Securing Reconfigurable Intelligent Surface-Aided Cell-Free Networks
Abstract
In this paper, we investigate the physical layer security in the reconfigurable intelligent surface (RIS)-aided cell-free networks. A maximum weighted sum secrecy rate problem is formulated by jointly optimizing the active beamforming (BF) at the base stations and passive BF at the RISs. To handle this non-trivial problem, we adopt the alternating optimization to decouple the original problem into two sub-ones, which are solved using the semidefinite relaxation and continuous convex approximation theory. To decrease the complexity for obtaining overall channel state information (CSI), we extend the proposed framework to the case that only requires part of the RIS’ CSI. This is achieved via deliberately discarding the RIS that has a small contribution to the user’s secrecy rate. Based on this, we formulate a mixed integer non-linear programming problem, and the linear conic relaxation is used to obtained the solutions. Finally, the simulation results show that the proposed schemes can obtain a higher secrecy rate than the existing ones.
Index Terms:
Cell-free network, reconfigurable intelligent surface (RIS), physical layer security, weighted sum secrecy rate.I Introduction
With the rapid development of the smart wireless applications, the demand of the wireless data throughput has been speedily increasing [1]. To satisfy the above requirement, more base stations (BSs) can be deployed to improve the service capacity [2], [3]. However, the serious interference will occur with traditional cellular network structure, especially for the cell-edge users [4]. To address this, the user-centric cell-free network structure has been developed, where multiple BSs cooperatively serve the users [5], [6]. In this way, there is no cell boundary, thereby effectively integrating the inter-cell interference and improving the system throughput as well as coverage probability [7], [8].
However, the ultra-dense BS deployment inevitably leads to huge energy consumption. Recently, the reconfigurable intelligent surface (RIS) technology has been proposed as an energy efficient solution, where the RIS is composed of a large number of low-cost nearly passive reflective elements with controller phase shifts [9], [10]. The RIS can reflect the received signal to the desired direction by adjusting the reflective elements, which effectively improves the strength of the received signals [11]. Compared with the traditional relay, there is no noise amplification and self interference in RIS, moreover, RIS can greatly decrease the energy consumption and is easy to deploy [12]. Therefore, it is a promising scheme to replace some BSs with RISs in cell-free networks, such that the high rate and low energy consumption can be obtained simultaneously.
Due to the inherent broadcasting characteristics of wireless signals, any user within the coverage range may receive them and could launch various attacks (eavesdropping, monitoring, etc.) [13], especially for the cell-free networks. Nowadays, the physical layer security (PLS) technique has been adopted to deal with the security issue [14], [15]. Interestingly, the RIS has also showed a good performance in improving the system security, through increasing the signal strength of legitimate users and weakening that of illegal users [16]. Motivated by this potential advantage of RIS, we will study the PLS in RIS-based cell-free networks in this paper.
I-A Related Works
Recently, there have been several innovative works considering the security performance of the cell-free networks [17-18]. Specifically, [17] studied the achievable secrecy rates and compared that with the co-located massive MIMO networks, where the active eavesdropper (Eve) was assumed. The authors in [18] considered the spatially correlated Rayleigh fading channels with active Eve, and proposed a distributed conjugate beamforming (BF) technique to obtain the minimum mean square error (MMSE). Furthermore, their research verified the correlation of ergodic secrecy rate with active Eve and channel fading conditions.
Meanwhile, RIS-aided secure issues have also received great attention recently [19-23]. Specifically, in [19], the authors considered a RIS-aided multiple-input single-output (MISO) system, in which an Eve eavesdrops the confidential message from the access point (AP) to a specific user. The authors then proposed a joint AP active BF and RIS passive BF scheme to maximize the secrecy rate of all users. Under the same system model, the authors in [20] considered AP-RIS as a rank one channel, and proposed a projection gradient descent algorithm to maximize the secrecy rate. To further enhance the PLS performance, artificial noise was introduced in [21] to deliberately destroy Eve’s channel. In [22], RIS-aided multi-user two-way communication secure system was considered, where one user signal was used to interfere with Eve wiretapping other users’ information. Considering the practical dynamic environment, a novel deep reinforcement learning (DRL)-based secure BF design method was proposed to guarantee the security by dynamically adjusting to the beam according the environment [23].
I-B Our Contributions
However, most of the recent related works only consider the single BS in RIS communications, without touching the cooperative secure BF problem. It is of significance to investigate RIS-aided cell-free networks, in order to further boost the network capacity or lower energy consumption. Nonetheless, the joint BF design at the BSs and RISs is much more challenging for the multi-BS and multi-RIS systems. In this paper, we aim to address this by studying the secrecy transmission problem in a RIS-based cell-free networks. The main contributions are summarized as follows:
-
We construct a RIS-based cell-free network under the presence of an Eve, where all RISs and BSs rely on the central processing unit (CPU) to cooperatively serve all users at the same time. Based on this, we formulate a maximum weight sum secrecy rate (WSSR) problem by jointly optimizing the active cooperating BF at BSs and passive cooperating BF at RISs.
-
To address the formulated non-trivial WSSR maximization problem, we propose a joint optimization framework based on all known channel state information (CSI). Specifically, we decompose the original problem into two sub-problems, and then each sub-problem is transformed into a solvable convex problem through semi-definite relaxation (SDR) and successive convex approximation (SCA) techniques. Finally, the solution of each sub-problem is updated though the proposed alternating optimization (AO) method until convergence.
-
Due to the high-dimensional channel maxtrix of RISs, the channel estimation is a great challenge. In addition, it is also unrealistic to continuously acquire all RIS CSI at each small coherence time. To overcome this issue, we propose an extension of the joint optimization framework based on assigning RIS. Specifically, we first obtain all CSI once at the beginning of each large coherence time, and then introduce the matching factor of user and RIS to transform the original optimization problem into a mixed-integer non-linear programming (MINP) one. Next, the upper bound of the objective function is obtained by applying the SCA method, while the linear conic relaxation (LCR) method is applied to relax zero-one constraint for obtaining a suitable matching factor. Based on the matching factor, the maximum WSSR is obtained by jointly optimizing the BF of the BSs and the RISs in each small coherence time.
The rest of this paper is organized as follows: Section II proposes a downlink RIS-aided cell-free secure system model, and formulates a joint optimization of the maximization WSSR problem. A joint optimization framework is proposed in Section III, and the extension framework of the assigning RIS scheme is proposed in Section IV. Section V gives a supplement to the framework. Section VII provides simulation results to verify the security performance of the above frameworks. Section VIII concludes the paper.
Notation: In this paper, boldface letters indicate matrices or vectors. denotes a complex-valued matrix of size . , , Tr respectively denote transpose, conjugate transpose, and trace of matrix . For a complex value , represents its phase, represents its modulus, and is its real part. For a vector , represents its -th element, represents its Euclidean norm, and represents the diagonal operation. For a matrix , is the element in its -th row and -th column, and represents the semi-definite matrix. is a vector of length with all elements 1, represents an all-zero element matrix of size , ln denotes the natural logarithm, and is the gradient of .

II System Model and Problem Formulation
In this section, we first describe the PLS-based RIS-aided cell-free networks, and then formulate the WSSR problem under several constraints.
II-A System Model
As shown in Fig. 1, in the PLS-based RIS-aided cell-free network we assume that there are BSs, RISs, and users, which are randomly deployed in a given area. The BSs are connected to the CPU through backhaul links [24] and RISs are wired or wirelessly connected by the CPU or BSs [25]. For simplification, we assume that there exits a single Eve for wiretapping all users’ information. In addition, the BSs and RIS are equipped with and antennas, respectively, while the users and Eve are equipped with single antenna, respectively. Let , , and denote the index of BSs, RISs, RIS elements and users, respectively.
Without loss of generality, we assume that there exist both direct links (from BSs to users/Eve) and reflect links (from BSs to RISs and from RISs to users/Eve). The direct channels from the -th BS to the -user and Eve are denoted as and , respectively. , and respectively represent link channels from the -th BS to the -th RIS, from the -th RIS to the -th user, and from the -th RIS to the Eve. To characterize the performance of the considered RIS-aided cell-free secrecy network, all CSI is assumed available via the advanced channel estimation techniques. Here, we assume that all legitimate users and Eve do not collude [26].
The reflection phase matrix of the -th IRS is represented by , where is the reflection phase of the -th reflection element of the -th IRS. Each reflecting unit of RISs adjusts the phase of the incident signal to suppress the Eve’s reception and enhance the users’ reception. Consider that the signal power reflected by RISs twice or more is much lower than the channel reflected by RISs once [27], [28], they are ignored here. We further assume ideal RIS here, i.e., each element can be independently and continuously regulated [29], i.e.,
(1) |
where , . To maximize the utility of the RISs, suppose . Note that it is unrealistic to achieve continuous adjustment of the reflection element phase in practice [30], [31], so we will refer to the low-resolution discrete phase shift in Section V.
Let denote the transmit signal for the -user, where . The transmit signals by the -th BS can be expressed as
(2) |
where represents the precoding vector for the -user. Thus, received signal of the -th user can be expressed as
(3) | ||||
where is the additive white Gaussian noise (AWGN) with zero mean and variance . The first term on the right hand-side of the second equal sign represents the desired signal for the -th user, while the second term represents the interference from all other users’ signals. At the same time, the -th user’s information wiretapped by the Eve can be written as
(4) |
where is AWGN with zero mean and variance . In addition, we simplify the following formulation as
(5) |
where holds by defining , holds by defining , and , , and holds by defining , , and . Similarly, we have
(6) |
where holds by defining , and . Then, the signal-to-interference-plus-noise ratio (SINR) of the received signal of the -th user and the Eve eavesdropping the -th user’s information can be calculated as
(7a) | ||||
(7b) |
where and .
II-B Problem Formulation
Thus, the achievable secrecy rate from BSs to the -th user can be expressed as
(8) |
where .
In this paper, we aim to maximize the WSSR by jointly optimizing the BF vector and the phase shift . Mathematically, the optimization problem can be formulated as follows
(9a) | ||||
(9b) | ||||
(9c) |
where represents the weight of the -th user, represents the maximum available transmit power of the -th BS, and is defined as . Note that in (9a) we omit , because the optimal value should be non-negative.
Due to the coupling of and in the objective function (9a) and the unit modulus constraint of , it is difficult to solve problem . Here we take the AO method to decouple variables and , and decompose the original problem into two sub-problems. We then fix other variables in each iteration of the sub-problems and solve each convex problem using SDR and SCA methods. The detail will be given in the following section.
III Joint Optimization Framework
In this section, we will systematically describe the AO algorithm for solving the problem , namely by iteratively solving two sub-problems (one is to optimize with a fixed , while the other is to optimize with a fixed ), as shown in Algorithm 1.
III-A Sub-Problem for Solving BF
Firstly, we fix the phase shift variable and solve the BF matrix in the original problem . Here, we give the following two inequalities near the fixed point :
(10a) | |||
(10b) |
Based on the above, we have the following inferences. Firstly, the information rate of the -th user with fixed point can be approximated as
(11) |
where
(12a) | |||
(12b) | |||
(12c) | |||
(12d) |
Then, the rate of negative weight of the Eve eavesdropping the -th user’s information can be written as
(13) |
The first term of the (13) can be approximated as
(14) |
where
(15) |
In (15), is calculated as . The second term on the right side of (13) can be approximately as
(16) |
where
(17a) | |||
(17b) |
Finally, based on the above inferences, the WSSR maximization problem can be reformulated as the following sub-problem :
(18a) | ||||
(18b) |
Here, is a convex problem, which can be solved by standard convex optimization techniques or CVX toolbox.
III-B Sub-Problem for Solving Phase Shift
Similarly, by fixing the BF matrix , we can rewrite problem as a sub-problem w.r.t. around the fixed point as follows:
(19a) | ||||
(19b) |
where the calculation of , and is the same as (12b), (12d) and (17b) in the previous sub-section. Besides,
(20a) | |||
(20b) | |||
(20c) |
For in (19a), it can also be approximated as
(21) |
where . Omitting the constant term, we can rewrite the problem as
(22a) | ||||
(22b) |
For brevity, we denote , and then , . Next, we denote
(23a) | |||
(23b) |
Hence, we can simplify problem as follows:
(24a) | ||||
(24b) |
where , and .
The simplified sub-problem is a quadratic programming (QP) problem with unit modulus constraint. Next, we will employ the alternating direction method of multipliers (ADMM) technology to solve it. Firstly, we introduce a slack variable , and the problem can be rewritten as
(25a) | ||||
(25b) | ||||
(25c) |
The augmented Lagrangian equation of problem can be expressed as
(26) |
where and represent Lagrangian multipliers. We put the superscript of each variable to represent the index of the iteration, and then the process of each iteration is as follows:
(27a) | |||
(27b) | |||
(27c) |
1) Optimizing : Here, the first-order optimization solves the gradient as follows:
(28) |
Let (28) be equal to zero, we can obtain
(29) |
2) Optimizing : The solution of (27b) is similar to the above, but with the constraint of (25c). Its solution is equivalent to
(30) |
i.e.,
(31) |
where , and .
3) Optimizing : From (28), we can solve (27c) as
(32) |
The above three sub-problems can be solved in closed form. Finally, to make the ADMM algorithm converge, we have the following lemma [30].
Lemma 1: The above ADMM algorithm converges, no matter whether belongs to a continuous set, as long as the penalty factor satisfies:
(33) |
Proof: The certification process can refer to [32].
Here, we briefly summarize the proposed scheme for solving the original problem . First, we solve sub-problem by fixing , and then solve sub-problem based on obtaining from the . For Solving , the ADMM method is applied to alternately iterating (27a), (27b), and (27c) until the result converges. Next, is re-solved based on obtaining from the , and the above process is repeated until convergence.

IV Extension of the Joint Optimization Framework for Assigning RIS
In previous section, we have proposed the joint optimization framework based on perfect CSI. However, due to the intrinsic high-dimensional form of the RIS channel and many RISs, BSs and users in RIS-aided cell-free network, it is impractical or extremely difficult to obtain CSI of RISs so frequently.
Therefore, here we propose an extended scheme for assigning RISs to users, and then reconsider the WSSR maximization problem. In order to facilitate the description, the concept of two coherent times is introduced as shown in Fig. 2, which is similar to [25]. The proposed Algorithm 1 is based on the obtained CSI at each coherence time. However, the proposed assigning RIS scheme is to obtain all CSI at the start of the large coherence time, and select a few RISs that can provide good secure service quality for the user. After that, we only need the CSI of selected RISs in each subsequent small coherence time, and perform joint optimization problem based on the selected RISs.
IV-A Overview of Assigning RIS
In this section, we propose an assigning RIS optimization scheme that balances the security performance and cost as shown in Fig. 2. Specifically, we select RISs with better secure service quality for joint optimization based on the feature that the RIS with poor service quality has less impact on user secrecy rate. At the start of a large coherence time, a full channel estimation is performed and the RIS with better service quality is selected for each user. After that, in each repeated small coherence time, we only obtain the CSI related to the allocated RIS and perform joint optimization problem. Here we omit the channel estimation of RISs with poor service quality in each small coherence time, which greatly decreases the overhead with a small performance loss. Meanwhile, those RISs that are not screened for user will not provide services to it. Because the phase shift of the unscreened RIS without joint optimization is actually equivalent to a random phase shift, the impact on the user’s secrecy rate is very limited. The specific performance loss and impact will be shown in detail later in Section VI.
IV-B Problem Formulation of Assigning RIS
To determine the matching problem among RISs and users, we introduce a matching factor variable to indicate whether the -th user and the -th RIS are grouped. When is , it means that the -th RIS does not serve the -th user and vice versa. For convenience, we define . To express the matching problem, we define the virtual received signal of the -th user and the Eve eavesdropping on the -th user as follows
(34a) | |||
(34b) |
The virtual achievable secret rate of user can be written as
(35) |
where the virtual SINRs of and are the same as (7a) and (7b), respectively, which will be given in the following sub-section. We introduce a parameter to indicate the maximum number of RISs served by each user, where . Therefore, the maximum WSSR problem with assigning RIS is formulated as
(36a) | ||||
(36b) | ||||
(36c) | ||||
(36d) | ||||
(36e) |
Due to the nonconvex objective function (36a), it is obvious that is a nonconvex MINP, which is difficult to solve directively. Next, an effective algorithm is proposed to deal with it.
IV-C Joint Optimization Algorithm for Assigning RIS
When the variable is fixed, we only need to multiply both and by a coefficient to replace the original and , and then the problem can be transformed into the same form as the problem that can be solve by the proposed Algorithm 1 proposed in Section III.
In this section, we mainly focus on the problem of optimizing when and are fixed. To transform into a solvable convex problem, we rewrite the mathematical form of the channel. The reflection channels of the -th user and the Eve eavesdropping on the -th user are denoted as
(37a) | |||
(37b) |
where , , , , and . For convenience, we define the following
(38a) | |||
(38b) |
where , , , , and . Then, the virtual SINR of the received signal of the -th user and the Eve eavesdropping the -th user’s information can be calculated separately as
(39a) | |||
(39b) |
where and . Thus, the achievable virtual secery rate from BSs to the -th user can be expressed as
(40) |
where , , , and , , , represented by:
(41a) | |||
(41b) | |||
(41c) | |||
(41d) |
It is clear that (40) is a difference of convex (DC) function, rather than convex. In order to convert (40) into a convex function, we introduce the first-order Taylor to approximate the global upper bounds of and . First of all, for the convex function we have:
(42a) | |||
(42b) |
Therefore, around the fixed point we can get
(43a) | ||||
(43b) |
where
(44a) | ||||
(44b) |
Define and . As long as and , are satisfied.
Therefore, after fixing and , the problem can be transformed into a solvable problem as follows:
(45a) | ||||
(45b) | ||||
(45c) | ||||
(45d) |
Due to the constraints of and , problem is a quadratic problem of zero-one programming, which is still difficult to solve. Here, we use LCR [33] relaxation constraints to obtain a suboptimal solution for the objective function. Accordingly, can be rewritten as:
(46a) | |||
(46b) | |||
(46c) | |||
(46d) | |||
(46e) | |||
(46h) |
Here the constraints become convex, and becomes a resoluble semidefinite programming (SDP) problem. The optimal solution for in problem can be easily obtained according to modern SDP solvers. Afterwards, to restore to discrete , we set the first larger items of to be 1, and the rest are 0, and then take the first items of as .
Finally, we summarize the scheme for solving the original problem as Algorithm 2. Specifically, by fixing other variables, the solving sub-problems , and are updated separately through the AO approach until the WSSR converges.
V Supplementary Framework
Due to the constraints of realistic conditions, it is challenging to achieve continuous phase adjustment for the reflection coefficient (RC). In this section, we mainly discuss the mode of RC discrete phase adjustment under non-ideal conditions, and analyze the complexity of the above two algorithms.
V-A Non-Ideal Discrete Phase Shift
In Sub-Section II-B, we define as an ideal RIS’s RC that can be continuously adjusted. However, due to the constraints of hardware, the phase of the RIS elements are generally discrete. Here, we still define the amplitude coefficient as constant 1, and re-define the ideal RC case as and the discrete RC case as [34], [35], i.e.,
(47a) | |||
(47b) |
where means has discrete phase shift values.
To solve the discrete RC problem, we can project continuous from to to obtain discrete [36]. Specifically, we relax the discrete RC to a continuous RC , and then obtain the sub-optimal solution in each iteration to optimize the continuous , thereby obtaining the sub-optimal . Project from to , the specific method of projection is Therefore, we can obtain the sub-optimal solution of the phase shift optimization for each iteration sub-problem. Although the previous joint optimization is based on continuous phase shift, the convergence is not yet known. The simulation in Section VI show that the discrete phase shift optimization also has good convergence.
V-B Algorithmic Complexity
In this subsection, we calculate the computational complexity of the proposed two algorithms. When applying the ADMM algorithm to solve , the computational complexity is , where symbolize the number of iterations required for to converge. Thus, the computational complexity of Algorithm 1 is , where is the number of iterations required for algorithm convergence. Similarly, the computational complexity of Algorithm 2 is .
VI Numerical Results
In this section, we numerically analyze the performance of the proposed AO scheme and the extended assigning RIS scheme.

We use three-dimensional coordinates in the evaluation to demonstrate the simulation scene as shown in Fig. 3. We deploy three BSs to serve three users and one Eve. Meanwhile, we assume that there are buildings that affect users and Eve to receive signals, and thus we deploy two RISs on the distant high ground to enhance the secrecy rate. Assume that three BSs have a height of 4 m and are located at (10 m, 0 m, 4 m), (50 m, 0 m, 4 m) and (50 m, 0 m, 4 m). The three users and Eve in the distance are located at (30 m, 50 m, 1.5 m), (35 m, 50 m, 1.5 m), (40 m, 50 m, 1.5 m), and (35 m, 40 m, 1.5 m) respectively, and the two RISs farther away are located at (30 m, 60 m, 8 m) and (70 m, 60 m, 8 m), respectively.
To match the real scene in the cell-free network, we set a small number of antennas in the BSs to , and the transmit power of the BS to dBm. The noise power of user and Eve is dBm, and the weight of the user is set to for ease of calculation. Assume that the number of elements in each RIS is . Both our direct channel and reflected channel follow a distance-dependent path loss model [26]. We formulate the channel fading model as where represents the path loss of the reference distance m, represents the distance between the transmitting place and the receiving place, represents the path loss exponent, and represents the small-scale fading model. Here we consider as a Rician fading channel [30], which is calculated as
Parameter | Value |
---|---|
Path loss exponent | , , |
Rician channel factor | , |
The Inter-antenna separation distance | |
Path loss at 1 meter | dB |
where is the Rician factor, and and are the line-of-sight (LoS) and Rayleigh fading components, respectively. is calculated as , where , and , here , , and respectively represent the angle of arrival (AoA) of the receiver, the number of antennas, and the separation distance between antennas. , , and respectively represent the angle of departure (AoD) of the transmitter, the number of antennas, and the separation distance between antennas, and is the wavelength [30]. The specific parameters setting can be found in Table I.
To show the convergence of our proposed algorithms, Fig. 4 plots the WSSR versus the number of iterations. Here, the legends have the following meanings: Ideal RIS case: without assigning RIS and continuous phase shift and perfect CSI obtained from Algorithm 1. Discrete phase shift: discrete 3-bit phase shift while performing the steps mentioned in Section V-A. Assigning RIS scheme: assuming , then execute Algorithm 2 with the phase shift being continuous. Random phase shift: the initial phase shift is random, and only the BF vector is optimized without optimizing the phase shift. Without RIS: there is no RIS in the scene.
From Fig. 4, we can observe that all curves increase with the number of iterations until convergence, which is achieved within 13 iterations. This confirms that the relaxation constraint conditions of the “Assigning RIS scheme” have minor effect on the convergence. Although the “Discrete phase shift scheme” is previously unpredictable, it has now also been shown to converge quickly.

In addition, we can observe that the RIS-aided WSSR is much higher than the WSSR without RIS, which also proves the importance of the RISs in improving the secrecy rate. For the “Assigning RIS scheme”, although the user is served by one RIS at most, its performance is close to that of the “Ideal case”. One can also observe that the performance of “Random phase shift” without optimizing the phase shift is close to that of the network without RIS assistance, which shows that the “Assigning RIS scheme” is reasonable in numerical evaluation compared with the situation that all RISs serve users.
Next, we evaluate the impact of the key parameters on the WSSR. The parameters are the same as the above unless otherwise stated.
1) Relationship between the WSSR and the BS transmit power: As shown in Fig. 5, the WSSR grow rapidly with the BS transmit power under all schemes. It is worth noting that the WSSR of our proposed “Assigning RIS scheme” is close to that of the “Ideal RIS case”. Specifically, one can observe that when the BS transmit power is small, the WSSR of all schemes is close to zero, and as the transmit power increases, the WSSR ratio of all RIS-aided schemes relative to the without RIS-aided scheme gradually decreases. Here, it can be explained that when the BS transmit power is relatively small, the WSSR contribution of RIS to the network is more obvious, because the BSs tend to assign more power to the reflection links. When the BS transmit power is relatively high, the WSSR contribution of RIS to the network is significantly reduced, because the BSs are more inclined to assign more power to the direct channel for transmission. In addition, we can also find that the performance of the “Discrete phase shift” is relatively closer to the “Without RIS” as the transmit power increases.

2) Relationship between the WSSR and the number of RIS elements: Fig. 6 shows the WSSR versus the number of RIS elements. As expected, the WSSR remains a constant for different number of RIS elements under Without RIS scheme. In contrast, the WSSR for all cases with RIS increases approximately linearly with the RIS elements. This can be explained as follows: as increases, the RIS can receive and reflect more signal energy to the user, yielding a stronger received signals. Although the RIS with larger elements can obtain a higher WSSR, it requires more overhead to obtain the CSI. Thus, we need to balance the system performance and overhead, and then select the suitable number of RIS elements in practice.

3) Relationship between the WSSR and the distance : Here we set the two-dimensional coordinates of three users and the Eve to ( m, 50 m), ( m, 50 m), ( m, 50 m), and ( m, 40 m) respectively, and plot Fig. 7 according to the relationship between the WSSR and . It can be observed that the WSSR reaches its peak at m and m with the RIS-aided curve. That is, as the user and Eve move away from these two points, the WSSR decreases. It indicates that when users and Eve approach the RIS, the signal reflected by the RIS will be stronger, so the users can obtain a higher secrecy rate. Based on the above, in practice we can obtain a better security performance through reasonable deployment of RISs. In addition, we can also observe that the average performance loss of the “Assign RIS scheme” compared to the “Ideal RIS case” is minor, which also shows the effectiveness of our proposed “Assign RIS scheme”.


4) Relationship between the WSSR and the number of users: Fig. 8 illustrates the WSSR versus the number of users. Here, we reset the two-dimensional coordinate position of the -th user to (30+ m, 50 m), and the total number of users to . We also redefine 2 curves (“1-bit phase shift” means 1-bit discrete phase shift scheme, and “3-bit phase shift” means 3-bit discrete phase shift scheme). Generally, we can observe that the WSSR increases with the number of users. Here, we can explain the above phenomenon as follow: when the number of users is less than that of BS antennas, the interference among users has little effect on the secrecy rate. Therefore, the WSSR increases with the number of users. In addition, we can also observe that as the resolution of the phase shifter increases, the performance of the system also increases. Nonetheless, it requires higher technical complexity and overhead. Finally, we can find that the solution “Assign RIS scheme” can still maintain similar performance to the “Ideal RIS case”, which again indicates the effectiveness of our proposed Algorithm 2.
5) Reconstruction of the relationship between the WSSR and the number of RIS elements: To evaluate the impact of the number of RISs allocated by Algorithm 2 on the overall performance of the system, in this part, we re-plan the system model of the network. Specifically, we added the number of RISs to and located in ( m, 60 m), and further define three schemes , , and respectively, and other system parameters are assumed to be the same as VI-A. On this basis, we plot Fig. 9 to show the variation of WSSR over the number of RIS elements.

From Fig. 9, we intuitively find that as the number of arranged RISs increases, the WSSR with the RIS-aided scheme grows much more than that in Fig. 6. Meanwhile, the WSSR increases with the RIS elements, which is easy to understand. Additionally, we can find that as the number of RISs allocated to each user increases, the WSSR also increases. It is because that as the number of RISs increases, the signals reflected by RISs becomes stronger, and thus users can obtain a higher secrecy rate. Although users with more allocated RISs can achieve a higher WSSR, it requires more overhead to obtain the CSI, increasing the technique complexity. Therefore, we need to balance system performance and overhand, and select the suitable number of RISs services for users in practice.
VII Conclusion
In this paper, we investigated the secure transmission in the RIS-aided cell-free networks. We proposed a joint active and passive optimization at the BSs and RISs to maximize the WSSR. To lower the complexity and overhead, we extended the proposed scheme to the cases with discrete phase shift and RIS nulling. Simulation results showed that the distributed low cost RIS-aided cell free network can obtain a better performance than the traditional cell-free networks. Meanwhile, it was illustrated that there exists a tradeoff between system performance and complexity/overhead.
References
- [1] R. Borralho, A. Mohamed, A. U. Quddus, P. Vieira, and R. Tafazolli, “A Survey on Coverage Enhancement in Cellular Networks: Challenges and Solutions for Future Deployments,” IEEE Commun. Surv. Tutor., vol. 23, no. 2, pp. 1302-1341, Secondquarter 2021.
- [2] M. A. Adedoyin and O. E. Falowo, “Combination of Ultra-Dense Networks and Other 5G Enabling Technologies: A Survey,” IEEE Access, vol. 8, pp. 22893-22932, 2020.
- [3] G. Chopra, R. K. Jha and, S. Jain, “Security issues in ultra dense network for 5G scenario,” in Proc. Int. Conf. Commun. Syst. Networks, COMSNETS, 2018, pp. 510-512.
- [4] R. Huangi, J. Si, J. Shi, and Z. Li, “Deep-Reinforcement-Learning-Based Resource Allocation in ultra-dense network,” in Proc. Int. Conf. Wirel. Commun. Signal Process., WCSP, 2021, pp. 1-5.
- [5] D. Yu, H. Lee, S.-E. Hong, and S.-H. Park, “Weighted MMSE Optimization of Conjugate Beamforming for Cell-Free Massive MIMO,” in Proc. Int. Conf. Ubiquitous Future Netw., ICUFN, 2021, pp. 261-263.
- [6] G. Interdonato, M. Karlsson, E. Björnson, and E. G. Larsson, “Local Partial Zero-Forcing Precoding for Cell-Free Massive MIMO,” IEEE Trans. Wireless Commun., vol. 19, no. 7, pp. 4758-4774, July 2020.
- [7] G. Interdonato, P. Frenger, and E. G. Larsson, “Scalability Aspects of Cell-Free Massive MIMO,” in Proc. IEEE Int. Conf. Commun., ICC, 2019, pp. 1-6.
- [8] S. Mosleh, H. Almosa, E. Perrins, and L. Liu, “Downlink Resource Allocation in Cell-Free Massive MIMO Systems,” in Proc. Int. Conf. Comput., Netw. Commun., ICNC, 2019, pp. 883-887.
- [9] S. Zeng, H. Zhang, B. Di, Z. Han, and L. Song, “Reconfigurable Intelligent Surface (RIS) Assisted Wireless Coverage Extension: RIS Orientation and Location Optimization,” IEEE Commun. Lett., vol. 25, no. 1, pp. 269-273, Jan. 2021.
- [10] J. Li, S. Xu, J. Liu, Y. Cao, and W. Gao, “Reconfigurable Intelligent Surface Enhanced Secure Aerial-Ground Communication,” IEEE Trans. Commun., vol. 69, no. 9, pp. 6185-6197, Sept. 2021.
- [11] G. Zhou, C. Pan, H. Ren, K. Wang, and Z. Peng, “Secure Wireless Communication in RIS-Aided MISO System With Hardware Impairments,” IEEE Wireless Commun. Lett., vol. 10, no. 6, pp. 1309-1313, June 2021.
- [12] H. Shen, W. Xu, S. Gong, Z. He, and C. Zhao, “Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted Multi-Antenna Communications,” IEEE Commun. Lett., vol. 23, no. 9, pp. 1488-1492, Sept. 2019.
- [13] L. Zhai, Y. Zou, J. Zhu, and B. Li, “Improving Physical Layer Security in IRS-Aided WPCN Multicast Systems via Stackelberg Game,” IEEE T. Commun. 2022.
- [14] Y. Wu, A. Khisti, C. Xiao, G. Caire, K. -K. Wong, and X. Gao, “A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679-695, April 2018.
- [15] Y. Ai, F. A. P. deFigueiredo, L. Kong, M. Cheffena, S. Chatzinotas, and B. Ottersten, “Secure Vehicular Communications Through Reconfigurable Intelligent Surfaces,” IEEE T. Veh. Technol., vol. 70, no. 7, pp. 7272-7276, July 2021.
- [16] A. Makarfi, K. Rabie, O. Kaiwartya, O. Badarneh, G. Nauryzbayev, and R. Kharel, “Physical Layer Security in RIS-assisted Networks in Fisher-Snedecor Composite Fading,” in Proc. Int. Symp. Commun. Syst., Networks Digit. Signal Process., CSNDSP, 2020, pp. 1-6.
- [17] S. Timilsina, D. Kudathanthirige, and G. Amarasuriya, “Physical Layer Security in Cell-Free Massive MIMO,” in Proc. IEEE Glob. Commun. Conf., GLOBECOM, 2018, pp. 1-7.
- [18] X. Wang, Y. Gao, G. Zhang, and M. Guo, “Security Performance Analysis of Cell-Free Massive MIMO over Spatially Correlated Rayleigh Fading Channels with Active Spoofing Attack,” in Proc. Int. Conf. Wirel. Commun. Signal Process., WCSP, 2020, pp. 540-545.
- [19] M. Cui, G. Zhang, and R. Zhang, “Secure Wireless Communication via Intelligent Reflecting Surface,” IEEE Wireless Commun. Lett., vol. 8, no. 5, pp. 1410-1414, Oct. 2019.
- [20] B. Feng, Y. Wu, and M. Zheng, “Secure Transmission Strategy for Intelligent Reflecting Surface Enhanced Wireless System,” in Proc. Int. Conf. Wirel. Commun. Signal Process., WCSP, 2019, pp. 1-6.
- [21] D. Xu, X. Yu, Y. Sun, D. W. K. Ng, and R. Schober, “Resource Allocation for Secure IRS-Assisted Multiuser MISO Systems,” in Proc. IEEE Globecom Workshops, GC Wkshps, 2019, pp. 1-6.
- [22] L. Lv, Q. Wu, Z. Li, N. Al-Dhahir, and J. Chen, “Secure Two-Way Communications via Intelligent Reflecting Surfaces,” IEEE Commun. Lett., vol. 25, no. 3, pp. 744-748, March 2021.
- [23] H. Yang, Z. Xiong, J. Zhao, D. Niyato, L. Xiao, and Q. Wu, “Deep Reinforcement Learning-Based Intelligent Reflecting Surface for Secure Wireless Communications,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 375-388, Jan. 2021.
- [24] U. Siddique, H. Tabassum, and E. Hossain, “Downlink spectrum allocation for in-band and out-band wireless backhauling of full-duplex small cells,” IEEE Trans. Commun., vol. 65, no. 8, pp. 3538-3554, Aug. 2017.
- [25] Z. Zhang and L. Dai, “A Joint Precoding Framework for Wideband Reconfigurable Intelligent Surface-Aided Cell-Free Network,” IEEE Trans. Signal Process., vol. 69, pp. 4085-4101, 2021.
- [26] J. Li, L. Zhang, K. Xue, Y. Fang, and Q. Sun, “Secure Transmission by Leveraging Multiple Intelligent Reflecting Surfaces in MISO Systems,” IEEE. Trans. Mob. Comput.
- [27] Q. Wu and R. Zhang, “Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming,” IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5394-5409, Nov. 2019.
- [28] C. Pan et al., “Intelligent Reflecting Surface Aided MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer,” IEEE J. Sel. Area. Comm., vol. 38, no. 8, pp. 1719-1734, Aug. 2020.
- [29] Q. Zheng et al., “Ultra-wideband side-lobe level suppression using amplitude-adjustable metasurfaces,” J. Phys. D: Appl. Phys., vol. 52, no. 6, Dec. 2018, Art. no. 065102.
- [30] H. Niu, Z. Chu, F. Zhou, Z. Zhu, M. Zhang, and K. -K. Wong, “Weighted Sum Secrecy Rate Maximization Using Intelligent Reflecting Surface,” IEEE Trans. Commun., vol. 69, no. 9, pp. 6170-6184, Sept. 2021.
- [31] J. Chen, Y.-C. Liang, Y. Pei, and H. Guo, “Intelligent Reflecting Surface: A Programmable Wireless Environment for Physical Layer Security,” IEEE Access, vol. 7, pp. 82599-82612, 2019.
- [32] Y. Wang, W. Yin, and J. Zeng, “Global convergence of ADMM in nonconvex nonsmooth optimization,” Journal of Scientific Computing, vol. 78, no. 1, pp. 29-63, 2019.
- [33] T. Nie, S.-C. Fang, Z. Deng, and J. E. Lavery, “On linear conic relaxation of discrete quadratic programs,” Optim. Methods Softw., vol. 31, pp. 737-754,Jan. 2016.
- [34] L. Dai et al., “Reconfigurable Intelligent Surface-Based Wireless Communications: Antenna Design, Prototyping, and Experimental Results,” IEEE Access, vol. 8, pp. 45913-45923, 2020.
- [35] H. Guo, Y.-C. Liang, J. Chen, and E. G. Larsson, “Weighted Sum-Rate Maximization for Intelligent Reflecting Surface Enhanced Wireless Networks,” in Proc. IEEE Glob. Commun. Conf., GLOBECOM, 2019.
- [36] G. Amarasuriya, R. F. Schaefer, and H. Vincent Poor, “Linear Precoder Design for Physical Layer Security via Reconfigurable Intelligent Surfaces,” in Proc. IEEE Workshop Signal Process. Adv. Wireless Commun. SPAWC, 2020, pp. 1-5.