Next Article in Journal
Hierarchical Image Quality Improvement Based on Illumination, Resolution, and Noise Factors for Improving Object Detection
Previous Article in Journal
Dynamic Spatio-Temporal Hypergraph Convolutional Network for Traffic Flow Forecasting
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Physical Layer Security in RIS-NOMA-Assisted IoV Systems with Uncertain RIS Deployment

1
Kangda College of Nanjing Medical University, Lianyungang 222000, China
2
School of Information Science and Technology, Nantong University, Nantong 226019, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(22), 4437; https://doi.org/10.3390/electronics13224437
Submission received: 17 October 2024 / Revised: 9 November 2024 / Accepted: 11 November 2024 / Published: 12 November 2024

Abstract

:
Reconfigurable intelligent surfaces (RISs), as an emerging radio technology, are widely used to expand the transmission distance and structure cascade channels to improve the performance of communication systems. However, based on the continuous development of wireless communication technology, as Internet of Vehicles (IoV) communication systems assisted with RIS and non-orthogonal multiple access (NOMA) can improve the overall transmission rate and system performance, the physical layer security (PLS) issue has gradually attracted attention and has become more and more important in the application of the system. In this paper, our aim is to investigate the potential threats for PLS, where an RIS is utilized in order to improve the security of wireless communications. In particular, we consider the non-fixed RIS location and wiretapping behavior of eavesdroppers on the data in this work, and further analyze the maximum safe-rate for above location assumptions. Numerical results reveal that RIS provides significant advantages on security performance, as well as providing a useful reference for the security design of future wireless communication systems, which verify the correctness of our analysis and the effectiveness of the proposed scheme.

1. Introduction

With the development of vehicle networking systems, wireless transmission coverage, high energy efficiency and secure communication have become the primary tasks of evaluating vehicle networking communication systems [1,2]. For the Internet of Vehicles (IoV), they can share information not only with infrastructure (e.g., roadside units (RSUs) through vehicle-to-infrastructure (V2I) communication), but also with vehicles through vehicle-to-vehicle (V2V) communication [3]. In addition, automatic driving, intelligent driving-assist systems, traffic flow and urban traffic management also bring exponential growth of massive data and computing resources consumption. Critical and real-time collaborative control messages require strict delay restrictions, while the transmission of multimedia entertainment application information can accommodate a certain degree of delay, which poses a great challenge for managing the interaction of vital information, task unloading and realizing large-scale model (LSM)-based decision-making across many heterogeneous nodes within the framework of the Internet of Vehicles [4]. The wide applications of the IoV based on artificial intelligence (AI) have aroused significant concern about the IoV, which involves heterogeneous computing-intensive and delay-intolerant tasks. The on-board resources of consumer vehicles cannot meet such requirements, so researchers introduced the technology of multiple-access edge computing (MEC), which can expand the computing power of vehicle networks by allowing vehicles to offload some tasks to MEC servers. The authors in [5] minimize energy consumption, and develop a method based on deep reinforcement learning (DRL) to offload tasks to roadside units (RSUs) or other vehicles. Similarly, the authors in [6,7] use the method based on DRL to unload tasks. In addition, the coverage of wireless communication networks based on high-cost base stations (BSs) is still limited, and it is impossible to provide continuous, reliable and high-throughput basic services [8,9]. Therefore, there are obvious technical obstacles to realize reliable and extensible wireless transmission in the IoV, which imposes great restrictions on the deployment of the above-mentioned intelligent vehicles and transportation systems.
As a novel wireless communication technology, RISs can utilize a series of reflective elements to modulate electromagnetic wave signals and transmit them to the receiver; thus, they can effectively assist the communication between the transmitter and the receiver. For example, when the user is in an environment with poor communication quality, the RIS deployed in the surrounding area can reflect the signal to the required position to assist communication. Compared with the traditional antenna and base station technology, RISs have higher spectral efficiency, lower power consumption and better privacy [10,11]. In order to ensure low latency, the IoV needs ubiquitous ultra-reliable, low-latency and high-speed wireless communication. In this respect, RIS-assisted communication is a revolutionary way to improve the quality of wireless communication by adjusting the wireless propagation path [12]. RISs can reconstruct the wireless channel by using electromagnetic elements to manipulate incident waves, thus enhancing the system throughput and improving the quality of service (QoS) of edge users [13,14]. Although BSs are the central hub of information exchange, they may not be able to achieve full coverage in urban application scenarios. Some RISs are deployed in a fixed configuration, while others are flexibly and adaptively configured by drones to adapt to the complexity of wireless channels [15,16,17]. On the basis of this framework, all vehicles in the IoV as terminal nodes can not only effectively transmit key information, but also offload local computing tasks to the edge or cloud server for processing. However, the hybrid architecture integrating RISs and BSs requires advanced hybrid beamforming, including digital beamforming at BSs and analog beamforming at passive RISs, thus maximizing system throughput and reducing mutual interference. In addition, the combination of RISs and non-orthogonal multiple access (NOMA) can further improve the performance of these systems.

1.1. Related Work

In recent years, the rational use of secure channel capacity has become a focus of discussion among researchers and scholars [18,19], where the secrecy capacity of the transmitted data is investigated and the system is able to reach the maximum transmission rate between a legitimate transmitter and receiver, but this scheme is subject to the limitations of the information available to unauthorized receivers. The authors of [18] proved that for discrete memoryless channels, the perfect secrecy capability is actually the difference in capacity between two users and generalized similar results to Gaussian channels [20]. A study considered the case of full channel state information (CSI), where the transmitter has access to the channel gains of both the legitimate receiver and the eavesdropper, and this secrecy capacity under the full CSI assumption was used as an upper bound on the secrecy capacity when only the CSI of the legitimate receiver is known on the transmitter. The authors of [21] also proposed a low-complexity on or off power allocation scheme that achieves near-optimal performance using only the primary channel CSI. More specifically, the scheme is shown to be asymptotically optimal when the average signal-to-noise ratio (SNR) reaches infinity, achieving the secrecy capability assumed by full CSI. All the above studies show that channel fading has a positive effect on the secrecy capability and rate adaptation based on channel CSI. Therefore, PLS as a technology based on the physical characteristics of the communication channel to protect the security of the communication system has gradually become an important research direction in the field of information security. PLS techniques utilize the physical characteristics of the communication channel, such as signal attenuation, multipath propagation, and time-varying properties, to design security mechanisms that enhance the security of the communication system during the transmission of data [22]. Researchers are committed to continuously improving the performance and reliability of PLS techniques to cope with increasingly complex and diverse security threats. In [23], the authors utilized RIS to tackle threats faced by vehicles (e.g., leaked data, hack attack, and jammer). The authors also proved that the security of IoV systems could be ensured with enough RIS elements. In [24], the PLS for RIS-aided vehicle-to-vehicle (V2V) wireless systems was investigated and two eavesdropping models were introduced. It was demonstrated that the optimizations of the RIS location and elements number could significantly improve the security of IoV environments, as well as actively deal with the challenges of eavesdroppers. And the features of PLS can effectively deal with some of the challenges faced by traditional cryptography, such as key management and side-channel attacks, as well as provide additional security guarantees. Currently, the commonly used PLS schemes are non-orthogonal multiple access (NOMA) [25], artificial noise (AN), and cooperative jamming [26].
Since eavesdroppers are unable to decode the information correctly after eavesdropping the data, researchers often employ artificial noise generation at the transmitter to reduce the quality of the received data for eavesdroppers [27,28] and to improve the security and reliability of the communication system. For some application scenarios, real-time generation, injection and processing of artificial noise signals are required, which need to be supported by corresponding hardware resources, increasing the system cost and energy consumption, in order to avoid excessive introduction of noise leading to degradation of communication quality or insufficient security enhancement. Recently, NOMA has been considered as a promising technology, which can improve the spectrum and energy efficiency [29]. The advantage of NOMA is that it can accommodate more users on the same resource block, use superposition coding at the sending terminal and continuous interference cancellation at the receiving terminal [30], which can reduce the interference of users with better channel quality to users with weaker channel quality, thus improving user fairness and reducing the probability of channel blockage in the IoV. Based on various channel conditions required by NOMA, RIS can be used for the intelligent control of random channels, which has been further discussed in recent research. However, most of these works do not consider in detail the influence of the number of RIS components on the safe-rate of data transmission under the NOMA principle.

1.2. Motivations and Contributions

In the RIS-NOMA-assisted IoV communication system, the secrecy capability can be significantly improved even in the presence of eavesdroppers. RIS can help to suppress the interference of communication signals by malicious eavesdroppers by adjusting the characteristics of the reflected signals, thus improving the security of the system [31]. RIS is also able to optimize the transmission path of the signals to reduce the signal leakage and the possibility of eavesdropping, as well as enhance the security of the channel links. In previous studies, the location of RIS is often fixed and unchanged, and how location change of the RIS can not only affect the quality of data transmission to users, but also further affect the overall safe-rate and performance of data transmission in the presence of eavesdroppers is not considered. For this reason, it is necessary to explore the impact of RIS location changes on the overall security rate of the system so as to maximize the security rate of data transmission for legitimate users.
  • We propose an RIS-NOMA system consisting of a remote user, a near user and an eavesdropper, in which the eavesdropper wiretaps on the data transmission over the wireless channel. The maximum security rate under different RIS positions is analyzed and derived.
  • The balance between the RIS deployment location and the channel security rate is investigated, and a trade-off between between the locations of far and near users is also considered.
  • Numerical results verify the correctness of our analysis as well as the effectiveness of the proposed scheme, which provides a significant improvement in terms of the safe-rate.

2. System Model and Proposed Scheme

This work considers an RIS and NOMA-assisted secure communication system, as shown in Figure 1, which consists of the transmitting source (S), the RIS, two legitimate users D 1 and D 2 , and an eavesdropper E. For the channel model, we assume that all nodes are equipped with single antenna, considering that S and D 1 , D 2 are known to the eavesdropper to wiretap on the desired data X within a long distance. With X = x 1 + x 2 , the valid data received by D 1 are x 1 , and the valid data received by D 2 are x 2 . Clearly, since the data received by D 1 and D 2 are both on the broadcasting channel, the safe-rate is extremely low. As the element size of RIS is much smaller than the RF signal wavelength, the elements are able to reflect the incident signal to each direction with constant gain. Furthermore, each element of the RIS is intelligently controllable, and the reflecting elements can control the phase shift.
As shown in Figure 1, the direct channels from S to RIS, user D 1 , user D 2 and eavesdropper E are, respectively, expressed as h i , i = { S R , S D 1 , S D 2 , S E } ; the reflection channel of RIS is h j , j = { R D 1 , R D 2 } . In the model, user D 2 is considered to be further away from the transmitter than user D 1 ; thus, the channel gain of h S D 2 ( H 2 ) is considered to be less than h S D 1 ( H 1 ) . · represents the norm of the vector. The angle of the RIS deployment position relative to the emission source is θ in [0,180]. Because the NOMA scheme will actively consider the fairness of users, there will be differences in setting the power distribution coefficients. The power distribution factors of service user D 1 and user D 2 are a 1 and a 2 , a 1 + a 2 = 1 , and the transmission data at S is X = a 1 x 1 + a 2 x 2 , where x 1 and x 2 are the expected signals of D 1 and D 2 , respectively.

2.1. Power Allocation Discussion

2.1.1. Power Allocation Strategy with a 1 < a 2

In this section, to ensure fairness among users, we discuss power allocation for two different situations. When a 1 < a 2 , the RIS is equipped with n fixed elements to serve different users with the same number of elements. The channel gains from the transmitter S to the RIS and from the RIS to user D 1 are h S R C N × 1 , h R D 1 C N × 1 . Similarly, the channel gains from S to RIS and RIS to D 2 can be expressed as h S R C N × 1 , h R D 2 C N × 1 . In addition, it is assumed that all channels experience Rayleigh fading distribution, and the signals received by users D 1 and D 2 can be expressed as
y D 1 = ( a 1 P x 1 + a 2 P x 2 ) ( h S D 1 + h R D 1 H Θ 1 h S R ) + n D 1 ,
y D 2 = ( a 1 P x 1 + a 2 P x 2 ) ( h S D 2 + h R D 2 H Θ 2 h S R ) + n D 2 ,
where P is the transmission power at S, x 1 and x 2 are the transmitted data, E [ | x | 2 ] = 1 , and the phase shift matrix of RIS at user D 1 is Θ 1 = α d i a g ( e j ϕ 1 , , e j ϕ N ) . The phase shift matrix at user D 2 is Θ 2 = α d i a g ( e j ψ 1 , , e j ψ N ) , α ( 0 , 1 ] is the amplitude reflection coefficient. The additive white Gaussian noise (AWGN) at both D 1 and D 2 is characterized by a mean value of zero and a variance of σ 2 .
In the communication system assisted by RIS-NOMA, according to the decoding principle of NOMA, user D 1 will first decode x 2 with x 1 as interference. After successfully decoding x 2 , user D 2 decodes x 1 through SIC. Therefore, the SNRs of user D 1 and user D 2 can be, respectively, given as
γ D 1 , x 2 = a 2 P | h S D 1 + h R D 1 H Θ 1 h S R | 2 a 1 P | h S D 1 + h R D 1 H Θ 1 h S R | 2 + σ 2 ,
γ D 1 , x 1 = a 1 P | h S D 1 + h R D 1 H Θ 1 h S R | 2 σ 2 ,
γ D 2 , x 2 = a 2 P | h S D 2 + h R D 2 H Θ 2 h S R | 2 a 1 P | h S D 2 + h R D 2 H Θ 2 h S R | 2 + σ 2 .
Similarly, the SNR of eavesdropper is γ E , x 1 = a 1 P | h S E | 2 σ 2 , γ E , x 2 = a 2 P | h S E | 2 a 1 P | h S E | 2 + σ 2 . Therefore, the achievable rates for the received data x 1 and data x 2 are, respectively, expressed as
R x 1 = E { log 2 ( 1 + γ D 1 , x 1 ) } ,
R x 2 = E { log 2 1 + m i n ( γ D 1 , x 2 , γ D 2 , x 2 ) } ,
where E [ x ] is the expected value of x; the eavesdropping rates on data x 1 and data x 2 by the eavesdropper are as follows:
R E x 1 = E { log 2 1 + γ E x 1 } ,
R E x 2 = E { log 2 1 + γ E x 2 } .
Finally, the secrecy rate of data x 1 and data x 2 can be further obtained as
R S x 1 = R x 1 R E x 1 = [ log 2 ( 1 + γ D 1 , x 1 ) log 2 ( 1 + γ E x 1 ) ] + ,
R S x 2 = R x 2 R E x 2 = [ log 2 ( 1 + m i n ( γ D 1 , x 2 , γ D 2 , x 2 ) ) log 2 ( 1 + γ E x 2 ) ] + ,
where [ x ] + = m a x ( 0 , x ) . Then, the secrecy sum-rate of the data can be obtained
R S = R S x 1 + R S x 2 .
In the communication system with NOMA, in order to ensure fairness, a larger power allocation factor will be assigned to the poor channel, and a 1 + a 2 = 1 . When a 1 < a 2 , the user D 1 is closer to the transmitting source, and when a 1 < a 2 , the channel gain can be expressed as h S D 1 > h S D 2 , h R D 1 > h R D 2 . Therefore, it can be further deduced from Equations (3)–(5) as γ D 1 , x 2 > γ D 2 , x 2 , m i n ( γ D 1 , x 2 , γ D 2 , x 2 ) = γ D 2 , x 2 , so Equation (11) can be rewritten as follows:
R S x 1 = [ log 2 ( 1 + γ D 1 , x 1 ) log 2 ( 1 + γ E x 1 ) ] + ,
R S x 2 = [ log 2 ( 1 + γ D 2 , x 2 ) log 2 ( 1 + γ E x 2 ) ] + .
Thus, Equation (12) can be further written as
R s = log 2 1 + γ D 1 , x 1 1 + γ E , x 1 + log 2 1 + γ D 2 , x 2 1 + γ E , x 2 = log 2 1 + γ D 1 , x 1 1 + γ D 2 , x 2 1 + γ E , x 1 1 + γ E , x 2 .

2.1.2. Power Allocation Strategy with a 1 > a 2

In this condition, it can be deduced from Equations (3)–(5) as
γ D 2 , x 1 = a 1 P | h S D 2 + h R D 2 H Θ 2 h S R | 2 a 2 P | h S D 2 + h R D 2 H Θ 2 h S R | 2 + σ 2 ,
γ D 2 , x 2 = a 2 P | h S D 2 + h R D 2 H Θ 2 h S R | 2 σ 2 ,
γ E , x 2 = a 2 P | h S E | 2 | σ 2 ,
γ E , x 1 = a 1 P | h S E | 2 a 2 P | h S E | 2 + σ 2 ,
γ D 1 , x 1 = a 1 P | h S D 1 + h R D 1 H Θ 1 h S R | 2 a 2 P | h S D 1 + h R D 1 H Θ 1 h S R | 2 + σ 2 ,
so it can be further calculated γ D 1 , x 1 > γ D 2 , x 1 , and m i n ( γ D 1 , x 1 , γ D 2 , x 1 ) = γ D 2 , x 1 . Therefore, the secrecy rate of data x 1 and x 2 can be expressed as
R S x 1 = R x 1 R E x 1 = [ log 2 ( 1 + γ D 2 , x 1 ) log 2 ( 1 + γ E , x 1 ) ] + ,
R S x 2 = R x 2 R E x 2 = [ log 2 ( 1 + γ D 2 , x 2 ) log 2 ( 1 + γ E , x 2 ) ] + ,
where [ x ] + = m a x ( 0 , x ) ; then, the secrecy rate can be obtained as
R S = R S x 1 + R S x 2 .
Considering the simple calculation, the Equations (19) and (20) can be directly substituted into Equation (23) as
R s = log 2 1 + γ D 2 , x 1 1 + γ E , x 1 + log 2 1 + γ D 2 , x 2 1 + γ E , x 2 = log 2 1 + γ D 2 , x 1 1 + γ D 2 , x 2 1 + γ E , x 1 1 + γ E , x 2 .

3. Performance Analysis

In this section, because the location of the RIS is not fixed, the channel quality of user D 1 and user D 2 will also change in the process of continuous movement, thus affecting the change in the secrecy rate. In a communication system assisted by RIS-NOMA, since the fairness of users should be guaranteed when transmitting data, the change in the RIS position will also affect the distribution of the channel power by NOMA, so the secrecy rate of the channel is a topic worthy of further discussion. This problem can be solved by simply considering the change in the channel secrecy rate when different power allocation factors are used.

3.1. Ideal Phase Case

It is assumed that the phase shift is optimal, Specifically, h S U + h R U H Θ h S R 2 , U { D 1 , D 2 } can be rewritten as
h S U + h R U H Θ h S R 2 = h S U 2 + h R U H Θ h S R 2 + 2 h R U H Θ h S R h S U cos arg h S U arg h R U H Θ h S R .
From Equation (25), it can be verified that h S U + h R U H Θ h S R 2 is with an optimal result when cos arg h S U arg h R U H Θ h S R = 1 , which implies that the phase shift for both the direct link between the source and destination, as well as the cascaded link is equivalent as arg h S U = arg h R U H Θ h S R . Specifically, h R D 1 H Θ 1 h S R = α i = 1 N e j ϕ i [ h S R ] i [ h R D 1 ] i and h R D 2 H Θ 2 h S R = α i = 1 N e j ψ i [ h S R ] i [ h R D 2 ] i . Therefore, the optimal phase shift can be obtained
ϕ i = arg h S D 1 arg h R D 1 H Θ h S R , ψ i = arg h S D 2 arg h R D 2 H Θ h S R .
Combining the direct channel and the reflection channel, the sum channel gains from source to D 1 and D 2 can be simply expressed as
| h D 1 | 2 = β S D 1 + N α β S R D 1 2 , | h D 2 | 2 = β S D 2 + N α β S R D 2 2 ,
where β S R D 1 = h S R h R D 1 , β S R D 2 = h S R h R D 2 . From the previous chapter, it can be seen that if Equation (23) is directly substituted into Equation (22), it will be difficult to simplify and increase the complexity of calculation. Let ρ = P σ 2 be the transmission SNR, because the proposed system works under the condition of high SNR by default; so, with the condition of ρ 1 , the approximation of 1 + ρ ρ can be used. Therefore, with γ D 2 , x 1 = ρ a 1 | h D 2 | 2 1 + ρ a 2 | h D 2 | 2 a 1 a 2 , γ D 2 , x 2 = ρ a 2 | h D 2 | 2 , γ D 1 , x 1 = ρ a 1 | h D 1 | 2 1 + ρ a 2 | h D 1 | 2 a 1 a 2 , γ E , x 2 = ρ a 2 | h S E | 2 , γ E , x 1 = ρ a 1 | h S E | 2 1 + ρ a 2 | h S E | 2 a 1 a 2 , substitution into Equation (17) can give a simplified formula as
R s log 2 [ ( 1 + a 1 a 2 ) ( 1 + ρ a 2 | h D 2 | 2 ) ( 1 + a 1 a 2 ) ( 1 + ρ a 2 | h S E | 2 ) ] .
Since ρ 1 , we can further deduce R s = log 2 [ | h D 2 | 2 | h S E | 2 ] . Similarly, when a 1 < a 2 , we can obtain R S = log 2 [ | h D 1 | 2 | h S E | 2 ] . It is clear that, for R s and R s , x is constantly bigger than 0. Therefore, according to Jensen’s inequality, for the concave function l o g 2 ( x ) , an explicit closed-form expression for the upper bound of the channel capacity can be derived as
E log 2 ( x ) log 2 E [ x ] .

3.2. Non-Ideal Phase Case

In practice, due to the hardware limitation, the RIS can not achieve ideal phase. Thus, for a 1 < a 2 , we have
γ D 1 , x 1 = a 1 P | h S D 1 + h R D 1 H Θ 1 h S R | 2 σ 2 = a 1 P | h S D 1 + i N [ h R D 1 ] i | h S R | i e j θ i | 2 σ 2 ,
γ D 1 , x 1 = a 1 ρ | h S D 1 + h R D 1 H Θ 1 h S R | 2 = a 1 ρ | | h S D 1 | + i = 1 N h S R i | h R D 1 i e j θ i | 2 = a 1 ρ | h S D 1 + i = 1 N h S R i h R D 1 i cos ( Θ i ) + j i = 1 N h S R i h R D 1 i sin ( Θ i ) | 2 = a 1 ρ | h S D 1 2 + i = 1 N h S R i 2 | h R D 1 i | 2 A + 2 h S D 1 i = 1 N h S R i h R D 1 i cos ( Θ i ) B + 2 i = 1 N 1 k = i + 1 N h S R i h R D 1 i h S R k h R D 1 k cos ( Θ i ) cos ( Θ k ) + sin ( Θ i ) sin ( Θ k ) | C .
The corresponding capacity is given by C D 1 , x 1 = l o g 2 ( 1 + γ D 1 , x 1 ) by which we attempt to obtain the ergodic capacity; so, C D 1 , x 1 = E = C D 1 , x 1 ; it is obvious that | β S D i | following the exponential distribution with parameters d S D 1 α , d S R α , d R D 1 α and d S E α . Where the | β i | = | h i | 2 , and | h i | obey Rayleigh fading with parameters 1 2 d i α 2 , for i = S D 1 , S R , R D 1 , S E . The secrecy rate of D 1 in c a s e 1 can thus be obtained from
R s log 2 ( 1 + E ( A ) + E ( B ) + E ( C ) ) log 2 ( 1 + E ( γ E ) ) .

4. RIS Deployment Analysis

In this section, we analyze the influence of the RIS-NOMA-assisted IoV system with uncertain RIS deployment. Assuming that the channel gain is G j , j { S , R , D 1 , D 2 } and the path loss is α k , k ( 1 , 2 ) , leading to β S D 1 = G S G D 1 α 1 d S D 1 . In the same way, we have β S D 2 = G S G D 2 α 2 d S D 2 , β S R D 1 = G S G R 2 G D 1 α 1 d S R d R D 1 d S D 1 , β S R D 2 = G S G R 2 G D 2 α 2 d S R d R D 2 d S D 2 . By substituting the above results back into Equation (27), we have
N 2 G R 2 d S R d R D 1 + d S D 1 = N 2 G R 2 d S R d R D 2 + d S D 2 .
Since the deployment position of the RIS and the distance from the RIS to S are variable, by means of the Cosine Theorem, the distance from RIS to user D 1 can be expressed as
d R D 1 = d S R 2 + d S D 1 2 2 d S R d S D 1 cos θ ,
as well as the distance from the RIS to user D 2 is
d R D 2 = d S R 2 + d S D 2 2 + 2 d S R d S D 2 cos θ .
Clearly, if direct membership makes the formula very complicated, where d S R and c o s θ are variables, Taylor expansion can be adopted to solve such a problem, and the binary Taylor formula is
f ( x 0 + Δ x , y 0 + Δ y ) = f ( x 0 , y 0 ) + Δ x x + Δ y y f ( x 0 , y 0 ) + 1 2 ! Δ x x + Δ y y 2 f ( x 0 , y 0 ) + + 1 n ! Δ x x + Δ y y n f ( x 0 , y 0 ) + R n ,
where R n = o ( Δ x ) 2 + ( Δ y ) 2 n . Letting d S R and c o s θ be x and y, respectively, we can obtain the following:
Let x 0 = d S D 1 and y 0 = 0 , which can be obtained after substitution in the formula and simplification as
d R D 1 = ( x 2 + d S D 1 2 2 d S D 1 x y ) 1 2 = ( x 0 2 + d S D 1 2 2 d S D 1 x 0 y 0 ) 1 2 + 1 2 ( x 0 2 + d S D 1 2 2 d S D 1 x 0 y 0 ) 1 2 ( 2 x 0 2 d S D 1 y 0 ) ( x x 0 ) + 1 2 ( x 0 2 + d S D 1 2 2 d S D 1 x 0 y 0 ) 1 2 ( 2 d S D 1 x 0 ) ( y y 0 ) + o [ ( x x 0 ) 2 + ( y y 0 ) 2 ] = 1 2 d S D 1 + 1 2 d S R 1 2 d S D 1 cos θ .
Let x 0 = d S D 2 and y 0 = 0 , which can be obtained after substitution in the formula and simplification as
d R D 2 = ( x 2 + d S D 2 2 + 2 d S D 2 x y ) 1 2 = ( x 0 2 + d S D 2 2 + 2 d S D 2 x 0 y 0 ) 1 2 + 1 2 ( x 0 2 + d S D 2 2 + 2 d S D 2 x 0 y 0 ) 1 2 ( 2 x 0 + 2 d S D 2 y 0 ) ( x x 0 ) + 1 2 ( x 0 2 + d S D 2 2 + 2 d S D 2 x 0 y 0 ) 1 2 ( 2 d S D 2 x 0 ) ( y y 0 ) + o [ ( x x 0 ) 2 + ( y y 0 ) 2 ] = 1 2 d S D 2 + 1 2 d S R 1 2 d S D 2 cos θ .
Substituting the function values of d R D 1 and d R D 2 , we can obtain
cos θ = 2 ( d S D 1 d S D 2 ) N 2 G R 2 d S R ( d S D 1 + d S D 2 ) + d S D 1 d S D 2 d S D 1 + d S D 2 .

5. Numerical Results

In this section, the performance of the proposed system is evaluated by numerical results. Assuming that all channels follow Rayleigh fading, the path loss index is set to 2.2. For simplicity, the position of each node is set to ( x S , y S ) = ( 0 , 0 ) , ( x D 1 , y D 1 ) = ( 80 , 0 ) , ( x D 2 , y D 2 ) = ( 100 , 0 ) .
Figure 2 shows the relationship between the total safe-rate of data transmission and the angle of the RIS position relative to the transmitter. In the proposed scheme, the transmission power is P = 1 dBm, and the number of reflective elements is fixed at 1000. As can be seen from the display results in Figure 2, when a 1 < a 2 , the safe-rate gradually decreases with increase in the distance between the RIS and D 1 . While a 1 > a 2 , the security rate gradually increases with decrease in the distance between RIS and D 2 . In addition, one can observe that there is an intersection between the security rates of data transmission, in which θ = 141 . This means that when the location of the RIS is deployed at this angle, the secrecy sum-rates with different power factor allocation mechanisms are equal. It is also the threshold of the safe-rate, and the security at this time is the most unreliable. When the angle is less than 141 , the data will be transmitted by the power distribution factor transmission mode of a 1 < a 2 . When the angle is larger than 141 , the data will be transmitted in the transmission mode of a 1 > a 2 .
Figure 3 shows the relationship between the safe-rate and the deployment position of the RIS. When the RIS is gradually further away from the user D 1 , the transmission rate of data x 1 gradually decreases, while the eavesdropper directly eavesdrops on the data x 1 of S. The eavesdropping rate will not change due to the change in the deployment position of the RIS, but the change in the position of the RIS has little influence on the transmission rate of data x 2 . In the proposed system, when a 1 < a 2 , the eavesdropper first decodes signal x 2 , and then decodes signal x 1 . As we mentioned earlier in this work, the approximation of SNR for signal x 2 at the eavesdropper can be expressed as a 2 a 1 , which means that the eavesdropping rate of signal x 2 is scarcely influenced by the RIS deployment location. Similar, the SNR for signal x 2 at D 2 is also scarcely influenced by the RIS deployment location, resulting in invariability of the safe rate of x 2 . Furthermore, the safe-rate of the total data transmitted is similar to that of the data x 1 . Similarly, when the RIS gradually approaches the user D 2 , its channel quality gradually passes the user D 1 , thus changing the power factor distribution of the channel. As a result, the safe-rate gradually increases after crossing the point. In this paper, the simulation assumes that the initial states are all on the same level with users D 1 , D 2 , and S.
Figure 4 shows that when the location of S is fixed and the distance between RIS and S is changed, the performance of the safe-rate is different. Assuming that the distances from S to RIS are 20 m, 30 m, and 40 m, respectively, one can observe that the safe-rate gradually increases as the deployment position of the RIS is closer to the S. This is because when the deployment position of the RIS is close to the S, the path loss decreases and the channel quality of the cascaded channel is improved, with the result that the safe-rate increases with decrease in the distance from the S. The changing trend of the curve in the figure is that the RIS gradually moves away from the user D 1 , which weakens the data transmission quality of the RIS service user D 1 channel. Thus, the safe-rate of data x 1 decreases with increase in the angle. Similarly, because the deployment position of RIS is gradually closer to user D 2 , the safe-rate of data x 2 gradually increases with increase in the deployment angle of the RIS relative to the S.
Figure 5 shows the impact of increasing the number of RIS elements on the safe-rate of data x 1 when the location of S is fixed. Assuming that the number of elements of the RIS is 1000, 1500, and 2000, respectively, one can observe from the graphic information that the safe-rate is larger and larger with increase in the number of RIS reflection elements. Moreover, one can also see that the safe-rate gradually improves as the deployment position of the RIS gets closer to the S. This is because when the number of elements of the RIS increases, the channel quality of the cascade channel is enhanced, so the safe-rate will increase with increase in the RIS elements number. The changing trend of the curve in the figure is that the RIS gradually moves away from the user D 1 , which weakens the data transmission quality of the RIS service user D 1 channel, so the safe-rate of data x 1 will decrease with increase in the angle. Similarly, because the deployment position of the RIS is gradually closer to user D 2 , the safe-rate of data x 2 will gradually increase with increase in the deployment angle of the RIS relative to the S.
Figure 6 plots the influence on the safe-rate of data x 1 when the location of S is fixed and the transmission power increases. Assuming that the transmission power is 1 dBm, −3 dBm, and −6 dBm, respectively, one can see that with increase in the transmission power, the safe-rate is larger and larger. This is because when the transmission power increases, the channel quality of the cascade channel is enhanced; thus, the safe-rate increases with increase in the transmission power. The changing trend of the curve in the figure is that the RIS gradually moves away from the user D 1 , which weakens the data transmission quality of the RIS service user D 1 channel, so the safe-rate of data x 1 will decrease as the angle increases. Similarly, because the deployment position of the RIS is gradually closer to user D 2 , the safe-rate of data x 2 will gradually increase with increase in the deployment angle of the RIS relative to the S.
Figure 7 draws the relationship between the power allocation factor coefficient and the angle of the RIS relative to the location of S. In the proposed scheme, the power is set as P = 1 dBm and the number of RIS elements is assumed to be 1000; one can see from the display results in the figure that when the power allocation factor coefficient changes, it could not have a great influence on the trend of the simulation curve. When a 1 < a 2 , the safe-rate of data transmission will gradually decrease with increase in the distance between the RIS deployment position and the user D 1 . While a 1 > a 2 , the safe-rate of data transmission will gradually increase with decrease in the distance between the deployment position of RIS and the user D 2 . In the simulation, it can be found that even if the power allocation factor coefficient changes, the intersection point of the safe-rate of data transmission will not change, and the lowest value of the safe-rate will not change. Because there is no power allocation factor in Equation (36), the simulation results also verify the correctness of the formula derivation.

6. Conclusions

This paper discussed the PLS of the RIS-NOMA system under the condition of uncertain RIS location, aiming to improve the safe-rate of data transmission under different channel conditions. In the proposed RIS-NOMA system, the RIS was designed to serve the user, while eavesdroppers tried to eavesdrop on the data of the source. It is worth noting that the deployment position of the RIS was not fixed, but changed within a certain range. In this paper, the equivalent safe-rate of two users was obtained through data analysis. In addition, this paper also deduced the minimum safe-rate required under different deployment angles of the RIS relative to the source. Numerical results obtained showed the deduced minimum safe-rate required with different angles of RIS relative to S, which verified the correctness of our analysis, as well as demonstrating the effectiveness of the proposed scheme. Apart from the analyzed results, the RIS-NOMA system is likely to offer further advantages, which could also be further refined in the future. The integration of RIS and NOMA, which could contribute effectively to power consumption and signal enhancement, is also a critical condition that requires further investigation.

Author Contributions

Software, Z.Z.; Validation, W.D.; Formal analysis, F.S.; Resources, H.Z.; Writing—original draft, J.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded in part by the Education Informatization Research Project in Jiangsu Province under Grant 2023JSETKT033, in part by the Qinglan Project in Jiangsu Province, and in part by Juxian Talent Project of Kangda College of Nanjing Medical University.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Liu, L.; Feng, J.; Mu, X.; Pei, Q.; Lan, D.; Xiao, M. Asynchronous deep reinforcement learning for collaborative task computing and on-demand resource allocation in vehicular edge computing. IEEE Trans. Intell. Transp. Syst. 2023, 24, 15513–15526. [Google Scholar] [CrossRef]
  2. Ni, Y.; Cai, L.; He, J.; Vinel, A.; Li, Y.; Mosavat-Jahromi, H.; Pan, J. Toward reliable and scalable internet of vehicles: Performance analysis and resource management. Proc. IEEE 2020, 108, 324–340. [Google Scholar] [CrossRef]
  3. Zhang, J.; Letaief, K.B. Mobile edge intelligence and computing for the internet of vehicles. Proc. IEEE 2020, 108, 246–261. [Google Scholar] [CrossRef]
  4. Li, H.; Ota, K.; Dong, M. Learning iov in 6g: Intelligent edge computing for internet of vehicles in 6g wireless communications. IEEE Wirel. Commun. 2023, 30, 96–101. [Google Scholar] [CrossRef]
  5. Hazarika, B.; Singh, K.; Biswas, S.; Li, C.-P. Drl-based resource allocation for computation offloading in iov networks. IEEE Trans. Ind. Inform. 2022, 18, 8027–8038. [Google Scholar] [CrossRef]
  6. Kazmi, S.A.; Ho, T.M.; Nguyen, T.T.; Fahim, M.; Khan, A.; Piran, M.J.; Baye, A.G. Computing on wheels: A deep reinforcement learning- based approach. IEEE Trans. Intell. Transp. Syst. 2022, 23, 22535–22548. [Google Scholar] [CrossRef]
  7. Shi, J.; Du, J.; Shen, Y.; Wang, J.; Yuan, J.; Han, Z. Drl-based v2v computation offloading for blockchain- enabled vehicular networks. IEEE Trans. Mob. Comput. 2022, 22, 3882–3897. [Google Scholar] [CrossRef]
  8. Wang, J.; Ke, H.; Liu, X.; Wang, H. Optimization for computational offloading in multi-access edge computing: A deep reinforcement learning scheme. Comput. Netw. 2022, 204, 108690. [Google Scholar] [CrossRef]
  9. Chen, J.-X.; Yan, T.-Y.; Yang, J.-Y.; Ding, X.-H.; Yang, L.-L.; Li, Y. Dual-polarized heterogeneous stacked patch antenna with stable radiation performance and high efficiency. IEEE Antennas Wirel. Propag. Lett. 2024, 23, 2421–2425. [Google Scholar] [CrossRef]
  10. Dai, L.; Jiao, R.; Adachi, F.; Poor, H.V.; Hanzo, L. Deep learning for wireless communications: An emerging interdisciplinary paradigm. IEEE Wirel. Commun. 2020, 27, 133–139. [Google Scholar] [CrossRef]
  11. Yao, Z.; Cheng, W.; Zhang, W.; Zhang, H. Resource allocation for 5g-uav-based emergency wireless communications. IEEE J. Sel. Areas Commun. 2021, 39, 3395–3410. [Google Scholar] [CrossRef]
  12. Zhang, Y.; Shen, K.; Ren, S.; Li, X.; Chen, X.; Luo, Z.Q. Configuring intelligent reflecting surface with performance guarantees: Op- timal beamforming. IEEE J. Sel. Top. Signal Process. 2022, 16, 967–979. [Google Scholar] [CrossRef]
  13. Zhang, C.; Dong, M.; Ota, K. Heterogeneous mobile networking for lightweight uav assisted emergency communication. IEEE Trans. Green Commun. Netw. 2021, 5, 1345–1356. [Google Scholar] [CrossRef]
  14. Wang, B.; Sun, Y.; Sun, Z.; Nguyen, L.D.; Duong, T.Q. Uavassisted emergency communications in social iot: A dynamic hypergraph coloring approach. IEEE Internet Things J. 2020, 7, 7663–7677. [Google Scholar] [CrossRef]
  15. Lin, Y.; Wang, T.; Wang, S. Uav-assisted emergency communications: An extended multi-armed bandit perspective. IEEE Commun. Lett. 2019, 23, 938–941. [Google Scholar] [CrossRef]
  16. Kafafy, M.; Ibrahim, A.S.; Ismall, M.H. Uplink Power Analysis of RIS-assisted Communication over Shared Radar Spectrum. In Proceedings of the 2022 5th International Conference on Communications, Signal Processing, and Their Applications (ICCSPA), Cairo, Egypt, 27–29 December 2022; pp. 1–5. [Google Scholar]
  17. Xu, L.; Zhou, X.; Tao, Y.; Yu, X.; Yu, M.; Khan, F. AF Relaying Secrecy Performance Prediction for 6G Mobile Communication Networks in Industry 5.0. IEEE Trans. Ind. Inform. 2022, 18, 5485–5493. [Google Scholar] [CrossRef]
  18. Andrawes, A.; Nordin, R.; Ismail, M. Energy harvesting with cooperative networks and adaptive transmission. In Proceedings of the 2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), Aqaba, Jordan, 11–13 October 2017; pp. 1–6. [Google Scholar]
  19. Chen, J.-X.; Yang, J.-Y.; Ding, X.-H.; Yan, T.-Y.; Li, Y.-L.; Yang, W.-W. A microwave/millimeter-wave shared-aperture fitering antenna with reused via structure. IEEE Trans. Antennas Propag. 2024, 72, 7377–7382. [Google Scholar] [CrossRef]
  20. Gopala, P.K.; Lai, L.; El Gamal, H. On the Secrecy Capacity of Fading Channels. IEEE Trans. Inform. Theory 2008, 54, 4687–4698. [Google Scholar] [CrossRef]
  21. Oh, M.K.; Lee, S.; Kang, Y.; Choi, D. Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security. IEEE Trans. Consum. Electron. 2020, 66, 11–21. [Google Scholar] [CrossRef]
  22. Sun, L.; Du, Q. Physical layer security with its applications in 5G networks: A review. China Commun. 2017, 14, 1–14. [Google Scholar] [CrossRef]
  23. Ji, B.; Zhang, J.; Zhang, H.; Zhang, G.; Fan, H.; Mumtaz, S. Performance Analysis of RIS-Enhanced Secure Transmission for Symbiotic IoV Systems. IEEE Trans. Cogn. Commun. Netw. 2024. [Google Scholar] [CrossRef]
  24. Chen, L.; Zhu, J.; Yang, Y.; Boichenko, S. Physical Layer Security for RIS-V2V Networks With Different Eavesdropper Locations. IEEE Internet Things J. 2024, 11, 35791–35801. [Google Scholar] [CrossRef]
  25. Wang, C.; Li, Z.; Xia, X.G.; Shi, J.; Si, J.; Zou, Y. Physical Layer Security Enhancement Using Artificial Noise in Cellular Vehicle-to-Everything (C-V2X) Networks. IEEE Trans. Veh. Technol. 2020, 69, 15253–15268. [Google Scholar] [CrossRef]
  26. Liu, Y.; Su, Z.; Wang, Y. Artificial Noise-Assisted Beamforming and Power Allocation for Secure D2D-Enabled V2V Communications. In Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), Norman, OK, USA, 27–30 September 2021; pp. 1–5. [Google Scholar]
  27. Li, X.; Li, J.; Liu, Y.; Ding, Z.; Nallanathan, A. Residual Transceiver Hardware Impairments on Cooperative NOMA Networks. IEEE Trans. Wirel. Commun. 2020, 19, 680–695. [Google Scholar] [CrossRef]
  28. Andrews, J.G. Interference cancellation for cellular systems: A contemporary overview. IEEE Wirel. Commun. 2005, 12, 19–29. [Google Scholar] [CrossRef]
  29. Hou, T.; Liu, Y.; Song, Z.; Sun, X.; Chen, Y.; Hanzo, L. Reconfigurable Intelligent Surface Aided NOMA Networks. IEEE J. Sel. Areas Commun. 2020, 38, 2575–2588. [Google Scholar] [CrossRef]
  30. Ding, Z.; Poor, H.V. A Simple Design of IRS-NOMA Transmission. IEEE Commun. Lett. 2020, 24, 1119–1123. [Google Scholar] [CrossRef]
  31. Zhang, Y.; Zhang, G.; Chen, S.; Choi, J.; Ho, P.H. Optimal Element Allocation for RIS-Aided Physical Layer Security. Wirel. Commun. Mob. Comput. 2022, 2022, 4617366. [Google Scholar] [CrossRef]
Figure 1. RIS-NOMA-assisted wireless network security communication system model.
Figure 1. RIS-NOMA-assisted wireless network security communication system model.
Electronics 13 04437 g001
Figure 2. Total safe-rate versus location of the RIS.
Figure 2. Total safe-rate versus location of the RIS.
Electronics 13 04437 g002
Figure 3. Safe-rates of x 1 and x 2 versus location of the RIS with different power allocations.
Figure 3. Safe-rates of x 1 and x 2 versus location of the RIS with different power allocations.
Electronics 13 04437 g003
Figure 4. Safe-rate of x 1 versus the angle of the RIS relative to S in the case of different distances between the RIS and S.
Figure 4. Safe-rate of x 1 versus the angle of the RIS relative to S in the case of different distances between the RIS and S.
Electronics 13 04437 g004
Figure 5. Relationship between the safe-rate of x 1 and location of the RIS under different numbers of RIS reflection elements.
Figure 5. Relationship between the safe-rate of x 1 and location of the RIS under different numbers of RIS reflection elements.
Electronics 13 04437 g005
Figure 6. Relationship between safe-rate of data x 1 and transmission power.
Figure 6. Relationship between safe-rate of data x 1 and transmission power.
Electronics 13 04437 g006
Figure 7. Relationship between safe-rate and power allocation factor.
Figure 7. Relationship between safe-rate and power allocation factor.
Electronics 13 04437 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gu, J.; Zhang, Z.; Duan, W.; Song, F.; Zhang, H. Physical Layer Security in RIS-NOMA-Assisted IoV Systems with Uncertain RIS Deployment. Electronics 2024, 13, 4437. https://doi.org/10.3390/electronics13224437

AMA Style

Gu J, Zhang Z, Duan W, Song F, Zhang H. Physical Layer Security in RIS-NOMA-Assisted IoV Systems with Uncertain RIS Deployment. Electronics. 2024; 13(22):4437. https://doi.org/10.3390/electronics13224437

Chicago/Turabian Style

Gu, Jinyuan, Zhao Zhang, Wei Duan, Feifei Song, and Huaiping Zhang. 2024. "Physical Layer Security in RIS-NOMA-Assisted IoV Systems with Uncertain RIS Deployment" Electronics 13, no. 22: 4437. https://doi.org/10.3390/electronics13224437

APA Style

Gu, J., Zhang, Z., Duan, W., Song, F., & Zhang, H. (2024). Physical Layer Security in RIS-NOMA-Assisted IoV Systems with Uncertain RIS Deployment. Electronics, 13(22), 4437. https://doi.org/10.3390/electronics13224437

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop