We consider a downlink multiuser RIS network as shown in Fig. 1, where we have a base station (BS) and communicates with legitimate users while ground eavesdroppers are attempting to wiretap communications. The BS, legitimate users, and eavesdroppers are equipped multiple antennas denoted as and formulating uniform linear arrays (ULA). The RIS is equipped with elements. The coordinates of UAV, legitimate user , eavesdropper , and the RIS are respectively given as , , , and .
where is the channel power gain at the reference distance m, is the distance between the BS and the users, and and are the pathloss exponents. is the Rician factor between the BS and users. are assumed to be independent and identically distributed variables following circularly symmetric complex Gaussian distribution with zero mean and unit variance. and are given as follows
|
|
|
(4) |
|
|
|
(5) |
where
where and are the antenna elements separation distance for the case of BS, legitimate user , and eavesdropper , respectively. and are the azimuth and elevation angles of departure. and represent are the azimuth and elevation angles of arrival. The LoS channel between the is given as follows
|
|
|
(6) |
The array responses and are defined as
|
|
|
|
(7) |
|
|
|
|
|
|
|
(8) |
where and represent RIS elements separation distance along x-axis and z-axis, respectively. and are the RIS elements along the x-axis and z-axis, respectively. and with and respectively represent the azimuth angle of arrival and the elevation angle of arrival. is the wavelength. is the angle of departure. The channels between the users and the RIS contain both LoS and NLoS. Using Rician channel modeling, these channels are given as
|
|
|
(9) |
where is the distance between the RIS and the user and is the pathloss exponent. and respectively denote the NLoS link between the RIS and the user, RIS and the eavesdropper, which are modeled as complex Gaussian distributed with zero mean and unit variance. is the LoS link between the user and the RIS can be expressed as
|
|
|
|
(10) |
|
|
|
|
where and respectively represent the azimuth angle of arrival and the elevation angle of arrival of the RIS and the user link. The transmit signal at the BS can be expressed as
|
|
|
(11) |
where with is the precoding matrix, is the information signal with , and is the artificial noise vector due to the hardware imperfections where and is the proportionality coefficient to characterize the hardware impairments. Let with represents the phase shift of the element . The received signal can be given as
|
|
|
|
(12) |
|
|
|
|
where is the additive white Gaussian noise (AWGN). Similarly, the signal of the eavesdropper can be expressed as with . Let the estimated cascaded channel matrix for the user be denoted as with denotes the estimated cascaded channel vector at the receiving antenna .
The received signal in (12) can be rewritten for the case of the user as follows
|
|
|
(13) |
where with where the elements of the column are ones and all other columns are zeros. Thus, . The signal-to-interference-plus-noise ratio (SINR) is given as below
|
|
|
(14) |
where is the signal distortion due to the hardware imperfections and given as
|
|
|
|
|
|
|
|
The hardware imperfections have impact on the interference and the noise levels as it can be seen in the first and third terms in the denominator of .
Similarly, we can define the SINR for the eavesdropper
|
|
|
(15) |
where is the signal distortion due to the hardware imperfections and given as
|
|
|
|
|
|
|
|
Channel state information (CSI) of the eavesdropper cannot be obtained. Therefore, using estimated channel error, we can define the channel coefficients of the eavesdropper as
|
|
|
(16) |
where and . and are constants measuring the level of channel uncertainties.
The achievable rates is defined as follows
|
|
|
(17) |
and
|
|
|
(18) |
The secrecy rate is defined as
|
|
|
(19) |
We aim at maximizing the secrecy rate through optimizing the beamforming and the phase shift. The optimization problem is formulated as follows
|
|
|
|
(II) |
|
s.t. |
|
|
(20a) |
|
|
|
|
(20b) |
|
|
|
|
(20c) |
|
|
|
|
(20d) |
|
|
|
|
(20e) |
Constraint (20a) is the power budget constraint with represents the total transmit power. Constraints (20c) and (20d) are the secrecy constraints which ensures that the rate of the legitimate user is above the limit and the rate of the eavesdropper is below the limit ; where . Since constraints (20c) and (20d) represent lower and upper bounds, problem (II) is nonconvex. In the following sections, we provide a traditional solution for problem (II) and based on this solution, we design a deep learning framework using deep unfolding techniques.