This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Securing Reconfigurable Intelligent Surface-Aided Cell-Free Networks

Wanming Hao,  Junjie Li, Gangcan Sun, Ming Zeng,  Octavia A. Dobre W. Hao is with the Henan Institute of Advanced Technology, and also with the School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China. (e-mail: iewmhao@zzu.edu.cn)J. Li is with the Henan Institute of Advanced Technology, Zhengzhou University, Zhengzhou 450001, China. (e-mail: 202012592017620@gs.zzu. edu.cn)G. Sun is with the School of Information Engineering, and Institute of Industrial Technology, Zhengzhou University, Zhengzhou 450001, China. (Email: iegcsun@zzu.edu.cn)M. Zeng is with the Department of Electrical Engineering and Computer Engineering, Universite Laval, Quebec, G1V 0A6, Canada. (E-mail: ming.zeng@gel.ulaval.ca)O. A. Dobre is with the Faculty of Engineering and Applied Science, Memorial University, St. Johns, NL A1B 3X5, Canada. (E-mail: odobre@mun.ca)
Abstract

In this paper, we investigate the physical layer security in the reconfigurable intelligent surface (RIS)-aided cell-free networks. A maximum weighted sum secrecy rate problem is formulated by jointly optimizing the active beamforming (BF) at the base stations and passive BF at the RISs. To handle this non-trivial problem, we adopt the alternating optimization to decouple the original problem into two sub-ones, which are solved using the semidefinite relaxation and continuous convex approximation theory. To decrease the complexity for obtaining overall channel state information (CSI), we extend the proposed framework to the case that only requires part of the RIS’ CSI. This is achieved via deliberately discarding the RIS that has a small contribution to the user’s secrecy rate. Based on this, we formulate a mixed integer non-linear programming problem, and the linear conic relaxation is used to obtained the solutions. Finally, the simulation results show that the proposed schemes can obtain a higher secrecy rate than the existing ones.

Index Terms:
Cell-free network, reconfigurable intelligent surface (RIS), physical layer security, weighted sum secrecy rate.

I Introduction

With the rapid development of the smart wireless applications, the demand of the wireless data throughput has been speedily increasing [1]. To satisfy the above requirement, more base stations (BSs) can be deployed to improve the service capacity [2], [3]. However, the serious interference will occur with traditional cellular network structure, especially for the cell-edge users [4]. To address this, the user-centric cell-free network structure has been developed, where multiple BSs cooperatively serve the users [5], [6]. In this way, there is no cell boundary, thereby effectively integrating the inter-cell interference and improving the system throughput as well as coverage probability [7], [8].

However, the ultra-dense BS deployment inevitably leads to huge energy consumption. Recently, the reconfigurable intelligent surface (RIS) technology has been proposed as an energy efficient solution, where the RIS is composed of a large number of low-cost nearly passive reflective elements with controller phase shifts [9], [10]. The RIS can reflect the received signal to the desired direction by adjusting the reflective elements, which effectively improves the strength of the received signals [11]. Compared with the traditional relay, there is no noise amplification and self interference in RIS, moreover, RIS can greatly decrease the energy consumption and is easy to deploy [12]. Therefore, it is a promising scheme to replace some BSs with RISs in cell-free networks, such that the high rate and low energy consumption can be obtained simultaneously.

Due to the inherent broadcasting characteristics of wireless signals, any user within the coverage range may receive them and could launch various attacks (eavesdropping, monitoring, etc.) [13], especially for the cell-free networks. Nowadays, the physical layer security (PLS) technique has been adopted to deal with the security issue [14], [15]. Interestingly, the RIS has also showed a good performance in improving the system security, through increasing the signal strength of legitimate users and weakening that of illegal users [16]. Motivated by this potential advantage of RIS, we will study the PLS in RIS-based cell-free networks in this paper.

I-A Related Works

Recently, there have been several innovative works considering the security performance of the cell-free networks [17-18]. Specifically, [17] studied the achievable secrecy rates and compared that with the co-located massive MIMO networks, where the active eavesdropper (Eve) was assumed. The authors in [18] considered the spatially correlated Rayleigh fading channels with active Eve, and proposed a distributed conjugate beamforming (BF) technique to obtain the minimum mean square error (MMSE). Furthermore, their research verified the correlation of ergodic secrecy rate with active Eve and channel fading conditions.

Meanwhile, RIS-aided secure issues have also received great attention recently [19-23]. Specifically, in [19], the authors considered a RIS-aided multiple-input single-output (MISO) system, in which an Eve eavesdrops the confidential message from the access point (AP) to a specific user. The authors then proposed a joint AP active BF and RIS passive BF scheme to maximize the secrecy rate of all users. Under the same system model, the authors in [20] considered AP-RIS as a rank one channel, and proposed a projection gradient descent algorithm to maximize the secrecy rate. To further enhance the PLS performance, artificial noise was introduced in [21] to deliberately destroy Eve’s channel. In [22], RIS-aided multi-user two-way communication secure system was considered, where one user signal was used to interfere with Eve wiretapping other users’ information. Considering the practical dynamic environment, a novel deep reinforcement learning (DRL)-based secure BF design method was proposed to guarantee the security by dynamically adjusting to the beam according the environment [23].

I-B Our Contributions

However, most of the recent related works only consider the single BS in RIS communications, without touching the cooperative secure BF problem. It is of significance to investigate RIS-aided cell-free networks, in order to further boost the network capacity or lower energy consumption. Nonetheless, the joint BF design at the BSs and RISs is much more challenging for the multi-BS and multi-RIS systems. In this paper, we aim to address this by studying the secrecy transmission problem in a RIS-based cell-free networks. The main contributions are summarized as follows:

  • \bullet

    We construct a RIS-based cell-free network under the presence of an Eve, where all RISs and BSs rely on the central processing unit (CPU) to cooperatively serve all users at the same time. Based on this, we formulate a maximum weight sum secrecy rate (WSSR) problem by jointly optimizing the active cooperating BF at BSs and passive cooperating BF at RISs.

  • \bullet

    To address the formulated non-trivial WSSR maximization problem, we propose a joint optimization framework based on all known channel state information (CSI). Specifically, we decompose the original problem into two sub-problems, and then each sub-problem is transformed into a solvable convex problem through semi-definite relaxation (SDR) and successive convex approximation (SCA) techniques. Finally, the solution of each sub-problem is updated though the proposed alternating optimization (AO) method until convergence.

  • \bullet

    Due to the high-dimensional channel maxtrix of RISs, the channel estimation is a great challenge. In addition, it is also unrealistic to continuously acquire all RIS CSI at each small coherence time. To overcome this issue, we propose an extension of the joint optimization framework based on assigning RIS. Specifically, we first obtain all CSI once at the beginning of each large coherence time, and then introduce the matching factor of user and RIS to transform the original optimization problem into a mixed-integer non-linear programming (MINP) one. Next, the upper bound of the objective function is obtained by applying the SCA method, while the linear conic relaxation (LCR) method is applied to relax zero-one constraint for obtaining a suitable matching factor. Based on the matching factor, the maximum WSSR is obtained by jointly optimizing the BF of the BSs and the RISs in each small coherence time.

The rest of this paper is organized as follows: Section II proposes a downlink RIS-aided cell-free secure system model, and formulates a joint optimization of the maximization WSSR problem. A joint optimization framework is proposed in Section III, and the extension framework of the assigning RIS scheme is proposed in Section IV. Section V gives a supplement to the framework. Section VII provides simulation results to verify the security performance of the above frameworks. Section VIII concludes the paper.

Notation: In this paper, boldface letters indicate matrices or vectors. M×N\mathbb{C}^{M\times N} denotes a complex-valued matrix of size M×NM\times N. 𝐀T\mathbf{A}^{T}, 𝐀H\mathbf{A}^{H}, Tr(𝐀)(\mathbf{A}) respectively denote transpose, conjugate transpose, and trace of matrix 𝐀\mathbf{A}. For a complex value xx, (x)\angle\left(x\right) represents its phase, |x|\left|x\right| represents its modulus, and (x)\Re(x) is its real part. For a vector 𝐚\mathbf{a}, [𝐚]i{\left[{\bf{a}}\right]_{i}} represents its ii-th element, 𝐚\left\|{\bf{a}}\right\| represents its Euclidean norm, and diag(x){\rm{diag}}\left(x\right) represents the diagonal operation. For a matrix 𝐀{\bf{A}}, 𝐀i,j{{\bf{A}}_{i,j}} is the element in its ii-th row and jj-th column, and 𝐀0{\bf{A}}\succeq 0 represents the semi-definite matrix. 𝟏L{{\bf{1}}_{L}} is a vector of length LL with all elements 1, 𝟎L×M{{\bf{0}}_{L\times M}} represents an all-zero element matrix of size L×ML\times M, ln()(\cdot) denotes the natural logarithm, and x{\nabla_{x}} is the gradient of xx.

Refer to caption
Figure 1: The IRS-aided cell-free network MISO system model.

II System Model and Problem Formulation

In this section, we first describe the PLS-based RIS-aided cell-free networks, and then formulate the WSSR problem under several constraints.

II-A System Model

As shown in Fig. 1, in the PLS-based RIS-aided cell-free network we assume that there are BB BSs, RR RISs, and KK users, which are randomly deployed in a given area. The BSs are connected to the CPU through backhaul links [24] and RISs are wired or wirelessly connected by the CPU or BSs [25]. For simplification, we assume that there exits a single Eve for wiretapping all users’ information. In addition, the BSs and RIS are equipped with MM and NN antennas, respectively, while the users and Eve are equipped with single antenna, respectively. Let ={1,,B}{\cal B}=\left\{{1,\ldots,B}\right\}, ={1,,R}{\cal R}=\left\{{1,\ldots,R}\right\}, 𝒩={1,,N}{\cal N}=\left\{{1,\ldots,N}\right\} and 𝒦={1,,K}{\cal K}=\left\{{1,\ldots,K}\right\} denote the index of BSs, RISs, RIS elements and users, respectively.

Without loss of generality, we assume that there exist both direct links (from BSs to users/Eve) and reflect links (from BSs to RISs and from RISs to users/Eve). The direct channels from the bb-th BS to the kk-user and Eve are denoted as 𝐇b,kM×1{\mathbf{H}}_{b,k}\in{{\mathbb{C}}^{M\times{1}}} and 𝐇b,eM×1{\mathbf{H}}_{b,e}\in{{\mathbb{C}}^{M\times{1}}}, respectively. 𝐆b,rN×M{\mathbf{G}}_{b,r}\in{{\mathbb{C}}^{N\times{M}}}, 𝐅r,kN×1{\mathbf{F}}_{r,k}\in{{\mathbb{C}}^{N\times{1}}} and 𝐅r,eN×1{\mathbf{F}}_{r,e}\in{{\mathbb{C}}^{N\times{1}}} respectively represent link channels from the bb-th BS to the rr-th RIS, from the rr-th RIS to the kk-th user, and from the rr-th RIS to the Eve. To characterize the performance of the considered RIS-aided cell-free secrecy network, all CSI is assumed available via the advanced channel estimation techniques. Here, we assume that all legitimate users and Eve do not collude [26].

The reflection phase matrix of the rr-th IRS is represented by 𝚯r=diag(θr,1,,θr,N)N×N{{\bf{\Theta}}_{r}}={\rm{diag(}}{\theta_{r{\rm{,}}1}},\ldots,{\theta_{r{\rm{,}}N}})\in{{\mathbb{C}}^{N\times{N}}}, where θr,n{\theta_{r{\rm{,}}n}} is the reflection phase of the nn-th reflection element of the rr-th IRS. Each reflecting unit of RISs adjusts the phase of the incident signal to suppress the Eve’s reception and enhance the users’ reception. Consider that the signal power reflected by RISs twice or more is much lower than the channel reflected by RISs once [27], [28], they are ignored here. We further assume ideal RIS here, i.e., each element θr,n{\theta_{r{\rm{,}}n}} can be independently and continuously regulated [29], i.e.,

={θr,n|θr,n=κr,nejφr,n,κr,n[0,1],φr,n[0,2π)},{\cal F}\!=\!\left\{{{\theta_{r,n}}{\rm{|}}{\theta_{r,n}}\!=\!{\kappa_{r,n}}{e^{j{\varphi_{r,n}}}},{\kappa_{r,n}}\!\in\!\left[{0,1}\right]\!,\!{\varphi_{r,n}}\!\in\!\left[{0\!,\!\left.{2\pi}\right)}\right.}\right\}, (1)

where r\forall r\in{\cal R}, n𝒩\forall n\in{\cal N}. To maximize the utility of the RISs, suppose κr,n=1{\kappa_{r,n}}=1. Note that it is unrealistic to achieve continuous adjustment of the reflection element phase in practice [30], [31], so we will refer to the low-resolution discrete phase shift in Section V.

Let sks_{k} denote the transmit signal for the kk-user, where 𝔼{|sk|2}=1{\mathbb{E}}\left\{{{{\left|{{s_{k}}}\right|}^{2}}}\right\}=1. The transmit signals by the bb-th BS can be expressed as

𝐱b=k=1K𝐰b,ksk,{{\bf{x}}_{b}}=\sum\limits_{k=1}^{K}{{{\bf{w}}_{b,k}}{s_{k}}}, (2)

where 𝐰b,kM×1{{\bf{w}}_{b,k}}\in{{\mathbb{C}}^{M\times{1}}} represents the precoding vector for the kk-user. Thus, received signal of the kk-th user can be expressed as

yk=\displaystyle{y_{k}}= b=1B(𝐇b,kH+r=1R𝐅r,kH𝚯rH𝐆b,r)𝐱b+nk\displaystyle\sum\limits_{b=1}^{B}\left({\bf{H}}_{b,k}^{H}+\sum\limits_{r=1}^{R}{{\bf{F}}_{r{\rm{,}}k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}\right){{\bf{x}}_{b}}+{n_{k}} (3)
=\displaystyle= b=1B(𝐇b,kH+r=1R𝐅r,kH𝚯rH𝐆b,r)𝐰b,ksk+\displaystyle{\kern 1.0pt}\sum\limits_{b=1}^{B}\left({\bf{H}}_{b,k}^{H}+\sum\limits_{r=1}^{R}{{\bf{F}}_{r,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}\right){{\bf{w}}_{b,k}}{{{s}}_{k}}+
b=1Bj=1,jkK(𝐇b,kH+r=1R𝐅r,kH𝚯rH𝐆b,r)𝐰b,jsj+nk,\displaystyle{\rm{}}\sum\limits_{b=1}^{B}{\sum\limits_{j\!=\!1,j\!\neq\!k}^{K}}\left({\bf{H}}_{b,k}^{H}\!+\!\sum\limits_{r\!=\!1}^{R}{{\bf{F}}_{r,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}\right){{\bf{w}}_{b,j}}{{{s}}_{j}}\!+\!{n_{k}},

where nk{n_{k}} is the additive white Gaussian noise (AWGN) with zero mean and variance σk2\sigma_{k}^{2}. The first term on the right hand-side of the second equal sign represents the desired signal for the kk-th user, while the second term represents the interference from all other users’ signals. At the same time, the kk-th user’s information wiretapped by the Eve can be written as

yke=b=1B(𝐇b,eH+r=1R𝐅r,e,kH𝚯rH𝐆b,r)𝐱b+ne=b=1B(𝐇b,eH+r=1R𝐅r,e,kH𝚯rH𝐆b,r)𝐰b,ksk+b=1Bj=1,jkK(𝐇b,eH+r=1R𝐅r,e,kH𝚯rH𝐆b,r)𝐰b,jsj+ne,\begin{split}y_{k}^{e}=&\sum\limits_{b=1}^{B}\left({\bf{H}}_{b,e}^{H}+\sum\limits_{r=1}^{R}{{\bf{F}}_{r,e,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}\right){{\bf{x}}_{b}}+{n_{e}}\\ =&{\kern 1.0pt}\sum\limits_{b=1}^{B}\left({\bf{H}}_{b,e}^{H}+\sum\limits_{r=1}^{R}{{\bf{F}}_{r,e,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}\right){{\bf{w}}_{b,k}}{{{s}}_{k}}+\\ &{\rm{}}\sum\limits_{b\!=\!1}^{B}{\sum\limits_{j\!=\!1,j\!\neq\!k}^{K}}\left({\bf{H}}_{b,e}^{H}\!+\!\sum\limits_{r\!=\!1}^{R}{{\bf{F}}_{r,e,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}\right){{\bf{w}}_{b,j}}{{{s}}_{j}}\!+\!{n_{e}},\end{split} (4)

where ne{n_{e}} is AWGN with zero mean and variance σe2{\sigma_{e}^{2}}. In addition, we simplify the following formulation as

b=1B(𝐇b,kH+r=1R𝐅r,kH𝚯rH𝐆b,r)𝐰b,k=(a)b=1B(𝐇b,kH+r=1R𝜽rHdiag(𝐅r,kH)𝐆b,r)𝐰b,k=(b)b=1B(𝐇b,kH+𝜽Hdiag(𝐅kH)𝐆b)𝐰b,k=(c)𝝁H𝐡k𝐰k,\begin{split}&{\rm{}}\sum\limits_{b=1}^{B}\left({\bf{H}}_{b,k}^{H}+\sum\limits_{r=1}^{R}{{\bf{F}}_{r,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}\right){{\bf{w}}_{b,k}}\\ \mathop{=}\limits^{(a)}&{\rm{}}\sum\limits_{b=1}^{B}\left({\bf{H}}_{b,k}^{H}+\sum\limits_{r=1}^{R}{\boldsymbol{\theta}_{r}^{H}}{\rm{diag}}\left({{\bf{F}}_{r,k}^{H}}\right){{\bf{G}}_{b,r}}\right){{\bf{w}}_{b,k}}\\ \mathop{=}\limits^{(b)}&{\rm{}}\sum\limits_{b=1}^{B}\left({\bf{H}}_{b,k}^{H}+{\boldsymbol{\theta}^{H}}{\rm{diag}}\left({\bf{F}}_{k}^{H}\right){{\bf{G}}_{b}}\right){{\bf{w}}_{b,k}}\\ \mathop{=}\limits^{(c)}&{\rm{}}{\boldsymbol{\mu}^{H}}{{\bf{h}}_{k}}{{\bf{w}}_{k}},\end{split} (5)

where (a)(a) holds by defining 𝜽r=[θr,1,,θr,N]T{\boldsymbol{\theta}_{r}}={\left[{{\theta_{r,1}},\ldots,{\theta_{r,N}}}\right]^{{\rm{}}T}}, (b)(b) holds by defining 𝜽=[𝜽1T,,𝜽RT]T\boldsymbol{\theta}={\left[{\boldsymbol{\theta}_{1}^{T},\ldots,\boldsymbol{\theta}_{R}^{T}}\right]^{{\rm{}}T}}, and 𝐅k=[𝐅1,kT,,𝐅R,kT]T{{\bf{F}}_{k}}={\left[{{\bf{F}}_{1,k}^{T},\ldots,{\bf{F}}_{R,k}^{T}}\right]^{{\rm{}}T}}, 𝐆b=[𝐆b,1T,,𝐆b,RT]T{{\bf{G}}_{b}}={\left[{{\bf{G}}_{b,1}^{T},\ldots,{\bf{G}}_{b,R}^{T}}\right]^{{\rm{}}T}}, and (c)(c) holds by defining 𝝁=[𝜽T,1]T\boldsymbol{\mu}={\left[{{\boldsymbol{\theta}^{T}},1}\right]^{{\rm{}}T}}, 𝐰k=[𝐰1,kT,,𝐰b,kT]T{{\bf{w}}_{k}}={\left[{{\bf{w}}_{1,k}^{T},\ldots,{\bf{w}}_{b,k}^{T}}\right]^{{\rm{}}T}}, and 𝐡k=[diag(𝐅kH)𝐆1diag(𝐅kH)𝐆b𝐇1,kH𝐇b,kH]{{\bf{h}}_{k}}=\left[{\begin{array}[]{c}{{\rm{diag}}({\bf{F}}_{k}^{H}){{\bf{G}}_{1}}}\cdots{{\rm{diag}}({\bf{F}}_{k}^{H}){{\bf{G}}_{b}}}\\ {{\bf{H}}_{1,k}^{H}}\ \ \ \ \cdots\ \ \ \ {{\bf{H}}_{b,k}^{H}}\end{array}}\right]. Similarly, we have

b=1B(𝐇b,eH+r=1R𝐅r,e,kH𝚯rH𝐆b,r)𝐰b,k=(d)b=1B(𝐇b,eH+𝜽Hdiag(𝐅e,kH)𝐆b)𝐰b,k=(e)𝝁H𝐡e,k𝐰k,\begin{split}&{\rm{}}\sum\limits_{b=1}^{B}\left({\bf{H}}_{b,e}^{H}+\sum\limits_{r=1}^{R}{{\bf{F}}_{r,e,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}\right){{\bf{w}}_{b,k}}\\ \mathop{=}\limits^{(d)}&{\rm{}}\sum\limits_{b=1}^{B}\left({\bf{H}}_{b,e}^{H}+{\boldsymbol{\theta}^{H}}{\rm{diag}}\left({\bf{F}}_{e,k}^{H}\right){{\bf{G}}_{b}}\right){{\bf{w}}_{b,k}}\\ \mathop{=}\limits^{(e)}&{\rm{}}{\boldsymbol{\mu}^{H}}{{\bf{h}}_{e,k}}{{\bf{w}}_{k}},\end{split} (6)

where (d)(d) holds by defining 𝐅e,k=[𝐅1,e,kT,,𝐅R,e,kT]T{{\bf{F}}_{e,k}}={\left[{{\bf{F}}_{1,e,k}^{T},\ldots,{\bf{F}}_{R,e,k}^{T}}\right]^{{\rm{}}T}}, and 𝐡e,k=[diag(𝐅e,kH)𝐆1diag(𝐅e,kH)𝐆b𝐇1,eH𝐇b,eH]{{\bf{h}}_{e,k}}=\left[{\begin{array}[]{c}{{\rm{diag}}({\bf{F}}_{e,k}^{H}){{\bf{G}}_{1}}}\cdots{{\rm{diag}}({\bf{F}}_{e,k}^{H}){{\bf{G}}_{b}}}\\ {{\bf{H}}_{1,e}^{H}}\ \ \ \ \cdots\ \ \ \ {{\bf{H}}_{b,e}^{H}}\end{array}}\right]. Then, the signal-to-interference-plus-noise ratio (SINR) of the received signal of the kk-th user and the Eve eavesdropping the kk-th user’s information can be calculated as

γk\displaystyle{\gamma_{k}} =|𝝁H𝐡~k𝐰k|2j=1,jkK|𝝁H𝐡~k𝐰j|2+1,\displaystyle=\frac{{{{\left|{{\boldsymbol{\mu}^{H}}{{\tilde{\mathbf{h}}}_{k}}{{\bf{w}}_{k}}}\right|}^{2}}}}{{\sum\limits_{j=1,j\neq k}^{K}{{{\left|{{\boldsymbol{\mu}^{H}}{{\tilde{\mathbf{h}}}_{k}}{{\bf{w}}_{j}}}\right|}^{2}}+1}}}, (7a)
γke\displaystyle{\gamma_{k}^{e}} =|𝝁H𝐡~e,k𝐰k|2j=1,jkK|𝝁H𝐡~e,k𝐰j|2+1,\displaystyle=\frac{{{{\left|{{\boldsymbol{\mu}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}{{\bf{w}}_{k}}}\right|}^{2}}}}{{\sum\limits_{j=1,j\neq k}^{K}{{{\left|{{\boldsymbol{\mu}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}{{\bf{w}}_{j}}}\right|}^{2}}+1}}}, (7b)

where 𝐡~k=σk1𝐡k{\tilde{\mathbf{h}}_{k}}={\sigma_{k}^{-1}}{{\mathbf{h}}_{k}} and 𝐡~e,k=σe1𝐡e,k{\tilde{\mathbf{h}}_{e,k}}={\sigma_{e}^{-1}}{{\mathbf{h}}_{e,k}}.

II-B Problem Formulation

Thus, the achievable secrecy rate from BSs to the kk-th user can be expressed as

Rs,k=[ln(1+γk)ln(1+γe,k)]+,{R_{s,k}}={\left[{\kern 1.0pt}{\ln(1+{\gamma_{k}})-\ln(1+{\gamma_{e,k}})}{\kern 1.0pt}\right]^{+}}, (8)

where [z]+=max(z,0){\left[z\right]^{+}}=\max\left({z,0}\right).

In this paper, we aim to maximize the WSSR by jointly optimizing the BF vector 𝐰k{\bf{w}}_{k} and the phase shift 𝝁\boldsymbol{\mu}. Mathematically, the optimization problem can be formulated as follows

𝒫o:max𝐖,𝝁\displaystyle{{\cal P}^{o}}:\mathop{\max}\limits_{{\bf{W}},\boldsymbol{\mu}}{\rm{}}\ Rs=k=1Kηk(ln(1+γk)ln(1+γke))\displaystyle{R_{s}}=\sum\limits_{k=1}^{K}{{\eta_{k}}(\ln{\kern 1.0pt}(1+{\gamma_{k}})-\ln{\kern 1.0pt}(1+\gamma_{k}^{e})}) (9a)
s.t.\displaystyle{\rm{s}}{\rm{.t.}}\ C1:k=1K𝐰b,k2Pb,b,\displaystyle C1:{\sum\limits_{k=1}^{K}}{{\rm{}}{{\left\|{{{\bf{w}}_{b,k}}}\right\|}^{{\kern 1.0pt}2}}}\leq{P_{b}}{\rm{}},\forall b\in{\cal B}, (9b)
C2:|θr,n|=1,r,n𝒩,\displaystyle C2:{\rm{}}\left|{{\theta_{r,n}}}\right|=1{\rm{}},{\rm{}}\forall r\in{\cal R},\forall n\in{\cal N}, (9c)

where ηk(0ηk1){\eta_{k}}\left(0\leq{\eta_{k}}\leq 1\right) represents the weight of the kk-th user, Pb{P_{b}} represents the maximum available transmit power of the bb-th BS, and 𝐖{\bf{W}} is defined as 𝐖=[𝐰1T,,𝐰KT]T{\bf{W}}{\rm{=}}{\left[{{\bf{w}}_{1}^{T},\ldots,{\bf{w}}_{K}^{T}}\right]^{T}}. Note that in (9a) we omit []+{\left[\cdot\right]^{+}}, because the optimal value should be non-negative.

Due to the coupling of 𝐖{\bf{W}} and 𝝁\boldsymbol{\mu} in the objective function (9a) and the unit modulus constraint of C2C2, it is difficult to solve problem 𝒫o{\cal P}^{o}. Here we take the AO method to decouple variables 𝐖{\bf{W}} and 𝝁\boldsymbol{\mu}, and decompose the original problem 𝒫o{\cal P}^{o} into two sub-problems. We then fix other variables in each iteration of the sub-problems and solve each convex problem using SDR and SCA methods. The detail will be given in the following section.

III Joint Optimization Framework

In this section, we will systematically describe the AO algorithm for solving the problem 𝒫o{\cal P}^{o}, namely by iteratively solving two sub-problems (one is to optimize 𝐖{\bf{W}} with a fixed 𝝁\boldsymbol{\mu}, while the other is to optimize 𝝁\boldsymbol{\mu} with a fixed 𝐖{\bf{W}}), as shown in Algorithm 1.

III-A Sub-Problem for Solving BF 𝐖{\bf{W}}

Firstly, we fix the phase shift variable 𝝁\boldsymbol{\mu} and solve the BF matrix 𝐖{\bf{W}} in the original problem 𝒫o{\cal P}^{o}. Here, we give the following two inequalities near the fixed point {a^,b^}\left\{{\hat{a},\hat{b}}\right\}:

ln(1+|a|2b)ln(1+|a^|2b^)|a^|2b^\displaystyle\ln\left({1+\frac{{{{\left|a\right|}^{2}}}}{b}}\right)\geq\ln\left({1+\frac{{{{\left|{\hat{a}}\right|}^{2}}}}{{\hat{b}}}}\right)-\frac{{{{\left|{\hat{a}}\right|}^{2}}}}{{\hat{b}}}\ \ \ \ \ \ \ \
+2{aa^}b^|a^|2(b+|a|2)b^(b^+|a^|2),\displaystyle+\frac{{2\Re\left\{{a\hat{a}}\right\}}}{{\hat{b}}}-\frac{{{{\left|{\hat{a}}\right|}^{2}}\left({b+{{\left|a\right|}^{2}}}\right)}}{{\hat{b}{\rm{}}\left({\hat{b}+{{\left|{\hat{a}}\right|}^{2}}}\right)}}, (10a)
ln(1+ab)(1+a^b^)b^b^+a^(aba^b^).\displaystyle\ln\left({1+\frac{a}{b}}\right)\leq\left({1+\frac{{\hat{a}}}{{\hat{b}}}}\right)-\frac{{\hat{b}}}{{\hat{b}+\hat{a}}}{\kern 1.0pt}\left({\frac{a}{b}-\frac{{\hat{a}}}{{\hat{b}}}}\right). (10b)
0:  𝐇b,k{{\bf{H}}_{b,k}}, 𝐇b,e{{\bf{H}}_{b,e}}, 𝐅r,k{{\bf{F}}_{r,k}}, 𝐅r,e,k{{\bf{F}}_{r,e,k}}, 𝐆b,r{{\bf{G}}_{b,r}}, and σk{\sigma_{k}}, σe{\sigma_{e}}.
0:  BF matrix 𝐖{\bf{W}}, phase shift vector 𝝁\boldsymbol{\mu}, and the maximum WSSR Rs{R_{s}}.
1:  Initialize 𝐖t{\bf{W}}^{t}, 𝝁t{\boldsymbol{\mu}}^{t}, Rst{R_{s}^{t}}, t=0t=0 and threshold ε\varepsilon;
2:  while  RstRst1>ε{R_{s}^{t}}-{R_{s}^{t-1}}>{\varepsilon} do
3:     t=t+1t=t+1;
4:     Update 𝐖t{\bf{W}}^{t} by solving 𝒫1{{\cal P}^{1}};
5:     Update 𝝁t\boldsymbol{\mu}^{t} by solving 𝒫5{{\cal P}^{5}};
6:     Update Rst{R_{s}^{t}} by (9a);
7:  end while
8:  return 𝐖t{\bf{W}}^{t}, 𝝁t{\boldsymbol{\mu}}^{t}, and Rst{R_{s}^{t}}.
Algorithm 1 Proposed Joint Optimization AO Algorithm.

Based on the above, we have the following inferences. Firstly, the information rate of the kk-th user with fixed point {𝐰kt,𝝁t}\left\{{{\bf{w}}_{k}^{t},{\boldsymbol{\mu}^{t}}}\right\} can be approximated as

ln(1+γk)=ln(1+|(𝝁t)H𝐡~k𝐰k|2j=1,jkK|(𝝁t)H𝐡~k𝐰j|2+1)ln(1+|αkt|2βkt)+2{αktαk}βkt|αkt|2βkt|αkt|2(βk+|αk|2)βkt(βkt+|αkt|2),\begin{split}\ln\left({1+{\gamma_{k}}}\right)=&\ln\left({1+\frac{{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{k}}{{\bf{w}}_{k}}}\right|}^{2}}}}{{\sum\limits_{j=1,j\neq k}^{K}{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{k}}{{\bf{w}}_{j}}}\right|}^{2}}+1}}}}\right)\\ \geq&\ln\left({1+\frac{{{{\left|{\alpha_{k}^{t}}\right|}^{2}}}}{{\beta_{k}^{t}}}}\right)+\frac{{2\Re\left\{{\alpha_{k}^{t}{\alpha_{k}}}\right\}}}{{\beta_{k}^{t}}}\\ &-\frac{{{{\left|{\alpha_{k}^{t}}\right|}^{2}}}}{{\beta_{k}^{t}}}-\frac{{{{\left|{\alpha_{k}^{t}}\right|}^{2}}\left({{\beta_{k}}+{{\left|{{\alpha_{k}}}\right|}^{2}}}\right)}}{{\beta_{k}^{t}{\rm{}}\left({\beta_{k}^{t}+{{\left|{\alpha_{k}^{t}}\right|}^{2}}}\right)}},\end{split} (11)

where

αk=(𝝁t)H𝐡~k𝐰k,\displaystyle{\alpha_{k}}={\left({{\boldsymbol{\mu}^{t}}}\right)^{H}}{{\tilde{\mathbf{h}}}_{k}}{{\bf{w}}_{k}},\qquad (12a)
αkt=(𝝁t)H𝐡~k𝐰kt,\displaystyle\alpha_{k}^{t}={\left({{\boldsymbol{\mu}^{t}}}\right)^{H}}{{\tilde{\mathbf{h}}}_{k}}{\bf{w}}_{k}^{t},\quad (12b)
βk=j=1,jkK|(𝝁t)H𝐡~k𝐰j|2+1,\displaystyle{\beta_{k}}=\sum\limits_{j=1,j\neq k}^{K}{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{k}}{{\bf{w}}_{j}}}\right|}^{2}}+1},\quad (12c)
βkt=j=1,jkK|(𝝁t)H𝐡~k𝐰jt|2+1.\displaystyle\beta_{k}^{t}=\sum\limits_{j=1,j\neq k}^{K}{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{k}}{\bf{w}}_{j}^{t}}\right|}^{2}}+1}.\quad (12d)

Then, the rate of negative weight of the Eve eavesdropping the kk-th user’s information can be written as

ln(1+γke)=ln(1+j=1,jkK|(𝝁t)H𝐡~e,k𝐰j|2)ln(1+j=1K|(𝝁t)H𝐡~e,k𝐰j|2).\begin{split}-\ln\left({1+\gamma_{k}^{e}}\right)=&\ln\left({1+\sum\limits_{j=1,j\neq k}^{K}{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}{{\bf{w}}_{j}}}\right|}^{2}}}}\right)\\ &-\ln\left({1+\sum\limits_{j=1}^{K}{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}{{\bf{w}}_{j}}}\right|}^{2}}}}\right).\end{split} (13)

The first term of the (13) can be approximated as

ln(1+𝐖H𝛀k𝛀kH𝐖)ln(1+𝛀kH𝐖t)2+2{𝐖H𝛀k𝛀kH𝐖t}𝛀kH𝐖t2𝛀kH𝐖t2(1+𝛀kH𝐖2)1+𝛀kH𝐖t2,\begin{split}&\ln\left({1+{{\bf{W}}^{H}}{{\bf{\Omega}}_{k}}{\bf{\Omega}}_{k}^{H}{\bf{W}}}\right)\\ \vspace{2ex}&\geq{\rm{ln}}\left({1+\left\|{{\bf{\Omega}}_{k}^{H}{{\bf{W}}^{t}}}\right\|{{}^{2}}}\right)+2\Re\left\{{{{\bf{W}}^{H}}{{\bf{\Omega}}_{k}}{\bf{\Omega}}_{k}^{H}{{\bf{W}}^{t}}}\right\}\\ &\ \ \ \ -\left\|{{\bf{\Omega}}_{k}^{H}{{\bf{W}}^{t}}}\right\|{{}^{2}}-\frac{{\left\|{{\bf{\Omega}}_{k}^{H}{{\bf{W}}^{t}}}\right\|^{2}}\left({1+{{\left\|{{\bf{\Omega}}_{k}^{H}{\bf{W}}}\right\|}^{2}}}\right)}{{{\rm{}}1+\left\|{{\bf{\Omega}}_{k}^{H}{{\bf{W}}^{t}}}\right\|^{2}}},\end{split} (14)

where

𝛀k𝛀kH=diag[𝝃e,k,,𝟎MB×MBkthterm,,𝝃e,k].{{\bf{\Omega}}_{k}}{\bf{\Omega}}_{k}^{H}={\rm{diag}}\left[{{\boldsymbol{\xi}_{e,k}},\ldots,\underbrace{{{\bf{0}}_{MB\times MB}}}_{k-{\rm{th\ term}}},\ldots,{\kern 1.0pt}{\boldsymbol{\xi}_{e,k}}}\right]. (15)

In (15), 𝝃e,k{\boldsymbol{\xi}_{e,k}} is calculated as 𝝃e,k=𝐡~e,kH𝝁t(𝝁t)H𝐡~e,k{\boldsymbol{\xi}_{e,k}}={\tilde{\mathbf{h}}}_{e,k}^{H}{\boldsymbol{\mu}^{t}}{\left({{\boldsymbol{\mu}^{t}}}\right)^{H}}{{\tilde{\mathbf{h}}}_{e,k}}. The second term on the right side of (13) can be approximately as

ln(1+χk)ln(1+χkt)1+χk1+χkt+1-\ln\left({1+{\chi_{k}}}\right)\geq-\ln\left({1+\chi_{k}^{t}}\right)-\frac{{1+{\chi_{k}}}}{{1+\chi_{k}^{t}}}+1 (16)

where

χk=j=1K|(𝝁t)H𝐡~e,k𝐰j|2,\displaystyle{\chi_{k}}=\sum\limits_{j=1}^{K}{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}{{\bf{w}}_{j}}}\right|}^{2}}}{\rm{}}, (17a)
χkt=j=1K|(𝝁t)H𝐡~e,k𝐰jt|2.\displaystyle\chi_{k}^{t}=\sum\limits_{j=1}^{K}{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}{\bf{w}}_{j}^{t}}\right|}^{2}}}. (17b)

Finally, based on the above inferences, the WSSR maximization problem 𝒫o{{\cal P}^{o}} can be reformulated as the following sub-problem 𝒫1{{\cal P}^{1}}:

𝒫1:\displaystyle{{\cal P}^{1}}: min𝐖k=1Kηk{2{αktαk}βkt+|αkt|2(βk+|αk|2)βkt(βkt+|αkt|2)\displaystyle\mathop{\min}\limits_{\bf{W}}\ \sum\limits_{k=1}^{K}{{\eta_{k}}}\left\{{-\frac{{2\Re\left\{{\alpha_{k}^{t}{\alpha_{k}}}\right\}}}{{\beta_{k}^{t}}}+\frac{{{{\left|{\alpha_{k}^{t}}\right|}^{2}}\left({{\beta_{k}}+{{\left|{{\alpha_{k}}}\right|}^{2}}}\right)}}{{\beta_{k}^{t}{\rm{}}\left({\beta_{k}^{t}+{{\left|{\alpha_{k}^{t}}\right|}^{2}}}\right)}}}\right.
+χkχkt+12{𝐖H𝛀k𝛀kH𝐖t}\displaystyle\qquad\qquad\qquad+\frac{{{\chi_{k}}}}{{\chi_{k}^{t}+1}}-2\Re\left\{{{{\bf{W}}^{H}}{{\bf{\Omega}}_{k}}{\bf{\Omega}}_{k}^{H}{{\bf{W}}^{t}}}\right\}
+𝛀kH𝐖t2𝛀kH𝐖21+𝛀kH𝐖t2}\displaystyle\qquad\qquad\qquad\left.+\frac{{{\kern 1.0pt}{\kern 1.0pt}\left\|{{\bf{\Omega}}_{k}^{H}{{\bf{W}}^{t}}}\right\|^{2}{{{\left\|{{\bf{\Omega}}_{k}^{H}{\bf{W}}}\right\|}^{2}}}{\kern 1.0pt}}}{{{\rm{}}1+\left\|{{\bf{\Omega}}_{k}^{H}{{\bf{W}}^{t}}}\right\|{\kern 1.0pt}{{\kern 1.0pt}^{2}}}}\right\} (18a)
s.t.C1:k=1K𝐰b,k2Pb,b.\displaystyle{\rm{s}}{\rm{.t}}{\rm{.}}\ C1\ {\rm{:}}\ \sum\limits_{k=1}^{K}{{\rm{}}{{\left\|{{{\bf{w}}_{b,k}}}\right\|}^{{\kern 1.0pt}2}}}\leq{P_{b}}{\rm{,}}\forall b\in{\cal B}.\qquad (18b)

Here, 𝒫1{{\cal P}^{1}} is a convex problem, which can be solved by standard convex optimization techniques or CVX toolbox.

III-B Sub-Problem for Solving Phase Shift 𝛍{\boldsymbol{\mu}}

Similarly, by fixing the BF matrix 𝐖{\bf{W}}, we can rewrite problem 𝒫o{{\cal P}^{o}} as a sub-problem w.r.t. 𝝁{\boldsymbol{\mu}} around the fixed point {𝐰kt,𝝁t}\left\{{{\bf{w}}_{k}^{t},{\boldsymbol{\mu}^{t}}}\right\} as follows:

𝒫2:\displaystyle{{\cal P}^{2}}: min𝝁k=1Kηk{2{αktαk}βkt+|αkt|2(βk+|αk|2)βkt(βkt+|αkt|2)\displaystyle\mathop{\min}\limits_{\boldsymbol{\mu}}{\rm{}}\ \sum\limits_{k=1}^{K}{\eta_{k}}\left\{-\frac{{2\Re\left\{{\alpha_{k}^{t}{\alpha_{k}}}\right\}}}{{\beta_{k}^{t}}}+\frac{{{{\left|{\alpha_{k}^{t}}\right|}^{2}}\left({{\beta_{k}}+{{\left|{{\alpha_{k}}}\right|}^{2}}}\right)}}{{\beta_{k}^{t}{\rm{}}\left({\beta_{k}^{t}+{{\left|{\alpha_{k}^{t}}\right|}^{2}}}\right)}}\right.
+χkχkt+1ln(1+j=1,jkK|(𝝁t)H𝐡~e,k𝐰jt|2)}\displaystyle+\left.\frac{{{\chi_{k}}}}{{\chi_{k}^{t}+1}}-\ln\left({1+\sum\limits_{j=1,j\neq k}^{K}{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}{{{\bf{w}}_{j}^{t}}}}\right|}^{2}}}}\right)\right\} (19a)
s.t.C3:|𝝁n|=1,n{1,,NR},\displaystyle{\rm{s}}{\rm{.t.}}\ C3:\left|{{\boldsymbol{\mu}_{n}}}\right|=1,\forall n\in\left\{{1,\ldots,NR}\right\},
𝝁NR+1=1,\displaystyle\qquad\qquad{\boldsymbol{\mu}_{NR+1}}=1, (19b)

where the calculation of αkt{\alpha_{k}^{t}}, βkt{\beta_{k}^{t}} and χkt\chi_{k}^{t} is the same as (12b), (12d) and (17b) in the previous sub-section. Besides,

αk=𝝁H𝐡~k𝐰kt,\displaystyle{\alpha_{k}}={\boldsymbol{\mu}^{H}}{{\tilde{\mathbf{h}}}_{k}}{\bf{w}}_{k}^{t}, (20a)
βk=j=1,jkK|𝝁H𝐡~k𝐰jt|2+1,\displaystyle{\beta_{k}}=\sum\limits_{j=1,j\neq k}^{K}{{{\left|{{\boldsymbol{\mu}^{H}}{{\tilde{\mathbf{h}}}_{k}}{{\bf{w}}_{j}^{t}}}\right|}^{2}}+1}, (20b)
χk=j=1K|𝝁H𝐡~e,k𝐰jt|2.\displaystyle{\chi_{k}}=\sum\limits_{j=1}^{K}{{\kern 1.0pt}{{\left|{{\boldsymbol{\mu}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}{{\bf{w}}_{j}^{t}}}\right|}^{2}}}. (20c)

For ln(1+j=1,jkK|(𝝁t)H𝐡~e,k𝐰jt|2)\ln\left({1+\sum\limits_{j=1,j\neq k}^{K}{{{\left|{{{\left({{\boldsymbol{\mu}^{t}}}\right)}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}{{{\bf{w}}_{j}^{t}}}}\right|}^{2}}}}\right) in (19a), it can also be approximated as

ln(1+𝝁H𝚿k𝚿kH𝝁)ln(1+𝚿kH𝝁t2)+2{𝝁H𝚿k𝚿kH𝝁t}𝚿kH𝝁t2𝚿kH𝝁t2(1+𝚿kH𝝁2)1+𝚿kH𝝁t2,\begin{split}&\ln\left({1+{\boldsymbol{\mu}^{H}}{{\bf{\Psi}}_{k}}{\bf{\Psi}}_{k}^{H}\boldsymbol{\mu}}\right)\\ &\geq{\rm{ln}}\left({1+{{\left\|{{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\|}^{2}}}\right)+2\Re\left\{{{\boldsymbol{\mu}^{H}}{{\bf{\Psi}}_{k}}{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\}\\ &\ \ \ -{\left\|{{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\|^{2}}-\frac{{{\kern 1.0pt}{\kern 1.0pt}{{\left\|{{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\|}^{2}}{\kern 1.0pt}\left({1+{{\left\|{{\bf{\Psi}}_{k}^{H}\boldsymbol{\mu}}\right\|}^{2}}}\right)}}{{{\rm{}}1+\left\|{{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\|{\kern 1.0pt}{{\kern 1.0pt}^{2}}}},\end{split} (21)

where 𝚿k𝚿kH=j=1,jkK𝐡~e,k𝐰jt(𝐰jt)H𝐡~e,kH{{\bf{\Psi}}_{k}}{\bf{\Psi}}_{k}^{H}=\sum\limits_{j=1,j\neq k}^{K}{{{\tilde{\mathbf{h}}}_{e,k}}{\bf{w}}_{j}^{t}{{({\bf{w}}_{j}^{t})}^{H}}{\tilde{\mathbf{h}}}_{e,k}^{H}}. Omitting the constant term, we can rewrite the problem 𝒫2{{\cal P}^{2}} as

𝒫3:\displaystyle{{\cal P}^{3}}: min𝝁k=1Kηk{2{αktαk}βkt+|αkt|2(βk+|αk|2)βkt(βkt+|αkt|2)\displaystyle\mathop{\min}\limits_{\boldsymbol{\mu}}{\rm{}}\ \sum\limits_{k=1}^{K}{\eta_{k}}\left\{-\frac{{2\Re\left\{{\alpha_{k}^{t}{\alpha_{k}}}\right\}}}{{\beta_{k}^{t}}}+\frac{{{{\left|{\alpha_{k}^{t}}\right|}^{2}}\left({{\beta_{k}}+{{\left|{{\alpha_{k}}}\right|}^{2}}}\right)}}{{\beta_{k}^{t}{\rm{}}\left({\beta_{k}^{t}+{{\left|{\alpha_{k}^{t}}\right|}^{2}}}\right)}}\right.
+χkχkt+12{𝝁H𝚿k𝚿kH𝝁t}\displaystyle\qquad\qquad\qquad+\frac{{{\chi_{k}}}}{{\chi_{k}^{t}+1}}-2\Re\left\{{{\boldsymbol{\mu}^{H}}{{\bf{\Psi}}_{k}}{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\}
+𝚿kH𝝁t2𝚿kH𝝁21+𝚿kH𝝁t2}\displaystyle\qquad\qquad\qquad+\left.\frac{{{\kern 1.0pt}{\kern 1.0pt}{{\left\|{{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\|}^{2}}{\kern 1.0pt}{{{\left\|{{\bf{\Psi}}_{k}^{H}\boldsymbol{\mu}}\right\|}^{2}}}}}{{{\rm{}}1+\left\|{{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\|{\kern 1.0pt}{{\kern 1.0pt}^{2}}}}\right\} (22a)
s.t.C3.\displaystyle{\rm{s}}{\rm{.t.}}\ C3. (22b)

For brevity, we denote ϖ=j=1K𝐰jt(𝐰jt)H\boldsymbol{\varpi}=\sum\limits_{j=1}^{K}{{\bf{w}}_{j}^{t}{{({\bf{w}}_{j}^{t})}^{H}}}, and then βk+|αk|2=𝝁H𝐡~kϖ𝐡~kH𝝁+1{{\beta_{k}}+{{\left|{{\alpha_{k}}}\right|}^{2}}}={\boldsymbol{\mu}^{H}}{{\tilde{\mathbf{h}}}_{k}}\boldsymbol{\varpi}{\tilde{\mathbf{h}}}_{k}^{H}\boldsymbol{\mu}+1, χk=𝝁H𝐡~e,kϖ𝐡~e,kH𝝁{\chi_{k}}={\boldsymbol{\mu}^{H}}{{\tilde{\mathbf{h}}}_{e,k}}\boldsymbol{\varpi}{\tilde{\mathbf{h}}}_{e,k}^{H}\boldsymbol{\mu}. Next, we denote

𝐀k=|αkt|2(𝐡~kϖ𝐡~kH)βkt(βkt+|αkt|2)+𝐡~e,kϖ𝐡~e,kHχkt+1+𝚿k𝚿kH𝚿kH𝝁t21+𝚿kH𝝁t2,\displaystyle{\mathbf{A}_{k}}{\rm{=}}\frac{{{{\left|{\alpha_{k}^{t}}\right|}^{2}}\left({{{\tilde{\mathbf{h}}}_{k}}\boldsymbol{\varpi}{\tilde{\mathbf{h}}}_{k}^{H}}\right)}}{{\beta_{k}^{t}{\rm{}}\left({\beta_{k}^{t}+{{\left|{\alpha_{k}^{t}}\right|}^{2}}}\right)}}+\frac{{{{\tilde{\mathbf{h}}}_{e,k}}\boldsymbol{\varpi}{\tilde{\mathbf{h}}}_{e,k}^{H}}}{{\chi_{k}^{t}+1}}+\frac{{{\kern 1.0pt}{\kern 1.0pt}{{\bf{\Psi}}_{k}}{\bf{\Psi}}_{k}^{H}{{\left\|{{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\|}^{2}}}}{{{\rm{1+}}{\kern 1.0pt}{\kern 1.0pt}{{\left\|{{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}}\right\|}^{2}}}}, (23a)
𝐯k=𝚿k𝚿kH𝝁t+𝐡~k𝐰ktαktβkt.\displaystyle\qquad\qquad\qquad{\mathbf{v}_{k}}{\rm{=}}{\kern 1.0pt}{\kern 1.0pt}{{\bf{\Psi}}_{k}}{\bf{\Psi}}_{k}^{H}{\boldsymbol{\mu}^{t}}+\frac{{{{\tilde{\mathbf{h}}}_{k}}{\bf{w}}_{k}^{t}\alpha_{k}^{t}}}{{\beta_{k}^{t}}}. (23b)

Hence, we can simplify problem 𝒫3{{\cal P}^{3}} as follows:

𝒫4:\displaystyle{{\cal P}^{4}}: min𝝁𝝁H𝐀𝝁2{𝝁H𝐯}\displaystyle\mathop{\min}\limits_{\boldsymbol{\mu}}\ {\rm{}}{\boldsymbol{\mu}^{H}}{\bf{A}}{\kern 1.0pt}\boldsymbol{\mu}-2\Re\left\{{{\boldsymbol{\mu}^{H}}{\bf{v}}}\right\} (24a)
s.t.C3,\displaystyle{\kern 1.0pt}{\kern 1.0pt}{\rm{s}}{\rm{.t.}}\ C3, (24b)

where 𝐀=k=1Kηk𝐀k{\bf{A}}=\sum\limits_{k=1}^{K}{{\eta_{k}}{{\bf{A}}_{k}}}, and 𝐯=k=1Kηk𝐯k{\bf{v}}=\sum\limits_{k=1}^{K}{{\eta_{k}}}{{\bf{v}}_{k}}.

The simplified sub-problem 𝒫4{{\cal P}^{4}} is a quadratic programming (QP) problem with unit modulus constraint. Next, we will employ the alternating direction method of multipliers (ADMM) technology to solve it. Firstly, we introduce a slack variable 𝐩NR+1\mathbf{p}\in{{\mathbb{C}}^{NR+1}}, and the problem 𝒫4{{\cal P}^{4}} can be rewritten as

𝒫5:\displaystyle{{\cal P}^{5}}: min𝐩,𝝁𝐩H𝐀𝐩2{𝐩H𝐯}\displaystyle\mathop{\min}\limits_{{\mathbf{p}},\boldsymbol{\mu}}\ {\rm{}}{{\mathbf{p}}^{H}}{\bf{A}}{\kern 1.0pt}{\mathbf{p}}-2\Re\{{{\mathbf{p}}^{H}}{\bf{v}}\} (25a)
s.t.𝐩=𝝁,\displaystyle{\rm{s}}{\rm{.t.}}\ \ {\mathbf{p}}=\boldsymbol{\mu}, (25b)
C3.\displaystyle\quad\ \ {\kern 1.0pt}{\kern 1.0pt}C3. (25c)

The augmented Lagrangian equation of problem 𝒫5{{\cal P}^{5}} can be expressed as

𝒢(𝐩,𝝁,𝝀)=𝐩H𝐀𝐩2{𝐩H𝐯}{𝝀(𝐩𝝁)}+δ2𝐩𝝁2,\begin{split}\mathbf{{\cal G}}\left({{\mathbf{p}},\boldsymbol{\mu},\boldsymbol{\lambda}}\right)=&{{\mathbf{p}}^{H}}{\bf{A}}{\kern 1.0pt}{\mathbf{p}}-2\Re\{{{\mathbf{p}}^{H}}{\bf{v}}\}\\ &-\Re\left\{{\boldsymbol{\lambda}\left({{\mathbf{p}}-\boldsymbol{\mu}}\right)}\right\}+\frac{\delta}{2}{\left\|{{\mathbf{p}}-\boldsymbol{\mu}}\right\|^{2}},\end{split} (26)

where 𝝀NR+1\boldsymbol{\lambda}\in{{\mathbb{C}}^{NR+1}} and δ0{\delta}\geq 0 represent Lagrangian multipliers. We put the superscript tt of each variable to represent the index of the iteration, and then the process of each iteration is as follows:

𝐩t+1=argmin𝐩𝒢(𝐩t,𝝁t,𝝀t),\displaystyle{{\mathbf{p}}^{t+1}}=\arg{\kern 1.0pt}{\kern 1.0pt}\mathop{\min}\limits_{\mathbf{p}}{\kern 1.0pt}{\kern 1.0pt}{\kern 1.0pt}{\kern 1.0pt}{\kern 1.0pt}{\mathbf{{\cal G}}}\left({{{\mathbf{p}}^{t}},{\boldsymbol{\mu}^{t}},{\boldsymbol{\lambda}^{t}}}\right), (27a)
𝝁t+1=argmin𝝁𝒢(𝐩t+1,𝝁t,𝝀t),\displaystyle{\boldsymbol{\mu}^{t+1}}=\arg{\kern 1.0pt}{\kern 1.0pt}\mathop{\min}\limits_{\boldsymbol{\mu}}{\kern 1.0pt}{\kern 1.0pt}{\kern 1.0pt}{\kern 1.0pt}{\kern 1.0pt}{\mathbf{{\cal G}}}\left({{{\mathbf{p}}^{t+1}},{\boldsymbol{\mu}^{t}},{\boldsymbol{\lambda}^{t}}}\right), (27b)
𝝀t+1=𝝀tδ(𝐩t+1𝝁t+1).\displaystyle{\boldsymbol{\lambda}^{t+1}}={\boldsymbol{\lambda}^{t}}-\delta\left({{{\mathbf{p}}^{t+1}}-{\boldsymbol{\mu}^{t+1}}}\right). (27c)

1) Optimizing 𝐩{\mathbf{p}}: Here, the first-order optimization solves the gradient 𝒢/𝒑\partial{\mathbf{{\cal G}}}/\partial{\boldsymbol{p}} as follows:

𝒢𝐩=2𝐀𝐩t+12𝐯𝝀t+δ(𝐩t+1𝝁t).\frac{{\partial{\mathbf{{\cal G}}}}}{{\partial{\mathbf{p}}}}=2{\bf{A}}{{\mathbf{p}}^{t+1}}-2{\bf{v}}-{\boldsymbol{\lambda}^{t}}+\delta{\rm{(}}{{\mathbf{p}}^{t+1}}-{\boldsymbol{\mu}^{t}}{\rm{)}}. (28)

Let (28) be equal to zero, we can obtain

𝐩t+1=(2𝐀+δ𝐈)1(2𝐯+𝝀t+δ𝝁t).{{\mathbf{p}}^{t+1}}=(2{\bf{A}}+\delta{\bf{I}}{\rm{)}}{{\kern 1.0pt}^{-1}}{\kern 1.0pt}(2{\bf{v}}+{\boldsymbol{\lambda}^{t}}+\delta{\boldsymbol{\mu}^{t}}). (29)

2) Optimizing 𝝁{\boldsymbol{\mu}}: The solution of (27b) is similar to the above, but with the constraint of (25c). Its solution is equivalent to

min|𝝁n|=1,𝝁NR+1=1𝝁(𝐩t+1δ1𝝀t),\mathop{\min}\limits_{\left|{{\boldsymbol{\mu}_{n}}}\right|=1,{\boldsymbol{\mu}_{NR+1}}=1}{\kern 1.0pt}{\kern 1.0pt}{\kern 1.0pt}{\kern 1.0pt}{\kern 1.0pt}\left\|{\boldsymbol{\mu}-({{\mathbf{p}}^{t+1}}-{\delta^{-1}}{\boldsymbol{\lambda}^{t}})}\right\|, (30)

i.e.,

[𝝁t+1]n={[𝐩t+1δ1𝝀t]n|[𝐩t+1δ1𝝀t]n|,[𝐩t+1δ1𝝀t]n0,[𝝁t]n,[𝐩t+1δ1𝝀t]n=0,\begin{split}{\left[{{\boldsymbol{\mu}^{t+1}}}\right]_{{\kern 1.0pt}n}}=\left\{\begin{array}[]{l}\frac{{{{\left[{{\kern 1.0pt}{{\mathbf{p}}^{t+1}}-{\delta^{-1}}{\boldsymbol{\lambda}^{t}}}\right]}_{{\kern 1.0pt}n}}}}{{\left|{{{\left[{{\kern 1.0pt}{{\mathbf{p}}^{t+1}}-{\delta^{-1}}{\boldsymbol{\lambda}^{t}}}\right]}_{n}}}\right|}},\ \ {\left[{{\kern 1.0pt}{{\mathbf{p}}^{t+1}}-{\delta^{-1}}{\boldsymbol{\lambda}^{t}}}\right]_{{\kern 1.0pt}n}}\neq 0,\\ \\ {\left[{{\boldsymbol{\mu}^{t}}}\right]_{n}},\qquad\qquad\quad{\rm{}}{\left[{{\kern 1.0pt}{{\mathbf{p}}^{t+1}}-{\delta^{-1}}{\boldsymbol{\lambda}^{t}}}\right]_{{\kern 1.0pt}n}}=0,{\rm{}}\end{array}\right.\end{split} (31)

where n{1,,NR}\forall n\in\left\{{1,\ldots,NR}\right\}, and |𝝁t+1|NR+1=1{\left|{{\boldsymbol{\mu}^{t+1}}}\right|_{NR+1}}=1.

3) Optimizing 𝝀{\boldsymbol{\lambda}}: From (28), we can solve (27c) as

𝝀t+1=2𝐀𝐩t+12𝐯.{\boldsymbol{\lambda}^{t+1}}=2{\bf{A}}{{\mathbf{p}}^{t+1}}-2{\bf{v}}. (32)

The above three sub-problems can be solved in closed form. Finally, to make the ADMM algorithm converge, we have the following lemma [30].

Lemma 1: The above ADMM algorithm converges, no matter whether 𝝁\boldsymbol{\mu} belongs to a continuous set, as long as the penalty factor δ\delta satisfies:

δ2𝐈𝐀𝟎.\frac{\delta}{2}{\bf{I}}-{\bf{A}}\succ{\bf{0}}. (33)

Proof: The certification process can refer to [32].

Here, we briefly summarize the proposed scheme for solving the original problem 𝒫o{\cal P}^{o}. First, we solve sub-problem 𝒫1{\cal P}^{1} by fixing 𝝁\boldsymbol{\mu}, and then solve sub-problem 𝒫5{\cal P}^{5} based on obtaining 𝐖\mathbf{W} from the 𝒫1{\cal P}^{1}. For Solving 𝒫5{\cal P}^{5}, the ADMM method is applied to alternately iterating (27a), (27b), and (27c) until the result converges. Next, 𝒫1{\cal P}^{1} is re-solved based on obtaining 𝝁\boldsymbol{\mu} from the 𝒫5{\cal P}^{5}, and the above process is repeated until convergence.

Refer to caption
Figure 2: The work process of the joint optimization of assigning RIS extension framework.

IV Extension of the Joint Optimization Framework for Assigning RIS

In previous section, we have proposed the joint optimization framework based on perfect CSI. However, due to the intrinsic high-dimensional form of the RIS channel and many RISs, BSs and users in RIS-aided cell-free network, it is impractical or extremely difficult to obtain CSI of RISs so frequently.

Therefore, here we propose an extended scheme for assigning RISs to users, and then reconsider the WSSR maximization problem. In order to facilitate the description, the concept of two coherent times is introduced as shown in Fig. 2, which is similar to [25]. The proposed Algorithm 1 is based on the obtained CSI at each coherence time. However, the proposed assigning RIS scheme is to obtain all CSI at the start of the large coherence time, and select a few RISs that can provide good secure service quality for the user. After that, we only need the CSI of selected RISs in each subsequent small coherence time, and perform joint optimization problem based on the selected RISs.

IV-A Overview of Assigning RIS

In this section, we propose an assigning RIS optimization scheme that balances the security performance and cost as shown in Fig. 2. Specifically, we select RISs with better secure service quality for joint optimization based on the feature that the RIS with poor service quality has less impact on user secrecy rate. At the start of a large coherence time, a full channel estimation is performed and the RIS with better service quality is selected for each user. After that, in each repeated small coherence time, we only obtain the CSI related to the allocated RIS and perform joint optimization problem. Here we omit the channel estimation of RISs with poor service quality in each small coherence time, which greatly decreases the overhead with a small performance loss. Meanwhile, those RISs that are not screened for user kk will not provide services to it. Because the phase shift of the unscreened RIS without joint optimization is actually equivalent to a random phase shift, the impact on the user’s secrecy rate is very limited. The specific performance loss and impact will be shown in detail later in Section VI.

IV-B Problem Formulation of Assigning RIS

To determine the matching problem among RISs and users, we introduce a matching factor variable lr,kl_{r,k} (l{0,1})\left(l\in\{0,1\}\right) to indicate whether the kk-th user and the rr-th RIS are grouped. When lr,kl_{r,k} is 0, it means that the rr-th RIS does not serve the kk-th user and vice versa. For convenience, we define Lk=[l1,k,,lR,k]T\textbf{L}_{k}=[{l_{1,k}},\ldots,{l_{R,k}}]^{T}. To express the matching problem, we define the virtual received signal of the kk-th user and the Eve eavesdropping on the kk-th user as follows

y^k=b=1Bj=1K(𝐇b,kH+r=1Rlr,k𝐅r,kH𝚯rH𝐆b,r)𝐰b,jsj+nk,\displaystyle{{{{\hat{y}}}}_{k}}=\sum\limits_{b=1}^{B}{\sum\limits_{j=1}^{K}{\left({{\bf{H}}_{b,k}^{H}+\sum\limits_{r=1}^{R}{{l_{r,k}}{\bf{F}}_{r,k}^{H}}{\bf{\Theta}}_{r}^{H}{\bf{G}}_{b,r}}\right)}}{{\bf{w}}_{b,j}}{s_{j}}+{n_{k}}, (34a)
y^ke=b=1Bj=1K(𝐇b,eH+r=1Rlr,k𝐅r,e,kH𝚯rH𝐆b,r)𝐰b,jsj+ne.\displaystyle{{\hat{y}}}_{k}^{e}=\sum\limits_{b=1}^{B}{\sum\limits_{j=1}^{K}{\left({{\bf{H}}_{b,e}^{H}+\sum\limits_{r=1}^{R}{{l_{r,k}}{\bf{F}}_{r,e,k}^{H}}{\bf{\Theta}}_{r}^{H}{\bf{G}}_{b,r}}\right)}}{{\bf{w}}_{b,j}}{s_{j}}+{n_{e}}. (34b)

The virtual achievable secret rate of user kk can be written as

R^s,k=[ln(1+γ^k)ln(1+γ^e,k)]+,{{\hat{R}}_{s,k}}={\left[{\kern 1.0pt}{\ln(1+{{\hat{\gamma}}_{k}})-\ln(1+{{\hat{\gamma}}_{e,k}})}{\kern 1.0pt}\right]^{+}}, (35)

where the virtual SINRs of γ^k{{\hat{\gamma}}_{k}} and γ^e,k{{\hat{\gamma}}_{e,k}} are the same as (7a) and (7b), respectively, which will be given in the following sub-section. We introduce a parameter Rassign{R_{{\rm{assign}}}} to indicate the maximum number of RISs served by each user, where RassignR{R_{{\rm{assign}}}}\leq R. Therefore, the maximum WSSR problem with assigning RIS is formulated as

𝒫assign:\displaystyle{{\cal P}_{assign}}: maxLk,𝐖,𝝁R^S=k=1Kηk(ln(1+γ^k)ln(1+γ^ke))\displaystyle\mathop{\max}\limits_{{\textbf{L}_{k}},{\bf{W}},\boldsymbol{\mu}}{\rm{}}{{\hat{R}}_{S}}=\sum\limits_{k=1}^{K}{{\eta_{k}}\left({\ln\left({1+{{\hat{\gamma}}_{k}}}\right)-\ln\left({1+\hat{\gamma}_{k}^{e}}\right)}\right)} (36a)
s.t.\displaystyle{\rm{s}}{\rm{.t.}} C1:k=1K𝐰b,k2Pb,b,\displaystyle\ \ \ C1:\sum\limits_{k=1}^{K}{{\rm{}}{{\left\|{{{\bf{w}}_{b,k}}}\right\|}^{2}}}\leq{P_{b}}{\rm{,}}\forall b\in{\cal B}, (36b)
C2:|θr,n|=1,r,n𝒩,\displaystyle\ \ \ C2:{\rm{}}\left|{{\theta_{r,n}}}\right|=1,{\rm{}}\forall r\in{\cal R},\forall n\in{\cal N}, (36c)
C4:lr,k{0,1},r,k𝒦,\displaystyle\ \ \ C4:{l_{r,k}}\in\left\{{0,1}\right\},\forall r\in{\cal R},\forall k\in{\cal K}, (36d)
C5:r=1Rlr,kRassign,k𝒦.\displaystyle\ \ \ C5:\sum\limits_{r=1}^{R}{{\kern 1.0pt}{l_{r,k}}\leq}{\kern 1.0pt}{\kern 1.0pt}{R_{assign}},\forall k\in{\cal K}. (36e)

Due to the nonconvex objective function (36a), it is obvious that 𝒫assign{{\cal P}_{assign}} is a nonconvex MINP, which is difficult to solve directively. Next, an effective algorithm is proposed to deal with it.

IV-C Joint Optimization Algorithm for Assigning RIS

When the variable lr,k{l_{r,k}} is fixed, we only need to multiply both 𝐅r,k{{\bf{F}}_{r,k}} and 𝐅r,e,k{{\bf{F}}_{r,e,k}} by a coefficient lr,k{l_{r,k}} to replace the original 𝐅r,k{{\bf{F}}_{r,k}} and 𝐅r,e,k{{\bf{F}}_{r,e,k}}, and then the problem 𝒫assign{{\cal P}_{assign}} can be transformed into the same form as the problem 𝒫o{{\cal P}^{o}} that can be solve by the proposed Algorithm 1 proposed in Section III.

In this section, we mainly focus on the problem of optimizing Lk{\textbf{{L}}_{k}} when 𝐖{\bf{W}} and 𝝁\boldsymbol{\mu} are fixed. To transform 𝒫assign{{\cal P}_{assign}} into a solvable convex problem, we rewrite the mathematical form of the channel. The reflection channels of the kk-th user and the Eve eavesdropping on the kk-th user are denoted as

0:  All channels 𝐇b,k{{\bf{H}}_{b,k}}, 𝐇b,e{{\bf{H}}_{b,e}}, 𝐅r,k{{\bf{F}}_{r,k}}, 𝐅r,e,k{{\bf{F}}_{r,e,k}}, 𝐆b,r{{\bf{G}}_{b,r}}, and noise σk{\sigma_{k}}, σe{\sigma_{e}}.
0:  BF matrix 𝐖{\bf{W}}, phase shift vector 𝝁\boldsymbol{\mu}, User-RIS assigned vector Lk\textbf{{L}}_{k} and the virtual maximum WSSR R^s{{\hat{R}}_{s}}.
1:  Initialize 𝐖t{\bf{W}}^{t}, 𝝁t{\boldsymbol{\mu}}^{t}, Lkt\textbf{{L}}_{k}^{t}, R^st{{\hat{R}}_{s}^{t}}, t=0t=0 and threshold ε\varepsilon;
2:  while RstRst1>ε{R_{s}^{t}}-{R_{s}^{t-1}}>{\varepsilon} do
3:     t=t+1t=t+1;
4:     Update 𝐖t{\bf{W}}^{t} by 𝒫1{{\cal P}^{1}};
5:     Update 𝝁t\boldsymbol{\mu}^{t} by 𝒫5{{\cal P}^{5}};
6:     Update Lkt\textbf{{L}}_{k}^{t} by 𝒫^assign{{\hat{\cal P}}_{assign}};
7:     Update R^st{{\hat{R}}_{s}^{t}} by (36a);
8:  end while
9:  return 𝐖t{\bf{W}}^{t}, 𝝁t{\boldsymbol{\mu}}^{t}, Lkt\textbf{{L}}_{k}^{t}, and R^st{{\hat{R}}_{s}^{t}}.
Algorithm 2 Proposed Joint Optimization AO Algorithm.
b=1Br=1Rlr,k𝐅r,kH𝚯rH𝐆b,r𝐰b,k=r=1Rlr,kar,k𝐰k=LkTak𝐰k,\displaystyle\sum\limits_{b=1}^{B}{\sum\limits_{r=1}^{R}{{l_{r,k}}{\bf{F}}_{r,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}}{{\bf{w}}_{b,k}}=\sum\limits_{r=1}^{R}{{l_{r,k}}{\textbf{{a}}_{r,k}}}{{\bf{w}}_{k}}=\textbf{{L}}_{k}^{T}{\textbf{{a}}_{k}}{{\bf{w}}_{k}}, (37a)
b=1Br=1Rlr,k𝐅r,e,kH𝚯rH𝐆b,r𝐰b,k=r=1Rlr,kar,e,k𝐰k=LkTae,k𝐰k,\displaystyle\sum\limits_{b=1}^{B}{\sum\limits_{r=1}^{R}{{l_{r,k}}{\bf{F}}_{r,e,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}}{{\bf{w}}_{b,k}}=\sum\limits_{r=1}^{R}{{l_{r,k}}{\textbf{{a}}_{r,e,k}}}{{\bf{w}}_{k}}=\textbf{{L}}_{k}^{T}{\textbf{{a}}_{e,k}}{{\bf{w}}_{k}}, (37b)

where ar,k=𝐅r,kH𝚯rH𝐆r{\textbf{{a}}_{r,k}}={{\bf{F}}_{r,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{r}}, ar,e,k=𝐅r,e,kH𝚯rH𝐆r{\textbf{{a}}_{r,e,k}}={{\bf{F}}_{r,e,k}^{H}}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{r}}, 𝐆r=[𝐆1,r,,𝐆b,r]{{\bf{G}}_{r}}=\left[{{{\bf{G}}_{1,r}},\ldots,{{\bf{G}}_{b,r}}}\right], ak=[a1,kT,,aR,kT]T{\textbf{{a}}_{k}}={\left[{\textbf{{a}}_{1,k}^{T},\ldots,\textbf{{a}}_{R,k}^{T}}\right]^{T}}, and ae,k=[a1,e,kT,,aR,e,kT]T{\textbf{{a}}_{e,k}}={\left[{\textbf{{a}}_{1,e,k}^{T},\ldots,\textbf{{a}}_{R,e,k}^{T}}\right]^{T}}. For convenience, we define the following

b=1Br=1R(𝐇b,kH+lr,k𝐅r,kH𝚯rH𝐆b,r)𝐰b,k=ukHbk𝐰k,\displaystyle\sum\limits_{b=1}^{B}{\sum\limits_{r=1}^{R}{\left({{\bf{H}}_{b,k}^{H}+{l_{r,k}}{\bf{F}}_{r,k}^{H}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}}\right)}}{{\bf{w}}_{b,k}}=\textbf{{u}}_{k}^{H}{\textbf{{b}}_{k}}{{\bf{w}}_{k}}, (38a)
b=1Br=1R(𝐇b,eH+lr,k𝐅r,e,kH𝚯rH𝐆b,r)𝐰b,k=ukHbe,k𝐰k,\displaystyle\sum\limits_{b=1}^{B}{\sum\limits_{r=1}^{R}{\left({{\bf{H}}_{b,e}^{H}+{l_{r,k}}{\bf{F}}_{r,e,k}^{H}{\bf{\Theta}}_{r}^{H}{{\bf{G}}_{b,r}}}\right)}}{{\bf{w}}_{b,k}}=\textbf{{u}}_{k}^{H}{\textbf{{b}}_{e,k}}{{\bf{w}}_{k}}, (38b)

where uk=[LkT,1]T{\textbf{{u}}_{k}}={\left[{\textbf{{L}}_{k}^{T},1}\right]^{T}}, bk=[akT,𝐇d,k]T{\textbf{{b}}_{k}}=\left[{\textbf{{a}}_{k}^{T},{{\bf{H}}_{d,k}}}\right]^{T}, be,k=[ae,kT,𝐇d,e]T{\textbf{{b}}_{e,k}}=\left[{\textbf{{a}}_{e,k}^{T},{{\bf{H}}_{d,e}}}\right]^{T}, 𝐇d,k=[𝐇1,kT,,𝐇b,kT]T{{\bf{H}}_{d,k}}={\left[{{\bf{H}}_{1,k}^{T},\ldots,{\bf{H}}_{b,k}^{T}}\right]^{T}}, and 𝐇d,e=[𝐇1,eT,,𝐇b,eT]T{{\bf{H}}_{d,e}}={\left[{{\bf{H}}_{1,e}^{T},\ldots,{\bf{H}}_{b,e}^{T}}\right]^{T}}. Then, the virtual SINR of the received signal of the kk-th user and the Eve eavesdropping the kk-th user’s information can be calculated separately as

γ^k=|ukHb~k𝐰k|2j=1,jkK|ukHb~k𝐰j|2+1,\displaystyle{{\hat{\gamma}}_{k}}=\frac{{{{\left|{\textbf{{u}}_{k}^{H}{\tilde{\textbf{{b}}}_{k}}{{\bf{w}}_{k}}}\right|}^{2}}}}{{\sum\limits_{j=1,j\neq k}^{K}{{{\left|{\textbf{{u}}_{k}^{H}{\tilde{\textbf{{b}}}_{k}}{{\bf{w}}_{j}}}\right|}^{2}}+1}}}, (39a)
γ^ke=|ukHb~e,k𝐰k|2j=1,jkK|ukHb~e,k𝐰j|2+1,\displaystyle\hat{\gamma}_{k}^{e}=\frac{{{{\left|{\textbf{{u}}_{k}^{H}{\tilde{\textbf{{b}}}_{e,k}}{{\bf{w}}_{k}}}\right|}^{2}}}}{{\sum\limits_{j=1,j\neq k}^{K}{{{\left|{\textbf{{u}}_{k}^{H}{\tilde{\textbf{{b}}}_{e,k}}{{\bf{w}}_{j}}}\right|}^{2}}+1}}}, (39b)

where b~k=σk1bk{\tilde{\textbf{{b}}}_{k}}={\sigma_{k}^{-1}}{\textbf{{b}}_{k}} and b~e,k=σe1be,k{\tilde{\textbf{{b}}}_{e,k}}={\sigma_{e}^{-1}}{\textbf{{b}}_{e,k}}. Thus, the achievable virtual secery rate from BSs to the kk-th user can be expressed as

ln(1+γ^k)ln(1+γ^ke)=ln(j=1K|ukHb~k𝐰j|2+1j=1,jkK|ukHb~k𝐰j|2+1j=1,jkK|ukHb~e,k𝐰j|2+1j=1K|ukHb~e,k𝐰j|2+1)=ln(j=1KTr(𝐃k,j𝐔k)+1j=1,jkKTr(𝐃k,j𝐔k)+1j=1,jkKTr(𝐃e,k,j𝐔k)+1j=1KTr(𝐃e,k,j𝐔k)+1)=Tk1+Tk2Tk3Tk4,\begin{split}&\ \ \ \ \ \ln\left({1+{{\hat{\gamma}}_{k}}}\right)-\ln\left({1+\hat{\gamma}_{k}^{e}}\right)\\ =&\ln\left({\frac{{\sum\limits_{j=1}^{K}{{{\left|{\textbf{{u}}_{k}^{H}{\tilde{\textbf{{b}}}_{k}}{{\bf{w}}_{j}}}\right|}^{2}}+1}}}{{\sum\limits_{j=1,j\neq k}^{K}{{{\left|{\textbf{{u}}_{k}^{H}{\tilde{\textbf{{b}}}_{k}}{{\bf{w}}_{j}}}\right|}^{2}}+1}}}\frac{{\sum\limits_{j=1,j\neq k}^{K}{{{\left|{\textbf{{u}}_{k}^{H}{\tilde{\textbf{{b}}}_{e,k}}{{\bf{w}}_{j}}}\right|}^{2}}+1}}}{{\sum\limits_{j=1}^{K}{{{\left|{\textbf{{u}}_{k}^{H}{\tilde{\textbf{{b}}}_{e,k}}{{\bf{w}}_{j}}}\right|}^{2}}+1}}}}\right)\\ =&\ln\left({\frac{{\sum\limits_{j=1}^{K}{{\rm{Tr}}\left({{{\bf{D}}_{k,j}}{{\bf{U}}_{k}}}\right)+1}}}{{\sum\limits_{j=1,j\neq k}^{K}{{\rm{Tr}}\left({{{\bf{D}}_{k,j}}{{\bf{U}}_{k}}}\right)+1}}}\frac{{\sum\limits_{j=1,j\neq k}^{K}{{\rm{Tr}}\left({{{\bf{D}}_{e,k,j}}{{\bf{U}}_{k}}}\right)+1}}}{{\sum\limits_{j=1}^{K}{{\rm{Tr}}({{\bf{D}}_{e,k,j}}{{\bf{U}}_{k}})+1}}}}\right)\\ =&\ \ \ \ T_{k}^{1}+T_{k}^{2}-T_{k}^{3}-T_{k}^{4},\end{split} (40)

where 𝐔k=ukukH{{\bf{U}}_{k}}={\textbf{{u}}_{k}}\textbf{{u}}_{k}^{H} , 𝐃k,j=bk𝐰j𝐰jHbkH{{\bf{D}}_{k,j}}={\textbf{{b}}_{k}}{{\bf{w}}_{j}}{\bf{w}}_{j}^{H}\textbf{{b}}_{k}^{H}, 𝐃e,k,j=be,k𝐰j𝐰jHbe,kH{{\bf{D}}_{e,k,j}}={\textbf{{b}}_{e,k}}{{\bf{w}}_{j}}{\bf{w}}_{j}^{H}\textbf{{b}}_{e,k}^{H}, and Tk1T_{k}^{1}, Tk2T_{k}^{2}, Tk3T_{k}^{3}, Tk4T_{k}^{4} represented by:

Tk1=ln(j=1KTr(𝐃k,j𝐔k)+1),\displaystyle T_{k}^{1}=\ln\left({\sum\limits_{j=1}^{K}{{\rm{Tr}}\left({{{\bf{D}}_{k,j}}{{\bf{U}}_{k}}}\right)+1}}\right){\kern 1.0pt}{\kern 1.0pt}, (41a)
Tk2=ln(j=1,jkKTr(𝐃e,k,j𝐔k)+1),\displaystyle T_{k}^{2}=\ln\left({\sum\limits_{j=1,j\neq k}^{K}{{\rm{Tr}}\left({{{\bf{D}}_{e,k,j}}{{\bf{U}}_{k}}}\right)+1}}\right), (41b)
Tk3=ln(j=1,jkKTr(𝐃k,j𝐔k)+1),\displaystyle T_{k}^{3}=\ln\left({\sum\limits_{j=1,j\neq k}^{K}{{\rm{Tr}}\left({{{\bf{D}}_{k,j}}{{\bf{U}}_{k}}}\right)+1}}\right), (41c)
Tk4=ln(j=1KTr(𝐃e,k,j𝐔k)+1).\displaystyle T_{k}^{4}=\ln\left({\sum\limits_{j=1}^{K}{{\rm{Tr}}({{\bf{D}}_{e,k,j}}{{\bf{U}}_{k}})+1}}\right). (41d)

It is clear that (40) is a difference of convex (DC) function, rather than convex. In order to convert (40) into a convex function, we introduce the first-order Taylor to approximate the global upper bounds of Tk3T_{k}^{3} and Tk4T_{k}^{4}. First of all, for the convex function f(b)f(b) we have:

(1λ)f(a)+λf(b)f((1λ)+λb),\displaystyle\left({1-\lambda}\right)f\left(a\right)+\lambda f\left(b\right)\leq f\left({\left({1-\lambda}\right)+\lambda b}\right), (42a)
f(b)f(a)+f(a+λ(ba))f(a)λ\displaystyle f\left(b\right)\leq f\left(a\right)+\frac{{f\left({a+\lambda\left({b-a}\right)}\right)-f\left(a\right)}}{\lambda}
=f(a)+f(a)(ba),λ0.\displaystyle\qquad=f\left(a\right)+\nabla f\left(a\right)\left({b-a}\right),\lambda\to 0. (42b)

Therefore, around the fixed point {𝐔kt}\left\{{{\mathbf{U}}_{k}^{t}}\right\} we can get

Tk3(𝐔k)\displaystyle T_{k}^{3}\left({{{\bf{U}}_{k}}}\right) Tk3(𝐔kt)+Tr(𝐔kTk3(𝐔kt)H(𝐔k𝐔kt))\displaystyle\leq T_{k}^{3}\left({{\bf{U}}_{k}^{t}}\right)+{\rm{Tr}}\left({{\nabla_{{{\bf{U}}_{k}}}}T_{k}^{3}{{\left({{\bf{U}}_{k}^{t}}\right)}^{H}}\left({{{\bf{U}}_{k}}-{\bf{U}}_{k}^{t}}\right)}\right)
=T~k3(𝐔k,𝐔kt),\displaystyle=\tilde{T}_{k}^{3}\left({{{\bf{U}}_{k}},{\bf{U}}_{k}^{t}}\right), (43a)
Tk4(𝐔k)\displaystyle T_{k}^{4}\left({{{\bf{U}}_{k}}}\right) Tk4(𝐔kt)+Tr(𝐔kTk4(𝐔kt)H(𝐔k𝐔kt))\displaystyle\leq T_{k}^{4}\left({{\bf{U}}_{k}^{t}}\right)+{\rm{Tr}}\left({{\nabla_{{{\bf{U}}_{k}}}}T_{k}^{4}{{\left({{\bf{U}}_{k}^{t}}\right)}^{H}}\left({{{\bf{U}}_{k}}-{\bf{U}}_{k}^{t}}\right)}\right)
=T~k4(𝐔k,𝐔kt),\displaystyle=\tilde{T}_{k}^{4}\left({{{\bf{U}}_{k}},{\bf{U}}_{k}^{t}}\right), (43b)

where

𝐔kTk3(𝐔kt)\displaystyle{\nabla_{{{\bf{U}}_{k}}}}T_{k}^{3}\left({{\bf{U}}_{k}^{t}}\right) =j=1,jkK𝐃k,jj=1,jkKTr(𝐃k,j𝐔kt)+1,\displaystyle=\frac{{\sum\limits_{j=1,j\neq k}^{K}{{{\bf{D}}_{k,j}}}}}{{\sum\limits_{j=1,j\neq k}^{K}{{\rm{Tr}}\left({{{\bf{D}}_{k,j}}{\bf{U}}_{k}^{t}}\right)+1}}}, (44a)
𝐔kTk4(𝐔kt)\displaystyle{\nabla_{{{\bf{U}}_{k}}}}T_{k}^{4}\left({{\bf{U}}_{k}^{t}}\right) =j=1K𝐃e,k,jj=1KTr(𝐃e,k,j𝐔kt)+1.\displaystyle=\frac{{\sum\limits_{j=1}^{K}{{{\bf{D}}_{e,k,j}}}}}{{\sum\limits_{j=1}^{K}{{\rm{Tr}}\left({{{\bf{D}}_{e,k,j}}{\bf{U}}_{k}^{t}}\right)+1}}}. (44b)

Define g(𝐔k)=Tk1Tk2+Tk3+Tk4g\left({{{\bf{U}}_{k}}}\right)=-T_{k}^{1}-T_{k}^{2}+T_{k}^{3}+T_{k}^{4} and g~(𝐔k)=Tk1Tk2+T~k3+T~k4\tilde{g}\left({{{\bf{U}}_{k}}}\right)=-T_{k}^{1}-T_{k}^{2}+\tilde{T}_{k}^{3}+\tilde{T}_{k}^{4}. As long as g(𝐔k)<0g\left({{{\bf{U}}_{k}}}\right)<0 and g~(𝐔k)0\tilde{g}\left({{{\bf{U}}_{k}}}\right)\leq 0, g(𝐔k)g~(𝐔k)g\left({{{\bf{U}}_{k}}}\right)\leq\tilde{g}\left({{{\bf{U}}_{k}}}\right) are satisfied.

Therefore, after fixing 𝐖{\bf{W}} and 𝝁\boldsymbol{\mu}, the problem 𝒫assign{{\cal P}_{assign}} can be transformed into a solvable problem as follows:

𝒫~assign:\displaystyle{{\tilde{\cal P}}_{assign}}: min𝐔kk=1Kηkg~(𝐔k)\displaystyle\mathop{\min{\kern 1.0pt}}\limits_{{{\mathbf{U}}_{k}}}\ \sum\limits_{k=1}^{K}{{\eta_{k}}}\tilde{g}\left({{{\mathbf{U}}_{k}}}\right) (45a)
s.t.\displaystyle{\rm{s}}{\rm{.t.}} C4:lr,k{0,1},r,k𝒦,\displaystyle\ \ C4:{l_{r,k}}\in\left\{{0,1}\right\},\forall r\in{\cal R},\forall k\in{\cal K}, (45b)
C5:r=1Rlr,kRassign,k𝒦,\displaystyle\ \ C5:\sum\limits_{r=1}^{R}{{\kern 1.0pt}{l_{r,k}}\leq}{\kern 1.0pt}{\kern 1.0pt}{R_{assign}},\forall k\in{\cal K}, (45c)
C6:𝐔k𝟎,k𝒦.\displaystyle\ \ C6:{{\mathbf{U}}_{k}}\succeq{\mathbf{0}},\forall k\in{\cal K}. (45d)

Due to the constraints of C4C4 and C5C5, problem 𝒫~assign{{\tilde{\cal P}}_{assign}} is a quadratic problem of zero-one programming, which is still difficult to solve. Here, we use LCR [33] relaxation constraints to obtain a suboptimal solution for the objective function. Accordingly, 𝒫~assign{{\tilde{\cal P}}_{assign}} can be rewritten as:

𝒫^assign:minuk,𝐔kk=1Kηkg~(𝐔k)\displaystyle{{\hat{\cal P}}_{assign}}:\mathop{\min}\limits_{{\textbf{{u}}_{k}},{{\bf{U}}_{k}}}{\kern 1.0pt}{\kern 1.0pt}\sum\limits_{k=1}^{K}{{\eta_{k}}}\tilde{g}\left({{{\mathbf{U}}_{k}}}\right) (46a)
s.t.C7:[𝐔k]i,i=[uk]i,i{1,,R+1},k𝒦,\displaystyle\ {\rm{s}}{\rm{.t.}}\ C7:{\kern 1.0pt}{\left[{{{\bf{U}}_{k}}}\right]_{i,i}}={\left[{{\textbf{{u}}_{k}}}\right]_{i}},\forall i\in\left\{{1,\ldots,R+1}\right\},\forall k\in{\cal K}, (46b)
C8:[uk]R+1=1,k𝒦,\displaystyle\qquad C8:{\kern 1.0pt}{[{\textbf{{u}}_{k}}]_{R+1}}=1,\forall k\in{\cal K}, (46c)
C9:𝟏R+1TukRassign+1,k𝒦,\displaystyle\qquad C9:{\kern 1.0pt}{\bf{1}}_{R+1}^{T}{\textbf{{u}}_{k}}\leq{R_{assign}}+1,\forall k\in{\cal K}, (46d)
C10:𝟏R+1T𝐔k(Rassign+1)ukT,k𝒦,\displaystyle\qquad C10:{\kern 1.0pt}{\bf{1}}_{R+1}^{T}{{\bf{U}}_{k}}\leq\left({{R_{assign}}+1}\right)\textbf{{u}}_{k}^{T},\forall k\in{\cal K}, (46e)
C11:[1ukTuk𝐔k]𝟎,k𝒦,\displaystyle\qquad C11:{\kern 1.0pt}\left[{\begin{array}[]{*{20}{c}}1&{\textbf{{u}}_{k}^{T}}\\ {{\textbf{{u}}_{k}}}&{{{\bf{U}}_{k}}}\end{array}}\right]{\kern 1.0pt}\succeq{\bf{0}},\forall k\in{\cal K}, (46h)

Here the constraints become convex, and 𝒫^assign{{\hat{\cal P}}_{assign}} becomes a resoluble semidefinite programming (SDP) problem. The optimal solution for uk{\textbf{{u}}_{k}} in problem 𝒫^assign{{\hat{\cal P}}_{assign}} can be easily obtained according to modern SDP solvers. Afterwards, to restore to discrete Lk\textbf{{L}}_{k}, we set the first Rassign+1{R_{assign}}+1 larger items of uk{\textbf{{u}}_{k}} to be 1, and the rest are 0, and then take the first RR items of uk{\textbf{{u}}_{k}} as Lk\textbf{{L}}_{k}.

Finally, we summarize the scheme for solving the original problem 𝒫assign{{\cal P}_{assign}} as Algorithm 2. Specifically, by fixing other variables, the solving sub-problems 𝒫1{{{\cal P}}_{1}}, 𝒫5{{{\cal P}}_{5}} and 𝒫^assign{{\hat{\cal P}}_{assign}} are updated separately through the AO approach until the WSSR converges.

V Supplementary Framework

Due to the constraints of realistic conditions, it is challenging to achieve continuous phase adjustment for the reflection coefficient (RC). In this section, we mainly discuss the mode of RC discrete phase adjustment under non-ideal conditions, and analyze the complexity of the above two algorithms.

V-A Non-Ideal Discrete Phase Shift

In Sub-Section II-B, we define {\cal F} as an ideal RIS’s RC that can be continuously adjusted. However, due to the constraints of hardware, the phase of the RIS elements are generally discrete. Here, we still define the amplitude coefficient κr,n{\kappa_{r,n}} as constant 1, and re-define the ideal RC case as 1{\cal F}_{1} and the discrete RC case as 2{\cal F}_{2} [34], [35], i.e.,

1={θr,n|θr,n=ejφr,n,φr,n[0,2π)},\displaystyle{{\cal F}_{1}}{\rm{=}}\left\{{{\theta_{r,{\rm{n}}}}\left|{{\theta_{r,{\rm{n}}}}{\rm{=}}{e^{j{\varphi_{r,n}}}}}\right.,{\varphi_{r,n}}\in\left[{0,\left.{2\pi}\right)}\right.}\right\}, (47a)
2={θr,n|θr,n=ejφr,n,φr,n{0,2πL,,2π(L1)L}},\displaystyle{{\cal F}_{2}}{\rm{=}}\left\{{{\theta_{r,{\rm{n}}}}\left|{{\theta_{r,{\rm{n}}}}{\rm{=}}{e^{j{\varphi_{r,n}}}}}\right.,{\varphi_{r,n}}\in\left\{{0,\frac{{2\pi}}{L},\ldots,\frac{{2\pi\left({L-1}\right)}}{L}}\right\}}\right\}, (47b)

where LL means 2{{\cal F}_{2}} has LL discrete phase shift values.

To solve the discrete RC problem, we can project continuous θr,n{\theta_{r,{\rm{n}}}} from 1{{\cal F}_{1}} to 2{{\cal F}_{2}} to obtain discrete θr,no{\theta_{r,{\rm{n}}}^{o}} [36]. Specifically, we relax the discrete RC θr,no{\theta_{r,{\rm{n}}}^{o}} to a continuous RC θr,n{\theta_{r,{\rm{n}}}}, and then obtain the sub-optimal solution 𝝁{\boldsymbol{\mu}^{*}} in each iteration to optimize the continuous 𝝁{\boldsymbol{\mu}}, thereby obtaining the sub-optimal θr,n\theta_{r,n}^{*}. Project θr,n\theta_{r,n}^{*} from 1{{\cal F}_{1}} to 2{{\cal F}_{2}}, the specific method of projection is θr,no=argminΦ2|θr,nΦ|.\angle{\theta_{r,{\rm{n}}}^{o}}=\mathop{\arg{\rm{min}}}\limits_{\Phi\in{{\cal F}_{2}}}\left|{\angle\theta_{r,n}^{*}-\angle\Phi}\right|. Therefore, we can obtain the sub-optimal solution of the phase shift optimization for each iteration sub-problem. Although the previous joint optimization is based on continuous phase shift, the convergence is not yet known. The simulation in Section VI show that the discrete phase shift optimization also has good convergence.

V-B Algorithmic Complexity

In this subsection, we calculate the computational complexity of the proposed two algorithms. When applying the ADMM algorithm to solve 𝝁\boldsymbol{\mu}, the computational complexity is 𝒪(TADMM(RN+1)2){\cal O}({{T_{ADMM}}{{({RN+1})}^{2}}}), where TADMM{T_{ADMM}} symbolize the number of iterations required for 𝝁\boldsymbol{\mu} to converge. Thus, the computational complexity of Algorithm 1 is 𝒪(To(B2M2K2(NR+1)+BMK2(NR+1)2+TADMM{\cal O}({T_{o}}({B^{2}}{M^{2}}{K^{2}}({NR+1})+BM{K^{2}}{{({NR+1})}^{2}}+{T_{ADMM}} (RN+1)2)){{({RN+1})}^{2}})), where To{T_{o}} is the number of iterations required for algorithm convergence. Similarly, the computational complexity of Algorithm 2 is 𝒪(To(B2M2K2(NR+1){\cal O}\left({T_{o}}\left({B^{2}}{M^{2}}{K^{2}}({NR+1})\right.\right. +BMK2(NR+1)2+TADMM(RN+1)2+K(R+1)3\left.\left.+BM{K^{2}}{{({NR+1})}^{2}}+{T_{ADMM}}{{({RN+1})}^{2}}+K{{({R+1})}^{3}}\right.\right. (KR+1)2.5)){{({KR+1})}^{2.5}})).

VI Numerical Results

In this section, we numerically analyze the performance of the proposed AO scheme and the extended assigning RIS scheme.

Refer to caption
Figure 3: The IRS-aided cell-free network MISO system model.

We use three-dimensional coordinates in the evaluation to demonstrate the simulation scene as shown in Fig. 3. We deploy three BSs to serve three users and one Eve. Meanwhile, we assume that there are buildings that affect users and Eve to receive signals, and thus we deploy two RISs on the distant high ground to enhance the secrecy rate. Assume that three BSs have a height of 4 m and are located at (10 m, 0 m, 4 m), (50 m, 0 m, 4 m) and (50 m, 0 m, 4 m). The three users and Eve in the distance are located at (30 m, 50 m, 1.5 m), (35 m, 50 m, 1.5 m), (40 m, 50 m, 1.5 m), and (35 m, 40 m, 1.5 m) respectively, and the two RISs farther away are located at (30 m, 60 m, 8 m) and (70 m, 60 m, 8 m), respectively.

To match the real scene in the cell-free network, we set a small number of antennas in the BSs to M=5M=5, and the transmit power of the BS to Pb=0P_{b}=0 dBm. The noise power of user kk and Eve is σk2=σe2=80\sigma_{k}^{2}=\sigma_{e}^{2}=-80 dBm, and the weight of the user is set to ηk=1{\eta_{k}}=1 for ease of calculation. Assume that the number of elements in each RIS is N=50N=50. Both our direct channel and reflected channel follow a distance-dependent path loss model [26]. We formulate the channel fading model as 𝐇=L0(dd0)τ𝐇,{\bf{H}}{\rm{=}}\sqrt{{L_{0}}{{\left({\frac{d}{{{d_{0}}}}}\right)}^{-\tau}}}{{\bf{H}}^{*}}, where L0{L_{0}} represents the path loss of the reference distance d0=1{d_{0}}=1 m, d{d} represents the distance between the transmitting place and the receiving place, τ\tau represents the path loss exponent, and 𝐇{{\bf{H}}^{*}} represents the small-scale fading model. Here we consider 𝐇{{\bf{H}}^{*}} as a Rician fading channel [30], which is calculated as 𝐇=KK+1𝐇LoS+1K+1𝐇NLoS,{{{\bf{H}}^{*}}=\sqrt{\frac{{K^{\prime}}}{{K^{\prime}+1}}}{\bf{H}}_{LoS}^{*}+\sqrt{\frac{1}{{K^{\prime}+1}}}{\bf{H}}_{NLoS}^{*}},

TABLE I: List of Key Notations
Parameter Value
Path loss exponent τBU=τBE=3.5{\tau_{BU}}={\tau_{BE}}=3.5, τRU=τRE=2.5{\tau_{RU}}={\tau_{RE}}=2.5, τBR=2.0{\tau_{BR}}=2.0
Rician channel factor KBU=KBE=0{{K^{\prime}}_{BU}}={{K^{\prime}}_{BE}}=0, KBR=KRU=KRE=3{{K^{\prime}}_{BR}}={{K^{\prime}}_{RU}}={{K^{\prime}}_{RE}}=3
The Inter-antenna separation distance dr=dt=λ/2{d_{r}}={d_{t}}={\lambda}/2
Path loss at 1 meter L0=30{L_{0}}=-30 dB

where K{K^{\prime}} is the Rician factor, and 𝐇LoS{\bf{H}}_{LoS}^{*} and 𝐇NLoS{\bf{H}}_{NLoS}^{*} are the line-of-sight (LoS) and Rayleigh fading components, respectively. 𝐇LoS{\bf{H}}_{LoS}^{*} is calculated as 𝐇LoS=𝐪(ϑAoA)𝐪(ϑAoD)H{\bf{H}}_{LoS}^{*}={\bf{q}}\left({{\vartheta^{AoA}}}\right){\bf{q}}{\left({{\vartheta^{AoD}}}\right)^{H}}, where 𝐪(ϑAoA)=exp(0,,j2πdrλ(Dr1)sinϑAoA)T{\bf{q}}\left({{\vartheta^{AoA}}}\right)=\exp{\left({0,\ldots,j\frac{{2\pi{d_{r}}}}{\lambda}({D_{r}}-1)\sin{\vartheta^{AoA}}}\right)^{T}}, and 𝐪(ϑAoD)=exp(0,,j2πdtλ(Dt1)sinϑAoD)T{\bf{q}}\left({{\vartheta^{AoD}}}\right)=\exp{\left({0,\ldots,j\frac{{2\pi{d_{t}}}}{\lambda}({D_{t}}-1)\sin{\vartheta^{AoD}}}\right)^{T}}, here ϑAoA{\vartheta^{AoA}}, dr{d_{r}}, and Dr{D_{r}} respectively represent the angle of arrival (AoA) of the receiver, the number of antennas, and the separation distance between antennas. ϑAoD{\vartheta^{AoD}}, dr{d_{r}}, and Dr{D_{r}} respectively represent the angle of departure (AoD) of the transmitter, the number of antennas, and the separation distance between antennas, and λ\lambda is the wavelength [30]. The specific parameters setting can be found in Table I.

To show the convergence of our proposed algorithms, Fig. 4 plots the WSSR versus the number of iterations. Here, the legends have the following meanings: Ideal RIS case: without assigning RIS and continuous phase shift and perfect CSI obtained from Algorithm 1. Discrete phase shift: discrete 3-bit phase shift while performing the steps mentioned in Section V-A. Assigning RIS scheme: assuming RAssign=1R_{Assign}=1, then execute Algorithm 2 with the phase shift being continuous. Random phase shift: the initial phase shift is random, and only the BF vector 𝐖{\bf{W}} is optimized without optimizing the phase shift. Without RIS: there is no RIS in the scene.

From Fig. 4, we can observe that all curves increase with the number of iterations until convergence, which is achieved within 13 iterations. This confirms that the relaxation constraint conditions of the “Assigning RIS scheme” have minor effect on the convergence. Although the “Discrete phase shift scheme” is previously unpredictable, it has now also been shown to converge quickly.

Refer to caption
Figure 4: Weighted sum secrecy rate versus the number of iterations.

In addition, we can observe that the RIS-aided WSSR is much higher than the WSSR without RIS, which also proves the importance of the RISs in improving the secrecy rate. For the “Assigning RIS scheme”, although the user is served by one RIS at most, its performance is close to that of the “Ideal case”. One can also observe that the performance of “Random phase shift” without optimizing the phase shift is close to that of the network without RIS assistance, which shows that the “Assigning RIS scheme” is reasonable in numerical evaluation compared with the situation that all RISs serve users.

Next, we evaluate the impact of the key parameters on the WSSR. The parameters are the same as the above unless otherwise stated.

1) Relationship between the WSSR and the BS transmit power: As shown in Fig. 5, the WSSR grow rapidly with the BS transmit power under all schemes. It is worth noting that the WSSR of our proposed “Assigning RIS scheme” is close to that of the “Ideal RIS case”. Specifically, one can observe that when the BS transmit power is small, the WSSR of all schemes is close to zero, and as the transmit power increases, the WSSR ratio of all RIS-aided schemes relative to the without RIS-aided scheme gradually decreases. Here, it can be explained that when the BS transmit power is relatively small, the WSSR contribution of RIS to the network is more obvious, because the BSs tend to assign more power to the reflection links. When the BS transmit power is relatively high, the WSSR contribution of RIS to the network is significantly reduced, because the BSs are more inclined to assign more power to the direct channel for transmission. In addition, we can also find that the performance of the “Discrete phase shift” is relatively closer to the “Without RIS” as the transmit power increases.

Refer to caption
Figure 5: Weighted sum secrecy rate versus the BS transmit power PbP_{b}.

2) Relationship between the WSSR and the number of RIS elements: Fig. 6 shows the WSSR versus the number of RIS elements. As expected, the WSSR remains a constant for different number of RIS elements under Without RIS scheme. In contrast, the WSSR for all cases with RIS increases approximately linearly with the RIS elements. This can be explained as follows: as NN increases, the RIS can receive and reflect more signal energy to the user, yielding a stronger received signals. Although the RIS with larger elements can obtain a higher WSSR, it requires more overhead to obtain the CSI. Thus, we need to balance the system performance and overhead, and then select the suitable number of RIS elements in practice.

Refer to caption
Figure 6: Weighted sum secrecy rate versus the number of RIS elements NN.

3) Relationship between the WSSR and the distance L0L_{0}: Here we set the two-dimensional coordinates of three users and the Eve to (L05{L_{0}}-5 m, 50 m), (L0L_{0} m, 50 m), (L0+5L_{0}+5 m, 50 m), and (L0L_{0} m, 40 m) respectively, and plot Fig. 7 according to the relationship between the WSSR and L0L_{0}. It can be observed that the WSSR reaches its peak at L0=30L_{0}=30 m and L0=70L_{0}=70 m with the RIS-aided curve. That is, as the user and Eve move away from these two points, the WSSR decreases. It indicates that when users and Eve approach the RIS, the signal reflected by the RIS will be stronger, so the users can obtain a higher secrecy rate. Based on the above, in practice we can obtain a better security performance through reasonable deployment of RISs. In addition, we can also observe that the average performance loss of the “Assign RIS scheme” compared to the “Ideal RIS case” is minor, which also shows the effectiveness of our proposed “Assign RIS scheme”.

Refer to caption
Figure 7: Weighted sum secrecy rate versus the distance L0L_{0}.
Refer to caption
Figure 8: Weighted sum secrecy rate versus the number of users.

4) Relationship between the WSSR and the number of users: Fig. 8 illustrates the WSSR versus the number of users. Here, we reset the two-dimensional coordinate position of the kk-th user to (30+kk m, 50 m), and the total number of users to KK. We also redefine 2 curves (“1-bit phase shift” means 1-bit discrete phase shift scheme, and “3-bit phase shift” means 3-bit discrete phase shift scheme). Generally, we can observe that the WSSR increases with the number of users. Here, we can explain the above phenomenon as follow: when the number of users is less than that of BS antennas, the interference among users has little effect on the secrecy rate. Therefore, the WSSR increases with the number of users. In addition, we can also observe that as the resolution of the phase shifter increases, the performance of the system also increases. Nonetheless, it requires higher technical complexity and overhead. Finally, we can find that the solution “Assign RIS scheme” can still maintain similar performance to the “Ideal RIS case”, which again indicates the effectiveness of our proposed Algorithm 2.

5) Reconstruction of the relationship between the WSSR and the number of RIS elements: To evaluate the impact of the number of RISs allocated by Algorithm 2 on the overall performance of the system, in this part, we re-plan the system model of the network. Specifically, we added the number of RISs to R=5R=5 and located in (10+20(r1)10+20(r-1) m, 60 m), and further define three schemes Rassign=1R_{assign}=1, Rassign=2R_{assign}=2, and Rassign=3R_{assign}=3 respectively, and other system parameters are assumed to be the same as VI-A. On this basis, we plot Fig. 9 to show the variation of WSSR over the number of RIS elements.

Refer to caption
Figure 9: Weighted sum secrecy rate versus the number of elements at RIS.

From Fig. 9, we intuitively find that as the number of arranged RISs increases, the WSSR with the RIS-aided scheme grows much more than that in Fig. 6. Meanwhile, the WSSR increases with the RIS elements, which is easy to understand. Additionally, we can find that as the number of RISs allocated to each user increases, the WSSR also increases. It is because that as the number of RISs increases, the signals reflected by RISs becomes stronger, and thus users can obtain a higher secrecy rate. Although users with more allocated RISs can achieve a higher WSSR, it requires more overhead to obtain the CSI, increasing the technique complexity. Therefore, we need to balance system performance and overhand, and select the suitable number of RISs services for users in practice.

VII Conclusion

In this paper, we investigated the secure transmission in the RIS-aided cell-free networks. We proposed a joint active and passive optimization at the BSs and RISs to maximize the WSSR. To lower the complexity and overhead, we extended the proposed scheme to the cases with discrete phase shift and RIS nulling. Simulation results showed that the distributed low cost RIS-aided cell free network can obtain a better performance than the traditional cell-free networks. Meanwhile, it was illustrated that there exists a tradeoff between system performance and complexity/overhead.

References

  • [1] R. Borralho, A. Mohamed, A. U. Quddus, P. Vieira, and R. Tafazolli, “A Survey on Coverage Enhancement in Cellular Networks: Challenges and Solutions for Future Deployments,” IEEE Commun. Surv. Tutor., vol. 23, no. 2, pp. 1302-1341, Secondquarter 2021.
  • [2] M. A. Adedoyin and O. E. Falowo, “Combination of Ultra-Dense Networks and Other 5G Enabling Technologies: A Survey,” IEEE Access, vol. 8, pp. 22893-22932, 2020.
  • [3] G. Chopra, R. K. Jha and, S. Jain, “Security issues in ultra dense network for 5G scenario,” in Proc. Int. Conf. Commun. Syst. Networks, COMSNETS, 2018, pp. 510-512.
  • [4] R. Huangi, J. Si, J. Shi, and Z. Li, “Deep-Reinforcement-Learning-Based Resource Allocation in ultra-dense network,” in Proc. Int. Conf. Wirel. Commun. Signal Process., WCSP, 2021, pp. 1-5.
  • [5] D. Yu, H. Lee, S.-E. Hong, and S.-H. Park, “Weighted MMSE Optimization of Conjugate Beamforming for Cell-Free Massive MIMO,” in Proc. Int. Conf. Ubiquitous Future Netw., ICUFN, 2021, pp. 261-263.
  • [6] G. Interdonato, M. Karlsson, E. Björnson, and E. G. Larsson, “Local Partial Zero-Forcing Precoding for Cell-Free Massive MIMO,” IEEE Trans. Wireless Commun., vol. 19, no. 7, pp. 4758-4774, July 2020.
  • [7] G. Interdonato, P. Frenger, and E. G. Larsson, “Scalability Aspects of Cell-Free Massive MIMO,” in Proc. IEEE Int. Conf. Commun., ICC, 2019, pp. 1-6.
  • [8] S. Mosleh, H. Almosa, E. Perrins, and L. Liu, “Downlink Resource Allocation in Cell-Free Massive MIMO Systems,” in Proc. Int. Conf. Comput., Netw. Commun., ICNC, 2019, pp. 883-887.
  • [9] S. Zeng, H. Zhang, B. Di, Z. Han, and L. Song, “Reconfigurable Intelligent Surface (RIS) Assisted Wireless Coverage Extension: RIS Orientation and Location Optimization,” IEEE Commun. Lett., vol. 25, no. 1, pp. 269-273, Jan. 2021.
  • [10] J. Li, S. Xu, J. Liu, Y. Cao, and W. Gao, “Reconfigurable Intelligent Surface Enhanced Secure Aerial-Ground Communication,” IEEE Trans. Commun., vol. 69, no. 9, pp. 6185-6197, Sept. 2021.
  • [11] G. Zhou, C. Pan, H. Ren, K. Wang, and Z. Peng, “Secure Wireless Communication in RIS-Aided MISO System With Hardware Impairments,” IEEE Wireless Commun. Lett., vol. 10, no. 6, pp. 1309-1313, June 2021.
  • [12] H. Shen, W. Xu, S. Gong, Z. He, and C. Zhao, “Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted Multi-Antenna Communications,” IEEE Commun. Lett., vol. 23, no. 9, pp. 1488-1492, Sept. 2019.
  • [13] L. Zhai, Y. Zou, J. Zhu, and B. Li, “Improving Physical Layer Security in IRS-Aided WPCN Multicast Systems via Stackelberg Game,” IEEE T. Commun. 2022.
  • [14] Y. Wu, A. Khisti, C. Xiao, G. Caire, K. -K. Wong, and X. Gao, “A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679-695, April 2018.
  • [15] Y. Ai, F. A. P. deFigueiredo, L. Kong, M. Cheffena, S. Chatzinotas, and B. Ottersten, “Secure Vehicular Communications Through Reconfigurable Intelligent Surfaces,” IEEE T. Veh. Technol., vol. 70, no. 7, pp. 7272-7276, July 2021.
  • [16] A. Makarfi, K. Rabie, O. Kaiwartya, O. Badarneh, G. Nauryzbayev, and R. Kharel, “Physical Layer Security in RIS-assisted Networks in Fisher-Snedecor Composite Fading,” in Proc. Int. Symp. Commun. Syst., Networks Digit. Signal Process., CSNDSP, 2020, pp. 1-6.
  • [17] S. Timilsina, D. Kudathanthirige, and G. Amarasuriya, “Physical Layer Security in Cell-Free Massive MIMO,” in Proc. IEEE Glob. Commun. Conf., GLOBECOM, 2018, pp. 1-7.
  • [18] X. Wang, Y. Gao, G. Zhang, and M. Guo, “Security Performance Analysis of Cell-Free Massive MIMO over Spatially Correlated Rayleigh Fading Channels with Active Spoofing Attack,” in Proc. Int. Conf. Wirel. Commun. Signal Process., WCSP, 2020, pp. 540-545.
  • [19] M. Cui, G. Zhang, and R. Zhang, “Secure Wireless Communication via Intelligent Reflecting Surface,” IEEE Wireless Commun. Lett., vol. 8, no. 5, pp. 1410-1414, Oct. 2019.
  • [20] B. Feng, Y. Wu, and M. Zheng, “Secure Transmission Strategy for Intelligent Reflecting Surface Enhanced Wireless System,” in Proc. Int. Conf. Wirel. Commun. Signal Process., WCSP, 2019, pp. 1-6.
  • [21] D. Xu, X. Yu, Y. Sun, D. W. K. Ng, and R. Schober, “Resource Allocation for Secure IRS-Assisted Multiuser MISO Systems,” in Proc. IEEE Globecom Workshops, GC Wkshps, 2019, pp. 1-6.
  • [22] L. Lv, Q. Wu, Z. Li, N. Al-Dhahir, and J. Chen, “Secure Two-Way Communications via Intelligent Reflecting Surfaces,” IEEE Commun. Lett., vol. 25, no. 3, pp. 744-748, March 2021.
  • [23] H. Yang, Z. Xiong, J. Zhao, D. Niyato, L. Xiao, and Q. Wu, “Deep Reinforcement Learning-Based Intelligent Reflecting Surface for Secure Wireless Communications,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 375-388, Jan. 2021.
  • [24] U. Siddique, H. Tabassum, and E. Hossain, “Downlink spectrum allocation for in-band and out-band wireless backhauling of full-duplex small cells,” IEEE Trans. Commun., vol. 65, no. 8, pp. 3538-3554, Aug. 2017.
  • [25] Z. Zhang and L. Dai, “A Joint Precoding Framework for Wideband Reconfigurable Intelligent Surface-Aided Cell-Free Network,” IEEE Trans. Signal Process., vol. 69, pp. 4085-4101, 2021.
  • [26] J. Li, L. Zhang, K. Xue, Y. Fang, and Q. Sun, “Secure Transmission by Leveraging Multiple Intelligent Reflecting Surfaces in MISO Systems,” IEEE. Trans. Mob. Comput.
  • [27] Q. Wu and R. Zhang, “Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming,” IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5394-5409, Nov. 2019.
  • [28] C. Pan et al., “Intelligent Reflecting Surface Aided MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer,” IEEE J. Sel. Area. Comm., vol. 38, no. 8, pp. 1719-1734, Aug. 2020.
  • [29] Q. Zheng et al., “Ultra-wideband side-lobe level suppression using amplitude-adjustable metasurfaces,” J. Phys. D: Appl. Phys., vol. 52, no. 6, Dec. 2018, Art. no. 065102.
  • [30] H. Niu, Z. Chu, F. Zhou, Z. Zhu, M. Zhang, and K. -K. Wong, “Weighted Sum Secrecy Rate Maximization Using Intelligent Reflecting Surface,” IEEE Trans. Commun., vol. 69, no. 9, pp. 6170-6184, Sept. 2021.
  • [31] J. Chen, Y.-C. Liang, Y. Pei, and H. Guo, “Intelligent Reflecting Surface: A Programmable Wireless Environment for Physical Layer Security,” IEEE Access, vol. 7, pp. 82599-82612, 2019.
  • [32] Y. Wang, W. Yin, and J. Zeng, “Global convergence of ADMM in nonconvex nonsmooth optimization,” Journal of Scientific Computing, vol. 78, no. 1, pp. 29-63, 2019.
  • [33] T. Nie, S.-C. Fang, Z. Deng, and J. E. Lavery, “On linear conic relaxation of discrete quadratic programs,” Optim. Methods Softw., vol. 31, pp. 737-754,Jan. 2016.
  • [34] L. Dai et al., “Reconfigurable Intelligent Surface-Based Wireless Communications: Antenna Design, Prototyping, and Experimental Results,” IEEE Access, vol. 8, pp. 45913-45923, 2020.
  • [35] H. Guo, Y.-C. Liang, J. Chen, and E. G. Larsson, “Weighted Sum-Rate Maximization for Intelligent Reflecting Surface Enhanced Wireless Networks,” in Proc. IEEE Glob. Commun. Conf., GLOBECOM, 2019.
  • [36] G. Amarasuriya, R. F. Schaefer, and H. Vincent Poor, “Linear Precoder Design for Physical Layer Security via Reconfigurable Intelligent Surfaces,” in Proc. IEEE Workshop Signal Process. Adv. Wireless Commun. SPAWC, 2020, pp. 1-5.