Literature DB >> 33267414

Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments.

Phu Tran Tin1,2, Tan N Nguyen1, Nguyen Q Sang3, Tran Trung Duy4, Phuong T Tran5, Miroslav Voznak1.   

Abstract

In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.

Entities:  

Keywords:  co-channel interference; energy harvesting; hardware impairments; rateless codes; transmit antenna selection

Year:  2019        PMID: 33267414      PMCID: PMC7515214          DOI: 10.3390/e21070700

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.524


1. Introduction

Physical-layer security (PLS) [1,2,3,4] has attracted much attention of the researchers as an efficient method to attain security. Due to the simple implementation, i.e., only exploiting characteristics of wireless medium such as link distance and channel state information (CSI), PLS can be implemented efficiently in wireless sensor networks (WSNs), internet-of-things (IoT) networks, etc. [5,6,7,8]. To enhance the secrecy performance, diversity transmission methods can be employed. In [9,10,11,12], MIMO-based transmit–receive methods such as Transmit Antenna Selection-Maximal Ratio Combining (TAS-MRC), Maximal Ratio Transmission-MRC (MRT-MRC), MRT-Selection Combining (MRT-SC), MRT-SC were proposed and analyzed. In addition, performance of secure communication protocols can be also enhanced with cooperative relaying methods [13,14,15,16]. In [17,18,19,20], the authors proposed cooperative jamming (CJ) techniques to reduce quality of the eavesdropping channels, where friendly jammers are employed to generate artificial noises on the eavesdropper, and the legitimate receivers have to cooperate with the jammers to remove the interference in the received signals. The results presented that the schemes which combine the diversity transmission and the jamming techniques outperform the conventional cooperative ones without using CJ. However, energy efficiency may become a critical issue when the jammer nodes continuously transmit the artificial noises by using their own energy. Recently, radio frequency (RF) energy harvesting (EH) is an efficient method to prolong lifetime for wireless networks [21,22,23,24]. Particularly, the wireless devices can harvest energy from full-energy nodes [21,22] or from power stations deployed in networks [25,26] or even from co-channel interferences caused by outside sources [27,28]. References [20,29] proposed and analyzed performance of RF-EH-based secure communication protocols. To support energy for the jammer nodes, the authors of [20,29] proposed harvest-to-jam (HJ) methods, where the cooperative jammers harvest energy from the RF signals, and then use it to generate artificial noises. Rateless codes or Fountain codes (FCs) [30,31,32,33] have drawn much attention due to their simple implementation. In FCs, a transmitter uses Fountain encoder to generate a limitless number of encoded packets, and then transmit them to intended receivers. If the receivers can receive a sufficient number of the encoded packets, they can recover the original message of the transmitter. Due to broadcast of the wireless channels, the encoded packets can be overheard by eavesdroppers. Therefore, the security becomes a critical issue for the FCs-based communication systems. Recently, some published works considering the secure communication protocols with FCs have been reported in [34,35,36]. In [34], the authors proposed a secure delivery scheme, in which the security can be achieved if the legitimate user receives enough Fountain packets before the eavesdropper. In [35], a dynamic Fountain-encoded at a transmitter was proposed to enhance the data security. The authors of [36] proposed a FC-based cooperative relay protocol. In [36], the source and the jammer cooperate to remove the interference components in the received signals at the destination. Reference [37] proposed an efficient FCs-based multicast scenario to achieve security for Internet of Things (IoT) systems. In this paper, we propose a FCs based secure communication protocol, where a multi-antenna source selects its best antenna to transmit the encoded packets to a single-antenna destination, in presence of a single-antenna eavesdropper who attempts to overhear the source information. When the destination can receive sufficient encoded packets for decoding the original data, it would send a feedback to the source to terminate the transmission. As a result, to obtain the secure transmission, the destination must receive a sufficient number of the encoded packets before the eavesdropper. Otherwise, the original information is intercepted. The main contributions of this paper can be summarized as follows: To the best of our knowledge, we first propose the FCs based communication protocol using the harvest-to-jam based cooperative jamming technique to reduce the quality of the eavesdropping link. Different with [34,35,36,37], we propose a cooperative jamming technique, where a cooperative jammer node harvests energy from the RF signals of the source and the interference sources to generate noises to the eavesdropper. Different with our previous works [38,39], in the proposed protocol, there exist interference sources in the network that cause co-channel interferences on both the destination and the eavesdropper. Until now, almost published works related to secrecy performance evaluation have assumed that the transceiver hardware of the wireless devices is perfect. However, in practice, it is not perfect due to phase noise, I/Q imbalance (IQI), amplifier non-linearity [40,41,42,43]. In this paper, the joint impact of hardware noises and co-channel interference on the system performances is investigated. For performance evaluation, we derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of the time slots used by the source over Rayleigh fading channel. The closed-form formulas are easy-to-compute, and hence they can be easily used to design and optimize the considered system. In addition, all of the derived expressions are verified by Monte Carlo simulations. The rest of this paper is organized as follows. The system model of the proposed protocols is described in Section 2. In Section 3, we evaluate performance of the proposed scheme. The simulation results are shown in Section 4. Finally, this paper is concluded in Section 5.

2. System Model

Figure 1 illustrates the system model of the proposed protocol, where the source node (S) equipped with M antennas communicates with the single-antenna destination (D), in presence of the single-antenna eavesdropper (E) who attempts to overhear the source data. All of the receivers such as D and E are suffered from co-channel interference caused by K ambient sources (denoted by ). To reduce the quality of the eavesdropping link, the cooperative jamming technique can be used, where the single antenna jammer (J) is employed to continuously generate the artificial noises to E. We assume that the nodes D and J are close with each other so that D can remove the co-channel interference generated by J [38]. Moreover, the jammer (J) uses the energy harvested from the RF signals of the source and the interference sources for transmitting the jamming signals.
Figure 1

System model of the proposed scheme.

The source divides its original data into L packets which are encoded appropriately to create the encoded packets. Then, at each time slot, the source uses the TAS technique to send each encoded packet to the destination. At the same time, the eavesdropper tries to receive the encoded packet. The destination and the eavesdropper are assumed to be able to successfully obtain the original data if they can correctly receive at least H encoded packets, where , and is the decoding overhead which depends on concrete code design. Moreover, after the destination receives sufficient number of the encoded packets, it will send an ACK message to inform the source to stop the data transmission. In this case, if the eavesdropper cannot obtain enough number of the encoded packets, it cannot obtain the source data. Otherwise, the original data of the source will be intercepted. Let us consider the data transmission at an arbitrary time slot. Let , and denote channel coefficients between the antenna of the source and the nodes D, E and J, respectively, where . We also denote and as channel gains of the and links, respectively, where . We assume that all of the link channels are block and flat Rayleigh fading which keeps constant in a time slot but independently changes over time slots. Therefore, the channel gains are exponential random variables (RVs) whose cumulative distribution function (CDF) and probability density function (PDF) are given, respectively as where is a parameter of i.e., and is an expected operator. We can assume that the RVs are independent and identical, i.e., for all m. On the contrary, the RVs are assumed to be independent and non-identical, i.e., as , where . With the TAS technique, the source selects the best transmit antenna to send the encoded packet to the destination, using the following method: where . Moreover, the CDF of can be obtained as where is a binomial coefficient. Let us denote T as a block time of each time slot: a duration of is used for the jammer node to harvest the energy from the source and the interference sources, and the remaining time is spent for the data transmission. Then, the energy harvested by the jammer is expressed as where is an energy conversion efficiency, and are transmit power of the source (S) and the interference sources , respectively. Next, the average transmit power of the jammer used for the data transmission phase can be formulated by where . It is worth noting that the implementation of the TAS method is simpler than that of the MRT method because it only requires the index of the best antenna which can be feed-backed by the destination (not feedback all of the channel state information (CSI) as in MRT). Moreover, the best transmit antenna selection can be performed before the EH phase, and the time used for this process can be ignored as compared with the EH and packet transmission phases. Finally, the source uses the selected antenna during each time slot for both the EH and data transmission purposes due to scheduling issues, e.g., the source uses the remaining antennas to serve other destinations. Let us denote U as the length of each encoded packet. If the source sends the signal to the destination, the received signals at the destination and the eavesdropper can be expressed, respectively as where , and are hardware noises caused by impairments, and are signals transmitted by the nodes J and , respectively, and and are additive white Gaussian noises (AWGNs) at D and E, respectively. The hardware noises and can be modeled as Gaussian RVs with zero-mean and variances of and , respectively, where and is total hardware impairment levels of the and links, respectively. Because the nodes D and J are close with each other so that we can assume that D knows , and via securely exchanging local messages with J. Therefore, D can remove the interference component from the received signal . Once D can perfectly remove the interference, the instantaneous signal-to-interference-plus-noise ratio (SINR) received by the destination under joint impact of co-channel interference and hardware impairments can be formulated as [44] where is variance of additive noises which are assumed to be same at all of the receivers, and . Because the eavesdropper cannot remove the jamming signals, the instantaneous SINR obtained at this node is given as Substituting (5) into (8), we obtain Next, we can give expressions of the data rate for the data and eavesdropping links, respectively by Assume that each encoded packet can be decoded successfully if the achievable data rate is higher than a predetermined target rate (denoted by ). Otherwise, the encoded packet cannot be received correctly. Hence, the probability that the destination cannot receive one encoded packet correctly is formulated as where Note that the probability of the successful decoding for one encoded packet at D is . Similarly, the probability that one encoded packet can be received correctly and incorrectly by the eavesdropper is given, respectively as Considering a delay-constrained system where the maximum number of time slots that can be used for transmitting the encoded packets is limited by . This means that the destination cannot recover the original data if it cannot successfully receive H encoded packets within time slots. Let us denote as the number of time slots used by the source (or the number of the encoded packets sent by the source), and as the number of the encoded packets received by the nodes D and E, respectively, after the source stops its transmission. Then, the outage probability (OP) at the destination is formulated by Next, the probability that the source-destination transmission is successful and secure (SS) is defined as Equation (15) implies that the destination can receive sufficient number of the encoded packets before the eavesdropper when the number of time slots used is less than or equal to . Let us consider the intercept probability (IP) defined as the probability that the eavesdropper can obtain H encoded packets before or at same time with the destination: We note from (16) that when the eavesdropper obtains H encoded packets, it does not need to receive more encoded packets, regardless of whether the source will transmit the encoded packets in the next time slots. Instead, it will start to decode the original data of the source. Finally, we study the average number of the time slots used to transmit encoded packets to the destination, which can be formulated by In (17), is the probability that the number of the encoded packets received at the destination is when the source used time slots (the destination is in outage), and is the probability that D can obtain sufficient number of the encoded packets within t time slots, where (the data transmission is successful). If See the proof and notations in Appendix A. □ If See the proof and notations in Appendix B. □

3. Performance Analysis

3.1. Derivations of and

In case where , Equation (19) reduces to

3.2. Analysis of Outage Probability (OP)

As defined in (14), an exact closed-form expression of OP can be provided as follows: It is noted from (21) that the possible values of are from 0 to , and there are possible cases for each value of .

3.3. Analysis of Successful and Secure Communication (SS)

From (15), we can rewrite SS by In (22), is the probability that the destination can correctly receive H encoded packets when the number of time slots used is u. Since the data transmission between the source and the destination ends in the time slot, is given as Moreover, in (22) presents the probability that the number of encoded packets obtained at the eavesdropper is t. Similar to (21), we have Substituting (23) and (24) into (22), an exact closed-form expression of SS can be given as

3.4. Analysis of Intercept Probability (IP)

The intercept probability (IP) in (16) is given by In (26), is the probability that the eavesdropper can receive sufficient number of the encoded packets in u time slots, which can be calculated similarly to (23) as Next, in (26) is calculated by (23), and in (26) can be obtained by Plugging (23), (26), (27) and (28) together, we obtain

3.5. Analysis of Average Number of Time Slots (TS)

Similarly, the probability and in (17) can be calculated respectively as Substituting (30) into (17), we obtain an exact closed-form formula for the average number of time slots used by the source as

4. Simulation Results

In this section, Monte Carlo simulations are presented to verify the theoretical results. For illustration purpose, in all of the simulations, we fix the required number of the encoded packets by 10 , the energy conversion efficiency by 1 , the total block time by 1 , the number of the interference sources by 3 , the parameters of the interference links by , and , and the parameters of the remaining links by 1 . In the figures, the simulation and theoretical results are denoted by Sim and Theo, respectively. In Figure 2, we present the probability and as a function of in dB. In this figure, the number of antenna equipped by the source is set to 3 , the fraction of time allocated for the EH phase is fixed by 0.3 , the hardware impairment levels are assigned by , and the target rate is set to 0.75 . It can be seen from Figure 2 that and decrease with the increasing of and the decreasing of . However, is much smaller than at medium and high regimes. We also obverse that the simulation and theoretical results are in good agreement, which validates our derivations.
Figure 2

and as a function of in dB when , , and .

Figure 3 presents outage performance of the proposed protocol as a function of in dB with dB, , , and . It is shown in Figure 3 that the impact of the co-channel interference on the performance is negative, i.e., the value of OP is very high at low regimes. In particularly, when the value of is lower than that of , OP is almost equal to 1. We can also observe that the outage performance is better with high value of because the source has more time slots to transmit the encoded packets to the destination.
Figure 3

OP as a function of in dB when dB, , , and .

In Figure 4, we present the value of SS as a function of in dB when dB , , , , and . We can see that the proposed protocol obtains higher value of SS when more antennas are equipped at the source. It is also seen that when , the SS performance is significantly degraded because no transmit diversity gain is obtained. Moreover, SS also increases as increasing . It is due to the fact that at high values, the destination almost obtains sufficient number of the encoded packets before the eavesdropper. However, it can be seen from Figure 4 that when the value of is very high, the value of SS slightly decreases due to high overhearing possibility of the eavesdropper. Moreover, the SS performance in all values of is almost same at high regimes.
Figure 4

SS as a function of in dB when dB, , , , and .

In Figure 5, the value of SS is presented as a function of when dB, , , and . As we can see, the performance significantly degrades with high hardware impairment levels of the data links, i.e., is high. Moreover, we can observe from that the fraction of time allocated for the EH phase impacts on the value of SS. It can be seen that there exists an optimal value of at which the value of SS is highest.
Figure 5

SS as a function of when dB, , , and .

In Figure 6, the intercept probability of the proposed protocol is presented as a function of M when dB, , , and . As we can see, the value of IP decreases when more antennas are equipped at the source. Also, IP is lower when the hardware impairment level of the eavesdropping links is high.
Figure 6

IP as a function of M when dB, , , and .

Figure 7 investigates impact of on the intercept probability as dB, , , and . It can be seen that the value of IP is higher when the number of increases. However, when the number of is high enough, IP converges to a constant. As expected, IP is lower when more time used for the EH phase (because the transmit power of the jammer is higher).
Figure 7

IP as a function of when dB, , and .

Figure 8 presents OP and IP as a function of when dB, , and . We can see that there exists a trade-off between OP and IP. Indeed, OP increases when increasing the value of , while IP decreases with higher value of . We can also see that when , OP is below when the value of is higher than (about) 0.15, but the intercept probability is higher than . In addition, OP significantly decreases as decreasing the value of .
Figure 8

OP and IP as a function of when dB, , and .

Figure 9 shows the trade-off between OP and IP when dB, , and . As we can observe, when the cooperative jamming technique is not used , the OP value is lower but the IP one is higher. Similarly, to increase the reliability of the data transmission, we can increase the number of . However, the intercept possibility of the eavesdropper also increases with higher value of .
Figure 9

OP and IP as a function of when dB, , and .

In Figure 10, we present average number of the time slots as a function of in dB when dB, , , and . We see that the number of time slots used decreases when increasing the number of antennas and the transmit power of the source. It is also seen that as the source has a single antenna (), the average number of time slots is much higher. Moreover, reducing the number of time slots means reducing the delay time and transmit power, which are an important metric of wireless communication systems.
Figure 10

Average number of time slots as a function of in dB when dB, , , and .

From Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10, it is worth noting that the theoretical results and simulation results are in good agreement which validates the theoretical derivations.

5. Conclusions

In this paper, we proposed an FC-based MISO scheme using the TAS and EH-based cooperative jamming techniques for the secure communication under the joint impact of hardware impairments and co-channel interference. The performance of the proposed scheme such as outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of the time slots was evaluated via both simulation and theory. The results presented that the hardware impairment levels, the co-channel interference, the fraction of time allocated for the EH phase and the number of transmit antennas at the source significantly impact on the system performance. Moreover, there exists a trade-off between the security and reliability, i.e., between OP and IP. Finally, the fraction of time allocated for the EH phase should be designed appropriately to optimize system performance.
  2 in total

1.  Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks.

Authors:  Jong-Ho Lee; Illsoo Sohn; Yong-Hwa Kim
Journal:  Sensors (Basel)       Date:  2016-10-17       Impact factor: 3.576

2.  Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection.

Authors:  Phu Tran Tin; Pham Minh Nam; Tran Trung Duy; Phuong T Tran; Miroslav Voznak
Journal:  Sensors (Basel)       Date:  2019-03-07       Impact factor: 3.576

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.