1. Introduction
With the development of wireless communication technology, more and more private information is transmitted through public channels, which increases the risk of information leakage. Numerous studies have been conducted on physical layer security in wireless communication [
1,
2,
3]. However, the security rate of traditional secure communication methods is limited when the eavesdropper’s interference signal power is high [
4]. To break this limit, an intelligent reflecting surface (IRS) can be combined with backscatter technology and integrated into the wireless communication system. The integration of backscatter in IRS can enhance the communication security of the system by utilizing the power of the interference signal emitted by the active eavesdropper. The signal reflected by the IRS can reduce the impact of the eavesdropper’s interference signal and strengthen the required signal received by the legitimate user. This dual capability enhances the reliability of communication, fortifying the received signal quality for legitimate users in the system.
The IRS is capable of reflecting incident wireless signals, as a plane containing numerous passive reflecting elements constitutes it. As the demand for enhanced performance in various wireless communication systems continues to rise, there is a simultaneous increase in expectations for advanced wireless communication technologies. Beyond merely seeking an improved performance, there is a growing demand for solutions that offer low deployment costs and minimal power consumption. In response to this demand, intelligent reflecting surface technology has emerged. This technology aims to effectively enhance the performance of wireless communication systems while adhering to the requirements of cost effectiveness and energy efficiency. Each reflecting element of IRS has the capability to apply a phase shift to the incident signal, and when acting in unison, all reflective elements can jointly adjust their phase shifts [
5]. The IRS is extensively used in wireless communications to enhance the communication performance in various ways [
6]. By adaptively adapting the amplitude and phase shift of the reflective elements, the IRS can reconfigure the wireless propagation environment and enhance the desired signals [
7,
8,
9], thereby effectively addressing channel fading and interference. Through the collaborative design of transmission beamforming at the transmitter and reflective beamforming at the IRS, communication systems assisted by IRS can achieve optimal transmission power [
10,
11] and maximum energy efficiency [
12,
13]. The system performance of IRS-assisted non-orthogonal multiple-access and orthogonal multiple-access networks for downlink and uplink transmission is described [
14]. In practical application, the IRS stands out due to its light weight, low deformation, and flexible size adjustment. These characteristics simplify the installation and disassembly processes, allowing for easy and adaptable deployment. IRS can serve as an auxiliary device in wireless communication systems and can be flexibly integrated into it, with high compatibility.
1.1. Motivation and Contributions
The integration of ambient backscatter and IRS is explored across various communication scenarios. A hybrid device-to-device (D2D) communication paradigm is introduced to consider the impact of environmental factors on communication performance [
15]. A new scheme has been designed to improve the error rate performance of environmental backscattering by using an IRS located in its proximity [
16]. A framework based on deep reinforcement learning has been proposed to jointly optimize IRS and reader beamforming, which can promote effective environmental backscatter communication [
17]. Motivated by these studies, we propose a novel approach, called BackCom-IRS, that utilizes the combination of IRS and backscatter to improve secure communication and mitigate the effects of eavesdropping. This research aims to maximizing the signal-to-interference-plus-noise ratio (SINR) at the legitimate user under the allowable maximum SINR at the eavesdropper via the proposed scheme to combat active eavesdropping.
Specifically, our proposed approach, BackCom-IRS, leverages the power of interference signals through backscattering to improve the security communication rate, with higher eavesdropper power leading to greater benefits for secure communication. This paper proposes a method to enhance system security by limiting the SINR at the eavesdropper. Meanwhile, we jointly optimize the IRS reflection coefficient and the source beamforming vector to maximize the SINR at the legal user. The optimization problem is non-convex so it is challenging to solve the optimization problem. To solve the non-convex optimization problem, we developed an alternation optimization algorithm. Transform the optimization problem into two convex problems and then optimize each of them alternatively. These two convex problems are positive semi-definite programs that can be solved using existing convex optimization solvers. The eavesdropper in this paper passively eavesdrops and sends interference signals. By leveraging the power of the interference signal through backscattering, the proposed scheme improves the legal user’s SINR. Simulation results prove the efficacy of the BackCom-IRS approach in enhancing communication system security.
1.2. Organization
The rest of the paper is structured as follows.
Section 2 discusses the related works.
Section 3 presents the system model and optimization problem formulation. The alternating optimization method is presented in
Section 4.
Section 5 presents numerical results and discussion. Finally, the conclusion and future work is drawn in
Section 6.
2. Related Works
The use of the IRS can increase the data rate of legitimate receivers while reducing the data rate of eavesdroppers, thereby enhancing the system’s security rate. The prevalent strategies for mitigating eavesdropping attacks such as artificial noise (AN) [
1] and multi-antenna beamforming [
2] suffer from high energy consumption, additional hardware costs, or optimization difficulties due to the high correlation between legitimate and illegitimate links. To maximize the security rate, Yu et al. jointly optimized the transmitted information beam, AN, and reflection coefficient [
18]. Cui et al. investigated how to maximize the security rate of the communication system when the transmission power is fixed, and the reflection parameters set at the IRS are limited [
4]. Shen et al. maximized the security rate of the multi-input single-output (MISO) communication via joint majorization of the emission covariance at the source and the phase shift matrix at the IRS [
19]. A secure wireless body area networks’ (WBAN) transmission scheme based on IRS-assisted reinforcement learning is proposed, which enables coordinators to jointly optimize sensor encryption keys and transmission power, as well as IRS phase shift combat active eavesdropping [
20]. This scheme also involves the balance of secure transmission games between coordinators and eavesdroppers, which is not covered in the system model studied in this paper.
The uniqueness of the backscatter channel provides important insights into the physical layer security of communication systems [
3]. In backscatter communication systems, a backscatter transmitter modulates and reflects received radio frequency (RF) signals to transmit data, rather than generating RF signals independently [
21]. This unique mechanism presents distinct challenges and opportunities for securing information transmission. Backscatter communication is generally categorized into three types: monostatic backscatter communication, bistatic backscatter communication, and ambient backscatter communication [
22]. Ambient backscatter communication utilizes available ambient RF sources in the environment [
23,
24]. The characteristics of backscatter channels can be utilized to generate security keys. The unique features of backscatter communication can be used to establish security keys and thus enhance the security of the communication system. A lightweight cryptography-based approach to address the security of backscatter communication is presented in [
25]. Ambient backscatter communication, which utilizes existing RF signals in the environment, can be leveraged for secure key generation. The randomness and variability in ambient signals can be used to generate cryptographic keys, enhancing the security of communication between devices. Although cryptography can achieve better security performance, it has limitations that rely on key generation, which can result in high communication overhead and computational complexity [
3]. In order to break these limitations, research on physical layer security suitable for the characteristics of backscatter channels has been developed. The method of physical layer security is to utilize the characteristics of wireless channels to prevent eavesdroppers from obtaining information from transmitters. Physical layer security can be not only an alternative to cryptography but also a complement to enhance encryption technology. In addition, injecting artificially generated noise can deteriorate the eavesdropper’s channel conditions to enhance secure transmission [
26].
Backscatter communication systems can use jamming to enhance security. The presence of interference in the backscatter channel can provide a diversity of communication paths, and the diversity of paths may make it more challenging for eavesdroppers to jam communications. Since backscatter devices utilize ambient signals or dedicated sources in the environment, they may not be as susceptible to traditional jamming techniques. This resilience contributes to the security of the communication link. The maximization of confidentiality in multi-input multi-output (MIMO) backscatter wireless systems is investigated by jointly optimizing the power supply of the injected AN and the precoding matrix [
27]. An interference-based multi-tag scheduling method is proposed, which selects one tag for data transmission and another for AN generation to have a deleterious effect on the eavesdropper [
28]. Backscatter systems can be designed to be resilient to traditional eavesdropping methods, offering a more secure communication channel. Backscatter communication can be used for secure localization and authentication in applications where device positioning and identity verification are critical. Backscatter communication is well suited for Internet of Things (IoT) applications where security and energy efficiency are crucial due to the low-power nature of backscatter devices. The researches of [
29] provided an optimization framework that maximizes the secrecy rate of backscatter communications in multi-cell non-orthogonal multiple access networks and the reflection coefficients of the backscatter nodes are optimized for the presence of multiple eavesdroppers in each cell. To summarize, the inherent characteristics of backscatter communication systems, including their low power consumption, resistance to jamming, and adaptability to the RF environment, provide opportunities to enhance security in diverse applications, ranging from IoT networks to secure key generation. The combination of IRS and backscatter has been shown to have advantages in suppressing interference signals [
30].
IRS [
4,
18,
19,
20] and backscatter [
27,
28,
29] have demonstrated good performance, respectively, in physical layer security across various communication scenarios. As mentioned in the above works, the combination of IRS and backscatter has been developed to enhance the communication performance [
15,
16,
17,
30]. In secure communication, this combined technology deserves more in-depth research, especially under different communication scenarios. In this paper, the proposed scheme is developed for a MISO communication system to enhance communication security by combating active eavesdropping. We jointly optimize the transmission power of the transmitter and the reflection coefficient of the IRS to maximize the SINR of the legal user.
3. System Model and Optimization Problem Formulation
Consider an IRS-based backscatter wireless communication system countermeasure against active eavesdropping, as shown in
Figure 1. A source (Alice), an IRS, a legitimate user (Bob), and an eavesdropper (Willie) constitute the communication system of this paper. In this system, Alice continuously transmits information to all directions. Willie is sending interference signals to prevent Bob from receiving the required signals to eavesdrop. Generally, the stronger the interference signals from an eavesdropper like Willie, the lower the communication system security is, which needs the IRS to enhance this system’s security. The IRS, as a transmitter, aims to convert all received signals into desired signals through backscattering. The signal processed by IRS uses the interference signal from Willie to ensure the communication safety of legal user Bob. The number of antennas equipped by Alice is N, while Willie and Bob are equipped with one antenna each. IRS has L elements. It is assumed that all channels in the system experience quasi-static flat fading. Additionally, we consider that the channel state information (CSI) of all the involved channels in the system is precisely and accurately known in order to determine the limit of the security rate. We assume the frequency is non-selective and constant in each fading block.
The channel gains from Alice to Bob, from the IRS to Bob, from Willie to Bob, from Willie to the IRS, from Alice to the IRS, from the IRS to Willie, and from Alice to Willie are represented by the following notations:
,
,
,
,
,
, and
. The beamforming vector used by Alice to transmit the desired signal
s is denoted by
, while the beamforming vector used by Willie to transmit the interference signal
a is represented by
. The signals
s and
a represent the transmitted signals from Alice, the legitimate transmitter, and Willie, the eavesdropper, respectively. In addition,
and
.
and
represent the Gaussian white noise at Bob and Willie, respectively. These noises have zero mean and variances of
and
, respectively. The amplitude and phase shift incurred by the
l-th reflective element of the IRS are represented by
with
,
and
. In this model, we do not consider the interaction of IRS-neighboring reflective units and assume that each IRS reflective unit reflects the signal independently. Due to strong path loss, we overlook signals that were reflected multiple times by the IRS. After the above design and construction of the whole system, the received signals at Bob and Willie can be respectively formulated as
In this system, the backscattering of signals through IRS does not need to distinguish the source signal
s and the interference signal
a. The goal of this system is to maximize the SINR at Bob
while we constrained Willie’s SINR
by setting the maximum value. The transmit powers at Alice and Willie are represented as
and
, respectively. Define
. The problem of this system is expressed as
The SINR at Bob is primarily dependent on two key variables: the beamforming vector
w used by Alice and the reflection coefficient vector
utilized by the IRS. The SINR at Willie is formulated as
The goal of this system model is to jointly optimize the transmission power of the transmitter and the reflection coefficient of the IRS to maximize the SINR of the legitimate user Bob, while considering the constrain that the signal-to-interference-plus-noise ratio of the eavesdropper is below the threshold. The optimization problem in this model is non-convex. To solving this optimization problem involves transforming problem (3) into a quadratically constrained quadratic programming (QCQP) problem. Subsequently, finding a sub-optimal solution to problem (3) involves employing Alternating Optimization (AO) optimization methods.
4. Alternation Optimization
We develop an alternating optimization algorithm to solve problem (3). Due to the coupling between the variables and w, directly solving the non-convex problem (3) can be challenging. Specifically, we address this non-convex problem by iteratively solving two sub-problems: sub-problem 1, which focuses on optimizing the beamforming vector w with a fixed reflection coefficient vector , and sub-problem 2, which focuses on optimizing with a fixed w.
Before optimizing these two sub-problems respectively, we need to convert the objective function equivalently. Since
, that expression can be converted to
and
. Then Equation (8) is transformed as:
letting
and
. Convert expression (6) to
assuming
. Letting
, and
, expression (7) can be transformed into
Therefore, the objective equation can be deduced as
Similarly, for the expression for the SINR at Willie, we transform it in the same way.
letting
,
,
,
and
.
Define
,
, rank
, rank
,
,
. Then problem (3) is reformulated as
We transform problem (14) into its relaxed form by removing the constraints of rank
and rank
. Subsequently, problem (14) is more tractable and can be solved using convex optimization techniques. This relaxation allows for a wider range of solutions. In addition, (14) can be expressed as
Sub-problem 1 is transformed into optimizing under the condition of given . Sub-problem 2 is transformed into optimizing with fixed .
(sub-problem 1) When
is given,
(sub-problem 2) When
is given,
The two subproblems resulting from the relaxation are convex. We can converge to an optimized solution for and through iteratively solving the relaxed sub-problems 1 and 2 alternately. The above problem currently is a convex-positive semi-definite program (SDP), and it can be efficiently solved using existing convex optimization solvers. If and are rank 1, restore and using singular value decomposition (SVD). When using the SVD for rank reduction, we can choose to keep the first few largest singular values and set the others to zero. This will result in a lower rank approximation, but not usually a complete reduction to rank one. A rank-one solution is a special case and is unlikely to be realized in the general case. In other cases, recover the approximate solution and using the standard Gaussian randomization method. This randomization method provides an approximate solution and is particularly useful when dealing with matrices of higher rank. The quality of the approximation depends on the properties of the original matrices and the size of the random matrix.
According to the above analysis, we recapitulate the overall algorithm for problem (3) as Algorithm 1. The objective value of optimizing problem (3) is represented by
with variables
and
in the k-th iteration, while
denotes a small threshold set to 0.001. The alternating optimization algorithm has many applications in wireless communication [
4,
5,
18]. Algorithm 1 always converges, as the objective value is non-decreasing over iterations and has a finite upper bound.
Algorithm 1 Algorithm for Solving Problem (3)–(6) |
- 1:
Initialization: Set , . Input variables: . - 2:
Compute ; , according to (14). - 3:
repeat - 4:
Set . - 5:
With given , optimize the sub-problem 1, by (13). - 6:
With given , optimize the sub-problem 2, by (14). - 7:
Compute . - 8:
until. - 9:
Recover rank-one approximate solution output variables and .
|
5. Numerical Results and Discussion
In order to evaluate the security of the proposed approach in this paper, numerical simulations were conducted on an IRS-assisted backscatter communication system. Additionally, for comparative analysis, this paper also provides several different schemes.
The first scheme considers the transmission scenario of a traditional wireless communication system that does not incorporate an IRS, which is expressed as Without-IRS. By comparing the performance of the IRS-assisted system against this Without-IRS scenario, we can evaluate the added benefits or improvements brought by the IRS. The optimization for this scheme is specifically for the beamformer . Therefore, it may not take advantage of the additional capabilities that an IRS can offer in terms of enhancing communication links, mitigating interference, or improving the overall system performance.
The second scheme is the wireless communication system assisted by passive reflection IRS, which is denoted by Reflection-IRS. This scheme involves the integration of an IRS into the wireless communication system. In this system, the IRS acts as a passive relay, reflecting signals to enhance communication links. This scheme jointly optimizes the IRS reflection coefficient and the source beamformer . The optimization process considers both the reflection properties of the IRS and the beamforming at the source. In contrast, the difference in the scheme proposed in this paper is that the IRS in the backscatter system utilizes the interference from the eavesdropper to enhance the receiving power of the legitimate user. This scheme is used to compare the effects of backscatter technology for IRS-assisted communication systems.
The third scheme involves only optimizing the reflection coefficient vector of the IRS using the maximum ratio transmission (MRT), referred to as MRT-IRS. In this approach, the beamforming vector of the source is not involved in optimization. The primary optimization in the MRT-IRS scheme is directed towards the IRS reflection coefficient vector. The goal is to maximize the received signal power at the legal user by adjusting the IRS reflections. By optimizing only the IRS reflection coefficients and not involving the source beamforming vector, it provides a reference for evaluating the impact of IRS reflections alone on the system performance. This scheme simplifies the optimization process and could limit the overall performance compared to schemes that optimize both the source and the IRS.
The last scheme is a relay. By introducing a relay with a set number of antennas and specific transmit power, the performance of this relay-based system can be compared with the IRS-assisted system. This scheme employs a relay with four antennas in place of the IRS, and its position is set to be identical to the IRS in the BackCom-IRS approach for comparison purposes. This positioning ensures a fair and relevant comparison between the two approaches. Unlike the IRS-assisted system, which primarily reflects signals to enhance communication, the relay scheme actively amplifies and forwards signals. The transmit power of this relay is denoted by .
The link from Alice to Willie is modeled as a slow-fading Rayleigh channel. The channel gain from the IRS to Bob follows a Rician distribution with a Rician factor of 3 on a small scale. The path loss model for all channels in the system is denoted by
dB. The path loss at the reference distance of
and
= 1 m is denoted by
= −30 dB. The transmit power at Alice is
= 9 dBW. The transmit power of relay is
= 0.1 W. The noise variance is
. The distances from Alice to Bob, Alice to the IRS, Alice to Willie, the IRS to Bob, Willie to Bob, and Willie to the IRS are
= 60 m,
= 55 m,
= 55 m,
= 15 m,
= 15 m, and
= 15 m, respectively. The summary of the parameters is presented in
Table 1.
Figure 2 shows the SINR at user Bob in the BackCom-IRS scheme as a function of the iteration number t under randomly generated observations. It represents a typical result selected from several generated observations. In this case,
dBW,
. As the iterations progress, the SINR at the legal user Bob tends to stabilize. When the number of iterations reaches ten, the objective function converges to
and the convergence is monotonically increasing.
Figure 3 shows that the SINR at Bob changes with the transmission power of the eavesdropper Willie. It can be seen from this figure that the SINR at Bob decreases as
increases. Increasing the transmission power at the eavesdropper Willie is detrimental to the user’s received information. Higher transmission power of the eavesdropper negatively affects the communication link to user Bob. The proposed scheme outperforms the MRT-IRS scheme, traditional reflection IRS scheme, Relay scheme, and Without-IRS scheme, as demonstrated in the simulation results. This implies that, even under conditions of increased eavesdropper power, the proposed scheme is more effective in maintaining a satisfactory SINR at user Bob. Especially in comparison to the conventional reflection-IRS, the IRS with integrated backscatter exhibits a more substantial difference in the SINR as the eavesdropper’s transmit power increases. This implies that backscatter technology can enhance the security of IRS-assisted communication systems. The detailed numerical results presented in
Figure 3 are available in
Appendix A Table A1. In [
4,
31], as the transmit power at Tx increases, IRS-assisted systems exhibit better secrecy rate gains. In [
14], the downlink network IRS-aided system has better performance than full-dupl decode-and-forward relay (FDR)-aided system in the high signal-to-noise ratio (SNR). In the low-SNR, the IRS transmission experiences severe path loss and performs worse than FDR-aided systems.
Figure 4 illustrates how the SINR at Bob is affected by the total number of reflective elements
L at the IRS. This figure shows that the SINR at Bob increases as the number of elements
L increases. The number of IRS elements does not affect the Without-IRS and relay scheme. At first, the relay scheme and the without-IRS scheme will be better than the scheme proposed in this paper. As the number of IRS components increases, the scheme proposed in this paper will achieve higher performance gains than other schemes. This implies that a larger number of elements in the IRS contributes positively to the security of the wireless communication system. Both [
31,
32] indicate that adding more IRS reflective elements is beneficial for improving the secrecy rate in the IRS-assisted system. When the number of reflecting elements is small, the received signal at legal user Bob is dominated by the direct link other than the IRS-assisted link. The performance differences between the proposed scheme and the MRT-IRS scheme increase with the reflecting elements of IRS. This indicates that as the number of reflective elements increases, the joint optimization of the beamforming vector of the source and the reflection coefficient of the IRS becomes more flexible, and the performance gain also becomes higher. The detailed numerical results presented in
Figure 4 are available in
Appendix A Table A2.