You are on page 1of 5

1300 IEEE SIGNAL PROCESSING LETTERS, VOL.

27, 2020

Intelligent Reflecting Surfaces Assisted Secure


Transmission Without Eavesdropper’s CSI
Hui-Ming Wang , Senior Member, IEEE, Jiale Bai , and Limeng Dong

Abstract—In this letter, improving the security of an intelli- decreased and hence a higher secrecy rate can be achieved.
gent reflecting surface (IRS) assisted multiple-input single-output Several algorithms were established to maximize the secrecy
(MISO) communication system is studied. Different from the ideal rates of IRS-assisted MISO transmission, including single user
assumption in existing literatures that full eavesdropper’s (Eve’s)
channel state information (CSI) is available, we consider a more case [2]–[5] and multi-user downlink case [6]. In [7], the secrecy
practical scenario without Eve’s CSI. To enhance the security of rate of an IRS-assisted MIMO wiretap channel was studied for
this system given a total transmit power at transmitter (Alice), we the first time. All these studies indicate that by jointly optimizing
propose a joint beamforming and jamming approach, in which the active transmit beamforming at the transmitter (Alice) and
a minimum transmit power is firstly optimized at Alice so as to passive reflect beamforming at IRS, Bob’s secrecy performance
meet the quality of service (QoS) at legitimate user (Bob), and then
artificial noise (AN) is emitted to jam the eavesdropper by using the can be greatly enhanced.
residual power at Alice. Two efficient algorithms exploiting oblique However, all these aforementioned works are simply based on
manifold (OM) and minorization-maximization (MM) algorithms, an ideal assumption that Eve’s channel state information (CSI)
respectively, are developed for solving the resulting non-convex op- is perfectly known, which is not practical since Eve is usually
timization problem. Simulation results have been provided to vali- hidden and passive who does not actively exchange CSI with
date the performance and convergence of the proposed algorithms.
Alice. Therefore, all the proposed secrecy schemes in [2]–[7]
Index Terms—Physical layer security, intelligent reflecting are invalid in the practical case. Motivated by this, in this
surface, secrecy rate, oblique manifold. letter, we investigate IRS-assisted secrecy transmission without
eavesdropper’s CSI. The main innovations and contributions are
I. INTRODUCTION in three aspects:
1) We propose a joint beamforming and jamming scheme to
NTELLIGENT reflecting surface (IRS) is proposed as a
I promising energy-efficient and cost-effective technology for
reconfiguring wireless propagation environment via software-
enhance security without eavesdropper’s CSI, where we
minimize the power of confidential signal to meet the qual-
ity of service (QoS) at Bob and allocate all residual power
controlled reflection. Specifically, IRS is a planar surface com- to transmit artificial noise (AN) to jam the eavesdropper.
prising a large number of low-cost passive reflecting elements, 2) We propose an oblique manifold (OM) algorithm to solve
each of which is able to change the phase for the incident signal the non-convex optimization problem. A minorization-
independently, thereby collaboratively achieving passive reflect maximization (MM) algorithm is also investigated.
beamforming. IRS has been recognized as a strong candidate 3) Compared to the full CSI case, security could still be
for the future wireless network [1]. guaranteed by increasing of QoS threshold at Bob as
Motivated by these advantages, IRS is recently combined with well as the number of reflecting elements at IRS. The
physical layer security (PLS) to deal with secure communica- performance of OM algorithm is better than of the MM
tion. By adjusting phase shifts coefficients at IRS, the signals algorithm.
reflected by IRS can add constructively with those from direct Notations: For a vector a = [a1 , . . . , an ], ||a|| denotes the
path to enhance the desired signal power at the legitimate user Euclidian norm, diag(a) denotes a diagonal matrix whose entries
(Bob), and destructively with those from direct path to reduce are a1 , · · ·, an , and unt(a) = [ |aa11 | , |aa22 | , . . . , |aann | ]T ; λmax (A)
the signal power at the eavesdropper (Eve). As a consequence,
and tr(A) denote maximum eigenvalue and trace of matrix A,
Bob’s signal-to-noise ratio (SNR) is increased while Eve’s is
respectively; arg(a) and {a} denotes phase and real part of
a; E{·} denotes statistical expectation; ◦ denotes Hadamard
Manuscript received April 22, 2020; revised May 30, 2020; accepted July 8,
2020. Date of publication July 22, 2020; date of current version August 6, 2020.
product between two matrices.
This work was supported in part by the National Natural Science Foundation
of China under Grant 61941118 and Grant 61941105. The associate editor II. SYSTEM MODEL
coordinating the review of this manuscript and approving it for publication was
Prof. Shiwen He. (Corresponding author: Hui-Ming Wang.) Consider an IRS-assisted communication system, which con-
The authors are with the School of Information and Communication Engi- sists of Alice, Bob, Eve, and an IRS shown in Fig. 1. We assume
neering and the Ministry of Education Key Laboratory for Intelligent Networks that Alice is equipped with Nt antennas, both Bob and Eve are
and Network Security, Xi’an Jiaotong University, Xi’an 710049, China (e-mail:
dlm_nwpu@hotmail.com). equipped with a single antenna, and the IRS has L reflecting
Digital Object Identifier 10.1109/LSP.2020.3010170 elements. We consider a quasi-static flat-fading channel model.

1070-9908 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: Xian Jiaotong University. Downloaded on November 08,2020 at 14:30:38 UTC from IEEE Xplore. Restrictions apply.
WANG et al.: INTELLIGENT REFLECTING SURFACES ASSISTED SECURE TRANSMISSION 1301

will increase the secrecy rate as much as possible, even without


knowing Eve’s CSI.
Based on the above scheme, our objective is to minimize PT =
||w||2 by optimizing w and Q, subject to QoS constraints γ at
Bob, as expressed by P 1:
  2
| hH IB QHAI + hAB w|
H
P 1 : min PT , s.t. ≥ γ, (4)
w,Q σb 2
We have to note that, Q is a diagonal matrix with each element
Fig. 1. An IRS-assisted MISO communication system. satisfying the unit modulus constraint |qi | = 1 since IRS only
changes the phase of the signal. The non-convex constraint (4)
then makes P 1 a non-convex optimization. However, P 1 can
Without eavesdropper’s CSI, we propose a joint beamforming
be equivalently transformed to a single variable optimization
and jamming scheme where Alice sends both information and
problem as follows. Firstly, it is obvious that the optimal solution
AN signals concurrently. The received signals yB , yE at Bob
must make (4) hold with equality. Secondly, for any given Q, it is
and Eve can be expressed as
known that only maximum-ratio transmission (MRT) is the opti-
yB = (hH √
IB QHAI + hAB )(wx + na ) + ξB
H hH
(1) mal w∗H , i.e., w∗H = PT ||hBB || . Therefore, by substituting w∗
yE = (hH into problem P 1, one obtains that the optimal minimum transmit
IE QHAI + hAE )(wx + na ) + ξE
H
(2)
γσb 2
Nt ×1
power is expressed as PT∗ = ||h B ||
2 . As such, minimizing PT is
where w, na ∈ C represent the transmit beamformer
and AN at Alice, Q  diag(ejθ1 , ejθ2 , . . . , ejθL ) is the equivalent to maximizing ||hB ||2 , so the optimization problem
phase shift matrix, θi is the phase shift of i-th reflecting can be expressed by P 2
2
element, HAI ∈ C L×Nt , hIB ∈ C L×1 , hIE ∈ C L×1 , hAB ∈ P 2 : max ||hH
IB QHAI + hAB || , s.t. |qi | = 1, ∀i,
H
(5)
Q
C Nt ×1 and hAE ∈ C Nt ×1 represent channels from Alice to
which can be further equivalently expressed as
IRS, IRS to Bob, IRS to Eve, Alice to Bob and Alice to Eve,
x is the transmitted signal following E{|x|2 }=1, ξB , ξE are P 3 : min qH Aq − qH b − bH q, s.t. |qi | = 1, ∀i, (6)
q
additive complex white Gaussian noises in which the entries
are with zero-mean and variances σb 2 and σe 2 at Bob and Eve where q  [q1 , q2 , . . ., qL ]H , b  diag(hH IB )HAI hAB and
A  −diag(hH )H H H
diag(h ). P 3 is still non-convex
respectively. For briefly, we denote hH B  hIB QHAI + hAB
H H IB AI AI IB
and hE  hIE QHAI + hAE . Obviously, the achievable se-
H H H due to nonconvex constraint (6). In the following, we propose
crecy rate in this scheme is two different algorithms to solve this problem.
  2

|hHB w|
CS  log 1 + 2 − A. Oblique Manifold Algorithm
σb + hH B RAN hB
 + In this subsection, we develop an Oblique Manifold (OM) al-
2
|hH
E w| gorithm to obtain a suboptimal solution of P 3. The optimization
log 1 + 2 , (3)
σe + hH E RAN hE
over a manifold is locally analogous to that in Euclidean space.
The unit modulus constraint is handled directly by manifold
where RAN  E{na nH a }. Given a total transmit power budget optimization theory [9]. There are some recent applications of
PA at Alice, we have PA  PT + PJ , where PT = ||w||2 and manifold optimization in wireless communications [10], [11]. In
PJ  tr(RAN ) are signal power and AN power, respectively. the following, we briefly introduce key steps of OM algorithm.
Specifically, P 3 can be equivalently transformed to the fol-
III. JOINT BEAMFORMING AND JAMMING SCHEME lowing minimization formular
Different from the existing works in [2]–[7] that full CSI 1
P 4 : min f (q) = H s.t. (6). (7)
is available at Alice, we consider a more realistic case where q q (−A)q + qH b + bH q
although the equivalent legitimate channel hH B is known, both Hence, the search space of P 3 is product of M  {q ∈ C L :
hAE and hIE , i.e., hHE , are completely unknown. Therefore, we |q1 | = |q2 | = · · · = |qL | = 1} in the complex plane, which is
could not directly maximize the secrecy rate (3). To guarantee a Riemannian submanifold of C L with the unit modulus con-
secure communication in this condition, the only solution is to straint. To obtain the solution q, three key steps are needed in
increase the information rate at Bob and decrease the infor- each iteration of OM algorithm.
mation leakage at Eve as much as possible. Hence, inspired by Firstly, the tangent space of manifold M at the point q is
the previous work in [8], two main procedures are included in defined as the space contained all tangent vectors of manifold
this joint transmission scheme. Firstly, we apply AN signalling M at q [10]. The tangent space for M at qi is given by
satisfying na ⊥ hH B , i.e., na is projected onto the null space 
of the equivalent channel hH Tqi M = z ∈ C M : [zqi H ]l,l = 0, ∀l ∈ M (8)
B , to jam Eve only. Secondly, a
minimum transmit power PT for the confidential signal x is where qi is the current iteration point, z is a tangent vector
allocated to meet a target QoS constraint γ at Bob, so that the at qi . The Riemannian gradient, i.e., gradqi f , is denoted as
residual power PJ = PA − PT can be as large as possible to be the tangent vector with the steepest increase of the objective
used for AN to jam Eve. We can see that both of the procedures function, which is the orthogonal projection of the Euclidean

Authorized licensed use limited to: Xian Jiaotong University. Downloaded on November 08,2020 at 14:30:38 UTC from IEEE Xplore. Restrictions apply.
1302 IEEE SIGNAL PROCESSING LETTERS, VOL. 27, 2020

gradient ∇qi f onto the tangent space Tqi M. Therefore, the


Algorithm 1: Oblique Manifold Algorithm.
Riemannian gradient at qi is given by
1. Set initial point q0 and convergence accuracy
gradqi f = ∇qi f −  {∇qi f ◦ qi ∗ } ◦ qi  = 10−4 ;
−Aqi + b 2. Set q = q0 and η0 ∈ (0, 1), calculate d0 =
f (qi ) = ∇qi f = −2 (9) μ0 = −∇q0 f ;
(qi H (−A)qi + qi H b + bH qi )2
repeat
Secondly, after obtaining the Riemannian gradient gradqi f , the
3. Calculate search step size ηi according to (14);
optimization approaches designed for the Euclidean space can be
4. Find the next point qi+1 using retraction in (14):
transplanted to oblique manifold. For instance, we can employ
qi+1 = Rqi (ηi μi ) = unt(qi + ηi μi );
conjugate gradient method with the update rule of the search
5. Determine Riemannian gradient gradqi+1 f in (9);
direction in the Euclidean space is given by
6. Calculate transport Tqi →qi+1 (μi ) according to (12);
μi+1 = −∇qi+1 f + αi μi (10) 7. Calculate Polak-Ribiere parameter αi in (11);
Here, μi denotes the search direction at qi and αi is chosen as 8. Compute conjugate search direction μi+1 with (13);
the Polak-Ribiere parameter [9] to achieve fast convergence. 9. i ← i + 1
[f (qi+1 )]T · f (qi+1 ) until convergence, i.e, ||gradqi f ||2 ≤ 
αi = max ,0 (11)
[f (qi )]T · f (qi )
However, μi and μi+1 in (10) lie in two different tangent spaces  H
Tqi M and Tqi+1 M, so the direction cannot be directly searched. + qH
k [λmax (A)I − A]qk − 2 qk+1 b
To solve this problem, an operation called transport which maps 
= 2Lλmax (A) − 2 qH k+1 β − qk Aqk
H
(15)
μi from tangent space Tqi M to Tqi+1 M is proposed. The vector
transport is given by where β  (λmax (A)I − A)qk + b. Hence, after dropping the
constant term in (15), P 3 can be approximated to P 5
Tqi →qi+1 (μi )  Tqi M → Tqi+1 M : 
P 5 : max  qH k+1 β s.t. (6) (16)
μi → μi −  {μi ◦ qi+1 ∗ } ◦ qi+1 qk+1

(12) Clearly, {qH


k+1 β}is maximized only when the phases of qi
Analogous to (10), the update rule for search direction on and βi are equal, where βi is the i-th entry of β. Therefore, the
manifold is given by closed-form optimal solution to problem P 5 is
μi+1 = −gradqi+1 f + αi Tqi →qi+1 (μi ), (13) qk+1 = ejarg(β1 ) , ejarg(β2 ) , . . . , ejarg(βL ) (17)
Thirdly, after determining the search direction μi at qi , we Then let k = k + 1 and update qk iteratively until the objective
employ the retraction to find the destination on the manifold. function converges. By initializing a feasible point q0 and ap-
The retraction for the search direction μi and step size ηi at plying MM algorithm to solve P 3 iteratively, a local optimal
point qi is given by solution of Q for P 3 can be obtained.
Rqi (ηi μi )  Tqi M → M : ηi μi → unt(ηi μi )
C. AN Signalling Strategy
[f (qi )]T di
ηi = −ηi−1 (14)
[f (qi − ηi−1 di )]T di − [f (qi )]T di Once P 1 is solved, the residual power PJ = PA − PT∗ is
where di represents the search direction in the Euclidean space, utilized for AN signalling in the null space of hB . Recalling
i.e., di = −f (qi ) + αi−1 di−1 . (3), since the CSI of hIE and hAE is completely unknown,
With these key steps introduced above, the final OM algorithm it is impossible to optimize the transmit covariance RAN to
for solving P 4 is summarized as Algorithm 1. According to [9], minimize the leakage rate. Hence, we use isotropic signalling
Algorithm 1 is guaranteed to converge to a critical point of P 3, with equal power allocation to transmit the AN signals in each
i.e., the point where the Riemannian gradient of the objective dimension of null(HB ), where HB = hB hH B . HB is a rank-1
function is zero. matrix so that the dimension of null(HB ) is Nt − 1. Hence, the
transmit covariance for AN can be formulated as
B. Minorization-Maximization Algorithm PA − PT∗
RAN = UAN UH (18)
Nt − 1 AN
In this subsection, we apply MM algorithm to solve P 3. The
where the columns in the semi-unitary matrix UAN are all
key idea of MM is to firstly obtain an approximately upper bound
Nt − 1 eigenvectors corresponding to zero eigenvalues of HB .
of the objective function and then iteratively compute the optimal
Therefore, by substituting the solution w and Q of P 1 as well
value of this bound subject to constraints. Then the converged
as (18) into (3), the final actual secrecy rate returned by this joint
point is a local optimal point [7].
transmission scheme can be obtained.
Specifically, let qk be a feasible point in current iteration
satisfying (6), an upper bound of the objective function at the
IV. SIMULATION RESULT
next iteration point qk+1 is expressed as
We set Nt = 5, PA = 5 dBm and σb 2 = σe 2 = −90 dBm.
k+1 Aqk+1 − qk+1 b − b qk+1
qH H H

 H The small-scale fading of all the channels follows the Rayleigh


≤ qH
k+1 λmax (A)Iqk+1 − 2 qk+1 [λmax (A)I − A]qk fading and the path loss model is given by P L = (P L0 −

Authorized licensed use limited to: Xian Jiaotong University. Downloaded on November 08,2020 at 14:30:38 UTC from IEEE Xplore. Restrictions apply.
WANG et al.: INTELLIGENT REFLECTING SURFACES ASSISTED SECURE TRANSMISSION 1303

Fig. 2. Convergence of proposed algorithms under Nt = 5 and γ = 10 dB.

10ρ log10 ( dd0 )) dB, where P L0 = −30 dB is path loss at ref-


erence distance d0 = 1 m, ρ is the path loss exponent. In the
simulation we set the path loss exponents and distances of the
Alice-to-IRS link, the IRS-to-Bob link, the IRS-to-Eve link,
the Alice-to-Bob link, and the Alice-to-Eve link as ρAI = 2,
ρIB = ρIE = 2.5, ρAB = ρAE = 3, dAI = 50 m, dIB = 6 m,
dIE = 7 m, dAB = 48 m, and dAE = 45 m, respectively.
The convergence of proposed algorithms is investigated in
Fig. 2 based on a round of randomly generated channels. Note
that both algorithms can guarantee convergence and MM re-
quires significantly less iterations than OM. Furthermore, a
larger L requires more iterations to converge due to the reason
that larger L leads to larger dimensions of Q. In addition, the
computational complexity of OM and MM algorithm is O(L2 )
for each iteration, so OM which requires more iterations needs
more computational time than MM. Fig. 3. Secrecy rate under Nt = 5. The results are averaged over 1000
In Fig. 3, we can see that the QoS threshold γ and the number randomly generated channels.
of reflecting elements L impact significantly on the achieved
secrecy rate. In Fig. 3(a), we note security rate with IRS is
significantly larger than that without IRS. It is because that IRS residual power can be allocated for AN signalling to reduce
can supply reflected power to transmit signal, so the Alice can information leakage. It also implies that if the total power is
allocate sufficient power for AN signalling and the secrecy rate limited, we can use more IRS to support a sufficient large γ to
is increased. In addition, we note taht the secrecy rate achieved improve the security performance.
by OM is larger than that by MM. This is due to the fact that the We can see that there exists cross-point between the two
optimized minimum power PT via OM is less than that via MM. curves γ = 20 dB/25 dB. It is because that L is small, the
Hence, more residual power can be allocated to AN signalling by reflected power is not sufficient. Hence if γ is set to 25 dB,
OM to jam Eve, resulting a higher secrecy rate. Furthermore, for Alice needs to allocate more power for signal transmission and
the fixed total power PA , increasing γ can increase secrecy rate less power for AN singnalling, so the secrecy rate is lower than
greatly because the legitimate information rate is significantly that of 20 dB. As L is increasing, the reflected power is sufficient
increased. However, if γ is set to be high, no sufficient power to transmit signal, so the Alice can allocate more power for AN
is left for AN signalling, so that the information leakage rate signalling to enhance security. If L is sufficient large, increasing
dominates and the achieved secrecy rate goes down. Therefore γ can increase the legitimate information rate. Hence when γ is
we see the important role of the power allocation tradeoff. As 25 dB, the secrecy rate is higher than that of 20 dB.
γ goes too high such that the total available power PA can not
support such a γ, P 1 becomes infeasible and the transmission
fails. V. CONCLUSION
In Fig. 3(b), we note that compared to the full CSI scenario, In this letter, we proposed a joint beamforming and jamming
although the secrecy rate without Eve’s CSI is decreased, the scheme to improve the PLS of an IRS-assisted MISO system
security still can be guaranteed by the proposed scheme. Further- without eavesdropper’ CSI. OM and MM algorithms are pro-
more, for the fixed PA , increasing L and γ will increase security. posed to jointly optimize the transmit beamforming at Alice
This is because with L increasing, the IRS can provide more and phase shifts at IRS. Simulation results have validated the
reflection power to transmit signal. Hence a sufficient higher convergence of the proposed algorithms, and it is shown that the
γ can be supported to exchange more information and more joint scheme greatly improves the security.

Authorized licensed use limited to: Xian Jiaotong University. Downloaded on November 08,2020 at 14:30:38 UTC from IEEE Xplore. Restrictions apply.
1304 IEEE SIGNAL PROCESSING LETTERS, VOL. 27, 2020

REFERENCES [6] J. Chen, Y. Liang, Y. Pei, and H. Guo, “Intelligent reflecting surface: A
programmable wireless environment for physical layer security,” IEEE
[1] Q. Wu and R. Zhang, “Towards smart and reconfigurable environment: Access, vol. 7, pp. 82599–82612, 2019.
Intelligent reflecting surface aided wireless network,” IEEE Commun. [7] L. Dong and H.-M. Wang, “Secure MIMO transmission via intelligent re-
Mag., vol. 58, no. 1, pp. 106–112, Jan. 2020. flecting surface,” IEEE Wireless Commun. Lett., vol. 9, no. 6, pp. 787–790,
[2] H. Shen, W. Xu, S. Gong, Z. He, and C. Zhao, “Secrecy rate maximization Jun. 2020.
for intelligent reflecting surface assisted multi-antenna communications,” [8] H. Wang, Q. Yin and X. Xia, “Distributed beamforming for physical-layer
IEEE Commun. Lett., vol. 23, no. 9, pp. 1488–1492, Sep. 2019. security of two-way relay networks,” IEEE Trans. Signal Process., vol. 60,
[3] M. Cui, G. Zhang, and R. Zhang, “Secure wireless communication via no. 7, pp. 3532–3545, Jul. 2012.
intelligent reflecting surface,” IEEE Wireless Commun. Lett., vol. 8, no. 5, [9] P.-A. Absil, R. Mahony, and R. Sepulchre, Optimization Algorithms on
pp. 1410–1414, Oct. 2019. Matrix Manifolds. Princeton, NJ, USA: Princeton Univ. Press, 2009.
[4] X. Yu and R. Schober, “Enabling secure wireless communications via [10] D. Xu et al., “Resource allocation for secure IRS-assisted multiuser MISO
intelligent reflecting surfaces,” 2019, arXiv:1904.09573. [Online]. Avail- systems,” 2019, arXiv:1907.03085. [Online]. Available: https://arxiv.org/
able: https://arxiv.org/abs/1904.09573 abs/1907.03085
[5] X. Guan, Q. Wu, and R. Zhang, “Intelligent reflecting surface assisted [11] K. Yang, Y. Shi, and Z. Ding, “Generalized low-rank optimization for
secrecy communication: Is artificial noise helpful or not?” IEEE Wireless topological cooperation in ultra-dense networks,” IEEE Trans. Wireless
Commun. Lett., vol. 9, no. 6, pp. 778–782, Jun. 2020. Commun., vol. 18, no. 5, pp. 2539–2552, May 2019.

Authorized licensed use limited to: Xian Jiaotong University. Downloaded on November 08,2020 at 14:30:38 UTC from IEEE Xplore. Restrictions apply.

You might also like