1. Introduction
With the rapid growth of communications between socially-connected users, not only physical parameters, e.g., channel qualities and traffic demands, but also the social relationship among users, such as kinship, friendship, and acquaintance, have been taken into account as key design parameters for efficient cooperative communications [
1,
2,
3,
4,
5]. As the most fundamental concept, the trust degree of the social relationship is interpreted as the degree that reveals how willingly a node helps other nodes’ communication in cooperative communications [
5]. In other words, the node would like to cooperate with others by consuming their own resources if they have a close relationship, i.e., a high trust degree, which can be evaluated and quantified based on the previous direct or indirect information according to observations of behavior [
6].
In the literature, the trust degree has triggered plenty of research interest in various fields, including content caching, mobile social communications, and especially cooperative communications [
1,
2,
3,
4,
5]. More specifically, the optimal social-aware relay selection strategy was proposed in [
1], while a partner selection algorithm was designed based on the social-position relationship in [
2]. The trust degree-based beamforming and transmission strategies were investigated for one relay in [
3] and two relays with different trusts in [
4] for a MISO cooperative communication system. Meanwhile, the traffic demand-driven user cooperation strategies were considered for various antenna configurations based on the trust degree in [
5].
Due to the broadcasting nature of wireless mediums, physical (PHY)-layer security has also drawn significant attention in communication networks [
7,
8,
9,
10,
11]. Specifically, the authors in [
8] gave a constructive survey on threats and attacks on mobile networks, while a comprehensive survey on cooperative relaying and jamming strategies for physical layer security was presented in [
9]. Meanwhile, the performance analysis of mmWave-overlaid microwave cellular networks was given in [
10] from the security perspective, and secrecy analysis with passive eavesdroppers by using partial cooperation was investigated in [
11]. Furthermore, with the rapid development of social awareness networks, the combination of the trust degree and PHY-layer security with application to cooperative communications has attracted plenty of research [
12,
13,
14,
15]. To be specific, the authors in [
12] treated potential eavesdroppers as relays to transmit messages and maximize the expected secrecy rate according to their trustworthiness, instead of regarding them as wiretappers all the time. In [
13,
14], trust degree-based cooperative secure transmission strategies were proposed, and users with sufficiently high trust degrees would cooperate to transmit data or jamming signals. In [
15], jamming-aided cooperative cooperation based on trust degree was investigated to maximize the security rate of the data transmission for P2P communications, where the authors applied a brute-force approach to search over all possible power allocations of the confidential message and jamming signal. However, the trust degree in [
13,
14] was exploited to choose trustworthy users (jammer [
13], jammer and relay [
14]) and filter out untrustworthy users (dummy nodes), and the explicit relationship between power allocations and trust degree had not been investigated and given in [
15]. Therefore, the characteristics of the jammer’ trust degree were not fully utilized to effectively design cooperative secure transmission strategies, and the insight into how the trust degree affects the confidential cooperation was not explicitly investigated and well presented.
Motivated by the aforementioned research and problems, we have observed that the trust degree plays a significant role in cooperative secure communications. Hence, in this paper, we consider the probability that the jammer cooperates in secure legitimate transmission as its trust degree and investigate its influence on the performance of confidential cooperative communications. Different from [
15], we not only consider the transmit signal-to-noise ratios (SNRs) of the confidential message and jamming signal, but also investigate the influence of artificial interference at the transmit user (Tu) in the case that the jamming signal from the jammer is not sufficient when the channel gain between the jammer and eavesdropper is weak and obtain their optimal transmit SNRs in closed-form to maximize the expected secrecy rate according to the trust degree. Meanwhile, we further achieve some meaningful results based on the relationship among the trust degree, channel gains, and the transmit SNR at Tu.
Notation: For a complex scalar x, its complex conjugate is denoted by . and denote the statistical expectation and complex Gaussian distributions, respectively.
2. Trust Degree and System Model
2.1. Trust Degree
With the rapid growth of online social networks, more and more people are getting involved in online social interactions. Therefore, the social relationship has emerged as an important issue to investigate how the degree of closeness of the social relationship between users affects their communication strategies [
5,
16,
17,
18]. In the cooperative communication systems, the trust degree can be interpreted as the degree that reveals how much a node is willing to help the communication of the other node [
1,
3,
5]. Similarly, in our system model, the trust degree between
and
,
, is defined by the probability that
helps to secure the transmission between
and
, and thus,
is a value in the range of
.
In the literature, the trust degree has been evaluated and quantified in various ways [
6,
19,
20,
21,
22,
23]. In emergency networks such as disaster relief and public safety networks, the most trustworthy nodes would be those in the immediate region, so the trust degree can be measured based on the proximity between nodes, e.g., physical distance [
19]. In general mobile networks, the trust degree can be evaluated by the observations of the previous behaviors of the node [
6,
20,
21,
22,
23]. In [
22,
23], the trust degree was determined using the Bayesian framework. In the Bayesian framework, the trust degree is given by the ratio of the observations of the positive behavior among total observations, where the positive behavior is that the node behaves in the predefined way of the network. Similar to [
23], in this paper, the positive behavior is defined by jammer, which helps to secure the transmission of Tu, and hence, Tu can estimate the trust degree based on the historical observations of the positive behavior of jammer. The trust degree can also be updated according to new observations. However, when the number of observations is sufficiently large, the trust degree will have ignorable change according to new observation, and it will be more like a constant. Therefore, in our system model, we assume that the trust degree remains unchanged during the transmission [
5].
2.2. System Model
Consider a user cooperation network as shown in
Figure 1, where there are four single-antenna nodes, including a Tu, a receive user (Ru), a jammer, and an eavesdropper, and we denote them by
,
,
, and
, respectively. The channels from
to
and
, and from
to
and
are denoted by
,
,
, and
, where all of them follow a complex Gaussian distribution with zero mean and different covariances,
,
,
m and
, respectively.
In this paper, we consider that will transmit the jamming signal to confound in order to help the legitimate transmission between and based on trust degree , which characterize the willingness that cooperates with for secure communications, i.e., helps with high probability when the trust degree is high. In this system, we consider the following two transmission strategies for confidential communications:
(a) Direct transmission: does not help to confound with jamming signal , and thus, transmits artificial interference, , together with a confidential message, , to keep its transmission secure, where and are independent. In this strategy, the transmit data at and are written as , while and , where and is the maximum transmit budget at .
(b) Cooperative transmission: transmits jamming signal to guarantee additionally the secure transmission between and and helps to reserve more power for the confidential message at . However, also needs to generate artificial interference for this strategy in case the jamming signal from the jammer is not sufficient when channel gain is small. Thus, the transmit data at and are given by , while , where and is the maximum transmit budget at .
According to the above strategies, the expected secrecy rate with respect to (w.r.t.) trust degree
, the similar structure of which was given in [
15], is obtained by:
in which we assume that
and
are prior-known at
, and
can completely cancel
and
from its received signal, which is a common assumption used in [
12,
24]. Notice that the information of jamming and artificial interference can be shared through an alternative wired connection between the transmitter or jammer and the receiver. In (
1),
and
. The channel gains are defined as
and
. The transmit SNRs are given as
and
, where
is the variance of the complex Gaussian distribution,
, associated with the additive white Gaussian noise (AWGN) at
and
. The first term of (
1) denotes the secrecy rate at
obtained by the direct transmission strategy when
does not help with the possibility
, while the second term represents the secrecy rate achieved by the cooperative transmission when
helps to jam with the possibility
.
3. Problem Formulation and Solution
From (
1), it is noted that for given
, (
1) is a monotonic increasing function w.r.t.
, and thus, the optimal transmit SNR of artificial interference that maximizes (
1) is achieved when
i.e.,
, where
. Meanwhile, it also applies to the case that for given
, the optimal transmit SNR of the jamming signal is
, which maximizes (
1). Therefore, the problem that maximizes (
1) can be formulated as:
where:
To maximize the expected secrecy rate in , the optimal transmit SNR of confidential message, , at can be achieved resorting to the following theorem.
Theorem 1. For given channel conditions and transmit SNRs, and , the optimal transmit SNR of confidential message, , that maximizes the expected secrecy rate at is obtained as:where , ,in which , , and . It is true that , and the proof is given as: Proof. Define
. With some mathematic manipulations, we can obtain:
Based on the property of the derivative, it is straightforward to know that is a decreasing function w.r.t. for , and . □
Proof. The proof of Theorem 1 is presented in
Appendix A. □
Notice that the one yielding the larger expected secrecy rate is regarded as between and ; meanwhile, the optimal transmit SNR of artificial interference is given by . To get a better insight into the relationship between the optimal transmit SNR of the confidential message, , and trust degree , we have the following corollary.
Corollary 1. When the transmit SNR of the jamming signal goes to infinity, i.e., , the optimal transmit SNR of the confidential message, , can be obtained as:where , , , and . Remark 1. From Corollary 1, we observe that the optimal transmit SNR of the confidential message, , is mainly determined by the relationship among the trust degree, channel qualities, and the transmit SNR at . If the eavesdropping channel quality is better than that of the legitimate channel such that , it is not secure to transmit any confidential message when α is small. With growing α within a moderate range, the transmit SNR of the confidential message basically depends on α. More specifically, will reduce the power for artificial interference and allocate more power for the confidential message to exploit the cooperation of fully. Furthermore, when helps to jam with high probability, equivalently α is high, relies on to guarantee secure transmission and assigns all the power for confidential message. Notice that when the legitimate channel quality is good such that , it is still secure to send the confidential message with an appropriate transmit SNR even if α is small.
4. Simulation Results
In this section, we evaluate the performance of the trust degree-based confidential cooperative communication and use the average gains of channel elements as dB, and the expected secrecy rates are averaged over channel realizations.
In
Figure 2, we plot the expected secrecy rates at
versus the trust degree of
, when the transmit SNRs at
and
are given by
dB. To compare with the proposed confidential cooperation scheme, we also plot the expected secrecy rate of the
no cooperation case (NCC) (
). For the proposed confidential cooperation, the optimal transmit SNR of the confidential message at
for cooperation is obtained as
in Theorem 1. In
Figure 2, it is certified that the expected secrecy rate can be significantly improved by the jammer’s cooperation and increased with growing the trust degree of
, yielding a higher expected secrecy rate than NCC.
In
Figure 3, we plot the expected secrecy rates at
versus the transmit SNR of the jamming signal at
, when the transmit SNR at
is given by
dB. In this figure, we first observe that when the transmit SNR of the jamming signal increases from 5 dB to 60 dB, i.e.,
goes to infinity, as shown in Corollary 1, the expected secrecy rate at
can be increased through the cooperation of
, and
will assign more power for the confidential message with growing
to achieve a higher expected secrecy rate. However, the expected secrecy rate does not increase all the time and will become saturated with the growth of
, as shown in (
A5), which has no relationship with
when
goes to infinity.