Next Article in Journal
New and Efficient Estimators of Reliability Characteristics for a Family of Lifetime Distributions under Progressive Censoring
Previous Article in Journal
Teaching–Learning-Based Optimization Algorithm with Stochastic Crossover Self-Learning and Blended Learning Model and Its Application
Previous Article in Special Issue
A Complex Insight for Quality of Service Based on Spreading Dynamics and Multilayer Networks in a 6G Scenario
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Active Intelligent Reflecting Surface Communication against Colluding Eavesdroppers

1
The School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China
2
Department of Computer and Networking Engineering, University of Jeddah, Jeddah 21959, Saudi Arabia
3
Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(10), 1597; https://doi.org/10.3390/math12101597
Submission received: 11 April 2024 / Revised: 7 May 2024 / Accepted: 16 May 2024 / Published: 20 May 2024

Abstract

:
An active intelligent reflecting surface (IRS)-assisted, secure, multiple-input–single-output communication method is proposed in this paper. In this proposed scheme, a practical and unfavorable propagation environment is considered by assuming that multiple colluding eavesdroppers (Eves) coexist. In this case, we jointly optimize the beamformers of the base station (BS) and the active IRS for the formulated sum secrecy rate (SSR) maximization problem. Because the formulated problem is not convex, we apply the alternating optimization method to optimize the beamformers for maximizing the SSR. Specifically, we use the semi-definite relaxation method to solve the sub-problem of the beamforming vector of the BS, and we use the successive convex approximation method to solve the sub-problem of the power amplification matrix of the active IRS. Based on the solutions obtained using these stated methods, numerical results show that deploying an active IRS is superior compared to the cases of a passive IRS and a non-IRS for improving the physical layer security of wireless communication with multiple colluding Eves under different settings, such as the numbers of users, Eves, reflecting elements, and BS antennas as well as the maximum transmit power budget at the BS.

1. Introduction

The use of an intelligent reflecting surface (IRS) is a highly promising technique with significant potential for future communications. It enables the reconfiguration of a wireless propagation environment by controlling a smart controller connected to the IRS which adjusts the phase shifter of each element [1]. However, in traditional passive architectures, the IRS is only capable of adjusting the phase shift of the incident signal, thus limiting the achievable rate at the receiver. A new IRS architecture referred to as an active IRS can provide an additional power ability to the IRS. This means that the active IRS has the capability to amplify the incident signal in addition to adjusting the phase shift matrix of the incident signal compared with a passive IRS.
Security in the physical layer has emerged as a significant concern for the future of wireless communication [2]. Because wireless communications have a broadcasting nature, there is a possibility of eavesdroppers (Eves) wiretapping the signal transmitted by a BS. In other words, the beamformer at the BS may designed to not only maximize the signal-to-noise ratio (SNR) for users but also for Eves. This is discussed in references [3,4,5,6]. To prevent legitimate information from being leaked to an eavesdropper, the authors of [7] proposed a secure SSK communication scheme for the classical eavesdropping scenario by introducing artificial noise (AN) according to the channel state information (CSI) of the user and the eavesdropper. Subsequently, the authors of [8] considered a more practical scenario by assuming that all CSI in their proposed scheme was imperfect. It is difficult to increase the sum secrecy rate (SSR) due to limited spatial degrees of freedom (DoFs) at the transceivers. Additionally, it is known that an IRS can be used to safeguard communication when there are wiretap channels caused by Eves because it can provide more controllable links to improve the SSR by increasing the achievable rate of legitimate users and preventing information from being leaked to the Eves. Recently, several works have introduced IRSs to secure wireless communication between a transmitter and legitimate receivers [9,10,11]. The authors of [9] formulated a maximization problem for maximizing the secrecy rate for -aided wireless communication involving one user and one Eve. In [10], Ye et al. introduced a jamming UAV to interfere with an Eve to safeguard communication between the user and the information UAV aided by an IRS. The maximum secrecy rate problem in the case of multiple ground nodes, including users and colluding Eves, in an IRS-assisted wireless environment was investigated in [11].

1.1. Related Work

Some previous works [12,13] stated that complicity among Eves can pose a serious threat to the physical layer security of wireless communications. From a security point of view, the case of complicit Eves could be treat as a worst-case scenario, and it is more worthy of research. In this case, in order to better protect communication between a transmitter and a legitimate receiver, one can introduce an IRS and adjust its phase shift matrix to provide multiple coherent links so that the SNR at the users is improved or to provide multiple incoherent links for suppressing the SNR at the Eves; thus, the SSR will be improved. In another research work on resource allocation, Qiao et al. proposed an energy-harvesting jammer and an IRS-aided security enhancement scheme to better combat eavesdroppers [14]. In addition, the authors of [15,16] proposed resource allocation methods for passive-IRS- and -IRS-aided wireless networks, respectively. Specifically, the authors of [15] introduced successive convex approximation (SCA), semi-definite relaxation (SDR), and manifold optimization to deal with the SSR maximization problem for a multiple-input–single-output (MISO) wireless network with one Eve and multiple users aided by passive IRS. The authors of [16] designed an algorithm that minimizes the transmit power of the base station (BS) while considering the constraints of quality-of-service (QoS) requirements for each user and the maximum amplification power of the active IRS for an active-IRS-aided communication system with multiple users. To investigate the impact of AN on passive-IRS-assisted secure communications, the authors of [17] considered a challenging scenario in which multiple Eves are in an IRS-aided communication system with one legitimate user. References [18,19] also considered a challenging scenario in which there are multiple users and Eves in a wireless communication system and a passive IRS is introduced to combat wiretapping from the multiple Eves by jointly optimizing beamformers at the BS and the passive IRS. In [20], Zhang et al. proposed a joint precoding algorithm that maximizes the sum rate of active-IRS-assisted multi-user MISO communication in which the numerical results verify that the active IRS has the ability to handle the multiplicative fading effect (MFE). To achieve better performance for secure, symbiotic radio multicast communication and a secure, wireless energy harvesting network, References [21,22] introduced an active IRS to combat multiple eavesdroppers. Moreover, a comparison of related works with our work is listed in Table 1.

1.2. Motivations and Contributions

These studies show that the active IRS is superior to the passive IRS because the active IRS brings more DoFs to each element than the passive IRS does. Based on the aforementioned discussions, it can be found that the active IRS can be used to handle the MFE and a worsened communication environment caused by colluding Eves. Specifically, we propose the use of an active IRS in the MISO wireless communication system to further suppress information leakage caused by multiple colluding Eves in which multiple users and multiple Eves are all assumed to be equipped with single antennas and the Eves cooperate with each other. To the best of our knowledge, this is the first scheme involving active-IRS-aided downlink MISO communication in which multiple users and multiple colluding Eves exist with direct and cascaded channels between the BS and all ground nodes. The contributions of the scheme proposed this paper are as follows:
  • This work proposes a joint optimization framework for optimizing the beamformers of the BS and the active IRS to maximize the system SSR in a secure multi-user MISO wireless network with multiple colluding Eves. Specifically, by considering direct and cascaded links, we can introduce an active IRS to prevent more information from being leaked to the multiple colluding Eves, and it can further improve the SSR of the proposed scheme, as compared with the case with passive IRS.
  • The problem of maximizing the SSR involves optimizing the beamforming vectors/ matrices of the BS and the active IRS, while taking into account the constraints of the BS’s maximum transmit power and the active IRS’s maximum amplification power. Given that the original problem is non-convex, we employ the alternating optimization (AO) approach to split it into two sub-problems. This allows us to separate the optimization variables. We then utilize the efficient SDR method to address the sub-problem of optimizing the beamformer vector of the BS. Furthermore, we employ SCA method to address the non-convex constraint in the sub-problem of optimizing the beamforming matrix of the active IRS.
  • The proposed scheme is shown to be superior through numerical and simulation results. In other words, the proposed scheme offers a significant improvement in the SSR compared to other baselines, such as the case without an IRS and the case with a passive IRS. This demonstrates that an active IRS is highly effective when dealing with unfavorable wireless communication environments involving multiple colluding Eves.

1.3. Notations

The primary symbols iused n this study are enumerated in Table 2. Specifically, the boldface, uppercase letters denote matrixes, and the italic, boldface lowercase letters denote vectors. diag · indicates the diagonalization of a vector. Complex and real spaces are denoted by C and R , respectively. Tr · , rank · , · , · H , and  · T represent the trace of a matrix, the rank of the matrix, the  L 2 norm of the vector, a conjugate transpose operation, and a transpose operation, respectively. max a 1 , , a z returns the largest value in the set of a 1 , , a z . 0 M × N and I N denote an all-zero matrix with a size of M × N and a unit matrix with a size of N × N , respectively. H ( a , b ) denotes an element of a matrix H at the a-th row and b-th column. Finally, O · is a big O notation for computational complexity.

2. System Model

This section presents a scenario of secure communication facilitated by an active IRS with multiple colluding Eves. The scenario is illustrated in Figure 1 and includes a BS with M antennas, an IRS with N elements, K users, and L Eves. Both the users and Eves are each equipped with a single antenna. Define K as the set of users in which K 1 , , K . Similarly, define L as the set of Eves in which L 1 , , L . The confidential information tended to the users is wiretapped by multiple colluding Eves. The perfect CSI of all communication channel in Figure 1 is assumed to be accurately obtained because of the following reasons. In practice, cascaded and direct channels can be accurately estimated using the least-squares method and by optimizing training reflection patterns [23]. In addition, multiple colluding Eves can be treated as untrusted users and may be periodically active in the wireless communications. Hence, the CSI of multiple colluding Eves can be accurately obtained via the central control of the active IRS. Moreover, in order to further explore the capabilities of active IRS-assisted wireless communication when faced with multiple colluding Eves, we make the assumption that the perfect CSI is available for the proposed scheme, the SSR value of which serves as an upper bound for the scenario in which imperfect CSI is assumed. Furthermore, the channel estimation of the proposed scheme is beyond the scope of this work. Based on this assumption, the signal transmitted by the BS is given by
s = k = 1 K ω k z k ,
where ω k C M × 1 represents the beamforming vector tended for the k-th user, and  z k denotes the corresponding signal. Without a loss of generality, we assume that E z k = 0 , E z k 2 = 1 , and  E z k z j = 0 , k , j K , k j . We denote the channel from the BS to the active IRS, the channel from the BS to the k-th user, the channel from the BS to the l-th Eve, the channel from the active IRS to the k-th user, and the channel from the active IRS to the l-th Eve as G C N × M , h a b , k C M × 1 , h a e , l C M × 1 , h i b , k C N × 1 , and h i e , l C N × 1 , respectively. Then, because of the controller attached to the active IRS and the independent amplifiers connected to each element at the active IRS, the reflected signal adjusted for the phase shifts and amplified for the power can be expressed as
y = P Θ s + P Θ v ,
where the matrix P = diag p 1 , , p N R + N × N depicts the amplification coefficients of the active IRS. It is a diagonal matrix with non-negative elements denoted as p 1 , , p N . The matrix P belongs to the set of non-negative real numbers denoted as R + N × N . The phase shift matrix Θ at the active IRS is represented by Θ = diag e j θ 1 , , e j θ N , where θ n denotes the phase shift of the n-th reflecting element at the active IRS. Since each element of the active IRS is connected to the amplification component, additional amplification power will be consumed, which accounts for amplifying the reflected signal; thus, non-negligible thermal noise will also be amplified, as shown as v in (2). Specifically, v represents the thermal noise and the inherent device noise of the active IRS elements. The thermal noise introduced by the active IRS elements cannot be neglected because of the amplifier, which is connected to the active IRS and amplifies thermal noise. We assume that the thermal noise vector v satisfies the distribution as v CN 0 N × 1 , σ v 2 I N . Based on the above, the received signals y b , k at the k-th user and y e , l at the l-th Eve can be expressed as
y b , k = h a b , k H + h i b , k H P Θ G k = 1 K ω k z k + h i b , k H P Θ v + n b , k ,
y e , l = h a e , l H + h i e , l H P Θ G k = 1 K ω k z k + h i e , l H P Θ v + n e , l ,
respectively, where the variables n b , k CN 0 , σ b 2 and n e , l CN 0 , σ e 2 stand for the additive white Gaussian noise at the k-th user and the l-th Eve followed by the circularly symmetric complex Gaussian distribution with a mean of 0 and variance of σ b 2 and a mean of 0 and a variance of σ e 2 , respectively. Let h b , k and h e , l be the equivalent channels from the BS to the k-th user and the l-th Eve, respectively, including both the direct link and the reflected link, shown as follows:
h b , k H = h i b , k H P Θ G + h a b , k H C 1 × M , k K ,
h e , l H = h i e , l H P Θ G + h a e , l H C 1 × M , l L .
The achievable rate of the k-th user is given as log 2 1 + γ k , where γ k is the signal-to-interference-plus-noise ratio (SINR) of the k-th user, which is given in [20]
γ k = h b , k H ω k 2 i k K h b , k H ω i 2 + σ v 2 h i b , k H P Θ 2 + σ b 2 , k .
When L colluding Eves work together to wiretap the k-th user, they can be regarded as an Eve with L antennas. Then, the achievable rate of the l-th Eve is represented by R k e = log 2 1 + l = 1 L γ k , l , where γ k , j represents the SINR of the l-th Eve given by
γ k , l = h e , l H ω k 2 i k K h e , l H ω i 2 + σ v 2 h i e , l H P Θ 2 + σ e 2 , k , l .
By applying Jensen’s inequality, we have the lower bound of R k e as follows:
R ¯ k e = 1 L l = 1 L log 2 ( 1 + L γ k , l ) , k .
With R ¯ k e in (9), we have the following tractable upper bound of the SSR of the proposed scheme [12]:
R sum = k = 1 K R k R ¯ k e + ,
where a + = max ( a , 0 ) . The transmit power of the BS and the amplification power coefficient of the active IRS, namely, P BS and P A , can, respectively, be written as
P BS = k = 1 K ω k 2 ,
P A = k = 1 K P Θ G ω k 2 + σ v 2 P Θ 2 .
Note that the proposed scheme always involves the presence of P and Θ in a multiplied form. Thus, P and Θ can be combined into a single matrix Φ , with  Φ = diag ( p 1 e j θ 1 , , p N e j θ N ) . The objective is to maximize the SSR by optimizing the beamformers, ω k and Φ , with two considered constraints, shown as follows:
max ω k , Φ k = 1 K R k R ¯ k e ,
s . t . P BS P BS max ,
k = 1 K Φ G ω k 2 + σ v 2 Φ 2 P A max .
Because the objective value of (13a) is always non-negative due to the DoF of the power control or resource allocation [9], we omit the operation [ · ] + for the objective function in (13a); thus, its smoothness is attained. In other words, if  R k R ¯ k e < 0 , we can allocate power to other users or let w k = 0 , k so that the objective value is 0. Compared with a passive IRS, the active IRS introduces an additional amplification factor in addition to the phase shifts at the IRS, thus avoiding the unit-modulus constraint and adding a power budget constraint (13c), accounting for the active IRS. However, it is worth investigating whether the newly introduced non-negligible thermal noise at the active IRS will cause a performance loss in the proposed scheme.

3. Proposed Methods

In this section, we employ the AO approach to optimize the beamformers of the BS and the active IRS because of the coupling between ω k and Φ . In other words, we optimize ω k and Φ alternately while keeping the other variable fixed. The flow chart of the proposed algorithm is shown in Figure 2. Specifically, for sub-problem 1, to circumvent non-convexity, we begin by introducing Lemma 1, as shown in Section 3.1, to convert the objective function into a more manageable form. Next, we employ the AO approach to decouple ω k , k and the newly introduced slack variables. Finally, we apply a Gaussian randomization-based SDR method to obtain a rank-one solution, ω k , k . For sub-problem 2, the SCA method is used to approximate non-convex terms in the objective functions.

3.1. Optimize ω k with Given Φ

To tackle the difficulty arising because the fraction in the logarithm function is complex, we let λ b , k = 1 σ b 2 and then rewrite R k as follows:
R k = log 2 i = 1 K h b , k H ω i 2 + σ v 2 h i b , k H Φ 2 + σ b 2 i k K h b , k H ω i 2 + σ v 2 h i b , k H Φ 2 + σ b 2 = log 2 λ b , k ( i = 1 K h b , k H ω i 2 + σ v 2 h i b , k H Φ 2 ) + 1 λ b , k ( i k K h b , k H ω i 2 + σ v 2 h i b , k H Φ 2 ) + 1 .
Noting that (14) is not convex, we resort to using the SDR method to transform the numerator and denominator of the logarithmic function into a linear form. To proceed, we first define H b , k = h b , k h b , k H , and W k = ω k ω k H ; then, the linear form of h b , k H ω i 2 is given by
h b , k H ω i 2 = Tr H b , k W k .
Let R k , A = i = 1 K Tr H b , k W i + σ v 2 h i b , k H Φ 2 , R k , B = j k K Tr H b , k W j + σ v 2 h i b , k H Φ 2 ; we rewrite R k in (14) as
R k ln 2 = ln ( λ b , k R k , A + 1 ) ln ( λ b , k R k , B + 1 ) .
Lemma 1.
Considering the function f ( u ) = u x + ln u + 1 , the maximum value of f ( u ) is max u > 0 f ( u ) = ln x , where u = 1 x .
Proof. 
Please refer to Lemma 1, [17].    □
To tackle the non-convex terms in (13a), we need to convert the convex part of (16) into the form shown in Lemma 1. By defining the set W W 1 , W K , we have
max t b , k > 0 f b ( W , t b , k ) = R k ln 2 ,
where f b ( W , t b , k ) = ln λ b , k R k , A + 1 t b , k λ b , k R k , B + 1 + ln t b , k + 1 . By using the SDR method, the original convex function can be transformed into a more tractable concave function. We can use the same method to handle part of the achievable rate of the Eves in (13a). Let λ e = 1 σ e 2 , E l = i l K Tr H e , l W i + σ v 2 h e , l H Φ 2 , and  H e , l = h e , l h e , l H . R ¯ k e can be written as follows:
R ¯ k e = 1 L l = 1 L log 2 1 + L h e , l H w k 2 E l + σ e 2 = 1 L l = 1 L log 2 λ e L Tr H e , l W k + E l + 1 λ e E l + 1 .
By defining R e , k , l = L Tr H e , l W k + E l , (18) can be rewritten as
R ¯ k e ln 2 = 1 L l = 1 L ln ( λ e R e , k , l + 1 ) ln ( λ e E l + 1 ) .
Similarly, by applying Lemma 1, we can obtain the minimum of (19) as follows:
1 L l = 1 L min t e , l > 0 f e ( W k , t e , k , l ) = R ¯ k e ln 2 ,
where f e ( W k , t e , k , l ) = t e , k , l ( λ e R e , k , l + 1 ) ln t e , k , l 1 ln ( λ e E l + 1 ) . To obtain the solution, W k , the AO method can be used to tackle the coupling between W k and t e , k , l or t b , k . The detailed steps of using the AO-based method to optimize W k are described in Algorithm 1. By utilizing the SDR method and removing the rank-1 constraint for convexity, problem (13) with respect to optimizing ω k is given by
max W , t b , k , t e , k , l k = 1 K f b ( W , t b , k ) 1 L l = 1 L f e ( W k , t e , k , l ) ,
s . t . k = 1 K Tr W k P BS max ,
k = 1 K Tr C W k + σ v 2 Φ 2 P A max ,
W k 0 , k K ,
t e , k , l 0 , k K , l L ,
t b , k 0 , k K ,
where C = G H Φ H Φ G . Note that “ ln 2 ” is neglected in the objective function without compromising its optimality. Since we omit the rank-1 constraint for tractability, if the rank of the solution of problem (21) satisfies rank ( W k ) = 1 , we can recover the solution for the beamformer at the BS ω k using eigenvalue decomposition. Otherwise, if the rank of the solution to the problem (21) is larger than 1, i.e.,  rank ( W k ) > 1 , the Gaussian randomization method can be employed to construct a suboptimal solution with a rank of one [24]. In addition, the convex problem (21) can be effectively solved using the CVX solver [25].
Algorithm 1 Optimize ω k with given Φ .
1:
Initialization: Iteration index i = 1 , W k 1 , t b , k 1 , and  t e , k , l 1
2:
repeat
3:
   Solve problem (21) for given t b , k i and t e , k , l i , and denote the solution as W k i + 1
4:
   Update t b , k i + 1 = ( λ b , k R k , B + 1 ) 1 for given t e , k , l i and W k i + 1
5:
   Update t e , k , l i + 1 = ( λ e , l R e , k , l + 1 ) 1 for given t b , k i + 1 and W k i + 1
6:
   Set i = i + 1
7:
until convergence
8:
for  k = 1 , , K  do
9:
   if  rank W k i + 1 > 1  then
10:
     Applying Gaussian randomization method to construct a suboptimal rank-1 solution ω k op
11:
   else
12:
     Using eigenvalue decomposition to obtain the rank-1 solution ω k op
13:
   end if
14:
end for
15:
Output:  ω k op

3.2. Optimize Φ with Given ω k

For any given ω k , k , we first define v = p 1 e j θ 1 , , p N e j θ N T for tractability in the sequel. To obtain the form of a quadratically constrained quadratic problem (QCQP), the terms in the numerator and denominator of (14) can be re-expressed as
G b , k = i = 1 K h b , k H ω i 2 + σ v 2 h i b , k H Φ 2 = v H T b , k v + 2 Re t b , k H v + d b , k ,
G ¯ b , k = j = 1 , j k K h b , k H ω j 2 + σ v 2 h i b , k H Φ 2 = v H T ¯ b , k v + 2 Re t ¯ b , k H v + d ¯ b , k ,
h i b , k H Φ 2 = v H diag h i b , k diag h i b , k H N b , k v ,
where
T b , k = j = 1 K diag ω j H G H h i b , k h i b , k H diag G ω j + σ v 2 N b , k , t b , k = j = 1 K diag ω j H G H h i b , k h a b , k H ω j ,
d b , k = j = 1 K h a b , k H ω j ω j H h a b , k , T ¯ b , k = j = 1 , j k K diag ω j H G H h i b , k h i b , k H diag G ω j + σ v 2 N b , k , t ¯ b , k = j = 1 , j k K diag ω j H G H h i b , k h a b , k H ω j , d ¯ b , k = j = 1 , j k K h a b , k H ω j ω j H h a b , k .
Additionally, constraint (13c), which is related to the active IRS, can be rewritten as
k = 1 K v H D + σ v 2 I N v P A max ,
in which D = diag ω k H G H diag G ω k . Accordingly, the SINR of l-th Eve for wiretapping the k-th user in (8) can be re-expressed as
G e , k , l = L h e , l H ω k 2 + j = 1 , j k K h e , l H ω j 2 + σ v 2 h i e , l H Φ 2 = v H T e , k , l v + 2 Re t e , k , l H v + d e , k , l ,
G ¯ e , k , l = j = 1 , j k K h e , l H ω j 2 + σ v 2 h i e , l H Φ 2 = v H T ¯ e , k , l v + 2 Re t ¯ e , k , l H v + d ¯ e , k , l ,
where
T e , k , l = L diag ω k H G H h i e , l h i e , l H diag G ω k + T ¯ e , k , l , t e , k , l = L diag ω k H G H h i e , l h a e , l H ω k + t ¯ e , k , l , d e , k , l = L h a e , l H ω k ω k H h a e , l + d ¯ e , k , l ,
in which
T ¯ e , k , l = j = 1 , j k K diag ω j H G H h i e , l h i e , l H diag G ω j + σ v 2 diag h i e , l diag h i e , l H N e , l , t ¯ e , k , l = j = 1 , j k K diag ω j H G H h i e , l h a e , l H ω j , d ¯ e , k , l = j = 1 , j k K h a e , l H ω j ω j H h a e , l .
Based on (14), (22)–(24), (26), and (27), we rewrite R k and R ¯ k e as R k = log 2 λ b , k G b , k + 1 λ b , k G ¯ b , k + 1 and R ¯ k e = 1 L l = 1 L log 2 λ e G e , k , l + 1 λ e G ¯ e , k , l + 1 , respectively.
To tackle the non-convexity of R k and R ¯ k e , we first introduce some slack variables as follows:
log 2 b 1 , k c 1 , k ,
λ b , k G b , k + 1 b 1 , k ,
log 2 b 2 , k c 2 , k ,
λ b , k G ¯ b , k + 1 b 1 , k ,
log 2 b 3 , k , l c 3 , k , l ,
λ e G e , k , l + 1 b 3 , k , l ,
log 2 b 4 , k , l c 4 , k , l ,
λ e G ¯ e , k , l + 1 b 4 , k , l .
We observe that (29), (30), (32), and (35) are not convex. To tackle this issue, we can utilize the SCA technique to approximate these constraints in a convex form. In particular, by employing the first-order Taylor expansion for these constraints, we have [26]
b 1 , k λ b , k 2 Re v ˜ H T b , k t b , k H v v ˜ H T b , k v ˜ d b , k 1 0 ,
log 2 b ˜ 2 , k + b 2 , k b ˜ 2 , k b ˜ 2 , k ln 2 a 2 , k 0 ,
log 2 b ¯ 3 , k , l + b 3 , k , l b ¯ 3 , k , l b ¯ 3 , k , l ln 2 a 3 , k , l 0 ,
b 4 , k , l λ e 2 Re v ˜ H T ¯ e , k , l t ¯ e , k , l H v v ˜ H T ¯ e , k , l v ˜ d ¯ e , k , l 1 0 ,
where v ˜ denotes the temporary variable, which is obtained in the last iteration. Then, by defining c k = [ c 1 , k , c 2 , k , c 3 , k , l , c 4 , k , l ] and b k = [ b 1 , k , b 2 , k , b 3 , k , l , b 4 , k , l ] , problem (13), with respect to optimizing v , can be approximated as
max v , c k , c k k = 1 K c 1 , k c 2 , k 1 L l = 1 L c 3 , k , l c 4 , k , l ,
s . t . ( 25 ) , ( 28 ) , ( 31 ) , ( 33 ) , ( 34 ) , ( 36 ) ( 39 ) .
We approximate all non-convex terms in problem (13) to convex terms in problem (40) for optimizing Φ with the given ω k . The convex problem (40) can be solved by a CVX solver. Moreover, in order to obtain the solution to problem (40) based on the SCA method, we iteratively optimize v . Detailed steps are described in Algorithm 2.
Algorithm 2 Optimize Φ with given ω k .
1:
Initialization: Iteration index i = 1 , ω k 1 , c k 1 , and  b k 1
2:
repeat
3:
   Solve problem (40) for given v i , a k i , and  b k i , and put the solution into the next iteration as v i + 1 , c k i + 1 , and  b k i + 1 , respectively
4:
   Set i = i + 1
5:
until convergence
6:
Output:  Φ op = diag v i + 1

3.3. Overall Algorithm

3.3.1. Convergence Analysis

The overall algorithm is an iterative optimization algorithm, as shown in Algorithm 3, which alternately optimizes ω k and Φ using iterative updates in each iteration. It can be easily seen that the AO-based algorithm generates a non-decreasing sequence of objective values in each iteration. In particular, by denoting the objective value of the original problem (13) as R · , it follows that
R ω k r + 1 , Φ r + 1 ( a ) R ω k r + 1 , Φ r ( b ) R ω k r , Φ r ,
where (b) holds because the maximum of the objective value of the original problem (13) is achieved when optimizing ω k for any given Φ . Similarly, (a) holds following the same reason as stated before. Therefore, the monotonically non-decreasing sequence for the objective value of the original problem (13) can be obtained. Moreover, because of limited resources, i.e., the bounded maximum transmit power budget of the BS and the maximum amplification power budget of the active IRS, R ω k , Φ has a finite upper bound; thus, it can converge to a stationary point.
Algorithm 3 AO algorithm for the proposed scheme.
1:
Initialization: Iteration index r = 1 , set ω k 1 = ω k op obtained from Algorithm 1 and Φ 1 = Φ op obtained from Algorithm 2
2:
repeat
3:
   Solve problem (21) by Algorithm 1, and denote the solution as ω k r + 1
4:
   Solve problem (40) by Algorithm 2, and denote the solution as Φ r + 1
5:
   Set r = r + 1
6:
until convergence
7:
Output:  ω op = ω r + 1 and Φ op = Φ r + 1

3.3.2. Complexity Analysis

The computational complexity of solving the SDR for the problem (21) is O M log 1 ϵ w 2 M 3 + 4 M 2 + 8 = O 2 M 3.5 log 1 ϵ w [27], where ϵ w is the convergence accuracy for problem (21), and the computational complexity of solving problem (40) is O 4 K + 4 K L + N 3.5 log 1 ϵ v , where ϵ v denotes the convergence accuracy for problem (40). Therefore, the complexity of the overall AO algorithm is
O Total = O 2 M 3.5 log 1 ϵ w + O 4 K + 4 K L + N 3.5 log 1 ϵ v .

4. Numerical and Simulation Results

In this section, we present simulation and numerical results from evaluating the performance of the proposed scheme in an active-IRS-aided secure communication system with multiple colluding Eves. Unless specified otherwise, the simulation parameters of the proposed scheme are listed in Table 3. The locations of the k-th user and l-th Eve are randomly generated within 3 m of the center locations of (20,5) and (20,−5), respectively. All channels in the proposed scheme are assumed to follow Rician channels, and we take the channel G as an example; it is shown below:
G = ρ d i α β 1 + β G LoS + 1 1 + β G NLoS ,
where ρ = 30 10 α log 10 ( d ) dB is the large-scale path loss; α is the path loss exponent; d is the distance in meters between the BS and the active IRS; β is the Rician factor; G LoS is the line-of-sight link between the BS and the active IRS; and the non-line-of-sight (NLoS) link between the BS and the active IRS is denoted as G NLoS in (43), where each entry follows the distribution CN 0 , σ G 2 . Moreover, for small-scale fading, the Rician factor of the active-IRS-related channels is 10, and that of the direct channels is 0 due to the unfavourable communication conditions in an urban environment. For large-scale fading, i.e., the LoS components, it is determined by multiplying the steering vectors of the transmitter with that of the receiver [27]. Other parameters are described in the specific simulation experiments. The benchmark schemes for comparison are as follows:
  • w/o an IRS [12]: We assume that no IRS is deployed, as compared with the proposed scheme. Then, we optimize the beamforming vector ω k , k of the BS to maximize the SSR. We set Θ = 0 N × N and σ v = 0 to obtain simulation diagrams of this case.
  • With a passive IRS [13]: We replace active IRS with passive IRS for the proposed scheme. Then, we optimize the beamforming vector ω k , k of the BS and the phase shift matrix Θ of the passive IRS to maximize the SSR. We set P = I N and σ v = 0 to obtain simulation diagrams of this case.
  • With an active IRS: the proposed scheme.
We first show the convergence behaviour of the proposed algorithm in Figure 3 by running the proposed algorithm once. Specifically, all curves are obtained by changing related parameters in the proposed algorithm. We can see in Figure 3 that our proposed algorithm demonstrates a favourable convergence behaviour, which verifies the validation of the proposed algorithm.
Figure 4 shows the influence of the number of legitimate users on security performance. It can be seen that when the number of Eves remains constant and the number of users increases, the interference ability of the multiple colluding Eves will decrease compared to the cases of a passive IRS and w/o an IRS. In addition, Figure 4 shows that when the number of users k increases while the number of Eves remains constant, the SSR of the proposed scheme shows an increasing trend, and the proposed scheme is superior to other two baseline schemes. Specifically, when the number of users is 4, the SSR value of the proposed scheme is about 11.3 % and 25.4 % higher than in the cases with a passive IRS and without an IRS, respectively, which indicates that deploying an IRS in a wireless communication network can improve the SSR, especially when the power amplification of each element of the IRS is applied.
Figure 5 shows that when the number of Eves, l, increases, the SSR value of each scheme monotonically decreases. This is because when the number of users remains constant and the number of Eves increases, more colluding Eves can jointly eavesdrop on users and decode confidential information transmitted by the BS, which significantly degrades the system’s security performance. Although the SSR values of all schemes decrease, the proposed scheme is superior to the other baselines. Specifically, when the number of Eves is 4, the SSR value of the proposed scheme is about 11.3 % and 31.7 % higher than in the schemes with and without a passive IRS, respectively. Among the three schemes, our proposed active IRS method consistently outperforms the other two baseline schemes.
Figure 6 and Figure 7 depict SSR values versus the number of passive/active IRS elements and the number of antennas, respectively. From Figure 6, it can be seen that the SSR values of all IRS-aided schemes increase as the reflecting elements N increase. In particular, our proposed scheme outperforms other schemes, and we can see that when the numbers of elements are 8 and 40, the SSR values of the proposed scheme are about 7 % / 16.8 % and 7.5 % / 29 % higher than in the cases with a passive IRS and without a passive IRS, respectively. This result also indicates that increasing the number of reflecting elements can provide more adjustable links to enhance the SSR. From Figure 7, it can be seen that the SSRs of all schemes increase as the number of BS antennas M increases. In particular, we can see that when the number of antennas is 4, the SSR value of the proposed scheme is about 5 % and 16.7 % higher than in the cases with a passive IRS and without an IRS, respectively. This indicates that increasing the number of transmit antennas can significantly improve the SSR for all schemes because more transmit antennas can provide more spatial DoFs to realize strong beam-focusing for the specific user, thereby enhancing the SSR values.
Figure 8 shows the SSR values versus the maximum power budget of the BS. We can notice that as the maximum transmit power increases, the SSR values of all schemes tend to increase. This is because a larger maximum transmit power budget at the BS leads to more DoFs for the optimization problem; thus, a higher SSR is achieved. Our proposed scheme is always superior to other benchmark schemes. In particular, when the maximum transmit power at the BS is 28 dBm, the SSR value of the proposed scheme is about 13 % and 32.6 % higher than in the schemes with and without a passive IRS, respectively. Compared with a passive IRS, an active IRS can overcome the fundamental limitation of the MFE. In other words, we can further optimize the power amplification of each element in an active IRS compared to a passive IRS. Simulation results show that the proposed scheme can enhance the values of the SSR in different scenarios with the assistance of the active IRS. These discussions demonstrate the effectiveness of the proposed scheme.
Although perfect CSI is assumed in the proposed scheme, we present Figure 9 to show the impact of imperfect CSI on the security performance of the proposed scheme. Specifically, we let all channels in the proposed scheme be h = h ^ + Δ h , where the real channel h can be replaced by G , h a b , k , h i b , k , h a e , k , and h i e , k , used for denoting channels in our work, and h ^ and Δ h ϵ represents the estimated channel and the corresponding channel uncertainty error caused by inaccurate channel estimation, with ϵ being the bound of the channel uncertainty error, respectively. The bound ϵ can be set to ϵ = δ h ^ , where δ denotes the CSI uncertainty level [29]. We can observe that the SSR values of all schemes decrease with an increasing CSI uncertainty level since the inaccurate channel estimation leads to difficulty in designing favourable beamformers for the BS and the active IRS. Although the SSR values of all schemes decrease, the proposed scheme is superior to other schemes. In addition, the performance saturation of the active IRS is achieved when the CSI uncertainty δ increases as compared with other schemes with a passive IRS and without an IRS, indicating that the introduction of an active IRS in the proposed scheme results in greater robustness compared with other schemes.

5. Conclusions

In this paper, we introduced an active IRS for secure wireless communications with multiple users and Eves and focused on investigating the potential of such a scenario with the help of the active IRS. For the non-convex problem formulated based on the AO algorithm, we first used the SDR method to deal with non-convex terms in an objective function for optimizing the beamforming vectors of the BS with any given beamforming matrix of the active IRS and then used the SCA method to transform the non-convex terms in the objective function into the convex terms for optimizing the beamforming matrix of the active IRS with any given beamforming vectors of the active IRS by applying a first-order Taylor expansion. Furthermore, numerical and simulation results verified that the active IRS in the proposed scheme can enhance SSR values in different settings when compared with other benchmark schemes, which shows that by deploying an active IRS in a scenario of secure resource allocation with multiple users and Eves, the security performance shows the most significant improvement when compared with schemes with and without a conventional passive IRS and different settings, such as numbers of users, Eves, reflecting elements, and BS antennas as well as the maximum transmit power budget of the BS.

Author Contributions

Conceptualization, J.X.; methodology, J.X. and Y.P.; software, J.X. and W.G.; validation, J.X. and Y.P.; formal analysis, J.X., Y.P. and R.Y.; investigation, J.X.; resources, Y.P., F.A.-H.,and M.M.M.; writing—original draft preparation, J.X.; writing—review and editing, Y.P., R.Y., W.G., F.A.-H. and M.M.M.; visualization, J.X.; supervision, Y.P.; project administration, Y.P.; funding acquisition, Y.P., F.A.-H. and M.M.M. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by The Science and Technology Development Fund, Macau SAR (0108/2020/A3).

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable.

Acknowledgments

The authors would like to acknowledge the Deanship of Graduate Studies and Scientific Research, Taif University, for funding this work.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Cui, T.J.; Qi, M.Q.; Wan, X.; Zhao, J.; Cheng, Q. Coding metamaterials, digital metamaterials and programmable metamaterials. Light. Sci. Appl. 2014, 3, e218. [Google Scholar] [CrossRef]
  2. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
  3. Pei, Y.; Liang, Y.C.; Zhang, L.; Teh, K.C.; Li, K.H. Secure communication over MISO cognitive radio channels. IEEE Trans. Wirel. Commun. 2010, 9, 1494–1502. [Google Scholar] [CrossRef]
  4. Cumanan, K.; Alexandropoulos, G.C.; Ding, Z.; Karagiannidis, G.K. Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis. IEEE Trans. Veh. Technol. 2017, 66, 7495–7505. [Google Scholar] [CrossRef]
  5. Liu, L.; Zhang, R.; Chua, K.C. Secrecy wireless information and power transfer with MISO beamforming. IEEE Trans. Signal Process. 2014, 62, 1850–1863. [Google Scholar] [CrossRef]
  6. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. Secrecy rate beamforming for multicell networks with information and energy harvesting. IEEE Trans. Signal Process. 2016, 65, 677–689. [Google Scholar] [CrossRef]
  7. Huang, Z.; Peng, Y.; Li, J.; Tong, F.; Zhu, K.; Peng, L. Secrecy Enhancing of SSK Systems for IoT Applications in Smart Cities. IEEE Internet Things J. 2021, 8, 6385–6392. [Google Scholar] [CrossRef]
  8. Zhu, H.; Peng, Y.; Xu, H.; Tong, F.; Jiang, X.Q.; Mirza, M.M. Secrecy Enhancement for SSK-Based Communications in Wireless Sensing Systems. IEEE Sens. J. 2022, 22, 18192–18201. [Google Scholar] [CrossRef]
  9. Cui, M.; Zhang, G.; Zhang, R. Secure wireless communication via intelligent reflecting surface. IEEE Wirel. Commun. Lett. 2019, 8, 1410–1414. [Google Scholar] [CrossRef]
  10. Ye, R.; Peng, Y.; Al-Hazemi, F.; Boutaba, R. A Robust Cooperative Jamming Scheme for Secure UAV Communication via Intelligent Reflecting Surface. IEEE Trans. Commun. 2024, 72, 1005–1019. [Google Scholar] [CrossRef]
  11. Zhang, Y.; Shen, Y.; Wang, H.; Yong, J.; Jiang, X. On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 2015, 13, 1281–1293. [Google Scholar] [CrossRef]
  12. Choi, J.; Park, J. Sum secrecy spectral efficiency maximization in downlink MU-MIMO: Colluding eavesdroppers. IEEE Trans. Veh. Technol. 2021, 70, 1051–1056. [Google Scholar] [CrossRef]
  13. Wang, Y.; Shi, W.; Huang, M.; Shu, F.; Wang, J. Intelligent Reflecting Surface Aided Secure Transmission with Colluding Eavesdroppers. IEEE Trans. Veh. Technol. 2022, 71, 10155–10160. [Google Scholar] [CrossRef]
  14. Qiao, T.; Cao, Y.; Tang, J.; Zhao, N.; Wong, K.K. IRS-Aided Uplink Security Enhancement via Energy-Harvesting Jammer. IEEE Trans. Commun. 2022, 70, 8286–8297. [Google Scholar] [CrossRef]
  15. Xu, D.; Yu, X.; Sun, Y.; Ng, D.W.K.; Schober, R. Resource allocation for secure IRS-assisted multiuser MISO systems. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  16. Xu, D.; Yu, X.; Kwan Ng, D.W.; Schober, R. Resource Allocation for Active IRS-Assisted Multiuser Communication Systems. In Proceedings of the 2021 55th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 31 October–3 November 2021; pp. 113–119. [Google Scholar] [CrossRef]
  17. Guan, X.; Wu, Q.; Zhang, R. Intelligent Reflecting Surface Assisted Secrecy Communication: Is Artificial Noise Helpful or Not? IEEE Wirel. Commun. Lett. 2020, 9, 778–782. [Google Scholar] [CrossRef]
  18. Chen, J.; Liang, Y.C.; Pei, Y.; Guo, H. Intelligent Reflecting Surface: A Programmable Wireless Environment for Physical Layer Security. IEEE Access 2019, 7, 82599–82612. [Google Scholar] [CrossRef]
  19. Yang, H.; Xiong, Z.; Zhao, J.; Niyato, D.; Xiao, L.; Wu, Q. Deep Reinforcement Learning-Based Intelligent Reflecting Surface for Secure Wireless Communications. IEEE Trans. Wirel. Commun. 2021, 20, 375–388. [Google Scholar] [CrossRef]
  20. Zhang, Z.; Dai, L.; Chen, X.; Liu, C.; Yang, F.; Schober, R.; Poor, H.V. Active RIS vs. passive RIS: Which will prevail in 6G? IEEE Trans. Commun. 2022, 71, 1707–1725. [Google Scholar] [CrossRef]
  21. Lyu, B.; Zhou, C.; Gong, S.; Hoang, D.T.; Liang, Y.C. Robust Secure Transmission for Active RIS Enabled Symbiotic Radio Multicast Communications. IEEE Trans. Wirel. Commun. 2023, 22, 8766–8780. [Google Scholar] [CrossRef]
  22. Li, P.; Bian, J. Active RIS-Assisted Transmission Design for Wireless Secrecy Network with Energy Harvesting. Math. Probl. Eng. 2023, 2023, 8897781. [Google Scholar] [CrossRef]
  23. Chen, H.; Li, N.; Long, R.; Liang, Y.C. Channel Estimation and Training Design for Active RIS Aided Wireless Communications. IEEE Wirel. Commun. Lett. 2023, 12, 1876–1880. [Google Scholar] [CrossRef]
  24. Wu, Q.; Zhang, R. Intelligent Reflecting Surface Enhanced Wireless Network: Joint Active and Passive Beamforming Design. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar] [CrossRef]
  25. Grant, M.; Boyd, S. CVX: Matlab Software for Disciplined Convex Programming, Version 2.1. Available online: http://cvxr.com/cvx (accessed on 1 February 2024).
  26. Sun, Y.; Babu, P.; Palomar, D.P. Majorization-Minimization Algorithms in Signal Processing, Communications, and Machine Learning. IEEE Trans. Signal Process. 2017, 65, 794–816. [Google Scholar] [CrossRef]
  27. Yu, X.; Xu, D.; Sun, Y.; Ng, D.W.K.; Schober, R. Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces. IEEE J. Sel. Areas Commun. 2020, 38, 2637–2652. [Google Scholar] [CrossRef]
  28. Zhou, G.; Pan, C.; Ren, H.; Wang, K.; Renzo, M.D.; Nallanathan, A. Robust Beamforming Design for Intelligent Reflecting Surface Aided MISO Communication Systems. IEEE Wirel. Commun. Lett. 2020, 9, 1658–1662. [Google Scholar] [CrossRef]
  29. Zhou, G.; Pan, C.; Ren, H.; Wang, K.; Nallanathan, A. A Framework of Robust Transmission Design for IRS-Aided MISO Communications With Imperfect Cascaded Channels. IEEE Trans. Signal Process. 2020, 68, 5092–5106. [Google Scholar] [CrossRef]
Figure 1. An active-IRS-aided secure communication system with multiple colluding Eves.
Figure 1. An active-IRS-aided secure communication system with multiple colluding Eves.
Mathematics 12 01597 g001
Figure 2. A flow chart of the proposed algorithm.
Figure 2. A flow chart of the proposed algorithm.
Mathematics 12 01597 g002
Figure 3. Convergence behaviour of proposed algorithm.
Figure 3. Convergence behaviour of proposed algorithm.
Mathematics 12 01597 g003
Figure 4. The SSR values versus the number of users, k.
Figure 4. The SSR values versus the number of users, k.
Mathematics 12 01597 g004
Figure 5. The SSR values versus the number of Eves.
Figure 5. The SSR values versus the number of Eves.
Mathematics 12 01597 g005
Figure 6. The SSR values versus the number of reflecting elements.
Figure 6. The SSR values versus the number of reflecting elements.
Mathematics 12 01597 g006
Figure 7. The SSR values versus the number of antennas.
Figure 7. The SSR values versus the number of antennas.
Mathematics 12 01597 g007
Figure 8. The SSR values versus the maximum transmit power at the BS.
Figure 8. The SSR values versus the maximum transmit power at the BS.
Mathematics 12 01597 g008
Figure 9. The SSR values versus the channel uncertainty level, δ .
Figure 9. The SSR values versus the channel uncertainty level, δ .
Mathematics 12 01597 g009
Table 1. A comparison of previous studies in the literature with our work.
Table 1. A comparison of previous studies in the literature with our work.
ReferenceNumber
of Users
Number
of Eves
Direct LinkScenarioType of IRS
[12]multiplemultiplesecure resource allocation/
[13]multiplemultiplesecure resource allocationpassive IRS
[14]singlesingleresource allocation
with the help of an
energy-harvesting jammer
passive IRS
[15]multiplesingle×secure resource allocationpassive IRS
[16]multiple/resource allocationactive IRS
[17]singlemultipleIRS-AN-aided
secure communication
passive IRS
[18]multiplemultiplesecure resource allocationpassive IRS
[19]multiplemultiplesecure resource allocationpassive IRS
[20]multiple/comparison of active IRS
and passive IRS
active IRS
[21]multiplemultiplesymbiotic radio multicast
of secure communication
active IRS
[22]multiplemultiplesecure, wireless energy
harvesting network
active IRS
our workmultiplemultiplesecure resource allocationactive IRS
Table 2. Definitions of the main symbols used in the proposed scheme.
Table 2. Definitions of the main symbols used in the proposed scheme.
SymbolDefinitionSymbolDefinition
G channel between BS
and active IRS
v v = [ Φ ( 1 , 1 ) , Φ ( 2 , 2 ) , , Φ ( N , N ) ] T
h a b , k direct channel between BS
and k-th user
σ b 2 noise power at each user
h a e , l direct channel between BS
and l-th Eve
σ e 2 noise power at each Eve
h i b , k channel between active IRS
and k-th user
Lnumber of Eves
h i e , l channel between active IRS
and l-th Eve
Knumber of users
ω k BS beamformer tended
for k-th user
Mnumber of antennas at BS
P amplification factor matrix
for active IRS
Nnumber of reflecting elements
at active IRS
Θ phase shift matrix
for active IRS
P BS max maximum power budget at BS
Φ beamformer matrix of
active IRS, Φ = P Θ
P A max maximum power budget
at active IRS
Table 3. Values of simulation parameters [20,28].
Table 3. Values of simulation parameters [20,28].
Symbol/ParameterValueSymbol/ParameterValue
number of users, K2path loss of
channel h a e , l
3.6
number of Eves, L2path loss of
channel h i b , k
3
number of antennas, M3path loss of
channel h a b , k
3.6
number of elements, N6maximum power budget
at BS, P BS max
30 dBm
location of
active IRS
[5,5]maximum power budget
at active IRS, P A max
24 dBm
location of
the BS
[0,0]noise power at
each user
60 dBm
Rician factor for
Rician channels, β
10 dBnoise power at
each Eve
60 dBm
path loss of
channel G
2.6 noise power at
active IRS
50 dBm
path loss of
channel h i e , l
3convergence threshold 10 4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, J.; Peng, Y.; Ye, R.; Gan, W.; AL-Hazemi, F.; Mirza, M.M. Secure Active Intelligent Reflecting Surface Communication against Colluding Eavesdroppers. Mathematics 2024, 12, 1597. https://doi.org/10.3390/math12101597

AMA Style

Xu J, Peng Y, Ye R, Gan W, AL-Hazemi F, Mirza MM. Secure Active Intelligent Reflecting Surface Communication against Colluding Eavesdroppers. Mathematics. 2024; 12(10):1597. https://doi.org/10.3390/math12101597

Chicago/Turabian Style

Xu, Jiaxin, Yuyang Peng, Runlong Ye, Wei Gan, Fawaz AL-Hazemi, and Mohammad Meraj Mirza. 2024. "Secure Active Intelligent Reflecting Surface Communication against Colluding Eavesdroppers" Mathematics 12, no. 10: 1597. https://doi.org/10.3390/math12101597

APA Style

Xu, J., Peng, Y., Ye, R., Gan, W., AL-Hazemi, F., & Mirza, M. M. (2024). Secure Active Intelligent Reflecting Surface Communication against Colluding Eavesdroppers. Mathematics, 12(10), 1597. https://doi.org/10.3390/math12101597

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop