Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2019 Mar 7;19(5):1160. doi: 10.3390/s19051160

Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection

Phu Tran Tin 1,2, Pham Minh Nam 2,3, Tran Trung Duy 4, Phuong T Tran 5,*, Miroslav Voznak 1
PMCID: PMC6427423  PMID: 30866513

Abstract

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.

Keywords: multi-hop wireless sensor networks, physical-layer security, transmit antenna selection, selection combining, cognitive radio, energy harvesting, hardware impairments

1. Introduction

Security is one of the important issues in wireless sensor networks (WSNs) due to the broadcast nature of wireless medium. Conventionally, encryption/decryption algorithms that generate public/private keys are used to guarantee security [1,2]. Recently, a security framework for the physical layer, called the wiretap channel or physical-layer security (PLS) [3,4,5,6,7], has been introduced as a potential solution. In PLS, the difference between the channel capacity of the data link and the channel capacity of the eavesdropping link, named secrecy capacity, is commonly used to evaluate secrecy performance such as average secrecy capacity (ASC), secrecy outage probability (SOP), and probability of non-zero secrecy capacity (PNSC). Hence, to enhance the secrecy performance, the quality of the data and eavesdropping links should be increased and decreased, respectively. To enhance the channel capacity of the data links, diversity transmit and receive methods [8,9,10] can be used. In [8], the transmit antenna selection (TAS) technique is employed at a multi-antenna base station (BS) to maximize the instantaneous signal-to-noise ratios (SNRs) obtained between BS and intended users. References [9,10] considered MIMO secure communication systems, where the transmitter uses the TAS technique, while the legitimate receiver and eavesdropper can use selection combining (SC) or maximal ratio combining (MRC) for reception. In [11,12,13,14,15], cooperative relaying strategies were proposed to improve secrecy performance via increasing the channel capacity for the data links. Moreover, to avoid the eavesdropper combining the data with MRC, a randomize-and-forward (RF) strategy [16] can be employed, where the source and relays generate different code-books to confuse the eavesdropper. For significantly degrading the eavesdropping channels, cooperative jamming (CJ) methods were reported in [17,18,19]. The basic idea of the CJ method is that jammer nodes are employed to generate artificial noises on the eavesdropper. In addition, the legitimate receivers have to cooperate with the jammers to remove the interference appeared in their received signals. However, the implementation of this technique can be a difficult work due to the requirement of high synchronization between the nodes.

Recently, wireless energy harvesting (EH) [20,21] has emerged as a potential solution to prolong the lifetime of WSNs. In wireless EH, the energy-constrained devices can harvest energy from radio frequency signals generated by ambient nodes. In [21], EH amplify-and-forward (AF) relaying protocols were proposed and analyzed, where the relay node harvests energy from the source for transmitting the source data to the destination. The authors of [22] considered both AF and decode-and-forward (DF) relaying schemes employed a hybrid power splitting (PS) and time switching (TS) EH relay. In [23,24,25], power beacons (PBs) are deployed in the networks to charge energy for wireless devices. The PB-aided wireless power transfer models are suitable for large-scale WSNs or wireless ad-hoc networks. Moreover, to avoid causing the co-channel interference to the receivers, channels used for harvesting energy from the wireless signals of PBs are different from those used for the data transmission. In [23,24,25], the authors studied the performance of secondary networks in PB-assisted underlay cognitive radio (PB-UCR), where the transmit power of secondary users was limited by both the harvested energy and the maximum interference levels required by primary users. In [26], a secure communication scenario in cognitive sensor radio networks with an EH eavesdropper was introduced. Reference [27] proposed various path-selection protocols in multi-path multi-hop relaying networks in the presence of active eavesdroppers. Moreover, in [27], all of the terminals whose transceiver hardware is low-cost suffered from hardware imperfection due to phase noise, I/Q imbalance (IQI), amplifier nonlinearities, etc. [28,29,30].

This paper deals with multi-hop secure communication networks in PB-UCR under impact of hardware impairments. In [31], the authors first evaluated the secrecy capacity in the presence of IQI for OFDMA communication systems. Reference [32] proposed a secure massive MIMO system with a passive multiple-antenna eavesdropper and hardware noises. The results in [31,32] showed that the hardware impairments significantly impact of the secrecy performance. Next, unlike [27], our scheme considers the PB-URC networks using the MIMO-based TAS/SC relaying technique. In [33,34,35], cooperative multi-hop full-duplex relaying networks were proposed to enhance the end-to-end secrecy performance. However, it is too difficult to apply these schemes into WSNs due to the complexity of full-duplex operation. References [36,37,38] introduced simple multi-hop secure relaying scenarios in which all of the nodes are equipped with a single antenna. In [39], PLS in downlink MIMO multi-hop heterogeneous cellular networks were investigated. In particular, the data transmission between base stations and mobile users is realized via direct or multi-hop mode. In [40], a multi-hop multicasting secure transmission protocol with multi-antenna DF relays in the presence of multiple eavesdroppers was proposed and analyzed. However, in [36,37,38,39,40], the authors did not consider the cognitive environment as well as the wireless EH technique.

To the best of our knowledge, there is no published work related to multi-hop secure transmission in PB-UCR under the impact of hardware noises. In the proposed protocol, a secondary source transmits its data to a secondary destination using the multi-hop mode in the presence of a secondary eavesdropper. To support the reliable communication at each hop, the TAS/SC technique is used to forward the source data. Operating on the underlay spectrum sharing method, the transmit power of the secondary source and relay nodes must be adjusted to satisfy the required QoS of the primary network. Moreover, the secondary transmitters have to harvest energy from PB deployed in the secondary network for the data transmission. The main contribution of this paper can be summarized as follows:

  • We propose a simple multi-hop MIMO relaying protocol using the TAS/SC technique for PB-UCR WSNs. The proposed protocol can obtain energy efficiency and spectrum usage efficiency, enhance the reliability of data transmission, and improve the secrecy performance.

  • In almost published works related to EH and UCR (see [23,24,25]), the transmitters adjust their transmit power following the instantaneous channel state information. As a result, the transmit power is a random variable (RV), which is not feasible. In this paper, the secondary source and relay nodes are assumed to transmit the source data at fixed transmit power levels. In addition, we derive an exact closed-form expression of the average transmit power of the secondary transmitters under the joint impacts of the energy harvested, the interference constraint, and the maximum transmit power level.

  • We investigate the impact of hardware impairments on the end-to-end SOP and PNSC of the proposed scheme. Indeed, the obtained results presented that the hardware imperfection has a significant impact on the secrecy performance. Moreover, the analytical results showed that different values of the hardware impairment levels of the data and eavesdropping links lead to different secrecy performance trend. Finally, it is worth noting that the proposed scheme is a generalized case of the existing schemes in which the transceiver hardware is assumed to be perfect [11,41,42,43].

  • We derive new exact and asymptotic expressions of the end-to-end SOP and PNSC over Rayleigh fading channels, which are then verified by Monte Carlo simulations.

The rest of this paper is organized as follows. The system model of the considered protocol is described in Section 2. In Section 3, the expressions of SOP are derived. The simulation results are shown in Section 4. Finally, this paper is concluded in Section 5.

2. System Model

Figure 1 illustrates the system model of the proposed scheme, in which a secondary source T0 wants to transmit its data to a destination TK via K1 intermediate nodes denoted by T1,T2, …, TK1. The data transmission between T0 and TK is realized via K orthogonal time slots, exploiting the TAS/SC technique. In particular, at the k+1-th hop, the node Tk selects an antenna to transmit the source data to the node Tk+1, which uses the SC technique to combine the signals received from Tk, where k=0,1,,K. We assume that all of the nodes including the source, the destination and the relays are equipped with ND antennas. The transmitter Tk has to harvest energy from wireless signals of a single-antenna power beacon (PB) deployed in the secondary network. Moreover, Tk must adjust the transmit power to satisfy a maximal interference threshold (Ith) required by a single-antenna primary user (PU). Also in the secondary network, there exists an NE-antenna eavesdropper (E) who uses the SC technique to decode the source data obtained at each hop. Similar to [16], the secondary transmitters randomly generate code-book to confuse the eavesdropper.

Figure 1.

Figure 1

System model of the proposed scheme.

Comment 1: Due to the size limitation and complexity constraint, it is assumed that all of the receivers can only use the SC combiner for decoding the data. In addition, the secrecy performance of the proposed protocol is same with that of the corresponding one with multiple non-colluding single-antenna eavesdroppers [44,45]. Finally, in the case where the eavesdropper can employ the MRC technique, the expressions derived in this paper can be used as bound expressions of the secrecy performance.

Let us denote γX,Y as the channel gain of the link, where X,YTk,E,PB,PU. Assume that all of the channels are Rayleigh fading; hence the channel gain γX,Y is an exponential RV. The cumulative distribution function (CDF) and probability density function (PDF) of γX,Y can be expressed, respectively, as

FγX,Yu=1expλX,Yu,fγX,Yu=λX,YexpλX,Yu, (1)

where λX,Y is parameter of the exponential RV γX,Y, i.e., λX,Y=1/EγX,Y=1/VarγX,Y, where E is expected operator and VarX is variance of X. To take path-loss into account, we can model λX,Y as λX,Y=dX,Yβ [46], where dX,Y is the distance between X and Y, and β is the path-loss exponent.

We denote γTk,m,Y as the channel gain between the m-th antenna of Tk and Y, where m=1,2,,ND. Assume that RVs γTk,m,Y are independent and identical, i.e., λTk,m,Y=λTk,Y for all m. Also, let γX,Tk+1,n and γX,Ep as channel gain between X and the n-th antenna of Tk+1, and that between X and the p-th antenna of E, respectively, where n=1,2,,ND and p=1,2,,NE. Similarly, γX,Tk+1,n and γX,Ep are independent and identically distributed (i.i.d.) RVs, i.e., λX,Tk+1,n=λX,Tk+1 and λX,Ep=λX,E for all n and p.

Let T denote the total transmission time between T0 and TK, and hence the time allocated for each time slot is given as τ=T/K. Considering the k+1-th hop; a duration of ετ is used for Tk to harvest energy, and the remaining duration, i.e., 1ετ, is spent for the data transmission between Tk and Tk+1, where 0ε1. Then, the amount of energy that TK can harvest is given by

EHk=ηετPBv=1NDγPB,Tk,v, (2)

where η0η1 is energy conversion efficiency, and PB is transmit power of PB.

From (2), we can formulate the transmit power that Tk can use in the data transmission phase by

QEH,k=EHk1ετ=χPBφsum,k, (3)

where χ=ηε/1ε and φsum,k=v=1NDγPB,Tk,v. Using (Equation (A.7) [25]), we can write the CDF of φsum,k as

Fφsum,kz=1t=0ND11t!λPB,TkztexpλPB,Tkz. (4)

Considering the data transmission between the transmitter A and the receiver B; under the impact of the hardware impairments, the instantaneous SNR received at B can be expressed as in [30,33,34,47,48]:

ΨA,B=PAγA,BκA2+κB2PAγA,B+σ2=PAγA,BκA,B2PAγA,B+σ2, (5)

where A,BT,E,PB,PU, PA is transmit power of the transmitter A, γA,B is channel gain between A and B, σ2 is the variance of additive white Gaussian noise (AWGN), κA2 and κB2 are constants characterizing the level of the hardware impairments at A and B, respectively, and κA,B2=κA2+κB2 is the total hardware impairment level. The values of κA2, κB2, κA,B2, which depend on the structure of the transceiver hardware at A and B, can be determined by practical experiments.

Moreover, in the URC network, if Tk uses the m-th antenna to transmit the data, the transmit power must satisfy the interference constraint required by PU as in [25,49]:

QIN,k,m=Ith1+κP2γTk,m,PU, (6)

where κP2 is total hardware impairment level at Tk and PU (see [25,49]).

Let PS denote the maximum transmit power of each antenna; by combining (3) and (6), the transmit power of the m-th antenna at Tk can be formulated by

Pk,m=minQEH,k,QIN,k,m,PS=PSminμ1φsum,k,μ2γTk,m,PU,1=PSminμ1φsum,k,μ2γTk,m,PU,ifminμ1φsum,k,μ2γTk,m,PU<1PS,ifminμ1φsum,k,μ2γTk,m,PU1 (7)

where

μ1=χPBPS,μ2=Ith1+κP2PS.

We can observe from (7) that when minμ1φsum,k,μ2/γTk,m,PU<1, then Pk,m=PSminμ1φsum,k,μ2/γTk,m,PU is a RV, which is not feasible (although this assumption was widely used in many published literature, e.g., [23,24,25] and references therein). In practice, the transmit power Pk,m should be fixed at pre-determined levels. Indeed, assume that there are W+1 fixed levels denoted by Lvv=0,1,,W with Lv=vPS/W. For example, L0=0 is the lowest level, and LW=PS is the highest one. Now, by combining with (7), we can write the expression of Pk,m as

Pk,m=0,ifPSminμ1φsum,k,μ2γTk,m,PU<L1Lv,ifv<W,LvPSminμ1φsum,k,μ2γTk,m,PU<Lv+1LW,ifLWPSminμ1φsum,k,μ2γTk,m,PU (8)

Now, we consider the data transmission between Tk and Tk+1. Employing the TAS/SC technique, the transmit antenna at Tk and the receive antenna at Tk+1 are selected by the following strategy (see [9]):

γTk,b,Tk+1,c=maxm=1,2,,NDmaxn=1,2,,NDγTk,m,Tk+1,n, (9)

where b and c are the selected antennas at Tk and Tk+1, respectively, b1,2,,ND and c1,2,,ND. Since γTk,m,Tk+1,n are i.i.d. RVs, CDF of γTk,b,Tk+1,c can be obtained by

FγTk,b,Tk+1,cx=m=1NDn=1NDFγTk,m,Tk+1,nx=1expλTk,Tk+1xND2=1+v=1ND21vND2vexpvλTk,Tk+1x. (10)

With the presence of hardware impairments, the channel capacity of the TkTk+1 link is calculated as

CD,k=1ετlog21+Pk,bγTk,b,Tk+1,cκD2Pk,bγTk,b,Tk+1,c+σ2, (11)

where κD2 is the total hardware impairment level at Tk and Tk+1, which is assumed to be the same for all values of k.

Let us consider the eavesdropping link at the k+1-th hop; the channel capacity of the TkE link can be obtained by

CE,k=1ετlog21+Pk,bγTk,b,EgκE2Pk,bγTk,b,Eg+σ2, (12)

where κE2 is the total hardware impairment level at Tk and E. In addition, since E uses the SC combiner, the channel gain γTk,b,Eg can be written as

γTk,b,Eg=maxp=1,2,,NEγTk,b,Ep, (13)

where g1,2,,NE. In addition, CDF of γTk,b,Eg can be expressed by

FγTk,b,Egx=p=1NEFγTk,b,Epx=1expλTk,ExNE. (14)

From (14), we obtain PDF of γTk,b,Eg as

fγTk,b,Egx=NEλTk,EexpλTk,Ex1expλTk,ExNE1=u=0NE11uNE1uNEλTk,Eexpu+1λTk,Ex. (15)

Next, from (11) and (12), the secrecy capacity at the k+1-th hop is obtained by

CSec,k=max0,CD,kCE,k=max0,1ατlog21+Pk,bγTk,b,Tk+1,cκD2Pk,bγTk,b,Tk+1,c+σ2log21+Pk,bγTk,b,EgκE2Pk,bγTk,b,Eg+σ2. (16)

With the random-and-forward strategy, the end-to-end secrecy capacity of the proposed protocol is given as in [37]:

CSece2e=mink=1,2,,KCSec,k. (17)

3. Performance Analysis

In this section, we analyze the average transmit power of the secondary transmitters and the secrecy performance of the proposed protocol in terms of SOP and PNSC.

3.1. Average Transmit Power of the Secondary Transmitters

From (8), the average transmit power of Tk can be given by the following formula:

EPk,b=v=1W1PrvWminμ1φsum,k,μ2γTk,b,PU<v+1WvWPS+Pr1minμ1φsum,k,μ2γTk,b,PUPS, (18)

where E. is an expectation operator. To calculate EPk,b, we attempt to find CDF of minμ1φsum,k,μ2/γTk,b,PU. Setting Zmin,k=minμ1φsum,k,μ2/γTk,b,PU, the CDF of Zmin,k is obtained by

FZmin,kz=11Fφsum,kzμ1FγTk,b,PUμ2z. (19)

Substituting FγTk,b,PUx=1expλTk,PUx and (4) into (19) yields

FZmin,kz=1t=0ND11t!λPB,Tkzμ1texpλPB,Tkzμ11expλTk,PUμ2z. (20)

Therefore, the average transmit power of Tk is written by

EPk,b=v=1W1FZmin,kv+1WFZmin,kvWvWPS+1FZmin,k1PS. (21)

3.2. Secrecy Outage Probability (SOP)

The end-to-end SOP of the proposed protocol can be calculated by

SOP=Pr(CSece2e<Cth)=Prmink=1,2,,KCSec,k<Cth=1k=1K1PrCSec,k<Cth=1k=1K1SOPk, (22)

where CthCth>0 is a predetermined outage threshold, and SOPk=PrCSec,k<Cth is the secrecy outage probability at the k-th hop. Using (8) and (16), we can formulate SOPk by

SOPk=v=1WPrPk,b=Lv×Pr1+LvγTk,b,Tk+1,cκD2LvγTk,b,Tk+1,c+σ21+LvγTk,b,EgκE2LvγTk,b,Eg+σ2<ρSOPkLv, (23)

where ρ=2Cth/1ετ.

It is noted from (23) that the secrecy outage event is only considered in the cases where the transmit power Pk,b is higher than zero, i.e., Pk,b=Lv and v1.

For the probability PrPk,b=Lv in (23), it can be calculated by

PrPk,b=Lv=FZmin,kv+1WFZmin,kvW,ifv<W1FZmin,k1,ifv=W (24)

Next, let us consider the SOP conditioned on Pk,b=Lv as marked in (23); we have

SOPkLv=PrLvγTk,b,Tk+1,cκD2LvγTk,b,Tk+1,c+σ2<ρ1+LvγTk,b,EgκE2LvγTk,b,Eg+σ2ρ=Prα0γTk,b,Tk+1,c<α1,v+α2γTk,b,Eg+α3,vγTk,b,Tk+1,cγTk,b,Eg, (25)

where

α0=1ρ1κD2,α1,v=σ2ρ1Lv,α2=ρ1κE2+ρ,α3,v=Lvσ2ρ1κD2κE2+κD2ρκE2. (26)

We can observe from (25) that if α00 (or κD21/ρ1), SOPkLv always equals 1 for all values of k and v.

In the following, we derive the exact expressions of SOPkLv as given in Lemmas 1–3 below.

Lemma 1.

When α0>0 and α3,v>0orκD2>κE2/ρ+ρ1κE2, the exact expression of SOP can be given as

SOPkLv=1+n=1ND2m=0NE11n+mβ00α0expβ1yexpβ2ydy. (27)

Proof. 

At first, when α0>0 and α3,v>0, we can rewrite SOPkLv as

SOPkLv=Prα0α3,vγTk,b,EgγTk,b,Tk+1,c<α1,v+α2γTk,b,Eg=PrγTk,b,Egα0α3,v+PrγTk,b,Eg<α0α3,v,γTk,b,Tk+1,c<α1,v+α2γTk,b,Egα0α3,vγTk,b,Eg=1FγTk,b,Egα0α3,v+0α0/α3,vFγTk,b,Tk+1,cα1,v+α2xα0α3,vxfγTk,b,Egxdx. (28)

By substituting the CDF of γTk,b,Tk+1,c in (10), and the PDF of γTk,b,Eg in (15) into (28), after some manipulations, we arrive at

SOPkLv=1+n=1ND2m=0NE11n+mND2nNE1mNEλTk,E×0α0/α3,vexpm+1λTk,ExexpnλTk,Tk+1α1,v+α2xα0α3,vxdx. (29)

By changing variable y=α0α3,vx, we have

SOPkLv=1+n=1ND2m=0NE11n+mND2nNE1mNEλTk,Eα3,v×expnλTk,Tk+1α2α3,vm+1λTk,Eα0α3,v×0α0expm+1λTk,Eα3,vyexpnλTk,Tk+1α1,vα3,v+α0α2α3,vydy. (30)

With α1,vα3,v+α0α2=ρ, we can rewrite (30) as

SOPkLv=1+n=1ND2m=0NE11n+mβ00α0expβ1yexpβ2ydy. (31)

where

β0=ND2nNE1mNEλTk,Eα3,vexpnλTk,Tk+1α2m+1λTk,Eα0α3,v,β1=m+1λTk,Eα3,v,β2=nλTk,Tk+1ρα3,v. (32)

We finish the proof of Lemma 1 here. We note that the integrals in (27) can be easily calculated by computer software such as Matlab or Mathematica. ☐

Comment 2: We can observe from (27) that the exact expression of SOPkLv is still in integral form, which does not provide any insights into the system performance. Therefore, our next objective is to find an asymptotic expression at high transmit SNR as given in Corollary 1 below.

Corollary 1.

When α0>0 and α3,v>0, we can approximate SOPkLv at high transmit SNR PS/σ2+ by a closed-form expression as

SOPkLvPS/σ2+11expλTk,Eα0α3,vNE. (33)

Proof. 

At high transmit SNR, we can approximate (25) in this case as follows:

SOPkLv=Prα0γTk,b,Tk+1,c<α1,v+α2γTk,b,Eg+α3,vγTk,b,Tk+1,cγTk,b,EgPS/σ2+Prα0γTk,b,Tk+1,c<α3,vγTk,b,Tk+1,cγTk,b,Eg=PrγTk,b,Eg>α0α3,vPS/σ2+1FγTk,b,Egα0α3,v. (34)

Substituting (14) into (34), we obtain (33). ☐

Comment 3: Combining (22), (23), (27), and (33), we obtain exact and asymptotic formulas of the end-to-end SOP when α0>0 and α3,v>0. Equation (33) implies that SOPkLv at high transmit SNR only depends on λTk,E,α0, and α3,v. Moreover, SOPkLv (and the end-to-end SOP) increases when PS/σ2 increases.

Lemma 2.

When α0>0 and α3,v<0, an exact expression of SOPkLv can be given as

SOPkLv=1+n=1ND2m=0NE11n+m+1β0α0+expβ1yexpβ2ydy. (35)

Proof. 

Similar to (28), SOPkLv in this case can be written by

SOPkLv=Prα0α3,vγTk,b,EgγTk,b,Tk+1,c<α1,v+α2γTk,b,Eg=PrγTk,b,Tk+1,c<α1,v+α2γTk,b,Egα0α3,vγTk,b,Eg=0+FγTk,b,Tk+1,cα1,v+α2xα0α3,vxfγTk,b,Egxdx. (36)

With the same manner as deriving SOPkLv in (28), we can obtain (35). ☐

Corollary 2.

At high transmit SNR, SOPkLv in (35) can be approximated by

SOPkLvPS/σ2+1expλTk,Tk+1α2α3,vND2. (37)

Proof. 

Similar to the proof of Corollary 1, we have

SOPkLv=Prα0γTk,b,Tk+1,c<α1,v+α2γTk,b,Eg+α3,vγTk,b,Tk+1,cγTk,b,EgPS/σ2+Prα3,vγTk,b,Tk+1,cγTk,b,Eg<α2γTk,b,EgPS/σ2+FγTk,b,Tk+1,cα2α3,v. (38)

Substituting (10) into (38), we then obtain (37). ☐

Comment 4: Combining (22), (23), (35), and (37), we obtain exact and asymptotic expressions of the end-to-end SOP when α0>0 and α3,v<0. Equation (37) also shows that at high transmit SNR, SOPkLv (and the end-to-end SOP) decreases as PS/σ2 increases.

Lemma 3.

When α0>0 and α3,v=0, SOPkLv is given by an exact closed-form expression as

SOPkLv=1+n=1ND2m=0NE11n+mND2nNE1mNEλTk,Em+1λTk,E+nλTk,Tk+1α2/α0expnλTk,Tk+1α1,vα0. (39)

Proof. 

In this case, we have

SOPkLv=Prα0γTk,b,Tk+1,c<α1,v+α2γTk,b,Eg=0+FγTk,b,Tk+1,cα1,vα0+α2α0xfγTk,b,Egxdx. (40)

Substituting CDF of γTk,b,Tk+1,c in (10), and PDF of γTk,b,Eg in (15) into (40), after some manipulations, we can obtain (39), and finish the proof. ☐

Corollary 3.

When α0>0 and α3=0, SOPkLv can be approximated by

SOPkLvPS/σ2+1+n=1ND2m=0NE11n+mND2nNE1mNEλTk,Em+1λTk,E+nλTk,Tk+1α2/α0. (41)

Proof. 

In this case, we have the following approximation:

SOPkLv=Prα0γTk,b,Tk+1,c<α1,v+α2γTk,b,EgPS/σ2+Prα0γTk,b,Tk+1,c<α2γTk,b,EgPS/σ2+0+FγTk,b,Tk+1,cα2α0xfγTk,b,Egxdx. (42)

 ☐

Substituting CDF of γTk,b,Tk+1,c, and PDF of γTk,b,Eg into (42), after some manipulations, we can obtain (41).

Comment 5: Equation (41) shows that SOPkLv, as well as the end-to-end SOP at high transmit SNR, do not depend on PS/σ2. It is worth noting that this paper considers a generalized system model where the hardware impairment levels on the data links and eavesdropping links can be different or the same. Moreover, we can observe from Lemmas 1–3 that the secrecy outage probability of the proposed protocol is only expressed by an exact closed-form formula when α3=0.

3.3. Probability of Non-Zero Secrecy Capacity (PNSC)

In this subsection, we analyze the end-to-end PNSC of the proposed protocol, which can be formulated by

PNSC=Pr(CSece2e>0)=Prmink=1,2,,KCSec,k>0=k=1KPrCSec,k>0=k=1KPNSCk, (43)

where PNSCk=PrCSec,k>0 is the probability of non-zero secrecy capacity at the k-th hop.

Lemma 4.

The exact expressions of PNSCk can be given by

PNSCk=v=1MPrPk,b=Lv×n=1ND2m=0NE11n+m+1χ001expχ1yexpχ2ydy,ifκD2>κE2n=1ND2m=0NE11n+m+1χ01+expχ1yexpχ2ydy,ifκD2<κE2n=1ND2m=0N11n+mND2nNE1mNEλTk,Em+1λTk,E+nλTk,Tk+1,ifκD2=κE2 (44)

where PrPk,b=Lv is calculated as in (24), and

χ0=ND2nNE1mNEλTk,Eσ2LvκD2κE2expnλTk,Tk+1m+1λTk,Eσ2LvκD2κE2,χ1=m+1λTk,Eσ2LvκD2κE2,χ2=nλTk,Tk+1σ2LvκD2κE2. (45)

Proof. 

Similar to (23), we can formulate PNSCk as

PNSCk=v=1MPrPk,b=Lv×Pr1+LvγTk,b,Tk+1,cκD2LvγTk,b,Tk+1,c+σ21+LvγTk,b,EgκE2LvγTk,b,Eg+σ2>1=v=1MPrPk,b=Lv×1limρ1SOPkLv. (46)

Next, by substituting ρ=1, α0=1,α1,v=0,α2=1 into α3,v=LvκD2κE2/σ2 in (27), (35), and (39), we can obtain (45). ☐

Comment 6: Similar to [37], the end-to-end PNSC can be obtained with three different cases, i.e., κD2>κE2, κD2<κE2, and κD2=κE2. Moreover, when κD2=κE2, we obtain the exact closed-form expression of the end-to-end PNSC. Finally, with κD2=κE2, the end-to-end PNSC value does not depend on the transmit SNR as well as the hardware impairment levels.

4. Simulation Results

In this section, we present Monte Carlo simulations to verify the theoretical results obtained in Section 3 by using MATLAB 2014a. For Monte Carlo experiments, we perform 1055106 independent trials, and in each trial, the Rayleigh channel coefficients for all of the links are generated to obtain the end-to-end secrecy performance. For the theoretical results, the expressions derived in Section 3 are used to present them.

In the simulation environment, a two-dimensional Oxy plane is considered, where the primary user (PU), the power beacon (PB), the secondary eavesdropper (E), and the secondary node (Tk) are located at (xP,yP), (xB,yB), (xE,yE), and k/K,0, respectively, where k=0,1,,K. In all of the simulations, we fix the path-loss exponent β by 3, the number of transmit power levels W by 8, the variance of Gaussian noises σ2 by 1, and the block time (T) by 1. Moreover, we assume that PB=2PS=4Ith, and the total hardware impairment level κP2 equals 0. It is noted from figures that simulation results (Sim) are presented by markers, while the theoretical results including exact ones (Exact) and asymptotic ones (Asym) are presented by solid and dash lines, respectively.

In Figure 2, we present the average transmit power of the secondary transmitters as a function of PS. In this simulation, the number of hops (K) is 3, the number of antennas at the node TkND equals 3, the energy conversion efficiency η by 0.25, and the fraction of time spent for the EH phase ε is 0.25. In addition, the co-ordinates of PB and PU are 0.4,0.3 and 0.6,0.5, respectively. We can observe from Figure 2 that the average transmit power of the source (T0) is highest because the Euclidean distance between T0 and PU is farthest. We also see that the average transmit power of T0, T1, and T2 linearly increases as PS increases. It is worth noting that the simulation results match very well with the theoretical ones, which validates our derivations.

Figure 2.

Figure 2

Average transmit power of the secondary transmitters as a function of PS when K=3, ND=3, ε=0.25, η=0.25, xB=0.4, yB=0.3, xP=0.6, and yP=0.5.

Figure 3 investigates the impact of the positions of PU and PB on the average transmit power of the secondary transmitters. Particularly, we change xB from 0.1 to 0.9, and xP is calculated by xP=1xB. Moreover, we fix the values of yB and yP by 0.3 and –0.5, respectively. It can be seen from Figure 3 that the average transmit power of T0, T1, and T2 varies with different positions of PB and PU. For example, when xB=0.1, the positions of PB and PU are (0.1, 0.3) and (0.9, –0.5), respectively. In this case, the average transmit power of T2 is lowest because this node is nearest to PU. For another example, xB=0.5, the distances between T1 and PU, and between T2 and PU are the same, and hence the average transmit power of T1 and T2 is almost the same. For the nodes T1 and T2, we see that there exist positions of PB and PU at which their average transmit power is lowest. However, the average transmit power of T0 always decreases as xB increases.

Figure 3.

Figure 3

Average transmit power of the secondary transmitters as a function of xB when PS=10 dB, K=3, ND=3, ε=0.25, η=0.25, yB=0.3, xP=1xB, and yP=0.5.

Figure 4 presents the end-to-end SOP as a function of PS with different number of antennas at E. In this simulation, the total hardware impairment levels of the data and eavesdropping links are given as κD2=0.01 and κE2=0, respectively, and hence the conditions in Lemma 1 are satisfied, i.e., α0>0 and α3,v>0. It can be seen from this figure that simulation results match very well with theoretical ones. Moreover, we see that the exact end-to-end SOP converges to the approximate one at high PS values, which verifies the derived expressions obtained in Lemma 1 and Corollary 1. As proved in Corollary 1, the end-to-end SOP at high PS regime increases with the increasing of PS. In addition, Figure 4 shows that there exists an optimal value of PS at which the SOP value is lowest. Finally, we can see that the secrecy performance of the proposed protocol is worse with higher number of antennas at E.

Figure 4.

Figure 4

End-to-end secrecy outage probability as a function of PS when K=3, ND=2, ε=0.25, η=0.25, Cth=0.2, xB=0.5, yB=0.3, xP=0.5, yP=0.5, xE=0.5, yE=0.5, κD2=0.01, and κE2=0.

In Figure 5, we present the end-to-end SOP as a function of PS with various number of hops K. In this figure, we assume that the transceiver hardware of the authorized nodes is better than that of the eavesdropper, i.e., κD2=0 and κE2=0.01, which satisfy the conditions in Lemma 2, i.e., α0>0 and α3,v<0. It is seen from Figure 5 that the end-to-end SOP rapidly decreases as PS increases. Moreover, the secrecy performance significantly enhances with higher number of hops. Finally, the simulation results again validate the theoretical results obtained from Lemma 2 and Corollary 2.

Figure 5.

Figure 5

End-to-end secrecy outage probability as a function of PS when ND=2, NE=2, ε=0.25, η=0.25, Cth=0.2, xB=0.5, yB=0.3, xP=0.5, yP=0.5, xE=0.5, yE=0.5, κD2=0, and κE2=0.01.

In Figure 6, we consider the cases where α3,v=0 or ρ1κD2κE2+κD2ρκE2=0. As proved in Lemma 3 and Corollary 3, we can see from Figure 6 that the exact end-to-end SOP rapidly converges to the asymptotic one which does not depend on PS. It is also seen that the hardware impairment levels κD2 and κE2 significantly impact on the secrecy performance. In this figure, the value of SOP is lowest when the transceiver hardware of the authorized nodes and the eavesdropper is perfect, i.e., κD2=κE2=0.

Figure 6.

Figure 6

End-to-end secrecy outage probability as a function of PS when K=3, ND=2, NE=2, ε=0.25, η=0.25, Cth=0.25, xB=0.5, yB=0.3, xP=0.5, yP=0.5, xE=0.5, and yE=0.5.

Figure 7 presents the SOP performance of the proposed protocol as a function of the fraction of time spent for the EH process ε. As illustrated in this figure, the end-to-end SOP increases with higher value of ε. Moreover, when ε is very small, the probability PrPk,b=Lv in (23) (v1) converges to zero, and hence the end-to-end SOP also goes to zero. Next, similar to Figure 5, the secrecy performance significantly enhances when the hardware impairment level of the data links κD2 is lower than that of the eavesdropping links κE2.

Figure 7.

Figure 7

End-to-end secrecy outage probability as a function of ε when PS=10 dB, K=4, ND=2, NE=2, η=0.1, Cth=0.25, xB=0.5, yB=0.3, xP=0.5, yP=0.5, xE=0.5, and yE=0.5.

In Figure 8, we investigate the impact of the number of hops K on the end-to-end SOP. In this simulation, we assume that the number of antennas at the Tk and E nodes is same, i.e., ND=NE, and the transceiver hardware of these nodes is perfect, i.e., κD2=κE2=0. As we can see, the values of SOP almost decrease as increasing the number of hops. However, in the case that ND=NE=1, the end-to-end SOP is highest when the number of hops equals 2. When K2, it is seen that the SOP performance in case that ND=NE=3 is best. Moreover, the value of SOP in this case rapidly decreases with the increasing of K.

Figure 8.

Figure 8

End-to-end secrecy outage probability as a function of K when PS=0 dB, ε=0.1, η=0.1, Cth=0.25, xB=0.5, yB=0.3, xP=0.5, yP=0.5, xE=0.5, yE=0.5, κD2=0, and κE2=0.

In Figure 9, we present the end-to-end PNSC as a function of PS with various values of κD2 as κE2 is fixed by 0.05. As observed, the PNSC performance is better with the decreasing of κD2. Moreover, as κD2<κE2κD2>κE2, the value of PNSC increases (decreases) with higher value of PS, and in the case that κD2=κE2, this value does not depend on PS. It is worth noting that the simulation and theoretical results match very well with each other, which validates the formulas derived in Lemma 4.

Figure 9.

Figure 9

End-to-end probability of non-zero secrecy capacity as a function of PS when K=3, ε=0.25, η=0.25, xB=0.5, yB=0.3, xP=0.5, yP=0.5, xE=0.5, yE=0.5, κE2=0.05, ND=1, and NE=2.

Figure 10 presents the end-to-end PNSC as a function of κD2 with different number of hops (K). As shown in this figure, the PNSC performance significantly decreases when the hardware impairment level of the data link increases. Moreover, at high κD2 values, the end-to-end PNSC is worse with high number of hops.

Figure 10.

Figure 10

End-to-end probability of non-zero secrecy capacity as a function of κD2 when K=3, ε=0.1, η=0.25, xB=0.5, yB=0.3, xP=0.5, yP=0.5, xE=0.5, yE=0.5, κE2=0.2, ND=2, and NE=2.

5. Conclusions

This paper proposed and evaluated the secrecy performance of the TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under the joint impact of the interference constraint, the limited-energy source, and the hardware impairments. The main contribution of this paper is to derive new exact and asymptotic expressions of the end-to-end SOP and PNSC over Rayleigh fading channel, which can be used to design and optimize the performance of the considered networks, with any hardware impairment levels, as well as other system parameters, in the practical considerations. The interesting results obtained in this paper can be listed as follows:

  • The hardware impairments have a significant impact on the secrecy performance. Particularly, when the transceiver hardware of the authorized nodes is better than that of the eavesdropper, the proposed protocol obtains high secrecy performance. Otherwise, the SOP and PNSC performance is significantly degraded.

  • The secrecy performance of the proposed protocol can be enhanced with higher number of antennas equipped at the authorized nodes.

  • By optimally designing the number of hops and the fraction of time spent for the energy harvesting phase, the secrecy performance of the proposed protocol can be significantly improved.

Acknowledgments

This work was supported by the grant SGS reg. No. SP2019/41 conducted at VSB Technical University of Ostrava, Czech Republic, and partially was funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2017.317.

Author Contributions

The main contributions of P.T.T. (Phu Tran Tin) and P.M.N. were to create the main ideas and execute performance evaluation by extensive simulations, while T.T.D., P.T.T. (Phuong T. Tran) and M.V. worked as the advisers of P.T.T. (Phu Tran Tin) and P.M.N. to discuss, create, and advise the main ideas and performance evaluations together.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Ledwaba L.P.I., Hancke G.P., Venter H.S., Isaac S.J. Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices. IEEE Access. 2018;6:9303–9323. doi: 10.1109/ACCESS.2018.2793301. [DOI] [Google Scholar]
  • 2.Liu Z., Choo K.-K.R., Grossschadl J. Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Commun. Mag. 2018;56:158–162. doi: 10.1109/MCOM.2018.1700330. [DOI] [Google Scholar]
  • 3.Wyner A.D. The Wire-tap Channel. Bell Syst. Tech. J. 1975;54:1355–1387. doi: 10.1002/j.1538-7305.1975.tb02040.x. [DOI] [Google Scholar]
  • 4.Csiszar I., Korner J. Broadcast Channels With Confidential Messages. IEEE Trans. Inf. Theory. 1978;24:339–348. doi: 10.1109/TIT.1978.1055892. [DOI] [Google Scholar]
  • 5.Gopala P.K., Lai L., Gamal H.E. On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory. 2008;54:4687–4698. doi: 10.1109/TIT.2008.928990. [DOI] [Google Scholar]
  • 6.Li Z., Jing T., Ma L., Huo Y., Qian J. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks. Sensors. 2016;16:339. doi: 10.3390/s16030339. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Tang X., Cai Y., Yang W., Yang W., Chen D., Hu J. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks. Sensors. 2018;18:331. doi: 10.3390/s18020331. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Yang M., Zhang B., Huang Y., Yang N., Guo D., Gao B. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming. Sensors. 2016;16:1908. doi: 10.3390/s16111908. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 9.Yang N., Yeoh P.L., Elkashlan M., Schober R., Collings I.B. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels. IEEE Trans. Commun. 2013;61:144–154. doi: 10.1109/TCOMM.2012.12.110670. [DOI] [Google Scholar]
  • 10.Xiong J., Tang Y., Ma D., Xiao P., Wong K.-K. Secrecy Performance Analysis for TAS-MRC System with Imperfect Feedback. IEEE Trans. Inf. Forensics Secur. 2015;10:1617–1629. doi: 10.1109/TIFS.2015.2421358. [DOI] [Google Scholar]
  • 11.Krikidis I. Opportunistic Relay Selection For Cooperative Networks with Secrecy Constraints. IET Commun. 2010;4:1787–1791. doi: 10.1049/iet-com.2009.0634. [DOI] [Google Scholar]
  • 12.Liu Y., Wang L., Tran T.D., Elkashlan M., Duong T.Q. Relay Selection for Security Enhancement in Cognitive Relay Networks. IEEE Wirel. Commun. Lett. 2015;4:46–49. doi: 10.1109/LWC.2014.2365808. [DOI] [Google Scholar]
  • 13.Duy T.T., Duong T.Q., Thanh T.L., Bao V.N.Q. Secrecy Performance Analysis with Relay Selection Methods under Impact of Co-channel Interference. IET Commun. 2015;9:1427–1435. doi: 10.1049/iet-com.2014.1128. [DOI] [Google Scholar]
  • 14.Zhong B., Zhang Z. Secure Full-Duplex Two-Way Relaying Networks With Optimal Relay Selection. IEEE Commun. Lett. 2017;21:1123–1126. doi: 10.1109/LCOMM.2017.2655050. [DOI] [Google Scholar]
  • 15.Kuhestani A., Mohammadi A., Mohammadi M. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2018;13:341–355. doi: 10.1109/TIFS.2017.2750102. [DOI] [Google Scholar]
  • 16.Mo J., Tao M., Liu Y. Relay Placement for Physical Layer Security: A Secure Connection Perspective. IEEE Commun. Lett. 2012;16:878–881. [Google Scholar]
  • 17.Hu L., Wen H., Wu B., Pan F., Liao R.-F., Song H., Tang J., Wang X. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things. IEEE Internet Things J. 2018;5:219–228. doi: 10.1109/JIOT.2017.2778185. [DOI] [Google Scholar]
  • 18.Ma H., Cheng J., Wang X., Ma P. Robust MISO Beamforming with Cooperative Jamming for Secure Transmission From Perspectives of QoS and Secrecy Rate. IEEE Trans. Commun. 2018;66:767–780. doi: 10.1109/TCOMM.2017.2765637. [DOI] [Google Scholar]
  • 19.Zhang G., Xu J., Wu Q., Cui M., Li X., Lin F. Wireless Powered Cooperative Jamming for Secure OFDM System. IEEE Trans. Veh. Technol. 2018;67:1331–1346. doi: 10.1109/TVT.2017.2756877. [DOI] [Google Scholar]
  • 20.Zhou X., Zhang R., Ho C.-K. Wireless information and power transfer: Architecture design and rate-energy tradeoff. IEEE Trans. Commun. 2013;61:4754–4767. doi: 10.1109/TCOMM.2013.13.120855. [DOI] [Google Scholar]
  • 21.Nasir A.A., Zhou X., Durrani S., Kennedy R.A. Relaying protocols for wireless energy harvesting and information processing. IEEE Trans. Wirel. Commun. 2013;12:3622–3636. doi: 10.1109/TWC.2013.062413.122042. [DOI] [Google Scholar]
  • 22.Atapattu S., Evans J. Optimal Energy Harvesting Protocols for Wireless Relay Networks. IEEE Trans. Wirel. Commun. 2016;15:5789–5803. doi: 10.1109/TWC.2016.2569097. [DOI] [Google Scholar]
  • 23.Xu C., Zheng M., Liang W., Yu H., Liang Y.-C. Outage Performance of Underlay Multihop Cognitive Relay Networks with Energy Harvesting. IEEE Commun. Lett. 2016;20:1148–1151. doi: 10.1109/LCOMM.2016.2547985. [DOI] [Google Scholar]
  • 24.Xu C., Zheng M., Liang W., Yu H., Liang Y.-C. End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting. IEEE Trans. Wirel. Commun. 2017;16:3561–3572. doi: 10.1109/TWC.2017.2684125. [DOI] [Google Scholar]
  • 25.Hieu T.D., Duy T.T., Dung L.T., Choi S.G. Performance Evaluation of Relay Selection Schemes in Beacon-Assisted Dual-hop Cognitive Radio Wireless Sensor Networks under Impact of Hardware Noises. Sensors. 2018;18:1843. doi: 10.3390/s18061843. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 26.Sun A., Liang T., Li B. Secrecy Performance Analysis of Cognitive Sensor Radio Networks with an EH-Based Eavesdropper. Sensors. 2017;17:1026. doi: 10.3390/s17051026. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 27.Hieu T.D., Duy T.T., Kim B.-S. Performance Enhancement for Multi-hop Harvest-to-Transmit WSNs with Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises. IEEE Sens. J. 2018;18:5173–5186. doi: 10.1109/JSEN.2018.2829145. [DOI] [Google Scholar]
  • 28.Mokhtar M., Gomaa A., Al-Dhahir N. OFDM AF relaying under I/Q imbalance: Performance analysis and baseband compensation. IEEE Trans. Commun. 2013;61:1304–1313. doi: 10.1109/TCOMM.2013.020813.120576. [DOI] [Google Scholar]
  • 29.Björnson E., Matthaiou M., Debbah M. A new look at dual-hop relaying: Performance limits with hardware impairments. IEEE Trans. Commun. 2013;61:4512–4525. doi: 10.1109/TCOMM.2013.100913.130282. [DOI] [Google Scholar]
  • 30.Solanki S., Upadhyay P.K., da Costa D.B., Bithas P.S., Kanatas A.G., Dias U.S. Joint Impact of RF Hardware Impairments and Channel Estimation Errors in Spectrum Sharing Multiple-Relay Networks. IEEE Trans. Commun. 2018;66:3809–3824. doi: 10.1109/TCOMM.2018.2832623. [DOI] [Google Scholar]
  • 31.Boulogeorgos A.A., Karas D.S., Karagiannidis G.K. How much does I/Q Imbalance affect secrecy capacity? IEEE Commun. Lett. 2016;20:1305–1308. doi: 10.1109/LCOMM.2016.2558561. [DOI] [Google Scholar]
  • 32.Zhu J., Ng D.W.K., Wang N., Schober R., Bhargava V.K. Analysis and Design of Secure Massive MIMO Systems in the Presence of Hardware Impairments. IEEE Trans. Wirel. Commun. 2017;16:2001–2016. doi: 10.1109/TWC.2017.2659724. [DOI] [Google Scholar]
  • 33.Lee J.-H. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems. IEEE Commun. Lett. 2015;19:525–528. doi: 10.1109/LCOMM.2015.2401551. [DOI] [Google Scholar]
  • 34.Lee J.-H., Sohn I., Kim Y.-H. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks. Sensors. 2016;16:1726. doi: 10.3390/s16101726. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 35.Tian F., Chen X., Liu S., Yuan X., Li D., Zhang X., Yang Z. Secrecy Rate Optimization in Wireless Multi-Hop Full Duplex Networks. IEEE Access. 2018;6:5695–5704. doi: 10.1109/ACCESS.2018.2794739. [DOI] [Google Scholar]
  • 36.Alotaibi E.R., Hamdi K.A. Secure Relaying in Multihop Communication Systems. IEEE Commun. Lett. 2016;20:1120–1123. doi: 10.1109/LCOMM.2016.2550025. [DOI] [Google Scholar]
  • 37.Tin P.T., Hung D.T., Duy T.T., Voznak M. Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels. Radio Eng. 2016;25:774–782. [Google Scholar]
  • 38.Yao J., Liu Y. Secrecy Rate Maximization with Outage Constraint in Multihop Relaying Networks. IEEE Commun. Lett. 2018;22:304–307. doi: 10.1109/LCOMM.2017.2768513. [DOI] [Google Scholar]
  • 39.Qi X., Huang K., Zhong Z., Kang X., Zhong Z. Physical layer security of multi-hop aided downlink MIMO heterogeneous cellular networks. Chin. Commun. 2016;13:120–130. doi: 10.1109/CC.2016.7833466. [DOI] [Google Scholar]
  • 40.Lee J.-H. Confidential Multicasting Assisted by Multi-Hop Multi-Antenna DF Relays in the Presence of Multiple Eavesdroppers. IEEE Trans. Commun. 2016;64:4295–4304. doi: 10.1109/TCOMM.2016.2600676. [DOI] [Google Scholar]
  • 41.Dong L., Han Z., Petropulu A.P., Poor H.V. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010;58:1875–1888. doi: 10.1109/TSP.2009.2038412. [DOI] [Google Scholar]
  • 42.Bao V.N.Q., Trung N.L., Debbah M. Relay selection scheme for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 2013;12:6076–6085. doi: 10.1109/TWC.2013.110813.121671. [DOI] [Google Scholar]
  • 43.Vo V.N., Tran D.-D., Chakchai S.-I., Tran H. Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things with Untrusted Relays. IEEE Access. 2018;6:48247–48258. [Google Scholar]
  • 44.Huang Y., Zhang P., Wu Q., Wang J. Secrecy Performance of Wireless Powered Communication Networks with Multiple Eavesdroppers and Outdated CSI. IEEE Access. 2018;6:33774–33788. doi: 10.1109/ACCESS.2018.2835832. [DOI] [Google Scholar]
  • 45.Lee K., Choi H.-H. Secure Analog Network Coding with Wireless Energy Harvesting under Multiple Eavesdroppers. IEEE Access. 2018;6:76289–76301. doi: 10.1109/ACCESS.2018.2884010. [DOI] [Google Scholar]
  • 46.Laneman J.N., Tse D.N., Wornell G.W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inf. Theory. 2004;50:3062–3080. doi: 10.1109/TIT.2004.838089. [DOI] [Google Scholar]
  • 47.Matthaiou M., Papadogiannis A. Two-way relaying under the presence of relay transceiver hardware impairments. IEEE Commun. Lett. 2013;17:1136–1139. doi: 10.1109/LCOMM.2013.042313.130191. [DOI] [Google Scholar]
  • 48.Duy T.T., Duong Q.T., da Costa D.B., Bao V.N.Q., Elkashlan M. Proactive Relay Selection with Joint Impact of Hardware Impairment and Co-channel Interference. IEEE Trans. Commun. 2015;63:1594–1606. doi: 10.1109/TCOMM.2015.2396517. [DOI] [Google Scholar]
  • 49.Sharma P.K., Upadhyay P.K. Cognitive relaying with transceiver hardware impairments under interference constraints. IEEE Commun. Lett. 2016;20:820–823. doi: 10.1109/LCOMM.2016.2533500. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES