Robust Covert Multicasting Aided by STAR-RIS With Hardware Impairment

被引:0
作者
Zhang, Jifa [1 ]
Wang, Wei [1 ]
Gao, Yuan [2 ]
Lu, Weidang [3 ]
Zhao, Nan [1 ]
Niyato, Dusit [4 ]
机构
[1] Dalian Univ Technol, Sch Informat & Commun Engn, Dalian 116024, Liaoning, Peoples R China
[2] Acad Mil Sci PLA, Beijing 100080, Peoples R China
[3] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Peoples R China
[4] Nanyang Technol Univ, Coll Comp & Data Sci, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
Multicast communication; Hardware; Eavesdropping; Wireless networks; Surveillance; Oral communication; Forensics; Covert communication; hardware impairment; imperfect wiretap CSI; robust optimization; STAR-RIS; WIRELESS COMMUNICATION; TRANSMISSION DESIGN; MISO COMMUNICATIONS; ENERGY EFFICIENCY; OPTIMIZATION; FRAMEWORK; SYSTEMS; NETWORK;
D O I
10.1109/TWC.2024.3437808
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Reconfigurable intelligent surface (RIS) has been widely deployed to assist the covert transmission thanks to its ability of channel reconfiguration. Compared with the conventional RIS, simultaneous transmitting and reflecting RIS (STAR-RIS) can transmit and reflect the incident signal simultaneously, which provides an opportunity for the full-space covert transmission. This paper investigates the robust covert multicasting aided by the STAR-RIS with the hardware impairment. Specifically, Alice covertly transmits the common information to two single-antenna users assisted by the STAR-RIS against two non-colluding multi-antenna wardens. Furthermore, both energy splitting (ES) and mode switching (MS) protocols of the STAR-RIS are considered. With perfect wiretap channel state information (CSI), the covert rate is maximized via jointly optimizing the transmit beamforming, the reflection and transmission coefficient matrices, satisfying the transmit power constraint, the covertness constraint and the protocol of the STAR-RIS. Moreover, we also investigate the covert rate maximization problem under the case of imperfect wiretap CSI. Due to the non-convexity of the problem, we propose iterative algorithms based on the alternating optimization, successive convex approximation and penalty-based semi-definite relaxation to obtain a near-optimal solution to each problem. Simulation results verify the effectiveness of the STAR-RIS, and show that the ES is superior to the MS.
引用
收藏
页码:16172 / 16186
页数:15
相关论文
共 44 条
[1]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[2]  
Boyd S.P., 2004, CONVEX OPTIMIZATION
[3]   A Survey on Multiple-Antenna Techniques for Physical Layer Security [J].
Chen, Xiaoming ;
Ng, Derrick Wing Kwan ;
Gerstacker, Wolfgang H. ;
Chen, Hsiao-Hwa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1027-1053
[4]   Covert Communications: A Comprehensive Survey [J].
Chen, Xinying ;
An, Jianping ;
Xiong, Zehui ;
Xing, Chengwen ;
Zhao, Nan ;
Yu, F. Richard ;
Nallanathan, Arumugam .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (02) :1173-1198
[5]   RIS-Assisted Multi-User MISO Communications Exploiting Statistical CSI [J].
Gan, Xu ;
Zhong, Caijun ;
Huang, Chongwen ;
Zhang, Zhaoyang .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (10) :6781-6792
[6]   Covert Communications When the Warden Does Not Know the Background Noise Power [J].
Goeckel, Dennis ;
Bash, Boulat ;
Guha, Saikat ;
Towsley, Don .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (02) :236-239
[7]   On Covert Communication With Noise Uncertainty [J].
He, Biao ;
Yan, Shihao ;
Zhou, Xiangyun ;
Lau, Vincent K. N. .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (04) :941-944
[8]   A Unified Algorithmic Framework for Block-Structured Optimization Involving Big Data [J].
Hong, Mingyi ;
Razaviyayn, Meisam ;
Luo, Zhi-Quan ;
Pang, Jong-Shi .
IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (01) :57-77
[9]  
Horn R.A., 2013, Matrix Analysis, V2nd, DOI 10.1017/CBO9780511810817
[10]   Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things [J].
Hu, Lin ;
Wen, Hong ;
Wu, Bin ;
Pan, Fei ;
Liao, Run-Fa ;
Song, Huanhuan ;
Tang, Jie ;
Wang, Xiumin .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :219-228