Wireless Information Surveillance via STAR-RIS
Abstract
We explore the potential of a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) to enhance the performance of wireless surveillance systems. The STAR-RIS is deployed between a full-duplex (FD) multi-antenna legitimate eavesdropper (E) and a suspicious communication pair. It reflects the suspicious signal towards the suspicious receiver (SR), while simultaneously transmitting the same signal to E for interception purposes. Additionally, it enables the forwarding of a jamming signal from E to SR, which is located on the back side of the STAR-RIS. To enhance the eavesdrop** non-outage probability, we formulate a non-convex joint optimization problem to design the beamforming vectors at E and reflection/transmission phase shift matrices at the STAR-RIS. We adopt the block coordinate descent (BCD) algorithm and propose an approach, mainly based on semi-definite relaxation (SDR) and successive convex approximation (SCA), for solving the resulting decoupled sub-problems. Finally, we compare the performance of the proposed design against low-complexity zero-forcing (ZF)-based beamforming designs.
††footnotetext: The work of M. Mohammadi and M. Matthaiou was supported by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 101001331).I Introduction
Wireless information surveillance can allow authorized parties (e.g., National Security Agency, military) to legally supervise and identify abnormal user behaviors in wireless networks [1]. It involves utilizing physical layer techniques, such as jamming-assisted [1, 2] and spoofing relaying-assisted proactive eavesdrop** [3], to manipulate the suspicious link aligned with the legitimate eavesdrop** channel, i.e., the link between the suspicious transmitter (ST) and E. This ensures that E can intercept dubious information.
The eavesdrop** performance of these systems is practically limited. Successful monitoring can only be achieved when E is in proximity to the ST or when a direct link exists between the ST and E [4]. Therefore, wireless surveillance systems primarily employ active FD relays to simultaneously forward/overhear the suspicious signal and interfere with the suspicious link [3]. To address the challenges of delay processing and energy consumption at active relays, surveillance systems have recently adopted the emerging RIS technology [5, 6, 7, 4, 8]. The RIS signal enhancement/ cancellation capabilities can be leveraged to intelligently reflect the received suspicious signal by adjusting the phase shifts of all passive elements, turning zero delay into a reality without requiring any additional transmission power for signal forwarding [9].
Existing research contributions [5, 6, 7, 4, 8] assume that the RIS can only reflect the incident signals, implying that the ST and SR must be located on the same side of the RIS. However, this geographical restriction may not always be met in practice and limits the applicability of RISs, as users are typically distributed on both sides of RISs. To overcome such limitations, the novel concept of STAR-RIS has been introduced [10, 11]. Unlike conventional RISs, each element of a STAR-RIS can simultaneously reflect and transmit the incident signals, eliminating the need to confine their deployment to specific geographic areas and achieving full-space coverage. Moreover, since both the transmission and reflection coefficients can be designed, a STAR-RIS offers new degrees-of-freedom (DoF) to enhance the performance of wireless systems. Recently, a few initial works [12, 13] have been conducted to investigate the potential of STAR-RISs in wireless surveillance systems. The work in [13] considered a half-duplex E, while the authors in [12] deployed a dual-antenna FD E, where one antenna is used to overhear the suspicious signal and the other antenna is employed to interfere with the SR. Hence, the potential use of multi-antenna arrays at E remains unexplored. Additionally, the design of phase shifts was neglected in both [12, 13].
We here explore a STAR-RIS-assisted wireless surveillance scenario, where a multi-antenna FD E aims to eavesdrop on a suspicious communication between a pair of ST-SR. The STAR-RIS adopts an energy-splitting protocol [10] and reflects the suspicious signal to the SR, while simultaneously transmitting the suspicious signal to the E and forwards the jamming signal from E to the SR. Our main contributions are as follows:
-
•
We jointly optimize the passive transmission/reflection coefficients at the STAR-RIS and the active transmit/receive beamforming vectors at the FD E. Although the resulting problem is a complicated non-convex optimization problem, we solve it by adopting the BCD algorithm and decompose it into tractable sub-problems. Then, we propose an approach based on SDR and SCA for solving the decoupled sub-problems.
-
•
As a benchmark, two low-complexity designs are proposed, where the ZF principle is used at the beamforming design stage to effectively cancel the self-interference (SI) at the FD E. Our numerical results reveal that the proposed joint beamforming and phase-shift design can significantly improve the information surveillance performance of the system compared to the benchmarks.
Notations: We use bold upper case letters to denote matrices, and lower case letters to denote vectors. The notations and denote the Hermitian transpose and transpose, respectively; denotes the Euclidean norm of a complex vector; denotes the absolute value of a complex scalar; and denote the trace and inverse operation of a matrix; and represent a vector whose elements are extracted from the main diagonal elements of the matrix and a diagonal matrix with on its main diagonal, respectively; represents the identity matrix; denotes an all-ones vector of size . A zero mean circular symmetric complex Gaussian variable having variance is denoted by . Finally, denotes the statistical expectation.
II System model
We consider a wireless surveillance system where FD E aims to eavesdrop on the communication link between a single ST-SR pair, as shown in Fig. 1. However, E is deliberately positioned far away from the suspicious system to avoid detection, resulting in a weak eavesdrop** link. To overcome this limitation, a STAR-RIS is deployed between E and the suspicious system to establish an effective bridge for eavesdrop** and jamming. The STAR-RIS, comprised of transmission/reflection elements, employs an energy-splitting protocol [10]. This protocol adaptively adjusts the channel power gains of the suspicious and legitimate eavesdrop** links, thereby enhancing the eavesdrop** capabilities. The STAR-RIS assists E in overhearing the ST, while simultaneously forwarding a jamming signal from E towards SR. E operates in FD mode, overhearing the suspicious signal from ST via receive antennas and sending a jamming signal via transmit antennas to interfere with SR. ST and SR are equipped with a single antenna each.
Let , , , and represent the channel coefficients for ST-to-SR, the ST-to-STAR-RIS, the STAR-RIS-to-SR, and the STAR-RIS-to-E link, respectively, where denotes the large-scale fading between node and . Moreover, , , , and denote the small-scale fading components each having elements. The SI link at E is denoted by , whose elements can be modeled as random variables [14]. We express the transmission and reflection coefficient matrices of the STAR-RIS as and respectively, where () and (), denote the transmission (reflection) energy splitting factors and phase shifts, respectively. In addition, we note that the phase shifts are generally chosen independently of each other. In contrast, according to the law of energy conservation, are coupled with each other, i.e., they should satisfy the constraint of [11]. Similar to [12, 13], we adopt the same energy splitting ratio for each element of the STAR-RIS, i.e., , and .
II-A Transmission Protocol
Assume that the ST transmits signal to SR with transmit power . Hence, the received signal of the SR is given by
(1) |
where is the transmit beamforming vector, denotes the jamming power of E, denotes the jamming signal of E, and . Hence, the received signal-to-interference-plus-noise ratio (SINR) at SR is given by
(2) |
Let denote the receive beamforming vector at E. Then, the received signal at E is given by
(3) |
where is the received noise vector such that . Accordingly, the received SINR at E can be expressed as
(4) |
![Refer to caption](x1.png)
As the performance metric for the considered surveillance system, we focus on the eavesdrop** non-outage probability, denoted as . The indicator function in denotes the event of successful eavesdrop** at E, given by
(5) |
where and indicate the eavesdrop** non-outage and outage events, respectively. In other words, to achieve a reliable detection at SR, ST varies its transmission rate according to . Hence, if , then E can also reliably decode the information intended to SR. On the other hand, if , E is unable to decode this information without any error [15, 16]. The eavesdrop** non-outage probability is mathematically represented by
(6) |
II-B Problem Formulation
The eavesdrop** non-outage probability expression in (II-A) depends on the transmit/receive beamforming vectors at E, i.e., , , as well as transmission/reflection matrices at the STAR-RIS, i.e., , and . Therefore, we can jointly optimize , , , and to enhance the surveillance performance. To characterize the fundamental information theoretic performance limits of the considered wireless information surveillance system, we assume that E has perfect channel state information (CSI) of all links [12, 13]. In practice, E can overhear the pilot signals sent by ST and SR to acquire the CSI of , , and . To this end, the proposed channel estimation method in [17] can be applied. On the other hand, E can obtain the CSI of by eavesdrop** the feedback channels of the suspicious transmitter-receiver pair [18].
Noticing that the STAR-RIS operates in energy-splitting mode, the joint optimization problem can be formulated as
(7a) | ||||
(7b) | ||||
(7c) | ||||
(7d) |
III Joint Beamforming and Phase-shift Design
In this section, we propose an optimal design to jointly optimize the beamforming vectors at E and transmission/reflection coefficients at STAR-RIS. Before proceeding, by invoking (2) and (4), we first re-express the objective function in a more tractable form. Therefore, the optimization problem (II-B) can be recast as
(8a) | ||||
(8b) |
It is obvious that (III) is a non-convex problem due to its non-convex objective and the phase shift-related constraints. To tackle this issue, we apply the widely used classic BCD algorithm to solve (III). To this end, we partition the optimization variables into two blocks, 1) receive/transmit semaphores at E, i.e., and ; 2) Transmission/reflection phase shifts at the STAR-RIS, i.e., and . Then, we minimize the objective function in (III) by iteratively optimizing each of the above two blocks in one iteration while the other block is fixed, until convergence is reached.
III-A Beamforming Design at E
By inspecting the objective function (III), we find out that only the second term, i.e., depends on . Therefore, for a given , the optimal is the solution of the following optimization problem
(9) |
Since (9) is a generalized Rayleigh ratio problem [14], the optimal receive beamformer can be obtained in closed-form
(10) |
where is the normalized signal-to-noise ratio (SNR) of the jamming symbols, while , with . By substituting into (III), the latter can be written as
(11) | ||||
The optimization problem (11) is non-convex because of the complex objective function. To proceed, we first introduce a slack variable . Then, by employing the SDR technique [19] to relax the quadratic terms of the beamformers in the objective function and constraints, the original problem is reformulated as follows
(12a) | ||||
(12b) | ||||
(12c) |
where . Problem (III-A) is still non-convex in the objective function and constraints (12b) and (12c). Note that when is fixed, problem (III-A) becomes a quasi-convex optimization problem, which can be converted into a convex SDP problem after some transformations. Hence, problem (III-A) can be solved by the two-stage optimization procedure [15], where the inner stage is an SDP problem with fixed , while the outer stage is a one dimensional line search problem over . In particular, the one dimensional problem is
(13a) | ||||
(13b) |
where is the optimal value of the inner optimization problem presented below
(14a) | ||||
(14b) | ||||
(14c) | ||||
(14d) |
where we have introduced , while satisfies . Problem (III-A) consists of a linear objective function with a set of linear constraints, hence it is a convex SDP problem that can be efficiently solved. Thus, optimization problems (III-A) and (III-A) are iteratively solved to provide the optimal transmit beamformer, .
III-B STAR-RIS Transmission/Reflecting Phase Design
In this subsection, we propose a joint design of and at the STAR-RIS for given and at E. To this end, the optimization problem (III) is formulated as
(15a) | ||||
(15b) |
By defining , , , , , , , , , , , , , , , , , , and , the optimization problem (III-B) can be reformulated as
(16a) | ||||
(16b) | ||||
(16c) | ||||
(16d) |
The optimization problem (III-B) is still non-convex due to non-convex objective function and constraints (16d). To deal with the non-convex objective function, we introduce two positive slack variables and . As a result, the problem (III-B) is recast as
(17a) | |||
(17b) | |||
(17c) | |||
(17d) |
Problem (III-B) is still non-convex due to the first two constraints and the non-convex rank-one constraints. To deal with the non-convex constraints (17b) and (17c), we apply the following lower bounds
(18) | ||||
(19) |
where . Then, by relaxing the rank-one constraints for and , we can solve the following SDP problem
(20a) | |||
(20b) | |||
(20c) | |||
(20d) |
III-C Overall Algorithm and Complexity Analysis
Putting together the solution for beamforming vectors and transmission/reflection matrices presented respectively in Sections III-A and III-B, our proposed algorithm for maximizing the eavesdrop** non-outage probability is summarized in Algorithm 1. Since at each iteration , the proposed algorithm decreases the value of the non-outage probability, convergence of the algorithm is guaranteed.
The complexity of Algorithm 1 is determined by the complexity of iteratively solving the SDP problem (III-A) and (III-B). An SDP problem with an semidefinite matrix and SDP constraints is solved with complexity by interior-point methods [19]. For problem (III-A), we have and , while for problem (III-B) we have and .
IV Low-Complexity Designs
The optimal design necessitates an SDP approach for beamforming design at E, which entails high computational complexity. In light of this, we propose low-complexity suboptimal beamforming designs using the ZF principle and linear processing, incorporating maximum ratio transmission (MRT) and maximum ratio combining (MRC).
IV-A Suboptimal Designs and Problem Formulation
IV-A1 ZF/MRT Beamforming Design
With ZF/MRT beamforming design, also known as RZF, ZF beamforming is employed on the receiving side to design , while MRT beamforming is utilized on the transmitting side to design . To ensure feasibility, we need to deploy at least two receive antennas at E, i.e., . Accordingly, we set , and the optimal , which maximizes the eavesdrop** non-outage probability, is the solution of
(21a) | ||||
(21b) |
By using projection matrix theory [14], the receive beamformer, which satisfies the condition in (21a), is given by , where is the projection idempotent matrix, with .
IV-A2 MRC/ZF Beamforming Design
With MRC/ZF beamforming design, which is also abbreviated as TZF, is designed based on the ZF principle to cancel SI, while is set according to the MRC principle to maximize the received SINR at the E, . Therefore, =, and the optimal , which maximizes the eavesdrop** non-outage probability, is the solution of
(23a) | ||||
(23b) |
Using projection matrix theory, the receive beamformer, which satisfies the condition in (23a), is given by , where with is the projection idempotent.
IV-B Solution
In this subsection, we present the solution of the optimization problems (IV-A1) and (IV-A2). Before proceeding, we define , where the superscript “” refers to the “beamforming scheme” with , and , while . Moreover, let , , where and , , . Therefore, the optimization problems (IV-A1) and (IV-A2) can be reformulated as
(25a) | ||||
(25b) | ||||
(25c) |
The optimization problem (IV-B) is non-convex due to (16a)-(16d). To tackle this issue, we first introduce two slack variables and .
Now, following a similar approach as in the optimal case and relaxing the rank-one constraints, optimization problem (IV-B) is recast as
(26a) | ||||
(26b) | ||||
(26c) | ||||
(26d) |
This SDP problem can be solved efficiently via CVX [20], in an iterative way. After obtaining the optimal and , we need to find a rank-one solution by using the Gaussian randomization procedure [19], if the results are not rank-one.
![Refer to caption](x2.png)
V Numerical Results
In this section, numerical results are presented to evaluate the performance of the proposed proactive eavesdrop** schemes. The optimal scheme refers to the case where the beamforming vectors at E and transmission/reflection coefficients at STAR-RIS are jointly optimized. Unless otherwise stated, in all the simulations, we set , and . We model the large-scale fading as , where is the individual link distance, dB is the reference channel gain at a distance of m, and denotes the path loss exponent of the individual link and set [4]. Moreover, the normalized SNR of the suspicious link, i.e., , is set to dB. As a benchmark, we also include the results for MRC/MRT beamforming design with optimized trans- mission and reflection coefficient matrices at STAR-RIS.
Figure 2 shows the eavesdrop** non-outage probability versus for the proposed optimal and suboptimal schemes. We observe that the optimal scheme yields the best performance, reflecting the impact of joint beamforming and transmission/reflection phase shift design. Moreover, by increasing , the RZF outperforms all suboptimal designs, while MRC/MRT outperforms the RZF and TZF schemes in the low regime. The superior performance of RZF over TZF at higher values of can be attributed to the transmission of stronger jamming signals (RZF sacrifices one DoF at the transmit side to cancel SI), leading to an increased dominance of the jamming phase.
Figure 3 shows the eavesdrop** non-outage probability versus the SI strength for the proposed schemes. We observe that the optimal design can effectively cancel SI. However, for a given number of antennas at E, increasing the number of receiving antennas can improve performance. As expected, SI does not affect the ZF-based suboptimal schemes, while the eavesdrop** non-outage probability of the MRC/MRT scheme significantly decreases when the SI strength increases. Moreover, with a decrease in the number of receiving antennas, , the MRC/MRT scheme outperforms the ZF/MRT beamforming scheme at lower values. This is due to the fact that decreasing results in weak SI, which is beneficial for the MRC/MRT design.
![Refer to caption](x3.png)
VI Conclusion
We proposed a STAR-RIS-assisted proactive eavesdrop** system, where the STAR-RIS is deployed to assist a FD multi-antenna E in overhearing a ST and interfering with a SR simultaneously. We formulated a non-convex joint optimization problem to design the beamforming vectors at and reflection/transmission phase shift matrices at the STAR-RIS. Moreover, low-complexity ZF-based beamforming designs were proposed that can balance between performance and system complexity. Our results suggest that the optimal design can effectively cancel the SI. Moreover, by increasing the number of receiving antennas at FD E, the surveillance performance of the optimal design is improved.
In the future, our work will involve monitoring multiple untrusted communication links. Moreover, we can explore other operating protocols for the STAR-RIS operation in wireless surveillance systems, namely, mode switching and time switching.
References
- [1] J. Xu, L. Duan, and R. Zhang, “Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm,” IEEE Wireless Commun., vol. 24, no. 4, pp. 152–159, Aug. 2017.
- [2] Z. Mobini, M. Mohammadi, and C. Tellambura, “Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 3, pp. 621–634, Mar. 2019.
- [3] Y. Zeng and R. Zhang, “Wireless information surveillance via proactive eavesdrop** with spoofing relay,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 8, pp. 1449–1461, Dec. 2016.
- [4] M.-M. Zhao, Y. Cai, and R. Zhang, “Intelligent reflecting surface aided wireless information surveillance,” IEEE Trans. Wireless Commun., vol. 22, no. 2, pp. 1219–1234, Feb. 2023.
- [5] J. Yao, T. Wu, Q. Zhang, and J. Qin, “Proactive monitoring via passive reflection using intelligent reflecting surface,” IEEE Commun. Lett., vol. 24, no. 9, pp. 1909–1913, Sept. 2020.
- [6] T. Ji, M. Hua, C. Li, Y. Huang, and L. Yang, “A robust IRS-aided wireless information surveillance design with bounded channel errors,” IEEE Wireless Commun. Lett., vol. 11, no. 10, pp. 2210–2214, Oct. 2022.
- [7] G. Hu, J. Si, Y. Cai, and N. Al-Dhahir, “Intelligent reflecting surface-assisted proactive eavesdrop** over suspicious broadcasting communication with statistical CSI,” IEEE Trans. Veh. Technol., vol. 71, no. 4, pp. 4483–4488, Apr. 2022.
- [8] X. Hu, Y. Yi, K. Li, H. Zhang, and C. Kai, “Active reconfigurable intelligent surface aided surveillance scheme,” IEEE Wireless Commun. Lett., vol. 12, no. 2, pp. 356–360, Feb. 2023.
- [9] Q. Wu, S. Zhang, B. Zheng, C. You, and R. Zhang, “Intelligent reflecting surface-aided wireless communications: A tutorial,” IEEE Trans. Commun., vol. 69, no. 5, pp. 3313–3351, May 2021.
- [10] X. Mu, Y. Liu, L. Guo, J. Lin, and R. Schober, “Simultaneously transmitting and reflecting (STAR) RIS aided wireless communications,” IEEE Trans. Wireless Commun., vol. 21, no. 5, pp. 3083–3098, May 2021.
- [11] Y. Liu, X. Mu, J. Xu, R. Schober, Y. Hao, H. V. Poor, and L. Hanzo, “STAR: Simultaneous transmission and reflection for 360° coverage by intelligent surfaces,” IEEE Wireless Commun., vol. 28, no. 6, pp. 102–109, Dec. 2021.
- [12] G. Hu et al., “Analysis and optimization of STAR-RIS-assisted proactive eavesdrop** with statistical CSI,” IEEE Trans. Veh. Technol., vol. 72, no. 5, pp. 6850–6855, May 2023.
- [13] G. Hu, Q. Wu, J. Si, K. Xu, Z. Li, Y. Cai, and N. Al-Dhahir, “STAR-RIS-assisted information surveillance over suspicious multihop communications,” IEEE Trans. Mobile Comput., pp. 1–20, 2023.
- [14] M. Mohammadi, B. K. Chalise, H. A. Suraweera, C. Zhong, G. Zheng, and I. Krikidis, “Throughput analysis and optimization of wireless-powered multiple antenna full-duplex relay systems,” IEEE Trans. Commun., vol. 64, no. 4, pp. 1769–1785, Apr. 2016.
- [15] C. Zhong, X. Jiang, F. Qu, and Z. Zhang, “Multi-antenna wireless legitimate surveillance systems: Design and performance analysis,” IEEE Trans. Wireless Commun., vol. 16, no. 7, pp. 4585–4599, Jul. 2017.
- [16] F. Feizi, M. Mohammadi, Z. Mobini, and C. Tellambura, “Proactive eavesdrop** via jamming in full-duplex multi-antenna systems: Beamforming design and antenna selection,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7563–7577, Dec. 2020.
- [17] C. Wu, C. You, Y. Liu, X. Gu, and Y. Cai, “Channel estimation for STAR-RIS-aided wireless communication,” IEEE Commun. Lett., vol. 26, no. 3, pp. 652–656, Mar. 2022.
- [18] H. Zhang, L. Duan, and R. Zhang, “Jamming-assisted proactive eavesdrop** over two suspicious communication links,” IEEE Trans. Wireless Commun., vol. 19, no. 7, pp. 4817–4830, Jul. 2020.
- [19] Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20–34, May 2010.
- [20] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.1, [online]. available:http: //cvxr.com/cvx, 2014.” 2014.