This application claims priority to Korean Patent Applications No. 10-2023-0162807, filed on Nov. 21, 2023, and No. 10-2024-0150963, filed on Oct. 30, 2024, with the Korean Intellectual Property Office (KIPO), the entire contents of which are hereby incorporated by reference.
The present disclosure relates to a security technique for wireless communication systems, and more particularly, to a method and an apparatus for enhancing physical layer security (PLS) for a wireless network in a wireless communication system including a reconfigurable intelligent surface (RIS).
In modern mobile communications, numerous devices, especially Internet of Things (IoT) devices, are connected to the Internet through terrestrial networks (TN), such as cellular networks, and non-terrestrial networks (NTN), such as low Earth orbit (LEO) satellite systems. The LEO satellite systems serve as essential solutions in remote areas where terrestrial networks cannot reach. These advancements in mobile communications offer a promising solution for enabling widespread Internet connectivity.
As the number of devices connecting to wireless networks continues to grow, the importance of security is increasing. Encryption is essential for protecting information in various applications. However, due to the complexity of encryption and high computational requirements, it poses challenges, especially for resource-constrained devices.
In recent years, physical layer security (PLS) of wireless networks has gained significant attention. Various research efforts have been made to optimize a signal strength for legitimate receivers while minimizing it for eavesdroppers. These efforts include the use of artificial noise (AN)-assisted schemes and signal jamming techniques. Nevertheless, AN-assisted schemes often require additional power, leading to power inefficiency and increased signal fluctuation. On the other hand, signal jamming techniques require dedicated jamming devices and extra power to transmit jamming signals.
A reconfigurable intelligent surface (RIS) is a software-controlled meta-surface that supports the dynamic configuration of wireless channels. RIS technology is known for its cost efficiency and low power consumption and is emerging as a pioneering concept in signal transmission design. RIS is also commonly referred to as an intelligent reflecting surface (IRS). In the present disclosure, RIS and IRS are used interchangeably.
Accordingly, there is a demand for new solutions that can enhance both transmission capacity and security by utilizing RIS.
The present disclosure for resolving the above-described problems is directed to providing a method and apparatus for enhancing security of wireless communications, including terrestrial network (TN) and non-terrestrial network (NTN) communication, without imposing additional burdens on wireless platforms such as satellites, base stations, gateways, terminals, or user equipment (UE).
The present disclosure for resolving the above-described problems is also directed to providing a method and apparatus for enhancing security that can disrupt operations of eavesdroppers more economically and efficiently, unlike conventional security techniques that simply use artificial noise (AN) or signal jamming, by utilizing low-cost hardware of a reconfigurable intelligent surface (IRS).
The present disclosure for resolving the above-described problems is also directed to providing a method and apparatus for enhancing security, designed to operate independently of prior knowledge of an eavesdropper's channel, thereby eliminating constraints related to the number of eavesdroppers or eavesdropping antennas.
A security enhancement method performed by a controller controlling a reconfigurable intelligent surface (RIS), according to an exemplary of the present disclosure for resolving the above-described technical problems, may comprise: selecting first RIS elements for a first signal transmitted between a transmitter and a first receiver that is a legitimate receiver, the first RIS elements including at least part of elements of the RIS; transmitting the first signal to the first receiver using the first RIS elements; and dynamically rendering a channel with another receiver or an eavesdropper without changing a channel with the first receiver during a channel coherence time between the transmitter and the first receiver, by changing phase(s) of at least part of the first RIS elements at least once during the channel coherence time.
The first signal may include reference signals or pilot signals for channel estimation.
An interval of the reference signals or pilot signals may be set to be smaller than the channel coherence time for the first signal.
The security enhancement method may further comprise: estimating a channel capacity of the first RIS elements, wherein the estimated channel capacity may be a maximum channel capacity of the first RIS elements.
The security enhancement method may further comprise: determining a channel capacity to be actually used for the first RIS elements by multiplying the maximum channel capacity by a weight having a positive real value less than 1.
The weight may be selected as a value equal to or greater than 0.5 and equal to or less than 0.9.
The maximum channel capacity may be determined based on an optimum accumulated channel from the transmitter to the first receiver.
The security enhancement method may further comprise: determining an accumulated channel with multiple roots from the transmitter to the first receiver.
The rendering may be performed at least once during a reception duration of the first signal, when the first receiver operates for the channel estimation.
The security enhancement method may further comprise: estimating a channel capacity of the first RIS elements, wherein the channel capacity may be estimated as a channel capacity when an inverse bandwidth of a baseband signal at the first receiver is equal to or less than a half of the channel coherence time.
A security enhancement device using a reconfigurable intelligent surface (RIS), according to another exemplary of the present disclosure for resolving the above-described technical problems, may comprise: a memory storing at least one instruction; and a processor executing the at least one instruction, wherein the at least one instruction may cause the processor to perform: selecting first RIS elements for a first signal transmitted between a transmitter and a first receiver that is a legitimate receiver, the first RIS elements including at least part of elements of the RIS; transmitting the first signal to the first receiver using the first RIS elements; and dynamically rendering a channel with another receiver or an eavesdropper without changing a channel with the first receiver during a channel coherence time between the transmitter and the first receiver, by changing phase(s) of at least part of the first RIS elements at least once during the channel coherence time.
The first signal may include reference signals or pilot signals for channel estimation.
An interval of the reference signals or pilot signals may be set to be smaller than the channel coherence time for the first signal.
At least one instruction may cause the processor to perform: estimating a channel capacity of the first RIS elements, wherein the estimated channel capacity may be a maximum channel capacity of the first RIS elements.
At least one instruction may cause the processor to perform: determining a channel capacity to be actually used for the first RIS elements by multiplying the maximum channel capacity by a weight having a positive real value less than 1.
The weight may be selected as a value equal to or greater than 0.5 and equal to or less than 0.9.
The maximum channel capacity may be determined based on an optimum accumulated channel from the transmitter to the first receiver.
At least one instruction may cause the processor to perform: determining an accumulated channel with multiple roots from the transmitter to the first receiver.
The rendering may be performed at least once during a reception duration of the first signal, when the first receiver operates for the channel estimation.
At least one instruction may cause the processor to perform: estimating a channel capacity of the first RIS elements, wherein the channel capacity may be estimated as a channel capacity when an inverse bandwidth of a baseband signal at the first receiver is equal to or less than a half of the channel coherence time.
According to the present disclosure, unlike the conventional security techniques that simply use artificial noise (AN) or signal jamming, a security enhancement method and apparatus can be provided that more economically and efficiently disrupt eavesdropper activities by utilizing a reconfigurable intelligent surface (RIS) with low-cost hardware.
In other words, to accurately estimate a channel at a terminal or receiver, it is essential for the channel to remain stable during an interval of reference signals or pilot signals for channel estimation. Furthermore, to enable proper information detection, the channel needs to remain unchanged for a duration of subsequent signal reception until the next reference signal is received. Considering that the interval between reference signals or pilot signals need to be set smaller than a channel coherence time, a constant channel between a legitimate receiver and the RIS may be maintained during a specific period (i.e. the channel coherence time). Simultaneously, a channel between an eavesdropper and the RIS is intentionally made dynamic throughout the channel coherence time. Thus, according to the present disclosure, overall security can be enhanced by negatively impacting the eavesdropper's signal reception performance without impairing the channel estimation and signal detection capabilities of the legitimate receiver.
Furthermore, according to the present disclosure, a new security enhancement technique can be provided for wireless communication systems, particularly LEO satellite systems, that operates independently of prior knowledge of the eavesdropper's channel. This removes constraints related to the number of eavesdroppers or the number of eavesdropping antennas.
RIS scheme are integrated according to the third exemplary embodiment of the present disclosure, based on a predetermined range of factor values.
Since the present disclosure may be variously modified and have several forms, specific exemplary embodiments will be shown in the accompanying drawings and be described in detail in the detailed description. It should be understood, however, that it is not intended to limit the present disclosure to the specific exemplary embodiments but, on the contrary, the present disclosure is to cover all modifications and alternatives falling within the spirit and scope of the present disclosure.
Relational terms such as first, second, and the like may be used for describing various elements, but the elements should not be limited by the terms. These terms are only used to distinguish one element from another. For example, a first component may be named a second component without departing from the scope of the present disclosure, and the second component may also be similarly named the first component. The term “and/or” means any one or a combination of a plurality of related and described items.
In exemplary embodiments of the present disclosure, “at least one of A and B” may refer to “at least one of A or B” or “at least one of combinations of one or more of A and B”. In addition, “one or more of A and B” may refer to “one or more of A or B” or “one or more of combinations of one or more of A and B”.
When it is mentioned that a certain component is “coupled with” or “connected with” another component, it should be understood that the certain component is directly “coupled with” or “connected with” to the other component or a further component may be disposed therebetween. In contrast, when it is mentioned that a certain component is “directly coupled with” or “directly connected with” another component, it will be understood that a further component is not disposed therebetween.
The terms used in the present disclosure are only used to describe specific exemplary embodiments, and are not intended to limit the present disclosure. The singular expression includes the plural expression unless the context clearly dictates otherwise. In the present disclosure, terms such as ‘comprise’ or ‘have’ are intended to designate that a feature, number, step, operation, component, part, or combination thereof described in the specification exists, but it should be understood that the terms do not preclude existence or addition of one or more features, numbers, steps, operations, components, parts, or combinations thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. Terms that are generally used and have been in dictionaries should be construed as having meanings matched with contextual meanings in the art. In this description, unless defined clearly, terms are not necessarily construed as having formal meanings.
Hereinafter, exemplary embodiments of the present disclosure will be described in greater detail with reference to the accompanying drawings. In order to facilitate general understanding in describing the present disclosure, the same components in the drawings are denoted with the same reference signs, and repeated description thereof will be omitted.
A communication network to which exemplary embodiments according to the present disclosure are applied will be described. The communication system may be a non-terrestrial network (NTN), a 4G communication network (e.g. long-term evolution (LTE) communication network), a 5G communication network (e.g. new radio (NR) communication network), a 6G communication network, or the like. The 4G communication network, 5G communication network, and 6G communication network may be classified as terrestrial networks.
A terrestrial network may be referred to as a wireless communication network and used interchangeably with a wireless communication system.
The NTN may operate based on the LTE technology and/or the NR technology. The NTN may support communications in frequency bands below 6 GHz as well as in frequency bands above 6 GHz. The 4G communication network may support communications in the frequency band below 6 GHz. The 5G communication network may support communications in the frequency band below 6 GHz as well as in the frequency band above 6 GHz.
The communication network to which the exemplary embodiments according to the present disclosure are applied is not limited to the contents described below, and the exemplary embodiments according to the present disclosure may be applied to various communication networks. Here, the communication network may be used in the same sense as the communication system.
Referring to
The communication node 120 may include a communication node (e.g. a user equipment (UE) or a terminal) located on a terrestrial site and a communication node (e.g. an airplane, a drone) located on a non-terrestrial space. A service link may be established between the satellite 110 and the communication node 120, and the service link may be a radio link. The satellite 110 may provide communication services to the communication node 120 using one or more beams. The shape of a footprint of the beam of the satellite 110 may be elliptical.
The communication node 120 may perform communications (e.g. downlink communication and uplink communication) with the satellite 110 using LTE technology and/or NR technology. The communications between the satellite 110 and the communication node 120 may be performed using an NR-Uu interface. When dual connectivity (DC) is supported, the communication node 120 may be connected to other base stations (e.g. base stations supporting LTE and/or NR functionality) as well as the satellite 110, and perform DC operations based on the techniques defined in the LTE and/or NR specifications.
The gateway 130 may be located on a terrestrial site, and a feeder link may be established between the satellite 110 and the gateway 130. The feeder link may be a radio link. The gateway 130 may be referred to as a ‘non-terrestrial network (NTN) gateway’. The communications between the satellite 110 and the gateway 130 may be performed based on an NR-Uu interface or a satellite radio interface (SRI).
The gateway 130 may be connected to the data network 140. There may be a ‘core network’ between the gateway 130 and the data network 140. In this case, the gateway 130 may be connected to the core network, and the core network may be connected to the data network 140. The core network may support the NR technology. For example, the core network may include an access and mobility management function (AMF), a user plane function (UPF), a session management function (SMF), and the like. The communications between the gateway 130 and the core network may be performed based on an NG-C/U interface.
Alternatively, a base station and the core network may exist between the gateway 130 and the data network 140. In this case, the gateway 130 may be connected with the base station, the base station may be connected with the core network, and the core network may be connected with the data network 140. The base station and core network may support the NR technology. The communications between the gateway 130 and the base station may be performed based on an NR-Uu interface, and the communications between the base station and the core network (e.g. AMF, UPF, SMF, and the like) may be performed based on an NG-C/U interface.
Referring to
Each of the satellites 211 and 212 may be a LEO satellite, a MEO satellite, a GEO satellite, a HEO satellite, or a UAS platform. The UAS platform may include a HAPS. The satellite 211 may be connected to the satellite 212, and an inter-satellite link (ISL) may be established between the satellite 211 and the satellite 212. The ISL may operate in an RF frequency band or an optical band. The ISL may be established optionally.
The communication node 220 may include a terrestrial communication node (e.g. UE or terminal) and a non-terrestrial communication node (e.g. airplane or drone). A service link (e.g. radio link) may be established between the satellite 211 and communication node 220. The satellite 211 may provide communication services to the communication node 220 using one or more beams.
The communication node 220 may perform communications (e.g. downlink (DL) communication or uplink (UL) communication) with the satellite 211 using LTE technology and/or NR technology. The communications between the satellite 211 and the communication node 220 may be performed using an NR-Uu interface. When DC is supported, the communication node 220 may be connected to other base stations (e.g. base stations supporting LTE and/or NR functionality) as well as the satellite 211, and may perform DC operations based on the techniques defined in the LTE and/or NR specifications.
The gateway 230 may be located on a terrestrial site, a feeder link may be established between the satellite 211 and the gateway 230, and a feeder link may be established between the satellite 212 and the gateway 230. The feeder link may be a radio link. When the ISL is not established between the satellite 211 and the satellite 212, the feeder link between the satellite 211 and the gateway 230 may be established mandatorily.
The communications between each of the satellites 211 and 212 and the gateway 230 may be performed based on an NR-Uu interface or an SRI. The gateway 230 may be connected to the data network 240. There may be a core network between the gateway 230 and the data network 240. In this case, the gateway 230 may be connected to the core network, and the core network may be connected to the data network 240. The core network may support the NR technology. For example, the core network may include AMF, UPF, SMF, and the like. The communications between the gateway 230 and the core network may be performed based on an NG-C/U interface.
Alternatively, a base station and the core network may exist between the gateway 230 and the data network 240. In this case, the gateway 230 may be connected with the base station, the base station may be connected with the core network, and the core network may be connected with the data network 240. The base station and the core network may support the NR technology. The communications between the gateway 230 and the base station may be performed based on an NR-Uu interface, and the communications between the base station and the core network (e.g. AMF, UPF, SMF, and the like) may be performed based on an NG-C/U interface.
Referring to
It is assumed that Alice and Bob have access to channel state information (CSI). A channel vector between Alice and Bob may be represented as h=[h1h2]T. In addition, Eve has access to CSI at a level of a characteristic vector g=[g1g2]T which characterizes a channel between Alice and Eve. Additionally, it is also assumed that Eve is located at a distance of several wavelengths from Bob, ensuring the independence between the two channel vectors.
Initially, an Alamouti code may encode two signals across two consecutive time slots, resulting in a 2×2 signal matrix. When two transmit signals to be encoded are denoted as s1 and s2, an Alamouti-encoded signal matrix may be represented as in Equation 1.
In Equation 1, s1 and s2 are signals at a time t, and −s2* and s1* are signals at a time t+T.
Then, for the artificial noise (AN)-added Alamouti code, the encoded signal matrix across two time slots may be represented as the Alamouti-encoded signal matrix with an AN matrix W added. The AN-assisted Alamouti-encoded signal matrix Z may be represented as in Equation 2.
In Equation 2, the AN matrix W may be expressed as in Equation 3.
Here, βi,k represents a coefficient of a complex Gaussian random variable v for the i-th time slot and k-th transmit antenna. The complex Gaussian random variable is characterized by a mean of zero and unit variance.
As such, the transmitter Alice needs to be equipped with not only an Alamouti encoder 330 but also an AN generator 310, and it needs allocate power to the artificial noise in addition to a signal power. Consequently, a total transmit power of the transmitter may increase. Therefore, the coefficient βi,k for the complex Gaussian random variable in the AN matrix for AN power needs to be designed as shown in Equation 4.
As shown in Equation 4, the AN may be canceled when received at Bob, and one of possible solution sets for βi,k may be expressed as in Equation 5.
In Equation 5, hi represents an accumulated channel in the i-th channel.
According to the above description, a signal vector received by Bob may be expressed as in Equation 6.
Here, (yb)i and (nb)i represent a signal and an additive white Gaussian noise (AWGN) received by Bob in the i-th time slot, respectively.
A detection process of Bob may be performed in the same manner as the conventional Alamouti scheme. That is, a signal vector detected at Bob does not include an interference vector generated by the artificial noise.
Meanwhile, a signal vector received by Eve may be expressed as in Equation 7.
Here, (ye)i and (ne)i represent a signal and an AWGN received by Eve in the i-th time slot, respectively.
A signal vector detected by Eve's detection process may include both a signal for information transmission and an interference vector We incurred by the artificial noise.
The interference vector We incurred by the artificial noise is represented as in Equation 8.
As described, Eve is subjected to interference from artificial noise (AN) in the form of the interference vector that remains independent of her signal-to-noise ratio (SNR). Therefore, if Eve attempts to extract information from the wireless communication channel, her eavesdropping operation becomes considerably complex.
Meanwhile, the aforementioned method protects information from unauthorized data access by introducing AN to interfere with the eavesdropper's signal. However, it has the drawback of requiring additional power for AN. That is, since AN is used independently of the transmit signal, the total transmit power of the transmitter is equal to a sum of the signal power and AN power. Thus, if equal power is allocated to both the signal and AN at the transmitter, a power loss of approximately 3 dB occurs at the transmitter.
To address this issue, a power-balanced (PB) Alamouti method is known. The PB Alamouti method is a technique that mitigates the overall transmit power rather than requiring additional power allocation for physical layer security. In this technique, since both the transmit signal and AN are complex numbers, a signal-dependent complex AN is introduced to reduce the total transmit power. The operational concept of this technique will be described in more detail with reference to
Referring to
In other words, in the AN-assisted Alamouti coding scheme, an AN phase transformer 420 of Alice determines an optimal phase rotation for the AN by estimating an optimal phase and rotating the phase of AN, thereby minimizing the total transmit power.
When rotating the phase of AN, it is important to maintain the same orthogonality principle for the AN matrix within the encoding matrix or channel matrix to preserve a diversity gain from the Alamouti code. Therefore, Alice's transmission operation is controlled to apply the same phase rotation to ANs within the same time slot.
To achieve transmit power efficiency in the encoding matrix employing the PB-Alamouti code, an optimal phase rotation and AN power can be found using a specific objective function as in Equation 9.
Here, αi represents a phase rotation in the i-th time slot, and (Pt)i denotes the total transmit power for the i-th time slot. Additionally, zi,1′ and zi,2′ are signals encoded at the first time t and second time t+T in the encoding matrix Z that employs the PB-Alamouti code.
A solution of Equation 9 indicates that the optimal AN power is half of the signal power, and the optimal phase rotation αi,opt may be expressed as αi,opt=π+ϕi. Here, ϕi=tan−1 (χi/ζi), and χi and ζi are as in Equation 10.
Here, αR and αI represent real and imaginary parts of a complex number α, respectively.
In summary, Alice estimates the AN matrix for each Alamouti-coded signal pair with optimal phase rotation and optimal AN power allocation, and transmits the PB-Alamouti code based on this estimation. Since the AN matrix is designed to be located in the null space of the legitimate channel, the signal detected at Bob remains identical to the conventional Alamouti signal, while the signal received by Eve encounters significant interference due to AN.
According to the theoretical analysis described above, the PB-Alamouti scheme achieves a power gain of 3 dB and 6 dB compared to the conventional Alamouti scheme without physical layer security (PLS) and the conventional AN-added Alamouti code, respectively.
Meanwhile, the physical layer security performance of Alamouti space-time block signals has limitations in environments such as time-selective fading channels. Therefore, the present disclosure provides a method for enhancing physical layer security performance using RIS. In particular, the physical layer security technique in the present disclosure is useful for strengthening physical layer security in low Earth orbit (LEO) satellite systems.
Referring to
The system model may comprise five main entities. The five main entities include a transmitter 510, intelligent reflecting surface (RIS) 520, controller 530, receiver 540, and eavesdropper 550.
The transmitter 510 may be a dynamic or static equipment equipped with means or devices for wireless communication, such as a satellite, drone, ship, submarine, vehicle, or base station, and may be referred to simply as Alice.
The RIS 520 enhances a signal strength for the receiver 540 while introducing interference to the eavesdropper 550.
The controller 530 manages phase adjustment of each RIS element in the RIS 520.
The receiver 540 is a legitimate receiver and may be referred to as user equipment (UE), terminal, etc. It may also be referred to as Bob.
The eavesdropper 550 is an unauthorized receiver or terminal and may be referred to as an eavesdropper device or Eve.
In a communication scenario of the present disclosure, it is assumed that Alice is tasked with transmitting information to Bob, while Eve attempts to eavesdrop on the information. The RIS 520 acts as an intelligent reflector with capability to manipulate phases of reflected signals. To protect the information, the RIS 520 may perform two operations or functions. Specifically, the RIS 520 may reflect signals toward Bob 540 for information delivery and reflect signals toward Eve 550 with the intent to cause interference.
To counter eavesdropping attempts of Eve 550, the controller 530, acting as a security enhancement device, may frequently adjust the phases of the RIS elements over a predefined period, such as a channel coherence time. The channel coherence time is a time period during which a channel impulse response (CIR) is considered constant. The phase adjustment of the RIS elements may involve dynamically rendering a channel experienced by Eve 550 within the predefined time while keeping a channel reflected to Bob 540 static.
In other words, the controller 530 may configure the RIS 520 to allow different combinations of phases of patch elements constituting the RIS for Bob and Eve by selecting fixed values for the RIS elements. Specifically, the phase adjustment of RIS elements may be implemented to set fixed values for the channel reflected from the RIS 520 to Bob 540 for a predefined time, such as the channel coherence time, while providing a channel environment for Eve 550 in which the phases are frequently adjusted.
Thus, the RIS 520, under the control of the controller 530, may randomly select one of multiple phase combinations of initially selected patch elements to set fixed values for a predefined time and perform phase adjustments for the RIS elements a predefined number of times.
Due to the phase adjustment of the RIS elements, Eve 550 experiences a time-varying channel over the predefined time, such as the channel coherence time. The dynamic nature of the reflected channel interferes with Eve 550, making it difficult for her to intercept the information transmitted from Alice 510.
The operational principle of the aforementioned RIS 520 will be described in more detail below.
The accumulated channel hb from the transmitter Alice to the legitimate receiver Bob may be expressed as in Equation 11.
Here, hrb∈1×N, har∈
N×1, and Θ∈
N×N are established. In addition, hab represents a direct channel between Alice and Bob, while hrb and har are the respective channel vectors between the RIS and Bob and between Alice and the RIS. The variable N represents the number of RIS elements, and Θ represents a diagonal matrix composed of the phases of the RIS elements. The diagonal matrix Θ may be expressed as in Equation 12.
Here, θi denotes phase information of the i-th element of the RIS. The variable i is a natural number from 1 to N, and N is a natural number of 3 or more.
Additionally, the accumulated channel he from Alice to the eavesdropper Eve may be expressed as in Equation 13.
Here, hre represents the channel vector between the RIS 520 and Eve, which may be represented as hre∈1×N, and hse represents the direct channel between Alice and Eve.
Assuming that the controller 300 has access to channel information of Bob, the controller 300 may first predefine the accumulated channel hb from Alice to Bob and then be configured to obtain a solution for Equation 11.
When decomposed into real-valued equations, Equation 11 becomes a set of two real-valued equations. For N>2, there may be multiple solutions to the diagonal matrix Θ included in Equation 11.
To estimate the diagonal matrix Θ for the accumulated channel hb from Alice to Bob as previously given, the controller 300 may transform or re-express Equation 11 as shown in Equation 14.
Here, hrbdiag(har) denotes a diagonal matrix of har, and a matrix or set v of the phases of the RIS elements may be represented as v=[ejθ
For simplification of Equation 14, a set t of time slots within a given time period may be defined as shown in Equation 15.
In Equation 15, tn is the n-th element of a specific time slot set t in Alice's encoder. In this way, the time slot set t may be expressed as a product of the diagonal matrix of the accumulated channel from Alice to the RIS and the accumulated channel from the RIS to Bob.
Using Equation 15, Equation 14 may be expressed as shown in Equation 16.
For simplicity, a transpose matrix u of the phases may be denoted as u=[θ1,θ2, . . . ,θN]T. In this case, the complex equation in Equation 16 may be decomposed by the controller 300 into two real-valued equations, as shown in Equation 17 and Equation 18.
Here, a complex number a is defined as α=+jαℑ, and f1(u) and f2(u) are functions of the transpose matrix u, representing the real and imaginary parts of Equation 16, respectively. For N>2, Equation 17 and Equation 18 form an underdetermined system of nonlinear equations. An underdetermined system is a set of equations with fewer equations than unknowns, allowing for infinite solutions due to the degrees of freedom in the unknowns, and is also referred to as an underdetermined system of equations.
To solve Equation 17 and Equation 18, the controller 300 may use the Newton-Raphson scheme, which can iteratively update the solution as shown in Equation 19.
Here, uk denotes a solution u at the k-th iteration, and Ju
Here, F(uk) denotes the multivariable vector function, which may be expressed as in Equation 21.
Finally, a secrecy capacity Cs in terms of a difference between the achievable channel capacities of Bob and Eve may be estimated by the controller 300 as shown in Equation 22.
Here, the channel capacity Cb of Bob may be estimated as in Equation 23.
Here, σb2 denotes a noise variance at Bob.
Then, since the accumulated channel he from Alice to Eve depends on the diagonal matrix Θ, the channel capacity Ce of Eve may be estimated by the controller 300 as shown in
Here, EΘ[·] denotes an expectation operation with respect to the diagonal matrix Θ, and σe2 denotes a noise variance at Eve.
As described above, determining the accumulated channel hb from Alice to Bob is crucial. That is, determining the accumulated channel hb may lead to three possible outcomes for the solutions of the diagonal matrix Θ, i.e. no root, a single root, and multiple roots.
In the present disclosure, the controller 300 may be configured to determine the accumulated channel hb from Alice to Bob, with multiple roots existing to induce a random channel at Eve. The controller 300 may set Bob's channel capacity to be less than the maximum achievable capacity by using a weight α, as shown in Equation 25.
Here, hb,opt denotes Bob's maximum achievable capacity, corresponding to the optimum accumulated channel from Alice to Bob with the maximum available channel capacity. hb,opt may be expressed as shown in Equation 26.
Here, the optimum diagonal matrix Θopt may be expressed as shown in Equation 27.
According to the present disclosure, the controller 530, as a type of security enhancement device, may dynamically render the channel detected at the eavesdropper 550 while keeping the channel reflected toward the legitimate receiver 540 static for the same predefined time by adjusting the phases of the RIS elements of the RIS 520 in the wireless communication system where the eavesdropper 550 is present. In other words, the controller 530 may operate to prevent the eavesdropper 550 from successful eavesdropping by introducing a dynamic time-varying channel through frequent phase adjustments of the RIS elements during the predefined time, such as the channel coherence time.
Additionally, to prevent the operation of the eavesdropper 550, in the technique of frequently adjusting the phases of some RIS elements, the number of phase adjustments or phase adjustment intervals may be set differently depending on at least one of the following: a frequency used for communication between the legitimate transmitter 510 and the legitimate receiver 540, the movement speed of the transmitter 510 or receiver 540, the number of RIS elements per unit area, or the resolution of the RIS 520.
Furthermore, the coherence time is a statistical measure of a time duration over which the channel impulse response remains essentially invariant, quantifying the similarity of channel responses at different times. In other words, the coherence time is a time duration during which two received signals maintain a strong potential for amplitude correlation. If the coherence time is defined as a time duration with a temporal correlation function of at least 0.5, the channel coherence time Tc may be approximately expressed as shown in Equation 28.
Here, fm, denotes the maximum Doppler frequency.
Thus, the security enhancement device of the present disclosure frequently adjust the phases of the RIS elements in the RIS 520 to control a reciprocal bandwidth of a baseband signal at the receiver 540 due to the wireless signal reflected toward the receive 540 so that it remains below the channel coherence time, while also frequently changing the channel of the signals reflected toward the eavesdropper 550.
For example, if the coherence time is defined as a geometric mean of two approximate values as in Clarke's model, a 50% coherence time (hereinafter ‘half coherence time’) can be obtained at the maximum Doppler frequency. In this context, the security enhancement device may control the respective phases of the RIS elements so that the reciprocal bandwidth of the baseband signal at at least one legitimate receiver 540 remains below the half coherence time while also frequently changing at least one channel of the signals reflected to at least one eavesdropper 550.
Additionally, for example, the RIS controller 530, as a security enhancement device, may control the phases of the RIS elements so that, during an interval between reference signals or pilot signals for channel estimation, the channel is kept stable to allow accurate channel estimation at the legitimate terminal or receiver 540. In other words, the interval between reference signals or pilot signals may be set to be shorter than the coherence time of the channel, so that the channel remains unchanged for the duration of receiving the signal until the next reference or pilot signal is received, enabling adequate information detection. At the same time, the phases of the RIS elements can be controlled so that all channels other than the channel to the legitimate terminal or receiver 540 (i.e. the channels of the signals reflected to the eavesdropper's terminal or receiver 550) are changed at least once within the coherence time.
Referring to
However, the respective components included in the security enhancement device 600 may be connected not to the common bus 670 but to the processor 610 through an individual interface or an individual bus. For example, the processor 610 may be connected to at least one of the memory 620, the transceiver 630, the input interface device 640, the output interface device 650, and the storage device 660 through dedicated interfaces
The processor 610 may execute a program stored in at least one of the memory 620 and the storage device 660. The processor 610 may refer to a central processing unit (CPU), a graphics processing unit (GPU), or a dedicated processor on which methods in accordance with embodiments of the present disclosure are performed. Each of the memory 620 and the storage device 660 may be constituted by at least one of a volatile storage medium and a non-volatile storage medium. For example, the memory 620 may comprise at least one of read-only memory (ROM) and random access memory (RAM).
Referring to
Additionally, when mounted on the transmitter, the security enhancement device 700 may include an AN generator 720 and a delay compensator (not shown) by default. In other words, the security enhancement device mounted on the transmitter may include the AN generator 720, an optimum phase estimator 730, an AN phase rotation unit 740, and an adder 750 to utilize AN and PB-aided Alamouti code.
Additionally, the security enhancement device 700, when mounted on the transmitter, may further include a multiplier 760 for assigning weights to the PB-assisted Alamouti code.
On the other hand, the security enhancement device 700 may be mounted on a control center that controls RIS operations. In this case, the security enhancement device 700 may include means, or a component that performs equivalent functions, for adjusting phases of first RIS elements, which are all or part of the RIS elements, at least once during a channel coherence time of a first signal transmitted between the transmitter and receiver. This allows for a channel related to the first signal to remain fixed during the coherence time while dynamically rendering a channel of another receiver or eavesdropper during the coherence time.
Furthermore, when the security enhancement device 700 is mounted on the control center, the security enhancement device 700 may include a selector for selecting the first RIS elements which are all or part of the RIS elements, a first estimator for estimating a one-dimensional matrix of the first RIS elements, a second estimator for estimating an array response vector and spatial frequencies necessary for reconstructing the array response vector using the estimated one-dimensional matrix, a third estimator for estimating a channel capacity of the first RIS elements using the array response vector and spatial frequencies, and a phase adjustment unit that changes the phases of the first RIS elements at least once over a duration of a given time slot based on the estimated channel capacity. The phase adjustment unit may be referred to as an interference generation unit and may be configured to dynamically render the channel of another receiver or eavesdropper without changing the channel between the transmitter and legitimate receiver for the predefined period.
Additionally, when mounted on the control center, the security enhancement device 700 may further include a multiplier 760 for assigning a weight to set the channel capacity to be less than the maximum channel capacity between the transmitter and receiver.
Referring to
The method of the present disclosure and the conventional method are within an approximate range in a low-power region. However, while the secrecy capacity Cs of the conventional method is nearly saturated in a high-power region, it can be observed that the secrecy capacity of the method of the present disclosure continues to increase as the transmit power Pt increases.
In the exemplary embodiment of the present disclosure, the secrecy capacity at the weight 0.7 is confirmed to be approximately 0.4 bps/Hz better than the secrecy capacity at the weight 0.5, as the channel capacity of Bob with the weight 0.7 is greater than that with the weight 0.5. Meanwhile, when Bob's channel capacity is continuously increased, the secrecy capacity slightly decreases in the high-power region, which may be due to excessive interference reduction at the eavesdropper, Eve, as the weight continues to increase.
For example, the secrecy capacity at the weight 0.9 is slightly better in some regions of the low-power and high-power regions compared to the secrecy capacity at the weight 0.7, but slightly worse in most other areas. Under these conditions, in terms of secrecy capacity, a weight in the vicinity of 0.7, i.e., a weight selected in the range of 0.5 to 0.9, may be considered the optimal range, with the weight 0.7 being considered the optimal weight in particular.
As described above, the security enhancement technique according to the present disclosure provides an RIS-supported physical layer security (PLS) scheme for satellite communication under conditions where a passive eavesdropper is present. Utilizing RIS in satellite communication allows for a substantial increase in channel capacity at the intended receiver, while simultaneously inducing interference at the eavesdropper without requiring knowledge of the eavesdropper's channel, making it easy to achieve the desired level of security.
In particular, the security enhancement technique according to the present disclosure can maintain a manageable state even if the number of eavesdroppers or antennas increases, thus serving as a practical security solution. Furthermore, the security enhancement technique according to the present disclosure can provide a stronger security solution by making the security dependent on interference at the eavesdropper, rather than the additive white Gaussian noise (AWGN) at the eavesdropper as in existing techniques.
Hereinafter, the security enhancement technique according to the present disclosure will be described in further detail through system models under various conditions. The security enhancement technique according to the present disclosure may utilize four approaches to enhance physical layer security (PLS) in low Earth orbit (LEO) satellite systems.
The first approach uses the Alamouti code with the aid of artificial noise (AN) and jointly employs two LEO satellites to ensure secure downlink transmission. The efficiency of the first approach is further improved when implementing a power-balanced Alamouti code.
The second approach introduces interference to potential eavesdroppers by utilizing a reconfigurable intelligent surface (RIS). Since the RIS manages the reflected channels, the PLS measures of the second approach can be achieved without requiring additional transmit power or receiver operations.
The third approach combines the first and second approaches, enhancing the secure transmission rate to nearly reach the maximum achievable rate compared to the individual approaches.
The fourth approach is based on a relay-based scheme that protects all transmission links from a satellite to a relay and from the satellite and relay to legitimate users.
Traditional cryptography (TC) faces issues related to power consumption and computational capacity in resource-constrained devices, such as IoT devices. Additionally, since TC encryption and decryption rely on mathematical algorithms, the encryption cannot theoretically be reversed without a decryption key. However, due to rapid advancements in computing power, encryption alone is no longer sufficient to prevent unauthorized individuals from accessing and exploiting confidential information.
To address the challenge of ensuring secure communication, multiple existing studies have proposed PLS schemes for multiple antenna systems, such as space-time block coding (STBC). One common PLS scheme for STBC is integration of artificial noise (AN). In such conventional methods, AN is strategically inserted into a null space of a legitimate channel, allowing it to be removed at a legitimate receiver while causing significant interference to unauthorized eavesdroppers.
However, using AN-assisted technique requires additional energy for the AN components, reducing power efficiency. Additionally, integrating AN that depends on channel characteristics may increase a peak-to-average power ratio, which places a burden on the power amplifier. These two drawbacks are particularly critical in satellite systems, where power resources are limited, and in high-power amplifiers that exhibit nonlinear characteristics. Reducing AN power may improve power efficiency by decreasing transmit power, but it also reduces interference to the eavesdropper, increasing the risk of information leakage.
For these reasons, the security enhancement technique of the present disclosure improves power efficiency by using an Alamouti scheme integrated with AN. Specifically, the PLS technique of the present disclosure introduces AN in a way that reduces total transmit power, eliminating the need for additional power consumption for security purposes. According to the security enhancement technique of the present disclosure, similar security performance to that of the conventional AN-assisted methods can be achieved in satellite systems with a power level of approximately 5 dB.
Meanwhile, reconfigurable intelligent surfaces (RIS), also known as smart surfaces, have gained significant attention in recent years as an effective means of enhancing not only security performance but also capacity. The RIS is configured as an array of passive elements capable of manipulating phases of electromagnetic signals. The phase manipulation of electromagnetic signals is used to achieve desired reflection and propagation characteristics of the signals. By dynamically controlling reflection patterns, the RIS shows potential to amplify signal strength, mitigate interference, and greatly improve communication performance within wireless networks.
In line with this trend, the present disclosure provides a new PLS method in the context of LEO satellite systems, specifically offering security enhancement methods based on artificial noise (AN), RIS support, relay support, or combinations of these methods.
According to the present disclosure, first, by introducing an application in LEO satellite systems that uses the Alamouti scheme with artificial noise, both security and power efficiency can be enhanced. Then, by using RIS to introduce a noisy channel for the eavesdropper, a new security enhancement method that disrupts eavesdropping attempts and ensures data security can be provided. As described above, the security enhancement method of the present disclosure applies a new concept of interference targeting the eavesdropper, allowing the legitimate channel to remain constant while dynamically altering the eavesdropper's channel.
In particular, to dynamically alter the eavesdropper's channel, the security enhancement method of the present disclosure can estimate the phases of RIS elements using an iterative technique known as the Newton-Raphson scheme. Additionally, the method of the present disclosure can strengthen transmission security in LEO satellite systems by using a relay, allowing all links to be protected by artificial noise.
In the following detailed description, the concepts of the power-balanced Alamouti code and RIS-aided security enhancement will be discussed more specifically with examples of system models.
In the following description, Eve is assumed to be a passive eavesdropper, and the legitimate transmitter Alice and receiver Bob are assumed not to have CSI for Eve. It is also assumed that the channel from Alice to Bob and the channel from Alice to Eve are independent. A summary of the four (No. 1 to No. 4) efficient PLS schemes for LEO satellite systems is shown in Table 1 below.
The security enhancement method of the present disclosure may enhance PLS using an AN-aided Alamouti code or a PB-Alamouti code.
Referring to
Alice1 and Alice2 may establish communication through a ground-based control sensor or an inter-satellite link. Additionally, Alice1 and Alice2 may be synchronized using a delay compensation technique.
To evaluate the security performance for PLS in the present exemplary embodiment, a secrecy capacity SC and a secrecy rate SR may be used. Here, the secrecy capacity SC may be defined as a capacity difference between Bob and Eve, as shown in Equation 29.
Here, Cb and Ce represent the capacities of Bob and Eve, respectively, and may be expressed as shown in Equation 30 and Equation 31.
Here, SNRb and SNRe represent an SNR of Bob and an SNR of Eve, respectively, and may be expressed as shown in Equation 32 and Equation 33.
Here, Λ and Ω represent the signal matrix and AN matrix, respectively. Additionally, S and W represent the Alamouti-coded signal matrix and AN matrix, respectively. In the case of the AN-aided scheme, Λ=S, and Ω=W.
In the PB-Alamouti scheme, since the added AN and W contain signal-dependent information, they cannot be treated as pure noise. For this reason, W may be decomposed into signal-dependent information and a pure noise component, as shown in Equation 34.
Here, E[W′|S] and Wn′ represent the signal-dependent part and the pure noise part of W, respectively. In the present exemplary embodiment, E[W′|S] is a constant-valued matrix, which means that an eavesdropper could learn an identifiable pattern when a substantial volume of signals is received. Meanwhile, Wn′ is a pure random noise component with a mean of zero, representing the fluctuating component of W, so the eavesdropper cannot retrieve any identifiable pattern to collect information. Consequently, when using the PB-Alamouti code, A=S+E[W′|S] and Ω=Wn′. Additionally, σb2 and σe2 represent variances of the AWGN at Bob and Eve, respectively.
Additionally, the secure rate (SR), represented as Rs, may be formulated as shown in Equation 35, considering the difference in mutual information (MI) exchanged between Alice and Bob and between Alice and Eve. MI measures a mutual dependence between two variables and corresponds to a Kullback-Leibler divergence (KLD) between a joint probability distribution of the two variables and a product of their two marginal probability distributions.
Here, I(yb;S) represents the MI of Bob, and I(ye;Λ) represents the MI of Eve.
Meanwhile, if SA is a set of Alamouti-coded matrices S obtained through M-ary modulation, the set of matrices S may be expressed as SA={S1, . . . , S(l), . . . , S(M
Here, Eh,n
Here, db=(S(l)−S(q))h. The momentum operator may also be referred to as a wave function or a total energy operator.
Similarly, in the case of the AN-aided Alamouti scheme, I(ye;Λ) may be expressed as shown in Equation 38.
Here, ne′=Ωg+ne and de=(Λ(l)−Δ(q))g. In addition, Λ(l)=S(l), and in both the AN-aided scheme and the PB-Alamouti scheme, Λ(l)=S(l)+E[W′|S(l)]. If σ′e2 is a variance of n′e, it may be expressed as σ′e2=E[n′eHn′e].
As described above, the security enhancement method of the present disclosure can enhance PLS in LEO satellite systems by using either the AN-aided or PB-Alamouti scheme. In particular, PLS can be enhanced by considering the difference between the MI exchanged between Alice and Bob and the MI exchanged between Alice and Eve.
The following is the second proposal for PLS in LEO satellite systems, describing a method that utilizes RIS to induce interference to the eavesdropper.
Referring to
To achieve this, the security enhancement method of the present exemplary embodiment introduces random noise to Eve while maintaining a constant amplitude for Bob during a coherence time assuming that all channels remain constant. Thus, the RIS may frequently randomize the phases of some of the RIS elements to interfere with Eve without causing interference to Bob. Specifically, some RIS elements need to be designed under the constraint of Bob's channel, i.e. under the constraint of the infinite solutions of the RIS elements.
A method for ensuring an infinite number of solutions for the RIS elements to maintain Bob's channel constant while inducing a noisy channel at Eve will be described in detail.
In
The signal received at Bob may be expressed as shown in Equation 39.
Here, S is the transmit signal, and ng is the AWGN at Bob. Accordingly, the signal received by Eve may be expressed as shown in Equation 40.
Here, ne represents the AWGN at Eve.
In the present exemplary embodiment, since Eve is assumed to be secretly eavesdropping on the signal transmitted by Alice, the control center cannot control the signal strength at Eve. Instead, the focus is on optimizing the phases of the RIS elements to maximize the signal strength received by Bob.
To apply interference by the RIS, the phases of the RIS elements need to be randomized to generate a random channel from the RIS to the eavesdropper. In this manner, the RIS may function as a jamming device against Eve. For this purpose, Bob's channel is maintained constant during the coherence time, while Eve's channel remains random.
Meanwhile, considering the solution to the optimization problem for Equation 11, the optimal accumulated channel from Alice to Bob may be simply expressed as shown in Equation 41.
Here, the optimized phases of the RIS elements, Θopt, are expressed as Θopt=diag(vopt), and δmax may be expressed as δmax=hrbΘopthar. This may be interpreted as the optimal reflected channel coefficient achievable through the solution to the optimization problem.
Using δmax described above, Bob can achieve the maximum accumulated channel capacity. The optimal phases Θopt of the RIS elements to achieve δmax are a single solution, so Θopt remains static during the coherence time and, therefore, Θopt cannot be used to introduce random interference to Eve.
To address this issue, the control center uses a constant reflected channel coefficient δ for Bob. This constant reflected channel coefficient becomes a random channel gain for Eve during the coherence time. That is, the constant reflected channel coefficient may be expressed as shown in Equation 42.
Here, if |δ|>|δmax|, there is no solution. However, if |δ|<|δmax|, an infinite number of solutions exist. Therefore, the control center implementing the security enhancement method of the present exemplary embodiment may configure the condition |δ|<|δmax| and use multiple solutions of the phases of the RIS elements to induce dynamic interference at Eve. Under this condition, the constant reflected channel coefficient remains constant during the coherence time, allowing Bob to detect the signal simply without any knowledge of the phases of the RIS elements.
Additionally, in the present exemplary embodiment, multiple solutions for the phases of the RIS elements may be found using the Newton-Raphson scheme. Specifically, various phase values of the RIS elements may be obtained through each initial condition of the Newton-Raphson scheme.
The method of finding multiple solutions of the phases of the RIS elements from Equation 42 to generate harmful interference at Eve using the aforementioned Newton-Raphson scheme may be essentially the same as described in Equations 11 to 21. Ultimately, the phase values of the RIS elements may be directly estimated from the configurable phases of the RIS elements, expressed as Θ=diag(eju). The various solutions for these phases vary according to each initial guess u0. Therefore, by imposing u0 varying over time, the control center may find as many solutions as possible for the phases of the RIS elements.
In this manner, the control center may apply random multiple solutions to the constant reflected channel coefficient expressed in Equation 42 and frequently adjust the phases of the RIS elements, causing Eve to experience a noisy channel. In other words, since the reflected channel greΘhar at Eve is undetermined, it will cause severe interference for Eve. Thus, high security protection can be achieved in LEO satellite systems through RIS-aided interference invoking.
The following describes the third approach for PLS in LEO satellite systems: an integrated approach of PB-Alamouti or AN-aided PLS and RIS-aided PLS.
Referring to
To formalize the AN from the satellite and the interference from the RIS, the channel variables are redefined as hab(1) and hab(2), representing the direct channels from Alice1 to Bob and from Alice2 to Bob, respectively. Similarly, the channel variables gae(1) and gae(2) represent the direct channels from Alice1 to Eve and from Alice2 to Eve, respectively. The channel vectors from Alice1 to the RIS and from Alice2 to the RIS are denoted by har(1) and har(2), respectively. Additionally, hrb and gre represent the channel vectors from the RIS to Bob and from the RIS to Eve, respectively. Finally, the i-th constant reflected channel coefficient of the RIS elements for Bob may be expressed as δi=hrbΘhar(i).
The first signal st1 transmitted from Alice1 may be expressed as shown in Equation 43, and the second signal st2 transmitted from Alice2 may be expressed as shown in Equation 44. The first and second signals each include the transmit signal and artificial noise.
Specifically, the signal vector received at Bob may be expressed as shown in Equation 45.
Here, ȟl may be expressed as shown in Equation 46.
When |δ|<|δmax|, δmax(i)=hrbΘopthar(i), and ȟ=[]T.
In addition, the signal vector received at Eve may be expressed as in Equation 47.
Here, è may be expressed as {grave over (g)}=gΘ+[gae(1)gae(2)]T, gΘ represents Eve's knowledge of the reflected channel vector, and , which has variable values, represents Eve's accumulated interference-plus-noise vector.
may be expressed as shown in Equation 48.
Here, {dot over (n)}e is the noise vector received due to artificial noise (AN), {umlaut over (n)}e is the interference vector received from the RIS, and ne is the AWGN vector.
The noise vector may be expressed as shown in Equation 49, and the interference vector may be expressed as shown in Equation 50.
Here, may be expressed as
=greΘhar(i)+gae(i).
The secrecy capacity of the integrated system in the present exemplary embodiment may be estimated by inserting the SNR values for Bob and Eve into Equation 51 and Equation 52, respectively.
Similarly, the secrecy transmission rate for each of Bob and Eve may be estimated using the mutual information (MI) for each of them. For example, the secrecy transmission rates may be estimated by inserting the MI values estimated for Bob and Eve into Equation 35.
According to the exemplary embodiment, the eavesdropper's operations within a LEO satellite system may be conveniently and effectively disrupted through the satellite's AN and the interference from the RIS.
The following describes AN-aided PLS in a satellite system that uses a ground relay as a component.
Referring to
A channel gain h1 for the direct path between Alice and Bob is assumed to be much weaker than channel gains hR and h2 for the path connecting Alice to the relay and the relay to Bob. Therefore, the present exemplary embodiment assumes that the relay plays an important role in improving the signal quality received by Bob.
That is, the relay occupies a crucial position in maintaining a secure communication link between Alice and Bob. To operate the satellite system within a reliable PLS environment, a controller in the present exemplary embodiment uses a time division scheme. The controller may be primarily mounted on a satellite which is Alice. Additionally, the controller is not limited to being mounted on Alice, and it may also be mounted on another satellite, relay, control center, or another communication node within the satellite system that is connected to Alice or synchronized to transmit and receive control communications with Alice.
In the present exemplary embodiment, the controller may divide time into four distinct time slots, labeled τ1 through τ4, to apply the time division scheme. In this case, during time slots τ1 and τ2, Alice transmits two signals, S1+μ1,1ejα
During the time slots τ1 and τ2, even if Eve attempts to intercept the signal that Alice transmits to the relay, Eve may still experience the effects of AN, which ultimately ensures the security of the satellite network link in each time slot.
In this configuration, Alice needs to access channel information related to the link between herself and Bob, as well as the link between the relay and Bob. This channel information is essential for designing the AN. For this purpose, the AN for the PB-Alamouti code may be designed as a function of h1 and h2 (see Equations 1 to 8, particularly Equation 4).
The signal yR received at the relay during the time slots τ1 and τ2 may be expressed as shown in Equation 53.
Here, (NR)1 and (NR)2 are the AWGN at the relay during the time slots τ1 and τ2, respectively.
The relay does not directly detect the original signal. Instead, it can identify the signal transmitted by Alice by effectively removing the channel coefficient from the received signal. Consequently, the detected signal at the relay may be expressed as shown in Equation 54.
Here, (ñR)i may be expressed as
In the time slots τ3 and τ4, the signal matrix may be expressed as shown in Equation 55.
Then, the signal vector {grave over (y)}b received at Bob may be expressed as shown in Equation 56.
Here, when h=[h1h2]T, h1 and h2 may represent the channel gains of the relay for Alice and Bob, respectively.
Similarly, the signal vector received at Eve may be expressed as shown in Equation 57.
Here, g may be expressed as g=[g1g2]T. g1 and g2 may represent the channel gains from Alice and the relay to Eve, respectively.
According to the present exemplary embodiment, due to the utilization of the relay, the secrecy capacity and secrecy transmission rate are influenced not only by the receiver noise but also by ñR. That is, the secrecy capacity and secrecy transmission rate with respect to Eve may be further impacted by the additional noise inserted by the relay. Therefore, effective AN-aided PLS can be ensured in the LEO satellite system by utilizing the relay.
To evaluate the security enhancement performance of the aforementioned exemplary embodiments, a system configuration as shown in Table 2 was used, with simulation results related to secrecy, particularly secrecy capacity (SC) and secrecy transmission rate (SR), shown in
The evaluation system operates in a 12 GHz frequency band and uses a satellite positioned at an altitude of 1000 km. The transmit antenna gain is fixed at 30 dBi, and the receive antenna gain and noise spectral density for all receiving components are uniformly set to 5 dBi and −200 dBW/Hz, respectively. Additionally, a 5 dB loss, such as rain fading, is applied to all links of the satellite.
Table 2 summarizes the simulation configuration for all the PLS schemes described in the present disclosure, along with the corresponding drawings showing security performance. The channel from the satellite (sat.) to all ground components is assumed to be a Rician fading channel with a Rician factor K that has a uniform probability density function (PDF), U(5,15) dB, for the satellite system. Here, U(a,b) represents a uniform PDF within a range from a to b. For simulations of the relay-based PLS scheme, the channel between the satellite and relay is assumed to be Gaussian, while the channel between the satellite and user is assumed to be a Rician fading channel with a Rician factor K. To ensure the channel between the satellite and relay is better than the channel from the satellite to the user, the satellite-relay link is assumed to be a Rician fading channel with U(−3,3) dB. Meanwhile, all channels between the ground components are considered Rayleigh fading channels.
Additionally, the modulation schemes used in the simulations include both quadrature phase shift keying (QPSK) and 16-quadrature amplitude modulation (16QAM). In all simulations using the AN-based method, the AN power is set equal to the transmit signal power. It is also assumed that the RIS in all systems utilizing RIS technology is mounted on a building or tower. A distance from the RIS to Bob and Eve is fixed at 500 meters, and the number of RIS elements is set to 200.
In the system model for the first PLS approach, which includes the joint use of two satellites, two PLS schemes are applied: the AN-aided scheme and the PB-Alamouti scheme.
Given the passive nature of the eavesdropper, Eve, it is conceivable that Eve's SNR could eventually exceed Bob's SNR. Consequently, as shown in
Referring to the SC performance in
A higher A value indicates that the RIS focuses more on amplifying Bob's channel gain rather than disrupting Eve. Therefore, under these conditions, Eve's channel fluctuations are reduced. For example, when pt=−40 dBW, the SC performance with λ=0.99 may be about 1 bps/Hz lower than the others.
Additionally, the SR performance in
In this simulation, it is assumed that Eve has knowledge of the reflected channel, as shown in Equation 58.
In
Referring to
Referring to
According to the aforementioned exemplary embodiments, in the first security enhancement approach, Alice may have the AN generator and the delay compensation unit. In the second security enhancement approach, the RIS controller is needed, which can provide security without burdening Alice or Bob. The third security enhancement approach, which integrates the first and second approaches, enhances security compared to applying either scheme individually. The fourth security enhancement approach shows the lowest power efficiency but can serve as a crucial PLS scheme when the relay is used to improve signal strength, allowing for a performance trade-off between SR and signal strength at Bob.
According to the four aforementioned security enhancement approaches, various levels of security enhancement can be provided across different system configurations. If reducing system complexity is a priority, Alice may be equipped with the delay compensation unit and the AN generator. However, this scheme may require an expensive power amplifier capable of handling power fluctuations caused by AN. Additionally, when utilizing RIS technology, there is no need to modify Alice's system configuration. Furthermore, if additional security enhancement is required, integrating RIS with the AN-aided scheme may be considered. In this case, the system may be configured to use the PB-Alamouti scheme instead of the AN-aided Alamouti code, thereby further improving power efficiency and security.
The operations of the method according to the exemplary embodiment of the present disclosure can be implemented as a computer readable program or code in a computer readable recording medium. The computer readable recording medium may include all kinds of recording apparatus for storing data which can be read by a computer system. Furthermore, the computer readable recording medium may store and execute programs or codes which can be distributed in computer systems connected through a network and read through computers in a distributed manner.
The computer readable recording medium may include a hardware apparatus which is specifically configured to store and execute a program command, such as a ROM, RAM or flash memory. The program command may include not only machine language codes created by a compiler, but also high-level language codes which can be executed by a computer using an interpreter.
Although some aspects of the present disclosure have been described in the context of the apparatus, the aspects may indicate the corresponding descriptions according to the method, and the blocks or apparatus may correspond to the steps of the method or the features of the steps. Similarly, the aspects described in the context of the method may be expressed as the features of the corresponding blocks or items or the corresponding apparatus. Some or all of the steps of the method may be executed by (or using) a hardware apparatus such as a microprocessor, a programmable computer or an electronic circuit. In some embodiments, one or more of the most important steps of the method may be executed by such an apparatus.
In some exemplary embodiments, a programmable logic device such as a field-programmable gate array may be used to perform some or all of functions of the methods described herein. In some exemplary embodiments, the field-programmable gate array may be operated with a microprocessor to perform one of the methods described herein. In general, the methods are preferably performed by a certain hardware device.
The description of the disclosure is merely exemplary in nature and, thus, variations that do not depart from the substance of the disclosure are intended to be within the scope of the disclosure. Such variations are not to be regarded as a departure from the spirit and scope of the disclosure. Thus, it will be understood by those of ordinary skill in the art that various changes in form and details may be made without departing from the spirit and scope as defined by the following claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2023-0162807 | Nov 2023 | KR | national |
10-2024-0150963 | Oct 2024 | KR | national |