In this paper, we investigate the design of secure transmission frameworks with an intelligent reflecting surface (IRS). Our design aims to minimize the system energy consumption in cases of rank-one and full-rank access point (AP)-IRS links. To facilitate the design, the problem is divided into two parts: design of beamforming vector at AP and phase shift at IRS. In the rank-one channel model, the beamforming vector design and phase shift design are independent. A closed-form expression of beamforming vector is derived. Meanwhile, some algorithms, including the semidefinite relaxation algorithm and projected gradient algorithm, are taken to solve the phase shift problem in the case of instantaneous channel, and in the statistical channel model, the impact of phase shift on the overall system is analyzed. However, since beamforming and phase shift depend on each other in the full-rank model, we refer to conventional wiretap model and utilize an eigenvalue-based algorithm to obtain beamforming vector, while the aforementioned two phase optimization schemes are also applied. Simulation results show that the IRS-enhanced system is envisioned to improve physical layer security.
In this paper, we investigate a large intelligent surface-enhanced (LIS-enhanced) system, where a LIS is deployed to assist secure transmission. Our design aims to maximize the achievable secrecy rates in different channel models, i.e., Rician fading and (or) independent and identically distributed Gaussian fading for the legitimate and eavesdropper channels. In addition, we take into consideration an artificial noise-aided transmission structure for further improving system performance. The difficulties of tackling the aforementioned problems are the structure of the expected secrecy rate expressions and the non-convex phase shift constraint. To facilitate the design, we propose two frameworks, namely the sample average approximation based (SAA-based) algorithm and the hybrid stochastic projected gradient-convergent policy (hybrid SPG-CP) algorithm, to calculate the expectation terms in the secrecy rate expressions. Meanwhile, majorization minimization (MM) is adopted to address the non-convexity of the phase shift constraint. In addition, we give some analyses on two special scenarios by making full use of the expectation terms. Simulation results show that the proposed algorithms effectively optimize the secrecy communication rate for the considered setup, and the LIS-enhanced system greatly improves secrecy performance compared to conventional architectures without LIS.
In this paper, we propose a preamble based medium access control (P-MAC) mechanism in Ad-Hoc network.Different from traditional carrier sense multiple access (CSMA) in Ad-Hoc network, P-MAC uses much shorter preamble to establish the network. First, we propose the P-MAC mechanism to shorten the time of establishing the Ad-Hoc network. Based on the P-MAC, we propose a more efficient way to maintain the network. Next, focusing on the power line communication (PLC) network which is a kind of Ad-Hoc network, we propose a frequency division power line communication (FD-PLC) network architecture to obtain the best communication frequency. To obtain the best frequency, i.e., highest SNR, we design the frequency sweeping mechanism which can determine the frequency of uplink and downlink communication before the transmitter and receiver communicate. Due to the large-scale networks in industry, P-MAC can be exploited to speed up the establishment of the Ad-Hoc PLC network. Finally, we compare our mechanism with CSMA. Numerical results indicate that our strategy greatly shortens the time of establishing the Ad-Hoc network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.