Next Article in Journal
Application of Methods Based on Artificial Intelligence and Optimisation in Power Engineering—Introduction to the Special Issue
Previous Article in Journal
Enhancing Energy Management Strategies for Extended-Range Electric Vehicles through Deep Q-Learning and Continuous State Representation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reconfigurable Intelligent Surface-Assisted Secure Communication in Cognitive Radio Systems

1
School of Computer Science, Qufu Normal University, Rizhao 276826, China
2
School of Physics and Electronic Information Engineering, Henan Polytechnic University, Jiaozuo 454099, China
*
Author to whom correspondence should be addressed.
Energies 2024, 17(2), 515; https://doi.org/10.3390/en17020515
Submission received: 7 November 2023 / Revised: 14 January 2024 / Accepted: 17 January 2024 / Published: 20 January 2024
(This article belongs to the Section F1: Electrical Power System)

Abstract

:
A reconfigurable intelligent reflective surface (RIS)-assisted cognitive radio (CR) multiple-input multiple-output (MIMO) secure communication system is considered. In the presence of an eavesdropper, a primary base station (PBS) and a cognitive base station (CBS) equipped with multiple antennas communicate to a primary user (PU) and a secondary user (SU), respectively. In order to maximize the achievable secrecy rate of the system, the secrecy rate maximization problem is first transformed into a secure energy efficiency (SEE) problem using an objective function. Then, the security energy efficiency of the system is maximized by jointly optimizing the transmit beam formation of the base station and the reflected beam formation of the smart reflecting surface under the conditions that the total transmitted power constraint and the interference power constraint are satisfied. To address the difficulty in solving the resulting optimization problem, we apply an algorithm based on alternating optimization and semidefinite relaxation, as well as Dinklbach’s algorithm, to solve the problem. Simulation results show that this method can significantly improve the safety energy efficiency of the system.

1. Introduction

In the era of rapid development, the proliferation of emerging applications has resulted in a substantial upsurge in the demand for network communication traffic. While 5G communication systems exhibit noteworthy advancements over their predecessors [1], forthcoming wireless communications necessitate even higher throughput, enhanced security, reduced latency, lower energy consumption, extensive connectivity, network densification, and improved Quality of Service (QoS) [2]. Additionally, the exponential growth of numerous emerging mobile application models and the surge in network traffic will engender an immense and escalating need for the radio spectrum. To effectively cope with the burgeoning mobile data traffic in future wireless network communications, it is imperative to address the scarcity of spectrum resources [3].
Cognitive Radio Network (CRN) is widely acknowledged as a promising solution to enhance the efficient utilization of spectrum resources. CRN utilizes dynamic spectrum access and reconfiguration, enabling it to comprehend its surroundings and adapt its operating parameters according to the changes in the radio frequency (RF) environment. This breakthrough innovation in radio technology, Cognitive Radio (CR), paves the way for significant improvements in the utilization of congested radio spectra [4].
In CRN systems, CR serves as an effective technique to enhance Spectrum Efficiency (SE), and its users are classified into PU and SU. A PU is a licensed user who possesses higher priority in accessing the spectrum. On the other hand, an SU is typically an unlicensed user who can share the spectrum of the PU while ensuring that no harmful interference is caused to the PU [5]. For secondary users, the primary concern is to share the spectrum of the PU while minimizing interference and maintaining QoS for themselves, thereby maximizing spectrum efficiency.
While CRNs offer significant improvements in the spectral efficiency of wireless networks, they also face challenges related to optimizing performance for both PUs and SUs, as well as ensuring robust security [6]. Practical applications of CRNs encounter persistent obstacles concerning network energy consumption and hardware costs. Additionally, like traditional wireless networks, CRNs are susceptible to security issues. As previously mentioned, the ability of the physical layer in CRNs to sense and comprehend the surrounding RF environment becomes a vulnerability that adversaries can exploit for malicious activities.
The dynamic and open nature of the physical layer in CRNs renders cognitive communications highly vulnerable to various internal and external malicious activities. In recent years, numerous research efforts have focused on developing secure transmission techniques at the physical layer specifically tailored for CRNs. These techniques include Artificial Noise (AN)-assisted beamforming, Cooperative Jamming (CJ), and Cooperative Relaying schemes [7]. However, these approaches primarily concentrate on signal processing at the receiver and transmitter to adapt to changes in the wireless environment. They are unable to completely mitigate the negative effects caused by the uncontrollable electromagnetic wave propagation environment. Moreover, the deployment of a large number of relays in a secure wireless system inevitably leads to excessive costs. Additionally, collaborative interference and artificial noise introduce additional power consumption. Considering the limitations of these existing approaches, there is an urgent need for a new wireless security paradigm that is both cost-effective and energy-efficient.
In recent years, the emergence of Intelligent Reflecting Surface (RIS) technology, made possible by advancements in technology and metamaterials, has provided new opportunities. RIS is a planar array comprising numerous reconfigurable passive elements, each capable of independently modulating the incident signal to induce a specific phase shift. This collective manipulation of the reflected signal’s propagation characteristics enables RIS to significantly enhance the spectral efficiency and security of wireless networks at a low cost [8]. RIS technology offers a high level of flexibility for resource allocation and CRN systems. Moreover, researchers have started exploring the application of RIS to enhance the physical layer security of wireless communications. By adjusting the phase shift of the reflected signals, RIS can reshape the wireless propagation environment. This adjustment increases the data rate for legitimate receivers while decreasing the data rate for potential eavesdroppers, thereby reducing information leakage and enhancing overall system security [9]. Consequently, the integration of RIS into CRN systems holds promise as a solution to address the challenges faced by CRNs, improving spectral efficiency and energy efficiency, and facilitating green and secure communications.

1.1. Related Work

Reference [10] focused on a MISO CR system and demonstrates the benefits of beamforming in increasing the secrecy rate. Reference [11] considered a MIMO CR network and introduced a robust secure beamforming design to obtain the maximum achievable secrecy rate for the worst-case SU. Furthermore, several scholars have utilized various auxiliary techniques, such as the introduction of AN, relaying, and Collaborative Jamming to enhance the secure transmission performance of CR communication systems. In reference [12], AN was introduced to enhance secure communication in fast-fading environments for SUs. Reference [13] explored secure transmission in CR networks using relay-assisted orthogonal frequency division multiple access, considering latent eavesdroppers. Additionally, reference [14] investigated bidirectional relaying in CR communication systems, showing significant improvements in secrecy and rate for SUs. Moreover, reference [15] proposed a wireless energy-harvesting Collaborative Jammer-assisted transmission scheme to enhance CR system security. However, these studies have two main drawbacks. Firstly, deploying relays or auxiliary devices for secure output incurs high hardware costs and additional energy consumption. Secondly, ensuring satisfactory confidentiality performance in harsh wireless transmission environments remains challenging, even with AN or jamming signals.
The above energy consumption problems can be addressed well by introducing an RIS in CR networks. Due to full-duplex transmission and low power consumption, RIS has received a great deal of attention from both academia and industry as a promising technology that can significantly improve energy efficiency in 6G communications. It is a new cost-effective and energy-efficient technology that can shape the radio propagation environment and is well-suited to improve the energy efficiency of CR systems. In reference [16], RIS was proposed as a means to enhance the data transfer rate of SUs in MIMO CR systems. Reference [17] investigated RIS-assisted MISO CR systems to maximize the transmission rate of SUs. However, security considerations were not addressed. Subsequent studies focused on the security aspect. In reference [18], the authors examined the security performance of RIS-assisted underlay-mode CR systems, enhancing the secrecy rate of SUs. In reference [19], the problem of improving SUs’ secrecy in the presence of multiple eavesdroppers was investigated. The extension to the MIMO model was explored in reference [20] to maximize SUs’ secrecy rate with RIS. However, the trade-off between secrecy rate and energy consumption was considered in reference [21], aiming to maximize the Secrecy Energy Efficiency (SEE) of SUs by utilizing RIS.

1.2. Contributions

However, the aforementioned studies primarily focused on the secrecy rate and energy consumption of SU, neglecting the security and energy consumption aspects of the entire CR system in the presence of PU. Therefore, building upon the existing research, we propose a novel communication scenario to address the secure communication problem in the downlink and introduce the concept of an RIS to enhance the secure communication performance of the entire CR system. The main contributions of our work are as follows:
  • In a novel CR downlink communication scenario, a PBS communicates with a PU, while a CBS communicates with a SU. The entire CR system is subject to eavesdropping by an external entity;
  • We balance the secrecy rate and energy consumption by formulating a secure energy efficiency objective function, transforming the maximization of secrecy rate into a secure energy efficiency problem;
  • To efficiently solve the non-convex objective function in the subproblem, we employ an SCA-like (Sequential Convex Approximation-like) lemma. This approach helps overcome the nonconvexity and enables effective optimization of the objective function;
  • We propose an efficient algorithm based on alternating optimization, semidefinite relaxation, and Dinklbach’s method to solve the resulting optimization problem. Our method effectively improves the safety energy efficiency of the overall CR system, as demonstrated by simulation results.

2. System Model and Problem

2.1. System Model

As shown in Figure 1, an RIS-assisted CR MIMO communication system model is considered. The PBS with M p antenna and the CBS with M c antenna communicate with the PU and the SU, each with a single antenna, respectively. Also, the user PU and SU are subject to interference. In the depicted scenario, the eavesdropper (Eve) is equipped with a single antenna, while the RIS comprises N passive reflective elements. During the transmission of confidential messages by the PBS and CBS, the PU receives both useful signals from PBS and RIS, as well as interfering signals from CBS and their reflections by RIS. The SU experiences a similar situation. Eve attempts to eavesdrop on all users. It is assumed that all channels within the system undergo quasi-static flat fading. The channel matrices from PBS to RIS, from PBS to PU, from PBS to SU, from PBS to Eve, and from RIS to Eve and RIS to PU are denoted by G p C M p × N , h pp C M p × 1 , h ps C M p × 1 , h pe C M p × 1 , and h re C N × 1 , respectively. The channel matrices from CBS to RIS, from CBS to SU, from CBS to PU, from CBS to Eve, and from RIS to SU are denoted by G c C M c × N , h cp C M c × 1 , h cs C M c × 1 , and h ce C M c × 1 , respectively.
We assume that all channels experience quasi-static flat fading and that the channel state information (CSI) is completely known for all channels. Using the received signals of PU and SU, Eve can be expressed as
y p = h pp H + h rp H Φ G p f p x p + h cp H + h rp H Φ G c f c x c + n e
y s = h cs H + h rs H Φ G c f c x c + h ps H + h rs H Φ G p f p x p + n s
y e = h pe H + h re H Φ G p f p x p + h ce H + h re H Φ G c f c x c + n e
where the superscript H denotes the conjugate transpose operation. The phase shift matrix of RIS is denoted by Φ = diag e j θ 1 , , e j θ n , θ n [ 0 , 2 π ] . Let q n = e j θ n , in order to maximize the reflected power gain; then, q n should satisfy
q n = 1 , n
f p and f c are the transmit beamforming vectors of the PBS and CBS of the base station satisfying f p 2 P p max and f c 2 P c max , respectively, where · denotes the Euclidean parametrization and P max denotes the maximum transmission power of the base station. x p and x c are complex Gaussian random variables with mean 0. E | x | 2 = 1 , n p , n s and n e denote the additive Gaussian white noise at PU, SU, and Eve, respectively, with zero mean and variance σ p 2 , σ s 2 , and σ e 2 , respectively. Thus, the achievable rates of PU and SU can be specified as
R p = log 2 1 + h pp H + h r p H Φ G p f p 2 h cp H + h rp H Φ G c f c 2 + σ p 2
R s = log 2 1 + h cs H + h r s H Φ G c f c 2 h ps H + h rs H Φ G p f p 2 + σ s 2
The achievable rates of the eavesdropping links from Eve to PU and SU, respectively, are
R e , p = log 2 1 + h pe H + h r e H Φ G p f p 2 h ce H + h re H Φ G c f c 2 + σ e 2
R e , s = log 2 1 + h ce H + h r e H Φ G c f c 2 h pe H + h re H Φ G p f p 2 + σ e 2
The secrecy rate (SR) from PBS to PU is
R s e c , p = R p R e , p +
The secrecy rate from CBS to SU is
R s e c , s = R s R e , s +
where [ z ] + = max ( 0 , x ) . Since the maximum SR must be non-negative, the [ · ] + operation can be omitted without loss of optimality. The total power consumption of the system, P total , consists of both the transmitted power and the dissipation of the hardware components:
P total = f p 2 + f c 2 + N P dyn + P s t a + P s u c i r + P p u c i r + P B S c i r
where f p 2 and f c 2 denote the transmitted power consumption energy of the PBS and CBS of the base station, respectively. P d y n denotes the dynamic power consumption of each reflective element of the RIS, N represents the number of RIS reflection elements, P s t a denotes the static power required to maintain the basic circuit operation of the RIS, and P su cir , P pu cir , and P BS cir denote the user SU and PU and the hardware power consumed by the base station, respectively. In summary, we define the safe energy efficiency of the system as
η = R sec , p + R sec , s / P total
At the same time, during the cognitive transmission, the interference temperature to PU must be lower than a predefined threshold I t h to ensure the QoS of PU, i.e.,
h cp H + h rp H Φ G c f c 2 I t h

2.2. Problem Formulation

Under this condition, the objective of this paper is to maximize η by jointly optimizing the reflection phase shift matrix Φ and the transmitted beamforming vectors f p and f c , using the equation. We obtain the following equivalent formulation of Problem (1):
max f p , f c , Φ η
s . t . f p 2 P p max
f c 2 P c max
q n = 1 , n
h cp H + h rp H Φ G c f c 2 I t h
P p max and P c max denote the maximum transmitted power of the base station CBS and PBS, respectively. Obviously, (P1) is difficult to solve due to the nonconvex objective function as well as the coupled optimization variables. Therefore, in this paper, we apply an AO-based algorithm to solve (P1). By iteratively optimizing one of f c , f p , and Φ , the other is fixed in each iteration until convergence is reached, as detailed below.

3. Alternating Optimization-Based Algorithm

3.1. Given Φ , Optimize f c , f p

First, we define the following symbols below:
h p 1 = h pp H + h rp H Φ G p , H p 1 = h p 1 H h p 1 .
h p 2 = h cp H + h rp H Φ G c , H p 2 = h p 2 H h p 2 .
h s 1 = h cs H + h rs H Φ G c , H s 1 = h s 1 H h s 1 .
h s 2 = h ps H + h rs H Φ G p , H s 2 = h s 2 H h s 2 .
h e 1 = h pe H + h re H Φ G p , H e 1 = h e 1 H h e 1 .
h e 2 = h ce H + h re H Φ G c , H e 2 = h e 2 H h e 2 .
F c = f c f c H , F P = f P f P H  
Then, Equation (5) can be simplified to
R p = log 2 1 + h p 1 F p h p 1 H h p 2 F c h p 2 H + σ p 2
Let tr(Z) and rank(Z) denote the trace and rank of the matrix Z, respectively, where the semidefinite relaxation (SDR) algorithm [22] is applied. Equation (15) can be written as
R p = log 2 1 + tr H p 1 F p tr H p 2 F C + σ p 2
Further,
R p = log 2 λ p tr H p 2 F c + λ p tr H p 1 F p + 1 λ p tr H p 2 F c + 1 , λ p = 1 / σ p 2
Similarly, we can obtain
R S = log 2 λ s tr H s 2 F p + λ s tr H s 1 F C + 1 λ p tr H s 2 F p + 1 , λ s = 1 / σ S 2
R e , p = log 2 λ e tr H e 2 F C + λ e tr H e 1 F p + 1 λ e tr H e 2 F C + 1 , λ e = 1 / σ e 2
R e , s = log 2 λ e tr H e 1 F p + λ e tr H e 2 F c + 1 λ e tr H e 1 F p + 1 , λ e = 1 / σ e 2
To further address the nonconvexity of the objective function, we quote the following lemma [23].
Lemma 1. 
For any x > 0 , consider the function φ ( t ) = t x + ln t + 1 . Then, we have
ln x = max t > 0 φ ( t )
The optimal solution is t = 1 / x . Lemma 1 provides an upper bound for φ ( t ) , which is tight when t = 1 / x . For R p , applying Lemma 1, let x = λ p tr H p 2 F c + 1 and t = t p ; then, R p can be written as
R p ln 2 = ln λ p tr H p 2 F c + λ p tr H p 1 F p + 1 ln λ p tr H p 2 F c + 1 = max t p > 0 φ p F p , F c , t p
where
φ p F p , F c , t p = ln λ p tr H p 2 F c + λ p tr H p 1 F p + 1 t p λ p tr H p 2 F c + 1 + ln t p + 1
Similarly, we set x = λ s tr H s 2 F p + 1 and t = t s , and R s can then be written as
R s ln 2 = ln λ s tr H s 2 F p + λ s tr H s 1 F c + 1 ln λ s tr H s 2 F p + 1 = max t s > 0 φ s F p , F c , t s
where
φ s F p , F c , t s = ln λ s tr H s 2 F p + λ s tr H s 1 F c + 1 t s λ s tr H s 2 F p + 1 + ln t s + 1
Let x = λ e tr H e 2 F c + λ e tr H e 1 F p + 1 and t = t e p ; the, R e , p can be written as
R e , p ln 2 = ln λ e tr H e 2 F c + λ e tr H e 1 F p + 1 ln λ e tr H e 2 F c + 1 = min t e p > 0 φ e p F p , F c , t e p
where
φ e p F p , F c , t e p = t e p λ e tr H e 2 F c + λ e tr H e 1 F p + 1 ln t e p 1 ln λ e tr H e 2 F c + 1
Let x = λ e tr H e 1 F p + λ e tr H e 2 F c + 1 , t = t e s , R e , s can be written as
R e , s ln 2 = ln λ e tr H e 1 F p + λ e tr H e 2 F c + 1 ln λ e tr H e 1 F p + 1 = min t e s > 0 φ e s F p , F c , t e s
where,
φ e s F p , F c , t e s = t e s λ e tr H e 1 F p + λ e tr H e 2 F c + 1 ln t e s 1 ln λ e tr H e 1 F p + 1
By applying the semidefinite relaxation (SDR), we relax the rank( F p ) = rank( F c ) = 1 constraint and apply Dinklbach’s algorithm [24]. Then, subproblem (P1.1) can be written as
max f p , f c , t p , t e s , t e p η
s . t . F c 0 , F p 0
tr F c P c max , tr F p P p max
t s > 0 , t p > 0 , t e s > 0 , t e p > 0
where g F c , F p = φ p F p , F c , t p φ e p F p , F c , t e p + φ s F p , F c , t s φ e s F p , F c , t e s ln 2 , where ρ is the auxiliary variable introduced by applying Dinkelbach’s algorithm to solve this fractional programming problem. It can be shown that (P1.1) is convex for F p , F c or t s , t p , t e s , t e p . Therefore, it can be solved by applying alternating optimization techniques. According to Lemma 1, the optimal F p , F c for fixed t s , t p , t e s , t e p can be derived in closed form as follows:
t p * = λ p tr H p 2 F c + 1 1
t s * = λ s tr H s 2 F p + 1 1
t e s * = λ e tr H e 1 F p + λ e tr H e 2 F c + 1 1
t e p * = λ e tr H e 2 F c + λ e tr H e 1 F p + 1 1
On the other hand, for a given t p * , t s * , t e s * , t e p * , the optimal F p , F c is solved by each fixed t p * , t s * , t e s * , t e p * iteration. Since (P1.1) is convex, it can be solved efficiently by using a convex optimization solver (e.g., CVX), and, eventually, the optimal solution is obtained by alternately updating F p , F c and t p * , t s * , t e s * , t e p * . Note that the obtained F c and F p are not guaranteed to be rank 1 matrices because the rank 1 constraint is discarded in (P1.2) by applying SDR. To solve the omitted constraint rank equal to 1, we apply a Gaussian randomization method reduction, the details of which are omitted here for the sake of brevity. Algorithm 1 is summarized as follows.    
Algorithm 1 Alternating optimization solves P1.1
Energies 17 00515 i001

3.2. Given f c , f p , Optimize Φ

First, we let v = e j θ 1 , , e j θ n H ; then, Φ = diag e j θ 1 , , e j θ n = diag v H .
Let v ¯ = 1 , v H H , V = v ¯ v ¯ H . And we define the following symbols below:
T p 1 = h pp H diag h rp H G p f p f p H h pp H diag h rp H G p H ,
T p 2 = h cp H diag h rp H G c f c f c H h cp H diag h rp H G c H ,
T s 1 = h cs H diag h rs H G c f c f c H h cs H diag h rs H G c H ,
T s 2 = h ps H diag h rs H G p f p f p H h ps H diag h rs H G p H ,
T e 1 = h pe H diag h re H G p f p f p H h pe H diag h re H G p H ,
T e 2 = h ce H diag h re H G c f c f c H h ce H diag h re H G c H .   
According to Lemma 1, we can obtain
ln 2 R p = ln λ p tr T p 1 V + λ p tr T p 2 V + 1 ln λ p tr T p 2 V + 1 = max u p > 0 ψ p V , u p
where
ψ p V , u p = ln λ p tr T p 1 V + λ p tr T p 2 V + 1 u p λ p tr T p 2 V + 1 + ln u p + 1
Similarly,
ln 2 R s = ln λ s tr T s 1 V + λ s tr T s 2 V + 1 ln λ s tr T s 2 V + 1 = max u s > 0 ψ s V , u s
where
ψ s V , u s = ln λ s tr T s 1 V + λ s tr T s 2 V + 1 u s λ s tr T s 2 V + 1 + ln u s + 1
ln 2 R e p = ln λ e tr T e 1 V + λ e tr T e 2 V + 1 ln λ e tr T e 2 V + 1 = min u e p > 0 ψ e p V , u e p
where
ψ e p V , u e p = u e p λ e tr T e 1 V + λ e tr T e 2 V + 1 ln u e p 1 ln λ e tr T e 2 V + 1
ln 2 R e s = ln λ e tr T e 1 V + λ e tr T e 2 V + 1 ln λ e tr T e 1 V + 1 = min u e s > 0 ψ e s V , u e s
where
ψ e s V , u e s = u e s λ e tr T e 1 V + λ e tr T e 2 V + 1 ln u e s 1 ln λ e tr T e 1 V + 1
By the semidefinite relaxation (SDR) method, we relax the rank ( V ) = 1 constraint, and the subproblem of (P1.2) can be written as follows:
max u p , u s , u e p , u e s ψ p ( V , u p ) ψ e p ( V , u e p ) + ψ s ( V , u s ) ψ e s ( V , u e s )
s . t . V 0
diag ( V ) = 1
tr T p 2 V I t h
u p > 0 , u s > 0 , u e p > 0 , u e s > 0
It can be shown that (P1.2) is convex for V or ( u p , u s , u e p , u e s ). Therefore, it can be solved by applying alternating optimization techniques. According to Lemma 1, the optimal ( u p , u s , u e p , u e s ) for a fixed V can be derived in closed form as follows:
u p * = λ p tr T p 2 V + 1 1
u s * = λ s tr T s 2 V + 1 1
u e p * = λ e tr T e 1 V + λ e tr T e 2 V + 1 1
u e s * = λ e tr T e 2 V + λ e tr T e 1 V + 1 1
For a given ( u p * , u s * , u e p * , u e s * ), the optimal V can be solved iteratively. The overall solution method is similar to the subproblem (P1.1), which is finally solved with the help of the CVX tool. The complete Algorithm 2 for solving the entire problem is as follows.
Algorithm 2 Alternating optimization solves P1
Energies 17 00515 i002

3.3. Algorithm Complexity

The overall algorithm for solving the problem is shown in Algorithm 2. The complexity of the algorithm comes from solving the two subproblems (P1.1) and (P1.2), the complexity of the algorithm in solving f c , f p is O M c 4.5 + M p 4.5 , and the complexity of the algorithm in solving v is O ( N + 1 ) 4.5 [25]. Assuming that the number of iterations in the two subproblems are L 1 and L 2 , the complexity is O L 1 M c 4.5 + M p 4.5 and O L 2 ( N + 1 ) 4.5 , respectively. Thus, we know that the number of iterations in the overall iterative process is L 3 , and the complexity of the whole algorithm is O L 3 L 1 M c 4.5 + M p 4.5 + L 2 ( N + 1 ) 4.5 .

4. Simulation Results

In this section, the effectiveness of the algorithm in this system model problem scenario is demonstrated by comparing it with the scheme without RIS and the RIS random phase algorithm scheme. We assume that the locations of primary user PU and secondary user SU are (100, 20) and (50, 0), respectively, the locations of PBS and CBS are (150, 0) and (0, 0), respectively, the locations of RIS and Eve are (50, 30), (100, −10), respectively, and the noise variance σ 2 is set to 10 10 W . The path loss of all channels is given by the equation L d a b = L 0 d a b / d 0 α a b , where L 0 denotes the path loss at the reference distance d 0 = 1 m, d denotes the straight-line distance from communication end a to communication end b, α is the path loss exponent, and the path loss coefficients of PBS to RIS, CBS to RIS, RIS to PU, RIS to SU, Eve to RIS, PBS to PU, PBS to SU, CBS to PU, CBS to SU, PBS to Eve, and CBS to Eve have path loss coefficients of α P R = α C R = 2 , α R P = α R S = α E R = 2.6 , and α P P = α P S = α C P = α C S = α P E = α C E = 3.5 , respectively.
It is assumed that the small-scale fading of the channels from PBS to RIS, RIS to PU, CBS to RIS, RIS to SU, and Eve to RIS all follow the Rayleigh fading model. The small-scale fading is expressed in the form of the equation g a b = β / 1 + β g a b L O S + β / 1 + β g a b N L O S , where β denotes the Rician factor, and g a b L O S and g a b N L O S represent the deterministic line-of-sight component and non-deterministic line-of-sight component of the channel of interest between the a and b ends, respectively. Other specific parameters are set as follows (Table 1).
Figure 2 shows the variation of the safety energy efficiency with the number of CBS antennas for different schemes with a fixed number of PBS base station antennas M c = 3 , with a maximum transmit power of 30 dBm, and a number of RISs N = 16 . Figure 3 shows the variation of different schemes with a fixed number of CBS base station antennas. It can be seen that, with the increase in the number of antennas, the system safety performance is improved to a certain extent, and the proposed algorithm is better than the other two schemes. In addition, the system with random RIS assistance is slightly better than the system without RIS assistance in terms of safety energy efficiency gain.
The convergence of the algorithm in this paper when P p max = P c max = 30 dBm is given in Figure 4. It can be seen that, as the number of iterations increases, the safety energy efficiency of the system increases monotonically until it maintains a steady state, which proves the effectiveness of the algorithm. Moreover, the more RIS reflection units, the greater the convergence value, which can be explained by the fact that the greater the number of RIS elements, the stronger the reflection of the signal in the expected direction.
Figure 5 shows the variation of the average security energy efficiency with the number of RIS reflective elements N for different schemes with a fixed number of base station antennas. At this time, the P max is 30 dBm, the number of antennas of both base stations is 4, and the interference temperature threshold is I t h −90 dBm. From the figure, it can be seen that, with the increase in the number of RIS reflector units in a certain range, the security energy efficiency of the two schemes—our proposed scheme and the RIS random phase-shift—becomes larger, whereas the security energy efficiency of the scheme without the assistance of the RIS remains unchanged. By increasing the number of RIS reflector units, the RIS gains more flexibility in channel design for the PBS/CBS–RIS–PU/SU link. This increased flexibility leads to improved beamforming gain. And the more RIS elements in the communication system, the more signal paths and energy the RIS reflects to improve the signal quality of the PUs and SUs while reducing the signal quality of the eavesdropper. However, it is worth noting that increasing the number of RISs is beneficial to improve the security energy efficiency of the whole communication system only within a certain range.
Figure 6 and Figure 7 show the variation of the security energy efficiency with CBS and PBS transmitting power for different schemes for N = 16. It can be observed that the gain effect of the proposed algorithm is significantly better than the other two schemes at different transmission powers. In addition, the safety energy efficiency of the three schemes gradually increases and then slowly decreases as the transmitted power P max gradually increases. Because the applied scheme optimizes the phase shift of the RIS reflection unit, it harnesses the additional degrees of freedom in the channel, resulting in a gradual increase in the safety energy efficiency of the system. This is achieved despite the associated increase in energy consumption as the maximum power ( P max ) gradually increases. As P max increases further, the increase in system energy consumption dominates the system energy efficiency performance, leading to a decrease in safety energy efficiency. As P max increases even further, the increased system rate begins to dominate the system safety energy efficiency, leading to a slow start of the decrease. Overall, the applied scheme is significantly better than the other two schemes.
Figure 8 shows the variation of the system safe energy efficiency for different I t h thresholds. As can be seen from the figure, the safe energy efficiency of all schemes is improved with the gradual increase in I t h . This is because the interference tolerance of the PU is greater when the interference temperature threshold I t h increases, which relaxes the constraints on the safe energy efficiency of the SU, and, thus, the safe energy efficiency of the whole communication system is improved. It can also be seen that the secure energy efficiency of our proposed scheme is significantly better than the benchmark scheme. Theoretically, the safe energy efficiency of the whole communication system should be saturated when the I t h increases to a certain value, which means that the interference temperature is no longer a factor affecting the safe energy efficiency of the system, which may be limited by the transmission power P max or other factors.
Figure 9 shows the system safety energy efficiency versus the path loss between the RIS and the base station. Path loss being an important parameter in communication, it is obvious that a greater path loss causes the associated safe energy efficiency to gradually decrease. However, we can clearly notice from the figure that, for the same path loss parameter, the scheme with RIS is better than the scheme without RIS assistance. More importantly, our proposed scheme with phase-shift optimization for RIS is superior to the one with random phase-shift, which is due to the disordered nature of the random phase-shift of RIS, which appears to weaken the communication quality of the legitimate link. Overall, the simulation results demonstrate the superiority and necessity of our proposed scheme.

5. Conclusions

This paper addresses the issue of secure transmission in RIS-assisted MIMO CR systems. The system SEE maximization problem is studied by jointly optimizing the transmit beamforming at the PBS and CBS and the reflection phase shift matrix at the RIS, under the premise that the SU interference to the PU is limited to a predefined threshold. To tackle the complexity of the nonconvex problem, we propose an iterative alternating optimization algorithm that effectively decouples the original problem into two subproblems. Simulation results show that the proposed algorithm can greatly improve the safe energy efficiency of the system, as a way to ensure the safe communication between PU and SU. Moreover, with the help of RIS, the SEE of the proposed algorithm is significantly improved compared to the benchmark solution.

Author Contributions

Conceptualization, X.W. (Xinshui Wang) and X.W. (Xu Wang); methodology, X.W. (Xinshui Wang); software, X.W. (Xu Wang), J.G. and Z.L.; validation, J.G., Z.L., X.L. and Y.M.; writing—original draft preparation, X.W. (Xinshui Wang) and X.W. (Xu Wang); writing—review and editing, X.W. (Xinshui Wang), X.W. (Xu Wang), and J.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was financially supported by the Natural Science Foundation of Shandong Province of China (Grant No. ZR2021MF013 and Grant No. ZR2021MF124).

Data Availability Statement

The data are not publicly available due to the data also forms part of an ongoing study.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Huang, C.; Hu, S.; Alexandropoulos, G.C.; Zappone, A.; Yuen, C.; Zhang, R.; Di Renzo, M.; Debbah, M. Holographic MIMO Surfaces for 6G Wireless Networks: Opportunities, Challenges, and Trends. IEEE Wirel. Commun. 2020, 27, 118–125. [Google Scholar] [CrossRef]
  2. Li, X.; Wang, Q.; Zeng, M.; Liu, Y.; Dang, S.; Tsiftsis, T.A.; Dobre, O.A. Physical-Layer Authentication for Ambient Backscatter-Aided NOMA Symbiotic Systems. IEEE Trans. Commun. 2023, 71, 2288–2303. [Google Scholar] [CrossRef]
  3. Almohamad, A.; Tahir, A.M.; Al-Kababji, A.; Furqan, H.M.; Khattab, T.; Hasna, M.O.; Arslan, H. Smart and Secure Wireless Communications via Reflecting Intelligent Surfaces: A Short Survey. IEEE Open J. Commun. Soc. 2020, 1, 1442–1456. [Google Scholar] [CrossRef]
  4. Huang, C.; Zappone, A.; Alexandropoulos, G.C.; Debbah, M.; Yuen, C. Reconfigurable intelligent surfaces for energy efficiency in wireless communication. IEEE Trans. Wirel. Commun. 2019, 18, 4157–4170. [Google Scholar] [CrossRef]
  5. Chen, X.; Ng, D.W.K.; Gerstacker, W.H.; Chen, H.H. A Survey on Multiple-Antenna Techniques for Physical Layer Security. IEEE Commun. Surv. Tutorials 2017, 19, 1027–1053. [Google Scholar] [CrossRef]
  6. Gui, G.; Liu, M.; Tang, F.; Kato, N.; Adachi, F. 6G: Opening New Horizons for Integration of Comfort, Security, and Intelligence. IEEE Wirel. Commun. 2020, 27, 126–132. [Google Scholar] [CrossRef]
  7. Li, X.; Qi, H.; Do, D.T.; Hui, Z.; Ding, Y.; Zhu, M.; Peng, H. IQ-Impaired Wireless-Powered Modify-and-Forward Relaying for IoT Networks: An In-Depth Physical-Layer Security Analysis. IEEE Internet Things J. 2023, 10, 14912–14924. [Google Scholar] [CrossRef]
  8. Feng, K.; Li, X.; Han, Y.; Jin, S.; Chen, Y. Physical Layer Security Enhancement Exploiting Intelligent Reflecting Surface. IEEE Commun. Lett. 2021, 25, 734–738. [Google Scholar] [CrossRef]
  9. Li, X.; Zhang, J.; Han, C.; Hao, W.; Zeng, M.; Zhu, Z.; Wang, H. Reliability and Security of CR-STAR-RIS-NOMA Assisted IoT Networks. IEEE Internet Things J. 2023. [Google Scholar] [CrossRef]
  10. Pei, Y.; Liang, Y.C.; Zhang, L.; Teh, K.C.; Li, K.H. Achieving cognitive and secure transmissions using multiple antennas. In Proceedings of the IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, Tokyo, Japan, 13–16 September 2009; pp. 1–5. [Google Scholar]
  11. Xiong, J.; Zhou, X.; Cao, K.; Liu, X.; Ma, D. Robust Secure Beamforming in Cognitive MIMO Wiretap Channels with Bounded Channel Errors. In Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 21–23 October 2020; pp. 742–747. [Google Scholar]
  12. Al-Nahari, A.; Geraci, G.; Al-Jamali, M.; Ahmed, M.H.; Yang, N. Beamforming with Artificial Noise for Secure MISOME Cognitive Radio Transmissions. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1875–1889. [Google Scholar] [CrossRef]
  13. Mokari, N.; Parsaeefard, S.; Saeedi, H.; Azmi, P.; Hossain, E. Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks. IEEE Trans. Signal Process. 2015, 63, 291–304. [Google Scholar] [CrossRef]
  14. Alavi, F.; Mokari, N.; Saeedi, H. Secure resource allocation in OFDMA-based cognitive radio networks with two-way relays. In Proceedings of the 23rd Iranian Conference on Electrical Engineering, Tehran, Iran, 10–14 May 2015; pp. 171–176. [Google Scholar]
  15. Chen, X.; Guo, L.; Li, X.; Dong, C.; Lin, J.; Mathiopoulos, P.T. Secrecy Rate Optimization for Cooperative Cognitive Radio Networks Aided by a Wireless Energy Harvesting Jammer. IEEE Access 2018, 6, 34127–34134. [Google Scholar] [CrossRef]
  16. Zhang, L.; Wang, Y.; Tao, W.; Jia, Z.; Song, T.; Pan, C. Intelligent Reflecting Surface Aided MIMO Cognitive Radio Systems. IEEE Trans. Veh. Technol. 2020, 69, 11445–11457. [Google Scholar] [CrossRef]
  17. Yuan, J.; Liang, Y.C.; Joung, J.; Feng, G.; Larsson, E.G. Intelligent Reflecting Surface (IRS)-Enhanced Cognitive Radio System. In Proceedings of the IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  18. Dong, L.; Wang, H.M.; Xiao, H. Secure Cognitive Radio Communication via Intelligent Reflecting Surface. IEEE Trans. Commun. 2021, 69, 4678–4690. [Google Scholar] [CrossRef]
  19. Zhang, X.; Li, A.; Guo, T. Secrecy Rate Maximization for IRS-assisted MISOME Cognitive Radio System. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 10–13 April 2022; pp. 1958–1963. [Google Scholar]
  20. Dong, L.; Wang, H.M.; Xiao, H.; Bai, J. Secure Intelligent Reflecting Surface Assisted MIMO Cognitive Radio Transmission. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021; pp. 1–6. [Google Scholar]
  21. Wu, X.; Ma, J.; Xing, Z.; Gu, C.; Xue, X.; Zeng, X. Secure and Energy Efficient Transmission for IRS-Assisted Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 170–185. [Google Scholar] [CrossRef]
  22. Liu, L.; Zhang, R.; Chua, K.C. Secrecy Wireless Information and Power Transfer with MISO Beamforming. IEEE Trans. Signal Process. 2014, 62, 1850–1863. [Google Scholar] [CrossRef]
  23. Li, Q.; Hong, M.; Wai, H.T.; Liu, Y.F.; Ma, W.K.; Luo, Z.Q. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization. IEEE J. Sel. Areas Commun. 2013, 31, 1714–1727. [Google Scholar] [CrossRef]
  24. Dinkelbach, W. On nonlinear fractional programming. Manag. Sci. 1967, 13, 492–498. [Google Scholar] [CrossRef]
  25. Polik, I.; Terlaky, T. Chapter 4—Interior point methods for nonlinear optimization. In Nonlinear Optimization, 1st ed.; Di Pillo, G., Schoen, F., Eds.; Springer: New York, NY, USA, 2010. [Google Scholar]
Figure 1. RIS-assisted Cognitive Radio Network.
Figure 1. RIS-assisted Cognitive Radio Network.
Energies 17 00515 g001
Figure 2. SEE versus the CBS antennas.
Figure 2. SEE versus the CBS antennas.
Energies 17 00515 g002
Figure 3. SEE versus the PBS antennas.
Figure 3. SEE versus the PBS antennas.
Energies 17 00515 g003
Figure 4. Convergence of the proposed algorithm.
Figure 4. Convergence of the proposed algorithm.
Energies 17 00515 g004
Figure 5. SEE versus the number of reflecting elements N.
Figure 5. SEE versus the number of reflecting elements N.
Energies 17 00515 g005
Figure 6. SEE versus CBS’s maximum transmit power P C B S max .
Figure 6. SEE versus CBS’s maximum transmit power P C B S max .
Energies 17 00515 g006
Figure 7. SEE versus CBS maximum transmit power P P B S max .
Figure 7. SEE versus CBS maximum transmit power P P B S max .
Energies 17 00515 g007
Figure 8. Variation of SEE with I t h .
Figure 8. Variation of SEE with I t h .
Energies 17 00515 g008
Figure 9. SEE versus path loss.
Figure 9. SEE versus path loss.
Energies 17 00515 g009
Table 1. Parameter setting.
Table 1. Parameter setting.
ParametersValues
Path loss L 0 30  dB
Rician factor β β = 10
QoS2 bps/Hz
Hardware power loss P s u c i r = P p u c i r = 0.005 P B S c i r = 1.5 P s t a = 0.1 P d y n = 0.0001
Other parameters ε = 0.001 L = 20
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, X.; Wang, X.; Ge, J.; Liu, Z.; Ma, Y.; Li, X. Reconfigurable Intelligent Surface-Assisted Secure Communication in Cognitive Radio Systems. Energies 2024, 17, 515. https://doi.org/10.3390/en17020515

AMA Style

Wang X, Wang X, Ge J, Liu Z, Ma Y, Li X. Reconfigurable Intelligent Surface-Assisted Secure Communication in Cognitive Radio Systems. Energies. 2024; 17(2):515. https://doi.org/10.3390/en17020515

Chicago/Turabian Style

Wang, Xinshui, Xu Wang, Jimin Ge, Zhibin Liu, Yuefeng Ma, and Xingwang Li. 2024. "Reconfigurable Intelligent Surface-Assisted Secure Communication in Cognitive Radio Systems" Energies 17, no. 2: 515. https://doi.org/10.3390/en17020515

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop