{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:53:04Z","timestamp":1775145184441,"version":"3.50.1"},"reference-count":40,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.<\/jats:p>","DOI":"10.3390\/s21041439","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T09:06:10Z","timestamp":1613725570000},"page":"1439","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Physical-Layer Security Improvement with Reconfigurable Intelligent Surfaces for 6G Wireless Communication Systems"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7486-8270","authenticated-orcid":false,"given":"Janghyuk","family":"Youn","sequence":"first","affiliation":[{"name":"Department of Electronics Engineering, Chungnam National University, Daejeon 34134, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9332-2102","authenticated-orcid":false,"given":"Woong","family":"Son","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, Chungnam National University, Daejeon 34134, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4485-9592","authenticated-orcid":false,"given":"Bang Chul","family":"Jung","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, Chungnam National University, Daejeon 34134, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2021,2,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"e218","DOI":"10.1038\/lsa.2014.99","article-title":"Coding metamaterials, digital metamaterials and programmable metamaterials","volume":"3","author":"Cui","year":"2014","journal-title":"Light. Sci. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MVT.2019.2921208","article-title":"6G wireless networks: Vision, requirements, architecture, and key technologies","volume":"14","author":"Zhang","year":"2019","journal-title":"IEEE Veh. Tech. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MCOM.001.1900107","article-title":"Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless networks","volume":"58","author":"Wu","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/MWC.001.1900534","article-title":"Holographic MIMO surfaces for 6G wireless networks: Opportunities, challenges, and trends","volume":"27","author":"Huang","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"116753","DOI":"10.1109\/ACCESS.2019.2935192","article-title":"Wireless communications through reconfigurable intelligent surfaces","volume":"7","author":"Basar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"5394","DOI":"10.1109\/TWC.2019.2936025","article-title":"Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming","volume":"18","author":"Wu","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/LWC.2020.3025030","article-title":"On spatial multiplexing using reconfigurable intelligent surfaces","volume":"10","author":"ElMossallamy","year":"2021","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Chu, Z., Xiao, P., Shojafar, M., Mi, D., Mao, J., and Hao, W. (2020). Intelligent reflecting surface assisted mobile edge computing for internet of things. IEEE Wirel. Commun. Lett.","DOI":"10.1109\/LWC.2020.3040607"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"\u00d6zdogan, \u00d6., Bj\u00f6rnson, E., and Larsson, E.G. (2020, January 4\u20138). Using intelligent reflecting surfaces for rank improvement in MIMO communications. Proceedings of the 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain.","DOI":"10.1109\/ICASSP40776.2020.9052904"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MWC.2011.5751298","article-title":"Physical layer security in wireless networks: A tutorial","volume":"18","author":"Shiu","year":"2011","journal-title":"IEEE Wirel. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","article-title":"A survey of physical layer security techniques for 5G wireless networks and challenges ahead","volume":"36","author":"Wu","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"8169","DOI":"10.1109\/JIOT.2019.2927379","article-title":"Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities","volume":"6","author":"Wang","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MCOM.2018.1700912","article-title":"A secure intelligent spectrum control strategy for future THz mobile heterogeneous networks","volume":"56","author":"Li","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","article-title":"A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions","volume":"22","author":"Khan","year":"2020","journal-title":"IEEE Commun. Surv. Tuts."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1778","DOI":"10.1109\/LCOMM.2013.071813.131158","article-title":"On the multi-user diversity with secrecy in uplink wiretap networks","volume":"17","author":"Jin","year":"2013","journal-title":"IEEE Commun. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1850","DOI":"10.1109\/JSAC.2013.130917","article-title":"On the resilience of wireless multiuser networks to passive and active eavesdroppers","volume":"31","author":"Chorti","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MCOM.2015.7120012","article-title":"Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks","volume":"53","author":"Kapetanovic","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Joung, J., Choi, J., Jung, B.C., and Yu, S. (2019). Artificial noise injection and its power loading methods for secure space-time line coded systems. Entropy, 21.","DOI":"10.3390\/e21050515"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Choi, J., Joung, J., and Jung, B.C. (2020). Space-time line code for enhancing physical layer security of multiuser MIMO uplink transmission. IEEE Syst. J.","DOI":"10.1109\/JSYST.2020.3001068"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Son, W., Jang, H., and Jung, B.C. (2019). A Pseudo-random beamforming technique for improving physical-layer security of MIMO cellular networks. Entropy, 21.","DOI":"10.3390\/e21111038"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1109\/TIFS.2018.2868494","article-title":"Opportunistic scheduling for average secrecy rate enhancement in fading downlink channel with potential eavesdroppers","volume":"14","author":"Abbas","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"127078","DOI":"10.1109\/ACCESS.2019.2939048","article-title":"Secrecy rate analysis of opportunistic user scheduling in uplink networks with potential eavesdroppers","volume":"7","author":"Bang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Son, W., Nam, H., Shin, W.-Y., and Jung, B.C. (2020). Secrecy outage analysis of multiuser downlink wiretap networks with potential eavesdroppers. IEEE Syst. J.","DOI":"10.1109\/JSYST.2020.3007434"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/MNET.011.1900579","article-title":"Intelligent reflecting surface enabled covert communications in wireless networks","volume":"34","author":"Lu","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.1109\/OJCOMS.2020.3023731","article-title":"Smart and secure wireless communications via reflecting intelligent surfaces: A short survey","volume":"1","author":"Almohamad","year":"2020","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Yu, X., Xu, D., and Schober, R. (2019, January 9\u201313). Enabling secure wireless communications via intelligent reflecting surfaces. Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA.","DOI":"10.1109\/GLOBECOM38437.2019.9014322"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1109\/LWC.2019.2919685","article-title":"Secure wireless communication via intelligent reflecting surface","volume":"8","author":"Cui","year":"2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/LWC.2019.2943559","article-title":"Intelligent reflecting surface aided multi-antenna secure transmission","volume":"9","author":"Chu","year":"2020","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"192924","DOI":"10.1109\/ACCESS.2020.3027365","article-title":"Secure wireless transmission for intelligent reflecting surface-aided millimeter-wave systems","volume":"8","author":"Xiu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1743","DOI":"10.1109\/LWC.2020.3003400","article-title":"Secure transmission for intelligent reflecting surface-assisted mmWave and Terahertz systems","volume":"9","author":"Qiao","year":"2020","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"82599","DOI":"10.1109\/ACCESS.2019.2924034","article-title":"Intelligent reflecting surface: A programmable wireless environment for physical layer security","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2068","DOI":"10.1109\/LWC.2020.3012664","article-title":"Robust and secure beamforming for intelligent reflecting surface aided mmWave MISO systems","volume":"9","author":"Lu","year":"2020","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Xu, D., Yu, X., Sun, Y., Ng, D.W.K., and Schober, R. (2019, January 9\u201313). Resource allocation for secure IRS-assisted multiuser MISO systems. Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA.","DOI":"10.1109\/GCWkshps45667.2019.9024490"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/LWC.2020.2969629","article-title":"Intelligent reflecting surface assisted secrecy communication: Is artificial noise helpful or not?","volume":"9","author":"Guan","year":"2020","journal-title":"IEEE Wirel. Commuin. Lett."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1109\/LSP.2020.3010170","article-title":"Intelligent reflecting surfaces assisted secure transmission without eavesdropper\u2019s CSI","volume":"27","author":"Wang","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2637","DOI":"10.1109\/JSAC.2020.3007043","article-title":"Robust and secure wireless communications via intelligent reflecting surfaces","volume":"38","author":"Yu","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"7851","DOI":"10.1109\/TCOMM.2020.3024621","article-title":"Artificial-noise-aided secure MIMO wireless communications via intelligent reflecting surface","volume":"68","author":"Hong","year":"2020","journal-title":"IEEE Trans. Commun."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Hong, S., Pan, C., Ren, H., Wang, K., Chai, K.K., and Nallanathan, A. (2020). Robust transmission design for intelligent reflecting surface aided secure communication systems with imperfect cascaded CSI. IEEE Trans. Wirel. Commun.","DOI":"10.1109\/GLOBECOM42002.2020.9322565"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1109\/TIFS.2020.3038994","article-title":"Secrecy rate optimization for intelligent reflecting surface assisted MIMO system","volume":"16","author":"Chu","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"3088","DOI":"10.1109\/TIT.2010.2048445","article-title":"Secure transmission with multiple antennas I: The MISOME wiretap channel","volume":"56","author":"Khisti","year":"2010","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/4\/1439\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:26:01Z","timestamp":1760160361000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/4\/1439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,19]]},"references-count":40,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,2]]}},"alternative-id":["s21041439"],"URL":"https:\/\/doi.org\/10.3390\/s21041439","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,19]]}}}