Abstract:
Ensuring signal confidentiality against eavesdroppers is particularly challenging, especially with imperfect channel state information (CSI). To address this, we propose ...Show MoreMetadata
Abstract:
Ensuring signal confidentiality against eavesdroppers is particularly challenging, especially with imperfect channel state information (CSI). To address this, we propose a novel approach leveraging reconfigurable intelligent surfaces (RISs) to enhance security and optimize transmission performance. This paper focuses on secure communication in symbiotic radio (SR) systems by investigating cooperative jamming-assisted transmission with RISs, providing a robust solution to these challenges. RIS-I, acting as a secondary transmitter (STx), multicasts confidential signals from the primary transmitter (Alice) to a primary user (Bob), protecting against eavesdropping by Eve. Additionally, RIS-I transmits its own signals to a secondary user (SU) using backscattering radio technology. Meanwhile, RIS-II serves as a cooperative jammer, converting received confidential signals from Alice into jamming signals by strategically adjusting its reflection coefficients to disrupt Eve’s reception. These RISs can operate cooperatively; when RIS-II transmits as an STx, RIS-I functions as a cooperative jammer. We explore two scenarios: 1. With perfect CSI for the wiretap channel, we propose a joint SDR(Semi-definite relaxation)+MM(Minorization-maximization) optimization algorithm to simultaneously optimize Alice’s beamforming vector and the RISs’ reflection coefficients. 2. With imperfect CSI, we derive the secrecy outage probability formula and evaluate the scheme’s performance across different scenarios. Numerical results demonstrate that RIS-assisted cooperative jamming significantly enhances the secrecy rate and reduces the secrecy outage probability for Bob, outperforming traditional RIS-assisted SR systems.
Published in: IEEE Transactions on Communications ( Early Access )
Funding Agency:
Citations are not available for this document.
Cites in Papers - |
Cites in Papers - IEEE (1)
Select All
1.
Yingkun Wen, Yan Huo, Junhuai Li, Jin Qian, Kan Wang, "Generative Adversarial Network-Aided Covert Communication for Cooperative Jammers in CCRNs", IEEE Transactions on Information Forensics and Security, vol.20, pp.1278-1289, 2025.