Skip to main content
Entropy logoLink to Entropy
. 2019 Jul 16;21(7):700. doi: 10.3390/e21070700

Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments

Phu Tran Tin 1,2, Tan N Nguyen 1, Nguyen Q Sang 3, Tran Trung Duy 4, Phuong T Tran 5,*, Miroslav Voznak 1
PMCID: PMC7515214  PMID: 33267414

Abstract

In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.

Keywords: rateless codes, transmit antenna selection, energy harvesting, co-channel interference, hardware impairments

1. Introduction

Physical-layer security (PLS) [1,2,3,4] has attracted much attention of the researchers as an efficient method to attain security. Due to the simple implementation, i.e., only exploiting characteristics of wireless medium such as link distance and channel state information (CSI), PLS can be implemented efficiently in wireless sensor networks (WSNs), internet-of-things (IoT) networks, etc. [5,6,7,8]. To enhance the secrecy performance, diversity transmission methods can be employed. In [9,10,11,12], MIMO-based transmit–receive methods such as Transmit Antenna Selection-Maximal Ratio Combining (TAS-MRC), Maximal Ratio Transmission-MRC (MRT-MRC), MRT-Selection Combining (MRT-SC), MRT-SC were proposed and analyzed. In addition, performance of secure communication protocols can be also enhanced with cooperative relaying methods [13,14,15,16]. In [17,18,19,20], the authors proposed cooperative jamming (CJ) techniques to reduce quality of the eavesdropping channels, where friendly jammers are employed to generate artificial noises on the eavesdropper, and the legitimate receivers have to cooperate with the jammers to remove the interference in the received signals. The results presented that the schemes which combine the diversity transmission and the jamming techniques outperform the conventional cooperative ones without using CJ. However, energy efficiency may become a critical issue when the jammer nodes continuously transmit the artificial noises by using their own energy. Recently, radio frequency (RF) energy harvesting (EH) is an efficient method to prolong lifetime for wireless networks [21,22,23,24]. Particularly, the wireless devices can harvest energy from full-energy nodes [21,22] or from power stations deployed in networks [25,26] or even from co-channel interferences caused by outside sources [27,28]. References [20,29] proposed and analyzed performance of RF-EH-based secure communication protocols. To support energy for the jammer nodes, the authors of [20,29] proposed harvest-to-jam (HJ) methods, where the cooperative jammers harvest energy from the RF signals, and then use it to generate artificial noises.

Rateless codes or Fountain codes (FCs) [30,31,32,33] have drawn much attention due to their simple implementation. In FCs, a transmitter uses Fountain encoder to generate a limitless number of encoded packets, and then transmit them to intended receivers. If the receivers can receive a sufficient number of the encoded packets, they can recover the original message of the transmitter. Due to broadcast of the wireless channels, the encoded packets can be overheard by eavesdroppers. Therefore, the security becomes a critical issue for the FCs-based communication systems. Recently, some published works considering the secure communication protocols with FCs have been reported in [34,35,36]. In [34], the authors proposed a secure delivery scheme, in which the security can be achieved if the legitimate user receives enough Fountain packets before the eavesdropper. In [35], a dynamic Fountain-encoded at a transmitter was proposed to enhance the data security. The authors of [36] proposed a FC-based cooperative relay protocol. In [36], the source and the jammer cooperate to remove the interference components in the received signals at the destination. Reference [37] proposed an efficient FCs-based multicast scenario to achieve security for Internet of Things (IoT) systems.

In this paper, we propose a FCs based secure communication protocol, where a multi-antenna source selects its best antenna to transmit the encoded packets to a single-antenna destination, in presence of a single-antenna eavesdropper who attempts to overhear the source information. When the destination can receive sufficient encoded packets for decoding the original data, it would send a feedback to the source to terminate the transmission. As a result, to obtain the secure transmission, the destination must receive a sufficient number of the encoded packets before the eavesdropper. Otherwise, the original information is intercepted. The main contributions of this paper can be summarized as follows:

  • To the best of our knowledge, we first propose the FCs based communication protocol using the harvest-to-jam based cooperative jamming technique to reduce the quality of the eavesdropping link. Different with [34,35,36,37], we propose a cooperative jamming technique, where a cooperative jammer node harvests energy from the RF signals of the source and the interference sources to generate noises to the eavesdropper. Different with our previous works [38,39], in the proposed protocol, there exist interference sources in the network that cause co-channel interferences on both the destination and the eavesdropper.

  • Until now, almost published works related to secrecy performance evaluation have assumed that the transceiver hardware of the wireless devices is perfect. However, in practice, it is not perfect due to phase noise, I/Q imbalance (IQI), amplifier non-linearity [40,41,42,43]. In this paper, the joint impact of hardware noises and co-channel interference on the system performances is investigated.

  • For performance evaluation, we derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of the time slots used by the source over Rayleigh fading channel. The closed-form formulas are easy-to-compute, and hence they can be easily used to design and optimize the considered system. In addition, all of the derived expressions are verified by Monte Carlo simulations.

The rest of this paper is organized as follows. The system model of the proposed protocols is described in Section 2. In Section 3, we evaluate performance of the proposed scheme. The simulation results are shown in Section 4. Finally, this paper is concluded in Section 5.

2. System Model

Figure 1 illustrates the system model of the proposed protocol, where the source node (S) equipped with M antennas communicates with the single-antenna destination (D), in presence of the single-antenna eavesdropper (E) who attempts to overhear the source data. All of the receivers such as D and E are suffered from co-channel interference caused by K ambient sources (denoted by I1,I2,,IK). To reduce the quality of the eavesdropping link, the cooperative jamming technique can be used, where the single antenna jammer (J) is employed to continuously generate the artificial noises to E. We assume that the nodes D and J are close with each other so that D can remove the co-channel interference generated by J [38]. Moreover, the jammer (J) uses the energy harvested from the RF signals of the source and the interference sources for transmitting the jamming signals.

Figure 1.

Figure 1

System model of the proposed scheme.

The source divides its original data into L packets which are encoded appropriately to create the encoded packets. Then, at each time slot, the source uses the TAS technique to send each encoded packet to the destination. At the same time, the eavesdropper tries to receive the encoded packet. The destination and the eavesdropper are assumed to be able to successfully obtain the original data if they can correctly receive at least H encoded packets, where H=1+εL, and ε is the decoding overhead which depends on concrete code design. Moreover, after the destination receives sufficient number of the encoded packets, it will send an ACK message to inform the source to stop the data transmission. In this case, if the eavesdropper cannot obtain enough number of the encoded packets, it cannot obtain the source data. Otherwise, the original data of the source will be intercepted.

Let us consider the data transmission at an arbitrary time slot. Let hSmD, hSmE and hSmJ denote channel coefficients between the mth antenna of the source and the nodes D, E and J, respectively, where m=1,2,,M. We also denote hIkD, hIkE, hIkJ and hJE as channel gains of the IkD, IkE, IkJ and JE links, respectively, where k=1,2,,K. We assume that all of the link channels are block and flat Rayleigh fading which keeps constant in a time slot but independently changes over time slots. Therefore, the channel gains γXY=|hXY|2,X,YSm,D,E,J,Ik are exponential random variables (RVs) whose cumulative distribution function (CDF) and probability density function (PDF) are given, respectively as

FγXYz=1expλXYx,fγXYz=λXYexpλXYx, (1)

where λXY is a parameter of γXY, i.e., λXY=1/EγXY, and E. is an expected operator. We can assume that the RVs γSmDγSmE,γSmJ are independent and identical, i.e., λSmD=λSD λSmE=λSE,λSmJ=λSJ for all m. On the contrary, the RVs γIkDγIkE,γIkJ are assumed to be independent and non-identical, i.e., λIkDλIlD λIkEλIlE,λIkJλIlJ as kl, where l1,2,,K.

With the TAS technique, the source selects the best transmit antenna to send the encoded packet to the destination, using the following method:

b=argmaxm=1,2,,MγSmD, (2)

where b1,2,,M.

Moreover, the CDF of γSbD can be obtained as

FγSbDx=Prmaxm=1,2,,MγSmD<x=1expλSDxM=1+m=1M1mCMmexpmλSDx, (3)

where CMm=M!/m!/Mm! is a binomial coefficient.

Let us denote T as a block time of each time slot: a duration of αT0α1 is used for the jammer node to harvest the energy from the source and the interference sources, and the remaining time 1αT is spent for the data transmission. Then, the energy harvested by the jammer is expressed as

EH=ηαTPSγSbJ+k=1KPIkγIkJ, (4)

where η0η1 is an energy conversion efficiency, PS and PIk are transmit power of the source (S) and the interference sources Ik, respectively.

Next, the average transmit power of the jammer used for the data transmission phase can be formulated by

PJ=EH1αT=χPSγSbJ+k=1KPIkγIkJ, (5)

where χ=ηα/1α.

It is worth noting that the implementation of the TAS method is simpler than that of the MRT method because it only requires the index of the best antenna which can be feed-backed by the destination (not feedback all of the channel state information (CSI) as in MRT). Moreover, the best transmit antenna selection can be performed before the EH phase, and the time used for this process can be ignored as compared with the EH and packet transmission phases. Finally, the source uses the selected antenna during each time slot for both the EH and data transmission purposes due to scheduling issues, e.g., the source uses the remaining antennas to serve other destinations.

Let us denote U as the length of each encoded packet. If the source sends the signal xSll=1,2,,U to the destination, the received signals at the destination and the eavesdropper can be expressed, respectively as

yD=PShSbDxSl+νDl+PJhJDxJl+k=1KPIkhIkDxIkl+nDl,yE=PShSbExSl+νEl+PJhJExJl+k=1KPIkhIkExIkl+nEl, (6)

where l=1,2,,U, νDl and νEl are hardware noises caused by impairments, xJl and xIkl are signals transmitted by the nodes J and Ik, respectively, and nDl and nEl are additive white Gaussian noises (AWGNs) at D and E, respectively. The hardware noises νDl and νEl can be modeled as Gaussian RVs with zero-mean and variances of κD2 and κE2, respectively, where κD2 and κE2 is total hardware impairment levels of the SbD and SbE links, respectively.

Because the nodes D and J are close with each other so that we can assume that D knows xJl, hJD and PJ via securely exchanging local messages with J. Therefore, D can remove the interference component PJhJDxJl from the received signal yD. Once D can perfectly remove the interference, the instantaneous signal-to-interference-plus-noise ratio (SINR) received by the destination under joint impact of co-channel interference and hardware impairments can be formulated as [44]

ΨD=PSγSbDκD2PSγSbD+k=1KPIkγIkD+N0=QSγSbDκD2QSγSbD+k=1KQIkγIkD+1, (7)

where N0 is variance of additive noises nDl which are assumed to be same at all of the receivers, QS=PS/N0 and QIk=PIk/N0.

Because the eavesdropper cannot remove the jamming signals, the instantaneous SINR obtained at this node is given as

ΨE=PSγSbEκE2PSγSbE+PJγJE+k=1KPIkγIkD+N0. (8)

Substituting (5) into (8), we obtain

ΨE=QSγSbEκE2QSγSbE+χQSγSbJ+k=1KQIkγIkJγJE+k=1KQIkγIkE+1. (9)

Next, we can give expressions of the data rate for the data and eavesdropping links, respectively by

CD=1αTlog21+ΨD,CE=1αTlog21+ΨE. (10)

Assume that each encoded packet can be decoded successfully if the achievable data rate is higher than a predetermined target rate (denoted by Cth). Otherwise, the encoded packet cannot be received correctly. Hence, the probability that the destination cannot receive one encoded packet correctly is formulated as

PrCD<Cth=PrΨD<θth=ΔρD, (11)

where

θth=2Cth1αT1. (12)

Note that the probability of the successful decoding for one encoded packet at D is PrCDCth=1ρD. Similarly, the probability that one encoded packet can be received correctly and incorrectly by the eavesdropper is given, respectively as

PrCE<Cth=PrΨE<θth=ΔρE,PrCECth=PrΨEθth=1ρE. (13)

Considering a delay-constrained system where the maximum number of time slots that can be used for transmitting the encoded packets is limited by NthNthH. This means that the destination cannot recover the original data if it cannot successfully receive H encoded packets within Nth time slots. Let us denote NSHNSNth as the number of time slots used by the source (or the number of the encoded packets sent by the source), ND and NE as the number of the encoded packets received by the nodes D and E, respectively, after the source stops its transmission. Then, the outage probability (OP) at the destination is formulated by

OP=PrND<H|NS=Nth. (14)

Next, the probability that the source-destination transmission is successful and secure (SS) is defined as

SS=PrND=H,NE<H|NSNth. (15)

Equation (15) implies that the destination can receive sufficient number of the encoded packets ND=H before the eavesdropper NE<H when the number of time slots used is less than or equal to Nth NSNth.

Let us consider the intercept probability (IP) defined as the probability that the eavesdropper can obtain H encoded packets before or at same time with the destination:

IP=PrNE=H,NDH|NSNth. (16)

We note from (16) that when the eavesdropper obtains H encoded packets, it does not need to receive more encoded packets, regardless of whether the source will transmit the encoded packets in the next time slots. Instead, it will start to decode the original data of the source. Finally, we study the average number of the time slots used to transmit encoded packets to the destination, which can be formulated by

TS=v=0H1NthPrND=v|NS=Nth+t=HNthtPrND=H|NS=t. (17)

In (17), PrND=v|NS=Nth is the probability that the number of the encoded packets received at the destination is v0v<H when the source used Nth time slots (the destination is in outage), and PrND=H|NS=t is the probability that D can obtain sufficient number of the encoded packets within t time slots, where HtNth (the data transmission is successful).

3. Performance Analysis

3.1. Derivations of ρD and ρE

Proposition 1.

If 1κD2θth0, then ρD=1, and if 1κD2θth>0,ρD can be expressed by an exact closed-form formula as

ρD=1+m=1M1mCMmexpmλSDω0k=1KλIkDλIkD+mλSDωk. (18)

Proof. 

See the proof and notations in Appendix A. □

Proposition 2.

If 1κE2θth0, then ρE=1, and if 1κE2θth>0, we can obtain an exact closed-form expression of ρE as

ρE=1k=1KλIkEλIkE+λSEϑkexpλSEϑ0×λJEΩSJλSEβ0expλJEΩSJλSEE1λJEΩSJλSE+k=1KλJEΩIkJλSEβkexpλJEΩIkJλSEE1λJEΩIkJλSE. (19)

Proof. 

See the proof and notations in Appendix B. □

In case where α=0, Equation (19) reduces to

ρE=1k=1KλIkEλIkE+λSEϑkexpλSEϑ0. (20)

3.2. Analysis of Outage Probability (OP)

As defined in (14), an exact closed-form expression of OP can be provided as follows:

OP=ND=0H1CNthND1ρDNDρDNthND. (21)

It is noted from (21) that the possible values of ND are from 0 to H1, and there are CNthND possible cases for each value of ND.

3.3. Analysis of Successful and Secure Communication (SS)

From (15), we can rewrite SS by

SS=u=HNthPrND=H|NS=u×t=0H1PrNE=t|NS=u. (22)

In (22), PrND=H|NS=u is the probability that the destination can correctly receive H encoded packets when the number of time slots used is u. Since the data transmission between the source and the destination ends in the uth time slot, PrND=H|NS=u is given as

PrND=H|NS=u=Cu1uH1ρDHρDuH. (23)

Moreover, PrNE=t|NS=u in (22) presents the probability that the number of encoded packets obtained at the eavesdropper is t. Similar to (21), we have

PrNE=t|NS=u=Cut1ρEtρEut. (24)

Substituting (23) and (24) into (22), an exact closed-form expression of SS can be given as

SS=u=HNthCu1uH1ρDHρDuH×t=0H1Cut1ρEtρEut. (25)

3.4. Analysis of Intercept Probability (IP)

The intercept probability (IP) in (16) is given by

IP=u=HNthPrNE=H|NS=u×PrND=H|NS=u+v=0H1PrND=v|NS=u. (26)

In (26), PrNE=H|NS=u is the probability that the eavesdropper can receive sufficient number of the encoded packets in u time slots, which can be calculated similarly to (23) as

PrNE=H|NS=u=Cu1uH1ρEHρEuH. (27)

Next, PrND=H|NS=u in (26) is calculated by (23), and PrND=v|NS=u in (26) can be obtained by

PrND=v|NS=u=Cuv1ρDvρDuv. (28)

Plugging (23), (26), (27) and (28) together, we obtain

IP=u=HNthCu1uH1ρEHρEuH×Cu1uH1ρDHρDuH+v=0H1Cuv1ρDvρDuv. (29)

3.5. Analysis of Average Number of Time Slots (TS)

Similarly, the probability PrND=v|NS=Nth and PrND=H|NS=t in (17) can be calculated respectively as

PrND=v|NS=Nth=CNthv1ρDvρDNthH,PrND=H|NS=t=Ct1tH1ρDHρDtH. (30)

Substituting (30) into (17), we obtain an exact closed-form formula for the average number of time slots used by the source as

TS=Nthv=0H1CNthv1ρDvρDNthv+t=HNthtCt1tH1ρDHρDtH. (31)

4. Simulation Results

In this section, Monte Carlo simulations are presented to verify the theoretical results. For illustration purpose, in all of the simulations, we fix the required number of the encoded packets by 10 H=10, the energy conversion efficiency by 1 η=1, the total block time by 1 T=1, the number of the interference sources by 3 K=3, the parameters of the interference links by λI1D=λI1E=λI1J=3, λI2D=λI2E=λI2J=4 and λI3D=λI3E=λI3J=5, and the parameters of the remaining links by 1 λSD=λSE=λSJ=λJE=1. In the figures, the simulation and theoretical results are denoted by Sim and Theo, respectively.

In Figure 2, we present the probability ρD and ρE as a function of QS in dB. In this figure, the number of antenna equipped by the source is set to 3 M=3, the fraction of time allocated for the EH phase is fixed by 0.3 α=0.3, the hardware impairment levels are assigned by κD2=κE2=0.1, and the target rate is set to 0.75 Cth=0.75. It can be seen from Figure 2 that ρD and ρE decrease with the increasing of QS and the decreasing of QI. However, ρD is much smaller than ρE at medium and high QS regimes. We also obverse that the simulation and theoretical results are in good agreement, which validates our derivations.

Figure 2.

Figure 2

ρD and ρE as a function of QS in dB when M=3, α=0.3, κD2=κE2=0.1 and Cth=0.75.

Figure 3 presents outage performance of the proposed protocol as a function of QS in dB with QI=7.5 dB, M=2, α=0.1, κD2=κE2=0 and Cth=1. It is shown in Figure 3 that the impact of the co-channel interference on the performance is negative, i.e., the value of OP is very high at low QS regimes. In particularly, when the value of QS is lower than that of QI, OP is almost equal to 1. We can also observe that the outage performance is better with high value of Nth because the source has more time slots to transmit the encoded packets to the destination.

Figure 3.

Figure 3

OP as a function of QS in dB when QI=7.5 dB, M=2, α=0.1, κD2=κE2=0 and Cth=1.

In Figure 4, we present the value of SS as a function of QS in dB when QI=10 dB , α=0.1, κD2=0.1, κE2=0, Nth=20 and Cth=1.5. We can see that the proposed protocol obtains higher value of SS when more antennas are equipped at the source. It is also seen that when M=1, the SS performance is significantly degraded because no transmit diversity gain is obtained. Moreover, SS also increases as increasing QS. It is due to the fact that at high QS values, the destination almost obtains sufficient number of the encoded packets before the eavesdropper. However, it can be seen from Figure 4 that when the value of QS is very high, the value of SS slightly decreases due to high overhearing possibility of the eavesdropper. Moreover, the SS performance in all values of M(M>1) is almost same at high QS regimes.

Figure 4.

Figure 4

SS as a function of QS in dB when QI=10 dB, α=0.1, κD2=0.1, κD2=0, Nth=20 and Cth=1.5.

In Figure 5, the value of SS is presented as a function of α when QS=QI=15 dB, M=3, κE2=0.1, Nth=15 and Cth=0.7. As we can see, the performance significantly degrades with high hardware impairment levels of the data links, i.e., κD2 is high. Moreover, we can observe from that the fraction of time allocated for the EH phase impacts on the value of SS. It can be seen that there exists an optimal value of α at which the value of SS is highest.

Figure 5.

Figure 5

SS as a function of α when QS=QI=15 dB, M=3, κE2=0.1, Nth=15 and Cth=0.7.

In Figure 6, the intercept probability of the proposed protocol is presented as a function of M when QS=QI=20 dB, κD2=0.2, α=0.3, Nth=20 and Cth=0.5. As we can see, the value of IP decreases when more antennas are equipped at the source. Also, IP is lower when the hardware impairment level of the eavesdropping links is high.

Figure 6.

Figure 6

IP as a function of M when QS=QI=20 dB, κD2=0.2, α=0.3, Nth=20 and Cth=0.5.

Figure 7 investigates impact of Nth on the intercept probability as QS=QI=20 dB, M=2, κD2=κE2=0, and Cth=0.5. It can be seen that the value of IP is higher when the number of Nth increases. However, when the number of Nth is high enough, IP converges to a constant. As expected, IP is lower when more time used for the EH phase (because the transmit power of the jammer is higher).

Figure 7.

Figure 7

IP as a function of Nth when QS=QI=20 dB, M=2, κD2=κE2=0 and Cth=0.5.

Figure 8 presents OP and IP as a function of α when QS=QI=15 dB, M=4, κD2=κE2=0 and Nth=16. We can see that there exists a trade-off between OP and IP. Indeed, OP increases when increasing the value of α, while IP decreases with higher value of α. We can also see that when Cth=0.8, OP is below 103 when the value of α is higher than (about) 0.15, but the intercept probability is higher than 2.5×103. In addition, OP significantly decreases as decreasing the value of Cth.

Figure 8.

Figure 8

OP and IP as a function of α when QS=QI=15 dB, M=4, κD2=κE2=0 and Nth=16.

Figure 9 shows the trade-off between OP and IP when QS=QI=15 dB, M=3, κD2=κE2=0.1 and Cth=0.75. As we can observe, when the cooperative jamming technique is not used α=0, the OP value is lower but the IP one is higher. Similarly, to increase the reliability of the data transmission, we can increase the number of Nth. However, the intercept possibility of the eavesdropper also increases with higher value of Nth.

Figure 9.

Figure 9

OP and IP as a function of Nth when QS=QI=15 dB, M=3, κD2=κE2=0.1 and Cth=0.75.

In Figure 10, we present average number of the time slots as a function of QS in dB when QI=10 dB, α=0.2, κD2=κE2=0.05, Nth=17 and Cth=1. We see that the number of time slots used decreases when increasing the number of antennas and the transmit power of the source. It is also seen that as the source has a single antenna (M=1), the average number of time slots is much higher. Moreover, reducing the number of time slots means reducing the delay time and transmit power, which are an important metric of wireless communication systems.

Figure 10.

Figure 10

Average number of time slots as a function of QS in dB when QI=10 dB, α=0.2, κD2=κE2=0.05, Nth=17 and Cth=1.

From Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10, it is worth noting that the theoretical results and simulation results are in good agreement which validates the theoretical derivations.

5. Conclusions

In this paper, we proposed an FC-based MISO scheme using the TAS and EH-based cooperative jamming techniques for the secure communication under the joint impact of hardware impairments and co-channel interference. The performance of the proposed scheme such as outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of the time slots was evaluated via both simulation and theory. The results presented that the hardware impairment levels, the co-channel interference, the fraction of time allocated for the EH phase and the number of transmit antennas at the source significantly impact on the system performance. Moreover, there exists a trade-off between the security and reliability, i.e., between OP and IP. Finally, the fraction of time allocated for the EH phase should be designed appropriately to optimize system performance.

Appendix A. Proof of Proposition 1

From (7) and (11), we obtain

ρD=PrQSγSbDκD2QSγSbD+k=1KQIkγIkD+1<θth=Pr1κD2θthQSγSbD<k=1KQIkθthγIkD+θth. (A1)

From (A1), we observe that if 1κD2θth0, then ρD=1; and if 1κD2θth>0, we can rewrite (A1) as

ρD=PrγSbD<k=1KωkγIkD+ω0, (A2)

where

ω0=θth1κD2θthQS,ωk=θthQIk1κD2θthQS. (A3)

Moreover, Equation (A2) can be rewritten by

ρD=0+0+FγSbDk=1Kωkxk+ω0fγI1Dx1fγIKDxKdx1dxK. (A4)

Using the CDF obtained by (3), we have

FγSbDk=1Kωkxk+ω0=1+m=1M1mCMmexpmλSDω0expmλSDk=1Kωkxk. (A5)

Substituting (A5) and the PDF of γIkD in (1); after some manipulations, we can obtain (18), and finish the proof here.

Appendix B. Proof of Proposition 2

Combining (9) and (13), we have

ρE=Pr1κE2θthQSγSbE<χθthQSγSbJ+k=1KQIkγIkJγJE+θthk=1KQIkγIkE+θth. (A6)

We observe from (A6) that if 1κE2θth0, then ρE=1, and if 1κE2θth>0, we can rewrite (A6) as

ρE=PrγSbE<ϑ0+k=1KϑkγIkE+μ0γSbJ+k=1KμkγIkJγJE, (A7)

where

ϑ0=θth1κE2θthQS,ϑk=θthQIk1κE2θthQS,μ0=χθth1κE2θth,μk=χθthQIk1κE2θthQS. (A8)

Setting Z=μ0γSbJ+k=1KμkγIkJγJE, from (A7), we have

ρE=0+0+FγSbEϑ0+k=1Kϑkxk+zfγI1Ex1fγIKExKfZzdx1dxKdz. (A9)

Substituting the CDF of γSbE and the PDF of γIkD provided by (1) into (A9), after some manipulations, which yields

ρE=1k=1KλIkEλIkE+λSEϑkexpλSEϑ0×0+expλSEzfZzdzI. (A10)

Now, our objective is to calculate the integral I in (A10). At first, we rewrite I under the following form:

I=0+expλSEzfZzdz=0+λSEexpλSEzFZzdz. (A11)

Next, we attempt to find the CDF of Z. Setting Y=μ0γSbJ+k=1KμkγIkJ, the CDF of Z can be formulated by

FZz=PrYγJE<z=0+FYzxλJEexpλJExdx. (A12)

Before calculating the CDF of Y, we note that Y is sum of the exponential RVs, i.e., μ0γSbJ and μkγIkJ. Indeed, because γSbJ and γIkJ are exponential RVs whose parameters are λSJ and λIkJ, respectively, hence μ0γSbJ and μkγIkJ are also exponential RVs, and their parameters are λSJ/μ0 and λIkJ/μk, respectively. Hence, the CDF of Y can be given as

FYy=1β0expΩSJyk=1KβkexpΩIkJy, (A13)

where

ΩSJ=λSJμ0,ΩIkJ=λIkJμk,β0=k=1KΩIkJΩIkJΩSJ,βk=ΩSJΩSJΩIkJt=1,tkKΩItJΩItJΩIkJ. (A14)

Substituting (A13) into (A12), we obtain

FZz=1β00+λJEexpλJExexpΩSJzxdyk=1Kβk0+λJEexpλJExexpΩIkJzxdy. (A15)

Using (Equation (3.324.1) of [45]) for the corresponding integrals in (A15), we arrive at

FZz=12β0λJEΩSJzK12λJEΩSJzk=1K2βkλJEΩIkJzK12λJEΩIkJz, (A16)

where K1. is modified Bessel function of the second kind [45]. Then, substituting (A16) into (A11), we obtain (A17) as

I=12β00+λSEexpλSEzλJEΩSJzK12λJEΩSJzdzk=1K2βk0+λSEexpλSEzλJEΩIkJzK12λJEΩIkJzdz. (A17)

Next, changing variable t=z, we can rewrite (A17) as

I=14λSEλJEΩSJβ00+t2expλSEt2K12λJEΩSJtdtk=1K4λSEΩIkJλJEβk0+t2expλSEt2K12λJEΩIkJtdt. (A18)

Applying (Equation (6.631.3) of [45]) for the corresponding integrals in (A18), we obtain

I=1β0expλJEΩSJ2λSEW1,1/2λJEΩSJλSEk=1KβkexpλJEΩIkJ2λSEW1,1/2λJEΩIkJλSE, (A19)

where W1,1/2. is the Whittaker function [45].

Moreover, from (Equation (46) of [46]), we have

expx2W1,1/2x=1xexpxE1x, (A20)

where E1. is exponential integral function [45].

Combining (A19) and (A20), after some manipulations, we obtain

I=λJEΩSJλSEβ0expλJEΩSJλSEE1λJEΩSJλSE+k=1KλJEΩIkJλSEβkexpλJEΩIkJλSEE1λJEΩIkJλSE. (A21)

It is worth noting that to attain (A21), we used the following equation:

β0+k=1Kβk=1. (A22)

Finally, substituting (A21) into (A10), we obtain (19), and finish the proof.

Author Contributions

The main contributions of P.T.T. (Phu Tran Tin) and P.T.T. (Phuong T. Tran) were to create the main ideas and execute performance evaluation by simulations, while the main contributions of T.T.D., T.N.N., M.V. and N.Q.S. are to discuss, create, and advise the main ideas and performance evaluations together.

Funding

This research received support from the grant SGS reg. No. SP2019/41 conducted at VSB Technical University of Ostrava, Czech Republic, and is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2017.317.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Wyner A.D. The Wire-tap Channel. Bell Syst. Tech. J. 1975;54:1355–1387. doi: 10.1002/j.1538-7305.1975.tb02040.x. [DOI] [Google Scholar]
  • 2.Csiszar I., Korner J. Broadcast Channels with Confidential Messages. IEEE Trans. Inf. Theory. 1978;2:339–348. doi: 10.1109/TIT.1978.1055892. [DOI] [Google Scholar]
  • 3.Liu R., Maric I., Spasojevic P., Yates R.D. Discrete Memoryless Interference and Broadcast Channels with Conffdential Messages: Secrecy Rate Regions. IEEE Trans. Inf. Theory. 2008;2:2493–2507. doi: 10.1109/TIT.2008.921879. [DOI] [Google Scholar]
  • 4.Gopala P.K., Lai L., Gamal H.E. On the Secrecy Capacity of Fading Channels. IEEE Trans. Inf. Theory. 2008;2:4687–4698. doi: 10.1109/TIT.2008.928990. [DOI] [Google Scholar]
  • 5.Zhang J., Duong T.Q., Woods R., Marshall A. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview. Entropy. 2017;19:420. doi: 10.3390/e19080420. [DOI] [Google Scholar]
  • 6.Sun L., Du Q. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy. 2018;2:730. doi: 10.3390/e20100730. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Tin P.T., Hung D.T., Tan N.N., Duy T.T., Voznak M. Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-hop Transmission With and Without Presence of Hardware Impairments. Entropy. 2019;21:217. doi: 10.3390/e21020217. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Tin P.T., Nam P.M., Duy T.T., Phuong T.T., Voznak M. Secrecy Performance of TAS/SC-based Multi-hop Harvest-to-Transmit Cognitive WSNs under Joint Constraint of Interference and Hardware Imperfection. Sensors. 2019;19:1160. doi: 10.3390/s19051160. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 9.Zhang T., Cai Y., Huang Y., Duong T.Q., Yang W. Secure Transmission in Cognitive MIMO Relaying Networks With Outdated Channel State Information. IEEE Access. 2016;4:8212–8224. doi: 10.1109/ACCESS.2016.2608966. [DOI] [Google Scholar]
  • 10.Huang Y., Wang J., Zhong C., Duong T.Q., Karagiannidis G.K. Secure Transmission in Cooperative Relaying Networks with Multiple Antennas. IEEE Trans. Wirel. Commun. 2016;2:6843–6856. doi: 10.1109/TWC.2016.2591940. [DOI] [Google Scholar]
  • 11.Yang M., Guo D., Huang Y., Duong T.Q., Zhang B. Secure Multiuser Scheduling in Downlink Dual-hop Regenerative Relay Networks over Nakagami-m Fading Channels. IEEE Trans. Wirel. Commun. 2016;2:8009–8024. doi: 10.1109/TWC.2016.2610965. [DOI] [Google Scholar]
  • 12.Zhao R., Lin H., He Y.-C., Chen D.-H., Huang Y., Yang L. Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems with Outdated CSI. IEEE Trans. Commun. 2018;2:546–559. doi: 10.1109/TCOMM.2017.2747554. [DOI] [Google Scholar]
  • 13.Mo J., Tao M., Liu L. Relay Placement for Physical Layer Security: A Secure Connection Perspective. IEEE Commun. Lett. 2012;2:878–881. [Google Scholar]
  • 14.Lee J.-H., Sohn I., Kim Y.-H. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks. Sensors. 2016;2:1726. doi: 10.3390/s16101726. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 15.Keshav S., Ku M.-L., Biswas S., Ratnarajah T. Energy-Efficient Subcarrier Pairing and Power Allocation for DF Relay Networks with an Eavesdropper. Energies. 2017;2:1953. [Google Scholar]
  • 16.Hieu T.D., Duy T.T., Kim B.-S. Performance Enhancement for Multi-hop Harvest-to-Transmit WSNs with Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises. IEEE Sens. J. 2018;2:5173–5186. doi: 10.1109/JSEN.2018.2829145. [DOI] [Google Scholar]
  • 17.Cao K., Cai K., Wu Y., Yang W. Cooperative Jamming for Secure Communication with Finite Alphabet Inputs. IEEE Commun. Lett. 2017;2:2025–2028. doi: 10.1109/LCOMM.2017.2716974. [DOI] [Google Scholar]
  • 18.Kang J.M., Yang J., Ha J., Kim I.M. Joint Design of Optimal Precoding and Cooperative Jamming for Multiuser Secure Broadcast Systems. IEEE Trans. Veh. Technol. 2017;2:10551–10556. doi: 10.1109/TVT.2017.2735414. [DOI] [Google Scholar]
  • 19.Ma H., Cheng J., Wang X., Ma P. Robust MISO Beamforming with Cooperative Jamming for Secure Transmission From Perspectives of QoS and Secrecy Rate. IEEE Trans. Commun. 2018;2:767–780. doi: 10.1109/TCOMM.2017.2765637. [DOI] [Google Scholar]
  • 20.Zhang G., Xu J., Wu Q., Cui M., Li X., Lin F. Wireless Powered Cooperative Jamming for Secure OFDM System. IEEE Trans. Veh. Technol. 2018;2:1331–1346. doi: 10.1109/TVT.2017.2756877. [DOI] [Google Scholar]
  • 21.Nasir A.A., Zhou X., Durrani S., Kennedy R.A. Relaying Protocols for Wireless Energy Harvesting and Information Processing. IEEE Trans. Wirel. Commun. 2013;2:3622–3636. doi: 10.1109/TWC.2013.062413.122042. [DOI] [Google Scholar]
  • 22.Atapattu S., Evans J. Optimal Energy Harvesting Protocols for Wireless Relay Networks. IEEE Trans. Wirel. Commun. 2016;2:5789–5803. doi: 10.1109/TWC.2016.2569097. [DOI] [Google Scholar]
  • 23.Wang L., Wong K.K., Jin S., Zheng G., Heath R.W. A New Look at Physical Layer Security, Caching, and Wireless Energy Harvesting for Heterogeneous Ultra-Dense Networks. IEEE Commun. Mag. 2018;2:49–55. doi: 10.1109/MCOM.2018.1700439. [DOI] [Google Scholar]
  • 24.Chang S., Li J., Fu X., Zhang L. Energy Harvesting for Physical Layer Security in Cooperative Networks Based on Compressed Sensing. Entropy. 2017;19:462. doi: 10.3390/e19090462. [DOI] [Google Scholar]
  • 25.Xu C., Zheng M., Liang W., Yu H., Liang Y.C. Outage Performance of Underlay Multihop Cognitive Relay Networks with Energy Harvesting. IEEE Commun. Lett. 2016;2:1148–1151. doi: 10.1109/LCOMM.2016.2547985. [DOI] [Google Scholar]
  • 26.Xu C., Zheng M., Liang W., Yu H., Liang Y.C. End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting. IEEE Trans. Wirel. Commun. 2017;2:3561–3572. doi: 10.1109/TWC.2017.2684125. [DOI] [Google Scholar]
  • 27.Zhu G., Zhong C., Suraweera H.A., Karagiannidis G.K., Zhang Z., Tsiftsis T.A. Wireless Information and Power Transfer in Relay Systems with Multiple Antennas and Interference. IEEE Trans. Commun. 2015;2:1400–1418. doi: 10.1109/TCOMM.2015.2398862. [DOI] [Google Scholar]
  • 28.Chen E., Xia M., Da Costa D., Aissa S. Multi-hop Cooperative Relaying with Energy Harvesting from Co-Channel Interferences. IEEE Commun. Lett. 2017;2:1199–1202. doi: 10.1109/LCOMM.2017.2655039. [DOI] [Google Scholar]
  • 29.Liu M., Liu Y. Power Allocation for Secure SWIPT Systems with Wireless-Powered Cooperative Jamming. IEEE Commun. Lett. 2017;2:1353–1356. doi: 10.1109/LCOMM.2017.2672660. [DOI] [Google Scholar]
  • 30.MacKay D. Fountain Codes. IEE Proc. Commun. 2005;2:1331–1346. doi: 10.1049/ip-com:20050237. [DOI] [Google Scholar]
  • 31.Castura J., Mao Y. Rateless Coding over Fading Channels. IEEE Commun. Lett. 2006;2:46–48. doi: 10.1109/LCOMM.2006.1576565. [DOI] [Google Scholar]
  • 32.Nguyen H.D.T., Tran L.N., Hong E.K. On Transmission Efficiency for Wireless Broadcast Using Network Coding and Fountain Codes. IEEE Commun. Lett. 2011;2:569–571. doi: 10.1109/LCOMM.2011.031611.101189. [DOI] [Google Scholar]
  • 33.Yue J., Lin Z., Vucetic B. Distributed Fountain Codes With Adaptive Unequal Error Protection in Wireless Relay Networks. IEEE Trans. Wirel. Commun. 2014;2:4220–4231. doi: 10.1109/TWC.2014.2314632. [DOI] [Google Scholar]
  • 34.Niu H., Iwai M., Sezaki K., Sun L., Du Q. Exploiting Fountain Codes for Secure Wireless Delivery. IEEE Commun. Lett. 2014;2:777–780. doi: 10.1109/LCOMM.2014.030914.140030. [DOI] [Google Scholar]
  • 35.Li W., Du Q., Sun L., Ren P., Wang Y. Security Enhanced via Dynamic Fountain Code Design for Wireless Delivery; Proceedings of the IEEE 2016 IEEE Wireless Communications and Networking Conference; Doha, Qatar. 3–6 April 2016; pp. 1–6. [Google Scholar]
  • 36.Sun L., Ren P., Du Q., Wang Y. Fountain-coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2016;2:291–300. doi: 10.1109/TII.2015.2509442. [DOI] [Google Scholar]
  • 37.Du Q., Xu Y., Li W., Song H. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes. Wirel. Commun. Mob. Comput. 2018;2018:8404219. doi: 10.1155/2018/8404219. [DOI] [Google Scholar]
  • 38.Hung D.T., Duy T.T., Trinh D.Q., Bao V.N.Q. Secrecy Performance Evaluation of TAS Protocol Exploiting Fountain Codes and Cooperative Jamming under Impact of Hardware Impairments; Proceedings of the 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom); Ho Chi Minh City, Vietnam. 29–31 January 2018; pp. 164–169. [Google Scholar]
  • 39.Hung D.T., Duy T.T., Trinh D.Q., Bao V.N.Q., Hanh T. Security-Reliability Analysis of Power Beacon-Assisted Multi-hop Relaying Networks Exploiting Fountain Codes with Hardware Imperfection; Proceedings of the International Conference on Advanced Technologies for Communications (ATC); Ho Chi Minh City, Vietnam. 18–20 October 2018; pp. 354–359. [Google Scholar]
  • 40.Mokhtar M., Gomaa A., Al-Dhahir N. OFDM AF Relaying under I/Q Imbalance: Performance Analysis and Baseband Compensation. IEEE Trans. Commun. 2013;2:1304–1313. doi: 10.1109/TCOMM.2013.020813.120576. [DOI] [Google Scholar]
  • 41.Björnson E., Matthaiou M., Debbah M. A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments. IEEE Trans. Commun. 2013;2:4512–4525. doi: 10.1109/TCOMM.2013.100913.130282. [DOI] [Google Scholar]
  • 42.Son P.N., Kong H.Y. Energy-Harvesting Decode-and-Forward Relaying under Hardware Impairments. Wirel. Pers. Commun. 2017;2:6381–6395. doi: 10.1007/s11277-017-4483-x. [DOI] [Google Scholar]
  • 43.Solanki S., Upadhyay P.K., da Costa D.B., Bithas P.S., Kanatas A.G., Dias U.S. Joint Impact of RF Hardware Impairments and Channel Estimation Errors in Spectrum Sharing Multiple-Relay Networks. IEEE Trans. Commun. 2018;2:3809–3824. doi: 10.1109/TCOMM.2018.2832623. [DOI] [Google Scholar]
  • 44.Zarei S., Gerstacker W.H., Aulin J., Schober R. Multi-Cell Massive MIMO Systems with Hardware Impairments: Uplink-Downlink Duality and Downlink Precoding. IEEE Trans. Wirel. Commun. 2017;2:5115–5130. doi: 10.1109/TWC.2017.2705709. [DOI] [Google Scholar]
  • 45.Gradshteyn I.S., Ryzhik I.M. Table of Integrals, Series, and Products. 7th ed. Elsevier Inc.; San Diego, CA, USA: 2007. [Google Scholar]
  • 46.Duy T.T., Alexandropoulos G.C., Vu T.T., Vo N.-S., Duong T.Q. Outage Performance of Cognitive Cooperative Networks with Relay Selection over Double-Rayleigh Fading Channels. IET Commun. 2016;2:57–64. doi: 10.1049/iet-com.2015.0236. [DOI] [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES