Next Article in Journal
Predicting High-Risk Groups for COVID-19 Anxiety Using AdaBoost and Nomogram: Findings from Nationwide Survey in South Korea
Previous Article in Journal
Hibiscus rosa-sinensis as Flavoring Agent for Alcoholic Beverages
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Rate of Resource-Constrained Mobile Relay Model under Two-Way Wiretap Channel

1
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2
School of Computer Science and Engineering, Jiangsu University of Science and Technology, Zhenjiang 212100, China
3
Department of Electrical and Electronic Engineering, The University of Hong Hong, Hong Kong 999077, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2021, 11(21), 9866; https://doi.org/10.3390/app11219866
Submission received: 31 August 2021 / Revised: 12 October 2021 / Accepted: 15 October 2021 / Published: 22 October 2021

Abstract

:

Featured Application

The resource-constrained two-way wiretap channel mobile relay system provides a promising security solution for cooperative sensor networks in which low-cost sensors need to exchange data to jointly complete tasks such as localization and anomaly detection.

Abstract

Relay communication is emerging as a promising solution to improving the reliability of long-distance communication systems. However, transmitting data in a secure way is challenging due to the possibility of eavesdroppers wiretapping such systems. To address the challenge, this paper proposes a joint secure transmission and graph mobility model. With the proposed model, the secrecy rate of the resource-constrained two-way wiretap channel mobile relay system is formulated as a mixed integer nonlinear programming (MINLP) problem. Furthermore, efficient algorithms that achieve a local optimal solution are derived. Numerical results are provided to validate the performance of the proposed algorithms.

Graphical Abstract

1. Introduction

It is well known that secure information transmission is an essential communication requirement. Resource-constrained two-way communication occurs in a four-node network, where two users exchange information through a relay station under the condition of an eavesdropper wiretapping the channels. This four-node relay-eavesdropper network has been widely studied [1,2,3,4,5], and with the help of relay, the network is able to adjust its uplink and downlink channels and thus improves the system security. With the rapid development of Internet of Things (IoT), huge numbers of long-distance sensors need to interact with each other to jointly complete tasks [6]. Resources such as time and energy in this type of cooperative sensor network are important factors that need to be carefully considered. Therefore, the resource-constrained relay-eavesdropper network is becoming a novel interesting research topic and is attracting considerable attention.
Currently, most existing works focus on two-way communication systems with fixed relays [7,8,9,10]. In particular, relay cooperative jamming has been studied extensively [7,8,9,10] to protect confidential message from wiretapping. This type of method, although effectively improving the secrecy rate, may lead to harmful interference and additional energy consumption [7,8]. Thus, to eliminate interference, interference cancellation techniques have to be taken into account [10]. On the other hand, in order to improve energy utilization efficiency, energy harvesting [7] or wireless energy transfer [8] is adopted to provide the relay and users with sufficient energy. Nowadays, there is a growing interest in deploying unmanned aerial vehicles (UAVs) in two-way relay systems [11,12,13]. UAV schemes indeed provide flexible mobile relays to implement air-to-ground or air-to-air wireless communication. However, for ground secure transmission, especially indoor, complicated pitches (e.g., warehouses), this beyond the reach of UAV-based relay system. Moreover, when an UAV serves as a flying relay, it requires large propulsion energy to keep itself aloft, which leads to a short life flight. This feature prevents the UAV from participating in many applications. Therefore, two-way secure relay system needs further investigation, and this paper presents an investigation of the secrecy rate region of a ground mobile vehicle-based relay system, which remains an open problem.
To quantify the performance gain brought by our scheme, this paper proposes a two-way secure transmission and a graph mobility model, as well as formulating a secrecy rate maximization optimization problem with resource allocations incorporating path planning constraints, which represents a mixed integer nonlinear programming (MINLP) problem. The major challenges in solving this discrete problem are twofold. First, the path planning refers to a considerable number of discrete binary variables, and the solution space grows exponentially with the number of anchor points. This characteristic results in a substantial difference from the design of UAVs’ trajectories, which only involve continues variables. Second, when the relay moves along an unknown path, finding the achievable secrecy rate becomes very challenging. This is because two major reasons. One is that the transmission time at different location point needs to be determined. The other is that the powers at relay and users at each location need to be jointly optimized. As a result, in contrast to the fixed relay case, the dimension of variables significantly increase, resulting in additional nonlinear coupling between time allocation and uplink–downlink power allocation. In order to overcome the above challenges, auxiliary and relaxation methods are adopted to transform the non-convex problem into a convex problem, and a local optimal solution is derived. Finally, numerical results show that our mobile relay scheme outperforms the fixed relay scheme, and the relay trajectory is highly dependent on noise power.
Notation: Italic letters, simple bold letters, and capital bold letters represent scalars, vectors, and matrices, respectively. ( · ) T , ( · ) 1 v e c ( · ) denote the transpose, inverse and, vectorization operators of a matrix, respectively. E ( · ) takes the expectation of a random variable, and | · | is the modulus of the complex-valued number. The notation [ a ] + is used as max(a,0); symbol I N represents the N × N identity matrix. Curlicue letters denote sets; ( s 1 , s 2 , ) represents a sequence; and [ s 1 , s 2 , ] T is a column vector.

2. Materials and Methods

2.1. System Model

2.1.1. Mobility Model

The two-way wireless secure transmission mobile relay system shown in Figure 1 was considered, and it consists of two IoT users (Alice and Bob), an eavesdropper (Eve), and a relay. The relay is equipped with N antennas and mounted on a ground mobile vehicle. Alice, Bob, and Eve are configured with a single antenna. Alice and Bob exchange data through the mobile relay under the condition of Eve eavesdropping the whole process. The scenario is described as a directed graph ( ν , ε ) as shown in Figure 2, where ν is the set of M vertices representing the possible stopping points, and ε is the set of directed edges representing the allowed movement paths [14,15]. We let D = ( D m , j ) , 1 m j M be an asymmetric M × M non-negative real distance matrix associated with ε , and we assume that the following three conditions hold:
(1)
The mobile relay returns to the starting point.
(2)
The mobile relay visits all important positions.
(3)
There is no subtour in the planned path.
Accordingly, we define a selection path variable s = [ s 1 , , s M ] T , where s m = 1 if the vertex m, 1 m M , appears in the visiting path and s m = 0 otherwise. In addition, we introduce an M × M matrix Z with variables Z m , j being set to 1 or 0, 1 m j M and interpret the value 1 (0 resp.) to mean “in path” (“not in path” resp). Then, motion distance Θ ( Z ) is given by
Θ ( Z ) = min m = 1 M j = 1 M Z m , j D m , j : Z A ( s , Z )
and we define set A ( s , Z ) as the visiting path, which can be expressed as [14]:
(2a) A ( s , Z ) = { ( s , Z ) : j = 1 M Z m , j = s m , j = 1 M Z j , m = s m , m = 1 , , M λ m λ j + ( l = 1 M s l 1 ) Z m , j + ( l = 1 M s l 3 ) Z j , m (2b) l = 1 M s l 2 + J ( 2 s m s j ) , m , j 2 , m j (2c) s m λ m ( l = 1 M s l 1 ) s m , m 2 (2d) Z m , j { 0 , 1 } , m , j , Z m , m = 0 , m (2e) s 1 = 1 , s m { 0 , 1 } , m 2 }
Constraint (2a) guarantees that vertex m being visited only once at the most, while (2b) and (2c) are sub-tour elimination constraints, which ensure that the visiting path is connected. (2d) represents whether edge ( m , j ) belongs to the path and also ensures that no self-loop appears in the visiting path. (2e) stands for the first vertex is the starting point. Note that { λ m } represents slack variables to guarantee a connected trajectory, and J is a constant set to J = 10 6 .
With the moving time from vertex m to vertex j being D m , j / a , where a is the average velocity, the total moving time along a selected visiting path is
Θ ( Z ) a = 1 a m = 1 M j = 1 M Z m , j D m , j
Furthermore, the total motion energy E G , along with the visiting path, is proportional to the total moving time [16]; it can be expressed as
E G = ζ ( a ) m = 1 M j = 1 M Z m , j D m , j
where ζ ( a ) is a simple parameter function of velocity a of the model. It can be described as ζ ( a ) = ( τ 1 + τ 2 / a ) , where ( τ 1 , τ 2 ) are parameters related to the weight of ground mobile vehicle (e.g., for the considered Pioneer 3DX robot, we have τ 1 = 7.4 and τ 2 = 0.29 ) [6,16,17].

2.1.2. Uplink Signal Model

For uplink transmission, Alice transmits vector x m C L m × 1 to relay with transmit power q m = 1 t m E [ | | x m | | 2 ] , where L m is the number of symbols and t m is the transmission time assigned to the mobile relay at the stopping point m. Then, the received signal Y m C N × L m at relay is given by Y m = h m x m T + N m , where h m C N × 1 denotes the uplink channel vector of Alice-to-relay, and N m C N × L m is the Gaussian noise with E [ v e c ( N m ) v e c ( N m ) H ] = σ r 2 I N L m . Given perfect channel state information (CSI) at the receiver, and applying a receive beamformer w m H (with | | w m | | = 1 , w m = h m | | h m | | ) to Y m , the uplink signal-to-noise ratio (SNR) of Alice-to-relay at the relay is q m | w m H h m | 2 / σ r 2 = q m | | h m | | 2 / σ r 2 . On the other hand, as the computational capability of the eavesdropper is not known, we focus on the worst case scenario for facilitating secrecy supply. In particular, we assume that the eavesdropper is equipped with a noise-free receiver and able to remove other interference. In this case, the received signal y e U P C 1 × L m at Eve is given by y e U P = h e x m T + n e , where h e C 1 × 1 denotes the uplink wiretap channel scalar of Alice-to-Eve, and n e C 1 × L m is the Gaussian noise with E [ n e n e ) H ] = σ e 2 I L m . Applying a receive beamformer w e (with w e = h e | h e | ) to y e U P , the uplink wiretap SNR of Alice-to-Eve at Eve is q m | w e H h e | 2 / σ e 2 = q m | h e | 2 / σ e 2 . Therefore, the uplink achievable secrecy rate R m U P S e c at the mth stopping point from Alice to relay is given by
R m U P S e c = log 2 ( 1 + q m | | h m | | 2 σ r 2 ) log 2 ( 1 + q m | h e | 2 σ e 2 ) +

2.1.3. Downlink Signal Model

For downlink transmission, the relay uses w m H Y m to generate a symbol b m C L m × 1 with power p m = 1 t m | | b m | | 2 . Then, the relay transmits b m to Bob with the transmit beamforming vector v m C N × 1 , which is given by v m = g m | | g m | | , | | v m | | = 1 . Therefore, the received signal r m T C 1 × L m at Bob is r m T = g m H v m b m T + n m T , where g m H C 1 × N is the downlink channel vector of relay-to-Bob, and n m T C 1 × L m is the Gaussian noise at Bob with E [ n m n m H ] = σ u 2 I L m . The received signal Y e D L C N × L m at Eve is given by Y e D L = g e , m x m T + N e , where g e , m C N × 1 denotes the downlink wiretap channel vector of relay-to-Eve, and N e C N × L m is the Gaussian noise with E [ v e c ( n e ) v e c ( N e ) H ] = σ e 2 I N × L m . Applying a receive beamformer w e with | | w e | | = 1 , w e = g e , m | | g e , m | | to Y e D L , the downlink wiretap SNR of relay-to-Eve at Eve is q m | | w e H g e , m | | 2 / σ e 2 = q m | | g e , m | | 2 / σ e 2 . Therefore, the downlink achievable secrecy rate R m D L S e c at the m t h stopping point from relay to Bob is given by
R m D L S e c = log 2 ( 1 + p m | | g m | | 2 σ u 2 ) log 2 ( 1 + p m | | g e , m | | 2 σ e 2 ) +

2.2. Achievable Secrecy Rate Problem Formulation

The achievable secrecy rate region of the resource-constrained two-way mobile relay system is the average of all combinations of the worst case uplink–downlink achievable secrecy rate; therefore, the achievable secrecy rate R S e c requirement that the system needs to meet is
R S e c 1 T m = 1 M t m m i n ( R m U P S e c , R m D L S e c )
where T is the time duration, consisting of all transmission time t m and total moving time. Moreover, the transmit power and energy requirements must also satisfy
(8) m = 1 M q m t m Q , q m 0 (9) m = 1 M p m t m ( E E G ) , p m 0
where q m and Q are transmit power and initial available energy at Alice, respectively. In addition, p m , E, and E G are the transmit power, initial available energy, and motion energy of the relay, respectively. If the relay is fixed, E G = 0 ; otherwise, E G 0 , which is determined by a selected visiting path. Having the power allocation and graph mobility constraints satisfied, the achievable secrecy rate problem is formulated as P1.
P 1 : max R S e c , s , Z , { λ m } , { t m , q m , p m } R S e c (10a) s.t. m = 1 M t m l o g 2 ( 1 + q m | | h m | | 2 σ r 2 ) t m l o g 2 ( 1 + q m | h e | 2 σ e 2 ) T R S e c (10b) m = 1 M t m l o g 2 ( 1 + p m | | g m | | 2 σ u 2 ) t m l o g 2 ( 1 + p m | | g e , m | | 2 σ e 2 ) T R S e c (10c) Θ ( Z ) a + m = 1 M t m T (10d) ( s , Z ) A ( s , Z ) (10e) m = 1 M p m t m + ζ ( a ) Θ ( Z ) E (10f) m = 1 M q m t m Q (10g) ( 1 s m ) ( t m + p m + q m ) = 0 , t m 0 , p m 0 , q m 0 m = 1 , , M
where the constraints mean:
(1)  (10a) and (10b) are for secure transmission.
(2)  (10c) ensures that the mobile ground vehicle moving and data transmission are completed in T seconds.
(3)  (10g) is the constraint that the stopping time and power allocation are zeros provided that the vertex is not visited.
However, problem P1 is a MINLP problem due to the discontinuity of integer constraints of (10d), which is NP hard and nontrivial to solve [18]. Moreover, the secrecy rate depends on the transmit power { p m , q m } and transmission time { t m } , which present unknown and nonlinear coupling with each other.

2.3. Local Optimal Solution to P1

To solve P1, we first utilize auxiliary and relaxation methods to transform the non-convex constraints of (10a) and  (10b) into convex. Then, by fixing s , an optimization problem P2 is derived, which is equivalent to P1. Through further transformation, P1 is converted to P3, which only involves variable s . Lastly, we exploit the neighborhood search method (NSM) [19,20,21] and develop an iterative algorithm to obtain the local optimal solution.

2.3.1. Convex Approximation via Taylor Expansion

We first consider the constraints of (10a) and  (10b) because of the nonlinear coupling between { t m } and { p m } , { t m } and { q m } . We replace { q m } with a new variable { Q m } such that { Q m : = q m t m } . Similarly, { p m } is replaced with a new variable { P m } satisfying { P m : = p m t m } . Therefore, the above constraints of (10a), (10b), and (10e)–(10g) of P1 are equal to the following:
(11) m = 1 M t m l o g 2 ( 1 + Q m | | h m | | 2 / σ r 2 t m ) t m l o g 2 ( 1 + Q m | h e | 2 / σ e 2 t m ) T R S e c (12) m = 1 M t m l o g 2 ( 1 + P m | | g m | | 2 / σ u 2 t m ) t m l o g 2 ( 1 + P m | | g e , m | | 2 / ( σ e 2 ) t m ) T R S e c (13) m = 1 M P m + ζ ( a ) m = 1 M j = 1 M Z m , j D m , j E (14) m = 1 M Q m Q ( 1 s m ) ( t m 2 + P m + Q m ) = 0 , t m 0 , P m 0 , Q m 0 (15) m = 1 , , M
Due to the non-convexity of the above Equations (11) and (12) [22], we need some transformations. For simplicity, we define four functions as follows:
(16) f 1 ( t m , Q m ) : = t m l o g 2 ( 1 + Q m | | h m | | 2 / σ r 2 t m ) (17) f 2 ( t m , Q m ) : = t m l o g 2 ( 1 + Q m | h e | 2 / σ e 2 t m ) (18) g 1 ( t m , P m ) : = t m l o g 2 ( 1 + P m | | g m | | 2 / σ u 2 t m ) (19) g 2 ( t m , P m ) : = t m l o g 2 ( 1 + P m | | g e , m | | 2 / σ e 2 t m )
According to [22], we can obtain the following theorem and properties.
Theorem 1.
Perspective function has convexity.
Property 1.
f 1 ( t m , Q m ) , f 2 ( t m , Q m ) , g 1 ( t m , P m ) , and g 2 ( t m , P m ) are concave with respect to { t m , Q m } and { t m , P m } , respectively.
Proof of Property 1.
Since t m l o g 2 ( 1 + A ( m ) t m ) is the perspective transformation of l o g 2 ( 1 + A ( m ) ) , where A ( m ) represents any numerator of (16)–(19), according to Theorem 1, t m l o g 2 ( 1 + A ( m ) t m ) has the same convexity as l o g 2 ( 1 + A ( m ) ) [22], which is a concave function. Therefore, f 1 ( t m , Q m ) , f 2 ( t m , Q m ) , g 1 ( t m , P m ) , and g 2 ( t m , P m ) are concave with respect to { t m , Q m } and { t m , P m } , r e s p e c t i v e l y .
   □
Property 2.
f 2 ( t m , Q m ) and g 2 ( t m , Q m ) are monotonically increasing functions of { t m , Q m } for all m.
Proof of Property 2.
Follows a similar proof to [14] (Property 1).    □
Duo to the concavity and monotonically increasing property, we can take derivatives of f 2 ( t m , Q m ) and g 2 ( t m , P m ) and have the following equivalent inequalities of constraints of (10a) and (10b) by applying the first-order Taylor expansion at the given points ( t m 0 , Q m 0 ) and ( t m 0 , P m 0 ),
T R S e c m = 1 M f 1 ( t m , Q m ) + m = 1 M f 2 ( t m 0 , Q m 0 ) + f 2 ( t m , Q m 0 ) t m | t m = t m 0 ( t m t m 0 ) + f 2 ( t m , Q m 0 ) Q m | Q m = Q m 0 ( Q m Q m 0 ) 0
T R S e c m = 1 M g 1 ( t m , P m ) + m = 1 M g 2 ( t m 0 , P m 0 ) + g 2 ( t m , P m 0 ) t m | t m = t m 0 ( t m t m 0 ) + g 2 ( t m 0 , P m ) P m | P m = P m 0 ( P m P m 0 ) 0

2.3.2. Optimal Solution of ( Z ) (Namely { Z m , j } ) and { t m , p m , q m }

Given s = s ˜ , where s ˜ is any feasible solution to P1, the constraint  (2e) of A ( s , Z ) can be discarded since it only involves s . Combined with Equation (1) and (10c), it is proved in Appendix A that we can obtain the following equation:
m = 1 M j = 1 M Z m , j D m , j = a ( T m = 1 M t m )
Putting the above Equation (22) into Equation (13), we can obtain a new equal constraint of (10e),
m = 1 M P m + ζ ( a ) ( T m = 1 M t m ) E
Based on  (13)–(15), (20)–(23), it is proved in Appendix B that P1 is equivalently transformed into the two-layer optimization problem shown below:
P 2 : max R S e c , { t m , Q m , P m } R S e c s.t. T R S e c m = 1 M f 1 ( t m , Q m ) + m = 1 M [ f 2 ( t m 0 , Q m 0 ) + f 2 ( t m , Q m 0 ) t m | t m = t m 0 ( t m t m 0 ) (24a) + f 2 ( t m , Q m 0 ) Q m | Q m = Q m 0 ( Q m Q m 0 ) ] 0 T R S e c m = 1 M g 1 ( t m , P m ) + m = 1 M [ g 2 ( t m 0 , P m 0 ) + g 2 ( t m , P m 0 ) t m | t m = t m 0 ( t m t m 0 ) (24b) + g 2 ( t m 0 , P m ) P m | P m = P m 0 ( P m P m 0 ) ] 0 (24c) m = 1 M t m = max { Z m , j , λ m } { T 1 a m = 1 M j = 1 M Z m , j D m , j : A ( s ˜ , Z ) } ( 1 s ˜ m ) ( t m 2 + P m + Q m ) = 0 , (24d) t m 0 , P m 0 , Q m 0 m = 1 , , M (24e) m = 1 M P m + ζ ( a ) ( T m = 1 M t m ) E (24f) m = 1 M Q m Q
In P2, the right hand of  (24c) is the crucial issue of the traveling salesman problem as shown below:
max { Z m , j , λ m } T 1 a m = 1 M j = 1 M Z m , j D m , j s . t . A ( s ˜ , Z )
Problem (25) can be optimally solved via the software Mosek [23,24]. { Z ^ m , j , λ ^ m } are supposed to be the optimal solution to the problem (25), and the optimal objective value of problem (25) is given by T ( m = 1 M j = 1 M Z ^ m , j D m , j ) / a . Then, the  (24c) constraint of P2 can be re-written as m = 1 M t m = T ( m = 1 M j = 1 M Z ^ m , j D m , j ) / a . Since other constraints of P2 are convex, P2 can be optimally solved by CVX. Denoting its solution as { R ^ S e c , t ^ m , Q ^ m , P ^ m } , the optimal { q ^ m , p ^ m } with fixed s = s ˜ can be obtained from q ^ m = Q ^ m / t ^ m and p ^ m = P ^ m / t ^ m .

2.3.3. Local Optimal Solution of s

With R ^ S e c , { Z ^ m , j } , { t ^ m , p ^ m , q ^ m , P ^ m , Q ^ m } , which were derived in a previous section, the secrecy rate, the left-hand sides of Equations  (13) and (14) with s = s ˜ , can be written as
Φ ( s ˜ ) = R ^ S e c Ξ ( s ˜ ) = ζ ( a ) ( m = 1 M j = 1 M Z ^ m , j D m , j ) + m = 1 M P ^ m Ψ ( s ˜ ) = m = 1 M Q ^ m
Therefore, problem P1 is re-written as
P 3 : max s Φ ( s ) (27a) s.t. Ξ ( s ) E (27b) Ψ ( s ) Q (27c) s 1 = 1 , s m { 0 , 1 } , m 2
To solve P3, an effective way is to apply the neighborhood search method (NSM) [19,20,21], which greatly reduces the amount of computation compared to an exhaustive search. The critical point of NSM is the idea of the neighborhood N ( · ) . Taking s ( 0 ) = [ 1 , 0 , , 0 ] T , for example, the neighborhood N ( s ( 0 ) ) is
N ( s ( 0 ) ) = { s { 0 , 1 } M : | | s s ( 0 ) | | 0 L , s 1 = 1 }
where L 1 is the size of neighborhood [21], and for arbitrary s ( n ) , the neighborhood N ( s ( n ) ) is obtained in Algorithm  1.
Algorithm 1 Computing the neighborhood N ( s ( n ) )
1:
Initialize s ( n ) (i.e., for n = 0, s ( 0 ) = [ 1 , 0 , , 0 ] T ) and a proper L.
2:
Flip the binary values of { s m } according to  (28).
3:
Output N ( s ( n ) ) .

2.3.4. Summary of Algorithm

At the beginning, we start from a feasible solution of s = s ( 0 ) and compute Φ ( s ( 0 ) ) by solving P2 with s = s ( 0 ) . Then, we randomly select a candidate solution s N ( s ( 0 ) ) and compute Φ ( s ) . Next, we compare Φ ( s ) with Φ ( s ( 0 ) ) . If Φ ( s ) Φ ( s ( 0 ) ) , we update s ( 1 ) with s ( 1 ) = s and view s ( 1 ) as a new feasible solution to construct the next neighborhood. Otherwise, we check the N ( s ( 0 ) ) to determine whether there are points not yet being sampled. If yes, we find another point within the neighborhood N ( s ( 0 ) ) and proceed to the above steps; otherwise, we terminate the procedure.
To obtain the local optimal solution of s , we repeat the above process and obtain a sequence of { s ( 0 ) , s ( 1 ) , s ( 2 ) , } . The convergence point is guaranteed to be a local optimal solution to P1 [14]. To summarize the process given above, an algorithm for obtaining the local optimal solution to P3 (equal to P1) is proposed as Algorithm  2.
In terms of computational complexity, the computing problem (25) requires O ( ( M 1 ) 2 · 2 M 1 ) in the worst case [14,25]. Solving P2 by CVX requires a complexity of O ( ( 3 M + 1 ) 3.5 ) [14,26] due to the fact that P2 has 3 M + 1 variables. Therefore, the complexity order of Algorithm  2 is dominated by O ( X · [ ( M 1 ) 2 · 2 M 1 + ( 3 M + 1 ) 3.5 ] ) , where X is the number of iterations.
Algorithm 2 Proposed local optimal solution to P1
1:
Repeat
2:
Select a candidate s from N ( s ( n ) ) , where N ( s ( n ) ) is obtained through Algorithm  1.
3:
Set s = s , and solve P2 to obtain Φ ( s ) (namely R S e c ).
4:
If Φ ( s ) Φ ( s ( n ) ) , update s ( n + 1 ) s and n n + 1 .
5:
Else go to step 2.
6:
Until Convergence.

3. Results

Numerical results are provided in this section to evaluate the performance of the resource-constrained two-way relay network. In particular, the distance-dependent path-loss model ϱ i , m = ϱ 0 · ( d i , m d 0 ) α is adopted, where d i , m is the distance from user 1 (Alice: user 1; Bob: user 2) to the mth stopping point of the relay; ϱ 0 = 10 3 is the path loss at distance d 0 = 1 m; and α is the path-loss exponent set to be 2.5 [6,27]. Based on the path-loss model, channels h m and g m are generated according to CN ( 0 , ϱ i , m I N ) . Similarly, the wiretap channels h e , and g e , m are generated according to CN ( 0 , ϱ e I N ) and CN ( 0 , ϱ e , m I N ) respectively, where ϱ e and ϱ e , m are the distance-dependent path loss of uplink and downlink wiretap channels, respectively. The receiver noise powers are set to σ r 2 = σ u 2 = 70 dBm and σ e 2 = 60 dBm. Furthermore, within the duration of T = 50 s, the energies available at Alice and relay are Q = 300 mJ and E = 1000 J, respectively. Each point in the figures is obtained by averaging over 100 simulation runs.
Based on the above settings, we simulate the secrecy rate map in a 20 m × 20 m = 400 m 2 square area [14,27], which is a typical size of a smart warehouse. Inside this map, 2 IoT users, 1 eavesdropper, 1 relay with 8 ( N = 8 ) antennas, and M = 15 vertices representing stopping points are randomly scattered, with the eavesdropper being near to the starting point of the relay.
To verify the convergence of Algorithm 2 in the previous section, Figure 3 shows the relationship between the secrecy rate and the number of iterations. It can be seen that with L = 3 , a stable result is obtained. This verifies the convergence of our proposed algorithm with a moderate number of iterations.
In order to illustrate the proposed scheme’s performance gains, Figure 4 shows a comparison between the fixed relay case and mobile relay scheme. The secrecy rate under the mobile relay scheme is much higher than that of the fixed case, which is almost zero due to the relay being near to Eve. Moreover, the performance gap concisely quantifies the secrecy rate gain brought by mobile relay, which demonstrates the advantage of employing movement of the relay.
To gain more insight into the mobile relay scheme, Figure 5 can be observed, from which it can be observed that Algorithm 2 can automatically determine where to move and how far to move. The relay can smartly avoid the dangerous zones that are close to the eavesdropper.
Furthermore, to show how the mobile relay scheme works effectively, we set σ e 2 = 90 dBm and obtained Figure 6. Compared with Figure 5 ( σ e 2 = 60 dBm), it can be seen in Figure 6 that the visiting path includes more far-way stopping points. This is because when the eavesdropper’s noise power is decreased, denoting that Eve has a stronger wiretap ability, the mobile relay has to move far way to guarantee secure transmission.

4. Discussion

In this section, we compare our proposed scheme and algorithms with state-of-the-art methods from the literature.
Unlike [1,2,3,4,5], which illustrate a four-terminal relay-eavesdropper network, there is no direct link between the source (Alice) and legitimate destination (Bob) in our system model due to the long distance between them and limited transmit power at Alice; therefore, the channel model and subsequent signal analysis are quite different from those in [1,2,3,4,5]. Moreover, in contrast to [2,3,4] with the relay’s location variation restricted in a line, the relay in our scheme moves around in a two-dimensional (2D) space, which is more complicated. In particular, unlike [3], where the relay assists the wire tapper rather than the destination, the mobile relay in our scheme helps the destination and suppresses the eavesdropper.
Our scheme presents moving trajectories, as shown in Figure 5 and Figure 6, which are not present in [7,8,9,10]. This is because [7,8,9,10] focus on fixed relay scenarios, in which relays are not able to move. Additionally, in contrast to [7], we obtain a competitive secrecy rate versus number of iterations. However, unlike [7], the secrecy rate of the fixed relay case in our scheme is near 0, which is depicted in Figure 4. This is because the eavesdropper in our paper is very close to the relay.
Refs. [11,12,13] aim to develop unmanned aerial vehicle(UAV)-based relay systems. They indeed provide flexible moving relays to implement air-to-ground or air-to-air wireless communication, while our ground mobile vehicle-based relay system is designed to solve the ground secure transmission problem, especially the indoor complicated pitch case. However, there are some identical issues both in UAV and in our ground mobile vehicle scheme, such as joint trajectory and communication design, which is generally formulated as mixed integer non-convex optimization problem, and this kind of problem is usually nontrivial to solve due to the integer constraints and other nonlinear parts. Contrary to expectations, we all utilize successive convex optimization techniques to solve the intractable optimization problem. Nevertheless, there are other different aspects among [11,12,13] and our scheme. Firstly, there is no eavesdropper in [11,13]; thus, it is not the maximum secrecy rate but the minimum communication delay in [11] and the maximum throughput in [13]. Secondly, multi-user communication scheduling and association in [13] are regarded as the integer constraints, while in our scheme, the integer constraints are the graph mobility model. Thirdly, Ref. [12] introduces an additional UAV-based jammer to ensure secure communication against eavesdropping. In comparison with [12], no jamming is added in our scheme, which leads to a notably different system model from that in [12]. Finally, unlike [11,12,13] employing the block coordinate descent method, we propose an iterative algorithm described as Algorithm 2 with Algorithm 1 embed in it, which is capable of obtaining a local optimal solution with much lower complexity.
A future research goal is to derive the secrecy rate bounds of the resource-constrained two-way mobile relay system. Additionally, finding the global optimal solution is a consequent work plan, and the secrecy rate with cache-aided at the mobile relay may also be worth investigation.

5. Conclusions

In the current study, the secrecy rate of a ground mobile vehicle-based relay system was investigated. Firstly, an integrated graph mobility model and a secrecy rate of the mobile relay system model were proposed. The joint secure transmission and graph mobility management problem was formulated to achieve secrecy rate maximization, subject to resource constraints and mobility graph structure constraints. Then, algorithms that achieve a local optimal solution were proposed. Simulation results were presented to demonstrate that our scheme outperforms the fixed relay scheme and that the mobile relay trajectory highly depends on noise power.

Author Contributions

Conceptualization and methodology: H.W.; software: H.W. and Y.W.; validation, formal analysis, investigation, resources, visualization, and writing—original draft preparation: H.W.; writing—review and editing: H.W. and Y.W.; supervision and project administration: M.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Overseas Study Fund of Jiangsu University of Science and Technology grant number just-2018-05.

Acknowledgments

The authors are grateful to Yik-Chung Wu at the University of Hong Kong for providing the visiting researcher project; thank Shuai Wang (Southern University of Science and Technology) technique help; and acknowledge the funding support from Jiangsu University of Science and Technology.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MINLP  Mixed integer nonlinear programming
UAV  Unmanned aerial vehicles
CSI  Channel state information
SNR  Signal-to-noise ratio
NSM  Neighborhood search method

Appendix A

( Z ) * and t m * are supposed to be optimal for P1; then, ( Z ) * and t m * must activate the constraint (10c), i.e., 1 a m = 1 M j = 1 M Z m , j * D m , j + m = 1 M t m * = T . Otherwise, we can increase the value of t m such that the left-hand sides of (11) and (12) are increased. This means that the objective value of P1 can also be increased, which contradicts t m * being the optimal. Therefore, the constraint (10c) can be restricted to an equality 1 a m = 1 M j = 1 M Z m , j D m , j + m = 1 M t m = T .

Appendix B

Transformation from P1 to P2 with fixed s = s ˜ .
Based on P1’s constraints (10a) and (10b), we can obtain the following:
R S e c 1 T m = 1 M t m l o g 2 ( 1 + q m | | h m | | 2 σ r 2 ) l o g 2 ( 1 + q m | h e | 2 σ e 2 )
R S e c 1 T m = 1 M t m l o g 2 ( 1 + p m | | g m | | 2 σ u 2 ) l o g 2 ( 1 + p m | | g e , m | | 2 σ e 2 )
With the fixed s = s ˜ , an optimal solution { R * S e c , ( Z ) * } , { λ m * } , { t m * } , { p m * } , { q m * } to P1 activates (10a), (A1a), and (A1b), and the following holds:
R S e c min 1 T m = 1 M t m l o g 2 ( 1 + q m | | h m | | 2 σ r 2 ) l o g 2 ( 1 + q m | h e | 2 σ e 2 ) , 1 T m = 1 M t m l o g 2 ( 1 + p m | | g m | | 2 σ u 2 ) l o g 2 ( 1 + p m | | g e , m | | 2 σ e 2 )
(A2) shows that the objective function R S e c of P1 is a monotonically increasing function of t m ; the maximum value of R S e c in (A2) is obtained when { t m } are maximized. Since (22) holds, m = 1 M t m = T 1 a m = 1 M j = 1 M Z m , j D m , j can be obtained, and maximizing { t m } is equal to obtaining the maximum value of T 1 a m = 1 M j = 1 M Z m , j D m , j ; therefore, problem P1 is equivalently transformed into P2.

References

  1. Lai, L.; Gamal, E.H. The relay eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory 2008, 54, 4005–4019. [Google Scholar] [CrossRef]
  2. Awan, Z.H.; Zaidi, A.; Vandendorpe, L. Secure transmission over parallel relay channel. IEEE Trans. Inf. Forensics Secur. 2012, 7, 359–371. [Google Scholar] [CrossRef] [Green Version]
  3. Yuksel, M.; Erkip, E. Secure communication with a relay helping the wire-tapper. In Proceedings of the IEEE Information Theory Workshop, Lake Tahoe, CA, USA, 2–6 September 2007; pp. 595–600. [Google Scholar]
  4. Awan, Z.H.; Zaidi, A.; Vandendorpe, L. Multiacess channel with partially cooperating encoders and security constraints. IEEE Trans. Inf. Forensics Secur. 2012, 8, 1243–1254. [Google Scholar] [CrossRef] [Green Version]
  5. Zaidi, A.; Vandendorpe, L. coding schemes for relay-assisted information embedding. IEEE Trans. Inf. Forensics Secur. 2009, 4, 70–85. [Google Scholar] [CrossRef]
  6. Wang, S.; Xia, M.; Huang, K.; Wu, Y.-C. Wirelessly powered two-way communication with nonlinear energy harvesting model: Rate regions under fixed and mobile relay. IEEE Trans. Wirel. Commun. 2017, 16, 8190–8204. [Google Scholar] [CrossRef]
  7. Xu, S.; Song, X.; Gao, Y.; Li, S.; Cao, i.; Xie, Z. Secrecy-Enhancing Design for Two-Way Energy Harvesting Cooperative Networks with Full-Duplex Relay Jamming. China Commun. 2021, 5, 273–284. [Google Scholar] [CrossRef]
  8. Wu, M.R.; Song, Q.Y.; Guo, L.; Jamalipour, A. Charge-Then-Cooperate: Secure Resource Allocation for Wireless-Powered Relay Networks With Wireless Energy Transfer. IEEE Trans. Vehicular Tech. 2021, 70, 5088–5093. [Google Scholar] [CrossRef]
  9. Yan, S.; Wang, X.; Li, Z.; Li, B.; Fei, Z. Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks. China Commun. 2019, 12, 154–164. [Google Scholar] [CrossRef]
  10. Lu, X.; de Lamare, R.C. Opportunistic Relaying and Jamming Based on Secrecy-Rate Maximization for Multiuser Buffer-Aided Relay Systems. IEEE Trans. Vehicular Tech. 2020, 69, 15269–15283. [Google Scholar] [CrossRef]
  11. Bliss, M.; Michelusi, N. Trajectory Optimization for Rotary-Wing UAVs in Wireless Networks with Random Requests. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–5. [Google Scholar]
  12. Zhang, J.Y.; Wu, F.H.; Zhu, Y.T.; Xiao, L.; Yang, D.C. Joint trajectory and power optimization for mobile jammer-aided secure UAV relay network. Veh. Commun. 2021, 30, 10035. [Google Scholar]
  13. Qingqing, W.; Yong, Z.; Rui, Z. Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks. IEEE Trans. Wireless Commun. 2018, 17, 2109–2121. [Google Scholar]
  14. Wang, S.; Xia, M.; Wu, Y.-C. Joint Communication and Motion Energy Minimization in mobile ground vehicle Backscatter Communication. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  15. Bondy, J.A.; Murthy, U. Graph Theory with Applications; Elsevier: New York, NY, USA, 1976. [Google Scholar]
  16. Mei, Y.; Lu, Y.H.; Hu, Y.; Lee, C. Deployment of mobile robots with energy and timing constraints. IEEE Trans. Robot. 2006, 22, 507–522. [Google Scholar]
  17. Shu, Y.; Yousefi, H.; Cheng, P.; Chen, J.; Gu, Y.; He, T.; Shin, K.G. Near-optimal velocity control for mobile charging in wireless rechargeable sensor networks. IEEE Trans. Mobile Comput. 2016, 15, 1699–1713. [Google Scholar] [CrossRef] [Green Version]
  18. Bertsekas, D.P. Network Optimization: Continuous and Discrete Models; Athena Scientific: Nashua, NH, USA, 1998. [Google Scholar]
  19. Gendreau, M.; Potvin, J.Y. Handbook of Metaheuristics, 2nd ed.; Springer: New York, NY, USA, 2010. [Google Scholar]
  20. Neumann, F.; Wegener, I. Randomized local search, evolutionary algorithms, and the minimum spanning tree problem. Theor. Comput. Sci. 2007, 378, 32–40. [Google Scholar] [CrossRef] [Green Version]
  21. Goldstein, L.; Waterman, M. Neighborhood size in the simulated annealing algorithm. Amer. J. Math. Manage. Sci. 1988, 8, 409–423. [Google Scholar]
  22. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge Univ Press: Cambridge, UK, 2004. [Google Scholar]
  23. Laporte, G. The traveling salesman problem: An overview of exact and approximate algorithms. Eur. J. Oper. Res. 1992, 59, 231–247. [Google Scholar] [CrossRef]
  24. Belotti, P.; Kirches, C.; Leyffer, S.; Linderoth, J.; Luedtke, J.; Mahajan, A. Mixed-integer nonlinear optimization. Acta Numer. 2013, 22, 1–131. [Google Scholar] [CrossRef] [Green Version]
  25. Held, M.; Karp, R.M. A dynamic programming approach to sequencing problems. J. Soc. for Indust. Appl. Math. 1962, 10, 196–210. [Google Scholar] [CrossRef]
  26. Ben-Tal, A.; Nemirovski, A. Lectures on Modern Convex Optimization (MPS/SIAM Series on Optimizations); SIAM: Philadelphia, PA, USA, 2013. [Google Scholar]
  27. Wang, S.; Xia, M.; Wu, Y.-C. Multi-pair two-way relay network with harvest-then-transmit users: Resolving pairwise uplink-downlink coupling. IEEE J. Sel. Topics Signal Process. 2016, 10, 1506–1521. [Google Scholar] [CrossRef] [Green Version]
Figure 1. System model.
Figure 1. System model.
Applsci 11 09866 g001
Figure 2. Mobility model.
Figure 2. Mobility model.
Applsci 11 09866 g002
Figure 3. Secrecy rate vs. iterations.
Figure 3. Secrecy rate vs. iterations.
Applsci 11 09866 g003
Figure 4. Secrecy rate comparison between fixed relay case and moving relay scheme.
Figure 4. Secrecy rate comparison between fixed relay case and moving relay scheme.
Applsci 11 09866 g004
Figure 5. Path for mobile relay with M = 15 when noise power σ e 2 = 60 dBm.
Figure 5. Path for mobile relay with M = 15 when noise power σ e 2 = 60 dBm.
Applsci 11 09866 g005
Figure 6. Selected path for mobile relay with M = 15 when noise power σ e 2 = 90 dBm.
Figure 6. Selected path for mobile relay with M = 15 when noise power σ e 2 = 90 dBm.
Applsci 11 09866 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, H.; Wang, Y.; Wu, M. Secrecy Rate of Resource-Constrained Mobile Relay Model under Two-Way Wiretap Channel. Appl. Sci. 2021, 11, 9866. https://doi.org/10.3390/app11219866

AMA Style

Wang H, Wang Y, Wu M. Secrecy Rate of Resource-Constrained Mobile Relay Model under Two-Way Wiretap Channel. Applied Sciences. 2021; 11(21):9866. https://doi.org/10.3390/app11219866

Chicago/Turabian Style

Wang, Hongmei, Yinchun Wang, and Meng Wu. 2021. "Secrecy Rate of Resource-Constrained Mobile Relay Model under Two-Way Wiretap Channel" Applied Sciences 11, no. 21: 9866. https://doi.org/10.3390/app11219866

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop