Abstract
A wireless secure communication method based on RIS-NOMA under complex channel conditions, the method including: firstly, an intelligent surface is assume to be disposed between the base station and legitimate NOMA users, and between the base station and eavesdroppers; the signal to interference plus distortion noise ratio (SIDNR) for the legitimate NOMA user and the eavesdropper is calculated in the presence of RHI in the system; secondly, considering shadow fading and to simplify the overly complex calculation process, the probability density function and cumulative distribution function of the shadow fading are approximated; finally, the outrage probability and intercept probability of the legitimate users and eavesdroppers are calculated.
Claims
1. A wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions, wherein the RIS-NOMA refers to a RIS-NOMA communication system comprises: a base station (BS), a reconfigurable intelligent surface (RIS), a legitimate NOMA user, and an eavesdropper (Eve); the legitimate NOMA user comprises a legitimate remote user D.sub.m and a legitimate near user D.sub.n, and the base station communicates with the RIS; the RIS communicates with the legitimate NOMA user; the Eve intercepts a signal transmitted by the RIS; an arbitrary channel link obeys K-u shadow fading; each node in the RIS-NOMA communication system encounters a residual hardware impairment (RHI); the method comprising: 1) calculating a signal to interference plus distortion noise ratio (SIDNR) for the legitimate NOMA user and the eavesdropper in the presence of RHI in the RIS-NOMA communication system; 2) approximating a probability density function and cumulative distribution function for the k-u shadow fading; 3) calculating an outrage probability of the legitimate NOMA user and an intercept probability of the eavesdropper; and 4) transforming a calculation of the outrage probability of the legitimate NOMA user and the intercept probability of the eavesdropper into solving a cumulative distribution function of equivalent channel coefficients of corresponding joint channels, whereby measuring physical layer secure transmission performance of the system.
2. The method of claim 1, wherein 1) is performed as follows: defining a channel coefficient from the base station to an ith RIS reflecting surface in the system as h.sub.si, and channel coefficients from the RIS to the legitimate NOMA user and to the eavesdropper as g.sub.id.sub.u, u(n,m) and g.sub.ie, respectively; when the legitimate near user D.sub.n detects a weak signal x.sub.m, the signal to interference plus distortion to noise ratio SIDNR is expressed as: wherein, .sub.m and .sub.n represent power distribution coefficients of the legitimate remote user D.sub.m and the legitimate near user D.sub.n, respectively, and represents an average signal-to-noise ratio of a legal link, Ps is a transmit power of BS, and is an additive white Gaussian noise channel variance; .sub.SD.sub.n represents an overall RHI level of a link BS.fwdarw.D.sub.n; A.sub.n=.sub.i=1.sup.N|h.sub.sig.sub.id.sub.n| represents a joint channel coefficient of the link BS.fwdarw.D.sub.n; h.sub.si is a channel coefficient of a link BS.fwdarw.RIS; g.sub.id.sub.n is a channel coefficient of a link RIS.fwdarw.D.sub.n; |.Math.| represents modeling; d.sub.B and d.sub.R,n represent a distance from the base station to the RIS and a distance from the RIS to the legitimate near user D.sub.n, respectively; and represents a path fading index; through SIC technology, the SIDNR of D.sub.n decoding its own signal is given by the following equation: when D.sub.m decodes its own signal, a signal x.sub.n with strong channel gain is considered as noise, and SIDNR is represented as follows: wherein A.sub.m=.sub.i=1.sup.N|h.sub.sig.sub.id.sub.m|; g.sub.id.sub.m is a channel coefficient of a link RIS.fwdarw.D.sub.m; when the eavesdropper intercepts the signals x.sub.n and x.sub.m respectively, the obtained SIDNR is expressed as follows: represents SNR of an eavesdropping link; A.sub.e=.sub.i=1.sup.N|h.sub.sig.sub.ie|; g.sub.ie represents a joint channel coefficient of a link RIS.fwdarw.Eve; .sub.E.sup.2 represents an additive white Gaussian noise channel variance of the eavesdropper; .sub.SE represents an overall RHI level of a link BS.fwdarw.Eve; and d.sub.R,e represents a distance from the RIS to the eavesdropper.
3. The method of claim 2, wherein 2) is performed as follows: SIDNR of the legitimate NOMA user and the eavesdropper contains A.sub.u=.sub.i=1.sup.N|h.sub.sig.sub.id.sub.u|, u(n,m) and A.sub.e=.sub.i=1.sup.N|h.sub.sig.sub.ie| as equivalent channel coefficients for corresponding joint channels; assuming that envelopes |h.sub.si|, |g.sub.id.sub.u|, u(n,m) and |g.sub.ie|; of all instantaneous channel coefficients are subject to independent and identically distributed k- shadow fading, and X represents the envelopes |h.sub.si|, |g.sub.id.sub.u|, u(n,m) and |g.sub.ie| of instantaneous channel coefficients, the cumulative distribution functions and probability density functions thereof are represented as follows: (.Math.), .sub.2(.Math.) and .sub.1F.sub.1(.Math.) are defined as a Gamma function, binary confluence hypergeometric function, and confluence hypergeometric function, respectively; k is a ratio of a total power of dispersed components to dominant sight components, is a total number of multipath clusters, m is a fading degree parameter, and R is an average power of the channel; to simplify calculation, the cumulative distribution function and probability density function of the k- shadow distribution are approximated as follows:
4. The method of claim 3, wherein in 3), the outrage probability of the legitimate NOMA user is calculated as follows: when a channel capacity of a main channel is less than a set threshold R.sub.u, and u(n,m), an interrupt event occurs; C.sub.u=log.sub.2(1+.sub.D.sub.u) represents the channel capacity of the main channel, and the outrage probability of a legitimate NOMA user D.sub.u is expressed as follows: 3.1) the outrage probability of the legitimate near user D.sub.n: F.sub.D.sub.n(x) is expressed as: F.sub.A.sub.n(x) represents a cumulative distribution function of A.sub.n; 3.2) the outrage probability of the legitimate remote user D.sub.m: F.sub.D.sub.m(x) is expressed as: F.sub.A.sub.m(x) represents a cumulative distribution function of A.sub.m.
5. The method of claim 4, wherein in 3), the intercept probability of the eavesdropper is calculated as follows: when a channel capacity of an eavesdropping channel is greater than a transmission rate, an interception event occurs; C.sub.E.sub.u=log.sub.2(1+.sub.D.sub.Eu) represents the channel capacity of the eavesdropping channel, and the intercept probability that the eavesdropper intercepts a legitimate user's information is denoted as follows: 3.3) the intercept probability when the eavesdropper intercepts the legitimate near user D.sub.n: F.sub.E.sub.n(x) is expressed as: F.sub.A.sub.e(x) represents a cumulative distribution function of A.sub.e; 3.4) the intercept probability when the eavesdropper intercepts the legitimate remote user D.sub.m: F.sub.E.sub.m(x) is expressed as: F.sub.A.sub.e(x) represents a cumulative distribution function of A.sub.e.
6. The method of claim 5, wherein 4) is performed as follows: given A.sub.u=.sub.i=1.sup.N|h.sub.sig.sub.id.sub.u|, let X.sub.i=X.sub.i1X.sub.i2=|h.sub.sig.sub.id.sub.u|, and A.sub.u=.sub.i=1.sup.NX.sub.i, approximating PDF and CDF of A.sub.u as follows: where, E[.Math.] represents expectation; to obtain a.sub.1, a.sub.2, a.sub.3, a.sub.4, first four moments of .sub.l are calculated, and .sub.l.sup.(i) (1l4) of a variable A.sub.u, is first calculated:
7. The method of claim 6, wherein the .sub.l.sup.(i) (1l4) of a variable A.sub.u is calculated as follows: firstly, calculating the expectations of X.sub.i1 and X.sub.i2, and calculating the expectation of f.sub.X.sub.i1(x) as follows: substituting formula (38) into formula (34), to yield: parsing processes of .sub.2.sup.(i), .sub.3.sup.(i), .sub.4.sup.(i) are the same as that of .sub.l.sup.(i): to obtain the outrage probability of the legitimate NOMA user and the intercept probability when the eavesdropper intercepts the information x.sub.n and x.sub.m; thus completing secure transmission of the physical layer of the system.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0055] FIG. 1 is a flow chart of a wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions;
[0056] FIG. 2 is a model diagram of a RIS-NOMA communication system of the disclosure;
[0057] FIG. 3 shows a variation of OP with SNR when N and Case are different;
[0058] FIG. 4 shows OP of NOMA users D.sub.n and D.sub.m;
[0059] FIG. 5 shows IP of NOMA users D.sub.n and D.sub.m;
[0060] FIG. 6 shows a variation of intercept probability with outage probability under different N;
[0061] FIG. 7 shows a variation of OP with signal-to-noise ratio at different cases and different R.sub.n;
[0062] FIG. 8 shows a variation of OP with signal-to-noise ratio when different and N;
[0063] FIG. 9 shows a variation of OP with signal-to-noise ratio when RHI is located at different nodes;
[0064] FIG. 10 shows a variation of IP with signal-to-noise ratio when RHI is located at different nodes;
[0065] FIG. 11 is a comparison of outrage probabilities of NOMA and OMA under different N conditions; and
[0066] FIG. 12 is a comparison of intercept probabilities of NOMA and OMA under different N conditions.
DETAILED DESCRIPTION
[0067] To further illustrate the disclosure, embodiments detailing a wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions are described below. It should be noted that the following embodiments are intended to describe and not to limit the disclosure.
[0068] FIG. 2 is a model diagram of a RIS-NOMA communication system of the disclosure, which comprises a base station (BS), a reconfigurable intelligent surface (RIS), a legitimate NOMA user, and an eavesdropper (Eve); the legitimate NOMA user comprises a legitimate remote user D.sub.m, and a legitimate near user D.sub.n, and the base station communicates with the reconfigurable intelligent surface (RIS); the reconfigurable intelligent surface (RIS) communicates with the legitimate NOMA user; the eavesdropper (Eve) intercepts a signal transmitted by the RIS; an arbitrary channel link obeys k-u shadow fading; each node in the RIS-NOMA communication system encounters a residual hardware impairment (RHI).
[0069] The wireless secure communication method using reconfigurable intelligent surface-non-orthogonal multiple access (RIS-NOMA) under complex channel conditions, as shown in FIG. 1, comprises: [0070] 1) calculating a signal to interference plus distortion noise ratio (SIDNR) for the legitimate NOMA user and the eavesdropper in the presence of RHI in the system, which is performed as follows: [0071] defining a channel coefficient from the base station to an ith RIS reflecting surface in the system as h.sub.si, and channel coefficients from the RIS to the legitimate NOMA user and to the eavesdropper as g.sub.id.sub.u, u(n,m) and g.sub.ie, respectively; [0072] when the legitimate near user D.sub.n detects a weak signal x.sub.m, the signal to interference plus distortion to noise ratio SIDNR is expressed as:
[00027] [0073] where, .sub.m and .sub.n represent power distribution coefficients of the legitimate remote user D.sub.m and the legitimate near user D.sub.n, respectively, and
[00028]
represents an average signal-to-noise ratio of a legal link, Ps is a transmit power of BS, and is an additive white Gaussian noise channel variance; .sub.SD, represents an overall RHI level of a link BS.fwdarw.D.sub.n; A.sub.n=.sub.i=1.sup.N|h.sub.sig.sub.id.sub.n| represents a joint channel coefficient of the link BS.fwdarw.D.sub.n; h.sub.si is a channel coefficient of a link BS.fwdarw.RIS; g.sub.id.sub.n is a channel coefficient of a link RIS.fwdarw.D.sub.n; |.Math.| represents modeling; d.sub.B and d.sub.R,n represent a distance from the base station to the RIS and a distance from the RIS to the legitimate near user D.sub.n, respectively; and represents a path fading index; [0074] through SIC technology, the SIDNR of D.sub.n decoding its own signal is given by the following equation:
[00029] [0075] when D.sub.m decodes its own signal, a signal x.sub.n with strong channel gain is considered as noise, and SIDNR is represented as follows:
[00030]
[0076] where A.sub.m=.sub.i=1.sup.N|h.sub.sig.sub.id.sub.m|; g.sub.id.sub.m is a channel coefficient of a link RIS.fwdarw.D.sub.m; [0077] when the eavesdropper intercepts the signals x.sub.n and x.sub.m respectively, the obtained SIDNR is expressed as follows:
[00031]
[00032]
represents SNR of an eavesdropping link; A.sub.e=.sub.i=1.sup.N|h.sub.sig.sub.ie|; g.sub.ie represents a joint channel coefficient of a link RIS.fwdarw.Eve; .sub.E.sup.2 represents an additive white Gaussian noise channel variance of the eavesdropper; .sub.SE represents an overall RHI level of a link BS.fwdarw.Eve; and d.sub.R,e represents a distance from the RIS to the eavesdropper; [0078] 2) approximating a probability density function and cumulative distribution function for the - shadow fading, which is performed as follows: [0079] SIDNR of the legitimate NOMA user and the eavesdropper contains A.sub.u=.sub.i=1.sup.N|h.sub.sig.sub.id.sub.u|, u(n,m) and A.sub.e=.sub.i=1.sup.N|h.sub.sig.sub.ie| as equivalent channel coefficients i=1 i=1 for corresponding joint channels; [0080] assuming that envelopes |h.sub.si|, |g.sub.id.sub.u|, u(n,m) and |g.sub.ie| of all instantaneous channel coefficients are subject to independent and identically distributed k-u shadow fading, and X represents the envelopes |h.sub.si|, |g.sub.id.sub.u|, u(n,m) and |g.sub.ie| of instantaneous channel coefficients, the cumulative distribution functions and probability density functions thereof are represented as follows:
[00033]
[0081] (.Math.), .sub.2(.Math.) and .sub.1F.sub.1(.Math.) are defined as a Gamma function, binary confluence hypergeometric function, and confluence hypergeometric function, respectively;
[00034]
k is a ratio of a total power of dispersed components to dominant sight components, is a total number of multipath clusters, m is a fading degree parameter, and R is an average power of the channel;
[0082] to simplify calculation, the cumulative distribution function and probability density function of the k- shadow distribution are approximated as follows:
[00035] [0083] 3) calculating an outrage probability of the legitimate NOMA user and an intercept probability of the eavesdropper, which is performed as follows: [0084] outage probability: [0085] when a channel capacity of a main channel is less than a set threshold R.sub.u, and u(n,m), an interrupt event occurs; C.sub.u=log.sub.2(1+.sub.D.sub.u) represents the channel capacity of the main channel, and the outrage probability of a legitimate NOMA user D.sub.u is expressed as follows:
[00036] [0086] 3.1) the outrage probability of the legitimate near user D.sub.n:
[00037] [0087] F.sub.D.sub.n(x) is expressed as:
[00038] [0088] F.sub.A.sub.n(x) represents a cumulative distribution function of A.sub.n; [0089] 3.2) the outrage probability of the legitimate remote user D.sub.m:
[00039] [0090] F.sub.D.sub.m(x) is expressed as:
[00040] [0091] F.sub.A.sub.m(x) represents a cumulative distribution function of A.sub.m; [0092] the intercept probability of the eavesdropper is calculated as follows: [0093] when a channel capacity of an eavesdropping channel is greater than a transmission rate, an interception event occurs; C.sub.E.sub.u=log.sub.2(1+.sub.DE.sub.u) represents the channel capacity of the eavesdropping channel, and the intercept probability that the eavesdropper intercepts a legitimate user's information is denoted as follows:
[00041] [0094] 3.3) the intercept probability when the eavesdropper intercepts the legitimate near user D.sub.n:
[00042] [0095] F.sub.E.sub.n(x) is expressed as:
[00043] [0096] F.sub.A.sub.e(x) represents a cumulative distribution function of A.sub.e; [0097] 3.4) the intercept probability when the eavesdropper intercepts the legitimate remote user D.sub.m:
[00044] [0098] F.sub.E.sub.m(x) is expressed as:
[00045] [0099] F.sub.A.sub.e(x) represents a cumulative distribution function of A.sub.e; [0100] 4) transforming the calculation of the outrage probability of the legitimate NOMA user and the intercept probability of the eavesdropper into solving a cumulative distribution function of equivalent channel coefficients of corresponding joint channels, whereby measuring physical layer secure transmission performance of the system, which is performed as follows: [0101] given A.sub.u=.sub.i=1.sup.N|h.sub.sig.sub.id.sub.u|, let X.sub.i=X.sub.i1X.sub.i2=|h.sub.sig.sub.id.sub.u|, and A.sub.u=.sub.i=1.sup.NX.sub.i, approximating PDF and CDF of A.sub.u as follows:
[00046] [0102] where, E[.Math.] represents expectation;
[00047] [0103] to obtain a.sub.1, a.sub.2, a.sub.3, a.sub.4, first four moments of .sub.l are calculated, and .sub.l.sup.(i) (1l4) of a variable A.sub.u is first calculated:
[00048] [0104] the .sub.l.sup.(i) (1l4) of a variable A.sub.u is calculated as follows: [0105] firstly, calculating the expectations of X.sub.i1 and X.sub.i2, and calculating the expectation of f.sub.X.sub.i1(x) as follows:
[00049] [0106] substituting formula (38) into formula (34), to yield:
[00050] [0107] parsing processes of .sub.2.sup.(i), .sub.3.sup.(i), .sub.4.sup.(i) are the same as that of .sub.l.sup.(i).
[00051] [0108] to obtain the outrage probability of the legitimate NOMA user and the intercept probability when the eavesdropper intercepts the information x.sub.n and x.sub.m:
[00052] [0109] thus completing secure transmission of the physical layer of the system.
[0110] FIG. 3 shows a variation of outrage probability (OP) of a legitimate near user D.sub.n under different RIS reflection unit numbers N.
[0111] To observe and understand the impact of the parameter k-u, the user's outage probability under different Cases is simulated. Case1, Case2 and Case3 are corresponding Rayleigh fading, Rice shadow fading, and k- shadow fading when the parameter k- takes special values, respectively. The Monte Carlo curves match well with the mathematically derived analytical result curves in the whole range of signal-to-noise ratio, which verifies the correctness of the theoretical analysis. In addition, under the same Case, the outage probability decreases with the increase of the number of the smart reflective surface elements N, which indicates that increasing the number of the smart reflective surface elements can reduce the outage probability of the system; the outage probability of Case3 is lower than that of Case1 and Case2 under the same N, which suggests that the general k- shadow fading can effectively improve the reliability of the system.
[0112] To study the interruption performance of NOMA users, FIG. 4 shows a change trend of outrage probability of near users D.sub.n and remote users D.sub.m with different Vs transmit powers and different number N of RIS reflection units. Firstly, it can be seen that the analysis result of the outrage probability is matched with the simulation, which indicates the correctness of the derivation of the formula for the outrage probability; secondly, the user SINR increases with the increase of the transmit power, and the outrage probability of all the users decreases with the increase of the Vs transmit power; in addition, the outrage probability of the near user is always lower than that of the remote user under different N and different cases, which means the former is more reliable. Particularly, it can also be observed that under the same Case, the user's outrage probability significantly decreases as N increases, which indicates that increasing the number of reflection units of the smart reflective surface can effectively improve the reliability of the system. Meanwhile, the outrage probability of Case3 is lower than the outrage probability of Case1 when Nis constant, which indicates that general k- shadow fading can effectively reduce the outrage probability of the system compared to Rayleigh fading.
[0113] FIG. 5 shows a change trend of interrupt probability of near users D.sub.n and remote users D.sub.m with different Vs transmit powers and different number N of RIS reflection units. The analysis result of the interrupt probability is matched with the simulation, which indicates the correctness of the derivation of the formula for the interrupt probability. The intercept probability of all users increases with the increase of Vs transmitting power, and when N is constant, the intercept probability of the near user is always lower than that of the remote user, and the security is stronger. As N increases, the intercept probability also increases and the system security performance decreases. This indicates that the increase of the number of different RIS reflection units will decrease the outrage probability, increase the security, increase the interrupt probability, and decrease the reliability of the system. At this point, there is a trade-off between the security and reliability of the system.
[0114] To further investigate the relationship between the outrage probability and the intercept probability of the system, FIG. 6 shows the effect of outrage probability on the intercept probability at different numbers N of the RIS reflection units. The results show that as the outrage probability gradually increases, the intercept probability decreases and vice versa, which implies that there is a trade-off between the outrage probability and the intercept probability, and between the security and reliability of the system. As the number N increases, the compromise between the security and reliability decreases. Because NOMA users adopt SIC technology, the impact of the number N on SINR of D.sub.n is greater and the change of D.sub.n is more significant. By increasing the number of the reflective units of RIS, the trade-off between the system security and reliability can be improved. Specifically, it can be observed that when the outrage probability is the same, the intercept probability of D.sub.n is less than that of D.sub.m; when the intercept probability is the same, the outrage probability of D.sub.n is less than that of D.sub.m, which means D.sub.n has higher safety and reliability performance, and the advantage becomes more obvious with the increase of N.
[0115] FIG. 7 shows the effect of R.sub.n of different Case on the outage probability of users. The results show that the target data rate affects the system security performance. At the same Case, the system outage probability decreases as R.sub.n decreases; when R.sub.n is a fixed value, the outage probability of Case2 is smaller than the outage probability of Case1, which shows the superiority of general k- shadow fading. Therefore, the performance of the system can be improved by reducing the target rate and adopting more complex and realistic k- shadow fading.
[0116] FIG. 8 shows the impact of RHI on the system performance at different N. To compare the effect of RHI on the outrage probability, a curve for the ideal case =0 is drawn as a comparison. In the ideal case, both the transmitter and receiver are not affected by hardware corruption, and the outrage probability is the lowest. As shown in the figure, the presence of RHI decreases the outrage probability of the E-RHI-RIS-NOMA system, and the outrage probability increases gradually with the increase of .
[0117] FIG. 9 shows the variation of the outage probability of users D.sub.n when RHI exists at different nodes. As shown in the figure, when RHI only occurs in the destination node and the eavesdropping node, the impact on the reliability performance of the system is smaller than that in the case of joint RHI, and it can also be observed that the outrage probability of the system decreases significantly with the increase of N. FIG. 10 shows the variation of the user's intercept probability in the presence of RHI at different nodes. The impact on the system security performance when RHI occurs only at the destination and eavesdropping nodes is greater than that in the case of a joint RHI, and the system's intercept probability increase significantly with increasing N. This suggests that the accurate modeling of the hardware defects of the transmitter and receiver is necessary when evaluating the performance of RIS-assisted NOMA systems.
[0118] As shown in FIG. 11, it can be seen that when N is the same, the outrage probability of RIS assisted NOMA system is lower than that of RIS assisted OMA system, indicating the former has stronger reliability. As N increases, the outrage probability of both systems gradually decreases. To comprehensively compare the intercept performance of NOMA and OMA systems under different N, as shown in FIG. 12, the intercept probability of RIS assisted NOMA system is lower than that of RIS assisted OMA system, indicating the former has stronger security. As N increases, the intercept probability of both systems gradually increases. Therefore, reasonable deployment of RIS can effectively improve the security and reliability of the OMA and NOMA systems, and RIS assisted NOMA systems are much more advantageous.
[0119] It will be obvious to those skilled in the art that changes and modifications may be made, and therefore, the aim in the appended claims is to cover all such changes and modifications.