Next Article in Journal
Correction: Che et al. Indoor Positioning System (IPS) Using Ultra-Wide Bandwidth (UWB)—For Industrial Internet of Things (IIoT). Sensors 2023, 23, 5710
Next Article in Special Issue
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm
Previous Article in Journal
Electron Temperature Measurements Using a Two-Filter Soft X-ray Array in VEST
Previous Article in Special Issue
Inter-Frame-Relationship Protected Signal: A New Design for Radio Frequency Fingerprint Authentication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Secrecy Performance Analysis of Backscatter Communications with Side Information

1
Department of Information and Communication Engineering, Aalto University, 02150 Espoo, Finland
2
Telecommunication Research Institute (TELMA), Universidad de Málaga, 29010 Málaga, Spain
3
School of Cyber Engineering, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(20), 8358; https://doi.org/10.3390/s23208358
Submission received: 27 July 2023 / Revised: 29 September 2023 / Accepted: 8 October 2023 / Published: 10 October 2023
(This article belongs to the Special Issue Security and Privacy in Wireless Communication and Internet of Things)

Abstract

:
Backscatter communication (BC) systems are a promising technology for internet of things (IoT) applications that allow devices to transmit information by modulating ambient radio signals without the need for a dedicated power source. However, the security of BC systems is a critical concern due to the vulnerability of the wireless channel. This paper investigates the impact of side information (SI) on the secrecy performance of BC systems. SI mainly refers to the additional knowledge that is available to the communicating parties beyond transmitted data, which can be used to enhance reliability, efficiency, security, and quality of service in various communication systems. In particular, in this paper, by considering a non-causally known SI at the transmitter, we derive compact analytical expressions of average secrecy capacity (ASC) and secrecy outage probability (SOP) for the proposed system model to analyze how SI affects the secrecy performance of BC systems. Moreover, a Monte Carlo simulation validates the accuracy of our analytical results and reveals that considering such knowledge at the transmitter has constructive effects on the system performance and ensures reliable communication with higher rates than the conventional BC systems without SI, namely, lower SOP and higher ASC are achievable.

1. Introduction

Backscatter communication (BC) is a promising technology that enables devices to transmit information by modulating ambient radio signals, eliminating the need for a dedicated power source. This innovative approach has gained significant attention in internet of things (IoT) applications over recent years due to its low power requirements and potential for widespread deployment [1,2,3,4]. However, the lack of a tractable transmission structure in the BC system makes it susceptible to passive eavesdropping attacks, where an adversary can intercept and decode transmitted information. Moreover, the unlicensed and shared nature of the wireless spectrum in which BC operates raises concerns about interference and unauthorized access. Hence, ensuring the security of the BC system remains a critical challenge that should be considered in future wireless communication technologies such as sixth generation (6G) [5,6,7,8,9].
To address the aforesaid challenges, on the one hand, applying physical layer security (PLS) techniques in BC systems can be helpful [10,11,12,13,14,15,16,17]. The concept of PLS was first proposed by Shannon [18] and then studied by Wyner [19] for a basic wiretap channel exploiting Shannon’s notion of perfect secrecy. Indeed, the PLS aims to exploit the unique characteristics of the wireless channel to provide secure communication. Hence, by leveraging the inherent properties of the channel, such as fading and noise, the PLS can enhance the confidentiality and integrity of the transmitted information in BC systems. On the other hand, considering side information (SI) at the transmitters/receivers may play a vital role in improving the security and reliability of wireless BC systems. Generally speaking, SI mainly refers to additional knowledge available to the communicating parties beyond the transmitted data (e.g., channel state information (CSI), interference sources, noise statistics, prior data transmissions, etc.). The use of SI at the transmitter was first introduced by Shannon [20] for single-user point-to-point (P2P) communication systems, and then studied by Jafar [21] in multi-user communication systems. In this regard, due to the advantages of SI in reducing the destructive effects of interference and guaranteeing reliable communication with higher rates, Mitrpant et al. [22] analyzed the Gaussian wiretap channel with SI. Then, by exploiting dirty paper coding [23], Chen and Vink [24] studied the impact of SI on the Gaussian wiretap channel to find out how much secret information can be reliably and securely sent to the legitimate receiver without leaking information about the secret message to the eavesdropper. They showed that the SI at the transmitter provides a larger secrecy capacity and guarantees a more secure communication.

1.1. Related Works

In recent years, several contributions have been carried out to analyze the performance of secure BC systems [25,26,27,28,29,30,31,32,33,34,35,36,37,38] and to evaluate the impact of SI on various communication systems [39,40,41,42,43,44,45]. Saad et al. [25] studied the PLS performance of a wireless backscatter systems in terms of the secrecy outage probability (SOP). Zhang et al. [26] analyzed the SOP of a multi-tag BC system in the presence of an eavesdropper. Furthermore, Liu et al. [27] enhanced the SOP using an optimal tag selection scheme for a passive BC with multiple tags and one eavesdropper. In [28], Liu et al. proposed a tag selection scheme to enhance the average secrecy capacity (ASC) and SOP of a multi-tag self-powered BC system in the presence of an eavesdropper. By deriving an analytical expression of SOP, Muratkar et al. [29] studied the impact of the eavesdropper’s and reader’s motion on ambient BC systems’ secrecy performance when channel estimation is imperfect. In [30], Zheng et al. proposed an overlay cognitive ambient BC non-orthogonal multiple access (NOMA) system for intelligent transportation systems. They analyzed the secrecy performance of their proposed system model in the presence of an eavesdropping vehicle by deriving the SOP. In addition, Jia et al. [31] studied the secure multi-antenna transmission in an ambient BC-based intelligent transportation system in the presence of a passive eavesdropper with jamming, where a cooperative jammer is placed in the system to deliberately disrupt the eavesdropper without influencing the reader. For analyzing the performance of the proposed scheme, they derived a new closed-form expression of SOP.
Sharma and Kumbhani [32] conducted an in-depth analysis of secrecy performance in automatic toll collection systems employing BC. Their investigation focused on assessing the probability of secrecy compromise, incorporating the principles of PLS. The study placed particular emphasis on the effects of varying distances between the tag, reader, and eavesdropper. In [33], the emphasis shifted towards the evaluation of the secrecy performance in wireless-powered BC systems, particularly within the context of smart sustainable cities. Unique to this work was the consideration of the spatial randomness of network nodes in large-scale wireless-powered BCs. The authors employed a stochastic geometry framework to analyze SOP, accounting for imperfect successive interference cancellation and energy-harvesting constraints. A significant stride in the domain of two-way ambient BC was made by Wang et al. [34]. Their work addressed the challenge of secure communication in two-way ambient BC networks, introducing PLS considerations. The study derived analytical and asymptotic expressions for SOP, showcasing the intricate trade-offs between reliability and security. In the realm of UAV-enabled BC, Ref. [35] brought attention to the issue of information leakage in wireless channels. The authors introduced a multi-user secure BC system with analog beamforming and randomized continuous wave techniques. By exploiting randomized continuous wave techniques for eroding eavesdropping links, the study offered closed-form expressions for the secrecy rate, demonstrating substantial improvements in secrecy performance.
That et al. [36] tackled the secrecy capacity of bi-static BC networks, a critical concern in the adoption of battery-free IoT sensors. This study centered on the presence of a malicious eavesdropper and presented closed-form expressions for ASC. The results were validated through rigorous Monte Carlo simulations. The reliability and security of ambient backscatter NOMA systems under in-phase and quadrature-phase imbalance were the subject of investigation in [37]. The authors derived analytical expressions for SOP, uncovering intriguing insights into the impact of in-phase and quadrature-phase imbalance on system reliability and security trade-offs. In [38], an analysis of PLS was extended to ambient BC systems with source and reader mobility. The study employed SOP as a performance metric, exploring the effects of varying relative speed and the number of tags on the security of the system.
By considering perfect SI, Kim and Skoglund [39] maximized the expected rate over a single-input single-output (SISO) slowly fading Gaussian channel. In contrast, by assuming partial SI, Narula et al. [40] analyzed the expected signal-to-noise ratio (SNR) for a multiple antenna data transmission, where they showed that even a small amount of SI can be quite valuable for the considered system model. In addition, by considering the partial SI at the transmitter to exploit multi-user diversity, the capacity of the multiple-input and multiple-output (MIMO) broadcast channels was derived in [41]. Compact analytical expressions of the coverage region and outage probability for multiple access communications in the presence of non-causally known SI at transmitters were derived in [42,43], respectively. In addition, the impact of SI on emerging RIS-aided multiple access communications in terms of the capacity region and outage probability was investigated in [44]. Furthermore, Ghadi et al. [45] obtained closed-form expressions for the ASC and SOP under correlated Rayleigh fading channels.
While the potential of SI in providing secure and reliable communications for the next generation of wireless networks has been widely acknowledged, the specific challenges and opportunities it presents within the context of BC remain largely untapped. Addressing this research gap is imperative for advancing our understanding of SI’s impact on BC security and for shaping the future of wireless communication systems.

1.2. Motivations and Contributions

To the best of the authors’ knowledge, the performance analysis of secure BC systems in the presence of SI remains an open challenge. Hence, motivated by the potential of SI in providing secure and reliable communications for the next generation of wireless networks and the unique advantages of BC systems, in this paper, we investigate the efficiency of the secrecy performance of wireless BC systems when SI is available at the transmitter.
In particular, the main contributions of this paper can be summarized as follows.
  • By considering the non-causally known SI at the transmitter, we first derive the closed-form expressions of marginal distributions of the equivalent SNR at both a legitimate receiver and an eavesdropper under independent Rayleigh fading channels.
  • Based on the derived probability density function (PDF) and cumulative distribution function (CDF) of the received SNR at the receiver and eavesdropper, we obtain the analytical expressions of the ASC and SOP to analyze the secrecy performance of the BC systems under the effect of non-causally known SI.
  • Finally, we validate our analytical results through a Monte Carlo simulation. Our numerical results validate the analytical expressions and indicate that even considering a small amount of non-causally known SI at the transmitter can significantly enhance the performance of secure BC systems, namely, providing a higher ASC and a lower SOP compared with the blank BC scenarios (i.e., without SI).

1.3. Paper Organization

The rest of this paper is organized as follows. Section 2 presents the system model. Section 3 analyses the secrecy performance of the proposed system model in terms of the ASC and SOP. Section 4 provides analytical and simulation results, and Section 5 concludes the paper.

2. System Model

This section presents the system model, including the channel model and SNR distribution at the legitimate receiver and the eavesdropper by considering the effect of SI.

2.1. Channel Model

We consider a secure backscatter communication system with non-causally known SI at the legitimate transmitter (Alice), as shown in Figure 1 (It is assumed that the interfering sequence SI at Alice is injected from an external dominant source that exhibits a strong line-of-sight condition with reduced fading fluctuation (Figure 5 in [46]). Hence, we consider this unfaded counterpart approximation for the fading coefficients corresponding to the interfering signals in our analysis [45]). Alice is wirelessly powered up by a remote radio-frequency (RF) source and aims to send a confidential message to a legitimate receiver (Bob) over a wireless fading channel, while an eavesdropper (Eve) attempts to decode the message from its received signal. For simplicity, and without loss of generality, since the RF source is sending an unmodulated carrier, both Bob and Eve can employ cancellation techniques to mitigate the impact of direct link interference from the RF source [47,48,49]. Moreover, we suppose that all nodes are equipped with a single antenna, and thus, the received signal at Bob and Eve can be expressed as
y K = h T h K x + s + z K , K { B , E }
where h T denotes the fading channel coefficient between the PB and Alice, h K is the fading channel coefficient between Alice and the node K, s defines the non-causally known SI at Alice with variance Q (i.e., s N 0 , Q ) which is independently and identically distributed (i.i.d) with probability distribution p ( s ) , and z K corresponds to i.i.d. additive white Gaussian noise (AWGN) with zero mean and variance σ K 2 at the node K. Furthermore, the instantaneous received signal power at Alice is given by
P A = P T L T d T α | h T | 2 ,
in which P T is the transmitted power by the PB, L T incorporates the gains of the transmit and receive antennas and frequency-dependent propagation losses, d T is the distance between the PB and Alice, and α > 2 is the path-loss exponent. Hence, the instantaneous SNR at node K can be defined as
γ K = P A | h K | 2 σ K 2 = P T L T σ K 2 d T α d K α | h T | 2 | h K | 2 = γ ¯ K W K ,
in which γ ¯ K = P T L T σ K 2 d T α d K α is the average SNR.

2.2. SNR Distribution

In this paper, we assume that all fading channels follow a Rayleigh distribution, therefore, the channel power gains g v = | h v | 2 , for v { T , K } , are the exponential distribution with unit mean (i.e., E [ g v ] = 1 ). Since the SNR γ K includes the product of two independent exponential random variables, the PDF of W K = g T g K can be mathematically determined as
    f W K ( w K ) = 0 1 g T f G T ( g T ) f G K ( w K / g T ) d g T
  = 0 1 g T e g T w K g T d g T
= 2 K 0 2 w K ,
where K ν ( . ) is the modified Bessel function of the second kind. Then, exploiting the fact that f γ K ( γ K ) = 1 γ ¯ K f W K γ K γ ¯ K , the PDF of γ K can be given by
f γ K ( γ K ) = 2 γ ¯ K K 0 2 γ K γ ¯ K .
By using the definition, F X ( x ) = 0 x f X ( x ) d x , the CDF of the SNR γ K can be derived as
F γ K γ K = 1 2 γ K γ ¯ K K 1 2 γ K γ ¯ K .

3. Secrecy Performance Analysis

Here, we derive the compact analytical expressions of the ASC and SOP for the proposed system model under Rayleigh fading channels.

3.1. ASC Analysis

In order to analyze the ASC, we first need to define the secrecy capacity for the considered system model. The secrecy capacity for a classic wiretap channel from the information theory viewpoint was derived in [24] and then extended to the wireless channels by considering the propagation environment effects such as fading, shadowing, path-loss, etc. [45]. Hence, the secrecy capacity for the block fading wiretap channel with non-causally known SI at the transmitter is given by (Theorem 2 in [45])
C s = log 2 1 + γ B if Corollary 1 log 2 1 + γ ¯ s , B + γ B 1 + γ ¯ s , E + γ E if Corollary 2 ,
where γ ¯ s , K = Q σ K 2 . blueBesides, Corollaries 1 and 2 are defined in [45].
Theorem 1.
The ASC for the concerned backscatter communications with non-causally known SI at the transmitter is given by
C ¯ s = C ¯ s 1 if Corollary 1 C ¯ s 2 if Corollary 2 ,
where
C ¯ s 1 = 1 γ ¯ B ln 2 G 1 , 3 3 , 1 1 γ ¯ B | 1 1 , 1 , 0 ,
and
  C ¯ s 2 = C 1 n = 1 l = 0 n ( 1 ) n n n l γ ¯ B l γ ¯ s , B n l G 2 , 2 2 , 2 γ ¯ B γ ¯ E | 1 2 l , 1 2 l 1 2 , 1 2
+ C 2 n = 1 l = 0 n ( 1 ) n n n l γ ¯ E l γ ¯ s , E n l G 2 , 2 2 , 2 γ ¯ E γ ¯ B | 1 2 l , 1 2 l 1 2 , 1 2
C 3 H 1 , 0 : 1 , 2 ; 0 , 1 0 , 1 : 2 , 1 ; 1 , 0 1 γ ¯ s , B γ ¯ B γ ¯ s , B | ( 0 ; 1 , 1 ) : ( 0 , 1 ) ; : ( 0 , 1 ) , ( 0 , 1 ) ; ( 0 , 1 ) ,
in which C 1 = γ ¯ B γ ¯ E ln 2 , C 2 = γ ¯ E γ ¯ B ln 2 , and C 3 = γ ¯ s , B γ ¯ B ln 2 .
Proof.
By re-expressing the logarithm function in terms of the Meijer’s G-function, inserting the PDF of γ ¯ B from (7), and using the integral format provided in [50], Equation (2.24.4.3), C ¯ s 1 can be derived as follows:
  C ¯ s 1 = 0 log 2 1 + γ B f B γ B d γ B
= 2 γ ¯ B ln 2 0 G 2 , 2 1 , 2 γ B | 1 , 1 1 , 0 K 0 2 γ B γ ¯ B d γ B
  = 1 γ ¯ B ln 2 G 1 , 3 3 , 1 1 γ ¯ B | 1 1 , 1 , 0 .
In order to prove the derived analytical expression for C ¯ s 2 under the SI effect we start with the ASC formula [45].
  C ¯ s 2 = 0 0 log 2 1 + γ ¯ s , B + γ B 1 + γ ¯ s , E + γ E f B γ B f E γ E d γ B d γ E = 0 log 2 1 + γ ¯ s , B + γ B f γ B γ B F γ E γ B d γ B + 0 log 2 1 + γ ¯ s , E + γ E f γ E γ E F γ B γ E d γ E
0 log 2 1 + γ ¯ s , E + γ E f γ E γ E d γ E .
By inserting (7) and (8) into (19), we will need to compute C ¯ s 2 as
C ¯ s 2 = I 1 I 2 I 3 ,
where
I 1 = 2 γ ¯ B 0 log 2 1 + γ ¯ s , B + γ B K 0 2 γ B γ ¯ B d γ B ,
I 2 = 4 γ ¯ E 0 log 2 1 + γ ¯ s , B + γ B γ B K 0 2 γ B γ ¯ B K 1 2 γ B γ ¯ E d γ B ,
I 3 = 4 γ ¯ B 0 log 2 1 + γ ¯ s , E + γ E γ E K 0 2 γ E γ ¯ E K 1 2 γ E γ ¯ B d γ E .
In order to solve I 1 , we first use the Meijer’s G-function shape of the logarithm and MacDonald’s functions (see (24) and (25)) and the y = γ ¯ s , B + γ B variable change.
ln 1 + x = G 1 , 2 2 , 2 x | 1 , 1 1 , 0 .
K ν x = 1 2 G 0 , 2 2 , 0 x 2 4 | ν 2 , ν 2 .
Then, we have I 1 as
I 1 = 1 γ ¯ B ln 2 0 G 1 , 2 2 , 2 y | 1 , 1 1 , 0 G 0 , 2 2 , 0 y γ ¯ s , B γ ¯ B | 0 , 0 d y .
By using the the Meijer’s G-function definition, we have (26) as
I 1 = 1 γ ¯ B ln 2 ( 2 π j ) 2 0 y ζ 1 y γ ¯ B γ ¯ s , B γ ¯ B ζ 2 d y I 1 L 1 L 2 Γ 1 ζ 1 Γ 2 ζ 1 Γ 1 + ζ 1 Γ 2 ζ 2 d ζ 2 d ζ 1 ,
where L 1 and L 2 are special contours and I 1 can be obtained as
I 1 = γ ¯ s , B 1 + ζ 1 γ ¯ s , B γ ¯ B ζ 2 Γ 1 ζ 1 ζ 2 Γ 1 + ζ 1 Γ ζ 2 .
By putting (28) into (27) and changing ζ 1 = ζ 1 and ζ 2 = ζ 2 , we have
I 1 = γ ¯ s , B γ ¯ B ln 2 ( 2 π j ) 2 L 1 L 2 Γ 1 + ζ 1 + ζ 2 Γ 1 + ζ 1 Γ 2 ζ 1 1 γ ¯ s , B ζ 1 Γ ζ 2 γ ¯ B γ ¯ s , B ζ 2 d ζ 2 d ζ 1 .
According to the definition of the bivariate Fox’s H-function ([51], Equations (2.56)–(2.60)), we can write (29) as (14), so the proof is completed for I 1 .
In order to compute I 2 , we first use the Taylor distribution of the logarithm and binomial functions and also re-express the MacDonald’s functions in terms of the Meijer’s G-function. Therefore, we can rewrite (22) as
I 2 = I n = 1 l = 0 n ( 1 ) n + 1 n n l γ ¯ s , B n l 0 γ B 1 2 + l G 2 , 0 0 , 2 γ B γ B ¯ | 0 , 0 G 0 , 2 2 , 0 γ B γ ¯ E | 0 , 0 d γ B I 2 ,
where I = 1 γ ¯ B γ ¯ E ln 2 . By using the ([50], Equation (2.24.3.1)), we can obtain I 2 as
I 2 = γ ¯ B 3 2 + l G 2 , 2 2 , 2 γ ¯ B γ ¯ E | 1 2 l , 1 2 l 1 2 , 1 2 .
Now, by inserting (31) into (30), we will have I 2 as (12) and the proof is completed. We can also take a similar step for completing the proof for obtaining I 3 as (13). As a result, the proof will be completed for C ¯ s 2 .

3.2. SOP Analysis

The SOP is defined as the probability that the random secrecy capacity C s is less than a target secrecy rate R s > 0 , i.e.,
P s o p = Pr C s R s .
Theorem 2.
The SOP for the considered backscatter communications with non-causally known SI at the transmitter is given by
P s o p = P s o p 1 if Corollary   1 P s o p 2 if   Corollary   2 ,
where
P s o p 1 = 1 2 R t h γ ¯ B K 1 2 R t h γ ¯ B ,
and
P s o p 2 = 1 R t 3 2 R t γ ¯ E H 1 , 0 : 1 , 0 ; 2 , 1 0 , 1 : 0 , 1 ; 1 , 2 γ ¯ B R t R t γ ¯ E R t | 2 ; 1 , 1 : 1 2 , 1 ; 1 , 1 , 1 , 1 : ; 1 , 1 .
Proof.
By substituting C s 1 into (32), P s o p 1 can be derived as
  P s o p 1 = Pr log 2 1 + γ B R s
= Pr γ B 2 R s 1
= F γ B R t h ,
in which by inserting R t h = 2 R s 1 into (8), the proof is completed.
Similarly, by inserting C s 2 into the SOP definition and considering the marginal distributions, we have
  P s o p 2 = Pr log 2 1 + γ ¯ s , B + γ B 1 + γ ¯ s , E + γ E > R s
= Pr γ B > 2 R s 1 + γ ¯ s , E + γ E 1 + γ ¯ s , B
= 0 F B γ t h f E γ E d γ E
= 1 4 γ ¯ E 0 γ t h γ ¯ B K 1 2 γ t h γ ¯ B K 0 2 γ E γ ¯ E d γ E ,
where γ t h = R t γ E + R t , R t = 2 R s , and R t = 2 R s 1 + γ ¯ s , E 1 γ ¯ s , B . Now, by re-expressing the Bessel functions in terms of the Meijer’s G-function we have
P s o p 2 = 1 1 γ ¯ E 0 R t γ E + R t γ ¯ B ×   G 0 , 2 2 , 0 R t γ E + R t γ ¯ B | 1 2 , 1 2 G 0 , 2 2 , 0 γ E γ ¯ E | 0 , 0 d γ E .
By using the Meijer G-function definition, we can rewrite (43) as
P s o p 2 = 1 1 γ ¯ E ( 2 π j ) 2 0 R t γ E + R t γ ¯ B 1 2 + ζ 1 γ E γ ¯ E ζ 2 d γ E J 1 × L 1 L 2 Γ 1 2 ζ 1 Γ 1 2 ζ 1 Γ 2 ζ 2 d ζ 2 d ζ 1 ,
where we can obtain J 1 as
J 1 = R t 3 2 R t R t γ ¯ B ζ 1 R r i m e t R t γ ¯ E ζ 2 Γ 3 ζ 1 ζ 2 Γ 1 + ζ 2 Γ 1 2 ζ 1 .
Now, by inserting (45) into (44) and changing ζ 1 = ζ 1 and ζ 2 = ζ 2 , we have P s o p 2 as
P s o p 2 = 1 P L 1 L 2 Γ 3 + ζ 1 + ζ 2 Γ 1 2 + ζ 1 R t γ ¯ B ζ 1 Γ 1 + ζ 2 Γ 2 ζ 2 R t R t γ ¯ E ζ 2 d ζ 2 d ζ 1 .
where P = R t 3 2 R t γ ¯ E ( 2 π j ) 2 . According to the definition of the bivariate Fox’s H-function ([51], Equations (2.56)–(2.60)), we can write (46) as (35), so the proof is completed for P s o p 2 .

4. Numerical Results

In this section, we evaluate the accuracy of our analytical results with Monte Carlo simulations in the presence/absence of non-causally known SI at the transmitter. To this end, we set P T = 20 ,   30 ,   40 ,   50 dBm, σ B 2 = 50 dBm, σ E 2 = 40 dBm, d T = d B = d E = 10 m, Q = 40 dBm, R s = 1 bits, α = 3 .
Figure 2 shows the behavior of the ASC in terms of γ ¯ B for given values of γ ¯ E when the non-causally known SI is available at Alice. As anticipated, it becomes evident that as γ ¯ B grows, the ASC also increases. This phenomenon can be attributed to the improvement in the primary communication link (from Alice to Bob) conditions. In simpler terms, as the average SNR at Bob improves, the ability to transmit secure information between Alice and Bob becomes more effective, resulting in an increase in the ASC. It can be also observed that the presence of SI has a constructive impact on the ASC performance. In other words, when SI is available, the ASC is significantly higher compared to scenarios where SI does not exist. This implies that SI plays a vital role in enhancing the ASC, making the communication link more secure and capable of transmitting information more effectively. These observations are in alignment with the findings of [24,45], where it was shown that the non-causally known SI at the transmitter can help to achieve a larger secrecy capacity and achieve a larger rate equivocation region. Additionally, it is worth noting that the positive influence of SI on the ASC gradually diminishes as γ ¯ B increases. In simpler terms, when the primary link’s signal quality from Alice to Bob is already quite strong (high γ ¯ B ), the additional benefit provided by SI becomes less significant. This suggests that while SI remains beneficial in lower SNR scenarios, its impact becomes less pronounced as the communication conditions improve. However, it is seen that the SI does not affect the ASC performance if Corollary 1 in [45] is considered since C ¯ s 1 is independent of SI and only depends on γ B (see (9)). In order to gain more insights into the impact of SI on the ASC performance, Figure 3 indicates the efficiency of the ASC versus the SI ratio γ ¯ s , B / γ ¯ s , E for three different scenarios γ ¯ B > γ ¯ E , γ ¯ B = γ ¯ E , and γ ¯ B < γ ¯ E . It is obvious that in all three scenarios, C ¯ s 1 is fixed as the SI ratio changes and only depends on γ ¯ B . In contrast, it can be seen that C ¯ s 2 monotonically increases as the SI ratio grows for all scenarios. It is worth noting that even under the scenario that the eavesdropper link (Alice-to-eavesdropper) is better than the main link (i.e., γ ¯ B < γ ¯ E ), the ASC is still achievable, though with lower values.
The impact of SI on the SOP performance in terms of γ ¯ B for selected values of γ ¯ E is illustrated in Figure 4. Due to the definition of the secrecy capacity from (9), we can see that the SOP is constant as γ ¯ B grows under Col. 1 provided in [45]; however, it is observed that the SI can significantly improve the SOP performance if Col. 2 in [45] is considered as it can reduce the likelihood of communication failures in the presence of eavesdroppers. To further evaluate the impact of SI on the SOP performance, Figure 5 demonstrates the SOP behavior versus the SI ratio γ ¯ s , B / γ ¯ s , E for three different scenarios. For all three scenarios, it can be observed that the SOP decreases as the SI ratio increases. We can also see that when the main link is better than the eavesdropper link (i.e., γ ¯ B > γ ¯ E ), the lowest SOP is achievable compared with two other cases. Hence, we can see that considering the non-causally known SI at the transmitter in the secure backscatter communication system can remarkably enhance the SOP performance.

5. Conclusions

In this study, we have explored the impact of side information on the secrecy performance of backscatter communication systems, assuming Rayleigh fading distributions for all channel conditions. Specifically, our investigation focused on scenarios where non-causally known side information is available at the transmitter. We conducted a comprehensive analysis of the system’s secrecy performance, providing concise analytical expressions for both ASC and SOP. Our analytical findings, coupled with simulation results, have consistently demonstrated the tangible benefits of incorporating SI in securing backscatter communication systems. This inclusion of SI has proven to be highly advantageous, resulting in a significant enhancement in the system’s secrecy performance, as quantified by improvements in both ASC and SOP. To put it succinctly, our results underscore the constructive influence of non-causally known SI in enhancing the security of backscatter communication systems, particularly in scenarios characterized by strong interference. This positive effect becomes particularly pronounced when contrasted with the scenario of an interference-free, clean backscatter communication system.

Author Contributions

Conceptualization, M.K., F.R.G., R.J. and Z.Y.; methodology, M.K. and F.R.G.; formal analysis, M.K. and F.R.G.; investigation, M.K. and F.R.G.; simulation, M.K. and F.R.G.; writing—original draft preparation, M.K. and F.R.G.; writing—review and editing, R.J. and Z.Y.; supervision, R.J. and Z.Y.; project administration, R.J. and Z.Y.; funding acquisition, R.J. and Z.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Academy of Finland under grants 345072 and 350464.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
BCBackscatter communication
IoTInternet of things
SISide information
ASCAverage secrecy capacity
SOPSecrecy outage probability
6GSixth generation
PLSPhysical layer security
P2PPoint-to-point
CSIChannel state information
SISOSingle-input single-output
MIMOMultiple-input multiple-output
SNRSignal-to-noise ratio
RFRadio-frequency

References

  1. Wu, W.; Wang, X.; Hawbani, A.; Yuan, L.; Gong, W. Survey on ambient backscatter communications: Principles, systems, applications, and challenges. Comput. Netw. 2022, 216, 109235. [Google Scholar] [CrossRef]
  2. Jameel, F.; Duan, R.; Chang, Z.; Liljemark, A.; Ristaniemi, T.; Jantti, R. Applications of backscatter communications for healthcare networks. IEEE Netw. 2019, 33, 50–57. [Google Scholar] [CrossRef]
  3. Xu, C.; Yang, L.; Zhang, P. Practical backscatter communication systems for battery-free Internet of Things: A tutorial and survey of recent research. IEEE Signal Process. Mag. 2018, 35, 16–27. [Google Scholar] [CrossRef]
  4. Yang, L.; Li, X.; Sun, M.; Sun, C. Hybrid policy-based reinforcement learning of adaptive energy management for the Energy transmission-constrained island group. IEEE Trans. Ind. Inform. 2023, 19, 10751–10762. [Google Scholar] [CrossRef]
  5. Duan, R.; Wang, X.; Yigitler, H.; Sheikh, M.U.; Jantti, R.; Han, Z. Ambient backscatter communications for future ultra-low-power machine type communications: Challenges, solutions, opportunities, and future research trends. IEEE Commun. Mag. 2020, 58, 42–47. [Google Scholar] [CrossRef]
  6. Wang, P.; Yan, Z.; Zeng, K. Bcauth: Physical layer enhanced authentication and attack tracing for backscatter communications. IEEE Trans. Inf. Forensics Secur. 2022, 17, 2818–2834. [Google Scholar] [CrossRef]
  7. Ghadi, F.R.; Martin-Vega, F.J.; Martínez, F.J.L. Capacity of backscatter communication under arbitrary fading dependence. IEEE Trans. Veh. Technol. 2022, 71, 5593–5598. [Google Scholar] [CrossRef]
  8. Cao, K.; Weng, J.; Li, K. Reliability-Driven End–End–Edge Collaboration for Energy Minimization in Large-Scale Cyber-Physical Systems. IEEE Trans. Reliab. 2023. early access. [Google Scholar] [CrossRef]
  9. Wang, P.; Wang, N.; Dabaghchian, M.; Zeng, K.; Yan, Z. Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise. In Proceedings of the IEEE INFOCOM 2019, Paris, France, 29 April–2 May 2019. [Google Scholar]
  10. Li, X.; Zheng, Y.; Khan, W.U.; Zeng, M.; Li, D.; Ragesh, G.K.; Li, L. Physical layer security of cognitive ambient backscatter communications for green Internet-of-Things. IEEE Trans. Green Commun. Netw. 2021, 5, 1066–1076. [Google Scholar] [CrossRef]
  11. Li, M.; Yang, X.; Khan, F.; Jan, M.A.; Chen, W.; Han, Z. Improving physical layer security in vehicles and pedestrians networks with ambient backscatter communication. IEEE Trans. Intell. Transp. Syst. 2022, 23, 9380–9390. [Google Scholar] [CrossRef]
  12. Tang, Z.; Hou, T.; Liu, Y.; Zhang, J.; Zhong, C. A novel design of RIS for enhancing the physical layer security for RIS-aided NOMA networks. IEEE Wirel. Commun. Lett. 2021, 10, 2398–2401. [Google Scholar] [CrossRef]
  13. Zhu, F.; Yao, M. Improving physical-layer security for CRNs using SINR-based cooperative beamforming. IEEE Trans. Veh. Technol. 2015, 65, 1835–1841. [Google Scholar] [CrossRef]
  14. Yang, Y.S.; Yan, Z.; Zeng, K.; Wang, P.; Li, J.J. Physical Layer Authentication in Backscatter Communication: A Review. IEEE Wirel. Commun. Mag. 2022, 17, 2818–2834. [Google Scholar]
  15. Wang, P.; Yan, Z.; Wang, N.; Zeng, K. Optimal Resource Allocation for Secure Multi-device Wirelessly Powered Backscatter Communications with Artificial Noise. IEEE Trans. Wirel. Commun. 2022, 21, 7794–7809. [Google Scholar] [CrossRef]
  16. Yang, Y.S.; Kaveh, M.; Li, J.J.; Zhang, Y.F.; Yan, Z.; Zeng, K. BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network. In Proceedings of the IEEE 2023 IEEE International Conference on Communications (ICC), Rome, Italy, 28 May–1 June 2023. [Google Scholar]
  17. Wang, P.; Jiao, L.; Zeng, K.; Yan, Z. Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals. In Proceedings of the IEEE INFOCOM 2021, Virtual Conference, 10–13 May 2021. [Google Scholar]
  18. Shannon, C.E. Communication theory of secrecy systems. Bell Labs Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  19. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  20. Shannon, C.E. Channels with side information at the transmitter. IBM J. Res. Dev. 1958, 2, 289–293. [Google Scholar] [CrossRef]
  21. Jafar, S. Capacity with causal and noncausal side information: A unified view. IEEE Trans. Inf. Theory 2006, 52, 5468–5474. [Google Scholar] [CrossRef]
  22. Mitrpant, C.; Vinck, A.J.H.; Luo, Y. An achievable region for the Gaussian wiretap channel with side information. IEEE Trans. Inf. Theory 2006, 52, 2181–2190. [Google Scholar] [CrossRef]
  23. Costa, M. Writing on dirty paper (corresp.). IEEE Trans. Inf. Theory 1983, 29, 439–441. [Google Scholar] [CrossRef]
  24. Chen, Y.; Vinck, A.H. Wiretap channel with side information. IEEE Trans. Inf. Theory 2008, 54, 395–402. [Google Scholar] [CrossRef]
  25. Saad, W.; Zhou, X.; Han, Z.; Poor, H.V. On the physical layer security of backscatter wireless systems. IEEE Trans. Wirel. Commun. 2014, 13, 3442–3451. [Google Scholar] [CrossRef]
  26. Zhang, Y.; Gao, F.; Fan, L.; Lei, X.; Karagiannidis, G.K. Secure communications for multi-tag backscatter systems. IEEE Wirel. Commun. Lett. 2019, 8, 1146–1149. [Google Scholar] [CrossRef]
  27. Liu, Y.; Ye, Y.; Hu, R.Q. Secrecy outage probability in backscatter communication systems with tag selection. IEEE Wirel. Commun. Lett. 2021, 10, 2190–2194. [Google Scholar] [CrossRef]
  28. Liu, Z.; Ye, Y.; Chu, X.; Sun, H. Secrecy performance of backscatter communications with multiple self-powered tags. IEEE Commun. Lett. 2022, 26, 2875–2879. [Google Scholar] [CrossRef]
  29. Muratkar, T.S.; Bhurane, A.; Sharma, P.K.; Kothari, A. Physical layer security analysis in ambient backscatter communication with node mobility and imperfect channel estimation. IEEE Commun. Lett. 2021, 26, 27–30. [Google Scholar] [CrossRef]
  30. Zheng, Y.; Li, X.; Zhang, H.; Alshehri, M.D.; Dang, S.; Huang, G.; Zhang, C. Overlay cognitive ABCom-NOMA-based ITS: An in-depth secrecy analysis. IEEE Trans. Intell. Transp. Syst. 2022, 24, 2217–2228. [Google Scholar] [CrossRef]
  31. Jia, S.; Wang, R.; Xu, Y.; Lou, Y.; Zhang, D.; Sato, T. Secrecy Analysis of ABCom-Based Intelligent Transportation Systems With Jamming. IEEE Trans. Intell. Transp. Syst. 2023. early access. [Google Scholar] [CrossRef]
  32. Sharma, H.K.; Kumbhani, B. Ergodic secrecy capacity of backscatter communication based automatic toll collection systems. Sādhanā 2023, 48, 83. [Google Scholar] [CrossRef]
  33. Zan, J.; Shi, L.; Lu, G.; Ye, Y. Wireless-powered backscatter communications for smart sustainable cities: A secrecy analysis. Sustain. Energy Technol. Assess. 2023, 56, 103036. [Google Scholar] [CrossRef]
  34. Wang, H.; Jiang, J.; Huang, G.; Wang, W.; Deng, D.; Elhalawany, B.M.; Li, X. Physical layer security of two-way ambient backscatter communication systems. Wirel. Commun. Mob. Comput. 2022, 2022, 5445676. [Google Scholar] [CrossRef]
  35. Bai, L.; Chen, Q.; Bai, T.; Wang, J. UAV-enabled secure multiuser backscatter communications with planar array. IEEE J. Sel. Areas Commun. 2022, 40, 2946–2961. [Google Scholar] [CrossRef]
  36. That, P.T.; Ha, D.H.; Nguyen, H.N. Secrecy capacity analysis of bi-static backscatter communication systems. Bull. Electr. Eng. Inform. 2022, 11, 3353–3360. [Google Scholar] [CrossRef]
  37. Li, X.; Zhao, M.; Liu, Y.; Li, L.; Ding, Z.; Nallanathan, A. Secrecy analysis of ambient backscatter NOMA systems under I/Q imbalance. IEEE Trans. Veh. Technol. 2020, 69, 12286–12290. [Google Scholar] [CrossRef]
  38. Gorbade, S.; Shrivastava, R.; Bhurane, A. Physical Layer Security Analysis in Ambient Backscatter Communication With Source and Reader Mobility. In Proceedings of the 2022 1st International Conference on the Paradigm Shifts in Communication, Embedded Systems, Machine Learning and Signal Processing (PCEMS), Nagpur, India, 6–7 May 2022; pp. 57–61. [Google Scholar]
  39. Kim, T.T.; Skoglund, M. On the expected rate of slowly fading channels with quantized side information. IEEE Trans. Commun. 2007, 55, 820–829. [Google Scholar] [CrossRef]
  40. Narula, A.; Lopez, M.J.; Trott, M.D.; Wornell, G.W. Efficient use of side information in multiple-antenna data transmission over fading channels. IEEE J. Sel. Areas Commun. 1998, 16, 1423–1436. [Google Scholar] [CrossRef]
  41. Sharif, M.; Hassibi, B. On the capacity of MIMO broadcast channels with partial side information. IEEE Trans. Inf. Theory 2005, 51, 506–522. [Google Scholar] [CrossRef]
  42. Ghadi, F.R.; Hodtani, G.A.; López-Martínez, F.J. The role of correlation in the doubly dirty fading MAC with side information at the transmitters. IEEE Wirel. Commun. Lett. 2021, 10, 2070–2074. [Google Scholar] [CrossRef]
  43. Ghadi, F.R.; Zhu, W.P. Performance Analysis Over Correlated/Independent Fisher-Snedecor F Fading Multiple Access Channels. IEEE Trans. Veh. Technol. 2022, 71, 7561–7571. [Google Scholar] [CrossRef]
  44. Ghadi, F.R.; López-Martínez, F.J. RIS-Aided Communications over Dirty MAC: Capacity Region and Outage Probability. IEEE Commun. Lett. 2023, 27, 2009–2013. [Google Scholar] [CrossRef]
  45. Ghadi, F.R.; López-Martínez, F.J.; Zhu, W.P.; Gorce, J.M. The impact of side information on physical layer security under correlated fading channels. IEEE Trans. Inf. Forensics Secur. 2022, 17, 3626–3636. [Google Scholar] [CrossRef]
  46. Walid, S.; Bennis, M.; Chen, M. A vision of 6G wireless systems: Applications, trends, technologies, and open research problems. IEEE Netw. 2019, 34, 134–142. [Google Scholar]
  47. Biswas, R.; Sheikh, M.U.; Yiğitler, H.; Lempiäinen, J.; Jäntti, R. Direct path interference suppression requirements for bistatic backscatter communication system. In Proceedings of the IEEE 93rd Vehicular Technology Conference, Helsinki, Finland, 25–28 April 2022; pp. 1–5. [Google Scholar]
  48. Zhang, M.; Zhao, J.; Chen, S.; Gong, W. Reliable backscatter with commodity BLE. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Toronto, ON, Canada, 6–9 July 2022; pp. 1291–1299. [Google Scholar]
  49. Liao, J.; Wang, X.; Ruttik, K.; Jäntti, R.; Phan-Huy, D.T. In-band Ambient FSK Backscatter Communications Leveraging LTE Cell-Specific Reference Signals. IEEE J. Radio Freq. Identif. 2023, 7, 267–277. [Google Scholar] [CrossRef]
  50. Prudnikov, A.P. Integrals and Series: More Special Functions; CRC Press: Boca Raton, FL, USA, 1986; Volume 3. [Google Scholar]
  51. Mathai, A.M.; Saxena, R.K.; Haubold, H.J. The H-Function: Theory and Applications; Springer Science and Business Media: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
Figure 1. Illustration of the secure backscatter communication with SI.
Figure 1. Illustration of the secure backscatter communication with SI.
Sensors 23 08358 g001
Figure 2. ASC versus γ ¯ B for selected values of γ ¯ E in presence/absence of SI.
Figure 2. ASC versus γ ¯ B for selected values of γ ¯ E in presence/absence of SI.
Sensors 23 08358 g002
Figure 3. ASC versus SI ratio for three different scenarios γ ¯ B > γ ¯ E , γ ¯ B = γ ¯ E , and γ ¯ B < γ ¯ E .
Figure 3. ASC versus SI ratio for three different scenarios γ ¯ B > γ ¯ E , γ ¯ B = γ ¯ E , and γ ¯ B < γ ¯ E .
Sensors 23 08358 g003
Figure 4. SOP versus γ ¯ B for selected values of γ ¯ E in presence/absence of SI.
Figure 4. SOP versus γ ¯ B for selected values of γ ¯ E in presence/absence of SI.
Sensors 23 08358 g004
Figure 5. SOP versus SI ratio for three different scenarios γ ¯ B > γ ¯ E , γ ¯ B = γ ¯ E , and γ ¯ B < γ ¯ E .
Figure 5. SOP versus SI ratio for three different scenarios γ ¯ B > γ ¯ E , γ ¯ B = γ ¯ E , and γ ¯ B < γ ¯ E .
Sensors 23 08358 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kaveh, M.; Rostami Ghadi, F.; Jäntti, R.; Yan, Z. Secrecy Performance Analysis of Backscatter Communications with Side Information. Sensors 2023, 23, 8358. https://doi.org/10.3390/s23208358

AMA Style

Kaveh M, Rostami Ghadi F, Jäntti R, Yan Z. Secrecy Performance Analysis of Backscatter Communications with Side Information. Sensors. 2023; 23(20):8358. https://doi.org/10.3390/s23208358

Chicago/Turabian Style

Kaveh, Masoud, Farshad Rostami Ghadi, Riku Jäntti, and Zheng Yan. 2023. "Secrecy Performance Analysis of Backscatter Communications with Side Information" Sensors 23, no. 20: 8358. https://doi.org/10.3390/s23208358

APA Style

Kaveh, M., Rostami Ghadi, F., Jäntti, R., & Yan, Z. (2023). Secrecy Performance Analysis of Backscatter Communications with Side Information. Sensors, 23(20), 8358. https://doi.org/10.3390/s23208358

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop