CROSS-REFERENCE TO RELATED APPLICATIONS
Pursuant to 35 U.S.C. § 119 and the Paris Convention Treaty, this application claims foreign priority to Chinese Patent Application No. 202310455947.0 filed Apr. 25, 2023, the contents of which, including any intervening amendments thereto, are incorporated herein by reference. Inquiries from the public to applicants or assignees concerning this document or the related applications should be directed to: Matthias Scholl P. C., Attn.: Dr. Matthias Scholl Esq., 245 First Street, 18th Floor, Cambridge, MA 02142.
BACKGROUND
The disclosure relates to the field of wireless communication, and more particularly to a wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions.
Reconfigurable intelligent surface (RIS) is a revolutionary technology in the field of wireless communications that can independently regulate the phase shift of electromagnetic signals incident on its own surface, thereby effectively improving the transmission environment and performance when the direct link of the communication system is blocked.
However, the sole use of RIS communication is not sufficient to meet the demand of massive access for 6G communication, and the power-domain non-orthogonal multiple access (NOMA) technique not only realizes massive multiple access, but also maintains user fairness compared with orthogonal multiple access schemes. Therefore, the combination of power-domain NOMA and RIS is expected to be widely used in the upcoming 6G era.
NOMA and RIS technologies are increasingly used in a wide range of complex and diverse scenarios. In practical communication systems, the transceiver hardware of wireless nodes is inevitably subject to various types of losses. Although these losses can be mitigated by some compensation and calibration algorithms, there are still incorrect calibration, so that the hardware loss cannot be completely removed. Hardware loss also has a significant adverse impact on system performance.
SUMMARY
In NOMA systems with eavesdroppers and obstructed or blocked direct links, to improve the physical layer security performance of the system, the disclosure provides a wireless secure communication method based on RIS-NOMA under complex channel conditions. Firstly, an intelligent surface is assume to be disposed between the base station and legitimate NOMA users, and between the base station and eavesdroppers; the signal to interference plus distortion noise ratio (SIDNR) for the legitimate NOMA user and the eavesdropper is calculated in the presence of RHI in the system; secondly, considering shadow fading and to simplify the overly complex calculation process, the probability density function and cumulative distribution function of the shadow fading are approximated; finally, the outrage probability and intercept probability of the legitimate users and eavesdroppers are calculated.
The disclosure provides a wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions; the RIS-NOMA refers to a RIS-NOMA communication system comprising: a base station (BS), a reconfigurable intelligent surface (RIS), a legitimate NOMA user, and an eavesdropper (Eve); the legitimate NOMA user comprises a legitimate remote user Dm, and a legitimate near user D″, and the base station communicates with the reconfigurable intelligent surface (RIS); the reconfigurable intelligent surface (RIS) communicates with the legitimate NOMA user; the eavesdropper (Eve) intercepts a signal transmitted by the RIS; an arbitrary channel link obeys k-u shadow fading; each node in the RIS-NOMA communication system encounters a residual hardware impairment (RHI), and the method comprising:
- 1) calculating a signal to interference plus distortion noise ratio (SIDNR) for the legitimate NOMA user and the eavesdropper in the presence of RHI in the system;
- 2) approximating a probability density function and cumulative distribution function for the κ-μ shadow fading;
- 3) calculating an outrage probability of the legitimate NOMA user and an intercept probability of the eavesdropper; and
- 4) transforming the calculation of the outrage probability of the legitimate NOMA user and the intercept probability of the eavesdropper into solving a cumulative distribution function of equivalent channel coefficients of corresponding joint channels, whereby measuring physical layer secure transmission performance of the system.
In a class of this embodiment, 1) is performed as follows:
- defining a channel coefficient from the base station to an ith RIS reflecting surface in the system as hsi, and channel coefficients from the RIS to the legitimate NOMA user and to the eavesdropper as gid, u∈(n,m) and gie, respectively;
- in the NOMA system, because the legitimate near user Dn is closer to the base station BS than the legitimate remote user Dm, with stronger channels; according to the NOMA principle, less transmission power is allocated to the legitimate near user Dn, and more power is allocated to the legitimate remote user Dm; for the legitimate near user Dn, due to being close to the base station, the channel gain is relatively large, and the corresponding allocated power is relatively small, so the signal strength thereof is also relatively small. For the legitimate near user Dn, the channel gain weak signals xm are eliminated through SIC.
When the legitimate near user Dn detects a weak signal xm, the signal to interference plus distortion to noise ratio SIDNR is expressed as:
where, αm and αn represent power distribution coefficients of the legitimate remote user Dm and the legitimate near user Dn, respectively, and
represents an average signal-to-noise ratio of a legal link, Ps is a transmit power of BS, and is an additive white Gaussian noise channel variance; ρSDn represents an overall RHI level of a link BS→Dn; An=Σi=1N|hsi∥gidn| represents a joint channel coefficient of the link BS→Dn; hsi is a channel coefficient of a link BS→RIS; gidn is a channel coefficient of a link RIS→Dn; |·| represents modeling; dn and dR,n represent a distance from the base station to the RIS and a distance from the RIS to the legitimate near user Dn, respectively; and τ represents a path fading index;
- through SIC technology, the SIDNR of D, decoding its own signal is given by the following equation:
- when Dm decodes its own signal, a signal xn with strong channel gain is considered as noise, and SIDNR is represented as follows:
- where Am=Σi=1N|hsi∥gidm|; gidm is a channel coefficient of a link RIS→Dm;
- when the eavesdropper intercepts the signals xn and xm respectively, the obtained SIDNR is expressed as follows:
represents SNR of an eavesdropping link; Ae=Σi=1N|hsi∥gie|; gie represents a joint channel coefficient of a link RIS→Eve; σE2 represents an additive white Gaussian noise channel variance of the eavesdropper; PSE represents an overall RHI level of a link BS→Eve; and dR,e represents a distance from the RIS to the eavesdropper.
In a class of this embodiment, 2) is performed as follows:
- SIDNR of the legitimate NOMA user and the eavesdropper contains Au=Σi=1N|hsi∥gidu|, u∈(n,m) and Ae=Σi=1N|hsi∥gie| as equivalent channel coefficients for corresponding joint channels; assuming that envelopes |hsi|, |gid|, u∈(n,m) and |gie| of all instantaneous channel coefficients are subject to independent and identically distributed k-μ shadow fading, and X represents the envelopes |hsi|, |gid|, u∈(n,m) and |gie| of instantaneous channel coefficients, the cumulative distribution functions and probability density functions thereof are represented as follows:
- Γ(·), Φ2(·) and 1F1(·) are defined as a Gamma function, binary confluence hypergeometric function, and confluence hypergeometric function, respectively;
k is a ratio of a total power of dispersed components to dominant sight components, μ is a total number of multipath clusters, m is a fading degree parameter, and R is an average power of the channel;
- to simplify calculation, the cumulative distribution function and probability density function of the k-μ shadow distribution are approximated as follows:
In a class of this embodiment, in 3), the outrage probability of the legitimate NOMA user is calculated as follows:
- when a channel capacity of a main channel is less than a set threshold Ru, and u∈(n,m), an interrupt event occurs, Cu=½log2(1+γDs) represents the channel capacity of the main channel, and the outrage probability of a legitimate NOMA user Du is expressed as follows:
- 3.1) the outrage probability of the legitimate near user Dn:
- FγDn (x) is expressed as:
- FAn (x) represents a cumulative distribution function of An;
- 3.2) the outrage probability of the legitimate remote user Dm;
- FγDm (x) is expressed as:
FAm (x) represents a cumulative distribution function of Am.
In a class of this embodiment, in 3), the intercept probability of the eavesdropper is calculated as follows:
- when a channel capacity of an eavesdropping channel is greater than a transmission rate, an interception event occurs; CEa=½log2(1+γDEa) represents the channel capacity of the eavesdropping channel, and the intercept probability that the eavesdropper intercepts a legitimate user's information is denoted as follows:
- 3.3) the intercept probability when the eavesdropper intercepts the legitimate near user Dn:
- FγEn (x) is expressed as:
- FAe (x) represents a cumulative distribution function of Ae;
- 3.4) the intercept probability when the eavesdropper intercepts the legitimate remote user Dm:
- FγEm (x) is expressed as:
- FAe (x) represents a cumulative distribution function of Ae.
In a class of this embodiment, 4) is performed as follows:
- given Au=Σi=1N|hsi∥gidu|, let Xi=Xi1Xi2=|hsi∥gidu|, and Au=Σi=1NXi, approximating PDF and CDF of Au as follows:
- where, E[·] represents expectation;
- to obtain a1, a2, a3, a4, first four moments of μl are calculated, and μl(i) (1≤l≤4) of a variable Au is first calculated:
In a class of this embodiment, the μl(i)(1≤l≤4) of a variable Au is calculated as follows:
- firstly, calculating the expectations of Xi1 and Xi2, and calculating the expectation of fxi1 (x) as follows:
- substituting formula (38) into formula (34), to yield:
- parsing processes of μ2(i), μ3(i), μ4(i) are the same as that of μl(i):
- to obtain the outrage probability of the legitimate NOMA user and the intercept probability when the eavesdropper intercepts the information xn and xm:
- thus completing secure transmission of the physical layer of the system.
The following advantages are associated with the wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions of the disclosure:
- 1. Compared with traditional NOMA systems and RIS-assisted OMA systems, the method of the disclosure considers the actual complex channel environment, and the RIS assisted physical layer security performance evaluation of the NOMA systems is more in line with practical scenarios.
- 2. The fading channel of the disclosure is universal and can be applied to various wireless communication environments.
- 3. The hardware loss considered in the method is of great significance in practical communication systems.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a flow chart of a wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions;
FIG. 2 is a model diagram of a RIS-NOMA communication system of the disclosure;
FIG. 3 shows a variation of OP with SNR when N and Case are different;
FIG. 4 shows OP of NOMA users Dn and Dm;
FIG. 5 shows IP of NOMA users Dn and Dm;
FIG. 6 shows a variation of intercept probability with outage probability under different N;
FIG. 7 shows a variation of OP with signal-to-noise ratio at different cases and different Rn;
FIG. 8 shows a variation of OP with signal-to-noise ratio when different ρ and N;
FIG. 9 shows a variation of OP with signal-to-noise ratio when RHI is located at different nodes;
FIG. 10 shows a variation of IP with signal-to-noise ratio when RHI is located at different nodes;
FIG. 11 is a comparison of outrage probabilities of NOMA and OMA under different N conditions; and
FIG. 12 is a comparison of intercept probabilities of NOMA and OMA under different N conditions.
DETAILED DESCRIPTION
To further illustrate the disclosure, embodiments detailing a wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions are described below. It should be noted that the following embodiments are intended to describe and not to limit the disclosure.
FIG. 2 is a model diagram of a RIS-NOMA communication system of the disclosure, which comprises a base station (BS), a reconfigurable intelligent surface (RIS), a legitimate NOMA user, and an eavesdropper (Eve); the legitimate NOMA user comprises a legitimate remote user Dm, and a legitimate near user Dn, and the base station communicates with the reconfigurable intelligent surface (RIS); the reconfigurable intelligent surface (RIS) communicates with the legitimate NOMA user; the eavesdropper (Eve) intercepts a signal transmitted by the RIS; an arbitrary channel link obeys k-u shadow fading; each node in the RIS-NOMA communication system encounters a residual hardware impairment (RHI).
The wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions, as shown in FIG. 1, comprises:
- 1) calculating a signal to interference plus distortion noise ratio (SIDNR) for the legitimate NOMA user and the eavesdropper in the presence of RHI in the system, which is performed as follows:
- defining a channel coefficient from the base station to an ith RIS reflecting surface in the system as hsi, and channel coefficients from the RIS to the legitimate NOMA user and to the eavesdropper as gidu, u∈(n,m) and gie, respectively;
- when the legitimate near user Dn detects a weak signal xm, the signal to interference plus distortion to noise ratio SIDNR is expressed as:
- where, αm and αn represent power distribution coefficients of the legitimate remote user Dm and the legitimate near user Dn, respectively, and
represents an average signal-to-noise ratio of a legal link, Ps is a transmit power of BS, and is an additive white Gaussian noise channel variance; ρSD, represents an overall RHI level of a link BS→Dn; An=Σi=1N|hsi∥gidn| represents a joint channel coefficient of the link BS→Dn; hsi is a channel coefficient of a link BS→RIS; gidn is a channel coefficient of a link RIS→Dn; |·| represents modeling; dB and dR,n represent a distance from the base station to the RIS and a distance from the RIS to the legitimate near user Dn, respectively; and τ represents a path fading index;
- through SIC technology, the SIDNR of Dn decoding its own signal is given by the following equation:
- when Dm decodes its own signal, a signal xn with strong channel gain is considered as noise, and SIDNR is represented as follows:
where Am=Σi=1N|hsi∥gidm|; gidm is a channel coefficient of a link RIS→Dm;
- when the eavesdropper intercepts the signals xn and xm respectively, the obtained SIDNR is expressed as follows:
represents SNR of an eavesdropping link; Ae=Σi=1N|hsi∥gie|; gie represents a joint channel coefficient of a link RIS→Eve; σE2 represents an additive white Gaussian noise channel variance of the eavesdropper; ρSE represents an overall RHI level of a link BS→Eve; and dR,e represents a distance from the RIS to the eavesdropper;
- 2) approximating a probability density function and cumulative distribution function for the κ-μ shadow fading, which is performed as follows:
- SIDNR of the legitimate NOMA user and the eavesdropper contains Au=Σi=1N|hsi∥gidu|, u∈(n,m) and Ae=Σi=1N|hsi∥gie| as equivalent channel coefficients i=1 i=1 for corresponding joint channels;
- assuming that envelopes |hsi|, |gidu|, u∈(n,m) and |gie| of all instantaneous channel coefficients are subject to independent and identically distributed k-u shadow fading, and X represents the envelopes |hsi|, |gidu|, u∈(n,m) and |gie| of instantaneous channel coefficients, the cumulative distribution functions and probability density functions thereof are represented as follows:
Γ(·), Φ2(·) and 1F1(·) are defined as a Gamma function, binary confluence hypergeometric function, and confluence hypergeometric function, respectively;
k is a ratio of a total power of dispersed components to dominant sight components, μ is a total number of multipath clusters, m is a fading degree parameter, and R is an average power of the channel;
to simplify calculation, the cumulative distribution function and probability density function of the k-μ shadow distribution are approximated as follows:
- 3) calculating an outrage probability of the legitimate NOMA user and an intercept probability of the eavesdropper, which is performed as follows:
- outage probability:
- when a channel capacity of a main channel is less than a set threshold Ru, and u∈(n,m), an interrupt event occurs; Cu=½log2(1+γDu) represents the channel capacity of the main channel, and the outrage probability of a legitimate NOMA user Du is expressed as follows:
- 3.1) the outrage probability of the legitimate near user Dn:
- FAn(x) represents a cumulative distribution function of An;
- 3.2) the outrage probability of the legitimate remote user Dm:
- FAm(x) represents a cumulative distribution function of Am;
- the intercept probability of the eavesdropper is calculated as follows:
- when a channel capacity of an eavesdropping channel is greater than a transmission rate, an interception event occurs; CEu=½log2(1+γDEu) represents the channel capacity of the eavesdropping channel, and the intercept probability that the eavesdropper intercepts a legitimate user's information is denoted as follows:
- 3.3) the intercept probability when the eavesdropper intercepts the legitimate near user Dn:
- FAe(x) represents a cumulative distribution function of Ae;
- 3.4) the intercept probability when the eavesdropper intercepts the legitimate remote user Dm:
- FAe(x) represents a cumulative distribution function of Ae;
- 4) transforming the calculation of the outrage probability of the legitimate NOMA user and the intercept probability of the eavesdropper into solving a cumulative distribution function of equivalent channel coefficients of corresponding joint channels, whereby measuring physical layer secure transmission performance of the system, which is performed as follows:
- given Au=Σi=1N|hsi∥gidu|, let Xi=Xi1Xi2=|hsi∥gidu|, and Au=Σi=1NXi, approximating PDF and CDF of Au as follows:
- where, E[·] represents expectation;
- to obtain a1, a2, a3, a4, first four moments of μl are calculated, and μl(i) (1≤l≤4) of a variable Au is first calculated:
- the ρl(i) (1≤l≤4) of a variable Au is calculated as follows:
- firstly, calculating the expectations of Xi1 and Xi2, and calculating the expectation of fXi1(x) as follows:
- substituting formula (38) into formula (34), to yield:
- parsing processes of μ2(i), μ3(i), μ4(i) are the same as that of μl(i).
- to obtain the outrage probability of the legitimate NOMA user and the intercept probability when the eavesdropper intercepts the information xn and xm:
- thus completing secure transmission of the physical layer of the system.
FIG. 3 shows a variation of outrage probability (OP) of a legitimate near user Dn under different RIS reflection unit numbers N.
To observe and understand the impact of the parameter k-u, the user's outage probability under different Cases is simulated. Case1, Case2 and Case3 are corresponding Rayleigh fading, Rice shadow fading, and k-μ shadow fading when the parameter k-μ takes special values, respectively. The Monte Carlo curves match well with the mathematically derived analytical result curves in the whole range of signal-to-noise ratio, which verifies the correctness of the theoretical analysis. In addition, under the same Case, the outage probability decreases with the increase of the number of the smart reflective surface elements N, which indicates that increasing the number of the smart reflective surface elements can reduce the outage probability of the system; the outage probability of Case3 is lower than that of Case1 and Case2 under the same N, which suggests that the general k-μ shadow fading can effectively improve the reliability of the system.
To study the interruption performance of NOMA users, FIG. 4 shows a change trend of outrage probability of near users Dn and remote users Dm with different Vs transmit powers and different number N of RIS reflection units. Firstly, it can be seen that the analysis result of the outrage probability is matched with the simulation, which indicates the correctness of the derivation of the formula for the outrage probability; secondly, the user SINR increases with the increase of the transmit power, and the outrage probability of all the users decreases with the increase of the Vs transmit power; in addition, the outrage probability of the near user is always lower than that of the remote user under different N and different cases, which means the former is more reliable. Particularly, it can also be observed that under the same Case, the user's outrage probability significantly decreases as N increases, which indicates that increasing the number of reflection units of the smart reflective surface can effectively improve the reliability of the system. Meanwhile, the outrage probability of Case3 is lower than the outrage probability of Case1 when Nis constant, which indicates that general k-μ shadow fading can effectively reduce the outrage probability of the system compared to Rayleigh fading.
FIG. 5 shows a change trend of interrupt probability of near users Dn and remote users Dm with different Vs transmit powers and different number N of RIS reflection units. The analysis result of the interrupt probability is matched with the simulation, which indicates the correctness of the derivation of the formula for the interrupt probability. The intercept probability of all users increases with the increase of Vs transmitting power, and when N is constant, the intercept probability of the near user is always lower than that of the remote user, and the security is stronger. As N increases, the intercept probability also increases and the system security performance decreases. This indicates that the increase of the number of different RIS reflection units will decrease the outrage probability, increase the security, increase the interrupt probability, and decrease the reliability of the system. At this point, there is a trade-off between the security and reliability of the system.
To further investigate the relationship between the outrage probability and the intercept probability of the system, FIG. 6 shows the effect of outrage probability on the intercept probability at different numbers N of the RIS reflection units. The results show that as the outrage probability gradually increases, the intercept probability decreases and vice versa, which implies that there is a trade-off between the outrage probability and the intercept probability, and between the security and reliability of the system. As the number N increases, the compromise between the security and reliability decreases. Because NOMA users adopt SIC technology, the impact of the number N on SINR of Dn is greater and the change of Dn is more significant. By increasing the number of the reflective units of RIS, the trade-off between the system security and reliability can be improved. Specifically, it can be observed that when the outrage probability is the same, the intercept probability of Dn is less than that of Dm; when the intercept probability is the same, the outrage probability of Dn is less than that of Dm, which means Dn has higher safety and reliability performance, and the advantage becomes more obvious with the increase of N.
FIG. 7 shows the effect of Rn of different Case on the outage probability of users. The results show that the target data rate affects the system security performance. At the same Case, the system outage probability decreases as Rn decreases; when Rn is a fixed value, the outage probability of Case2 is smaller than the outage probability of Case1, which shows the superiority of general k-μ shadow fading. Therefore, the performance of the system can be improved by reducing the target rate and adopting more complex and realistic k-μ shadow fading.
FIG. 8 shows the impact of RHI on the system performance at different N. To compare the effect of RHI on the outrage probability, a curve for the ideal case ρ=0 is drawn as a comparison. In the ideal case, both the transmitter and receiver are not affected by hardware corruption, and the outrage probability is the lowest. As shown in the figure, the presence of RHI decreases the outrage probability of the E-RHI-RIS-NOMA system, and the outrage probability increases gradually with the increase of ρ.
FIG. 9 shows the variation of the outage probability of users Dn when RHI exists at different nodes. As shown in the figure, when RHI only occurs in the destination node and the eavesdropping node, the impact on the reliability performance of the system is smaller than that in the case of joint RHI, and it can also be observed that the outrage probability of the system decreases significantly with the increase of N. FIG. 10 shows the variation of the user's intercept probability in the presence of RHI at different nodes. The impact on the system security performance when RHI occurs only at the destination and eavesdropping nodes is greater than that in the case of a joint RHI, and the system's intercept probability increase significantly with increasing N. This suggests that the accurate modeling of the hardware defects of the transmitter and receiver is necessary when evaluating the performance of RIS-assisted NOMA systems.
As shown in FIG. 11, it can be seen that when N is the same, the outrage probability of RIS assisted NOMA system is lower than that of RIS assisted OMA system, indicating the former has stronger reliability. As N increases, the outrage probability of both systems gradually decreases. To comprehensively compare the intercept performance of NOMA and OMA systems under different N, as shown in FIG. 12, the intercept probability of RIS assisted NOMA system is lower than that of RIS assisted OMA system, indicating the former has stronger security. As N increases, the intercept probability of both systems gradually increases. Therefore, reasonable deployment of RIS can effectively improve the security and reliability of the OMA and NOMA systems, and RIS assisted NOMA systems are much more advantageous.
It will be obvious to those skilled in the art that changes and modifications may be made, and therefore, the aim in the appended claims is to cover all such changes and modifications.