Next Article in Journal
Tracking the Turn Maneuvering Target Using the Multi-Target Bayes Filter with an Adaptive Estimation of Turn Rate
Previous Article in Journal
Collagen-Gold Nanoparticle Conjugates for Versatile Biosensing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks

1
Graduate School of Smart City Science Management, Hongik University, Seoul 30016, Korea
2
Department of Electronics and Computer Engineering, Hongik University, Seoul 30016, Korea
3
Department of Computer and Information Communications Engineering, Hongik University, Seoul 30016, Korea
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(2), 377; https://doi.org/10.3390/s17020377
Submission received: 6 December 2016 / Revised: 25 January 2017 / Accepted: 8 February 2017 / Published: 15 February 2017
(This article belongs to the Section Sensor Networks)

Abstract

:
In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks.

1. Introduction

Physical layer security (PLS) techniques have been emerging as a robust solution to prevent information eavesdropping for future wireless networks, especially for cooperative relaying networks [1,2,3,4]. The underlying idea of PLS is to exploit the physical characteristics of wireless channels to securely transmit information between legitimate users [5]. More specifically, from the information-theoretic perspective, information can be confidentially transmitted if the main channels (the channels between legitimate users) and the eavesdropper channels (the channel from a legitimate user to an eavesdropper) can be managed or controlled so that the legitimate destinations can decode their information successfully while the eavesdroppers are not able to decode their overheard information. It is shown that PLS is on the cutting-edge of the technologies of security, particularly in wireless communications to prevent eavesdropping attacks [3,6]. In PLS, the maximum rate at which the information can be confidentially transmitted between legitimate users is termed the secrecy capacity. The secrecy capacity can be determined by the difference between the capacity of the main channel and that of the eavesdropper channel [5]. Additionally, the performance of PLS is also evaluated in terms of the secrecy outage probability (SOP). The SOP can be defined as the probability that the secrecy capacity falls below a predefined target secrecy rate [5].
Cooperative relaying transmissions have been recognized as an efficient method to improve the coverage and capacity of wireless networks and have been adopted in industry standards, e.g., the IEEE 802.16j standard for relay-based wireless access networks [7]. In the literature, uplink scenarios of multiuser multirelay cooperative networks can be described as multiple sources transmitting data to a single destination via the help of multiple relays [8]; and downlink scenarios can be described as a single source communicating with multiple destinations via multiple relays [9]. In such systems, opportunistic scheduling, i.e., a source (destination) communicates with only one scheduled destination (source) with the assistance of only one selected relay, has been recognized as an attractive scheduling method to improve system performance [8,9,10] since the time-varying nature of wireless channels is exploited.
While the cooperative relaying transmissions have the ability to increase the reliability, as well as the transmission range of wireless communications, it is also more vulnerable to attackers because the same information is transmitted twice (by a source and then a relay). PLS has been shown as a potential means to combat this issue.
Considering the downlink/uplink scenarios of wireless networks where a central entity (e.g., base station or access point) communicates with multiple users, existing works in the literature have shown that the performance of such networks will be better if the central entity chooses to communicate with the user having the best channel condition [11,12,13], particularly under the consideration of physical layer security (PLS) [14]. Furthermore, the performance improvements of the best user selection scheme (for downlink or uplink scenarios) have been demonstrated in cooperative relaying networks with or without considering PLS [15,16]. Owing to these facts, in this paper, we adopt the best source selection scheme together with the best relay selection scheme to improve the performance of multiuser multirelay cooperative networks under the consideration of PLS.
Next, we are going to elaborate on the applications of PLS into multiuser and/or multirelay cooperative networks.
In [16], considering both amplify-and-forward (AF) and decode-and-forward (DF) protocols, the authors proposed optimal relay selection protocols to help the improvement of the wireless security of a given source destination transmission against an eavesdropper. Furthermore, considering the single source destination pair, the authors in [17] extended to the case of multiple eavesdroppers; three opportunistic relay selection protocols with different required overhead information were proposed. Considering a downlink transmission from a base station to multiple destinations via the assistance of a DF relay in the presence of multiple eavesdroppers, the authors in [18] investigated the secrecy performance of the maximal ratio transmission scheme when the eavesdropper’s channel state information (CSI) is available and is not available at the relay, respectively. In [19], considering the DF protocol, the author assumed a destination using cooperative jamming (CJ) to improve the system performance. Then, the best relay is selected based on the achievable system secrecy capacity. Additionally, the authors optimized the transmit power of source, relay and destination, respectively. The authors in [20] studied a large-scale multi-input multi-output (LS-MIMO) relaying system. Specifically, en evaluation method of secrecy outage capacity was proposed for the case for which the CSI of the eavesdropper channel is not available and the CSI of the main channel is imperfect. In [21], assuming an uplink scenario where one selected legitimate user wants to transmit data to a base station while eavesdroppers attempt to intercept the legitimate transmission, two opportunistic schedulings with and without instantaneous CSI of eavesdroppers, respectively, were investigated. Next, considering a similar uplink scenario, but the base station is now equipped with multiple antennas, the authors in [22] proposed two low-complexity user selection schemes under different requirements of eavesdropper’s CSI. In [23], the impact of different diversity combining techniques, namely maximal ratio combining (MRC) and selection combining (SC) on the security of an uplink cooperative transmission, where a selected source transmits data to a destination via a multi-antenna relay, were studied. Recently, PLS in multiuser multirelay cooperative networks was investigated in [24,25]. In particular, the authors in [24] proposed that multiuser and multirelay selection schemes based on the set of relays can perfectly decode from the base station. The authors in [25] considered two criteria for source relay selection proposed by exploiting the direct links between sources and destination. Very recently, secure multiuser communications in wireless sensor networks were investigated in [26], where the switch-and-stay combining technique was adopted to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, while the transmit antenna selection technique and cooperative jamming were used to achieve satisfactory secrecy performance.
In this paper, we consider an uplink scenario of multiuser multirelay cooperative networks, where a selected source communicates with a destination via the help of a selected relay in the presence of one eavesdropper. Compared with the above related works, the key contributions of this paper can be summarized as follows.
  • We propose a low-complexity, yet performance comparable, source relay selection scheme, named the PSRS scheme, by taking into account both the CSIs of the main and eavesdropper channels. Specifically, the PSRS scheme first selects the least vulnerable source, in other words the source that minimizes the channel gains of the source eavesdropper channels; then, the relay that maximizes the end-to-end system secrecy capacity for the given selected source is chosen. In addition, the eavesdropper is assumed to perform either the maximal ratio combing (MRC) technique or the selection combing (SC) technique to combine its overheard signals.
  • In order to analyze the secrecy performance of the considered system, we derive new closed-form expressions of the system secrecy outage probability (SOP), which have not been reported in the literature. The developed analysis is verified by Monte Carlo simulation to confirm our correctness.
  • From the numerical results, we show that the PSRS scheme achieves better secrecy performance than that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme significantly reduces the required amount of CSI estimations compared to that required by the OJSRS scheme, especially when the numbers of sources and relays are large.
The rest of the paper is arranged as follows. Section 2 introduces the system model and describes in detail the selection criterion of the PSRS scheme. Section 3 presents the developed analysis in terms of the SOP for the considered scenarios. Section 4 presents some illustrative numerical results, based on which insightful discussions are provided. Monte Carlo simulations are shown to corroborate the proposed analysis. Finally, Section 5 concludes the paper.

2. System Model

Let us consider a multiuser and multirelay cooperative network, where a source communicates with a destination via the help of a relay with the presence of an eavesdropper as depicted in Figure 1. Specifically, the system is composed of a set of M sources S = { S m | m = 1 , , M } , a set of N relays R = { R n | n = 1 , , N } , one destination D and one eavesdropper E . We assume that the direct links between the users and the destination are not available due to the destination being out of the coverage area, or severe fading, or deep shadowing, as in [16,17,23]. Moreover, the data transmission from the source to the destination is carried out through the support of the decode-and-forward (DF) relays. Specifically, a time-division multiple-access scheme is used for orthogonal access, and we assume perfect synchronization in the network. The slot of one data transmission is divided into two sub-slots, which equal the time duration. In the first sub-slot, a selected source broadcasts its signal. In the second sub-slot, a selected relay perfectly decodes the received signal from the source and then forwards the signal to the destination. Considering the physical layer security of such a cooperative network, we assume that an eavesdropper monitors the communication between legitimate users, i.e., the user and destination. We further assume that all nodes are equipped with an omnidirectional antenna and operate in half-duplex mode. All wireless links are assumed to undergo independent and identical distributed (i.i.d.) Rayleigh block flat fading. In order to provide a comprehensive analysis of the PLS of the considered relaying system, we assume that the required channel state information (CSI) is available, as in [16,17,25].
In the following part of the paper, let h XY denote the fading coefficient of the X Y channel, where X S R and Y R { D , E } . Under the assumption of i.i.d. Rayleigh fading, h XY can be modeled as i.i.d. complex Gaussian random variables with zero-mean and variance λ XY . Additionally, let n Y denote the additive white Gaussian noise (AWGN) at node Y with zero-mean and variance σ Y 2 .

2.1. Communication Process

The communication process is carried out in two phases, namely the broadcasting phase and the relaying phase, which are conducted in the first and second sub-slots, respectively. Without loss of generality, in a certain transmission slot, we suppose that the source S m has been selected to transmit its data, and the relay R n has been chosen to help the selected source.

2.1.1. Broadcasting Phase

In the broadcasting phase, S m transmits a normalized signal s, i.e., E [ | s | 2 ] = 1 , where E [ · ] denotes the statistical expectation operator, with transmit power P S m . Thus, the received signal at R n can be expressed as:
y S m R n = P S m h S m R n s + n R n ,
where h S m R n CN ( 0 , λ S m R n ) and n R n CN ( 0 , σ R n 2 ) ; herein, CN ( 0 , σ 2 ) denotes a circular symmetric complex Gaussian variable with zero-mean and variance σ 2 .
Meanwhile, the eavesdropper can intercept the source signal due to the broadcast nature of wireless communications. Thus, the overheard signal at E can be written as:
y S m E = P S m h S m E s + n E ,
where h S m E CN ( 0 , λ S m E ) and n E CN ( 0 , σ E 2 ) .
Hence, from Equations (1) and (2), the received signal-to-noise ratios (SNRs) at R n and E in the broadcasting phase can be expressed as:
γ S m R n = P S m | h S m R n | 2 σ R n 2 , γ S m E = P S m | h S m E | 2 σ E 2 .

2.1.2. Forwarding Phase

In the forwarding phase, the decode-and-forward (DF) protocol [27] is adopted at the selected relay. For the sake of simplicity, we assume that the relay always successfully decodes the source signal. Similar to the broadcasting phase, the relaying signal from R n to D is also intercepted by E . Thus, the received signal at D and the overheard signal at E in the forwarding phase can be written as:
y R n D = P R n h R n D s ^ + n D ,
y R n E = P R n h R n E s ^ + n E ,
respectively, where P R n denotes the transmit power of R n , s ^ denotes the re-encoded version of the source signal E [ | s ^ | 2 ] = 1 , h R n D CN ( 0 , λ R n D ) , h R n E CN ( 0 , λ R n E ) and n D CN ( 0 , σ D 2 ) .
The received SNRs at R n and E in the forwarding phase can be expressed as:
γ R n D = P R n | h R n D | 2 σ D 2 , γ R n E = P R n | h R n E | 2 σ E 2 .
In physical layer security, the channels between legitimate nodes, i.e., the S m R n and R n D channels, are called the main channels. While the channels between legitimate nodes and the eavesdropper, i.e., the S m E and R n D channels, are called the eavesdropper channels.
Considering DF relaying transmission, the failure of the S m R n or R n D transmissions will lead to the failure of the end-to-end transmission. Thus, from Equation (6), the end-to-end SNR of the main channel can be expressed as γ S m R n D main = min { γ S m R n , γ R n D } [27,28]. Consequently, the end-to-end achievable capacity of the main channel can be expressed as:
C S m R n D main = 1 2 log 2 1 + min { γ S m R n , γ R n D } ,
where the factor 1 / 2 appears because the end-to-end transmission from S m to D is conducted in two sub-slots.
In what follows, the eavesdropper intercepts both the broadcasting and relaying signals. In this paper, we consider two well-known signal combining techniques, namely the maximal ratio combining (MRC) and selection combining (SC), at the eavesdropper.
The eavesdropper is assumed to perform the MRC technique if the selected source and the selected relay use the same codewords, i.e., repetition coding [29]. Using the MRC technique, the end-to-end received SNR of the eavesdropper channel can be written as γ S m R n D eve , MRC = γ S m E + γ R n E . Consequently, the end-to-end achievable capacity of the eavesdropper channel can be expressed as:
C S m R n D eve , MRC = 1 2 log 2 ( 1 + γ S m E + γ R n E ) .
The eavesdropper is assumed to employ the SC technique if the signals from the selected source and the relay are independent, i.e., the selected and relay use different codewords [30]. Using the SC technique, the end-to-end received SNR of the eavesdropper channel can be written as γ S m R n D eve , SC = max { γ S m E , γ R n E } . Consequently, the end-to-end achievable capacity of the eavesdropper channel can be expressed as:
C S m R n D eve , SC = 1 2 log 2 ( 1 + max { γ S m E , γ R n E } ) .
The system secrecy capacity can be defined by the difference between the capacity of the main channel and that of the eavesdropper channel [5,16], which can be mathematically expressed as:
C secrecy MRC = 1 2 log 2 1 + min { γ S m R n , γ R n D } 1 + γ S m E + γ R n E ,
C secrecy SC = 1 2 log 2 1 + min { γ S m R n , γ R n D } 1 + max { γ S m E , γ R n E } ,
for the case of using MRC and SC, respectively.

2.2. Source Relay Selection Process

The source relay selection process is conducted through the CSI estimation/acquisition system. Furthermore, it is noteworthy to recall that this process is carried out before the data transmission. In this paper, we propose a performance comparable, low-complexity source relay selection scheme, called the proposed source relay selection (PSRS) scheme. The PSRS scheme first selects the least vulnerable source, which minimizes the channel gains of eavesdropper channels from the sources to the eavesdropper. Thus, the best source can be selected as:
S m * = arg min 1 m M γ S m E .
After selecting the best source, the PSRS scheme selects the most robust relay, which maximizes the end-to-end system secrecy capacity. Hence, the best relay will be selected as:
R n * = arg max 1 n N 1 2 log 2 1 + min { γ S m * R n , γ R n D } 1 + γ S m * E + γ R n E ,
R n * = arg max 1 n N 1 2 log 2 1 + min { γ S m * R n , γ R n D } 1 + max { γ S m * E , γ R n E } ,
for the case of using MRC and SC, respectively.

3. Performance Analysis

In this section, we investigate the performance of the SRSS schemes in terms of the secrecy outage probability (SOP). Because the wireless channels undergo i.i.d. fading, for the sake of notational convenience, let λ S m R n = λ SR , λ S m E = λ SE , λ R n D = λ RD and λ R n E = λ RE . In addition, we assume that the source and the relay use the same transmit power, i.e., P S m = P R n = P , and all nodes have the same noise variance, i.e., σ R n 2 = σ D 2 = σ E 2 = σ 2 , as in [16,17,25]. It is noteworthy that the assumptions of using the same transmit powers and identical noise variances do not lose the generality of the developed analysis. Let γ ¯ = P σ 2 denote the transmit signal-to-noise ratio (SNR).
Recall that the SOP can be defined as the probability that the end-to-end achievable system secrecy capacity drops below a predefined target secrecy rate R th .
In this paper, we study the performance of the physical layer security of multi-user multirelay cooperative networks under two scenarios, namely the eavesdropper performs either the maximal-ratio combining (MRC) technique or the selection combining (SC) technique to combine overheard signals from legitimate users, i.e., the source and relay. More specifically, consider a cooperative network with multiple sources, e.g., a multiuser long-term evolution-advanced (LTE-A) cellular system [31,32]; the best user selection has been demonstrated as an efficient user scheduling to improve system performances [31,32]. On the other hand, when multiple relays are available, selecting the best relay helping the source-destination transmission can improve system throughput, e.g., for the IEEE 802.12j vehicular networks [9,33].
Studying the security issue of such networks in terms of PLS, we assume that the eavesdropper can employ either MRC or SC techniques. Please note that PLS is on the cutting-edge of technologies of security, particularly in wireless communications to prevent eavesdropping attacks [3,6]. Suppose that the source and relay use the same codeword to encode the transmitted signal, e.g., repetition coding [29]; the MRC technique can be employed by the eavesdropper, as in [34]. Otherwise, the eavesdropper may employ the SC technique, as in [35,36].

3.1. The Case of the Eavesdropper Using the MRC Technique

From Equation (10), the system SOP in the case when the eavesdropper performs the MRC technique can be expressed as:
P SOP MRC = Pr 1 2 log 2 1 + min { γ S m * R n * , γ R n * D } 1 + γ S m * E + γ R n * E < R th = Pr 1 + min { γ S m * R n * , γ R n * D } 1 + γ S m * E + γ R n * E < γ th ,
where γ th = 2 2 R th represents the secrecy SNR threshold. From Equation (13) and since all of the wireless channels are assumed to be independent, Equation (15) can be rewritten as:
P SOP MRC = Pr max 1 n N 1 + γ ¯ min { | h S m * R n | 2 , | h R n D | 2 } 1 + γ ¯ | h S m * E | 2 + γ ¯ | h R n E | 2 < γ th .
As we can observe that the events of the probability in Equation (16) are not mutually exclusive because they include the same component | h S m * E | 2 , therefore conditioning on | h S m * E | 2 = z , the P SOP MRC can be re-expressed as:
P SOP MRC = 0 n = 1 N Pr min { | h S m * R n | 2 , | h R n D | 2 } < ( γ th 1 ) γ ¯ + γ th z + γ th | h R n E | 2 Ξ f | h S m * E | 2 ( z ) d z .
Since the PSRS scheme first selects the best source, the statistical characteristic of the | h S m * E | 2 will be presented in the following Lemma.
Lemma 1.
Suppose that | h S m * E | 2 = min 1 m M | h S m E | 2 ; the cumulative distribution function (CDF) and probability density function (PDF) of | h S m * E | 2 can be expressed as:
F | h S m * E | 2 ( z ) = 1 e M z λ SE
f | h S m * E | 2 ( z ) = M λ SE e M z λ SE
respectively.
Proof. 
From Equation (12), the CDF of | h S m * E | 2 can be written as:
F | h S m * E | 2 ( z ) = Pr min 1 m M | h S m E | 2 < z = 1 Pr min 1 m M | h S m E | 2 z
Since the sources are assumed to be independent, F | h S m * E | 2 ( z ) in Equation (20) can be further expressed as:
F | h S m * E | 2 ( z ) = 1 m = 1 M 1 Pr | h S m E | 2 < z = 1 e M z λ SE .
By taking the derivative of the right-hand side of Equation (21), the PDF of | h S m * E | 2 can be obtained as in Equation (19). This completes the proof of Lemma 1. ☐
The statistical characteristic of the gain of the channel from the selected source to an arbitrary relay, i.e., | h S m * R n | 2 , will be presented in the next Lemma.
Lemma 2.
Given the selected source S m * , the CDF and PDF of | h S m * R n | 2 can be expressed as:
F | h S m * R n | 2 ( x ) = 1 e x λ SR ,
f | h S m * R n | 2 ( x ) = 1 λ SR e x λ SR ,
respectively.
Proof. 
Using the total probability theory [37], the CDF of | h S m * R n | 2 can be expressed as:
F | h S m * R n | 2 ( x ) = m = 1 M Pr ( S m * = S m ) Ω Pr ( | h S m R n | 2 < x ) .
From Equation (12), Ω in Equation (24) can be expressed as:
Ω = Pr l = 1 l m M γ S l R n > γ S m R n = Pr l = 1 l m M | h S l R n | 2 > | h S m R n | 2 .
By conditioning on | h S m R n | 2 = v and since the sources are assumed to be independent, Equation (25) can be further expressed as:
Ω = 0 Pr ( l = 1 l m M | h S l R n | 2 > v f | h S m R n | 2 ( v ) d v = 0 l = 1 l m M 1 Pr ( | h S l R n | 2 < v ) f | h S m R n | 2 ( v ) d v
and after some algebraic manipulations, Ω can be obtained as:
Ω = 0 e ( M 1 ) v λ SR e v λ SR λ SR d v = 1 M .
By plugging Equation (27) into (24) and after some calculation steps, the CDF and PDF of | h S m * R n | 2 can be obtained as presented in Equations (22) and (23), respectively. This completes the proof of Lemma 2. ☐
For the sake of notational convenience, let X | h S m * R n | 2 , Y | h R n D | 2 , Z | h S m * E | 2 and T | h R n E | 2 . The probability Ξ in Equation (16) can be rewritten as:
Ξ = Pr min { X , Y } < γ th 1 γ ¯ + γ th z + γ th T .
The following lemma will help facilitate the derivation of Ξ.
Lemma 3.
Let U min { X , Y } ; the CDF of U can be expressed as:
F U ( u ) = 1 e λ SR + λ RD λ SR λ RD u .
Proof. 
The CDF of U can be written as:
F U ( u ) = Pr ( min { X , Y } < u ) = 1 1 Pr ( X < u ) 1 Pr ( Y < u ) = 1 e u λ SR e u λ RD .
This completes the proof of Lemma 3. ☐
Let μ γ th 1 γ ¯ and θ λ SR + λ RD λ SR λ RD . By conditioning on T = t and applying Lemma 3, Ξ in Equation (28) can be obtained as:
Ξ = 0 1 e θ ( μ + γ th z + γ th t ) 1 λ RE e t λ RE d t = 1 1 λ RE 0 e μ θ θ γ th z θ γ th λ RE + 1 λ RE t d t = 1 e μ θ θ γ th z θ γ th λ RE + 1 .
By plugging Equation (31) into (16) and making use of the fact that 1 e a b x c N = k = 0 N N k ( 1 ) k c k e k a k b x ([38] Equation (1.111)), the P SOP MRC can be further expressed as:
P SOP MRC = 0 k = 0 N N k ( 1 ) k ( θ γ th λ RE + 1 ) k e k μ θ k θ γ th z M λ SE e M z λ SE d z ,
and after some algebraic manipulations, the system SOP in the case of using MRC can be obtained as:
P SOP MRC = M k = 0 N N k ( 1 ) k e k μ θ ( θ γ th λ RE + 1 ) k ( k θ γ th λ SE + M ) .

3.2. The Case of the Eavesdropper Using SC Technique

From Equation (11), the system SOP in the case when the eavesdropper performs the SC technique can be expressed as:
P SOP SC = Pr 1 2 log 2 1 + min { γ S m * R n * , γ R n * D } 1 + max { γ S m * E , γ R n * E } < R th = Pr 1 + min { γ S m * R n * , γ R n * D } 1 + max { γ S m * E , γ R n * E } < γ th ,
From Equation (14), Equation (34) can be rewritten as:
P SOP SC = Pr max 1 n N 1 + γ ¯ min { | h S m * R n | 2 , | h R n D | 2 } 1 + γ ¯ min { | h S m * E | 2 , | h R n E | 2 } < γ th .
Similarly to Equation (15), the events of the probability in Equation (35) are not mutually exclusive because they include the same component | h S m * E | 2 . Therefore, conditioning on | h S m * E | 2 = z , the P SOP SC can be re-expressed as:
P SOP SC = 0 n = 1 N Pr min { | h S m * R n | 2 , | h R n D | 2 } < ( γ th 1 ) γ ¯ + γ th max { z , | h R n E | 2 } Ψ f | h S m * E | 2 ( z ) d z ,
By conditioning on T = t , Ψ can be expressed as:
Ψ = 0 Pr min { X , Y } < γ th 1 γ ¯ + γ th max { z , T } f T ( t ) d t = 0 Pr min { X , Y } < γ th 1 γ ¯ + γ th z | z > t + Pr min { X , Y } < γ th 1 γ ¯ + γ th t | t > z f T ( t ) d t = 0 z Pr min { X , Y } < γ th 1 γ ¯ + γ th z f T ( t ) d t Ψ 1 + z Pr min { X , Y } < γ th 1 γ ¯ + γ th t f T ( t ) d t Ψ 2 ,
where Ψ 1 can be derived as:
Ψ 1 = 1 λ RE 0 z 1 e μ ( θ γ th z ) e 1 λ RE t d t = 1 λ RE 0 z e 1 λ RE t d t 1 λ RE 0 z e μ θ θ γ th z 1 λ RE t d t = 1 e 1 λ RE z e μ θ θ γ th z + e μ θ θ γ th λ RE + 1 λ RE z ,
and Ψ 2 can be derived as:
Ψ 2 = 1 λ RE z e 1 λ RE t d t 1 λ RE z e μ θ θ γ th t 1 λ RE t d t = e 1 λ RE z 1 θ γ th λ RE + 1 e μ θ θ γ th λ RE + 1 λ RE z .
Now, plugging Equations (38) and (39) into (37) and after some manipulations, Ξ S C can be obtained as:
Ψ = 1 e μ θ θ γ th z + θ γ th λ RE θ γ th λ RE + 1 e μ θ θ γ th λ RE + 1 λ RE z .
Finally, substituting Equation (40) into Equation (36), P SOP SC is obtained as:
P SOP SC = M λ SE 0 1 e μ θ θ γ th z + θ γ th λ RE θ γ th λ RE + 1 e μ θ θ γ th λ RE + 1 λ RE z N e M λ SE z d z .
In order to further simplify the integral (41), we rely on the trinomial coefficient, i.e., ( a + b + c ) n = i , j , k n = i + j + k n i , j , k a i b j c k [39]. Consequently, the P SOP SC can be expressed as:
P SOP SC = M λ SE 0 i , j , k 0 N N i , j , k ( 1 ) j e j θ ( μ + γ th z ) θ γ th λ RE θ γ th λ RE + 1 k e k ( μ θ + θ γ th λ RE + 1 λ RE z ) e M λ SE z d z = M λ SE i , j , k 0 N N i , j , k ( 1 ) j θ γ th λ RE θ γ th λ RE + 1 k e ( j + k ) μ θ 0 e ( j θ γ th + k θ γ th λ RE + 1 λ RE + M λ RE ) z d z ,
and after some algebraic manipulations, the P SOP SC can be obtained as:
P SOP SC = M λ SE i , j , k N N i , j , k ( 1 ) j θ λ RE γ th θ λ RE γ th + 1 k e ( j + k ) μ θ j θ γ th + k ( θ γ th λ RE + 1 ) / λ RE + M / λ SE .

4. Numerical Results and Discussions

In this section, representative numerical results are provided to illustrate the secrecy performance of the PSRS scheme in terms of the secrecy outage probability (SOP). Insightful discussions relating to the impacts of the main-to-eavesdropper ratio (MER), the signal-to-noise ratio (SNR), the source relay distance, d SR , the secrecy target data rate, R th , and the numbers of sources and relays on the system SOP will be presented. Additionally, performance comparison, as well as the complexity order between the proposed scheme, the OJSRS scheme and the random source relay selection (RSRS) scheme are provided to show the advantages and disadvantages of our proposed scheme.
Without loss of generality, we consider a line network that is deployed in a unit squared area; in particular, the sources are located at the same place and so are the relays, which is often used in the literature [16,17,18,21,23,25]. Please note that distances between the sources and between the relays are, respectively, considered the same, which leads to the corresponding average channel gains being the same. However, the instantaneous channel gains are still random; therefore, these are the order statistics for the minimum and maximum of the channel gains, which satisfy Equations (12)–(14). The average channel gain is modeled as λ XY = d XY ϵ , where d represents the Euclidean distance and ϵ stands for path-loss exponent. Herein, we set ϵ = 4 (for an urban environment). The main-to-eavesdropper ratio (MER) can be defined as the ratio of the average main channel gain over the average eavesdropper channel gain in one hop [16,25], i.e., MER 1 = λ SR λ SE and MER 2 = λ RD λ RE . Without loss of generality, in our simulation, we set MER 1 = MER 2 = MER . Recall that, in this section, SNR stands for γ ¯ = P σ 2 .
In Figure 2, we plot the SOP as a function of MER with different values of SNR. As can be seen, the SOP decreases along with the increasing of MER, which means that the transmission is more secure if the legitimate channels have better conditions than that of the eavesdropper channels. More specifically, in Figure 2, two parameters are varied, i.e., the main-to-eavesdropper ratio (MER) and the signal-to-noise ratio (SNR). For a given value of SNR, increasing MER leads to decreasing of the SOP. Furthermore, for a given value of MER, the SOP decreases as the SNR increases. The latter result can be explained as follows. The MER can be defined as the ratio of the average channel gains between the main channel and the eavesdropper channel [4]. However, in practice, the eavesdropper channel gain could not be controlled by legitimate nodes. Therefore, in order to improve the MER, one solution is to improve the channel gain of the main channel (or move far away eavesdroppers to degrade the eavesdropper channel gain). Additionally, one of the typical methods to achieve better SNR of the main channel is to increase the transmit power of the source. Hence, increasing the transmit power of the sources also helps improve the system secrecy.
Figure 3 presents the SOP as a function of the secrecy target data rate, R th (bits/s/Hz), with different values of MER. As can be seen, the SOP increases as R th increases. This means that if the sources and/or the relays are allowed to transmit with a higher secrecy data rate (in order to obtain higher throughput), the relaying transmission will be more vulnerable to the eavesdropper.
In Figure 4, we plot the SOP as a function of the distance between the sources and the relays, d SR . We can observe that the SOP is a convex function with respect to d SR . Therefore, from the derived SOP, the optimal position of the selected relay that minimizes the SOP can be numerically found. For example, with our simulation setting, the SOP is minimum when d SR = 0.75 , 0.65 , 0.55 for MER = 10 , 20 , 30 dB, respectively.
There actually is a performance gap between the MRC and SC techniques. In particular, we present the performance gap between the two techniques in Table 1 using the analysis results with SNR = 30 dB, M = 3 , N = 3 , d SR = 0.5 and R th = 3 bits/s/Hz.
As shown in Table 1, the secrecy outage probability (SOP) in the case of the eavesdropper using MRC is larger than that of the case of using SC. This means that the relaying system is more vulnerable when the eavesdropper uses MRC compared to the case of using SC. The reason is that with the MRC technique, the eavesdropper is able to collect more information of the transmit data than using the SC technique. However, the eavesdropper can only employ the MRC technique when the source and relay use the same codeword to encode the transmitted signal, e.g., repetition coding [29]. Otherwise, the eavesdropper employs the SC technique [26,36], which is to choose the strongest overheard signal among that transmitted from the source or relay.
Because this performance gap is too small, it is hard to be recognized in the plots of our paper, and these differences of the SOP between the MRC and SC techniques can be ignored. Therefore, Figure 2, Figure 3 and Figure 4 show similar performances achieved by the MRC and SC techniques.
For a benchmark comparison of the PSRS scheme, we now present the selection criterion of the optimal joint source relay selection (OJSRS) scheme. Let S m * and R n * denote the selected source and relay, respectively, in each transmission block. The OJSRS scheme aims to select a pair of source relay nodes that maximizes the end-to-end system secrecy capacity. Mathematically, the selection criterion of the OJSRS scheme can be expressed as:
( S m * , R n * ) = arg max 1 m M max 1 n N 1 2 log 2 1 + min { γ S m R n , γ R n D } 1 + γ S m E + γ R n E ,
( S m * , R n * ) = arg max 1 m M max 1 n N 1 2 log 2 1 + min { γ S m R n , γ R n D } 1 + max { γ S m E , γ R n E } ,
for the case of using MRC and SC, respectively. To the best of the authors’ knowledge, such a selection criterion (which takes into account the main channel, as well as the eavesdropper channel) has not been investigated in the literature since its performance analysis is intractable.
Performance comparisons between the PSRS scheme, the OJSRS scheme and the random source relay selection (RSRS) scheme are presented in Figure 5 and Figure 6, where we plot the SOP as a function of MER and SNR, respectively. As can be seen, on the one hand, both the PSRS and OJSRS schemes significantly outperform the RSRS scheme, which demonstrates the benefit of user selection in cooperative relaying networks. On the other hand, the PSRS scheme does not provide a better performance than that of the OJSRS scheme.
From Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6, it is shown that the SOPs are the same for the cases of the MRC technique and the SC technique employed by the eavesdropper. Hence, we can conclude that both the MRC and SC techniques have the same effect on the security of the considered cooperative transmission.
In order to highlight the advantage of the PSRS scheme, we compare its operation complexity with that of the OJRDS scheme by introducing the complexity order metric. The complexity order of a selection scheme can be defined as an amount of CSI estimations (or channel estimations) that a selection criterion of a scheme (the PSRS scheme or the OJSRS scheme) needs to know to select the best source relay pair per transmission block. From Equations (12)–(14), the amount of CSI required by the PSRS scheme is M + 3 N . From Equations (44) and (45), the amount of CSI required by the OJSRS scheme is M N + M + 2 N . In Figure 7, the complexity orders of the PSRS and OJSRS schemes are evaluated. As can be seen, the complexity order of the PSRS scheme is much lower than that of the OJSRS scheme, especially when the number of relays is relatively large. This is the noteworthy advantage of the PSRS scheme. Note that the RSRS scheme does not require CSI to select the source relay pair.
We now turn our attention to the impact of the numbers of sources and relays on the secrecy performance of the PSRS scheme. In Figure 8 and Figure 9, we plot the SOP as a function of MER and SNR, respectively, with different numbers of sources, M, and relays, N. As can be observed, when the number of sources or relays increases, the SOP decreases. This means that when more nodes participate in a cooperative relaying transmission, the security of the transmission will be improved. Please note that one possible reason for the benefit of user/relay selection is that in wireless communications, independent users have a low probability of experiencing the deep effects of fading simultaneously [40]. Therefore, if more sources and relays participate in a cooperative transmission, we have more chances to choose ones that exhibit low-correlated, better channel conditions, which leads to a better cooperative transmission and a robustness to attacks from eavesdroppers (according to information-theoretic perspectives). Thus, increasing the number of sources and relays can improve the PLS, i.e., decrease the secrecy outage probability (SOP), of cooperative relaying transmission.
Moreover, the SOP decreases more quickly when M is fixed and N is increased than M is increased and N is fixed. This observation means that the number of relays has a stronger impact on the secrecy performance compared to that of the number of sources. It can be explained as follows. Please note that we assume that the direct links between the sources and the destination are not available due to severe fading or deep shadowing as in [16,17,23]. Hence, the relays play a key role in such cooperative relaying transmissions. On the other hand, in the proposed source-relay selection scheme, the selected source is separately chosen based on the channel conditions of the links from sources to the eavesdropper, while the selected relay is chosen based on the channel conditions of the links from the selected source to the eavesdropper, from the relays to the eavesdropper, from the selected source to the relays and from the relays to the destination. Because the relays are greatly involved in the cooperative transmission with PLS compared to the sources, the number of relays therefore has more impact on the secrecy outage performance, i.e., more decreasing of the SOP, than that of the number of sources.

5. Conclusions

In this paper, we have investigated the secrecy performance of opportunistic scheduling in multiuser multirelay cooperative networks. We have proposed the PSRS scheme, which aims to improve the physical layer security (PLS) of the considered cooperative relaying networks. In addition, two combining techniques, namely maximal ratio combing (MRC) and selection combining (SC), have been considered at the eavesdropper. The closed-form expressions of the secrecy outage probability (SOP) have been derived and verified by the computer simulation. Our results showed that the PSRS scheme provides a reasonable secrecy outage performance compared to that of the optimal joint source relay selection (OJSRS) scheme, but significantly reduces the complexity of the selection process. Indeed, in the case of the OJSRS scheme, the complexity order is M N + M + 2 N , while the complexity order of the PSRS scheme is reduced to M + 3 N . The impact of the number of sources and relays on the SOP is also explored. We have shown that increasing the number of sources and relays can decrease the SOP of cooperative relaying transmission. Additionally, the number of relays has more impact on the secrecy outage performance, i.e., more decreasing of the SOP, than that of the number of sources. Furthermore, the PSRS scheme provides a reasonable secrecy outage performance compared to that of the optimal joint source relay selection (OJSRS) scheme.

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (Grant No. 2016R1D1A1B03934898) and by the Leading Human Resource Training Program of Regional Neo Industry through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (Grant No. 2016H1D5A1910577).

Author Contributions

The main contributions of Kyusung Shim were to create the main ideas and execute performance evaluations by theoretical analysis and simulation. Nhu Tri Do worked on related works to review the idea and improved the writing of the paper. Beongku An worked as the advisor of Kyusung Shim and Nhu Tri Do to discuss, create and advise the main ideas and performance evaluations together.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wang, H.M.; Xia, X.G. Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Commun. Mag. 2015, 53, 47–53. [Google Scholar] [CrossRef]
  2. Rodriguez, L.J.; Tran, N.H.; Duong, T.Q.; Le-Ngoc, T.; Elkashlan, M.; Shetty, S. Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Commun. Mag. 2015, 53, 32–39. [Google Scholar] [CrossRef]
  3. Trappe, W. The challenges facing physical layer security. IEEE Commun. Mag. 2015, 53, 16–20. [Google Scholar] [CrossRef]
  4. Zou, Y.; Zhu, J.; Wang, X.; Leung, V. Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw. 2015, 29, 42–48. [Google Scholar] [CrossRef]
  5. Dong, L.; Han, Z.; Petropulu, A.; Poor, H. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  6. Poor, H.V.; Schaefer, R.F. Wireless physical layer security. Proc. Natl. Acad. Sci. USA 2016, 114, 19–26. [Google Scholar] [CrossRef] [PubMed]
  7. Genc, V.; Murphy, S.; Yu, Y.; Murphy, J. IEEE 802.16j Relay-based Wireless Access Networks: An Overview. IEEE Wireless Commun. 2008, 15, 56–63. [Google Scholar] [CrossRef] [Green Version]
  8. Ding, H.; Ge, J.; da Costa, D.B.; Jiang, Z. A new efficient low-complexity scheme for multi-source multi-relay cooperative networks. IEEE Trans. Veh. Technol. 2011, 60, 716–722. [Google Scholar] [CrossRef]
  9. Kim, J.; Michalopoulos, D.S.; Schober, R. Diversity analysis of multi-user multi-relay networks. IEEE Trans. Wirel. Commun. 2011, 10, 2380–2389. [Google Scholar] [CrossRef]
  10. Elkhalil, K.; Eltayeb, M.E.; Kammoun, A.; Al-Naffouri, T.Y.; Bahrami, H.R. On the feedback reduction of multiuser relay networks using compressive sensing. IEEE Trans. Wirel. Commun. 2016, 64, 1437–1450. [Google Scholar] [CrossRef]
  11. Zhou, Q.; Dai, H. Asymptotic analysis on the interaction between spatial diversity and multiuser diversity in wireless networks. IEEE Trans. Signal Process. 2007, 55, 4271–4283. [Google Scholar] [CrossRef]
  12. Seo, W.; Song, H.; Lee, J.; Hong, D. A new asymptotic analysis of throughput enhancement from selection diversity using a high SNR approach in multiuser systems. IEEE Trans. Wirel. Commun. 2009, 8, 55–59. [Google Scholar]
  13. Rao, A.; Alouini, M.S. Adaptive modulation with best user selection over non-identical Nakagami fading channels. In Proceedings of the 2011 8th International Symposium on Wireless Communication Systems (ICC), Aachen, Germany, 6–9 November 2011; pp. 609–613.
  14. Zou, Y.; Wang, X.; Shen, W. Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans. Commun. 2013, 61, 5103–5113. [Google Scholar] [CrossRef]
  15. Ding, H.; Ge, J.; da Costa, D.B.; Guo, Y. Spectrally efficient diversity exploitation schemes for downlink cooperative cellular networks. IEEE Trans. Veh. Technol. 2012, 61, 386–393. [Google Scholar] [CrossRef]
  16. Zou, Y.; Wang, X.; Shen, W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013, 31, 2099–2111. [Google Scholar] [CrossRef]
  17. Bao, V.N.Q.; Linh-Trung, N.; Debbah, M. Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 2013, 12, 6076–6085. [Google Scholar] [CrossRef] [Green Version]
  18. Yang, M.; Guo, D.; Huang, Y.; Duong, T.Q.; Zhang, B. Secure multiuser scheduling in downlink dual-hop regenerative relay networks over Nakagami-m fading channels. IEEE Trans. Wirel. Commun. 2016, 15, 8009–8024. [Google Scholar] [CrossRef]
  19. Liu, Y.; Li, J.; Petropulu, A.P. Destination assisted cooperative jamming for wireless physical-layer security. IEEE Trans. Inf. Forensics Secur. 2013, 8, 682–694. [Google Scholar] [CrossRef]
  20. Chen, X.; Lei, L.; Zhang, H.; Yuen, C. On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014; pp. 2052–2057.
  21. Ge, X.; Jin, H.; Zhu, J.; Cheng, J.; Leung, V.C.M. Exploiting opportunistic scheduling in uplink wiretap networks. IEEE Trans. Veh. Technol. 2016. [Google Scholar] [CrossRef]
  22. Deng, H.; Wang, H.M.; Yuan, J.; Wang, W.; Yin, Q. Secure communication in uplink transmissions: User selection and multiuser secrecy gain. IEEE Trans. Commun. 2016, 64, 3492–3506. [Google Scholar] [CrossRef]
  23. Abd El-Malek, A.H.; Salhab, A.M.; Zummo, S.A.; Alouini, M.S. Security and reliability analysis of diversity combining techniques in SIMO mixed RF/FSO with multiple users. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 23–27 May 2016; pp. 213–218.
  24. Lei, X.; Fan, L.; Hu, R.Q.; Michalopoulos, D.S.; Fan, P. Secure multiuser communications in multiple decode-and-forward relay networks with direct links. In Proceedings of the 2014 IEEE Global Communications Conference (ICC), Austin, TX, USA, 8–12 December 2014; pp. 3180–3185.
  25. Fan, L.; Yang, N.; Duong, T.Q.; Elkashlan, M.; Karagiannidis, G.K. Exploiting direct links for physical layer security in multiuser multirelay networks. IEEE Trans. Wirel. Commun. 2016, 15, 3856–3867. [Google Scholar] [CrossRef]
  26. Yang, M.; Zhang, B.; Huang, Y.; Yang, N.; Guo, D.; Gao, B. Secure multiuser communications in wireless sensor networks with TAS and cooperative jamming. Sensors 2016, 16, 1908. [Google Scholar] [CrossRef] [PubMed]
  27. Laneman, J.N.; Tse, D.N.C.; Wornell, G.W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inform. Theory 2004, 50, 3062–3080. [Google Scholar] [CrossRef]
  28. Duong, T.Q.; Bao, V.N.Q.; Zepernick, H. On the performance of selection decode-and-forward relay networks over Nakagami-m fading channels. IEEE Commun. Lett. 2009, 13, 172–174. [Google Scholar] [CrossRef]
  29. Yuksel, M.; Erkip, E. Secure communication with a relay helping the wire-tapper. In Proceedings of the 2007 IEEE Information Theory Workshop, Tahoe City, CA, USA, 2–6 September 2007; pp. 595–600.
  30. Dong, L.; Yousefi’zadeh, H.; Jafarkhani, H. Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011; pp. 1–5.
  31. Alam, M.S.; Mark, J.W.; Shen, X. Relay selection and resource allocation for multi-user cooperative LTE-A uplink. In Proceedings of the 2012 IEEE International Conference on Communication (ICC), Ottawa, ON, Canada, 10–15 June 2012; pp. 595–600.
  32. Gómez, J.; Aguayo-Torres, M.; Blánquez-Casado, F.; Martín-Vega, F. Channel inversion CoMP technique in cellular system: A user-selection algorithm. In Proceedings of the 2014 Tenth International Conference on Wireless and Mobile Communications, Seville, Spain, 22–26 June 2014.
  33. Ge, Y.; Wen, S.; Ang, Y.H.; Liang, Y.C. Optimal relay selection in IEEE 802.16j multihop relay vehicular networks. IEEE Trans. Veh. Technol. 2010, 59, 2198–2206. [Google Scholar] [CrossRef]
  34. He, F.; Man, H.; Wang, W. Maximal ratio diversity combining enhanced security. IEEE Commun. Lett. 2011, 15, 509–511. [Google Scholar]
  35. Zhang, H.; Molisch, A.F.; Zhang, J. Applying Antenna Selection in WLANs for Achieving Broadband Multimedia Communications. IEEE Trans. Broadcast. 2006, 52, 475–482. [Google Scholar] [CrossRef]
  36. Yang, N.; Yeoh, P.L.; Elkashlan, M.; Schober, R.; Collings, I.B. Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Commun. 2013, 61, 144–154. [Google Scholar] [CrossRef]
  37. Papoulis, A.; Pillai, S.U. Probability, Random Variables, and Stochastic Processes, 4th ed.; McGraw-Hill: New York, NY, USA, 2002. [Google Scholar]
  38. Gradshteyn, I.S.; Ryzhik, I.M. Tables of Integrals, Series, and Products, 7th ed.; Academic Press: New York, NY, USA, 2007. [Google Scholar]
  39. Koshy, T. Discrete Mathematics with Applications; Academic Press: Burlington, VT, USA, 2004. [Google Scholar]
  40. Goldsmith, A.J. Wireless Communications; Cambridge University Press: Burlington, VT, USA, 2005. [Google Scholar]
Figure 1. Schematic illustration of the multiuser multirelay cooperative networks with the presence of an eavesdropper.
Figure 1. Schematic illustration of the multiuser multirelay cooperative networks with the presence of an eavesdropper.
Sensors 17 00377 g001
Figure 2. Secrecy outage probability as a function of the main-to-eavesdropper ratio (MER) with different values of the signal-to-noise ratio (SNR), where M = 3 , N = 3 , d SR = 0.5 and R th = 3 bits/s/Hz.
Figure 2. Secrecy outage probability as a function of the main-to-eavesdropper ratio (MER) with different values of the signal-to-noise ratio (SNR), where M = 3 , N = 3 , d SR = 0.5 and R th = 3 bits/s/Hz.
Sensors 17 00377 g002
Figure 3. Secrecy outage probability as a function of the secrecy target data rate, R th (bits/s/Hz), with different values of the main-to-eavesdropper ratio (MER), where M = 3 , N = 3 , d SR = 0.5 and SNR = 10 dB.
Figure 3. Secrecy outage probability as a function of the secrecy target data rate, R th (bits/s/Hz), with different values of the main-to-eavesdropper ratio (MER), where M = 3 , N = 3 , d SR = 0.5 and SNR = 10 dB.
Sensors 17 00377 g003
Figure 4. Secrecy outage probability as a function of the source relay distance, d SR , with different values of the main-to-eavesdropper ratio (MER), where M = 3 , N = 3 , SNR = 20 dB and R th = 2 bits/s/Hz.
Figure 4. Secrecy outage probability as a function of the source relay distance, d SR , with different values of the main-to-eavesdropper ratio (MER), where M = 3 , N = 3 , SNR = 20 dB and R th = 2 bits/s/Hz.
Sensors 17 00377 g004
Figure 5. Performance comparison between the proposed source relay selection (PSRS), the optimal joint source relay selection (OJSRS) and the random source relay selection (RSRS) schemes with the secrecy outage probability as a function of the main-to-eavesdropper ratio (MER) with M = 3 , N = 3 , d SR = 0.5 , SNR = 20 dB and R th = 3 bits/s/Hz.
Figure 5. Performance comparison between the proposed source relay selection (PSRS), the optimal joint source relay selection (OJSRS) and the random source relay selection (RSRS) schemes with the secrecy outage probability as a function of the main-to-eavesdropper ratio (MER) with M = 3 , N = 3 , d SR = 0.5 , SNR = 20 dB and R th = 3 bits/s/Hz.
Sensors 17 00377 g005
Figure 6. Performance comparison between the PSRS, OJSRS and RSRS schemes with the secrecy outage probability as a function of signal-to-noise ratio (SNR) with M = 3 , N = 3 , d SR = 0.5 , MER = 20 dB and R th = 2 bits/s/Hz.
Figure 6. Performance comparison between the PSRS, OJSRS and RSRS schemes with the secrecy outage probability as a function of signal-to-noise ratio (SNR) with M = 3 , N = 3 , d SR = 0.5 , MER = 20 dB and R th = 2 bits/s/Hz.
Sensors 17 00377 g006
Figure 7. Comparison of the complexity order between the PSRS and OJSRS schemes.
Figure 7. Comparison of the complexity order between the PSRS and OJSRS schemes.
Sensors 17 00377 g007
Figure 8. Illustration of the impact of the number of sources, M, and the number of relays, N, on the secrecy outage probability as a function of the main-to-eavesdropper ratio (MER), where d SR = 0.5 , SNR = 30 dB and R th = 3 bits/s/Hz.
Figure 8. Illustration of the impact of the number of sources, M, and the number of relays, N, on the secrecy outage probability as a function of the main-to-eavesdropper ratio (MER), where d SR = 0.5 , SNR = 30 dB and R th = 3 bits/s/Hz.
Sensors 17 00377 g008
Figure 9. Illustration of the impact of the number of sources, M, and the number of relays, N, on the secrecy outage probability as a function of the signal-to-noise ratio (SNR), where d SR = 0.5 , MER = 30 dB and R th = 3 bits/s/Hz.
Figure 9. Illustration of the impact of the number of sources, M, and the number of relays, N, on the secrecy outage probability as a function of the signal-to-noise ratio (SNR), where d SR = 0.5 , MER = 30 dB and R th = 3 bits/s/Hz.
Sensors 17 00377 g009
Table 1. The differences of the secrecy outage probability with the eavesdropper using the maximal ratio combining (MRC) and selection combining (SC) techniques.
Table 1. The differences of the secrecy outage probability with the eavesdropper using the maximal ratio combining (MRC) and selection combining (SC) techniques.
MER (dB)0246810
MRC10.9625940.9008310.8481600.7739830.673843
SC10.9450740.9001560.8481500.7739830.673843
Performance gap00.0175200.0006750.00001000

Share and Cite

MDPI and ACS Style

Shim, K.; Do, N.T.; An, B. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks. Sensors 2017, 17, 377. https://doi.org/10.3390/s17020377

AMA Style

Shim K, Do NT, An B. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks. Sensors. 2017; 17(2):377. https://doi.org/10.3390/s17020377

Chicago/Turabian Style

Shim, Kyusung, Nhu Tri Do, and Beongku An. 2017. "Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks" Sensors 17, no. 2: 377. https://doi.org/10.3390/s17020377

APA Style

Shim, K., Do, N. T., & An, B. (2017). Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks. Sensors, 17(2), 377. https://doi.org/10.3390/s17020377

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop