Next Article in Journal
Wearable IoT System for Hand Function Assessment Based on EMG Signals
Previous Article in Journal
Fairness-Aware Dynamic Ride-Hailing Matching Based on Reinforcement Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers

1
School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730070, China
2
School of Physics and Mechanical and Electrical Engineering, Longyan University, Longyan 364012, China
3
Institute of Artificial Intelligence and Robotics, College of Artificial Intelligence, Xi’an Jiaotong University, Xi’an 710049, China
*
Authors to whom correspondence should be addressed.
Electronics 2024, 13(4), 777; https://doi.org/10.3390/electronics13040777
Submission received: 22 December 2023 / Revised: 4 February 2024 / Accepted: 8 February 2024 / Published: 16 February 2024
(This article belongs to the Special Issue Recent Advancements in Signal and Vision Analysis)

Abstract

:
Cooperative communication and cognitive radio can effectively improve spectrum utilization, coverage range, and system throughput of vehicular networks, whereas they also incur several security issues and wiretapping attacks. Thus, security and threat detection are vitally important for such networks. This paper investigates the secrecy and throughput performance of an underlay cooperative cognitive vehicular network, where a pair of secondary vehicles communicate through a direct link and the assistance of a decode-and-forward (DF) secondary relay in the presence of Poisson-distributed colluding eavesdroppers and under an interference constraint set by the primary receiver. Considering mixed Rayleigh and double-Rayleigh fading channels, we design a realistic relaying transmission scheme and derive the closed-form expressions of secrecy and throughput performance, such as the secrecy outage probability (SOP), the connection outage probability (COP), the secrecy and connection outage probability (SCOP), and the overall secrecy throughput, for traditional and proposed schemes, respectively. An asymptotic analysis is further presented in the high signal-to-noise ratio (SNR) regime. Numerical results illustrate the impacts of network parameters on secrecy and throughput and reveal that the advantages of the proposed scheme are closely related to the channel gain of the relay link compared to the direct link.

1. Introduction

1.1. Background and Motivation

With the enormous number of cars and growing application of fifth-generation (5G) communication technologies, the Internet of Vehicles (IoV) has become one of the critical wireless networks and aims to establish and maintain a reliable and intelligent transportation system by connecting pedestrians and vehicles along with roadside units (RSUs). A vehicular ad hoc network (VANET), as a key component of the IoV, is envisaged and deployed to facilitate traffic management by enhancing passenger safety, providing entertainment information, etc. There are mainly three communication modes in the VANET, i.e., vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and hybrid vehicle communication (HVC), including both V2V and V2I. Due to the mobility of vehicles and limited coverage of RSU, V2V and V2I links are intermittently connected and disconnected, causing many problems such as unreliability, continual handoff, and low throughput. Cooperative communication, which provides diversity gain by introducing relays, has been proven to be an effective compensation technology and has been widely used and analyzed in the VANET [1,2,3].
On the other hand, with the ever-growing demands of vehicular wireless services, the problem of spectrum scarcity in vehicular networks has become more serious [4]. In order to alleviate this problem and pursue green communication, cognitive radio (CR) has been introduced as a promising technology to address the conflict between spectrum scarcity and spectrum underutilization. In CR networks, unlicensed secondary users (SUs) are allowed to dynamically access the licensed spectrum with the requirement of not interfering with the primary users (PUs). In general, according to the different spectrum access strategies, there are mainly two paradigms of CR networks, i.e., overlay CR and underlay CR; the former allows SUs to transmit data by sensing the spectrum holes of PUs, and the latter enables SUs to utilize the licensed spectrum simultaneously with PUs while guaranteeing the interference at PUs does not exceed the acceptable threshold. Comprehensively, coupling CR with cooperative vehicular networks can be an effective and efficient solution for better spectrum utilization, connectivity, and reliability [5].
However, every coin has two sides. The introduction of CR is not without drawbacks. In the underlay CR, the coexistence of licensed and unlicensed users on the same network leads to several security issues and privacy attacks, such as eavesdropping over a wiretap channel shown in Figure 1. This not only makes the network structure more complex by introducing additional interference links between secondary transmitters (SU-Tx) and primary receivers (PU-Rx) and bringing the dependence in channel gains of the instantaneous end-to-end signal-to-noise ratio (SNR) at the destination and eavesdroppers (E), but also throws up various new information security challenges for such vehicular networks. Existing security solutions mainly include key-based cryptographic techniques and physical-layer security (PLS) techniques. PLS has gained wider research interest because it “smartly” utilizes the inherent characteristics of the physical channel to realize keyless secure transmissions, and it can be easily integrated into the prevailing security infrastructure through signal design and physical layer resource allocation [5]. Furthermore, security issues are very prominent in cooperative vehicular networks because confidential information is broadcast twice, i.e., by the source and relays. Thus, it is much more important to study the PLS in cooperative cognitive vehicular networks [6].
On the other hand, throughput, as a crucial performance index, directly affects and reflects the system’s performance and quality of service (QoS). How to improve throughput to meet the quality of experience (QoE) is a long-standing research hotspot in wireless communication networks, especially in the era of 5G and beyond communication networks that promise high speed, low latency, reliable connectivity, and seamless integration of various complex heterogeneous networks to provide a truly digital world [7]. Therefore, inspired by the above, exploiting PLS to analyze the secrecy and throughput performance of cooperative underlay CR vehicular networks is the main focus of this paper.

1.2. Related Work

Owing to the merits of PLS, the secrecy performance of wireless networks has been widely studied in previous works. As the originator, Wyner laid the theoretical foundation for the study of PLS by establishing a three-node wiretap channel model and proposing the information-theoretic notion of secrecy in [8]. Based on Wyner’s model, a great deal of work has been proposed. For instance, Ref. [9] studied the average secrecy capacity and secrecy outage probability (SOP) under three different conditions when the main and wiretap channels experience independent log-normal, correlated log-normal, and independent composite fading, respectively. Considering both single-antenna and multiple-antenna-aided transmission scenarios, Ref. [10] investigated the PLS of non-orthogonal multiple access (NOMA) in large-scale networks by invoking stochastic geometry.
Furthermore, the PLS of cooperative networks [6,11,12] or CR networks [13,14,15] have been well analyzed. Specifically, Ref. [6] proposed a relay selection strategy to improve the secure connection probability in a decentralized wireless network with randomly distributed relays and eavesdroppers. Ref. [11] presented two PLS transmission schemes and examined their achievable secrecy performance for multi-user multi-relay networks intercepted by a passive eavesdropper. In terms of CR networks, considering two different interference power constraint scenarios, Ref. [13] derived the closed-form analytical expressions of SOP for an underlay CR sensor network with an external energy harvesting (EH)-based eavesdropper. By modeling a CR network with multiple eavesdroppers for the Internet of Things (IoT) over k-μ fading channels, Ref. [14] developed the minimum limit values of SOP and the probability of strictly positive secrecy capacity (SPSC). In order to achieve secure transmission in a CR network in the presence of randomly distributed eavesdroppers, Ref. [15] designed four transmission protocols and comprehensively analyzed multiple performance factors, including delay, security, reliability, and throughput, for each protocol.
Based on the aforementioned work, of particular interest is the PLS in cooperative cognitive relaying networks, which has been extensively studied in Refs. [16,17,18,19,20]. Over Rayleigh fading channels, Ref. [16] evaluated and asymptotically analyzed the intercept and outage probability of a decode-and-forward (DF) relaying underlay CR network where an eavesdropper tapped the second hop. By deriving closed-form and asymptotic expressions for SOP over Nakagami-m fading channels, Ref. [17] investigated the PLS of a dual-hop underlay uplink CR network assisted by a multi-antenna relay and overheard by M multi-antenna eavesdroppers. Refs. [18,19,20] studied the PLS with outdated channel state information (CSI) for cooperative cognitive relaying networks. However, all the above work always confines itself to the assumption that nodes are stationary and channels between them are always modeled as Rayleigh, Nakagami-m, or Rician fading.
Recently, vehicular communication networks, which were formed because of the advancements in the development of automatically connected vehicles with embedded sensors, have promised a plethora of mobile world applications, e.g., intelligent transportation systems (ITS), environment monitoring, infotainment services, etc. [6]. It makes mobility performance indispensable and must be considered. In the mobile communication scenarios, however, classical Rayleigh or Nakagami-m fading channels become inadequate, and the double-Rayleigh or double Nakagami-m channels have proven to be more appropriate in characterizing the V2V links according to both the field measurements and theoretical analyses [21,22].
Motivated by this, a quantity of work [5,7,17,23,24,25,26,27,28,29,30] has been proposed. For example, Refs. [5,23] studied the secrecy performance of an underlay cooperative cognitive amplify-and-forward (AF) relaying vehicular network and drew the conclusion that the presence of eavesdroppers causes an irreducible error floor and hence reduces the secrecy diversity order by deriving tight lower bounds and asymptotic expressions of SOP. Further, assuming a situation where the eavesdropper takes advantage of both the relay and direct link, the secrecy performance was analyzed in [7,24]. Ref. [25] investigated the secrecy performance of a cooperative vehicular relaying network in the presence of an interference source and proposed a power allocation model to reduce the SOP of the source and relay transmission powers. In addition, some new technologies have been introduced to improve secrecy performance, such as beamforming [27,28], cooperative jammers [17,29,30], and reconfigurable intelligent surfaces (RIS) [31,32,33,34], especially RIS, which is considered one of the critical 6G technologies for its outstanding advantages in energy efficiency, adaptability, interference management, signal control, and, notably, secrecy performance.
In summary, there are some drawbacks to the current research:
  • For simplicity, some ideal assumptions have always been made. For instance, many studies, such as [5,24,35,36], assumed that the direct link between SU-Tx and its receiver (SU-Rx) is unavailable because of the severe shadowing or path loss, and the direct link between SU-Tx and E is also neglected since E is far away from SU-Tx and outside the transmission range of the first hop. It is unrealistic because vehicles are moving, and the direct links can be available when the receiver (SU-Rx or E) moves close to SU-Tx and does not experience severe fading or shadowing. Also, direct links can affect both legitimate and wiretap transmissions [7], so the impact of direct links should not be ignored for secure transmission in such networks;
  • In terms of wiretap channels, many papers [5,7,25] have focused on the perfect CSI or single eavesdropper, while there is always a potentially large number of passive eavesdroppers who deliberately conceal their CSI or location information from legitimate users in practical scenarios. Therefore, it is necessary to model the location set of eavesdroppers as a stochastic process following some distributions [37,38]. However, it has been rarely discussed for secrecy analysis in such networks.
  • Most work has studied the PLS of cooperative cognitive vehicular networks in the AF relaying protocol, such as [5,7,23,24], but only a few studies have focused on the DF protocol, such as [39]. It is understandable because AF can provide lower latency and complexity, which is crucial for real-time IoV networks. However, meanwhile, AF worsens the legitimate channels because of its non-regenerative principle, where the relay directly amplifies and forwards the received signals without decoding, causing the accumulation of noise and a decrease in system performance. This is not conducive to communication data with high reliability requirements, such as passenger privacy, security information, etc. By comparison, DF is more suitable for some communication environments with relaxed latency but strict reliability requirements because it can eliminate the impact of fading on the first hop by decoding and regenerating the received signal [25,40]. Refs. [41,42,43] have also studied the gain between AF and DF; for instance, Ref. [41] concluded that from a diversity–multiplexing tradeoff (DMT) perspective, DF is strictly optimal over a certain range of the multiplexing gains, but the DMT of AF is offset by a constant term depending on the quality of CSI of the source-destination link only. Furthermore, Ref. [43] has proven that a hybrid decode–amplify–forward (HDAF) relaying protocol can achieve greater secure rate gain with the help of interfering nodes. Therefore, it is also necessary to study the applicability of DF in such networks.
To the best of the authors’ knowledge, there is no existing work that studied the PLS of cooperative underlay CR vehicular networks by simultaneously considering the above-mentioned 1, 2, and 3. Therefore, we mainly analyze the secrecy and throughput performance of such DF relaying networks with direct links and Poisson-distributed colluding eavesdroppers. Table 1 presents the comparison between our work and some existing works to clearly highlight the contributions of this paper.

1.3. Approach and Contributions

Motivated by the aforementioned work, we investigate the secrecy and throughput performance of cooperative underlay CR vehicular networks where a mobile SU-Tx communicates with a mobile SU-Rx assisted by a mobile DF-based secondary relay (SU-Relay) while under the constraint of a stationary PU-Rx. In addition, multiple colluding eavesdroppers whose location set is modeled as a homogeneous Poisson point process (HPPP) exist in the network to overhear the confidential information. In reality, the direct links, including SU-Tx between SU-Rx and SU-Tx between E, are also considered in this paper. Our major contributions are summarized as follows:
  • Considering realistic traffic conditions, this paper establishes a more practical cognitive vehicular system model that not only considers secondary direct links and randomly distributed eavesdroppers but also adopts mixed Rayleigh and double-Rayleigh fading channels to characterize V2V and V2I links. Moreover, a DF relaying transmission scheme is proposed to provide theoretical supplements for existing AF works;
  • According to the proposed system model, this paper derives the approximate expressions of the distribution functions of SNR for the traditional direct transmission scheme and the proposed relaying transmission scheme, respectively. We further deduce the closed-form expressions of the secrecy and throughput performance for each scheme and conduct an asymptotic analysis in the high SNR regime;
  • Designing numerical simulations, this paper verifies our theoretical findings and discusses the performance comparison of the two schemes, the impact of network parameters on security and throughput performance, and the relationship between the maximum secrecy throughput and the optimal relay position in order to provide useful design insights for relay networks with security constraints.
The rest of this paper is organized as follows: Section 2 presents the system model and a complete description of the proposed relay transmission scheme. Section 3 basically obtains the distribution functions of one-hop SNR and performance analysis for the direct transmission scheme. In Section 4, we analyze the distribution functions of two-hop SNR and system performance for the proposed scheme and further present an asymptotic SOP and COP analysis in the high SNR regime. Numerical simulation results are provided in Section 5, and the conclusions are finally put forward in Section 6.

2. System Model and Scheme Description

2.1. System and Channel Models

As shown in Figure 2, we consider a cooperative cognitive mobile network that consists of a primary transmitter–receiver pair (PU-Tx and PU-Rx) and a secondary cooperative network comprising a SU-Tx (S), a SU-Relay (R), a SU-Rx (D), and multiple movable eavesdroppers Ej (j = 1, 2, …). The network works in the underlay mode, which allows the licensed spectrum of the primary network to be shared by secondary users to communicate confidential information but requires that the instantaneous interference power at PU-Rx from secondary senders (both S and R) be limited below the maximum tolerable interference threshold I 0 . It is worth mentioning that such a system model has theoretical correlations in many popular communication systems, such as cognitive radio sensor networks, cognitive IoT networks, spectrum-sharing heterogeneous cooperative vehicular networks, etc.
In reality, we assume that eavesdroppers are randomly distributed in the secondary network, and the HPPP model with density λ E is adopted to characterize this stochastic process. Compared to deterministic models, the spatial HPPP model has the advantage of introducing total randomness for the node deployment and being tractable in performance analysis only by requiring the node density. Some important results about wireless networks with PPP-based randomly distributed nodes have been obtained in [37].
In this model, each node has a single antenna and operates in a half-duplex manner. We further assume that the receiver (including PU-Rx, R, D, and E) has the perfect CSI, but the availability of CSI at the transmitter (including PU-Tx, S, and R) is different due to the different capabilities of the receiving terminals. Specifically, we consider a scenario where the PU-Rx is a cellular base station (BS) that is capable of instantaneous CSI to all transmitters, while D, which is always a mobile vehicle, is not capable of full CSI feedback. This assumption meets the fact that the PU-Rx feeds back to both S and R with the instantaneous channel gain to enable them to adjust transmit power to satisfy the interference constraint. Realistically, eavesdroppers are assumed to be totally passive, such that their CSI is not revealed to S and R.
In terms of channel models, we assume all channels are quasi-static and subject to independent and non-identically distributed (i.ni.d.) fading. Moreover, because of the mobile nature of S, R, and D, and the stationary nature of PU-Rx, the V2V channels, i.e., S → D, S → R, and R → D, are assumed to experience the double-Rayleigh fading [44,45], while the V2I links, such as S → PU and R → PU, are modeled as Rayleigh fading [46,47]. It is worth noting that multiple movable eavesdroppers can be regarded as a single eavesdropper, denoted as E, with multiple distributed antennas for the reason that colluding eavesdroppers can exchange information with each other [6], so the channels related to eavesdroppers, i.e., S → E and R → E, can also be modeled as the Rayleigh channel [15]. In particular, the channel coefficients h i j for { i j } { S P , R P , S E , R E } are independent complex Gaussian random variables having zero mean and variance Ω i j , i.e., h i j ~ C N ( 0 , Ω i j ) . Ω i j d i j ε , where d i j is the distance between i and j, ε is the path loss factor, and thus the channel gain | h i j | 2 is an exponential random variable, and its probability density function (PDF) and cumulative distribution function (CDF) are given as:
f | h i j | 2 ( x ) = 1 Ω i j e x Ω i j , x > 0
F | h i j | 2 ( x ) = 1 e x Ω i j , x > 0
On the other hand, the channel coefficients h k for { k } { S D , S R , R D } can be modeled as the product of h k , 1 and h k , 2 , where h k , i ~ C N ( 0 , Ω k , i ) and assuming Ω k , 1 = Ω k , 2 = Ω k . The PDF and CDF of the channel gain | h k | 2 are, respectively, given as:
f | h k | 2 ( x ) = 2 Ω k 2 K 0 ( 2 x Ω k ) , x > 0
F | h k | 2 ( x ) = 1 2 x Ω k K 1 ( 2 x Ω k ) , x > 0
where K v ( ) denotes the v-th order modified Bessel function of the second kind [5]. The additive white Gaussian noise (AWGN) for each link is modeled as C N ( 0 , N 0 ) . The above PDFs and CDFs will be used for the subsequent performance analysis.

2.2. Transmission Scheme

In this section, we provide a complete description of the proposed relaying transmission (RT) scheme. It is worth noting that, unlike transmission schemes in [5,6,15,25], where the communication from S to D must be accomplished via R in two hops, the fastest transmission from S to D in our RT scheme can be completed in one hop by considering the availability of the direct S-D link.
Specifically, in the first time slot, S broadcasts a unit confidential message xs to R and D; the transmission is completed if D decodes xs correctly. Otherwise, D requests retransmission in the second time slot. Due to the working principle of the DF relaying protocol, R regenerates and retransmits xs to D if it has correctly decoded xs in the first time slot. Otherwise, retransmission can only be executed by S. Note that xs from both S and R will impose interference on PU and be overheard by E during the whole process. The proposed scheme is presented in Table 2.
In terms of secure encoding, secondary senders (S and R) use the widely adopted wiretap code [8] to encode xs. We denote ( R B , R S ) as the set of all possible Wyner codes, where R B is the codeword transmission rate, R S is the confidential information rate and R B > R S . We assume R B and R S are constants, as the design of the rate parameter is beyond the scope of this paper. It is obvious that the rate difference R B R S reflects the cost of securing the message against eavesdropping.

3. Performance Analysis of the Direct Transmission Scheme

In this section, we first analyze the distribution functions of the instantaneous equivalent SNR for each receiver under the direct transmission (DT) scheme and then further study the secrecy and throughput performance of this scheme.

3.1. The PDFs and CDFs of SNR

The so-called DT scheme refers to the transmission without relaying, i.e., whether D decodes the message correctly or not, the data transmission must be completed in one hop. The instantaneous equivalent end-to-end SNR of receivers (both D and Ej) can be represented as:
γ S D = P S | h S D | 2 N 0 , γ S E j = P S | h S E j | 2 N 0
where P S is the transmit power of S, and it must be adjusted to P S = I 0 | h S P | 2 in order to satisfy the instantaneous interference constraint I 0 at PU-Rx. Denoting Φ E as the location set of eavesdroppers, (5) can be rewritten as:
γ S D = ρ | h S D | 2 | h S P | 2
γ S E = ρ E j Φ E | h S E j | 2 | h S P | 2 = ρ Z Φ E | h S P | 2
where ρ I 0 N 0 and Z Φ E E j Φ E | h S E j | 2 . The CDFs of γ S D and γ S E can be calculated as:
F γ S D ( x ) = Pr { γ S D < x } = Pr { | h S D | 2 < | h S P | 2 x ρ } = 0 F | h S D | 2 ( x y ρ ) f | h S P | 2 ( y ) d y
substituting (1) and (4), applying the substitution y = t and the fact that 0 f | h S P | 2 ( y ) d y = 1 , we can rewrite (8) as:
F γ S D ( x ) = 1 4 x ρ Ω S D Ω S P 0 t 2 K 1 ( 2 x ρ t Ω S D ) e t 2 Ω S P d t
using 0 x μ K v ( β x ) e α x 2 d x = 1 2 α μ 2 1 β Γ ( 1 + v + μ 2 ) Γ ( 1 v + μ 2 ) e β 2 8 α W μ 2 , v 2 ( β 2 4 α ) ([48], Equation (6.631.3)), where Γ ( x ) = 0 e t t x 1 d t is the Gamma function [49]. We can obtain the final expression as follows:
F γ S D ( x ) = 1 e k x 2 W 1 , 1 2 ( k x )
where k Ω S P ρ Ω S D 2 , W v , μ ( ) denotes the Whittaker-W function ([50], Equation (9.220.4)). Furthermore, by using W v , μ ( x ) x = ( 1 2 v x ) W v , μ ( x ) W v + 1 , μ ( x ) x ([49], Equation (07.45.20.0005.01)), the PDF of γ S D can be calculated as follows:
f γ S D ( x ) = k e k x 2 W 1 , 1 2 ( k x ) 1 x e k x 2 W 1 , 1 2 ( k x ) + 1 x e k x 2 W 0 , 1 2 ( k x )
On the other hand, the CDF of γ S E can be calculated as follows:
F γ S E ( x ) = Pr { γ S E < x } = Pr { ρ Z Φ E | h S P | 2 < x } = Pr { | h S P | 2 > ρ Z Φ E x }
substituting (1), and the final expression is:
F γ S E ( x ) = 0 ρ z x [ 1 Ω S P e y Ω S P ] f Z Φ E ( z ) d y d z   = 0 f Z Φ E ( z ) e ρ Ω S P x z d z   = Z Φ E ( s )
where s ρ Ω S P x , and Z Φ E ( ) denotes the Laplace transform of Z Φ E . As given in [15]:
Z Φ E ( s ) = exp ( 2 π λ E s 2 / ε / ε Γ ( 1 2 ε ) Γ ( 2 ε ) )

3.2. Secrecy and Throughput Performance Analysis

Based on Section 3.1, we further evaluate the secrecy and throughput performance by adopting outage-based metrics related to security and reliability instead of using the widely used outage probability of secrecy capacity [51], i.e., p o u t = Pr { max [ C D C E , 0 ] < R S } , which cannot differentiate outages caused by either information leakage to eavesdroppers (security) or unreliable reception at the receiver (reliability). Specifically, we denote the secrecy outage probability (SOP) and the connection outage probability (COP) to represent two kinds of outage events under the fixed-rate wiretap code. Furthermore, in order to comprehensively reflect the system performance of having a secure and reliable transmission, the secrecy and connection outage probability (SCOP) is defined. Finally, the overall secrecy throughput is measured based on the SCOP.
  • SOP represents the probability that a secrecy outage event happens when the secure transmission cannot be guaranteed, which is given by [52] as follows:
    p s o D T = Pr { C S E > R B R S }
    where C S E = log 2 ( 1 + γ S E ) denotes the wiretap channel capacity. (15) can be rewritten as follows:
    p s o D T = Pr { log 2 ( 1 + γ S E ) > R B R S } = Pr { γ S E > 2 ( R B R S ) 1 }
    substituting (13) into (16), SOP can be obtained as follows:
    p s o D T = 1 Z Φ E ( ρ Ω S P [ 2 ( R B R S ) 1 ] )
  • COP represents the probability that a connection outage event happens when the message cannot be decoded at the intended receiver correctly, which can be expressed as follows:
    p c o D T = Pr { C S D < R B }
    where C S D = log 2 ( 1 + γ S D ) denotes the wiretap channel capacity. (18) can be rewritten as follows:
    p c o D T = Pr { log 2 ( 1 + γ S D ) < R B } = Pr { γ S D < 2 R B 1 }
    substituting (10) into (19), COP can be derived as follows:
    p c o D T = 1 e k ( 2 R B 1 ) 2 W 1 , 1 2 [ k ( 2 R B 1 ) ]
    by using e z / 2 W v , μ ( z ) = 1 Γ ( 1 2 μ v ) Γ ( μ v + 1 2 ) G 1 , 2 2 , 1 ( z |   μ + 1 2 , 1 2 μ v + 1 ) ([49], Equation (07.45.26.0005.01)), where G p , q m , n ( z | b 1 , , b m , b m + 1 , , b q a 1 , , a n , a n + 1 , , a p ) is the Meijer-G function [49], (20) can be further expressed as follows:
    p c o D T = 1 G 1 , 2 2 , 1 ( k ( 2 R B 1 ) | 1 , 0 0 )
  • SCOP represents the probability that either the secrecy outage or the connection outage happens, which can comprehensively reflect the joint performance of security and reliability. SCOP can be given as:
    p s c o D T = 1 Pr { C S E R B R S ,   C S D R B }
    It is worth noting that the calculation of (22) is tedious and intractable due to the mutual correlation between security ( γ S E ) and reliability ( γ S D ). We assume that the SOP and COP are independent, which is reasonable in CR networks with fixed transmit power [15], so (22) can be simplified as:
    p s c o D T = 1 ( 1 p s o D T ) ( 1 p c o D T )
    substituting (17) and (20), SCOP can be derived as:
    p s c o D T = 1 Z Φ E ( ρ Ω S P [ 2 ( R B R S ) 1 ] ) G 1 , 2 2 , 1 ( k ( 2 R B 1 ) | 1 , 0 0 )
  • Secrecy throughput quantifies the achievable average secrecy rate at which the message can be transmitted securely and reliably to D, which is given as:
    η D T = ( 1 p s c o D T ) R S
    substituting (24), secrecy throughput can be finally obtained as:
    η D T = R S Z Φ E ( ρ Ω S P [ 2 ( R B R S ) 1 ] ) G 1 , 2 2 , 1 ( k ( 2 R B 1 ) | 1 , 0 0 )
Remark 1.
From (17) and (21), it is worth noting that the SOP is an increasing function of λ E and ρ , while is a decreasing function of Ω S P and ( R B R S ) . Conversely, the COP, which is independent of λ E , is an increasing function of Ω S P and R B , while is a decreasing function of ρ . This implies that a large λ E is harmful to reducing the SOP and SCOP but has no effect on the COP in the secondary network. On the other hand, it can be inferred from (24) and (26) that the SCOP and secrecy throughput of the DT scheme are closely related to the network parameters, including ρ , Ω S P , Ω S D , and ( R B R S ) .

4. Performance Analysis of the Relaying Transmission Scheme

This section first analyzes the CDFs of the instantaneous equivalent SNR at D and E after two-hop transmission under the proposed relaying transmission (RT) scheme, and the secrecy and throughput performance are then studied based on them. Finally, an asymptotic SOP and COP analysis is presented in the high SNR regime.

4.1. The CDFs of SNR

Unlike the DT scheme with only one hop, the proposed RT scheme involves two-hop transmission, and the SNR analysis of each receiver (D and E) needs to be discussed based on the decoding situation of R. For simplicity, we consider that S and R have the same codebook and code rate. D utilizes the maximal ratio combining (MRC) technique, and E only decodes the signal with a higher SNR in two hops, i.e., E uses the selection combining (SC) technique.
According to Section 2.2, if D decodes xs with error but R successfully, the retransmission is executed by R in the next hop. Based on the DF forwarding strategy, the instantaneous equivalent SNR at D and E is:
γ D = γ S D + γ S R D = γ S D + min { γ S R ( 1 ) , γ R D ( 2 ) }  
γ E = max { γ S E ( 1 ) , γ R E ( 2 ) }
where γ i j ( n ) represents the SNR of the link i-j at the n-th hop. They can be further expressed as:
γ S R ( 1 ) = ρ | h S R | 2 | h S P | 2 , γ R D ( 2 ) = ρ | h R D | 2 | h R P | 2
γ S E ( 1 ) = ρ Z Φ E | h S P | 2 , γ R E ( 2 ) = ρ Z Φ E | h R P | 2
where Z Φ E E k Φ E | h R E k | 2 . According to F γ S R D ( x ) = F γ S R ( 1 ) ( x ) + F γ R D ( 2 ) ( x ) F γ S R ( 1 ) ( x ) F γ R D ( 2 ) ( x ) [53] and the fact that γ S R ( 1 ) and γ R D ( 2 ) follow the same distribution as γ S D in (10), the CDF of γ S R D can be calculated as follows:
F γ S R D ( x ) = 1 e ( k 1 + k 2 ) x 2 W 1 , 1 2 ( k 1 x ) W 1 , 1 2 ( k 2 x )
where k 1 Ω S P ρ Ω S R 2 , k 2 Ω R P ρ Ω R D 2 . We can further express the CDF of γ D as:
F γ D ( z ) = Pr { γ S D + γ S R D < z } = Pr { γ S R D < z γ S D } = 0 F γ S R D ( z x ) f γ S D ( x ) d x
with the aid of the F γ S R D ( x ) in (31), the f γ S D ( x ) in (11), (32) can be rewritten as follows:
F γ D ( z ) = 1 + k 0 e k x 2 W 1 , 1 2 ( k x ) e ( k 1 + k 2 ) ( z x ) 2 W 1 , 1 2 [ k 1 ( z x ) ] W 1 , 1 2 [ k 2 ( z x ) ] d x + 0 1 x e k x 2 W 1 , 1 2 ( k x ) e ( k 1 + k 2 ) ( z x ) 2 W 1 , 1 2 [ k 1 ( z x ) ] W 1 , 1 2 [ k 2 ( z x ) ] d x 0 1 x e k x 2 W 0 , 1 2 ( k x ) e ( k 1 + k 2 ) ( z x ) 2 W 1 , 1 2 [ k 1 ( z x ) ] W 1 , 1 2 [ k 2 ( z x ) ] d x
similar to the substitution from (20) to (21), it can be rewritten as:
F γ D ( z ) = 1 + k 0 G 1 , 2 2 , 1 ( k x | 1 , 0 0 ) G 1 , 2 2 , 1 [ k 1 ( z x ) | 1 , 0 0 ] G 1 , 2 2 , 1 [ k 2 ( z x ) | 1 , 0 0 ] d x + 0 1 x G 1 , 2 2 , 1 ( k x | 1 , 0 0 ) G 1 , 2 2 , 1 [ k 1 ( z x ) | 1 , 0 0 ] G 1 , 2 2 , 1 [ k 2 ( z x ) | 1 , 0 0 ] d x 0 1 x G 1 , 2 2 , 1 ( k x | 1 , 0 1 ) G 1 , 2 2 , 1 [ k 1 ( z x ) | 1 , 0 0 ] G 1 , 2 2 , 1 [ k 2 ( z x ) | 1 , 0 0 ] d x
according to ([49], Equation (07.34.21.0081.01)), (34) can be further evaluated as follows:
F γ D ( z ) = 1 + G 2 , 1 : 1 , 2 : 1 , 2 1 , 2 : 2 , 1 : 2 , 1 ( 1 , 0 0 | 0 1 , 0 | 0 1 , 0 | k 1 z k | k 2 z k ) + G 2 , 1 : 1 , 2 : 1 , 2 1 , 2 : 2 , 1 : 2 , 1 ( 0 , 1 1 | 0 1 , 0 | 0 1 , 0 | k 1 z k | k 2 z k )   G 2 , 1 : 1 , 2 : 1 , 2 1 , 2 : 2 , 1 : 2 , 1 ( 0 , 1 0 | 0 1 , 0 | 0 1 , 0 | k 1 z k | k 2 z k )
On the other hand, according to F γ E ( x ) = F γ S E ( 1 ) ( x ) F γ R E ( 2 ) ( x ) [53] and F γ S E ( x ) in (13), the CDF of γ E can be obtained as:
F γ E ( x ) = Z Φ E ( ρ Ω S P x ) Z Φ E ( ρ Ω R P x )
In particular, if both D and R decode xs incorrectly, the retransmission can only be executed by S in the second hop. In this situation, the SNRs of D and E become as follows:
γ D = 2 γ S D , γ E = 2 γ S E
and their CDFs are simplified as:
F γ D ( x ) = 1 e k x [ W 1 , 1 2 ( k x ) ] 2
F γ E ( x ) = [ Z Φ E ( ρ Ω S P x ) ] 2

4.2. Secrecy and Throughput Performance Analysis

Based on the CDFs obtained in Section 4.1, we further evaluate the secrecy and throughput performance of the proposed RT scheme.
  • SOP: referring to (15), SOP can be expressed as:
    p s o R T = Pr { log 2 ( 1 + γ E ) > R B R S } = Pr { γ E > 2 ( R B R S ) 1 }
    according to the different decoding situations of R and substituting (36) and (39), (40) expands as:
    p s o R T = { 1 Z Φ E ( ρ Ω S P [ 2 ( R B R S ) 1 ] ) Z Φ E ( ρ Ω R P [ 2 ( R B R S ) 1 ] ) , ( 1 p c o ) 1 [ Z Φ E ( ρ Ω S P [ 2 ( R B R S ) 1 ] ) ] 2 , p c o
    where p c o is the probability that R cannot decode the message correctly, i.e., the COP of R, which can be calculated by referring to (18):
    p c o = Pr { log 2 ( 1 + γ S R ( 1 ) ) < R B } = Pr { γ S R ( 1 ) < 2 R B 1 }
    referring to the CDF of γ S D in (10), p c o can be expressed as:
    p c o = 1 e k 1 ( 2 R B 1 ) 2 W 1 , 1 2 [ k 1 ( 2 R B 1 ) ]   = 1 G 1 , 2 2 , 1 ( k 1 ( 2 R B 1 ) | 1 , 0 0 )
    Thus, the average SOP p s o R T ¯ can be obtained by using the expectation formula E [ x ] = i = 1 n x i p i .
  • COP: referring to (18), COP can be expressed as:
    p c o R T = Pr { log 2 ( 1 + γ D ) < R B } = Pr { γ D < 2 R B 1 }
    similarly, substituting (35) and (38), (44) expands as (45), and the average COP p c o R T ¯ can be obtained by calculating its expectation.
    p c o R T = { 1 + G 2 , 1 : 1 , 2 : 1 , 2 1 , 2 : 2 , 1 : 2 , 1 ( 1 , 0 0 | 0 1 , 0 | 0 1 , 0 | k 4 ( 2 R B 1 ) | k 5 ( 2 R B 1 ) )     + G 2 , 1 : 1 , 2 : 1 , 2 1 , 2 : 2 , 1 : 2 , 1 ( 0 , 1 1 | 0 1 , 0 | 0 1 , 0 | k 4 ( 2 R B 1 ) | k 5 ( 2 R B 1 ) )     G 2 , 1 : 1 , 2 : 1 , 2 1 , 2 : 2 , 1 : 2 , 1 ( 0 , 1 0 | 0 1 , 0 | 0 1 , 0 | k 4 ( 2 R B 1 ) | k 5 ( 2 R B 1 ) ) ,       ( 1 p c o ) 1 e k ( 2 R B 1 ) { W 1 , 1 2 [ k ( 2 R B 1 ) ] } 2 ,                                                                               p c o
    where k 4 = k 1 k = Ω S D 2 Ω S R 2 , k 5 = k 2 k = Ω R P Ω S D 2 Ω S P Ω R D 2 .
  • SCOP: referring to (23), the average SCOP can be expressed as:
    p s c o R T ¯ = 1 ( 1 p s o R T ¯ ) ( 1 p c o R T ¯ )
  • Secrecy throughput: referring to (25) and the principle of the RT scheme, the average secrecy throughput is expressed according to the total probability theorem:
    η R T ¯ = ( 1 p c o D T ) η D T + p c o D T ( 1 p s c o R T ¯ ) R S
Remark 2.
From (41) and (45), it can be found that the SOP and COP of the proposed RT scheme become more complex due to the cooperation of secondary relays. Specifically, except for the network parameters involved in the DT scheme, the SOP of the proposed RT scheme deeply depends on the values of Ω S P and Ω R P , in other words, Ω R P Ω S P . Furthermore, the COP is not only related to Ω R P Ω S P , but also highly to Ω S D 2 Ω S R 2 and Ω S D 2 Ω R D 2 . It means that the advantages of the proposed RT scheme are totally decided by the channel gain of the relay link compared to the direct link, which further reflects the importance of optimal relay selection.

4.3. Asymptotic Analysis

We present asymptotic SOP and COP performance analysis in the high SNR regime ( ρ ). It is worth noting that when ρ , p c o 0 , which means the secondary relay must be able to successfully decode the received message and retransmit it in the second time slot. Substituting p c o 0 into (41), it can be easily found that:
p ˜ s o U B R T 1
which implies that when ρ , there exists an upper bound for SOP. Specially, an infinite maximum tolerable interference threshold I 0 means there is no limit to the transmission power of the secondary transmitters; a secrecy outage event must happen so that secure transmission cannot be guaranteed since the SNR of both legitimate links and wiretap links is improved simultaneously.
Unlike SOP, it can be discovered by substituting p c o 0 into (45) that:
p ˜ c o L B R T 1 + G 2 , 1 : 1 , 2 : 1 , 2 1 , 2 : 2 , 1 : 2 , 1 ( 1 , 0 0 | 0 1 , 0 | 0 1 , 0 | k 4 ( 2 R B 1 ) | k 5 ( 2 R B 1 ) ) + G 2 , 1 : 1 , 2 : 1 , 2 1 , 2 : 2 , 1 : 2 , 1 ( 0 , 1 1 | 0 1 , 0 | 0 1 , 0 | k 4 ( 2 R B 1 ) | k 5 ( 2 R B 1 ) ) G 2 , 1 : 1 , 2 : 1 , 2 1 , 2 : 2 , 1 : 2 , 1 ( 0 , 1 0 | 0 1 , 0 | 0 1 , 0 | k 4 ( 2 R B 1 ) | k 5 ( 2 R B 1 ) )
From (49), it can be found that there exists a lower bound for the asymptotic COP in the high ρ region, and this lower bound is closely related to the ratio of channel gain between the direct link and relay link.

5. Simulations

In this section, we first show the numerical comparison and asymptotic analysis for the aforementioned transmission schemes, i.e., the DT and RT schemes. Then, the interaction and effect of different network parameters on security and reliability performance are present. Finally, we reveal the relationship between the maximum secrecy throughput and the optimal relay location. The channel parameter is assumed to be ε = 4 . It is worth noting that we use Ω i j to reflect the distance d i j , the larger Ω i j , the better average | h i j | 2 , and hence the closer d i j . Similarly, ρ is adopted to comprehensively reflect the ratio of interference threshold I 0 and noise power N 0 .
Figure 3 depicts the impact of the eavesdropper density λ E on SOP ( p s o ) and COP ( p c o ) for fixed values of ρ = 10   dB , Ω S P = 10   dB , Ω S D = Ω S R = 5   dB , R B = 3   bps / Hz , R S = 1   bps / Hz . It can be first seen from Figure 3 that no matter the DT or RT scheme, SOP increases while COP remains constant with λ E increases; this is consistent with Remark 1. It is reasonable because the larger λ E , the better wiretap channel quality enhances the ability to eavesdrop on confidential information, p s o therefore increases as increasing λ E . However, COP, which represents the outage probability that D cannot decode the confidential information correctly, i.e., the reliability performance, is independent of the eavesdropper density λ E , and hence p c o keeps unchanged as λ E increases.
Further, we can observe from Figure 3 that the SOP of the DT scheme outperforms that of the RT scheme, especially in a smaller Ω R P . However, in terms of COP, the RT scheme surpasses the DT, especially in a larger Ω R D . The former is because the presence of relays strengthens the wiretap link capacity, and smaller Ω R P results in a better channel quality of R-E link, and hence, a worse security performance will be induced. At the same time, the latter is because the introduction of relays brings diversity to D for successful decoding. Furthermore, an increasing Ω R D can improve the quality of the R-D channel and enhance the ability of D to decode information, resulting in better reliability performance. It can be concluded from Figure 3 that the introduction of relays is a double-edged sword, which not only improves reliability performance but also deteriorates security performance. As the comment made in [7] identifies, in this case, even E is able to extract the benefits of increased transmit SNR along with D.
Figure 4 further depicts the impact of ρ on SOP and COP for fixed values of λ E = 0.3 , Ω S P = 10   dB , Ω S D = 5   dB , R B = 3   bps / Hz , R S = 1   bps / Hz . It can be observed from Figure 4 that the asymptotic results (the dotted lines) are in good agreement with the exact results in a high SNR regime. Moreover, Figure 4a reflects the same conclusion as in Figure 3a because SOP is the increasing function of both λ E and ρ . Figure 4b illustrates the fact that the better the channel gain of the secondary relay ( Ω S R and Ω R D ), the lower the COP, i.e., the better the reliability performance can be achieved by the proposed RT scheme, especially when the channel gain is better than that of the direct link. It is also consistent with the insight given in Remark 2.
We then show the effect of different network parameters on the security and reliability performance. Figure 5 plots the SCOP, i.e., p s c o versus ρ , for various values of R B and R S , when λ E = 0.3 , Ω S P = Ω R P = 10   dB , Ω S R = Ω R D = 5   dB , Ω S D = 2   dB . From Figure 5, we can see that p s c o decreases with the increase of ρ . It is because the larger the ρ , the more relaxed the interference constraint on the secondary transmitters, the higher the secondary transmit power can be achieved, and hence, the secure and reliable transmission performance is improved. Moreover, it can be observed from Figure 5 that the SCOP increases with the increase of R B R S , which is because a higher power will be required to compensate for the greater cost of secure transmission.
Figure 6 illustrates the impact of the primary receiver (assuming Ω S P = Ω R P ) on SCOP for various values of ρ , when λ E = 0.3 , Ω S R = Ω R D = 10   dB , Ω S D = 5   dB , R B = 3   bps / Hz , R S = 1   bps / Hz . It is seen from Figure 6 that p s c o increases with the increase of Ω S P ( Ω R P ), which is owing to the reason that a larger value of Ω S P ( Ω R P ) imposes a stronger power constraint from the PU receiver to the secondary transmitters (both S and R), causing a lower secondary transmit power ( P S and P R ), thereby degrading the SCOP performance. Moreover, we can find that the SCOP curves exhibit a secrecy floor phenomenon, irrespective of ρ , as reported in [7].
.
In Figure 7, we demonstrate the effect of the average channel gain of the direct link, i.e., Ω S D , on the SCOP performance for λ E = 0.3 , ρ = 10   dB , Ω S P = Ω R P = 10   dB , R B = 3   bps / Hz , R S = 1   bps / Hz . We can observe from Figure 7 that SCOP improves with the increase of Ω S D , which is due to the truth that a larger Ω S D brings a better channel capacity of the legitimate direct S-D link. Furthermore, it can be seen that SCOP decreases as Ω R D increases, especially when both Ω R D and Ω S R improve, such as the curve at Ω S R = Ω R D = 30   dB , a better SCOP performance can be achieved. This is because the diversity gain depends on the strength of channels pertaining to relays. Therefore, it can be concluded that a secure and reliable transmission will be guaranteed as the channel quality of either/both S-D and R-D (S-R) links increases.
Figure 8 presents the plot of the secrecy throughput, i.e., η , as a function of q R for different values of λ E when ρ = 10   dB , Ω S P = Ω R P = 10   dB , Ω S D = 5   dB , R B = 3   bps / Hz , R S = 1   bps / Hz . In this case, we assume a normalized two-dimensional network topology for numerical discussion, and the coordinates of S, R, D, and PU-Rx are ( 0 , 0 ) , ( q R , 0 ) , ( 1 , 0 ) and ( 0 , 1 ) , respectively. It can be first seen from Figure 8 that both schemes achieve a higher secrecy throughput at a smaller λ E , which is in coherence with the conclusion drawn in Figure 3. Then, we can clearly observe that the closer the relay position is to the midpoint of the distance between S and D, i.e., q R = 0.5 , in the RT scheme, the higher secrecy throughput can be obtained. That is, we can graphically evaluate the optimal relay location for maximum secrecy throughput at the midpoint of the communication distance, which provides theoretical guidance and is aligned with the findings reported in [2,4,22]. However, the secrecy throughput of the DT scheme remains constant because it is independent of q R .

6. Conclusions

This paper investigated the secrecy and throughput performance of an underlay cognitive vehicular relaying network, wherein a pair of vehicle nodes communicate with each other through a direct link and the help of a secondary DF relay in the presence of multiple movable HPPP-distributed eavesdroppers. Considering Rayleigh fading for V2I links and double-Rayleigh fading for V2V links, we derived expressions of the distribution functions of SNR for the traditional DT scheme and proposed RT scheme, respectively. The closed-form expressions of system performance, including SOP, COP, SCOP, and secrecy throughput, are deduced, and an asymptotic analysis is further conducted. Finally, we verified our analytical results via numerical simulations, revealed the effect of network parameters on secrecy and throughput performance, and showed the channel conditions under which the proposed relaying scheme outperforms the traditional direct schemes.
Future work will focus on the study of preventing and mitigating malicious eavesdropping by employing some advanced technologies, such as cooperative jamming and artificial noise, in such vehicular networks.

Author Contributions

Conceptualization, F.W. and C.L.; methodology, J.X.; software, L.S.; validation, Y.L.; resources, S.D. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by the National Natural Science Foundation of China (62161016) and the Young Scholars Science Foundation of Lanzhou Jiaotong University (2021005).

Data Availability Statement

The datasets generated and analyzed during the current study are available from the corresponding author upon request.

Acknowledgments

We are truly grateful to the anonymous referees for their constructive comments on our paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Xu, L.; Huang, L.; Cao, C.; Wang, H.; Li, Y.; Gulliver, T.A. Outage performance of mobile V2V cooperative networks. Phys. Commun. 2019, 34, 295–300. [Google Scholar] [CrossRef]
  2. Li, S.; Wang, F.; Gaber, J.; Chang, X. Throughput and energy efficiency of cooperative ARQ strategies for VANETs based on hybrid vehicle communication mode. IEEE Access 2020, 8, 114287–114304. [Google Scholar] [CrossRef]
  3. Ngo, F.J.M.A. Performance analysis of cooperative V2V and V2I communications under correlated fading. IEEE Trans. Intell. Transp. 2020, 21, 3476–3484. [Google Scholar]
  4. Feng, J.; Yu, F.R.; Pei, Q.; Chu, X.; Du, J.; Zhu, L. Cooperative computation offloading and resource allocation for blockchain-enabled mobile-edge computing: A deep reinforcement learning approach. IEEE Int. Things J. 2020, 7, 6214–6228. [Google Scholar] [CrossRef]
  5. Suneel, Y.; Anshul, P. On the secrecy performance of cooperative cognitive vehicular relay networks. In Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), BITS Pilani, Goa, India, 16–19 December 2019. [Google Scholar]
  6. Cai, C.X.; Cai, Y.M.; Zhou, X.Y.; Yang, W.W.; Yang, W.D. When does relay transmission give a more secure connection in wireless Ad Hoc networks? IEEE. Trans. Inf. Foren. Sec. 2014, 9, 624–632. [Google Scholar] [CrossRef]
  7. Anshul, P.; Suneel, Y.; Dinh-Thuan, D.; Rupak, K. Secrecy performance of cooperative cognitive AF relaying networks with direct links over mixed Rayleigh and double-Rayleigh fading channels. IEEE Trans. Veh. Technol. 2020, 69, 15095–15112. [Google Scholar]
  8. Wyner, A.D. The wire-tap channel. Bell Labs. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  9. Pan, G.F.; Tang, C.Q.; Zhang, X.; Li, T.T.; Weng, Y.; Chen, Y.F. Physical-layer security over non-small-scale fading channels. IEEE Trans. Veh. Technol. 2016, 65, 1326–1339. [Google Scholar] [CrossRef]
  10. Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
  11. Fan, L.; Yang, N.; Duong, T. Exploiting direct links for physical layer security in multi-user multi-relay networks. IEEE Trans. Wirel. Commun. 2016, 15, 3856–3867. [Google Scholar] [CrossRef]
  12. Zhao, H.; Pan, G. Analysis of secure communications for a DF and RF relaying SIMO system with Gauss errors. Sci. Sin-Inf. 2016, 46, 350–360. [Google Scholar] [CrossRef]
  13. Sun, A.; Liang, T.; Li, B. Secrecy performance analysis of cognitive sensor radio networks with an EH-based eavesdropper. Sensors 2017, 17, 1026. [Google Scholar] [CrossRef]
  14. Li, J.; Zhao, H.; Johnson, M. Secrecy performance analysis of a cognitive network for IoT over k-μ channels. Wirel. Commun. Mob. Com. 2021, 6, 1–12. [Google Scholar] [CrossRef]
  15. Xu, X.M.; He, B.A.; Yang, W.W.; Zhou, X.Y.; Cai, Y.M. Secure transmission design for cognitive radio networks with Poisson distributed eavesdroppers. IEEE. Trans. Inf. Foren. Sec. 2016, 11, 373–387. [Google Scholar] [CrossRef]
  16. Chopra, K.; Bose, R.; Joshi, A. Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network. IET Commun. 2017, 11, 1396–1406. [Google Scholar] [CrossRef]
  17. Mounia, B.; Faissal, E.B.; Mohamed-Slim, A. A PHY layer security analysis of uplink cooperative jamming-based underlay CRNs with multi-eavesdroppers. IEEE Trans. Cogn. Commun. 2020, 6, 704–717. [Google Scholar]
  18. Zhang, T.; Cai, Y.M.; Huang, Y.Z.; Duong, T.Q.; Yang, W.W. Secure transmission in cognitive MIMO Relaying networks with outdated channel state information. IEEE Access 2016, 4, 8212–8224. [Google Scholar] [CrossRef]
  19. Yang, Q.Q.; Ding, J.; Hu, A.G. Secrecy outage performance analysis of DF cognitive relay network with co-channel interference. Wirel. Pers. Commun. 2019, 107, 549–564. [Google Scholar] [CrossRef]
  20. Zhang, J.; Pan, X.; Zhuang, Y. Secrecy performance for underlay cognitive multi-relaying MISO-RF/SIMO-FSO networks with outdated CSI. Phys. Commun. 2021, 48, 1–12. [Google Scholar] [CrossRef]
  21. Salo, J.; El-Sallabi, H.M.; Vainikainen, P. Statistical analysis of the multiple scattering radio channel. IEEE Trans. Antenn. Propag. 2006, 54, 3114–3124. [Google Scholar] [CrossRef]
  22. Nguyen, S.Q.; Kong, H.Y. Outage probability analysis in dual-hop vehicular networks with the assistance of multiple access points and vehicle nodes. Wirel. Pers. Commun. 2016, 87, 1175–1190. [Google Scholar] [CrossRef]
  23. Pandey, A.; Yadav, S. Physical layer security in cooperative AF relaying networks with direct links over mixed Rayleigh and double-Rayleigh fading channels. IET Commun. 2018, 67, 10615–10630. [Google Scholar] [CrossRef]
  24. Pandey, A.; Yadav, S. Physical layer security in cooperative amplify-and-forward relay networks over mixed Nakagami-m and double Nakagami-m fading channels: Performance evaluation and optimization. IET Commun. 2020, 14, 95–104. [Google Scholar] [CrossRef]
  25. Mohamed, G.A.; Ahmed, H.A.; Mohammed, A. Secrecy performance and power allocation for cooperative vehicular relaying networks in the presence of interference. In Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 20–22 February 2023. [Google Scholar]
  26. Serdar, Z.A.; Erdogan, E. Secrecy outage probability of inter-vehicular cognitive radio networks. Int. J. Commun. Syst. 2020, 33, 1–11. [Google Scholar]
  27. Hu, C.; Li, Q.; Yang, L.; Qin, J. Joint power allocation and collaborative beamforming for physical layer security in underlay CR NOMA relay systems. Phys. Commun. 2021, 48, 1–11. [Google Scholar] [CrossRef]
  28. Li, Q.; Yang, Y.; Ma, W.K.; Lin, M.; Ge, J.; Lin, J. Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal. Proces. 2014, 63, 206–220. [Google Scholar] [CrossRef]
  29. Mensi, N.; Rawat, D.B.; Balti, E. PLS for V2I communications using friendly jammer and double kappa-mu shadowed fading. In Proceedings of the IEEE International Conference on Communications (ICC), Montreal, QC, Canada, 14–23 June 2021. [Google Scholar]
  30. Xie, P.; Zhang, J.; Xing, M.; Zhang, L.; Wu, G. Aided opportunistic jammer selection for secrecy improvement in underlay cognitive radio networks. Wirel. Pers. Commun. 2019, 107, 1–20. [Google Scholar] [CrossRef]
  31. Ghadi, F.R.; Kaveh, M.; Martín, D. Performance analysis of RIS/STAR-IOS-aided V2V NOMA/OMA communications over composite fading channels. arXiv 2023, arXiv:2309.07738. [Google Scholar] [CrossRef]
  32. Yang, L.; Yang, J.; Xie, W.; Hasna, M.O.; Tsiftsis, T.; Di Renzo, M. Secrecy performance analysis of RIS-aided wireless communication systems. IEEE Trans. Veh. Technol. 2020, 69, 12296–12300. [Google Scholar] [CrossRef]
  33. Kaveh, M.; Yan, Z.; Jäntti, R. Secrecy performance analysis of RIS-aided smart grid communications. IEEE Trans. Industr. Inform. 2023, 1–13. [Google Scholar] [CrossRef]
  34. Wei, L.; Wang, K.; Pan, C.; Elkashlan, M. Secrecy performance analysis of RIS-aided communication system with randomly flying eavesdroppers. IEEE Wireless Commun. Lett. 2022, 11, 2240–2244. [Google Scholar] [CrossRef]
  35. Saad, W.; Shokair, M.; Ibraheem, S.M. On the security of relay assisted cognitive radio networks in the presence of primary transceiver network. Wirel. Pers. Commun. 2019, 104, 949–977. [Google Scholar] [CrossRef]
  36. Zhao, R.; Yuan, Y.; Fan, L.; He, Y. Secrecy performance analysis of cognitive decode-and-forward relay networks in Nakagami-m fading channels. IEEE Trans. Commun. 2017, 65, 549–563. [Google Scholar] [CrossRef]
  37. Pinto, P.C.; Barros, J.; Win, M.Z. Secure communication in stochastic wireless networks—Part I: Connectivity. IEEE Trans. Inf. Foren. Sec. 2012, 7, 125–138. [Google Scholar] [CrossRef]
  38. Pinto, P.C.; Barros, J.; Win, M.Z. Secure communication in stochastic wireless networks—Part II: Maximum rate and collusion. IEEE Trans. Inf. Foren. Sec. 2012, 7, 139–147. [Google Scholar] [CrossRef]
  39. Ji, B.; Han, Y.; Li, P. Research on secure transmission performance of electric vehicles under Nakagami-m channel. IEEE Trans. Intell. Transp. Syst. 2020, 22, 1881–1891. [Google Scholar] [CrossRef]
  40. Zhang, J.; Pan, G. Secrecy outage analysis with Kth best relay selection in dual-hop inter-vehicle communication systems. Int. J. Electron. Commun. 2017, 71, 139–144. [Google Scholar] [CrossRef]
  41. Kim, T.T.; Poor, H.V. On the diversity gain of AF and DF relaying with noisy CSI at the source transmitter. IEEE Trans. Inf. Theory 2009, 55, 5064–5073. [Google Scholar] [CrossRef]
  42. Lai, L.; Gamal, H.E. The relay–eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory 2008, 54, 4005–4019. [Google Scholar] [CrossRef]
  43. Gurrala, K.K.; Das, S. Performance study of hybrid decode–amplify–forward (HDAF) relaying scheme for physical layer security in wireless cooperative network. Int. J. Commun. Syst. 2017, 30, e3182. [Google Scholar] [CrossRef]
  44. Li, Z.; Jia, L.; Li, F. Outage performance analysis in relay-assisted inter-vehicular communications over double-Rayleigh fading channels. IEEE Int. Conf. Commun. Mobile Comput. 2010, 2, 266–270. [Google Scholar]
  45. Nguyen, B.C.; Hoang, T.M.; Dung, L.T. Performance analysis of vehicle-to-vehicle communication with full-duplex amplify-and-forward relay over double-Rayleigh fading channels. Veh. Commun. 2019, 19, 100166. [Google Scholar] [CrossRef]
  46. Sklar, B. Rayleigh fading channels in mobile digital communication systems. I. Characterization. IEEE Commun. Mag. 1997, 35, 90–100. [Google Scholar] [CrossRef]
  47. Islam, M.R.; Hamouda, W. Performance of cooperative ad-hoc networks in Rayleigh fading channels. In Proceedings of the IEEE Vehicular Technology Conference, Montreal, QC, Canada, 25–28 September 2006; pp. 1–4. [Google Scholar]
  48. Prudnikov, A.P.; Brychkov, Y.A.; Marichev, O.I. Integrals and Series. Volume 2: Special Functions; Gordon and Breach Science Publishers: Philadelphia, PA, USA, 1992. [Google Scholar]
  49. The Wolfram Functions Site. Available online: http://functions.wolfram.com/ (accessed on 14 February 2024).
  50. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 6th ed.; Academic Press: New York, NY, USA, 2000. [Google Scholar]
  51. Bloch, M.; Barros, J.; Rodrigues, M.R.D.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
  52. He, B.; Zhou, X. Secure on-off transmission design with channel estimation errors. IEEE Trans. Inf. Foren. Sec. 2013, 8, 1923–1936. [Google Scholar] [CrossRef]
  53. Papoulis, A.; Pillai, S.U. Probability, Random Variables, and Stochastic Processes, 4th ed.; McGraw-Hill Book Co.: New York, NY, USA, 2001. [Google Scholar]
Figure 1. Cooperative underlay CR vehicular networks with wiretap channels.
Figure 1. Cooperative underlay CR vehicular networks with wiretap channels.
Electronics 13 00777 g001
Figure 2. The proposed system model.
Figure 2. The proposed system model.
Electronics 13 00777 g002
Figure 3. Impacts of eavesdropper density λ E on SOP and COP.
Figure 3. Impacts of eavesdropper density λ E on SOP and COP.
Electronics 13 00777 g003
Figure 4. Impacts of ρ on SOP and COP.
Figure 4. Impacts of ρ on SOP and COP.
Electronics 13 00777 g004
Figure 5. SCOP versus ρ .
Figure 5. SCOP versus ρ .
Electronics 13 00777 g005
Figure 6. Impact of PU receiver on SCOP.
Figure 6. Impact of PU receiver on SCOP.
Electronics 13 00777 g006
Figure 7. Impact of Ω S D on the SCOP.
Figure 7. Impact of Ω S D on the SCOP.
Electronics 13 00777 g007
Figure 8. Impact of relay location on throughput.
Figure 8. Impact of relay location on throughput.
Electronics 13 00777 g008
Table 1. Comparison of proposed work with related research.
Table 1. Comparison of proposed work with related research.
ContextThis Work[5][7][17][24][39]
Cooperative
Cognitive Vehicular Networks
YesYesYesNoNoYes
Relaying ProtocolDFAFAFDFDFDF
Direct link
SU-Tx and SU-Rx
YesNoYesNoNoNo
Direct link
SU-Tx and E
YesNoYesYesNoNo
Performance
Analysis
PLS,
Throughput
PLSPLSPLSPLSPLS
Eavesdropping NodesMultipleSingleSingleMultipleSingleMultiple
Fading ScenarioRayleigh
and Double-
Rayleigh
Rayleigh
and Double-
Rayleigh
Rayleigh
and Double-Rayleigh
Nakagami-mNakagami-m
and Double Nakagami-m
Nakagami-m
Table 2. The proposed relaying transmission scheme.
Table 2. The proposed relaying transmission scheme.
First Time SlotSecond Time Slot
S → PU-Rx (Interference)(only when D decodes with error)
S → R and D (Data)If R has decoded correctlyR → PU-Rx (Interference)
R → D (Data)
R → E (Wiretap)
S → E (Wiretap)If R has decoded incorrectlyS → PU-Rx (Interference)
S → D (Data)
S → E (Wiretap)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, F.; Li, C.; Xie, J.; Su, L.; Liu, Y.; Du, S. Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers. Electronics 2024, 13, 777. https://doi.org/10.3390/electronics13040777

AMA Style

Wang F, Li C, Xie J, Su L, Liu Y, Du S. Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers. Electronics. 2024; 13(4):777. https://doi.org/10.3390/electronics13040777

Chicago/Turabian Style

Wang, Fan, Cuiran Li, Jianli Xie, Lin Su, Yadan Liu, and Shaoyi Du. 2024. "Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers" Electronics 13, no. 4: 777. https://doi.org/10.3390/electronics13040777

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop