Preprint
Article

Physical Layer Security Performance Analysis of RIS-aided Cognitive Radio Networks

Altmetrics

Downloads

173

Views

46

Comments

0

A peer-reviewed article of this preprint also exists.

Submitted:

20 April 2023

Posted:

21 April 2023

You are already at the latest version

Alerts
Abstract
Abstract- Cognitive radio (CR) play an important role in improving spectral efficiency (SE) of wireless communication, meanwhile, intelligent reflecting surface (IRS) is an effective technology to improve the secrecy performance of wireless communication system by adjusting the phase shift and amplitude of channel. Thus, we consider an IRS-aided multiple-input single-output (MISO) CR systems to enhance secrecy rate, which is consists of a single eavesdropping link, a primary network containing the primary receiver (PR), and secondary network including secondary receiver (SR) and the SR transmitter (SR-TX). Specifically, we minimize the transmit power of SR subject to secrecy capacity constraint and interference temperature (IT) constraint on PR, by jointly optimizing the beamforming vector and artificial noise (AN) constraints matrix at SR-TX as well as the phase shift matrix of IRS. Numerical results show that the different values of transmit antennas at the SR-TX and the number of IRS elements can significantly decrease the transmit power under the condition of ensuring secure communication.
Keywords: 
Subject: Engineering  -   Telecommunications

1. Introduction

Recently, physical layer security (PLS) has been considered to guarantee the information is not eavesdropped. More specifically, beamforming vector is designed at the transmitter of multiple antennas to improve the PLS [1]. Another considering technology was to transmit artificial noise (AN) from the transmitter to enhance the secrecy rate. By analyzing and optimizing the achievable secrecy capacity of the system, the authors in [2] show that the AN can improve the secrecy performance, by designing it to interference the eavesdropping channel, while AN vector into the null space of the legitimate channel. Jointly optimization of beamforming vector and AN vector to minimize the transmit power was proposed in [3] and [4], and the authors also considered the imperfect channel state information (CSI) of the eavesdropper [4]. In addition, it has been designed for various wireless communication at present. The author in [5] introduces AN vector to improve the security performance of cognitive radio (CR) communication scenario.
Moreover, the number of devices serving wireless communication has increased dramatically, the demand for spectral efficiency has also increased. Therefore, cognitive radio networks (CRNs) have been studied widely due to the ability to improve spectral efficiency [6]. Besides, the intelligent reflecting surface (IRS) has attracted wide attention recently since it can actively adjust the phase shifts and amplitude of the channel [7], applying IRS to wireless networks can enhance spectral and energy efficiency. Therefore, many existing literature use RIS to assist secure wireless communication systems in different scenarios, such as the multiple-input signal-output (MISO) case [8], UAV communication [9], the millimeter wave communication [10], and CRNs system [11].
However, few authors have studied IRS-aided CR system until recently, except for a few influential papers that have been published in [12]- [13]. The authors in [12] investigate the IRS can reduce the transmission power of the secondary transmitter (ST). In [13], IRS assisted CR system has been proposed by establishing an optimization to maximize the secrecy rate of ST while exist a static eavesdropper, which the cooperative beamforming was considered, as well as to ensure the quality of service (QoS) of the primary receiver (PR).
In addition, the RIS has been exploited to assist secure communication by cooperate with other traditional security technologies include the AN [14], cooperative relaying [15] and simultaneous wireless information and power transfer SWIPT [16]. Inspired of CR system and the advantages of IRS, we consider the Physical layer security of IRS-aided CR system with AN as shown in Figure 1. Including a multiple-antennas secondary receiver (SR) transmitter (SR-TX), a signal antenna SR and primary receiver (PR). Moreover, there was a static signal antenna eavesdropper near the SR-TX. More specifically, we introduce AN at SR-TX to interfere with eavesdropper, and the problem of minimize the transmit power of SU was considered, by alternating optimizing the beamforming vector and AN and phase shift matrix of IRS, while subject to the security capacity constraint and the interference temperature constraint at PR and the secrecy rate constraint. In the processing of solving this problem. we use iterative algorithm (AO) base on a block coordinate descent (BCD) method [17] to deal with the non-convex problem, which transform object problem into a two subproblems, and the variables in two subproblems are alternatively optimized. In addition, the method of semidefinite relaxation (SDR) to solve the unit module constraint. A Gaussian randomization scheme in [18] is applied to recover the rank-1 variables until the algorithm converges.

2. System Model

As shown in Figure 1, consider an RIS-aided CR communication system including a multiple antennas SR-TX, a signal antenna SR and PR, an eavesdropper (Eve), and an RIS that is composed of N reflecting meta-surfaces.

2.1. Main Link

Let h s p M × 1 , h s s M × 1 , h s e M × 1 , h s r N × M represent the channels from the ST-RX to the PR, the SR, and the IRS, respectively. On the other hand, the channels from the IRS to the PR and the SR are given by h r p N × 1 and h r s N × 1 , respectively. the diagonal phase shift matrix of the IRS is denoted by Φ = d i a g ( f 1 , f 2 , f N ) [3], where f n = e j θ n , n = 1 , , N and θ n [ 0 , 2 π ) represent the phase shift of the signal transmission to each IRS elements.
The transmitted signal x s is expressed by
x s = w s + z
where w M × 1 is the beamforming vector, z M × 1 is the AN vector with z ~ C N ( 0 , Z _ 0 ) .
The received signal reflected by the IRS at the SR can be expressed as
y s = ( h s s T + h r s T Φ h s r ) x s + n s
where n s ~ C N ( 0 , σ s 2 ) is the complex additive white Gaussian noise (AWGN) at the SR-TX. Thus, the signal-to-interference-plus-noise ratio (SINR) at the SR can be written as
γ s = | h ˜ s w | 2 | h ˜ s z | 2 + σ s 2
where h ˜ s = h s s T + h r s T Φ h s r . Since the primary receiver transmitter (PT-RX) is not considered in our proposed model, PR will not only receive interference from the SR, but also the signal reflected by IRS when the ST-RX broadcasts the signal x s . Therefore, the interference signal at the PR can be expressed as
y p = ( h s p T + h r p T Φ h s r ) x s + n p
where n p ~ C N ( 0 , σ p 2 ) is the AWGN at the PR. Then, the interference power is given by
I p = | h ˜ p w | 2 + | h ˜ p z | 2
where h ˜ p = h s p T + h r p T Φ h s r .

2.2. Eavesdropping Link

Let h s e M × 1 denote the channels from the ST-RX to the Eve, while the transmitted signal from the RIS to the Eve is denoted by h r e N × 1 . The received signal reflected by the RIS at the eavesdropper can be expressed as
y e = ( h s e T + h r e T Φ h s r ) x s + n e
where n e ~ C N ( 0 , σ e 2 ) denote the AWGN at the Eve. Thus, SINR at the Eve can be written as
γ e = | h ˜ e w | 2 | h ˜ e z | 2 + σ e 2
where h ˜ e = h s e T + h r e T Φ h s r .

3. Problem Formulation

In this section, we minimize the transmit power at ST-RX, by jointly optimizing the beamforming vector w and AN vector z , as well as the reflecting phase θ of IRS. In other hand, the constraints are as follows.

3.1. Interference power constraint

Let ϕ p denote the upper bound of interference power at the PR. Then the constraint of interference power (IT) can be expressed as
| h ˜ p w | 2 + | h ˜ p z | 2 < ϕ p

3.2. Secrecy rate constraints

To ensure that the SR can correctly decode the transmit signal s from the ST-RX, we transform the SR’s achievable rate into the following SINR constraint
| h ˜ s w | 2 | h ˜ s z | 2 + σ s 2 γ ¯ s
where γ ¯ s represents the minimal required SINR at the SR.
Similarly, the eavesdropper cannot eavesdrop on useful information, thus the Eve’s SINR constraint can be given by
| h ˜ e w | 2 | h ˜ e z | 2 + σ e 2 γ ¯ e
where γ ¯ e denoted the upper bound of SINR of eavesdropping link to obtain the information from ST-RX.

3.3. Phase constraint

IRS has the advantage of adjusting the phase and amplitude of the channel [3]. However, in this paper, we assume that IRS reflects the signal without changing the amplitude of the signals, the constraint can be written as
| f i | = 1 , i = 1 , , N
Based on above constraints, the transmit power minimization problem is expressed as
( P 0 ) : min z , w , θ T r ( W + Z )
s . t . ( 8 ) , ( 9 ) , ( 10 ) , ( 11 )
Z _ 0
W _ 0
rank ( W ) = 1
where W = ww H satisfying (15) and (16), Z = zz H satisfying (14). To the best of our knowledge, it is hard to solve P0. Firstly, the constraint of unit modulus in (11) is not easy to converted into a tractable convex when we optimize θ . Secondly, the objective function (OF) is in a semi-closed form. Lastly, both the OF (11) and constraints (8) contain coupled optimization variables.

4. Proposed Solutions

In this section, proposed method is mainly divided into two steps to solve the P0. Firstly, the beamforming vector w and AN vector z at the ST-RX are jointly optimized when phase shift f i of IRS is given. And then, fixed w and z , optimize f i to minimize the transmit power. Specifically, two subproblems P0-A and P0-B of P0 can be written as follows
(1). P0-A: min z , w T r ( W + Z ) s.t. (8), (9), (10), (14), (15), (16)
(2). P0-B: min θ T r ( W + Z ) s.t. (8), (9), (10), (11)
Then, we continuously update the values of f i , w and z through AO of these two subproblem until the OF T r ( W + Z ) converges.

4.1. Optimization of W and Z

Dealing with the constraints (3), we denote
h r s T Φ h s r = f T d i a g ( h r s T ) h s r = f T G s h r p T Φ h s r = f T d i a g ( h r p T ) h s r = f T G p h r e T Φ h s r = f T d i a g ( h r e T ) h s r = f T G e
where f [ f 1 , , f N ] T , f n e j θ n , n 1 , , N . Then, we denote G ˜ s = [ G s ; h s s T ] , G ˜ p = [ G p ; h s p T ] , G ˜ e = [ G s ; h s e T ] , f ˜ = [ f ; 1 ] and letting F ˜ = f ˜ f ˜ H satisfying F ˜ _ 0 and r a n k ( F ˜ ) = 1 , we have
h ˜ s = h s s + h r s T Φ h s r = f ˜ T G ˜ s h ˜ p = h s p + h r p T Φ h s r = f ˜ T G ˜ p h ˜ e = h s e + h r e T Φ h s r = f ˜ T G ˜ e
Then, P0 has the same optimal solutions as following
( P 1 ) : min Z , W , F ˜ Tr ( W ) + Tr ( Z )
s . t . Z , W , F ˜ _ 0 , r a n k ( F ˜ ) = 1
Tr ( F ˜ G ˜ s W G ˜ s H ) Tr ( F ˜ G ˜ s Z G ˜ s H ) + σ s 2 > γ ¯ s
Tr ( F ˜ G ˜ e W G ˜ e H ) Tr ( F ˜ G ˜ e Z G ˜ e H ) + σ e 2 < γ ¯ e
Tr ( F ˜ G ˜ p W G ˜ p H ) + Tr ( F ˜ G ˜ p Z G ˜ p H ) < ϕ p
Both of problem P1 and all constraints become convex after processing. Fixing either { Z , W } or F ˜ , the subproblem is easier to solve by using the AO. When an initial value of F ˜ is given, problem P1 can be rewrite as problem P1a
( P 1 a ) : min Z , w Tr ( W ) + Tr ( Z )
s . t . Z , W _ 0
Tr ( Ψ s W ) Tr ( Ψ s Z ) + σ s 2 > γ ¯ s
Tr ( Ψ e W ) Tr ( Ψ e Z ) + σ e 2 < γ ¯ e
Tr ( Ψ p W ) + Tr ( Ψ p Z ) < ϕ p
where Ψ s = G ˜ s H F ˜ G ˜ s , Ψ p = G ˜ p H F ˜ G ˜ p , Ψ e = G ˜ e H F ˜ G ˜ e . Thus, we can use CVX tools to find the optimal solution of P1a [19]3. If the rank of the obtained W matrix is not 1, Gaussian randomization method can be used to convert the rank to 1, and then W can be obtained by eigenvalue decomposition.

4.2. Optimization of phase matrix F ˜

In the second step, we fix the variable { W , Z } , the subproblem of P0b is easier to handle. We first reformulate the constraint in (9) and (10), respectively. Specifically, it can be simplified as
h ˜ s H W h ˜ s h ˜ s H Z h ˜ s + σ s 2 γ ¯ s Tr ( [ W γ ¯ s Z ] h ˜ s h ˜ s H ) γ ¯ s σ s 2 Tr ( [ W γ ¯ s Z ] ( G ˜ s H f ˜ ) ( f ˜ H G ˜ s ) ) γ ¯ s σ s 2 Tr ( G ˜ s [ W γ ¯ s Z ] G ˜ s H F ˜ ) γ ¯ s σ s 2
h ˜ e H W h ˜ e h ˜ e H Z h ˜ e + σ e 2 γ ¯ e Tr ( [ W γ ¯ e Z ] h ˜ e h ˜ e H ) γ ¯ e σ e 2 Tr ( [ W γ ¯ e Z ] ( G ˜ e H f ˜ ) ( f ˜ H G ˜ e ) ) γ ¯ e σ e 2 Tr ( G ˜ e [ W γ ¯ e Z ] G ˜ e H F ˜ ) γ ¯ e σ e 2
Then, by introducing slack variables into the SINR constraint of SR in (29) and Eve in (30), which can be rewritten as following respectively
Tr ( G ˜ s [ W γ ¯ s Z ] G ˜ s H F ˜ ) γ ¯ s σ s 2 + δ 0 , δ 0 0
Tr ( G ˜ e [ W γ ¯ e Z ] G ˜ e H F ˜ ) γ ¯ e σ e 2 δ 1 , δ 1 0
Finally, the P0b is rewritten as
( P 2 ) : max f ˜ , δ δ 1
s . t . Tr ( G ˜ s [ W γ ¯ s Z ] G ˜ s H F ˜ ) γ ¯ s σ s 2 + δ 0
Tr ( G ˜ e [ W γ ¯ e Z ] G ˜ e H F ˜ ) + δ 1 γ ¯ e σ e 2
Tr ( Λ p F ˜ ) + Tr ( V p F ˜ ) < ϕ p
δ _ 0
| f ˜ n | = 1 , n = 1 , , N
where δ = [ δ 0 , δ 1 ] H , Λ p = G ˜ p W G ˜ p H , and V p = G ˜ p Z G ˜ p H . Therefore, we observed that the constraint of (38) in P3 is the unit modulus constraint. According to [4], we can use semidefinite programming (SDP) method to handle the constraint. Thus, P2 can be rewritten as
( P 2 a ) : max F , δ δ 1
s . t . ( 34 ) , ( 35 ) , ( 36 ) , ( 37 )
d i a g ( F ˜ ) = 1 N
F ˜ _ 0
rank ( F ˜ ) = 1
where the constraints (41), (42) and (43) replace the constraint (38). To the best of our knowledge, all the constraint of P2a is convex except the (43). We can use the semi-definite relaxation (SDR) method to handle constraint (43), but it is not guarantee that all the F ˜ matrices we obtain have rank 1, so that f ˜ n is failed to solved by using eigenvalue decomposition. To avoid this kind of situations, the most effective way is the Lemma 1 as follows.
Lemma 1: Any positive semidefinite matrix A satisfies the inequality [4]
| I + A | 1 + Tr ( A )
and the equality in (44) holds if and only if rank ( A ) 1 . Then, the constraint (43) can be recast as
( 43 ) | I + F ˜ | 1 + Tr ( F ˜ ) log det | I + F ˜ | log ( 1 + ( N + 1 ) )
where Tr ( F ˜ ) = N + 1 . By using the method of penalty-based, P2a is rewritten as
( P 2 b ) : max F , δ δ 1 + κ [ log ( 1 + ( N + 1 ) ) log det ( I + F ˜ ) ]
s . t . ( 40 ) , ( 41 ) , ( 42 )
where κ denote penalty factor, which is aim to penalize the case of rank ( F ˜ ) 1 . However, it is hard to solve because log det ( I + F ˜ ) is concave function about F ˜ , by utilizing the first-order Taylor to obtain the upper bound approximately
log det ( I + F ˜ ) ( log e ) T r { ( ( I + F ˜ ( n ) ) 1 ) * ( F ˜ - F ˜ ( n ) ) } + ( log e ) log det ( I + F ˜ ( n ) )
where e is the natural logarithm. Finally, P2b is recast as
( P 2 c ) : max F , δ δ 1 + κ [ ( log e ) T r { ( ( I + F ( n ) ) 1 ) * ( F F ( n ) ) } ]
s . t . ( 40 ) , ( 41 ) , ( 42 )
After above processing, P2c can be solved using CVX tools. The whole AO algorithm is shown in Algorithm 1. The convergence of the transmit power can be guaranteed by iterative optimization P1a and P2c.
Algorithm 1 Alternating Optimization Algorithm
1: Input: N , M , h .
2: Output: F ˜ , W , Z .
3: Initialize F ˜ 0 by random generated.
4: repeat
5:  Obtain W i and Z i by solving (P1a) in (24) for given F ˜ i .
6:    if rank ( W ) 1 or rank ( Z ) 1
7:      Gaussian randomization algorithm;
8:    end
9:    Obtain F ˜ i + 1 by solving (P2c) in (49) for given W i and Z i .
10:    if rank ( F ˜ i + 1 ) 1
11:      Gaussian randomization algorithm;
12:    end
13:  compute P i + 1 = Tr ( W i ) + Tr ( Z i ) .
14:  Update i i + 1
15: until  P i + 1 P i 1 e 3 .

5. Numerical results

We assume that the ST-RX, the SR, the PR, the eavesdropper, and the RIS are located at (0,10), (180,0), (160,0), (170,0), (100,25) in meter (m) in a two-dimensional plane, respectively. The channels of ST-RX -Eve, ST-RX -SR and ST-RX -PR experience Rayleigh fading, while the ST-RX -RIS, RIS-SR, RIS-PR and RIS-Eve links experience Rician fading with a Rician factor of 4. The large-scale fading is defined as 10 3 d c , where d is the link distance, c is the path-loss exponent, which 2.2, 2.2, 2.2, 2, 2, and 2 denote the ST-RIS, the RIS-SR, the RIS-PR, the RIS-Eve, the ST-SR, the ST-PR and the ST-Eve links, respectively. Other default system parameters are set as: σ s 2 = σ e 2 = σ p 2 = 65 d B m , γ ¯ s = 8 , γ ¯ e = 2 , ϕ p = 35 d B m .
In Figure 2, the relationship curve between different transmission power and average safety rate of ST is shown. Set the number of reflection units for IRS N = 16 . Among them, "passive IRS" represents the simulation curve in the presence of IRS, and " P A = 20 d B m " represents the safety rate simulation curve that can be achieved when the maximum noise amplification power of the active IRS is 20dBm. Compare the safety performance of passive IRS and active IRS assisted CR systems under the same parameter settings. The maximum interference power received by PR is P I = 10 d B m . As the p t increases, the average security rate of the SR end also continues to increase and shows a trend of convergence. In the case of an active IRS, the maximum amplification amplitude coefficient of each reflection unit is set to a max 2 = 30 d B . Consider two cases where the maximum noise amplification power of an active IRS is P A = 30 d B m and P A = 20 d B m respectively. From the figure, when the transmission power is the same, the safety performance gain brought by active IRS is always better than that of passive IRS. This is because the active IRS can not only adjust the phase of the incident signal, but also amplify the incident signal, and the channel capacity at the SR end will further increase. However, active IRS amplifies the incoming signal while also amplifying the introduced thermal noise. The simulation results show that the average safety rate of different amplified noise power budgets is basically the same when the transmission power is small. This indicates that under low transmission power conditions, the noise power budget of active IRS has little impact on the safety performance of the system. When the transmission power is high, the average safe rate increases with P A increasing. Then, as the transmission power increases to a certain value, the safety rate curve gradually smooths out, and even at P t = 40 d B m , the average safety rate of the " P A = 20 d B m " and "passive IRS" curves is almost the same. This is because when the threshold value of amplified noise power is low and the transmission power is high, the amplification of the incident signal by the active IRS will also be limited according to the constraints of amplified noise. In addition, in the case of "passive IRS", due to the limitation of the PR end interference power threshold condition P I = 10 d B m , when the power increases to a certain value, the channel gain brought by the reflection link will continue to weaken until P I = 10 d B m the average safe rate no longer increases.
In Figure 3, the average safety rate curves of passive IRS and active IRS assisted CR systems with different amplitudes were compared under different transmission powers of ST. Set N = 32 , P A = 30 d B m , P I = 10 d B m , and compare the average safety rate under different a max 2 conditions. As shown in Figure 3, the average safety rate will increase as a max 2 increases. Especially when the reflection power is less than 15dBm, the safety rate curves of different amplification amplitudes are basically consistent. Under weak power conditions, the safety rate is not sensitive to the amplification gain of active IRS. When the transmission power is greater than 15dBm, as the amplification amplitude increases, the average safety rate also increases. Compared to passive IRS, active IRS can achieve better safety performance.
In Figure 4, the transmitted power curves for different numbers of reflection units are given while the number of antennas is M = 4 . When N > 3 , the transmitted power decreases with the increase of the number of reflection units, it is shown that IRS can guarantee the security of CR systems with low power consumption. From Figure 2, it is seen that the convergence times of the algorithm increase with the increase of N . This is because when the increase of IRS elements will make the dimension of phase matrix Φ larger, more computation time and iterations are required to optimization of Φ . Therefore, more IRS elements will reduce the transmit power of ST-RX, but increase the time complexity of the algorithm.
In Figure 5, we have plotted the transmitted power curves for different numbers of antennas while the number of reflection units is N = 3 . We observed that the number of iterations decreases when proposed algorithm converges with the increase of the number of antennas. Moreover, the less transmit power is required as the number of antennas of ST-RX under fixing the IRS elements. Therefore, the number of IRS elements and transmit antennas can be increased appropriately if the transmit power of ST-RX is limited, while the constraints of secure communication.

6. Conclusion

In this paper, by designing the IRS-aided CR system, we investigated the secrecy performance by introducing AN vector at ST-RX. The OF is minimize the transmit power of the ST-RX by jointly optimizing the { w , z } and θ i , while subject to secrecy rate constraint and IT constraint of PR. To solve it, the AO algorithm was utilized to solve the challenge constraint. By utilizing the SDR scheme, we have dealt with the { w , z } and θ i effectively. For the constraint of unit modulus, the penalty function method was applied. Simulation results illustrate that the joint scheme can effectively reduce the transmit power at ST-RX under the condition of ensuring secure communication. on the other hand, the QoS of PR can be satisfied.

References

  1. L. Dong and H. -M. Wang, "Enhancing Secure MIMO Transmission via Intelligent Reflecting Surface," IEEE Trans. Wireless Commun, vol. 19, no. 11, pp. 7543-7556, Nov. 2020. [CrossRef]
  2. S. Hong, C. Pan, H. Ren, K. Wang and A. Nallanathan, "Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface," IEEE Trans. Commun, vol. 68, no. 12, pp. 7851-7866, Dec. 2020. [CrossRef]
  3. Q. Wu and R. Zhang, “Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network,” IEEE Commun. Mag., vol. 58, no. 1, pp. 106–112, Jan. 2020. [CrossRef]
  4. S. Hong, C. Pan, H. Ren, K. Wang, K. K. Chai and A. Nallanathan, "Robust Transmission Design for Intelligent Reflecting Surface Aided Secure Communication Systems with Imperfect Cascaded CSI," IEEE Trans. Wireless Commun. [CrossRef]
  5. V. Nguyen, T. Q. Duong, O. A. Dobre and O. Shin, "Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks," IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2609-2623, Nov. 2016. [CrossRef]
  6. W. Zhang, C. Wang, X. Ge, and Y. Chen, “Enhanced 5G cognitive radio networks based on spectrum sharing and spectrum aggregation,” IEEE Trans. Commun, vol. 66, no. 12, pp. 6304–6316, 2018. [CrossRef]
  7. A. Almohamad et al., "Smart and Secure Wireless Communications via Reflecting Intelligent Surfaces: A Short Survey," IEEE Open Journal of the Communications Society, vol. 1, pp. 1442-1456, 2020. [CrossRef]
  8. X. Yu, D. Xu and R. Schober, "Enabling Secure Wireless Communications via Intelligent Reflecting Surfaces," 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019, pp. 1-6.
  9. S. Fang, G. Chen and Y. Li, "Joint Optimization for Secure Intelligent Reflecting Surface Assisted UAV Networks," IEEE Wireless Commun. Lett. [CrossRef]
  10. X. Lu, W. Yang, X. Guan, Q. Wu and Y. Cai, "Robust and Secure Beamforming for Intelligent Reflecting Surface Aided mmWave MISO Systems," IEEE Wireless Commun. Lett, vol. 9, no. 12, pp. 2068-2072, Dec. 2020. [CrossRef]
  11. X. Guan, Q. Wu and R. Zhang, "Joint Power Control and Passive Beamforming in IRS-Assisted Spectrum Sharing," IEEE Commun. Lett, vol. 24, no. 7, pp. 1553-1557, July 2020. [CrossRef]
  12. L. Zhang, C. Pan, Y. Wang, H. Ren, K. Wang and A. Nallanathan, "Robust Beamforming Optimization for Intelligent Reflecting Surface Aided Cognitive Radio Networks," 2020 IEEE Global Communications Conference (GLOBECOM), Taipei, Taiwan, 2020, pp. 1-6.
  13. Xiao, Haitao; Dong, Limeng; Wang, Wenjie. 2020. "Intelligent Reflecting Surface-Assisted Secure Multi-Input Single-Output Cognitive Radio Transmission" Sensors 20, no. 12: 3480. [CrossRef]
  14. X. Guan, Q. Wu and R. Zhang, "Intelligent Reflecting Surface Assisted Secrecy Communication: Is Artificial Noise Helpful or Not?," IEEE Wireless Commun. Lett, vol. 9, no. 6, pp. 778-782, June 2020. [CrossRef]
  15. Z. Abdullah, G. Chen, S. Lambotharan and J. A. Chambers, "A Hybrid Relay and Intelligent Reflecting Surface Network and Its Ergodic Performance Analysis," IEEE Wireless Commun. Lett, vol. 9, no. 10, pp. 1653-1657, Oct. 2020. [CrossRef]
  16. Q. Wu and R. Zhang, "Weighted Sum Power Maximization for Intelligent Reflecting Surface Aided SWIPT," IEEE Wireless Commun. Lett, vol. 9, no. 5, pp. 586-590, May 2020. [CrossRef]
  17. S. J. Wright, “Coordinate descent algorithms,” Math. Program., vol. 151, no. 1, pp. 3–34, Mar. 2015. [CrossRef]
  18. W.-K. Ma, T. N. Davidson, K. M. Wong, Z.-Q. Luo, and P.-C. Ching, “Quasi-maximum-likelihood multiuser detection using semi-definite relaxation with application to synchronous CDMA,” IEEE Trans. Signal Process., vol. 50, no. 4, pp. 912–922, Apr. 2002. [CrossRef]
  19. S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.Cambridge Univ. Press, 2004.
Figure 1. RIS-aided CR system with an eavesdropper.
Figure 1. RIS-aided CR system with an eavesdropper.
Preprints 71448 g001
Figure 2. Average Security Rate with different transmision power p t when N = 16 .
Figure 2. Average Security Rate with different transmision power p t when N = 16 .
Preprints 71448 g002
Figure 3. Average Security Rate with different transmision power p t when N = 32 .
Figure 3. Average Security Rate with different transmision power p t when N = 32 .
Preprints 71448 g003
Figure 4. Convergence of the proposed algorithm with different values of N.
Figure 4. Convergence of the proposed algorithm with different values of N.
Preprints 71448 g004
Figure 5. Convergence of the proposed algorithm with different values of M.
Figure 5. Convergence of the proposed algorithm with different values of M.
Preprints 71448 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated