2020
DOI: 10.1109/tvt.2020.3007521
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems

Abstract: In this work, we study the secrecy performance of a reconfigurable intelligent surfaces (RIS)-aided wireless communication system in the presence of an eavesdropping user. Specifically, we assume that the RIS is placed between the source and the legitimate user to create a smart environment and used to improve the link security. In particular, analytical results for the secrecy outage probability (SOP) is derived. We also provide an asymptotic analysis to investigate the effect of the main parameters on the se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
171
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

4
4

Authors

Journals

citations
Cited by 269 publications
(174 citation statements)
references
References 20 publications
3
171
0
Order By: Relevance
“…A double Rayleigh distribution is assumed between the mobile ends, and the Meijer G-function is used to obtain the probability distribution function (PDF) of the received source, which slightly complicates the analysis. The reported results are similar to those in [24]. Furthermore, the authors study the effect of varying the number of RIS's reflecting elements and the distance between the source and the RIS.…”
Section: -(A)supporting
confidence: 79%
See 1 more Smart Citation
“…A double Rayleigh distribution is assumed between the mobile ends, and the Meijer G-function is used to obtain the probability distribution function (PDF) of the received source, which slightly complicates the analysis. The reported results are similar to those in [24]. Furthermore, the authors study the effect of varying the number of RIS's reflecting elements and the distance between the source and the RIS.…”
Section: -(A)supporting
confidence: 79%
“…Yang et al [24] studies the secrecy performance of an RISassisted SISO communication link in the presence of a lineof-sight (LoS) links between the RIS and the eavesdropper and the legitimate user. Single RIS is considered with N reflecting elements placed between the source and the legitimate user.…”
Section: -(A)mentioning
confidence: 99%
“…Similar to [14 ], we assume that E has the multiuser detection ability, and it can use the parallel interference cancellation technology to intercept the different users' signals. Then, the received SNR at E is γEn= hEdSEχ/2+ i=1NαmiβnormalEmiej(ϕmiθmiδmi)dSRmχ/2dRmnormalEχ/22cn2EsNnormalE=B2cn2 where n=false(m1,m2false) and B2 follows the exponential distribution with parameter λnormalE [16 ] and its PDF can be written as fB2false(yfalse)= 1λnormalEnormalexp yλE where λnormalE=Nγfalse¯normalSRmE+γfalse¯normalSE, γfalse¯normalSRm…”
Section: System and Channel Modelsmentioning
confidence: 99%
“…RISs have various potential applications in wireless communications, which include the design of secure wireless systems based on the concept of physical layer security (e.g., [9]- [14]). In [9]- [12], the authors investigated optimization problems to jointly design the beamforming vectors and phase shifts at the transmitter and RIS, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…However, the instantaneous eavesdropping CSI is difficult to obtain in practice, since the Eves are usually passive and do not actively communicate with other nodes. Motivated by this consideration, the authors of [13] and [14] considered RIS-assisted secrecy communications without assuming the knowledge of the instantaneous eavesdropping CSI. In particular, the authors of [13] proposed a joint beamforming and jamming scheme to enhance the secrecy rate, and the authors of [14] analyzed the secrecy outage probability at the RIS.…”
Section: Introductionmentioning
confidence: 99%