Abstract

Currently, the reconfigurable intelligent surface (RIS) has been applied to improve the physical layer security in wireless networks. In this paper, we focus on the secure transmission in RIS-aided multiple-input single-output (MISO) systems. Specifically, by assuming that only imperfect channel state information (CSI) of the eavesdropper can be obtained, we investigated the robust secrecy energy efficiency (SEE) optimization via jointly designing the active beamforming (BF), artificial noise (AN) at Alice, and the passive phase shifter at the RIS. The formulated problem is hard to handle due to the complicated secrecy rate expression as well as the infinite constraints introduced by the CSI uncertainties. By utilizing the Taylor expansion, we transformed the fractional programming into a convex problem, while all the constraints are approximated via the successive convex approximation and constrained concave-convex procedure. Then, by using the extended S-Lemma, we transform the infinite constraints into linear matrix inequality, which is convex. Finally, an alternate optimization (AO) algorithm was proposed to solve the reformulated problem. Simulation results demonstrated the performance of the proposed design.

1. Introduction

Recently, the energy efficiency (EE) has been regarded as an important aspect in assessing the performance of communication systems, which is defined as the ratio of the information rate to the total power consumption [1]. Meanwhile, the reconfigurable intelligent surface (RIS) has been emerged as a promising technique to improve the performance such as coverage, throughput, spectrum efficiency (SE), and EE of future wireless networks [2, 3].

To be specific, Fang et al. [4] studied the EE optimization of RIS-enabled nonorthogonal multiple access (NOMA) networks, where a semidefinite relaxation- (SDR-) based algorithm was proposed to optimize the transmit and passive BF. Then, [5] investigated the EE-oriented resource allocation for RIS-assisted uplink systems by using a block coordinate descent- (BCD-) based method. Then, Le et al. [6, 7] studied the EE optimization in RIS-assisted cell-free multiple-input single-output (MISO) and multiple-input multiple-output (MIMO) network, respectively. Moreover, Yang et al. [810] investigated the EE optimization of distributed wireless network, device-to-device network, and wireless energy harvesting network, respectively. Recently, Yuo et al. [11] studied the EE and SE tradeoff in RIS-aided MIMO network, where an iterative mean-square error minimization approach was developed to optimize the phase shifter. On the other hand, in [12], Wang et al. studied the cooperative hybrid NOMA-based mobile-edge computing networks. In [13], Wang et al. studied the delay-sensitive secure NOMA transmission for Internet-of-Things (IoT) networks. Then, Wang et al. [14] investigated the outage-driven link selection for secure buffer-aided networks. Moreover, He et al. [15] investigated a NOMA-enabled framework for relay deployment and network optimization in airborne access vehicular ad hoc networks.

Besides the benefits of improving the SE or EE, the application of RIS is also appealing in secure communication application. For example, Dong and Wang [16] studied the secure MIMO transmission enhanced by a RIS, where a BCD-based method was proposed to design the precoding and phase shifter. Then, a minorization-maximization- (MM-) based method was proposed to optimize the precoding, artificial noise (AN) covariance and the phase shifter for secure MIMO network in [17]. Actually, if the phase shifts are given, the optimization problem reduces to a conventional beamforming (BF) design problem in MISO network, which has been extensively studied in the literature. Inspired by this consideration, alternating optimization (AO) algorithms are usually applied to decouple the optimization variables. Then, the BF vectors at the Tx are typically obtained by using existing BF design methods such as the weighted minimum mean square error (WMMSE) algorithm [18]. On the other hand, the optimization methods of the phase shifts in RIS-assisted network can be summarized as follows: (a) optimization techniques for continuous phase shifts: (1) relaxation and projection; (2) SDR; (3) majorization-minimization (MM) algorithm; (4) manifold approach; (5) element-wise BCD; (6) alternating direction method of multipliers (ADMM) based algorithm; (7) penalty convex-concave procedure (PCCP); (8) barrier function penalty; (9) accelerated projected gradient; (10) deep reinforcement learning. (b) Optimization techniques for discrete phase shifts: (1) rounding method; (2) binary mode selection method; (3) negative square penalty [19].

The performance index of these works were commonly measured by the criterion called secrecy rate, which is the capacity of conveying information to the legitimated users (Bobs), while keeping it confidential from the eavesdroppers (Eves) [20]. However, for network design with both security and EE requirements, it is beneficial to combine these two metrics into an individual target, which is termed as the secrecy EE (SEE) and defined as the ratio between the achieved secrecy rate to the total power consumption. Specifically, Wu et al. [21] studied the SEE maximization in RIS-assisted cognitive radio system, where a Dinkelbach and second order cone programming- (SOCP-) based method was proposed. Also, Wang et al. [22] studied the robust BF and cooperative jamming design in a RIS-assisted MISO network to maximize the SEE, where an AO algorithm was developed. Recently, Liu et al. [23] studied the SEE in RIS-aided secure simultaneous wireless information and power transfer (SWIPT) network, where an AO-based method was proposed.

The acquirement of the channel state information (CSI) is an important issue in communication network. Currently, the methods of the channel estimation for the RIS-aided network can be divided into two folds. The first one is to estimate the transmitter (Tx)-RIS channel and the RIS-user channel separately by installing some active elements at the RIS, which requires more hardware and power consumption [24]. The second method is to estimate the cascaded Tx-RIS-user channel, e.g., the product of the Tx-RIS channel and the RIS-user channel, where the main advantage is that no extra hardware and power cost are needed [25], and actually the cascaded channel is sufficient for the joint BF design [26]. However, in secure communication scenario, since the Eves are commonly passive nodes, it is very hard to obtain the perfect CSI of the Eves.

In existing works, the CSI of the Eves are commonly model as the bounded error model and the statistical error model. For the bounded CSI errors, in [27], Zhou et al. studied the worst-case robust BF design for RIS-aided MISO communication systems to maximize the worst case information rate. Then, Yu et al. [28] studied the worst-case robust secrecy design in RIS-assisted network with bounded CSI errors. Besides, for the statistical error model, in [29], Zhao et al. studied the outage-constrained robust BF for RIS-aided wireless communication. Also, in [30, 31], the authors studied the outage-constrained BF in RIS-assisted secure network. Then, in [20, 32], the authors studied both the two kinds of robust design in RIS-aided multiuser system and secure SWIPT system, respectively. Recently, in [33], Hong et al. proposed a novel On/Off scheme for the RIS to improve the robustness. However, these works mainly focused on the secrecy rate optimization; the SEE in RIS-aided multiuser downlink network has not been studied yet.

Motivated by these observations, in this paper, we investigate the robust SEE design in a downlink multiuser MISO network. The main contributions are summarized as follows: (i)by assuming that only imperfect CSI of the Eve can be obtained, we aim to maximize the worst case SEE by jointly designing the active BF and AN at Alice, and the passive phase shifter at the RIS. The formulated problem is hard to handle due to the complicated secrecy rate expression as well as the infinite constraints introduced by the CSI uncertainty(ii)differently with the commonly used Dinkelbach algorithm, which turn the fractional objective into a subtractive form, we equivalently transform it into a more tractable reformulation with linear objective via successive convex approximation (SCA) and constrained concave-convex procedure (CCCP). Then, by using the extended S-Lemma, we transform the infinite constraints into linear matrix inequality, which is convex(iii)finally, an AO algorithm was proposed to solve the reformulated problem. Simulation results demonstrated the performance of the proposed design and provide some meaningful insights. (1) RIS plays more important role than AN in enhancing the SEE; (2) less number of quantization bits can lead to higher SEE; (3) the acquirement of the CSI is important in secrecy transmission design

The rest of this paper is organized as follows. A system model and problem formulation is given in Section 2. Section 3 investigates the joint BF, AN, and phase shifter design, wherein a SCA and CCCP based iterative approach is proposed. Simulation results are illustrated in Section 4. Section 5 concludes this paper.

Notations: Throughout the paper, we use the upper case boldface letters for matrices and lower case boldface letters for vectors. The conjugate, transpose, conjugate transpose, and trace of matrix are denoted as , , , and , respectively. means to stack the columns of into . means that is positive semidefinite. Besides, represents a diagonal matrix with on the main diagonal. and denote the Euclidean norm and Frobenius norm, respectively. indicates an identity matrix. Moreover, , , and denote the real part, the modulus, and the angle of a complex number , respectively. The distribution of a circularly symmetric complex Gaussian (CSCG) random vector with mean and covariance is denoted by . In addition, means the Hadamard production; denotes the Kronecker product, and means the mathematical expectation, respectively.

2. System Model and Problem Formulation

2.1. System Model

We consider a downlink multiuser MISO system as shown in Figure 1, which consists of one transmitter (Alice), one RIS, Bobs, and Eves. The Alice and the RIS are equipped with antennas and reflecting elements, respectively, while all Bobs and Eves are single antenna nodes. We denote , , , , and , as the channels between Alice and RIS, between Alice and the -th Bob, between RIS and the -th Bob, between Alice and the -th Eve, and between RIS and the -th Eve, respectively. In addition, we assume that a RIS controller is utilized to exchange the CSI between Alice and the RIS. Besides, the controller adjusts the phase shift and amplitude of each passive element at the RIS to achieve passive BF so that the signal power is improved at the Bobs or reduced at the Eves.

Alice sends independent data streams for each Bob in the same frequency band, under the thread of the Eves. Let us denote as the confidential message intended to the -th Bob, with . Since AN is injected to degrade the Eve’s channel, the transmitted signal is given as , where denotes the BF vector intent to the -th Bob, and denotes the AN vector.

In this work, we assume that each Eve only eavesdrop the signal send to the nearest Bob. Thus, the received signals at the -th Bob and the -th Eve are, respectively, given by where and are the zero-mean additive Gaussian noise at the -th Bob and Eve, with variance and , respectively.

Here, we assume that the Bobs have the priori knowledge about the AN vector . Thus, Bobs can cancel the interference and the actually received signal at the -th Bob is given by .

Here, denotes an diagonal reflection coefficient matrix (also known as the passive BF matrix), which can be written as , . Let denote the number of quantization bits for phase-shift control per RIS element, respectively. We thus have where with , i.e., the discrete phase-shift values are assumed to be equally spaced in a circle. Furthermore, by letting , the model in (2) becomes the case with continuous phase shifts, i.e., . In practice, due to the hardware limitation, it is costly to achieve continuous phase shift on the reflecting elements. However, it is meaningful to investigate the continuous phase shift design, since the optimization method for the continuous phase shift is useful to the discrete phase shift design.

In fact, by denoting , we have and

Thus, the signal-to-interference-plus-noise ratio (SINR) at the -th BoB and the -th Eve can be given as respectively.

Hence, the information rates at the -th Bob and the Eve are, respectively, given by

Thus, the secrecy rate for the RIS-assisted network is given by

Similar to [11], the total power consumption of the network is model as where denotes the transmit power; is the power amplifier efficiency for Alice. In addition, the constant denotes the total circuit power consumption for Alice and the receivers. Without loss of generality, we assume in the following part, [10, 21, 23]. Besides, denotes the per unit hardware dissipated power at the RIS with a -bit resolution phase shifter. From (11), we can observe that the RIS operates without consuming any transmit power, since RIS is a passive device which do not change the magnitude of the reflected signals. (According to [3], the typical power consumption values of each phase shifter are , , , and for -, -, -, and -bit resolution phase shifting.)According to several related works such as [35], the linear power consumption model is rational when the following assumptions holds. First, the static circuit power is independent of the data rate. Second, the power amplifier at Alice operates in the linear region, thus a constant power offset can approximate the hardware power consumption. Typical wireless communication transceivers satisfy these two assumptions generally.

Therefore, the SEE for the RIS-aided network is defined as

2.2. CSI Error Models

In this work, both imperfect direct link and cascaded link are considered, i.e., we model and as where and denote the true CSI; and denote the estimated CSI; and denote the associated CSI error, respectively. Specifically, the following bounded CSI models are considered, where the CSI error is assumed to lie in a region with a given bound, i.e., where and denote the respective sizes of the bounded channel error region. As for the statistical error model, since it can be transformed into the bounded model by the proposed method in [20, 32], we focus on the bounded error model in this work due to the generality.

2.3. Problem Formulation

Our objective is to maximize the SEE by jointly designing , , and , subject to the maximum transmit power constraint and the unit modulus constraint (UMC). Here, we first relax the discrete phase shift design to the continuous phase shift design, then project the obtained solution to the discrete set. Mathematically, our problem is formulated as

Notably, we find that is nonconvex [34], which is hard to solve. In the next section, we will develop a tractable solution to through convex approximation.

3. Proposed SEE Optimization Method

In this section, we will propose a SCA and CCCP based method to convert into a solvable reformulation.

First, by introducing slack variables and , we recast as

Then, via introducing auxiliary variables and ; can be transformed into the following problem

Furthermore, to convert the fractional objective into a linear reformulation, we introduce auxiliary variables , , and , P3 can be recast as the following problem where we use the trick that maximize is equivalent to maximize to linear the objective.

is still hard to solve due to the nonconvex constraints (15(c)) and (15(d)). In the following, we will utilize the SCA and CCCP to approximate these constraints. Firstly, we handle the first part of (14(d)) and (14(g)). In fact, is equivalent to . Moreover, is equivalent to , which can be further rewritten as which is joint convex with respect to (w.r.t.) . Similarly, and can be equivalent rewritten as

Then, we turn to the right hand side of (14(c)), (14(e)), (14(g)) and (15(c)) to handle the nonconvex functions , , , and . In fact, in the -th iteration, these constraints can be replaced by the following linear constraints where , , , and are the optimal values of , , , and in the -th iteration, respectively.

Then, we focus on the nonconvex (14(b) and 14(f)). In fact, these constraints can be turn to convex constraints w.r.t. a given variable when fixing the others. Actually, the left hand side of (14(b)) is convex w.r.t. or when fixing the others. Since a convex function can be lower-bounded or under-estimated by the first order Taylor expansion around a given point, thus, in the -th iteration, (14(b)) can be approximated as where is the optimal values of in the -th iteration.

Then, (14(f)) can be approximated as where is the optimal values of in the -th iteration.

The remain task is to handle the CSI uncertainties in (18(b) and (20)). First, we denote , and ; it is known that . Besides, the following equation holds

Then, we denote

Thus, the following relationship holds where . We find the following extended S-Lemma is useful to handle the CSI uncertainty.

Lemma 2 (see [20]). Define the function with variable , where , , and . The condition holds if and only if there exists such that

To utilize Lemma 2, we first denote , . By invoking the identity , (18(b)) can be rewritten as

Following Lemma 2, (26) holds if the following linear matrix inequality (LMI) holds where are the slack variables, and .

Similarly, by denoting , (20) is equivalent to

Then, by Lemma 2, we find that (28) holds if the following LMI holds where are the slack variables, and .

Combining these steps, around given point , we obtained the following approximated subproblem w.r.t. which is convex and can be efficiently solved by the optimization toolbox, such as CVX [35].

Nextly, we handle these constraints w.r.t. with fixed . Here, we mainly focus on the difference between the counterpart of the optimization w.r.t. . Firstly, (23) can be approximated as where is the optimal values of in the -th iteration.

Then, for convenient, we denote , thus, (14(c)) can be approximated as and (14(f)) can be approximated as

Then, by Lemma 2, we find that (33) holds if the following LMI holds where are the slack variables, and .

To this end, the only nonconvexity in is the UMC (12(c)). In the following, we will utilize the penalty CCP method to handle (12(c)). According to the penalty CCP principle, (12(c)) can be first equivalently transformed into . Then, we introduce the following Lemma to handle the nonconvex part .

Lemma 3 (see [32]). Let be a complex scalar variable, then the following inequality holds for any fixed point .

Via Lemma 3, the subproblem w.r.t. can be formulated as where is the obtained in the previous iteration; is the slack variable for the UMC, and is the penalty multiplier to scale the penalty item , which can control the feasibility of . Here, is updated by , where the upper bound is used to avoid numerical problems. More details can refer to [27, 32].

To this end, we have solved efficiently. The whole procedure is summarized in Algorithm 3, where is the obtained optimal value in the -th iteration for . In addition, denotes the accuracy.

1.    Initialization: , set , , , , , and the initial value .
2:    Repeat
    (a) Obtain with fixed by solving .
    (b) Obtain with fixed by solving .
    (c) .
3:    Until.
4:    Output.

Thus, we have finished the algorithm in the continuous phase shift case. While for the discrete phase shift case, at the end of Algorithm 1, we project the obtained into the discrete set. In particular, we denote the solution of the two cases as and , respectively. Then, we map to obtain , i.e., , where .

4. Simulation Results

In this section, we provide simulation results to assess the performance of the proposed algorithm. The simulation scenario is shown in Figure 2, where there are one Alice, one RIS, Bobs, and Eves. A three dimensional coordinate system is utilized to represent the positions of these nodes, where Alice and RIS are deployed at (0 m, 0 m, and 10 m) and (50 m, 10 m, and 10 m), while all Bobs/Eves are randomly located in a circle centered at (50 m, 0 m, and 2 m) and with radius 5 m. In fact, the electromagnetic feature of each reflecting element can be adapted. Thus, by proper designing the phase of each reflecting element, the incident signal can be reflected to different direction to serve different users. Besides, the distance between these users is commonly smaller than the distance between the Alice to RIS, and the RIS is deployed more closer to the users than the Alice. Thus, the RIS does not need to form a very thin reflecting beam.

Unless otherwise specified, the simulation settings are assumed as follows: , , , , , and . The large-scale path loss is given by , where is the path loss at the reference distance ; is the link distance; is the path loss exponent. More details about the simulation parameters can refer to [36]. As for the CSI uncertainty, we use a parameter to model the uncertainty, which is given as , and , respectively, where and measure the relative number of the CSI errors and are set as and [32], respectively. In addition, for the parameters of the CCCP method, we set , , and [27].

Here, we compare the proposed method with the following benchmarks: (1) the no AN design, e.g., setting while only optimizing and ; (2) the random RIS design, e.g., choosing randomly; (3) the no RIS-assisted case; (4) Alice can obtain ideal CSI of the Eves, which can be seen as the upper bound of the proposed design; (5) the penalty dual decomposition (PDD) method in [20]; (6) the SDR with Gaussian randomization (GR) methods [4]. These designs are labeled as “Proposed method”, “No AN design”, “Random RIS”, “No RIS case”, “Ideal CSI case”, “PDD method”, and “SDR with GR”, respectively.

Firstly, we investigate the convergence behaviour of the proposed method by comparing the obtained SEE with the number of iterations. Figure 3 shows the convergence behaviour with different number of and via fixing all the other parameters. From this figure, we can see that the proposed method can always converge to the optimal solution in almost iterations, which suggests the convergence of the proposed method. Besides, it should be pointed that in the simulation, we utilize the obtained objective value of P5, e.g., in (50) to judge the secrecy energy efficiency. This is mainly due to the fact that there exists a penalty term in the objective of P6, thus using the obtained objective value of P5 to judge the secrecy energy efficiency is more straightforward.

Then, we compare the SEE of these schemes versus the transmit power budget , the result is shown in Figure 4. From this figure, we can see that the proposed method achieves the very closed performance with the PDD method, and outperforms the SDR with GR method. In addition, for all these methods, the SEE tends to increase with only when is smaller than a threshold and then the SEE approaches a constant when is larger than the threshold value. This is due to the fact that there exists a unique maximizer of the transmit power for SEE maximization and the SEE saturates when the power budget exceeds the value of this maximizer. Consequently, the actual transmit power remains constant when the maximum SEE is attained, leading to saturated SEE in high regimes. To provide more insights for this results, the corresponding secrecy rate is reported versus in Figure 5, where we can see that the secrecy rate increases rapidly with when is small and then increases slowly when is large. Thus, using all the available power budget to maximize the secrecy rate is not a sound strategy from the perspective of the energy efficiency. Besides, it is also observed that the no AN method achieves nearly performance with the proposed method, while the no RIS and random RIS methods suffer certain performance loss, especially for the no RIS design, which suggests that RIS play a more important role than AN in improving the performance.

Next, we show the obtained SEE of the proposed method versus and ; the result is shown in Figure 6. From this figure, we can see that the SEE increases monotonically with and . This is due to that larger or leads to higher secrecy rate, thus to improve the SEE. In addition, we can see that plays a more important role on the SEE performance than , since the RIS utilizes passive elements, no radio frequency chains will be required, thus lower power consumption can be obtained.

Moreover, we compare the SEE of these schemes versus the number of quantization bits ; the result is shown in Figure 7. From this figure, we can see that for all these RIS-aided methods, the SEE decreases monotonically with . This is mainly due to the fact that the increase of can only increase the secrecy rate slightly but lead a significant increase of the quantization energy consumption, thus decrease the SEE.

Finally, we show the SEE of these schemes versus the CSI uncertainty level and in Figures 8 and 9, respectively. From these two figures, we find that the SEE decreases when the uncertainty level increases. This phenomenon indicated that the CSI uncertainty level has nonnegligible impact on the secure performance. Since the larger CSI uncertainty level, the higher probability that the confidential information leakage to the Eve’s channel. In addition, by comparing Figure 8 with Figure 9, we can see that the CSI uncertainty of the cascaded channel plays a more dominating role than that of the direct channels in the SEE performance.

5. Conclusion

In this paper, we have investigated the robust SEE optimization in a RIS-assisted wiretap channels. Specifically, we aim to maximize the worst case SEE via jointly designing the BF, the AN covariance, and the phase shifter. Different with the commonly used Dinkelbach algorithm, we transformed the fractional programming into a solvable problem with linear objective, while all the constraints are approximated via SCA and CCCP. Then, an iterative method was proposed to solve the approximated convex problem. Simulation results demonstrated the performance of the proposed design.

Data Availability

Data available on request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this article.

Acknowledgments

This work was supported in part by the Natural Science Foundation of China under Grant No. 61673108, in part by the Colleges and Universities Natural Science Foundation in Jiangsu Province under Grant No.19KJA110002, and in part by the Industry-University-Research Cooperation Project of Jiangsu Province No. BY2020335 and No. BY2020358.