Professional Documents
Culture Documents
Manasa Final
Manasa Final
Chapter 1
Introduction
1.1 Introduction
Such type of medium is called guided medium. On the other hand, wireless
communication doesn’t require any physical medium but propagates the Signal through
space. Since, space only allows for signal transmission without any guidance, the
medium used in wireless communication is called unguided medium.
Antennas are electrical devices that transform the electrical signals to radio
signals in the form of electromagnetic (EM) waves and vice versa. These
electromagnetic waves propagates through space. Hence, both transmitter and receiver
consists of an antenna. Recently, the reconfigurable intelligent surface (RIS) has
emerged as a promising technology for next-generation wireless communications. A RIS
is a software-controlled meta surface with a large number of nearly-passive components
that can be reconfigured to make the wireless environment programmable.
The RIS features low-cost and low-power operation while provides an effective
way to alter the electromagnetic properties (e.g., phase shift) of the incident signal so as
to benefit the intended reception. Meanwhile, as an alternative to conventional
encryption- based security, physical layer security has received wide attention for its
keyless operation and potential for perfect secrecy. Generally, physical layer security is
achieved when the wiretap channel is a degraded version of the legitimate channel.
security. RIS plays a major role in providing security to the data while transmitting from
transmitter to the receiver. It is a programmable device which consists elements.
Due to the significant potential of RIS, it has raised research interests in various
aspects of wireless communications, including the RIS-channel modelling, transmission
precoding, energy efficiency, practical discrete phase shift designs, and so forth. In
addition to the rich literature in RIS assisted communications, the RIS-enhanced
wireless security has also attracted particular interest. In, the authors investigate the
secure multiple-input single-output communications with artificial noise and RIS.
1.2 Motivation
1.3 Overview
Security to our data is very important while communication mainly in wireless
transmission. We have witnessed fast growing research effort on wireless
communication using RISs. RIS which are an emerging technology to manipulate
electromagnetic waves. RIS assisted wireless communications have great potential to
achieve significant performance improvement and coverage enhancement in a cost
effective way. In current wireless communication systems, the wireless environment,
i.e., the physical objects that influence the propagation of electromagnetic waves, is
uncontrollable.
Designing of the RIS is very easy, lossless and less expensive to realize. We are
implementing this using the software matlab. It stands for Matrix laboratory. Matlab is a
program that was originally designed to simplify the implementation of numerical linear
algebra routines. It has since grown into something much bigger and it is used to
implement numerical algorithms for a wide range of applications.
Therefore, channel measurements are urgently needed, which may provide authentic
information on the path loss of RIS assisted wireless communications. Motivated by
these conditions, we develop free-space path loss models for RIS-assisted wireless
communications in different scenarios based on the physics and electromagnetic nature
of RIS.
1.6 Conclusion
We worked on computerized method for security wireless transmissions. The
proposed model has obtained an accuracy and precise results without any errors.
Chapter 2
Literature Survey
In the first scheme, the secondary transceivers are jointly designed to maximize
their sum rate while satisfying a threshold on the PU’s secrecy rate. Due to the non-
convex nature, it is first converted into a convex one and then, an alternating
optimization algorithm based on the second-order cone programming is proposed to
solve it.
The key features and performances of the two proposed schemes are also compared.
Finally, simulation results are presented to verify the effectiveness of the two proposed
schemes for secure CR networks.
With the aim for maximizing the secrecy rate (SR), the transmit precoding (TPC)
matrix at the BS, covariance matrix of AN and phase shifts at the IRS are jointly
optimized subject to constrains of transmit power limit and unit modulus of IRS phase
shifts.
Specifically, the optimal TPC matrix and an AN covariance matrix are derived
by the Lagrangian multiplier method, and the optimal phase shifts are obtained by
Majorization-Minimization (MM) algorithm. Since all variables can be calculated in
closed form, the proposed algorithm is very efficient. We also extend the SRM problem
to the more general multiple-IRs scenario and propose a BCD algorithm to solve it.
Finally, simulation results validate the effectiveness of system security enhancement via
an IRS.
Hence, it can actively control the signal propagation properties in favor of signal
reception, and thus realize the notion of a smart radio environment. As such, the IRS’s
phase control, combined with the conventional transmission control, can potentially
bring performance gain compared to wireless networks without IRS.
In this survey, we first introduce basic concepts of the IRS and the realizations of its
re-configurability. Then, we focus on applications of the IRS in wireless
communications. We overview different performance metrics and analytical approaches
to characterize the performance improvement of IRS assisted wireless networks.
To exploit the performance gain, we discuss the joint optimization of the IRS’s
phase control and the transceivers’ transmission control in different network design
problems, e.g., rate maximization and power minimization problems. Furthermore, we
extend the
2.3 Conclusion
This survey consists of evolution of the securing wireless transmission. RIS receiver
plays a major in securing the information.
Chapter 3
We are using the RIS technology for secured wireless transmission. It has emerged
as a promising technology for next generation wireless communications. RIS is a
software controlled meta-surface with a large number of passive components that can be
reconfigured to make wireless environment programmable.
For RIS, as an emerging wireless technology, most existing research efforts on RIS-
enhanced security has been devoted to the strategy design at the transmitter. In contrast,
the problem at the receiver’s side is, however, rarely addressed. In practice, the security
enhancement in terms of reception usually corresponds to the uplink transmissions,
where the transmitter is typically the less-powerful user equipment and thus the security
can be more endangered. Towards this issue, in this correspondence, we address the
RIS-assisted security for single-input and multiple-output (SIMO) transmissions.
3.1.2 Disadvantage:
Also, the legitimate side has full knowledge of the channel state information,
including the reflection links and wiretap links2. In contrast, the eavesdropper is passive
and thus has no information regarding the reflection links3. As such, the eavesdropper
can only determine it’s received beamforming based on the wiretap channel information.
Finally, we investigate the passive beamforming at the RIS while fixing the receive
beamforming and jamming. Generally, by introducing the RIS, there incur
corresponding counterparts for the legitimate link, wiretap link, and jamming link,
which significantly changes the propagation and thus has the potential to enhanced
security. We have in the preceding discussions investigated the receive beamforming,
jamming, and reflection, respectively.
Now we can incorporate them under a BCD framework for the optimization in an
alternative manner to achieve coordinated secure transmissions. In this section, the
simulation results are provided to verify the effectiveness of our proposal. The
following parameters are used for simulations as the default unless otherwise noted. We
consider that the legitimate transmitter, receiver, and eavesdropper are located on the
ground with coordinating.
3.1.4 Objective:
During this phase, the necessary environmental information for configuring the operation
of the RIS is estimated, and the RIS is configured for subsequent operation.
During this phase, the RIS is configured already and assists the transmission of other
devices throughout the network.
General operation:
Based on this general definition, the operation of an RIS can, in general, be split into two
phases that are executed periodically based on the coherence time of the environment.
The achieved secrecy rate with respect to the number of elements in the RIS and
jamming power, indicating the combined effect of active jamming and passive
beamforming upon security performance. As expected, the secrecy rate increases with
more RIS elements and higher jamming power. In particular, we can see that the secrecy
rate increases almost linearly with the number of RIS elements. In contrast, the benefit
for security brought by active jamming is quite evident when the jamming power is low,
and the improvement in secrecy rate becomes plateaued when the jamming power is
sufficiently large.
This is because that the RIS always act as a contributing factor to affect the radio
environment towards improved secrecy with properly adjusted phase shifts. The
jamming attack also induces self-interference at the legitimate receiver. Thus, the
overall effect of jamming to improve security becomes limited.
3.2.2 Eavesdropper:
Specifically, we consider the cases without the RIS, without jamming, and neither
jamming nor reflection as baselines. Overall, we can see that the secrecy rate is
significantly improved with the assistance of active jamming and passive beamforming.
Specifically, we show the performance with different locations of the eavesdropper,
where the x-axis corresponds to the x-coordinate of the eavesdropper. As we can see, as
the eavesdropper moves away from the legitimate transmitter and approaches the
legitimate receiver, the secrecy rate is increased, since the wiretap channel is worsened
and also more heavily jammed. Meanwhile, for the cases without jamming, we can see
that the benefit brought by the RIS becomes more significant when the eavesdropper
moves rightwards. While for the cases with jamming attacks, the security improvement
by the RIS is almost a constant, regardless of different locations of the eavesdropper.
The eavesdropper intends to wiretap the legitimate transmissions while the RIS is
deployed as part of the legitimate system to combat eavesdropping. The legitimate
transmitter, receiver, and eavesdropper are denoted by S, D, and E, respectively. The
legitimate transmitter has one single antenna while the eavesdropper has NE antennas.
The legitimate receiver has NR receive antennas and NT transmit antennas, enabling
full- duplex operations to emit an active jamming signal to confuse the eavesdropper.
RISs are currently under research and design. These include smart surfaces that are
or are not capable of amplifying and performing signal processing operations on the
impinging radio waves active vs. passive surfaces, as well as surfaces whose functions
cannot or can be modified after being manufactured and deployed static vs. dynamic or
reconfigurable surfaces. A detailed classification of these options is provided in further
text. For ease of writing, however, we feel important to mention that in the present
paper we refer, unless otherwise stated, to RISs that can be broadly classified as nearly-
passive and dynamic.
The two-dimensional structure makes RISs easier to design and to deploy, less lossy,
and less expensive to realize, as compared with their three-dimensional counterpart
whose thickness is not negligible.
𝐹 𝜃,,𝜑
x
z
3.3 Free space path loss modelling of RIS- assisted wireless communication
In this section, we describe the overall system model and develop the free-space path
loss model for RIS-assisted wireless communications in different scenarios.
Let N and M denote the no. of rows and columns of the regularly arranged unit cells
of RIS respectively. The size of each unit cell along the X axis is d x and that along y
axis is dy which are usually of sub wavelength scale half of the wavelength. F (θ, ϕ) is
the normalized power radiation pattern of the unit cell, which reveals the dependency of
incident or reflected power density of the unit cell on the incident or reflected angle.
G is the gain of the unit cell, which is defined and is only related to the normalized
power radiation pattern F (θ, ϕ) of the unit cell. U n,m denotes the unit cell in the nth row
and mth column with the programmable reflection coefficient Γ n,m. The center position
of Un,m is ((m−1/2 )dx, (n−1/2)dy, 0), where m 1 – (M/2,M/2) and n [1- N/2, N/2],
assuming that both of N and M are even numbers. We use the symbols d1, d2, θt, ϕt, θr
and ϕr to represent the distance between the transmitter and the center of the RIS, the
distance between the receiver and the center of the RIS, the elevation angle and the
azimuthal angle from the center of the RIS to the transmitter, the elevation angle and the
azimuth angle from the center of the RIS to the receiver, respectively.
3.3.2 Theorem 1
Theorem 1 reveals received signal power is proportional to the transmitted signal
power, the gains of the transmitting/receiving antennas, the gain of the unit cell, the size
of the unit cell, the square of the wave length. In addition, Theorem 1 also indicates that
the received signal power is related to the normalized power radiation patterns of the
transmitting/receiving antennas. However, their specific relationships are not that
straightforward, which needs further analysis and discussions in the rest of this paper.
In this project, we develop free-space path loss models for RIS-assisted wireless
communications in different scenarios, which can be classified into two categories: RIS-
assisted beamforming and RIS-assisted broadcasting as shown in Fig. 3.3 In the RIS-
assisted beamforming scenario, the received signal power is maximized for a single
specific user. On the other hand, in the RIS- assisted broadcasting scenario, the signal
evenly covers all users in a specific area. We regard as a general formula. As each
considered scenario depends on the design of the reflection coefficients of the unit cells,
as well as the near-field or far-field effects of the RIS, will be further discussed for
different cases to draw insights on the free space path loss of RIS-assisted wireless
communications.
The signals reflected by all the unit cells of the RIS to the receiver can be
aligned in phase to enhance the received signal power, which makes RIS especially
appealing for beamforming applications. Therefore, it is important to study the free-
space path loss in RIS-assisted beam- forming scenario. The case where both of the
transmitter and receiver are in the far field of the RIS is first discussed as follows.
Proposition 1. Assume that the directions of peak radiation of both the transmitting and
receiving antennas point to the center of the RIS, and all the unit cells of the RIS share
the same reflection coefficient Γ n,m = Aejφ. The received signal power in the far field
case can be written as Half of the wave length where N and M are rows and columns
respectively. Proposition 1 is more insightful compared with the general formula in
Theorem 1 and equation is referred to as the far-field formula. Proposition 1 reveals that
the free-space path loss of RIS-assisted wireless communications is proportional to
(d1d2)2 in the far field case.
The free-space path loss is also related to the unit cells’ normalized power radiation
pattern F (θ, ϕ), which is fixed once the RIS is designed and fabricated. Furthermore,
when the reflection coefficients of all the unit cells are the same, the RIS performs
specular reflection, that is, the incident signal is mainly reflected towards the mirror
direction (θr = θt and ϕr = ϕt + π). The above analysis assumes that all the unit cells share
the same reflection coefficient. The design of Γ n,m is discussed in the following
proposition, which enables the RIS to beam form the reflected signal reflection.
Radiation is the energy released by the electron. The signals reflected by all the
unit cells of the RIS to the receiver can be aligned in phase to enhance the received
signal
BRECW, 2022 Page 15 of 50
Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming
Proposition 2. Assume that the directions of peak radiation of both the transmitting and
receiving antennas point to the center of the RIS, and the reflection coefficients of all
the unit cells share the same amplitude value A and different phase shift φn,m (Γn,m =
Aejφn,m) received signal power through intelligent reflection in the far field case can be
written as the normalized power radiation patterns of transmitting or receiving antennas.
Based on the case study where the transmitter or receiver are in the near field of the
RIS is discussed in the subsection which enables the RIS to focus the reflected signal to
the receiver by properly design the reflection coefficients.
The above analysis assumes that all the unit cells share the same reflection
coefficient. The design of Γn,m is discussed in the following proposition, which enables
the RIS to beamform the reflected signal to the receiver in any desired direction (θ des,
ϕdes) through intelligent reflection. According to the phase shift design described by 9,
the incident signal from direction (θt, ϕt) to the RIS can be manipulated and reflected
towards any desired direction (θdes, ϕdes) in the far field case, which is referred to as
intelligent reflection. Besides, and also indicate that the free-space path loss of RIS-
assisted far- field beamforming has the same scaling law as for specular reflection and
intelligent reflection. Moreover, as for the far-field beamforming case, a large-size RIS
outperforms a small-size RIS under the same condition based.
Assume that the directions of peak radiation of both the transmitting and receiving
antennas point to the center of the RIS, and the reflection coefficients of all the unit cells
share the same amplitude value A and different phase shift φn,m (Γn,m = Aejφn,m ). The
intelligent reflection in this paper refers to intelligently controlling the reflection nature
of the RIS by properly programming the reflection coefficients of the unit cells of the
RIS.
The specular reflection in this paper includes two cases: far-field specular
beamforming and near-field specular broadcasting, and the reflection coefficients of the
unit cells are identical. This is need for the beamforming and advantage also.In the
previous subsection, the path loss analyses for the RIS-assisted beamforming assume
that both of the transmitter and the receiver are in the far field of the RIS.
The case study where the transmitter and/or the receiver are in the near field of the
RIS is discussed in this subsection, which enables the RIS to focus the reflected signal
to the receiver by properly design the reflection coefficients Γn,m.
Proposition 3. Assume that the reflection coefficients of all the unit cells share the
same amplitude value A and different phase shifts φn,m and that the RIS-assisted wireless
communication system operates in the near field case. The received signal power is
written as follows
In the near field broadcasting case, the free-space path loss of RIS-assisted wireless
communications can also be characterized by the general formula in Theorem 1. In
addition, a more insightful result can be obtained by using the approximation based on
geometric optics, which is typically employed in ray tracing. Since all the unit cells
share the same reflection coefficient, the RIS performs specular reflection in the view of
geometrical optics. As shown in Figure 3.3 the mirror image of the transmitter, namely
Txmirror, can be obtained by taking the RIS as the symmetric plane.
The signal transmission process is equivalent to that the signal is transmitted from
Txmirror and received by the receiver after travelling distance (d1 + d2), thus we can get
Proposition 4 according to the conventional free-space path loss model.
Proposition 4. Assume the reflection coefficients of all the unit cells share different
amplitude and phase shift. The RIS aims to direct the signal in a different way. The
above analysis assumes that all the unit cells share the different reflection coefficient. In
the following, we introduce a design method for the phase shifts of the unit cells, which
enables the RIS to broadcast the reflected signal to the desired direction through
intelligent reflection.
Proposition 5. Assume that the reflection coefficients of all the unit cells share the same
amplitude value A and different phase shift φn,m, and the RIS aims to broadcast the
reflected signal to the desired direction (θdes, ϕdes) (i.e., the desired center direction of
Ωt) in the near field broadcasting case, an effective design method for the phase shift
φn,m .
3.4 RIS-assisted Beamforming
Beam forming is based on single input multi output method which means one
transmitter sends data to many receivers Γ n,m = φn,m = 0. The large ban4d and X-band
antennas are employed in the simulation. When d 1 and d2 are both greater than 71.4 m,
the far field condition of RIS1 is fulfilled. The small RIS and C-band antennas are also
employed in the simulation under the same conditions. When d 1 and d2 are both larger
than 1 m, the far field condition of the small RIS is fulfilled the simulated received
signal power distribution in various distance.
Denote hSD ∈ CNR× , hSE ∈ CNE×1, his ∈ CN×1, HID ∈ CNR×N, HIE ∈
CNE×N, HDE ∈ CNE×NT , and HDI ∈ CN×NT as the S-D, S-E, S-I, I-D, I-E, D-E,
and D-I
channels, respectively. Also, the self-interference channel at the legitimate receiver is
HDD ∈ CNR×NT with a suppression ratio of ρ. For the RIS, let θ = [θ1,θ2,··· ,θN]T
denote the phase shifts at the reflecting elements, and we then have a N × N diagonal
For the wireless system noted above, the received signals at the legitimate receiver and
eavesdropper.
In this subsection, we present the problem formulation to enhance the wireless security.
Then, the problem is solved within a BCD framework such that the receive
beamforming, passive reflection, and active jamming are jointly optimized.
For the considered system, we assume that the RIS belongs to the legitimate
system, with full coordination among the transmitter, receiver, and reflector. Also, the
legitimate side has full knowledge of the channel state information, including the
reflection links and wiretap links.
We first consider the receiving beamforming optimization with fixed jamming and
reflection. As we can see, the receive beam former only concerns the SINR at the
legitimate receiver in the objective function.
Then we consider the jamming strategy with fixed receive beamforming and
reflection. When launching jamming attacks, the jamming signal not only degrades the
eavesdropper but also affects the legitimate reception. Jamming is performed to confuse
the eavesdropper. Jamming along with passive beam forming provides security to the
data while transmitting from transmitter to the receiver. Active jamming includes using
of high frequency components like amplifiers or radios to confuse the eavesdropper. By
providing high frequency signals the third party may confuse and our data can be
protected.
Finally, we investigate the passive beamforming at the RIS while fixing the receive
beamforming and jamming. Generally, by introducing the RIS, there incur
corresponding counterparts for the legitimate link, wiretap link, and jamming link,
which significantly changes the propagation and thus has the potential to enhance
security.
3.7 Algorithm
2. repeat
3. t ← t + 1;
To confuse the eavesdropper we use the RIS which performs passive beam
forming and active jamming. By the confusion of eavesdropper the information reaches
to the receiver directly.
The legitimate transmit power is 1 W and there are 50 elements in the RIS. The
jamming power is 1 W with a self interference ratio of −100 dB. The threshold
determining the convergence is 1×10−4. For the initialization of the algorithm, we null
the jamming power and employ an identity matrix as the reflection-coefficient matrix.
Then, we can determine the receive beamforming according to (10) with the initialized
jamming and phase shift and conduct the algorithm.
3.9 Results
3.9.1 Security performance with respect to iterations
Security is important for our data during transmission. Mainly in the wireless
transmissions security plays a major role. To protect our information from we use the
RIS which confuses the eavesdropper and helps in providing the data to be transmitted
only to the receiver. As there are many advantages by using this RIS we are
BCD framework.
The above result is security rate vs iterations. We can observe the performance
of security with the iterations. As we increase the number of iterations of security rate is
increasing. Security is important to our data during transmission from transmitter to the
receiver. Figure confirms the convergence of the proposed algorithm.
The demonstration here corresponds to four different initial states. In Case-1 and
Case-2, we null the jamming power while use an identical jamming power allocation
summing up to the maximum for Case-3 and Case-4. Moreover, in Case-1 and Case-3,
we use identity matrix as the reflection-coefficient matrix, while in Case-2 and Case-4
we use random diagonal elements with unit modulus. Suggesting that the iterations
generate a monotonically increasing (at least non-decreasing) sequence due to the
updates of receive beamforming, jamming, and reflection through the optimizations
detailed before. Therefore, the proposed algorithm is guaranteed to converge to a local
optimum of the objective function.
As we can see, different initial states induce different initial secrecy rate.
However, as updated through the iterations, different initial states finally converge to
almost the same local optimum, where the maximum different is about 1‰.
The above figure is number of elements and jamming power vs security rate. It
shows the achieved secrecy rate with respect to the number of elements in the RIS and
jamming power, indicating the combined effect of active jamming and passive
beamforming upon security performance. As expected, the secrecy rate increases with
more RIS elements and higher jamming power.
In particular, we can see that the secrecy rate increases almost linearly with the
number of RIS elements. In contrast, the benefit for security brought by active jamming
is quite evident when the jamming power is low, and the improvement in secrecy rate
becomes plateaued when the jamming power is sufficiently large. This is because that
the RIS always act as a contributing factor to affect the radio environment towards
improved secrecy with properly adjusted phase shifts. While in contrast, the jamming
attack also
induces self-interference at the legitimate receiver. Thus, the overall effect of jamming to
improve security becomes limited.
3.10 Conclusion
In this correspondence, we investigate the RIS-assisted secure transmissions for
SIMO transmissions, where the multi antenna receiver launches full-duplex jamming
attacks to confuse the eavesdropper. We jointly consider the receive beamforming,
active jamming, and passive beamforming of the RIS towards the optimal security
performance, and propose the algorithm under a BCD framework. The simulation
indicates that the combined effect of jamming and reflection can significantly enhance
the wireless security. Moreover, due to the RIS’s nature to affect the wireless
transmissions by changing the ratio environment, it induces stable security improvement
regardless of the jamming attacks.
Chapter 4
Software Requirements
4.1 Introduction
MATLAB is the tool used by Universities to understand the engineering concepts and it is
good at it. However the industries don’t use Matlab and as a engineer you will forget the
Matlab skills. Also Matlab is very expensive when it comes to commercial license.
R2015b network licenses require a license server running FLEXnet v11.13, which
is provided by the Mathworks installer. A license server that is enabling multiple
releases of MATLAB must use the version of FLEXnet shipped with the latest
release of MATLAB enabled by that license server.
Starting with R2016a, the License Manager is not available for 32-bit Windows.
Windows 8.1
Windows 7
Service Pack 1
Windows
Server 2012
Windows
Server 2012
R2
Windows
Server 2008
R2 Service
Pack1
Windows
Server 2008
Applications may be written and changed with the built-in integrated development
environment and debugged with the MATLAB debugger.
4.6 Conclusion
In our project we are using MATLAB R2015b which provides required algorithms,
expressions and libraries.
So, In this chapter we’ll discuss about this software we’ll discuss about the
advantages, history and system requirements of MATLAB R2015b.
Chapter 5
Implementation
5.1 Introduction
In this Chapter we will get to know about the algorithm used in the project and the
complete circuit diagram used for this project.
Due to the sugnificant potential of RIS, it has raised reasearch interests in various
aspects of wireless communications, includingthe RIS-channel modeling, transmission
precoding, energy efficiency, practical discrete phase shift designs, and so forth. In
addition to rich literature in RIS-assisted communications, the RIS-enhanced wireless
security has also attracted particular interest. In, the authors investigate the secure
multiple-input single-output communications with artificial noise and RIS. The security
enhancement for multiple-input multiple-output communications in investigated in. In, the
authors particularly investigate the RIS-assisted security without the channel state
information on eavsdropper. In, the authors consider the security issue with a RIS under
different channel models and analyze the performance in terms of the expected secrecy rae
In, the authors address the partial channel state information issue and intend to optimize
the robust security performance for RIS communications.
the security can be more endangered. Towards this issue in correspondance, we address
the RIS-assisted security for single-input and multiple-output (SIMO) transmissions. The
multi-antenna receiver performs full-duplex operations and launches an active jamming
single to downgrade to eavesdreopping. Therefore, the reveiver coordinates the jamming
attacks and passive beanforming. The problem is solved under a block coordinate descent
(BCD) framework, and simulation results are provided to verify the effectiveness of our
proposal.
Block cordinate descent (BCD), also known as nonlinear Gauss- Seidel, is a simple
iterative algorithm for non-convex optimization that sequentially minimizes the objective
fun ction in each block cordinate while the other cordinates are held fixed. We propose a
version of BCD that, for block multi-convex and smooth objective functions under
constratints, is guaranteed to converge to the stationary points with worst-case rate of
convergence of O((log n)^2/n) for n iterations, and a bound of O(E^-1(log(E^-1)^2) for
the number of iterations to achieve an an E- approximate stationary point. Furthermore,
we show that these results continue to hold even when the convex sub-problems are in
exactly solved if the optimality gaps are uniformly summable aginst initialization. A key
idea is to restrict the parameter search within a diminishing radius to promote stability of
iterates. As an application, we provide alternating least squares algorithm with
diminishing radius to promote stability of iterates.
In this work, we introduce a new modification of the standard BCD (2) and
achieve the following results:
With the given scope for new use cases and the demanding needs of future 6th generation
(6G) wireless networks, the development of wireless communications looks exciting. The
propagation medium has been viewed as a randomly behaving entity between the
transmitter and the receiver since traditional wireless technology, degrading the quality
of the received signal due to the unpredictable interactions of the broadcast radio waves
with the surrounding objects. On the other hand, network operators could now manipulate
electromagnetic radiation to remove the negative impacts of natural wireless propagation
due to the recent arrival of reconfigurable intelligent surfaces (RIS) in wireless
communications. According to recent findings, the RIS mechanism benefits nonorthogonal
multiple access (NOMA), which can effectively deliver e ffective transmissions. For
simple design, of RIS-NOMA system, fixed power allocation scheme for NOMA is
required. The main system performance metric, i.e., outage probability, needs to be
considered to look at the efficiency and capability of transmission mode relying on RIS
and NOMA schemes, motivated by the potential of these developing technologies. As
major performance metrics, we derive analytical representations of outage probability, and
throughput and an accurate approximation is obtained for the outage probability.
Numerical results are conducted to validate the exactness of the theoretical analysis. It is
found that increasing the higher number of reflecting elements in the RIS can significantly
boost the outage probability performance, and the scenario with only the RIS link is also
beneficial. In addition, it is desirable to deploy the RIS-NOMA since it is indicated that
better performance compared with the traditional multiple access technique.
Due to high demands in terms of system capacity and spec- trum efficiency, the
traditional orthogonal multiple access (OMA) has been unable to meet the user needs to be
associ- ated with the rapid growth of Internet of Things (IoT) and mobile communications.
To meet the heavy demand for mobile services, nonorthogonal multiple access (NOMA) is
researched in recent years with promising applications . In some scenarios, NOMA
benefits to device-to-device communications and cognitive radio- (CR-) aided NOMA and
these are considered as potential key technologies for the fifth-generation mobile
communica- tions (5G). The authors in deployed the relaying scheme for the secondary
network of the considered CR-NOMA, and the relay can energy harvesting (EH) from the
second- ary transmitter to serve signal forwarding to distant second- ary users. They
studied the complex model of EH-assisted CR-NOMA in terms of outage behavior and
Recently, due to its high-energy efficiency, reconfigur- able intelligent surface (RIS)
technique is recognized as the next-generation relay technique, also namely relay 2.0 .The
RIS elements can independently shift the signal phase and absorbing the signal energy. The
reflected signals benefit to wireless transmission due to less energy required . In the authors
demonstrated an interesting RIS architecture which includes any number of passive
reflecting elements, a simple controller for their adjustable configuration, and a single radio
frequency (RF) chain for baseband measurements.
By assuming sparse wireless chan- nels in the beam space domain, they studied an
alternating optimization scheme for explicit estimation of the channel gains at the RIS
elements attached to the single RF chain . The authors in explored RIS by combining the
functions of phase shift and radiation together on an electro- magnetic surface. As such,
positive intrinsic-negative (PIN) diodes are employed to realize 2-bit phase shifting for
beam forming. Thanks to providing RIS equipped 256 two-bit ele- ments, this radical
design is recognized as first wireless com- munication prototype in the world. The
developed prototype includes main components such as modular hardware and flexible
software. In this prototype, they used the hosts to set parameter and exchange data.
Together with this, they employed the universal software radio peripherals (USRPs) to
process baseband and radio frequency (RF) signals, as well as implemented the RIS to
transmit and receive signals. Reference studied a mmWave system relying on several RIS
arrays which implemented low-precision analog-to-digital converters (ADCs). To assist
multiple- input multiple-output (MIMO) transmission, these RIS arrays form a synthetic
channel with increased spatial diver- sity and power gain by enabling the linear spatial
processing. In this section, we analyze the achievable performance of the proposed RIS-
NOMA system in some scenarios, and bench- mark scheme is also mentioned in Figure. It
should be pointed out that as there are different decoding conditions for users NU and FU,
we should compare performance gap among NU and FU, so that the main parameters are
decided to guarantee the fairness. For simplifying the system perfor- mance analysis on
performance gap among two users, this paper just focuses on main performance metric,
BRECW, 2022 Page 38 of 50
Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming
i.e., outage probability. Of course, the other system performance metrics of such networks
will be
further studied but it needs change to other method of computation. However, this study
exhibits explicit performance metric and more accuracy for- mulas if we compare them
with the conventional method which is also used to present the outage performance,
namely, the central limit theorem (CLT), in which variables A and B are approximated as a
Gaussian random variable with fixed mean values and variances.
5.6 Conclusion:
In this chapter we discussed about the algorithm, implementation and description of the
circuit diagram.
Chapter 6
6.1 Introduction
In this chapter we will come to know about the advanatges and applications of Secured
wireless transmissions using RIS receiver.
6.2 Advanatges
Data encryption and user authentication are two of the basic security measures.
Data encryption protects the vulnerable wireless link between client devices and
access points by encrypting all data in the transmission.
6.3 Applications
Encryption is the process of translating plain text data into something that appears to be
random and meaningless (ciphertext).
Data privacy, also called information privacy, is the aspect of information technology that
deals with the ability an organization or individual has to determine what data in a
computer system can be shared with the third parties.
3) Hacking privacy
Just like any thief, a hacker will choose the most vulnerable targets they can find. But
instead of using lock picks to steal from your home or business, they use software to steal
your personal data. Hackers will often try to glean information such as credit card numbers
on bank accunt information.
4) Active Jamming
Applications of active jamming are blocking, snooping attemots, protecting private and
confidential information, limiting the use of mobile phone and radio devices.
5) Passive Beamforming
6.4 Conclusion
Chapter 7
Results
7.1 Introduction
In this chapter we will discuss about all the outputs from Phase I and Phase 2.
7.4 Conclusion
In this Chapter we discussed about all the outputs of Phase I and II.
Chapter 8
Conclusion and Future Scope
8.1 Introduction
In this chapter we are concluding the documentation by mentioning it’s future scope.
8.3 Conclusion
In this paper, secure transmission of confidential informa- tion with an artificial jamming signal
to prevent eavesdropping has been considered. By deriving the distribution of SINRs of a
legitimate MS and eavesdroppers, the lower bound of secrecy rate has been derived with some
approximation. Based on the approximated ergodic secrecy rate, the optimal power splitting
factor and the limiting secrecy rate with massive number of antennas are examined. To
evaluate the secrecy rate under time-varying channels, the secrecy rate loss due to channel
variation has been evaluated. To obtain more insight from the analytical results, the upper
bound of the secrecy rate loss is analyzed under a high SINR assumption. The rate loss in
the high SINR region is affected only by a fading coefficient, channel delay, and, SNR of
the legitimate MS. That is, other parameters, such as the power splitting factor and the
numbers of transmit antennas and eavesdroppers, have no influence on the secrecy rate loss. In
a low SINR case, however, the secrecy rate loss depends on a power splitting factor and the
numbers of transmit antennas as well. These observations are verified with numerical
simulations.
References
[1]. H. Yu and W. Khalid, “Secure communication with beamforming and jamming in
time-varying channels,” in Proc. Eighth International Conference on Ubiquitous and
Future Networks (ICUFN), pp. 218–221, Jul. 2016.
[2]. Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: technical
challenges, recent advances, and future trends,” Proceedings of the IEEE, vol. 104, no. 9,
pp. 1727–1765, Sep. 2016.
[3]. A. Wyner, “The wire-tap channel,” The Bell Sys. Tech. J., vol. 54, no. 8, pp. 1355 –
1387, Oct. 1975.
[4]. A. Khisti and G. Wornell, “Secure transmission with multiple antennas I: The
MISOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, no. 7,
pp. 3088 – 3104, Jul. 2010.
[5]. R. Liu and H. Poor, “Secrecy capacity region of a mulitple anntena Gaussian broadcast
channel with confidential message,” IEEE Trans- actions on Information Theory, vol. 55,
no. 3, pp. 1235 – 1249, Mar. 2009.
[6]. P. K. Gopala, L. Lai, and H. E. Gamal, “On the secrecy capacity of fading
channels,” IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687–4698,
Oct. 2008.
[7]. Y. Liang, H. V. Poor, and S. Shamai, “Secure communication over fading channels,”
IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2470–2492, Jun. 2008.