1. Introduction
Along with the emergence of numerous wireless devices and various wireless services, wireless security has become a critical design issue in the implementation and operation of wireless sensor networks [
1,
2,
3,
4]. Against this background, physical layer security (PLS) has been receiving great research attention [
5]. Compared to traditional key-based cryptographic techniques applied to upper layers which can be deciphered, PLS which exploits the channel characters to enhance security, can safeguard wireless data transmissions without requiring secret keys and complex algorithms [
6,
7,
8]. The main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes in the wireless sensor networks [
9]. In particular, beamforming and artificial noise (AN) are exploited to improve the security performance [
10,
11,
12,
13]. Most works assume that eavesdroppers work with a passive way in the wireless sensor networks. However, there are also active eavesdroppers who can eavesdrop information in a more "smart" way. An active eavesdropper, which can perform both eavesdropping and malicious jamming simultaneously, brings an intractable challenging security problem [
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24].
One of the active eavesdropping methods is pilot contamination in a wireless sensor network. The eavesdropper attacked the training phase to cause pilot contamination in wireless communication to improve its eavesdropping performance [
14,
15,
16]. Another active eavesdropping method is jamming. In the presence of an active eavesdropper, the authors in [
17,
18] calculated an optimal power allocation to improve the security performance of transmission. In [
19,
20], the properties of the game equilibrium were exploited to design a transmission strategy and a jamming strategy, where the eavesdropper took action first as the leader and the legitimate user acts as the follower in the wireless network. In [
21], a three-stage Stackelberg game approach was proposed to improve the security performance under the competitions among the transmitter, relays and active eavesdropper. Finding the Stackelberg equilibrium of the scheme, and the legitimate users can achieve cooperative communication to improve the secrecy capacity and to defend against full-duplex active eavesdropping attacks. A novel transmission outage constrained scheme for both reliability and security was proposed to evaluate the secrecy performance and to gain valuable design insights in [
22]. An optimal relay selection scheme was developed to improve the security performance with an active eavesdropper in cooperative wireless networks in [
23,
24].
These works mainly focused on adjusting the transmission strategies to obtain a better performance under the effect of self interference at the active eavesdropper and neglected the location of the eavesdropper in the wireless sensor networks. However, in practice, the location of the eavesdropper is unknown and this can change its location to cause severe interference for the transmission with small power. In this case, the above transmission strategies do not work well, which brings an intractable challenge for the transmission. Hence, the location of the active eavesdropper, as a vital parameter, has to be considered.
Under the assumption that the eavesdropper is passive, the authors in [
25,
26] revealed that the uncertainty on the location of the eavesdropper should be seriously taken into account for deploying a wireless sensor network system. A piecewise function was proposed to approximate the line-of-sight (LoS) probability for the air-to-ground links, which provides a better approximation than using the existing sigmoid-based fitting under randomly located unmanned aerial vehicle eavesdroppers [
27]. The secrecy outage analysis of the randomly located eavesdroppers, which act independently and collude to intercept the transmitted message, was studied in [
28]. The insecure region refers to a geographical area where certain security metrics such as average secrecy capacity and secrecy outage probability are not satisfied [
29,
30,
31,
32,
33,
34]. In [
29], both the legitimate receiver and transmitter generated AN to impair the eavesdropper’s channel, and the insecure region was defined by the average secrecy capacity to characterise the security performance when the eavesdropper’s channel was unknown. A concept of outage secrecy region to evaluate the secrecy performance from a geometrical perspective was proposed in [
30], where the legitimate receiver generated AN to impair the eavesdropper’s channel. However, the approximate secrecy capacity was not accurate to define the insecure region. Then, outage probability, as a more appropriate metric, was exploited to determine the insecure region [
31,
32,
33,
34]. Authors examined the impact of the unmanned aerial vehicle jamming power and its three-dimensional spatial deployment on the outage probability of the legitimate receiver and the intercept probability of the eavesdropper. The security region was defined by the intercept probability [
31]. In [
32], one relay node in the sensor networks can improve the security by decreasing the area in which the eavesdropper can reside and listen to the information transmitted to the destination. This region was called vulnerability region with its characterization. In [
33,
34], with the design of AN, high outage performance around the around the transmitter was achieved.
Inspired by the above works, we propose a practical way to defend against an active eavesdropper by establishing a protecting region to restrict the location of an active eavesdropper in a wireless sensor network. Since the eavesdropper is able to emit a jamming signal to interfere with the transmission, the traditional metrics are not appropriate in this case, and a new metric, namely hybrid outage probability, is exploited to evaluate the security performance. Specifically, we derive the expression of the hybrid outage probability which takes both the transmission outage probability and the secrecy outage probability into consideration both for active and passive eavesdropper. Based on it, the insecure region is defined to confront the eavesdropper. And the concept safe transmission range, as a valuable indicator, is proposed. In our system, the AN is generated from receiver. This method has the following advantages. (a) The CSI is not needed by Alice, so there is no feedback channel and thus the bandwidth resource is saved; (b) The AN can be generated by either multiple antennas or a single antenna, which is more practical than the existing AN methods which need multiple antennas at the transmitter; (c) It is particularly useful when the receiver has a stronger ability than the transmitter; (d) It is efficient if Eves are located around Bob [
29,
30,
35]. Our analysis can be used in various practical sensor networks to provide valuable basis for establishing the protecting region and achieve secure transmission.
2. System Model
We consider a multiple-input single-output (MISO) system in the presence of a full-duplex active eavesdropper (We assume that the distribution of location of eavesdropper is a homogeneous Poisson point process, and the eavesdropper works independently. In this case, an eavesdropper with changeable location can be popularized to multiple randomly located eavesdroppers.), as shown in
Figure 1. Alice with
uniform linear array (ULA) antennas aims to transmit a confidential signal to Bob. In order to enhance the secrecy performance, beamforming is utilized at Alice. Bob and randomly located Eve are both equipped with one receiving antenna and one transmitting antenna [
17,
18]. Bob simultaneously receives the signal from Alice and emits the AN signal omnidirectionally to confuse the potential eavesdropper, while Eve simultaneously eavesdrops the signal from Alice and transmits jamming signal to interfere with the transmission. Since the full duplex capability at Bob, we assume the cancellation is not perfect.
is the residual self interference after the self-interference cancellation. It is often assumed that the self-interference can be significantly suppressed [
36], so that
can be regarded as an independent Rayleigh distributed variable [
37]; and
is the linear residual self-interference coefficient. As for Eve, since the legitimate users cannot obtain the information of Eve, the worst case that Eve’s self-interference can be eliminated perfectly is considered for the robust design.
The main channel and the wiretap channel can be expressed as
vector
and
, respectively. Besides, the scalar
and
represent the channels from Bob to Eve and Eve to Bob, respectively. All channels are assumed to be the flat Rayleigh fading. We assume that the Eve’s CSI and location are unknown to both Alice and Bob and the full CSI of Bob is available for Alice. The received signals at Bob and Eve are respectively expressed as
and
where
represents the
beamforming vector at Alice, and the superscript
represents Hermitian conjugate. Under the assumption that perfect CSI of Bob is assumed to be known for Alice, the optimal beamforming is designed as
to enhance the receiving performance of Bob [
38]. The confidential signal from Alice, the AN from Bob, and the jamming signal from Eve are respectively denoted by scalar
,
, and
with unit power, i.e.,
. The total transmission power is denoted by
P, which includes the confidential signal power from Alice and the AN power from Bob; and
is the power allocation factor between the confidential signal from Alice and the AN signal from Bob. The jamming signal power from Eve is denoted by
.
and
are additive white Gaussian noises with powers
and
, respectively. As our system model is also compatible with the passive Eve, i.e., when
, Eve becomes passive. Then, the received signal at Bob is
3. Insecure Region Analysis
In this section, the correctness of the hybrid outage probability for active Eve is verified firstly. Subsequently, the expression of the hybrid outage probability is derived. Based on it, the insecure region and safe transmission range are defined to evaluate the security performance.
3.1. Hybrid Outage Probability
From (1) and (2), the signal-to-interference-noise ratio (SINR) at Bob and active Eve can be respectively calculated as (This paper aims to establish the insecure region to defend against the active eavesdropper and achieve a higher security performance. The self-interference is beyond our main focus. This is modeled as a variable depending on the ability of Bob, according to [
18,
22]. The value of self-interference is changed with
.)
and
where
denotes the Euclidean norm,
,
, and
represent the distances between Alice and Bob, Alice and Eve, Bob and Eve, respectively,
is a constant which depends on the propagation model and carrier frequency,
is the path-loss exponent. When Eve is passive, from (3), the SINR at Bob is
The secrecy capacity is expressed as [
29,
30]
where
is the main channel capacity between Alice and Bob.
is the wiretap channel capacity between Alice and Eve. Since the CSI of the wiretap channel is unavailable, the instantaneous secrecy capacity is unobtainable. Thus, the outage probability is a more suitable metric for our system.
If the secrecy transmission rate is assumed to be
, the entire event space of communication can be divided into three mutually exclusive events [
39]:
Transmission outage event occurs when . In this case, we find , which conflicts with the fact that . As such, is not supported by the main channel and Alice can not transmit a signal.
Secrecy outage event occurs when and . In this case, as some information on the confidential signal can be known by Eve, perfect secrecy cannot be achieved.
Secure transmission event occurs when . In this case, perfect secrecy can be guaranteed.
In the conventional scenario where Eve is passive, the main performance metric is secrecy outage probability. However, in our system, Eve can emit malicious interference to destroy the transmission, which causes the transmission outage event. In this case, the secrecy outage probability cannot evaluate the performance comprehensively. Hence, we adopt the hybrid outage probability as performance metric, as follows
where
represents the transmission outage probability and
represents the secrecy outage probability. Meanwhile, the hybrid outage probability is also applicable to passive Eve.
In order to obtain the expressions of the outage probabilities, we present the statistics of
and
. From the right hand side of (4), we find the numerator follows a chisquared distribution since
is a sum of the squares of
independent Gaussian random variables; and the denominator follows an exponential distribution. Meanwhile, as the numerator and denominator are independent, we apply
to obtain the cumulative distribution functions (CDF) of
as
where
and
We now derive the CDF of
. Due to the fact that the beamforming vector
at Alice is independent from eavesdropper’s channel
, the denominator follows exponentially distributed; and the numerator is also exponentially distributed. Similarly, the numerator and denominator are independent. With the help of (9), the CDF of
is
where
and
According to the definition of the transmission outage event with active Eve, we have
The hybrid outage probability in (8) can be re-expressed as
Then, from (11), the probability density function (PDF) of
can be derived as
By substituting (9) and (13) into (12), the hybrid outage probability in the presence of an active Eve is derived as
It is clear that the secrecy outage probability can be calculated through (15) and (12) with the help of (8).
From (6),
is a sum of the squares of
independent Gaussian random variables, the CDF of
is
The analysis of the outage probability expressions with passive Eve are similar. The transmission outage probability and the hybrid outage probability are derived, as follows
and
where
is the exponential integral function [
40].
3.2. Insecure Region and Safe Transmission Range
As mentioned above, the insecure region
is the set of the eavesdropper’s locations where the hybrid outage probability is larger than a given threshold denoted by
; this is expressed as
According to the definition of insecure region, we can establish the protecting region, where Eve is not allowed to enter to achieve secure transmission in a real communication scenario.
Eve emitting a jamming signal also brings the risk of being detected. We assume that if the jamming power from Eve increases to a certain threshold , it will be exposed. When Eve is located near Alice, it can intercept the confidential signal easily; when Eve is located near Bob, it can damage the legitimate transmission with small power. Hence, not only the region around Alice but also around Bob is insecure. When the jamming signal power from Eve equals , the boundary of the insecure region can be obtained.
In addition, for the worst case that Eve appears on the line between Alice and Bob, it can also obtain the power gain from Alice’s beamforming. The safe transmission range is defined by
, as shown in
Figure 2. This range is denoted by
, and helps delineating the circular protecting region around Alice and Bob.
4. Numerical Results
Simulation results are conducted to show the insecure region defined by the hybrid outage probability. Unless otherwise mentioned, the default simulation parameters are as listed in
Table 1. All channels experience Rayleigh fading, i.e,
. The boundary of the insecure region is obtained when the jamming signal power
. The outage probabilities are calculated over 1000 trials of Monte Carlo simulations.
Figure 3,
Figure 4,
Figure 5,
Figure 6 and
Figure 7 show the insecure regions with active Eve and passive Eve, respectively. The region represents the secure region where
, while the yellow region represents the insecure region where
. Compared with the passive Eve in
Figure 7, one can see that the active Eve increases the insecure region, and the region around Bob is also insecure. Since the jamming signal from Eve can interfere with Bob, which makes the insecure region also look approximately like a disc around Bob. On the other hand, the confidential signal is transmitted from Alice, Eve appears around Alice can eavesdrop the confidential signal, which makes the insecure region look approximately like a disc around Alice. As for the active Eve in
Figure 3 and
Figure 4, when a large number of antennas are applied in Alice, the size of insecure region will diminish. Because the multi-antenna gain makes Bob receive the confidential signal more easily. Although it also benefits to the eavesdropper to eavesdrop the confidential signal, the gain from beamforming increases the performance difference between the link of the legitimate receiver and that of the eavesdropper, and from
Figure 3 and
Figure 5, when
increases, the insecure region enlarges, since Eve can interfere with the transmission at a further location. It is noted that the insecure region enlarges when
increases from
Figure 3 and
Figure 6 since that the AN from Bob effects itself much more. When the insecure region is determined, the secure transmission can be achieved by protecting the insecure region, which is easy to conduct due to its regular circular shape.
In the following, we consider that Eve is located on the line between Alice and Bob, and the change trend between Alice and Bob is analyzed.
Figure 8 presents the hybrid outage probability
and the transmission outage probability
versus
with different
. For passive Eve,
decreases with the increase of
, due to the fact that the power of the received confidential signal decreases and the power of the received AN from Bob increases. On the other hand,
is a constant, which is easily verified from (17). For active Eve, when increasing
, the significant difference of
from passive Eve
is the change around Bob. The main reason is that
dramatically increases around Bob, since the jamming signal from Eve causes significant damage to Bob. When
decreases, one notices that the width of the peak around Bob decreases, which means that the insecure region around Bob diminishes, and the safe transmission range
increases. According to the safe transmission range, the circular protecting region around Alice and Bob can be conducted.
Figure 9 depicts the transmission outage probability
and the secrecy outage probability
versus
with different
. As
increases,
increases while
decreases; this is because increasing the power of the confidential signal is beneficial to the establishment of transmission between Alice and Bob, but also increases the risk of eavesdropping. Note that
represents the reliability of the transmission. Thus, a reasonable trade-off between transmission reliability and security should be considered. Meanwhile, the variation trend of
is the same for both active and passive Eve, which means that the active Eve mainly interferes with the establishment of the legitimate transmission link between Alice and Bob, and it can dramatically increase
by moving around Bob.
Figure 10 shows the influence of
,
, and
on the hybrid outage probability, respectively. It is clear that when
increases, the security performance decreases, since the communication condition is worse. When
decreases, the security performance increases, as more power can be used to transmit the AN signal. As
increases, the security performance decreases, since the self-interference at Bob causes more damage to the transmission. It is worth noting that numerical results are consistent with the simulation results.
Figure 11 shows the influence of
and
on
. The top and bottom surfaces represent the positions of the right and left endpoints of the safe transmission range, respectively, with distance
between them. The insecure region around Bob corresponding to the top surface mainly depends on
, while the insecure region around Alice corresponding to the bottom surface mainly depends on
. Furthermore, when
increases, Eve can interfere with Bob from a further location, which causes the decrease of
. The increase of
makes it easier to intercept, which causes the decrease of
as well. Obviously, all simulation results show that the active Eve can cause a higher outage probability, and is more harmful to the secure transmission.