Using STAR-IRS to Secure Indoor Communications Through Symbol-Level Random Phase Modulation
Du, Sun, Zhang et al.
This paper proposes a secure indoor communication scheme based on simultaneous transmitting and reflecting intelligent reflecting surface (STAR-IRS). Specifically, a transmitter (Alice) sends confidential information to its intended user (Bob) indoors, while several eavesdroppers (Eves) lurk outside. To safeguard the transmission from eavesdropping, the STAR-IRS is deployed on walls or windows. Upon impinging on the STAR-IRS, the incoming electromagnetic wave is dynamically partitioned into two components, enabling both transmission through and reflection from the surface. The reflected signal is controlled to enhance reception at Bob, while the transmitted signal is modulated with symbol-level random phase shifts to degrade the signal quality at Eves. Based on such a setting, the secrecy rate maximization problem is formulated. To solve it, a graph neural network (GNN)-based scheme is developed. Furthermore, a field-programmable gate array (FPGA)-based GNN accelerator is designed to reduce computational latency. Simulation results demonstrate that the proposed strategy outperforms both the conventional scheme and the reflection-only scheme in terms of secrecy performance. Moreover, the GNN-based approach achieves superior results compared to benchmark techniques such as maximum ratio transmission (MRT), zero forcing (ZF), and minimum mean square error (MMSE) in solving the optimization problem. Finally, experimental evaluations confirm that the FPGA-based accelerator enables low inference latency.
academic
Using STAR-IRS to Secure Indoor Communications Through Symbol-Level Random Phase Modulation
This paper proposes a secure indoor communication scheme based on Simultaneous Transmitting and Reflecting Intelligent Reflecting Surface (STAR-IRS). Specifically, a transmitter (Alice) sends confidential information to an indoor target user (Bob), while multiple eavesdroppers (Eves) lurk outdoors. To protect the transmission against eavesdropping, STAR-IRS is deployed on walls or windows. Electromagnetic waves incident on STAR-IRS are dynamically divided into two components, enabling surface transmission and reflection. The reflected signal is controlled to enhance Bob's reception, while the transmitted signal reduces the signal quality for Eves through symbol-level random phase modulation. Based on this setup, a secrecy rate maximization problem is formulated. To solve this problem, a Graph Neural Network (GNN)-based approach is developed. Additionally, a Field-Programmable Gate Array (FPGA)-based GNN accelerator is designed to reduce computational latency. Simulation results demonstrate that the proposed strategy outperforms conventional schemes and pure reflection schemes in terms of secrecy performance.
Surging 6G Network Demands: Sixth-generation networks are expected to bring unprecedented 1000-fold growth in data traffic, driven primarily by data-intensive applications such as massive machine-type communications, virtual reality, and Internet of Things devices.
Indoor Communication Security Challenges: Since most wireless data transmission occurs in indoor environments, the inherent openness of wireless propagation makes indoor transmission particularly vulnerable to interception by external eavesdroppers, posing significant risks to information confidentiality.
Limitations of Existing Methods:
Traditional physical layer security (PLS) strategies such as beamforming and artificial noise are primarily designed for general scenarios
Few studies focus on external eavesdropping through physical barriers (such as walls or windows)
Existing research on STAR-IRS-assisted indoor communications is relatively limited
STAR-IRS, as a sophisticated planar metasurface, can simultaneously handle reflection and transmission of incident electromagnetic energy, providing additional degrees of freedom for full-space coverage. STAR-IRS deployed on walls or windows in indoor venues can simultaneously affect indoor and outdoor users, making it a promising solution for addressing potential outdoor eavesdroppers.
First Proposal of Symbol-Level Random Phase Modulation-Based STAR-IRS Security Strategy: Intelligently divides incident signals into two components: information-bearing signals reflected to indoor target users and transmitted artificial noise signals for degrading the performance of potential outdoor eavesdroppers.
Formulation of Secrecy Rate Maximization Optimization Problem: Mathematically models the secrecy rate maximization problem under total power budget constraints and reflection/transmission coefficient constraints.
Development of GNN-Based Deep Learning Algorithm: Designs a GNN algorithm to simultaneously optimize the transmitter's beamforming vector and STAR-IRS's transmission and reflection matrices.
Implementation of FPGA Hardware Accelerator: Leveraging hardware parallelism and structural optimization, the FPGA accelerator aims to minimize inference latency and power consumption, meeting the stringent real-time requirements of indoor communication systems.
The reflection and transmission coefficients of each STAR-IRS element are √(β_l^r)e^(jθ_l^r) and √(β_l^t)e^(jθ_l^t) respectively, satisfying the energy conservation constraint: β_l^r + β_l^t = 1.
Nodes: STAR-IRS, Bob, and all Eves
Node Features: Include real and imaginary parts of direct and cascaded channels
Adjacency Matrix: Reflects the connectivity between STAR-IRS and other nodes
Distance Configuration: Alice-to-Bob, STAR-IRS-to-Bob, and Alice-to-STAR-IRS are all 8m; Alice-to-Eve and STAR-IRS-to-Eve are randomly generated in the 4-8m range
The GNN scheme converges rapidly within approximately 300 iterations, with AN-GNN consistently achieving the highest secrecy rate, validating the effectiveness of symbol-level random phase modulation.
The GNN scheme demonstrates strong robustness under Gaussian-distributed channel estimation errors, maintaining high secrecy rates even with significant estimation errors.
Existing research primarily focuses on weighted sum secrecy rate maximization, key generation, and power minimization, but research specifically targeting indoor communications is relatively limited.
DRL Methods: While effective, suffer from long training times, high computational complexity, and limited generalization capability
GNN Methods: Can effectively model network topology and scale efficiently, but their application in STAR-IRS-assisted secure indoor communications has not been explored
The paper cites 27 relevant references covering multiple domains including 6G networks, physical layer security, STAR-IRS technology, and deep learning optimization, with comprehensive and authoritative citation coverage.
Overall Assessment: This is a high-quality paper with innovation in the field of STAR-IRS-assisted secure communications. The technical approach is novel, experimental validation is comprehensive, and hardware implementation enhances practical value. While there are certain limitations in applicable scenarios and complexity analysis, the paper provides valuable contributions to the development of this field.