Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2016 Nov 12;16(11):1908. doi: 10.3390/s16111908

Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

Maoqiang Yang 1,, Bangning Zhang 1,, Yuzhen Huang 1,, Nan Yang 2,, Daoxing Guo 1,*,, Bin Gao 1,
Editors: Ignacio Bravo, Esther Palomar, Alfredo Gardel, José Luis Lázaro
PMCID: PMC5134567  PMID: 27845753

Abstract

In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.

Keywords: wireless sensor networks, physical layer security, multiuser scheduling, transmit antenna selection, cooperative jamming, secrecy outage probability, effective secrecy throughput

1. Introduction

Wireless sensor networks (WSNs) are envisioned as an emerging research field with numerous applications, such as health monitoring, vehicular tracking, military surveillance and environment sensing. Therefore, the research of WSNs has recently attracted a tremendous amount of attention from both industry and academia [1,2]. Generally, in the WSNs, a large number of the sensor nodes are deployed to collect the environmental information, and then report the sensed data to a base station (BS) wirelessly [3,4]. However, the secure transmission of WSNs is a fundamental concern due to the broadcast characteristics of radio propagation, and thus the sensing information is required to be safeguarded [5,6]. Conventionally, the cryptographic encryption relying on a secrecy key is broadly adopted to protect the confidential message from being wiretapped by the eavesdroppers. Nevertheless, the limitations behind the traditional cryptographic techniques lie in the complex protocols and architectures for the distribution and management of secret keys. It is noteworthy that the sensor nodes are the energy-constrained, cost-constrained, and lightweight computing devices, in which a considerable portion of the available energy is allocated to support the core sensorial and computational capabilities. Hence, there is possibly little left over to provide the security [7,8,9,10,11,12]. As such, it is of interest to explore efficient and low-complexity protocols to guarantee the secrecy of WSNs.

To address the above concerns, the physical layer security (PLS) technique has emerged as an attractive approach to achieve the perfect secrecy from an information-theoretical perspective [13]. The basic idea of PLS is to take advantage of the imperfection of wireless medium (e.g., fading, interference and noise) to ensure the secure transmission between the legitimate parties. By introducing randomness and structured redundancy into the data signal, the PLS enables legitimate users to decode the confidential messages correctly while keeps the eavesdropper from extracting the messages successfully [4,14,15].

Recently, various advanced techniques such as multi-antenna, cooperative relaying and cooperative jamming have been incorporated to further boost the potential benefits of PLS. In particular, transmit antenna selection (TAS) has been widely investigated on account of the low realization complexity of radio frequency (RF) chain, meanwhile yielding full diversity [16,17,18,19,20,21]. Recently, Yang et al. [16] proposed and analyzed TAS to enhance PLS in multiple-input multiple-output (MIMO) wiretap channels. Later on, TAS with Alamouti coding and power allocation was addressed in [17]. Considering the outdated channel state information (CSI) due to feedback delay, the authors in [18] investigated the secrecy outage performance of spectrum sharing MIMO networks with generalized TAS and maximal ratio combining (MRC) over the Nakagami-m channel. Based on whether the source node has the global CSIs of both the main link and eavesdropper’s link, optimal antenna selection (OAS) and suboptimal antenna selection (SAS) were proposed in [19] with the traditional space-time transmission (STT) as a benchmark in MIMO systems. Meanwhile, [20] examined TAS/MRC and TAS/selection combining (SC) scheme with decode-and-forward (DF) relaying in underlay spectrum sharing with multiple primary users (PU) transceivers and multiple antennas at the secondary users (SUs). In addition, in [21], the secrecy performance of multiple-input single-output (MISO) simultaneous wireless information and the power transfer (SWIPT) system was studied with TAS and imperfect CSI.

In parallel, cooperative jamming has been identified as an effective paradigm to enhance the security due to its ability of reducing the leakage rate to the wiretapper. Loosely speaking, the jamming signals can be transmitted from the source [14,15], the legitimate destination [22,23] and the relay [24,25,26,27,28,29,30]. As indicated in these studies, the jamming signals need to be designed carefully since the interference may also be leaked to the desired user. With the assistance of artificial noise, the optimal secure transmission was addressed by considering an on-off transmission scheme and an adaptive transmission scheme in the MISO single-antenna eavesdropper wiretap channel [14] and in the MISO multi-antenna eavesdropper wiretap channel [15], respectively. In [14,15], the artificial noise was transmitted in conjunction with the information signal at the BS, and beamforming matrix was designed to deteriorate the eavesdropper’s channel quality by transmitting noise in all directions except towards the intended user. Furthermore, [22] generated the artificial jamming noise at the legitimate receiver, under the assumption that the receiver knows the artificial jamming noise and thus can cancel it by performing self-interference subtraction. In [23], a joint scheme of destination-aid cooperative jamming and precoding at both the source and the relay was proposed for dual-hop amplify-and-forward MIMO untrusted relay systems, where the self-interference is assumed to be perfectly estimated and can be subtracted from the received signal. In addition, considering the jamming signals emitted by the relay, the external helper degraded the eavesdropper’s channel without hurting the legitimate channel. With imperfect CSI, the secure communication aided by a multi-antenna cooperative jammer was addressed in [24]. Taking into account which role the helper should take to enhance the secrecy, [25] investigated a direct transmission scheme (DTS) and a relay transmission scheme (RTS) in terms of ergodic secrecy rate and optimal power allocation. The work in [26] investigated different secrecy rate optimization techniques for a multi-antenna cooperative jammer assisted MIMO secrecy channel. Moreover, in [27], three secure transmission schemes were investigated in multi-antenna relay systems with cooperative jamming in terms of the ergodic achievable secrecy rate. Very recently, the worst-case cooperative jamming for secure communications in the cognitive internet of things (CIoT) was investigated in [28]. In [29], the MRC/ZFB scheme at the relay was designed to enhance the secrecy performance of dual-hop multi-antenna spectrum sharing relaying networks, while the cooperative jamming with the ZFB scheme was addressed in [30] to achieve secure transmission in cooperative relaying networks.

It is critical to note that, in multiuser communication systems, the conventional opportunistic scheduling scheme requires the feedback of channel information for all the diversity branches. Based on the continuously-updated CSIs of all the nodes in the network, full multiuser diversity gains are explored at the central scheduler. However, a significant portion of the battery energy of the low-end terminals and a large share of air-link resources are occupied to feed the CSIs back instead of valuable data traffic [31]. To circumvent this difficulty, the multiuser switched diversity scheduling schemes were proposed in [32] in order to search any acceptable user (i.e., with good channel quality) rather than the best one among all. Recently, PLS with threshold-based multiuser scheduling was studied in multi-antenna wireless networks [33]. Considering the imperfect decoding at the regenerative relay, the secure multiuser scheduling was investigated in dual-hop relay networks over Nakagami-m fading in [34]. In particular, the multi-branch switch-and-stay combining (SSC) scheme was first addressed in [35], which reduces the implementation complexity for multi-channel communication scenarios. In the multi-branch SSC scheme, if the channel quality of the currently connected branch exceeds a predetermined threshold, then this branch is kept. Otherwise, no matter what the channel quality of the switch-to branch is, the scheduler settles on that branch for the next transmission burst [35]. It is noteworthy that, in considering the opportunistic relay selection in cooperative networks, the distributed SSC scheme was explored in [36] for secrecy enhancement. More recently, a secure SSC protocol was proposed in [37] to overcome the high relay switching rate for two-phase underlay cognitive relay networks.

To the best knowledge of the authors, the SSC based secure multiuser transmission with TAS and cooperative jamming for WSNs has not been reported in literature thus far. We are therefore motivated to examine the security level of such networks when cooperative jamming is applied in parallel with user selection. The main contributions of this paper are summarized as follows:

  • Two novel hybrid secure transmission schemes, i.e., TAS-SSC-ZFB and TAS-SSC-NAN, are proposed for securing the data transmission in WSNs while achieving low feedback requirements and examination costs.

  • Exact closed-form expressions for the secrecy outage probability and effective secrecy throughput are derived for the proposed schemes, which provide an efficient and convenient approach to characterize the secrecy performance of the considered network.

  • Using these closed-form expressions, the optimal switching threshold is determined and the optimal power allocation factor between the BS and CJ is obtained for both schemes to minimize the secrecy outage probability. In addition, the optimal secrecy rate is decided for both schemes to maximize the effective secrecy throughput. Our findings demonstrate that the TAS-SSC-ZFB scheme outperforms the TAS-SSC-NAN scheme in terms of both secrecy outage probability and effective secrecy throughput, while the TAS-SSC-NAN scheme is more robust than the TAS-SSC-ZFB scheme.

The remaining parts of the paper are organized as follows. In Section 2, the system model and transmission protocols of TAS-SSC-ZFB and TAS-SSC-NAN are presented, and the secrecy performance of both schemes are analyzed in Section 3. In Section 4, the numerical simulation and discussions are provided to validate the theoretical analysis. Finally, the conclusions are drawn in Section 5.

2. System Model and Transmission Protocol

2.1. System Model

Let us consider a multiuser downlink wireless sensor network, as illustrated in Figure 1, in which a base station (A) with AA transmit antennas serves NB single-antenna legitimate sensor nodes (B) in the presence of a single-antenna eavesdropper (E), and a friendly pure jammer (J) with AJ antennas AJ2. In this model, we preserve the practical assumption that the legitimate channel, jammer’s channel and the eavesdropper’s channel are subject to independent and non-identically distributed (i.n.i.d) flat Rayleigh fading such that they have different average signal-to-noise ratio (SNR), i.e., γ¯B,γ¯J and γ¯E, and the involved fading coefficients are quasi-stationary within the channel coherence time. In order to perform secure transmission, the BS encodes the messages with a capacity achieving wiretap codebook and then transmits the resulting codewords to the legitimate user. In addition, each transmission block is considered to be equivalent to the channel coherence time and is composed of two parts, i.e., guard time and data transmission time.

Figure 1.

Figure 1

System model.

2.2. Secure Transmission Schemes

We now detail the proposed secure transmission schemes in the considered WSNs. In general, the complete transmission procedure can be separated into two phases.

In the first phase, an acceptable user of NB candidates is selected according to the SSC scheme [35] out of AA transmit antennas within the guard time to carry out the data transmission. To be specific, considering the first transmit antenna (α=1), the previously selected user k k1,2,,NB compares its instantaneous SNR γα,kb with the pre-determined switching threshold γT. If the received instantaneous SNR exceeds γT, then it stays without switching over and feeds the SNR and user index back to the BS with γB,α=γα,kbγT. Otherwise, it switches to the next user regardless of its SNR following the similar feedback operation with γB,α=γα,k+1b. The same SSC operation repeats for the rest of AA1 transmit antennas.

To proceed, the pair of transmit antenna and corresponding selected user that gives the largest instantaneous SNR is picked out, which is right for the data transmission time. As such, only one legitimate user is scheduled for data transmission without continuously examining all the users in the WSNs, which brings about considerable savings of feedback requirements and implementation complexity. Therefore, the selected antenna is given by

α*=argmax1αAAγB,α. (1)

In the second phase, we consider a cooperative relay node, which serves as the friendly pure jammer. Note that the synchronization requirement between the cooperative jammer and the BS can be implemented by some well-known techniques, for instance, the time-service from the GPS or compass. Alternatively, the BS can broadcast the timing information, which enables the cooperative jammer to keep the same pace with the BS. Depending on whether the relay node has the global CSIs of both J → B link and J → E link, the ZFB scheme and NAN scheme are, respectively, explored to confound the eavesdropper while avoiding interference with the selected legitimate user.

2.2.1. Zero-Forcing Beamforming

Firstly, similar to [29,30,38,39], we assume that the CSIs of both J → B link and J → E link are available at the relay. It is pointed out that this scenario is reasonable in the multiuser system where the user may play dual roles as legal receiver for some messages and as eavesdropper for others [40,41,42].

The purpose of the ZFB scheme is to maximize the interference imposed on the eavesdropper while avoiding the interruption to the selected legitimate user. To this end, according to the principle of ZFB scheme, we obtain

maxwhJEw,s.t.hJBw=0&wF=1, (2)

where † denotes the conjugate transpose operator and ·F represents the Frobenius norm. w is the weight vector, hJB and hJE, separately, denote the AJ×1 vector for the CSIs of J → B link and J → E link, whose entries follow Rayleigh distribution with zero mean, and variance λJB and λJE, respectively.

Based on the projection matrix theory [43] (Proposition 1), the optimum beamforming vector w is given by

w=hJEhJEF, (3)

where =IhJBhJBhJB1hJB is the projection idempotent matrix. Hence, the instantaneous SNR of the legitimate channel is given by

γB=PAσB2hα*B2, (4)

and the instantaneous received signal-to-interference-and-noise ratio (SINR) of eavesdropper’s channel is given by

γE=PAσE2hα*E2PJσE2hJEF2+1, (5)

where hα*B and hα*E denote the CSIs of the selected legitimate channel and the selected transmit antenna to the eavesdropper channel, respectively. Its entries follow Rayleigh distribution with zero mean, and variance λAB and λAE. σB2 and σE2 denote the noise variance at the legitimate user and eavesdropper, respectively. PA and PJ denote the transmit powers at the BS and the jammer, respectively.

2.2.2. Null-Space Artificial Noise

To relax the assumption in the ZFB scheme, we now consider that the CSI of J → E link is unavailable at the relay and the relay only has the knowledge of CSI for J → B link. Here, the NAN scheme is exploited to emit artificial noise in the nullspace of the selected legitimate user but disperse in all directions towards the eavesdropper. We design the AJ×AJ beamforming matrix as W=wJB,WJE, where wJB is an AJ×1 vector used for J → B link and WJE is an AJ×AJ1 matrix used to deteriorate the quality of eavesdropper’s channel by transmitting AN in all directions except towards the selected legitimate user.

To do so, we choose wJB as the principle eigenvector corresponding to the largest eigenvalue of hJBhJB, and then choose WJE as the remaining AJ1 eigenvectors of hJBhJB such that WJE lies in the nullspace of hJB, i.e., hJBWJE=0. As such, W is a unitary matrix. In addition, since the cooperative jammer has no knowledge about hJE, the jammer distributes the transmit power PJ uniformly across the AJ1 transmit antennas. Building on this, we have the same instantaneous SNR of the legitimate channel as the ZFB scheme, and the corresponding instantaneous SINR of the eavesdropper’s channel is given by

γE=PAσE2hα*E21AJ1PJσE2hJEWJEF2+1. (6)

For both cooperative jamming schemes, we further assume that the total transmit power adopted at the BS and CJ is constrained by PS, i.e., PA+PJ=PS. We define ϕ, 0<ϕ<1, as the power allocation scaling factor which denotes the fraction of the power allocation to the BS, such that PA=ϕPS and PJ=1ϕPS. For notational convenience, we define the overall average transmit SNR as γ¯S=PS/σB2, the average transmit SNR of AB link, AE link and JE link as γ¯B=PA/σB2, γ¯E=PA/σE2 and γ¯J=PJ/σE2, respectively.

We also denote MBE=γ¯B/γ¯E as the ratio between the average SNR of AB link and AE link, i.e., the main-to-eavesdropper (MER) ratio. As such, we have γ¯B=ϕγ¯S, γ¯E=γ¯B/MBE and γ¯J=1ϕγ¯S/MBE.

We highlight that the proposed methods bring about several advantages that are of particular interest to WSNs. First, the exploitation of SSC scheduling among legitimate nodes help to avoid a large amount of CSI feedback, which, in turn, reduces the share of air-link resources. Second, the best antenna at the BS is optimal to the selected legitimate link but is equivalent to a random transmit antenna for the eavesdropper. Thus, the eavesdropper cannot achieve any transmit diversity from the best antenna. Third, the cooperative jamming schemes, i.e., the ZFB scheme and NAN scheme, are designed to increase the interference at the eavesdropper while avoiding interrupting the selected legitimate node, which provides a further safeguard for data transmission in WSNs. Building on these advantages, we clarify that our proposed schemes allow low-cost sensor nodes to fully explore the limited battery energy to support the core sensorial and computational operations, while guaranteeing the secure data transmission from the sensor nodes.

2.3. Achievable Secrecy Rate

Now, the achievable secrecy rate of the SSC based WSNs with TAS and cooperative jamming is provided by

Cs=CBCE+=[log1+γBlog1+γE]+, (7)

where u+=maxu,0, CB=log1+γB and CE=log1+γE represent the instantaneous capacity of the legitimate channel and eavesdropper’s channel, respectively.

3. Secrecy Performance Analysis

In this section, we analyze the secrecy outage probability and the effective secrecy throughput as the main performance metrics to examine the secrecy performance of the considered network.

3.1. Preliminaries

Before proceeding, we first determine the statistic properties of the end-to-end instantaneous SNRs in the considered network. According to the basic principle of the SSC scheme and following the same steps developed in [35], the cumulative distribution function (CDF) for γB,α is provided by

FγB,αγ=Fγα,kbγTFγα,kbγ,γ<γT,Fγα,kbγ+Fγα,kbγTFγα,kbγ1,γγT. (8)

Moreover, according to the antenna selection at the BS, we define γB as the resulting instantaneous SNR of A → B link with γB=maxγB,α,α1,2,,AA. Considering that each legitimate channel is subject to independent and identical distribution (i.i.d.) Rayleigh fading, the CDF of γB is given by FγBγ=FγB,αγAA. Furthermore, with the assistance of binomial theorem [44] (Equation (1.111)), the CDF of γB can be re-expressed as

FγBγ=Fγα,kbγTAAFγα,kbγAA,γ<γT,q=0AAAAqFγα,kbγTqq1=0qqq11q1Fγα,kbγAAq1,γγT, (9)

where Fγα,kbγ=1γγ¯Bexpγγ¯B denotes the CDF for end-to-end instantaneous SNR of each legitimate link.

On the other hand, according to Equation (5), the probability density function (PDF) of end-to-end instantaneous SNR γE with ZFB scheme can be expressed as

fγE()x=1γ¯E1+γ¯Jγ¯ExAJ1expxγ¯EAJ1γ¯J1+γ¯Jγ¯Ex1+1. (10)

Similarly, based on Equation (6), the PDF of end-to-end instantaneous SNR γE with NAN scheme is given by

fγE()x=1γ¯E1+γ¯Jγ¯E1AJ1xAJ1expxγ¯Eγ¯J1+γ¯Jγ¯E1AJ1x1+1. (11)

Proof. 

The detailed derivation of Equation (10) can be found in [30] (Appendix D), and following the similar lines we have Equation (11). ☐

3.2. Secrecy Outage Probability

The definition of secrecy outage probability is the probability that the achievable secrecy rate falls down the predetermined secrecy rate Rs [30,38,41]. Mathematically, the secrecy outage probability can be formulated as

OoutRs=PrCs<Rs. (12)

Now, an exact closed-form expression for secrecy outage probability of the considered system is derived and expressed in the following theorem.

Theorem 1.

The secrecy outage probability of the SSC based WSNs with TAS and cooperative jamming is derived as

OoutκRs=OoutAκRs,ΠγT0,OoutBκRs,ΠγT<0, (13)

where κI,II with I and II stand for the TAS-SSC-ZFB scheme and the TAS-SSC-NAN scheme, respectively. OoutIRs and OoutIIRs are provided by Equation (19) and Equation (20), as shown at the top of the next page, respectively. z=2Rsq2γ¯B+1γ¯E, E1=exp2Rs1γ¯B, and ΠγT=2Rs1+γT1. Γα,β and Ψμ,υ;τ denote the upper incomplete Gamma function [44] (Equation (8.350.2)) and confluent hypergeometric function of the second kind [44] (Equation (9.211.4)), respectively.

Proof of Theorem 1.

Based on the definition in Equation (12), we have

OoutRs=PrCs<Rs|γB>γEPrγB>γEP1+PrγB<γEP2, (14)

where P1 and P2 are given by, respectively,

P1=0y2Rs1+y1fγBxfγEydxdy (15)

and

P2=00yfγBxfγEydxdy. (16)

Now, inserting Equations (15) and (16) into Equation (14) for both schemes yields

OoutRs=002Rs1+y1fγBxfγEydxdy=0FγB2Rs1+y1fγEydy, (17)

where fγBx is the PDF of γB. Owing to the fact that the switching threshold γT is exploited in the CDF of γB in Equation (8), we have the relationship between 2Rs1+y1 and γT in Equation (17), i.e., 2Rs1+y1γT or 2Rs1+y1<γT. For the simplicity of notation, we denote a boundary point by ΠγT=2Rs1+γT1. To do so, the derivation of secrecy outage probability is separated into two parts regarding the bound point ΠγT. Thus, we have,

OoutRs=0ΠγTFγBλyfγEydy+ΠγTFγBλyfγEydy,ΠγT0,0FγBλyfγEydy,ΠγT<0, (18)

where λy=2Rs1+y1.

In the following, by substituting Equations (9) and (10) into Equation (18) and using [44] (Equations (1.111), (3.381.3), and (9.211.4)), the secrecy outage probability OoutRs in Equation (18) is derived in Equation (19) for the TAS-SSC-ZFB scheme. Similarly, for the TAS-SSC-NAN scheme, OoutRs is presented in Equation (20). ☐

We remark that our new derived expressions in Equations (19) and (20) are ready to compute because the involved functions are merely the easy-to-calculate exponential functions, power functions, upper incomplete Gamma functions and confluent hypergeometric functions. As such, the optimal performance and optimal parameters of the considered network are achieved with convenience.

We further highlight that the derived theoretical results in Equations (19) and (20) are valid for general WSNs with an arbitrary number of antennas at the BS and cooperative jammer, arbitrary number of legitimate users, arbitrary average SNRs and switching threshold.

OoutAIRs=FγγTAAq=0AAAAq1qE1qexpγ¯Ezγ¯Jγ¯Jγ¯Ezγ¯JAJ1{AJ1γ¯J[Γ1AJ,γ¯Ezγ¯JΓ1AJ,γ¯Ezγ¯J+zΠγT]+γ¯Ezγ¯J1Γ2AJ,γ¯Ezγ¯JΓ2AJ,γ¯Ezγ¯J+zΠγT}+q=0AAAAqFγγTqq1=0qqq11q1q2=0AAq1AAq1q21q2E1q2expγ¯Ezγ¯Jγ¯Jγ¯Ezγ¯JAJ1×AJ1γ¯JΓ1AJ,γ¯Ezγ¯J+zΠγT+γ¯Ezγ¯J1Γ2AJ,γ¯Ezγ¯J+zΠγT, (19a)
OoutBIRs=q=0AAAAqFγγTqq1=0qqq11q1q2=0AAq1AAq1q21q2E1q2×AJ1Ψ1,2AJ;γ¯Eγ¯Jz+γ¯J1Ψ1,3AJ;γ¯Eγ¯Jz, (19b)
OoutAIIRs=FγγTAAq=0AAAAq1qE1qAJ1γ¯JexpAJ1γ¯Ezγ¯JAJ1γ¯Ezγ¯JAJ1×{γ¯JΓ1AJ,AJ1γ¯Ezγ¯JΓ1AJ,AJ1γ¯Ezγ¯J+zΠγT+AJ1γ¯Ezγ¯J1×Γ2AJ,AJ1γ¯Ezγ¯JΓ2AJ,AJ1γ¯Ezγ¯J+zΠγT}+q=0AAAAqFγγTq×q1=0qqq11q1q2=0AAq1AAq1q21q2E1q2AJ1γ¯JexpAJ1γ¯Ezγ¯JAJ1γ¯Ezγ¯JAJ1×γ¯JΓ1AJ,AJ1γ¯Ezγ¯J+zΠγT+AJ1γ¯Ezγ¯J1Γ2AJ,AJ1γ¯Ezγ¯J+zΠγT, (20a)
OoutBIIRs=q=0AAAAqFγγTqq1=0qqq11q1q2=0AAq1AAq1q21q2E1q2×AJ1Ψ1,2AJ;γ¯EzAJ1γ¯J+γ¯J1Ψ1,3AJ;γ¯EzAJ1γ¯J. (20b)

3.3. Effective Secrecy Throughput

Before proceeding, we first present the definition of the secrecy transmission probability as the probability that the messages are confidentially conveyed from the BS to the legitimate user without leaking to the eavesdropper. Thus, according to [15] (Equation (8)), we have,

PsecκRs=1OoutκRs. (21)

From Equation (21), it is found that the effective secrecy throughput can be characterized as the product of the secure transmission probability and secrecy rate Rs, which evaluates the average rate of the messages that are transmitted from the BS to the legitimate user confidentially in the passive wiretapping scenario [14,15]. We now present the effective secrecy throughput in the following theorem.

Theorem 2.

The effective secrecy throughput of the SSC based WSNs with TAS and cooperative jamming is derived as

STκRs=1OoutAκRsRs,ΠγT0,1OoutBκRsRs,ΠγT<0, (22)

where κI,II with I and II represent the TAS-SSC-ZFB scheme and the TAS-SSC-NAN scheme, respectively.

Proof of Theorem 2.

By substituting Equations (19) and (20) into Equation (22), the exact closed-form expressions for the effective secrecy throughput of the considered WSNs can be obtained. ☐

4. Simulations and Discussions

In this section, we perform the simulations with MATLAB R2014a 64-bit version (The MathWorks, Inc., Natick, MA, USA) running on a Windows 7 64-bit system (Microsoft, Redmond, Washington D.C., USA). Monte Carlo simulation results of the proposed TAS-SSC-ZFB and TAS-SSC-NAN schemes are presented to validate the conducted analysis and illustrate the joint impact of the key system parameters on the secrecy performance of the considered network.

Figure 2 illustrates the secrecy outage probability versus overall average transmit SNR γ¯S of the considered system with equal power allocation for both schemes. It can be readily observed that the theoretical analyses in Theorem 1 are in exact agreement with the Monte Carlo simulations, which demonstrates the correctness of our derived results. Moreover, we observe that the TAS-SSC-ZFB scheme outperforms the TAS-SSC-NAN scheme, which can be explained by the fact that the TAS-SSC-ZFB scheme benefits from the CSIs of both J → B channel and J → E channel while the TAS-SSC-NAN scheme merely relies on the knowledge of the J → B channel. In addition, as expected, increasing the number of transmit antennas brings about a significant secrecy performance improvement while enhancing the secrecy rate results in larger secrecy outage probability.

Figure 2.

Figure 2

Secrecy outage probability versus different γ¯S for AJ=3, NB=2,γT=10 dB, MBE=5, and ϕ=0.5.

Figure 3 examines the secrecy outage probability versus different antenna configurations at the cooperative jammer. Interestingly, we first see that the TAS-SSC-ZFB scheme degrades into the TAS-SSC-NAN scheme when the number of antennas at the jammer is equal to two. Such an observation is explained by the fact that the PDF of γE for the TAS-SSC-ZFB scheme is equivalent to that for the TAS-SSC-NAN scheme when AJ=2. Next, we find that the secrecy performance comes to a floor for both schemes when the number of antennas grows large. Notably, the secrecy outage floors can be further improved by increasing the number of antennas at the BS or decreasing the predetermined secrecy rate. Finally, we find that the secrecy performance is independent of the number of legitimate users in the networks. This is demonstrated by the observation that OoutRs stays the same when NB=2 increases to NB=4 with AA=2,Rs=1 setup for both schemes.

Figure 3.

Figure 3

Secrecy outage probability versus different AJ for γT=10 dB, MBE=5, γ¯S=20 dBW, and ϕ=0.5.

Figure 4 depicts the secrecy outage probability versus different switching threshold γT for the given equal power allocation. Firstly, we find that there exists an optimal switching threshold γT* for both schemes, which accounts for the SSC scheduling being employed in the networks and being independent of the way that the cooperative jammer operates. Regarding the antenna configuration of the cooperative jammer, it can be observed that increasing the number of antennas has a positive impact on the secrecy performance and the minimum OoutRs shifts to the left. In addition, we see that the secrecy outage probability degrades when γ¯E increases and the optimal γT* shifts to right. For instance, γT* increases from 10.9 dB for MBE=10 to 11.7 dB for MBE=5 concerning the TAS-SSC-ZFB scheme when AJ=3, and increases from 11.6 dB for MBE=10 to 12.45 dB for MBE=5 concerning the TAS-SSC-NAN scheme when AJ=3. This reveals that a larger switching threshold setup is required to obtain the minimum OoutRs for larger γ¯E.

Figure 4.

Figure 4

Secrecy outage probability versus different γT for AA=2, NB=2,Rs=1, γ¯S=20 dB, and ϕ=0.5.

Figure 5 shows the secrecy outage probability versus different power allocation between the BS and the cooperative jammer. Considering a given switching threshold, we can see that an optimal power allocation factor ϕ* is found for both schemes. Specifically, the optimal factor ϕ* shifts to the right when the number of antennas at the cooperative jammer increases (e.g., AJ=2,MBE=5 and AJ=3,MBE=5). This reveals that less power is allocated at the cooperative jammer since this antenna configuration improves the capabilities of jamming. Once again, we can see that the TAS-SSC-ZFB scheme and the TAS-SSC-NAN scheme yield the same secrecy performance when the cooperative jammer is equipped with only two antennas. Furthermore, the optimal ϕ* shifts to the left for both schemes when γ¯E increases. This indicates that more power is necessary to be allocated for the jamming signal to achieve the minimum OoutRs in view of higher γ¯E.

Figure 5.

Figure 5

Secrecy outage probability versus different ϕ for γT=10 dB, AA=3,NB=2,Rs=1, and γ¯S=20 dB.

Figure 6 plots the effective secrecy throughput versus different secrecy rates for a given switching threshold and power allocation factor. In this figure, it is found that ST first increases and then decreases as Rs increases, which demonstrates that there exists an optimal Rs* point to achieve the largest effective secrecy throughput. To begin with, we concentrate on the impact of the number of transmit antenna elements AA and the total transmit power γ¯S. We readily observe that a larger effective secrecy throughput is obtained while either AA or γ¯S increases. Moreover, it can be seen that the TAS-SSC-ZFB scheme slightly outperforms the TAS-SSC-NAN scheme in the medium to high regime of Rs. Furthermore, the optimal Rs* shifts to the right while considering that either AA or γ¯S improves. For instance, considering the cases AA=2,γ¯S=20 dBW and AA=2,γ¯S=25 dBW, we see that increasing γ¯S from 20 dBW to 25 dBW leads to enhancement of Rs* from 4.1 to 5.3 for the TAS-SSC-NAN scheme as well as from 4.3 to 5.6 for the TAS-SSC-ZFB scheme. Likewise, considering the cases AA=2,γ¯S=25 dBW and AA=4,γ¯S=25 dBW, we find that increasing AA from 2 to 4 increases Rs* from 5.3 to 5.8 for the TAS-SSC-NAN scheme as well as from 5.6 to 6.2 for the TAS-SSC-ZFB scheme. These observations indicate that the BS supports a larger secrecy rate for higher AA and γ¯S.

Figure 6.

Figure 6

Effective secrecy throughput versus different Rs for AJ=3, γT=10 dB, NB=2, γ¯B/γ¯E=10, and ϕ=0.5.

We now focus on the impact of the number of antenna elements at the jammer AJ or the average SNR of legitimate channel γ¯E. As can be obviously revealed from Figure 7, decreasing AJ or increasing γ¯E results in a reduction in the effective secrecy throughput. Moreover, we find that Rs* shifts to the left when AJ decreases or γ¯E increases. Considering the cases AJ=2,MBE=10 and AJ=3,MBE=10, it can be seen that reducing AJ from 3 to 2 decreases Rs* from 4.4 to 4.3 for the TAS-SSC-NAN scheme and from 4.7 to 4.3 for the TAS-SSC-ZFB scheme. Similarly, comparing the cases of AJ=3,MBE=10 and the case of AJ=3,MBE=25, it can be found that increasing γ¯E from γ¯B/25 to γ¯B/10 decreases Rs* from 4.6 to 4.4 for the TAS-SSC-NAN scheme and from 4.8 to 4.7 for the TAS-SSC-ZFB scheme. These observations indicate that the BS supports a lower secrecy rate for higher γ¯E and smaller AJ.

Figure 7.

Figure 7

Effective secrecy throughput versus different Rs for AA=3, γT=10 dB, NB=2, γ¯S=20 dBW, and ϕ=0.5.

5. Conclusions

In this paper, we designed the secure transmission in the SSC based WSNs with TAS and cooperative jamming. Specifically, the TAS scheme was adopted at the BS, and the ZFB scheme as well as the NAN scheme were, respectively, explored at the cooperative jammer to further improve the security of the considered network. In doing so, we derived the novel exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput to evaluate the secrecy performance achieved by both schemes. Additionally, numerical results were presented to validate the analysis of the proposed schemes and provide insights into the impact of key system parameters on the secrecy performance. Finally, it was revealed that the TAS-SSC-ZFB scheme outperforms the TAS-SSC-NAN scheme in terms of the secrecy outage probability and the effective secrecy throughput, while the TAS-SSC-NAN scheme is more robust than the TAS-SSC-ZFB scheme.

Acknowledgments

This work was supported by the National Science Foundation of China (No. 61501507), and the Jiangsu Provincial Natural Science Foundation of China (No. BK20150719). The work of Nan Yang is supported by the Australian Research Council Discovery Project (DP150103905). The authors would like to extend their gratitude to the anonymous reviewers for their valuable and constructive comments, which have largely improved and clarified this paper.

Author Contributions

Maoqiang Yang, Bangning Zhang and Yuzhen Huang conceived of the main proposal of TAS-SSC-ZFB and TAS-SSC-NAN schemes, conducted system modeling, and derived analysis and numerical simulation of the proposed schemes. Maoqiang Yang and Daoxing Guo wrote the manuscript. Nan Yang, Yuzhen Huang, and Bin Gao provided considerable comments and technique review of the proposed scheme and contributed to the revision of the paper. Bangning Zhang and Daoxing Guo read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Deng Y., Wang L., Elkashlan M., Nallanathan A., Mallik R.K. Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach. IEEE Trans. Inf. Forensics Secur. 2016;11:1128–1138. doi: 10.1109/TIFS.2016.2516917. [DOI] [Google Scholar]
  • 2.Gope P., Hwang T. A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 2016;63:7124–7132. doi: 10.1109/TIE.2016.2585081. [DOI] [Google Scholar]
  • 3.Sun L., Ren P., Du Q., Wang Y. Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 2016;12:291–300. doi: 10.1109/TII.2015.2509442. [DOI] [Google Scholar]
  • 4.Liau Q.Y., Leow C.Y., Ding Z. Physical layer security using two-path successive relaying. Sensors. 2016;16:846. doi: 10.3390/s16060846. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 5.Mehmood A., Song H., Lloret J. In Multi-agent based framework for secure and reliable communication among open clouds, Network Protocols and Algorithms. Macrothink Inst. 2014;6:60–76. [Google Scholar]
  • 6.Butun I., Erol-Kantarci M., Kantarci B., Song H. Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Commun. Mag. 2016;54:47–53. doi: 10.1109/MCOM.2016.7452265. [DOI] [Google Scholar]
  • 7.Trappe W. The challenges facing physical layer security. IEEE Commun. Mag. 2015;53:16–20. doi: 10.1109/MCOM.2015.7120011. [DOI] [Google Scholar]
  • 8.Xu Q., Ren P., Song H., Du Q. Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access. 2016;4:2840–2853. doi: 10.1109/ACCESS.2016.2575863. [DOI] [Google Scholar]
  • 9.Curiac D.I. Wireless sensor network security enhancement using directional antennas: State of the art and research challenges. Sensors. 2016;16:488. doi: 10.3390/s16040488. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 10.Song H., Rawat D.B., Jeschke S., Brecher C. Cyber-Physical Systems: Foundations, Principles and Applications. 1st ed. Elsevier/Academic Press; Boston, MA, USA: 2016. [Google Scholar]
  • 11.Sheng G., Wang Y., Lv Z., Song H. Multiple-antenna systems and multiuser communications: Fundamentals and an overview of software-based modeling techniques. Comput. Electr. Eng. 2016 doi: 10.1016/j.compeleceng.2016.08.015. [DOI] [Google Scholar]
  • 12.Xu D., Ren P., Sun L., Song H. Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems. IET Commun. 2016;10:292–299. doi: 10.1049/iet-com.2015.0229. [DOI] [Google Scholar]
  • 13.Yang N., Wang L., Geraci G., Elkashlan M., Yuan J., Renzo M.D. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015;53:20–27. doi: 10.1109/MCOM.2015.7081071. [DOI] [Google Scholar]
  • 14.Yang N., Yan S., Yuan J., Malaney R., Subramanian R., Land I. Artificial noise: Transmission optimization in multi-input single-output wiretap channels. IEEE Trans. Commun. 2015;63:1771–1783. doi: 10.1109/TCOMM.2015.2419634. [DOI] [Google Scholar]
  • 15.Yang N., Elkashlan M., Duong T.Q., Yuan J., Malaney R. Optimal transmission with artificial noise in MISOME wiretap channels. IEEE Trans. Veh. Technol. 2016;65:2170–2181. doi: 10.1109/TVT.2015.2419318. [DOI] [Google Scholar]
  • 16.Yang N., Yeoh P.L., Elkashlan M., Schober R., Collings I.B. Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Commun. 2013;61:144–154. doi: 10.1109/TCOMM.2012.12.110670. [DOI] [Google Scholar]
  • 17.Yan S., Yang N., Malaney R., Yuan J. Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels. IEEE Trans. Wirel. Commun. 2014;13:1656–1667. doi: 10.1109/TWC.2013.013014.131248. [DOI] [Google Scholar]
  • 18.Huang Y., Al-Qahtani F., Duong T., Wang J., Xiao C. Secure transmission in spectrum sharing MIMO channels with generalized antenna selection over Nakagami-m channels. IEEE Access. 2016;4:4058–4065. doi: 10.1109/ACCESS.2016.2593012. [DOI] [Google Scholar]
  • 19.Zhu J., Zou Y., Wang G., Yao Y.D., Karagiannidis G.K. On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping. IEEE Trans. Veh. Technol. 2016;65:214–225. doi: 10.1109/TVT.2015.2397195. [DOI] [Google Scholar]
  • 20.Yeoh P.L., Elkashlan M., Kim K.J., Duong T.Q., Karagiannidis G.K. Transmit antenna selection in cognitive MIMO relaying with multiple primary transceivers. IEEE Trans. Veh. Technol. 2016;65:483–489. doi: 10.1109/TVT.2015.2392753. [DOI] [Google Scholar]
  • 21.Pan G., Lei H., Deng Y., Fan L., Yang J., Chen Y., Ding Z. On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI. IEEE Trans. Commun. 2016;64:3831–3843. doi: 10.1109/TCOMM.2016.2573822. [DOI] [Google Scholar]
  • 22.Park K.H., Wang T., Alouini M.S. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming. IEEE J. Sel. Areas Commun. 2013;31:1741–1750. doi: 10.1109/JSAC.2013.130908. [DOI] [Google Scholar]
  • 23.Xiong J., Cheng L., Ma D., Wei J. Destination aided cooperative jamming for dual-hop amplify-and-forward MIMO untrusted relay systems. IEEE Trans. Veh. Technol. 2016;65:7274–7284. doi: 10.1109/TVT.2015.2490099. [DOI] [Google Scholar]
  • 24.Chen X., Chen J., Zhang H., Zhang Y., Yuen C. On secrecy performance of a multi-antenna jammer aided secure communications with imperfect CSI. IEEE Trans. Veh. Technol. 2016;65:8014–8024. doi: 10.1109/TVT.2015.2510502. [DOI] [Google Scholar]
  • 25.Hao D., Hui-Ming W., Wei G., Wenjie W. Secrecy transmission with a helper: To relay or to jam. IEEE Trans. Inf. Forensics Secur. 2015;10:293–307. [Google Scholar]
  • 26.Zheng C., Cumanan K., Ding Z., Johnston M., Le Goff S.Y. Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Trans. Veh. Technol. 2015;64:1833–1847. [Google Scholar]
  • 27.Zhao R., Huang Y., Wang W., Lau V.K.N. Ergodic achievable secrecy rate of multiple-antenna relay systems with cooperative jamming. IEEE Trans. Wirel. Commun. 2016;15:2537–2551. doi: 10.1109/TWC.2015.2504526. [DOI] [Google Scholar]
  • 28.Li Z., Jing T., Ma L., Huo Y., Qian J. Worst-case cooperative jamming for secure communications in CIOT networks. Sensors. 2016;16:339. doi: 10.3390/s16030339. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 29.Zhang T., Huang Y., Cai Y., Yang W. Secure transmission in spectrum sharing relaying networks with multiple antennas. IEEE Commun. Lett. 2016;20:824–827. doi: 10.1109/LCOMM.2016.2537329. [DOI] [Google Scholar]
  • 30.Huang Y., Wang J., Zhong C., Duong T.Q., Karagiannidis G.K. Secure transmission in cooperative relaying networks with multiple antennas. IEEE Trans. Wirel. Commun. 2016;15:6843–6856. doi: 10.1109/TWC.2016.2591940. [DOI] [Google Scholar]
  • 31.Shaqfeh M., Alnuweiri H., Alouini M.S. Multiuser switched diversity scheduling schemes. IEEE Trans. Commun. 2012;60:2499–2510. doi: 10.1109/TCOMM.2012.062512.110196. [DOI] [Google Scholar]
  • 32.Holter B., Alouini M.S., Oien G.E., Hong-Chuan Y. Multiuser switched diversity transmission; Proceedings of the IEEE Vehicular Technology Conference; Los Angeles, CA, USA. 26–29 September 2004; pp. 2038–2043. [Google Scholar]
  • 33.Yang M., Guo D., Huang Y., Duong T.Q., Zhang B. Physical layer security with threshold-based multiuser scheduling in multi-antenna wireless networks. IEEE Trans. Commun. 2016 doi: 10.1109/TCOMM.2016.2606396. [DOI] [Google Scholar]
  • 34.Yang M., Guo D., Huang Y., Duong T.Q., Zhang B. Secure multiuser scheduling in downlink dual-hop regenerative relay networks over Nakagami-m fading channels. IEEE Trans. Wirel. Commun. 2016 doi: 10.1109/TWC.2016.2610965. [DOI] [Google Scholar]
  • 35.Hong-Chuan Y., Alouini M.S. Performance analysis of multibranch switched diversity systems. IEEE Trans. Commun. 2003;51:782–794. doi: 10.1109/TCOMM.2003.811408. [DOI] [Google Scholar]
  • 36.Al-Qahtani F.S., Zhong C., Alnuweiri H.M. Opportunistic relay selection for secrecy enhancement in cooperative networks. IEEE Trans. Commun. 2015;63:1756–1770. doi: 10.1109/TCOMM.2015.2412939. [DOI] [Google Scholar]
  • 37.Fan L., Zhang S., Duong T.Q., Karagiannidis G.K. Secure switch-and-stay combining (SSSC) for cognitive relay networks. IEEE Trans. Commun. 2016;64:70–82. doi: 10.1109/TCOMM.2015.2497308. [DOI] [Google Scholar]
  • 38.Bloch M., Barros J., Rodrigues M.R.D., McLaughlin S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory. 2008;54:2515–2534. doi: 10.1109/TIT.2008.921908. [DOI] [Google Scholar]
  • 39.Zou Y., Wang X., Shen W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013;31:2099–2111. doi: 10.1109/JSAC.2013.131011. [DOI] [Google Scholar]
  • 40.Wang L., Kim K.J., Duong T.Q., Elkashlan M., Poor H.V. Security enhancement of cooperative single carrier systems. IEEE Trans. Inf. Forensics Secur. 2015;10:90–103. doi: 10.1109/TIFS.2014.2360437. [DOI] [Google Scholar]
  • 41.Hoang T.M., Duong T.Q., Suraweera H.A., Tellambura C., Poor H.V. Cooperative beamforming and user selection for improving the security of relay-aided systems. IEEE Trans. Commun. 2016;63:5039–5051. doi: 10.1109/TCOMM.2015.2494012. [DOI] [Google Scholar]
  • 42.Yang M., Zhang B., Huang Y., Guo D., Yi X. Ergodic secrecy capacity for downlink multiuser networks using switch-and-examine combining with post-selection scheduling scheme. IET Electron. Lett. 2016;52:720–722. doi: 10.1049/el.2015.4375. [DOI] [Google Scholar]
  • 43.Ding Z., Leung K.K., Goeckel D.L., Towsley D. On the application of cooperative transmission to secrecy communications. IEEE J. Sel. Areas Commun. 2012;30:359–368. doi: 10.1109/JSAC.2012.120215. [DOI] [Google Scholar]
  • 44.Gradshteyn I.S., Ryzhik I.M. Table of Integrals, Series, and Products. 7th ed. Elsevier/Academic Press; Amsterdam, The Netherlands: 2007. [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES