Next Article in Journal
A New Single-Phase Direct Frequency Controller Having Reduced Switching Count without Zero-Crossing Detector for Induction Heating System
Previous Article in Journal
Deep Learning Models for Classification of Red Blood Cells in Microscopy Images to Aid in Sickle Cell Anemia Diagnosis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Physical Layer Security in a Hybrid TPSR Two-Way Half-Duplex Relaying Network over a Rayleigh Fading Channel: Outage and Intercept Probability Analysis

1
Faculty of Electrical and Electronics Engineering, Ho Chi Minh City University of Food Industry, Ho Chi Minh City 700000, Vietnam
2
Optoelectronics Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
3
Wireless Communication Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(3), 428; https://doi.org/10.3390/electronics9030428
Submission received: 30 January 2020 / Revised: 1 March 2020 / Accepted: 3 March 2020 / Published: 4 March 2020
(This article belongs to the Section Networks)

Abstract

:
In this paper, the system performance of a hybrid time–power splitting relaying (TPSR) two-way half-duplex (HD) relaying network over a Rayleigh fading channel is investigated in terms of the outage probability (OP) and intercept probability (IP). The proposed model has two sources, A and B, which communicate with each other with the help of an intermediate relay (R) under the presence of an eavesdropper (E). The physical layer security (PLS) was considered in this case. Firstly, we derived the closed-form expressions of the exact and asymptotic IP in two cases, using MRC (maximal ratio combining) and SC (selection combining) techniques. The closed-form expressions of the system OP was then analyzed and derived. All the analytical expressions of the OP and IP of the system model were verified by a Monte Carlo simulation in connection with all the main system parameters. In the research results, the analytical and simulation values were in total agreement, demonstrating the correctness of the system performance analysis.

1. Introduction

When energy harvesting (EH) from green environmental sources is considered, radio frequency (RF) signals can be seen as potential electrical sources for cooperative network devices. In comparison with other green environmental electrical sources, an RF signal’s source has excellent advantages, such as small dimensions, low cost, and independence with respect to time and location in urban areas. From this point of view, RF can be considered a novel solution for communication devices. In addition, RF signals can provide both information and energy in communication network nodes, using a well-known technique in the communication cooperative network called a wireless powered network (WPNs). Research in WPNs is therefore an important research direction in both academia and industry [1,2,3,4]. Furthermore, WPNs do not require as much charging, servicing, and maintenance as many battery-powered devices, and this is the great advantage of WPNs in comparison with other types of network. Instead, battery charging, recharging and replacing operations can take place through the air without physical cable connections. We can therefore state that WPNs are a novel solution for future applications of technology such as the Internet of Things (IoT) and the Internet of Everything (IoE) [1,2,3,4,5,6,7,8].
Security is increasingly considered a key area for further study on improving wireless communications, especially in the physical layer. Studies on information exchange security have already been extensively performed for the upper layers, but recently, the security of the physical layer has gained significant importance. Physical layer security (PLS) has recently attracted considerable attention, because it can prevent eavesdropping without data encryption in the upper layer. There is an ever-increasing interest in exploring the PLS of digital communications over fading channels. Due to its simple implementation (i.e., only exploiting characteristics of the wireless medium such as link distance and channel state information), PLS can be implemented efficiently in wireless communication networks, internet-of-things (IoT) networks, etc. [9,10,11,12,13,14]. The authors of [15] investigated a joint relay selection and power scheme to enhance the PLS of a cooperative network with a multiple-antenna source and a single-antenna destination in the presence of untrusted relays and passive eavesdroppers. In [16], secure downlink transmission from a controller to an actuator, with the help of a cooperative jammer to fight against multiple passive eavesdroppers and non-colluding eavesdroppers’ security, was studied, and cooperative jamming was explored to further enhance the PLS. Furthermore, [17] proposed and studied robust quality-of-service-based and secrecy-rate-based secure transmission designs for a multiple-input single-output (MIMO) system with multiple eavesdroppers and a cooperative jammer. A cooperative multi-hop-secured transmission protocol to underlie cognitive radio networks was proposed and considered in [18]. The PLS problem in cognitive decode-and-forward relay networks over a Nakagami-m fading channel is discussed in [19]. Moreover, [20] evaluated the secrecy performance of multi-hop cognitive wireless sensor networks. The secure cooperative transmissions in a dual-hop MIMO relay system (using a combined transmit antenna selection and a maximal-ratio combining scheme over the Nakagami-m fading channels, with an adaptive decode-and-forward relaying protocol and a multi-antenna eavesdropper) were considered in [21]. In [22], the authors investigated three innovative protocols, namely, the shortest path selection protocol, the random path selection protocol, and the best path selection protocol. These protocols enhanced the security of multi-hop multi-path randomize-and-forward cooperative wireless sensor networks, in the presence of eavesdroppers and hardware defects. The authors of [23] investigated the physical layer security of full-duplex two-way multiple AF relaying networks in the presence of an eavesdropper, in terms of the closed form expression of the approximate secrecy outage probability in maximizing the secrecy capacity. Furthermore, [24] proposed the physical layer secure transmission of a cooperative wireless communication system over a three-phase AF two-way relaying channel, and considered a cooperative jamming and multi-antenna relay beam forming scheme to improve the physical layer security of the system. A relay power allocation scheme was proposed in [25], the and information security of a cooperative wireless communication system over three-phase AF two-way relaying channels was investigated, as a way of improving system secrecy capacity. In [26], user selection coupled with an antenna selection (AS) scheme at the base station (BS) was employed in secure cellular multi-user two-way AF relay networks in the presence of a single-antenna passive eavesdropper to maximize the end-to-end signal-to-noise ratios. In addition, the authors of [27] and [28] proposed a novel wireless caching scheme to enhance the physical layer security of video streaming in cellular networks with limited backhaul capacity. Moreover, the authors of [29] studied and investigated the joint effect of fading and co-channel interference (CCI) on the secrecy performance of a wireless communications system when maximal ratio combining (MRC) is employed. From their point of view, the security issue remains unresolved and requires further study. This is the purpose of the present paper. In this paper, the system performance of a hybrid Time–Power Splitting Relaying (TPSR) two-way Half-Duplex (HD) relaying network over a Rayleigh fading channel is investigated, in terms of the Outage Probability (OP) and Intercept Probability (IP). The main contributions of this research are as follows:
(1) A system model of the hybrid TPSR two-way HD relaying communication network over Rayleigh fading channel is developed.
(2) The closed form expressions of the exact and asymptotic IP in two cases (with MRC (maximal ratio combining) techniques and SC (selection combining) techniques), and the closed form expression of the system OP, are derived.
(3) The correctness of the analytical expressions is verified using a Monte Carlo simulation.
The rest of this paper is organized as follows. The hybrid TPSR two-way HD relaying communication network is presented in the second section. The system OP and IP are analyzed and derived in the third section. The research results and some discussion are provided in the fourth section. Finally, the conclusion is proposed in the last section of the paper.

2. Network Model

In this section, a hybrid TPSR two-way HD relaying network over a Rayleigh fading channel is described (Figure 1). Two sources, A and B, communicate with each other with the help of a relay (R), in the presence of an eavesdropper (E). In this system model, all the block-fading channels are Rayleigh fading channels. The Energy Harvesting (EH) and Information Transmission (IT) phases in the interval T are displayed in Figure 2. In the first half-interval, αT, R harvests energy ((1−β)PA) from source A, and the source transfers the information βPA to R, where α is the time-switching factor, β is the power splitting factor, and 0 < α < 0.5 and 0 < β < 1 . Actually, we can consider different values of β for A-to-R and B-to-R links, i.e., β1 for A-to-R and β2 for B-to-R. The analysis should be the same as it is here. However, the resulting formula may be more complex. Without loss of generality, we assume the same β for both A-to-R and B-to-R links, to make the result simpler and more readable. In the next interval αT, R continues to harvest energy ((1−β)PB)) from source B and transfers the information βPB to source A. In the last interval, (1−2α)T, R transfers information to sources A and B [30,31,32,33,34].

2.1. Energy Harvesting Phase

In the first phase, α T , A transmits the message x A with the power P A and the signal received at R can be calculated as follows:
y A R = 1 β h A R x A + n R 1 ,
where n R 1 is additive white Gaussian noise (AWGN) with variance δ 1 2 , h A R is the channel gain of the A–R link, and E { | x A | 2 } = P A where E { } is the expectation operator.
The EH relay employs a fixed power-splitting factor, β , to split the received RF power into two parts: β ( h A R x A + n R ) is used for information transmission, and the remaining power, 1 β ( h A R x A + n R ) , is used for EH.
The amount of harvested energy during the first and second phase can be formulated as
E R = η ( 1 β ) α T ( P A | h A R | 2 + P B | h B R | 2 ) ,
where 0 < η 1 is the energy conversion efficiency, PB is the average transmitted power at the source B, and hBR is the channel gain of the B–R link. Moreover, 0 < β < 1 and 0 < α < 0.5 are the power-splitting and time-switching factors, respectively.
If we assume that P A = P B = P , Equation (2) can be reformulated as the following:
E R = η ( 1 β ) α T P ( | h A R | 2 + | h B R | 2 ) .
The average transmitted power at the relay can be calculated by
P R = E R T ( 1 2 α ) = η ( 1 β ) α T P ( | h A R | 2 + | h B R | 2 ) T ( 1 2 α ) = κ P ( | h A R | 2 + | h B R | 2 ) ,
where κ = η ( 1 β ) α 1 2 α .

2.2. Information Transmission Phase

In the first phase, after completing EH, A will broadcast the information to the node R and to B with the remaining power β P A .
Hence, the signal received at R can be given as the below equation:
y A R = β h A R x A + n R 1 .
Similar to the first phase, the signal received at R in the second phase can be expressed as
y B R = β h B R x B + n R 2 ,
where h B R is the channel gain of the B–R link and E { | x B | 2 } = P B and n R 2 is AWGN with variance δ 2 2 .
Hence, the total signal received at R after nodes A and B transmit their signal can be calculated as
y R = β h A R x A + β h B R x B + n R ,
where n R = n R 1 + n R 2 denotes the total AWGN at R with variance N0.
Finally, in the third phase, the signals received at the A and B nodes can be calculated, respectively, as
y A = h R A x R + n A , y B = h R B x R + n B
where h R A , h R B is the channel gain of R–B and R–A links, respectively, n A , n B is AWGN with variance N0 at the A and B nodes, and E { | x R | 2 } = P R .
In our proposed model, we considered the amplify and forward (AF) mode. In order to ensure that the transmission power at R is PR, the amplifying coefficient μ was chosen as follows:
μ = x R y R = P R β [ P A | h A R | 2 + P B | h B R | 2 ] + N 0 = P R β P [ | h A R | 2 + | h B R | 2 ] + N 0 .
Combining Equation (7) with Equations (5) and (6), the received signal at the A node can be rewritten as
y A = h R A μ ( y A R + y B R ) + n A .
Substituting Equation (7) into Equation (10), we can obtain the following:
y A = h R A μ ( β h A R x A + β h B R x B + n R ) + n A = h R A μ β h B R x B s i g n a l + h R A μ β h A R x A s e l f i n t e r f e r e n c e + h R A μ n R + n A n o i s e
This signal contains both messages, x A and x B , while only x B is the desired signal at A. Since node A perfectly knows its own transmitted symbol x A , it can eliminate the corresponding self-interference term h R A μ β h A R x A from y A .
Therefore, Equation (11) can be reformulated as
y A = h R A μ β h B R x B s i g n a l + h R A μ n R + n A n o i s e .
The signal to noise ratio (SNR) at node A can be formulated as
γ A = E { | s i g n a l | 2 } E { | n o i s e | 2 } = | h R A | 2 | h B R | 2 μ 2 β P | h R A | 2 μ 2 N 0 + N 0 ,
Substituting Equation (5) into Equation (9) and then doing some algebra. In this paper, we assume that the channels are reciprocal, so h B R = h R B and h A R = h R A . Hence, the end-to-end SNR at A can be obtained by
γ A κ β Ψ | h A R | 2 | h B R | 2 κ | h A R | 2 + β ,
where Ψ = P N 0 .
In the total information transmission phase, while R will receive both legitimated messages, x A and x B , from source nodes A and B, E will also overhear the information transmitted by the A and B nodes. Thus, the signal received at E can be obtained by
y E 1 = h A E x A + h B E x B + n E ,
where h A E and h B E are the channel gain of the A–E and B–E links, respectively, and n E is AWGN with variance N0.
During the broadcast signal phase, E also overhears the information from R. Hence, the received signal at E can be given by
y E 2 = h R E x R + n E = h R E μ y R + n E = h R E μ ( β h A R x A + β h B R x B + n R ) + n E
In our model, we analyzed the intercept (IP) at node A. Because our system model was symmetrical, we could analyze at either node A or node B. Therefore, using Equations (15) and (16), the SNR at E (when decoding a successful message from node A) in the two different phases can be determined, respectively, by
γ E 1 = | h A E | 2 P A | h B E | 2 P B + N 0 = | h A E | 2 Ψ | h B E | 2 Ψ + 1 ,
γ E 2 = | h R E | 2 μ 2 β | h A R | 2 P A | h R E | 2 μ 2 β | h B R | 2 P B + | h R E | 2 μ 2 N 0 + N 0 β | h A R | 2 P A β | h B R | 2 P B + N 0 = β | h A R | 2 Ψ β | h B R | 2 Ψ + 1 .

3. Outage Probability and Throughput Analysis

3.1. Outage Probability (OP)

The outage probability at node A can be defined by
O P = Pr ( C A < C t h ) ,
where C A = ( 1 2 α ) T 3 × log 2 ( 1 + γ A ) .
Using Equation (14), Equation (19) can be rewritten as
O P = Pr ( γ A < ρ ) = Pr ( κ β Ψ | h A R | 2 | h B R | 2 κ | h A R | 2 + β < ρ ) = 0 Pr ( | h B R | 2 < ρ ( κ x + β ) κ β Ψ x | | h A R | 2 = x ) × f | h A R | 2 ( x ) d x = 0 Pr ( | h B R | 2 < ρ κ Ψ x + ρ β Ψ ) × f | h A R | 2 ( x ) d x = 0 F | h B R | 2 ( ρ κ Ψ x + ρ β Ψ ) × f | h A R | 2 ( x ) d x = λ A R 0 [ 1 exp ( λ B R ρ κ Ψ x λ B R ρ β Ψ ) ] × exp ( λ A R x ) d x = 1 λ A R exp ( λ B R ρ β Ψ ) 0 exp ( λ B R ρ κ Ψ x λ A R x ) d x
where ρ = 2 3 C t h ( 1 2 α ) T 1 > 0 .
Applying eq (3.324,1) to the table of the integral [35], Equation (20) can be reformulated as
O P = 1 2 exp ( λ B R ρ β Ψ ) ρ λ B R λ A R κ Ψ × K 1 ( 2 ρ λ B R λ A R κ Ψ ) .

3.2. Intercept Probability

Case 1.
Instantaneous End-to-End SNR at E using the MRC Technique.
Using the MRC technique, E combines the SNRs from Equations (17) and (18). Hence, the end-to-end SNR at E can be obtained by
γ E M R C = γ E 1 + γ E 2 = | h A E | 2 Ψ | h B E | 2 Ψ + 1 + β | h A R | 2 Ψ β | h B R | 2 Ψ + 1 .
From Equations (14) and (12), we can now claim the capacities at node E are
C E M R C = ( 1 2 α ) T 3 × log 2 ( 1 + γ E M R C ) .
The IP can be calculated as
I P = Pr ( C E M R C C t h ) ,
where C t h is a predetermined threshold.
Combining Equations (22) and (23), Equation (24) can be rewritten as
I P = Pr ( | h A E | 2 Ψ | h B E | 2 Ψ + 1 + β | h A R | 2 Ψ β | h B R | 2 Ψ + 1 ρ ) = Pr ( X + Y ρ ) = 1 Pr ( X + Y < ρ ) = 1 0 ρ F X ( ρ Y | Y = y ) f Y ( y ) d y
where ρ = 2 3 C t h ( 1 2 α ) T 1 > 0 and X = | h A E | 2 Ψ | h B E | 2 Ψ + 1 , Y = β | h A R | 2 Ψ β | h B R | 2 Ψ + 1 .
Comment: We assume that all of the channels are Rayleigh fading channels. Firstly, in order to find the IP in Equation (22), we have to determine the cumulative distribution function (CDF) and probability density function (PDF) of X, Y, respectively, as follows:
F X ( x ) = Pr ( X < x ) = Pr ( | h A E | 2 Ψ | h B E | 2 Ψ + 1 < x ) = Pr ( | h A E | 2 < x | h B E | 2 + x Ψ ) = 0 F | h A E | 2 ( x | h B E | 2 + x Ψ | | h B E | 2 = t ) × f | h B E | 2 ( t ) d t = 1 λ B E × exp [ λ A E x Ψ ] 0 exp ( λ B E t ) × exp ( x λ A E t ) d t = 1 λ B E × exp [ λ A E x Ψ ] λ B E + x λ A E
where λ A E and λ B E is the mean of the random variables (RVs) | h A E | 2 and | h B E | 2 , respectively.
Similar to above, the CDF of Y can be obtained by
F Y ( y ) = Pr ( Y < y ) = Pr ( β | h A R | 2 Ψ β | h B R | 2 Ψ + 1 < y ) = 1 λ B R × exp ( λ A R y β Ψ ) λ B R + y λ A R
where λ A R and λ B R is the mean of RVs | h A R | 2 and | h B R | 2 , respectively.
From Equation (24), the PDF of Y can be formulated as
f Y ( y ) = F Y ( y ) y = λ B R × exp ( λ A R y β Ψ ) × ( λ B R λ A R β Ψ + ( λ A R ) 2 y β Ψ + λ A R ) ( λ B R + y λ A R ) 2 .
Lemma 1.
Exact Analysis.
Substituting Equations (26) and (28) into Equation (25), the IP can be claimed as
I P = 1 λ B R 0 ρ [ 1 λ B E × exp [ λ A E ( ρ y ) Ψ ] λ B E + ( ρ y ) λ A E ] × exp ( λ A R y β Ψ ) × ( λ B R λ A R β Ψ + ( λ A R ) 2 y β Ψ + λ A R ) ( λ B R + y λ A R ) 2 d y = 1 λ B R 0 ρ exp ( λ A R y β Ψ ) × ( λ B R λ A R β Ψ + ( λ A R ) 2 y β Ψ + λ A R ) ( λ B R + y λ A R ) 2 d y P 1 + λ B R λ A E β Ψ exp ( λ A E ρ Ψ ) 0 ρ exp [ y ( λ A R β Ψ λ A E Ψ ) ] ( λ B R λ A R + y + β Ψ λ A R ) [ λ B E λ A E + ρ y ] ( λ B R λ A R + y ) 2 d y P 2
We can now solve for P 1 and P 2 .
By using results from Equation (27), P 1 can be obtained as
P 1 = 1 λ B R × exp ( λ A R ρ β Ψ ) λ B R + ρ λ A R .
Next, we consider P 2 . Using Equation (29), P 2 can be rewritten as
P 2 = λ B R λ A E β Ψ exp ( λ A E ρ Ψ ) × 0 ρ exp [ b y ] ( y + a ) ( c + y ) 2 ( d y ) d y P ˜ 2 ,
where a = λ B R λ A R + β Ψ λ A R , b = λ A R β Ψ λ A E Ψ , c = λ B R λ A R and d = λ B E λ A E + ρ ,
with
P ˜ 2 = 0 ρ exp [ b y ] ( y + a ) ( c + y ) 2 ( d y ) d y = 1 ( c + d ) 2 ( c + x ) × a { [ e b d ( c + x ) E i ( b d b x ) + e b c ( c + d ) ( b ( c + x ) E i ( b c b x ) + e b ( c + x ) ) e b c ( c + x ) E i ( b c b x ) ] } d e b d ( c + x ) E i ( b d b x ) + d e b c ( c + x ) E i ( b c b x ) + c e b c ( c + d ) ( b ( c + x ) E i ( b c b x ) + e b ( c + x ) ) | ρ 0 = 1 ( c + d ) 2 ( c + ρ ) × a { [ e b d ( c + ρ ) E i ( b d b ρ ) + e b c ( c + d ) ( b ( c + ρ ) E i ( b c b ρ ) + e b ( c + ρ ) ) e b c ( c + ρ ) E i ( b c b ρ ) ] } d e b d ( c + ρ ) E i ( b d b ρ ) + d e b c ( c + ρ ) E i ( b c b ρ ) + c e b c ( c + d ) ( b ( c + ρ ) E i ( b c b ρ ) + e b ( c + ρ ) ) 1 c ( c + d ) 2 × a { [ c e b d E i ( b d ) + e b c ( c + d ) ( b c E i ( b c ) + e b c ) c e b c E i ( b c ) ] } c d e b d E i ( b d ) + c d e b c E i ( b c ) + c e b c ( c + d ) ( b c E i ( b c ) + e b c )
where Ei ( x ) = x e t t d t is the exponential integral.
Finally, IP can be determined by
I P = λ B R × exp ( λ A R ρ β Ψ ) λ B R + ρ λ A R + λ B R λ A E β Ψ exp ( λ A E ρ Ψ ) × P ˜ 2
where P ˜ 2 was defined in Equation (32).
Lemma 2.
Asymptotic Analysis.
At the high SNR regime ( Ψ + ) , the IP can be approximated by
I P a s y m = Pr ( | h A E | 2 | h B E | 2 + | h A R | 2 | h B R | 2 ρ ) = 1 Pr ( | h A E | 2 | h B E | 2 + | h A R | 2 | h B R | 2 < ρ ) = 1 0 ρ F X ( ρ Y | Y = y ) f Y ( y ) d y
It is easy to observe from Equations (26) and (27) that we can obtain the CDF of X and Y at a high SNR, respectively, as follows:
F X ( x ) = 1 λ B E λ B E + x λ A E , F Y ( y ) = 1 λ B R λ B R + y λ A R
The PDF of Y can be obtained from Equation (35):
f Y ( y ) = λ A R λ B R ( λ B R + y λ A R ) 2 .
Substituting Equations (35) and (36) into Equation (34), the IP, in this case, can be determined by
I P a s y m = 1 0 ρ [ 1 λ B E λ B E + ( ρ y ) λ A E ] × λ A R λ B R ( λ B R + y λ A R ) 2 d y = λ B R λ B R + ρ λ A R + 0 ρ λ A R λ B R ( λ B R + y λ A R ) 2 × λ B E λ B E + ( ρ y ) λ A E d y = λ B R λ B R + ρ λ A R + c ( d ρ ) 0 ρ [ 1 ( c + d ) ( c + y ) 2 + 1 ( c + d ) 2 ( c + y ) + 1 ( c + d ) 2 ( d y ) ] d y
where c = λ B R λ A R , d = λ B E λ A E + ρ .
The integral in Equation (37) is not complicated and in easy to compute. Hence, we can obtain
I P a s y m = λ B R λ B R + ρ λ A R + c ( d ρ ) [ ρ c ( c + d ) ( c + ρ ) + ln ( 1 + ρ c 1 ρ d ) ( c + d ) 2 ] .
Case 2.
Instantaneous End-to-End SNR at E under SC Technique
With the SC technique, E will choose the max SNR from Equations (17) and (18). Hence, the end-to-end SNR at E can be expressed by
γ E S C = max ( γ E 1 , γ E 2 ) = max ( | h A E | 2 Ψ | h B E | 2 Ψ + 1 , β | h A R | 2 Ψ β | h B R | 2 Ψ + 1 ) .
Lemma 3.
Exact analysis.
The IP can be given by
I P = Pr ( γ E S C ρ ) = Pr [ max ( | h A E | 2 Ψ | h B E | 2 Ψ + 1 , β | h A R | 2 Ψ β | h B R | 2 Ψ + 1 ) ρ ] = 1 Pr ( | h A E | 2 Ψ | h B E | 2 Ψ + 1 < ρ ) Pr ( β | h A R | 2 Ψ β | h B R | 2 Ψ + 1 < ρ )
From Equations (26) and (27), we have
I P = 1 { 1 λ B E × exp [ λ A E ρ Ψ ] λ B E + ρ λ A E } { 1 λ B R × exp ( λ A R ρ β Ψ ) λ B R + ρ λ A R } .
Lemma 4.
Asymptotic analysis.
From Equation (31), the I P a s y m can be given by
I P a s y m = 1 ( 1 λ B E λ B E + ρ λ A E ) ( 1 λ B R λ B R + ρ λ A R ) .
Remark.
The position of the E is integrated into the channel gains h A E , h B E and h R E . Communication between A and B with the assistance of R does not require knowledge about the position of the E. The position of E only affects the IP of E.

4. Numerical Results and Discussion

A Monte Carlo simulation was conducted to validate the correctness of the system performance analysis in terms of the derived IP and OP expressions [36,37,38,39,40,41,42,43,44,45,46,47,48]. The analytical and simulation results should match to verify the correctness of our analysis.
In Figure 3, the system IP is considered as a function of the time switching factor α, with the main system parameters set as Cth = 0.5 bps/Hz, ψ = 10 dB and β = 0.5, 0.85, respectively. In this simulation stage, we vary the time switching factor α from 0 to 0.5, as shown in Figure 3. As shown in Figure 3, the system IP decreases to 0 as α changes from 0 to 0.3, and remains at 0 with further rises of α. In Figure 3, we considered both cases using SC and MRC techniques. When α increases, SNR threshold also increases, because ρ = 2 3 C t h ( 1 2 α ) T 1 > 0 (from Equation (23)). Therefore, IP decreases. The IP versus the power splitting factor β, is also plotted in Figure 4. In this figure, we set the primary system parameters as Cth = 0.5 bps/Hz, α = 0.3, and ψ = 10 dB, 15 dB, respectively, and vary the power splitting factor β from 0 to 1. From Figure 4, we can see that the system IP has a critical increase with the rising of β. It can be observed that when β increases, the SNR at E in phase three (Equation (18)) increases. Therefore, IP increases. In addition, the system IP of the MRC technique is better than the system IP of the SC technique as shown in Figure 3 and Figure 4. Moreover, the simulation produces an agreement between the analytical curves (drawn in Figure 3 and Figure 4), demonstrating the correctness of the system performance analysis described in the above section.
In Figure 5, we investigated the influence of ψ on the system IP, with the main system parameters as Cth = 0.5 bps/Hz, β = 0.5 in both cases, using SC and MRC techniques. From the research results, we can see that the exact system IP significantly rises while ψ varies from 0 to 25, and then retains a constant value near the asymptotic system IP. When SNR increases (i.e., when the power of sources A and B increases), the harvested energy at R also increases. Therefore, the transmit power of all sources and relays increases, leading to an increase in IP. This can be verified using Equations (17) and (18). As in Figure 3 and Figure 4, we can see that the simulation and analytical values are the same, and the values obtained with the MRC technique are better than those obtained with the SC technique for verifying the correctness of the system performance analysis described in the third section.
Moreover, the system OP versus the time switching factors α and ψ is displayed in Figure 5 and Figure 6, respectively. Here, the main system parameters are set at Cth = 0.5 bps/Hz, ψ = 10 dB, η = 0.8, and β = 0.5, 0.85 for Figure 6, and Cth = 0.5 bps/Hz, α = 0.3, β = 0.5 and η = 0.5, 1 for Figure 7, respectively. From Figure 6, it can be observed that the system OP decreases greatly with a rise of α from 0.05 to 0.25 and then increases greatly as α rises from 0.25 to 0.45. The optimal value for system OP is obtained with α near 0.2–0.25, as shown in Figure 6. In the same way, the system OP decreases greatly with rising ψ, as shown in Figure 7. In both Figure 6 and Figure 7, we can state that the simulation and analytical curves do not differ, demonstrating the correctness of the analytical section of this paper.
Finally, the system OP versus β is presented in Figure 8, with the main system parameters set as Cth = 0.5 bps/Hz, ψ = 10 dB, η = 1, and α = 0.3, 0.15, respectively. In Figure 8, we can see that the system OP decreases greatly as α rises from 0 to 0.5 and then increases greatly as α rises from 0.5 to 1. The optimal value of the system OP is obtained with α near 0.5, as shown in Figure 8. Again, the simulation and analytical curves do not differ, demonstrating the correctness of the analysis.

5. Conclusions

In this paper, the system performance of a hybrid TPSR two-way HD relaying network over a Rayleigh fading channel was investigated, in terms of the system OP and IP. The closed form expressions of the exact and asymptotic IP in two cases (with MRC (maximal ratio combining) and SC (selecting combining) techniques) were derived to analyze the system performance. Moreover, the closed form expression of the system OP was analyzed and derived. The correctness of all the analytical expressions of OP and IP in the system model was verified using a Monte Carlo simulation, in connection with all main system parameters. The results show that the analytical and simulation values agree well with each other.

Author Contributions

Methodology, N.H.A., T.N.N.; software, N.H.A., T.N.N., and D.-H.H.; validation, T.N.N., and D.-H.H.; writing—original draft preparation, T.N.N., M.T.; writing—review and editing, T.N.N., M.T.; supervision, M.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bi, S.; Ho, C.K.; Zhang, R. Wireless powered communication: Opportunities and challenges. IEEE Commun. Mag. 2015, 53, 117–125. [Google Scholar] [CrossRef] [Green Version]
  2. Niyato, D.; Kim, D.I.; Maso, M.; Han, Z. Wireless Powered Communication Networks: Research Directions and Technological Approaches. IEEE Wirel. Commun. 2017, 2–11. [Google Scholar] [CrossRef]
  3. Yu, H.; Lee, H.; Jeon, H. What is 5G? Emerging 5G Mobile Services and Network Requirements. Sustainability 2017, 9, 1848. [Google Scholar] [CrossRef] [Green Version]
  4. Zhou, X.; Zhang, R.; Ho, C.K. Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff. IEEE Trans. Commun. 2013, 61, 4754–4767. [Google Scholar] [CrossRef] [Green Version]
  5. Nguyen, T.N.; Tran, M.; Ha, D.H.; Trang, T.T.; Vozňák, M. Multi-source in DF Cooperative Networks with the PSR Protocol Based Full-duplex Energy Harvesting over a Rayleigh Fading Channel: Performance Analysis. Proc. Est. Acad. Sci. 2019, 68, 264. [Google Scholar] [CrossRef]
  6. Nguyen, T.N.; Tran, M.; Nguyen, T.L.; Ha, D.H.; Voznak, M. Performance Analysis of a User Selection Protocol in Cooperative Networks with Power Splitting Protocol-Based Energy Harvesting Over Nakagami-m/Rayleigh Channels. Electronics 2019, 8, 448. [Google Scholar] [CrossRef] [Green Version]
  7. Nguyen, T.; Quang Minh, T.; Tran, P.; Vozňák, M. Energy Harvesting over Rician Fading Channel: A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments. Sensors 2018, 18, 1781. [Google Scholar] [CrossRef] [Green Version]
  8. Nguyen, T.N.; Minh, T.H.Q.; Tran, P.T.; Voznak, M.; Duy, T.T.; Nguyen, T.L.; Tin, P.T. Performance Enhancement for Energy Harvesting Based Two-way Relay Protocols in Wireless Ad-hoc Networks with Partial and Full Relay Selection Methods. Ad Hoc Netw. 2019, 84, 178–187. [Google Scholar] [CrossRef]
  9. Liu, R.; Maric, I.; Spasojevic, P.; Yates, R.D. Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions. IEEE Trans. Inf. Theory 2008, 54, 2493–2507. [Google Scholar] [CrossRef] [Green Version]
  10. Gopala, P.K.; Lai, L.; El Gamal, H. On the Secrecy Capacity of Fading Channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698. [Google Scholar] [CrossRef] [Green Version]
  11. Zhang, J.; Duong, T.Q.; Woods, R.; Marshall, A. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview. Entropy 2017, 19, 420. [Google Scholar] [CrossRef]
  12. Sun, L.; Qinghe, D. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy 2018, 20, 730. [Google Scholar] [CrossRef] [Green Version]
  13. Sun, L.; Qinghe, D. Physical Layer Security with Its Applications in 5G Networks: A Review. China Commun. 2017, 14, 1–14. [Google Scholar] [CrossRef]
  14. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. Safeguarding 5G Wireless Communication Networks Using Physical Layer Security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
  15. Kuhestani, A.; Abbas, M.; Mohammadali, M. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2017, 1. [Google Scholar] [CrossRef] [Green Version]
  16. Hu, L.; Wen, H.; Wu, B.; Pan, F.; Liao, R.F.; Song, H.; Tang, J.; Wang, X. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things. IEEE Internet Things J. 2018, 5, 219–928. [Google Scholar] [CrossRef]
  17. Ma, H.; Cheng, J.; Wang, X.; Ma, P. Robust MISO Beamforming with Cooperative Jamming for Secure Transmission from Perspectives of QoS and Secrecy Rate. IEEE Trans. Commun. 2018, 66, 767–780. [Google Scholar] [CrossRef]
  18. Tran Tin, P.; Nguyen, T.N.; Duy, T.T.; Voznak, M. Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments. Entropy 2019, 21, 217. [Google Scholar] [CrossRef] [Green Version]
  19. Zhao, R.; Yuan, Y.; Fan, L.; He, Y.-C. Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami-m Fading Channels. IEEE Trans. Commun. 2017, 65, 549–563. [Google Scholar] [CrossRef]
  20. Tin, P.T.; Minh Nam, P.; Trung Duy, T.; Tran, P.T.; Voznak, M. Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs under Joint Constraint of Interference and Hardware Imperfection. Sensors 2019, 19, 1160. [Google Scholar] [CrossRef] [Green Version]
  21. Zhao, R.; Lin, H.; He, Y.-C.; Chen, D.-H.; Huang, Y.; Yang, L. Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems with Outdated CSI. IEEE Trans. Commun. 2018, 2, 546–559. [Google Scholar] [CrossRef]
  22. Hieu, T.D.; Duy, T.T.; Kim, B.-S. Performance Enhancement for Multi-hop Harvest-to-Transmit WSNs with Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises. IEEE Sens. J. 2018, 2, 5173–5186. [Google Scholar] [CrossRef]
  23. Liu, F.; Li, J.; Li, S.; Liu, Y.A. Physical Layer Security of Full-Duplex Two-Way AF Relaying Networks with Optimal Relay Selection. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018. [Google Scholar] [CrossRef]
  24. Ma, Z.; Lu, Y.; Shen, L.; Liu, Y.; Wang, N. Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way Relaying. In Proceedings of the 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Zhengzhou, China, 18–20 October 2018. [Google Scholar] [CrossRef]
  25. Ma, Z.; Wang, N.; Lu, Y.; Zhang, D. Relay Power Allocation for Security Enhancement in Three-phase AF Two-way Relaying Systems. In Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11–13 October 2017. [Google Scholar] [CrossRef]
  26. Shukla, M.K.; Yadav, S.; Purohit, N. Secure Transmission in Cellular Multiuser Two-Way Amplify-and-Forward Relay Networks. IEEE Trans. Veh. Technol. 2018, 67, 11886–11899. [Google Scholar] [CrossRef]
  27. Xiang, L.; Ng, D.W.K.; Schober, R.; Wong, V.W. Cache-Enabled Physical Layer Security for Video Streaming in Backhaul-Limited Cellular Networks. IEEE Trans. Wirel. Commun. 2018, 17, 736–751. [Google Scholar] [CrossRef] [Green Version]
  28. Xiang, L.; Ng, D.W.K.; Schober, R.; Wong, V.W. Secure Video Streaming in Heterogeneous Small Cell Networks With Untrusted Cache Helpers. IEEE Trans. Wirel. Commun. 2018, 17, 2645–2661. [Google Scholar] [CrossRef] [Green Version]
  29. Moualeu, J.M.; Hamouda, W.; Takawira, F. Intercept Probability Analysis of Wireless Networks in the Presence of Eavesdropping Attack with Co-Channel Interference. IEEE Access 2018, 6, 41490–41503. [Google Scholar] [CrossRef]
  30. Nguyen, T.N.; Tran, P.T.; Voznak, M. Wireless energy harvesting meets receiver diversity: A successful approach for two-way half-duplex relay networks over block Rayleigh fading channel. Comput. Netw. 2020, 172, 107176. [Google Scholar] [CrossRef]
  31. Nguyen, T.N.; Tran, P.T.; Minh, T.H.Q.; Voznak, M.; Sevcik, L. Two-Way Half Duplex Decode and Forward Relaying Network with Hardware Impairment over Rician Fading Channel: System Performance Analysis. Elektron. Elektrotech. 2018, 24. [Google Scholar] [CrossRef] [Green Version]
  32. Gu, Y.; Chen, H.; Li, Y.; Vucetic, B. An adaptive transmission protocol for wireless-powered cooperative communications. In Proceedings of the IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 4223–4228. [Google Scholar]
  33. Ju, H.; Zhang, R. Throughput Maximization in Wireless Powered Communication Networks. IEEE Trans. Wirel. Commun. 2014, 13, 418–428. [Google Scholar] [CrossRef] [Green Version]
  34. Bhatnagar, M.R. On the Capacity of Decode-and-Forward Relaying over Rician Fading Channels. IEEE Commun. Lett. 2013, 17, 1100–1103. [Google Scholar] [CrossRef] [Green Version]
  35. Jeffrey, A.; Zwillinger, D. (Eds.) Table of Integrals, Series, and Products; Springer: New York, NY, USA, 2015. [Google Scholar] [CrossRef]
  36. Nasir, A.A.; Zhou, X.; Durrani, S.; Kennedy, R.A. Relaying Protocols for Wireless Energy Harvesting and Information Processing. IEEE Trans. Wirel. Commun. 2013, 12, 3622–3636. [Google Scholar] [CrossRef] [Green Version]
  37. Tan, N.; Nguyen, T.H.Q.; Minh, P.; Tran, T.; Voznak, M. Adaptive Energy Harvesting Relaying Protocol for Two-Way Half Duplex System Network over Rician Fading Channels. Wirel. Commun. Mob. Comput. 2018, 2018, 10. [Google Scholar]
  38. Nguyen, T.; Tin, P.T.; Ha, D.; Voznak, M.; Tran, P.; Tran, M.; Nguyen, T.-L. Hybrid TSR–PSR Alternate Energy Harvesting Relay Network over Rician Fading Channels: Outage Probability and SER Analysis. Sensors 2018, 18, 3839. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  39. Tin, P.T.; Dinh, B.H.; Nguyen, T.N.; Ha, D.H.; Trang, T.T. Power Beacon-Assisted Energy Harvesting Wireless Physical Layer Cooperative Relaying Networks: Performance Analysis. Symmetry 2020, 12, 106. [Google Scholar] [CrossRef] [Green Version]
  40. Park, J.-H.; Jeon, Y.-S.; Han, S. Energy Beamforming for Wireless Power Transfer in MISO Heterogeneous Network with Power Beacon. IEEE Commun. Lett. 2017, 21, 1163–1166. [Google Scholar] [CrossRef]
  41. Tin, P.T.; Nguyen, T.N.; Tran, M.; Trang, T.T.; Sevcik, L. Exploiting Direct Link in Two-Way Half-Duplex Sensor Network over Block Rayleigh Fading Channel: Upper Bound Ergodic Capacity and Exact SER Analysis. Sensors 2020, 20, 1165. [Google Scholar] [CrossRef] [Green Version]
  42. Nguyen, T.N.; Tran, M.; Nguyen, T.L.; Voznak, M. Adaptive Relaying Protocol for Decode and Forward Full-Duplex System over Rician Fading Channel: System Performance Analysis. China Commun. 2019, 16, 92–102. [Google Scholar]
  43. Tin, P.T.; Nguyen, T.N.; Sang, N.Q.; Duy, T.T.; Tran, P.T.; Voznak, M. Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments. Entropy 2019, 21, 700. [Google Scholar] [CrossRef] [Green Version]
  44. Nguyen, T.N.; Tran, M.; Nguyen, T.-L.; Ha, D.-H.; Voznak, M. Multisource Power Splitting Energy Harvesting Relaying Network in Half-Duplex System over Block Rayleigh Fading Channel: System Performance Analysis. Electronics 2019, 8, 67. [Google Scholar] [CrossRef] [Green Version]
  45. Valenta, C.R.; Durgin, G.D. Harvesting wireless power: Survey of energy-harvester conversion efficiency infar-field, wireless power transfer systems. IEEE Microw. Microw. Mag. 2014, 15, 108–120. [Google Scholar]
  46. Phan, V.D.; Nguyen, T.N.; Tran, M.; Trang, T.T.; Voznak, M.; Ha, D.H.; Nguyen, T.L. Power Beacon-Assisted Energy Harvesting in a Half-Duplex Communication Network under Co-Channel Interference over a Rayleigh Fading Environment: Energy Efficiency and Outage Probability Analysis. Energies 2019, 12, 2579. [Google Scholar] [CrossRef] [Green Version]
  47. Nguyen, T.N.; Tran, M.; Ha, D.-H.; Nguyen, T.-L.; Voznak, M. Energy harvesting based two-way full-duplex relaying network over a Rician fading environment: performance analysis. P. Est. Acad. Sci. 2019, 68, 111. [Google Scholar] [CrossRef]
  48. Nguyen, T.N.; Tran, M.; Tran, P.T.; Tin, P.T.; Nguyen, T.-L.; Ha, D.-H.; Voznak, M. On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels. Security and Communication Networks 2018, 2018, 1–11. [Google Scholar] [CrossRef]
Figure 1. The relaying network model.
Figure 1. The relaying network model.
Electronics 09 00428 g001
Figure 2. Energy harvesting (EH) and information transmission (IT) phases.
Figure 2. Energy harvesting (EH) and information transmission (IT) phases.
Electronics 09 00428 g002
Figure 3. Intercept probability (IP) versus α.
Figure 3. Intercept probability (IP) versus α.
Electronics 09 00428 g003
Figure 4. IP versus β.
Figure 4. IP versus β.
Electronics 09 00428 g004
Figure 5. IP versus ψ.
Figure 5. IP versus ψ.
Electronics 09 00428 g005
Figure 6. Outage probability (OP) versus α.
Figure 6. Outage probability (OP) versus α.
Electronics 09 00428 g006
Figure 7. OP versus ψ.
Figure 7. OP versus ψ.
Electronics 09 00428 g007
Figure 8. OP versus β.
Figure 8. OP versus β.
Electronics 09 00428 g008

Share and Cite

MDPI and ACS Style

Hoang An, N.; Tran, M.; Nguyen, T.N.; Ha, D.-H. Physical Layer Security in a Hybrid TPSR Two-Way Half-Duplex Relaying Network over a Rayleigh Fading Channel: Outage and Intercept Probability Analysis. Electronics 2020, 9, 428. https://doi.org/10.3390/electronics9030428

AMA Style

Hoang An N, Tran M, Nguyen TN, Ha D-H. Physical Layer Security in a Hybrid TPSR Two-Way Half-Duplex Relaying Network over a Rayleigh Fading Channel: Outage and Intercept Probability Analysis. Electronics. 2020; 9(3):428. https://doi.org/10.3390/electronics9030428

Chicago/Turabian Style

Hoang An, Ngo, Minh Tran, Tan N. Nguyen, and Duy-Hung Ha. 2020. "Physical Layer Security in a Hybrid TPSR Two-Way Half-Duplex Relaying Network over a Rayleigh Fading Channel: Outage and Intercept Probability Analysis" Electronics 9, no. 3: 428. https://doi.org/10.3390/electronics9030428

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop