Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 50

Major Project Report Secured Wireless Transmission by RIS

receiver: Passive beamforming and


Active jamming

Chapter 1
Introduction
1.1 Introduction

Communications can be wireless or wired and the medium used for


communication can be guided or unguided. In wired communication, the medium is a
physical path like co-axial cables, twisted pair cable and optical fiber links etc. which
guides the signal to propagate from one point to other.

Such type of medium is called guided medium. On the other hand, wireless
communication doesn’t require any physical medium but propagates the Signal through
space. Since, space only allows for signal transmission without any guidance, the
medium used in wireless communication is called unguided medium.

Antennas are electrical devices that transform the electrical signals to radio
signals in the form of electromagnetic (EM) waves and vice versa. These
electromagnetic waves propagates through space. Hence, both transmitter and receiver
consists of an antenna. Recently, the reconfigurable intelligent surface (RIS) has
emerged as a promising technology for next-generation wireless communications. A RIS
is a software-controlled meta surface with a large number of nearly-passive components
that can be reconfigured to make the wireless environment programmable.

The RIS features low-cost and low-power operation while provides an effective
way to alter the electromagnetic properties (e.g., phase shift) of the incident signal so as
to benefit the intended reception. Meanwhile, as an alternative to conventional
encryption- based security, physical layer security has received wide attention for its
keyless operation and potential for perfect secrecy. Generally, physical layer security is
achieved when the wiretap channel is a degraded version of the legitimate channel.

Correspondingly, the conventional approaches are devoted to enhancing the


legitimate reception or downgrading the eavesdropping while adapting to the radio
environment. With the RIS-enabled intelligent ratio environment, we can artificially
intervene in the signal propagation so as to make the environment more favorable for
secure transmissions. In this respect, by the joint optimization of transmission and radio
environment, the RIS has opened up a new dimension towards new designs for wireless

BRECW, Hyderabad Page 1 of 25


Major Project Report Secured Wireless Transmission by RIS
receiver: Passive beamforming and
Active jamming

security. RIS plays a major role in providing security to the data while transmitting from
transmitter to the receiver. It is a programmable device which consists elements.

Due to the significant potential of RIS, it has raised research interests in various
aspects of wireless communications, including the RIS-channel modelling, transmission
precoding, energy efficiency, practical discrete phase shift designs, and so forth. In
addition to the rich literature in RIS assisted communications, the RIS-enhanced
wireless security has also attracted particular interest. In, the authors investigate the
secure multiple-input single-output communications with artificial noise and RIS.

The security enhancement for multiple-input multiple-output communications is


investigated. In, the authors particularly investigate the RIS-assisted security without the
channel state information on the eavesdropper. In, the authors consider the security issue
with a RIS under different channel models and analyze the performance in terms of the
expected secrecy rate. In, the authors address the partial channel state information issue
and intend to optimize the robust security performance for RIS communications.

1.2 Motivation

Wireless communications is one of the most active areas of technology development of


our time. This development is being driven primarily by the transformation of what has
been largely a medium for supporting voice telephony into a medium for supporting
other services such as the transmission of video, images, text, and data. The aim of this
project is to secure the data while transmission as it is the wireless communication. This
wireless communication system a lot of demand now-a-days. This work motivated to
implement the wireless communication with security.

1.3 Overview
Security to our data is very important while communication mainly in wireless
transmission. We have witnessed fast growing research effort on wireless
communication using RISs. RIS which are an emerging technology to manipulate
electromagnetic waves. RIS assisted wireless communications have great potential to
achieve significant performance improvement and coverage enhancement in a cost
effective way. In current wireless communication systems, the wireless environment,
i.e., the physical objects that influence the propagation of electromagnetic waves, is
uncontrollable.

BRECW, Hyderabad Page 2 of 25


Major Project Report Secured Wireless Transmission by RIS
receiver: Passive beamforming and
Active jamming

Designing of the RIS is very easy, lossless and less expensive to realize. We are
implementing this using the software matlab. It stands for Matrix laboratory. Matlab is a
program that was originally designed to simplify the implementation of numerical linear
algebra routines. It has since grown into something much bigger and it is used to
implement numerical algorithms for a wide range of applications.

1.4 Technical Approach


During the research and design process of wireless communication systems one can
only design transceivers signal processing algorithms and transmission protocols to
adapt to the radio environment. RISs, on the other hand may in principle make the
wireless environment controllable and programmable thus bringing unprecedented new
opportunities for enhancing the performance of wireless communication systems.
Against this background, various RIS-assisted wireless communication systems
have recently been studied, by providing cost effective and energy-efficient solutions
that offer performance improvements and coverage enhancement in wireless networks.
By jointly optimizing active and passive beamforming in an RIS-assisted wireless
network, the energy consumption and the coverage performance can be significantly
improved. The joint beamforming design was also investigated for improving the
physical layer security. The authors of optimized the achievable rate of RIS assisted
systems in different communication scenarios. The energy efficiency of RIS-based
downlink multiuser MISO systems was maximized. Energy harvesting performance,
ergodic spectral efficiency, symbol error probability and outrange probability of RIS-
assisted wireless communications were derived and optimized. The comparison with
relays was carried out and channel estimation was recently analyzed.
However, the major limitation of existing research on RIS-assisted wireless
communication is the lack of tractable and reliable physical and electromagnetic models
for the RISs. Most of the existing research works are based on simplistic mathematical
models that regard the RIS as a diagonal matrix with phase shift values.
The responses of the RISs to the radio waves have not yet been extensively studied
from the physics and electromagnetic point of view, which may lead to relatively
simplified algorithm designs and performance predictions.
The path loss models used in most existing works do not consider physical factors
such as the size of the RISs, and the near-field effects of RISs.

BRECW, Hyderabad Page 3 of 25


Major Project Report Secured Wireless Transmission by RIS
receiver: Passive beamforming and
Active jamming

Therefore, channel measurements are urgently needed, which may provide authentic
information on the path loss of RIS assisted wireless communications. Motivated by
these conditions, we develop free-space path loss models for RIS-assisted wireless
communications in different scenarios based on the physics and electromagnetic nature
of RIS.

We validate them by using numerical simulations and we also conduct channel


measurements by using fabricated RIS.

1.5 Organization of Report


Chapter 1: Introduction The chapter consists of introduction, motivation and overview of
securing wireless transmission.
Chapter 2: Literature Survey The chapter consists of researchers, articles and works of
various people on securing wireless transmission.
Chapter 3: Existing and Proposed methods The chapter consists of existing and proposed
methods.

1.6 Conclusion
We worked on computerized method for security wireless transmissions. The
proposed model has obtained an accuracy and precise results without any errors.

BRECW, Hyderabad Page 4 of 25


Major Project Report Secured Wireless Transmission by RIS
receiver: Passive beamforming and
Active jamming

Chapter 2

Literature Survey

2.1 Securing Wireless transmission


In this, “Securing wireless transmission by RIS receiver- passive beamforming and
active jamming” handled by Haifeng Zhang, Wen Su4 in the year 2019.

2.2 Literature Survey

1. Radio Environments Empowered by Reconfigurable Intelligent Surfaces:


How It Works, State of Research, and The Road Ahead

Reconfigurable intelligent surfaces (RISs) are an emerging transmission technology


for application to wireless communications. RISs can be realized in different ways,
which include (i) large arrays of inexpensive antennas that are usually spaced half of the
wavelength apart; and (ii) metamaterial-based planar or conformal large surfaces whose
scattering elements have sizes and inter-distances much smaller than the wavelength.
Compared with other transmission technologies, e.g., phased arrays, multi-antenna
transmitters, and relays, RISs require the largest number of scattering elements, but each
of them needs to be backed by the fewest and least costly components. Also, no power
amplifiers are usually needed. For these reasons, RISs constitute a promising software-
defined architecture that can be realized at reduced cost, size, weight, and power (C-
SWaP design), and are regarded as an enabling technology for realizing the emerging
concept of smart radio environments (SREs).

In this project, we (i) introduce the emerging research field of RIS-empowered


SREs;
(ii) overview the most suitable applications of RISs in wireless networks; (iii) present an
electromagnetic-based communication-theoretic framework for analyzing and
optimizing metamaterial-based RISs; (iv) provide a comprehensive overview of the
current state of research; and (v) discuss the most important research issues to tackle.

Owing to the interdisciplinary essence of RIS-empowered SREs, finally, we put


forth the need of reconciling and reuniting C.E. Shannon’s mathematical theory of
communication with G.Green’s and J.C. Maxwell’s mathematical theories of
electromagnetism for appropriately modelling, analyzing, optimizing, and deploying
future wireless networks empowered by RISs.

BRECW, Hyderabad Page 5 of 25


Major Project Report Secured Wireless Transmission by RIS
receiver: Passive beamforming and
Active jamming

2. Optimization or Alignment: Secure primary transmission assisted by


secondary networks
Security is a challenging issue for cognitive radio (CR) to be used in future 5G
mobile systems. Conventionally, interference will degrade the performance of a primary
user (PU) when the spectrum is shared with secondary users (Sus). However, when
properly designed, Sus can serve as friendly jammers to guarantee the secure
transmission of PU. Thus, in this paper, we propose two schemes to improve the sum
rate of Sus while guaranteeing the secrecy rate of PU.

In the first scheme, the secondary transceivers are jointly designed to maximize
their sum rate while satisfying a threshold on the PU’s secrecy rate. Due to the non-
convex nature, it is first converted into a convex one and then, an alternating
optimization algorithm based on the second-order cone programming is proposed to
solve it.

In the second scheme, the principle of interference alignment is employed to


eliminate interference from PU and other Sus at each secondary receiver, and the
interference from Sus is zero-forced at the primary receiver. Thus, interference-free
transmission can be performed by the legitimate CR network, with eavesdropping
towards PU disrupted by Sus.

The key features and performances of the two proposed schemes are also compared.
Finally, simulation results are presented to verify the effectiveness of the two proposed
schemes for secure CR networks.

3. Artificial-Noise-Aided Secure MIMO Wireless Communications via


Intelligent Reflecting Surface
This paper considers a MIMO secure wireless communication system aided by
the physical layer security technique of sending artificial noise (AN). To further enhance
the system security performance, the advanced intelligent reflecting surface (IRS) is
invoked in the AN-aided communication system, where the base station (BS), legitimate
information receiver (IR) and eavesdropper (Eve) are equipped with multiple antennas.

With the aim for maximizing the secrecy rate (SR), the transmit precoding (TPC)
matrix at the BS, covariance matrix of AN and phase shifts at the IRS are jointly
optimized subject to constrains of transmit power limit and unit modulus of IRS phase
shifts.

BRECW, Hyderabad Page 6 of 25


Major Project Report Secured Wireless Transmission by RIS
receiver: Passive beamforming and
Active jamming

Then, the secrecy rate maximization (SRM) problem is formulated, which is a


non-convex problem with multiple coupled variables. To tackle it, we propose to utilize
the block coordinate descent (BCD) algorithm to alternately update the TPC matrix, AN
covariance matrix, and phase shifts while keeping SR non-decreasing.

Specifically, the optimal TPC matrix and an AN covariance matrix are derived
by the Lagrangian multiplier method, and the optimal phase shifts are obtained by
Majorization-Minimization (MM) algorithm. Since all variables can be calculated in
closed form, the proposed algorithm is very efficient. We also extend the SRM problem
to the more general multiple-IRs scenario and propose a BCD algorithm to solve it.
Finally, simulation results validate the effectiveness of system security enhancement via
an IRS.

4. Toward Smart Wireless Communications via Intelligent


Reflecting Surfaces: A Contemporary Survey
This paper presents a literature review on recent applications and design aspects of
the intelligent reflecting surface (IRS) in the future wireless networks. Conventionally,
the network optimization has been limited to transmission control at two endpoints, i.e.,
end users and network controller. The fading wireless channel is uncontrollable and
becomes one of the main limiting factors for performance improvement. The IRS is
composed of a large array of scattering elements, which can be individually configured
to generate additional phase shifts to the signal reflections.

Hence, it can actively control the signal propagation properties in favor of signal
reception, and thus realize the notion of a smart radio environment. As such, the IRS’s
phase control, combined with the conventional transmission control, can potentially
bring performance gain compared to wireless networks without IRS.

In this survey, we first introduce basic concepts of the IRS and the realizations of its
re-configurability. Then, we focus on applications of the IRS in wireless
communications. We overview different performance metrics and analytical approaches
to characterize the performance improvement of IRS assisted wireless networks.

To exploit the performance gain, we discuss the joint optimization of the IRS’s
phase control and the transceivers’ transmission control in different network design
problems, e.g., rate maximization and power minimization problems. Furthermore, we
extend the

BRECW, Hyderabad Page 7 of 25


Major Project Report Secured Wireless Transmission by RIS
receiver: Passive beamforming and
Active jamming

discussion of IRS-assisted wireless networks to some emerging use cases. Finally, we


highlight important practical challenges and future research directions for realizing IRS
assisted wireless networks in beyond 5G communications.

5. Wireless Communications with Reconfigurable Intelligent Surface:


Path Loss Modeling and Experimental Measurement
Reconfigurable intelligent surfaces (RISs) comprised of tunable unit cells have
recently drawn significant attention due to their superior capability in manipulating
electromagnetic waves. In particular, RIS-assisted wireless communications have the
great potential to achieve significant performance improvement and coverage
enhancement in a cost-effective and energy-efficient manner, by properly programming
the reflection coefficients of the unit cells of RISs.

In this project, free-space path loss models for RIS-assisted wireless


communications are developed for different scenarios by studying the physics and
electromagnetic nature of RISs. The proposed models, which are first validated through
extensive simulation results, reveal the relationships between the free-space path loss of
RIS-assisted wireless communications and the distances from the transmitter/receiver to
the RIS, the size of the RIS, the near-field/far-field effects of the RIS, and the radiation
patterns of antennas and unit cells.

In addition, three fabricated RISs (meta-surfaces) are utilized to further corroborate


the theoretical findings through experimental measurements conducted in a microwave
anechoic chamber. The measurement results match well with the modeling results, thus
validating the proposed free-space path loss models.

2.3 Conclusion

This survey consists of evolution of the securing wireless transmission. RIS receiver
plays a major in securing the information.

BRECW, Hyderabad Page 8 of 25


Major Project Report Secured Wireless Transmission by RIS
receiver: Passive beamforming and
Active jamming

Chapter 3

Existing and Proposed Methods


3.1 Introduction

We are using the RIS technology for secured wireless transmission. It has emerged
as a promising technology for next generation wireless communications. RIS is a
software controlled meta-surface with a large number of passive components that can be
reconfigured to make wireless environment programmable.

3.1.1 Existing System:

For RIS, as an emerging wireless technology, most existing research efforts on RIS-
enhanced security has been devoted to the strategy design at the transmitter. In contrast,
the problem at the receiver’s side is, however, rarely addressed. In practice, the security
enhancement in terms of reception usually corresponds to the uplink transmissions,
where the transmitter is typically the less-powerful user equipment and thus the security
can be more endangered. Towards this issue, in this correspondence, we address the
RIS-assisted security for single-input and multiple-output (SIMO) transmissions.

The multi-antenna receiver performs full-duplex operations and launches an active


jamming signal to downgrade the eavesdropping. Therefore, the receiver coordinates the
jamming attacks and passive beamforming at the RIS to achieve the optimized security
performance.

3.1.2 Disadvantage:

In this subsection, we present the problem formulation to enhance the wireless


security. Then, the problem is solved within a BCD framework such that the receive
beamforming, passive reflection, and active jamming are jointly optimized. For the
considered system, we assume that the RIS belongs to the legitimate system, with full
coordination among the transmitter, receiver, and reflector.

Also, the legitimate side has full knowledge of the channel state information,
including the reflection links and wiretap links2. In contrast, the eavesdropper is passive
and thus has no information regarding the reflection links3. As such, the eavesdropper
can only determine it’s received beamforming based on the wiretap channel information.

BRECW, Hyderabad Page 9 of 25


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

3.1.3 Proposed System:

Finally, we investigate the passive beamforming at the RIS while fixing the receive
beamforming and jamming. Generally, by introducing the RIS, there incur
corresponding counterparts for the legitimate link, wiretap link, and jamming link,
which significantly changes the propagation and thus has the potential to enhanced
security. We have in the preceding discussions investigated the receive beamforming,
jamming, and reflection, respectively.

Now we can incorporate them under a BCD framework for the optimization in an
alternative manner to achieve coordinated secure transmissions. In this section, the
simulation results are provided to verify the effectiveness of our proposal. The
following parameters are used for simulations as the default unless otherwise noted. We
consider that the legitimate transmitter, receiver, and eavesdropper are located on the
ground with coordinating.

3.1.4 Objective:

Control and programming phase:

During this phase, the necessary environmental information for configuring the operation
of the RIS is estimated, and the RIS is configured for subsequent operation.

Normal operation phase:

During this phase, the RIS is configured already and assists the transmission of other
devices throughout the network.

General operation:

Based on this general definition, the operation of an RIS can, in general, be split into two
phases that are executed periodically based on the coherence time of the environment.

3.2 Module Description:

3.2.1 Beamforming Upon Security Performance:

The achieved secrecy rate with respect to the number of elements in the RIS and
jamming power, indicating the combined effect of active jamming and passive
beamforming upon security performance. As expected, the secrecy rate increases with
more RIS elements and higher jamming power. In particular, we can see that the secrecy

BRECW, 2022 Page 10 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

rate increases almost linearly with the number of RIS elements. In contrast, the benefit
for security brought by active jamming is quite evident when the jamming power is low,
and the improvement in secrecy rate becomes plateaued when the jamming power is
sufficiently large.

This is because that the RIS always act as a contributing factor to affect the radio
environment towards improved secrecy with properly adjusted phase shifts. The
jamming attack also induces self-interference at the legitimate receiver. Thus, the
overall effect of jamming to improve security becomes limited.

3.2.2 Eavesdropper:

Specifically, we consider the cases without the RIS, without jamming, and neither
jamming nor reflection as baselines. Overall, we can see that the secrecy rate is
significantly improved with the assistance of active jamming and passive beamforming.
Specifically, we show the performance with different locations of the eavesdropper,
where the x-axis corresponds to the x-coordinate of the eavesdropper. As we can see, as
the eavesdropper moves away from the legitimate transmitter and approaches the
legitimate receiver, the secrecy rate is increased, since the wiretap channel is worsened
and also more heavily jammed. Meanwhile, for the cases without jamming, we can see
that the benefit brought by the RIS becomes more significant when the eavesdropper
moves rightwards. While for the cases with jamming attacks, the security improvement
by the RIS is almost a constant, regardless of different locations of the eavesdropper.

3.2.3 Legitimate Transmissions:

The eavesdropper intends to wiretap the legitimate transmissions while the RIS is
deployed as part of the legitimate system to combat eavesdropping. The legitimate
transmitter, receiver, and eavesdropper are denoted by S, D, and E, respectively. The
legitimate transmitter has one single antenna while the eavesdropper has NE antennas.
The legitimate receiver has NR receive antennas and NT transmit antennas, enabling
full- duplex operations to emit an active jamming signal to confuse the eavesdropper.

3.2.4 Impinging Radio Waves:

RISs are currently under research and design. These include smart surfaces that are
or are not capable of amplifying and performing signal processing operations on the
impinging radio waves active vs. passive surfaces, as well as surfaces whose functions

BRECW, 2022 Page 11 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

cannot or can be modified after being manufactured and deployed static vs. dynamic or
reconfigurable surfaces. A detailed classification of these options is provided in further
text. For ease of writing, however, we feel important to mention that in the present
paper we refer, unless otherwise stated, to RISs that can be broadly classified as nearly-
passive and dynamic.

3.2.5 Two-dimensional structure:

The RIS is modeled as a two-dimensional structure of man-made material, whose


transverse size is much larger than its thickness. Usually, the transverse size of an RIS is
much larger than the wavelength of the radio waves (e.g., a few tens or a few hundreds
times larger than the wavelength depending on the functions to realize), and its
thickness is much smaller than the wavelength of the radio waves. For this reason, an
RIS is often referred to as a zero-thickness sheet of electromagnetic material.

The two-dimensional structure makes RISs easier to design and to deploy, less lossy,
and less expensive to realize, as compared with their three-dimensional counterpart
whose thickness is not negligible.

𝐹 𝜃,,𝜑

x
z

Figure 3.1 Radiation pattern

BRECW, 2022 Page 12 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

3.3 Free space path loss modelling of RIS- assisted wireless communication

Figure 3.2 RIS – Model

In this section, we describe the overall system model and develop the free-space path
loss model for RIS-assisted wireless communications in different scenarios.

3.3.1 System Model

We consider a general RIS- assisted single-input single-output wireless


communication system as shown in figure 3.2. This paper aims to study the free space
path loss modelling of RIS assisted wireless communications. The direct link between
transmitter and receiver is ignored in the rest of the paper. The RIS is placed in the x-y
plane of a cartesian co-ordinate system and the geometric center of RIS is aligned with
the origin of the co-ordinate system.

Let N and M denote the no. of rows and columns of the regularly arranged unit cells
of RIS respectively. The size of each unit cell along the X axis is d x and that along y
axis is dy which are usually of sub wavelength scale half of the wavelength. F (θ, ϕ) is
the normalized power radiation pattern of the unit cell, which reveals the dependency of
incident or reflected power density of the unit cell on the incident or reflected angle.

BRECW, 2022 Page 13 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

G is the gain of the unit cell, which is defined and is only related to the normalized
power radiation pattern F (θ, ϕ) of the unit cell. U n,m denotes the unit cell in the nth row
and mth column with the programmable reflection coefficient Γ n,m. The center position
of Un,m is ((m−1/2 )dx, (n−1/2)dy, 0), where m 1 – (M/2,M/2) and n [1- N/2, N/2],
assuming that both of N and M are even numbers. We use the symbols d1, d2, θt, ϕt, θr
and ϕr to represent the distance between the transmitter and the center of the RIS, the
distance between the receiver and the center of the RIS, the elevation angle and the
azimuthal angle from the center of the RIS to the transmitter, the elevation angle and the
azimuth angle from the center of the RIS to the receiver, respectively.
3.3.2 Theorem 1
Theorem 1 reveals received signal power is proportional to the transmitted signal
power, the gains of the transmitting/receiving antennas, the gain of the unit cell, the size
of the unit cell, the square of the wave length. In addition, Theorem 1 also indicates that
the received signal power is related to the normalized power radiation patterns of the
transmitting/receiving antennas. However, their specific relationships are not that
straightforward, which needs further analysis and discussions in the rest of this paper.

Theorem1 also shows that RIS-assisted wireless communication systems are


transmitter receiver reciprocal, since the same signal power can be received if the roles
of the transmitter and the receiver are exchanged, which is an especially important
property in the uplink and downlink design of time division duplexing (TDD) wireless
communication systems.

Figure 3.3 Two scenarios of RIS assisted wireless communication

(a) RIS assisted beamforming (b) RIS assisted broadcasting

BRECW, 2022 Page 14 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

In this project, we develop free-space path loss models for RIS-assisted wireless
communications in different scenarios, which can be classified into two categories: RIS-
assisted beamforming and RIS-assisted broadcasting as shown in Fig. 3.3 In the RIS-
assisted beamforming scenario, the received signal power is maximized for a single
specific user. On the other hand, in the RIS- assisted broadcasting scenario, the signal
evenly covers all users in a specific area. We regard as a general formula. As each
considered scenario depends on the design of the reflection coefficients of the unit cells,
as well as the near-field or far-field effects of the RIS, will be further discussed for
different cases to draw insights on the free space path loss of RIS-assisted wireless
communications.

A. Far fielding Beamforming Case

The signals reflected by all the unit cells of the RIS to the receiver can be
aligned in phase to enhance the received signal power, which makes RIS especially
appealing for beamforming applications. Therefore, it is important to study the free-
space path loss in RIS-assisted beam- forming scenario. The case where both of the
transmitter and receiver are in the far field of the RIS is first discussed as follows.
Proposition 1. Assume that the directions of peak radiation of both the transmitting and
receiving antennas point to the center of the RIS, and all the unit cells of the RIS share
the same reflection coefficient Γ n,m = Aejφ. The received signal power in the far field
case can be written as Half of the wave length where N and M are rows and columns
respectively. Proposition 1 is more insightful compared with the general formula in
Theorem 1 and equation is referred to as the far-field formula. Proposition 1 reveals that
the free-space path loss of RIS-assisted wireless communications is proportional to
(d1d2)2 in the far field case.

The free-space path loss is also related to the unit cells’ normalized power radiation
pattern F (θ, ϕ), which is fixed once the RIS is designed and fabricated. Furthermore,
when the reflection coefficients of all the unit cells are the same, the RIS performs
specular reflection, that is, the incident signal is mainly reflected towards the mirror
direction (θr = θt and ϕr = ϕt + π). The above analysis assumes that all the unit cells share
the same reflection coefficient. The design of Γ n,m is discussed in the following
proposition, which enables the RIS to beam form the reflected signal reflection.

Radiation is the energy released by the electron. The signals reflected by all the
unit cells of the RIS to the receiver can be aligned in phase to enhance the received
signal
BRECW, 2022 Page 15 of 50
Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

power , which makes RIS especially appealing for beamforming applications.


Therefore, it is important to study the free-space path loss in RIS-assisted beam-
forming scenario. The case where both of the transmitter and receiver are in the far field
of the RIS is first discussed as follows.

For this reason, an RIS is often referred to as a zero-thickness sheet of


electromagnetic material. The two-dimensional structure makes RISs easier to design
and to deploy, less lossy, and less expensive to realize, as compared with their three-
dimensional counterpart whose thickness is not negligible to the receiver in any desired
direction (θdes, ϕdes) through intelligent reflection

Proposition 2. Assume that the directions of peak radiation of both the transmitting and
receiving antennas point to the center of the RIS, and the reflection coefficients of all
the unit cells share the same amplitude value A and different phase shift φn,m (Γn,m =
Aejφn,m) received signal power through intelligent reflection in the far field case can be
written as the normalized power radiation patterns of transmitting or receiving antennas.

Based on the case study where the transmitter or receiver are in the near field of the
RIS is discussed in the subsection which enables the RIS to focus the reflected signal to
the receiver by properly design the reflection coefficients.

The above analysis assumes that all the unit cells share the same reflection
coefficient. The design of Γn,m is discussed in the following proposition, which enables
the RIS to beamform the reflected signal to the receiver in any desired direction (θ des,
ϕdes) through intelligent reflection. According to the phase shift design described by 9,
the incident signal from direction (θt, ϕt) to the RIS can be manipulated and reflected
towards any desired direction (θdes, ϕdes) in the far field case, which is referred to as
intelligent reflection. Besides, and also indicate that the free-space path loss of RIS-
assisted far- field beamforming has the same scaling law as for specular reflection and
intelligent reflection. Moreover, as for the far-field beamforming case, a large-size RIS
outperforms a small-size RIS under the same condition based.

Assume that the directions of peak radiation of both the transmitting and receiving
antennas point to the center of the RIS, and the reflection coefficients of all the unit cells
share the same amplitude value A and different phase shift φn,m (Γn,m = Aejφn,m ). The
intelligent reflection in this paper refers to intelligently controlling the reflection nature
of the RIS by properly programming the reflection coefficients of the unit cells of the
RIS.

BRECW, 2022 Page 16 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

The specular reflection in this paper includes two cases: far-field specular
beamforming and near-field specular broadcasting, and the reflection coefficients of the
unit cells are identical. This is need for the beamforming and advantage also.In the
previous subsection, the path loss analyses for the RIS-assisted beamforming assume
that both of the transmitter and the receiver are in the far field of the RIS.

The case study where the transmitter and/or the receiver are in the near field of the
RIS is discussed in this subsection, which enables the RIS to focus the reflected signal
to the receiver by properly design the reflection coefficients Γn,m.

Proposition 3. Assume that the reflection coefficients of all the unit cells share the
same amplitude value A and different phase shifts φn,m and that the RIS-assisted wireless
communication system operates in the near field case. The received signal power is
written as follows

In the near field broadcasting case, the free-space path loss of RIS-assisted wireless
communications can also be characterized by the general formula in Theorem 1. In
addition, a more insightful result can be obtained by using the approximation based on
geometric optics, which is typically employed in ray tracing. Since all the unit cells
share the same reflection coefficient, the RIS performs specular reflection in the view of
geometrical optics. As shown in Figure 3.3 the mirror image of the transmitter, namely
Txmirror, can be obtained by taking the RIS as the symmetric plane.

The signal transmission process is equivalent to that the signal is transmitted from
Txmirror and received by the receiver after travelling distance (d1 + d2), thus we can get
Proposition 4 according to the conventional free-space path loss model.

Recently, we have witnessed fast growing research effort on wireless


communication using RISs. RISs have been utilized to realize new wireless transceiver
architectures in which may bring a paradigm-shift on the transceiver design and reduce
the hardware cost of future wireless communication systems. Moreover, RISs can
artificially shape the electromagnetic wave propagation environment.
In current wireless communication systems, the wireless environment, i.e., the
physical objects that influence the propagation of the electromagnetic waves, is
uncontrollable. During the research and design processes of wireless communication
systems, one can only design transceivers, signal processing algorithms, and
transmission protocols to adapt to the radio environment.

BRECW, 2022 Page 17 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Proposition 4. Assume the reflection coefficients of all the unit cells share different
amplitude and phase shift. The RIS aims to direct the signal in a different way. The
above analysis assumes that all the unit cells share the different reflection coefficient. In
the following, we introduce a design method for the phase shifts of the unit cells, which
enables the RIS to broadcast the reflected signal to the desired direction through
intelligent reflection.
Proposition 5. Assume that the reflection coefficients of all the unit cells share the same
amplitude value A and different phase shift φn,m, and the RIS aims to broadcast the
reflected signal to the desired direction (θdes, ϕdes) (i.e., the desired center direction of
Ωt) in the near field broadcasting case, an effective design method for the phase shift
φn,m .
3.4 RIS-assisted Beamforming
Beam forming is based on single input multi output method which means one
transmitter sends data to many receivers Γ n,m = φn,m = 0. The large ban4d and X-band
antennas are employed in the simulation. When d 1 and d2 are both greater than 71.4 m,
the far field condition of RIS1 is fulfilled. The small RIS and C-band antennas are also
employed in the simulation under the same conditions. When d 1 and d2 are both larger
than 1 m, the far field condition of the small RIS is fulfilled the simulated received
signal power distribution in various distance.

3.5 System model

Consider a wireless system consisting of a RIS-assisted legitimate transmitter-


receiver pair and an eavesdropper, as shown. The eavesdropper intends to wiretap the
legitimate transmissions while the RIS is deployed as part of the legitimate system to
combat eavesdropping. The legitimate transmitter, receiver, and eavesdropper are
denoted by S, D, and E, respectively. The legitimate transmitter has one single antenna
while the eavesdropper has NE antennas. The legitimate receiver has NR receive
antennas and NT transmit antennas, enabling full-duplex operations to emit an active
jamming signal to confuse the eavesdropper. Meanwhile, the RIS, denoted by I,
incorporates N reflecting elements whose phase shift can be flexibly adjusted to
enhance security.

Denote hSD ∈ CNR× , hSE ∈ CNE×1, his ∈ CN×1, HID ∈ CNR×N, HIE ∈
CNE×N, HDE ∈ CNE×NT , and HDI ∈ CN×NT as the S-D, S-E, S-I, I-D, I-E, D-E,

BRECW, 2022 Page 18 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

and D-I
channels, respectively. Also, the self-interference channel at the legitimate receiver is
HDD ∈ CNR×NT with a suppression ratio of ρ. For the RIS, let θ = [θ1,θ2,··· ,θN]T

BRECW, 2022 Page 19 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

denote the phase shifts at the reflecting elements, and we then have a N × N diagonal

reflection-coefficient matrix given by Θ = diag (ϑ) with

For the wireless system noted above, the received signals at the legitimate receiver and
eavesdropper.

Respectively, where x is the legitimate signal to be protected with a transmit power


PS, while z is the emitted jamming signal from the full-duplex receiver, i.e., D, with z ∼
CN(0,1) and w is the NT-dimensional jamming beamformer from D with and Tr (W) ≤
PDmax, where PDmax is the maximum allowable jamming power. Also denote the
background Gaussian noise at D and E, respectively, which are assumed of an identical
at D and E, respectively. Then, the secrecy rate is obtained as

C = [log(1 + γD) – log(1 + γE)]

3.6 RIS receiver coordinate security

3.6.1 Problem Formulation

In this subsection, we present the problem formulation to enhance the wireless security.
Then, the problem is solved within a BCD framework such that the receive
beamforming, passive reflection, and active jamming are jointly optimized.

For the considered system, we assume that the RIS belongs to the legitimate
system, with full coordination among the transmitter, receiver, and reflector. Also, the
legitimate side has full knowledge of the channel state information, including the
reflection links and wiretap links.

In contrast, the eavesdropper is passive and thus has no information regarding


the reflection links. As such, the eavesdropper can only determine its receive
beamforming based on the wiretap channel information.

Meanwhile, the legitimate receiver needs to determine the receive beamforming,


jamming, as well as the phase shifts of the RIS for security enhancement. Therefore, the
problem is formulated as

Max C = log(1 + γD) − log(1 + γE)

BRECW, 2022 Page 20 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

3.6.2 Receive Beamforming

We first consider the receiving beamforming optimization with fixed jamming and
reflection. As we can see, the receive beam former only concerns the SINR at the
legitimate receiver in the objective function.

3.6.3 Active Jamming

Then we consider the jamming strategy with fixed receive beamforming and
reflection. When launching jamming attacks, the jamming signal not only degrades the
eavesdropper but also affects the legitimate reception. Jamming is performed to confuse
the eavesdropper. Jamming along with passive beam forming provides security to the
data while transmitting from transmitter to the receiver. Active jamming includes using
of high frequency components like amplifiers or radios to confuse the eavesdropper. By
providing high frequency signals the third party may confuse and our data can be
protected.

3.6.4 Passive Beamforming

Finally, we investigate the passive beamforming at the RIS while fixing the receive
beamforming and jamming. Generally, by introducing the RIS, there incur
corresponding counterparts for the legitimate link, wiretap link, and jamming link,
which significantly changes the propagation and thus has the potential to enhance
security.

3.7 Algorithm

Algorithm: BCD for secure communications

Input: Network topology, channel parameters, and antenna configurations at the


nodes.

1. Initialization: t ← 0, set wD(t), w(t), and ϑ(t) ;

2. repeat

3. t ← t + 1;

4. Update wD(t) according to (10) with w(t−1), and ϑ(t−1);

BRECW, 2022 Page 21 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

5. Update w(t) by solving the problem with (t) and ϑ(t-1);

BRECW, 2022 Page 22 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

6. Update ϑ(t) by solving the problem with wD(t) and w(t);

7. Output: Optimal receive beamforming, active jamming, and passive beamforming

We have in the preceding discussions investigated the receive beamforming,


jamming, and reflection, respectively. Now we can incorporate them under a BCD
framework for the optimization in an alternative manner to achieve coordinated secure
transmissions. The overall algorithm is summarized as Algorithm where is the
predefined threshold to claim the convergence. Evidently, we can see that the objective
function is upper-bounded.

3.8 System topology

Fig. 3.4 System topology.

In the above figure we can observe the 3 dimension structure of transmitter,


receiver, RIS and eavesdropper. Transmitter and receiver are along the x-axis. RIS is
along x-z coordinates, whereas eavesdropper is along x-y coordinates. An information is
transmitting from transmitter to the receiver if any third party involves that information
may not be secure.

To confuse the eavesdropper we use the RIS which performs passive beam
forming and active jamming. By the confusion of eavesdropper the information reaches
to the receiver directly.

BRECW, 2022 Page 23 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

We consider that the legitimate transmitter, receiver, and eavesdropper are


located on the ground with coordinates (0,0), and (200,300), respectively. The receiver
has 4 receive antennas and 2 transmit antennas, and the eavesdropper has 4 antennas.
The RIS is deployed with an altitude of 100 m and horizontal coordinates of (200,−100).
The system topology is demonstrated.

The large-scale fading at a reference distance of 1 m is −20 dB and the


background noise power is −140 dBW. The channels on the ground suffer a path-loss
exponent of 4 with Rayleigh fading while the channels related to the RIS experience a
path-loss exponent of 2.5 with Rician fading as the RIS is deployed high above the
ground.

The legitimate transmit power is 1 W and there are 50 elements in the RIS. The
jamming power is 1 W with a self interference ratio of −100 dB. The threshold
determining the convergence is 1×10−4. For the initialization of the algorithm, we null
the jamming power and employ an identity matrix as the reflection-coefficient matrix.
Then, we can determine the receive beamforming according to (10) with the initialized
jamming and phase shift and conduct the algorithm.

By the 3-D coordinate we can observe the location of eavesdropper, transmitter,


receiver and the RIS. RIS is a meta surface programmable device which consists of
passive elements which are programmable. RIS plays a major role in providing security
to the data. RIS is an upcoming and promising technology in future mainly in the
wireless communication domain. It consists of small elements which are programmable
and they are arranged in the mth and nth rows and columns. By the decomposition of
eigen vectors and eigen values this RIS assisted receiver works. By providing high
frequency signals using amplifiers or radio frequency this RIS receiver confuses the
eavesdropper. Thus provides security to our data.

3.9 Results
3.9.1 Security performance with respect to iterations
Security is important for our data during transmission. Mainly in the wireless
transmissions security plays a major role. To protect our information from we use the
RIS which confuses the eavesdropper and helps in providing the data to be transmitted
only to the receiver. As there are many advantages by using this RIS we are

BRECW, 2022 Page 24 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

implemented thus in project. It is a programmable device which is used to control the


eavesdropper by using

BRECW, 2022 Page 25 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

BCD framework.

Fig 3.5 Security Vs iterations

The above result is security rate vs iterations. We can observe the performance
of security with the iterations. As we increase the number of iterations of security rate is
increasing. Security is important to our data during transmission from transmitter to the
receiver. Figure confirms the convergence of the proposed algorithm.

The demonstration here corresponds to four different initial states. In Case-1 and
Case-2, we null the jamming power while use an identical jamming power allocation
summing up to the maximum for Case-3 and Case-4. Moreover, in Case-1 and Case-3,
we use identity matrix as the reflection-coefficient matrix, while in Case-2 and Case-4
we use random diagonal elements with unit modulus. Suggesting that the iterations
generate a monotonically increasing (at least non-decreasing) sequence due to the
updates of receive beamforming, jamming, and reflection through the optimizations
detailed before. Therefore, the proposed algorithm is guaranteed to converge to a local
optimum of the objective function.

Moreover, we briefly analyze the computation complexity of the proposed


algorithm. In the algorithm, the receive beamforming is of a complexity of O due to the
matrix inversion. (From the perspective of system of linear equations, it is of the same
complexity for the worst case.) For the active jamming that requires an iterative process
for semidefinite programming, the semidefinite programming is of a complexity of O
and we assume there are LA times of iteration, then the incurred complexity is O.
Similarly,
BRECW, 2022 Page 26 of 50
Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

solving for the passive beamforming requires a complexity of O , where LP is the


number of iterations. Finally, we assume the outer iterations among the receive
beamforming, jamming, and reflection are of L times, then the overall complexity is O .

As we can see, different initial states induce different initial secrecy rate.
However, as updated through the iterations, different initial states finally converge to
almost the same local optimum, where the maximum different is about 1‰.

3.9.2 Security performance with respect to number of elements and jamming


power

Fig 3.6 Security vs jamming power and number of elements

The above figure is number of elements and jamming power vs security rate. It
shows the achieved secrecy rate with respect to the number of elements in the RIS and
jamming power, indicating the combined effect of active jamming and passive
beamforming upon security performance. As expected, the secrecy rate increases with
more RIS elements and higher jamming power.

In particular, we can see that the secrecy rate increases almost linearly with the
number of RIS elements. In contrast, the benefit for security brought by active jamming
is quite evident when the jamming power is low, and the improvement in secrecy rate
becomes plateaued when the jamming power is sufficiently large. This is because that
the RIS always act as a contributing factor to affect the radio environment towards
improved secrecy with properly adjusted phase shifts. While in contrast, the jamming
attack also

BRECW, 2022 Page 27 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

induces self-interference at the legitimate receiver. Thus, the overall effect of jamming to
improve security becomes limited.

3.10 Conclusion
In this correspondence, we investigate the RIS-assisted secure transmissions for
SIMO transmissions, where the multi antenna receiver launches full-duplex jamming
attacks to confuse the eavesdropper. We jointly consider the receive beamforming,
active jamming, and passive beamforming of the RIS towards the optimal security
performance, and propose the algorithm under a BCD framework. The simulation
indicates that the combined effect of jamming and reflection can significantly enhance
the wireless security. Moreover, due to the RIS’s nature to affect the wireless
transmissions by changing the ratio environment, it induces stable security improvement
regardless of the jamming attacks.

BRECW, 2022 Page 28 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Chapter 4

Software Requirements

4.1 Introduction

MATLAB is a proprietary multi-paradigm programming language and numeric computing


environment developed by Mathworks. MATLAB allows matrix manipulations, plotting
of functions and data, implementations of algorithms, creation of user interfaces, and
interfacing with programs written in other languages.

MATLAB is a programming platform designed specifically for engineers and


scientists to analyze and design systems and products that transform our world. The heart
of MATLAB is the MATLAB language, a matrix-based language allowing the most
natural expression of computational mathematics.

4.2 Usage of MATLAB

MATLAB is the tool used by Universities to understand the engineering concepts and it is
good at it. However the industries don’t use Matlab and as a engineer you will forget the
Matlab skills. Also Matlab is very expensive when it comes to commercial license.

It combines computation, visualization and programming to create an easy to use


environment to solve many technical computing problems. MATLAB consists of some
amazing features making it the easiest and most productive programming environment for
engineers and scientists.

4.3 License Management

 R2015b network licenses require a license server running FLEXnet v11.13, which
is provided by the Mathworks installer. A license server that is enabling multiple
releases of MATLAB must use the version of FLEXnet shipped with the latest
release of MATLAB enabled by that license server.

 Starting with R2016a, the License Manager is not available for 32-bit Windows.

BRECW, 2022 Page 29 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

4.4 System Requirements for R 2015b

32-bit and 64-bit MATLAB and Simulink Product Families

Operating Processors Disk Space RAM Graphics


Systems

Windows 10 Any intel or 1GB for 2 GB; with No specific


AMIDx86 MATLAB simulink graphics card
processor only, 3-4 GB coder, 4 GB is is required.
supporting for a typical recommended Hardware
SSE2 instllation accelerated
instruction set grsphics card
supoorting
OpenGI.33
with 1GB
GPU memory

Windows 8.1

Windows 7
Service Pack 1

Windows
Server 2012

Windows
Server 2012
R2

Windows
Server 2008
R2 Service
Pack1

Windows
Server 2008

BRECW, 2022 Page 30 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Table 4.1 System Requirements of R2015b

BRECW, 2022 Page 31 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

4.5 Advantages of R2015b

 Implement and test your algorithms easily.

 Develop the computational codes easily.

 We can debug easily.

 We can use a large database of built in algorithms.

 Process still images and create simulation videos easily.

 Symbolic Computation can be easily done.

 We can call external libraries.

 The program can be used as a scratchpad to evaluate expressions typed at the


command line, or it can be used to execute large prewritten programs.

 Applications may be written and changed with the built-in integrated development
environment and debugged with the MATLAB debugger.

4.6 Conclusion

In our project we are using MATLAB R2015b which provides required algorithms,
expressions and libraries.

So, In this chapter we’ll discuss about this software we’ll discuss about the
advantages, history and system requirements of MATLAB R2015b.

BRECW, 2022 Page 32 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Chapter 5

Implementation

5.1 Introduction

In this Chapter we will get to know about the algorithm used in the project and the
complete circuit diagram used for this project.

5.2 System Model

Fig 5.1 System Model

BRECW, 2022 Page 33 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

5.3 Impelmentation using RIS receiver

Recently, the reconfigurable intelligent surface (RIS) has emerged as a promising


technology for next-generation wireless communications. A RIS is a software controlled
meta surface with a large number of nearly-passive components that can be reconfigured
to make the wireless environment programmable. The RIS features low-cost and low-
power operation while provides an effective way to alter the electromagnetic propoerties
(e.g.; phase shift) of the incident signal so as to conventional encryption-based security,
physical layer security has received wide attention for its keyless operation and potential
for perfect secrecy. Generally, physical layer security os achieved when the wiretap
channel is a degraded version of the legitimate channel. Correspondingly, the conventional
approaches are devoted to enhancing the legitimate reception or downgrading the
eavesdropping while adapting to the radio environment. With the RIS-enabled intelligent
ratio environment, we can artifically intervene in the signal propogation so as to make the
environment more favourable for secure transmissions. In this respect, by the joint
optimization of transmission and radio environment, the RIS has opened up a new
dimension towards new designs for wireless security.

Due to the sugnificant potential of RIS, it has raised reasearch interests in various
aspects of wireless communications, includingthe RIS-channel modeling, transmission
precoding, energy efficiency, practical discrete phase shift designs, and so forth. In
addition to rich literature in RIS-assisted communications, the RIS-enhanced wireless
security has also attracted particular interest. In, the authors investigate the secure
multiple-input single-output communications with artificial noise and RIS. The security
enhancement for multiple-input multiple-output communications in investigated in. In, the
authors particularly investigate the RIS-assisted security without the channel state
information on eavsdropper. In, the authors consider the security issue with a RIS under
different channel models and analyze the performance in terms of the expected secrecy rae
In, the authors address the partial channel state information issue and intend to optimize
the robust security performance for RIS communications.

For RIS, as an emerging wireless technology, most existing research efforts on


RIS-enhanced security has been devoted to the startegy design at the transmitter. In
contrast, the problem at the receiver’s side is , however, rarely addressed. In practice, the
security enchancement in terms of receptionusually corresponds to the uplink
transmissions, where the transmitter is typically the less-powerful user equipment and thus
BRECW, 2022 Page 34 of 50
Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

the security can be more endangered. Towards this issue in correspondance, we address
the RIS-assisted security for single-input and multiple-output (SIMO) transmissions. The
multi-antenna receiver performs full-duplex operations and launches an active jamming
single to downgrade to eavesdreopping. Therefore, the reveiver coordinates the jamming
attacks and passive beanforming. The problem is solved under a block coordinate descent
(BCD) framework, and simulation results are provided to verify the effectiveness of our
proposal.

Fig 5.2 RIS receiver

Consider a wireless system consisting of a RIS- assisted legitimate transmitter-


receiver pair and an eavesdropper, as shown. The eavesdropper intends to wiretap the
legitimate transmissions while the RIS is deployed as part of the legitimate system to
combat eavesdropping. The legitimate transmitter, receiver, and eavesdropper are denoted
by S, D and E respectively. The legitimate transmitter has one single antenna while the
eavesdropper has NE antennas. The legitimate receiver has N R receive antennas and NT
transmit antennas, enabling full-duplex operstions to emit an active jamming signal to
confuse the eavesdropper, Meanwhile the RIS denoted by I, incorporates N reflecting
elements whose phase shift can be flexibly adjusted to enhance security.

BRECW, 2022 Page 35 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

5.4 Algorithm : Block Co-ordinate Descent method

Block cordinate descent (BCD), also known as nonlinear Gauss- Seidel, is a simple
iterative algorithm for non-convex optimization that sequentially minimizes the objective
fun ction in each block cordinate while the other cordinates are held fixed. We propose a
version of BCD that, for block multi-convex and smooth objective functions under
constratints, is guaranteed to converge to the stationary points with worst-case rate of
convergence of O((log n)^2/n) for n iterations, and a bound of O(E^-1(log(E^-1)^2) for
the number of iterations to achieve an an E- approximate stationary point. Furthermore,
we show that these results continue to hold even when the convex sub-problems are in
exactly solved if the optimality gaps are uniformly summable aginst initialization. A key
idea is to restrict the parameter search within a diminishing radius to promote stability of
iterates. As an application, we provide alternating least squares algorithm with
diminishing radius to promote stability of iterates.
In this work, we introduce a new modification of the standard BCD (2) and
achieve the following results:

(1) Global convergence to stationary points for block multi-convex and


differentiable objectives un- der constraints;
(2) Worst-case rate of convergence to stationary points of order (log n)2/n;
(3) Worst-case bound of O(ε−1(log ε−1)2) on the number of iterations to
achieve ε-approximate sta- tionary points;
(4) Robustness of the aformentioned results under inexact execution of the
algorithm.
To our best knowledge, we believe our work provides the first result on the
global rate of conver- gence and iteration complexity of BCD for the general
block multi-convex case, especially with the additional robustness result. We do
not impose any additional assumptions such as the Kurdyka- Łojasiewicz
property. For gradient descent methods with unconstrained nonconvex objective,
it is known that such rate of convergence cannot be faster than O(1/n) [CGT10],
so our rate bound matches the optimal result up to a (log n)2 factor. We
experimentally validate our results with both synthetic and real-world data and
demonstrate that using auxiliary search radius restriction can in fact improve the
rate of convergence over the standard BCD.

BRECW, 2022 Page 36 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

5.5 Description about RIS reciver

With the given scope for new use cases and the demanding needs of future 6th generation
(6G) wireless networks, the development of wireless communications looks exciting. The
propagation medium has been viewed as a randomly behaving entity between the
transmitter and the receiver since traditional wireless technology, degrading the quality
of the received signal due to the unpredictable interactions of the broadcast radio waves
with the surrounding objects. On the other hand, network operators could now manipulate
electromagnetic radiation to remove the negative impacts of natural wireless propagation
due to the recent arrival of reconfigurable intelligent surfaces (RIS) in wireless
communications. According to recent findings, the RIS mechanism benefits nonorthogonal
multiple access (NOMA), which can effectively deliver e ffective transmissions. For
simple design, of RIS-NOMA system, fixed power allocation scheme for NOMA is
required. The main system performance metric, i.e., outage probability, needs to be
considered to look at the efficiency and capability of transmission mode relying on RIS
and NOMA schemes, motivated by the potential of these developing technologies. As
major performance metrics, we derive analytical representations of outage probability, and
throughput and an accurate approximation is obtained for the outage probability.
Numerical results are conducted to validate the exactness of the theoretical analysis. It is
found that increasing the higher number of reflecting elements in the RIS can significantly
boost the outage probability performance, and the scenario with only the RIS link is also
beneficial. In addition, it is desirable to deploy the RIS-NOMA since it is indicated that
better performance compared with the traditional multiple access technique.

Due to high demands in terms of system capacity and spec- trum efficiency, the
traditional orthogonal multiple access (OMA) has been unable to meet the user needs to be
associ- ated with the rapid growth of Internet of Things (IoT) and mobile communications.
To meet the heavy demand for mobile services, nonorthogonal multiple access (NOMA) is
researched in recent years with promising applications . In some scenarios, NOMA
benefits to device-to-device communications and cognitive radio- (CR-) aided NOMA and
these are considered as potential key technologies for the fifth-generation mobile
communica- tions (5G). The authors in deployed the relaying scheme for the secondary
network of the considered CR-NOMA, and the relay can energy harvesting (EH) from the
second- ary transmitter to serve signal forwarding to distant second- ary users. They
studied the complex model of EH-assisted CR-NOMA in terms of outage behavior and

BRECW, 2022 Page 37 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

throughput performance when has imperfect successive interference cancellation (SIC).


Reference. presented relay-aided CR-NOMA networks to improve the performance of far
users by enabling partial relay selection architecture. They explored system performance
in terms of full-duplex (FD) and half-duplex (HD) relays for both uplink and downlink
communications.

Recently, due to its high-energy efficiency, reconfigur- able intelligent surface (RIS)
technique is recognized as the next-generation relay technique, also namely relay 2.0 .The
RIS elements can independently shift the signal phase and absorbing the signal energy. The
reflected signals benefit to wireless transmission due to less energy required . In the authors
demonstrated an interesting RIS architecture which includes any number of passive
reflecting elements, a simple controller for their adjustable configuration, and a single radio
frequency (RF) chain for baseband measurements.

By assuming sparse wireless chan- nels in the beam space domain, they studied an
alternating optimization scheme for explicit estimation of the channel gains at the RIS
elements attached to the single RF chain . The authors in explored RIS by combining the
functions of phase shift and radiation together on an electro- magnetic surface. As such,
positive intrinsic-negative (PIN) diodes are employed to realize 2-bit phase shifting for
beam forming. Thanks to providing RIS equipped 256 two-bit ele- ments, this radical
design is recognized as first wireless com- munication prototype in the world. The
developed prototype includes main components such as modular hardware and flexible
software. In this prototype, they used the hosts to set parameter and exchange data.
Together with this, they employed the universal software radio peripherals (USRPs) to
process baseband and radio frequency (RF) signals, as well as implemented the RIS to
transmit and receive signals. Reference studied a mmWave system relying on several RIS
arrays which implemented low-precision analog-to-digital converters (ADCs). To assist
multiple- input multiple-output (MIMO) transmission, these RIS arrays form a synthetic
channel with increased spatial diver- sity and power gain by enabling the linear spatial
processing. In this section, we analyze the achievable performance of the proposed RIS-
NOMA system in some scenarios, and bench- mark scheme is also mentioned in Figure. It
should be pointed out that as there are different decoding conditions for users NU and FU,
we should compare performance gap among NU and FU, so that the main parameters are
decided to guarantee the fairness. For simplifying the system perfor- mance analysis on
performance gap among two users, this paper just focuses on main performance metric,
BRECW, 2022 Page 38 of 50
Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

i.e., outage probability. Of course, the other system performance metrics of such networks
will be

further studied but it needs change to other method of computation. However, this study
exhibits explicit performance metric and more accuracy for- mulas if we compare them
with the conventional method which is also used to present the outage performance,
namely, the central limit theorem (CLT), in which variables A and B are approximated as a
Gaussian random variable with fixed mean values and variances.

5.6 Conclusion:
In this chapter we discussed about the algorithm, implementation and description of the
circuit diagram.

BRECW, 2022 Page 39 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Chapter 6

Advantages and Applications

6.1 Introduction

In this chapter we will come to know about the advanatges and applications of Secured
wireless transmissions using RIS receiver.

6.2 Advanatges

 Wireless networks are cheaper to install and maintain.

 Data is transmitted faster and at ahigh speed.

 Reduced maintainance and installation cost compared to other form of networks.

 Wireless network can be accessed from anywhere, anytime.

 Wireless security is the prevention of unauthorized users from accessing your


wireless network and stealing the data using your wi-fi network.

 To be precise, wireless security ensures protection to a Wi-fi network from


unauthorized access.

 There is more Stability and Reliability.

 It is more secured compared to wired network.

 It has best accessibility.

 There will be no interference.

 Data encryption and user authentication are two of the basic security measures.
Data encryption protects the vulnerable wireless link between client devices and
access points by encrypting all data in the transmission.

 User authentication protects against unauthorized access to the wireless network.

 It prevents damage to computers or data using wireless networks.

BRECW, 2022 Page 40 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

6.3 Applications

1) Data encryption and Decryption

Encryption is the process of translating plain text data into something that appears to be
random and meaningless (ciphertext).

Decryption is the process of converting ciphertext back to plain text. To encrypt


more than a small amount of data symmetric encryption is used.

2) Data Privacy and Secrecy

Data privacy, also called information privacy, is the aspect of information technology that
deals with the ability an organization or individual has to determine what data in a
computer system can be shared with the third parties.

3) Hacking privacy

Just like any thief, a hacker will choose the most vulnerable targets they can find. But
instead of using lock picks to steal from your home or business, they use software to steal
your personal data. Hackers will often try to glean information such as credit card numbers
on bank accunt information.

4) Active Jamming

Applications of active jamming are blocking, snooping attemots, protecting private and
confidential information, limiting the use of mobile phone and radio devices.

5) Passive Beamforming

Applications of Passive beamforming are radar, sonar, seismology, wireless


communication, radio astronomy, acoustics and bio medicine.

6.4 Conclusion

In this Chapter we discussed about advantages and applications of Secured wireless


transmission using RIS receiver.

BRECW, 2022 Page 41 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Chapter 7

Results

7.1 Introduction

In this chapter we will discuss about all the outputs from Phase I and Phase 2.

7.2 Phase I Outputs

Fig 7.1 Output 1 Fig7.2 Output2

Fig 7.3 Ouput 3 Fig7.4 Output4

BRECW, 2022 Page 42 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Fig 7.5 Output5 Fig 7.6 Output 6

Fig 7.7 Output 7 Fig 7.8 Ouput 8

BRECW, 2022 Page 43 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Fig 7.9 Output 9

Fig7. 10 Output 10 Fig7.11 Output 11

Fig 7.12 Output 12 Fig 7.13 Output 13

BRECW, 2022 Page 44 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

7.3 Phase II Outputs

Fig 7.14 Output1 Fig 7.15 Output 2

Fig 7.16 Output 3 Fig 7.17 Ouput 4

Fig 7.18 Output 5 Fig 7.19 output 6

BRECW, 2022 Page 45 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Fig 7.20 Output 7 Fig 7.21 Output 8

Fig 7.22 Ouput 9 Fig 7.23 Output 10

Fig 7.24 Output 11 Fig 7.25 Output 12

BRECW, 2022 Page 46 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Fig 7.26 Ouput 13 Fig 7.27Output 14

Fig 7.28 Output 15 Fig7.29 Output 16

7.4 Conclusion

In this Chapter we discussed about all the outputs of Phase I and II.

BRECW, 2022 Page 47 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

Chapter 8
Conclusion and Future Scope
8.1 Introduction
In this chapter we are concluding the documentation by mentioning it’s future scope.

8.2 Future Scope


No doubt wireless network is an amazing wireless technology which has totally changes th
means of communication. There is no business, industry, project which can be progressed
without the needs of wireless networks. Now a wireless network has become the significant
option of any business because of it’s salient features like speed, security, mobility and Wi-fi
hotsopt. Voice application like VOIP (Voice over internet protocol) can be only possible
because the essential point of any network, Now wireles network has become the essential
point of any network to make their customer more satisfied.
Wireless network a magic word which can change your status very prompltly that
can get access to internet very speedily, and make possible conversation more and more than
two users such as text messages, downloading and uploading of pictures, hear online radio,
music and video downloading with a very high speed. Wireless network offering hotspot
therefore now the usage of internet at aiport, business companies is not an issue now.
With the development of science the profession of medicine becomes more and more
complex and sophisticated. Therfore at this time we need a technology which can serve and
solve all big complication in hurrry for the benefit of patient and progress of science and for
all above purposes and the solutions are Bluetooth, wireless network are the best
applications of medical science are remote monitoring of patienr, biometric data of wireless
network, and dispensers applications.
Now the checking of certain body functions, print reports, and quick result of all
things possible only with wireless technology. Now doesn’t matter where you live because if
you are suffered with a big illness and cure it. All type of measuring equpments ,
electrocardiograms and others which are used to get complete detail body functional are
allowing the doctor to measure and get convenient reprt via wireless technologies. Same as
in dispenser’s applications any person deluvers medicine if got any problem or confusion in
patient the he will immediately contact to related doctor.

BRECW, 2022 Page 48 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

8.3 Conclusion
In this paper, secure transmission of confidential informa- tion with an artificial jamming signal
to prevent eavesdropping has been considered. By deriving the distribution of SINRs of a
legitimate MS and eavesdroppers, the lower bound of secrecy rate has been derived with some
approximation. Based on the approximated ergodic secrecy rate, the optimal power splitting
factor and the limiting secrecy rate with massive number of antennas are examined. To
evaluate the secrecy rate under time-varying channels, the secrecy rate loss due to channel
variation has been evaluated. To obtain more insight from the analytical results, the upper
bound of the secrecy rate loss is analyzed under a high SINR assumption. The rate loss in
the high SINR region is affected only by a fading coefficient, channel delay, and, SNR of
the legitimate MS. That is, other parameters, such as the power splitting factor and the
numbers of transmit antennas and eavesdroppers, have no influence on the secrecy rate loss. In
a low SINR case, however, the secrecy rate loss depends on a power splitting factor and the
numbers of transmit antennas as well. These observations are verified with numerical
simulations.

BRECW, 2022 Page 49 of 50


Major Project Report Secured Wireless Transmission with RIS receiver:
Passive beamforming and Active jamming

References
[1]. H. Yu and W. Khalid, “Secure communication with beamforming and jamming in
time-varying channels,” in Proc. Eighth International Conference on Ubiquitous and
Future Networks (ICUFN), pp. 218–221, Jul. 2016.
[2]. Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: technical
challenges, recent advances, and future trends,” Proceedings of the IEEE, vol. 104, no. 9,
pp. 1727–1765, Sep. 2016.
[3]. A. Wyner, “The wire-tap channel,” The Bell Sys. Tech. J., vol. 54, no. 8, pp. 1355 –
1387, Oct. 1975.
[4]. A. Khisti and G. Wornell, “Secure transmission with multiple antennas I: The
MISOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, no. 7,
pp. 3088 – 3104, Jul. 2010.
[5]. R. Liu and H. Poor, “Secrecy capacity region of a mulitple anntena Gaussian broadcast
channel with confidential message,” IEEE Trans- actions on Information Theory, vol. 55,
no. 3, pp. 1235 – 1249, Mar. 2009.
[6]. P. K. Gopala, L. Lai, and H. E. Gamal, “On the secrecy capacity of fading
channels,” IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687–4698,
Oct. 2008.
[7]. Y. Liang, H. V. Poor, and S. Shamai, “Secure communication over fading channels,”
IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2470–2492, Jun. 2008.

BRECW, 2022 Page 50 of 50

You might also like