Next Article in Journal
Sliding Mode Control Proposed Using a Clegg Integrator for Speed Control of a Three-Phase Induction Motor
Previous Article in Journal
Energy Production Assessment of Intermittent Renewable Generation Projects from a Stochastic Perspective
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Proceeding Paper

Information-Theoretic Security of RIS-Aided MISO System Under N-Wave with Diffuse Power Fading Model †

1
Colegio de Ciencias e Ingenierías “El Politécnico”, Universidad San Francisco de Quito (USFQ), Diego de Robles s/n, Quito 170157, Ecuador
2
Departamento de Electrónica, Telecomunicaciones y Redes de Información, Escuela Politécnica Nacional (EPN), Ladrón de Guevara E11-253, Quito 170525, Ecuador
*
Author to whom correspondence should be addressed.
Presented at the XXXII Conference on Electrical and Electronic Engineering, Quito, Ecuador, 12–15 December 2024.
Eng. Proc. 2024, 77(1), 1; https://doi.org/10.3390/engproc2024077001
Published: 18 November 2024
(This article belongs to the Proceedings of The XXXII Conference on Electrical and Electronic Engineering)

Abstract

This paper aims to examine the physical layer security (PLS) performance of a reconfigurable intelligent surface (RIS)-aided wiretap multiple-input single-output (MISO) system over generalized fading conditions by assuming inherent phase shift errors at the RIS. Specifically, the procedures (i.e., the method) to conduct this research is based on learning-based approaches to model the magnitude of the end-to-end RIS channel, i.e., employing an unsupervised expectation-maximization (EM) approach via a finite mixture of Nakagami-m distributions. This general framework allows us to accurately approximate key practical factors in RIS’s channel modeling, such as generalized fading conditions, spatial correlation, discrete phase shift, beamforming, and the presence of direct and indirect links. For the numerical results, the secrecy outage probability, the average secrecy rate, and the average secrecy loss under different setups of RIS-aided wireless systems are assessed by varying the fading parameters of the N-wave with a diffuse power fading channel model. The results show that the correlation between RIS elements and unfavorable channel conditions (e.g., Rayleigh) affect secrecy performance. Likewise, it was confirmed that the use of a RIS is not essential when there is a solid line-of-sight link between the transmitter and the legitimate receiver.

1. Introduction

Recently, RISs have received academic and industrial attention for their promising potential to customize the wireless channel cost-effectively. A RIS element can be programmed to adjust the phases, amplitude, phase frequency, and even the polarization of the impinging signal on the RIS to overwhelm the hazardous consequences of the channel. Owing to the promising RIS’s features, this technology will presumably permit PLS to finally advance as a defense technique for delivering information security to wireless systems by exploiting the wireless propagation’s intrinsic randomness (e.g., fading and noise). Motivated by these reasons, some research works on RIS-aided secure systems under diverse fading channel conditions have been studied in the literature [1]. Nevertheless, an in-depth examination of RIS-related studies in PLS indicates that the typical premise is to consider Rayleigh fading to model the individual end-to-end RIS channels for the mathematical facility. However, the original intention of RIS is to provide reliable line-of-sight (LoS) links between the indirect RIS channels. Therefore, unlike the Rayleigh model, the generalized channel models are better suited to deliver these requirements thanks to their freedom to model different propagation environments. In recent years, some activities have been addressed to develop a more precise channel model through two procedures: On the one hand, envelope-aided fading models, such us [2]. On the other hand, ray-based channel models where the received wave is constructed from dominant specular components plus several scattered waves with random phases [3]. The pioneering ray-based model was proposed in [4] and called the N-wave with diffuse power (N-WDP) model. This type of channel model is suited to accommodate different wireless channel conditions encountered in upcoming networks for higher frequencies. Particularly, the N-WDP models have exhibited satisfactory exactness in characterizing the short-fading channel in mm wave bands [5]. Regarding the performance of the RIS over different fading channel models, in [6], the authors developed a unified framework to assess the outage performance of RIS-assisted communications over generalized fading channels in the presence of phase error noise by using Fox’s H functions. Likewise, in [7], a comprehensive statistical, secrecy, and performance analysis of RIS-assisted multiple-antenna systems under Weibull fading was presented. In [8], the secrecy rate analysis for a RIS-aided multi-user MISO system over a Rician fading channel was explored. Recently, in [9], the secrecy performance of RIS-aided systems over the Rician channel by assuming spatially random eavesdroppers was analyzed.
In light of the aforementioned points, and encouraged by the RIS features, this paper investigates how more realistic fading channels, discrete phase shifts, and spatial correlation impact the secrecy performance of RIS-assisted networks. Specifically, our primary purpose is to conduct a good description of the role of N-WDP’s parameters on the secrecy performance of RIS-assisted networks. Furthermore, some useful insights for reaching secure communications in RIS-aided systems are provided, which are naturally connected to the physical parameters captured by the generalized channel model.
Notation: In what follows, uppercase and lowercase bold letters denote matrices and vectors, respectively; f ( · ) ( · ) , probability density function (PDF); F ( · ) ( · ) , the cumulative density function (CDF); U [ a , b ] , a uniform distribution on [ a , b ] ; · T , the transpose; · , the Euclidean norm of a complex vector; Γ ( · ) , the gamma function ([10], Equation (6.1.1)); Υ ( · , · ) , the lower incomplete gamma function ([10], Equation (6.5.2)); F 1 2 · , · ; · ; · , the hypergeometric function ([10], Equation (15.1.1)); C , the set of complex numbers; E [ · ] , expectation; B · , · , the Beta function ([10], Equation (6.2.2)); diag x , a diagonal matrix whose main diagonal is given by x ; C N ( · , · ) , the circularly symmetric Gaussian distribution; I N , the identity matrix of size N × N ; · H , the Hermitian transpose; mod · , the modulus operation; · , the floor function, and sinc ( w ) = sin ( π w ) / ( π w ) , the sinc function.

2. System and Channel Models

Assume a RIS-aided wiretap model composed of a transmitter, Alice (A) provided with M antennas, one legitimate node called Bob (B), one eavesdropper denoted by Eve (E), and a RIS, which helps the secure communication between A and B nodes. Specifically, a MISO system is assumed, where A sends information through its multiple antennas to a legitimate receiver B and an eavesdropper E, both of which have a single antenna. In this sense, the RIS helps to redirect the incident signal toward the legitimate receiver B, complicating the decoding of the message by eavesdropper E, as shown in Figure 1. In short, B and E are equipped with a single antenna, while the RIS has L nearly reconfigurable units. So, the received signal at E and B can be expressed as
y i = P h 2 , i T Φ G + h d , i T w x + n ˜ i ,
in which i B , E is either the eavesdropper or the legitimate channel, x is the transmitted information symbol, P is the transmit power at A, n ˜ C N ( 0 , σ i 2 ) denotes the additive white Gaussian noise (AWGN) with σ i 2 power, h d , i C M × 1 is the channel between A and B or A and E, w   C M × 1 denotes the precoding vector at A, G = g 1 , , g M C L × M and h 2 , i = h 2 , i , 1 , , h 2 , i , L T C L × 1 are the paths between A and RIS, RIS and B, or RIS and E, respectively. Furthermore, Φ = diag ( δ 1 e j φ 1 , , δ L e j φ L ) is the phase-shift matrix generated by the RIS, where δ l for l = 1 , , L denotes the amplitude of the lth RIS element. Hereafter, it is considered that δ l = 1 ,   l in all subsequent derivations. The RIS adjusts the phase shifts for each unit to compensate for all phases created by the direct and indirect channels at the legitimate receiver, i.e., φ l = ( h d , B H w ) ( h 2 , B , l H ) ( g l w )  ([11], Equation (19)) where h 2 , B , l H is the lth element of h 2 , B H and g l is the lth row vector from G . In this configuration, both φ l and the transmit precoding w are optimized together [11] to maximize the acquired signal-to-noise ratio (SNR) at B . Nevertheless, the RIS forces a residual random phase error to prevail in practice. Here, such an error is denoted by ϕ l , so the final phase shifts of the lth RIS unit change from the optima to Θ l = φ l + ϕ l [11]. Therefore, the equivalent channel observed by the receivers can be formulated as
h i = h 2 , i T Ψ G + h d , i T w + ,
where Ψ = diag ( e j Θ 1 , , e j Θ L ) indicates the phase noise, and w + = h 2 , B T Ψ G + h d , B T H h 2 , B T Ψ G + h d , B T C M × 1 is the maximal ratio transmission (MRT) precoding. Here, we decided to use the joint active and passive MRT precoding strategy from [11] because it is a low-complexity algorithm obtained on alternating optimization. In particular, the transmit precoding at A and the RIS’s phase shifts were optimized iteratively until meeting a pre-established criterion. It is worth pointing out that the MRT beamforming occurs when w is employed as a starting point in the distributed algorithm, which is updated in each iteration together with the RIS’s phase shifts. Concerning the channel model, we supposed that the fading coefficients of the underlying system are constructed as a superposition of N-dominant specular components plus scattering waves (i.e., the N-WDP model); so, it follows that [12]
h d , i p = β d , i n = 1 N d , i V d , i ( n , p ) e j θ d , i ( n , p ) + Z d , i ( p ) , h 2 , i , l = β 2 , i n = 1 N RIS , i V 2 , i ( n , l ) e j θ 2 , i ( n , l ) + Z 2 ( l )
g l , p = β 1 n = 1 N A , RIS V 1 ( n , p , l ) e j θ 1 ( n , p , l ) + Z 1 ( p , l ) ,
for p = 1 , , M , and l = 1 , , L . Here, V ( · ) ( n , · ) symbolize the amplitude of an nth specular component, θ ( · ) ( n , · ) U [ 0 , 2 π ] and N ( f ) , ( u ) indicate the total number of dominant components of the channel between nodes f and u, and Z ( · ) ( · ) follow Rayleigh with E { | Z | 2 } = 2 σ 2 = Ω 0 , indicating the diffuse received waves. The terms β 1 , β 2 , i , and β d , i encompass the path loss for A-RIS, RIS-i, and A-i links for i B , E , respectively. Notice that the N-WDP model includes important stochastic fading models such as TWDP, Rician, and Rayleigh as special cases for N ( · ) = 2 , 1 , 1 , respectively. Now, to evaluate spatial correlation for the RIS channels, the geometry network proposed in [13] is employed. Hence, we assumed that the RIS is a surface consisting of L elements, where L V and L H are the total units per row and per column, respectively. In this regard, the area of an individual RIS element is expressed by A = d H d V , with d H and d V denoting the vertical height and the horizontal width, respectively. Based on this, and by assuming an isotropic diffuse environment, the indirect RIS fading channels subject to correlation and the direct link can defined as h d , i = h d , i 1 , , h d , i M T , h 2 , i = A R h 2 , i , 1 , , h 2 , i , L T , g p = A R g 1 , p , , g L , p T , where p = 1 , , M , R C L × L is the spatial correlation matrix for the RIS. The ( a , b ) th-entry of R is given by R a , b = sinc 2 u a u b / λ a , b = 1 , , L [13], where u ζ = 0 , mod ζ 1 , L H d H , ζ 1 / L H d V T , ζ a , b , and λ is the wavelength of the wave. With the previous expressions, the received SNR at B or E is formulated by
γ i = P | h i | 2 σ i 2 = γ ¯ i | h i | 2 .
Now, γ ¯ i = P / σ i 2 is defined as the average transmit SNR for B or E . As a first stage, the purpose is to approximate the magnitude of h i using some statistical distribution. For this purpose, we employed the EM learning algorithm, as follows:

3. RIS Channel Characterization

Here, using a simple mixture of Nakagami-m random variables (RVs) combined with the EM strategy, the end-to-end RIS channel was characterized in a simple manner.
Let h i = h i 1 t be a training set vector of t samples of h i in (2); it is approximated that h i is observed by B and E using a mixture of Nakagami-m distributions, as follows [14]:
f h i ( r i ) z = 1 C ω z , i N z , i r i ; m z , i , Ω z , i ,
where C is the mixture size (i.e., the number of Nakagami-m components), N z , i r i ; m z , i , Ω z , i = m z , i m z , i r i 2 m z , i e m z , i r i 2 Ω z , i 2 1 Γ ( m z , i ) Ω z , i m z , i r i , ω z , i 1 , , C with z = 1 C ω z , i = 1 and 0 ω z , i 1 are the mixture weights, and Ω z , i and m z , i are the mean powers and the fading elements of the weighted PDFs, respectively. Here, we refer to the unsupervised EM method to fit the mixture parameters. Specifically, in the expectation (E)-step of the EM technique, the posterior probabilities (i.e., membership values) of the zth-weighted PDF of both B and E can be calculated as [14]
τ z j , i ( k ) = ω z , i N z , i h i , j ; m z , i , Ω z , i l = 1 C ω l , i N l , i h i , j ; m z , i , Ω z , i , z = 1 , , C , j = 1 , , t ,
where k represents the present iteration, t is the size of the sample set in (2), h i , j , j = 1 t are the unlabeled samples at the receiver node i B , E , and z is the mixture component. Next, in the M-step of the EM algorithm, the updated parameters are fitted by maximizing the log-likelihood formulation of each RV-weighted mixture via the posterior probabilities. Hence, the updated parameters of the receive sides can be calculated as [14]
Ω z , i ( k + 1 ) = j = 1 t τ z j , i ( k ) h i , j 2 j = 1 t τ z j , i ( k ) m z , i ( k + 1 ) = 1 + 1 + 4 Δ z , i k 3 4 Δ z , i k ω z , i ( k + 1 ) = j = 1 t τ z j , i ( k ) t , Δ z , i k = j = 1 t τ z j , i ( k ) log ( Ω z , i ) log ( h i , j 2 ) j = 1 t τ z j , i ( k )
Algorithm 1 displays the EM Nakagami-m mixture model, where the initial mixture weights are randomly selected from U [ 0 , 1 ] , and the start values for the scaling parameters of Nakagami-m PDFs are calculated using the maximum likelihood estimation (MLE). Also, comparable toleration practice is employed as a stopping criterion. It is worth pointing out that the EM can efficiently model any target system’s wireless channel considered in (2). In fact, EM can also be utilized even with experimental measurement channel data.   
Algorithm 1: Unsupervised EM machine learning algorithm for fitting ω i , Ω i , and m i of Nakagami-m RVs
Engproc 77 00001 i001

4. RIS Secrecy Performance

4.1. Distribution of γ E and γ B

The PDFs and CDFs of the received SNR in E and B , respectively, are acquired by performing a transformation of variables from (5). Thus, this yields
f E ( γ E ) = z = 1 C γ E κ z , E 1 γ ¯ E θ z , E κ z , E Γ ( κ z , E ) e γ E γ ¯ E θ z , E , F B ( γ B ) = z = 1 C Υ κ z , B , γ B γ ¯ B θ z , B Γ κ z , B
where κ z , i = m z , i and θ z , i = Ω z , i / m z , i .

4.2. Secrecy Outage Probability (SOP)

This metric is useful for passive eavesdropping scenarios where Eve channel’s channel state information (CSI) is not known at Alice. Thus, Alice encodes the information at an unchanging secrecy rate R S . Based on [15], the secrecy capacity, i.e., C S , is calculated as C S = max C B C E , 0 , with C B = log 2 ( 1 + γ B ) and C E = log 2 ( 1 + γ E ) being the channel capacities at B and E , respectively. Here, secrecy is attained only when R S C S , and it is compromised otherwise. Mathematically speaking, a lower bound of the SOP can be determined as [15 SOP L ( R S ) = 0 F γ B 2 R S γ E f γ E ( γ E ) d γ E . Hence, an approximation of the SOP L can obtained as stated below.
Proposition 1.
The SOP L for RIS-assisted MISO networks under generalized fading is approximated as
SOP L ( R S ) = s = 1 C z = 1 C ω s , B ω z , E γ ¯ E θ z , E γ ¯ B θ s , B κ s , B 2 R S κ s , B κ s , B B κ s , B , κ z , E F 1 2 κ s , B + κ z , E , κ s , B ; 1 + κ s , B ; 2 R S γ ¯ E θ z , E γ ¯ B θ s , B .
Proof. 
SOP L can be easily derived from ([16], Equation (7)), with the corresponding substitutions of (9), and after some mathematical manipulations. □

4.3. Average Secrecy Rate (ASR)

This metric is relevant for the active eavesdropping case, where Alice knows the CSI of both Bob and Eve channels. Alice can guarantee secrecy by adjusting her transmission rate subject to R S . Based on [17], the ASR can be computed as ASR = 0 1 SOP L ( x ) d x .
Proposition 2.
The ASR expression of the RIS underlying network is approximated by
ASR c = 1 η ξ c e x c u 1 ( x c ) ,
where u 1 ( x c ) = e x c ( 1 SOP L ( x c ) ) and x c and ξ c are the cth zero (root) and weight of the ηth-order Laguerre polynomial ([10], Equation (22.2.13)).
Proof. 
Based on Gauss–Laguerre quadrature technique ([10], Equation (25.4.45)), the exact ASR can be approximated by a weighted sum of samples. □

4.4. Average Secrecy Loss (ASL)

This novel secrecy metric relates to the information leaked from A to E. Using ([17], Equation (9)), the ASL is expressed as in the following proposition.
Proposition 3.
The ASL formulation of the underlying network is expressed as
ASL j = 1 υ ρ j e x j u 2 ( x j ) ASR 2 1 ,
where u 2 ( x j ) = 2 x j e x j ( 1 SOP L ( x j ) ) , x j , and ρ j are the jth zero (root) and weight of the υth-order Laguerre polynomial ([10], Equation (22.2.13)).
Proof. 
Again, the Gauss–Laguerre quadrature approach is used to approximate the integral ([17], Equation (10)), which involves the computation of the exact ASL. □

5. Numerical Results and Discussions

Here, we investigated how correlated channels over generalized fading impact the system’s secrecy performance, assuming discrete phase shifts, as well as the goodness-of-fit of the approximations for the RIS channels. Monte Carlo (MC) simulations for EM-based approximations are included in all instances with markers. For the sake of comparison, the well-known moment matching method (MoM) (For informative purposes and to compare the MoM with the proposed method fairly) models the end-to-end channel in (2) through a Nakagami-m distribution. Here, the fitting parameters were obtained numerically by calculating the moments and equating them to the parameters of the Nakagami-m distribution, as indicated by the MoM procedure in ([18], Sec. III).) proposed in [18] for modeling generalized RIS channels (i.e., (2)) is included as a baseline in the secrecy analysis. Also, to estimate the parameters of the Nakagami-m mixture model with the EM method, 10 5 realizations are generated for the unlabeled training set in (2), which is required in Algorithm 1 for both Bob and Eve. Specifically, these generated channel coefficients are the observations, constituting the input in Algorithm 1. With the output of Algorithm 1 (e.g., ω z , i , Ω z , i , and m z , i ), these fitting parameters are used in (9) to be later substituted into (10)–(12); in this way, the performance of the underlying system model is evaluated. The discrete phase shift ϕ l is built from U [ 2 q π , 2 q π ] , where q 1 is the amount of quantization bits utilized to encode the phase shifts errors, i.e., the discrete set of 2 q phases that can be configured on the RIS (a larger q refers to smaller phase errors on RIS’s configuration).
In all figures, the following considerations are assumed: (i) a RIS-aided network system given in [13] with a frequency of 3 GHz (i.e., λ = 0.1 m), B W = 1 MHz of bandwidth, a transmit power of P = 23 dBm, and an AWGN with a power spectral density of N 0 = 174 dBm/Hz. Hence, σ i 2 = N 0 B W = 114 dBm, which makes P / σ i 2 = γ ¯ i = 137 dB, (ii) R S = 1 bps/Hz for all SOP curves, and (iii) C = 2 as the number of components of the Nakagami-m mixture.
Moreover, only Figure 2b includes both direct and indirect links. For mathematical compactness, the power ratio parameter is represented as being analogous to the Rician K factor, i.e., K N ( · ) = Δ Ω N ( · ) Ω 0 , with Ω N ( · ) = n = 0 N ( · ) V ( · ) ( n , · ) 2 being the total average power of the dominant components. Also, K dB ( · ) = 10 log 10 K ( · ) = K N ( · ) is defined. Likewise, the amplitudes of corresponding rays are depicted in terms of the amplitude of the first dominant component, i.e., V ( · ) ( n , · ) = α n , ( · ) V ( · ) ( 1 , · ) for n = 2 , , N ( · ) , with 0 < α n , ( · ) < 1 . Figure 2a shows the SOP vs. β 2 , B for different channel setups. Here, the following cases are assumed. Case I : The legitimate paths are subject to Rician fading, i.e., N A , RIS = N RIS , B = 1 with V 1 ( 1 , · ) = V 2 , B ( 1 , · ) = 1 for K dB A , RIS = K dB RIS , B = 12 dB, and the eavesdropper link, i.e., RIS-to-E, follows Rayleigh fading (i.e., N RIS , E = 0 ). Case II : All channels follow Rayleigh fading (i.e., the classical assumption). For the aforementioned cases, the remaining system parameters are M = 5 , L = 144 , q = 5 , β 1 = 20 dB, β 2 , E = 30 dB, and d H = d V λ / 2 , λ / 5 . Here, the impact of dealing with both Rician fading and RIS-correlated channels is explored. From all traces, we observed that a more favorable channel propagation for legitimate links (i.e., Rician fading) contributes to improving the SOP performance with respect to Rayleigh propagation’s counterpart. Moreover, revealing SOP behavior is observed depending on the strength of the correlation on RIS channels. For instance, decreasing the size of RIS units (i.e., hard-correlated RIS channels) leads to lower secrecy performance.
Figure 2b illustrates the SOP vs. β 2 , B when both Bob and Eve have a direct path. Here, all the indirect paths, i.e., A-to-RIS, RIS-to-B, and RIS-to-E, follow Rayleigh fading. However, the direct links, i.e., A-to-B and A-to-E, are subject to TWDP fading. Thus, N d , E = N d , B = 2 with V d , E ( 1 , · ) = V d , B ( 1 , · ) = 1 , α 2 , d , B = α 2 , d , E = 0.7 for K dB d , B = K dB d , E = 18 dB. The remaining parameters are set to M = 8 , L = 196 , A β 1 = 30 dB, A β 2 , E = 50 dB, and d H = d V = λ / 3 . From this figure, we observed that the combination of mild path loss (i.e., β d , i = 40 dB) and good propagation conditions (i.e., TWDP fading) on Bob’s direct link is favorable to achieve better secrecy performance. Also, for this scenario, notice that the RIS does not contribute significantly to the system’s performance due to the presence of a strong LoS for Bob and Eve’s links. However, the SOP’s behavior changes slightly from β 2 , B 20 dB since the RIS-to-B link presents better channel conditions than the direct A-to-B link. Therefore, the RIS begins to operate in this region, and a difference in the phase error’s configuration is observed. Now, when direct paths are heavily attenuated (i.e., β d , i = 90 dB), the use of the RIS makes sense in this case since different performances of the SOP are obtained by varying q.
Figure 3a presents the ASR vs. β 2 , B . In this figure, base values (i.e., baseline fading channel models) are considered to measure the system’s performance by setting different propagation conditions. Also, the following scenarios are considered: Case III : A-to-RIS link (Rician), N A , RIS = 1 with V 1 ( 1 , · ) = 1 for K dB A , RIS = 25 dB. RIS-to-B link (three rays), N RIS , B = 3 with V 2 , B ( 1 , · ) = 1 , α n , RIS , B = 0.1 for n = 2 , 3 , and K dB RIS , B = 25 dB. RIS-to-E link (TWDP), N RIS , E = 2 with V 2 , E ( 1 , · ) = 1 , α 2 , RIS , E 1 , 0.5 , 0.1 for K dB RIS , E = 25 dB. Also, M = 6 , L = 196 , q = 4 , A β 1 = A β 2 , E = 50 dB, and d H = d V = λ / 4 . Herein, the impact of Eve’s fading TWDP parameters on the ASR performance is explored. From all traces, notice that there is a mixture of more dominant paths in B than E and that lower amplitude values associated with Eve’s rays (i.e., α 2 , RIS , E ) lead to poor ASR performance. This result verifies that the amplitudes of the specular waves play relevant roles in secure communication criteria of over-generalized channel conditions.
Figure 3b depicts the ASL vs. β 2 , B by altering the elements at the RIS. For this scenario, we considered that all indirect paths follow Rician fading, i.e., N A , RIS = N RIS , B = N RIS , E = 1 with V 1 ( 1 , · ) = V 2 , B ( 1 , · ) = V 2 , E ( 1 , · ) = 1 for K dB A , RIS = K dB RIS , B = K dB RIS , E = 20 dB. Furthermore, M = 4 , q = 6 , A β 1 = A β 2 , E = 45 dB, and d H = d V = λ / 3 . From all instances, it was observed that information leakage was drastically reduced as the number of elements on the RIS increased. Here, the ASL shows how much β 2 , B the system needs to drive the information leak to zero. For instance, in the proposed setup, from β 2 , B 35 dB, communication between legitimate links is secure. In addition, notice that in all the analyzed curves, the proposed approximation beats the MoM in precision, mainly in the secrecy outage-based metric. Finally, it is worth mentioning that an energy consumption parameter that integrates energy collection from environmental sources with secure communication mechanisms at the physical layer is not considered. However, this topic is out of this paper’s scope and will be explored in the future.

6. Conclusions

The secrecy performance of the RIS-assisted wiretap MISO system by assuming generalized fading channels and discrete phase shifts was explored. Specifically, secrecy metrics such as the SOP, ASR, and ASL were obtained in closed-form expression to evaluate the secure performance by approximating the end-to-end RIS channel through an unsupervised EM learning algorithm. Some insights reveal how different propagation conditions and RIS practical implementation (e.g., discrete phase-shift noise, spatial correlation, beamforming, presence of direct link) impact secrecy performance. For instance, when the direct link is present in the communication between Alice and Bob, using a RIS is practically unnecessary despite correctly configuring the phase error. On the contrary, when only the non-line-of-sight link between Alice and Bob is available, RIS technology is essential so that the information does not leak to the eavesdropper.

Author Contributions

Conceptualization, J.D.V.-S.; methodology, A.Z. and R.M.; writing—original draft preparation, A.Z. and J.O.; writing—review and editing, J.D.V.-S. and A.Z.; supervision, R.M. and J.O. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

The work of Ana Zambrano and Ricardo Mena was supported by the Escuela Politécnica Nacional, under research project PII-DETRI-2024-02, “Análisis de desempeño de comunicaciones 6G asistidas por superficies inteligentes reconfigurables o antenas fluidas”.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zhou, G.; Pan, C.; Ren, H. Secure Wireless Communication in RIS-Aided MISO System with Hardware Impairments. IEEE Wirel. Commun. Lett. 2021, 10, 1309–1313. [Google Scholar] [CrossRef]
  2. Yacoub, M.D. The κ-μ distribution and the η-μ distribution. IEEE Antennas Propagat. Mag. 2007, 49, 68–81. [Google Scholar] [CrossRef]
  3. Durgin, G.D. Theory of Stochastic Local Area Channel Modeling for Wireless Communications. Ph.D. Thesis, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA, 2000. [Google Scholar]
  4. Chun, Y.J. A generalized fading model with multiple specular components. arXiv 2018, arXiv:1810.05258. [Google Scholar]
  5. Zöchmann, E.; Caban, S.; Mecklenbräuker, C.F.; Pratschner, S.; Lerch, M.; Schwarz, S.; Rupp, M. Better than Rician: Modelling millimetre wave channels as two-wave with diffuse power. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 21. [Google Scholar] [CrossRef]
  6. Trigui, I.; Ajib, W.; Zhu, W.-P.; Renzo, M.D. Performance Evaluation and Diversity Analysis of RIS-Assisted Communications Over Generalized Fading Channels in the Presence of Phase Noise. IEEE Open J. Commun. Soc. 2022, 3, 593–607. [Google Scholar] [CrossRef]
  7. Alves Junior, M.A.; Fraidenraich, G.; Ferreira, R.C.; De Figueiredo, F.A.P.; De Lima, E.R. Multiple-Antenna Weibull-Fading Wireless Communications Enhanced by Reconfigurable Intelligent Surfaces. IEEE Access 2023, 11, 107218–107236. [Google Scholar] [CrossRef]
  8. Wang, J.; Zhang, J.; Lu, J.; Wang, J.; Zhang, Q.; Wang, D. Secrecy Rate Analysis for RIS-Aided Multi-User MISO System over Rician Fading Channel. J. Commun. Inf. Netw. 2023, 8, 48–56. [Google Scholar] [CrossRef]
  9. Shi, W.; Xu, J.; Xu, W.; Yuen, C.; Lee Swindlehurst, A.; Zhao, C. On Secrecy Performance of RIS-Assisted MISO Systems Over Rician Channels with Spatially Random Eavesdroppers. IEEE Trans. Wirel. Commun. 2024, 23, 8357–8371. [Google Scholar] [CrossRef]
  10. Abramowitz, M.; Stegun, I.A. Handbook of Mathematical Functions; US Department of Commerce, National Bureau of Standards: Washington, DC, USA, 1972.
  11. Wu, Q.; Zhang, R. Intelligent Reflecting Surface Enhanced Wireless Network: Joint Active and Passive Beamforming Design. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar] [CrossRef]
  12. Durgin, G.D.; Rappaport, T.S.; De Wolf, D.A. New analytical models and probability density functions for fading in wireless communications. IEEE Trans. Commun. 2002, 50, 1005–1015. [Google Scholar] [CrossRef]
  13. Björnson, E.; Sanguinetti, L. Rayleigh Fading Modeling and Channel Hardening for Reconfigurable Intelligent Surfaces. IEEE Wirel. Commun. Lett. 2020, 10, 830–834. [Google Scholar] [CrossRef]
  14. Sánchez, J.D.V.; Urquiza-Aguiar, L.; Paredes, M.C.P.; López-Martínez, F.J. Expectation-Maximization Learning for Wireless Channel Modeling of Reconfigurable Intelligent Surfaces. IEEE Wirel. Commun. Lett. 2021, 10, 2051–2055. [Google Scholar] [CrossRef]
  15. Bloch, M.; Barros, J.; Rodrigues, M.R.D.; McLaughlin, S.W. Wireless Information-Theoretic Security. IEEE Trans. Inf. Theory 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
  16. Kong, L.; Tran, H.; Kaddoum, G. Performance analysis of physical layer security over α-μ fading channel. Electron. Lett. 2016, 52, 45–47. [Google Scholar] [CrossRef]
  17. Li, S.; Yang, L.; Hasna, M.O.; Alouini, M.S.; Zhang, J. Amount of Secrecy Loss: A Novel Metric for Physical Layer Security Analysis. IEEE Commun. Lett. 2020, 24, 1626–1630. [Google Scholar] [CrossRef]
  18. Da Costa, D.B.; Yacoub, M.D.; Filho, J. Highly Accurate Closed-Form Approximations to the Sum of α-μ Variates and Applications. IEEE Trans. Wirel. Commun. 2008, 7, 3301–3306. [Google Scholar] [CrossRef]
Figure 1. RIS-aided wiretap MISO wireless communication system.
Figure 1. RIS-aided wiretap MISO wireless communication system.
Engproc 77 00001 g001
Figure 2. (a) SOP vs. β 2 , B with different channel configurations. (b) SOP vs. β 2 , B by varying both β d , i and q in the presence of direct and indirect paths. The solid lines represent the proposed analytical solutions.
Figure 2. (a) SOP vs. β 2 , B with different channel configurations. (b) SOP vs. β 2 , B by varying both β d , i and q in the presence of direct and indirect paths. The solid lines represent the proposed analytical solutions.
Engproc 77 00001 g002
Figure 3. (a) ASR vs. β 2 , B with different number of specular components on the receiver sides. (b) ASL vs. β 2 , B by varying the number of elements on the RIS. The solid lines represent the proposed analytical solutions.
Figure 3. (a) ASR vs. β 2 , B with different number of specular components on the receiver sides. (b) ASL vs. β 2 , B by varying the number of elements on the RIS. The solid lines represent the proposed analytical solutions.
Engproc 77 00001 g003
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Vega-Sánchez, J.D.; Zambrano, A.; Mena, R.; Oscullo, J. Information-Theoretic Security of RIS-Aided MISO System Under N-Wave with Diffuse Power Fading Model. Eng. Proc. 2024, 77, 1. https://doi.org/10.3390/engproc2024077001

AMA Style

Vega-Sánchez JD, Zambrano A, Mena R, Oscullo J. Information-Theoretic Security of RIS-Aided MISO System Under N-Wave with Diffuse Power Fading Model. Engineering Proceedings. 2024; 77(1):1. https://doi.org/10.3390/engproc2024077001

Chicago/Turabian Style

Vega-Sánchez, José David, Ana Zambrano, Ricardo Mena, and José Oscullo. 2024. "Information-Theoretic Security of RIS-Aided MISO System Under N-Wave with Diffuse Power Fading Model" Engineering Proceedings 77, no. 1: 1. https://doi.org/10.3390/engproc2024077001

APA Style

Vega-Sánchez, J. D., Zambrano, A., Mena, R., & Oscullo, J. (2024). Information-Theoretic Security of RIS-Aided MISO System Under N-Wave with Diffuse Power Fading Model. Engineering Proceedings, 77(1), 1. https://doi.org/10.3390/engproc2024077001

Article Metrics

Back to TopTop