Abstract
This paper investigates the secure transmission for buffer-aided relay networks in the Internet of Things (IoT) in the presence of multiple passive eavesdroppers. For security enhancement, we adopt the max-link relay selection policy and propose three secure transmission schemes: (1) non-jamming (NJ); (2) source cooperative jamming (SCJ); and (3) source cooperative jamming with optimal power allocation (SCJ-OPA). Moreover, to analyze the secrecy performance comprehensively, two eavesdropping scenarios, i.e., non-colluding eavesdroppers (NCE) and colluding eavesdroppers (CE) are considered. Based on this, by modeling the dynamic buffer state transition as a Markov chain, we derive the exact closed-form expressions of the secrecy outage probability, the average secrecy throughput, and the end-to-end delay for each schemes. The analytical analysis and simulation shows that the SCJ-OPA scheme achieves similar performance as the NJ scheme when the total transmit power is small. On the other hand, when the transmit power is high, the performance achieved by SCJ-OPA is similar to that of SCJ. Thereby, the SCJ-OPA scheme can achieve better performance across the entire total transmit power, which makes up the defects of NJ and SCJ exactly.
1. Introduction
The Internet of things (IoT) serves a crucial architecture in future wireless communication systems, which can connect all things (e.g., mobile devices, sensors, and vehicles) to the Internet and enable these physical devices with sensorial and computing capabilities to cooperate with each other and achieve common goals [1,2,3]. Numerous fields such as industry, medical and transportation are expected to deploy IoT applications widely [4]. Moreover, due to the resource constraints of IoT devices (e.g., energy and computing capability), relay transmission is seen as a promising solution to solve the problem above in IoT networks, which has attracted great research interest [5,6,7]. Specifically, in [6], the unmanned aerial vehicle (UAV) was considered as the relay node firstly, and then the outage probability and throughput was investigated in the UAV relay assisted IoT networks enhanced with energy harvesting. In [7], G. Chen et al. considered both half-duplex (HD) and full-duplex (FD) decode-and-forward (DF) relaying schemes in multi-hop IoT networks, whose operating mode was similar to the one in [8], and studied the outage probability of the system with randomly located interferers.
However, since the best link may be not available, the relay has to follow the fixed transmission strategy to transmit the data packet [9]. That is to say, the selected relay receives the data packets from the source node in the first hop and then forwards it to the destination node immediately in the second hop. Recently, equipping data buffer at the relays has drawn considerable attentions due to its ability of offering high performance gains and extra degrees of freedom, which is called “buffer-aided relay” [10,11,12,13]. In [12], A. Ikhlef et al. proposed the max-max relay selection (MMRS) scheme for DF relay networks. In [13], the max-link relay selection scheme was proposed, which could achieve better performance than MMRS by selecting the best link among all the available links. Nowadays, several works have considered applying the buffer-aided relay to IoT for increasing the reliability of communication networks [14,15,16]. The buffer-aided successive relay selection scheme for energy harvesting IoT networks based on DF and amplify-and-forward (AF) relay is investigated in [15]. In [16], a novel prioritization-based buffer-aided relay selection scheme was proposed, which can seamlessly combine both non-orthogonal multiple access (NOMA) and orthogonal multiple access (OMA) transmission in the IoT.
On the other hand, the broadcast characteristics of the wireless channels makes the wireless networks vulnerable to malicious attacks by illegitimate nodes, which presents a new challenge for the security of data transmission [17,18]. The encryption technique employed at the upper layer is a traditional method against eavesdropping [19]. However, this traditional technique not only imposes extra computational complexity resulted from the secret key management but can also be easily decrypted with the rapid improvement of the calculation level and thus being inappropriate to provide security services for IoT networks especially. Alternatively, physical layer security has been proposed as an effective approach to prevent the eavesdroppers from intercepting the information transmission by exploiting the randomness nature of the wireless channels [20,21,22]. Inspired by this, lots of research efforts have focused on the security of IoT networks from a physical layer security perspective [23,24,25,26]. In [23], the secrecy outage performance was studied for the wireless communication in IoT under eavesdropper collusion. In [24], three different scheduling schemes were designed to perform secure communication in an untrusted-relay-aided IoT uplink transmission. An on-off based multiuser secure transmission scheme was proposed for the heterogeneous IoT downlink networks in [25]. Then, the authors optimized several parameters to maximize the network secrecy throughput. Additionally, P. Huang et al. further examined the maximization of the secrecy sum rate for the downlink IoT systems with a novel relay-aided secure transmission scheme [26]. In recent years, some works have studied the physical layer security of buffer-aided relay networks [27,28,29]. In [27], G. Chen et al. proposed a novel max-ratio relay selection scheme to enhance the physical layer security for buffer-aided DF networks. For multi-relay multiple-input multiple-output (MIMO) cooperative networks, a buffer-aided joint transmit antenna and relay selection (JTARS) scheme was proposed in [28], and then the expression of the secrecy outage probability in closed-form was derived to assess the impact of different parameters on the secrecy performance. The closed-form expression of the secrecy outage probability was also derived in [29] to understand the secrecy performance of a buffer-aided underlay cognitive relay network. However, the secure transmission of buffer-aided relay network in IoT is an open issue to study. To the best of our knowledge, the design of secure transmission schemes for buffer-aided relay IoT networks has not been examined.
Inspired by these observations above, we investigate the secure transmission for buffer-aided relay IoT networks. To enhance the secrecy performance of the considered system, we adopt the max-link relay selection policy and propose three secure transmission schemes. The main contributions of this paper are summarized as follows:
- We propose three secure transmission schemes, i.e., non-jamming (NJ), source cooperative jamming (SCJ) and source cooperative jamming with optimal power allocation (SCJ-OPA), to enhance the secrecy performance for buffer-aided relay networks in IoT scenarios.
- By modeling the dynamic buffer state transition as a Markov chain, we derive the closed-form expressions of the secrecy outage probability, the average secrecy throughput and the end-to-end delay under the non-colluding eavesdroppers (NCE) and colluding eavesdroppers (CE) scenarios, respectively. Based on these expressions, the impacts of different parameters on the secrecy performance can be evaluated effectively.
- Our findings highlight that although the NJ and the SCJ schemes can achieve good secrecy performance when the total transmit power is small or large, respectively, the SCJ-OPA scheme outperforms the other two schemes across the whole transmit power range of interest, which can make up the defects of the other two schemes.
Table 1 provides a list of the fundamental symbols throughout this paper. The remainder of the paper is organized as follows. In Section 2, we introduce the considered system model and the relay selection policy. Section 3 presents three transmission schemes. In Section 4, we investigate the several key performance metrics of the system, respectively. Section 5 provides simulation results. Finally, the conclusion is given in Section 6.
Table 1.
List of the main notations and parameters.
2. System Model and Relay Selection Policy
2.1. System Model
Let us consider the uplink transmission for the buffer-aided relay network in IoT application, as illustrated in Figure 1, which consists of a source sensor S, a controller D, M half-duplex intermediate relay sensors and K passive eavesdroppers . In the network, all nodes are equipped with a single antenna and each relay is also equipped with a data buffer of finite size L. Note that the data packets in the buffer obey the “first-in-first-out” rule. Therefore, the time that a data packet is transmitted from the relay sensor to the controller depends on the length of the queue. On the other hand, it takes only one time slot to transmit a packet from the source sensor to the relay sensor. Furthermore, the and links are referred to as the main channel, and the and links are referred to as the wiretap channels. All channels are modeled as the quasi-static flat Rayleigh fading, hence the channel coefficients keep unchanged in the coherent time of the channels [30]. Since the impact of significant path loss, the direct link between S and D is assumed unavailable. That is to say, the source sensor S has to communicate with the controller D via the assistance of multiple intermediate relay sensors [27,31,32].
Figure 1.
System Model.
In this paper, we denote the complex Gaussian random variable as the channel coefficient of link . According to this, the channel gain can be regarded as an exponentially distributed random variable, which mean it is equal to , where denotes the expectation operation, and and represent the distance of the link and the path loss factor, respectively. Specifically, the main channels are assumed independent and identically distributed (i.i.d), i.e., . Besides, due to the energy limitation of the sensors nodes in IoT networks, we consider the total power constraint , where and represent the maximum transmit power of the source and the relay sensor, and denotes the total power.
2.2. Relay Selection Policy
In this subsection, we investigate the max-link relay selection considering the secrecy constraints [13]. To further probe into this relay selection policy mentioned above, the number of the data packets in each buffer is modeled as a state firstly. We define as a certain buffer state, where denotes the number of data packets in buffer at state .
For the buffer-aided relay , when its buffer is full or empty, it means that the relay cannot receive or transmit data packet, i.e., or . According to this, and denote that the relay can be chosen to receive and transmit data packet at state . In other words, the corresponding link is available. On the contrary, and represent the link in the first and second hops corresponding to the relay is not available, respectively. Hence, we have and .
Then, the number of available links at state in the first or the second hops are, respectively, given by
Based on [13], the relay selection policy can be mathematically expressed as
where denotes the largest channel gain among available links in the first hop. Similarly, is the largest channel gain among available links in the second hop.
From the above expression, we find that the relay with the strongest channel gain is always selected for data transmission. Specifically, when is selected for reception, it receives and decodes the data packet and the packet can be stored in the buffer . Hence, the number of packets in the buffer increases by one. Similarly, when is chosen for transmission, the controller D receives and decodes the data packet, and the buffer discards the packet. Thereby, the number of the packets correspondingly decreases by one. Furthermore, if the whole communication between the source sensor S and the controller D is not successful, the buffer state will remain unchanged.
3. Transmission Schemes
In this section, a conventional non-jamming scheme and two source cooperative jamming schemes are presented for the considered buffer-aided relay IoT networks.
3.1. NJ Scheme
The total transmission is divided into two hops. In the first hop, the source sensor S sends the signal to the relay sensor while intercepted by K eavesdroppers . Hence, the received SNR at and can be, respectively, expressed as
where denotes the transmit power of the source sensor, which obeys the uniform power allocation for ease of analysis. and represent the channel gains of link and , is the variance of the additive white Gaussian noise (AWGN).
Similar to the first hop, the received SNR at D and can be, respectively, given by
where is the transmit power of the selected relay sensor, and and denote the channel gains of link and , respectively.
Due to the presence of multiple eavesdroppers, we take both NCE and CE scenarios into account.
In the NCE scenario, the eavesdroppers decode information individually without interactions [33]. Hence, the received signal-to-noise ratio (SNR) at the eavesdroppers of the first and second hops can be, respectively, given by
In the CE scenario, all eavesdroppers can exchange the information with each other and adopt the maximal ratio combining (MRC) for enhancing the intercept ability [34,35]. Thus, the instantaneous SNR of the eavesdroppers’ channels for the first and second hops are expressed as
where denotes the channel vector between the source sensor and the eavesdroppers. Similarly, represents the channel vector between the selected relay sensor and the eavesdroppers.
The NJ scheme is a benchmark invoked for the purpose of comparison, which can also be applicable for the practical application scenario due to it lower complexity.
3.2. SCJ Scheme
In this case, when the second hop is selected, the source sensor can send jamming signals to the eavesdroppers with the transmit power , which degrades the quality of eavesdroppers’ channels effectively without interfering other nodes. Furthermore, due to the total power constraint, we have , where denotes the transmit power of the source sensor when transmitting useful information. Similar to the NJ scheme, the power allocation follows the uniform allocation rule, i.e., , .
The first hop of the SCJ scheme is the same as the NJ scheme, hence we have and . In the second hop, the received signal-to-interference-plus-noise-ratio (SINR) at is given by
where denotes the link of when S acts as a jamming node.
Thus, for the NCE scenario, the received SNR and SINR at the eavesdroppers of the first and second hops can be written as
For the CE mode, the received SNR and SINR of the eavesdroppers’ channel for the first and second hops are given by
where represents the channel vector between the source sensor and the eavesdroppers when the source acts as a jamming node.
3.3. SCJ-OPA Scheme
To further enhance the physical layer security for the SCJ scheme, the optimal power allocation operation is employed at the source sensor node under the SCJ-OPA scheme. Similar to the section above, we still assume that . Then, we have . Given and where denotes the power allocation factor. We aim to find the optimal power allocation factor to minimize the secrecy outage probability of the considered system. Therefore, the optimization problem can be written as
where represents the overall secrecy outage probability of the system. We derive the expression of the secrecy outage probability and solve the optimization in the following section. Moreover, making an appropriate substitution of the parameters, i.e., and , the received SNR or SINR at the corresponding node under the SCJ-OPA scheme can be obtained easily, hence is omitted.
Now, according to the authors of [36,37], the achievable secrecy rate of the first and second hops can be, respectively, expressed as
where , , , .
4. Performance Analysis
4.1. Secrecy Outage Analysis
In this subsection, we investigate the secrecy outage performance of the considered system. According to [13], considering all of the possible states, the secrecy outage probability of the system is given by
where denotes the total number of states, and denote that when the state is , the corresponding stationary probability and the secrecy outage probability. represents the secrecy outage threshold. Besides, to make the following analysis traceable, we define , and the noise variance is .
4.1.1. NJ Scheme
According to [28], the secrecy outage probability at state under the NJ scheme is given by
Theorem 1.
The CDF of under the NCE scenario is given by
Proof of Theorem 1.
See Appendix A. □
Theorem 2.
The CDF of under the CE scenario can be written as
Proof of Theorem 2.
See Appendix B. □
It is worth noting that, if we replace some parameters, i.e., , , and , we can derive the CDF of due to the symmetry of the first and second hops.
Next, we proceed with the stationary probability under the NJ scheme . Firstly, we denote as the set whose states can be transferred from state successfully within one step. Then, according to the authors of [13,38,39], we denote as the state transition matrix of the Markov chain under the NJ scheme, where the entry denotes the transition probability of moving from state to the state , where is an element in set .
As can be seen from the relay selection policy, if the packet is not successfully transmitted to the corresponding node, the buffer state keeps unchanged. In other words, the secrecy outage event occurs. On the other hand, when the current state transforms to another state within one step, i.e., , then the corresponding transmission is successful. From these observations, the entry of is given by
Based on this, we can obtain the stationary probability vector in the following.
Theorem 3.
The stationary probability vector of the NJ scheme is given by
where , , is the identity matrix and is the all-ones matrix.
Proof of Theorem 3.
The proof can be found in [13]. □
4.1.2. SCJ Scheme
The secrecy outage probability at state under the SCJ scheme can be represented as
Theorem 4.
The CDF of under the NCE scenario is given by
where , , and are given by
Proof of Theorem 4.
See Appendix C. □
Theorem 5.
The CDF of under the CE scenario can be presented as
where Φ is given by
with , and can be expressed as
where is the upper incomplete Gamma function [40] (eq. (8.350.2)), and is the exponential integral function [40] (eq. (8.211.1)).
Proof of Theorem 5.
See Appendix D. □
Recalling the first hop of the SCJ scheme is the same as the NJ scheme, we can derive by making a substitution of some parameters. Furthermore, the stationary probability vector of the SCJ scheme can also be obtained following the similar analysis as in Theorem 3. Hence, the secrecy outage probability for the NCE and CE scenarios under the SCJ scheme in closed-form can be derived by substituting Equation (26) and into Equation (20).
4.1.3. SCJ-OPA Scheme
Since the difference between the SCJ and the SCJ-OPA scheme is that the latter operates the optimal power allocation at the source sensor, making a substitution of the parameters , and , we can obtain the secrecy outage probability for the NCE and CE scenarios under the SCJ-OPA scheme easily.
However, recalling the closed-form expression and the optimization problem mentioned above, we find that an explicit expression for is intractable. Instead, considering that the value space of is limited, thus the optimal result can be obtained by numerical calculations, i.e., the grid-search solution or the straightforward search solution, and the computer complexity is also acceptable.
4.2. Average Secrecy Throughput and End to End Delay
The average secrecy throughput can measure the average rate of the transmitted information which is kept confidential to the eavesdropper. Resorting to the work in [24,41], the average secrecy throughput can be expressed as
where the factor is because every packet reaches the controller takes two time slots.
Recalling the definition of the secrecy outage probability, the value of is increased with the increase of . Thus, from Equation (33), we observe that the function of the average secrecy throughput with respect to is a unimodal function. When is small or large, only the lower average secrecy throughput can be obtained. That is to say, there exists an optimal secrecy rate which can maximum the average secrecy throughput of the considered system. The optimization problem can be given by
Following a similar approach, we find the optimal by utilizing the grid-search or the straightforward search techniques.
In the buffer-aided relay IoT network, the end-to-end delay is the time slots it takes for a data packet to arrive at the controller from the source sensor, which is given by
where the term “1” represents the delay at the source sensor. This is because each packet takes only one time slot when it is sent from the source sensor to the relay sensor. denotes the average delay at the intermediate relay sensors. On the other hand, considering the probability of selecting a relay sensor among all M relays is the same, we can obtain and , where denotes the delay at relay , and represents the average secrecy throughput at relay .
Then, we denote as the queuing length in the buffer of relay at state . Therefore, considering all of the possible states, the average queuing length at can be written as
With the help of the Little’s law [42], the average delay at relay is given by
Finally, based on the analysis above, the average end-to-end delay can be expressed as
5. Simulation Analysis
In this section, Monte-Carlo simulation results are presented to validate the theoretical analysis derived in the previous sections for the three transmission schemes. Without loss of generality, the normalized distance is set as follows: , . The path loss factor is set to be 3. From the figures, the theoretical curves are in exact agreement with the simulation results, which verifies the accuracy of our theoretical analysis.
Figure 2 illustrates the secrecy outage probability versus the total transmit power budget for the three proposed transmission schemes. As shown in Figure 2, the secrecy outage probability decreases with the increase of until a secrecy outage performance floor occurs at high transmit power. This is intuitive since both capacities of the main and wiretap channels improve with the increase of the transmit power. Furthermore, we observe that, in both the NCE and CE scenarios, the NJ scheme outperforms the SCJ scheme at the low total transmit power, while the opposite holds in the high total transmit power. For the SCJ-OPA scheme, almost the same performance as the NJ scheme can be obtained at the low transmit power, and, when is large, a similar performance as the SCJ scheme can also be achieved, which indicates that the SCJ-OPA scheme covers the shortages of the NJ and SCJ schemes exactly. In addition, it is worth noting that the secrecy performance of the CE scenario is worse than that of the NCE scenario under the same conditions, which is because that the MRC scheme utilized by the CE mode can enhance the ability of eavesdropping.
Figure 2.
Secrecy outage probability vs. the total transmit power budget for the three proposed transmission schemes when 0.6 (bit/s/Hz), 3, 2, .
Figure 3 plots the average secrecy throughput of the three proposed transmission schemes versus the total transmit power budget . It is observed that the average secrecy throughput increases until it converges to a fixed value with the increase of the total transmit power. In addition, we further observe that the NJ and SCJ-OPA schemes outperforms the SCJ scheme in terms of the average secrecy throughput when is not large. At the high , the SCJ and SCJ-OPA schemes achieve better performance than the NJ scheme. In other words, utilizing the SCJ-OPA scheme can improve the secrecy performance of the considered system, especially when the total power is small or large.
Figure 3.
Average Secrecy throughput vs. the total transmit power budget for the three proposed transmission schemes when 1 (bit/s/Hz), 2, .
Figure 4 investigates the impact of the secrecy rate on the average secrecy throughput for the NCE and CE scenarios, respectively. From these figures, we find that, for both NCE and CE scenarios, the average secrecy throughput first increases with the increase of and then decreases when increases beyond a certain value, which demonstrates the accuracy of the analysis in Section 4.2. Besides, it can be observed that when the total transmit power is small, i.e., 10 dB, the SCJ-OPA scheme obtains a similar average secrecy throughput as the NJ scheme, which are both better than the SCJ scheme. On the other hand, when the total transmit power is large, i.e., 20 dB, the SCJ-OPA and SCJ schemes are superior to the NJ scheme, which is consistent with the previous analysis and simulation.
Figure 4.
Average Secrecy throughput vs. the secrecy rate for the three proposed transmission schemes under the NCE (a) and CE (b) scenarios when 2, 3, , 10, 20 dB.
Figure 5 presents the end-to-end delay for the three proposed transmission schemes versus the total transmit power budget . As shown in Figure 5, the end-to-end delay is significantly decreased as the increases in both the NCE and CE scenarios. Similarly, when the increases beyond a certain value, the end-to-end delay remains unchanged. That is to say, a performance floor occurs. This is because the secrecy outage probability tends to a fixed value at this moment. Furthermore, we can also observe that the SCJ-OPA scheme achieves better performance in terms of the end-to-end delay than the other two schemes across the entire transmit power range of interest, which indicates the advantage of the SCJ-OPA scheme.
Figure 5.
End to end delay vs. the total transmit power budget for the three proposed transmission schemes when 0.6 (bit/s/Hz), 2, 3.
Figure 6 plots the secrecy outage probability versus the buffer size L for the three proposed transmission schemes under the NCE and CE scenarios, respectively. As can be readily observed, as the buffer size increases, the achieved performance approaches the performance floor. Specifically, for both NCE and CE scenarios, the NJ and SCJ-OPA schemes outperform the SCJ scheme when is small. On the contrary, the SCJ and SCJ-OPA schemes are superior to the NJ scheme at the condition of the high transmit power, which matches the simulation above.
Figure 6.
Secrecy outage probability vs. the buffer size L for the three proposed transmission schemes under the NCE (a) and CE (b) scenarios when 0.5 (bit/s/Hz), 2, 3, 5, 15 dB.
Figure 7 shows the impact of the power allocation factor on the secrecy outage probability for the SCJ-OPA scheme. The curves shown in Figure 7 are calculated by using the grid-search or the straightforward search methods. It is clearly seen that the optimal power allocation factor is decreased with the increase of . That is to say, more power is allocated to transmit the useful information at the source sensor when is not large. This is because, when is too small, only few packets can be sent from the source sensor to relay sensors in the first hop. Thereby, not enough data packets can be forwarded to the controller. Even if the jamming power is large in the second hop, it cannot improve the secrecy performance of the whole network. On the other hand, with the increase of , the dominant factor that affects the secrecy performance of the considered system changes from the information transmit power to the jamming transmit power at the source sensor, which is the exact reason the optimal power allocation factor becomes smaller gradually.
Figure 7.
Secrecy outage probability vs. the power allocation factor for the SCJ-OPA scheme under the NCE and CE scenarios when 0.5 (bit/s/Hz), 2, 2, and 12, 20, 30 dB.
6. Conclusions
In this paper, we propose three secure transmission schemes for buffer-aided relay networks in IoT. To take full advantage of buffer-aided relay, the max-link relay selection policy is adopted to enhance the secrecy performance by selecting the main link with the best rate. Furthermore, for each schemes, we also derive the exact expressions of the secrecy outage probability, the average secrecy throughput and the end-to-end delay in closed-form by utilizing the Markov chain theory under both the NCE and CE scenarios, respectively, which provides an effective way to evaluate the secrecy performance of each proposed scheme. Our numerical results indicate that, when the total power is small, the performance achieved by the SCJ-OPA scheme is similar to that of the NJ scheme. On the other hand, the SCJ-OPA scheme can also achieve almost identical performance as the SCJ scheme when is high. In other words, the SCJ-OPA scheme achieves better performance across the whole transmit power range of interest than the other two schemes, which is because the factor can be dynamically allocated under different total transmit power. These results could be useful in the design of buffer-aided relay IoT networks under multiple eavesdroppers scenarios.
Author Contributions
C.W. and W.Y. conceived the model; C.W. performed the simulation results and wrote the paper; and W.Y., Y.C. provided some suggestions and revised the paper.
Funding
This work was supported by the National Natural Science Foundation of China under Grant Nos. 61771487 and 61371122.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A
Let us define and , according to the order statistic, the CDF of under the NCE scenario can be expressed as
According to the relay selection policy and the analysis above, the CDF of and the PDF of are, respectively, expressed as
Appendix B
Assuming , the PDF of can be presented as [44]
Following the similar analysis as Equation (A1), we can derive the CDF of under the CE scenario, which can be expressed as
Appendix C
We first define , and the CDF of can be expressed as
In view of the selection of a relay sensor that is independent of the eavesdroppers’ channel, we have the PDF of and as follows:
and
By substituting Equations (A7) and (A8) into Equation (A6), the CDF of can be easily obtained, which is given by
Next, we can derive the PDF of by taking the derivative of with respect z. We also denote and the CDF of can be easily derived by making a substitution of some parameters. Following a similar approach, the CDF of under the NCE scenario can be given by
Substituting the CDF of and the PDF of into Equation (A10), and denoting , , the CDF of can be further expressed as
For item , there are two cases to consider, i.e., and . We can obtain the corresponding terms for two cases according to the equalities [40] (eq. (3.352.4)) and [40] (eq. (3.353.2)), respectively. Similarly, the item can be easily derived when we utilize [40] (eq. (3.353.2)) to solve the corresponding integral. Finally, the desired results in Theorem 4 can be easily obtained after some mathematical manipulations.
Appendix D
Denoting and , the CDF of under the CE scenario can be given by
By invoking the PDF of and and the CDF of into Equation (A12), we can obtain the expression as follows:
Now, by utilizing [40] (eq. (3.351.3)) and the binomial theorem, we have
where and for the analysis tractable. Hence, can be further written as
Obviously, to obtain , we have to calculate first. For the item , there are also two cases to consider, i.e., and . For , with the help of [40] (eq. (3.351.3)), we have , which yields . On the other hand, for , by changing variable and using the binomial theorem, we have
By utilizing [40] (eq. (3.351.2)), [40] (eq. (3.352.2)) and [40] (eq. (3.353.1)), the item as can be derived, as shown in Equation (32). Finally, the desired result in Theorem 5 can be derived by pulling everything together.
References
- Xu, L.; He, W.; Li, S. Internet of things in industries: A survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar] [CrossRef]
- Mukherjee, A. Physical-layer security in the Internet of things: Sensing and communication confidentiality under resource constraints. Proc. IEEE 2015, 103, 1747–1761. [Google Scholar] [CrossRef]
- Xu, Q.; Ren, P.; Song, H.; Du, Q. Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 2016, 4, 2840–2853. [Google Scholar] [CrossRef]
- Chen, Y.; Han, F.; Yang, Y.; Ma, H.; Han, Y.; Jiang, C.; Lai, H.; Claffey, D.; Safar, Z.; Liu, K. Time-reversal wireless paradigm for green Internet of things: An overview. IEEE Internet Things J. 2014, 1, 81–98. [Google Scholar] [CrossRef]
- Lyu, B.; Yang, Z.; Guo, H.; Tian, F.; Gui, G. Relay cooperation enhanced backscatter communication for Internet-of-things. IEEE Internet Things J. 2019, 6, 2860–2871. [Google Scholar] [CrossRef]
- Ji, B.; Li, Y.; Zhou, B.; Li, C.; Song, K.; Wen, H. Performance analysis of UAV relay assisted IoT communication network enhanced with energy harvesting. IEEE Access 2019, 7, 38738–38747. [Google Scholar] [CrossRef]
- Chen, G.; Coon, J.; Mondal, A.; Allen, B.; Chambers, J. Performance analysis for multi-hop full-duplex IoT networks subject to poisson distributed interferers. IEEE Internet Things J. 2019, 6, 3467–3479. [Google Scholar] [CrossRef]
- Massri, K.; Vitaletti, A.; Vernata, A.; Chatzigiannakis, I. Routing protocols for delay tolerant networks: A reference architecture and a thorough quantitative evaluation. J. Sens. Actuator Netw. 2016, 5, 6. [Google Scholar] [CrossRef]
- Michalopoulos, D.; Karagiannidis, G. Performance analysis of single relay selection in Rayleigh fading. IEEE Trans. Wirel. Commun. 2008, 7, 3718–3724. [Google Scholar] [CrossRef]
- Xia, B.; Fan, Y.; Thompson, J.; Poor, H. Buffering in a three-node relay network. IEEE Trans. Wirel. Commun. 2008, 7, 4492–4496. [Google Scholar] [CrossRef]
- Zlatanov, N.; Schober, R.; Popovski, P. Buffer-aided relaying with adaptive link selection. IEEE J. Sel. Areas Commun. 2013, 31, 1530–1542. [Google Scholar] [CrossRef]
- Ikhlef, A.; Michalopoulos, D.; Schober, R. Max-max relay selection for relays with buffers. IEEE Trans. Wirel. Commun. 2012, 11, 1124–1135. [Google Scholar] [CrossRef]
- Krikidis, I.; Charalambous, T.; Thompson, J. Buffer-aided relay selection for cooperative diversity systems without delay constraints. IEEE Trans. Wirel. Commun. 2012, 11, 1957–1967. [Google Scholar] [CrossRef]
- Nasir, H.; Javaid, N.; Raza, W.; Guizani, M.; Alrajeh, N.; Alabed, M. Virtual-link relay selection scheme for buffer-aided IoT based cooperative relay networks. IEEE Access 2018, 6, 74648–74659. [Google Scholar] [CrossRef]
- Shabbir, G.; Ahmad, J.; Raza, W.; Amin, Y.; Akram, A.; Loo, J.; Tenhunen, H. Buffer-aided successive relay selection scheme for energy harvesting IoT networks. IEEE Access 2019, 7, 36246–36258. [Google Scholar] [CrossRef]
- Alkhawatrah, M.; Gong, Y.; Chen, G.; Lambotharan, S.; Chambers, J. Buffer-aided relay selection for cooperative NOMA in the Internet of things. IEEE Internet Things J. 2019, 6, 5722–5731. [Google Scholar] [CrossRef]
- Mukherjee, A.; Fakoorian, S.; Huang, J.; Swindlehurst, A. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
- Bloch, M.; Barros, J.; Rodrigues, M.; Mclaughlin, S. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
- Liang, Y.; Poor, H.; Shamai, S. Secure communication over fading channels. IEEE Trans. Inf. Theory 2008, 54, 2470–2492. [Google Scholar] [CrossRef]
- Nan, Y.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Renzo, M. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar]
- Zou, Y.; Zhu, J.; Wang, X.; Leung, V. Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw. 2015, 29, 42–48. [Google Scholar] [CrossRef]
- Zhang, Y.; Shen, Y.; Wang, H.; Yong, J.; Jiang, X. On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 2016, 13, 1281–1293. [Google Scholar] [CrossRef]
- Chen, D.; Yang, W.; Hu, J.; Cai, Y.; Tang, X. Energy-efficient secure transmission design for the Internet of things with an untrusted relay. IEEE Access 2018, 6, 11862–11870. [Google Scholar] [CrossRef]
- Hu, J.; Yang, N.; Cai, Y. Secure downlink transmission in the Internet of things: How many antennas are needed? IEEE J. Sel. Areas Commun. 2018, 36, 1622–1634. [Google Scholar] [CrossRef]
- Huang, P.; Hao, Y.; Lv, T.; Xing, J.; Yang, J.; Mathiopoulos, P. Secure beamforming design in relay-assisted Internet of things. IEEE Internet Things J. 2019, 6, 6453–6464. [Google Scholar] [CrossRef]
- Chen, G.; Tian, Z.; Gong, Y.; Chen, Z.; Chambers, J. Max-ratio relay selection in secure buffer-aided cooperative wireless networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 719–729. [Google Scholar] [CrossRef]
- Tang, X.; Cai, Y.; Huang, Y.; Duong, T.; Yang, W.; Yang, W. Secrecy outage analysis of buffer-aided cooperative MIMO relaying systems. IEEE Trans. Veh. Technol. 2018, 67, 2035–2048. [Google Scholar] [CrossRef]
- Sun, A.; Liang, T.; Zhang, Y. Performance analysis of secure buffer-aided cognitive radio network. In Proceedings of the 2015 4th IEEE/CIC International Conference on Communications in China (ICCC), Shenzhen, China, 2–4 November 2015; pp. 1–4. [Google Scholar]
- Bletsas, A.; Shin, H.; Win, M. Cooperative communications with outage-optimal opportunistic relaying. IEEE Trans. Wirel. Commun. 2007, 6, 3450–3460. [Google Scholar] [CrossRef]
- Chatzigiannakis, I.; Kinalis, A.; Nikoletseas, S. Efficient data propagation strategies in wireless sensor networks using a single mobile sink. Comput. Commun. 2008, 31, 896–914. [Google Scholar] [CrossRef]
- Chatzigiannakis, I.; Kinalis, A.; Nikoletseas, S. Fault-tolerant and efficient data propagation in wireless sensor networks using local, additional network information. J. Parallel Distrib. Comput. 2007, 67, 456–473. [Google Scholar] [CrossRef]
- Zheng, T.; Wang, H.; Yuan, J.; Towsley, D.; Lee, M. Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers. IEEE Trans. Commun. 2015, 63, 4347–4362. [Google Scholar] [CrossRef]
- Zhou, X.; Ganti, R.; Andrews, J. Secure wireless network connectivity with multi-antenna transmission. IEEE Trans. Wirel. Commun. 2011, 10, 425–430. [Google Scholar] [CrossRef]
- Huang, Y.; Zhang, P.; Wu, Q.; Wang, J. Secrecy performance of wireless powered communication networks with multiple eavesdroppers and outdated CSI. IEEE Access 2018, 6, 33774–33788. [Google Scholar] [CrossRef]
- Gopala, P.; Lai, L.; Gamal, H. On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698. [Google Scholar] [CrossRef]
- Oggier, F.; Hassibi, B. The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory 2011, 57, 4961–4972. [Google Scholar] [CrossRef]
- Chatzigiannakis, I.; Nikoletseas, S. Design and analysis of an efficient communication strategy for hierarchical and highly changing ad-hoc mobile networks. Mob. Netw. Appl. 2004, 9, 319–332. [Google Scholar] [CrossRef]
- Chatzigiannakis, I.; Nikoletseas, S.; Spirakis, P. On the average and worst-case efficiency of some new distributed communication and control algorithms for ad-hoc mobile networks. In Proceedings of the 1st ACM Int’l Workshop on Principles of Mobile Computing (POMC’01), Newport, RI, USA, August 2001; pp. 1–19. [Google Scholar]
- Gradshteyn, I.; Ryzhik, I. Table of Integrals, Series, and Products; Publishing House: San Diego, CA, USA, 2007. [Google Scholar]
- Chen, G.; Gong, Y.; Xiao, P.; Tafazolli, R. Dual antenna selection in self-backhauling multiple small cell networks. IEEE Commun. Lett. 2016, 20, 1611–1614. [Google Scholar] [CrossRef]
- Tian, Z.; Gong, Y.; Chen, G.; Chambers, J. Buffer-aided relay selection with reduced packet delay in cooperative networks. IEEE Trans. Veh. Technol. 2017, 66, 2567–2575. [Google Scholar] [CrossRef]
- Coolidge, J.L. The Story of the Binomial Theorem. Am. Math. Mon. 1949, 23, 147–157. [Google Scholar] [CrossRef]
- Afana, A.; Asghari, V.; Ghrayeb, A.; Affes, S. Cooperative relaying in spectrum-sharing systems with beamforming and interference constraints. In Proceedings of the 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cesme, Turkey, 17–20 June 2012; pp. 429–433. [Google Scholar]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).






