2021 IEEE Global Communications Conference (GLOBECOM) 2021
DOI: 10.1109/globecom46510.2021.9685746
|View full text |Cite
|
Sign up to set email alerts
|

RIS-Assisted Secure Transmission Exploiting Statistical CSI of Eavesdropper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…In our system, there are two types of channels: the direct channel between Alice and Bob (or Eve) hd,;, i = {u, e}, and the RIS-aided cascaded channel G, g, and h. We assume that the direct channel hd,i, i = {u, e} with rich scatters are Rayleigh distributed, while the channel G, g, and h follow a Rician fading, since the LoS components are generally contained in the RIS-aided cascaded channel, which is similar to the model described in [ 40,43,50]. More specifically, the Alice-to-RIS, the RIS-to-Bob, and the RIS-to-Eve mm Wave channels are expressed as followed…”
Section: Channel Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…In our system, there are two types of channels: the direct channel between Alice and Bob (or Eve) hd,;, i = {u, e}, and the RIS-aided cascaded channel G, g, and h. We assume that the direct channel hd,i, i = {u, e} with rich scatters are Rayleigh distributed, while the channel G, g, and h follow a Rician fading, since the LoS components are generally contained in the RIS-aided cascaded channel, which is similar to the model described in [ 40,43,50]. More specifically, the Alice-to-RIS, the RIS-to-Bob, and the RIS-to-Eve mm Wave channels are expressed as followed…”
Section: Channel Modelmentioning
confidence: 99%
“…Specifically, the authors in [30] showed that better performance could be obtained in a robust beamforming design under this type of CSI error model in terms of convergence speed and complexity. To make the secure transmission design more practical, the authors of [37][38][39][40] investigated different performance metrics for RIS-aided systems under imperfect CSI of eavesdroppers, such as the average secrecy rate, energy efficiency, and secrecy outage probability, which proposed different algorithms to improve the security performance. However, we note that all these secure works only considered the scenarios with the imperfect CSI of the eavesdroppers, while no relevant research on analyzing the secure performance of multi-RIS-aided systems considering imperfect CSI of both intended users and eavesdroppers, which is more practical.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…After some algebraic manipulations with ( 14) and (17), and then setting their first order derivatives with respect to the auxiliary variables A 1 and A 2 , respectively, equal to zero, the optimal values for A 1 and A 2 become:…”
Section: Proposed Ris-empowered Mimo Secrecy Designmentioning
confidence: 99%
“…Based on a statistical CSI error model for the RIS-parameterized cascaded channel, the power minimization problem for a system with multiple single-antenna eavesdroppers was considered in [16], where AN was utilized to boost the secrecy performance. Exploiting statistical CSI for a single-antenna eavesdropper, the ergodic secrecy rate maximization problem was studied in [17]. The energy efficiency maximization of a MISO system with multiple legitimate Receivers (RX) and eavesdroppers, was examined in [18] assuming CSI uncertainty at the transmitter with respect to the unintended users.…”
Section: Introductionmentioning
confidence: 99%