Introduction
Steady growth in smaller and more portable wireless devices due to the emergence of many internet-based and mobile-based services have led to the need to develop firmly secured wireless communication systems [1]. Physical layer security (PLS) concept has emerged as a promising candidate that exploits the wireless channel characteristics to ensure authentication and confidentiality in the physical layer, which was discovered by Wyner using a wiretap channel [2], [3], [4]. The basic concept of PLS includes three primary communication entities, as shown in Fig. 1.
The two legitimate nodes, i.e., transmitter, receiver, and one eavesdropper node referred to as Eve. The transmitter node, i.e., Alice, sends secret information to the receiver, i.e., Bob. Eve tries to decrypt the information to obtain the secret message.
PLS strategies have been proposed in the literature that aims to utilize the wireless channel characteristics such as fading, diversity, noise, and interference, for reducing the signaling overhead [5], [6]. They are more advantageous in decentralized networks since it does not require longer cryptographic key length as opposed to classical cryptography [7], [8], [9]. The concept of utilizing long secret key to attain perfect secrecy was successfully demonstrated by Shannon in 1949 [9]. This work inspired the research community to work on the idea of designing the robust and secured networks. The traditional cryptographic techniques may fail to provide robust security to the network for futuristic sixth-generation (6G) communication systems due to the unlimited computational capacity of quantum computing. The large amount of data that is collected by environmental, human-body sensors, etc. and the mobility features need more advanced security techniques that can be achieved by PLS combined with the advances in artificial intelligence (AI) algorithms. Hence, PLS has emerged as a promising technology for securing the network from eavesdroppers (Eves). Due to the aforementioned reasons, PLS-based methods are more suitable for providing robust security to emerging wireless technologies such as the Internet of Things (IoT), fifth-generation (5G)-Tactile Internet, vehicular communication for autonomous driving, remote surgery, etc., as these technologies are delay-sensitive, power-limited, and processing-restricted. It is likely to be best suited for critical applications such as financial services, mobile services, healthcare services, transport services, and AI-powered services which give utmost priority to strong security [1].
Nowadays, secured wireless communication is becoming more challenging due to the large number of users utilizing shared spectrum to improve spectrum efficiency such as cooperative communication and non-orthogonal multiple access (NOMA). Managing data security and privacy among billions of internet-connected devices is a significant challenge. Due to the rapid increase in IoT devices, the physical layer has become quite vulnerable to Eves due to hardware defects and physical signal features such as time, frequency, and modulation [10], [11]. The overall mobile data traffic figure anticipates reaching 5016 exabytes (EB)/month by 2030 as reported in International Telecommunication Union - Radiocommunication Report (ITU-R) [12]. There is a need to safeguard such a large volume of data from malicious users in wireless networks. Besides, securing such massive data, there are some other key performance indicators (KPIs) that motivate us to find new radical solutions for beyond 5G/6G based communication systems [13], [14]. The KPIs targeted for 6G are peak data rate (at least
Reconfigurable intelligent surface (RIS) is a planar surface that consists of a large number of low-power and low-cost passive elements as shown in Fig. 2. The outer layer comprises many reflecting elements, the middle layer is made of copper and the last layer has a circuit board that tunes the reflection coefficients. The RIS is operated by a smart controller. Each reflecting element is made up of positive-intrinsic-negative (PIN) diodes. The base station (BS) calculates the value of reflection coefficients depending on channel state information (CSI), which are provided to the RIS's controller through a feedback link. The key advantages of RIS are that it can improve the overall signal-to-interference-plus-noise ratio (SINR) without affecting the hardware, passively reflect the incident signals with optimal phase shifts, and reduce the number of antennas at the transmitter and receiver [17]. RIS is comparable to the half-duplex relay in terms of spectral efficiency performance and achieves the same and even better energy efficiency performance than a full-duplex relay. RIS does not require effective self-interference cancellation techniques or signal power amplification as compared to the conventional relay systems [18]. Also, due to its ability to get mounted on different surfaces, it is suitable for diverse application scenarios [17].
The RIS technology has several unique characteristics, such as it is nearly passive, unaffected by receiver noise, having complete frequency band response, being easily deployable, and does not need much signal processing [13], [19]. It also supports full-duplex transmission and adjusts the phase shifts to coherently combine the reflected, refracted, and scattered radio waves and minimizes the fading effect, thereby improving the performance [20]. The aforementioned features of RIS technology help in enhancing the quality of service (QoS) in terms of high data rate, support for a large number of users, ultra-high reliability, etc. [21], [22], [23]. Many existing PLS techniques, such as conventional beamforming, and artificial noise (AN), cannot provide complete security to the wireless network. The usage of RIS in conjunction with the PLS methods has been suggested in the literature to further enhance the overall security of communication between legitimate users [24], [25]. RIS's capability to perform passive beamforming increases the degree of freedom (DoF) that further enhances the system's performance, especially PLS. The main idea behind the design of RIS technology is the 2-Dimensional metasurface that can tune the wireless propagation environment by coherently combining the reflected, refracted, and scattered radio waves and directing them towards the legitimate receiver [26], [27]. In many research works, other terminologies for RIS such as intelligent reflecting surface (IRS) [28], [29], [30], [31], [32], intelligent wall [33], large intelligent surface (LIS) [22], have been used, though all these terms are based on the same principle of passive reflecting elements and perform same operation. A complete list of acronyms is given in Table 1.
As shown in Fig. 2, a multi-antenna BS with N antennas communicates with a single-antenna user via an M-element RIS in the presence of an Eve. RIS receives the signal
RIS combined with PLS dramatically improves the secrecy performance of wiretap channels (WTCs) [28], [29], [38], [39], [40], [41], [42], [43], [44]. The authors in [28] maximized the secrecy rate of RIS-assisted multi-antenna wireless communication system by applying alternating optimization. In [38], a more practical scenario is considered where the CSI of the Eve is unknown to the transmitter. By applying the joint beamforming and jamming scheme and effective utilization of RIS, the authors demonstrated the enhancement in secrecy rate. In [29], the authors considered an RIS-assisted Gaussian multiple-input multiple-output (MIMO) wiretap channel and maximized the secrecy rate by jointly designing the transmit covariance matrix at the transmitter and the phase-shift matrix at the RIS. The authors in [40] provided the asymptotic secrecy outage probability (SOP) analysis to study the impact of the increase in the number of reflecting elements of RIS and average SNRs. It is shown that the secrecy performance is enhanced by utilizing the characteristics of RIS. Then, in [41], [42], the authors utilized the concept of physical layer secret key generation by using RIS to maximize the secret key rate. Several research works have examined PLS scenarios for the cases of both known and unknown CSI of the Eve to the legitimate transmitter. In [43], the authors proposed an active RIS assisted system to minimize transmission power at UAV-borne BS and enhance achievable secrecy rate. In [44], the authors considered a active-RIS assisted MISO system with an eavesdropper and achieved enhanced secrecy performance gain by not only modifying the phase shifts but also by amplification of signal amplitudes.
There are some articles in the literature that address the related issue of PLS with brief discussion on RIS for some wireless networks [45], [46], [47], [48], [49], [50]. In [45], the authors have done a short survey by reviewing the research works related to RIS-assisted PLS and also suggested some of the open research challenges in RIS-assisted PLS scenarios. In [46], the authors have discussed about the various challenges, solutions and applications of PLS in beyond-5G systems, including cell-free massive MIMO, RIS, light fidelity (LiFi), or distributed and cooperative protocols. In [47], the authors discussed different use cases demonstrating the impact of RIS in enhancing the PLS of unmanned aerial vehicle (UAV) networks. In another survey [48], the authors have presented a systematic classification of key less PLS schemes. They have also concisely discussed about AI in PLS and RIS for PLS in the context of key less PLS. In [49], the authors have presented a comprehensive survey on different RIS applications in ground-based vehicular communications and aerial vehicular communications. In [50], the authors presented a comprehensive analysis on security and privacy challenges faced by RIS-assisted 6G technologies.
The aforementioned existing survey articles [45], [46], [47], [48], [49], [50] have not provided detailed discussion on RIS-assisted PLS systems. To the best of the authors' knowledge, this is the first survey article that addresses in detail about the wide range of research works focused on RIS-assisted PLS systems for improving the overall secrecy performance. Specifically, this work presents an in-depth analysis of how RIS is utilized to enhance the PLS for different wireless networks with different topologies. Additionally, this survey article aims to discuss RIS coupled with various promising 6G communication technologies such as RIS-assisted energy-efficient and extremely-high reliability and low latency with security (eRLLCS), RIS-assisted visible light communication (VLC) systems [51], RIS-UAV [52], RIS-NOMA [53], RIS-assisted intelligent transportation systems, and RIS-assisted smart healthcare. The major contributions of this survey article are detailed as follows:
A detailed and systematic classification of various RIS-assisted models is provided based on system model, fading distribution, type of eavesdropping attacks (active or passive), methodology adopted and performance metric evaluated.
Some promising essential technologies for 6G that use RIS to reduce eavesdropping and improve secrecy are discussed in this article.
This survey article also discuss various performance metrics required to evaluate the secrecy performance of RIS-assisted wireless networks.
A tutorial with an emphasis on key design issues, namely, PLS performance metrics, RIS placement in different communication scenarios, and RIS passive reflection optimization techniques from a security perspective, to help researchers, engineers, cyber-security practitioners, system designers, students, in clearly grasping the big picture of the role of RIS in enhancing PLS, is presented.
Lastly, possible research directions that could be further worked upon for the betterment of security in RIS-assisted PLS systems are suggested.
Fig. 3 shows the systematic representation of the survey. The rest of this paper is summarized as follows: Section II presents the PLS concept and the performance metrics to evaluate the secrecy performance of the given system. It discusses how PLS is useful in the development of highly secured and robust future wireless systems. Different kinds of privacy, minimization of active and passive attacks, and ultra-reliable and low latency communication (URLLC) are some of the PLS crucial features which are discussed in this Section. Section III provides a brief description of RIS and its applicability in the 6G scenario. Section IV summarizes the existing state-of-the-art methods for secrecy enhancement in RIS-assisted wireless systems. There is a discussion of technical challenges and future directions in Section V. Finally, we conclude the survey in Section VI.
Pls and Its Applicability in Other Network Scenarios
In this Section, we briefly discuss PLS, various performance metrics of PLS and its applicability in different wireless networks as shown in Table 2. Due to the anticipated trillions of IoT devices connected to the backbone network in the presence of a highly mobile and distributed environment, it has become crucial to adopt PLS techniques [54]. As discussed earlier, the PLS techniques exploit the channel characteristics, i.e., noise and fading, and transceiver architecture features such as synchronization and hardware impairment, to fully support legitimate communication by providing double-layer security [55]. Connecting more wireless devices increases the risk for future wireless networks [1].
Some of the critical aspects of future wireless networks in which PLS has a crucial role to play are as follows:
Privacy and authentication: Privacy is one of the most crucial elements which needs to be considered in wireless communication [56]. There are three different types of privacy: data privacy, location privacy, and identity privacy. Due to the demand for data-intensive on-demand services by the users, the service providers get access to their private information, which is stored and utilized by other collaborators, and adversarial entities in designing their recommendation systems [57]. So, in order to prevent illegal data access by service providers and securely implement the smart city concept, there is a need to ensure the privacy of users' data. User authentication is also essential in order to prevent the wireless network from impersonation threats [2], [56].
Enhancing secrecy capacity in MIMO system: With the help of PLS characteristics in [58], the authors achieved a large secrecy capacity between the source and destination. Antenna array beamforming techniques enhance communications between legitimate users while jamming Eve's signals. Multi-antenna deployments and cooperative relays can increase the SR performance of the system [3], [59], [60].
Minimize active and passive attacks: Interference and jamming are the two kinds of active attacks. These attacks use transmission power to interfere with the original signal. Jamming is of four types: spot, sweep, barrage, and deceptive jamming. Similarly, interference can persist by random and on-demand interference. Passive attacks include eavesdropping and traffic analysis. By applying different PHY layer security techniques, such as beamforming, AN, and directional antennas, the wireless networks can be prevented from such attacks to a certain extent [61].
Here, we briefly discuss some performance metrics.
A. Secrecy Capacity
The secrecy capacity is the difference between the capacity of the main channel and the Eve's channel [4], [62] and is given by
\begin{equation*}
C_\text{{S}} = C_\text{{M}} - C_\text{{W}}, \tag{1}
\end{equation*}
\begin{equation*}
C_\text{{M}} = \frac{1}{2} \log _{2}\left(1+\frac{P}{N_\text{{M}}}\right), \tag{2}
\end{equation*}
\begin{equation*}
C_\text{{W}} = \frac{1}{2} \log _{2}\left(1+\frac{P}{N_\text{{W}}}\right), \tag{3}
\end{equation*}
B. SOP and CONNECTION OUTAGE PROBABILITY (COP)
SOP is defined as the probability that the target rate becomes higher than the instantaneous code rate. It can be expressed as
\begin{equation*}
p_\text{{{out}}} = P(C_\text{{S}} < R_\text{{S}}), \tag{4}
\end{equation*}
COP is defined as the probability that the Eve receives the message successfully. Connection outage occurs when the amount of mutual information accumulated for legitimate channel is less as compared to the code rate.
C. Secrecy Throughput
It is the average amount of confidential information received without a secrecy outage at the receiver. Mathematically, it is given as the product of target SR and the secrecy probability [65]. Effective secrecy throughput depends on the CSI accuracy at transmitter. It increases with increase in accuracy of CSI availability upto a certain extent. Then it decreases since higher value of CSI accuracy will also enhance the Eve's decoding capability leading to rise in SOP as well [66]. Effective secrecy throughput can be defined as
\begin{equation*}
T_{eff} = (R_{code} - R_{red}) P_{r} (C_{L} - C_{eve}, C_{eve} < R_{eve}) \tag{5}
\end{equation*}
D. ERGODIC SECRECY CAPACITY (ESC)
Ergodic secrecy capacity is the capacity of fading channels calculated in an average sense, (which is an important parameter in PLS) since the received SNR varies with time for a faded scenario [67]. From the transmitter node to the
\begin{equation*}
R_{T:j} = E_{h_{j}, r_{j}} {\left[ log_{2} \left(1+ |h_{j}|^{2} P/ \left(r_{j}^\alpha \sigma _{s}^{2}\right)\right)\right]}, \tag{6}
\end{equation*}
\begin{equation*}
R_{T:e} = E_{h_{e}, r_{e}} {[ log_{2} (1 + |h_{e}|^{2} P/ (r_{e}^\alpha \sigma _{e}^{2})) ]}, \tag{7}
\end{equation*}
\begin{equation*}
C_{T:j} = \left[ {R_{T:j}}_{min} - {R_{T:e}}_{max} \right]^+, \tag{8}
\end{equation*}
E. Security Gap and Rate Interval
Security gap and rate interval can assess the PLS in URLLC. The security gap can be defined as
\begin{equation*}
\text{Security gap} = \frac{\text{SNR}_{\text{{Bmin}}}}{\text{SNR}_{\text{{Bmax}}}} \tag{9}
\end{equation*}
\begin{equation*}
\delta R = R_\text{{{tr}}} - R_\text{{{inf}}}, \tag{10}
\end{equation*}
F. INTERCEPT PROBABILITY and PROBABILITY of NONZERO SECRECY CAPACITY (PNSC)
The probability by which the secrecy capacity,
\begin{equation*}
P_{inter} = P_{r} (C_{s} < 0) \tag{11}
\end{equation*}
PNSC can be defined as the probability that secrecy capacity is maintained above zero level since the wireless channel is variable. The secrecy of the channel can be maintained only till the legitimate channel's quality is better than the eavesdropper's channel.
\begin{equation*}
P_{r} (C_{s}>0) = P_{r}(\gamma _{L} - \gamma _{eve}) \tag{12}
\end{equation*}
G. Secure Energy Efficiency
The energy efficiency of secured transmission over physical layer can be evaluated by the help of two performance metrics. One is the secure energy efficiency and the other is energy per secret bit. Secure energy efficiency can be defined as the amount of confidential information transmitted with a specified amount of energy consumed in duration
\begin{equation*}
EE = \frac{R_{sec}\delta T}{\delta E} = \frac{R{sec}}{P} (bits/Joule) \tag{13}
\end{equation*}
\begin{equation*}
E_{bit} = \frac{P}{R_{sec}} (Joules/bit) \tag{14}
\end{equation*}
Table 2 summarizes the existing surveys on PLS schemes in different wireless networks. In [76], the authors discussed PLS research on various 5G technologies including MIMO, NOMA, millimeter-wave communications, etc. and not particularly on RIS. The authors in [5] focussed on various multiple-antenna techniques to enhance PLS for different systems. Similarly, the authors in [79] have provided a detailed review on various secure transmission strategies from point-to-point channels to larger multi user networks Then, in [80], the authors presented a detailed survey on various PLS optimization strategies to maximize secrecy performance of the system. The authors in [81] and [82] focused particularly on PLS for VLC and UAV systems, respectively. Similarly, in [85], the authors presented an exhaustive survey on PLS in satellite communications. However, the aforementioned works in [5], [79], [80], [81], [82], [85] have not considered the important fact that besides controlling the transmitter and receiver, the propagation channel parameters can also be finely tuned. RIS has the capability to smartly control channel parameters thereby improving the SNR, security, spectral and energy efficiency. It can be integrated with other existing networks by modifying the network protocol. Also, it is nearly passive, light in weight and small in size due to which it can be easily deployed. All these unique characteristics can help in realizing an intelligent network in 6G scenario. The role of RIS in 6G PLS is discussed in following Section.
RIS and ITS APPLICABILITY in 6G PHYSICAL LAYER SECURITY SCENARIO
As shown in Fig. 4, the deployment of RIS in smart offices/homes, not only improves the connectivity but also compensates for the power loss by reflecting beamforming to nearby devices [93]. In order to enhance the coverage in an indoor environment such as airports, shopping malls, educational institutions, and factories, RIS can be fixed to walls, ceilings, and even furniture, which is quite practically feasible [94]. Similarly, the connectivity can be enhanced in outdoor environments by coating RIS on building exteriors, lampposts, high-speed moving vehicles, road signs, etc., in order to control the transportation system smartly and thus make the propagation environment intelligent [19], [78], [94], [95], [96], [97]. RISs can be deployed in high-security areas where BSs cannot be installed [98]. With the rapid evolution of 6G emerging technologies, i.e., THz communication, AI, intelligent wearables, implants, RIS, optical wireless communication (OWC), 3D networking, proactive caching, UAV, and wireless power transfer, the number of wireless devices has increased manifold [99], [100].
Table 3 shows the summary of representative works on RIS and its role in 6G PLS scenario. To support ubiquitous connectivity all over the world, including deserted places, as well as to satisfy the 6G KPIs in terms of data rate upto Tbps, RIS is an excellent option. It is due to its nearly passive nature, its ability to control the wavefront intelligently such that additional reflected paths are available at high frequency and visible light spectrum, and its easy deployment in the existing infrastructure [11], [13], [98], [101]. In [102], the authors investigated the performance of RIS-assisted THz massive MIMO system and by exploiting the use of RIS, the bit-error rate performance is improved by combating the large free space path-loss. It can provide a robust non-line-of-sight (NLoS) link in areas where obstacles block the line-of-sight (LoS) path [103]. The indoor RIS can be connected to the outdoor RIS which facilitates cooperative communication between the household environment and outside the public domain. As discussed in [104], intelligent Omni-surface, which is a specimen of RIS, can be utilized to provide ubiquitous service connectivity to mobile users. In the future, this ubiquitous wireless connectivity requires authentication and complete security from eavesdropping and man-in-the-middle attacks. It is possible with the help of RIS-assisted PLS techniques, which aim to redirect undesirable signals in such a way that the communication between legitimate users is strongly secured [45], [46], [101].
Some of the PLS applications of RIS in 6G are discussed as follows:
A. Ris-Assisted Erllcs Communication System
The smart city concept composed of advanced industries, schools/universities, and critical areas such as health care, defense sector, surveillance, etc., require less delay and secure connectivity that is free from Eves. The smart city model comprises applications as the upper layer, followed by an open-access platform and massive IoT infrastructure that forms the lower layer. These layers utilize the wireless medium to communicate with each other [123]. So, one must safeguard the interaction between the layers in a massive IoT against malevolent users regarding privacy, confidentiality, integrity, and interoperability. The next generation of communication systems will consist of massive self-organizing and self-healing robots. Many IoT devices, including personal IoT, healthcare IoT, and industrial IoT, require high computational power and, therefore, need more energy. So, in order to ensure an eco-friendly communication network design, bit-per-Joule energy efficiency (EE) is also a crucial performance criterion. It decides the applicability of a particular wireless technology for creating the green and sustainable network [124]. PLS exploits the inherent characteristics of the physical channel and does not involve any complex encryption/decryption process, due to which it becomes beneficial in providing security to delay-sensitive applications. It satisfies the ultra-low latency requirement of the given network while maintaining its security and privacy [69]. Authors in [125] applied the friendly jamming technique, which is one of the promising PLS techniques, to prevent the data from getting decoded by Eves. RIS turns out to be a powerful hardware technology for the upcoming 6G networks due to the presence of many low-cost and passive reflecting elements. It can play an important role in achieving PLS by carefully utilizing the channel conditions and by optimization of phase shifts of reflecting elements of RIS to enhance the data rate and energy efficiency compared to the traditional amplify-and-forward relay in communication networks [124], [126]. By configuring RIS to redirect the signals such that they produce destructive interference towards Eves and add constructively at desired users, the security of the system can be enhanced [123]. RIS maintains a trade-off between security, complexity, and energy while designing PLS protocols for IoT-based networks [127]. One of the methods used in conjunction with the RIS to improve network security is cooperative jamming [31].
B. Ris-Assisted Smart Healthcare System
The smart healthcare system is a data-intensive service that requires very high data rates, ultra-high reliability, and very low end-to-end delays that can be made possible by using 6G network [126]. As shown in Fig. 4, a smart healthcare system consists of intelligent internet of medical things (IIoMT) which are wearable devices and sensors that can intelligently monitor real-time data and securely send the patient's information to the medical staff via the internet. It is required to prevent the patients' privacy and access to the massive volume of critical information from eavesdropping, jamming, and spoofing [128]. Remote healthcare has become very crucial, especially in pandemic times when it is required to follow strict protocols and maintain social distancing to minimize the infection spread. It facilitates hospital-to-home (H2H) facility, thus reducing patient load at the hospital and supporting the elderly population who need continuous health monitoring to ensure well-being. For IIoMT devices, energy efficiency is the most crucial parameter. In order to send and receive confidential data securely and efficiently, reliable connectivity is also critical. Due to the boundless spread of a large amount of medical data, there is a need to address the security and privacy issue of this humongous information in order to form a fully connected and secured digital world [66]. In [129], the authors briefly discuss the three main classifications in which the PLS techniques can be categorized based on the kind of authenticity attack. These are cryptography, anomaly detection, and “friendly” jamming.
A PLS technique to ensure authentication and improve channel estimation for Wireless Implantable Devices is proposed. In the future, RIS-assisted PLS techniques can be used effectively to protect private medical and health data from Eves. It can be deployed for seamless connectivity and enhance the security of the legitimate link from malicious users. Also, due to its passive reflection mechanism, it is applicable for almost the whole frequency range, which makes it a cost-effective solution for 6G applications [130]. The capability of RIS to modify the propagation channel conditions can be effectively utilized to enhance reliability and sensing accuracy which are the prime concerns in the medical field [131]. In [13], the authors have proposed a design to create wearable body area network to monitor the health of people in real time by using RIS and smart sensors. The sixth generation of wireless communication networks can satisfy all these requirements, which are beyond 5G capabilities [132].
C. Ris-Assisted Smart and Secured Transportation
Smart transportation aims to enhance the cellular user's quality of service (QoS), road safety, traffic congestion, cost and energy efficiency by deploying the latest wireless technologies in the current transportation system [133]. It focuses the desired signal towards the intended receiver by adjusting the phase shifts and amplitudes of incident waves such that the desired information and energy is transmitted to the receiver [134]. Security issues in vehicle-to-infrastructure (V2I) networks are addressed by deploying RIS keeping in mind that it should be 1) optimally placed, 2) able to estimate the CSI in a highly dynamic vehicular environment, 3) able to reflect optimally, and 4) able to adapt to varied spectrum ranges. The intelligent transportation system needs to protect the communication links between different wireless vehicular network entities from Eve attacks as shown in Fig. 5.
In [106], the authors utilized RIS for both PLS as well as vehicle-to-vehicle (V2V) communication. In previous works, the researchers either did not consider RIS in the vehicular networks [136], [137], [138], [139], [140] or the system was a non-vehicular RIS-assisted PLS system. In [106], two scenarios are considered. In the first scenario, the authors considered a V2V network consisting of a RIS-based access point for transmission, and in the second scenario, they considered a vehicular ad-hoc network (VANET) comprising a RIS-based relay. The main idea is to utilize RIS as a reflector and a transmitter. Mobile nodes are considered and also the effects of fading. They showed that the parameters such as source power, Eve distance, the distance between source and relay, secrecy threshold, and the number of RIS cells had a great impact on the system's performance. The average secrecy capacity (ASC) and SOP of the system were analyzed. Similarly, in [107], the authors considered two realistic scenarios; one is V2V communication in which RIS acts as a relay as shown in Fig. 5, and the other is V2I, in which RIS acts as a receiver. SOP is analyzed, and the system's performance improves due to RIS's presence in the network.
D. Ris-Assisted Vlc Systems
VLC is a high-speed communication technique that utilizes existing illumination systems which makes it cost-effective. It operates within the frequency range of 400–800 THz, which makes it a suitable technique for the 6G scenario [141]. RIS's ability to re-configure the wireless propagation channel to compensate for the blocked LoS path is greatly utilized in enhancing the communication performance [142]. By intelligently controlling the reflection coefficients, a fine-grained three-dimensional (3D) passive beamforming toward the desired user can be achieved. This feature also helped in improving the secrecy performance of the single-input single-output (SISO) VLC system [108]. RIS is implemented as an intelligent controllable mirror array and by smartly controlling the orientation of each mirror, the difference between the channel gains of transmitter and receiver is increased, and thus the secrecy performance is improved. Now, in [109], the authors investigated the secrecy performance of a multi-user RIS-assisted VLC system. The system model is composed of multiple transmitters, multiple receivers, and an Eve. By adopting an additive channel model [143] instead of optimizing the mirror orientation as discussed above [108], the secrecy rate is significantly improved as compared to the other benchmarks, namely, random assignment case and without RIS case.
In [28], the authors considered maximizing the SR of a RIS-assisted RF multi-antenna system with a single antenna Eve. Most of the research works are focused on enhancing the secrecy performance of RIS-assisted standalone VLC or RF network [28], [108], [109]. So, the authors in [110] discussed the PLS of RIS-assisted dual-hop SISO-based VLC/RF hybrid network in the presence of an Eve eavesdropping from the relay. The first hop is the VLC link that transmits information in an electromagnetic-sensitive environment and the second hop corresponds to the RF link that further increases the communication coverage with the help of RIS and relay nodes. Closed-form expressions of SOP and strictly positive secrecy capacity are derived and verified via simulations. Further research can be done in RIS-assisted PLS systems considering multiple-input single-output (MISO) systems, MIMO systems, multiple RISs, Nakagami fading channels, etc.
E. Ris-Assisted Uav Communication Systems
UAV-based communication systems have emerged as one of the most innovative and upcoming wireless technologies, which is getting popularity due to its flexible networking architecture and affordable deployment cost [144], [145], [146], [147], [148]. They are needed in order to cater to explosive growth in wireless traffic, especially in high altitude areas or difficult terrains where either the BS is inoperative or is not possible to build [149], [150], [151], [152]. By optimization of rotation angles and RIS location, which can be adjusted by UAV, the ergodic capacity is improved [153].
By deploying a UAV relay with a RIS between users and BS, stronger legitimate links with ground nodes can be made, and also more potential Eves can be determined [154] as shown in Fig. 5. In [111], the authors investigated the performance of a RIS-assisted UAV secure communication systems that consists of rotary-wing UAV, ground user, and an Eve. Time division multiple access (TDMA) protocol is used in order to ensure legitimate communication between ground user and UAV. Building-mounted RIS is used to further assist secure data communication. Rician fading is assumed for all links. Imperfect CSI of the Eve is available to the transmitter. To maximize the average worst SR, joint uplink/downlink optimization is done by the proposed algorithm. The performance improvement is observed in simulation results due to the joint design of UAV trajectory, RIS's passive beamforming and transmit power of legitimates. The authors in [112] proposed a RIS-assisted UAV communication system that consists of UAV-mounted BS and a legitimate receiver to maximize the average secrecy rate. Passive Eve is considered, so, the small scale fading between the RIS and the passive Eve is difficult to achieve. Joint optimization of the trajectory, transmit power of UAV, and phase shifters of RIS is done and the SCA scheme is applied. It is demonstrated that with the help of RIS, the secrecy performance of the system is significantly improved. In [113], the authors maximized the fair secrecy energy efficiency which is calculated by taking the ratio of the minimum secrecy rate to the total power utilized. This is done by jointly optimizing the UAV's trajectory, phase shifts of RIS, and transmit power.
From these studies, it can be concluded that significant secrecy performance improvement can be achieved over the traditional schemes as in [113]. For efficient utilization of bandwidth resources, RIS can be deployed to enhance the spectral efficiency by integrating the index modulation [126]. By utilizing the THz and visible band, and deploying RIS, the spectral efficiency of the wireless communication system can be further increased [155], [156]. From the point of view of PLS, RIS aims to maximize the SR in the UAV-assisted networks, besides improving spectral efficiency [52], [157].
F. Ris-Assisted Noma Networks
NOMA is one of the crucial schemes for 5G and beyond wireless networks, because it has high spectral efficiency, low latency, supports a massive number of users, etc. [158], [159]. However, this scheme is quite prone to eavesdropping. So, there is a need to fully secure from malicious users [1], [160]. So, designing PLS techniques for NOMA is very critical for the security of the network [161]. The work in [161] focuses on PLS for downlink NOMA considering both kinds of Eves, i.e., 1) external Eves and 2) internal Eves.
The authors of [114] focused on securing wireless transmission in NOMA networks with RIS assistance. Rayleigh fading channel was used. The work utilized robust active and passive beamforming for the secure wireless transmission of data and to minimize overall transmission power. AN was introduced to degrade the information reception capability of the Eve. A sequential rank-one constraint relaxation (SROCR) based alternating optimization (AO) algorithm is applied to optimize the RIS reflection coefficients and transmit power efficiently. A robust beamforming design was analyzed mathematically and it was demonstrated that by carefully increasing the number of antennas at BSs, the transmit power decreases, and beamforming gain for secured communication in NOMA improves. It was shown that with the increase in the eavesdropping rate, the security requirement reduces due to which less AN is needed. The proposed AO algorithm performs better in terms of transmit power than two baseline schemes, i.e., random phase and equal power allocation (EPA). It consumes the least power of all. In article [115], the authors enhanced the heterogeneous internal secrecy requirements of NOMA users and minimized the total transmit power. They proposed SDP and SCA-based iterative algorithms to optimize active beamforming and passive phase shifts to minimize power consumption. A significant improvement in power consumption compared to conventional NOMA (C-NOMA), NOMA without RIS, and OMA with or without RIS is demonstrated. Then in [53], the authors investigated the performance of RIS-assisted downlink NOMA transmission system having two NOMA users. Two scenarios are considered. In the first one, internal eavesdropping is present, and in the second case, it extends to both external and internal eavesdropping. The authors further considered two sub-scenarios, one is the sub-scenario without CSI of Eve, and in another case, the Eve's CSI is available. Joint beamforming and power allocation scheme were applied to enhance the secrecy performance. Also, by increasing the number of reflecting elements of RIS, the secrecy performance is improved.
The authors in [116] optimized the SR, sum SR, and eavesdropping rate by jointly optimizing the transmit beamforming, artificial jamming, and RIS reflecting vectors. The jamming and NOMA signals are transmitted together to suppress eavesdropping and apply successive interference cancellation (SIC). In another article, [117], the secrecy performance of RIS-assisted NOMA networks consisting of two legitimate users, BS, and an Eve is evaluated in terms of SOP and ASC under a generalized Nakagami-m fading channel model. The secrecy diversity orders and high SNR slopes are also determined in [117].
G. Ris-Assisted Cr Systems
In this Section as shown in Fig. 6, we discuss CR systems which are deployed in order to cater to the ever increasing bandwidth demand of users and thus solve the spectrum scarcity issues. These are prone to eavesdropping, jamming, and spectrum sensing data falsification and need to be fully protected by applying PLS techniques [119]. The authors in [118] considered an underlay MIMO-CRN with a relay node to effectively utilize the spectrum and cater to a huge number of users. Both primary users (PUs) and secondary users (SUs) intelligently use the same spectrum in underlay MIMO-CRN due to which there is less interference to PU data. But to fully preserve the privacy of PU's and SU's data and maintain their data rate, the authors propose a bi-directional zero-forcing beamforming scheme to enhance the secrecy capacity of the network. Highly secured communication is achieved for both PUs and SUs and the results are demonstrated in terms of ergodic secrecy capacity and SOP. As shown in Fig. 6, RIS is combined with PLS to prevent the network from eavesdropping and to make it energy-efficient. Here
In [119], the authors considered a RIS-assisted gaussian CR MISO system and aim to enhance the secrecy rate of the SU. Joint optimization of transmit covariance at transmitter and phase shift coefficients at RIS is done by applying AO and improved results with RIS are reported in terms of secrecy rate. Similarly, in [120], the authors considered a RIS-assisted multiple-input-multiple-output cognitive radio wiretap channel (MIMO CR WTC) model and aim to enhance the secrecy rate of the SU. An AO is proposed for joint optimization of transmit covariance at the base station and phase shift coefficients at RIS. So, the secrecy rate of the SU is enhanced over other benchmark schemes and the proposed algorithm has fast monotonic convergence too. Then in [121], the authors considered a CR MISO WTC and aim to enhance the secrecy rate at SU under certain power constraints. It is assumed that complete CSI of PU and SU is available and for Eve, three different conditions of CSI are considered, namely, full CSI, imperfect CSI, and no CSI. To get the enhanced secrecy rate in each scenario, different optimization algorithms are proposed and optimized secrecy rates are obtained for each case. The authors in [122] considered a RIS-assisted cognitive radio network (CRN) that utilizes RIS to enhance its spectral efficiency, energy efficiency, and security.
Studies on Secrecy Enhancement in Various Ris-Assisted Wireless System Topologies
The major research works on secrecy performance in RIS-assisted wireless networks are summarized in this Section. The organization is done based on the system design, specifically how RIS relates to the network's topology. The research works presented are classified according to the four main categories, i.e., single/multiple users with single/multiple Eves. Further, they are analysed in terms of performance metrics obtained, antenna system deployed, number of RIS present, channel model used, and the major contributions in the research field. Table 4 presents a summary of representative works on secrecy enhancement of RIS-assisted wireless networks with single/multiple users and single/multiple Eves.
A. Secured Transmission for a Single User With One Eve
In Fig. 7, we consider a generic RIS-assisted system setup consisting of
1) Siso
For SISO wireless network configuration with a single transmitter, single receiver, single RIS, and an Eve, we consider
Recently, secret key generation (SKG) has gained popularity in safeguarding legitimate data communication from eavesdropping [41], [163]. Several research works have been reported in the literature [41], [42], [163], [164], [165], [166] for SKG and the secret key rate maximization in RIS-assisted wireless networks. SKG approach proves to be a lightweight PLS technique that uses shared keys among legitimate users to secure the privacy of the data communication from malicious users. Hence, Eves face difficulty in decoding the information because there is a low correlation between legitimate channels and Eves. In [163], the authors aim to increase the secret key capacity of the RIS-assisted system by optimizing the location of intelligent RIS units. The system model is composed of a single antenna transmitter, receiver, and Eve. The secret key capacity formula is derived, and besides enhancing the secret key capacity, the bit inconsistency rate is also reduced. In [41], [163], the authors have utilized RIS for SKG in order to enhance the secret key capacity. In [163], the authors consider a single Eve whereas [41] dealt with multiple non-colluding Eves. The Eves in both [41] and [163] are not completely passive, so, their CSI statistics are available to the transmitter as well as to the receiver. The authors in [167] investigated both constructive and destructive impact of RIS on physical layer key generation (PKG) scheme. The system setup is composed of a transmitter, receiver, RIS and an eavesdropper which can be active or passive. The experimental results demonstrated the improvement in sum secrecy rate.
The authors in [168] investigated the environment reconfiguraton attack (ERA) which is a wireless jamming attack primitive. The system setup is composed of legitimate transmitter, receiver and an eavesdropper that employ OFDM modulation technique along with RIS. RIS behaves as a practical low-cost toolkit for attackers and helps in disturbing legitimate receivers and thus randomness increases. Analytical, simulation as well as experimental results are presented. The results demonstrate that ERA is able to severely degrade available data rates even with small RIS. So, RIS acts as a powerful attacker tool that can deal with physical layer attacks against wireless communications. The authors in [169] designed a countermeasure against adversarial wireless sensing that is referred to as IRShield that acts as a plug-and-play privacy-preserving extension to the existing wireless infrastructure. The experimental evaluation of the designed system demonstrated that the adversarial motion detection rates from passive eavesdropping of wireless signals are lowered to 5% or less.
The authors in [170] analysed the security gap concept for Gaussian channels and for the discrete memoryless channels (DMCs) for any finite codelengths under any reliability/security conditions and at any transmission rates. The authors in [171] have proposed a suitable performance metric for URLLC networks, i.e., COP that maintains a trade-off between latency, reliability, security and network throughput. In another research work [172], the authors have analysed the performance of PLS in RIS-assisted hybrid automatic repeat request (HARQ) system. The system setup is composed of single antenna transmitter, receiver, Eve and an RIS in non-LoS scenario. The closed form expressions for COP and SOP are obtained in RIS-assisted hybrid automatic repeat request with chase combining (HARQ-CC) and hybrid automatic repeat request with incremental redundancy (HARQ-IR) systems and the numerical results are verified by simulation results.
2) Miso
For MISO configuration with a single transmitter, receiver, RIS, and an Eve, we consider
On a comparable basis, in [178], the authors aimed to maximize the SR of the network consisting of a multi-antenna transmitter, receiver, and Eve. Assuming that CSI is perfectly known to to the transmitter and the RIS. The differences are in the optimization techniques used at the transmitter and RIS. They have proposed two techniques, namely, element-wise block coordinate descent (BCD) and AO with minorization-maximization. The first is more suitable for small-scale RISs, while the second is more suitable for large-scale fading RISs. In [178], Rayleigh fading channels are employed. The simulation results indicate that the average SR performance for both BCD and AO algorithms is similar for wide range of transmit power values. The average SR performance is also compared with the no RIS scenario and demonstrates that the average SR improves significantly by employing the RIS. Similarly, in [185], the authors presented a power-efficient scheme that aimed to minimize the transmit power subject to secrecy constraints. A multi-antenna BS communicates with a single-antenna receiver in the presence of a single-antenna passive Eve. They employed an AO algorithm and semidefinite programming (SDP) relaxation to obtain an optimal secure transmit beamformer and reflecting beamformer design at RIS. The authors demonstrated that it outperforms when there is no RIS in terms of secure transmit power.
However, in prior works, the scenario like in [51] has rarely been thoroughly investigated, where the average power of a legitimate communication link is lesser than the Eve link. The considered channel in [51] is a quasi-state flat fading one. The average secrecy rate (ASR) is maximized by joint optimization of the access point (AP) transmit beamforming vector, and RIS reflect beamforming vector. An efficient algorithm based on alternating optimization (AO) maximizes the SR. The authors compared the performance of the proposed ‘alternating optimization’ based joint active and passive beamforming scheme with access point-maximum ratio transmission (AP-MRT) with RIS, without RIS. Furthermore, the proposed scheme in [51] was also validated by the analytical upper bound on SR, which agrees well with the simulation results. Using the presented simulation results in [51], it is shown that their scheme outperforms the existing benchmarks like AP-MRT in achieving secrecy.
The aforementioned research works studied the performance of single RIS-based wireless networks considering both large and small-scale RISs [178]. The SR performance can be further analyzed for multiple RISs scenarios. There are a few research works in which multiple RISs are considered to increase the communication links between the legitimate parties, which results in improved SR performance as demonstrated in [186], [187], [188], [189]. The multiple RISs are considered in order to make the data transmission more robust and secured [186]. Deep Reinforcement Learning approaches are also applied to smart radio environment composed of multiple RISs for the orchestration of tunable reflecting elements [190].
RIS can be used either as legitimate or eavesdropping in order to enhance the privacy of confidential information [187]. By deploying multiple RISs, the number of transmission paths between the legitimate receiver and the BS increases, which results in an improvement in the received signal power, thereby improving the overall SR performance [188]. The authors in [186] maximized the SR of the system in which multiple RISs cater to the users. When Eve is active, its CSI is available at AP. The switch state of each RIS is adjusted according to the system load. RIS phase shifts, AP transmit beamforming, and RIS switch state vector are jointly optimized to maximize SR under a given power constraint. They demonstrated that the proposed distributed RISs assisted scheme performs better in terms of SR than the conventional RIS-assisted scheme. In another research [187], the authors investigated the SR performance of multistream MIMO PLS system considering two RISs, i.e., one legitimate and the other eavesdropping RIS. The simulation system comprises a multi-antenna BS, a multi-antenna legitimate receiver, and a legitimate RIS. Within proximity of the legitimate communication link lies a multi-antenna Eve with an eavesdropping RIS to assist in decoding legitimate information. It was assumed that BS knows about the Eve but is unaware of the eavesdropping RIS. Similarly, the Eve is unaware of the deployment of the legitimate RIS. Frequency flat Rayleigh fading channels are considered. They showed that even with a minimal RIS size compared to an eavesdropping one, the SR increases over the whole range of SNR. In [189], the authors maximized the SR at the user in the network having RIS-assisted channel with inter-surface signal reflection. They apply the AO algorithm for joint optimization of the beamformer at transmitter and phase shift coefficients at double RIS. Product Riemannian manifold based AO algorithm is applied to optimize phase shift coefficients at both RIS. Performance comparison with the SDR-based AO algorithm demonstrates that SR in both cases is nearly the same but with a faster speed of convergence in the case of the Product Riemannian manifold based AO algorithm.
Furthermore, the performance can be analyzed under the generalized Nakagami-m distribution for small-scale fading as opposed to the Rayleigh fading channel models considered in the aforementioned works [28], [38], [114], [178]. The Nakagami-m distribution reduces to Rayleigh for
The researchers also focus on enhancing the SR of wireless communication in the mm/terahertz (THz) band by applying powerful beamforming techniques [193], [194]. In [173], the authors investigated the performance of the RIS in providing security to wireless communication in the mm/THz band. The considered channel in [173] is a rank one channel model with a dominant LoS link for the BS-RIS case in the presence of passive Eve. This paper discussed the SR maximization assuming discrete phase shift by joint optimization of the transmit beamforming and reflecting matrix. SR performance in terms of simulation curves is reported, and it is shown that with the increase in the number of reflecting elements of RIS, there is a steady increase in SR. Also, the SR performance enhances appreciably by applying SDP-based and BCD methods. Authors in [174] maximized the SR of downlink THz communication in the MISO wiretap channel by designing the active beamformer at the BS and the passive reflecting phase shifters at the RIS. They use a clustered channel model based on the extended Saleh Valenzuela model. RIS operates in two modes, i.e., sensing mode (for channel estimation) and computing mode. To jointly optimize the phase shifters and beamformers, two high-quality suboptimal designs are discussed, i.e., the closed-form successive design (SD) and the iterative joint design (JD). It is shown that the proposed RIS-based SD and JD methods perform better than the traditional optimal secure beamforming without RIS in terms of achievable secrecy data rate.
In [175], the authors maximized the SR over the BS to the legitimate user by jointly optimizing the BS beamforming matrix and the RIS phase shift matrix. The system design consists of a single antenna receiver, a multiple antenna Eve, one RIS, and one BS equipped with a multi-antenna uniform linear array. CSI is available to the BS and the RIS. The difference between the works in [174] and [175] lies in the kind of applied optimization techniques and also in the chosen frequency band. In [175], the authors developed an efficient algorithm that is executed by optimizing the phase shift matrix at RIS and transmitting beamforming vectors alternately, keeping the other parameters fixed. They exploit Majorization-Minimization (MM) and manifold optimization (MO) techniques to obtain the solution. The proposed algorithm in [175] not only improves the SR but is also computationally more efficient than the existing Charnes-Cooper transform and semidefinite relaxation (CCT-SDR).
In this part, we have reviewed the performance of RIS in enhancing the SR of wireless communication in the mm/THz band considering a single Eve. Then the joint optimization of the transmitter's beamforming matrix and RIS phase shift matrix is done to maximize the SR. Further investigation can be done by considering multiple colluding as well as non-colluding Eves since we need to thoroughly study the more realistic scenario. Practical optimization techniques that are cost and energy-efficient need to be designed to accurately obtain the CSI of Eves.
3) Mimo
In Fig. 7, by considering
The authors in [177] investigated the secrecy performance of a RIS-assisted MIMO and multi-Eve system that aims to enhance the secured communication among the multi-antenna enabled mobile devices targeting the beyond fifth generation (5G) mobile communication networks. They presented a system where all entities, i.e., the transmitting AP, the legitimate receiving user, and the Eve, have multiple antennas. CSI for all channels are accurately known at AP. RIS composed of multiple passive elements dynamically adjusts the phase shift of each reflecting element based on the propagation environment learned through periodic sensing [195]. In order to enhance the SR, the transmit covariance matrix at the AP and the RIS reflection coefficients are optimized jointly for both discrete and continuous RIS coefficients. The transmit covariance matrix optimization problem is solved by a successive convex approximation (SCA)-based algorithm to maximize the secrecy rate. This work can be extended to multiple legitimate users and multiple Eves. The authors of [32] investigated the impact of fading on the secrecy system performance and maximized the achievable secrecy rate with the required transmit power budget. The AN was introduced to bring in additional interference to degrade the reception of the Eve by exploiting the RIS-induced extra DoF. A generic MIMO system with a single BS, a legitimate receiver, a single Eve, and a RIS was considered. The work in [32] assumes that the CSI of the Eve is available at the BS. The BCD algorithm was applied to jointly optimize the secure precoder, the AN jamming precoder, and the phase shift matrix at the RIS. Using the weighted minimum mean square error (WMMSE) algorithm and the Karush-Kuhn-Tucker (KKT) conditions, the authors in [32] have derived the closed-form expressions for the secure precoder and the AN jamming precoder phase shift using the MM algorithm. The proposed algorithm proves to be superior over the baseline schemes in terms of SR. The authors in [196] have proposed RIS-assisted physical layer key generation (PLKG) strategy for TDD systems. The system model is a MIMO system composed of a transmitter, receiver, eavesdropper and RIS. The experimental results demonstrate that the proposed scheme achieves high KGR, low key error rate and randomness.
B. Secured Transmission for a Single User With Multiple Eves
In this Section, we classify the research works with a single receiver and multiple Eves based on number of antennas at the transmitter and receiver.
1) Siso
For this setup, we consider
As discussed earlier, in [41], the authors adopted the secret key generation concept by utilizing RIS in order to enhance the secrecy key capacity. Multiple non-colluding Eves are considered and RIS's ability was utilized to modify reflection coefficients that helped in minimizing the secret key leakage to Eves. A closed-form expression for lower bound on RIS-assisted wireless networks' secret key capacity is derived along with the multiple elements reflecting coefficient matrix that helped to increase the minimum secret key capacity. Semidefinite relaxation-successive convex approximation (SDR-SCA) optimization technique was applied to obtain the desired solutions. The authors have shown that by increasing the size of RIS in the network and using SDR-SCA, the secret key capacity is improved compared to other benchmark systems, such as one without RIS and one with RIS. The authors presented another study in [164] to generate secret keys in a RIS-assisted wireless network. RIS was utilized to generate artificial randomness in the propagation channel to achieve fast phase switching and support one time password-encrypted data transmission. Secure transmission rate and key generation rate (KGR) are derived and based on this, an optimal time slot allocation algorithm is formulated that caters to two phases, one is for key generation, and the other corresponds to data transmission. Here, the authors considered multiple Eves with the non-availability of CSI, and the Poisson point process (PPP) is used to derive KGR. Simulation results demonstrated that this proposed scheme outperforms the other two schemes, i.e., random phase-shifted RIS and when there is no RIS.
2) Miso
Many research works in the literature deal with security enhancement in RIS-assisted MISO wireless networks with multiple Eves. Table 3 lists some notable works in this area. We consider a MISO wireless network consisting of a multi-antenna transmitter, receiver, multiple Eves, and a RIS with multiple reflecting elements by taking
In [180], the authors considered two eavesdropping scenarios, i.e. colluding and non-colluding Eves and the transmitter is not completely aware about CSI of Eves' channels. The authors maximized the achievable secrecy rate in the presence of both the above eavesdropping scenarios. They distributed Eves randomly around the receiver, and the angle of arrival (AoA)-based CSI of the cascaded wiretap channel is imperfectly known. An efficient AO-based robust and secure beamforming (RSBF) scheme was presented that proved to perform better than the standard schemes. RIS can enhance spectrum as well as energy efficiency. So, there are a few papers that deal with improving energy efficiency besides providing security to the network [31], [197]. In [31], the authors investigated the secrecy performance of the RIS-assisted wireless network in the presence of cooperative jamming. The cooperative jamming concept involves transmitting the cooperative jamming signal that disturbs the Eve, and therefore, the signal helps in enhancing the SR. The work also aimed to maximize the energy efficiency of the network. The beamforming vector, jamming vector, and phase shift matrix were jointly optimized to maximize the energy efficiency and improve the SR over other benchmark schemes. In [197], the authors considered a RIS-assisted-secure-energy-efficient transmission that maximized the transmit power such that the SNR at legitimate user and Eve is under control. They optimized the beamforming weights at the transmitter and phase shift coefficients at RIS. All channels experience Rayleigh fading and perfect CSI is available at transmitter and receiver. It is shown that over the entire range of target SR, the transmit power of the proposed scheme remains almost constant, and noticeable improvement is seen compared to the other benchmark schemes.
C. Secured Transmission for Multiple Users With One Eve
In this Section, the classification of research works consisting of multiple receivers with one Eve is done based on number of antennas at transmitter and receiver.
1) Miso
In [182], the authors proposed a multi-user two-way communication setup with RIS and evaluated its secrecy performance. The system setup comprises several pairs of end-users, a RIS, and an Eve. Due to the non-LoS scenario, the RIS establishes communication links between the end users. Channels experience quasi-static block fading. Due to passive Eve, the instantaneous CSI of the Eve is not known to the users. The proposed scheme in [182] utilizes the signal from one particular user as good jamming to disturb the reception of the signal at the Eve. A user scheduling scheme is also derived to enhance the ASR. It was shown that it improves with the number of reflecting elements. ASR scaling laws are also derived considering very large transmit power, RIS reflecting elements, and the number of end-user pairs.
D. Secured Transmission for Multiple Users With Multiple Eves
Here, we consider the case when multiple receivers with multiple eves are present.
1) Miso
This scenario considers a MISO wireless network consisting of a multi-antenna transmitter, multiple receivers, and Eves, and a RIS with multiple reflecting elements, by taking
In [184], the authors considered the worst-case assumption, i.e., Eves possess more hardware resources and computational capabilities than legitimate users. The perfect CSI of Eves is unknown at AP. The Rician fading model is employed. The system setup consists of multi-antenna AP, multiple single-antenna legitimate users, and multi-antenna potential Eves. Transmit beamformers, AN covariance matrix, and RIS phase shifts are jointly optimized, and a robust, secured system demonstrates the vast potential of RIS in enhancing the PLS of future wireless communication systems.
Technical Challenges and Future Directions
In this Section, we discuss the technical challenges and open research directions that are identified on the basis of the presented survey.
A. Csi Acquisition
Most of the research works in RIS-assisted wireless networks are based on the assumption of the availability of exact CSI at the transmitter and/or RIS since accurate CSI is critical in order to optimally adjust the RIS elements to achieve maximum performance gains [198]. By employing long-term CSI, we can reduce the computational complexity of the overall system [198]. Also, it plays a crucial role while choosing a suitable secrecy performance metric and accordingly the appropriate PLS technique that can be applied for secured data transmission. However, in reality, knowledge of imperfect CSI can only be made available to the transmitter since the RIS is composed of a large number of passive reflecting elements, which makes it a very challenging task [45]. The conventional channel estimation schemes for RF are not suitable for RIS-assisted communication systems since the transceiver for RIS is entirely different from the conventional RF transceivers [198]. The authors in [114] assumed that the transmitter did not have complete knowledge of the CSI of the Eve, thereby necessitating more transmit power to achieve higher secrecy and reduce channel estimation inaccuracy. Hence, there is a need to design new channel estimation methods for RIS-assisted wireless communication links for different fading channel models.
B. Cost and Energy-Efficient Practical Protocols
The practical protocols required to deploy RIS at different places, optimally design them, and facilitate information exchange between the RIS and the traditional transceivers need to be cost and energy-efficient. We can apply PLS techniques for secured data transmission in IoT-based networks, but these strategies should have cost and power efficiency besides being delay-sensitive [199]. In [200], the authors have proposed a dynamic spectrum learning-assisted RIS framework in which by intelligently controlling the ON-OFF status of RIS elements, the energy efficiency and hence, the received SINR can be improved. But from the PLS point of view, the design of cost and power-efficient techniques for RIS-assisted wireless communication systems is still an open research problem.
C. RIS-ASSISTED PLS of LATEST 6G-BASED WIRELESS COMMUNICATION TECHNOLOGIES
6G networks focus on human-centric applications such as AI, virtual reality (VR), 3D media, blockchain technology, and the Internet of Everything (IoE) [201]. AI is the most crucial technology for 6G networks [202], [203], [204], [205], [206]. Tight integration of RIS with these latest wireless communication technologies such as mmWave communication, free-space optics, blockchain technology, mobile edge computing (MEC) architecture for space information networks (SIN) [207] etc., and its secrecy performance evaluation needs to be explored [208]. By optimally tuning the phase shifts of the scattering elements of RIS, the transmitted signals can be either reflected or refracted depending on the position of the legitimate receiver and Eve. With that adjustable reflected phase-shifted signal and the transmitted signal, one can improve the security and energy efficiency of the network.
D. Ris-Assisted Mimo System With Multiple Eves and Users
The researchers need to address yet another challenge based on this literature survey. They need to consider a more practical scenario with multiple Eves, and receivers [17] and improve the secrecy performance of the system. In [209], the authors investigated the secrecy performance of the system composed of multiple Eves and receivers. The authors in [210] investigated the secrecy performance of the massive MIMO system composed of a BS, multiple users, and an Eve. In another research, [211], the system setup consists of a downlink Rician MIMO channel, a multi-antenna BS, multi-antenna user, multi-antenna Eve, and a RIS, and they generate ergodic SRs. So, a more practical scenario with a better practical PLS improvement strategy and less signaling overhead needs to be designed [157].
Conclusion
The RIS is found to be a promising technology for enhancing the PLS of wireless networks and facilitating 6G wireless communication. Their ability to smartly control the propagation environment helps in improving the SR of wireless communication. This paper presents a detailed literature survey on the PLS of RIS-assisted wireless communication links for different systems and channel models. First, a brief discussion on the RIS and its applications in the 6G scenario is presented in this survey article. We discuss the various performance metrics used to evaluate the secrecy performance of wireless networks. Next, we present a detailed literature review on the RIS-assisted PLS of different wireless systems, including SISO, MISO and MIMO categorized based on the number of Eves. Finally, this survey presents the technical challenges and a few possible future research directions.
The research topics are related to RIS usage in 6G networks due to its diversified applications, and practical limitations such as the availability of complete CSI and hardware impairments. The performance of RIS-assisted wireless networks can be further analyzed whilst considering the mobility and orientation of RIS in combination with the MIMO system comprising multiple Eves and receivers. The performance gain in terms of secrecy rate due to RIS can be further studied by considering information encoding and QoS provisioning as well. Also, practical optimization strategies that can provide maximum performance gains from channel and RIS physical characteristics can be explored. Apart from security, the critical concern that one should consider while designing the PLS techniques for RIS-assisted links is the satisfaction of QoS requirements like reliability, power efficiency, spectral efficiency, and delay conditions.