Next Article in Journal
Kernel-Free Quadratic Surface Regression for Multi-Class Classification
Next Article in Special Issue
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice
Previous Article in Journal
Critic Learning-Based Safe Optimal Control for Nonlinear Systems with Asymmetric Input Constraints and Unmatched Disturbances
Previous Article in Special Issue
Practical Entropy Accumulation for Random Number Generators with Image Sensor-Based Quantum Noise Sources
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Weighted Sum Secrecy Rate Maximization for Joint ITS- and IRS-Empowered System

1
Wireless Communication Technology Office, Information Engineering University, Zhengzhou 450001, China
2
School of Intelligent Engineering, Zhengzhou University of Aeronautics, Zhengzhou 450046, China
3
Sixty-Third Research Institute, National University of Defense Technology, Nanjing 210007, China
4
5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford GU2 7XH, UK
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(7), 1102; https://doi.org/10.3390/e25071102
Submission received: 15 June 2023 / Revised: 13 July 2023 / Accepted: 18 July 2023 / Published: 24 July 2023
(This article belongs to the Special Issue Quantum and Classical Physical Cryptography)

Abstract

:
In this work, we investigate a novel intelligent surface-assisted multiuser multiple-input single-output multiple-eavesdropper (MU-MISOME) secure communication network where an intelligent reflecting surface (IRS) is deployed to enhance the secrecy performance and an intelligent transmission surface (ITS)-based transmitter is utilized to perform energy-efficient beamforming. A weighted sum secrecy rate (WSSR) maximization problem is developed by jointly optimizing transmit power allocation, ITS beamforming, and IRS phase shift. To solve this problem, we transform the objective function into an approximated concave form by using the successive convex approximation (SCA) technique. Then, we propose an efficient alternating optimization (AO) algorithm to solve the reformulated problem in an iterative way, where Karush–Kuhn–Tucker (KKT) conditions, the alternating direction method of the multiplier (ADMM), and majorization–minimization (MM) methods are adopted to derive the closed-form solution for each subproblem. Finally, simulation results are given to verify the convergence and secrecy performance of the proposed schemes.

1. Introduction

With the development of Internet of Things (IoT) systems, a massive number of data are transmitted via wireless networks, which are very vulnerable to eavesdropping attacks due to the broadcast nature of the wireless medium. Information security has become a non-negligible issue in sixth-generation (6G) networks. Physical layer security (PLS) is a promising technique to enhance system security via exploiting the inherent characteristics of the wireless channel. The theoretical basis of PLS comes from Shannon’s information-theoretic secrecy research [1]. Then, Wyner introduced the wiretap channel model and derived secrecy capacity in degraded broadcast channels [2]. Afterwards, the idea of PLS was extended to non-degraded broadcast channels [3], Gaussian channels [4], multi-antenna channels [5], and so on. Nowadays, various schemes, such as artificial noise (AN), beamforming, and cooperative relaying, have been utilized to improve the secrecy rate [6]. However, these techniques increase the computational complexity and hardware cost, which have become challenging issues with a massive number of devices in 6G networks. Moreover, when the channel responses of the legitimate receivers and the eavesdroppers are highly correlated, traditional schemes also benefit eavesdroppers [7].
Recently, intelligent surfaces have been proposed as a potential alternative technique for building an energy-efficient wireless networks [8]. To be specific, an intelligent surface is a two-dimensional surface consisting of many low-cost, passive, reconfigurable elements. The intelligent surface consumes much less power than conventional antennas since these elements require no dedicated radio frequency (RF) chains or amplifiers [9]. Each element of an intelligent surface can dynamically adjust the amplitude and/or phase of the incident electromagnetic (EM) wave, which enables the intelligent surface to actively customize wireless propagation environments [10]. Moreover, intelligent surfaces can be flexibly deployed on building surfaces without introducing additional interference. Depending on the operation mode of the intelligent surface elements, an intelligent surfaces is mainly divided into two categories: an intelligent reflecting surface (IRS) and an intelligent transmission surface (ITS).
Many studies have been carried out to examine IRS-aided PLS. For instance, Ref. [11] proposed a power-efficient beamforming scheme for IRS-aided multi-antenna secure transmission where a closed-form expression of the optimal beamformer is derived. In [12], the achievable secrecy rate maximization problem of the IRS-aided multiuser (MU) system is alternatively optimized by a block coordinate decent (BCD) algorithm. An IRS-aided secrecy simultaneous wireless information and power transfer (SWIPT) network was considered in [13], where a penalty dual decomposition (PDD)-based algorithm was proposed to solve a max–min fairness robust problem. Ref. [14] focused on the secrecy performance of IRS-aided massive MIMO systems with statistical channel state information (CSI), where an approximate expression of the sum achievable security data rate was derived.
The above works mainly focus on adopting intelligent surfaces as auxiliary nodes. Actually, apart from being deployed as a passive reflector, intelligent surfaces can also be equipped at the base station (BS) serving as an antenna array. Without the requirement for a conventional RF combiner and phase shifter, intelligent surface-based transmitters consume significantly less power than conventional transmitters [15]. Because of advantages including higher aperture efficiency, larger working bandwidth, and no feed occlusion or self-interference, the ITS-based transmitter is more promising than the IRS-based transmitter in complicated communication environments [16]. In Ref. [17], the author proposed an ITS-based transmitter in the MISO channel, where difference-of-convex (DC) programming was used to maximize the achievable sum-rate. Further, the authors of [18] investigated the SWIPT networks with ITS-based transmitters, where a robust transmission scheme was proposed in the case of imperfect CSI. In Ref. [19], a novel joint intelligent surface-assisted secure network was investigated for the first time, where PDD and element-wise Lagrange dual methods were utilized to design ITS beamforming vector and IRS phase shift.
It can be seen that existing studies primarily focused on the standalone use of intelligent surfaces as additional nodes or antenna arrays. Based on the above analysis, we consider secure transmission over multiple-input single-output multiple-eavesdropper (MISOME) channels where an ITS-aided transmitter and an IRS are jointly deployed to improve system secure performance. Specifically, we constructed a WSSR maximization problem by optimizing transmit power allocation, the ITS beamforming vector, and the IRS phase shift vector. Since the original problem is non-concave, we first use successive convex approximation (SCA) to approximate the object function by its linear lower bound. Then, we decompose the reformulated problem into three subproblems through the AO technique, where the transmit power allocation optimization subproblem is solved iteratively by using Karush–Kuhn–Tucker (KKT) conditions, and the optimization subproblem of ITS beamforming vector and IRS phase shift vector are solved by the ADMM and MM methods, respectively. The main contributions of this article are summarized as follows:
(1) We propose a novel intelligent surface-assisted MU-MISOME network architecture, where an ITS-aided transmitter sends a confidential signal to several legitimate users with the assistance of an IRS in the presence of multiple eavesdroppers. Specifically, the ITS reduces the power consumption and hardware cost of the transmitter by replacing power amplifiers and the RF chains. Moreover, the IRS is utilized to configure the radio propagation environment aiming for efficiently enlarging the channel difference between Bobs and Eves. Furthermore, we derived the WSSR to characterize the secure performance of the system.
(2) We propose an energy-efficient transmission scheme to maximize the WSSR by jointly designing transmit power allocation, ITS beamforming, and the IRS phase shift. As the objective function is non-concave and the optimization variables are highly coupled, we firstly transform the objective function into a more feasible concave form and solve it alternatively via the AO algorithm. Specifically, we derive the analytical solution for transmit power allocation by employing the KKT conditions, while the ITS beamforming and IRS phase shift are kept fixed. To solve the ITS beamforming and IRS phase shift optimization subproblem, the ADMM and MM methods are proposed.
(3) The simulation results validate the accuracy of our derived results and show the effectiveness of the proposed algorithms.
The rest of this paper is organized as follows. In Section 2, we present a MU-MISOME downlink secure transmission network assisted by an ITS-based transmitter and IRS. In Section 3, the WSSR maximization problem is reformulated and solved by an AO algorithm. Our theoretical analysis is verified by simulation results in Section 4, and conclusions are drawn in Section 5.
Notation: Column vectors and matrices are represented as boldface lower-case and upper-case letters, respectively. The transpose, conjugate, and conjugate transpose of A are represented, respectively, as A T , A * , and A H . A 0 represents that A is a Hermitian positive definite matrix. a , a , and a denote the real part, the absolute value, and the angle of a complex value a, respectively. C N ( 0 , δ ) represents a circularly symmetric complex Gaussian (CSCG) random variable with zero mean and covariance δ . The letter j stands for the imaginary unit 1 .

2. System Model and Signal Representation

In this paper, we consider a secure MU-MISOME downlink broadcast system as illustrated in Figure 1. An ITS-based transmitter (Alice) intends to send L independent confidential data streams for each of the L legitimate users (Bobs) over the same frequency band simultaneously in the presence of L internal untrusted non-cooperative eavesdroppers (Eves) that are arbitrarily distributed around Bobs. An IRS is employed to assist the secure communication. All Bobs and Eves are equipped with a single antenna, and the number of transmissive elements at ITS and that of reflective elements at IRS are denoted as N and M, respectively. Similar to [20], the CSI of all links is assumed to be perfectly known at the transmitter, and the IRS that makes the results presented in this paper can be regarded as the performance upper bound of the considered system. For convenience, we summarize the key notations utilized throughout this paper in Table 1.

2.1. Channel Model

The channel coefficients from Alice to the IRS, from Alice to the lth Bob/Eve, and from the IRS to the lth Bob/Eve (l = 1, …, L) are denoted, respectively, by F C M × N , h d , l C N × 1 ; g d , l C N × 1 ; h r , l C M × 1 ; and g r , l C M × 1 . Without a loss of generality, we assume that g d , l and h d , l experience the Rayleigh fading. However, the IRS-related wireless channels are modeled as Rician fading due to the fact that the IRS is commonly deployed on the high-rise buildings near the desired receivers. Thus, we have
h = κ h κ h + 1 h L o S + 1 κ h + 1 h N L o S
where h H = F , h r , l , g r , l ; κ h is the Rician factor; and h L o S and h N L o S represent line-of-sight (LoS) and non-LoS (NLoS) components of channel h , respectively. The NLoS components h N L o S follow the Rayleigh fading. The LoS components h L o S is given by h L o S = a r a t H , where a t and a r are the array response vectors of the corresponding transmitter and receiver, respectively. In this paper, we assume both IRS and ITS are modeled as the uniform planar array (UPA). For a H × V UPA, the array response vector is formulated as follows:
a ν , ψ = 1 H V 1 , , e j 2 π d e λ m sin ν sin ψ + n cos ψ , , e j 2 π d e λ H 1 sin ν sin ψ + V 1 cos ψ T
where d e represents the spacing between two adjacent array elements; λ is the carrier wavelength; and ν and ψ denote the azimuth and elevation angle of arrival (or departure), respectively. m 0 , H and n 0 , V represent the horizontal and vertical element indices at the array, respectively.

2.2. Signal Model for ITS and IRS

The ITS-based transmitter we considered consists of a feed antenna and an ITS. The feed antenna sends a single frequency electromagnetic (EM) wave to the ITS. To facilitate the analysis, the EM wave emitted from the feed antenna is assumed to be transmitted through ITS completely [18]. The ITS performs signal modulation and beamforming on the incident wave by adjusting the amplitude and phase of each transmissive element [17]. In this work, we focus on the beamforming design of ITS, and the beamforming vector is denoted by w = w 1 , , w N T C N × 1 , where w n W = Δ w n w n = α n e j β n , α n 0 , 1 , β n 0 , 2 π , n , α n , and β n represent the amplitude and phase response of the nth transmissive element, respectively. Similarly, we let θ = θ 1 , . . . , θ M T C M × 1 denote the phase shift vector of the IRS where θ m X = Δ θ m θ m = e j ϕ m , ϕ m 0 , 2 π , m , ϕ m denotes the phase shift of the mth reflective element of the IRS. Note that the amplitude of IRS phase shift is normalized, i.e., θ m = 1 , m because each IRS reflective element only modifies the phase of the incident wave without changing amplitude. Moreover, we ignore the signal reflected multiple times as a result of severe path loss [20].

2.3. Signal Transmission Model

The confidential message transmitted to the lth Bob is denoted as s l , which is assumed as the i.i.d CSCG random variable, i.e., s l C N 0 , 1 , l . Then, the signal sent by Alice can be formulated as x = w l = 1 L a l s l , where a l is the corresponding power allocation factor for s l . Thus, the received signal at the lth Bob/Eve can be represented as
y d , l = h d , l H + h r , l H Θ H F w i = 1 L a i s i + n d , l
y e , l = g d , l H + g r , l H Θ H F w i = 1 L a i s i + n e , l
respectively, where Θ = d i a g θ 1 , . . . , θ M is the phase shift matrix of IRS. n d , l C N 0 , σ d , l 2 and n e , l C N 0 , σ e , l 2 represent additive white Gaussian noise at the lth Bob/Eve, respectively. By letting θ ^ = θ H , 1 H , H l = diag h r , l H F , h d , l H T , and G l = diag g r , l H F , g d , l H T , the received signals in (3) and (4) can be reformulated as follows:
y d , l = θ ^ H H l w i = 1 L a i s i + n d , l
y e , l = θ ^ H G l w i = 1 L a i s i + n e , l
Assuming each Eve only attempts to eavesdrop its nearest Bob, the received signal-to-interference-plus noise ratio (SINR) at the lth Bob/Eve can be written as [19]
r d , l = θ ^ H H ˜ l w a l 2 i = 1 , i l L θ ^ H H ˜ l w a i 2 + 1
r e , l = θ ^ H G ˜ l w a l 2 i = 1 , i l L θ ^ H G ˜ l w a i 2 + 1
respectively, where H ˜ l = H l / σ d , l , G ˜ l = G l / σ e , l . The achievable secrecy rate for the lth Bob in bits/second/Hertz (bps/Hz) can be given as
R s , l = R d , l R e , l +
where z + = Δ max z , 0 , R d , l = ln 1 + r d , l , and R e , l = ln 1 + r e , l denote the achievable rates of the lth Bob/Eve, respectively. Since the optimal value of our problem must be non-negative, the operator · + is omitted for simplicity in the remaining parts of this paper.

3. Problem Formulation and Solution for Wssr Maximization

In this work, our objective is to jointly optimize the power allocation { a l } l = 1 L , the ITS transmission coefficient w , and the IRS phase shift θ ^ to maximize the WSSR of the system. Let η l denote the weight for the lth Bob, which is used to represent the priority of the lth Bob in the system. Thus, the WSSR maximization problem can be generally formulated as
max { a l } l = 1 L , w , θ ^ R s = Δ l = 1 L η l ln 1 + r d , l ln 1 + r e , l
s . t . l = 1 L a l 2 P s , a l 0 , l
w n W , n
θ m X , m , θ ^ M + 1 = 1
where R s represents WSSR of the system; constraint (10b) defines the total transmit power constraint; and constraints (10c,d) characterize the constraints of the ITS beamforming and the phase shifts of the IRS, respectively. The proposed WSSR maximization problem (10) is challenging to solve directly, mainly because of the non-concave objective function as well as the coupling relation of the optimization variables. In order to tackle this, we first approximately reformulate the objective function (10a) into a tractable form by deriving its concave lower bound. Then, we decouple the optimization variables and decompose the transformed problem into three solvable subproblems by utilizing the alternating optimization (AO) technique, and each subproblem is efficiently solved via the iterative algorithm. Finally, we present the overall algorithm and analyze its convergence and complexity

3.1. Problem Transformation

To start with, let { a l t } l = 1 L , w t , θ ^ t denote a given point in problem (10) at the tth iteration and introduce the following lemma.
Lemma 1
([21]). For any u and v > 0 , we have
ln 1 + u 2 v ln 1 + u t 2 v t u t 2 v t + 2 u t * u v t u t 2 v + u 2 v t v t + u t 2
where u t , v t are fixed points.
Based on Lemma 1, we can find a lower bound of R d , l and an upper bound of R e , l around { a l t } l = 1 L , w t , θ ^ t , which can be expressed as
R d , l ln 1 + x l t 2 y l t x l t 2 y l t + 2 x l t * x l y l t x l t 2 y l + x l 2 y l t y l t + x l t 2 = Δ R d , l l b
R e , l ln 1 + z l t + 1 + z l 1 + z l t ln 1 + c l t + c l t 2 i = 1 , i l L a i w H G ˜ l H θ ^ θ ^ t H G ˜ l w t a i t + c l t 1 + c l t 1 + i = 1 , i l L θ ^ H G ˜ l w a i 2 1 = Δ R e , l u b
respectively, where x l = θ ^ H H ˜ l w a l , x l t = θ ^ t H H ˜ l w t a i t , y l = i = 1 , i l L θ ^ H H ˜ l w a i 2 + 1 , y l t = i = 1 , i l L θ ^ t H H ˜ l w t a i t 2 + 1 , z l = i = 1 L θ ^ H G ˜ l w a i 2 , z l t = i = 1 L θ ^ t H G ˜ l w t a i t 2 , and c l t = i = 1 , i l L θ ^ t H G ˜ l w t a i t 2 .
Proof. 
Please refer to Appendix A.    □
By substituting (12) and (13) into (10a) and neglecting the constant terms, we transform the problem (10) into a tractable approximated form around the fixed point { a l t } l = 1 L , w t , θ ^ t as follows:
min { a l } l = 1 L , w , θ ^ l = 1 L η l c l t 1 + c l t i = 1 , i l L θ ^ H G ˜ l w a i 2 + x l t 2 i = 1 L θ ^ H H ˜ l w a i 2 y l t y l t + x l t 2 + i = 1 L θ ^ H G ˜ l w a i 2 1 + z l t 2 i = 1 , i l L R a i w H G ˜ l H θ ^ θ ^ t H G ˜ l w t a i t + 2 R a i w H H ˜ l H θ ^ θ ^ t H H ˜ l w t a i t y l t
s . t . ( 10 b ) ( 10 d )
However, problem (14) is still difficult to solve directly due to the highly coupled optimization variables in (14a). In the following part, we use the AO technique to decompose problem (14) into three subproblems and alternately update { a l } l = 1 L , w and θ ^ while keeping the other variables fixed.

3.2. Power Allocation Optimization

In this subsection, we consider the optimization of { a l } l = 1 L with the given w and θ ^ . By omitting the irrelevant term, the WSSR maximization problem with respect to power allocation { a l } l = 1 L is reformulated as follows:
min { a l } l = 1 L l = 1 L T l a l 2 2 t l a l
s . t . ( 10 b )
where
T 0 = i = 1 L η i c i t θ ^ t H G ˜ i w t 2 1 + c i t + i = 1 L η i x i t 2 θ ^ t H H ˜ i w t 2 y i t y i t + x i t 2 + i = 1 L η i θ ^ t H G ˜ i w t 2 1 + z i t T l = T 0 η l c l t θ ^ t H G ˜ l w t 2 1 + c l t t l = i = 1 , i l L η i R a l t w t H G ˜ i H θ ^ t θ ^ t H G ˜ i w t + η l R a l t w t H H ˜ l H θ ^ t θ ^ t H H ˜ l w t y l t
Note that problem (15) is a quadratically constrained quadratic programming (QCQP), which can be solved by using a convex optimization solver, e.g., CVX [22]. In order to further reduce computational complexity, we propose a more efficient method by solving KKT conditions. The KKT conditions of the problem (15) with respect to { a l } l = 1 L are given as follows:
L { a l } l = 1 L , λ a l = 0
λ l = 1 L a l 2 P s = 0
where L { a l } l = 1 L , λ = l = 1 L T l a l 2 2 t l a l + λ l = 1 L a l 2 P m a x is the Lagrangian function and λ 0 is the Lagrangian multiplier associated with the constraint (10b). By solving (17), we can derive power allocation a l λ as
a l λ = t l T l + λ , l
The optimal λ * can be calculated by solving the second KKT condition (18). We search λ * by considering the following two cases:
(1) If a l 0 satisfies the power constraint, i.e., i = 1 L a l 2 0 P m a x , then λ * = 0 , and the optimum power allocation is obtained by a l * = a l 0 .
(2) Otherwise, the full power constraint i = 1 L a l 2 λ = P m a x should be met. Given (19), we have i = 1 L t l 2 / T l + λ 2 = P m a x . Since i = 1 L t l 2 / T l + λ 2 decreases monotonically with respect to λ , the optimal λ * can be found efficiently by applying the bisection method. Moreover, since T l > 0 l , we can set an upper searching bound on λ by letting T l = 0 l ; thus, the search interval is 0 , i = 1 L t l 2 / P m a x .
The detailed steps for calculating { a l * } l = 1 L and λ * are summarized in Algorithm 1.
Algorithm 1 Power Allocation Optimization
1: Initialization: set the accuracy ε , and set the searching bounds λ l and λ u ;
2: Calculate  { a l 0 } l = 1 L according to (19). If i = 1 L a l 2 0 P m a x , then a l * = a l 0 l , λ * = 0 and terminate; otherwise, move to step 3;
3: Repeat
4: Calculate λ = λ l + λ u / 2 ;
5: Update { a l λ } l = 1 L via (19);
6: If i = 1 L a l 2 λ P m a x set λ l = λ ; Otherwise, set λ u = λ end if;
7: Until λ l λ u ε ;
8: Output { a l * } l = 1 L , λ * .

3.3. Optimization of ITS Beamforming

In this subsection, we attempt to optimize the ITS beamforming vector w with given { a l } l = 1 L and θ ^ . With some manipulations, the problem (14) can be reformulated as follows:
min w w H Aw 2 w H b
s . t . ( 10 c )
where A = l = 1 L η l A l and b = l = 1 L η l b l . A and b are, respectively, denoted as
A l = c l t i = 1 , i l L a i t 2 G ˜ l H θ ^ t θ ^ t H G ˜ l 1 + c l t + x l t 2 i = 1 L a i t 2 H ˜ l H θ ^ t θ ^ t H H ˜ l y l t y l t + x l t 2 + i = 1 L a i t 2 G ˜ l H θ ^ t θ ^ t H G ˜ l 1 + z l t b l = i = 1 , i l L G ˜ l H θ ^ t θ ^ t H G ˜ l w t a i t 2 + H ˜ l H θ ^ t θ ^ t H H ˜ l w t a l t 2 y l t
Problem (20) is a quadraitic programming problem that can be solved by using the CVX toolbox. Here, we propose a low-complexity algorithm where a closed-form solution is derived iteratively by using the ADMM method. First, let us reformulate problem (20) as follows:
min r , w r H Ar 2 r H b
s . t . w n 1 , n M
r = w
where r C M × 1 is a slack variable. Then, the augmented Lagrange function of (20a) can be written as
L r , w , p = r H Ar 2 r H b p H r w + ρ 2 r w 2
where p C N × 1 is the Lagrange multiplier with respect to the constraint (22b) and ρ 0 is the penalty factor. By using the ADMM method, we have the following iterations:
r k + 1 = a r g min r L r k , w k , p k
w k + 1 = a r g min w n = 1 n L r k + 1 , w k , p k
p k + 1 = p k ρ r k + 1 w k + 1
According to first-order optimality condition of (23), we have
2 A r k + 1 2 b p k ρ r k + 1 w k = 0
Then, the solution for (24a) is derived as
r k + 1 = ρ I + 2 A 1 2 b + ρ w k + p k
Problem (24b) is equivalent to min w n = 1 n N w r k + 1 ρ 1 p k 2 , which is a projection problem, and the closed-form solution is given as
w k + 1 n = r k + 1 ρ 1 p k n , if r k + 1 ρ 1 p k n 1 r k + 1 ρ 1 p k n r k + 1 ρ 1 p k n , if r k + 1 ρ 1 p k n > 1
where w n denotes the nth element of w . Then, by exploiting (24c) and (25), we obtain that p k + 1 = 2 A r k + 1 2 b . The detailed step of the ADMM algorithm is stated in Algorithm 2, and it guarantees to converge when the value of the penalty parameter ρ satisfies: ρ I / 2 A 0 [23].
Algorithm 2 The ADMM algorithm for problem (20)
1: Initialization: set the maximum iteration number K; the accuracy ε ; a feasible point { a l 0 } l = 1 L , w 0 , θ ^ 0 ; and the penalty factor ρ , which satisfies ρ I / 2 A 0 ;
2: Repeat k
3: Update r k + 1 according to (26);
4: Update  w k + 1 according to (27);
6: Update  p k + 1 = 2 A r k + 1 2 b ;
7: Until f w k + 1 f w k f w k + 1 f w k f w k + 1 f w k + 1 ε or k > K ;
8: Output  w * .

3.4. Optimization of IRS Phase Shift

In this subsection, we aim to optimize the IRS phase shift θ ^ with given { a l } l = 1 L and w . We first recast the problem (14) as follows:
min θ ^ θ ^ H Ω θ ^ 2 θ ^ H φ
s . t . ( 10 d )
where Ω = i = 1 L η i Ω i , φ = i = 1 L η i φ i , Ω i and φ i are denoted by
Ω l = c l t 1 + c l t i = 1 , i l L a i t 2 G ˜ l w t w t H G ˜ l H + x l t 2 i = 1 L a i t 2 H ˜ l w t w t H H ˜ l H y l t y l t + x l t 2 + i = 1 L a i t 2 G ˜ l w t w t H G ˜ l H 1 + z l t l φ l = i = 1 , i l L G ˜ l w t w t H G ˜ l H θ ^ t a i t 2 + H ˜ l w t w t H H ˜ l H θ ^ t a l t 2 y l t l
The unit modulus constraint (10d) makes the problem difficult to solve. Although the semidefinite relaxation (SDR) method can be used to solve it, it is time consuming [11]. We provide two efficient algorithms to tackle this problem. We start by introducing the MM method first.
(1) The MM method: the main idea behind the MM method is to transform the problem (28) into a series of tractable approximated subproblems [24]. Generally, the MM method contains two steps. In the majorization step, we construct a surrogate function that upperbounds the objective function of (28) up to a constant. Let us denote the objective function of (28) as f θ ^ . According to the second order Taylor expansion of f θ ^ at a fixed point θ ^ k , we obtain the following inequality:
f θ ^ λ max θ ^ H θ ^ 2 θ ^ H Ω λ max I M × M θ ^ k + φ + ( θ ^ k ) H Ω λ max I M × M θ ^ k
where λ max is the maximum eigenvalue of matrix Ω . By taking the unit modulus constraint θ ^ m = 1 , m into consideration, we have θ ^ H θ ^ = M . Then, Equation (30) can be transformed as
f θ ^ λ max M 2 θ ^ H Ω λ max I M × M θ ^ k + φ + ( θ ^ k ) H Ω λ max I M × M θ ^ k = Δ g θ ^ θ ^ k
where g θ ^ θ ^ k is the surrogate function of f θ ^ at point θ ^ k . In the minimization step, we derive the corresponding solution by minimizing g θ ^ θ ^ k and solve problem (28) iteratively. By omitting the constants, the subproblem of minimizing g θ ^ θ ^ k at the kth iteration can be rewritten as
min θ ^ 2 θ ^ H q k
s . t . ( 10 d )
where q k = Ω λ max I M × M θ ^ k + φ . It is easy to see that the problem (32) has a closed-form solution, which is derived as
θ ^ k + 1 = exp j arg q k
According to the principle of the MM method, the proposed MM algorithm is described in Algorithm 3.
Algorithm 3 The MM algorithm for problem (28)
1: Initialization: set the accuracy ε , the maximum iteration number K, and a feasible point { a l 0 } l = 1 L , w 0 , θ ^ 0 ;
2: Repeat k
3: Calculate q k = Ω λ max I M × M θ ^ k + φ ;
4: Update  θ ^ k + 1 according to (33);
5: Until f θ ^ k + 1 f θ ^ k f θ ^ k + 1 f θ ^ k f θ ^ k + 1 f θ ^ k + 1 ε or k > K ;
6: Output θ ^ * .
(2) The ADMM method: Note that problem (28) has a similar structure to problem (22) except for the modulus constraint θ m = 1 , m . Therefore, after making some modifications to (27), we obtain the following expressions:
θ ^ k + 1 m = r θ k + 1 ρ θ 1 p θ k m r θ k + 1 ρ θ 1 p θ k m , if r θ k + 1 ρ θ 1 p θ k m 0 θ ^ k m , if r θ k + 1 ρ θ 1 p θ k m = 0
where r θ , ρ θ , and p θ are corresponding auxiliary variables related to θ ^ . A closed-form solution of problem (28) can be obtained by adopting the ADMM method as described in Algorithm 2 in the preceding section, which is omitted here for brevity.
Lastly, the WSSR maximization problem (10) was decomposed into three solvable subproblems that were solved iteratively by corresponding methodsṪhe proposed AO algorithm is summarized in Algorithm 4.
Algorithm 4 The proposed AO algorithm for the WSSR maximization problem
1: Initialization: set the maximum iteration number K, the accuracy ε , and a feasible point { a l 0 } l = 1 L , w 0 , θ ^ 0 ;
2: Repeat k
3: Obtain { a l k + 1 } l = 1 L via solving (15) with fixed { a l k } l = 1 L , w k , θ ^ k ;
4: Obtain w k + 1 via solving (20) using the ADMM method with fixed { a l k + 1 } l = 1 L , w k , θ ^ k ;
5: Obtain θ ^ k + 1 via solving (28) using the ADMM or MM method with fixed { a l k + 1 } l = 1 L , w k + 1 , θ ^ k ;
6: Until  R s k + 1 R s k < ε or k > K ;
7: Output  { a l * } l = 1 L , w * , θ ^ * .

3.5. Complexity Analysis

In this part, we analyze the computational complexity of the proposed algorithms. We first denote the iteration number of the ADMM, MM, and AO algorithms as T A D M M , T M M , and T A O , respectively. Specifically, the complexity of the proposed ADMM method mainly lies in updating r , the complexity of which is O N 2 + N 3 , where O N 3 and and O N 2 , respectively, denote the complexity for calculating ρ I + 2 A 1 and other multiplication operations in updating r . We note that the inverse matrix ρ I + 2 A 1 is calculated only once during the whole algorithm. Therefore, the total complexity of the ADMM method is O T A D M M N 2 + N 3 [25]. Similar to the ADMM algorithm, the complexity of the MM algorithm mainly lies in two parts. At the beginning of the MM algorithm, calculating λ max incurs O M 3 computational complexity. In each iteration of the MM algorithm, the main complexity comes from updating q k , the complexity of which is O M 2 . Thus, the complexity of the MM algorithm is O T M M M 2 + M 3 [26]. It can be observed that the complexity of the ADMM and MM methods mainly depends on the iteration times, which is typically several hundreds of seconds. Lastly, the overall complexity of the proposed AO algorithm is O T A O ( ( T A D M M N 2 + N 3 ) + ( T A D M M / M M M 2 + M 3 ) ) .

4. Simulation Results

In this section, we evaluate the performance of our proposed algorithms by numerical simulation results. The simulation scenario for the coordinates (in meters) is illustrated in Figure 2, where Alice and the IRS are located at (0, 0) and (100, 0), respectively. L Bobs are randomly scattered in a circle centered at (100, 20) with a radius of 5 m. Each Bob is eavesdropped by one Eve, which randomly located within a circle centered at the Bob with radius 2 m. The heights of Alice, IRS, Bobs, and Eves are set as 20 m, 10 m, 1.5 m and 1.5 m, respectively. The large-scale path loss is modeled as PL = P L 0 10 log 10 d / d 0 dB, where P L 0 is the path-loss at the reference distance and d is the link distance in meters. The path loss exponents for the Alice-Bobs/Eves link, the Alice-IRS link, and the IRS–Bobs/Eves link are set as α t = 4 , α t r = 2 and α r = 2 , respectively. Other parameters, unless otherwise specified, are set as follows: N = 48 , M = 64 , P m a x = 10 dBm , σ d , l 2 = σ e , l 2 = 70 dBm , d 0 = 1 m , L = 4 , and Ricean factor κ = 3 .
We first study the convergence behaviors of the proposed algorithm with different numbers of transmissive element N and reflective element M. Figure 3 shows the convergence properties of ADMM and MM algorithms for optimizing the phase shift of IRS in the first AO iteration. It can be observed that the WSSR achieved by both methods increases with the iteration number. Although the ADMM method converges a little more slowly than the MM method, they both tend to converge within 200 iterations, which verifies the convergence of the two methods.
The convergence performance of the AO algorithm is shown in Figure 4 for different N and M. It is clear that the AO algorithm tends to converge within 15 iterations for all N and M combinations considered, which demonstrates the convergence of the suggested AO algorithms. Moreover, the increase in N or M leads to higher WSSR but slower convergence performance, which is because large N or M indicates more variables that need to be optimized. Also, given the same N and M combinations, the AO-MM and AO-ADMM algorithms have a similar convergence speed, but the WSSR obtained by the AO-MM method is higher than that of the AO-ADMM method.
Next, we evaluate the performance of the proposed algorithm and contrast it with the benchmark methodologies shown below: (1) Random IRS: Only { a l } l = 1 L and w are optimized, and the phase for each IRS reflective components is generated uniformly and independently over [ 0 , 2 π ) . (2) No IRS: Replace the IRS-related channel matrices by zero matrices and remove step 5 from Algorithm 4. (3) Equal power: Allocate the same power to each Bob, i.e., set a l = P m a x / L l . (4) The upper bound: Obtaining the optimal value of power allocation, ITS beamforming, and IRS phase shift numerically by using CVX toolbox. Specifically, { a l * } l = 1 L and w * are obtained by directly solving problem (15) and (20) as QCQP and QP, respectively. θ ^ * is obtained by solving problem (28) via applying the SDR method and Gaussian randomization techniques.
Figure 5 compares the WSSR performance versus the transmit power P m a x of all schemes. We can see that the WSSR increases with P m a x . Moreover, both ADMM and MM algorithms achieve near-optimal performance compared to the upper bound and also significantly outperform other schemes, demonstrating the performance of our proposed transmission strategy. Further, the random phase scheme outperforms the no IRS scheme, which verifies the benefits of utilizing IRS. Lastly, the equal power scheme achieves the worst performance when P m a x > 10 dBm , which can be explained by the fact that the inter-user interference becomes the primary performance constraint in the high transmit power region.
Then, we study the impact of the number of IRS reflective elements M on the WSSR of a different scheme in Figure 6. We can see that the WSSR experiences a great increase with M for both ADMM and MM schemes, which indicates that increasing the number of IRS elements can improve the WSSR effectively. By contrast, the WSSR of the random phase scheme is significantly lower that of the ADMM or MM schemes, which verifies the advantage of our proposed algorithm. Moreover, the WSSR of random phase scheme is higher than that of the no IRS case, and the gap only increases slightly with M, which is due to the fact that more signals can be reflected by IRS with larger M and these additional signals can enhance secrecy performance only if the phase shifter been properly designed.
Next, we investigate the system performance with a different number of Bobs/Eves L, as shown in Figure 7. As we can see, the WSSR declines with L, which is because the inter-user interference increases with L and the weight 1/L for each Bobs decreases with L. As a result, the WSSR tends to decrease.
Lastly, we discuss the relationship between system performance and path loss exponent. As Figure 8 shows, the WSSR of the proposed algorithms decreases dramatically with the increase in the path loss exponent of the IRS–Bobs link. This is mainly because more severe path loss will decrease the power of the reflected signal from the IRS, which jeopardizes the system performance. Meanwhile, the increase in the path loss exponent of the IRS–Eves link improves the WSSR as depicted in Figure 9, which is due to the fact that more severe large-scale fading degrades the reflected signal at Eve. These two figures demonstrate a technical insight that, in order to achieve a better performance, the IRS should be carefully installed so that there are fewer obstructions in the legitimate link or more obstructions in the eavesdropping link.

5. Conclusions

This paper has investigated an ITS-and IRS-empowered MU-MISOME secure communication network where an IRS is deployed to create a programmable wireless environment, and an ITS-based transmitter is adopted to perform energy-efficient beamforming. To be specific, we have maximized the WSSR by jointly optimizing the power allocation, ITS beamforming, and phase shift of IRS while guaranteeing transmit power constraint and unit-modulus constraints. The non-concave objective function was transformed into a tractable form by using the SCA technique. An efficient AO scheme was developed to convert the reformulated problem into three solvable subproblems. The KKT conditions and the ADMM and MM methods were adopted to derived the closed-form solution for each subproblem. The numerical results demonstrated that the proposed schemes can achieve near-optimal performance and the IRS can improve the system WSSR effectively.
The performance of the MM algorithm is slightly better than that of the ADMM algorithm, while the ADMM algorithm is a more general approach since it does not require the objective function to be differentiable. Both secrecy transmission schemes we proposed are suitable for resource-constrained IoT devices because they do not rely on computational complexity. In addition, the IRS can be flexibly deployed in IoT networks without causing additional interference or changing the network topology.

Author Contributions

Conceptualization, K.H.; funding acquisition, K.H. and Y.W.; methodology, S.Y. and H.N.; software, S.Y.; validation, S.Y. and Y.W.; writing—original draft, S.Y.; and writing—review and editing, Y.W. and Z.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the National Key Research and Development Program of China (No.2022YFB2902205), in part by the National Natural Science Foundation of China under Grant (No.U22A2001, No.61901490), in part by the Training Program for Young Scholar of Henan Province for Colleges and Universities under Grand 2020GGJS172, in part by the Program for Science & Technology Innovation Talents in Universities of Henan Province under Grand 22HASTIT020, and in part by the Scientific and Technological Key Project of Henan Province under Grant 232102210151.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data available on request from the authors.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of (12) and (13).
The prove of (12) is straightforward since R d , l l b can be obtained directly by using Lemma 1 after rewriting R d , l as follows: ln 1 + x l 2 x l 2 y l y l . Next, let us derive R e , l u b . We first rewrite R e , l as
R e , l = ln 1 + z l ln 1 + i = 1 , i l L θ ^ H G ˜ l w a i 2
According to the first-order condition of the concave function, an upper bound of ln 1 + z l can be derived as follows:
ln 1 + z l ln 1 + z l t + 1 + z l 1 + z l t 1
For (11), let v = v t = 1 ; then, (11) can be written as follows:
ln 1 + u 2 ln 1 + u t 2 u t 2 + 2 u t * u u t 2 1 + u 2 1 + u t 2
According to (A3), the following inequality can be derived by keeping u i fixed for i l ,
ln 1 + i = 1 , i l L u i 2 + u l 2 ln 1 + i = 1 , i l L u i t 2 + u l t 2 u l t 2 + 2 u l t * u l u l t 2 1 + i = 1 , i l L u i 2 + u l 2 1 + i = 1 , i l L u i t 2 + u l t 2
Using (A4) with l = 1 , , L , we derive the following inequality:
ln 1 + i = 1 L u i 2 ln 1 + i = 1 , L u l t 2 i = 1 L u l t 2 + i = 1 L 2 u l t * u l i = 1 L u l t 2 1 + i = 1 L u i 2 1 + i = 1 L u l t 2
According to (A5), we have
ln 1 + i = 1 , i l L θ ^ H G ˜ l w a i 2 ln 1 + c l t c l t + 2 i = 1 , i l L a i w H G ˜ l H θ ^ θ ^ t H G ˜ l w t a i t c l t 1 + c l t 1 + i = 1 , i l L θ ^ H G ˜ l w a i 2
Finally, it is straightforward to obtain R e , l u b by substituting (A2) and (A6) back into (A1). □

References

  1. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  2. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  3. Csiszár, I.; Korner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef] [Green Version]
  4. Yamamoto, H. A coding theorem for secret sharing communication systems with two gaussian wiretap channels. IEEE Trans. Inf. Theory 1991, 37, 634–638. [Google Scholar] [CrossRef] [Green Version]
  5. Fakoorian, S.A.A.; Swindlehurst, A.L. Optimal power allocation for gsvd-based beamforming in the mimo gaussian wiretap channel. In Proceedings of the 2012 IEEE International Symposium on Information Theory Proceedings, Cambridge, MA, USA, 1–6 July 2012; pp. 2321–2325. [Google Scholar]
  6. Chen, X.; Ng, D.W.K.; Gerstacker, W.H.; Chen, H.-H. A survey on multiple-antenna techniques for physical layer security. IEEE Commun. Surv. Tutorials 2017, 19, 1027–1053. [Google Scholar] [CrossRef]
  7. Cui, M.; Zhang, G.; Zhang, R. Secure wireless communication via intelligent reflecting surface. IEEE Wirel. Commun. Lett. 2019, 8, 1410–1414. [Google Scholar] [CrossRef] [Green Version]
  8. Jiang, W.; Han, B.; Habibi, M.A.; Schotten, H.D. The road towards 6g: A comprehensive survey. IEEE Open J. Commun. Soc. 2021, 2, 334–366. [Google Scholar] [CrossRef]
  9. Wu, Q.; Zhang, R. Beamforming optimization for intelligent reflecting surface with discrete phase shifts. In Proceedings of the ICASSP 2019—2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 7830–7833. [Google Scholar]
  10. Chu, Z.; Zhu, Z.; Zhou, F.; Zhang, M.; Al-Dhahir, N. Intelligent reflecting surface assisted wireless powered sensor networks for internet of things. IEEE Trans. Commun. 2021, 69, 4877–4889. [Google Scholar] [CrossRef]
  11. Chu, Z.; Hao, W.; Xiao, P.; Shi, J. Intelligent reflecting surface aided multi-antenna secure transmission. Prog. Artif. Intell. 2020, 9, 108–112. [Google Scholar] [CrossRef]
  12. Chu, Z.; Hao, W.; Xiao, P.; Mi, D.; Liu, Z.; Khalily, M.; Kelly, J.R.; Feresidis, A.P. Secrecy rate optimization for intelligent reflecting surface assisted MIMO system. IEEE Trans. Inf. Forensics Secur. 2020, 16, 1655–1669. [Google Scholar] [CrossRef]
  13. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z.; Zhen, L.; Wong, K.-K. Robust design for intelligent reflecting surface-assisted secrecy SWIPT network. IEEE Trans. Wirel. Commun. 2022, 21, 4133–4149. [Google Scholar] [CrossRef]
  14. Ren, H.; Liu, X.; Pan, C.; Peng, Z.; Wang, J. Performance analysis for RIS-aided secure massive MIMO systems with statistical csi. IEEE Wirel. Commun. Lett. 2022, 12, 124–128. [Google Scholar] [CrossRef]
  15. Yang, Z.; Xu, W.; Huang, C.; Shi, J.; Shikh-Bahaei, M. Beamforming design for multiuser transmission through reconfigurable intelligent surface. IEEE Trans. Commun. 2021, 69, 589–601. [Google Scholar] [CrossRef]
  16. Li, Z.; Chen, W.; He, C.; Bai, X.; Lu, J. Multi-antenna systems by transmissive reconfigurable meta-surface. arXiv 2022, arXiv:2109.05462. [Google Scholar]
  17. Li, Z.; Chen, W.; Cao, H. Beamforming design and power allocation for transmissive RMS-based transmitter architectures. IEEE Wirel. Commun. Lett. 2022, 11, 53–57. [Google Scholar] [CrossRef]
  18. Li, Z.; Chen, W.; Zhang, Z.; Wu, Q.; Cao, H.; Li, J. Robust sum-rate maximization in transmissive RMS transceiver-enabled SWIPT networks. IEEE Internet Things J. 2023, 10, 7259–7271. [Google Scholar] [CrossRef]
  19. Niu, H.; Lin, Z.; Chu, Z.; Zhu, Z.; Xiao, P.; Nguyen, H.X.; Lee, I.; Al-Dhahir, N. Joint beamforming design for secure RIS-assisted IoT networks. IEEE Internet Things J. 2023, 10, 1628–1641. [Google Scholar] [CrossRef]
  20. Wu, Q.; Zhang, R. Intelligent reflecting surface enhanced wireless network: Joint active and passive beamforming design. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018. [Google Scholar]
  21. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. Secrecy rate beamforming for multicell networks with information and energy harvesting. IEEE Trans. Signal Process. 2017, 65, 677–689. [Google Scholar] [CrossRef] [Green Version]
  22. Grant, M.; Boyd, S.P. CVX: Matlab Software for Disciplined Convex Programming. 2014. Available online: http://cvxr.com/cvx (accessed on 14 June 2023).
  23. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z.; Zhang, M.; Wong, K.-K. Weighted sum secrecy rate maximization using intelligent reflecting surface. IEEE Trans. Commun. 2021, 69, 6170–6184. [Google Scholar] [CrossRef]
  24. Ying, S.; Babu, P.; Palomar, D.P. majorization–minimization algorithms in signal processing, communications, and machine learning. IEEE Trans. Signal Process. 2016, 65, 794–816. [Google Scholar]
  25. Li, Q.; Li, C.; Lin, J. Constant modulus secure beamforming for multicast massive MIMO wiretap channels. IEEE Trans. Inf. Forensics Secur. 2019, 15, 264–275. [Google Scholar] [CrossRef]
  26. Jiang, W.; Chen, B.; Zhao, J.; Xiong, Z.; Ding, Z. Joint Active and Passive Beamforming Design for the IRS-Assisted MIMOME-OFDM Secure Communications. IEEE Trans. Veh. Technol. 2021, 70, 10369–10381. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Entropy 25 01102 g001
Figure 2. Simulation setup.
Figure 2. Simulation setup.
Entropy 25 01102 g002
Figure 3. The convergence performance of ADMM and MM algorithms.
Figure 3. The convergence performance of ADMM and MM algorithms.
Entropy 25 01102 g003
Figure 4. The convergence behavior of OA algorithms.
Figure 4. The convergence behavior of OA algorithms.
Entropy 25 01102 g004
Figure 5. The WSSR versus the transmit power.
Figure 5. The WSSR versus the transmit power.
Entropy 25 01102 g005
Figure 6. The WSSR versus the reflective element number.
Figure 6. The WSSR versus the reflective element number.
Entropy 25 01102 g006
Figure 7. TheWSSR versus L.
Figure 7. TheWSSR versus L.
Entropy 25 01102 g007
Figure 8. The WSSR versus pathloss exponent of the IRS–Bobs link.
Figure 8. The WSSR versus pathloss exponent of the IRS–Bobs link.
Entropy 25 01102 g008
Figure 9. The WSSR versus pathloss exponent of the IRS–Eves link.
Figure 9. The WSSR versus pathloss exponent of the IRS–Eves link.
Entropy 25 01102 g009
Table 1. List of main notations in the considered system.
Table 1. List of main notations in the considered system.
SymbolDefinition
Nnumber of ITS elements
Mnumber of IRS elements
F C M × N channel matrix from ITS to IRS
h d , l C N × 1 / g d , l C N × 1 channel vector from ITS to the lth Bob/Eve
h r , l C M × 1 / g r , l C M × 1 channel vector from IRS to the lth Bob/Eve
w C N × 1 beamforming vector of ITS
θ C M × 1 phase shift vector of IRS
s l C confidential message for the lth Bob
a l > 0 power allocation factor for s l
n d , l / n e , l AWGN at lth Bob/Eve
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, S.; Huang, K.; Niu, H.; Wang, Y.; Chu, Z. Weighted Sum Secrecy Rate Maximization for Joint ITS- and IRS-Empowered System. Entropy 2023, 25, 1102. https://doi.org/10.3390/e25071102

AMA Style

Yang S, Huang K, Niu H, Wang Y, Chu Z. Weighted Sum Secrecy Rate Maximization for Joint ITS- and IRS-Empowered System. Entropy. 2023; 25(7):1102. https://doi.org/10.3390/e25071102

Chicago/Turabian Style

Yang, Shaochuan, Kaizhi Huang, Hehao Niu, Yi Wang, and Zheng Chu. 2023. "Weighted Sum Secrecy Rate Maximization for Joint ITS- and IRS-Empowered System" Entropy 25, no. 7: 1102. https://doi.org/10.3390/e25071102

APA Style

Yang, S., Huang, K., Niu, H., Wang, Y., & Chu, Z. (2023). Weighted Sum Secrecy Rate Maximization for Joint ITS- and IRS-Empowered System. Entropy, 25(7), 1102. https://doi.org/10.3390/e25071102

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop