Physical Layer Security in Cooperative AF Relaying Networks With Direct Links Over Mixed Rayleigh and Double-Rayleigh Fading Channels

In this paper, we investigate the secrecy performance of a dual-hop cooperative relaying network, where a source node communicates with a destination node via an amplify-and-forward relay node and via direct link in the presence of a passive eavesdropper. In this network, the eavesdropper exploits the advantages of both direct and relay links. We assume that the source, relay, and eavesdropper nodes are mobile, and the destination node is stationary. Moreover, we consider that the source-relay, relay-destination, and source-destination links experience Rayleigh fading, whereas source-eavesdropper and relay-eavesdropper links undergo double-Rayleigh fading. Examples of such scenario are encountered in vehicle-to-vehicle communication and/or vehicle-to-infrastructure communication under cooperative vehicular networks. In particular, we derive new tight closed-form expressions for the secrecy outage probability and ergodic secrecy capacity of the considered system under mixed fading environments. In addition, we present an effective secrecy diversity order within the main-to-eavesdropper ratio ranges of practical interest, and demonstrate that the secrecy diversity order of 2 can be achieved. Finally, the numerical and simulation results corroborate our analytical findings, and show the occurrence conditions for secrecy outage probability and ergodic secrecy capacity floors, and impacts of channel conditions and relay and eavesdropper positions on the system secrecy performance.

[1]  H. Vincent Poor,et al.  Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems , 2015, IEEE Transactions on Communications.

[2]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[3]  Jørgen Bach Andersen Stastistical distributions in mobile communications using multiple scattering , 2002 .

[4]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[5]  Mohsen Guizani,et al.  A Unified Approach for Calculating the Outage Performance of Two-Way AF Relaying Over Fading Channels , 2015, IEEE Transactions on Vehicular Technology.

[6]  Patrick Claus F. Eggers,et al.  Investigations of outdoor-to-indoor mobile-to-mobile radio communication channels , 2002, Proceedings IEEE 56th Vehicular Technology Conference.

[7]  Samuel Pierre,et al.  On the Performance of Multihop-Intervehicular Communications Systems Over n*Rayleigh Fading Channels , 2016, IEEE Wireless Communications Letters.

[8]  George C. Alexandropoulos,et al.  Secrecy Outage Analysis Over Correlated Composite Nakagami- $m$ /Gamma Fading Channels , 2017, IEEE Communications Letters.

[9]  Mehdi Bennis,et al.  Sum Secrecy Rate Maximization for Relay-Aided Multiple-Source Multiple-Destination Networks , 2017, IEEE Transactions on Vehicular Technology.

[10]  Kwok Hung Li,et al.  Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes , 2016, IEEE Transactions on Information Forensics and Security.

[11]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[12]  Tiep Minh Hoang,et al.  Optimal Power Allocation for Multiuser Secure Communication in Cooperative Relaying Networks , 2016, IEEE Wireless Communications Letters.

[13]  Mohamed-Slim Alouini,et al.  Physical Layer Security for Cooperative Relaying Over Generalized- $K$ Fading Channels , 2018, IEEE Wireless Communications Letters.

[14]  Simon L. Cotton,et al.  Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..

[15]  Murat Uysal,et al.  Relay Selection in Dual-Hop Vehicular Networks , 2011, IEEE Signal Processing Letters.

[16]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[17]  Jinhong Yuan,et al.  Location-Based Secure Transmission for Wiretap Channels , 2015, IEEE Journal on Selected Areas in Communications.

[18]  Matthias Pätzold,et al.  Modeling, analysis, and simulation of MIMO mobile-to-mobile fading channels , 2008, IEEE Transactions on Wireless Communications.

[19]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[20]  Yongming Huang,et al.  Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems With Outdated CSI , 2018, IEEE Transactions on Communications.

[21]  István Z. Kovács,et al.  Radio channel description and quality of service for TETRA direct mode operation in forest environments , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[22]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[23]  George K. Karagiannidis,et al.  Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.

[24]  Bo Ai,et al.  Physical Layer Security Over Fluctuating Two-Ray Fading Channels , 2018, IEEE Transactions on Vehicular Technology.

[25]  Murat Uysal,et al.  Cooperative Diversity for Intervehicular Communication: Performance Analysis and Optimization , 2009, IEEE Transactions on Vehicular Technology.

[26]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[27]  Gaofeng Pan,et al.  Secrecy outage analysis with Kth best relay selection in dual-hop inter-vehicle communication systems , 2017 .

[28]  Hai Jiang,et al.  Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper , 2017, IEEE Transactions on Wireless Communications.

[29]  A. M. Mathai,et al.  Generalized Hypergeometric Functions with Applications in Statistics and Physical Sciences , 1973 .

[30]  Li Sun,et al.  Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.

[31]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[32]  Caijun Zhong,et al.  Secure Transmission in Cooperative Relaying Networks With Multiple Antennas , 2016, IEEE Transactions on Wireless Communications.

[33]  I︠u︡. A Brychkov Handbook of Special Functions: Derivatives, Integrals, Series and Other Formulas , 2008 .

[34]  Hyung Yun Kong,et al.  Outage Probability Analysis in Dual-Hop Vehicular Networks with the Assistance of Multiple Access Points and Vehicle Nodes , 2016, Wirel. Pers. Commun..

[35]  Aydin Behnad,et al.  On the Secrecy Rate Achievability in Dual-Hop Amplify-and-Forward Relay Networks , 2014, IEEE Wireless Communications Letters.

[36]  I. S. Ansari,et al.  Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.

[37]  Ali Kuhestani,et al.  Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[38]  Trung Quang Duong,et al.  Secure Multiuser Scheduling in Downlink Dual-Hop Regenerative Relay Networks Over Nakagami- $m$ Fading Channels , 2016, IEEE Transactions on Wireless Communications.

[39]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[40]  Kiseon Kim,et al.  Secrecy Outage Probability of Optimal Relay Selection for Secure AnF Cooperative Networks , 2015, IEEE Communications Letters.

[41]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[42]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[43]  George K. Karagiannidis,et al.  Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.

[44]  Sevil Sen,et al.  A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.

[45]  P. Vainikainen,et al.  Statistical Analysis of the Multiple Scattering Radio Channel , 2006, IEEE Transactions on Antennas and Propagation.

[46]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[47]  Lu Lv,et al.  Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation , 2017, IET Commun..

[48]  Hui Wang,et al.  Impact of Relay’s Eavesdropping on Untrusted Amplify-and-Forward Networks Over Nakagami- $m$ Fading , 2018, IEEE Wireless Communications Letters.