Secrecy Energy Efficiency Maximization in RIS-Aided Wireless Networks with Statistical CSI

Robert Kuku Fotock,Agbotiname Lucky Imoize,Alessio Zappone,Marco Di Renzo,Roberto Garello
2024-08-17
Abstract:This work studies the problem of secrecy energy efficiency maximization in multi-user wireless networks aided by reconfigurable intelligent surfaces, in which an eavesdropper overhears the uplink communication. A provably convergent optimization algorithm is proposed which optimizes the user's transmit power, metasurface reflection coefficients, and base station receive filters. The complexity of the proposed method is analyzed and numerical results are provided to show the performance of the proposed optimization method.
Signal Processing,Optimization and Control
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to maximize the secrecy energy efficiency (SEE) in the uplink communication assisted by reconfigurable intelligent surface (RIS) in multi - user wireless networks in the presence of eavesdroppers. Specifically, the research aims to optimize the following aspects: 1. **Transmit power of users**: The transmit power of each user needs to be optimized to ensure that energy consumption is minimized while meeting communication requirements. 2. **RIS reflection coefficients**: The reflection coefficients of RIS determine how signals are reflected and enhanced, and these coefficients need to be optimized to improve SEE. 3. **Base station receive filter**: The receive filter of the legitimate base station also needs to be optimized to better separate useful signals and interference signals. ### Problem background - **RIS technology**: RIS is an emerging technology that can improve the performance of wireless communication systems by adjusting the reflection characteristics of its surface. It has great application potential in 6G networks and can provide higher rates and lower energy consumption. - **Physical - layer security**: In order to ensure the security of communication and prevent information from being obtained by eavesdroppers, physical - layer security mechanisms need to be considered. - **Statistical CSI**: Since it is difficult to obtain the channel state information (CSI) of eavesdroppers, it is assumed that only statistical CSI is available, which poses a challenge to optimization algorithms. ### Specific problem description The research object of this paper is a network that includes multiple single - antenna mobile transmitters (Alice) and a base station (Bob) equipped with multiple antennas, and there is also a single - antenna eavesdropper (Eve). Through RIS - assisted communication, the research objectives are: - Maximize the secrecy rate of the system, that is, the difference between the transmission rate of the legitimate communication link and the transmission rate of the eavesdropping link, under a given total power consumption. - Consider hardware limitations in practical applications, such as RIS reflection coefficient constraints and users' maximum transmit power limitations. ### Mathematical model The objective function of the system is: \[ \text{SEE}=\frac{\sum_{k = 1}^{K}\log_2(1+\text{SINR}_{k,B})-\mathbb{E}_\delta[\log_2(1+\text{SINR}_{k,E})]}{P_{\text{tot}}} \] where: - \( \text{SINR}_{k,B} \) and \( \text{SINR}_{k,E} \) respectively represent the signal - to - interference - plus - noise ratio (SINR) of the \( k \) - th user at the legitimate receiving end and the eavesdropping end. - \( P_{\text{tot}} \) represents the total power consumption of the entire network, including the transmit power of users, the energy consumption of RIS, and the static power consumption of the system. ### Optimization problem The optimization problem can be expressed as: \[ \max_{\gamma, p, C_B}\frac{\sum_{k = 1}^{K}\log_2(1+\text{SINR}_{k,B})-\mathbb{E}_\delta[\log_2(1+\text{SINR}_{k,E})]}{P_{\text{tot}}} \] The constraint conditions include: \[ \begin{aligned} & \text{tr}(R)\leq \text{tr}(R\gamma\gamma^H)\leq P_{R,\max}+\text{tr}(R), \\ & 0\leq p_k\leq P_{\max,k}, \quad \for \end{aligned} \]