Gui Zhou, Cunhua Pan, Hong Ren, Kangda Zhi, Sheng Hong, K. K. Chai
{"title":"无源窃听下ris辅助安全SWIPT MIMO系统的用户协作","authors":"Gui Zhou, Cunhua Pan, Hong Ren, Kangda Zhi, Sheng Hong, K. K. Chai","doi":"10.1109/ICCCWorkshops52231.2021.9538921","DOIUrl":null,"url":null,"abstract":"In this paper, reconfigurable intelligent surface (RIS) is proposed to enhance the physical layer security in the Rician fading channel where the angular direction of the eavesdropper is aligned with a legitimate user. In this scenario, we consider a two-phase communication system under the passive eavesdropping. Particularly, in the first phase, the base station avoids direct transmission to the attacked user. While, in the second phase, other users cooperate to forward signals to the attacked user with the help of RIS and energy harvesting technology. An average secrecy rate maximization problem is formulated, which is addressed by a low complexity algorithm. Numerical results show that the negative effect of the eavesdropper’s channel error is greater than that of the legitimate user.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"User Cooperation for RIS-aided Secure SWIPT MIMO Systems under the passive eavesdropping\",\"authors\":\"Gui Zhou, Cunhua Pan, Hong Ren, Kangda Zhi, Sheng Hong, K. K. Chai\",\"doi\":\"10.1109/ICCCWorkshops52231.2021.9538921\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, reconfigurable intelligent surface (RIS) is proposed to enhance the physical layer security in the Rician fading channel where the angular direction of the eavesdropper is aligned with a legitimate user. In this scenario, we consider a two-phase communication system under the passive eavesdropping. Particularly, in the first phase, the base station avoids direct transmission to the attacked user. While, in the second phase, other users cooperate to forward signals to the attacked user with the help of RIS and energy harvesting technology. An average secrecy rate maximization problem is formulated, which is addressed by a low complexity algorithm. Numerical results show that the negative effect of the eavesdropper’s channel error is greater than that of the legitimate user.\",\"PeriodicalId\":335240,\"journal\":{\"name\":\"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538921\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538921","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
User Cooperation for RIS-aided Secure SWIPT MIMO Systems under the passive eavesdropping
In this paper, reconfigurable intelligent surface (RIS) is proposed to enhance the physical layer security in the Rician fading channel where the angular direction of the eavesdropper is aligned with a legitimate user. In this scenario, we consider a two-phase communication system under the passive eavesdropping. Particularly, in the first phase, the base station avoids direct transmission to the attacked user. While, in the second phase, other users cooperate to forward signals to the attacked user with the help of RIS and energy harvesting technology. An average secrecy rate maximization problem is formulated, which is addressed by a low complexity algorithm. Numerical results show that the negative effect of the eavesdropper’s channel error is greater than that of the legitimate user.