Physical Layer Security Performance of Multi-User Mixed Radio-Frequency/Free-Space-Optics System Based on Optimal User Interference

This paper presents research on the physical layer security performance of a multi-user mixed RF/FSO system based on optimal user interference. In this system model, the RF link experiences Rayleigh fading, and the FSO link follows the Fischer–Snedecor F distribution. The system adopts a double-hop-decode-and-forward (DF) relay scheme. We also consider the effect of directivity errors in the FSO link and assume the presence of an illegal eavesdropper with a single antenna near the RF link. The source node controls the energy collection and information forwarding using a multi-user structure based on simultaneous wireless information and power transfer (SWIPT). We select the optimal user to jam the eavesdropper’s communication. We derive closed-form expressions for the mixed RF/FSO communication system’s secrecy outage probability (SOP) and average secrecy capacity (ASC). Monte Carlo simulations are performed to verify the accuracy of these expressions. By formulating and simulating the simulation system, the impact of various important factors on the mixed system’s physical layer security (PLS) is analyzed. The analysis indicates that increasing the number of antennas and interference signal-to-noise ratio (SNR) of the optimal user, the time allocation factor and energy conversion efficiency, and the improvement in the quality of atmospheric channels with improved weather will significantly enhance this system’s PLS.


Introduction
The rapid scientific and technological development, and the growing network demand are overwhelming the radio frequency spectrum resources. Compared with traditional radio frequency (RF) communication, FSO (Free Space Optics) is a well-established wireless optical transmission technology. FSO communication has attracted a lot of interest as the simulation results of FSO link fading using F-distribution have a good fit compared with the experimental data.
To overcome the limitations of the existing techniques, this paper presents a multiuser mixed RF/FSO system with optimal user interference. The RF link experiences the Rayleigh fading distribution and the FSO link experiences the F fading distribution. SWIPT and multiple users are considered in the system. Optimal user interference, equal-gaincombining (EGC) receiving and decode-and-forward (DF) relaying schemes are invoked. In the first place, the probability density function (PDF) and cumulative distribution function (CDF) of the signal-to-interference noise ratio (SINR) of eavesdroppers under interference signals are studied, in which the interference signal is transmitted by the optimal user. Second, we obtain a unified CDF based on the system signal-to-noise ratio (SNR) of the DF trunking scheme. Based on CDF, we derive closed-form formulas for the mixed system's SOP and ASC under the help of the Meijer G-function and the generalized Laguerre integration method, which are verified by Monte Carlo simulation. Through simulation, we analyzed the impact of factors such as the optimal number of interference-transmitting antennas, average interference SNR, energy conversion efficiency, time allocation factor, and atmospheric turbulence on the system's safety performance. Figure 1 shows a multi-user mixed RF/FSO system based on the optimal user interference. The system contains a multi-user source node S i (i ∈ {1, . . . , M}), a single-inputand-single-output relay (R), a legitimate destination receiving user with a single receive antenna (D) and an illegal eavesdropper (E). The RF link experiences the Rayleigh fading distribution and the FSO link experiences the F fading distribution. The source node adopts the SWIPT technology and multi-user scheduling scheme and is equipped with an energy harvesting device. The source node utilizes the optimal user to transmit jamming signals to the illegal eavesdropper.

System Model
to study the physical layer security performance of mixed systems. In recent ye found that the simulation results of FSO link fading using F-distribution have a compared with the experimental data.
To overcome the limitations of the existing techniques, this paper presents user mixed RF/FSO system with optimal user interference. The RF link experien Rayleigh fading distribution and the FSO link experiences the F fading distr SWIPT and multiple users are considered in the system. Optimal user interference gain-combining (EGC) receiving and decode-and-forward (DF) relaying schemes voked. In the first place, the probability density function (PDF) and cumulative d tion function (CDF) of the signal-to-interference noise ratio (SINR) of eavesdropp der interference signals are studied, in which the interference signal is transmitted optimal user. Second, we obtain a unified CDF based on the system signal-to-no (SNR) of the DF trunking scheme. Based on CDF, we derive closed-form formulas mixed system's SOP and ASC under the help of the Meijer G-function and the gen Laguerre integration method, which are verified by Monte Carlo simulation. T simulation, we analyzed the impact of factors such as the optimal number of inter transmitting antennas, average interference SNR, energy conversion efficiency, tim cation factor, and atmospheric turbulence on the system's safety performance. Figure 1 shows a multi-user mixed RF/FSO system based on the optimal use ference. The system contains a multi-user source node i S ( } ,...,

System Model
, a single and-single-output relay (R), a legitimate destination receiving user with a single antenna (D) and an illegal eavesdropper (E). The RF link experiences the Rayleigh distribution and the FSO link experiences the F fading distribution. The sour adopts the SWIPT technology and multi-user scheduling scheme and is equipped energy harvesting device. The source node utilizes the optimal user to transmit ja signals to the illegal eavesdropper.    , the optimal user of the source node transmits interfere nals to the eavesdropper, and the relay receives signals sent by other users of the node with the EGC technology.  Figure 2 is a schematic diagram of the time slot switching protocol for SWIPT, where ρ and T are the time switching factor and the time period of the time slot switching protocol, respectively. The relay device first transmits the RF energy signal to the source node multiuser in the first time slot ρT and the multi-user source node equipped with the energy harvesting device recognizes the received energy signal and stores it [19]. In the remaining time slot (1 − ρ)T, the optimal user of the source node transmits interference signals to the eavesdropper, and the relay receives signals sent by other users of the source node with the EGC technology.  (2) where η is the energy conversion efficiency of the source node corresponding to the conversion of the RF signal into direct current (DC). The energy received by the optimal user J S is expressed as [22] T h P d E The signal received by the relay after EGC is expressed as follows: In the energy harvesting phase, the relay node R sends a radio signal x RS i with a power of P R , which is transmitted to each user S i at the transmitter through the channel of RS i . The RF energy signal received by each user S i on the source node can be expressed as follows [20]: where P R and x RS i are the transmitted power and normalized signal of the relay node, respectively, h RS i is the channel coefficient between the users of the relay R and the source node, d RS i represents the distance between R and S i , τ is the path loss index, and n S i represents the additive white Gaussian noise with zero mean and variance σ RS i at each user. According to (1), it can be gathered from [21] that when noise influence is ignored, the energy stored by each user can be expressed as where η is the energy conversion efficiency of the source node corresponding to the conversion of the RF signal into direct current (DC). Defining the optimal user as S J , the RF signal received by it from the relay can be expressed as where h RS J and d RS J denote the channel coefficient between the relay R and the optimal user S J , respectively, and n S J denotes the additive white Gaussian noise with zero mean and variance σ RS J at the optimal user. The energy received by the optimal user S J is expressed as [22] The signal received by the relay after EGC is expressed as follows: where y S i and N i denote the SNR and additive white Gaussian noise at each branch, respectively. As the optimal user at the source node has multiple RF transmit antennas, it generates a matrix W J with an orthogonal basis of null space N S J (N S J − 1) using the artificial interference generation method in [23]. The ε vector has (N S J − 1) independent and identically distributed complex Gaussian random elements with a normalized variance. Subsequently, Sensors 2023, 23, 6523 5 of 14 the optimal user of the source node sends W ε as the interference signal. When the number of the optimal user's interference transmit antennas is greater than 1, interference signals that are transmitted into the null space will not affect the main signal, as the null space is defined as the orthogonal complement of the signal space. Under the effect of the jamming signal transmitted by the optimal user, the received signal at the illegal eavesdropper can be expressed as where h S G E is the channel coefficient between the source S G and the eavesdropper E, and n E expresses the additive white Gaussian noise with zero mean and variance σ 2 E at the illegal eavesdropper node.

RF Channel Model
The jamming signal is designed in such a way that it will only affect the illegal eavesdropper without degrading the quality of the main transmission. When communicating, the signal interference to noise ratio (SINR) of the illegal eavesdropper can be written as follows: The RF links between source and relay obey the Rayleigh fading. The Instantaneous SNR γ k 's PDF and CDF at the RF link can be mathematically expressed as the following formula: where k ∈ {S G R, S G E}, and Ω S G R = represent the average power channel gain between the corresponding RF channels, respectively. It is known from [24] that the CDF of the optimal user is Using (9) and (10), the CDF of the instantaneous SNR of the optimal user interference γ S J E is obtained as follows: Calculating the corresponding derivative of (11) gives the PDF of the instantaneous interference SNR of the optimal user as where is the average power channel gain between the optimal user S J and the illegal eavesdropper E, and Ψ = The CDF of the instantaneous SNR γ S G S J E can be obtained using (7)- (9) and (12) as follows [25]: Applying the derivative operation to the CDF represented by (13), the corresponding PDF is obtained as

FSO Channel Model
The optical signal received by the target node from the relay through the FSO link can be represented as [26,27]: where η e represents the electro-optical conversion efficiency, and G represents the gain factor. The value of r represents the type of detection method (r = 1: heterodyne detection (HD); r = 2: direct detection (DD)), y S G R indicating the signal received by the source node. I FSO represents the channel coefficient of the FSO link and n RD represents the zero-mean AWGN with variance σ 2 RD . The PDF and CDF of the FSO fading channel are expressed as follows [28]: where µ r is the average telecom noise ratio, r = 1 represents the heterodyne detection (HD), and r = 2 represents the direct detection (DD).
In the above expressions, ξ 2 mod is related to the equivalent beam width w Leq , and a and b denote the turbulence parameters. The value of ξ 2 mod increases as the pointing error decreases. When there is no pointing error, ξ 2 mod → ∞ .

End-to-End SNR Statistics
Under DF relaying, the end-to-end instantaneous SNR is denoted by The mixed channel's CDF is denoted by [29] Substituting (9) and (17) into (19) results in the following equation

Secrecy Outage Probability Analysis
The Secrecy Outage Probability (SOP) is a benchmark for secrecy, indicating the probability of the occurrence of an event where the instantaneous secrecy capacity falls below the target secrecy rate R S . The mixed system's SOP lower bound formula is defined as follows [30]: where θ = exp(R s ). Substituting (8) and (20) into (21), and then combining the relevant expressions given in [31] and the generalized Laguerre polynomial [32], after some simplifying mathematical operations, the SOP can be obtained as follows: 2 , Y j means the jth root of the generalized Laguerre polynomial

Average Secrecy Capacity Analysis
The Average Secrecy Capacity (ASC) is a critical metric for assessing the activeeavesdropping's security performance and can be expressed as follows: Substituting (13) and (20) into (23) and after a few mathematical simplifications described above, we obtain

Results and Analysis
In this part, the simulation data of the multi-user mixed RF/FSO system under diverse parameters with optimal user interference are presented. Monte Carlo simulations verify the numerical results' accuracy. The FSO link distance is 100 m and the wavelength is 785 nm, the optical wave number k = 2π/λ; C 2 n = 10 −11 m −2/3 is the atmospheric refractive index structure constant of medium turbulence, and the target secrecy rate R S = 0.01 nat/s. Furthermore, the Instantaneous SNR of the FSO link is γ RD = 20 dB, the instantaneous SNR of the RF link is γ SR = 15 dB, and the instantaneous SNR of the eavesdropping link is γ SE = −10 dB. On the RF link, d SE = d SR = 10 m, and d RE = 5 m. The other parameters are η = 0.8, ρ = 0.8, N J = 2, r = 1, a = 1.83, b = 3.94, and ξ mod = 0.84. The specific simulation parameters are shown in Table 1. The above parameter values are used in the following simulations. When the generalized Laguerre orthogonal numerical integration method is used, j is considered as 30 in order to make the series converge. The Monte Carlo simulation results confirm the validity of the analytical expressions. The numerical and simulation results are in good agreement, which verifies the accuracy of the proposed expressions. Figure 3 shows the mixed system's SOP as a function of the variation of the RF link's Instantaneous SNR λ SR for diverse numbers of the optimal user's interfering antennas. It can be known that the mixed system's SOP with different number of interfering antennas N J decreases as the λ SR increases. When λ SR = 30 dB and N J = 2, 4, 6 and 8, the mixed system's SOP are 9.7 × 10 −4 , 3.0 × 10 −4 , 1.3 × 10 −4 and 6.9 × 10 −5 , respectively. This set of simulation data shows the mixed system's SOP decreases as the number of interfering antennas of the optimal user increases. Therefore, it can be gathered that the mixed system's security performance could be effectively enhanced by enlarging the optimal user interference antennas' number at the source node. As the spatial degree of freedom of the optimal user increases with an increase in the number of optimal user interference antennas, the eavesdropping channel quality degrades based on its state information at the eavesdropping node. For the same value of SOP, increasing the optimal user's number of jamming antennas results in lower transmission power for each antenna in the scheme. In addition, the cost of increasing the antennas' number is lower than that of adding jammers outside the mixed RF/FSO system. Increasing the number of jamming antennas provides a good schedule for the design of the optimal user transmitting jamming signals and reducing the power consumption of the source node.
The relationship between the SOP and the RF link's instantaneous SNR λ SR in a mixed RF/FSO system is shown in Figure 4. The system is based on multi-user SWIPT, and the illegal eavesdropper experiences interference from the optimal user. Based on the simulation results, increasing λ SR reduces the SOP of the system in a gradual manner. Based on the findings, increasing λ JE decreases the system's SOP, indicating that the optimal user's jamming signal to the eavesdropper improves PLS performance in the mixed system. Increasing the interference SNR of the optimal user can reduce eavesdropping channel quality, but it is restricted by transmission power. Thus, introducing optimal user interference and selecting appropriate transmit power can enhance the mixed system's secrecy performance. As the spatial degree of freedom of the optimal user increases with an increase in the number of optimal user interference antennas, the eavesdropping channel quality degrades based on its state information at the eavesdropping node. For the same value of SOP, increasing the optimal user's number of jamming antennas results in lower transmission power for each antenna in the scheme. In addition, the cost of increasing the antennas' number is lower than that of adding jammers outside the mixed RF/FSO system. Increasing the number of jamming antennas provides a good schedule for the design of the optimal user transmitting jamming signals and reducing the power consumption of the source node.
The relationship between the SOP and the RF link's instantaneous SNR λ SR in a mixed RF/FSO system is shown in Figure 4. The system is based on multi-user SWIPT, and the illegal eavesdropper experiences interference from the optimal user. Based on the simulation results, increasing λ SR reduces the SOP of the system in a gradual manner. When λ SR = 30 dB and λ JE =2, 4, 6 and 8 dB, the mixed system's SOP are 9.6 × 10 −4 , 2.9 × 10 −4 , 1.4 × 10 −4 and 4.0 × 10 −5 . Based on the findings, increasing λ JE decreases the system's SOP, indicating that the optimal user's jamming signal to the eavesdropper improves PLS performance in the mixed system. Increasing the interference SNR of the optimal user can reduce eavesdropping channel quality, but it is restricted by transmission power. Thus, introducing optimal user interference and selecting appropriate transmit power can enhance the mixed system's secrecy performance.    Figure 5 depicts the mixed system's SOP as a function of the RF link's Instantaneous SNR λ SR when the optimal user at the source node adopts different values of energy conversion efficiency η. The figure shows that the mixed system's SOP diminishes as λ SR increases for different values of η. When λ SR = 30 dB and η= 0.3, 0.5, 0.7 and 0.9, the mixed system's SOP are 9.7 × 10 −4 , 4.2 × 10 −4 , 2.2 × 10 −4 and 1.3 × 10 −4 , respectively. As the energy conversion efficiency of the optimal user increases, the SOP of the system decreases. The energy harvesting multi-user source node efficiently converts the relay's RF energy signal into DC, boosting both the stored energy and interference power of the optimal user relative to the illegal eavesdropper. Consequently, the jamming effect is improved, the communication quality of the illegal eavesdropper deteriorates, and the mixed system's PLS performance is improved. By improving the optimal user energy conversion efficiency scheme, the collected energy is more stable and that makes the system more secure. Figure 6 shows the ASC of the mixed RF/FSO system as a function of the instantaneous SNR λ SR of the RF link when the optimal user adopts different time allocation factors ρ . The simulation results show that the ASC of the system increases as λ SR increases.
When =30d λ SR B and 1 . 0 = ρ , 0.3, 0.5 and 0.7, the ASC values of the system are 1.8957, 1.9088, 1.9242 and 1.9464, respectively. This set of simulation data shows that the ASC of the mixed RF/FSO system can be effectively increased by increasing the time allocation factor ρ . This is because as the time allocation factor ρ increases, the time taken by the relay to transmit the RF energy signal to the optimal user of the source node becomes longer in the first time slot and the RF energy received by the source node increases. The energy stored is higher, and the power of the optimal user to transmit interference signal to the eavesdropper is enhanced at the same time, which increases the interference effect of the optimal user on the illegal eavesdropper. Therefore, the communication quality and the mixed system's PLS performance are improved. The energy harvesting multi-user source node efficiently converts the relay's RF energy signal into DC, boosting both the stored energy and interference power of the optimal user relative to the illegal eavesdropper. Consequently, the jamming effect is improved, the communication quality of the illegal eavesdropper deteriorates, and the mixed system's PLS performance is improved. By improving the optimal user energy conversion efficiency scheme, the collected energy is more stable and that makes the system more secure. Figure 6 shows the ASC of the mixed RF/FSO system as a function of the instantaneous SNR λ SR of the RF link when the optimal user adopts different time allocation factors ρ. The simulation results show that the ASC of the system increases as λ SR increases. When λ SR = 30 dB and ρ = 0.1, 0.3, 0.5 and 0.7, the ASC values of the system are 1.8957, 1.9088, 1.9242 and 1.9464, respectively. This set of simulation data shows that the ASC of the mixed RF/FSO system can be effectively increased by increasing the time allocation factor ρ. This is because as the time allocation factor ρ increases, the time taken by the relay to transmit the RF energy signal to the optimal user of the source node becomes longer in the first time slot and the RF energy received by the source node increases. The energy stored is higher, and the power of the optimal user to transmit interference signal to the eavesdropper is enhanced at the same time, which increases the interference effect of the optimal user on the illegal eavesdropper. Therefore, the communication quality and the mixed system's PLS performance are improved. In Figure 7, the ASC is plotted against the RF link's instantaneous SNR λ SR in the mixed system, while the eavesdropper experiences varying levels of interference SNR λ JE from the optimal user. Simulation results show an ascending trend of the ASC alongside In Figure 7, the ASC is plotted against the RF link's instantaneous SNR λ SR in the mixed system, while the eavesdropper experiences varying levels of interference SNR λ JE from the optimal user. Simulation results show an ascending trend of the ASC alongside increasing λ JE . When λ SR = 30 dB, λ JE =2, 3, 6 and 9 dB, the system's ASC values of 1.95, 1.96, 1.98, and 2.01 support the conclusion that higher interference SNR λ JE from the optimal user boosts the ASC to a certain degree. This affirms that transmitting jamming signals from the optimal user to the eavesdropper enhances the security of the communication system, and higher transmission power bolsters the PLS performance. The graphic in Figure 8 plots the mixed system's ASC against the FSO link's in taneous SNR RD λ model which is based on the F distribution under the optima interference for different turbulence conditions. The figure shows that when RD λ dB, the ASC of the system is 2.08 in weak turbulence conditions of a = 2.33 and b = When a = 1.83 and b = 3.94, the ASC of the system is 2.02. The ASC of the system is 1 the case of strong turbulence with a = 1.43 and b = 3.53. As the atmospheric turbu intensity increases, the ASC of the system decreases. This shows that the FSO link i sitive to weather conditions, and a bad weather environment will seriously affect t curity performance of the FSO link. The graphic in Figure 8 plots the mixed system's ASC against the FSO link's instantaneous SNR λ RD model which is based on the F distribution under the optimal user interference for different turbulence conditions. The figure shows that when λ RD = 30 dB, the ASC of the system is 2.08 in weak turbulence conditions of a = 2.33 and b = 4.53. When a = 1.83 and b = 3.94, the ASC of the system is 2.02. The ASC of the system is 1.94 in the case of strong turbulence with a = 1.43 and b = 3.53. As the atmospheric turbulence intensity increases, the ASC of the system decreases. This shows that the FSO link is sensitive to weather conditions, and a bad weather environment will seriously affect the security performance of the FSO link.

Conclusions
In this paper, the PLS performance of a mixed RF/FSO communication system

Conclusions
In this paper, the PLS performance of a mixed RF/FSO communication system with multi-user SWIPT under optimal user interference was studied. The mixed system's SOP and ASC were researched theoretically and through simulations, with the derived expressions' validity verified using the Monte Carlo method. The impacts of the number of jamming antennas, average jamming SNR, energy conversion efficiency, time allocation factor and atmospheric turbulence on the mixed system's security performance were mainly studied. Simulation results indicated that as the RF link's instantaneous SNR increased, the system's SOP gradually decreased while the ASC increased. When the number of antennas from which the optimal user transmitted the interference signals was enlarged, the mixed system's SOP was reduced. Increasing the number of the optimal user's jamming antennas could enhance the interference effect and reduce the transmit power of each single antenna, which was an effective scheme to enhance the mixed system's security performance. When the optimal user interference SNR increased, the mixed system's SOP decreased and ASC gradually increased. This showed that the interference effect on the eavesdropper could be enhanced by increasing the optimal user interference SNR, which improved the mixed system's security performance. On the other hand, improving the energy conversion efficiency of the optimal user simultaneously enabled the energy harvesting device to store more energy and increase the power of the interference signal transmitted by the energy harvesting device, which in turn enhanced the secrecy ability of the mixed system. By using the SWIPT technology to adjust the time allocation factor, the optimal user energy harvester could prolong the receiving time of the RF energy signal sent by the relay. This phenomenon increased the energy required by the optimal user to transmit the interference signals to the illegal eavesdropper and enhance the mixed system's security performance. Additionally, the system's ASC demonstrates an increase as the FSO link's instantaneous SNR increases with optimal user interference. Notably, when turbulence factors a, b of the F distribution are adjusted from strong to weak turbulence, the system's ASC increases, suggesting that improved weather conditions can enhance the PLS performance. It can be seen that the mixed RF/FSO system based on optimal user interference limits the eavesdropping SNR of potential illegal eavesdrops to a large extent, thereby increasing the average security capacity of the mixed system and reducing its security outage probability. This scheme not only improves the communication quality of the mixed system, but also significantly improves the physical layer security of the system, which is of great significance to solve the problem of interception in the mixed system. With the development of science and technology, there may be potential eavesdroppers in the FSO link of mixed system. Therefore, the application of the optimal user jamming scheme into the mixed system with eavesdroppers in both links in the future has important research value to improve the security performance of the system.