XL-RIS empowered near-field physical layer security against jamming and eavesdropping attacks

Wireless communication is vulnerable to malicious jamming and eavesdropping attacks due to the broadcast nature of wireless channels. An extremely-large-scale reconfigurable intelligent surface (XLRIS) demonstrates its abilities to enhance the physical layer security (PLS) and compensate for the sev...

Full description

Saved in:
Bibliographic Details
Published inFrontiers of information technology & electronic engineering Vol. 25; no. 12; pp. 1750 - 1758
Main Authors Cui, Zelong, Liu, Jun, Yang, Gang
Format Journal Article
LanguageEnglish
Published Hangzhou Zhejiang University Press 01.12.2024
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Wireless communication is vulnerable to malicious jamming and eavesdropping attacks due to the broadcast nature of wireless channels. An extremely-large-scale reconfigurable intelligent surface (XLRIS) demonstrates its abilities to enhance the physical layer security (PLS) and compensate for the severe path loss. We investigate an XL-RIS empowered near-field PLS communication system against jamming and eavesdropping attacks with the help of artificial noise (AN). To maximize the secrecy capacity, we propose an alternating optimization (AO) based algorithm to jointly optimize the beamformers at the base station (BS) and the reflection coefficient matrix at the XL-RIS, subject to the BS’s maximum transmit power and the XL-RIS’s unitmodulus constraints. For the beamforming and AN design at the BS, auxiliary variables are introduced to reformulate the subproblem into a more tractable problem, which is solved by the proposed successive convex approximation (SCA) based algorithm. For the reflection coefficient matrix design at the XL-RIS, a manifold optimization (MO) based algorithm is proposed to address the challenge of large-scale variables and unit-modulus constraints. Numerical results show that XL-RIS can ensure secure communication even if the eavesdropper is located at the same direction as the legitimate user and closer to the XL-RIS.
Bibliography:SourceType-Scholarly Journals-1
ObjectType-Correspondence-1
content type line 14
ISSN:2095-9184
2095-9230
DOI:10.1631/FITEE.2400477