Next Article in Journal
A UAV-Assisted Stackelberg Game Model for Securing loMT Healthcare Networks
Next Article in Special Issue
Hierarchical Matching Algorithm for Relay Selection in MEC-Aided Ultra-Dense UAV Networks
Previous Article in Journal
Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems
Previous Article in Special Issue
A Multi-Subsampling Self-Attention Network for Unmanned Aerial Vehicle-to-Ground Automatic Modulation Recognition System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

LAP and IRS Enhanced Secure Transmissions for 6G-Oriented Vehicular IoT Services

1
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
2
College of Information Science and Engineering, Jiaxing University, Jiaxing 314001, China
3
Changji Electric Power Supply Company, State Grid Xinjiang Electric Power Co., Ltd., Changji 831100, China
*
Author to whom correspondence should be addressed.
Drones 2023, 7(7), 414; https://doi.org/10.3390/drones7070414
Submission received: 26 May 2023 / Revised: 15 June 2023 / Accepted: 20 June 2023 / Published: 22 June 2023
(This article belongs to the Special Issue UAV-Assisted Intelligent Vehicular Networks)

Abstract

:
In 6G-oriented vehicular Internet of things (IoT) services, the integration of a low altitude platform (LAP) and intelligent reflecting surfaces (IRS) provides a promising solution to achieve seamless coverage and massive connections at low cost. However, due to the open nature of wireless channels, how to protect the transmission of privacy information in LAP-based IRS symbiotic vehicular networks remains a challenge. Motivated by the above, this paper investigates the LAP and IRS enhanced secure transmission problem in the presence of an eavesdropper. Specifically, we first deploy a fixed LAP equipped with IRS to overcome the blockages and introduce artificial noise against the eavesdropper. Next, we formulate a total secure channel capacity maximization problem by optimizing the phase shift, power distribution coefficient, and channel allocation. To effectively solve the formulated problem, we design an iterative algorithm with polynomial complexity, where the optimization variables are solved in turn. In addition, the complexity and convergence of the proposed iterative algorithm are analyzed theoretically. Finally, numerical results show that our proposed secure transmission scheme outperforms the comparison schemes in terms of the total secure channel capacity.

1. Introduction

While the dense coverage of fifth-generation (5G) terrestrial networks can satisfy the demands of vehicular Internet of things (IoT) services in hotspots, people still have urgent requirements for ubiquitous connectivity with high data rates in remote areas [1]. Due to the inherent limitations of terrestrial networks, air-to-ground (A2G) communications are envisioned as a promising technique to serve sixth-generation (6G)-oriented vehicular IoT applications [2,3,4]. As the most representative A2G communications, low-altitude platform (LAP)-enhanced transmissions have lower path loss and higher line-of-sight (LoS) link probability, which can be deployed on demand via a levitation mode to provide seamless and flexible coverage [5,6,7]. On the other hand, intelligent reflecting surfaces (IRS) with low hardware cost and power consumption can be used for 6G-oriented vehicular IoT services by smartly reconfiguring wireless propagation environments [8,9,10].
Following the technological advancements of A2G communications, the combination of LAP and IRS has attracted a certain amount of attention [11]. Generally, this combination can be divided into two cases, i.e., mobile IRS schemes [12,13] and fixed IRS schemes [14,15,16]. However, in some practical vehicular network (VNet) scenarios (e.g., emergency rescues), mobile IRS schemes may be impractical. The reason is that the payload and flight time of LAPs with mobile capability are extremely limited. According to the above discussion, the authors in [14] derived the channel gain lower bound for LAP and IRS collaborative communications. Inspired by this work, the researchers in [15] investigated the sum rate maximization problem of LAP-aided IRS networks by optimizing the phase shift and LAP altitude. Moreover, by using quasi-stationary LAPs, the IRS-assisted multi-layer aerial architecture was proposed in [16], which pointed out a promising direction for 6G-oriented vehicular IoT services. Furthermore, in order to improve the channel capacity, more works focused on the network optimization problems, including beamforming, resource (e.g., power and spectrum) allocation, and energy efficiency optimization [17,18,19,20]. We have summarized these works in Table 1.
Although the above works present optimization policies and models of LAP and IRS enhanced transmissions, these works make an implicit assumption that LAP-based IRS symbiotic vehicular networks (VNets) are secure. In LAP-based IRS symbiotic VNets, the privacy information is susceptible to eavesdropping due to the open nature of A2G channels [21]. Traditionally, the network security is protected by upper-layer encryption methods. However, such encryption algorithms and key allocation strategies will significantly improve the complexity of the system [22]. Faced with the above challenges, by using the wireless channel characterizations, the physical layer security (PLS) technique can be regarded as a promising alternative technique, which can be widely applied to 6G-oriented vehicular IoT services to ensure information security [23]. Therefore, under the constraints of network security, how to improve the total secure channel capacity of LAP and IRS enhanced transmissions is a key technical difficulty.
Motivated by the above, this paper investigates the secure transmission problem in LAP-based IRS symbiotic VNets in the presence of an eavesdropper. First, we deploy a fixed LAP equipped with IRS to overcome the blockages and exploit artificial noise (AN) to interfere with the eavesdropper. Next, aiming to maximize the total secure channel capacity, we formulate this problem as a mixed-integer and non-convex program. To effectively solve the formulated problem, an iterative algorithm with polynomial complexity is proposed, where the phase shift, power distribution coefficient, and channel allocation are optimized in turn. Then, we theoretically analyze the complexity and convergence of the proposed iterative algorithm. Finally, numerical results show that the proposed secure transmission scheme significantly improves the total secure channel capacity against the current works [2,23] and baseline scheme. In addition, the influence of the number of reflection elements is discussed. The above results are a meaningful guide for improving the quality of service (QoS) of 6G-oriented vehicular IoT services.
The rest of this article is organized as follows. Section 2 introduces the network model and presents the total secure channel capacity maximization problem. Then, in Section 3, we design an iterative algorithm with polynomial complexity to solve the formulated problem. Simulation results are presented in Section 4. Finally, Section 5 concludes the paper.

2. Network Model and Problem Formulation

Figure 1 illustrates the considered LAP-based IRS symbiotic VNet, which consists of a remote base station (RBS), a fixed LAP equipped with IRS, U legitimate vehicle users, and an eavesdropper. The set of legitimate vehicle users is denoted as U = 1 , 2 , . . . , U . We assume that there is no direct communication link between the RBS and the legitimate vehicle user/eavesdropper due to obstacles [8]. Under this condition, we adopt the LAP equipped with IRS to enhance transmissions. The IRS can be controlled by an intelligent controller.
It is assumed that the IRS has G h horizontal reflection elements and G v vertical reflection elements, denoted as G = 1 , 2 , , G , where G = G h × G v . Moreover, the RBS has N antennas and K channels, denoted as K = 1 , 2 , , K , where K U . Let K = k u k K , u U denote the channel allocation policy. If the u-th u U legitimate vehicle user occupies the k-th k K channel, k u = 1 ; otherwise, k u = 0 . Furthermore, each legitimate vehicle user with self-interference cancellation capability has two antennas that can implement full-duplex communication. Meanwhile, we assume that the AN emitted by the legitimate vehicle users will not affect the received signals, and the eavesdropper is equipped with a single antenna [24]. Since the total power P u max of the system is limited, the RBS and the u-th legitimate vehicle user need to negotiate to decide the transmitted power P u down of RBS (downlink) and the transmitted power P u up of AN (uplink). Especially, as discussed in [21], the channel is assumed to have reciprocity. Likewise, it is assumed that the channel state information (CSI) associated with the eavesdropper/IRS is available. The reason is that even for a passive eavesdropper, it can also estimate its CSI through local oscillator power inadvertently leaked from the eavesdropper’s receiver radio frequency frontend [25]. Since the investigated scenario is highly dynamic, imperfect estimation of the reflection phases and phase errors are possible with respect to the link between LAP and ground nodes. In this situation, the CSI of the LAP vehicle links needs to be periodically reported to the RBS with a feedback period. According to [26], the first-order Gauss–Markov process can be utilized to estimate the CSI of LAP-vehicle links.
According to the above description, the received signal y u of the u-th legitimate vehicle user can be expressed as
y u = h l , u H Φ H B , l P u down s u + η u ,
where h l , u H is the channel from IRS to the u-th legitimate vehicle user, h l , u C G × 1 ; Φ is the phase shift matrix, and Φ = diag e j X g , X g 0 , 2 π , where X g is the phase shift of the g-th g G reflection element; H B , l is the channel from the RBS to IRS, H B , l C G × N ; s u is the transmitted signal from the RBS for the u-th legitimate vehicle user with zero mean and normalized power; η u is the noise received by the u-th legitimate vehicle user, η u C N 0 , σ u 2 , where σ u 2 is the noise power of the u-th legitimate vehicle user.
Similarly, the received signal y u Eve of the eavesdropper is
y u Eve = h l , Eve H Φ H B , l P u down s u + h l , Eve H Φ h l , u P u up a u + h u , Eve P u up a u + η Eve ,
where h l , Eve H is the channel from IRS to the eavesdropper, h l , Eve C G × 1 ; a u is the AN signal emitted by the u-th legitimate vehicle user with zero mean and normalized power; h u , Eve is the channel from the u-th legitimate vehicle user to the eavesdropper, h u , Eve C ; η Eve is the noise received by the eavesdropper, η Eve C N 0 , σ Eve 2 , where σ Eve 2 is the noise power of the eavesdropper.
According to (1), the information rate R B , u Φ , P u down , k u of the u-th legitimate vehicle user is given by
R B , u Φ , P u down , k u = k = 1 K B u k u log 2 1 + SINR B , u ,
where B u is the channel bandwidth of the u-th legitimate vehicle user, and SINR B , u can be expressed as
SINR B , u = P u down h l , u H Φ H B , l 2 σ u 2 .
The information rate R u , Eve Φ , P u down , P u up , k u of the eavesdropper is given by
R u , Eve Φ , P u down , P u up , k u = k = 1 K B Eve k u log 2 1 + SINR u , Eve ,
where SINR u , Eve can be expressed as
SINR u , Eve = P u down h l , Eve H Φ H B , l 2 P u up h l , Eve H Φ h u , l 2 + P u up h u , Eve 2 + σ Eve 2 .
For notational simplicity, we define Ψ u as the power distribution coefficient of the u-th legitimate vehicle user. Since P u max = P u down + P u up , we have P u down = Ψ u P u max and P u up = 1 Ψ u P u max . According to (3) and (5), in LAP-based IRS symbiotic VNets, the secure channel capacity R u sec of the u-th legitimate vehicle user is
R u sec Φ , Ψ u , k u = R B , u Φ , Ψ u , k u R u , Eve Φ , Ψ u , k u + ,
where · + represents max · , 0 .
Therefore, the total secure channel capacity R tot sec Φ , Ψ , K can be expressed as
R tot sec Φ , Ψ , K = u = 1 U R u sec Φ , Ψ u , k u ,
where Ψ = Ψ u u U .
By optimizing the power distribution coefficient Ψ , phase shift Φ , and channel allocation policy K , we aim to maximize the total secure channel capacity R tot sec Φ , Ψ , K . The total secure channel capacity maximization problem can be mathematically formulated as
P 1 : max Φ , Ψ , K R tot sec Φ , Ψ , K
s . t . 0 < Ψ u 1 , u ,
u = 1 U P u max = P tot ,
Φ = diag e j X g , g ,
e j X g = 1 , X g 0 , 2 π , g ,
k u 0 , 1 , k = 1 K k u = 1 , u = 1 U k u 1 , k , u ,
where P tot is the total power of the system.
The main notations are summarized in Table 2.
In P1, (9b) and (9c) together limit the transmitted power of the RBS and legitimate vehicle users; (9d) and (9e) constrain the IRS phase shift; (9f) defines the channel allocation mode of multiple legitimate vehicle users. Since e j X g = 1 and k u 0 , 1 , P1 is a mixed-integer and non-convex program. It is hard to obtain a global optimal solution for P1. Therefore, in Section 3, we propose an iterative algorithm, where Ψ , Φ , and K are solved in turn.

3. Total Secure Channel Capacity Maximization Scheme

3.1. Phase Shift Optimization

In this stage, given Ψ and K , the phase shift optimization problem P2 is given by
P 2 : max Φ R tot sec Φ = u = 1 U R u sec Φ
s . t . Φ = diag e j X g , g ,
e j X g = 1 , X g 0 , 2 π , g .
Next, an intermediate variable X is introduced, where X = e j X 1 , , e j X G H . We have Φ = diag X H . Let A l , u = diag h l , u H and B l , Eve = diag h l , Eve H . Based on the property of matrix transformation (i.e., a H Φ b = X H diag a H b ), SINR u sec X can be recast as
SINR u sec X = X H w 1 X X H w 2 + w 3 + w 4 X × X H w 5 + w 6 X ,
where R u sec Φ = log 2 1 + SINR u sec X , and I G is the unit matrix. In addition, we have
w 1 = 1 G I G + Ψ u P u max A l , u H B , l H B , l H A l , u H σ u 2 ,
w 2 = Ψ u P u max B l , Eve H B , l H B , l H B l , Eve H ,
w 3 = 1 Ψ u P u max B l , Eve h l , u h l , u H B l , Eve H ,
w 4 = 1 Ψ u P u max h u , Eve 2 + σ Eve 2 G I G ,
w 5 = 1 Ψ u P u max B l , Eve h l , u h l , u H B l , Eve H ,
and
w 6 = 1 Ψ u P u max h u , Eve 2 + σ Eve 2 G I G .
To tackle P2, we further introduce three intermediate variables ( α , β , and χ ), which can be respectively expressed as
α = 1 G I G + Ψ u P u max A l , u H B , l H B , l H A l , u H σ u 2 ,
β = B l , Eve H B , l H B , l H B l , Eve H ,
and
χ = 1 Ψ u P u max B l , Eve h l , u h l , u H B l , Eve H + 1 Ψ u P u max h u , Eve 2 + σ Eve 2 G 1 I G .
Then, we simplify (11), and SINR u sec X can be rewritten as
SINR u sec X = tr α X X H tr β X X H tr χ X X H ,
where tr · is the trace of matrix.
To satisfy (10b) and (10c), we have
rank X X H = 1 , X X H g , g = 1 , g G .
Afterward, a slack variable is introduced. By using , P2 can be rewritten as
P 3 : min X
s . t . e log 2 tr χ X X H log 2 tr β X X H log 2 tr α X X H 0 ,
tr α X X H e log 2 tr α X X H ,
tr β X X H e log 2 tr β X X H ,
tr χ X X H e log 2 tr χ X X H ,
rank X X H = 1 ,
X X H g , g = 1 , g .
By using the sequential convex approximation (SCA) method, we take the first-order Taylor expansion of (23e), which can be expressed as
e log 2 tr χ X X H Δ + e log 2 tr χ X X H Δ ln e Δ e log 2 tr χ X X H tr χ X X H e log 2 tr χ X X H Δ 1 + Δ ,
where Δ is a minuscule negative value. Therefore, log 2 tr χ X X H Δ can be considered an approximation of log 2 tr χ X X H .
According to (24), we adopt the semi-definite relaxation (SDR) method to relax (23f). Under this condition, P3 can be relaxed as
P 4 : min X
s . t . ( 23 b ) ( 23 d ) , ( 23 g )
tr χ X X H e log 2 tr χ X X H Δ 1 + Δ .
Obviously, P4 is a convex optimization problem, which can be solved by the convex problem solver. However, since the SDR method is used to relax (23f), the obtained phase shift cannot always satisfy rank X X H = 1  [27]. Therefore, the Gaussian random process is employed to acquire the approximate solution, which satisfies rank-one, i.e., rank X X H = 1 .

3.2. Power Distribution Coefficient Optimization

In this stage, since it is assumed that Φ and K have been determined, the power distribution problem can be expressed as
P 5 : max Ψ R tot sec Ψ = u = 1 U R u sec Ψ u
s . t . 0 < Ψ u 1 , u ,
u = 1 U P u max = P tot .
In P5, SINR u sec Ψ u can be rewritten as
SINR u sec Ψ u = f 1 f 2 P u max f 3 f 4 + σ Eve 2 ,
where R u sec Ψ u = log 2 1 + SINR u sec Ψ u . In addition, we can obtain
f 1 = 1 + Ψ u P u max H B , l H Φ H h l , u h l , u H Φ H B , l σ u 2 ,
f 2 = 1 Ψ u P u max h l , Eve H Φ h l , u 2 + P u max h u , Eve 2 + σ Eve 2 ,
f 3 = h l , Eve H Φ h l , u 2 + h u , Eve 2 ,
and
f 4 = Ψ u h l , Eve H Φ h l , u 2 + h u , Eve 2 H B , l H Φ H h l , Eve h l , Eve H Φ H B , l .
Lemma 1.
The objective function SINR u sec Ψ u is a convex function.
Proof of Lemma 1.
The first-order derivative of SINR u sec Ψ u with respect to Ψ u is derived as
SINR u sec Ψ u Ψ u = Ψ u 2 × y 1 y 2 2 H B , l H Φ H h l , u h l , u H Φ H B , l P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 + σ Eve 2 σ u 2 P u max 2 h l , Eve H Φ h l , u 2 + h u , Eve 2 1 Ψ u 1 + P u max H B , l H Φ H h l , u h l , u H Φ H B , l σ u 2 P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 + σ Eve 2 2 P u max H B , l H Φ H h l , Eve h l , Eve H Φ H B , l P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 + σ Eve 2 ,
where
y 1 = P u max 3 H B , l H Φ H h l , u h l , u H Φ H B , l σ u 2 h l , Eve H Φ h l , u 2 + h u , Eve 2 2 ,
and
y 2 = P u max 3 H B , l H Φ H h l , u h l , u H Φ H B , l h l , Eve H Φ h l , u 2 + h u , Eve 2 σ u 2 H B , l H Φ H h l , Eve h l , Eve H Φ H B , l 1 .
The second-order derivative of SINR u sec Ψ u with respect to Ψ u is derived as
2 SINR u sec Ψ u Ψ u 2 = 2 g 1 g 2 Ψ u g 3 + g 4 3 ,
where
g 1 = P u max H B , l H Φ H h l , Eve h l , Eve H Φ H B , l × P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 + σ Eve 2 ,
g 2 = P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 P u max H B , l H Φ H h l , Eve h l , Eve H Φ H B , l P u max H B , l H Φ H h l , u h l , u H Φ H B , l σ u 2 P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 + σ Eve 2 1 ,
g 3 = P u max H B , l H Φ H h l , Eve h l , Eve H Φ H B , l P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 ,
and
g 4 = P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 + σ Eve 2 .
We can obtain g 1 > 0 , g 2 > 0 , and Ψ u g 3 + g 4 > 0 . Therefore, we have 2 g 1 g 2 Ψ u g 3 + g 4 3 < 0 , i.e., 2 SINR u sec Ψ u Ψ u 2 < 0 . In this case, the objective function R u sec Ψ u can be regarded as a convex function, thus proving Lemma 1.    □
According to Lemma 1, when 2 SINR u sec Ψ u Ψ u 2 = 0 , we can obtain the maximum of R u sec Ψ u . As can be seen from (32), 2 SINR u sec Ψ u Ψ u 2 is a quadratic function with respect to Ψ u . Therefore, Ψ u is derived as
Ψ u = g 4 g 3 ± g 1 g 2 g 5 g 3 g 5 ,
where
g 5 = P u max 2 H B , l H Φ H h l , u h l , u H Φ H B , l σ u 2 × h l , Eve H Φ h l , u 2 + h u , Eve 2 .
However, for Ψ u = g 4 g 3 + g 1 g 2 g 5 g 3 g 5 , we have
Ψ u = g 4 g 3 + g 1 g 2 g 5 g 3 g 5 g 4 g 3 = P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 + σ Eve 2 P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 H B , l H Φ H h l , Eve h l , Eve H Φ H B , l P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 + σ Eve 2 P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 = 1 + σ Eve 2 P u max h l , Eve H Φ h l , u 2 + h u , Eve 2 > 1 .
According to (42), we know that Ψ u = g 4 g 3 + g 1 g 2 g 5 g 3 g 5 cannot satisfy (26b), i.e., 0 < Ψ u 1 . Under this condition, the optimal power distribution coefficient Ψ u is
Ψ u g 4 g 3 + g 1 g 2 g 5 g 3 g 5 , 0 < Ψ u 1 , 1 , else .

3.3. Channel Allocation

Similarly, we assume that Ψ and Φ have been given in advance. The channel allocation problem takes the form
P 6 : max K R tot sec K = u = 1 U R u sec k u
s . t . k u 0 , 1 , k = 1 K k u = 1 , u = 1 U k u 1 , k , u .
As discussed in [23], P6 turns out to be a maximum weight bipartite matching (MWBM) problem. In polynomial time, the MWBM problem can be solved by the Hungarian algorithm. Based on above analysis, we can obtain the optimal channel allocation policy by using Algorithm 1.
Algorithm 1 Optimal channel allocation algorithm for P6
1:
for  k = 1 : K  do
2:
   for  u = 1 : U  do
3:
     According to the SCA and SDR methods, as well as Gaussian random process, we can obtain the optimal phase shift Φ .
4:
     According to (43), we can acquire the optimal power distribution coefficient Ψ .
5:
     We substitute Φ and Ψ into (7) to obtain  R u sec k u .
6:
   end for
7:
end for
8:
The Hungarian algorithm is adopted to solve P6.
9:
Output the optimal channel allocation policy K .

3.4. Overall Algorithmic Framework

In this paper, we design a total secure channel capacity maximization scheme for LAP and IRS enhanced transmissions, where the phase shift Φ , power distribution coefficient Ψ , and channel allocation K are optimized. Figure 2 shows the overall algorithmic framework, where Φ , Ψ , and K are solved iteratively. Specifically, by using the SCA and SDR methods, we can solve the formulated phase shift optimization problem P2, based on which the optimal phase shift Φ satisfying the rank-one constraint can be obtained by adopting the Gaussian random process. Next, according to (43), we can obtain the closed-form expression of optimal power distribution coefficient Ψ . Then, Algorithm 1 employs the Hungarian algorithm to acquire K . Finally, the above processes are repeated until satisfying the termination condition.
The complexity of the total secure channel capacity maximization scheme is mainly composed of three parts: (1) phase shift optimization; (2) power distribution coefficient optimization; (3) channel allocation. For the first part, since the SCA and SDR methods are used, the complexity of this part is O G 3.5 . Moreover, for the second part, we can derive the closed-form of the optimal power distribution coefficient; thus, the complexity of this part is O 1 . Furthermore, for the third part, the complexity of the channel allocation policy using the Hungarian algorithm is O U + K 3 . To summarize, the total computational complexity of solving P1 is O I tot G 3.5 + O I tot + O I tot U + K 3 , where I tot is the total number of iterations.
Discussion (Convergence Analysis): In this paper, the total secure channel capacity is maximized by iterative optimization. Therefore, the convergence needs to be analyzed. First, we present a simple scenario, which consists of an RBS, a fixed LAP equipped with IRS, a legitimate vehicle user, and an eavesdropper. In this case, K can be obtained by using the enumeration method. As shown in Figure 3, for a given K , we iteratively optimize Φ and Ψ based on the coordinated polling method. The objective function value (i.e., the total secure channel capacity) is improved partly after each iteration. Since the objective function value of P1 is bounded, our designed iterative algorithm can always converge to the optimal value or some certain values after finite iterations.

4. Performance Evaluation

In this section, simulation experiments are conducted to evaluate the performance of the proposed total secure channel capacity maximization scheme. Specifically, the comparison schemes are as follows. (a) Scheme 1 (LAP-PLS-CPO) [23]: This work uses the LAP to relay signals of the RBS and the PLS technique to ensure information security. In addition, the channel and power are optimized. (b) Scheme 2 (LAP-SPHO) [2]: This work adopts the LAP-enabled relay method to improve the data rate, based on which the spectrum, power, and LAP height are optimized. (c) Scheme 3 (LAP-RIS-CPO): In this scheme, Φ is initialized by random value, and then, K and Ψ are optimized by the Algorithm 1 and (43), respectively.
In our simulations, we consider a scenario, where U = 10 , 55 , P u max = 33 dBm, N = 32 , K = 15 , 60 , G = 64 , and σ u 2 = σ Eve 2 = 174 dBm/Hz. In order to analyze conveniently, a Cartesian coordinate is established in Figure 1, where the RBS is located at 0 , 0 , 0 m, the fixed LAP equipped with IRS is located at 800 , 0 , 200 m, the eavesdropper is located at 650 , 300 , 0 m, and the cell radius of RBS is 1000 m. Moreover, the A2G channel model is 32.44 + 20 lg d km + 20 lg f c MHz . We model the fast fading channels as independent and identically distributed (i.i.d.) Rayleigh fading channels. As shown in Figure 1, the fast fading channels can be regarded as Rayleigh fading channels, taking into account the rich reflections and diffractions from surface-based obstacles.
Figure 4 illustrates the comparison of the total secure channel capacity with respect to the number of legitimate vehicle users under the different schemes. It is obvious that our proposed total secure channel capacity maximization scheme outperforms other comparison schemes. The reason is that the LAP and IRS enhanced transmissions are adopted in the considered scenario, based on which the phase shift, power distribution coefficient, and channel allocation are optimized. Compared to Scheme 1 (LAP-PLS-CPO), Scheme 2 (LAP-SPHO), and Scheme 3 (LAP-RIS-CPO), the total secure channel capacity can be increased by 67.56%, 141.3%, and 31.94%, respectively. Especially, for Scheme 2 (LAP-SPHO), since the PLS technique is not adopted, security cannot be satisfied, resulting in the lowest total secure channel capacity. In addition, even when the number of legitimate vehicle users is large, our designed scheme can still achieve relatively high information security rates.
Figure 5 shows the comparison of the total secure channel capacity with respect to the maximum transmitted power under the different schemes. We can observe that the total secure channel capacity increases monotonously with the increase in the maximum transmitted power P u max . In addition, the larger the P u max , the faster the growth of the total secure channel capacity. This is because, in this case, more power is allocated to AN to jam the eavesdropper, which can protect the security of 6G-oriented vehicular IoT services.
Next, we investigate the impact of the number of reflection elements on the performance of the proposed scheme. In Figure 6, we plot the comparison of the total secure channel capacity under different numbers of reflection elements. It is observed that the total secure channel capacity increases with the number of reflection elements. This phenomenon is more obvious when the number of legitimate vehicle users is small. This is because more reflection elements can better improve the channel quality. However, as discussed in Section 3.4, since the complexity of solving P2 is O G 3.5 , adding reflection elements will significantly increase the algorithm complexity. Therefore, there is a tradeoff between the total secure channel capacity and the algorithm complexity in terms of the number of reflection elements. The total secure channel capacity maximization by jointly considering the above two factors is a meaningful problem for future research.
As shown in Figure 7, we investigate the impact of the LAP’s altitude on the total secure channel capacity. We can find that with the increase in the LAP’s altitude, the total secure channel capacity decreases. The reason is that increasing the LAP’s altitude will lead to an increase in the path loss, thereby reducing the total secure channel capacity. However, there is a minimum altitude limit for using this A2G channel model. For altitudes below 100 m, we need to change the large-scale fading model.
As shown in Figure 8, we investigate the impact of the distance on the total secure channel capacity, where the LAP’s X-axis positions are changed. It can be observed that the total secure channel capacity increases first and then decreases. Similarly, this is because the LAP’s position will affect the path loss, thereby influencing the total secure channel capacity. Therefore, optimizing the LAP’s deployment is an interesting topic that deserves further study.

5. Conclusions

In order to improve the QoS of 6G-oriented vehicular IoT services, this paper used LAP equipped with IRS to overcome blockages, based on which the secure transmission problem was investigated. First, we introduced AN to enhance the security performance, which could prevent the eavesdropper from receiving privacy information. Next, by jointly considering the phase shift and power distribution coefficient optimization as well as channel allocation, we formulated a total secure channel capacity maximization problem for the LAP-based IRS symbiotic VNets. Then, to deal with this intractable problem, we devised an iterative algorithm, based on which the convergence and the complexity were analyzed. Finally, numerical results demonstrated that the proposed scheme significantly outperformed the comparison schemes in terms of the total secure channel capacity. Furthermore, the joint optimization of the LAP location and network resources with imperfect CSI to maximize the total secure channel capacity is worth investigating and is challenging, which will be our future work.

Author Contributions

L.M.: Conceptualization, Methodology, Software, Writing—Original Draft Preparation, Visualization. J.L.: Conceptualization, Resources, Methodology, Software, Writing—Review. Y.H.: Conceptualization, Resources, Writing—Review and Editing, Supervision, Project Administration, Funding Acquisition. Q.S.: Conceptualization, Resources, Writing—Review. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China, under grant 62206221, and in part by the Fundamental Research Funds for the Central Universities.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest for publishing in this journal.

References

  1. Wang, C.; Li, Z.; Zhang, H.; Ng, D.W.K.; Al-Dhahir, N. Achieving covertness and security in broadcast channels with finite blocklength. IEEE Trans. Wireless Commun. 2022, 21, 7624–7640. [Google Scholar]
  2. Zhai, D.; Li, H.; Tang, X.; Zhang, R.; Ding, Z.; Yu, F.R. Height optimization and resource allocation for NOMA enhanced UAV-aided relay networks. IEEE Trans. Commun. 2021, 69, 962–975. [Google Scholar]
  3. Wang, C.; Li, Z.; Shi, J.; Ng, D.W.K. Intelligent reflecting surface-assisted multi-antenna covert communications: Joint active and passive beamforming optimization. IEEE Trans. Commun. 2021, 69, 3984–4000. [Google Scholar]
  4. Fawaz, W. Effect of non-cooperative vehicles on path connectivity in vehicular networks: A theoretical analysis and UAV-based remedy. Veh. Commun. 2018, 11, 12–19. [Google Scholar] [CrossRef]
  5. Fotouhi, A.; Qiang, H.; Ding, M.; Hasson, M.; Giordano, L.G.; Garcia-Rodriguez, A.; Yuan, J. Survey on UAV cellular communications: Practical aspects standardization advancements regulation and security challenges. IEEE Commun. Surveys Tuts. 2019, 21, 3417–3442. [Google Scholar]
  6. Schweiger, K.; Preis, L. Urban air mobility: Systematic review of scientific publications and regulations for vertiport design and operation. Drones 2022, 6, 179. [Google Scholar]
  7. Alsamhi, S.H.; Shvetsov, A.V.; Kumar, S.; Hassan, J.; Alhartomi, M.A.; Shvetsova, S.V.; Sahal, R.; Hawbani, A. Computing in the sky: A survey on intelligent ubiquitous computing for UAV-assisted 6G networks and industry 4.0/5.0. Drones 2022, 6, 177. [Google Scholar]
  8. Cao, Y.; Lv, T.; Ni, W. Intelligent reflecting surface aided multi-user mmWave communications for coverage enhancement. In Proceedings of the 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, London, UK, 31 August–3 September 2020; pp. 1–6. [Google Scholar]
  9. Pan, Q.; Wu, J.; Nebhen, J.; Bashir, A.K.; Su, Y.; Li, J. Artificial intelligence-based energy efficient communication system for intelligent reflecting surface-driven VANETs. IEEE Trans. Intell. Transp. Syst. 2022, 23, 19714–19726. [Google Scholar]
  10. Zhi, K.; Pan, C.; Ren, H.; Wang, K. Power scaling law analysis and phase shift optimization of RIS-aided massive MIMO systems with statistical CSI. IEEE Trans. Commun. 2022, 70, 3558–3574. [Google Scholar]
  11. You, C.; Kang, Z.; Zeng, Y.; Zhang, R. Enabling smart reflection in integrated air-ground wireless network: IRS meets UAV. IEEE Wireless Commun. 2021, 28, 138–144. [Google Scholar] [CrossRef]
  12. Shafique, T.; Tabassum, H.; Hossain, E. Optimization of wireless relaying with flexible UAV-borne reflecting surfaces. IEEE Trans. Commun. 2021, 69, 309–325. [Google Scholar] [CrossRef]
  13. Samir, M.; Elhattab, M.; Assi, C.; Sharafeddine, S.; Ghrayeb, A. Optimizing age of information through aerial reconfigurable intelligent surfaces: A deep reinforcement learning approach. IEEE Trans. Veh. Technol. 2021, 70, 3978–3983. [Google Scholar] [CrossRef]
  14. Iacovelli, G.; Coluccia, A.; Grieco, L.A. Channel gain lower bound for IRS-assisted UAV-aided communications. IEEE Commun. Lett. 2021, 25, 3805–3809. [Google Scholar] [CrossRef]
  15. Li, Y.; Zhang, H.; Long, K.; Nallanathan, A. Exploring sum rate maximization in UAV-based multi-IRS networks: IRS association, UAV altitude, and phase shift design. IEEE Trans. Commun. 2022, 70, 7764–7774. [Google Scholar] [CrossRef]
  16. Al-Jarrah, M.; Al-Dweik, A.; Alsusa, E.; Iraqi, Y.; Alouini, M.-S. On the performance of IRS-assisted multi-layer UAV communications with imperfect phase compensation. IEEE Trans. Commun. 2021, 69, 8551–8568. [Google Scholar] [CrossRef]
  17. Su, Y.; Pang, X.; Chen, S.; Jiang, X.; Zhao, N.; Yu, F.R. Spectrum and energy efficiency optimization in IRS-assisted UAV networks. IEEE Trans. Commun. 2022, 70, 6489–6502. [Google Scholar] [CrossRef]
  18. Zhang, X.; Wang, J.; Poor, H.V. Joint optimization of IRS and UAV-trajectory: For supporting statistical delay and error-rate bounded QoS over mURLLC-driven 6G mobile wireless networks using FBC. IEEE Veh. Technol. Mag. 2022, 17, 55–63. [Google Scholar] [CrossRef]
  19. Ji, Z.; Yang, W.; Guan, X.; Zhao, X.; Li, G.; Wu, Q. Trajectory and transmit power optimization for IRS-assisted UAV communication under malicious jamming. IEEE Trans. Veh. Technol. 2022, 71, 11262–11266. [Google Scholar] [CrossRef]
  20. Wang, D.; He, T.; Zhou, F.; Cheng, J.; Zhang, R.; Wu, Q. Outage-driven link selection for secure buffer-aided networks. Sci. China Inf. Sci. 2022, 65, 182303. [Google Scholar] [CrossRef]
  21. Sun, G.; Tao, X.; Li, N.; Xu, J. Intelligent reflecting surface and UAV assisted secrecy communication in millimeter-wave networks. IEEE Trans. Veh. Technol. 2022, 70, 11949–11961. [Google Scholar] [CrossRef]
  22. Wang, D.; Wu, M.; He, Y.; Pang, L.; Xu, Q.; Zhang, R. An HAP and UAVs collaboration framework for uplink secure rate maximization in NOMA-enabled IoT networks. Remote Sens. 2022, 14, 4501. [Google Scholar] [CrossRef]
  23. He, Y.; Nie, L.; Guo, T.; Kaur, K.; Hassan, M.M.; Yu, K. A NOMA-enabled framework for relay deployment and network optimization in double-layer airborne access VANETs. IEEE Trans. Intell. Transp. Syst. 2022, 23, 22452–22466. [Google Scholar] [CrossRef]
  24. Ding, X.; Song, T.; Zou, Y.; Chen, X.; Hanzo, L. Security-reliability tradeoff analysis of artificial noise aided two-way opportunistic relay selection. IEEE Trans. Veh. Technol. 2017, 66, 3930–3941. [Google Scholar] [CrossRef] [Green Version]
  25. Xu, S.; Liu, J.; Cao, Y. Intelligent reflecting surface empowered physical-layer security: Signal cancellation or jamming? IEEE Internet Things J. 2022, 9, 1265–1275. [Google Scholar] [CrossRef]
  26. He, Y.; Wang, D.; Huang, F.; Zhang, R.; Gu, X.; Pan, J. A V2I and V2V collaboration framework to support emergency communications in ABS-aided Internet of Vehicles. IEEE Trans. Green Commun. Netw. 2023; Early access. [Google Scholar] [CrossRef]
  27. Luo, Z.; Ma, W.; So, A.M.; Ye, Y.; Zhang, S. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
Figure 1. LAP-based IRS symbiotic VNets.
Figure 1. LAP-based IRS symbiotic VNets.
Drones 07 00414 g001
Figure 2. Overall algorithmic framework.
Figure 2. Overall algorithmic framework.
Drones 07 00414 g002
Figure 3. Coordinate polling method.
Figure 3. Coordinate polling method.
Drones 07 00414 g003
Figure 4. The total secure channel capacity versus the number of legitimate vehicle users.
Figure 4. The total secure channel capacity versus the number of legitimate vehicle users.
Drones 07 00414 g004
Figure 5. The total secure channel capacity versus the maximum transmitted power.
Figure 5. The total secure channel capacity versus the maximum transmitted power.
Drones 07 00414 g005
Figure 6. Comparison of the total secure channel capacity under different numbers of reflection elements.
Figure 6. Comparison of the total secure channel capacity under different numbers of reflection elements.
Drones 07 00414 g006
Figure 7. Comparison of the total secure channel capacity under different LAP altitudes.
Figure 7. Comparison of the total secure channel capacity under different LAP altitudes.
Drones 07 00414 g007
Figure 8. Comparison of the total secure channel capacity under different distances.
Figure 8. Comparison of the total secure channel capacity under different distances.
Drones 07 00414 g008
Table 1. Summary of key contributions and limitations of existing works on UAV-aided RIS-assisted IoT networks.
Table 1. Summary of key contributions and limitations of existing works on UAV-aided RIS-assisted IoT networks.
ReferenceKey ContributionsLimitation
[14]The channel gain lower bound for LAP and IRS collaborative communications was derived.These works make an implicit assumption
that LAP-based IRS symbiotic vehicular
networks (VNets) are secure. In LAP-based
IRS symbiotic VNets, the privacy
information is susceptible to eavesdropping
due to the open nature of A2G channels.
[15]The sum rate maximization problem of LAP-aided IRS networks was investigated, where the phase shift and LAP altitude were optimized.
[16]The IRS-assisted multi-layer aerial architecture was proposed.
[17,18,19,20]By considering the beamforming, resource allocation, and energy efficiency, the channel capacity was improved.
Table 2. Definition of parameters.
Table 2. Definition of parameters.
ParameterDefinition
UNumber of legitimate vehicle users
GNumber of reflection elements
NNumber of antennas
KNumber of channels
P u max Total power
P u down Transmitted power of the RBS
P u up Transmitted power of AN
y u Received signal of the u-th legitimate vehicle user
h l , u H Channel from IRS to the u-th legitimate vehicle user
Φ Phase shift matrix
H B , l Channel from the RBS to IRS
s u Transmitted signal from the RBS for the u-th legitimate vehicle user
h l , Eve H Channel from IRS to the eavesdropper
a u AN signal emitted by the u-th legitimate vehicle user
h u , Eve Channel from the u-th legitimate vehicle user to the eavesdropper
η Eve Noise received by the eavesdropper
R B , u Information rate of the u-th legitimate vehicle user
B u Channel bandwidth of the u-th legitimate vehicle user
R u , Eve Information rate of the eavesdropper
Ψ u Power distribution coefficient of the u-th legitimate vehicle user
R u sec Secure channel capacity of the u-th legitimate vehicle user
R tot sec Total secure channel capacity
P tot Total power of the system
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Min, L.; Li, J.; He, Y.; Si, Q. LAP and IRS Enhanced Secure Transmissions for 6G-Oriented Vehicular IoT Services. Drones 2023, 7, 414. https://doi.org/10.3390/drones7070414

AMA Style

Min L, Li J, He Y, Si Q. LAP and IRS Enhanced Secure Transmissions for 6G-Oriented Vehicular IoT Services. Drones. 2023; 7(7):414. https://doi.org/10.3390/drones7070414

Chicago/Turabian Style

Min, Lingtong, Jiawei Li, Yixin He, and Qin Si. 2023. "LAP and IRS Enhanced Secure Transmissions for 6G-Oriented Vehicular IoT Services" Drones 7, no. 7: 414. https://doi.org/10.3390/drones7070414

Article Metrics

Back to TopTop