1. Introduction
Physical-layer security approaches can enhance the security of wireless sensor networks (WSNs) against eavesdroppers by exploiting the physical characteristics of wireless channels, such as noise and multipath fading [
1]. The secrecy capacity is the maximum rate of secret information that can be sent from the source to the destination in the presence of eavesdroppers. The cooperative relaying strategy has recently been used as a practical technology to provide transmission secrecy [
2,
3,
4,
5], to break through the limitation on the channel conditions that the main channel (from the source to the destination) must be better than the eavesdropper channel (from the source to the eavesdropper). Many kinds of approaches have been proposed to enhance the physical-layer security under cooperative communication framework conditions, such as amplify-and-forward (AF) [
6,
7], decode-and-forward (DF) [
8], compress-and-forward (CF) [
8], noise-forwarding (NF) [
9], etc.
In the past few years, radio frequency (RF) energy harvesting (EH) has becomes a research hotspot in wireless communications, especially in applications where the battery-limited devices are difficult to replace or recharge [
10]. Simultaneous wireless information and power transfer (SWIPT) [
11,
12,
13] was proposed to improve the energy utilization efficiency of wireless networks. Under this scheme, the nodes in wireless networks can be energy self-sufficient by harvesting RF signals from the surrounding environment.
Cooperative communication is exploited for its capability to further improve the efficiency of SWIPT systems [
14]. As the RF signals can carry information and energy concurrently, thereby in such wireless networks, the cooperative relays are able to harvest energy and process information simultaneously [
11]. There are two kinds of relaying protocols: power splitting relaying (PSR) protocols and time switching relaying (TSR) protocols [
11,
15,
16,
17]. In a PSR protocol, the received signals are divided by a power-splitting ratio to operate EH and information processing (AF or DF), and the EH and information processing are performed simultaneously [
10,
11,
15,
16], while, in a TSR protocol, the EH is performed first, and the information processing is performed in the remainder of the total transmission period [
10,
11,
15,
17,
18]. Comparison studies between PSR and TSR are conducted in [
10,
15], and the PSR approach is proved to be better than the TSR in EH-based multi-antenna AF relaying networks. Especially in [
15], an eavesdropper is considered in the network, and the destination transmits noise information to interrupt the eavesdropper. In [
16], the EH-AF and EH-DF schemes with a single EH relay and single eavesdropper are compared based on TSR protocol, concluding that the EH-DF protocol outperforms the EH-AF protocol in terms of secrecy capacity. In [
18], the authors consider an underlay cognitive radio network (CRN) with a pair of primary nodes, a couple of secondary nodes, and one eavesdropper. The EH is performed on the secondary transmitter. Experimental results show that the EH nodes could improve both energy efficiency and spectral efficiency.
Compressed sensing (CS) technology has recently become an effective solution to improve the physical layer security in cooperative wireless networks. CS could represent the compressible signals at a rate below the Nyquist rate, and the information could be retrieved from a small number of linear measurements [
19,
20,
21]. The application of CS in the field of information-theoretic secrecy has attracted researchers’ attention and a series of studies have been conducted. In [
22,
23], the authors consider the scenario of one source node, one receiver and one eavesdropper (i.e., a point-to-point scheme). In [
22], the measurement matrix is treated as an encryption key which is unknown to the eavesdroppers. It can provide computational secrecy with unbounded eavesdropper computation capability. In [
23], perfect secrecy is achievable under the condition that the number of source messages goes to infinity. Different from these methods, the authors in [
24] considered the situation of keyless physical-layer security, and indicated that the eavesdropper could not decode the information successfully in terms of the Wolfowitz secrecy. In [
25], the CS matrix is used to encode the messages. If the wire-tap channels are strictly worse than the main channels, the eavesdroppers can learn almost nothing, thereby, in this situation, it is unnecessary for us to know the channel state information (CSI) of eavesdroppers.
However, the transmitting methods with CS in point-to-point communication scenarios cannot be directly applied to WSNs, because WSNs possess the property of decentralization [
26]. The CS-AF scheme was first proposed and applied in wireless networks in [
27], and the channel capacity of the CS-AF scheme was investigated in [
28]. It is a novel approach in that the channel matrix from sources to relays is the compressive matrix in CS technology, and thus can help to achieve security. It has been proved that the recovery probability of the eavesdroppers under a CS-AF scheme can be arbitrarily small. No more researches considering the channel matrixes as the compressed matrix have been found, and the study of EH in this kind of networks is still a new area.
In this paper, we study the secrecy capacity of the CCS-AF wireless network based on the EH protocol. In this model, the sources send their information to the relays simultaneously, and the relays harvest energy from the radio-frequency signals of sources based on the PSR protocol. Through this protocol, the energy harvested is used by the cooperative relays to amplify and forward the received information to the destination. A group of simulation experiments is conducted to analyze the impacts of some key parameters (such as power splitting ratio, EH efficiency, relay location, and the number of relays) on the system secrecy capacity. Simulation results reveal that under certain conditions, the EH relaying scheme in this paper can achieve higher secrecy capacity than traditional relaying strategies while costing the same or even less power.
The rest of this paper is organized as follows: in
Section 2, the CCS-AF model is proposed and introduced in detail. Then a brief introduction of PSR protocol is presented in
Section 3. Simulations with analysis are presented in
Section 4. Finally, conclusions are drawn in
Section 5.
2. System Model
Figure 1 shows the communication network of CCS-AF with eavesdroppers and the scheme of the PSR protocol. This network contains
source nodes
,
relays
,
eavesdroppers
and one destination (
). In the first time slot, the sources transmit their information to the relays simultaneously with a fixed transmission power
, thereby, the power shared by each source node is
. In the second time slot, the relays harvest energy from the RF signals to amplify and forward (AF) the information received to the destination. The channel state information (CSI) is known to all legitimate users.
The channels in the CCS-AF network are represented as follows. We denote the matrix as the source-to-relay channel matrix; the vector is the relay-to-destination channel vector; the matrix is the source-to-eavesdropper channel matrix. The distances from the sources to relays, from relays to the destination and from sources to eavesdroppers are denoted by , , and , respectively.
To measure the security level of the communication network, the secrecy capacity is usually defined as the maximum difference between the mutual information of the main channels and eavesdropper channels [
21], and could be formulated as Equation (1):
in which
is the secrecy capacity,
is the input signal at sources,
and
are output signals at destination and eavesdroppers, respectively.
is the mutual information of the sources and destination;
is the mutual information of the sources and eavesdroppers;
is the capacity for the transmission between sources and destination; and
is the capacity at eavesdropper.
CCS-AF Scheme
In the first time slot, denote
as the original signals to be transmitted by the source nodes. The power constraints of the sources and relays are
and
, respectively. The channel fading between sources and relays is
, where
. This is incoherent with the identity matrix and satisfies the restricted isometry property (RIP) with a high probability as long as
[
15], where
is the number of relays,
is a small constant,
is the sparsity,
is the number of sources.
is the
transmission matrix of the source-to-relay channels, the matrix
represents the path loss the channels. The element
indicates the path loss from the
th source node to the
th relay and can be calculated as
, where
is the distance between the
and
, and
is the path loss component. The signals received by the relays is represented by
, where
is an additive white Gaussian noise (AWGN) vector with variance
.
In the second time slot, the selected relays cooperate to amplify and forward the received signals to the destination.
indicates the channel between relays and the destination, then
is the transmission matrix between relays and destination, and
is the path loss of the relay-to-destination channels. Therefore, the signal received at the destination could be represented by Equation (2):
where
is a diagonal matrix, the entry
in
denotes the amplification coefficient of the
th relay. The noise between relays and destination is
, which is a AWGN vector with variance
.
Let , then Equation (2) can be rewritten as . As the channel matrix satisfies the RIP property and is a diagonal matrix, therefore, satisfies the requirements of the RIP property and can be used as the secure measurement matrix to encrypt the transmitted information. The channel matrix from sources to the destination is the compressive matrix in CS theory, and also it is the measurement matrix.
The destination recovers the source signals
from
by solving the convex optimization problem:
where
is the upper bound of the noise magnitude and
are the signals reconstructed at the destination.
3. Power Splitting Relaying Protocol
In the power splitting relaying protocol, the total transmission time
from sources to the destination is divided into two equal parts, i.e.,
. During the first slot, the relays harvest energy and process information simultaneously. The RF power
received at each relay is divided by the power splitting ratio
(
), which means
is allocated for EH and
is used for information processing. In the second slot, the relays amplify and forward the received signal to the destination using the harvested energy. The channel matrix between the sources and relays is:
where
,
, and
(
) indicates the channel between
and
.
In the first slot, denoting the signals received by the EH receiver as
, then it can be expressed as Equation (5):
The energy harvested by the EH receiver is as follows:
Thereby, the power of the harvested energy at
could be obtained and shown in Equation (7):
Denoting he signals at the information receiver as
, then it can be computed as Equation (8).
Now, the signals received at the eavesdroppers in the first slot can be written as:
In the second slot, the signal transmitted by the relays is
, where
is a diagonal matrix. The diagonal elements in
can be represented as Equation (10):
where
is the amplification coefficient of the
th relay. The noise between relays and destination is
, which is a AWGN vector with variance
.Thereby, the signal received at the destination can be formulated as:
The secrecy capacity is the difference between the capacity of main channels and the eavesdropper channels, and could be calculated as the sum of the reliable information received by the destination. In order to obtain the channel capacity, we transform the
channel matrix
to a
parallel channel vector by using singular value decomposition (SVD) approach [
16]. Let
, then we get
, where
is a diagonal matrix,
and
V are both unitary matrixes, and
is the conjugate transpose of
V. Let
,
,
, then the information received by relays is equivalent to
. Thereby, Equation (11) can be rewritten as:
According to the property of the unitary matrix,
and
V won’t change the power of
,
,
, which means
,
,
. Thereby, the power matrixes of the received information and signal noise at the destination can be easily obtained after SVD, and could be formulated as Equations (13) and (14):
where
indicates the
th parallel Gaussian channel,
is the
th diagonal entry of
.
Then the channel capacity
of the main channel could be computed by Equation (5):
in which,
and
are the noise powers of two time slots.
The signal received by eavesdropper
could be expressed as:
where
is the channel matrix between the sources and
,
is the noise at
. The power of the signals and noise received by
is
and
, respectively.
The channel capacity of the eavesdropper channel (from
to
) is:
where
is the path loss between
and
. The security loss caused by the eavesdroppers is as follows:
where
, and
(
) indicates the capacity of the channel from
to
. Thereby, the secrecy capacity of the CCS-AF network can be obtained by Equation (1) and represented as
.
Our scheme can achieve perfect secrecy under the condition of bounded computation capability of eavesdroppers.
4. Simulations and Analysis
In this section, we consider a CCS-AF wireless network with 15 sources, four relays, two eavesdroppers and one destination. The parameters are set as follows: the path loss of the channels is
; the noises are assumed to be Gaussian with variances
. In order to simplify the simulation and study the impact of the relays’ position on the system secrecy capacity, a simple model is shown in
Figure 2, where all nodes are set on a straight line. All the source nodes are considered to be located at the same position, thereby the effect on the secrecy capacity caused by the distances among the source nodes is ignored. The relays and eavesdroppers are treated in the same way. The distance between sources and destination are normalized to a unit value, thereby, the coordinates of the source nodes, relays, eavesdroppers, and destination are (0, 0), (
, 0), (
, 0) and (1, 0), respectively.
In the first simulation, we study how the secrecy capacity changes with
. The power splitting ratio
is 0.5, the energy conversion efficiency
is 1, and
varies from 0 to 1. Three conditions that the
is
W,
W and
W, are considered, respectively.
Figure 3 shows the simulation results. The secrecy capacity under each
decreases monotonously and approaches to 0 with the increase of
. This could be explained that when
increases, the EH power and information received by relays decrease rapidly, which obeys Equations (6) and (8). The reason for why does the network achieves the higher secrecy capacity when
W than the other two conditions will be analyzed in the fourth simulation.
In the second simulation, we study how the secrecy capacity changes with the power-splitting ratio
under several conditions of
. The sources’ power is
,
, and
is set to 0.3, 0.5 and 0.8, respectively. The secrecy rates of the networks are calculated and plotted in
Figure 4. On the one hand, for each situation of
, the system secrecy capacity with
increases first and then decreases, and achieves the highest at a certain point.
This is because when is small, the relays get little power for energy harvesting, which makes the transmission power at relays un-enough and results in lower secrecy capacity. In contrary, when is too large, the power for the information transmission will be too little and much harvested power will be wasted. This could well explain that the secrecy capacity achieves the highest when takes a moderate value. The reason for why the model with smaller could get higher secrecy rate has been explained in the first simulation.
In the third simulation, we study the change of the secrecy capacity with the energy conversion efficiency
.
varies from 0 to 1,
is set to 0.5, and the other parameters are set the same as the first simulation. The simulation results are shown in
Figure 5. It is obvious that for each
, the secrecy capacity of the EH-AF protocol increases with
, and approaches to a constant when
is high enough. This is easy to explain, higher energy conversion efficiency means higher energy could be obtained without improving the power splitting ratio. Thereby more energy can be obtained to transmit the received information to the destination. We can also see that the secrecy rates increase slowly with
when
is higher than 0.7, 0.5 and 0.1 under the conditions that
is 0.3, 0.5 and 0.8, respectively. This phenomenon has an important instructive meaning in engineering, as it means we do not have to seek EH devices with high
with an unnecessarily high economic cost.
The effect of relay number on the system secrecy capacity is studied in the fourth simulation, and three scenarios are considered, where
is set to
,
, and
, respectively.
,
,
, and the relay number varies from 3 to 13. The simulation result is shown in
Figure 6. It could be seen that when
is large enough, the model that contains more relays will presents a significant advantage. As shown in
Figure 6, when the relay number
, the higher
is, the higher secrecy capacity will be obtained. This is because the number of eavesdroppers is fixed, though higher
will improve the channel capacity of eavesdroppers, but the increased relays will obtain more secrecy capacity for the main channels under enough energy. Thereby higher secrecy capacity could be obtained. It could be seen in
Figure 6 that when the relay number
, the network achieves the highest secrecy capacity when
, which could explain why the network achieves the highest secrecy rate when
in the first simulation.
In the last simulation, we study the change of secrecy capacity with
. To test the efficiency of the PSR protocol sufficiently, the AF protocols in [
28] is taken as a comparison. In both approaches, the
varies from
to
, and the simulation is operated under three conditions where
is 0.3, 0.5, and 0.8, respectively. The total power in the AF protocol is
, and the energy conversion efficiency in PSR protocol is
.
Figure 7 presents the simulation results. Under each circumstance of
, the secrecy capacity of PSR increases with
and approaches to a constant. As we can see, when
, the PSR protocol in this paper always outperforms the AF protocol. When
and 0.8, the PSR protocol performs the better only when
is higher than
and
, respectively. Though the PSR protocol is not so good as the AF protocol in some stages when
is 0.5 and 0.8, the inferiority is very small. This means the PSR protocol proposed in this paper could get a similar or much higher secrecy capacity by consuming less power than AF, though this advantage will be weakened with the increase of
.