Next Article in Journal
RNNCon: Contribution Coverage Testing for Stacked Recurrent Neural Networks
Previous Article in Journal
Enhanced Efficiency at Maximum Power in a Fock–Darwin Model Quantum Dot Engine
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Secure Performance of Intelligent Reflecting Surface-Assisted HARQ Systems

1
Department of Electronic and Information Engineering, Anhui University of Finance and Economics, Bengbu 233030, China
2
School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(3), 519; https://doi.org/10.3390/e25030519
Submission received: 19 February 2023 / Revised: 14 March 2023 / Accepted: 15 March 2023 / Published: 17 March 2023
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
This paper analyzes the physical layer security performance of hybrid automatic repeat request (HARQ) systems with the assistance of an intelligent reflecting surface (IRS) and aims to reveal the primary factors that enhance PLS. First, closed-form expressions for the connection outage probability (COP) and secrecy outage probability (SOP) in HARQ with chase combining (HARQ-CC) are acquired using the generalized-K (KG) distribution. Then, these two critical metrics are derived while adopting HARQ with incremental redundancy (HARQ-IR), resorting to the mixture gamma (MG) distribution and the Mellin transform. Diversity and coding gain are also addressed through an asymptotic analysis of the COP and SOP. Finally, an evaluation of the numerical results demonstrates that a greater gain in the main channel and the wiretap channel can be produced by increasing the number of meta-surfaces rather than increasing the maximum transmission number, except for the higher signal-to-noise (SNR) region of HARQ-IR where the latter is preferred. This finding provides a significant guidance for the joint configuration of IRS and HARQ to achieve secure communication.

1. Introduction

Rapid developments in wireless communications have made intelligent reflecting surface (IRS), sometimes referred to as reconfigurable intelligent surface (RIS), an important candidate technology for 6G due to its flexible control and superior performance. IRS can be deployed in different locations with extremely low costs compared to base stations (BSs) or small cells. Smart radio environments (SREs) can also be achieved by adjusting the phase, frequency or other parameters of the reflected signal using a soft-defined architecture, which effectively enhances signal coverage and network transmission performance [1,2].
Significant research has been conducted to speed up the application of IRS, including studies on channel modeling, performance analysis and resource allocation. Generally, IRS channel modeling consists of two components; those are the transmitter-IRS channel and the IRS-receiver channel. A typical approach is to uniformly model the transmitter-IRS-receiver process as a cascade channel (i.e., the product of a two-part channel fading [3,4,5]). Basar et al. proposed a phase adjusting scheme aiming to improve the received signal-to-noise ratio (SNR) [6]. The central limit theorem (CLT) was applied so as to assess the probability density function (PDF) for this SNR when the amount of meta-surfaces (N) was great, to further derive a symbol error rate (SER) under different modulation conditions. However, in some scenarios, it is not necessary to allocate multiple meta-surfaces to a single user, and thus CLT is not suitable when N is small. Yang et al. noted a cascade channel can be accurately modeled with the generalized-K (KG) distribution [7]. An analysis conducted by Zhang et al. further demonstrated the influence of limited phase shifts on achievable performance levels [8]. Outage probability and spectral efficiency have also been deduced in multiple-element IRS-assisted systems [9]. In addition, Boulogeorgos et al. compared the outage probability and ergodic capacity of IRS-assisted and amplify-and-forward (AF) relaying wireless systems [10]. Huang et al. maximized spectral and energy efficiency through transmitting power allocation and meta-surface phase shifts [11]. Guo and Yang et al. optimized the achievable rate through dynamic passive beamforming in an IRS-assisted system while considering orthogonal frequency division multiplexing (OFDM) and multi-user channels [12,13].
Physical layer security (PLS), which ensures secure performance through a wireless propagation environment, has received increased attention recently. This is in part due to IRS systems that can flexibly configure a wireless propagation channel with the assistance of IRS. Connection outage probability (COP), secrecy outage probability (SOP) and secrecy rate (i.e., secrecy capacity) are commonly used performance optimization metrics for these systems. COP mainly describes the likelihood that the legitimate receiver (Bob) cannot decode transmitted codewords, and SOP gives the possibility that the eavesdropper (Eve) cannot be confused by secrecy redundancy after the k-th transmission. They indicate the reliability and security, respectively, while secrecy rate shows the overall secure performance [14,15]. For example, Yang et al. developed a closed-form solution of SOP and identified a corresponding asymptotic value in an IRS-assisted communication system using CLT [16]. Khoshafa et al. proposed an SOP for an IRS-assisted D2D system involving Meijer’s G-function [17]. Shen et al. investigated secrecy rate maximization for multi-antenna IRS systems by combined optimum design of source transmission covariance and IRS phase shift matrices [18]. This joint optimization was also achieved by Cui et al., who solved the problem through beamforming to enhance the secrecy rate [19] while taking into account a complex scenario where the wiretap channel exceeded the main channel. Similarly, Hong et al. applied a covariance matrix of artificial noise (AN) to the joint optimization of a block coordinate descent (BCD) algorithm [20]. This was done to maximize the secrecy rate when the transmitting power limit and unit modulus of the IRS phase shifts were constrained. A fast solution was proposed to solve these constrained optimization problems with a modified genetic algorithm [21]. Yu et al. introduced a robust secure transmission scheme, which considered imperfect channel state information (CSI) in the wiretap channel [22]. This system was designed to improve the sum-rate capacity with constrained highest information leakage for possible eavesdroppers. Wang et al. proposed a joint beamforming and jamming strategy that improved security in a more realistic scenario, in which the CSI was absent [23]. Gu et al. expressed the probabilities of a nonzero secrecy capacity and an ergodic secrecy capacity using closed-form expressions while considering the distribution of eavesdropper locations [24].
As a classical error-control technology, HARQ simultaneously ensures reliability and effectiveness using re-transmission and combining mechanisms. Previous studies have suggested that HARQ is also capable of improving physical layer security. Typical HARQ schemes primarily include chase combining (CC) and incremental redundancy (IR). In the case of HARQ-CC, decoding errors in the receiver trigger the re-transmission of same redundancy versions. Soft information from initial transmissions and re-transmissions is then combined, producing gains in the SNR. Unlike HARQ-CC, HARQ-IR constructs re-transmitted data using various redundancy versions, thus achieving higher coding gain. This approach is not only more efficient, it is also more complex and improvements to its design have been the subject of several recent studies [25,26,27]. In addition, Tang et al. gave the discussion of secrecy outage probability and secrecy throughput in secure HARQ transmissions [28]. Mheich et al. designed a rate adaptive secure HARQ scheme [29], and Guan et al. addressed the reliability–security trade-off and accurate secrecy throughput [30]. It has been demonstrated that an eavesdropper cannot obtain the same diversity gain as a legitimate user, since re-transmissions rely solely on the latter user [31]. As another import metric, effective secrecy throughput (EST) with multiple eavesdroppers has been optimized in secure HARQ transmissions [32]. Additionally, Park proposed Kalman combining-based iterative detection and decoding schemes for multiple-input multiple-output (MIMO) systems with HARQ [33], and Wu et al. achieved a tradeoff between timeliness and reliability for HARQ-CC aided non-orthogonal multiple-access (NOMA) systems [34].
HARQ plays an important role in error-control mechanisms for IRS-assisted systems, as its diversity attributes will inevitably impact reliability and security. Cao et al. addressed the outage rate and progressiveness of Type-1 and HARQ-CC for multi-RIS systems [35]. However, a similar study has yet to be conducted for the more efficient HARQ-IR scheme. Moreover, the performance of PLS in IRS-assisted HARQ systems has yet to be reported. As such, this study first analyzes secure IRS-assisted HARQ performance. Additional contributions of this work include the following:
  • Closed-form expressions for COP and SOP are derived in IRS-assisted HARQ-CC systems while considering the differences in received SNR between the main channel and the wiretap channel. These two SNR distributions can be accurately approximated by the sum of KG distributed random variables (RVs) with varying parameters.
  • Closed-form expressions for COP and SOP in IRS-assisted HARQ-IR systems are derived with the stated differences in received SNR. The mixture gamma (MG) distribution and the Mellin transform are then required to efficiently solve this problem, owing to the computing complexity of IR.
  • Diversity gain and coding gain in the main channel and wiretap channel are then derived via COP/SOP and their asymptotic values using a series expansion of Meijer’s G-function.
  • Numerical results verify the accuracy of our derivations and confirm that the amounts of meta-surfaces and the maximum transmission number have varying influence on COP and SOP for HARQ-CC and HARQ-IR.
The remainder of this paper is structured as follows. Section 2 describes the overall system model as well as secure transmission without HARQ. Section 3 derives closed-form expressions for COP and SOP in IRS-assisted systems with HARQ-CC and HARQ-IR, respectively. Section 4 provides asymptotic values for COP and SOP, along with their corresponding diversity gain and coding gain. Numerical and simulated results are discussed in Section 5. Section 6 concisely concludes our study.
Notation: K v ( · ) represents the modified Bessel function of the second kind and order v, Γ ( · ) denotes the gamma function, E [ · ] indicates the expectation operator, G p , q m , n [ · ] is Meijer’s G-function [36], ( · ) T indicates the transpose of a matrix, and R and Z represent the sets of real numbers and integers, respectively.

2. System Model for IRS-Assisted Secure HARQ Transmissions

2.1. System Model

We take into account an IRS-assisted secure HARQ transmission model, as depicted in Figure 1. In this scenario, an obstacle is positioned between the transmitter (Alice) and the legitimate receiver (Bob). The transmitted signal reaches Bob after being reflected by the IRS while the passive eavesdropper (Eve) intercepts signals from the IRS. These two components of the cascade channel (i.e., from Alice to the IRS and from the IRS to Bob/Eve) are both assumed to be Rayleigh fading channels. The Wyner secrecy code [37] was used for secrecy encoding, with a code rate and secrecy redundancy rate of R B and R E , respectively. In the event of erroneous decoding by Bob, he will transmit a negative acknowledgment (NAK) message to Alice, requesting a re-transmission. Otherwise, an acknowledgment (ACK) message is provided for the new transmission, where a re-transmitted code word is constructed using redundancy versions based on HARQ-CC/IR protocols. Re-transmission ceases once a maximum transmission number K is reached. In this process, Eve achieves limited gain through multiple signal versions, since re-transmission relies only on decoding results from Bob.

2.2. Secure Transmissions without HARQ

We first analyze secure transmissions without re-transmission. In this process, power scaling laws [38] were employed to fix the transmitting power for a single meta-surface path to P. The corresponding transmitted symbol x then satisfies E x 2 = P , where channel fading items for the i-th meta-surface from Alice to the IRS and from the IRS to Bob are represented by h i and g i , respectively. These paths constitute a cascade main channel with both symmetric complex Gaussian distribution (i.e., h i CN ( 0 , 1 ) and g i CN ( 0 , 1 ) ). In the following sections, the shifted IRS phase is denoted by ϕ i , n B is additive Gaussian white noise (AWGN) for the whole cascade main channel and n B CN ( 0 , σ B 2 ) . The magnitude of the received signal in the main channel can then be expressed as
r B = i = 1 N h i e j ϕ i g i x + n B .
These two channel fading terms can be represented using complex signals as h i = α i e j θ i and g j = β i e j ψ i , where α i and β i are the corresponding magnitude terms and θ i and ψ i are the corresponding phase terms. The received SNR of the main channel is
γ B = P σ B 2 i = 1 N α i β i e j ϕ i θ i ψ i 2 .
This SNR is maximized when ϕ i = θ i + ψ i [6], such that
γ B = P σ B 2 i = 1 N α i β i 2 = γ ¯ B R 1 2 ,
where γ ¯ B denotes the average received SNR of the main channel and X i = α i β i . Since the cascade channel is double Rayleigh distributed, X i is also generalized-K (KG) distributed. In addition, R 1 = i = 1 N X i is the sum of KG distributed RVs approximated using W , where W = i = 1 N X i 2 is accurately approximated by a squared KG distribution [7,39]. Hence, the probability density function (PDF) of R 1 can be obtained by
f R 1 ( r ) = 4 Ξ m k m + m m Γ ( k m ) Γ ( m m ) r k m + m m 1 K k m m m ( 2 Ξ m r ) ,
where k m and m m are shaping parameters, k m = b + b 2 4 a c 2 a 2 , and Ξ m = k m m m Ω m , where Ω m is the mean power of R 1 which can be obtained by its second moment denoted by μ R 1 ( 2 ) . The calculation of a , b , c and μ R 1 ( n ) can be found in [39]. The PDF of γ B can be expressed as
f γ B ( γ ) = 2 Ξ ˜ m k m + m m Γ ( k m ) Γ ( m m ) γ k m + m m 2 1 K k m m m ( 2 Ξ ˜ m γ ) ,
where Ξ ˜ m = k m m m γ ¯ B Ω m . The closed-form expression of the corresponding cumulative distribution function (CDF) can be acquired from F γ B ( γ ) = 0 f γ B ( γ ) d γ as
F γ B ( γ ) = 1 Γ ( k w ) Γ ( m w ) G 1 , 3 2 , 1 Ξ ˜ m 2 γ | 1 k w , m w , 0 .
In the case of the wiretap channel, which is the cascade channel constructed from components of Alice-IRS and IRS-Eve, channel fading and phase adjustments from Alice to IRS are consistent with the main channel. In other words, h i and ϕ i are defined as shown above. The other part of channel fading from IRS to Eve is indicated by g i and thus g i CN ( 0 , 1 ) , where n E is the AWGN of the whole cascade wiretap channel and n E CN ( 0 , σ E 2 ) . The received signal in the wiretap channel is then given by
r E = i = 1 N h i e j ϕ i g i x + n E .
After adjusting ϕ i given in the main channel, h i e j ϕ i and h i follow the same distribution due to the characteristics of a cyclic symmetric complex Gaussian distribution. Assuming h i * = h i e j ϕ i , the received SNR of the wiretap channel is given by
γ E = P σ E 2 i = 1 N h i * g i 2 = γ ¯ E h i * T · g i .
The PDF of the cascaded channel amplitude is known as a KG distributed model [40] and the corresponding CDF follows a squared KG distribution. Hence, the PDF of γ E is given by
f γ E ( γ ) = 2 Ξ ˜ w N + 1 γ N 1 2 Γ ( N ) K N 1 2 Ξ ˜ w γ ,
where Ξ ˜ w = 1 γ ¯ E , K v ( x ) is a modified Bessel function of the second kind (order v) and k w = N and m w = 1 are shaping parameters. In addition, Ξ w = k w m w Ω w = 1 , where Ω w = N . The CDF of γ E is
F γ E ( γ ) = 1 Γ ( N ) G 1 , 3 2 , 1 Ξ ˜ w 2 γ | 1 N , 1 , 0 .

3. Outage Probability of IRS-Assisted Secure HARQ

In this section, we discuss the outage probability (OP) performance of IRS-assisted secure HARQ communication systems, involving connection outage probability (COP) and secrecy outage probability (SOP). These two metrics are derived in HARQ-CC and HARQ-IR, respectively, and are used to evaluate the critical secure performance.

3.1. OP of IRS-Assisted Secure HARQ-CC

The HARQ-CC case is first analyzed, in which a connection outage occurs if less mutual information of the main channel is accumulated compared with R B . This corresponding COP is given by
P e C C = Pr I B C C ( K ) < R B ,
where I B C C ( K ) denotes the accumulated mutual information after the K-th transmission. When adopting maximum ratio combining (MRC), I B C C ( K ) = log 2 1 + k = 1 K γ B , k , where γ B , k is the received SNR of the k-th transmission in the main channel. This term exhibits a KG distribution and its PDF can be expressed by Equation (5). Assuming Υ B , K = k = 1 K γ B , k implies
P e C C = Pr Υ B , K < 2 R B 1 = F Υ B , K ( 2 R B 1 ) .
The sum of multiple KG-distributed RVs can be accurately approximated by a squared KG distribution [41]. The corresponding PDF is thus
f Υ B , K ( γ ) = 2 Ξ ˜ M k M + m M γ k M + m M 2 1 Γ ( k M ) Γ ( m M ) K k M m M ( 2 Ξ ˜ M γ ) ,
where the fading parameters are k M = K k m and m M = K m m . Additionally, Ξ ˜ M = k M m M γ ¯ B Ω M , where Ω M = K Ω m . After integrating the above formula, the CDF of Υ B , K can be obtained by
F Υ B , K ( γ ) = 1 Γ ( k M ) Γ ( m M ) G 1 , 3 2 , 1 Ξ ˜ M 2 γ | 1 k M , m M , 0 .
The COP of HARQ-CC can be acquired by instituting F Υ B , K ( γ ) in Equation (12). The probability of the k-th transmission is then given by
Pr { M = k } = P e C C ( k 1 ) P e C C ( k ) = F Υ B , k 1 ( 2 R B 1 ) F Υ B , k ( 2 R B 1 ) ,
where M denotes the actual transmission number and P e C C ( 0 ) = 1 . Hence, the average transmission number of HARQ-CC is
M ¯ = E ( M ) = k = 1 K k Pr { M = k } = 1 + k = 1 K 1 F Υ B , K ( 2 R B 1 ) .
Since a secrecy outage occurs when the mutual information is greater than the secrecy redundancy rate in the wiretap channel, the SOP of HARQ-CC after the k-th transmission can be expressed as
Pr { I E C C ( K ) R E } = Pr log 2 1 + k = 1 K γ E , k R E = 1 F Υ E , K ( 2 R E 1 ) ,
where I E C C ( K ) represents the wiretap channel mutual information accumulated by HARQ-CC after the K-th transmission and γ E , k denotes the received SNR at Eve during the k-th transmission, with a distribution given by Equation (9). We assume Υ E , K = k = 1 K γ E , k and it has been already demonstrated that the sum of the aforementioned KG distributed RVs still follows a KG distribution with relevant parameters. The corresponding PDF can be represented by
f Υ E , K ( γ ) = 2 Ξ ˜ W k W + m W γ k W + m W 2 1 Γ ( k W ) Γ ( m W ) K k W m W ( 2 Ξ ˜ W γ ) ,
where k W = K N and m W = K are shaping parameters and Ξ ˜ W = K Ξ ˜ w . The CDF of Υ E , K is then given by
F Υ E , K ( γ ) = 1 Γ ( K N ) Γ ( K ) G 1 , 3 2 , 1 K Ξ ˜ w 2 γ | 1 K N , K , 0 .
Since the actual transmission number M is solely dependent on the main channel, the SOP of HARQ-CC can be expressed as
P s C C = k = 1 K Pr M = k Pr I E C C ( k ) R E = k = 1 K F Υ B , k 1 ( 2 R B 1 ) F Υ B , k ( 2 R B 1 ) 1 F Υ E , k ( 2 R E 1 ) ,
where F Υ B , k ( γ ) and F Υ E , K ( γ ) are defined by Equations (14) and (19), respectively.

3.2. OP of IRS-Assisted Secure HARQ-IR

Unlike HARQ-CC, HARQ-IR forms code words using different redundancy versions, rather than the same re-transmitted data. After soft-combining, mutual information (not SNR) is directly accumulated. For the main channel, the COP of HARQ-IR is thus
P e I R = Pr { I B I R ( K ) < R B } ,
where accumulated mutual information after the K-th transmissions is given by
I B I R ( K ) = k = 1 K log 2 1 + γ B , k = log 2 k = 1 K 1 + γ B , k .
We can assume Z B , K = k = 1 K Y B , k and Y B , k = 1 + γ B , k , where Y B , k is a shifted squared KG distributed RV and γ B , k is given in Equation (5). Thus
P e I R = Pr k = 1 K Y B , k < 2 R B = Pr Z B , k < 2 R B = F Z B , K 2 R B ,
where the CDF of Z B , K is denoted by F Z B , K · and γ B , k follows a squared KG distribution. However, the PDF and CDF of Z B , K are difficult to determine. Therefore, we resort to applying the mixture gamma (MG) distribution [42] to express the PDF of γ B , k as
f γ B , k ( γ ) = i = 1 L α m , i γ β m , i 1 e ζ m , i γ , γ 0 ,
where α m , i = ψ ( θ m , i , β m , i , ζ m , i ) = θ m , i j = 1 L θ m , j Γ ( β m , j ) ζ m , j β m , j , β m , i = m m , ζ m , i = λ m t m , i , λ m = Ξ ˜ m 2 , θ m , i = λ m m ω i t k m m m 1 Γ ( k m ) Γ ( m m ) . The amount of summation terms in this distribution is denoted by L, while ω i and t i are the weight and abscissas factors in the Gaussian–Laguerre integration [43]. The k m , m m and Ξ ˜ m were defined in Equation (5). Furthermore, Y B , k can be expressed as a combination of the shifted Gamma distributed RVs, with a PDF given by
f Y B , k ( y ) = i = 1 L α m , i ( y 1 ) β m , i 1 e ζ m , i ( y 1 ) , y 1 .
A Mellin transform of f Y B , k ( y ) can then be used to derive the distribution of Z B , K as
M s f Y B , k ( y ) = 1 y s 1 f Y B , k ( y ) d y = 1 y s 1 i = 1 L α m , i ( y 1 ) β m , i 1 e ζ m , i ( y 1 ) d y = i = 1 L 0 ( 1 + t ) s 1 α m , i t β m , i 1 e ζ m , i t d t = i = 1 L α i Γ ( β m , i ) Ψ ( β m , i , β m , i + s ; ζ m , i ) ,
where Ψ ( α , γ ; z ) = 1 Γ ( α ) 0 e z t t α 1 ( 1 + t ) γ α 1 d t denotes Tricomi’s confluent hyper-geometric function [36].
According to the properties of Mellin transform [44],
M s f Z B , K ( z ) = k = 1 K M s f Y B , k ( y ) = i = 1 L α m , i Γ ( β m , i ) Ψ ( β m , i , β m , i + s ; ζ m , i ) K = r 1 r L r 1 + + r L = K K r 1 r L j = 1 L α m , j Γ ( β m , j ) Ψ ( β m , j , β m , j + s ; ζ m , j ) r j ,
where K r 1 r L = K ! r 1 ! r p ! and the last equation holds by the polynomial theorem. The inverse Mellin transform of M s f Z B , K ( z ) is provided in Appendix A and the PDF f Z B , K ( z ) is shown as
f Z B , K ( z ) = r 1 r L r 1 + + r L = K K r 1 r L j = 1 L α m , j Γ ( β m , j ) ζ m , j β m , j + 1 r j × Y 0 , K K , 0 z j = 1 L ζ m , j r j | ( 0 , 1 , ζ m , 1 , β m , 1 ) , , ( 0 , 1 , ζ m , 1 , β m , 1 ) r 1 items , , ( 0 , 1 , ζ m , L , β m , L ) , , ( 0 , 1 , ζ m , L , β m , L ) r L items
The CDF of Z B , K can be deduced by integrating the PDF above [45] as
F Z B , K ( z ) = r 1 r L r 1 + + r L = K K r 1 r L j = 1 L α m , j Γ ( β m , j ) ζ m , j β m , j r j × 1 Y 1 , K + 1 K + 1 , 0 z j = 1 L ζ m , j r j | ( 1 , 1 , 0 , 1 ) ( 0 , 1 , 0 , 1 ) , ( 0 , 1 , ζ m , 1 , β m , 1 ) , , ( 0 , 1 , ζ m , 1 , β m , 1 ) r 1 items , , ( 0 , 1 , ζ m , L , β m , L ) , , ( 0 , 1 , ζ m , L , β m , L ) r L items
As a result, the COP of HARQ-IR becomes F Z B , K ( 2 R B ) . The average transmission number of HARQ-IR is then
M ¯ = 1 + k = 1 K 1 F Z B , k ( 2 R B ) ,
and the probability of a secrecy outage occurring after the K-th transmission is
Pr { I E I R ( K ) R E } = Pr k = 1 K log 2 1 + γ E , k R E ,
where the accumulated mutual information of HARQ-IR after the K-th transmission is denoted by I E I R ( K ) . Assuming Z E , K = k = 1 K Y E , k and Y E , k = 1 + γ E , k gives
Pr { I E I R ( K ) R E } = 1 Pr Z E , K < 2 R E .
The above analysis suggests the k-th received SNR in the wiretap channel is an MG distributed RV with a PDF given by
f γ E , k ( γ ) = i = 1 L α w , i γ β w , i 1 e ζ w , i γ , γ 0 ,
where α w , i = ψ ( θ w , i , β w , i , ζ w , i ) = θ w , i j = 1 L θ w , j Γ ( β w , j ) ζ w , j β w , j , β w , i = m w , ζ w , i = λ w t i , λ w = Ξ ˜ w 2 , θ w , i = λ m w ω i t i k w m w 1 Γ ( k w ) Γ ( m w ) , ω i and t i are given in [43], k w = L , m w = 1 and Ξ ˜ w = 1 γ ¯ E . Applying a similar approach in the main channel produces the CDF of Z E , K given by
F Z E , K ( z ) = r 1 r L r 1 + + r L = K K r 1 r L j = 1 L α w , j Γ ( β w , j ) ζ w , j β w , j r j × 1 Y 1 , K + 1 K + 1 , 0 z j = 1 L ζ w , j r j | ( 1 , 1 , 0 , 1 ) ( 0 , 1 , 0 , 1 ) , ( 0 , 1 , ζ w , 1 , β w , 1 ) , , ( 0 , 1 , ζ w , 1 , β w , 1 ) r 1 items , , ( 0 , 1 , ζ w , L , β w , L ) , , ( 0 , 1 , ζ w , L , β w , L ) r L items
The SOP of HARQ-IR can then be obtained by
P s I R = k = 1 K Pr M = k Pr I E I R ( k ) R E = k = 1 K F Z B , k 1 ( 2 R B 1 ) F Z B , k ( 2 R B 1 ) 1 F Z E , k ( 2 R E 1 ) ,
where F Z B , k ( z ) and F Z E , k ( z ) are provided in Equations (29) and (34), respectively.

4. Analysis of Diversity and Coding Gain

In this section, the asymptotic COP and SOP of both HARQ-CC and HARQ-IR are derived at higher SNR. The corresponding diversity and coding gain are then derived from these expressions, which reveal critical factors of secure performance.

4.1. Gain of IRS-Assisted Secure HARQ-CC

We first consider the diversity gain and coding gain of IRS-assisted secure HARQ-CC. Equations (12) and (14) can be used to reformulate the COP of HARQ-CC as
P e C C = F Υ B , K ( 2 R B 1 ) = 1 Γ ( k M ) Γ ( m M ) G 1 , 3 2 , 1 Ξ M 2 ( 2 R B 1 ) γ ¯ B | κ 1 κ 2 ,
where Ξ M = k M m M Ω M , κ 1 = 1 and κ 2 = k M , m M , 0 . Applying the asymptotic series expansion of Meijer’s G-function (provided in Appendix B) when γ ¯ B gives that the COP can be approximated as
P e C C 1 Γ ( k M ) Γ ( m M ) k = 1 2 γ ¯ B Ξ M 2 ( 2 R B 1 ) κ 2 , k l = 1 , l k 2 Γ ( κ 2 , l κ 2 , k ) · Γ ( κ 2 , k ) Γ ( 1 + κ 2 , k ) .
It is worth noting that, if κ 2 , l = κ 2 , k , we can define Γ ( κ 2 , l κ 2 , k ) = Γ ( ϵ ) , where ϵ indicates a minor error term involved to meet the requirements of asymptotic series expansion. According to a definition in [46], when γ ¯ B , P e C C ( G c , m C C γ ¯ B ) G d , m C C , where G d , m C C and G c , m C C represent the diversity gain and coding gain of the main channel in HARQ-CC. A comparison with Equation (37) gives
G d , m C C = min k M , m M = K min k m , m m .
Assuming κ 2 , k * = min k m , m m , where k * is the index of min k m , m m in κ 2 , gives
G c , m C C = 1 Ξ M 2 ( 2 R B 1 ) 1 Γ ( k M ) Γ ( m M ) l = 1 , l k * 2 Γ ( κ 2 , l K κ 2 , k * ) · Γ ( K κ 2 , k * ) Γ ( 1 + K κ 2 , k * ) 1 K κ 2 , k * = 1 Ξ M 2 ( 2 R B 1 ) 1 Γ ( k M ) Γ ( m M ) Γ ( K | k m m m | ) · Γ ( K κ 2 , k * ) Γ ( 1 + K κ 2 , k * ) 1 K κ 2 , k * .
The diversity gain and coding gain in the wiretap channel of HARQ-CC can then be obtained by defining the connection outage probability of the wiretap channel as
P e , w C C = Pr I E C C ( M ¯ ) R E = F Υ E , M ¯ ( 2 R E 1 ) .
Equation (19) then becomes
P e , w C C = 1 Γ ( M ¯ N ) Γ ( M ¯ ) G 1 , 3 2 , 1 2 R E 1 M ¯ γ ¯ E | κ 3 κ 4 ,
where κ 3 = 1 and κ 4 = M ¯ N , M ¯ , 0 . When γ ¯ B and γ ¯ E , this implies M ¯ 1 and κ 4 N , 1 , 0 . Applying a similar method in the main channel produces an outage probability of
P e , w C C 1 Γ ( N ) k = 1 2 γ ¯ E 2 R E 1 κ 4 , k l = 1 , l k 2 Γ ( κ 4 , l κ 4 , k ) · Γ ( κ 4 , k ) Γ ( 1 + κ 4 , k ) .
The diversity gain and coding gain in the HARQ-CC wiretap channel can be denoted by G d , w C C and G c , w C C , respectively, satisfying P e , w C C ( G c , w C C γ ¯ E ) G d , w C C . A comparison with Equation (42) suggests the diversity gain in the wiretap channel is
G d , w C C = min N , 1 = 1 .
While the coding gain is
G c , w C C = 1 2 R E 1 1 Γ ( N ) Γ ( N 1 ) · Γ ( 1 ) Γ ( 2 ) 1 = N 1 2 R E 1 .

4.2. Gain of IRS-Assisted Secure HARQ-IR

We next consider the diversity gain and coding gain of IRS-assisted secure HARQ-IR. When γ ¯ B , the COP of HARQ-IR can be represented as
P e I R = Pr k = 1 K log 2 1 + γ B , k < R B Pr log 2 k = 1 K γ B , k < R B = Pr k = 1 K γ B , k < 2 R B ,
where γ B , k = γ ¯ B R k 2 and R k denotes the signal magnitude of the k-th transmission. The PDF of Y B , K = 1 K R k can be determined using a moment generation function (MGF)-based method [47] by
f Y B , K ( y ) = 2 y Γ ( k m ) Γ ( m m ) K G 0 , 2 K 2 K , 0 y 2 Ξ m 2 K | k m , m m , , k m , m m 2 K items .
Defining Z B , K = k = 1 K γ B , k = γ ¯ B , k Y B , K 2 then gives f Z B , K ( z ) = f Y B , K ( z γ ¯ B ) 1 2 γ ¯ B z . In other words,
f Z B , K ( z ) = 1 z Γ ( k m ) Γ ( m m ) K G 0 , 2 K 2 K , 0 z Ξ m 2 γ ¯ B K | k m , m m , , k m , m m 2 K items .
A corresponding integration implies the CDF of Z K is given by
F Z K ( z ) = 1 Γ ( k m ) Γ ( m m ) K G 1 , 2 K + 1 2 K , 1 z Ξ m 2 γ ¯ B K | 1 k m , m m , , k m , m m 2 K items , 0 .
Equation (45) suggests the COP of the main channel can be expressed as
P e I R = F Z K 2 R B = 1 Γ ( k m ) Γ ( m m ) K G 1 , 2 K + 1 2 K , 1 2 R B Ξ m 2 γ ¯ B K | κ 5 κ 6 ,
where κ 5 = 1 and κ 6 = 2 K items k m , m m , , k m , m m , 0 . As stated in Appendix B, when γ ¯ B ,
P e I R = 1 Γ ( k m ) Γ ( m m ) K k = 1 2 K γ ¯ B 2 R B K Ξ m 2 K κ 6 , k l = 1 , l k 2 K Γ ( κ 6 , l κ 6 , k ) · Γ ( κ 6 , k ) Γ ( 1 + κ 6 , k ) .
The diversity gain and coding gain in the HARQ-IR main channel are denoted by G d , m I R and G c , m I R , respectively, with the former expressed as
G d , m I R = K min k w , m w .
Assuming κ 6 , k * = min k w , m w = κ 2 , k * , the coding gain can be represented as
G c , m I R = 1 2 R B K Ξ m 2 1 Γ ( k w ) Γ ( m w ) K l = 1 , l k 2 K Γ ( κ 6 , l κ 6 , k * ) · Γ ( κ 6 , k * ) Γ ( 1 + κ 6 , k * ) 1 K κ 6 , k * = 1 2 R B K Ξ 2 1 Γ ( k w ) Γ ( m w ) K Γ ( κ 6 , k * ) Γ ( 1 + κ 6 , k * ) Γ ( | k w m w | K Γ ( ϵ ) K 1 1 K κ 6 , k * .
Since the actual transmission number of HARQ-IR is M ¯ = 1 when γ B , the same gain can be acquired as HARQ-CC. The diversity gain in the wiretap channel is then
G d , w I R = min N , 1 = 1 ,
and the coding gain in the wiretap channel is
G c , w I R = 1 2 R E 1 1 Γ ( N ) Γ ( N 1 ) · Γ ( 1 ) Γ ( 2 ) 1 = N 1 2 R E 1 .

5. Numerical Results

In this section, through Monte Carlo simulations and numerical results obtained from the analytical expressions above, we analyze the outage probability performance of IRS assisted secure HARQ, using the model shown in Figure 1. The main secure performance metrics, including COP, SOP and their asymptotic value of HARQ-CC and HARQ-IR, are primarily discussed with a given constraint of maximum transmission number.
Figure 2 shows COP curves plotted against γ ¯ B of a secure HARQ-CC system assisted by an IRS, demonstrating the influence of different re-transmission numbers and meta-surfaces. The parameters were set as γ ¯ B = 10 20 dB, R B = 5 , R E = 2 , with five pairs of curves configured as different combinations of K = 1 , 2 , 4 and N = 1 , 2 , 4 . The solid lines and asterisks represent the theoretical and simulated COP, respectively. It can be observed that the differences between these two curves are trivial, verifying the theoretical accuracy of Equations (12) and (14). In addition, the COP decreases monotonically with the increase of γ ¯ B , as higher quality of the main channel resulted in fewer connection outages. The COP also decreased significantly with increasing K, due to an accumulated SNR for HARQ-CC. The increase in N allowed the IRS to provide more channels through meta-surfaces, thereby reducing connection outage. Furthermore, it is also evident that increasing N had more of an effect on the COP of HARQ-CC than increasing K (e.g., the results of N = 2 , K = 1 outperforms N = 1 , K = 2 and N = 4 , K = 2 outperforms N = 2 , K = 4 ). This is because chase combining adopts simple repeated transmission with a limited gain.
Figure 3, which depicts SOP performance of an IRS-assisted HARQ-CC system, demonstrates the influence of different transmission numbers and meta-surface quantities. SOP curves were plotted against different values of γ ¯ E , including γ ¯ B = 10 dB, γ ¯ E = 10 20 dB, R B = 5 , R E = 2 and five additional pairs of curves configured as given in Figure 2. It is evident the theoretical SOP (solid line) values agree well with the simulated results (asterisks). In addition, increases in γ ¯ E are strongly correlated with an increase in SOP, which indicates that higher quality in the wiretap channel worsens secrecy outage. Furthermore, increases in K were seen to cause SOP increases, though the increment of N = 2 , K = 4 (relative to N = 2 , K = 2 ) was less than that of N = 2 , K = 2 (relative to N = 2 , K = 1 ). This is because the COP is higher during the first transmission than at the second round. In other words, more re-transmissions occur for lower gain in the wiretap channel. In addition, the SOP deteriorates significantly with increasing N (e.g., the results for N = 4 , K = 2 are higher than for N = 2 , K = 2 ). This is caused by more assisted channels implemented through meta-surfaces for both the main channel and wiretap channel.
Figure 4 plots COP versus γ ¯ B of a secure HARQ-IR system assisted by IRS, demonstrating the influence of different re-transmission and meta-surface quantities. Parameters in the figure were set as in Figure 2. This analysis of the COP was also verified by theoretical and simulated results, denoted by the solid lines and asterisks, respectively. The COP in Equation (29) decreases monotonically as γ ¯ B increases, indicating higher quality in the main channel with fewer connection outages. The COP decreased significantly as K increased, indicating the coding gain in HARQ-IR can be determined for better connection performance. The IRS then provides more channels as N increases, thereby reducing the COP. It is worth noting the effects of increasing N and increasing K differed for HARQ-IR under various conditions. For instance, the COP for N = 1 , K = 2 outperformed that of N = 2 , K = 1 and N = 2 , K = 4 outperformed N = 4 , K = 2 . As such, the maximum transmission number should be increased at higher SNR, while meta-surface quantities should be increased at lower SNR. This is because connections benefit more from channel diversity than from coding in the case of lower SNRs and vice versa, as verified in Figure 5.
COP curves of the HARQ system assisted by IRS are plotted with their asymptotic values in Figure 5, for a case where γ ¯ B is large. Parameters were set as γ ¯ B = 0 60 dB, R B = 10 and R E = 5 . The solid and dotted lines represent theoretical and asymptotic HARQ-CC and HARQ-IR COP values for N = 2 , K = 4 and N = 4 , K = 2 , respectively. The simulated values have already been verified and are not repeated here for clarity. It is evident that when γ ¯ B , each theoretical COP value comes first at lower SNR and tends to an asymptotic limit. The COP of N = 4 , K = 2 is then better than that of N = 2 , K = 4 when HARQ-CC is adopted. Thus, the gain resulting from an increase in the number of meta-surfaces is larger than that caused by increasing the maximum transmission number, which is consistent with our analysis from Figure 2. Furthermore, the COP for N = 2 , K = 4 is superior to that of N = 4 , K = 2 when HARQ-IR is adopted. In other words, increasing the maximum transmission number is more effective than increasing the number of meta-surfaces, which is concordant with the high-SNR results depicted in Figure 4.
Figure 6 plots SOP performance of an IRS-assisted HARQ-IR system as a function of γ ¯ E , N and K. The simulated parameters are the same as those of the SOP simulation for HARQ-CC as shown in Figure 3. The difference between theoretical and simulated results is slight, while the former is given in Equation (35). As shown, the SOP continues to increase with γ ¯ E and K, though the increment of N = 2 , K = 4 relative to N = 2 , K = 2 is lower than that of N = 2 , K = 2 relative to N = 2 , K = 1 . The observed gain in the wiretap channel also decreased more sharply than that of HARQ-CC, due to stronger coding gain for HARQ-IR. In addition, the SOP further increased as N increased, though the increment decreased with increasing N. For instance, the SOP of N = 2 , K = 2 increased significantly relative to N = 1 , K = 2 , while that of N = 4 , K = 2 changed little compared to N = 2 , K = 2 . This was due to a decrease in COP, a decrease in the actual transmission number and corresponding limited IRS-assisted gain.
Figure 7 provides an asymptotic SOP analysis of the IRS-assisted HARQ system. Curves are included for the 1-SOP and its asymptotic values in HARQ-CC and HARQ-IR for increased clarity. Among these curves, γ ¯ B = 30 dB, γ ¯ E = 0 60 dB and all other parameters are the same as in Figure 5. The solid and dashed lines represent the theoretical and asymptotic SOP values, respectively. Each 1-SOP theoretical value tends to an asymptotic limit when γ ¯ E , which supports our presented analysis. In addition, the 1-SOP curves for HARQ-CC and HARQ-IR tended to be consistent for a given N configuration, such as N = 2 , K = 2 and N = 2 , K = 4 or N = 4 , K = 2 and N = 4 , K = 4 . The asymptotic SOP values were also the same, which further verifies our analysis of SOP (i.e., the asymptotic values are only dependent on N with given R E ).

6. Conclusions

In this paper, we derived closed-form COP and SOP expressions of HARQ-CC and HARQ-IR using the KG distribution, the MG distribution and the Mellin transform. The asymptotic value analysis of the COP and SOP was performed to determine the diversity and coding gain. An analysis of numerical and simulated results suggested that expanding the number of meta-surfaces had a significant impact on the main channel for all SNR regions in HARQ-CC and lower-SNR regions in HARQ-IR while increasing the maximum transmission number critically affected the main channel for higher-SNR regions in HARQ-IR. Additionally, only the number of meta-surfaces mainly affected the wiretap channel for both HARQ-CC and HARQ-IR. On this basis, corresponding strategies could be further designed to effectively improve physical layer security performance for an IRS-assisted HARQ system.

Author Contributions

Conceptualization, Y.W. and S.Y.; methodology, Y.W.; software, K.M.; validation, Y.W., K.M. and K.D.; formal analysis, Y.W.; investigation, Y.W. and K.M.; resources, K.D.; data curation, S.Y.; writing—original draft preparation, Y.W.; writing—review and editing, S.Y. and H.Y.; visualization, Y.W.; supervision, H.Y.; project administration, Y.W.; funding acquisition, Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Natural Science Foundation of the Higher Education Institutions of Anhui Province grant number 2022AH050591 and by Science Research Foundation of Anhui University of Finance and Economics grant number ACKYB22022.

Institutional Review Board Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. The Inverse Mellin Transform of M s f Z B , K ( z )

Here, we obtain the inverse Mellin transform of M s f Z B , K ( z ) as follows,
f Z B , K ( z ) = M s 1 M s f Z B , K ( z ) = 1 2 π i c i c + i M s f Z B , K ( z ) z s d s .
Substituting Equation (27) into Equation (A1) gives
f Z B , K ( z ) = 1 2 π i c i c + i r 1 r L r 1 + + r L = K K r 1 r L j = 1 L α m , j Γ ( β m , j ) Ψ ( β m , j , β m , j + s ; ζ m , j ) r j z s d s = r 1 r L r 1 + + r L = K K r 1 r L j = 1 L α m , j Γ ( β m , j ) r j 1 2 π i c i c + i j = 1 L Ψ ( β m , j , β m , j + s ; ζ m , j ) r j z s d s
For convenience of presentation, we define
I 0 = 1 2 π i c i c + i j = 1 L Ψ ( β m , j , β m , j + s ; ζ m , j ) r j z s d s .
An expression of I 0 is provided as
I 0 = j = 1 L ζ m , j β m , j 1 r j Y 0 , K K , 0 z j = 1 L ζ m , j r j | ( 0 , 1 , ζ m , 1 , β m , 1 ) , , ( 0 , 1 , ζ m , 1 , β m , 1 ) r 1 items , , ( 0 , 1 , ζ m , L , β m , L ) , , ( 0 , 1 , ζ m , L , β m , L ) r L items
where Y p , q m , n [ r ] denotes the generalized Fox’s H function which is defined as
Y p , q m , n r | a 1 , α 1 , A 1 , φ 1 , , a p , α p , A p , φ p b 1 , β 1 , B 1 , ϕ 1 , , b q , β q , B q , ϕ q = 1 2 π i L M p , q m , n [ s ] x s d s ,
where L is the Mellin-Barnes contour of the complex s plane from c i to c + i and c R . The term M p , q m , n [ s ] is defined as
M p , q m , n [ s ] = j = 1 m B j ϕ j + b j + β j s 1 Ψ ϕ j , ϕ j + b j + β j s ; B j i = n + 1 p A i φ i + a i + a i s 1 Ψ φ i , φ i + a i + α i s ; A i i = 1 n A i φ i a i a i s Ψ φ i , φ i + 1 a i α i s ; A i j = m + 1 B j ϕ j b j β j s Ψ ϕ j , ϕ j + 1 b j β j s ; B j
Inserting I 0 into Equation (A2) produces the expression of f Z B , K ( z ) shown in Equation (28).

Appendix B. The Asymptotic Series Expansion of Meijer’s G-Function at z 0

The asymptotic series expansion of Meijer’s G-function at z 0 is given by [48]
G p , q m , n z | a 1 , , a n , a n + 1 , , a p b 1 , , b m , b m + 1 , , b q k = 1 m z b k j = 1 , j k m Γ ( b j b k ) j = 1 n Γ ( 1 a j + b k ) j = n + 1 p Γ ( a j b k ) j = m + 1 q Γ ( 1 b j + b k ) ,
with j k and b j b k Z .

References

  1. Wu, Q.; Zhang, R. Towards Smart and Reconfigurable Environment: Intelligent Reflecting Surface Aided Wireless Network. IEEE Commun. Mag. 2020, 58, 106–112. [Google Scholar] [CrossRef] [Green Version]
  2. Di Renzo, M.; Zappone, A.; Debbah, M.; Alouini, M.-S.; Yuen, C.; De Rosny, J.; Tretyakov, S. Smart Radio Environments Empowered by Reconfigurable Intelligent Surfaces: How It Works, State of Research, and The Road Ahead. IEEE J. Sel. Areas Commun. 2020, 38, 2450–2525. [Google Scholar] [CrossRef]
  3. Yu, X.; Xu, D.; Schober, R. Enabling secure wireless communications via intelligent reflecting surfaces. In Proceeding of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar]
  4. Hong, S.; Pan, C.; Ren, H.; Chai, K.; Nallanathan, A. Robust transmission design for intelligent reflecting surface-aided secure communication systems with imperfect cascaded CSI. IEEE Trans. Wirel. Commun. 2021, 20, 2487–2501. [Google Scholar] [CrossRef]
  5. Zhou, G.; Pan, C.; Ren, H.; Wang, K.; Nallanathan, A. Framework of Robust Transmission Design for IRS-Aided MISO Communications with Imperfect Cascaded Channels. IEEE Trans. Signal Process. 2020, 68, 5092–5106. [Google Scholar] [CrossRef]
  6. Barar, E.; Di Renzo, M.; De Rosny, J.; Debbah, M.; Alouini, M.-S.; Zhang, R. Wireless communications through reconfigurable intelligent surfaces. IEEE Access 2019, 7, 116753–1167736. [Google Scholar]
  7. Yang, L.; Meng, F.; Wu, Q.; Da Costa, D.; Alouini, M.-S. Accurate closed-form approximations to channel distributions of RIS-aided wireless systems. IEEE Wirel. Commun. Lett. 2020, 9, 1985–1989. [Google Scholar] [CrossRef]
  8. Zhang, H.; Di, B.; Song, L.; Han, Z. Reconfigurable intelligent surfaces assisted communications with limited phase shifts: How many phase shifts are enough? IEEE Trans. Veh. Technol. 2020, 69, 4498–4502. [Google Scholar] [CrossRef] [Green Version]
  9. Atapattu, S.; Fan, R.; Dharmawansa, P.; Wang, G.; Evans, J.; Tsiftsis, T.A. Reconfigurable intelligent surface assisted two–way communications: Performance analysis and optimization. IEEE Trans. Commun. 2020, 68, 6552–6567. [Google Scholar] [CrossRef]
  10. Boulogeorgos, A.-A.A.; Alexiou, A. Performance analysis of reconfigurable intelligent surface-assisted wireless systems and comparison with relaying. IEEE Access 2020, 8, 94463–94483. [Google Scholar] [CrossRef]
  11. Huang, C.; Zappone, A.; Alexandropoulos, G.C.; Debbah, M.; Yuen, C. Reconfigurable intelligent surfaces for energy efficiency in wireless communication. IEEE Trans. Wirel. Commun. 2019, 18, 4157–4170. [Google Scholar] [CrossRef] [Green Version]
  12. Guo, H.; Liang, Y.C.; Chen, J.; Larsson, E.G. Weighted sum-rate maximization for reconfigurable intelligent surface aided wireless networks. IEEE Trans. Wirel. Commun. 2020, 19, 3064–3076. [Google Scholar] [CrossRef] [Green Version]
  13. Yang, Y.; Zhang, S.; Zhang, R. IRS-enhanced OFDMA: Joint resource allocation and passive beamforming optimization. IEEE Commun. Lett. 2020, 9, 760–764. [Google Scholar] [CrossRef] [Green Version]
  14. Wang, Y.; Yin, H.; Zhang, T.; Yang, W.; Shang, X.; Shen, Y. Secure Transmission for Energy-Harvesting Sensor Networks with a Buffer-Aided Sink Node. IEEE Internet Things J. 2022, 9, 6703–6718. [Google Scholar] [CrossRef]
  15. Diao, D.; Wang, B.; Cao, K.; Dong, R.; Cheng, T. Enhancing Reliability and Security of UAV-Enabled NOMA Communications with Power Allocation and Aerial Jamming. IEEE Trans. Veh. Technol. 2022, 8, 8662–8674. [Google Scholar] [CrossRef]
  16. Yang, L.; Yang, J.; Xie, W.; Hasna, M.O.; Tsiftsis, T.; Di Renzo, M. Secrecy performance analysis of RIS-aided wireless communication systems. IEEE Trans. Veh. Technol. 2020, 69, 12296–12300. [Google Scholar] [CrossRef]
  17. Khoshafa, M.H.; Ngatched, T.M.N.; Ahmed, M.H. Reconfigurable intelligent surfaces-aided physical layer security enhancement in D2D underlay communications. IEEE Commun. Lett. 2020, 25, 1443–1447. [Google Scholar] [CrossRef]
  18. Shen, H.; Xu, W.; Gong, S.; He, Z.; Zhao, C. Secrecy rate maximization for intelligent reflecting surface assisted multi-antenna communications. IEEE Commun. Lett. 2019, 23, 1488–1492. [Google Scholar] [CrossRef] [Green Version]
  19. Cui, M.; Zhang, G.; Zhang, R. Secure wireless communication via intelligent reflecting surface. IEEE Commun. Lett. 2019, 8, 1410–1414. [Google Scholar] [CrossRef] [Green Version]
  20. Hong, S.; Pan, C.; Ren, H.; Wang, K.; Nallanathan, A. Artificial-noise-aided secure MIMO wireless communications via intelligent reflecting surface. IEEE Trans. Commun. 2020, 68, 7851–7866. [Google Scholar] [CrossRef]
  21. Tsoulos, I.G.; Stavrou, V.; Mastorakis, N.E.; Tsalikakis, D. GenConstraint: A programming tool for constraint optimization problems. SoftwareX 2019, 10, 100355. [Google Scholar] [CrossRef]
  22. Yu, X.; Xu, D.; Sun, Y.; Ng, D.W.K.; Schobe, R. Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces. IEEE J. Sel. Areas Commun. 2020, 38, 2637–2652. [Google Scholar] [CrossRef]
  23. Wang, H.M.; Bai, J.; Dong, L. Intelligent Reflecting Surfaces Assisted Secure Transmission without Eavesdropper’s CSI. IEEE Signal Process. Lett. 2020, 27, 1300–1304. [Google Scholar] [CrossRef]
  24. Gu, X.; Duan, W.; Zhang, G.; Sun, Q.; Wen, M.; Ho, P.H. Physical Layer Security for RIS-Aided Wireless Communications with Uncertain Eavesdropper Distributions. IEEE Syst. J. 2022, 17, 848–859. [Google Scholar] [CrossRef]
  25. Chelli, A.; Zedini, E.; Alouini, M.-S.; Barry, J.R.; Patzold, M. Performance and Delay Analysis of Hybrid ARQ with Incremental Redundancy Over Double Rayleigh Fading Channels. IEEE Trans. Wirel. Commun. 2014, 13, 6245–6258. [Google Scholar] [CrossRef]
  26. Shi, Z.; Ma, S.; Yang, G.; Tam, K.-W.; Xia, M. Asymptotic Outage Analysis of HARQ-IR Over Time-Correlated Nakagami- m Fading Channels. IEEE Trans. Wirel. Commun. 2017, 16, 6119–6134. [Google Scholar] [CrossRef] [Green Version]
  27. Zedini, E.; Chelli, A.; Alouini, M.-S. On the Performance Analysis of Hybrid ARQ with Incremental Redundancy and with Code Combining Over Free-Space Optical Channels with Pointing Errors. IEEE Photon. J. 2014, 6, 1–18. [Google Scholar] [CrossRef] [Green Version]
  28. Tang, X.; Liu, R.; Spasojevic, P.; Poor, H.V. On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels. IEEE Trans. Inf. Theory 2009, 55, 1575–1591. [Google Scholar] [CrossRef] [Green Version]
  29. Mheich, Z.; Treust, M.L.; Alberge, F.; Duhamel, P. Rate Adaptation for Incremental Redundancy Secure HARQ. IEEE Trans. Commun. 2016, 64, 765–777. [Google Scholar] [CrossRef] [Green Version]
  30. Guan, X.; Cai, Y.; Yang, W. On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ. IEEE Commun. Lett. 2014, 18, 479–482. [Google Scholar] [CrossRef]
  31. Wu, Y.; Yin, S.; Zhou, J.; Yang, P.; Yang, H. Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system. Sci. China Inf. Sci. 2020, 63, 122303. [Google Scholar] [CrossRef] [Green Version]
  32. Wu, Y.; Yin, S.; Zhou, J.; Yang, P.; Yang, H. Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers. Entropy 2020, 22, 403. [Google Scholar] [CrossRef] [Green Version]
  33. Park, S. Kalman Combining Based Iterative Detection and Decoding for MIMO Systems with Hybrid ARQ. IEEE Trans. Veh. Technol. 2023, 2, 2040–2050. [Google Scholar] [CrossRef]
  34. Wu, S.; Deng, Z.; Li, A.; Jiao, J.; Zhang, N.; Zhang, Q. Minimizing Age-of-Information in HARQ-CC Aided NOMA Systems. IEEE Trans. Wirel. Commun. 2023, 2, 1072–1086. [Google Scholar] [CrossRef]
  35. Cao, Q.; Zhang, H.; Wang, H.; Fu, Y.; Yang, G.; Ma, S. Outage Performance Analysis of HARQ-Aided Multi-RIS Systems. In Proceeding of IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021. [Google Scholar]
  36. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 6th ed.; Academic: New York, NY, USA, 2000. [Google Scholar]
  37. Wyner, A.D. The wire-tap channel. Bell. Sys. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  38. Bjornson, E.; Sanguinetti, L. Power Scaling Laws and Near-Field Behaviors of Massive MIMO and Intelligent Reflecting Surfaces. IEEE Open J. Commun. Soc. 2020, 1, 1306–1324. [Google Scholar] [CrossRef]
  39. Peppas, K.P. Accurate closed-form approximations to generalised-K sum distributions and applications in the performance analysis of equal-gain combining receivers. IET Commun. 2011, 5, 982–989. [Google Scholar] [CrossRef]
  40. Liu, H.; Ding, H.; Xiang, L.; Yuan, J.; Zhang, L. Outage and BER Performance Analysis of Cascade Channel in Relay Networks. Procedia Comput. Sci. 2014, 34, 23–30. [Google Scholar] [CrossRef] [Green Version]
  41. Chatzidiamantis, N.D.; Karagiannidis, G.K. On the Distribution of the Sum of Gamma-Gamma Variates and Applications in RF and Optical Wireless Communications. IEEE Trans. Commun. 2011, 59, 1298–1308. [Google Scholar] [CrossRef] [Green Version]
  42. Atapattus, S.; Tellambura, C.; Jiang, H. A Mixture Gamma Distribution to Model the SNR of Wireless Channels. IEEE Trans. Wirel. Commun. 2011, 10, 4193–4203. [Google Scholar] [CrossRef]
  43. Abramowitz, M.; Stegun, I.A. Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematical Tables; Dover Publications: Garden City, NY, USA, 1965. [Google Scholar]
  44. Debnath, L.; Bhatta, D. Integral Transforms and Their Applications; CRC Press: Boca Raton, FL, USA, 2010. [Google Scholar]
  45. Yilmaz, F.; Alouini, M.-S. Outage capacity of multicarrier systems. In Proceeding of the IEEE International Conference on Telecommunications (ICT), Doha, Qatar, 4–7 April 2010. [Google Scholar]
  46. Wang, Z.; Giannakis, G.B. A simple and general parameterization quantifying performance in fading channels. IEEE Trans. Commun. 2003, 51, 1389–1398. [Google Scholar] [CrossRef] [Green Version]
  47. Trigui, I.; Laourine, A.; Affes, S.; Stephenne, A. On the performance of cascaded generalized k fading channels. In Proceeding of the IEEE Global Telecommunications Conference (GLOBECOM), Honolulu, HI, USA, 30 November–4 December 2009. [Google Scholar]
  48. Wolfram Research, I. Mathematica Edition: Version 8.0; Wolfram Res.: Champaign, IL, USA, 2010. [Google Scholar]
Figure 1. System model of secure IRS-assisted HARQ system.
Figure 1. System model of secure IRS-assisted HARQ system.
Entropy 25 00519 g001
Figure 2. Connection outage probability (COP) of HARQ-CC versus γ ¯ B for different N and K.
Figure 2. Connection outage probability (COP) of HARQ-CC versus γ ¯ B for different N and K.
Entropy 25 00519 g002
Figure 3. Secrecy outage probability (SOP) of HARQ-CC versus γ ¯ E for different N and K.
Figure 3. Secrecy outage probability (SOP) of HARQ-CC versus γ ¯ E for different N and K.
Entropy 25 00519 g003
Figure 4. Connection outage probability (COP) of HARQ-IR versus γ ¯ B for different N and K.
Figure 4. Connection outage probability (COP) of HARQ-IR versus γ ¯ B for different N and K.
Entropy 25 00519 g004
Figure 5. Asymptotic COP versus γ ¯ B of both HARQ-CC and HARQ-IR for different N and K.
Figure 5. Asymptotic COP versus γ ¯ B of both HARQ-CC and HARQ-IR for different N and K.
Entropy 25 00519 g005
Figure 6. Secrecy outage probability (SOP) of HARQ-IR versus γ ¯ E for different N and K.
Figure 6. Secrecy outage probability (SOP) of HARQ-IR versus γ ¯ E for different N and K.
Entropy 25 00519 g006
Figure 7. Asymptotic 1-SOP versus γ ¯ E of both HARQ-CC and HARQ-IR for different N and K.
Figure 7. Asymptotic 1-SOP versus γ ¯ E of both HARQ-CC and HARQ-IR for different N and K.
Entropy 25 00519 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, Y.; Mu, K.; Duan, K.; Yin, S.; Yang, H. On the Secure Performance of Intelligent Reflecting Surface-Assisted HARQ Systems. Entropy 2023, 25, 519. https://doi.org/10.3390/e25030519

AMA Style

Wu Y, Mu K, Duan K, Yin S, Yang H. On the Secure Performance of Intelligent Reflecting Surface-Assisted HARQ Systems. Entropy. 2023; 25(3):519. https://doi.org/10.3390/e25030519

Chicago/Turabian Style

Wu, Yue, Kuanlin Mu, Kaiyu Duan, Shishu Yin, and Hongwen Yang. 2023. "On the Secure Performance of Intelligent Reflecting Surface-Assisted HARQ Systems" Entropy 25, no. 3: 519. https://doi.org/10.3390/e25030519

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop