Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2018 Sep 4;18(9):2942. doi: 10.3390/s18092942

A Coalitional Formation Game for Physical Layer Security of Cooperative Compressive Sensing Multi-Relay Networks

Jialun Li 1,2, Shuai Chang 1,*, Xiaomei Fu 1,2,*, Liang Zhang 1, Yishan Su 2, Zhigang Jin 2
PMCID: PMC6165233  PMID: 30181482

Abstract

Cooperative relaying is an effective technology to improve the capacity of physical-layer security, in which the relay helps forward the received signal to the destination. In this paper, a cooperative compressive sensing and amplify-and-forward (CCS-AF) scheme, which combines the compressive sensing theory and amplify-and-forward strategy, is proposed to increase the secrecy capacity. To optimize the secrecy performance, a coalition formation algorithm based on coalitional game theory of optimal relay selection is proposed to maximize the secrecy capacity. Different to maximizing the individual utility based on the traditional pareto order, the max-coalition order rule is newly defined to guide the coalitional formation. Simulation results indicate that with the proposed algorithm, part of the relays could form a coalition to forward the information and the proposed algorithm could significantly improve the secrecy capacity of cooperative multi-relay networks.

Keywords: coalitional game, physical layer security, cooperative compressive sensing, multi-relay networks

1. Introduction

Security problems have always been of great importance in wireless communication. Traditionally, the transmitted data is encrypted by the keys to assurance the security. However, the commonly used cryptographic mechanisms have several main shortcomings, such as the difficulty in distributing the key over a public medium and the high computational complexity in wireless sensor networks (WSNs).

Recently, physical layer security has attracted much attention. It could enhance the security of wireless communication against eavesdroppers by exploiting the physical characteristics of wireless channels without encryption keys [1]. The definition of secrecy capacity is the maximum rate of secret information sent from the user to its destination in the presence of eavesdroppers [2,3,4]. It equals to the channel capacity difference between the main channel and the eavesdropper channel. However, to achieve the security, the channel condition limitation must be satisfied for networks without relays. The limitation is that the security can be achieved only when the main channel (source to–relay channel) is better than the eavesdropper channel (source to eavesdropper channel) [5]. To break through the limitation, the cooperative relay, which helps to improve the main channel condition, has recently been used as a practical technology to provide secret transmission [3,4,5,6,7].

Many kinds of approaches have been proposed in light of the physical-layer security under the cooperative communication framework, such as relay strategies and relay selection schemes. For relay strategies, amplify-and-forward (AF) and decode-and-forward (DF) are the most commonly used strategies [8,9,10,11]. For relay selection schemes, single-relay selection (SRS) and multi-relay selection (MRS) schemes are proposed to improve the secrecy capacity based on the signal-to-noise ratio (SNR) at the destination [12,13,14]. These relay selection schemes all require a centralized controller and are not suitable for the practical networks.

The characteristic of self-organization is of great importance to the distributed WSNs and cannot be realized by the traditional MRS schemes. Thus, game theory has attracted much attention in WSNs. Game theory, a highly appealing mathematical tool, has been used to design algorithms for cooperation and competition scenarios in wireless networks. It has also been applied to the physical-layer security for relay selection and power optimization [15,16,17,18,19,20,21,22,23,24]. In relay selection schemes, the distributed coalitional game has been studied in wireless networks, where users can self-organize into disjointed coalitions and maximize the secrecy capacity of each user [15,16,17]. The work in [18,19] solves the problem of multi-relay selection via a distributed algorithm based on the political coalition formation game and offers a network sum-rate performance/stability tradeoff. Furthermore, in power optimization, an efficient power-allocation protocol based on the coalition formation scheme is proposed in [20]. It achieves a significant reduction in power consumption and an improvement in payoff for transmitter nodes. A distributed coalition formation algorithm applied to a cognitive radio (CR) network utilizes the power of secondary users to interfere with the eavesdroppers in order to improve the primary user’s secrecy capacity [21]. In [22], a two-level decentralized approach based on game theory is proposed to solve the relay selection and resource allocation problems of the D2D networks. In this approach, D2D pairs and relays can form and swap coalitions, and the system capacity can be enhanced significantly. The nontransferable coalition formation game has been employed in [23] for relay selection in cooperative networks with energy harvesting relays, and it can approach the empirical bounds of the capacity very closely. Furthermore, coalition game theory is also utilized in [24] to select the optimal relay pairs for improving the secure key generation rate in D2D communications with nontrusted relays.

Compressive sensing (CS) has recently been widely used in wireless communication and signal processing. The CS could capture and represent the compressible signals at a rate far below the Nyquist rate, and the information could be retrieved from a small number of linear measurements [25,26,27]. The CS method has been studied as a physical layer security strategy of wireless networks in many research works. In [28,29], CS is used in a wireless network with one source node, one receiver, and one eavesdropper, and the measurement matrix is used as an encryption key to achieve the computational secrecy. Furthermore, authors in [30,31] considered the keyless PHY-layer secrecy scenario. The measurement matrix in [31] is the encryption key to encode the source’s signal, and the secrecy is ensured. Those studies indicate that the measurement matrix can be used to achieve the physical-layer security without the channel state information of eavesdroppers.

However, the networks of the above studies are based on the point-to-point (one source and one destination) communication scenario, and due to the decentralized property of the WSNs, the CS methods in [28,29,30,31] are not directly applicable to the WSNs [32]. In [33], authors firstly utilize the CS-AF (compressed sensing amplify and forward) scheme in WSNs. It indicates that the channel matrix from sources to relays can be used as the secure measurement matrix to achieve security. The results show that the probability of recovery of the eavesdroppers under the CS-AF scheme can be arbitrarily small; or equivalently, in terms of physical security, the CS-AF scheme can dramatically enhance the protection against eavesdropper. However, the influences of relays are not considered.

The main contributions are as follows:

  • (1)

    We propose a CCS-AF (cooperative compressed sensing amplify and forward) scheme for physical layer security in wireless sensor network, in which relays amplify and forward the received combined sources’ signals. We find that secrecy capacity is not proportional to the number of relays and the secrecy capacity is also sensitive to the source–relay distances.

  • (2)

    The max-coalition order is newly defined to guide the coalition formation, which is different from the traditional ‘Pareto order’. It is used to optimize the whole network utility instead of the individual utility.

  • (3)

    A coalitional formation algorithm for multi-relay selection is proposed to find the optimal coalition structure to achieve the maximum secrecy capacity. The simulation results show that the proposed algorithm can improve the secrecy capacity compared with the circumstance with all relays. Furthermore, the distributed algorithm confers to the relays self-organization and self-optimization properties.

The rest of this paper is organized as follows: In Section 2, a cooperative network model with multi-user and multi-relay is proposed based on CCS-AF. A brief introduction of coalitional game is shown in Section 3, and the coalition formation algorithm is introduced in Section 4. The results of simulations are provided and analyzed in Section 5. Finally, conclusions are drawn in Section 6.

2. System Model

In this section, we model a cooperative system with multiple sources and multiple relays based on CS. As shown in Figure 1, there are N sources (S1,,SN), M relays (R1,,RM), Z eavesdroppers (E1,,EZ), and one destination (D; M<N) in the network. The transmission period is divided into two time slots. In the first time slot, the source nodes send their own information to the relay nodes simultaneously. In the second time slot, some or all of the relays will be selected to amplify and forward (AF) the received combined signals to the destination. Besides, the channel state information (CSI) is known to all legitimate users.

Figure 1.

Figure 1

CCS-AF model with eavesdroppers.

The sparsity of the sources’ signal is denoted as K (KN) [34]. Let HSRRM×N denote the source–relay channel matrix, the matrix HDRRM×1 denote the relay–destination matrix vector, and the matrix HSERZ×M denote the source–eavesdropper channel matrix. The source–relay distances, relay–destination distances, and source–eavesdropper distances are represented as dSR, dRD, and dSE, respectively. Secrecy capacity, which is the channel capacity difference between the main channel and the eavesdropper channel, is used to measure the system security. It can be represented as

CS=(CDCE)+ (1)

where CS is the secrecy capacity, CD is the capacity at destination, and CE is the capacity at the eavesdropper.

2.1. CCS-AF Scheme

In the CCS-AF scheme, there are there phases, namely the sensing phase, measurement phase, and reconstruction phase.

2.1.1. Sensing Phase

In the sensing phase, only K of N source nodes whose readings are changed in a certain quantity will transmit their data to the relay nodes synchronously. Let xi denote the signal transmitted by the source Si. Thus, there are K nonzero elements and NK zero elements in the N-dimensional sources’ signal X=[x1,x2,,xN]. According to the CS theory, the number of nonzero elements in the signal is called the sparsity. Hence, the sparsity of sources’ signal X is K.

2.1.2. Measurement Phase

In this CCS-AF scheme, the transmission matrix is used as the measurement matrix of CS. Modeled by the source–relay transmission matrix, the signal received at each relay is the linear combination of the sources’ signal X. Furthermore, the X signal is compressed from the N dimension to the M dimension through the M × N source–relay transmission matrix.

According to the CS theory, the measurement should satisfy the restricted isometry property (RIP). The transmission matrix is proved as the measurement matrix in the following part.

In the first time slot, the sources send information to relays simultaneously. The power constraints of the sources and relays are PS and PR, respectively. The source–relay channel matrix HSR~N(0,M1) is incoherent with the identity matrix, and satisfies the RIP property with a high probability as long as Mc·Klog(N/K), where M is the number of relays, c is a small constant, K is the sparsity, and N is the number of sources [33]. In this paper, the number of relays M should satisfy Equation (2) [29,34]:

2KM<N (2)

The transmission matrix ARM×N is equal to A=αSRHSR. Besides, αSR is a M×N matrix which represents the path loss of the first time slot, and the path loss from the jth source (Sj) to the ith relay (Rj) is αSRi,j=di,jμ/2(i[1,M];j[1,N]). The received signal of relays is represented as

YR=A·X+N0 (3)

where N0RM×1 is an additive white Gaussian noise (AWGN) vector at relays and the variance is σn02.

In the second time slot, the selected relays amplify and forward the received sources’ signal to the destination (D). The diagonal matrix HRDRM×M represents the channel between relays and the destination. The relay–destination transmission matrix is H=αRDHRD, where αRDRM is the relay–destination path loss. Thereby, the received signal at the destination is

YD=β·H·YR+W0=β·H·(A·X+N0)+W0 (4)

where β is the diagonal matrix and its entity βii=PR/MPSN·j=1N|Ai,j|2+σn02(i[1,M];j[1,N]) denotes the amplification coefficient of Ri, and W0RM×1 is the noise between relays and D and is a AWGN vector with variance σw02.

Equation (4) could be rewritten as

YD=Φ·X+(β·H·N0+W0) (5)

where Φ=β·H·A. The Φ matches the requirement of the RIP property, because the transmission matrix ARM×N satisfies the RIP property and β·H is a diagonal matrix. Therefore, the transmission matrix Φ can be used as the secure measurement matrix to encrypt the sources’ signal X.

2.1.3. Reconstruction Phase

The destination receives all the signals from the relays and can recover the sources’ signal X from YD by solving the convex optimization problem:

min||X^||l1 s.t. ||YDΦX^||l2 ε (6)

where ε is an upper bound on the magnitude of the noise and X^ is the reconstructed vector at D.

It should be noted that the eavesdroppers in this model are unable to reconstruct the original signal because they have no knowledge about the measurement matrix. Thus, the eavesdropper cannot overhear the signal from the relay nodes, and the security performance is improved.

2.2. Secrecy Capacity

To calculate secrecy capacity conveniently, we use the singular value decomposition (SVD) method introduced in [35,36] to obtain the equivalent parallel channel. The M × N source–relay channel matrix A is transformed to a M×1 parallel channel vector.

Let A=UΛVH, and then the signal at the relays can be represented by YR=UΛVH·X+N0, where Λ is a diagonal matrix, UCM×M and VCM×N are both unitary matrixes, and VH is the conjugate transpose of V. Hence, the signal received at the relays shown in Equation (3) can be transformed as follows:

YR=UΛVH·X+N0 (7a)
UHYR=UHUΛVH·X+UHN0  (7b)
YR=ΛX+N0 (7c)

As is shown, in Equation (7c), YR=UH·YR, X=VH·X, and N0=UH·N0. Then, bringing Equation (7c) into Equation (4), the received signal at the destination can be written as

YD=β·H·YR+W0  =β·H·Λ·X+β·H·N0+W0  (8)

Due to the property of the unitary matrix, the power of signals YR,X, and N0 cannot be changed by the U and V, and we can know that PX=PX, PN0=PN0, and PYR=PYR. Thus, the signal power and the noise power could be formulated as follows:

Pi=PSN·|Hii|2βii2Λi2 (9a)
σi2=σw02+σn02|Hii|2βii2 (9b)

where i indicates the ith parallel Gaussian channel and Λi is the ith diagonal entry of Λ.

Then, the channel capacity C of the main channel is

C=12i=1Mlog2(1+Pi/σi2)=12i=1Mlog2(1+PSN·|Hii|2Λi2σw02βii2+σn02|Hii|2)=12i=1Mlog2(1+PSN·|Hii|2Λi2σw02PR/M(PSN·j=1N|Aij|2+σn02)+σn02|Hii|2) (10)

where σn02 and σw02 are the noise powers of the two time slots, respectively.

The signal received by the eavesdropper Ef could be expressed as

YEf=BfX+NEf (11)

where Bf is the transmission vector between the sources and eavesdropper Ef and NEf is the noise at Ef. The power of the signal and the noise at Ef are Pfe=PSN·|Bj,f|2 and σEf2, respectively. The channel capacity from Sj to Ef is

C^j,fe=12log2(1+PSN·|Bj,f|2σEf2) (12)

where Bj,f is the path loss between Sj and Ef, and σEf2 is the noise at Ef.

Therefore, the eavesdropper channel capacity is as follows:

CE=j=1Nmax (C^j,1e, ,C^j,te,,C^j,Ze) (13)

The secrecy capacity of the CCS-AF system can be represented as CS=CCE based on Equation (1).

The secrecy capacity is the channel capacity difference between the main channel and eavesdropper channel. From Equation (10), we find that when the relay number M increases, the capacity obtained by each relay decreases because of the reduction of the amplification coefficient. However, the large number of relays can improve the secrecy capacity. Thus, there exists a certain relay number M that maximizes the secrecy capacity. Meanwhile, the position of the relay affects the main channel condition. To obtain the maximum secrecy capacity, we proposed a coalition formation algorithm to select the relays based on coalition game theory because of the distribution property.

3. Coalitional Games

3.1. Coalition Game Model

In wireless networks, the coalitional game is an effective mathematical tool to enhance the PHY security and improve the performance. As is defined, a coalitional game with transferable utility (TU) is represented by a pair (N,V), where N is the set of players and the function V is a value for each coalition. Denote S as an element in N and ϕ(S) as the payoff of coalition S during its time slot, and the function V is defined as follows [15]:

V(S)={ϕ(S)R|S|,iS,ϕ(S)=(CSCES)+} (14)

where CS is the gain in terms of secrecy capacity for coalition S given by (10), CES is a security loss function for coalition S during the first slot, and the security loss caused by the fth (fZ) eavesdropper in the first slot is given by Equation (12). Let C(S)=(CSCES)+, and then C(S) is the secrecy capacity and acts as the measure of the wireless communication security. The cost function CES is computed according to Equation (13), which is the security loss caused by eavesdroppers.

3.2. Coalition Formation

The coalitional game can be divided into two kinds of orders. One is coalition value orders, and the other is individual value orders. Coalition value orders compare the value of two collections, such as the utilitarian order, in which WZ implies i=1xv(Si)>i=1yv(Si*). In contrast, the individual value orders compare the individual payoff of each player, such as the Pareto order. Assuming that the collection W and the collection Z have the same players and the payoff of a player Rj in these two collections are denoted by ϕjv(W) and ϕjv(Z), respectively, which can be written as WZ{ϕjv(W)ϕjv(Z),RjW,Z} by Pareto order if the collection W is better than the collection Z. In other words, W is preferred to Z if at least one player’s utility is increased without decreasing other players’ utilities.

In this CCS-AF network, only the coalition that obtains the highest secrecy capacity can be selected, which means only the relays in the coalition with higher secrecy capacity have more chances for cooperation. If a relay cannot participate the coalition with the highest secrecy capacity, it will obtain nothing. Differently from the cases where the individual values are considered, we consider the whole coalition value, where the Pareto order is not suitable. The two coalitions are preferred to be merged into one coalition if a higher coalition value can be obtained. This merge operation makes the players in these two coalitions have more chance to win the utility. To deal with the cooperative problem, a new comparison relation rule is defined as follows.

Definition 1.

Consider two collections, W={S1,,Sl} and Z={S1*,,Sk*}, which have the same players. Then, the ‘Max-Coalition order’ is defined as WZ{max{v(S1),,v(St)}max{v(S1*),,v(Sh*)}}.

3.3. Merge-and-Split Rule

To make sure the relays can self-organize to form the coalition, the “merge” and “split” rules are defined as below.

Merge Rule: Merge any set of coalitions {S1,,Sl} whenever the relays prefer the merged form.

if {j=1lSj}{S1,,Sl}, then {S1,,Sl}{j=1lSj} (15)

Split Rule: Split any coalition j=1lSj whenever the relays prefer a split form.

if {S1,,Sl }{j=1lSj}, then {j=1lSj}{S1,,Sl} (16)

Based on the merge-and-split rules and the ‘Max-Coalition order’ proposed above, the relays will form a new coalition if split-and-merge operations improve the secrecy capacity; otherwise, they keep the original coalition.

4. Coalition Formation Algorithm

In this CCS-AF network, some of the relays could form a coalition to maximize the system secrecy capacity based on the newly defined Max-Coalition order. Coalitions would like to merge if the merging forms a preferred coalition. It is implied that a group of relays will sign an agreement to merge into a larger coalition if the coalition yielded by the merge has larger secrecy capacity. Similarly, a coalition should split if the splitting can form a preferred coalition. At the beginning, relays are noncooperative nodes and the coalition structure is W={{R1},,{Rk},,{RM}}. Therefore, the first operation should be merging. Based on merge-and-split rules and ‘Max-Coalition order’, the coalition formation algorithm is shown in Table 1. The coalition formation algorithm needs to know the transmission matrix to calculate the secrecy capacity of the possible coalition and decide whether to form this possible coalition. This requires that the CSI must be accurate. If the CSI is wrong, the relays cannot obtain the accurate transmission matrix. This makes the relay node unable to calculate the security capacity of the possible coalition correctly. If the CSI error is too large, the new formed coalition based on the ‘Max-coalition order’ may have a lower secrecy capacity than the old coalition. This will make the network unable to select the best relay to obtain the highest security performance through the proposed algorithm.

Table 1.

Coalition formation algorithm.

Initial State:
The coalition structure of the network is W={S1,,Sk} (at the beginning, all relays are noncooperative nodes, i.e., W={{R1},,{Rk},,{RM}}).
Stage 1—Neighbor discovery
Each coalition surveys the environment and finds the possible neighbor to cooperate with.
Stage 2—Secrecy capacity calculation
Calculate the secrecy capacity V of the coalition Sk.
Stage 3—Iterative coalition formation
In this phase, a stable coalition structure is formed to obtain a higher secrecy capacity by using merge-and-split rules. The number of selected relays is limited in that 2KMc<N.
Repeat
(a) Zn= Merge (Wn): some coalitions in Wn decide to merge with each other based on the Max-Coalition order, if the relay number of the new coalition is less than the source number, i.e., Mc<N.
If the merge can yield a new coalition Sk which has a larger secrecy capacity than the coalitions Sk and St, coalitions Sk and St will merge to form the new coalition Sk.
Otherwise, relays stay in the former coalition; coalitions Sk and St do not change.
(b) Zn= Split (Wn): the coalition in this network decides to split based on Max-Coalition order, if the relay number of the new coalition is two times larger than the sparsity, i.e., Mc>2K.
(c) n=n+1.
Until merge-and-split terminates.
Final state: Coalition selected
The coalition Sc which can obtain the highest system secrecy capacity is selected to transmit the information.
Stage 1 to Stage 3 are repeated periodically when the network operates, and this repetition makes sure the network topology is adaptive to the change of environment (such as mobility of relays).

In order to make the topology adaptive to the relays’ dynamic location, the coalition formation algorithm is repeated periodically during the network operation. There are three stages in the algorithm: neighbor discovery, secrecy capacity calculation, and the iterative coalition formation. After these three stages, the topology is stable and the appropriate coalition will be selected.

In the neighbor discovery stage (stage 1), each coalition surveys the environment and finds the possible neighbor coalition to cooperate with. In the secrecy capacity calculation stage (stage 2), the coalition calculates the secrecy capacity periodically. Then, the iterative formation process begins (stage 3). In this stage, relays determine whether to merge with other coalitions to form a new coalition or sign a split agreement to break the current coalition. If the merge operation can yield a new coalition Sk which has a larger secrecy capacity than coalitions Sk and St, coalitions Sk and St in Zn will merge based on the Max–Coalition order: the two coalitions Sk and St will form a new coalition, Sk. This is mainly because merging brings a long-term secrecy capacity improvement of this network. The merging operation will stop if there is not a better merge form. After merging, the coalitions are about to split based on the split rule. If coalitions can find a better split form through the Max-Coalition order, the relays in those coalitions will sign the split agreement to form a new coalition, Sk. This is because splitting improves the secrecy capacity of the network. The network will repeat the merge-and-split operations until the highest secrecy capacity has been obtained. The coalition Sc which can obtain the highest system secrecy capacity is selected to help sources transmit the information. Under this circumstance, the coalition is stable and relays have no incentive to merge or split to form a new coalition.

The complexity of this algorithm is related to the split/merge operations. In terms of the split operation, supposing the current coalition is Sk, the number of potential coalitions grows exponentially with the number of relays in coalition Sk. Supposing the number of relays in the current coalition is M and the total number of relays in the network is MA, the number of merge trails is l=1MAMl =(MAM)(MAM+1)/2, and this results in the complexity of o((MAM)2), while the real computation load is usually far below this, for the algorithm will stop when a better coalition is found. The complexity is the number of all possible merge operations under the current coalition structure, while the real computational load is the number of real operations before the merge operation stops, which means there is no other better coalition with higher secrecy capacity that can be obtained through the merge operation. Obviously, the number of real merge operations is far below the number of all possible merge operations under the current coalition structure. In other words, there is no need for the algorithm to traverse all possible situations, because the iteration of operation will stop once a better coalition is found.

5. Simulations

We consider a coalitional network with 15 users, four relays, two eavesdroppers, and one destination located in a square of 1.2 km×1.2 km, as shown in Figure 2. Sources are randomly distributed between x=0 to x=0.3. The coordinates for the destination and eavesdroppers are set to (1.2 km, 0.6 km) for D, (1.05 km, 0.28 km) for E1, and (0.95 km, 0.93 km) for E2. The path loss μ is 4, the power constraints of sources and relays are PS=0 dBm and PR=0 dBm, respectively, and both σn02 and σw02 are 1014 W.

Figure 2.

Figure 2

A coalitional structure with eavesdroppers.

5.1. Coalition Formation Process

As shown in Figure 2, the coordinates for relays are set to (0.75 km, 0.15 km) for Relay 1 (R1), (0.68 km,0.45 km) for Relay 2 (R2), (0.75 km, 0.75 km) for Relay 3 (R3), and (0.65 km, 1.05 km) for Relay 4 (R4). It is shown in Figure 2 that R3 and R4 form a coalition and help sources to forward the information. The capacities of all potential coalitions and the relay utility are shown in Table 2. The details of the coalition formation process are described below.

Table 2.

The utility of each potential coalition and each relay for the network of Figure 2.

Cooperative with All Relays
v({R1,R2,R3,R4})=1.2539, v({R1})=0.4990, v({R2})=0.3410, v({R3})=0.3410, v({R4})=0.0751
Cooperative Using Coalition Formation Algorithm
Max-Coalition order Pareto order
system R1 R2 R3 R4 system R1 R2 R3 R4
{R3,R4} 1.4087 - - 1.0481 0.3606 {R3,R4} 1.4087 - - 1.0481 0.3606
{R3,R4,R2} 1.4583 - 0.6625 0.6257 0.1701 {R3,R4,R2} 1.4583 - 0.6625 0.6257 0.1701
{R3,R4,R2,R1} 1.2539 0.4990 0.3410 0.3388 0.0751 {R3,R4,R1} 1.2906 0.5982 - 0.5402 0.1522
{R3,R2} 1.5547 - 0.8514 0.7033 -

At first, for both Max-Coalition order and Pareto order, the relay nodes are noncooperative and each relay is a coalition. The first operation is a merge operation, and it starts with R3 (the nearest relay from the destination), which attempts to merge with R4 (the closest relay to R3). Then, the coalition {R3,R4} is formed. Subsequently, the coalition {R3,R4} tries to merge with R2 (the nearest relay to the coalition {R3,R4}) to form a three-relay coalition. Then, the process of Max-Coalition order and Pareto order will be described separately.

For Max-Coalition order, the coalition {R3,R4,R2} is formed successfully because the system secrecy capacity is improved from 1.4087 to 1.4583. After that, the coalition {R3,R4,R2} has an incentive to merge with R1, but this merge is impossible as the system utility decreases (1.2593<1.4583). Until this moment, the merge operation is finished, for no other better coalition can be obtained by the merge operation, and the split operation begins. For the first split operation, R4 (located in the edge of the current coalition) splits from the coalition {R3,R4,R2} successfully, because the split operation can enhance the secrecy capacity from 1.4583 to 1.5547. Then, the iteration process ends. Thus, the coalition {R3,R2} is the selected coalition, and its utility is v({R3,R2})=1.5547. As a result, for Max-Coalition order, the coalition {R3,R2} cannot merge or split any further, and the final coalition structure is W={{R3,R2},{R1},{R4}}.

In contrast, based on Pareto order, the coalition {R3,R4,R2} cannot be formed. This is because the utilities of R3 (0.6257<1.0481) and R4 (0.1701<0.3606) cannot be improved through this merge. Then, the coalition {R3,R4} tries to merge with R2, but the merge operation fails for the same reason (for R3 0.5402<0.6257 and for R4 0.1522<0.3606). For Pareto order, the coalition {R3,R4} is selected and its utility is v({R3,R4})=1.4087. It can be seen that the utility obtained by Max-Coalition order is higher than that of the Pareto order, and this result demonstrates the effectiveness of the Max-Coalition order.

5.2. The Adaption on the Relay’s Mobility

In this section, the algorithm’s ability for handling the relay’s mobility is studied. For this purpose, R3 in Figure 2 is moved horizontally from 0.45 km  (R3) to 1.05 km  (R3). The change of the coalition structure and the performance are shown in Figure 3 and Figure 4, respectively.

Figure 3.

Figure 3

Coalition structure with the movement of R3.

Figure 4.

Figure 4

System secrecy capacity and the relay utilities with the movement of Relay 3 corresponding to Figure 3.

In Figure 3, the coalition structure changes dynamically when relay R3 changes its location. When relay R3 moves from sources to the destination, R1 first splits from {R1,R2,R3}. When R3 moves close to destination, R4 merges and forms the coalition {R2,R3,R4}.

Figure 4a is the secrecy capacity of the system, and Figure 4b is the utility of each relay accordingly. In Figure 4a, it is obvious that the system secrecy capacity obtained by the coalition formation algorithm is much higher than the circumstance when all relays are selected. This phenomenon proves that the coalitional game algorithm improves the system security.

Obviously, the selected coalition through the coalition formation algorithm is stable based on the Max-Coalition order, because there is no relay that has an incentive to split or merge and form another coalition which can obtain a higher system secrecy capacity. Due to the fact that the algorithm prefers a higher secrecy capacity to keep the stability of the coalition, the coalition structure will change to obtain a higher capacity when R3 moves from 0.45 km  to 1.05 km . We can easily know that the splitting of R1 at 0.5 km  is beneficial to both R2 and R3 from Figure 4b, so R1 splits from {R1,R2,R3}. During the movement of R3, the utility of R3 is increasing, and this is because R3 is getting closer to the destination. After R3 moves at 0.85 km , the system capacity starts increasing. It is clear that the merging of R4 increases the utility of R3 and the capacity of the system.

Obviously, the secrecy capacity obtained through the proposed algorithm is higher than the secrecy capacity obtained with all relays. This is because the relays can self-organize into some coalitions, and the best coalition structure will be formed after some iteration guided by the ‘Max-Coalition order’. Due to the property of the ‘Max-Coalition order’, the relays will try to form the coalitions which can obtain a higher secrecy capacity. Thus, the final formed coalition structure is the best structure and it is stable because relays cannot form another structure with a higher secrecy capacity. In the final state, the relays in the best coalition which obtains the highest system secrecy capacity will be selected to transmit the source information. Therefore, we can easily know that the selected relays have a higher ability to obtain the secrecy capacity than the other unselected relays, and the total relay power will be only allocated to these selected relays. In other words, this relay-selection algorithm can select better relays and increase the efficiency of the total relay power. Thus, the secrecy capacity is improved by the proposed algorithm.

5.3. The Effect of Power on the Performance

Figure 5 shows the system performance and the average size of coalitions versus PR, where the number of sources N  is set to 15 and 35, respectively. The total power of sources PS=0 dBm and PR varies from 0 dBm to 30 dBm. Figure 5a is the average number of the selected relays with different PR. It can be observed that the average number of selected relays increases with the increase of PR. This implies that the higher PR is, the more relays that have a chance to gain their utilities. Compared with the circumstance when N=15, especially when PR is large, the number of selected relays when N=35 is higher. When PR22 dBm, the number of selected relays (when N=15) is no more than 15; this can be explained by Equation (2). Figure 5b demonstrates the maximum system secrecy capacity when the number of selected relays is set as in Figure 5a. The secrecy capacity with each N increases with the increase of PR. In other words, higher PR results in a better system performance.

Figure 5.

Figure 5

System performance and the average size of coalition versus power of relay PR.

Figure 6 represents the secrecy capacity versus PS where the number of sources N  is set to 15 and 35, respectively. The total power of relays PR=0 dBm and PS varies from 0 dBm to 18 dBm. The secrecy capacity is first increased and then decreased along with the increasing of the PS. When PS is larger than a certain value, the secrecy capacity will drop to zero (for N=15 and 35, the certain values of PS are 10 dBm  and 12 dBm, respectively). This means the too-large PS has a negative effect on the system security. This phenomenon can be explained by Figure 7a,b. When PS increases, the channel capacity goes up first and then stays steady at the point about PS=15 dBm. While the secrecy loss caused by eavesdroppers increases slowly at first, and at the point about PS=15 dBm, it goes up rapidly. In other words, when PS is larger than a certain value, the increase of eavesdropper capacity is much faster than that of the channel capacity. Thus, the large PS degrades the secrecy capacity.

Figure 6.

Figure 6

System capacity with different number of sources versus PS.

Figure 7.

Figure 7

Channel capacity and eavesdropper capacity with different number of sources versus PS.

6. Conclusions

In this paper, a distributed multi-relay selection algorithm based on the coalition formation game is proposed to enhance the physical layer security of the CCS-AF wireless network, which consists of multiple sources and multiple relays with compressed sensing. Compared with the traditional ‘Pareto order’, the newly defined ‘Max-Coalition order’ rule is proved to be more suitable to solve the multi-relay selection problem for the CCS-AF networks. Simulation results show that the relays can self-organize into a better coalition and have good ability to adapt to the change of the topology. The proposed algorithm can select the better relay nodes and increase the efficiency of the total relay power. If the CSI is accurate, the system security performance can be improved significantly through the distributed relay selection algorithm.

Author Contributions

S.C., X.F., and Z.J. conceived and designed the study. J.L., S.C., and L.Z. performed the experiments. J.L. and Y.S. wrote the paper. X.F., S.C., and Z.J. reviewed and edited the manuscript. All authors read and approved the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under Grant Nos. 61571323 and 61571318, 61701335.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Khodakarami H., Lahouti F. Link adaptation for physical layer security over wireless fading channels. IET Commun. 2012;6:353–362. doi: 10.1049/iet-com.2011.0319. [DOI] [Google Scholar]
  • 2.Saad W., Han Z., Basar T., Debbah M., Hjorungnes A. Physical layer security: Coalitional games for distributed cooperation; Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks; Seoul, Korea. 23 October 2009; pp. 1–8. [Google Scholar]
  • 3.Chen X., Chen J., Zhang H., Zhang Y., Yuen C. On secrecy performance of multi-antenna-jammer-aided secure communications with imperfect CSI. IEEE Trans. Veh. Technol. 2016;65:8014–8024. doi: 10.1109/TVT.2015.2510502. [DOI] [Google Scholar]
  • 4.Chen X., Zhong C., Yuen C., Chen H.H. Multi-antenna relay aided wireless physical layer security. IEEE Commun. Mag. 2015;53:40–46. doi: 10.1109/MCOM.2015.7355564. [DOI] [Google Scholar]
  • 5.Chen X., Lei L., Zhang H., Yuen C. Large-scale MIMO relaying techniques for physical layer security: AF or DF? IEEE Trans. Wirel. Commun. 2015;14:5135–5146. doi: 10.1109/TWC.2015.2433291. [DOI] [Google Scholar]
  • 6.Zhang J., Yuen C., Wen C.K., Jin S., Wong K.K., Zhu H. Large system secrecy rate analysis for SWIPT MIMO wiretap channels. IEEE Trans. Inf. Forensics Secur. 2016;11:74–85. doi: 10.1109/TIFS.2015.2477050. [DOI] [Google Scholar]
  • 7.Zhuang W., Ismail M. Cooperation in wireless communication networks. IEEE Wirel. Commun. 2012;19:10–20. doi: 10.1109/MWC.2012.6189408. [DOI] [Google Scholar]
  • 8.Zou Y., Wang X., Shen W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013;31:2099–2111. doi: 10.1109/JSAC.2013.131011. [DOI] [Google Scholar]
  • 9.Jing Y., Jafarkhani H. Single and multiple relay selection schemes and their achievable diversity orders. IEEE Trans. Wirel. Commun. 2009;8:1414–1423. doi: 10.1109/TWC.2008.080109. [DOI] [Google Scholar]
  • 10.Lai L., El Gamal H. The relay–eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory. 2008;54:4005–4019. doi: 10.1109/TIT.2008.928272. [DOI] [Google Scholar]
  • 11.Ju P., Song W., Zhou D. Survey on cooperative medium access control protocols. IET Commun. 2013;7:893–902. doi: 10.1049/iet-com.2012.0739. [DOI] [Google Scholar]
  • 12.Ding X., Song T., Zou Y., Chen X., Hanzo L. Security-reliability tradeoff analysis of artificial noise aided two-way opportunistic relay selection. IEEE Trans. Veh. Technol. 2017;66:3930–3941. doi: 10.1109/TVT.2016.2601112. [DOI] [Google Scholar]
  • 13.Wang W., Teh K.C., Li K.H. Generalized relay selection for improved security in cooperative DF relay networks. IEEE Wirel. Commun. Lett. 2016;5:28–31. doi: 10.1109/LWC.2015.2488660. [DOI] [Google Scholar]
  • 14.Chen J., Zhang R., Song L., Han Z., Jiao B. Joint relay and jammer selection for secure two-way relay networks. IEEE Trans. Inf. Forensics Secur. 2012;7:310–320. doi: 10.1109/TIFS.2011.2166386. [DOI] [Google Scholar]
  • 15.Zhang Z., Song L., Han Z., Saad W. Coalitional games with overlapping coalitions for interference management in small cell networks. IEEE Trans. Wirel. Commun. 2014;13:2659–2669. [Google Scholar]
  • 16.Saad W., Han Z., Başar T., Debbah M., Hjørungnes A. Distributed coalition formation games for secure wireless transmission. Mob. Netw. Appl. 2011;16:231–245. doi: 10.1007/s11036-010-0275-1. [DOI] [Google Scholar]
  • 17.Khayatian H., Saadat R., Abouei J. Coalition-based approaches for joint power control and relay selection in cooperative networks. IEEE Trans. Veh. Technol. 2013;62:835–842. doi: 10.1109/TVT.2012.2222681. [DOI] [Google Scholar]
  • 18.Bahbahani M.S., Baidas M.W., Alsusa E. Distributed multi-relay selection via political coalition formation in cooperative wireless networks; Proceedings of the 2016 IEEE Wireless Communications and Networking Conference; Doha, Qatar. 3–6 April 2016; pp. 1–7. [Google Scholar]
  • 19.Bahbahani M.S., Baidas M.W., Alsusa E. A distributed political coalition formation framework for multi-relay selection in cooperative wireless networks. IEEE Trans. Wirel. Commun. 2015;14:6869–6882. doi: 10.1109/TWC.2015.2461619. [DOI] [Google Scholar]
  • 20.Zhang H., Wang T., Song L., Han Z. Interference improves PHY security for cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 2016;11:609–620. doi: 10.1109/TIFS.2015.2500184. [DOI] [Google Scholar]
  • 21.Fang X., Zhang N., Zhang S., Chen D., Sha X., Shen X. On physical layer security: Weighted fractional Fourier transform based user cooperation. IEEE Trans. Wirel. Commun. 2017;16:5498–5510. doi: 10.1109/TWC.2017.2712158. [DOI] [Google Scholar]
  • 22.Gao C., Li Y., Zhao Y., Chen S. A two-level game theory approach for joint relay selection and resource allocation in network coding assisted D2D communications. IEEE Trans. Mob. Comput. 2017;16:2697–2711. doi: 10.1109/TMC.2016.2642190. [DOI] [Google Scholar]
  • 23.Bannour A., Sacchi C., Sun Y. MIMO-OFDM based energy harvesting cooperative communications using coalitional game algorithm. IEEE Trans. Veh. Technol. 2017;66:11166–11179. doi: 10.1109/TVT.2017.2768622. [DOI] [Google Scholar]
  • 24.Waqas M., Ahmed M., Li Y., Jin D., Chen S. Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays. IEEE Trans. Wirel. Commun. 2018;17:3918–3930. doi: 10.1109/TWC.2018.2817607. [DOI] [Google Scholar]
  • 25.Patterson S., Eldar Y.C., Keidar I. Distributed compressed sensing for static and time-varying networks. IEEE Trans. Signal Process. 2014;62:4931–4946. doi: 10.1109/TSP.2014.2340812. [DOI] [Google Scholar]
  • 26.Martinez J., Mejia J., Mederos B. Compress sensing for wireless sensor networks using gossip pairwise algorithm and optimization algorithms; Proceedings of the Ecuador Technical Chapters Meeting (ETCM); Guayaquil, Ecuador. 12–14 October 2016; pp. 1–5. [Google Scholar]
  • 27.Candes E.J., Romberg J.K., Tao T. Stable signal recovery from incomplete and inaccurate measurements. Commun. Pure Appl. Math. 2006;59:1207–1223. doi: 10.1002/cpa.20124. [DOI] [Google Scholar]
  • 28.Rachlin Y., Baron D. The secrecy of compressed sensing measurements; Proceedings of the Communication, Control, and Computing; Urbana-Champaign, IL, USA. 23–26 September 2008; pp. 813–817. [Google Scholar]
  • 29.Mayiami M.R., Seyfe B., Bafghi H.G. Perfect secrecy using compressed sensing. Mathematics. 2010 doi: 10.1109/IWCIT.2013.6555751. [DOI] [Google Scholar]
  • 30.Agrawal S., Vishwanath S. Secrecy using compressive sensing; Proceedings of the Information Theory Workshop (ITW); Paraty, Brazil. 16–20 October 2011; pp. 563–567. [Google Scholar]
  • 31.Reeves G., Goela N., Milosavljevic N., Gastpar M. A compressed sensing wire-tap channel; Proceedings of the Information Theory Workshop (ITW); Paraty, Brazil. 16–20 October 2011; pp. 548–552. [Google Scholar]
  • 32.Barcelo-Llado J.E., Morell A., Seco-Granados G. Amplify-and-forward compressed sensing as an energy-efficient solution in wireless sensor networks. IEEE Sens. J. 2014;14:1710–1719. doi: 10.1109/JSEN.2014.2303080. [DOI] [Google Scholar]
  • 33.Barcelo-Llado J.E., Morell A., Seco-Granados G. Amplify-and-forward compressed sensing as a physical-layer secrecy solution in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014;9:839–850. doi: 10.1109/TIFS.2014.2309855. [DOI] [Google Scholar]
  • 34.Baraniuk R.G. Compressive sensing [lecture notes] IEEE Signal Process. Mag. 2007;24:118–121. doi: 10.1109/MSP.2007.4286571. [DOI] [Google Scholar]
  • 35.Guo J., Zhang J., Yang K., Zhang B., Hong W., Wu Y. Information capacity and sampling ratios for compressed sensing-based sar imaging. IEEE Geosci. Remote Sens. Lett. 2015;12:900–904. [Google Scholar]
  • 36.Trappe W., Miller R. On the vulnerabilities of CSI in MIMO wireless communication systems. IEEE Trans. Mob. Comput. 2012;11:1386–1398. [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES