STAR-RIS-Assisted Millimeter-Wave Secure Communication with Multiple Eavesdroppers

: Aiming to address the limited coverage of conventional reconfigurable intelligent surfaces (RISs), this study proposes a millimeter-wave secure communication scheme based on the simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). It uses the transmission and reflection functions of the STAR-RIS to achieve multiple users’ full-area communication coverage and meet the security communication needs of different users. To maximize the system sum rate under the security communication requirements of users in the transmission and reflection regions, this study proposes a joint optimization design scheme consisting of transmit beamforming at the base station (BS) and transmitting and reflecting coefficients at the STAR-RIS based on the energy-splitting protocol, and it models the rate optimization problem with information leakage constraints under imperfect eavesdroppers’ channel state information (ECSI). First, a series of transformations is proposed to solve the coupling between the optimization variables, and then, an efficient iterative algorithm based on successive convex approximation (SCA) and semi-definite relaxation (SDR) is proposed. Aiming to address the amplitude and phase constraints of the STAR-RIS, an optimization method comprising a penalty concave–convex procedure is adopted. The simulation results show that, compared with the conventional RIS, the proposed STAR-RIS assistance scheme can achieve the full coverage of the communication system and effectively improve the system sum rate while ensuring the safe transmission of information. The combination of STAR-RIS and millimeter-wave can promote the efficient and safe transmission of information in dense cities.


Introduction
Millimeter-wave communication is considered a promising technology with the potential to support multi-gigabit wireless applications [1].Millimeter-wave technology adopts a line-of-sight (LOS) transmission mode.It transmits in space in the form of direct beamforming, with a narrow beam and strong directivity.Because the frequency band is relatively high and there are not many interference sources, the reliability and stability of its propagation are excellent.However, millimeter-wave signals are easily blocked by obstacles [2], especially in indoor or densely populated urban environments [3].Regarding this problem, the reconfigurable intelligent surface (RIS) has become a promising and cost-effective solution, as it can establish a reliable connection even when the LOS link is blocked by obstacles [4].In recent years, the RIS has emerged as a promising technology to realize the propagation link in the next-generation configured wireless network [5].RISs can dynamically change the wireless channel by using many low-cost passive reflective components integrated into the plane to subtly change the reflected signal, thus improving the system's performance [6].The conventional RIS only has the reflection function.The transmitter communicates with the user through the RIS, and the eavesdroppers try to intercept confidential information in a non-colluding way.Ref. [7] focuses on the secure transmission of millimeter-wave and terahertz systems assisted by the RIS, in which the base station (BS) communicates with the destination through the RIS in the presence of passive eavesdroppers.Ref. [8] focuses on the security issues of confidential communication in a multiple RIS-assisted terahertz system, where potential eavesdroppers can intercept the communication link.
However, conventional RISs can only reflect the incident wireless signals.In this case, the transmitter and receiver must be on the same side of the RIS [9], resulting in smart radio environments (SREs) in half space.However, this location restriction may not always be satisfied in practice and severely limits the flexibility and effectiveness of RISs, because the users may be on both sides of the RIS.To overcome this limitation, Ref. [10] proposed the new concept of a simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS).This technology can achieve full space coverage because the STAR-RIS can transmit and reflect incident waves at the same time.
On the other hand, security is also an important aspect of wireless networks [11].The authors of [12] studied the secure beamforming and phase-shifting design of an RIS-assisted multiple-input single-output (MISO) downlink channel and proposed an algorithm based on an alternating-direction multiplier.Meanwhile, Ref. [13] studied the secure precoding and phase shifting design of RIS-assisted multiple-input multiple-output (MIMO) channels and developed a maximization-minimization (MM) optimization method.The authors of [14] studied secure communication assisted by a STAR-RIS to maximize the secrecy rate of the system under perfect channels.Moreover, Ref. [15] studied a penalty-based secure beamforming algorithm developed to solve the resulting non-convex optimization problem.The authors of [16] studied secure transmission in a STAR-RIS-assisted uplink nonorthogonal multiple access system.According to the availability of eavesdropping channel state information (CSI), the minimum security capacity is maximized by considering the eavesdroppers' complete CSI and statistical CSI.
The above security communication scheme achieves superior security performance.However, the introduction of STAR-RIS also brings additional eavesdropping challenges.The most recent studies [17,18] have focused on STAR-RIS-assisted communication with perfect CSI.In general, it is difficult to obtain perfect CSI due to the unreliable behavior of eavesdroppers and the feedback delay or channel estimation error, so eavesdroppers in millimeter-wave systems can intercept the transmission of confidential information, causing serious security issues.However, in the case of multiple eavesdroppers, imperfect channels' impact on millimeter-wave communication has not yet been explored.
Based on the above problems, this study evaluates the STAR-RIS-assisted secure transmission in millimeter-wave systems, where eavesdroppers can eavesdrop on the confidential information transmitted and reflected by the STAR-RIS.Under the assumption of imperfect ECSI and information leakage constraints, the system sum rate of the legitimate receivers is defined to measure the transmission performance.The main purpose of this work is to study the security transmission problem in the millimeter-wave system, define the transmitting and reflecting coefficients of the STAR-RIS, and examine the transmit beamforming of the BS, seeking to reduce the information leakage caused by imperfect eavesdroppers' channel state information (ECSI) and improve the security performance of millimeter-wave communication.Specifically, the main contributions of this study can be summarized as follows.
By jointly designing the transmitting and reflecting coefficients at the STAR-RIS and the transmit beamforming at the BS, the sum rate of legitimate users is maximized under the information leakage constraints.Owing to the coupled variables and non-convexity of the objective function, the formulated problem is non-convex and difficult to solve.To overcome these obstacles, the problem is transformed into a solvable formula.
To solve the current design problems, this study proposes an iterative suboptimal algorithm with high computational efficiency.We first propose a series of transformations to solve the coupling between the optimization variables, which paves the way for the development of efficient iterative algorithms based on successive convex approximation (SCA) and semi-definite relaxation (SDR).For the amplitude and phase shift constraints at the STAR-RIS, an optimization method based on the penalty concave-convex procedure is adopted.Unlike the traditional alternative optimization method, which is prone to falling into a low-efficiency stationary point during the iterative process in practice, our algorithm can jointly optimize all optimization variables at each iteration and has a higher system sum rate.
Notations: The scalars, vectors, and matrices are represented by lowercase letter x, boldface lowercase letter x, and boldface uppercase letter X, respectively.C N×M denotes the space of N × M matrices with complex entries.The modulus of a complex-valued scalar is denoted by  (•), and the eigenvector associated with the maximum eigenvalue is denoted by λ max (•).X ⪰ 0 mean that the matrix is positive semi-definite.ℜ stands for the real part of a complex number.diag(x) denotes a diagonal matrix with its diagonal elements given by the vector.Diag(X) denotes a vector whose elements are extracted from the main diagonal elements of the matrix.▽ f (•) represents the gradient.I N denotes an N×N identity matrix.

Signal Model
This study considers secure communication under multiple users.Since multiple users exist in different locations, the transmitter needs to send information to these multiple users at the same time.Therefore, this study introduces STAR-RIS to ensure secure communication.A STAR-RIS is capable of independently controlling the transmitted and reflected signals, which introduces additional degrees of freedom.To characterize this unique feature, for a STAR-RIS with M elements, let s m represent the signal incident on the m-th element, where m ∈ M ≜ {1, 2, • • • , M}.After reconfiguration with the corresponding transmission and reflection coefficients, the signal transmitted and reflected by the m-th element is given as t m = ( α t m e jϕ t m )s m , r m = ( √ α r m e jϕ r m )s m , where α t m , α r m ∈ [0, 1], ϕ t m , ϕ r m ∈ [0, 2π) describes the amplitude and phase shift adjustment of the incident signal by the m-th element during transmission and reflection, respectively.
The adjustments of the phase shifts of transmission and reflection can usually be implemented independently of one another.However, the transmission and reflection amplitude coefficients must comply with the law of the conservation of energy: the sum of the energy of the transmission and reflection signals must be equal to the energy of the incident signal.Therefore, the sum of α t m and α r m should be equal to 1. Thus, after adjusting the amplitude coefficients for transmission and reflection, each element can operate in full transmission mode, full reflection mode, or a simultaneous transmission and reflection mode.Based on the above basic signal model, an energy-splitting protocol for a STAR-RIS in wireless networks is proposed.
All elements of the STAR-RIS that transmit and reflect simultaneously work in both modes.Therefore, the transmission and reflection coefficients are modeled as For the energy splitting protocol, since the transmission coefficient and reflection coefficient of each element can be optimized, higher system design flexibility can be achieved.
However, the unique ability of the STAR-RIS to reconfigure the whole space's radio propagation environment will inevitably lead to eavesdropping.In other words, eavesdroppers near the STAR-RIS can access the confidential information transmitted through the STAR-RIS, which poses a serious security challenge from the perspective of information theory.Fortunately, physical-layer security technology is expected to protect STAR-RIS-assisted communication by utilizing the inherent characteristics of wireless channels (such as fading, noise, and interference).
Figure 1 shows a MISO system consisting of a BS, a STAR-RIS, two users, and 2K eavesdroppers.The BS and the STAR-RIS are, respectively, equipped with N antennas and M elements; Bob t and Bob r are legitimate receivers; Eve t,k and Eve r,k are eavesdroppers, where k∈ K ≜ {1, 2, • • • , K}, and each of them is a single-antenna node.In Figure 1, it is assumed that the STAR-RIS serves both the transmission and reflection regions.Bob t and Bob r are located in the transmission and reflection regions, respectively.Eve t,k and Eve r,k are located in the transmission and reflection regions, respectively.Due to a serious blockage, the direct links between the BS and the users can be ignored.The distances from the BS to the STAR-RIS, from the STAR-RIS to Bob t , from the STAR-RIS to Eve t,k , from the STAR-RIS to Bob r , and from the STAR-RIS to Eve r,k are denoted by where w t ∈ C N×1 and w r ∈ C N×1 represent the beamforming of Bob t and Bob r ; Φ t ∈ C M×M and Φ r ∈ C M×M represent the transmission and reflection coefficients of Bob t and Bob r ; n b,t , n b,r are the Gaussian noise at Bob t and Bob r , both with a mean of zero and variance σ 2 b .n e,t , n e,r are the Gaussian noise at Eve t,k and Eve r,k , both with a mean of zero and variance σ 2 e .Accordingly, the received signal-to-interference-plus-noise ratio (SINR) at Bob t and Bob r is given by The achievable rates (bits/s/Hz) of Bob t and Bob r are given by R b,t = log 2 (1 + Γ b,t ), R b,r = log 2 (1 + Γ b,r ).Since multiple eavesdroppers are arbitrarily distributed to nearby users, non-colluding eavesdropping is considered.In non-colluding eavesdropping, the eavesdroppers are independent and individually overhear private information.Here, we assume that the eavesdroppers only eavesdrop on the information sent to users who are located in the same region.As a result, the received SINR of Eve t,k and Eve r,k can be expressed as ) The achievable rates of Eve t,k and Eve r,k are given by R e,t,k = log 2 (1 + Γ e,t,k ), R e,r,k = log 2 (1 + Γ e,r,k ).Hence, the secrecy rate between the BS and Bob t is R s,t = R b,t − max k∈K R e,t,k , the secrecy rate between the BS and Bob r is R s,r = R b,r − max k∈K R e,r,k , and the system sum secrecy rate is given by R s = R s,t + R s,r .

Channel State Information
We consider a scenario where the BS adopts a uniform linear array (ULA) with N antennas, and the STAR-RIS consists of a uniform rectangular array (URA) with M = M x M z elements, where M x and M z represent the number of elements along the horizontal and vertical axes, respectively.In our simulation, the STAR-RIS-user and STAR-RIS-eavesdropper channels are both generated based on the following geometric channel model [19]: where L is the number of paths, α l is the complex gain associated with the l-th path, ϕ al (ϕ el ) is the relevant azimuth (elevation) deviation angle, and a t ∈ C M×1 is the normalized emission array response vector, while λ r and λ t represent the gains of the receiving and transmitting antenna units.According to [20,21], for the STAR-RIS-user and STAR-RISeavesdropper links, λ r and λ t are set to 0 dBi and 9.82 dBi.The complex gain α l is generated based on the complex Gaussian distribution [22] α l ∼ CN (0, 10 −0.1κ ), where κ is given as κ = e + 10 f log 10 (d) + ζ and d represents the distance between the transmitter and receiver, ζ ∼ N (0, σ 2 ζ ).We set the values of e = 72, f = 2.92, and σ ζ = 8.7 dB, as shown in real channel measurements in a 28 GHz Non-Line-of-Sight (NLOS) scenario.The BS-STAR-RIS channel has the characteristics of the rank-one geometric channel model, which provides the following: Here, ϑ a (ϑ e ) represents the azimuth (elevation) arrival angle related to the BS-STAR-RIS path.ϕ is the relevant departure angle, where a r ∈ C M×1 and a t ∈ C N×1 represent the normalized receiving and transmitting array response vectors, respectively.Both λ r and λ t are the antenna gains.
In considering the impact of the imperfect eavesdropper channel on secure communication, the bounded CSI error models are used for the cascaded BS-STAR-RIS-Eve t,k channel, the cascaded BS-STAR-RIS-Eve r,k channel, the direct STAR-RIS-Eve t,k channel, and the direct STAR-RIS-Eve r,k channel.Specifically, we denote the cascaded BS-STAR-RIS-Eve t,k channel as with The continuous set Υ t,k , ∀k, collects all possible channel estimation errors, while constant ρ t,k , ∀k, denotes the maximum value of the norm of the CSI estimation error ∆G t,k , ∀k.
Since passive eavesdroppers typically hide their presence from the BS, they interact less frequently with the desired communication system.It is more practical to assume that only partial eavesdroppers' CSI is available to legitimate users.The direct STAR-RIS-Eve t,k channel can be estimated by exploiting conventional uplink pilot transmission.We denote the direct STAR-RIS-Eve t,k channel as with

Problem Formulation
Here, we aim to maximize legitimate users' sum rate by jointly designing beamforming at the BS and transmission and reflection coefficients at the STAR-RIS.Specifically, for the energy-splitting protocol, the problem can be expressed as max The objective function in (13) maximizes the system sum rate.Constraint C1 ensures that the transmit power at the BS does not exceed its maximum transmit power budget P. Constraint C2 represents the phase shift response of the m-th element, while constraint C3 represents the amplitude response of the m-th element.Constants τ t,k and τ r,k in C4 are the maximum tolerable information leakage to Eve t,k and Eve r,k for the wiretapping of the signal transmitted to Bob t and Bob r considering the CSI error.In particular, C4 can guarantee that the system secrecy rate R s is bounded from below Remark 1.The formula in (13) for the maximization of the system sum rate considering the information leakage constraints proposed is more flexible in resource allocation than the formula for the direct maximization of the system secrecy rate (such as [23,24]).In particular, the proposed problem formula can be adjusted with τ t,k , τ r,k , ∀k, to control the secrecy performance level of a single eavesdropper, offering a more flexible formula to determine the communication security level in heterogeneous practical applications.This is widely used in the literature [25][26][27][28].

Problem Transformation
Before solving the formulation problem, we first rewrite the problem in (13).Defining , where the matrices Hence, the received rates (R b,t , R b,r ) and information leakages at eavesdroppers (R e,t,k , R e,r,k ) in the constraint C4 can be equivalently rewritten as in which we define the beamforming matrices as W t = w t w H t and W r = w r w H r , denote Θ t = θ t θ H t satisfying Θ t ⪰ 0 and Rank(Θ t ) = 1, and denote Θ r = θ r θ H r satisfying Θ r ⪰ 0 and Rank(Θ r ) = 1.W t , W r , Θ t , Θ r are Hermitian matrices.
By solving the following optimization problem, the performance lower bound of the problem can be obtained: where ξ t , ξ r , ι t , and ι r are slack variables.Moreover, the non-convex constraint in C9 in ( 14) can be replaced with the following constraints: Therefore, the optimization problem in ( 14) is equivalent to the following problem: s.t.C1, C2, C3, C4, C5, C6, C7, C8, C9a, C9b

Optimization Variable Decoupling
For the optimization problem in (17), the non-convexity arises from constraints C4, C7, and C8 and the objective function due to severely coupled variables.In particular, there are two types of variable coupling, i.e., the fractional form of two continuous variables in the SINR and the multiplication between W t , W r , Θ t , Θ r , e.g., Tr(F t W t F H t Θ t ) and Tr(F r W r F H r Θ r ).To address the first type of coupling, we rewrite the SINR in ( 14) in its equivalent form, namely the difference of convex (D.C.) form: where ) are two functions that are both concave with respect to ξ t , ξ r , ι t , ι r .We take the term −Tr(F t W t F H t Θ t ) as an example to explain the construction of a convex constraint approximating the non-convex quality-of-service constraint C7.The term is rewritten as Now, the last two terms in (19) are non-convex with respect to W t and Θ t , respectively.We construct a global underestimator for the non-convex terms via first-order Taylor approximation.Specifically, we have where i denotes the iteration index.Using the above transformation, C4, C7, and C8 can be written in the following form:

S-Procedure
On the other hand, due to the CSI uncertainty, there are infinite possibilities for constraint C4.As a result, we adopt the S-procedure to tackle these issues.Then, for constraint C4, there is an infinite number of quadratic matrix inequalities (QMIs) due to the CSI uncertainty set.To overcome this problem, we first introduce slack optimization variables Ψ t,k and Ψ r,k to replace . Hence, constraint C4 can be equivalently rewritten as Note that constraint C4b still involves an infinite number of inequality constraints.To circumvent this difficulty, we use the Generalized S-Procedure to convert the infinite constraint C4b to an equivalent form with a finite number of constraints by applying Lemma 1.
On the basis of the above Lemma 1, we can express the first term of the constraint C4b as Then, applying Lemma 1, the first term of constraint C4b is equivalently transformed as Similarly, the second term of constraint C4b can be equivalently represented as

SCA-and SDR-Based Iterative Algorithm
Next, to tackle the non-convexity of constraints C4a and C9b and the objective function in (17), we first transform them into the D.C. form such that SCA can be applied to obtain a suboptimal solution.Firstly, the rank-one constraint C9b is rewritten using Lemma 2: Lemma 2. The rank-one constraint in the first term of C9b is equivalent to the following D.C. form constraint: C9b Proof.Since Y t is a Hermitian matrix, the inequality holds, where the i-th singular value of Y t is denoted by ρ i .Thus, the inequality in (37) holds if and only if Y t has a unit rank.
Aiming to tackle the D.C. form constraint C9b, a lower bound of ||Y t || 2 is given by the first-order Taylor approximation for any feasible point On the basis of the SCA method, C9b can be obtained, which is given by Since C9b ⇒ C9b, replacing C9b with C9b can ensure that the former is satisfied when the proposed algorithm converges.On the other hand, it can be observed that, for the nonconvex objective function in (18), the non-convex constraint is in a D.C.-differentiable form.Similarly, after deriving the first-order Taylor expansions corresponding to the non-convex component, for any feasible point ι r , we have the following inequalities: where As such, the lower bound of the objective function ( 18) is given by Similarly, to overcome the non-convexity of C4a, we can use the inequality in (20) to obtain Next, we focus on the optimization of θ t , θ r .We rewrite constraints C2 and C3 as C10 : Diag(θ t θ H t + θ r θ H r ) = 1.It is obvious that the above constraint C10 is non-convex.To cope with this, we introduce auxiliary vectors Following the principles of the penalty concave-convex procedure, we relax x t,m , x r,m by m .Thus, we obtain problem (42), as shown at the bottom of the page, where y t,m ≥ 0, y r,m ≥ 0 are the slack variables for the modulus constraints; ∑ 2M m=1 y t,m , ∑ 2M m=1 y r,m are the penalty terms added into the objective function, which is scaled by the multiplier η (i) in the i-th iteration.In addition, η (i) is updated with η (i) = min{γη (i−1) , η max }, where the upper bound η max is used to avoid numerical problems.The original problem can be obtained from the following optimization problem: s.t.C1, C4a, C4b, C4c, C5, C6, C7, C8, C9a, C9b C10a Since the rank-one constraint in C6 is the only non-convex part of the optimization problem (42), we apply the SDR technique to drop the rank constraint in C6, such that the relaxed rank constraint version of (42) can be solved by using a standard numerical solver for convex programming.In the following theorem, the tightness of the adopted SDR is revealed.
Theorem 1.For P > 0 and if (42) is feasible, the rank-one constraint of C6 in (42) can always be obtained.
Proof.Please refer to Appendix A for the proof of Theorem 1.
Due to the use of SCA, solving the problem in (42) provides a lower bound.To tighten the lower bound of performance, we iteratively update the feasible solution by solving the problem in (42).The proposed algorithm is shown in Algorithm 1.

√
I 1 log 1 ϱ ), where I 1 = 11 + 6K + 6M and V 1 = 16 + 4K are the number of inequalities and the number of variables of the proposed scheme, respectively.Besides, ϱ is the threshold of convergence tolerance.The computational complexity of each iteration of the conventional RIS algorithm is given by O(( , where I 2 = 10 + 6K + 6M and V 2 = 14 + 4K are the number of inequalities and the number of variables of the conventional RIS scheme, respectively.Although the complexity of conventional RIS is lower, it needs to use multiple RISs to achieve full space coverage, so it is not as flexible and cost-effective as the deployment of STAR-RIS.

Simulation Results and Analysis
We assume that the BS and the STAR-RIS are deployed at (0, 0, 10) and (5, 20, 10) meters, and Bob t and Bob r are deployed at (6,21,10) and (4,19,10) meters.The number of antennas at the BS is 36, and the maximum transmit power is 10mW.Eve t,k and Eve r,k are deployed on half-circles centered at the STAR-RIS with a radius of 5 m.We assume that the STAR-RIS is composed of M = M x M z elements, and we define ν G t,k , ν g t,k , ν G r,k , ν g r,k as the maximum normalized estimation error for the channel G t,k , g t,k , G r,k , g r,k , i.e., ν G and ν 2 = 0.1, which is the normalized mean square error based on the channel estimation method in [30].The maximum tolerable channel capacity of potential eavesdroppers is τ t,k = τ r,k = 2.1 bits/s/Hz.The noise power for users and eavesdroppers is σ 2 b = σ 2 e = −80dBm.For the parameters of the penalty concave-convex procedure method, we set η max = 10 and γ = 0.8.
For the millimeter-wave secure communication system assisted by a STAR-RIS, this study proposes a joint optimization design scheme considering the transmission beamforming vector of the BS and the transmission and reflection coefficients of the STAR-RIS to maximize the system sum rate.The power budget of the BS is an important factor affecting the system sum rate.As shown in Figure 2, with an increase in the power budget, the system sum rate also increases.By increasing the power, the signal strength of the receiving user can be improved, but at this time, the signal strength of the eavesdropper will also be increased.Therefore, the power of the BS should be set reasonably.When the transmission power is small, such as 0 dbm or 5 dBm, the performance improvement of STAR-RIS is not obvious.When the transmitting power is large, such as 20 dbm or 25 dbm, the performance improvement of STAR-RIS is more obvious.It can also be seen from the figure that the sum rate of STAR-RIS is greater than the sum rate of the conventional RIS under the same power of the BS. Figure 3 shows the impact of the number of elements of the two RISs on the system sum rate.It can be seen from the figure that increasing the number of elements of the RIS can increase the system sum rate.As the number of RIS elements increases, for the STAR-RIS, the signal strength transmitted to the transmission region increases, and the signal strength reflected in the reflection region also increases.For a conventional RIS, the signal strength reflected in the reflection region increases.Therefore, for both RISs, the system sum rate increases.It can also be seen from the figure that, with the same number of elements, the sum rate of STAR-RIS is greater than the sum rate of the conventional RIS.With the increase of the number of elements, the relative value of the performance increase of STAR-RIS is almost unchanged.The number of elements M Figure 4 shows the impact of the number of antennas of the BS on the system sum rate.By increasing the number of antennas of the BS, the system sum rate can be improved.As the number of antennas in the BS increases, the strength of the transmitted signal increases, as do the signal transmitted to the RIS and the strength of the received signal at the user side.With the same number of BS antennas, the sum rate of STAR-RIS is greater than the sum rate of the conventional RIS.As the number of antennas increases, the relative value of the performance increase of STAR-RIS is almost similar.The number of antennas N

Conclusions
This study considers a millimeter-wave secure communication system assisted by a STAR-RIS, in which the BS realizes the requirements of secure communication with users in the transmission region and reflection region through the STAR-RIS.By jointly optimizing the transmit beamforming of the BS and the transmitting and reflecting coefficients of the STAR-RIS, the system sum rate is maximized.For the non-convex optimization problem, this study uses a series of transformations to decouple the optimization variables, uses the S-Procedure algorithm to solve the imperfect ECSI, and then, uses the SCA and SDR to design an iterative optimization algorithm.At this time, the problem is transformed into a convex problem, which can be solved using the standard convex programming numerical solver.The simulation results show that the millimeter-wave secure communication scheme assisted by a STAR-RIS proposed in this study can significantly improve the system sum rate and ensure the safe transmission of information.STAR-RIS can be installed in all parts of the city to achieve full coverage of the communication range.Besides, our proposed approach has the potential to improve data transmission speeds and security in various fields like autonomous vehicles, smart cities, and remote healthcare services.The combination of millimeter-wave and RIS can also minimize signal interference and reduce power consumption, making it more sustainable for long-term use.
the power of the transmitter to satisfy constraint C1.Similarly, the same analysis can be performed on W * r .

Figure 1 .
Figure 1.The STAR-RIS-aided system model.The BS simultaneously sends independent signals to each user at the same frequency.s t and s r are represented as the signals sent to Bob t and Bob r , where E{|s t | 2 } = E{|s r | 2 } = 1.Then, the signals received by Bob t , Bob r , Eve t,k , and Eve r,k are

Figure 2 .
Figure 2. System sum rate versus the power budget.

Figure 3 .
Figure 3. System sum rate versus number of elements.

Figure 4 .
Figure 4. System sum rate versus number of antennas.
| • |.The Euclidean norm, spectral norm, nuclear norm, and Frobenius norm of a matrix are denoted by || • ||, || • || 2 , || • || * , and || • || F , respectively.The conjugate transpose, conjugate, expectation, rank, and trace of a matrix are denoted as (•) H , (•) * , E{}, Rank(•), and Tr(•), respectively.The maximum eigenvalue of a matrix is denoted by λ max ∀k, where g t,k is the estimate of the corresponding channel g t,k and the corresponding channel estimation error is ∆g t,k .The continuous set Ω t,k collects all possible channel estimation errors, while constant µ t,k is the maximum value of the norm of the CSI estimation error.Similarly, the BS-STAR-RIS-Eve r,k channel and the STAR-RIS-Eve r,k channel are denoted as G r,k