding and an Design

Generally speaking, the maximum and minimum optimization problem is a complexity solving process. P1 is the optimization problem of multi-variable coupling of W , Z , Θ ˜ , which further increases the difficulty of solving the problem. Inspired by the alternate optimization method, when the other two variables are fixed, P 1 is transformed into an optimization problem related to only one variable, and the complexity of the solution is greatly reduced.
In this subsection, we adopt the block coordinate descent (BCD) algorithm to transform the original complex coupled puzzle into two solvable suboptimal solutions. When solving the optimal solution of each variable, in order to avoid the high complexity brought by the successive convex approximation (SCA) algorithm, we use an ingenious function transformation method to convert the complex problem of subtracting two logarithms into a single function maximum value problem, relax the non-convex constraint to transform it into a solvable convex problem, and finally obtain the respective optimal solutions.

4.1. Sub-Problem for W ,   Z When Given Θ ˜

Constraint C 2 can be removed for a given IRS phase shift. For further illustration, we expand Equation (13) at the top of this page. Here, ε 0 = 1 J k , ε 1 = 1 N 0 . χ k 1 , χ E v e , k 2 , χ k 3 and χ E v e , k 4 are represented as follows
R k d R E v e d = log 2 ε 0 j = 1 K Tr ( F k W j ) + γ 0 j = 1 K Tr ( F k Z j ) + 1 ε 0 j = 1 , j k K Tr ( F k W j ) + γ 0 j = 1 K Tr ( F k Z j ) + 1 × ε 1 j = 1 , j k K Tr ( F E v e W j ) + γ 1 j = 1 K Tr ( F E v e Z j ) + 1 ε 1 j = 1 K Tr ( F E v e W j ) + γ 1 j = 1 K Tr ( F E v e Z j ) + 1 = log 2 χ k 1 + log 2 χ E v e , k 2 log 2 χ k 3 log 2 χ E v e , k 4
χ k 1 = ε 0 j = 1 K Tr ( F k W j ) + γ 0 j = 1 K Tr ( F k Z j ) + 1
χ E v e , k 2 = ε 1 j = 1 , j k K Tr ( F E v e W j ) + γ 1 j = 1 K Tr ( F E v e Z j ) + 1
χ k 3 = ε 0 j = 1 , j k K Tr ( F k W j ) + γ 0 j = 1 K Tr ( F k Z j ) + 1
χ E v e , k 4 = ε 1 j = 1 K Tr ( F E v e W j ) + γ 1 j = 1 K Tr ( F E v e Z j ) + 1
However, P 1 is still a difficult non-convex optimization problem to solve. For  P 1 , the traditional method is to adopt the SCA [42]. Specifically, the wide upper bounds of log 2 χ k 3 and log 2 χ E v e , k 4 are constructed by Taylor expansion, then the partial derivatives of the upper bounds are solved, and finally the approximate value of R k d R E v e d is obtained by inequality scaling [42]. However, as the number of APs and users increases, and the dimension of the channel matrix increases, SCA needs to be used to continuously approach the optimal solution, and the computational complexity increases sharply. Therefore, the paper adopts an ingenious transformation method, using Lemma 1 [43,44] to convert the problem of logarithmic subtraction into the problem of solving the extremum of a single function, which can effectively reduce the computational complexity.
Lemma 1. 
The function ϑ t = t x + ln ( t ) + 1 , for any x > 0 , we have
ln ( x ) = max t > 0   ϑ t
And the optimal solution of the above formula is t = 1 x .
From Lemma 1, we can find the upper bound of function ϑ t , and when t = 1 x , the upper bound is tight. With Lemma 1, maximizing the user’s minimum achievable secrecy rate can be transformed into solving the maximization problem of log 2 χ k 3 log 2 χ E v e , k 4 . We set x = ε 0 j = 1 , j k K Tr ( F k W j ) + γ 0 j = 1 K Tr ( F k Z j ) + 1 and t = t k , restate R k d and R E v e d .
R k d ln 2 = ln χ k 1 ln χ k 3 = max t k > 0 ϑ k W , Z , t k
where
R E v e k ln 2 = ln χ E v e , k 3 ln χ E v e , k 4 = min t E v e > 0 ϑ E v e , k W , Z , t E v e , k
Treating R E v e d in the same way, let x = ε 0 j = 1 K Tr ( F E v e W j ) + γ 0 j = 1 K Tr ( F E v e Z j ) + 1 and t = t E v e . Then, R E v e d can be written as
R E v e k ln 2 = ln χ E v e , k 3 ln χ E v e , k 4 = min t E v e > 0 ϑ E v e , k W , Z , t E v e , k
where
ϑ E v e , k W , Z , t E v e , k = t E v e , k χ E v e , k 3 ln χ E v e , k 4 ln t E v e , k 1
According to Sion’s min–max theory in [44], P 1 can be reformulated as P 1 a
P 1 a : max W , Z , t k , t E v e , k ( ϑ k W , Z , t k max k ϑ E v e , k W , Z , t E v e , k ) s . t . C 1 : T r W k + T r Z k ) P max , W k 0 , Z k 0 , k 1 , 2 , , K . C 1 : t k > 0 , t E v e , k > 0 .
So far, P1a has been transformed into a convex function optimization problem for W , Z , t k and t E v e , k . We use alternating optimization to find the respective optimal values.

4.1.1. Fix W and Z , Solve for t k and t E v e , k

From Lemma 1, given W and Z , the optimal closed-form expressions for t k and t E v e , k can be written as
t k = 1 γ 0 j = 1 , j k K Tr ( F k W j ) + γ 0 j = 1 K Tr ( F k Z j ) + 1
t E v e , k = 1 γ 0 j = 1 K Tr ( F E v e W j ) + γ 0 j = 1 K Tr ( F E v e Z j ) + 1

4.1.2. Fix t k , t E v e , k , Solve W and Z

Given t k , t E v e , k , the optimal W and Z are solved by optimizing P 1 b
P 1 b : max W , Z ϑ k W , Z , t k max k ϑ E v e , k W , Z , t E v e , k s . t . C 1 : T r W k + T r Z k P max W k 0 , Z k 0 , k 1 , 2 , , K
Introducing auxiliary variable τ , P 1 b can continue to be written as P 1 c
P 1 c : max W , Z , τ ϑ k W , Z , t k τ s . t . C 1 : T r W k + T r Z k P max W k 0 , Z k 0 , k 1 , 2 , , K C 1 : ϑ E v e , k W , Z , t E v e , k < τ
Obviously, P 1 c is a solvable convex form that can be solved by convex optimization toolboxes such as CVX. In  C 1 , the rank-1 constraints are removed by semi-definite relaxation (SDR), so the solved ones are not guaranteed to be rank-1 in P 1 c . If the rank of W and Z in the result is 1, w ˜ k and z ˜ k can be recovered by eigenvalue decomposition; if the rank is not 1, it needs to be recovered by Gaussian randomization [41].
So far, given the IRS phase shift, the process of solving the optimal precoding and AN matrix is over, and its specific steps are given in Algorithm 1.
Algorithm 1: Alternating Optimization for Solving W and Z
  Input:   P max , ε 0 , ε 1 , F k and F E v e .
  Output: Beamforming W , AN mattrix Z .
  1: Initialize W ( 0 ) , and  Z ( 0 ) , satisfy constraint C 1 , i = 1 .  
  2: repeat  
  3:   Given W ( i 1 ) , Z ( i 1 ) according to formulation (26) and (27) get the optimal t k ( i ) , t E v e ( i ) .  
  4:   With given t k ( i ) , t E v e ( i ) , solving P 3 get the optimal W ( i ) and Z ( i ) .
  5:   Update i = i + 1 .  
  6: until the value of P 3 reaches convergence.

4.2. Sub-Problem for Θ ˜ When Given W and Z

This subsection presents the solution for optimizing the IRS reflection phase with fixed W and Z . First, we rewrite the corresponding optimization objective
P 2 : max Θ ˜ min k R sec , k d s . t . C 2 : 0 θ n 2 π , e j θ n = 1 , n { 1 , , N }
Similar to the solution of (IV-A), we first make some deformations of the objective function and then apply Lemma 1 to solve it. For convenience, we define λ i = e j θ i , 1 , e j θ i , 2 , e j θ i , N H , ζ = 1 , λ 1 H , λ 2 H , , λ I H , ζ C 1 × ( I N + 1 ) .
G m , j , l = h m , l H w j , l d i a g g m , 1 H G 1 , l w j , l d i a g g m , 2 H G 2 , l w j , l d i a g g m , I H G I , l w j , l
T m , j , l = h m , l H z j , l d i a g g m , 1 H G 1 , l z j , l d i a g g m , 2 H G 2 , l z j , l d i a g g m , I H G I , l z j , l
V k , j , J a = h k , J a H w j , J a d i a g g k , 1 H G 1 , J a w j , J a d i a g g k , 2 H G 2 , J a w j , J a d i a g g k , I H G I , J a w j , J a
where m 1 , 2 , K , E v e . Substituting ζ , G , T and V into Formulas (2) and (3), the information received by the user and Eve is rewritten as
y k = j = 1 K l M j ζ G k , j , l + j = 1 K l M j ζ T k , j , l + j = 1 K ζ V k , j , J a + n k
y E v e k = j = 1 K l M j ζ G E v e , j , l + j = 1 K l M j ζ T E v e , j , l + n E v e
Define T = ζ H ζ , R m , j , l = G m , j , l G m , j , l H , P m , j , l = T m , j , l T m , j , l H , B k , j , J a = V k , j , J a V k , j , J a H . Then, the achievable secrecy rate of user k can be written as formulation (36).
R k d R E v e , k d = log 2 γ k 1 + log 2 γ E v e , k 2 log 2 γ k 3 log 2 γ E v e , k 4
where
γ k 1 = ε 0 j = 1 K l M j Tr ( R k , j , l T ) + ε 0 j = 1 K l M j Tr ( P k , j , l T ) + j = 1 K Tr ( B k , j , J a T ) + 1
γ E v e , k 2 = ε 0 j = 1 , j k K l M j Tr ( R E v e , j , l T ) + ε 0 j = 1 K l M j Tr ( P E v e , j , l T ) + 1
γ k 3 = ε 0 j = 1 , j k K l M j Tr ( R k , j , l T ) + ε 0 j = 1 K l M j Tr ( P k , j , l T ) + j = 1 K Tr ( B k , j , J a T ) + 1
γ E v e , k 4 = ε 0 j = 1 K l M j Tr ( R E v e , j , l T ) + ε 0 j = 1 K l M j Tr ( P E v e , j , l T ) + 1
Similar to beamforming and the solution of AN, with  W and Z fixed, we use Lemma 1 and SDR to solve the optimal ζ , and the optimization problem can be formulated as
P 2 a : max T , k , E v e , k k T , k max k E v e , k T , E v e , k s . t . C 3 : T 0 , T n , n = 1 , n = 1 , , I N + 1 . C 4 : k > 0 , E v e , k > 0
P 2 a is a coupled optimization about T and k , E v e , k . When one of the two is fixed, the other variable is convex, which can be solved directly using CVX. Fix T , and the optimal k , E v e , k can be solved by the following formula k = 1 γ k 3 and E v e , k = 1 γ E v e , k 4 .
Given k , E v e , k , we obtain the optimal T by solving P 2 b .
P 2 b : max T n , n = 1 k T , k max k E v e , k T , E v e , k s . t . C 3 .
Finally, λ is recovered by eigenvalue decomposition and Gaussian randomization. So far, the beamforming W , the AN Z matrix and the IRS reflection phase Θ ˜ are solved, and the overall solution is given in Algorithm 2.
Algorithm 2: BCD-based algorithm for solving P 1
Input: Number of AP L, number of IRS I, number of N, number of antennas Q, P max , ε 0 , ε 1 F k and F E v e , H k , J a , ϖ , a a .
Output: Beamforming W , AN mattrix Z , phase-shift matrix Θ ˜ .
1:  Initialize phase-shift matrix Θ ˜ ( 0 ) , m = 1 .
2:  repeat  
3:  Solve each sub-problem: given Θ ˜ ( m 1 ) , solve ( P 1 a ) by applying Algorithm 1, get the solution W ( m ) , Z ( m ) ; solve ( p 2 a ) for given W ( m ) , Z ( m ) and obtain the solution Θ ˜ ( m ) .
4:  Update m = m + 1 .
5:  until the value of P 1 is below ϖ or m = a a .

5. Numerical Results and Discussion

As shown in Figure 3, in the simulation of IRS-assisted cell-free massive MIMO secure transmission, we build the simulation scenario with reference to the deployment scheme of [13,14,41]. We set up five APs in the x-z plane with each AP height set to 8 m and the APs spaced 30 m apart. Multiple IRSs are randomly located within a circle of 5 m radius at a height of 4 m in the y-axis direction 15 m from the base station. To investigate the worst-case potential of the system to resist transient jamming and eavesdropping, we set up SJD to lurk within a cluster of users, who are randomly distributed within a square area with a 10 m side at the central coordinates ( 55 ,   15 ,   0 ) . Considering that IRS location distribution has a significant impact on transmission performance, higher gain can be obtained by deploying close to the base station [22,28]. Therefore, to investigate the upper bound of secure transmission performance for multi-IRS-assisted cell-free massive MIMO systems, we set the IRS close to the AP rather than the user and consider that the CSI of each channel is known at the CPU [32]. As in Figure 3, it is assumed that there are obstacles between the AP and user areas that cause large AP and user channel fading. Specifically, it is assumed that AP-Users/Eve, AP/Jammer-IRS, and Jammer-Users all follow a distance-dependent path loss model. Take the direct channel between AP l and user k as an example.
h = L 0 d A U δ A U h
h = κ A U κ A U + 1 h L o S + 1 1 + κ A U h N L o S
where L 0 = 40   dB represents the path loss when the reference distance is 1m, d A U represents the distance between the AP and the user, and δ A U represents the path loss exponent between the AP and the user. h represents the small-scale fading component, which is modeled as a Rician fading model [22,28,43]. κ A U represents the Rician factor of the AP and the user, and h L o S and h N L o S denote the line-of-sight (LoS) component and the non-line-of-sight (NLoS) component, respectively. Other parameters are shown in Table 1.
In Figure 4, the achievable secrecy rates of the various schemes are compared versus IRS reflection amplitude. As illustrated in Figure 4, an increase in the reflection amplitude is associated with a corresponding rise in the minimum achievable secrecy rate under each scheme. For a given reflection amplitude, the proposed scheme of multiple IRSs combined with AN is effective in increasing the minimum achievable secrecy rate by approximately 3 % compared to a single IRS and AN-assisted scheme. The proposed multiple IRS and AN scheme improves the achievable secrecy rate by 10 % compared to a single IRS-assisted scheme without AN. In addition, the number of IRSs has a greater impact on the confidentiality performance of the system than AN. As the number of IRSs increases, the number of cascaded channels between the AP and users increases, resulting in higher channel gains. Although the number of cascaded channels between interferers and users has also increased, it should be noted that the reflected phase and transmitted precoding of multiple IRSs are jointly optimized based on user information (such as location) and demand, and they are reliable for users. Interferers cannot use cascaded channels to obtain sufficient signal interference, and this phenomenon is more pronounced when the number of IRSs increases.
Figure 5 compares the curves of achievable secrecy rate vs. transmission power obtained under various schemes. As can be seen from the figure, as the transmission power increases, the system’s achievable secure rate also increases. This is in line with the fact that as the transmission power increases, the user end receives a stronger signal, the ability to resist instantaneous interference and eavesdropping is enhanced, and the system’s secure rate increases. The fixed transmission power is 30 dBm, the transmission scheme jointly designed by multiple IRSs and AN can improve the user secrecy rate by about 18% compared with a single IRS. Continuing to increase the transmission power, the performance of the multi-IRS scheme without AN is close to that of the proposed scheme, because at this time, the transmission power is large enough, and the channel capacity of the legitimate user is completely greater than that of the Eve. It is not a wise choice to use the base station to redistribute power for designing AN.
Figure 6 illustrates the minimum secure rate that can be achieved for each scheme at varying transmission powers of the jammer. From the graph, the various schemes using IRS against transient interference achieve better performance when the jammer’s power is small. As the interference power increases, the achievable confidential rate obtained by the scheme of a single IRS is found to be significantly lower than that of the scheme proposed in this paper, and it is also lower than that of the multi-IRS scheme without AN transmission. This is due to the fact that the multi-IRS provides users with reliable channel gain through cascaded channels, thus ensuring the normal downlink communication quality under high-power interference. In general, the auxiliary scheme with multiple IRSs is better than the single IRS, and the auxiliary scheme with AN is better than the scheme without AN when the jammer’s power is low.
Figure 7 shows the achievable secrecy rate versus the number of users K for the different schemes. It can be seen from Figure 7 that the secrecy rate achieved by each scheme decreases as the number of users increases, which is limited by the total transmission power. The proposed scheme with multiple IRSs and AN performs better than the scheme with a single IRS and AN for different numbers of users, and it performs slightly better than the scheme with multiple IRSs but without AN. However, this superiority decreases as the number of users increases, because the increase in the number of users reduces the power allocated to each user, but the Eve and jammer power remain unchanged, and the gain of AN with limited power is difficult to achieve to effectively reduce the channel capacity of Eve. Therefore, the proposed scheme is more favorable for a smaller number of users.
Figure 8 illustrates the relationship between the system’s achievable secrecy rate and the location of the IRS cluster. Here, Setup(a), Setup(b), and Setup(c) represent the three scenarios where the IRS cluster is located close to the AP cluster, in the middle of the AP and the user, and close to the user cluster, respectively. From the diagram, it can be seen that higher secrecy capacity can be achieved when the IRS cluster is close to the AP, followed by deploying the IRS cluster in the middle of the AP and the user, and worst of all, when the IRS is deployed close to the user. This is because when the user and AP are far away, it is the IRS cascaded link that plays the main role, and when the IRS cluster is deployed near the AP, higher transmit power can be allocated, and the high channel gain of the cascaded link improves the channel capacity for the user. Because the SJD is deployed in the middle of the user cluster, when the IRS cluster is close to the user, the SJD can also take advantage of the IRS reflection gain, increasing the interference to legitimate users and improving the Eve’s channel capacity. The Setup(c) scenario therefore has the lowest system secrecy rate.

6. Conclusions

This paper studies the use of multiple IRSs and AN to enhance the anti-interference and anti-eavesdropping capabilities of cell-free massive MIMO. In order to ensure secure downlink transmission, a joint optimization algorithm for AP beamforming, AN matrix and IRS phase shift matrix is proposed based on the BCD algorithm, which maximizes the minimum secrecy rate of all users. Avoiding heavy signal processing by the CPU and huge backhaul link load, an AP selection strategy based on user location information is designed to reasonably determine the set of APs for each user so as to achieve a trade-off between signal processing complexity and security performance with the optimal AP set selection. Simulation experiments show that the proposed multi-IRS joint AN scheme is superior to the traditional single IRS scheme and slightly better than the transmission scheme without AN assistance. The scheme proposed provides ideas for secure transmission from single IRS to multi-IRS assistance in wireless networks and also broadens the application of multi-IRS in 6G networks. In the future, further consideration can be given to the extreme communication environment of multi-SJD joint interference, and the security of multi-IRS enhancement systems can be studied from the perspective of game equilibrium between SJD and users.

Author Contributions

Conceptualization, H.H., W.X. and K.X.; methodology, H.H.; data curation, H.H., W.X. and K.X.; writing—original draft preparation, H.H., X.X. and H.W.; writing—review and editing, H.H., W.X. and N.L.; project administration, K.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under Grant 62471488, 62271503, 62071485, the Natural Science Foundation of Jiangsu Province under BK20231485, and the Basic Research Project of Jiangsu Province under Grant BK20192002.

Institutional Review Board Statement

The study did not require ethical approval.

Informed Consent Statement

Not human research in this post.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Nguyen, N.P.; Ngo, H.Q.; Duong, T.Q.; Tuan, H.D. Full-Duplex Cyber-Weapon with Massive Arrays. IEEE Trans. Commun. 2017, 65, 5544–5558. [Google Scholar] [CrossRef]
  2. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  3. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
  4. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving Wireless Physical Layer Security via Cooperating Relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  5. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975, 54, 1335–1387. [Google Scholar] [CrossRef]
  6. Leung-Yan-Cheong, S.; Hellman, M. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  7. Gopala, P.K.; Lai, L.; El Gamal, H. On the Secrecy Capacity of Fading Channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698. [Google Scholar] [CrossRef]
  8. Kim, D.; Lee, H.; Hong, D. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems. IEEE Trans. Wirel. Commun. 2016, 15, 2245–2261. [Google Scholar]
  9. Xie, H.; Gao, F.; Zhang, S.; Jin, S. A Unified Transmission Strategy for TDD/FDD Massive MIMO Systems With Spatial Basis Expansion Model. IEEE Trans. Veh. Technol. 2017, 66, 3170–3184. [Google Scholar] [CrossRef]
  10. Rusek, F.; Persson, D.; Lau, B.K.; Larsson, E.G.; Marzetta, T.L.; Edfors, O.; Tufvesson, F. Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays. IEEE Signal Process. Mag. 2013, 30, 440–460. [Google Scholar] [CrossRef]
  11. Zhu, J.; Schober, R.; Bhargava, V.K. Secure transmission in multi-cell massive MIMO systems. IEEE Trans. Wirel. Commun. 2014, 13, 4766–4781. [Google Scholar] [CrossRef]
  12. Di Pietro, R.; Oligeri, G. Jamming mitigation in cognitive radio networks. IEEE Netw. 2013, 27, 10–15. [Google Scholar] [CrossRef]
  13. Interdonato, G.; Björnson, E.; Quoc Ngo, H.; Frenger, P.; Larsson, E.G. Ubiquitous cell-free Massive MIMO communications. Wirel. Commun. Netw. 2019, 2019, 197. [Google Scholar] [CrossRef]
  14. Björnson, E.; Sanguinetti, L. Scalable Cell-Free Massive MIMO Systems. IEEE Trans. Commun. 2020, 68, 4247–4261. [Google Scholar] [CrossRef]
  15. Qiu, J.; Xu, K.; Xia, X.; Shen, Z.; Xie, W.; Zhang, D.; Wang, M. Secure Transmission Scheme Based on Fingerprint Positioning in Cell-Free Massive MIMO Systems. IEEE Trans. Signal Inf. Process. Netw. 2022, 8, 92–105. [Google Scholar] [CrossRef]
  16. Zhang, Y.; Xia, W.; Zheng, G.; Zhao, H.; Yang, L.; Zhu, H. Secure Transmission in Cell-Free Massive MIMO With Low-Resolution DACs Over Rician Fading Channels. IEEE Trans. Commun. 2022, 70, 2606–2621. [Google Scholar] [CrossRef]
  17. Xia, X.; Fan, Z.; Luo, W.; Lu, A.; Wang, D.; Zhao, X.; You, X. Joint Uplink Power Control, Downlink Beamforming, and Mode Selection for Secrecy Cell-Free Massive MIMO with Network-Assisted Full Duplexing. IEEE Syst. J. 2022, 17, 720–731. [Google Scholar] [CrossRef]
  18. Alageli, M.; Ikhlef, A.; Alsifiany, F.; Abdullah, M.A.; Chen, G.; Chambers, J. Optimal Downlink Transmission for Cell-Free SWIPT Massive MIMO Systems with Active Eavesdropping. Trans. Inf. Forensics Secur. 2020, 15, 1983–1998. [Google Scholar] [CrossRef]
  19. Wang, X.; Gao, Y.; Zhang, G.; Guo, M. Security Performance Analysis of Cell-Free Massive MIMO over Spatially Correlated Rayleigh Fading Channels with Active Spoofing Attack. In Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 21–23 October 2020. [Google Scholar]
  20. Zhang, X.; Guo, D.; An, K.; Zhang, B. Secure Communications Over Cell-Free Massive MIMO Networks with Hardware Impairments. IEEE Syst. J. 2020, 14, 1909–1920. [Google Scholar] [CrossRef]
  21. Hoang, T.M.; Ngo, H.Q.; Duong, T.Q.; Tuan, H.D.; Marshall, A. Cell-Free Massive MIMO Networks: Optimal Power Control Against Active Eavesdropping. IEEE Trans. Commun. 2018, 66, 4724–4737. [Google Scholar] [CrossRef]
  22. Wu, Q.; Zhang, R. Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming. IEEE Trans. Wirel. Commun. 2019, 18, 5394–5409. [Google Scholar] [CrossRef]
  23. Huang, C.; Zappone, A.; Alexandropoulos, G.C.; Debbah, M.; Yuen, C. Reconfigurable Intelligent Surfaces for Energy Efficiency in Wireless Communication. IEEE Trans. Wirel. Commun. 2019, 18, 4157–4170. [Google Scholar] [CrossRef]
  24. Mei, W.; Wang, D.; Chen, Z.; Zhang, R. Joint Beam Routing and Resource Allocation Optimization for Multi-IRS-Reflection Wireless Power Transfer. Trans. Wirel. Commun. 2024. [Google Scholar] [CrossRef]
  25. Nguyen, T.V.; Nguyen, D.N.; Renzo, M.D.; Zhang, R. Leveraging Secondary Reflections and Mitigating Interference in Multi-IRS/RIS Aided Wireless Networks. IEEE Trans. Wirel. Commun. 2023, 22, 502–517. [Google Scholar] [CrossRef]
  26. Wang, Z.; Liu, L.; Cui, S. Channel Estimation for Intelligent Reflecting Surface Assisted Multiuser Communications: Framework, Algorithms, and Analysis. IEEE Trans. Wirel. Commun. 2020, 19, 6607–6620. [Google Scholar] [CrossRef]
  27. Zheng, B.; You, C.; Zhang, R. Intelligent Reflecting Surface Assisted Multi-User OFDMA: Channel Estimation and Training Design. IEEE Trans. Wirel. Commun. 2020, 19, 8315–8329. [Google Scholar] [CrossRef]
  28. Wu, Q.; Zhang, R. Beamforming Optimization for Wireless Network Aided by Intelligent Reflecting Surface With Discrete Phase Shifts. IEEE Trans. Commun. 2020, 68, 1838–1851. [Google Scholar] [CrossRef]
  29. Huang, C.; Mo, R.; Yuen, C. Reconfigurable Intelligent Surface Assisted Multiuser MISO Systems Exploiting Deep Reinforcement Learning. IEEE J. Sel. Areas Commun. 2020, 38, 1839–1850. [Google Scholar] [CrossRef]
  30. Han, Y.; Zhang, S.; Duan, L.; Zhang, R. Cooperative Double-IRS Aided Communication: Beamforming Design and Power Scaling. IEEE Wirel. Commun. Lett. 2020, 9, 1206–1210. [Google Scholar] [CrossRef]
  31. Pan, C.; Ren, H.; Wang, K.; Xu, W.; Elkashlan, M.; Nallanathan, A.; Hanzo, L. Multicell MIMO Communications Relying on Intelligent Reflecting Surfaces. IEEE Trans. Wirel. Commun. 2020, 19, 5218–5233. [Google Scholar] [CrossRef]
  32. Sun, Y.; An, K.; Zhu, Y.; Zheng, G.; Wong, K.K.; Chatzinotas, S.; Yin, H.; Liu, P. RIS-Assisted Robust Hybrid Beamforming Against Simultaneous Jamming and Eavesdropping Attacks. IEEE Trans. Wirel. Commun. 2022, 21, 9212–9231. [Google Scholar] [CrossRef]
  33. Yu, X.; Xu, D.; Sun, Y.; Ng, D.W.K.; Schober, R. Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces. IEEE J. Sel. Areas Commun. 2020, 38, 2637–2652. [Google Scholar] [CrossRef]
  34. Gong, S.; Lu, X.; Hoang, D.T.; Niyato, D.; Shu, L.; Kim, D.I.; Liang, Y.C. Toward Smart Wireless Communications via Intelligent Reflecting Surfaces: A Contemporary Survey. IEEE Commun. Surv. Tutor. 2020, 22, 2283–2314. [Google Scholar] [CrossRef]
  35. Almohamad, A.; Tahir, A.M.; Al-Kababji, A.; Furqan, H.M.; Khattab, T.; Hasna, M.O.; Arslan, H. Smart and Secure Wireless Communications via Reflecting Intelligent Surfaces: A Short Survey. IEEE Open J. Commun. Soc. 2020, 1, 1442–1456. [Google Scholar] [CrossRef]
  36. Hu, H.; Xu, K.; Xie, W.; Xia, X.; Wang, M. Multi-Intelligent Reflecting Surface Assisted Cell-free Massive MIMO Downlink Transmission. In Proceedings of the IEEE 21st International Conference on Communication Technology (ICCT), Tianjin, China, 13–16 October 2021. [Google Scholar]
  37. Zhou, T.; Xu, K.; Xia, X.; Xie, W.; Xu, J. Achievable Rate Optimization for Aerial Intelligent Reflecting Surface-Aided Cell-Free Massive MIMO System. IEEE Access 2021, 9, 3828–3837. [Google Scholar] [CrossRef]
  38. Nguyen, N.T.; Nguyen, V.; Nguyen, H.V.; Ngo, H.Q.; Chatzinotas, S.; Juntti, M. Downlink Throughput of Cell-Free Massive MIMO Systems Assisted by Hybrid Relay-Reflecting Intelligent Surfaces. In Proceedings of the ICC-2022 IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022. [Google Scholar]
  39. Zhou, T.; Xu, K.; Shen, Z.; Xie, W.; Zhang, D.; Xu, J. AoA-Based Positioning for Aerial Intelligent Reflecting Surface-Aided Wireless Communications: An Angle-Domain Approach. IEEE Wirel. Commun. Lett. 2022, 11, 761–765. [Google Scholar] [CrossRef]
  40. Björnson, E.; Sanguinetti, L. Making Cell-Free Massive MIMO Competitive With MMSE Processing and Centralized Implementation. IEEE Trans. Wirel. Commun. 2020, 19, 77–90. [Google Scholar] [CrossRef]
  41. Zhang, Z.; Dai, L. A Joint Precoding Framework for Wideband Reconfigurable Intelligent Surface-Aided Cell-Free Network. IEEE Trans. Signal Process. 2021, 69, 4085–4101. [Google Scholar] [CrossRef]
  42. Li, J.; Zhang, L.; Xue, K.; Fang, Y.; Sun, Q. Secure Transmission by Leveraging Multiple Intelligent Reflecting Surfaces in MISO Systems. IEEE Trans. Mob. Comput. 2023, 22, 2387–2401. [Google Scholar] [CrossRef]
  43. Guan, X.; Wu, Q.; Zhang, R. Intelligent Reflecting Surface Assisted Secrecy Communication: Is Artificial Noise Helpful or Not? IEEE Wirel. Commun. Lett. 2020, 9, 778–782. [Google Scholar] [CrossRef]
  44. Li, Q.; Hong, M.; Wai, H.T.; Liu, Y.F.; Ma, W.K.; Luo, Z.Q. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization. IEEE J. Sel. Areas Commun. 2013, 31, 1714–1727. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of multi-IRS assisted communication.
Figure 1. Schematic diagram of multi-IRS assisted communication.
Sensors 24 07326 g001
Figure 2. System model of multi-IRS against simultaneous jamming and eavesdropping communication.
Figure 2. System model of multi-IRS against simultaneous jamming and eavesdropping communication.
Sensors 24 07326 g002
Figure 3. Simulation deployment.
Figure 3. Simulation deployment.
Sensors 24 07326 g003
Figure 4. Achievable secrecy rate [bps/Hz] v.s. IRS amplitude limitation for L = 5 , K = 2 , N = 20 , P max = 0 dBm, P J a , max = 30 dBm.
Figure 4. Achievable secrecy rate [bps/Hz] v.s. IRS amplitude limitation for L = 5 , K = 2 , N = 20 , P max = 0 dBm, P J a , max = 30 dBm.
Sensors 24 07326 g004
Figure 5. Achievable secrecy rate [bps/Hz] v.s. transmit power for L = 5 , K = 2 , N = 20 , P J a , max = 30 dBm.
Figure 5. Achievable secrecy rate [bps/Hz] v.s. transmit power for L = 5 , K = 2 , N = 20 , P J a , max = 30 dBm.
Sensors 24 07326 g005
Figure 6. Achievable secrecy rate [bps/Hz] v.s. jammer transmit power [dBm] for L = 5 , K = 2 , N = 20 , P max = 0 dBm.
Figure 6. Achievable secrecy rate [bps/Hz] v.s. jammer transmit power [dBm] for L = 5 , K = 2 , N = 20 , P max = 0 dBm.
Sensors 24 07326 g006
Figure 7. Achievable secrecy rate [bps/Hz] v.s. number of users for L = 5 , N = 20 , P max = 0 dBm, P J a , max = 30 dBm.
Figure 7. Achievable secrecy rate [bps/Hz] v.s. number of users for L = 5 , N = 20 , P max = 0 dBm, P J a , max = 30 dBm.
Sensors 24 07326 g007
Figure 8. Achievable secrecy rate [bps/Hz] v.s. location of IRS clusters for L = 5 , K = 2 , N = 20 , P max = 0 dBm, P J a , max = 30 dBm.
Figure 8. Achievable secrecy rate [bps/Hz] v.s. location of IRS clusters for L = 5 , K = 2 , N = 20 , P max = 0 dBm, P J a , max = 30 dBm.
Sensors 24 07326 g008
Table 1. List of key notations.
Table 1. List of key notations.
Parameter Value
Bandwidth180 MHz
P max 30 dBm
P J a , max 30 dBm
Noise power of user/Eve−80 dBm
Antennas of each AP and SJDQ = Q e = 2
Path loss (AP/jammer–IRS) δ A R = δ J R = 2.2
Path loss (AP–user/Eve) δ A U = δ A E = 3.5
Path loss (IRS–user/Eve) δ R U = δ R E = 3
Rician factor (AP/jammer–IRS) κ A R = κ J R =
Rician factor (AP/IRS–user/Eve) κ A U = κ A E = κ R U = κ R E = 0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, H.; Xie, W.; Xu, K.; Xia, X.; Li, N.; Wu, H. Multi-Intelligent Reflecting Surfaces and Artificial Noise-Assisted Cell-Free Massive MIMO Against Simultaneous Jamming and Eavesdropping. Sensors 2024, 24, 7326. https://doi.org/10.3390/s24227326

AMA Style

Hu H, Xie W, Xu K, Xia X, Li N, Wu H. Multi-Intelligent Reflecting Surfaces and Artificial Noise-Assisted Cell-Free Massive MIMO Against Simultaneous Jamming and Eavesdropping. Sensors. 2024; 24(22):7326. https://doi.org/10.3390/s24227326

Chicago/Turabian Style

Hu, Huazhi, Wei Xie, Kui Xu, Xiaochen Xia, Na Li, and Huaiwu Wu. 2024. "Multi-Intelligent Reflecting Surfaces and Artificial Noise-Assisted Cell-Free Massive MIMO Against Simultaneous Jamming and Eavesdropping" Sensors 24, no. 22: 7326. https://doi.org/10.3390/s24227326

APA Style

Hu, H., Xie, W., Xu, K., Xia, X., Li, N., & Wu, H. (2024). Multi-Intelligent Reflecting Surfaces and Artificial Noise-Assisted Cell-Free Massive MIMO Against Simultaneous Jamming and Eavesdropping. Sensors, 24(22), 7326. https://doi.org/10.3390/s24227326

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop