Next Article in Journal
The Fisher–Rao Distance between Multivariate Normal Distributions: Special Cases, Bounds and Applications
Previous Article in Journal
Constraining LQG Graph with Light Surfaces: Properties of BH Thermodynamics for Mini-Super-Space, Semi-Classical Polymeric BH
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers

1
Department of Electronic and Information Engineering, Anhui University of Finance and Economics, Bengbu 233030, China
2
School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(4), 403; https://doi.org/10.3390/e22040403
Submission received: 3 March 2020 / Revised: 29 March 2020 / Accepted: 30 March 2020 / Published: 31 March 2020

Abstract

:
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency. First, we analyzed some critical performance metrics, including connection outage probability (COP), secrecy outage probability (SOP) and effective secrecy throughput (EST). Then, to maximize the EST, three optimization problems of rate adaption were discussed: (i) optimizing the code rate with a given secrecy redundancy rate by a parameterized closed-form solution; (ii) optimizing the secrecy redundancy rate with a given code rate by a fixed-point method; (iii) optimizing both code rate and secrecy redundancy rate by an iterative optimization algorithm. We also considered COP and SOP constraints among the problems while corresponding solutions were deduced. Finally, numerical and simulated results verified our conclusions that the approximated SOP matches well with Monte–Carlo simulation for a strict reliable constraint, and that the optimized transmitting rate enhances EST efficiently with multiple eavesdroppers and retransmissions. Moreover, the influence of the number of eavesdroppers on secrecy performance was analyzed. Briefly, secrecy performance inevitably deteriorates with increasing number of eavesdroppers due to raised information leakage.

1. Introduction

In modern wireless communication systems, physical layer security (PLS) is regarded as a critical aspect in providing confidential message transmission according to the characteristics of wireless channels. Differing from traditional encryption techniques, PLS can be proved and quantified without the risk of brute-force cracking. Shannon first proposed the notion of information-theoretic secrecy in his groundbreaking work [1]. The more practical framework, named ‘the wiretap channel’, was established by Wyner in terms of a binary symmetric channel (BSC) [2]. Another important contribution of Wyner was the designing of a secrecy coding scheme, in which the secrecy redundancy rate worked to confuse an eavesdropper. As extended versions, the wiretap channel has been considered in broadcast channels by Csiszar [3] and in Gaussian channels by Leung-Yan-Cheong [4].
On the basis of the above work, PLS has contributed to considerable progress, especially in performance optimization and signal processing. Secrecy capacity, which evaluates the effectiveness of secure transmission, has been defined as the maximum rate in each reliable and secure transmission [5]. This metric has been adopted in the security analysis and optimization of 5G mmWave small cell networks [6], co-operative non-orthogonal multiple access with proactive jamming [7], artificial noise (AN)-aided multi-input multi-output (MIMO) Rician channels [8] and so on. As the secrecy capacity may be less than target secrecy redundancy rate, the secrecy outage probability (SOP) has been applied to present a more comprehensive performance evaluation. For instance, [9] discussed a security region with AN based on SOP, and [10] minimized SOP in a D2D-enabled cellular network by access control. When a certain SOP constraint is required, secrecy throughput has widely been considered, especially in optimization problems where the transmission rate or power is adjusted for improved security [11,12]. On the other hand, signal processing-related methods have also been proposed, mainly including beamforming and precoding, AN, co-operative and relay and diversity technologies [13,14,15,16].
Recently, many excellent contributions have focused on the PLS of hybrid automatic repeat request (HARQ) methods capable of typical time diversity features. In HARQ with chase combining (HARQ-CC), the transmitter retransmits erroneous codewords (or their redundant versions) if the legitimate receiver fails to decode them. On the contrary, new transmissions are triggered when either the decoding is successful or the maximum transmission number is reached [17]. Due to the increased comprehensive requirements, Makki et al. [18] proposed a low-latency reliable HARQ protocol using finite blocklength codes. When a passive eavesdropper exists, it has been proven that retransmissions and combinations are capable of enhancing security, due to the diversity gain of the legitimate receiver [19]. In order to efficiently design secure HARQ, Tang et al. [20] discussed SOP, secrecy throughput and their asymptotic properties; Tomasin [21] proposed a multiple-encoding HARQ scheme with statistics channel state information (CSI); Mheich et al. and Treust et al. [22,23] optimized secrecy throughput using multi-level feedback and rate adaption. However, most of them did not consider the influence of secrecy outage on secrecy throughput, which generally led to overestimated performance [24]. Hence, in our previous work, we extended the effective secrecy throughput (EST) of a single transmission [25] into a HARQ-CC system with a passive eavesdropper, and optimized secrecy redundancy rate for improved security [26]. Nevertheless, another common scenario, which includes multiple eavesdroppers, rate adaption and limited latency, has not yet been analyzed.
Inspired by this problem, in this paper, we completed the optimization of both the code rate and secrecy redundancy rate to maximize EST in a general scenario with multiple eavesdroppers. At the same time, different latency requirements were also considered. The major contributions of our work include:
  • The closed-form expressions of COP, average transmission number and SOP in the HARQ-CC system with multiple eavesdroppers and different latencies are given. The corresponding approximations were also deduced, while EST was defined considering both reliable outage and secrecy outage.
  • With a given secrecy redundancy rate, the optimization problem of code rate to maximize the EST was discussed. This problem was solved with a parameterized closed-form solution, with and without the COP constraint.
  • When the code rate is given, the optimization problem of secrecy redundancy rate with EST criteria was also analyzed. We solved this problem by applying a fixed-point method, with and without the SOP constraint.
  • The joint optimization problem of the rate pair (i.e., code rate and secrecy redundancy rate), in order to maximize the EST, was discussed. To solve this problem, an iterative optimization algorithm was designed which involves the two methods mentioned above. COP and SOP constraints were also considered.
  • Numerical and simulated results confirm our expressions of critical secure performance metrics, as well as the proposed optimization methods, under different cases. We also found that secrecy performance inevitably deteriorates with an increasing number of eavesdroppers, due to more information leakage.
The rest of this paper is organized as follows: The overall system model and assumptions are described in Section 2. Section 3 expresses COP, average transmission number, SOP and its approximation, along with the definition of EST in a HARQ-CC system with multiple eavesdroppers. Section 4 proposes the optimization of code rate, secrecy redundancy rate and both of them, in order to maximize EST under different constraints and the numerical and simulated results are presented in Section 5. Section 6 concludes our work.
Notation: E [ · ] denotes the expectation operator. The function Γ a , x is the upper incomplete gamma function, Γ a is the gamma function, Γ r a , x = Γ a , x / Γ a and γ r a , x = 1 Γ r a , x are the regularized upper and lower incomplete gamma functions, respectively. N ( a , b ) denotes a Gaussian distribution with mean a and variance b, respectively. f X x and F X x denote the probability density function (PDF) and the cumulative distribution function (CDF) of a random variate X, respectively. The function W 0 x is the principal branch ( W 0 x > 1 ) of Lambert’s W-function, defined through the implicit equation x = W x e W x [27].

2. System Model of Secure HARQ-CC With Multi-Eavesdroppers

We considered a secure HARQ-CC transmission system with multiple eavesdroppers, as shown in Figure 1. The transmitter (Alice) sends a confidential message w with a secrecy redundancy message v to the legitimate receiver (Bob) over the main channel, while several passive eavesdroppers (Eve1, …, EveM) intercept the transmission through M wiretap channels. We assumed that the main and wiretap channels are independent Rayleigh block-fading channels. Retransmissions are triggered only by Bob, depending on his decoding failure. To avoid unexpected retransmissions, the maximum transmission number (K) guarantees limited latency. A major security advantage of this protocol is that the erroneous codewords received by eavesdroppers may not be retransmitted by Alice, unless Bob had the same erroneous ones. Hence, there was much more diversity gain obtained by Bob than Eve1, …, EveM.
Alice encodes the confidential message w and the secrecy redundancy message v into the codeword x ( k ) using the Wyner secrecy code [2], where k is the transmission number (1 ≤ kK). The code rate and secrecy redundancy rate are denoted by R B and R E , respectively. Thus, the secrecy rate is given by R s = R B R E . Assume that the transmission power is fixed at P, and E x ( k ) 2 = 1 . We denote the fading parameters of the main and wiretap channels by h B ( k ) and h E , 1 ( k ) , , h E , M ( k ) , respectively, which are independently and identically distributed (i.i.d.) complex Gaussian random variables with zero mean and unit variance. We denote the additive Gaussian white noise by z B ( k ) and z E , 1 ( k ) , , z E , M ( k ) , respectively. Their means are zero and their variances are, respectively, σ B 2 and σ E , 1 2 , , σ E , M 2 . In each slot, the received signals of Bob and Eve1, …, EveM after k transmissions are
y B ( k ) = P h B ( k ) x ( k ) + z B ( k ) y E , m ( k ) = P h E , m ( k ) x ( k ) + z E , m ( k ) , m = 1 , , M .
For simplicity, we define S B = P / σ B 2 and S E , m = P / σ E , m 2 , ( m = 1 , , M ) as the average received signal-to-noise ratio (SNR) through the main channel and the wiretap channels, respectively. After k transmissions, Bob and Eve1, …, EveM uses the maximal ratio combining (MRC) before decoding. Their combined SNR becomes:
γ B ( k ) = i = 1 k S B h B ( i ) 2 γ E , m ( k ) = i = 1 k S E , m h E , m ( i ) 2 , m = 1 , , M .

3. Security Performance Metrics

Based on the above secure HARQ-CC system model with multiple eavesdroppers, we analyzed some critical security performance metrics, including connection outage probability (COP), average transmission number, secrecy outage probability (SOP) and effective secrecy throughput (EST). Connection outage occurs when the legitimate receiver (Bob) cannot decode the transmitted codewords, and secrecy outage occurs when one or several of the eavesdroppers (Eve1, …, EveM) cannot be confused by secrecy redundancy after the k th transmission.
We first considered the COP after k transmissions, denoted by P e ( k ) . The COP is defined as the probability that a connection outage occurs; that is, the mutual information after the k th transmission, I B ( k ) , is less than the codeword rate R B ,
P e ( k ) = Pr { I B ( k ) < R B } = Pr { ln 1 + i = 1 k S B h B ( i ) 2 < R B } = Pr i = 1 k h B ( i ) 2 < e R B 1 S B .
We know that the fading parameters are independent zero-mean unit-variance complex Gaussian random variables. Hence, the sum of their modular square is distributed according to the chi-squared distribution. Denote the decoding threshold of the main channel by Θ B = e R B 1 / S B , then
P e ( k ) = F χ 2 2 Θ B , 2 k = γ r k , Θ B ,
where F χ 2 · is the cumulative distribution function (CDF) of a chi-squared random variable.
The average transmission number N ¯ is determined by the main channel, which is equal to the expectation of the actual transmission number, N,
N ¯ = E [ N ] = 1 + k = 1 K 1 P e ( k ) = 1 + k = 1 K 1 γ r k , Θ B .
The SOP of HARQ-CC, denoted by P s ( k ) , is defined as the probability that a message transmitted by Alice can be decoded successfully by Eve1 or … or EveM after k transmissions. As passive receivers, Eve1, …, EveM only receive messages when retransmissions are requested by Bob. When the number of transmissions in the main channel is N,
P s ( k ) = i = 1 k Pr N = i · Pr I E , 1 ( i ) > R E I E , 2 ( i ) > R E I E , M ( i ) > R E = i = 1 k Pr N = i · 1 Pr I E , 1 ( i ) < R E , I E , 2 ( i ) < R E , , I E , M ( i ) < R E ,
where I E , i is the mutual information of the wiretap channel, Pr N = i is the probability that the i th transmission occurs, and Pr N = i = P e ( i 1 ) P e ( i ) . Assume that M wiretap channels are i.i.d. Gaussian block fading channels, S E , m = S E , Pr I E , m ( i ) > R E = Pr I E ( i ) > R E , m = 1 , , M . Denote the decoding threshold of a wiretap channel by Θ E = e R E 1 / S E . Then we define
ϕ ( i ) = Pr I E , 1 ( i ) < R E , I E , 2 ( i ) < R E , , I E , M ( i ) < R E = Pr I E , 1 ( i ) < R E Pr I E , 2 ( i ) < R E Pr I E , M ( i ) < R E = Pr I E ( i ) < R E M = Pr log 2 1 + j = 1 i S E h E , m ( i ) 2 < R E M = γ r i , Θ E M .
Hence, the SOP after K transmissions becomes
P s ( K ) = i = 1 K Pr N = i · 1 ϕ ( i ) .
It is well-known that an extremely small COP is the fundamental reliablity requirement in modern systems. We assume that under different latency requirements (i.e., different maximum transmission numbers K), a small P e ( K ) has to be assured. Thus we have i = 1 K Pr N = i = 1 , then
P s ( K ) = i = 1 K Pr N = i i = 1 K Pr N = i · ϕ ( i ) = 1 E [ ϕ ( N ) ] .
As N is an integer, ϕ ( N ) is also M th power of the complementary CDF (CCDF) of a Poisson random variable. With a given R E , the PDF and CDF are both well-known as a log-concave function of N. According to [28], its CCDF is also log-concave. In other words, ln ϕ ( N ) is concave with respect to N. Under the above assumption that a low P e ( K ) is assured under different K, i = 1 K Pr N = i = 1 . According to Jenson’s inequality, we have
ln ϕ E [ N ] E ln ϕ ( N ) = i = 1 K Pr N = i · ln ϕ ( N ) = i = 1 K ln ϕ ( N ) Pr N = i = ln i = 1 K ϕ ( i ) Pr N = i ( a ) ln i = 1 K Pr N = i · ϕ ( i ) = ln E ϕ ( i ) = ln ( 1 P s ( K ) ) ,
where (a) is true, based on the general mean inequality, and 1 P s ( K ) and ϕ E [ N ] are both positive. Thus,
P s ( K ) 1 ϕ E [ N ] .
Substituting Equation (7) into Equation (11), we approximate the SOP of the K th transmission by its upper bound, as follows:
P s ( K ) 1 γ r K , Θ E M .
For simplicity, we define P e = P e ( K ) and P s = P s ( K ) , which means that the maximum transmission number of COP and SOP has been reached.
Most related works have not considered the influence of SOP in secrecy throughput, but this has been found to be inaccurate [24]. Hence, we define the effective secrecy throughput (EST) of a secure HARQ-CC system as [26]
η s = E [ R s ] E [ N ] = R B R E · 1 P e · 1 P s N ¯ ,
where R s = R B R E indicates the maximum rate of each reliable and secure transmission, N ¯ is the average transmission number, and the COP and SOP are denoted by P e and P s , respectively. Based on the renewal–reward theorem [29,30], η s in Equation (13) expresses the average reliable and secure transmission rate of each transmission. As this metric demonstrates the secrecy performance more comprehensively, we adapted the code rate and secrecy redundancy rate to enhance the performance with this criteria in the following section.

4. Rate Adaption in Secure HARQ-CC System

In this section, in order to improve the performance of secure transmission when multiple eavesdroppers exist and latency is limited, we optimized the code rate R B and secrecy redundancy rate R E to maximize the EST of HARQ-CC. Three cases were considered: When R E is given, R B is optimized by a parameterized closed-form solution, with and without a COP constraint. When R B is given, R E is optimized by a fix-point method, with and without an SOP constraint. Combining the above methods, we then solved the joint optimization of the rate pair ( R B , R E ) by an iterative algorithm with and without both COP and SOP constraints.

4.1. Optimization of Code Rate

In a secure HARQ-CC system, when the number of eavesdroppers is M, the maximum transmission number is K and the secrecy redundancy rate is given by R ˜ E , we first considered the problem of how to determine the code rate which maximizes the EST:
max R B η s s . t . 0 R ˜ E R B ,
where P e , P s and η s are obtained by Equations (4), (12) and (13), respectively. Now, we extended the parameterized closed-form solution [17] to solve this problem. Several HARQ schemes tell us the standard solution is to solve the equation d η s / d R B = 0 for the (globally) optimal rate point R ^ B . Furthermore, d 2 η s / d R B 2 | R ^ B < 0 is required to guarantee a global maximum.
The basic idea of this solution method is to use the substitution R B = ln 1 + S B Θ B for the rate in the numerator of the EST expression. S B only occurs in the numerator once; hence, instead of considering the rate R B , we focus on the threshold Θ B in the optimization.
The EST expression for secure HARQ-CC is first parameterized with respect to Θ B , according to
η s = R B R E N ¯ ˜ ( Θ B ) = ln 1 + S B Θ B R ˜ E N ¯ ˜ ( Θ B ) ,
where N ¯ ˜ ( Θ B ) = N ¯ ( Θ B ) / ( 1 P e ( Θ B ) ) ( 1 P s ( Θ B ) ) , and P s ( Θ B ) is also function of Θ B , as S E , R E , M and K are given. Then, we take the derivative with respect to Θ B ,
d η s d Θ B = 1 N ¯ ˜ ( Θ B ) 2 S B 1 + S B Θ B N ¯ ˜ ( Θ B ) N ¯ ˜ ( Θ B ) ln 1 + S B Θ ^ B R ˜ E .
Let d η s / d Θ B | Θ ^ B = 0 , where Θ ^ B is the optimal point, and divide both sides by Θ ^ B . Then, we have
1 + S B Θ ^ B S B Θ ^ B ln 1 + S B Θ ^ B R ˜ E = N ¯ ˜ ( Θ ^ B ) Θ ^ B N ¯ ˜ ( Θ ^ B ) ,
where the S B Θ ^ B -terms and Θ ^ B -terms are separated into different sides of Equation (17). We define
u = S B Θ ^ B ,
g ( u ) = ( 1 + u ) ln ( 1 + u ) R ˜ E / u ,
t ( Θ ^ B ) = N ¯ ˜ ( Θ ^ B ) / Θ ^ B N ¯ ˜ ( Θ ^ B ) .
Then, Equation (17) is given by g ( u ) = t . From Equation (19), this relationship becomes 1 + u = e t t 1 + u + R ˜ E . Let v = t 1 + u , which is rewritten to v e v = t e t R ˜ E , which is solved by v = W 0 t e t R ˜ E where W 0 ( x ) is the principal branch ( W 0 ( x ) > 1 ) of Lambert’s W-function. Thus, we have 1 + S B Θ ^ B = e t + W 0 t e t R ˜ E R E .
Then, we solve the problem in Equation (14) by
S B ( Θ ^ B ) = e t + W 0 t e t R ˜ E + R ˜ E 1 Θ ^ B ,
R ^ B ( Θ ^ B ) = t + W 0 t e t R ˜ E + R ˜ E ,
η s ( Θ ^ B ) = R B ( Θ ^ B ) R ˜ E N ¯ ˜ ( Θ ^ B ) ,
where t ( Θ ^ B ) = N ¯ ˜ ( Θ ^ B ) / Θ ^ B N ¯ ˜ ( Θ ^ B ) . We see that all equations are expressed only in terms of the parameter Θ ^ B . With the given S B , the optimal R ^ B ( Θ ^ B ) and η s ( Θ ^ B ) can therefore be obtained.
As g ( u ) , defined in Equation (19), can be expanded by ln ( 1 + u ) u u 2 / 2 + O ( u 3 ) , we give the low and high SNR asymptotes as follows:
Remark 1.
As S B 0 for finite M, the problem in Equation (14) is solved by
S B ( Θ ^ B ) = t 1 + ( t 1 ) 2 + 2 R ˜ E Θ ^ B ,
R ^ B ( Θ ^ B ) = ln t + ( t 1 ) 2 + 2 R ˜ E ,
η s ( Θ ^ B ) = ln t + ( t 1 ) 2 + 2 R ˜ E R ˜ E N ¯ ˜ ( Θ ^ B ) ,
where t ( Θ ^ B ) = N ¯ ˜ ( Θ ^ B ) / Θ ^ B N ¯ ˜ ( Θ ^ B ) .
Proof. 
When S B 0 , we have g ( u ) 1 + u / 2 R ˜ E / u . By g ( u ) = t , u = t 1 + ( t 1 ) 2 + 2 R ˜ E , our solutions then become Equations (24)–(26), as u = S B Θ ^ B , R B = ln ( 1 + u ) , and η s = ( R B R ˜ E ) / N ¯ ˜ . □
Remark 2.
As S B for finite M, the problem in Equation (14) is solved by
S B ( Θ ^ B ) = e t + R ˜ E Θ ^ B ,
R ^ B ( Θ ^ B ) = t ,
η s ( Θ ^ B ) = t R ˜ E N ¯ ˜ ( Θ ^ B ) ,
where t ( Θ ^ B ) = N ¯ ˜ ( Θ ^ B ) / Θ ^ B N ¯ ˜ ( Θ ^ B ) .
Proof. 
When S B , g ( u ) ln ( 1 + u ) . By g ( u ) = t , we have u = e t + R ˜ E 1 . Then, Equations (27)–(29) can be achieved. □
High reliability is the fundamental requirement in a modern wireless communication system. Hence, we continue to consider the problem in Equation (14) with the following COP constraint:
max R B η s s . t . P e P e 0 R ˜ E R B ,
where P e denotes the target COP. According to Equation (4), P e increases monotonically with increasing R B . Hence, we know the COP constraint requires R B R B , where
R B = ln 1 + S B 2 F χ 2 1 P e , 2 K ,
in which F χ 2 1 · is the inverse function of the CDF of the chi-squared distribution.
As the solution of Equation (14) requires d η s / d R B | R ^ B = 0 and d 2 η s / d R B 2 | R ^ B < 0 , (30) can be solved by:
R B = min R ^ B ( Θ ^ B ) , R B ,
where the optimal point R B is always the maximum point in the feasible set of R B .

4.2. Optimization of Secrecy Redundancy Rate

When the number of eavesdroppers is M, the maximum transmission number is K and code rate is given by R ˜ B , we consider the problem of how to determine the secrecy redundancy rate which maximizes the EST:
max R E η s s . t . 0 R E R ˜ B ,
where η s is obtained by Equation (13). With the given R ˜ B , the decoding threshold of main channel becomes Θ ˜ B = e R ˜ B 1 / S B . According to Equation (4),
P ˜ e = γ r K , Θ ˜ B .
Thus, the EST of HARQ-CC becomes
η s = 1 P ˜ e N ¯ · R ˜ B R E · 1 P s ,
where P ˜ e and N ¯ are both determined, and P s is given in Equation (6) and approximated in Equation (12).
Proposition 1.
η s is a log-concave function on 0 R E R ˜ B , with existing maximum value.
Proof. 
Take the natural logarithm of both sides of Equation (35),
ln η s = ln 1 P ˜ e ln N ¯ + ln R ˜ B R E + ln 1 P s ,
where the first two parts in the RHS of Equation (36) are determined. In the third part, ln R ˜ B R E is a composition function f = ln g R E on 0 R E R ˜ B , and g R E = R ˜ B R E . g R E is obviously concave. Based on the convexity-preserving properties, ln R ˜ B R E is still concave on 0 R E R ˜ B . Finally, as 1 P s is the M th power of the CDF of a chi-squared distribution, which is logarithmic concave, ln 1 P s is concave. Therefore, η s is logarithmic concave with maximum value [31]. □
Therefore, the log-concave optimization problem given in Equation (33) can be converted to the following concave one:
max R E ln η s s . t . 0 R E R B .
Based on the above analysis, we know that if the optimal point R ^ E satisfies d ln η s / d R E | R ^ E = 0 , then ln η s and η s both have their maximum value at this value. From Equation (35),
d η s d R E = d d R E ln 1 P ˜ e ln N ¯ + ln ( R ˜ B R E ) + ln 1 P s = 1 R ˜ B R E 1 1 P s · d P s d R E ,
where P s is approximated by Equation (12) and its first derivative is
d P s d R E M Θ E N ¯ 1 e R E Θ E γ r N ¯ , Θ E M 1 S E Γ ( N ¯ ) .
Substituting Equations (12) and (39) into Equation (38) and letting d η s / d R E = 0 , we have the following fixed-point equation of the approximated R ^ E :
R ^ E R ˜ B S E γ N ¯ , Θ ^ E ( R ^ E ) e Θ ^ E ( R ^ E ) M e R ^ E Θ ^ E ( R ^ E ) N ¯ 1 ,
where Θ ^ E ( R ^ E ) = e R ^ E 1 / S E . Some classical techniques, such as the fixed-point iterative method, are suitable for solving the above equation.
Remark 3.
As S E 0 , we obtain R ^ E = 0 .
Proof. 
Since γ ( s , x ) Γ ( s ) if x , when S E 0 , we have γ r N ¯ , Θ E 1 . Hence, from Equation (12), P s 0 and Equation (35) become
η s = 1 P ˜ e N ¯ · ( R ˜ B R E ) .
It is easy to find that the maximum value of η s , ( 1 P ˜ e ) · R ˜ B N ¯ , is obtained when R E = 0 . □
Remark 4.
As S E , R ^ E can be obtained by solving the fixed-point equation,
R ^ E = R ˜ B e R ^ E 1 M · e R ^ E · N ¯ .
Proof. 
If S E , Θ ^ E 0 . Applying γ ( s , x ) x s 1 s when x 0 , we have
lim Θ ^ E 0 γ N ¯ , Θ E Θ ^ E N ¯ = 1 N ¯ .
Substituting Equation (43) into Equation (40), Equation (42) can be obtained. □
When the SOP constraint is required (e.g., in some special application scenarios), the optimization problem of secrecy redundancy rate aiming to enhance the EST becomes:
max R E η s s . t . P s P s 0 R E R ˜ B ,
where P s denotes the target SOP. According to Equation (12), P s decreases monotonically with increasing R E . Hence, we know the SOP constraint requires R E R E , and
R E = ln 1 + S E 2 F χ 2 1 1 P s 1 M , 2 K ,
where F χ 2 1 · is the same inverse function of the CDF of the chi-squared distribution as in Equation (31).
Since EST in Equation (35) has been proven to be log-concave on R E and d ln η s / d R E | R ^ E = 0 , Equation (44) can be solved by
R E = max R ^ E , R E ,
where the optimal point R E is always the maximum point in the feasible set of R E .

4.3. Optimization of the Rate Pair ( R B , R E )

In this part, we discuss a more general problem, which optimizes both the code rate and secrecy redundancy rate—that is, the rate pair ( R B , R E )—with the EST criteria. When multiple eavesdroppers and limited retransmission number are still considered, this optimization problem is given by
max R B , R E η s s . t . 0 R E R B ,
where η s is obtained by Equation (13), P e and P s are given by Equations (4) and (12), respectively. As the expression of η s is extremely complicated and its concavity is difficult to prove, we proposed an iterative algorithm to determine the rate pair ( R B , R E ).
In brief, the optimization problem in Equation (47) can be tackled by iteratively adapting R B and R E separately until the EST gain denoted by δ is no greater than ϵ , where ϵ is a preassigned small positive real number (e.g., 10 3 ). Specifically, it is first assumed that δ = η s ( 1 ) η s ( 0 ) > ϵ , where η s ( 0 ) and η s ( 1 ) denote the optimal EST before and after each iteration, respectively. Here, we initialize them as η s ( 0 ) = 0 and δ = 1 . The optimal rates are initialized as R ^ B = 0 and R ^ E = 0 . Next, using R ˜ E = R ^ E , we solve the optimization of R B in Equation (14), while the optimal point R ^ B is obtained by Equations (21)–(23). Then, using R ˜ B = R ^ B , we solve the optimization of R E in Equation (33), while the optimal point R ^ E is obtained by Equation (40). After this iteration, we computed the maximum EST, η s ( R ^ B , R ^ E ) , by Equation (13) and set η s ( 1 ) = η s ( R ^ B , R ^ E ) to evaluate the EST gain by δ = η s ( 1 ) η s ( 0 ) . Simultaneously, η s ( 0 ) is updated by η s ( 1 ) for next iteration. The iterations continue if δ > ϵ ; otherwise, the optimal rate pair ( R ^ B , R ^ E ) is output. This algorithm giving the ϵ -suboptimal solution is summarized in Algorithm 1.
Algorithm 1 Iterative optimization of ( R B , R E ) for solving Equation (47).
Input: ϵ = 10 3 , R ^ B = 0 , R ^ E = 0 , η s ( 0 ) = 0 , δ = 1 ;
1:
while δ > ϵ do
2:
R ˜ E R ^ E ;
3:
 Compute R ^ B by Equations (21)–(23)
4:
R ˜ B R ^ B
5:
 Compute R ^ E by Equation (40)
6:
 Compute η s ( R ^ B , R ^ E ) by Equation (13)
7:
η s ( 1 ) η s ( R ^ B , R ^ E )
8:
δ η s ( 1 ) η s ( 0 )
9:
η s ( 0 ) η s ( 1 )
10:
end while
Output: ( R ^ B , R ^ E );
Then, we reconsider Equation (47) when COP and SOP constraints are both required. The optimization becomes:
max R B , R E η s s . t . P e P e P s P s 0 R E R B ,
where P e and P s denote the target COP and SOP, respectively. This problem can be solved by a modified version of Algorithm 1, in which R ^ B and R ^ E are replaced by R B and R E , computing Equations (32) and (46). In other words, the optimal rate pair should be selected among its feasible set.

5. Numerical Results

In this section, a wireless HARQ-CC system with Alice, Bob and multiple eavesdroppers, Eve1, , EveM, were considered, as shown in Figure 1. Under this system model, some typical results were demonstrated to evaluate the security performance. These related performance metrics include SOP, EST and optimal rate, with a given number of eavesdropper M and maximum transmission number K.

5.1. SOP Results

In Figure 2, we plot the SOP curves versus R E for different S E , which are determined by both the main and wiretap channels. The parameters were set as S B = 20 dB , R B = 5 , K = 4 , M = 2 and S E = 0 dB , 5 dB , 10 dB . Theoretical and approximated P s were obtained by Equations (6) and (12), respectively. First, we found that the simulation curves precisely match those of theoretical P s , while their differences from the approximated P s were limited. Then, SOP monotonically decreases with increasing R E , which means that security will be enhanced by more secrecy redundancy. Furthermore, it should be pointed out that, in order to maintain the same SOP value, a larger R E is required when S E increases. In other words, although the wiretap channel is better, we need more secrecy redundancy to ensure the same level of security.
Figure 3 shows the SOP versus M for different S E . For all curves, S B = 20 dB , R B = 5 , R E = 3 , K = 4 and S E = 0 dB , 5 dB , 10 dB . Theoretical and approximated P s are also obtained by Equations (6) and (12); their differences are also limited, considering the use of logarithmic co-ordinate. SOP slowly rises with increasing M, which means that secrecy performance worsens when more eavesdroppers exist. On the other hand, when S E increases, SOP with fixed M increases sharply. This means the condition of wiretap channel has more influence on the security.

5.2. Optimization Results of Code Rate

Figure 4 shows the EST curves versus R B for different S E where the maximum ESTs are marked with and without the COP constraint. Parameters are set as S B = 20 dB , R ˜ E = 1.5 , M = 2 , K = 4 and S E = 0 dB , 5 dB , 10 dB . Target COP is P e = 10 4 when it is considered. Theoretical and approximated η s curves are generated according to P s and the approximated P s , respectively. It can be observed that the difference between the theoretical and approximated η s is limited, especially the maximum value. EST curves increase monotonically to the maximum point with increasing R B , and then decrease monotonically. Hence, their slopes are positive when R B is less than its optimal value R ^ B , and negative when R B > R ^ B . The maximum η s ( R ^ B ) , using the parameterized close-form solution in Equations (21)–(23), are plotted in Figure 4. These results well match the maximum η s and maximum approximated η s without COP constraint. Considering the COP constraint P e < P e , we state the feasible set R B R B . The corresponding maximum EST values, η s ( R B ) , are also plotted, in which R B equals the minimum of R ^ B and R B .
In Figure 5, we plot the EST versus R B for different M. For all curves, S B = 20 dB , S E = 0 dB , R ˜ E = 1.5 and K = 4 . The target COP is still P e = 10 4 . Theoretical and approximated η s also match well. η s ( R ^ B ) and η s ( R B ) illustrate maximum ESTs without and with the COP constraint, respectively; the differences between their maximum and optimized values are all limited. Then, it is critical to point out that, all these η s decrease obviously with increasing M. Similarly to SOP, more eavesdroppers worsen secrecy performance, including the EST.

5.3. Optimization Results of Secrecy Redundancy Rate

In Figure 6, we plot the EST curves versus R E , as well as maximum ESTs corresponding to calculated optimal R E with and without the SOP constraint. The channel conditions are S B = 20 dB , S E = 0 dB , 5 dB and 10 dB . The SOP constraint is P s 10 1 , when considered. The other parameters are set as R ˜ B = 3 , K = 4 and M = 2 . Compared with the theoretical η s , we verified that our approximated η s is relatively accurate. The maximum ESTs without SOP constraint (i.e., η s ( R ^ E ) ), are obtained by the fixed-point method in Equation (40). They precisely match the maximum value of the approximated η s curves. When P s is involved, we also state the feasible set, R E R E . The solutions η s ( R E ) computed by Equation (46) are plotted. It is worth noting that, η s ( R E ) = η s ( R ^ E ) = η s ( R E ) for S E = 0 dB , η s ( R E ) = η s ( R ^ E ) for S E = 5 dB , and no feasible solution arrives for S E = 10 dB , under the given P s .
Figure 7 shows the EST versus R E for different number of eavesdroppers with and without the SOP constraint, and corresponding optimized ESTs. The channel conditions and maximum transmission number are same as the parameters in Figure 6. The SOP constraint is P s = 10 1 . The three groups of EST curves are obtained with M = 1 , 2 , 4 , respectively. With an increasing M, we found that the optimal R E rises and maximum EST reduces, which indicates that in order to meet the SOP requirement, we need an increased secrecy redundancy when more eavesdroppers exist; thus EST decreases.

5.4. Optimization Results of the Rate Pair ( R B , R E )

Figure 8 depicts the EST versus R B and R E for multiple eavesdroppers, without COP and SOP constraint. For simplicity, only the approximated EST is plotted here, while its accuracy was verified by Figure 4, Figure 5, Figure 6 and Figure 7. The maximum EST is also marked, which was obtained by Algorithm 1. We observed that the optimization is solved precisely, which confirms the effectiveness of Algorithm 1. In our simulation, we also found that the iteration number is small (only about four iterations were needed).
Finally, we give the surface of the EST versus R B and R E with COP and SOP constraints in Figure 9. The same parameters as Figure 8 are configured here, except for P e = 10 4 and P s = 10 1 . The optimal EST is located at the maximum value of the approximated EST, which proves that our solution for Equation (48) works well. COP and SOP constraints, in fact, define a 2-dimensional feasible space for rate adaption.

6. Conclusions

In this paper, we discussed the rate adaption of secure transmissions in HARQ-CC system, with multiple eavesdroppers and limited latency. We first presented some critical secrecy performance metrics, including COP, SOP and EST. Then, three optimization problems were derived using a parameterized closed-form solution, a fixed-point method and an iterative algorithm, respectively. Finally, numerical and simulated results demonstrated that our proposed methods improved secrecy performance efficiently by optimizing code rate, secrecy redundancy rate and both of them paired. We also concluded that more eavesdroppers worsen the secrecy performance, but channel condition plays a more significant role.

Author Contributions

Funding acquisition, Y.W. and S.Y.; investigation, J.Z. and P.Y.; methodology, Y.W.; software, J.Z.; supervision, H.Y.; writing—original draft, Y.W.; writing—review and editing, S.Y., P.Y. and H.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by National Natural Science Foundation of China (Grant No. 61673049) and Natural Science Foundation of the Higher Education Institutions of Anhui Province (Grant No. KJ2018A0441).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  2. Wynner, A.D. The wire-tap channel. Bell. Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  3. Csiszar, I.; Korner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef] [Green Version]
  4. Leung-Yan-Cheong, S.; Hellman, M. The gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  5. Barros, J.; Rodrigues, M.R.D. Secrecy Capacity of Wireless Channels. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seattle, WA, USA, 9–14 July 2006; pp. 356–360. [Google Scholar]
  6. Xiao, K.; Li, W.; Kadoch, M.; Li, C. On the secrecy capacity of 5G mmWave small cell networks. IEEE Wirel. Commun. 2018, 25, 47–51. [Google Scholar] [CrossRef]
  7. Yuan, C.; Tao, X.; Li, N.; Ni, W.; Liu, R.; Zhang, P. Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming. IEEE Trans. Veh. Technol. 2019, 68, 2682–2696. [Google Scholar] [CrossRef]
  8. Ahmed, M.; Bai, L. Secrecy capacity of artificial noise aided secure communication in MIMO Rician channels. IEEE Access 2018, 6, 7921–7929. [Google Scholar] [CrossRef]
  9. Mao, L.; Li, Y.; Li, T.; Gao, M.; Zhang, H. Security Region Analysis with Artificial Noise Based on Secrecy Outage Probability. In Proceedings of the IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018; pp. 336–340. [Google Scholar]
  10. Chen, Y.; Ji, X.; Huang, K.; Li, B.; Kang, X. Minimizing secrecy outage probability in D2D enabled cellular networks: Access control with power optimization. Trans. Emerg. Telecommun. Technol. 2018, 29, e3231. [Google Scholar] [CrossRef]
  11. Zheng, T.; Wang, H.; Liu, F.; Moon, H.F. Outage constrained secrecy throughput maximization for DF relay networks. IEEE Trans. Commun. 2015, 63, 1741–1755. [Google Scholar] [CrossRef]
  12. Monteiro, M.E.P.; Rebelatto, J.L.; Souza, R.D.; Brante, G. Maximum secrecy throughput of transmit antenna selection with eavesdropper outage constraints. IEEE Trans. Commun. 2015, 63, 1741–1755. [Google Scholar] [CrossRef]
  13. Zhou, F.; Li, Z.; Cheng, J.; Li, Q.; Si, J. Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT. IEEE Trans. Wirel. Commun. 2017, 16, 2450–2464. [Google Scholar] [CrossRef] [Green Version]
  14. Liu, S.; Hong, Y.; Vierbo, E. Guaranteeing Positive Secrecy Capacity for MIMOME Wiretap Channels With Finite-Rate Feedback Using Artificial Noise. IEEE Trans. Wirel. Commun. 2015, 14, 4193–4203. [Google Scholar] [CrossRef]
  15. Wang, S.; Xu, X.; Huang, K.; Ji, X.; Chen, Y.; Jin, L. Artificial noise aided hybrid analog-digital beamforming for secure transmission in MIMO millimeter wave relay systems. IEEE Access 2019, 7, 28597–28606. [Google Scholar] [CrossRef]
  16. Zou, Y.; Zhu, J.; Wang, X. Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw. 2015, 29, 42–48. [Google Scholar] [CrossRef] [Green Version]
  17. Larsson, P.; Rasmussen, L.K.; Skoglund, M. Throughput analysis of ARQ schemes in Gaussian block fading channels. IEEE Trans. Commun. 2014, 62, 2569–2588. [Google Scholar] [CrossRef]
  18. Makki, B.; Svensson, T.; Caire, G.; Zorzi, M. Fast HARQ over finite blocklength codes: A technique for low-latency reliable communication. IEEE Trans. Wirel. Commun. 2019, 18, 194–209. [Google Scholar] [CrossRef] [Green Version]
  19. Wu, Y.; Olawoyin, A.L.; Zhang, N.; Yang, H. The analysis of secure HARQ with chase combining over block fading channel. China Commun. 2016, 13, 82–88. [Google Scholar] [CrossRef]
  20. Tang, X.; Liu, R.; Spasojevic, P. On the throughput of secure hybrid-arq protocols for gaussian block-fading channels. IEEE Trans. Inf. Theory 2009, 55, 1575–1591. [Google Scholar] [CrossRef] [Green Version]
  21. Tomasin, S. Secure HARQ with multiple encoding over block fading channels: channel set characterization and outage analysis. IEEE Trans. Inf. Forensic Secur. 2014, 9, 1708–1719. [Google Scholar] [CrossRef]
  22. Mheich, Z.; Treust, M.L.; Alberge, F.; Duhamel, P.; Szczecinski, L. Rate-adaptive secure HARQ protocol for block-fading channels. In Proceedings of the 22nd European Sinal Processing Conference (EUSIPCO), Lisbon, Portugal, 1–5 September 2014; pp. 830–834. [Google Scholar]
  23. Treust, M.L.; Szczecinski, L.; Labeau, F. Rate Adaptation for Secure HARQ Protocols. IEEE Trans. Inf. Forensic Secur. 2018, 13, 2981–2994. [Google Scholar] [CrossRef] [Green Version]
  24. Guan, X.; Cai, Y.; Yang, W. On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ. IEEE Commun. Lett. 2014, 18, 479–482. [Google Scholar] [CrossRef]
  25. Yan, S.; Yang, N.; Geraci, G. Optimization of Code Rates in SISOME Wiretap Channels. IEEE Trans. Wirel. Commun. 2015, 14, 6377–6388. [Google Scholar] [CrossRef] [Green Version]
  26. Wu, Y.; Yin, S.; Zhou, J.; Yang, P.; Yang, H. Quasi-Concave Optimization of Secrecy Redundancy Rate in HARQ-CC System. Sci. China Inf. Sci. 2020, 63, 122303. [Google Scholar] [CrossRef] [Green Version]
  27. Corless, R.; Gonnet, G.; Hare, D.; Jeffrey, D.; Knuth, D. On the Lambert W function. Adv. Comput. Math. 1996, 5, 329–359. [Google Scholar] [CrossRef]
  28. Bagnoli, M.; Bergstrom, T. Log-concave probability and its applications. Adv. Comput. Math. 1996, 5, 329–359. [Google Scholar]
  29. Zorzi, R.; Rao, R. On the use of renewal theory in the analysis of ARQ protocols. IEEE Trans. Commun. 2005, 26, 445–469. [Google Scholar] [CrossRef]
  30. Caire, G.; Tuninetti, D. The Throughput of Hybrid-ARQ Protocols for the Gaussian Collision Channel. IEEE Trans. Inf. Theory 2001, 47, 1971–1988. [Google Scholar] [CrossRef]
  31. Steven, B.; Lieven, V. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004; pp. 104–108. [Google Scholar]
Figure 1. Secure hybrid automatic repeat request (HARQ) with chase combining (HARQ-CC) system model with multiple eavesdroppers.
Figure 1. Secure hybrid automatic repeat request (HARQ) with chase combining (HARQ-CC) system model with multiple eavesdroppers.
Entropy 22 00403 g001
Figure 2. Secrecy outage probability (SOP) versus R E for different average received signal-to-noise ratio (SNR) of wiretap channel with multiple eavesdroppers; S E 0 dB , 5 dB , 10 dB , S B = 20 dB , R B = 5 , K = 4 and M = 2 .
Figure 2. Secrecy outage probability (SOP) versus R E for different average received signal-to-noise ratio (SNR) of wiretap channel with multiple eavesdroppers; S E 0 dB , 5 dB , 10 dB , S B = 20 dB , R B = 5 , K = 4 and M = 2 .
Entropy 22 00403 g002
Figure 3. SOP versus M for different average received SNR of wiretap channel with multiple eavesdroppers; S E 0 dB , 5 dB , 10 dB , S B = 20 dB , R B = 5 , R E = 3 and K = 4 .
Figure 3. SOP versus M for different average received SNR of wiretap channel with multiple eavesdroppers; S E 0 dB , 5 dB , 10 dB , S B = 20 dB , R B = 5 , R E = 3 and K = 4 .
Entropy 22 00403 g003
Figure 4. Effective secrecy throughput (EST) versus R B for different average received SNR of wiretap channel and multiple eavesdroppers, with and without the COP constraint; S E 0 dB , 5 dB , 10 dB , P e = 10 4 , S B = 20 dB , R ˜ E = 1.5 , M = 2 and K = 4 .
Figure 4. Effective secrecy throughput (EST) versus R B for different average received SNR of wiretap channel and multiple eavesdroppers, with and without the COP constraint; S E 0 dB , 5 dB , 10 dB , P e = 10 4 , S B = 20 dB , R ˜ E = 1.5 , M = 2 and K = 4 .
Entropy 22 00403 g004
Figure 5. EST versus R B for different number of eavesdroppers, with and without the COP constraint; M 1 , 2 , 4 , S B = 20 dB , S E = 0 dB , P e = 10 4 , R ˜ E = 1.5 and K = 4 .
Figure 5. EST versus R B for different number of eavesdroppers, with and without the COP constraint; M 1 , 2 , 4 , S B = 20 dB , S E = 0 dB , P e = 10 4 , R ˜ E = 1.5 and K = 4 .
Entropy 22 00403 g005
Figure 6. EST versus R E for different average received SNR of wiretap channel and multiple eavesdroppers, with and without the SOP constraint; S E 0 dB , 5 dB , 10 dB , P s = 10 1 , S B = 20 dB , R ˜ B = 3 , K = 4 and M = 2 .
Figure 6. EST versus R E for different average received SNR of wiretap channel and multiple eavesdroppers, with and without the SOP constraint; S E 0 dB , 5 dB , 10 dB , P s = 10 1 , S B = 20 dB , R ˜ B = 3 , K = 4 and M = 2 .
Entropy 22 00403 g006
Figure 7. EST versus R E for different number of eavesdroppers, with and without the SOP constraint; M 1 , 2 , 4 , S B = 20 dB , S E = 0 dB , P s = 10 1 , R ˜ B = 3 and K = 4 .
Figure 7. EST versus R E for different number of eavesdroppers, with and without the SOP constraint; M 1 , 2 , 4 , S B = 20 dB , S E = 0 dB , P s = 10 1 , R ˜ B = 3 and K = 4 .
Entropy 22 00403 g007
Figure 8. EST versus ( R B , R E ) for multiple eavesdroppers, without COP and SOP constraint; S B = 20 dB , S E = 0 dB , M = 2 , and K = 4 .
Figure 8. EST versus ( R B , R E ) for multiple eavesdroppers, without COP and SOP constraint; S B = 20 dB , S E = 0 dB , M = 2 , and K = 4 .
Entropy 22 00403 g008
Figure 9. EST versus ( R B , R E ) for multiple eavesdroppers, with COP and SOP constraints; S B = 20 dB , S E = 0 dB , P e = 10 4 , P s = 10 1 , M = 2 , and K = 4 .
Figure 9. EST versus ( R B , R E ) for multiple eavesdroppers, with COP and SOP constraints; S B = 20 dB , S E = 0 dB , P e = 10 4 , P s = 10 1 , M = 2 , and K = 4 .
Entropy 22 00403 g009

Share and Cite

MDPI and ACS Style

Wu, Y.; Yin, S.; Zhou, J.; Yang, P.; Yang, H. Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers. Entropy 2020, 22, 403. https://doi.org/10.3390/e22040403

AMA Style

Wu Y, Yin S, Zhou J, Yang P, Yang H. Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers. Entropy. 2020; 22(4):403. https://doi.org/10.3390/e22040403

Chicago/Turabian Style

Wu, Yue, Shishu Yin, Jian Zhou, Pei Yang, and Hongwen Yang. 2020. "Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers" Entropy 22, no. 4: 403. https://doi.org/10.3390/e22040403

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop