1. Introduction
With the development of vehicle networking systems, wireless transmission coverage, high energy efficiency and secure communication have become the primary tasks of evaluating vehicle networking communication systems [
1,
2]. For the Internet of Vehicles (IoV), they can share information not only with infrastructure (e.g., roadside units (RSUs) through vehicle-to-infrastructure (V2I) communication), but also with vehicles through vehicle-to-vehicle (V2V) communication [
3]. In addition, automatic driving, intelligent driving-assist systems, traffic flow and urban traffic management also bring exponential growth of massive data and computing resources consumption. Critical and real-time collaborative control messages require strict delay restrictions, while the transmission of multimedia entertainment application information can accommodate a certain degree of delay, which poses a great challenge for managing the interaction of vital information, task unloading and realizing large-scale model (LSM)-based decision-making across many heterogeneous nodes within the framework of the Internet of Vehicles [
4]. The wide applications of the IoV based on artificial intelligence (AI) have aroused significant concern about the IoV, which involves heterogeneous computing-intensive and delay-intolerant tasks. The on-board resources of consumer vehicles cannot meet such requirements, so researchers introduced the technology of multiple-access edge computing (MEC), which can expand the computing power of vehicle networks by allowing vehicles to offload some tasks to MEC servers. The authors in [
5] minimize energy consumption, and develop a method based on deep reinforcement learning (DRL) to offload tasks to roadside units (RSUs) or other vehicles. Similarly, the authors in [
6,
7] use the method based on DRL to unload tasks. In addition, the coverage of wireless communication networks based on high-cost base stations (BSs) is still limited, and it is impossible to provide continuous, reliable and high-throughput basic services [
8,
9]. Therefore, there are obvious technical obstacles to realize reliable and extensible wireless transmission in the IoV, which imposes great restrictions on the deployment of the above-mentioned intelligent vehicles and transportation systems.
As a novel wireless communication technology, RISs can utilize a series of reflective elements to modulate electromagnetic wave signals and transmit them to the receiver; thus, they can effectively assist the communication between the transmitter and the receiver. For example, when the user is in an environment with poor communication quality, the RIS deployed in the surrounding area can reflect the signal to the required position to assist communication. Compared with the traditional antenna and base station technology, RISs have higher spectral efficiency, lower power consumption and better privacy [
10,
11]. In order to ensure low latency, the IoV needs ubiquitous ultra-reliable, low-latency and high-speed wireless communication. In this respect, RIS-assisted communication is a revolutionary way to improve the quality of wireless communication by adjusting the wireless propagation path [
12]. RISs can reconstruct the wireless channel by using electromagnetic elements to manipulate incident waves, thus enhancing the system throughput and improving the quality of service (QoS) of edge users [
13,
14]. Although BSs are the central hub of information exchange, they may not be able to achieve full coverage in urban application scenarios. Some RISs are deployed in a fixed configuration, while others are flexibly and adaptively configured by drones to adapt to the complexity of wireless channels [
15,
16,
17]. On the basis of this framework, all vehicles in the IoV as terminal nodes can not only effectively transmit key information, but also offload local computing tasks to the edge or cloud server for processing. However, the hybrid architecture integrating RISs and BSs requires advanced hybrid beamforming, including digital beamforming at BSs and analog beamforming at passive RISs, thus maximizing system throughput and reducing mutual interference. In addition, the combination of RISs and non-orthogonal multiple access (NOMA) can further improve the performance of these systems.
1.1. Related Work
In recent years, the rational use of secure channel capacity has become a focus of discussion among researchers and scholars [
18,
19], where the secrecy capacity of the transmitted data is investigated and the system is able to reach the maximum transmission rate between a legitimate transmitter and receiver, but this scheme is subject to the limitations of the information available to unauthorized receivers. The authors of [
18] proved that for discrete memoryless channels, the perfect secrecy capability is actually the difference in capacity between two users and generalized similar results to Gaussian channels [
20]. A study considered the case of full channel state information (CSI), where the transmitter has access to the channel gains of both the legitimate receiver and the eavesdropper, and this secrecy capacity under the full CSI assumption was used as an upper bound on the secrecy capacity when only the CSI of the legitimate receiver is known on the transmitter. The authors of [
21] also proposed a low-complexity on or off power allocation scheme that achieves near-optimal performance using only the primary channel CSI. More specifically, the scheme is shown to be asymptotically optimal when the average signal-to-noise ratio (SNR) reaches infinity, achieving the secrecy capability assumed by full CSI. All the above studies show that channel fading has a positive effect on the secrecy capability and rate adaptation based on channel CSI. Therefore, PLS as a technology based on the physical characteristics of the communication channel to protect the security of the communication system has gradually become an important research direction in the field of information security. PLS techniques utilize the physical characteristics of the communication channel, such as signal attenuation, multipath propagation, and time-varying properties, to design security mechanisms that enhance the security of the communication system during the transmission of data [
22]. Researchers are committed to continuously improving the performance and reliability of PLS techniques to cope with increasingly complex and diverse security threats. In [
23], the authors utilized RIS to tackle threats faced by vehicles (e.g., leaked data, hack attack, and jammer). The authors also proved that the security of IoV systems could be ensured with enough RIS elements. In [
24], the PLS for RIS-aided vehicle-to-vehicle (V2V) wireless systems was investigated and two eavesdropping models were introduced. It was demonstrated that the optimizations of the RIS location and elements number could significantly improve the security of IoV environments, as well as actively deal with the challenges of eavesdroppers. And the features of PLS can effectively deal with some of the challenges faced by traditional cryptography, such as key management and side-channel attacks, as well as provide additional security guarantees. Currently, the commonly used PLS schemes are non-orthogonal multiple access (NOMA) [
25], artificial noise (AN), and cooperative jamming [
26].
Since eavesdroppers are unable to decode the information correctly after eavesdropping the data, researchers often employ artificial noise generation at the transmitter to reduce the quality of the received data for eavesdroppers [
27,
28] and to improve the security and reliability of the communication system. For some application scenarios, real-time generation, injection and processing of artificial noise signals are required, which need to be supported by corresponding hardware resources, increasing the system cost and energy consumption, in order to avoid excessive introduction of noise leading to degradation of communication quality or insufficient security enhancement. Recently, NOMA has been considered as a promising technology, which can improve the spectrum and energy efficiency [
29]. The advantage of NOMA is that it can accommodate more users on the same resource block, use superposition coding at the sending terminal and continuous interference cancellation at the receiving terminal [
30], which can reduce the interference of users with better channel quality to users with weaker channel quality, thus improving user fairness and reducing the probability of channel blockage in the IoV. Based on various channel conditions required by NOMA, RIS can be used for the intelligent control of random channels, which has been further discussed in recent research. However, most of these works do not consider in detail the influence of the number of RIS components on the safe-rate of data transmission under the NOMA principle.
1.2. Motivations and Contributions
In the RIS-NOMA-assisted IoV communication system, the secrecy capability can be significantly improved even in the presence of eavesdroppers. RIS can help to suppress the interference of communication signals by malicious eavesdroppers by adjusting the characteristics of the reflected signals, thus improving the security of the system [
31]. RIS is also able to optimize the transmission path of the signals to reduce the signal leakage and the possibility of eavesdropping, as well as enhance the security of the channel links. In previous studies, the location of RIS is often fixed and unchanged, and how location change of the RIS can not only affect the quality of data transmission to users, but also further affect the overall safe-rate and performance of data transmission in the presence of eavesdroppers is not considered. For this reason, it is necessary to explore the impact of RIS location changes on the overall security rate of the system so as to maximize the security rate of data transmission for legitimate users.
We propose an RIS-NOMA system consisting of a remote user, a near user and an eavesdropper, in which the eavesdropper wiretaps on the data transmission over the wireless channel. The maximum security rate under different RIS positions is analyzed and derived.
The balance between the RIS deployment location and the channel security rate is investigated, and a trade-off between between the locations of far and near users is also considered.
Numerical results verify the correctness of our analysis as well as the effectiveness of the proposed scheme, which provides a significant improvement in terms of the safe-rate.
2. System Model and Proposed Scheme
This work considers an RIS and NOMA-assisted secure communication system, as shown in
Figure 1, which consists of the transmitting source (
S), the RIS, two legitimate users
and
, and an eavesdropper
E. For the channel model, we assume that all nodes are equipped with single antenna, considering that
S and
are known to the eavesdropper to wiretap on the desired data
X within a long distance. With
, the valid data received by
are
, and the valid data received by
are
. Clearly, since the data received by
and
are both on the broadcasting channel, the safe-rate is extremely low. As the element size of RIS is much smaller than the RF signal wavelength, the elements are able to reflect the incident signal to each direction with constant gain. Furthermore, each element of the RIS is intelligently controllable, and the reflecting elements can control the phase shift.
As shown in
Figure 1, the direct channels from S to RIS, user
, user
and eavesdropper E are, respectively, expressed as
; the reflection channel of RIS is
. In the model, user
is considered to be further away from the transmitter than user
; thus, the channel gain of
is considered to be less than
.
represents the norm of the vector. The angle of the RIS deployment position relative to the emission source is
in [0,180]. Because the NOMA scheme will actively consider the fairness of users, there will be differences in setting the power distribution coefficients. The power distribution factors of service user
and user
are
and
,
, and the transmission data at S is
, where
and
are the expected signals of
and
, respectively.
2.1. Power Allocation Discussion
2.1.1. Power Allocation Strategy with
In this section, to ensure fairness among users, we discuss power allocation for two different situations. When
, the RIS is equipped with n fixed elements to serve different users with the same number of elements. The channel gains from the transmitter S to the RIS and from the RIS to user
are
. Similarly, the channel gains from S to RIS and RIS to
can be expressed as
. In addition, it is assumed that all channels experience Rayleigh fading distribution, and the signals received by users
and
can be expressed as
where
P is the transmission power at S,
and
are the transmitted data,
, and the phase shift matrix of RIS at user
is
. The phase shift matrix at user
is
,
is the amplitude reflection coefficient. The additive white Gaussian noise (AWGN) at both
and
is characterized by a mean value of zero and a variance of
.
In the communication system assisted by RIS-NOMA, according to the decoding principle of NOMA, user
will first decode
with
as interference. After successfully decoding
, user
decodes
through SIC. Therefore, the SNRs of user
and user
can be, respectively, given as
Similarly, the SNR of eavesdropper is
,
. Therefore, the achievable rates for the received data
and data
are, respectively, expressed as
where
is the expected value of
x; the eavesdropping rates on data
and data
by the eavesdropper are as follows:
Finally, the secrecy rate of data
and data
can be further obtained as
where
. Then, the secrecy sum-rate of the data can be obtained
In the communication system with NOMA, in order to ensure fairness, a larger power allocation factor will be assigned to the poor channel, and
. When
, the user
is closer to the transmitting source, and when
, the channel gain can be expressed as
. Therefore, it can be further deduced from Equations (3)–(5) as
,
, so Equation (
11) can be rewritten as follows:
Thus, Equation (
12) can be further written as
2.1.2. Power Allocation Strategy with
In this condition, it can be deduced from Equations (3)–(5) as
so it can be further calculated
, and
. Therefore, the secrecy rate of data
and
can be expressed as
where
; then, the secrecy rate can be obtained as
Considering the simple calculation, the Equations (19) and (20) can be directly substituted into Equation (
23) as
5. Numerical Results
In this section, the performance of the proposed system is evaluated by numerical results. Assuming that all channels follow Rayleigh fading, the path loss index is set to 2.2. For simplicity, the position of each node is set to .
Figure 2 shows the relationship between the total safe-rate of data transmission and the angle of the RIS position relative to the transmitter. In the proposed scheme, the transmission power is
dBm, and the number of reflective elements is fixed at 1000. As can be seen from the display results in
Figure 2, when
, the safe-rate gradually decreases with increase in the distance between the RIS and
. While
, the security rate gradually increases with decrease in the distance between RIS and
. In addition, one can observe that there is an intersection between the security rates of data transmission, in which
. This means that when the location of the RIS is deployed at this angle, the secrecy sum-rates with different power factor allocation mechanisms are equal. It is also the threshold of the safe-rate, and the security at this time is the most unreliable. When the angle is less than
, the data will be transmitted by the power distribution factor transmission mode of
. When the angle is larger than
, the data will be transmitted in the transmission mode of
.
Figure 3 shows the relationship between the safe-rate and the deployment position of the RIS. When the RIS is gradually further away from the user
, the transmission rate of data
gradually decreases, while the eavesdropper directly eavesdrops on the data
of S. The eavesdropping rate will not change due to the change in the deployment position of the RIS, but the change in the position of the RIS has little influence on the transmission rate of data
. In the proposed system, when
, the eavesdropper first decodes signal
, and then decodes signal
. As we mentioned earlier in this work, the approximation of SNR for signal
at the eavesdropper can be expressed as
, which means that the eavesdropping rate of signal
is scarcely influenced by the RIS deployment location. Similar, the SNR for signal
at
is also scarcely influenced by the RIS deployment location, resulting in invariability of the safe rate of
. Furthermore, the safe-rate of the total data transmitted is similar to that of the data
. Similarly, when the RIS gradually approaches the user
, its channel quality gradually passes the user
, thus changing the power factor distribution of the channel. As a result, the safe-rate gradually increases after crossing the point. In this paper, the simulation assumes that the initial states are all on the same level with users
,
, and S.
Figure 4 shows that when the location of S is fixed and the distance between RIS and S is changed, the performance of the safe-rate is different. Assuming that the distances from S to RIS are 20 m, 30 m, and 40 m, respectively, one can observe that the safe-rate gradually increases as the deployment position of the RIS is closer to the S. This is because when the deployment position of the RIS is close to the S, the path loss decreases and the channel quality of the cascaded channel is improved, with the result that the safe-rate increases with decrease in the distance from the S. The changing trend of the curve in the figure is that the RIS gradually moves away from the user
, which weakens the data transmission quality of the RIS service user
channel. Thus, the safe-rate of data
decreases with increase in the angle. Similarly, because the deployment position of RIS is gradually closer to user
, the safe-rate of data
gradually increases with increase in the deployment angle of the RIS relative to the S.
Figure 5 shows the impact of increasing the number of RIS elements on the safe-rate of data
when the location of S is fixed. Assuming that the number of elements of the RIS is 1000, 1500, and 2000, respectively, one can observe from the graphic information that the safe-rate is larger and larger with increase in the number of RIS reflection elements. Moreover, one can also see that the safe-rate gradually improves as the deployment position of the RIS gets closer to the S. This is because when the number of elements of the RIS increases, the channel quality of the cascade channel is enhanced, so the safe-rate will increase with increase in the RIS elements number. The changing trend of the curve in the figure is that the RIS gradually moves away from the user
, which weakens the data transmission quality of the RIS service user
channel, so the safe-rate of data
will decrease with increase in the angle. Similarly, because the deployment position of the RIS is gradually closer to user
, the safe-rate of data
will gradually increase with increase in the deployment angle of the RIS relative to the S.
Figure 6 plots the influence on the safe-rate of data
when the location of S is fixed and the transmission power increases. Assuming that the transmission power is 1 dBm, −3 dBm, and −6 dBm, respectively, one can see that with increase in the transmission power, the safe-rate is larger and larger. This is because when the transmission power increases, the channel quality of the cascade channel is enhanced; thus, the safe-rate increases with increase in the transmission power. The changing trend of the curve in the figure is that the RIS gradually moves away from the user
, which weakens the data transmission quality of the RIS service user
channel, so the safe-rate of data
will decrease as the angle increases. Similarly, because the deployment position of the RIS is gradually closer to user
, the safe-rate of data
will gradually increase with increase in the deployment angle of the RIS relative to the S.
Figure 7 draws the relationship between the power allocation factor coefficient and the angle of the RIS relative to the location of S. In the proposed scheme, the power is set as
dBm and the number of RIS elements is assumed to be 1000; one can see from the display results in the figure that when the power allocation factor coefficient changes, it could not have a great influence on the trend of the simulation curve. When
, the safe-rate of data transmission will gradually decrease with increase in the distance between the RIS deployment position and the user
. While
, the safe-rate of data transmission will gradually increase with decrease in the distance between the deployment position of RIS and the user
. In the simulation, it can be found that even if the power allocation factor coefficient changes, the intersection point of the safe-rate of data transmission will not change, and the lowest value of the safe-rate will not change. Because there is no power allocation factor in Equation (
36), the simulation results also verify the correctness of the formula derivation.