Next Article in Journal
A Novel Method to Measure the Static Coefficient of Friction for Socks
Next Article in Special Issue
A Joint Automatic Modulation Classification Scheme in Spatial Cognitive Communication
Previous Article in Journal
Low-Complexity Multiple Transform Selection Combining Multi-Type Tree Partition Algorithm for Versatile Video Coding
Previous Article in Special Issue
Secrecy Capacity Maximization of UAV-Enabled Relaying Systems with 3D Trajectory Design and Resource Allocation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Covert Performance for Integrated Satellite Multiple Terrestrial Relay Networks with Partial Relay Selection

School of Space Information, Space Engineering University, Beijing 101416, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(15), 5524; https://doi.org/10.3390/s22155524
Submission received: 15 June 2022 / Revised: 8 July 2022 / Accepted: 19 July 2022 / Published: 25 July 2022
(This article belongs to the Special Issue Integration of Satellite-Aerial-Terrestrial Networks)

Abstract

:
Integrated satellite multiple terrestrial relay network (ISMTRN) is a new network architecture that combines satellite communication with terrestrial communication. It both utilizes the advantages of the two systems and overcomes their shortcomings. However, security issues inevitably arise in the ISMTRN resulting from the broad coverage of the satellite beams and the openness of wireless communication. One of the promising methods to achieve secure transmission is covert communication technology, which has been a hot discussion topic in recent years. In this paper, we investigate the performance of covert communication in the ISMTRN with partial relay selection. Particularly, when the satellite transmits its signal to the user, we consider the scenario that the selected relay opportunistically sends covert information to the destination. Furthermore, the closed-form error detection probability and average covert communication rate are derived. Finally, numerical simulation results are provided to reveal the impact of critical parameters on system covert performance.

1. Introduction

Satellite communication (SatCom) is increasingly seen as an indispensable part of the next-generation wireless communications networks, which can provide a higher rate, broader coverage, lower energy consumption, more robust performance, and higher spectrum utilization [1,2]. Moreover, to make up for its shortcomings and further enhance the quality of service (QoS), SatCom is commonly combined with terrestrial communication. However, security issues arise due to the broad coverage of the satellite beams and the openness of wireless communication. In this paper, we adopt covert communication technology to solve them.

1.1. Related Work

As a potential future communication network architecture, the integrated satellite multiple terrestrial relay network (ISMTRN) absorbs and combines the advantages of SatCom and terrestrial communication, which guarantees the communication demands of the users and diversifies the communication ways [3,4,5]. It is becoming the research hotspot and has important practical significance for future communication development. In [6], the paper studied the performance of non-orthogonal multiple access (NOMA)-based overlay cognitive ISMTRN with secondary network selection. A hybrid satellite-terrestrial relay network (HSTRN) consisting of a satellite and multiple terrestrial nodes was considered in [7]. Moreover, the authors of [8] investigated the secure transmission in an HSTRN. In [9], the authors studied the impacts of joint relay selection and user scheduling schemes on the physical layer security for the HSTRN. The performance of an ISMTRN with the threshold-based decode-and-forward (DF) protocol was investigated in [10]. The authors of [11] established the multi-relay hybrid satellite-terrestrial systems (HSTSs) with artificial noise (AN) to investigate their reliability and security.
However, due to the broad area of satellite beams and the openness of wireless communication, communication security risks are inevitable, such as information eavesdropping, information tampering, malicious interruption interference, source location listening, and others. Traditionally, secure communication is usually achieved by high-level encryption and decryption technology. The authors of [12] used the features of quantum walk to construct a new substitution box method which played a significant role in block cipher techniques for 5G-IoT technologies. In [13], a forward secure public-key searchable encryption scheme was proposed. Besides, physical layer security (PLS) technology offers another promising direction for the security of communication networks by exploiting the inherent randomness of the physical layer wireless fading channel [1,2,9], and some other new security techniques are also widely adopted. In [14], the authors presented a method to obtain visible light communication PLS. An adaptive physical-layer key generation scheme was proposed in Smart Homes in [15]. The authors of [16] considered designs that mask the user’s identity during communication, resulting in anonymous communications, and in particular, examined the recent interest in physical layer anonymous solutions. Moreover, in [17], the authors provided a tutorial overview of the promising intelligent reflection communication (IRC) technologies and articulated multiple ways of enhancing the security of Internet-of-Everything (IoE) by the IRC. The authors of [18] discussed the challenges and opportunities of information security for next-generation integrated sensing and communication (ISAC) networks. The authors introduced the concept of physical layer anonymity and revealed some related conclusions in [19].
Nevertheless, none of those security techniques mentioned above can completely solve the security problems because eavesdroppers can obtain critical encrypted information by analyzing the eavesdropped traffic data. Thus, to further the safety of the ISMTRN, we utilize covert communication in this paper. The “prisoner model” proposed by Simmons in 1983 is a classic model in the field of covert communication. It assumed that in prison, two prisoners need to communicate. However, due to a malicious eavesdropper, Willie (passive or active listening), they could not communicate directly and needed to hide the information by some means. Hence, they exploited the randomness of the wireless communication channel and the uncertainty of noise to achieve covert information transmission to prevent the communication signal from being detected by Willie [20]. Namely, if the malicious eavesdropper cannot confirm the existence of the signal, it is difficult for it to carry out further illegal acts. Due to the unique advantages of covert communication, it has been applied in many real-life scenarios, such as covert military communications and the interconnection as well as intercommunication of the Internet of Things (IoT) [21] or UAV networks [22]. The authors of [23,24,25] investigated the information-theoretic limits of covert communication. In [26,27], a positive covert rate was realized. Moreover, interference and channel uncertainty of covert communication were discussed in [28]. Besides, in [29], the authors investigated the performance of covert communication in terrestrial relay networks. Moreover, the authors of [30] studied the covert performance under a scenario consisting of a source-destination pair, a passive warden, and multiple relays.

1.2. Motivation and Contributions

Recently, a wide range of research studies has been carried out to investigate covert communication in relay networks. In many of these works, covert communication is achieved with the help of channel uncertainty or jammer assistance. However, they are commonly based on separate terrestrial networks. Moreover, for multi-relay networks, relay selection is considered an effective technique to achieve spatial diversity gain, which is hardly involved in the related work. As far as we know, the performance analysis of covert communication in ISMTRN combined with relay selection has not been reported, which is innovative enough to investigate.
The above observations motivate us to investigate the covert performance of the ISMTRN with relay selection. Specifically, the key novelty and main contributions of this paper are summarized below:
  • We first pioneer the study of covert communication in the ISMTRN with the partial relay selection scheme, where the selected relay opportunistically transmits covert information;
  • Furthermore, considering the actual signal transmission situation, the statistical characteristics of the channels are given;
  • On this basis, the closed-form expression of error detection probability (EDP) under this covert communication network is deduced to obtain more in-depth insights. Besides, the average covert communication rate (ACR) is given to measure the covert performance of this system;
  • Finally, the numerical simulation results are given to analyze covert performance considerably. Moreover, observation results are summarized in detail.
The subsequent composition of this article is as follows. Section 2 consists of the system description, transmission model and problem formulation, while the performance of the considered system is investigated in Section 3. Moreover, numerical simulation results are given in Section 4. Finally, the whole article is discussed in Section 5.

2. System Model and Problem Formulation

This section first introduces the system we investigate. After that, the signal transmission process is analyzed. Finally, we formulate the problem we research based on this system model.

2.1. System Description

In Figure 1, we investigate a covert communication system based on ISMTRN with partial relay selection, consisting of a satellite S, a legal user U, and N DF relays, represented by R i ( i = 1 , , N ). All nodes are equipped with a single antenna and work in half-duplex mode. Besides, it is assumed that the direct link between the satellite and the user cannot be achieved due to deep channel fading. In our model, we consider the scenario that while forwarding the satellite’s source information, the selected relay opportunistically transmits its information to the destination covertly. Meanwhile, the satellite acts as a monitor.
The channel coefficient of the link a b ( a , b S , R i , U ) is defined as h a b , which is an independent, zero-mean complex Gaussian random variable with unit variance. In order to make the analysis concrete, it is assumed that there are discrete-time channels with T time slots between each node, and each time slot has n symbol periods. Moreover, we consider that the channels within this system experience block fading, representing that channel coefficients in each time slot remain constant but vary independently from one-time slot to another. Furthermore, it is assumed that ith relay R i only knows its own h S R i and h R i U , while S knows all h S R i and U knows all h R i U [29]. Finally, we assume that the satellite-terrestrial relay links are modeled by Shadowed–Rician (SR) fading, and relay-user links follow the Rayleigh fading. Generally, additive white Gaussian noise (AWGN) ( C N 0 , σ 2 ) interferes with all nodes.

2.2. Transmission Model

In our system, a partial relay selection scheme is considered by us, which is expressed as that the relay with the highest instantaneous average signal-to-noise ratio (SNR) at U, denoted by R m ( m = 1 , , N ), is selected as the special relay to transmit the source information from S [31]. Thus, for the DF relaying mentioned above, we have:
h R m U 2 = max i 1 , , N h R i U 2 .
Therefore, the received SNR at U can be given by:
γ U = P R h R m U 2 σ U 2 .
where P R is the transmit power of the selected relay, n U denotes the noise at U with C N 0 , σ U 2 .
Moreover, since the system realizes communication from S to U by relays, the information transfer process includes two time periods. In the first time period, S transmits the source information to U with a fixed rate, denoted by r S U [29]. The received signal at R m is given by:
y R m k = P S T h S R m x S k + n R m k ,
where P S T is the transmit power of S, k = 1 , 2 , , n is the symbol subscript, x S denotes the source transmission signal of S, which satisfies E x S k 2 = 1 , and n R m is the complex AWGN received by R m with n R m k C N 0 , σ R m 2 .
In the second time period, whether R m is able to transmit information successfully is decided by two necessary conditions. One of them is that the R m has enough ability to decode x S correctly, which is expressed by:
γ R m = P S T h S R m 2 σ R m 2 γ t h ,
where γ R m represents the received SNR at R m , and γ t h = 2 2 r S U 1 is the threshold [21].
Moreover, another one is that U can decode the signal from R m successfully:
γ U , M = P M h R m U 2 σ U 2 γ t h ,
where γ U , M is the maximum received SNR at U, P M is the maximum transmit power of R m , and σ U 2 represents the average noise power at U. Meanwhile, the satisfaction of the above conditions is monitored by R m at any time. According to Equations (4) and (5), the condition for keeping the communication link uninterrupted is obtained as:
Γ = min γ R m , γ U , M γ t h ,
when the demands set Γ is met, R m can transmit information successfully.
Furthermore, the two cases need to be considered, including transmitting without or with covert information. If R m only transmits source information to U without covert information, the received signal at U is given by:
y U 0 k = P R m , 0 h R m U x R k + n U k ,
where P R m , 0 is the transmit power of R m without covert information, x R denotes transmission signal of source information of R m , which satisfies E x R k 2 = 1 , and n U is the complex AWGN received by U with n U k C N 0 , σ U 2 .
Since the transmission rate of S to U is fixed, R m must ensure γ R m = γ t h at least. Therefore, the transmit power of R m without covert information can be expressed by:
P R m , 0 = γ t h σ U 2 h R m U 2 .
On the other hand, if R m transmits source information to U with covert information, the received signal at U is given by:
y U 1 k = P R m , 1 h R m U x R k + P C h R m U x C k + n U k ,
where P R m , 1 is the transmit power of R m for x R , and P C is the fixed transmit power of R m for transmitting its own covert information x C , which also satisfies E x C k 2 = 1 .
When U receives y U 1 , x C is seen as an interference signal in the first phase of decoding x R . Thus, the signal-to-interference-plus-noise ratio (SINR) for decoding x R is obtained as:
γ U 1 = P R m , 1 h R m U 2 P C h R m U 2 + σ U 2 .
Due to the constraints of Equation (6), γ U 1 = γ t h should be ensured at least. Hence, the P R m , 1 can be denoted by:
P R m , 1 = P C γ t h + γ t h σ U 2 h R m U 2 .
Moreover, it is apparent only when the condition P R m , 1 + P C P M is satisfied, R m is able to transmit covert information, which is given by:
Λ = h R m U 2 γ t h σ U 2 P M γ t h + 1 P C ,
when the set Λ is met, the R m can have enough ability to realize the covert information transmission. After successfully decoding x R , it will be stripped by U. Thus, the SNR for decoding x C is expressed as:
γ C = P C h R m U 2 σ U 2 .

2.3. Problem Formulation

In our model, while forwarding the information of satellite S, the selected relay R m opportunistically transmits its information to the destination covertly. However, since the total communication resources are limited, the behavior of covert communication will inevitably occupy the communication resources of the primary link and be unfavorable for its communication. Therefore, the covert communication behavior at R m is illegal. Based on this, S must always detect R m to judge whether it transmits covert information to the user U or not, so that S can respond on time. Against this background, we perform the following analysis and present the research problem of this paper.
The received signal at S in the second time period can be obtained as:
y S k = P R m , 0 h R m S x R k + n S k H 0 P R m , 1 h R m S x R k + P C h R m S x C k + n S k H 1 ,
where n S is the complex AWGN received by S, and n S k C N 0 , σ S 2 . H 1 denotes R m transmits with covert information and H 0 is the opposite. Besides, due to the channel reciprocity, h R m S = h S R m . The energy detection method is adopted by S to probe whether R m is transmitting covert information, which has been proved as the best method in quasi-static fading channels in [32]. Namely, when the average power of the received signal of S is larger than the preset energy detection threshold, S considers R m are transmitting covert information to U [33]. In order to further analyze the impact of system parameters on the performance of covert communication and obtain the inspiration for optimization, we need to create a model to quantify the covert performance, namely, the detection capability of S. Generally, we first analyze the error detection probability of S.
The error detection of S can be divided into two categories as:
P f a = P P S r λ | H 0 P m d = P P S r < λ | H 1 ,
where P S r = 1 / n k = 1 n y S k 2 , and λ is the preset energy detection threshold. Moreover, P f a is the false alarm (FA) probability, and P m d is the missed detection (MD) probability.
Lemma 1.
When the demands set Γ is met, R m will transmit information successfully and S stars to detect. Thus, under the condition Γ, for a given λ, we can derive:
P f a = 1 , F A ( λ ) , 0 , λ < σ S 2 σ S 2 λ α λ > α ,
P m d = 0 , M D ( λ ) , 1 , λ < β β λ γ λ > γ ,
where
α = P M h R m S 2 + σ S 2 ,
β = γ t h + 1 P C h R m S 2 + σ S 2 ,
γ = P M + γ t h + 1 P C h R m S 2 + σ S 2 ,
Moreover,
F A λ = 1 exp γ t h σ U 2 h R m S 2 λ σ S 2 N 1 exp γ t h σ U 2 P M N 1 1 exp γ t h σ U 2 P M N ,
M D λ = 1 1 exp γ t h σ U 2 h R m S 2 λ γ t h + 1 P C h R m S 2 σ S 2 N 1 1 exp γ t h σ U 2 P M N .
Proof. 
See Appendix A. □

3. Performance Analysis

This section provides the statistical properties of the Rayleigh fading channel and SR fading channel. The exact expressions of EDP at S in the ISMTRN are obtained. Further, we also derive ACR to measure this covert performance of our considered system.

3.1. Statistical Properties of Channels

In this paper, it is assumed that all terrestrial links experience the independent identically distributed (i.i.d) Rayleigh fading. With the help of Equation (1), the probability distribution function (PDF) and cumulative distribution function (CDF) of h R m U 2 can be obtained as, respectively [9]:
f h R m U 2 x = N 1 e x N 1 e x = N k = 0 N 1 N 1 k e k + 1 x 1 k ,
F h R m U 2 x = 1 e x N = k = 0 N N k e k x 1 k .
Moreover, it is inevitable to use multi-beam technology to improve the spectral efficiency in SatCom. Therefore, this factor must be considered in the channel model. For geosynchronous earth orbit (GEO) satellites, multiple beams are usually generated by array reflectors, which have a higher efficiency than direct radiation arrays. In this case, the radiation pattern of each beam is a constant, which significantly reduces the need for on-satellite processing capacity [34]. Furthermore, time division multiple access (TDMA) technology is applied to ensure that only one terrestrial user is accessed for the given time in the system.
Furthermore, the channel coefficient h S R between the satellite and terrestrial relay can be shown as:
h S R = C S R g S R ,
where g S R represents the SR coefficient, and C S R denotes the radio frequency loss, which consists of free space loss and antenna gain and is expressed as:
C S R = λ 4 π G S G R s 2 + R 0 2 ,
where λ is the carrier wavelength, s denotes the distance between terrestrial relay and satellite beam center, and R 0 35 , 786 km represents the radius of geosynchronous earth orbit. Moreover, G S is the beam gain of the satellite, and G R denotes the antenna gain of terrestrial relay.
Besides, the antenna gain for terrestrial relay with parabolic antenna can be shown as [35]:
G R ( d B ) G M R , 0 < ψ < 1 32 25 log ψ , 1 ψ < 48 10 , 48 < ψ 180 ,
where G M R is the upper limit of the antenna gain, and ψ represents the deflection angle of the satellite. As for G S , ϑ is defined as the angle between the terrestrial relay and the center of the satellite beam, and ϑ ¯ represents the 3 dB angle of the satellite beam. Furthermore, the beam gain of the satellite can be given by [36]:
G S ( d B ) G M S J 1 τ 2 τ + 36 J 3 τ τ 3 2 ,
where G M S represents the maximal beam gain, τ = 2.07123 sin ϑ / sin ϑ ¯ , J 1 x and J 3 x are the first-kind bessel function of order 1 and 3, respectively. Ideally, to obtain the best system performance, generally ϑ 0 . Therefore, we can get G S = G M S , and further, h S R = C S R M a x g S R .
From [37], the PDF of h S R m 2 = C S R m M a x g S R m 2 is given by
f h S R m 2 x = α S R m e β S R m x 1 F 1 m S R m ; 1 ; δ S R m x ,
where α S R m = 1 2 b S R m 2 b S R m m S R m 2 b S R m m S R m + Ω S R m m S R m , δ S R m = Ω S R m 2 b S R m 2 b S R m m S R m + Ω S R m , and β S R m = 1 2 b S R m . Besides, m S R m represents the Nakagami-m parameter, Ω S R m denotes average power of line of sight (LOS) link and b S R m represents half average power of the multi-path.
Generally that m S R m is an integer, with the utilizing of [38], 1 F 1 m S R m ; 1 ; δ S R m x is represented as:
1 F 1 m S R m ; 1 ; δ S R m x = e δ S R m x n = 0 m S R m 1 δ S R m n 1 m S R m n n ! 2 x n ,
where x y is the pochhammer function [39].
According to Equations (29) and (30), the PDF and CDF of h S R m 2 are obtained as:
f h S R m 2 x = α S R m n = 0 m S R m 1 δ S R m n 1 m S R m n n ! 2 x n e β S R m δ S R m x ,
F h S R m 2 x = 1 α S R m n = 0 m S R m 1 k = 0 n δ S R m n 1 m S R m n k ! n ! β S R m δ S R m n k + 1 x k e β S R m δ S R m x .

3.2. EDP

When the power constraint in the information transmission process is satisfied, namely, the set Λ is met, we set the probability of R m transmitting covert information as θ .
Theorem 1.
For given λ and θ, the EDP can be given by
μ = P f a P H 0 + P m d P H 1 ,
where P H 0 = 1 P H 1 and P H 1 = θ P Λ Γ .
Furthermore,
μ = 1 ε 1 ε F A λ ε M D λ + 1 ε F A λ ε M D λ ε λ < σ S 2 σ S 2 λ β β λ α α λ γ λ > γ ,
where
ε = θ 1 1 exp γ t h σ U 2 P M γ t h + 1 P C N 1 1 exp γ t h σ U 2 P M N .
Proof. 
See Appendix B. □
Obviously, the EDP given above can be minimized by optimizing λ . From the Equation (34), according to its functional properties, it is evident that the optimal solution of λ to minimize the EDP belongs to the interval β , α , which has been solved by numerical simulation in Section 4.

3.3. ACR

Only when the conditions Γ and Λ are met at the same time, the covert rate can be achieved, which is defined as R = log 2 1 + γ . With a fixed transmit power P C , taking θ into account, the ACR of this system can be obtained as:
R A C = θ u f h S R m 2 x d x v log 2 1 + P C y σ U 2 f h R m U 2 y d y ,
where u = γ t h σ R m 2 P S , v = γ t h σ U 2 P M γ t h + 1 P C .
According to Equations (23) and (31) and variable Y substitution, Equation (36) can be derived as:
R A C = θ 1 F h S R m 2 u N I n 2 k = 0 N 1 N 1 k 1 k e k + 1 v × σ U 2 P C 0 I n Y + P C v σ U 2 + 1 exp k + 1 σ U 2 P C Y d Y ,
where Y = P C y v σ U 2 .
Further, with the help of [16], the ACR can be re-written as:
R A C = θ α S R m n = 0 m S R m 1 k = 0 n δ S R m n 1 m S R m n k ! n ! β S R m δ S R m n k + 1 u k e β S R m δ S R m u × N I n 2 k = 0 N 1 N 1 k ( 1 ) k exp ( k + 1 ) v k + 1 I n 1 + P C v σ U 2 exp ω E i ω .
where ω = k + 1 v + σ 2 U P C and E i x = x e t t d t is the exponential integral function.

4. Numerical Results

In this section, the numerical simulation results are given to investigate and analyze the impact of system parameters. Moreover, the SR fading channels parameters are shown in Table 1 [37]. The parameters of the considered system are given in Table 2 [40].
Figure 2 depicts μ versus λ for different P C . It is obvious that the μ can be minimized by optimizing λ . Combined with Equations (21) and (22), it is easy to know that 1 ε F A λ is a minus function of λ , and ε M D λ is an incremental function with respect to λ . Moreover, μ is a continuous function of λ . Therefore, the optimal solution of λ named λ o p t belongs to β , α which has been verified by the simulation results in this figure. Finally, we can have μ o p t = ε M D λ o p t + 1 ε F A λ o p t .
Figure 3 shows μ o p t versus P C for the different number of relays. In [21], the authors gave the covert constraint, namely, μ o p t min ε , 1 ε o ¯ , where o ¯ 0 . Therefore, the maximum value of μ o p t is ρ , which equals 0.5. Moreover, it is obvious that as the power used for covert communication P C gradually increases, the value of μ o p t decreases. It is because the enhanced power radiation used for covert communication is helpful for the detection of the satellite. All in all, the value of P C is determined by the covert constraint. Finally, we can also see that the increased number of relays leads to a decrease in μ o p t , which indicates that the gain generated by the relay selection is beneficial in eliminating the uncertainty of detection at S.
Figure 4 plots ACR versus P C for the different number of relays. It is shown that there exists a value of P C that maximizes ACR, namely, ACR can be optimized by adjusting P C . Furthermore, it is evident that as the fading of the satellite-terrestrial relay links worsens, it inevitably leads to a decrease in ACR because the degree of fading determines the proportion of on and off time for the overall system communication link. Finally, we can also see that an increase in the number of relays contributes to the rise in ACR, implying a diversity gain in relay selection.
Figure 5 depicts the ACR versus r S U for the different number of relays. First, it is easy to see that the increase in r S U is detrimental to the covert communication because the enhancement in the decoding threshold increases the difficulty of keeping the communication link connected. In addition, similar to the previous conclusion, the rise in the number of relays favors the increase in the rate of covert communication, which is evident when r S U is small. Finally, as in the previous analysis, the ACR decreases when the satellite-terrestrial relay links’ fading deteriorates. In particular, in the I L S and A S cases, the curves become convexly decreasing, while in the F H S , the curves are concave and decreasing.

5. Discussion

This article investigated covert communication in the ISMTRN with relay selection. In our model, terrestrial relays sent covert information to the user. The satellite always detected terrestrial relays to prevent them from misusing communication resources to send covert information. Based on this foundation, the closed-form solutions of EDP and ACR were derived to analyze the covert communication performance. Our results showed that the gain generated by the relay selection was beneficial in eliminating the detection uncertainty. Moreover, as the fading of the satellite-terrestrial relay links worsened, it inevitably decreased ACR. Finally, a rise in the number of relays contributed to the increase of ACR, which implied the existence of the diversity gain in relay selection.

Author Contributions

Z.W., R.L., H.S., S.Z. and C.L. conceived and designed the experiments; Z.W. and C.L. performed the experiments; R.L. and H.S. analyzed the data; S.Z. contributed analysis tools; Z.W., R.L. and H.S. wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the National Science Natural Foundation of China (No. 61901502, No. 61971474 and No. 62001517), and the Project of Space Engineering University (No. 2020XXAQ01 and No. 2019XXAQ05).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ACRAverage covert communication rate
ANArtificial noise
ASAverage shadow
AWGNAddictive white Gaussian noise
CDFCumulative distortion function
DFDecode-and-forward
EDPError detection probability
FAFalse alarm
FHSFrequent heavy shadowing
GEOGeosynchronous earth orbit
HSTRNHybrid satellite-terrestrial relay network
HSTSsHybrid satellite-terrestrial systems
ILSInfrequent light shadowing
IoEInternet-of-Everything
IoTInternet of Things
IRCIntelligent Reflection Communication
ISACIntegrated Sensing and Communication
ISMTRNIntegrated satellite multiple terrestrial relay network
LOSLine-of-sight
MDMissed detection
NOMANon-orthogonal multiple access
PDFProbability distribution function
PLSPhysical Layer Security
QoSQuality of service
SatComSatellite communication
SINRSignal-to-interference-plus-noise ratio
SNRSignal-to-noise ratio
SRShadowed-Rician
TDMATime division multiple access
UAVUnmanned aerial vehicle

Appendix A

Based on the Equation (15), we have known
P f a = P P S r λ H 0 .
Further, with the help of Equations (8) and (14), the false alarm probability can be derived as
P f a = P γ t h σ U 2 h R m U 2 h R m S 2 + σ S 2 λ Γ .
Then, we have known that when λ < σ s 2 , there is P f a = 1 and when λ > α , namely, γ U , M < γ t h , there is P f a = 0 . Therefore, the P f a can be expressed as
P f a = 1 , λ < σ S 2 P Γ , γ t h σ U 2 h R m U 2 h R m S 2 + σ S 2 P Γ = P γ t h σ U 2 P M h R m U 2 γ t h σ U 2 h R m U 2 λ σ S 2 P h R m U 2 γ t h σ U 2 P M , σ S 2 λ α 0 , λ > α .
According to Equation (1) and the CDF of h R m U 2 as Equations (24) and (21) can be proved.
Similarly, with the help of Equations (11) and (14), the missed detection probability can be obtained as
P m d = P γ t h + 1 P C + γ t h σ U 2 h R m U 2 h R m S 2 + σ S 2 λ Γ .
Considering Equations (6) and (A4) can be expressed as
P m d = 0 , λ < β P h R m U 2 γ t h σ U 2 h R m S 2 λ γ t h + 1 P C h R m S 2 σ S 2 P h R m U 2 γ t h σ U 2 P M , β λ γ 1 , λ > γ .
After some steps, Equation (22) can be proved.

Appendix B

Based on the above derivation, only when Γ is satisfied can the signal transmission link in this system remain uninterrupted. Namely, S can carry out its detection in the second time period, and R m will opportunistically transmit covert information. In the previous content, we have set the probability of R m transmitting covert information as θ when the set Λ is met.
From Equation (33), the EDP can be expressed as
μ = P f a P H 0 + P m d P H 1 .
In Equation (A6), we have known P f a and P m d . Furthermore, with the help of Equations (6) and (12), the prior probability of hypothesises can be derived as
P H 1 = θ P Λ Γ P H 0 = 1 P H 1 ,
where
P Λ Γ = P Λ Γ P Γ = P h R m U 2 γ t h σ U 2 P M γ t h + 1 P C P h R m U 2 γ t h σ U 2 P M ,
Substituting Equation (24) into Equations (A7) and (A8), the P H 1 can be obtained as
P H 1 = θ 1 1 exp γ t h σ U 2 P M γ t h + 1 P C N 1 1 exp γ t h σ U 2 P M N = Δ ε .
Correspondingly, we can get P H 0 simply by Equations (A7) and (A9).
Besides, it is apparently that β < α < γ due to the power constraint of R m . Therefore, combining Equations (16), (17), (A7) and (A9), the Equation (34) can be proved.

References

  1. Li, B.; Fei, Z.; Zhou, C.; Zhang, Y. Physical-layer security in space information networks: A survey. IEEE Internet Things J. 2020, 7, 33–52. [Google Scholar] [CrossRef]
  2. Guo, K.; An, K.; Zhang, B.; Huang, Y.; Tang, X.; Zheng, G.; Tsiftsis, T.A. Physical layer security for multi-user satellite communication systems with threshold-based scheduling scheme. IEEE Trans. Veh. Technol. 2020, 69, 5129–5141. [Google Scholar] [CrossRef]
  3. An, K.; Li, Y.; Yan, X.; Liang, T. On the performance of cache-enabled hybrid satellite-terrestrial relay networks. IEEE Wirel. Commun. Lett. 2019, 8, 1506–1509. [Google Scholar] [CrossRef]
  4. Zhang, X.; Guo, D.; An, K.; Zheng, G.; Chatzinotas, S.; Zhang, B. Auction-based multichannel cooperative spectrum sharing in hybrid satellite-terrestrial IoT networks. IEEE Internet Things J. 2021, 8, 7009–7023. [Google Scholar] [CrossRef]
  5. Lin, Z.; Lin, M.; Zhu, W.-P.; Wang, J.-B.; Chen, J. Robust secure beam-forming for wireless powered cognitive satellite-terrestrial networks. IEEE Trans. Cognit. Commun. Netw. 2021, 7, 567–580. [Google Scholar] [CrossRef]
  6. Liu, R.; Guo, K.; An, K.; Zhu, S. NOMA-based overlay cognitive integrated satellite-terrestrial relay networks with secondary network selection. IEEE Trans. Veh. Technol. 2022, 71, 2187–2192. [Google Scholar] [CrossRef]
  7. Cao, W.; Zou, Y.; Yang, Z.; Zhu, J. Relay selection for improving physical-layer security in hybrid satellite-terrestrial relay networks. IEEE Access 2018, 6, 65275–65285. [Google Scholar] [CrossRef]
  8. Yan, S.; Wang, X.; Li, Z.; Li, B.; Fei, Z. Cooperative jamming for physical layer security in hybrid satellite terrestrial relay networks. China Commun. 2019, 16, 154–164. [Google Scholar] [CrossRef]
  9. Guo, K.; An, K.; Zhang, B.; Huang, Y.; Guo, D. Physical layer security for hybrid satellite terrestrial relay networks with joint relay selection and user scheduling. IEEE Access 2018, 6, 55815–55827. [Google Scholar] [CrossRef]
  10. Huang, Q.; Lin, M.; Zhu, W.; Chatzinotas, S.; Alouini, M. Performance analysis of integrated satellite-terrestrial multi-antenna relay networks with multi-user scheduling. IEEE Trans. Aerosp. Electron. Syst. 2020, 56, 2718–2731. [Google Scholar] [CrossRef]
  11. Huang, M.; Gong, F.; Zhang, N.; Li, G.; Qian, F. Reliability and security performance analysis of hybrid satellite-terrestrial multi-relay systems with artificial noise. IEEE Access 2020, 17, 34708–34721. [Google Scholar] [CrossRef]
  12. El-Latif, A.; Abd-El-Atty, B.; Mazurczyk, W.; Fung, C.; Venegas-Andraca, S.E. Secure data encryption based on quantum walks for 5G IoT scenario. IEEE Trans. Netw. Serv. Manag. 2021, 9, 118–131. [Google Scholar]
  13. Zeng, M.; Qian, H.; Chen, J.; Zhang, K. Forward secure public key encryption with keyword search for outsourced cloud storage. IEEE Trans. Cloud Comput. 2022, 10, 426–438. [Google Scholar] [CrossRef]
  14. Soderi, S.; Nicola, R.D. 6G networks physical layer security using RGB visible light communications. IEEE Access 2022, 10, 5482–5496. [Google Scholar] [CrossRef]
  15. Zhao, H.; Zhang, Y.; Huang, X.; Xiang, Y.; Su, C. A physical-layer key generation approach based on received signal strength in smart homes. IEEE Internet Things J. 2022, 9, 4917–4927. [Google Scholar] [CrossRef]
  16. Wei, Z.; Masouros, C.; Poor, H.V.; Petropulu, A.P.; Hanzo, L. Physical layer anonymous precoding: The path to privacy-preserving communications. IEEE Wirel. Commun. 2022, 29, 154–160. [Google Scholar] [CrossRef]
  17. Shi, W.; Xu, W.; You, X.; Zhao, C.; Wei, K. Intelligent reflection enabling technologies for integrated and green Internet-of-Everything beyond 5G: Communication, sensing, and security. IEEE Wirel. Commun. 2022. [Google Scholar] [CrossRef]
  18. Wei, Z.; Liu, F.; Masouros, C.; Su, N.; Petropulu, A.P. Toward multi-functional 6G wireless networks: Integrating sensing, communication, and security. IEEE Commun. Mag. 2022, 60, 65–71. [Google Scholar] [CrossRef]
  19. Wei, Z.; Liu, F.; Masouros, C.; Poor, H.V. Fundamentals of physical layer anonymous communications: Sender detection and anonymous precoding. IEEE Trans. Wirel. Commun. 2022, 21, 64–79. [Google Scholar] [CrossRef]
  20. Simmons, G.J. The prisoners’ problem and the subliminal channel. In Advances in Cryptology; Springer: Boston, MA, USA, 1984; pp. 51–67. [Google Scholar]
  21. Hu, J.; Yan, S.; Zhou, X.; Shu, F.; Li, J.; Wang, J. Covert communication achieved by a greedy relay in wireless networks. IEEE Trans. Wirel. Commun. 2018, 17, 4766–4779. [Google Scholar] [CrossRef] [Green Version]
  22. Zhou, X.; Yan, S.; Hu, J.; Sun, J.; Li, J.; Shu, F. Joint optimization of a UAV’s trajectory and transmit power for covert communications. IEEE Trans. Signal Process. 2019, 67, 4276–4290. [Google Scholar] [CrossRef] [Green Version]
  23. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef] [Green Version]
  24. Wang, L.; Wornell, G.W.; Zheng, L. Fundamental limits of communication with low probability of detection. IEEE Trans. Inf. Theory 2016, 62, 3493–3503. [Google Scholar] [CrossRef] [Green Version]
  25. Bloch, M.R. Covert communication over noisy channels: A re-solvability perspective. IEEE Trans. Inf. Theory 2016, 62, 2334–2354. [Google Scholar] [CrossRef] [Green Version]
  26. Lee, S.; Baxley, R.J.; Weitnauer, M.A.; Walkenhorst, B. Achieving undetectable communication. IEEE J. Sel. Top. Signal Process. 2015, 9, 1195–1205. [Google Scholar] [CrossRef]
  27. He, B.; Yan, S.; Zhou, X.; Lau, V.K.N. On covert communication with noise uncertainty. IEEE Commun. Lett. 2017, 21, 941–944. [Google Scholar] [CrossRef] [Green Version]
  28. Liu, Z.; Liu, J.; Zeng, Y.; Ma, J. Covert wireless communications in IoT systems: Hiding information in interference. IEEE Wirel. Commun. 2018, 25, 46–52. [Google Scholar] [CrossRef]
  29. Su, Y.; Sun, H.; Zhang, Z.; Lian, Z.; Xie, Z.; Wang, Y. Covert communication with relay selection. IEEE Wirel. Commun. Lett. 2021, 10, 421–425. [Google Scholar] [CrossRef]
  30. Gao, C.; Yang, B.; Jiang, X. Covert communication in relay-assisted IoT systems. IEEE Internet Things J. 2021, 8, 6313–6323. [Google Scholar] [CrossRef]
  31. Michalopoulos, D.S.; Suraweera, H.A.; Karagiannidis, G.K.; Schober, R. Amplify-and-forward relay selection with outdated channel estimates. IEEE Trans. Commun. 2012, 60, 1278–1290. [Google Scholar] [CrossRef]
  32. Sobers, T.V.; Bash, B.A.; Guha, S.; Towsley, D.; Goeckel, D. Covert communication in the presence of an uninformed jammer. IEEE Trans. Wirel. Commun. 2017, 16, 6193–6206. [Google Scholar] [CrossRef]
  33. Wang, J.; Tang, W.; Zhu, Q.; Li, X.; Rao, H.; Li, S. Covert communication with the help of relay and channel uncertainty. IEEE Wirel. Commun. Lett. 2019, 8, 317–320. [Google Scholar] [CrossRef]
  34. Arnau, J.; Christopoulos, D.; Chatzinotas, S.; Mosquera, C.; Ottersten, B. Performance of the multi-beam satellite return link with correlated rain attenuation. IEEE Trans. Wirel. Commun. 2014, 13, 6286–6299. [Google Scholar] [CrossRef]
  35. ITU-R P.452-15; Prediction Procedure for the Evaluation of Interference between Stations on the Surface of the Earth at Frequencies above about 0.1 GHz. ITU-R: Geneva, Switzerland, 2013.
  36. An, K.; Liang, T.; Zheng, G.; Yan, X.; Li, Y.; Chatzinotas, S. Performance limits of cognitive-uplink FSS and terrestrial FS for Ka-Band. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 2604–2611. [Google Scholar] [CrossRef]
  37. Miridakis, N.I.; Vergados, D.D.; Michalas, A. Dual-hop communication over a satellite relay and shadowed rician channels. IEEE Trans. Veh. Technol. 2015, 64, 4031–4040. [Google Scholar] [CrossRef]
  38. The Wolfram Function Site. Available online: http://functions.wolfram.com (accessed on 14 June 2022).
  39. Brychkov, Y.A. Handbook of Special Functions: Derivatives, Integrals, Series and Other Formulas; Chapman Hall/CRC Press: Boca Raton, FL, USA, 2008. [Google Scholar]
  40. Yan, X.; Xiao, H.; An, K.; Zhen, G.; Chatzainotas, S. Ergodic capacity of NOMA-based uplink satellite networks with randomly deployed users. IEEE Syst. J. 2020, 14, 3343–3350. [Google Scholar] [CrossRef]
Figure 1. Covert communication system based ISMTRN with partial relay selection.
Figure 1. Covert communication system based ISMTRN with partial relay selection.
Sensors 22 05524 g001
Figure 2. The EDP versus λ for the different P C .
Figure 2. The EDP versus λ for the different P C .
Sensors 22 05524 g002
Figure 3. The optimal EDP versus P C for the different number of relays.
Figure 3. The optimal EDP versus P C for the different number of relays.
Sensors 22 05524 g003
Figure 4. The ACR versus P C for the different number of relays.
Figure 4. The ACR versus P C for the different number of relays.
Sensors 22 05524 g004
Figure 5. The ACR versus r S U for the different number of relays.
Figure 5. The ACR versus r S U for the different number of relays.
Sensors 22 05524 g005
Table 1. Channel parameters.
Table 1. Channel parameters.
Shadowing m j b j Ω j
Frequent heavy shadowing (FHS)10.0630.0007
Average shadowing (AS)50.2510.279
Infrequent light shadowing (ILS)100.1581.29
Table 2. System parameters.
Table 2. System parameters.
ParameterValue
Satellite OrbitGEO
Carrier Frequency f = 18 GHz
3 dB angle ϑ ¯ = 0 . 4
Maximal Beam Gain G M S = 48 dB
Maximal Receive Antenna Gain G M R = 4 dB
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wu, Z.; Liu, R.; Shuai, H.; Zhu, S.; Li, C. Covert Performance for Integrated Satellite Multiple Terrestrial Relay Networks with Partial Relay Selection. Sensors 2022, 22, 5524. https://doi.org/10.3390/s22155524

AMA Style

Wu Z, Liu R, Shuai H, Zhu S, Li C. Covert Performance for Integrated Satellite Multiple Terrestrial Relay Networks with Partial Relay Selection. Sensors. 2022; 22(15):5524. https://doi.org/10.3390/s22155524

Chicago/Turabian Style

Wu, Zeke, Rui Liu, Haifeng Shuai, Shibing Zhu, and Changqing Li. 2022. "Covert Performance for Integrated Satellite Multiple Terrestrial Relay Networks with Partial Relay Selection" Sensors 22, no. 15: 5524. https://doi.org/10.3390/s22155524

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop