Next Article in Journal
Erratum: Luan, E.X.; Shoman, H.; Ratner, D.M.; Cheung, K.C.; Chrostowski, L. Silicon Photonic Biosensors Using Label-Free Detection. Sensors 2018, 18, 3519
Previous Article in Journal
Spatiotemporal Rule of Heat Transfer on a Soil/Finned Tube Interface
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection

1
VSB, Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava, Poruba, Czech Republic
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Ho Chi Minh City 700000, Vietnam
3
Faculty of Electrical and Electronics Engineering, HCMC University of Technology and Education, Ho Chi Minh City 700000, Vietnam
4
Department of Telecommunications, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, Vietnam
5
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(5), 1160; https://doi.org/10.3390/s19051160
Submission received: 11 February 2019 / Revised: 20 February 2019 / Accepted: 4 March 2019 / Published: 7 March 2019
(This article belongs to the Section Sensor Networks)

Abstract

:
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.

1. Introduction

Security is one of the important issues in wireless sensor networks (WSNs) due to the broadcast nature of wireless medium. Conventionally, encryption/decryption algorithms that generate public/private keys are used to guarantee security [1,2]. Recently, a security framework for the physical layer, called the wiretap channel or physical-layer security (PLS) [3,4,5,6,7], has been introduced as a potential solution. In PLS, the difference between the channel capacity of the data link and the channel capacity of the eavesdropping link, named secrecy capacity, is commonly used to evaluate secrecy performance such as average secrecy capacity (ASC), secrecy outage probability (SOP), and probability of non-zero secrecy capacity (PNSC). Hence, to enhance the secrecy performance, the quality of the data and eavesdropping links should be increased and decreased, respectively. To enhance the channel capacity of the data links, diversity transmit and receive methods [8,9,10] can be used. In [8], the transmit antenna selection (TAS) technique is employed at a multi-antenna base station (BS) to maximize the instantaneous signal-to-noise ratios (SNRs) obtained between BS and intended users. References [9,10] considered MIMO secure communication systems, where the transmitter uses the TAS technique, while the legitimate receiver and eavesdropper can use selection combining (SC) or maximal ratio combining (MRC) for reception. In [11,12,13,14,15], cooperative relaying strategies were proposed to improve secrecy performance via increasing the channel capacity for the data links. Moreover, to avoid the eavesdropper combining the data with MRC, a randomize-and-forward (RF) strategy [16] can be employed, where the source and relays generate different code-books to confuse the eavesdropper. For significantly degrading the eavesdropping channels, cooperative jamming (CJ) methods were reported in [17,18,19]. The basic idea of the CJ method is that jammer nodes are employed to generate artificial noises on the eavesdropper. In addition, the legitimate receivers have to cooperate with the jammers to remove the interference appeared in their received signals. However, the implementation of this technique can be a difficult work due to the requirement of high synchronization between the nodes.
Recently, wireless energy harvesting (EH) [20,21] has emerged as a potential solution to prolong the lifetime of WSNs. In wireless EH, the energy-constrained devices can harvest energy from radio frequency signals generated by ambient nodes. In [21], EH amplify-and-forward (AF) relaying protocols were proposed and analyzed, where the relay node harvests energy from the source for transmitting the source data to the destination. The authors of [22] considered both AF and decode-and-forward (DF) relaying schemes employed a hybrid power splitting (PS) and time switching (TS) EH relay. In [23,24,25], power beacons (PBs) are deployed in the networks to charge energy for wireless devices. The PB-aided wireless power transfer models are suitable for large-scale WSNs or wireless ad-hoc networks. Moreover, to avoid causing the co-channel interference to the receivers, channels used for harvesting energy from the wireless signals of PBs are different from those used for the data transmission. In [23,24,25], the authors studied the performance of secondary networks in PB-assisted underlay cognitive radio (PB-UCR), where the transmit power of secondary users was limited by both the harvested energy and the maximum interference levels required by primary users. In [26], a secure communication scenario in cognitive sensor radio networks with an EH eavesdropper was introduced. Reference [27] proposed various path-selection protocols in multi-path multi-hop relaying networks in the presence of active eavesdroppers. Moreover, in [27], all of the terminals whose transceiver hardware is low-cost suffered from hardware imperfection due to phase noise, I/Q imbalance (IQI), amplifier nonlinearities, etc. [28,29,30].
This paper deals with multi-hop secure communication networks in PB-UCR under impact of hardware impairments. In [31], the authors first evaluated the secrecy capacity in the presence of IQI for OFDMA communication systems. Reference [32] proposed a secure massive MIMO system with a passive multiple-antenna eavesdropper and hardware noises. The results in [31,32] showed that the hardware impairments significantly impact of the secrecy performance. Next, unlike [27], our scheme considers the PB-URC networks using the MIMO-based TAS/SC relaying technique. In [33,34,35], cooperative multi-hop full-duplex relaying networks were proposed to enhance the end-to-end secrecy performance. However, it is too difficult to apply these schemes into WSNs due to the complexity of full-duplex operation. References [36,37,38] introduced simple multi-hop secure relaying scenarios in which all of the nodes are equipped with a single antenna. In [39], PLS in downlink MIMO multi-hop heterogeneous cellular networks were investigated. In particular, the data transmission between base stations and mobile users is realized via direct or multi-hop mode. In [40], a multi-hop multicasting secure transmission protocol with multi-antenna DF relays in the presence of multiple eavesdroppers was proposed and analyzed. However, in [36,37,38,39,40], the authors did not consider the cognitive environment as well as the wireless EH technique.
To the best of our knowledge, there is no published work related to multi-hop secure transmission in PB-UCR under the impact of hardware noises. In the proposed protocol, a secondary source transmits its data to a secondary destination using the multi-hop mode in the presence of a secondary eavesdropper. To support the reliable communication at each hop, the TAS/SC technique is used to forward the source data. Operating on the underlay spectrum sharing method, the transmit power of the secondary source and relay nodes must be adjusted to satisfy the required QoS of the primary network. Moreover, the secondary transmitters have to harvest energy from PB deployed in the secondary network for the data transmission. The main contribution of this paper can be summarized as follows:
  • We propose a simple multi-hop MIMO relaying protocol using the TAS/SC technique for PB-UCR WSNs. The proposed protocol can obtain energy efficiency and spectrum usage efficiency, enhance the reliability of data transmission, and improve the secrecy performance.
  • In almost published works related to EH and UCR (see [23,24,25]), the transmitters adjust their transmit power following the instantaneous channel state information. As a result, the transmit power is a random variable (RV), which is not feasible. In this paper, the secondary source and relay nodes are assumed to transmit the source data at fixed transmit power levels. In addition, we derive an exact closed-form expression of the average transmit power of the secondary transmitters under the joint impacts of the energy harvested, the interference constraint, and the maximum transmit power level.
  • We investigate the impact of hardware impairments on the end-to-end SOP and PNSC of the proposed scheme. Indeed, the obtained results presented that the hardware imperfection has a significant impact on the secrecy performance. Moreover, the analytical results showed that different values of the hardware impairment levels of the data and eavesdropping links lead to different secrecy performance trend. Finally, it is worth noting that the proposed scheme is a generalized case of the existing schemes in which the transceiver hardware is assumed to be perfect [11,41,42,43].
  • We derive new exact and asymptotic expressions of the end-to-end SOP and PNSC over Rayleigh fading channels, which are then verified by Monte Carlo simulations.
The rest of this paper is organized as follows. The system model of the considered protocol is described in Section 2. In Section 3, the expressions of SOP are derived. The simulation results are shown in Section 4. Finally, this paper is concluded in Section 5.

2. System Model

Figure 1 illustrates the system model of the proposed scheme, in which a secondary source T 0 wants to transmit its data to a destination T K via K 1 intermediate nodes denoted by T 1 , T 2 , …, T K 1 . The data transmission between T 0 and T K is realized via K orthogonal time slots, exploiting the TAS/SC technique. In particular, at the k + 1 -th hop, the node T k selects an antenna to transmit the source data to the node T k + 1 , which uses the SC technique to combine the signals received from T k , where k = 0 , 1 , , K . We assume that all of the nodes including the source, the destination and the relays are equipped with N D antennas. The transmitter T k has to harvest energy from wireless signals of a single-antenna power beacon (PB) deployed in the secondary network. Moreover, T k must adjust the transmit power to satisfy a maximal interference threshold ( I th ) required by a single-antenna primary user (PU). Also in the secondary network, there exists an N E -antenna eavesdropper (E) who uses the SC technique to decode the source data obtained at each hop. Similar to [16], the secondary transmitters randomly generate code-book to confuse the eavesdropper.
Comment 1: Due to the size limitation and complexity constraint, it is assumed that all of the receivers can only use the SC combiner for decoding the data. In addition, the secrecy performance of the proposed protocol is same with that of the corresponding one with multiple non-colluding single-antenna eavesdroppers [44,45]. Finally, in the case where the eavesdropper can employ the MRC technique, the expressions derived in this paper can be used as bound expressions of the secrecy performance.
Let us denote γ X , Y as the channel gain of the link, where X , Y T k , E , PB , PU . Assume that all of the channels are Rayleigh fading; hence the channel gain γ X , Y is an exponential RV. The cumulative distribution function (CDF) and probability density function (PDF) of γ X , Y can be expressed, respectively, as
F γ X , Y u = 1 exp λ X , Y u , f γ X , Y u = λ X , Y exp λ X , Y u ,
where λ X , Y is parameter of the exponential RV γ X , Y , i.e., λ X , Y = 1 / E γ X , Y = 1 / V a r γ X , Y , where E is expected operator and V a r X is variance of X. To take path-loss into account, we can model λ X , Y as λ X , Y = d X , Y β [46], where d X , Y is the distance between X and Y, and β is the path-loss exponent.
We denote γ T k , m , Y as the channel gain between the m-th antenna of T k and Y, where m = 1 , 2 , , N D . Assume that RVs γ T k , m , Y are independent and identical, i.e., λ T k , m , Y = λ T k , Y for all m. Also, let γ X , T k + 1 , n and γ X , E p as channel gain between X and the n-th antenna of T k + 1 , and that between X and the p-th antenna of E, respectively, where n = 1 , 2 , , N D and p = 1 , 2 , , N E . Similarly, γ X , T k + 1 , n and γ X , E p are independent and identically distributed (i.i.d.) RVs, i.e., λ X , T k + 1 , n = λ X , T k + 1 and λ X , E p = λ X , E for all n and p.
Let T denote the total transmission time between T 0 and T K , and hence the time allocated for each time slot is given as τ = T / K . Considering the k + 1 -th hop; a duration of ε τ is used for T k to harvest energy, and the remaining duration, i.e., 1 ε τ , is spent for the data transmission between T k and T k + 1 , where 0 ε 1 . Then, the amount of energy that T K can harvest is given by
E H k = η ε τ P B v = 1 N D γ PB , T k , v ,
where η 0 η 1 is energy conversion efficiency, and P B is transmit power of PB.
From (2), we can formulate the transmit power that T k can use in the data transmission phase by
Q EH , k = E H k 1 ε τ = χ P B φ sum , k ,
where χ = η ε / 1 ε and φ sum , k = v = 1 N D γ PB , T k , v . Using (Equation (A.7) [25]), we can write the CDF of φ sum , k as
F φ sum , k z = 1 t = 0 N D 1 1 t ! λ PB , T k z t exp λ PB , T k z .
Considering the data transmission between the transmitter A and the receiver B; under the impact of the hardware impairments, the instantaneous SNR received at B can be expressed as in [30,33,34,47,48]:
Ψ A , B = P A γ A , B κ A 2 + κ B 2 P A γ A , B + σ 2 = P A γ A , B κ A , B 2 P A γ A , B + σ 2 ,
where A , B T , E , PB , PU , P A is transmit power of the transmitter A, γ A , B is channel gain between A and B, σ 2 is the variance of additive white Gaussian noise (AWGN), κ A 2 and κ B 2 are constants characterizing the level of the hardware impairments at A and B, respectively, and κ A , B 2 = κ A 2 + κ B 2 is the total hardware impairment level. The values of κ A 2 , κ B 2 , κ A , B 2 , which depend on the structure of the transceiver hardware at A and B, can be determined by practical experiments.
Moreover, in the URC network, if T k uses the m-th antenna to transmit the data, the transmit power must satisfy the interference constraint required by PU as in [25,49]:
Q IN , k , m = I th 1 + κ P 2 γ T k , m , PU ,
where κ P 2 is total hardware impairment level at T k and PU (see [25,49]).
Let P S denote the maximum transmit power of each antenna; by combining (3) and (6), the transmit power of the m-th antenna at T k can be formulated by
P k , m = min Q EH , k , Q IN , k , m , P S = P S min μ 1 φ sum , k , μ 2 γ T k , m , PU , 1 = P S min μ 1 φ sum , k , μ 2 γ T k , m , PU , if min μ 1 φ sum , k , μ 2 γ T k , m , PU < 1 P S , if min μ 1 φ sum , k , μ 2 γ T k , m , PU 1
where
μ 1 = χ P B P S , μ 2 = I th 1 + κ P 2 P S .
We can observe from (7) that when min μ 1 φ sum , k , μ 2 / γ T k , m , PU < 1 , then P k , m = P S min μ 1 φ sum , k , μ 2 / γ T k , m , PU is a RV, which is not feasible (although this assumption was widely used in many published literature, e.g., [23,24,25] and references therein). In practice, the transmit power P k , m should be fixed at pre-determined levels. Indeed, assume that there are W + 1 fixed levels denoted by L v v = 0 , 1 , , W with L v = v P S / W . For example, L 0 = 0 is the lowest level, and L W = P S is the highest one. Now, by combining with (7), we can write the expression of P k , m as
P k , m = 0 , if P S min μ 1 φ sum , k , μ 2 γ T k , m , PU < L 1 L v , if v < W , L v P S min μ 1 φ sum , k , μ 2 γ T k , m , PU < L v + 1 L W , if L W P S min μ 1 φ sum , k , μ 2 γ T k , m , PU
Now, we consider the data transmission between T k and T k + 1 . Employing the TAS/SC technique, the transmit antenna at T k and the receive antenna at T k + 1 are selected by the following strategy (see [9]):
γ T k , b , T k + 1 , c = max m = 1 , 2 , , N D max n = 1 , 2 , , N D γ T k , m , T k + 1 , n ,
where b and c are the selected antennas at T k and T k + 1 , respectively, b 1 , 2 , , N D and c 1 , 2 , , N D . Since γ T k , m , T k + 1 , n are i.i.d. RVs, CDF of γ T k , b , T k + 1 , c can be obtained by
F γ T k , b , T k + 1 , c x = m = 1 N D n = 1 N D F γ T k , m , T k + 1 , n x = 1 exp λ T k , T k + 1 x N D 2 = 1 + v = 1 N D 2 1 v N D 2 v exp v λ T k , T k + 1 x .
With the presence of hardware impairments, the channel capacity of the T k T k + 1 link is calculated as
C D , k = 1 ε τ log 2 1 + P k , b γ T k , b , T k + 1 , c κ D 2 P k , b γ T k , b , T k + 1 , c + σ 2 ,
where κ D 2 is the total hardware impairment level at T k and T k + 1 , which is assumed to be the same for all values of k.
Let us consider the eavesdropping link at the k + 1 -th hop; the channel capacity of the T k E link can be obtained by
C E , k = 1 ε τ log 2 1 + P k , b γ T k , b , E g κ E 2 P k , b γ T k , b , E g + σ 2 ,
where κ E 2 is the total hardware impairment level at T k and E. In addition, since E uses the SC combiner, the channel gain γ T k , b , E g can be written as
γ T k , b , E g = max p = 1 , 2 , , N E γ T k , b , E p ,
where g 1 , 2 , , N E . In addition, CDF of γ T k , b , E g can be expressed by
F γ T k , b , E g x = p = 1 N E F γ T k , b , E p x = 1 exp λ T k , E x N E .
From (14), we obtain PDF of γ T k , b , E g as
f γ T k , b , E g x = N E λ T k , E exp λ T k , E x 1 exp λ T k , E x N E 1 = u = 0 N E 1 1 u N E 1 u N E λ T k , E exp u + 1 λ T k , E x .
Next, from (11) and (12), the secrecy capacity at the k + 1 -th hop is obtained by
C Sec , k = max 0 , C D , k C E , k = max 0 , 1 α τ log 2 1 + P k , b γ T k , b , T k + 1 , c κ D 2 P k , b γ T k , b , T k + 1 , c + σ 2 log 2 1 + P k , b γ T k , b , E g κ E 2 P k , b γ T k , b , E g + σ 2 .
With the random-and-forward strategy, the end-to-end secrecy capacity of the proposed protocol is given as in [37]:
C Sec e 2 e = min k = 1 , 2 , , K C Sec , k .

3. Performance Analysis

In this section, we analyze the average transmit power of the secondary transmitters and the secrecy performance of the proposed protocol in terms of SOP and PNSC.

3.1. Average Transmit Power of the Secondary Transmitters

From (8), the average transmit power of T k can be given by the following formula:
E P k , b = v = 1 W 1 Pr v W min μ 1 φ sum , k , μ 2 γ T k , b , PU < v + 1 W v W P S + Pr 1 min μ 1 φ sum , k , μ 2 γ T k , b , PU P S ,
where E . is an expectation operator. To calculate E P k , b , we attempt to find CDF of min μ 1 φ sum , k , μ 2 / γ T k , b , PU . Setting Z min , k = min μ 1 φ sum , k , μ 2 / γ T k , b , PU , the CDF of Z min , k is obtained by
F Z min , k z = 1 1 F φ sum , k z μ 1 F γ T k , b , PU μ 2 z .
Substituting F γ T k , b , PU x = 1 exp λ T k , PU x and (4) into (19) yields
F Z min , k z = 1 t = 0 N D 1 1 t ! λ PB , T k z μ 1 t exp λ PB , T k z μ 1 1 exp λ T k , PU μ 2 z .
Therefore, the average transmit power of T k is written by
E P k , b = v = 1 W 1 F Z min , k v + 1 W F Z min , k v W v W P S + 1 F Z min , k 1 P S .

3.2. Secrecy Outage Probability (SOP)

The end-to-end SOP of the proposed protocol can be calculated by
SOP = Pr ( C Sec e 2 e < C th ) = Pr min k = 1 , 2 , , K C Sec , k < C th = 1 k = 1 K 1 Pr C Sec , k < C th = 1 k = 1 K 1 SO P k ,
where C th C th > 0 is a predetermined outage threshold, and SO P k = Pr C Sec , k < C th is the secrecy outage probability at the k-th hop. Using (8) and (16), we can formulate SO P k by
SO P k = v = 1 W Pr P k , b = L v × Pr 1 + L v γ T k , b , T k + 1 , c κ D 2 L v γ T k , b , T k + 1 , c + σ 2 1 + L v γ T k , b , E g κ E 2 L v γ T k , b , E g + σ 2 < ρ SO P k L v ,
where ρ = 2 C th / 1 ε τ .
It is noted from (23) that the secrecy outage event is only considered in the cases where the transmit power P k , b is higher than zero, i.e., P k , b = L v and v 1 .
For the probability Pr P k , b = L v in (23), it can be calculated by
Pr P k , b = L v = F Z min , k v + 1 W F Z min , k v W , if v < W 1 F Z min , k 1 , if v = W
Next, let us consider the SOP conditioned on P k , b = L v as marked in (23); we have
SO P k L v = Pr L v γ T k , b , T k + 1 , c κ D 2 L v γ T k , b , T k + 1 , c + σ 2 < ρ 1 + L v γ T k , b , E g κ E 2 L v γ T k , b , E g + σ 2 ρ = Pr α 0 γ T k , b , T k + 1 , c < α 1 , v + α 2 γ T k , b , E g + α 3 , v γ T k , b , T k + 1 , c γ T k , b , E g ,
where
α 0 = 1 ρ 1 κ D 2 , α 1 , v = σ 2 ρ 1 L v , α 2 = ρ 1 κ E 2 + ρ , α 3 , v = L v σ 2 ρ 1 κ D 2 κ E 2 + κ D 2 ρ κ E 2 .
We can observe from (25) that if α 0 0 (or κ D 2 1 / ρ 1 ), SO P k L v always equals 1 for all values of k and v.
In the following, we derive the exact expressions of SO P k L v as given in Lemmas 1–3 below.
Lemma 1.
When α 0 > 0 and α 3 , v > 0 or κ D 2 > κ E 2 / ρ + ρ 1 κ E 2 , the exact expression of SOP can be given as
SO P k L v = 1 + n = 1 N D 2 m = 0 N E 1 1 n + m β 0 0 α 0 exp β 1 y exp β 2 y d y .
Proof. 
At first, when α 0 > 0 and α 3 , v > 0 , we can rewrite SO P k L v as
SO P k L v = Pr α 0 α 3 , v γ T k , b , E g γ T k , b , T k + 1 , c < α 1 , v + α 2 γ T k , b , E g = Pr γ T k , b , E g α 0 α 3 , v + Pr γ T k , b , E g < α 0 α 3 , v , γ T k , b , T k + 1 , c < α 1 , v + α 2 γ T k , b , E g α 0 α 3 , v γ T k , b , E g = 1 F γ T k , b , E g α 0 α 3 , v + 0 α 0 / α 3 , v F γ T k , b , T k + 1 , c α 1 , v + α 2 x α 0 α 3 , v x f γ T k , b , E g x d x .
By substituting the CDF of γ T k , b , T k + 1 , c in (10), and the PDF of γ T k , b , E g in (15) into (28), after some manipulations, we arrive at
SO P k L v = 1 + n = 1 N D 2 m = 0 N E 1 1 n + m N D 2 n N E 1 m N E λ T k , E × 0 α 0 / α 3 , v exp m + 1 λ T k , E x exp n λ T k , T k + 1 α 1 , v + α 2 x α 0 α 3 , v x d x .
By changing variable y = α 0 α 3 , v x , we have
SO P k L v = 1 + n = 1 N D 2 m = 0 N E 1 1 n + m N D 2 n N E 1 m N E λ T k , E α 3 , v × exp n λ T k , T k + 1 α 2 α 3 , v m + 1 λ T k , E α 0 α 3 , v × 0 α 0 exp m + 1 λ T k , E α 3 , v y exp n λ T k , T k + 1 α 1 , v α 3 , v + α 0 α 2 α 3 , v y d y .
With α 1 , v α 3 , v + α 0 α 2 = ρ , we can rewrite (30) as
SO P k L v = 1 + n = 1 N D 2 m = 0 N E 1 1 n + m β 0 0 α 0 exp β 1 y exp β 2 y d y .
where
β 0 = N D 2 n N E 1 m N E λ T k , E α 3 , v exp n λ T k , T k + 1 α 2 m + 1 λ T k , E α 0 α 3 , v , β 1 = m + 1 λ T k , E α 3 , v , β 2 = n λ T k , T k + 1 ρ α 3 , v .
We finish the proof of Lemma 1 here. We note that the integrals in (27) can be easily calculated by computer software such as Matlab or Mathematica. ☐
Comment 2: We can observe from (27) that the exact expression of SO P k L v is still in integral form, which does not provide any insights into the system performance. Therefore, our next objective is to find an asymptotic expression at high transmit SNR as given in Corollary 1 below.
Corollary 1.
When α 0 > 0 and α 3 , v > 0 , we can approximate SO P k L v at high transmit SNR P S / σ 2 + by a closed-form expression as
SO P k L v P S / σ 2 + 1 1 exp λ T k , E α 0 α 3 , v N E .
Proof. 
At high transmit SNR, we can approximate (25) in this case as follows:
SO P k L v = Pr α 0 γ T k , b , T k + 1 , c < α 1 , v + α 2 γ T k , b , E g + α 3 , v γ T k , b , T k + 1 , c γ T k , b , E g P S / σ 2 + Pr α 0 γ T k , b , T k + 1 , c < α 3 , v γ T k , b , T k + 1 , c γ T k , b , E g = Pr γ T k , b , E g > α 0 α 3 , v P S / σ 2 + 1 F γ T k , b , E g α 0 α 3 , v .
Substituting (14) into (34), we obtain (33). ☐
Comment 3: Combining (22), (23), (27), and (33), we obtain exact and asymptotic formulas of the end-to-end SOP when α 0 > 0 and α 3 , v > 0 . Equation (33) implies that SO P k L v at high transmit SNR only depends on λ T k , E , α 0 , and α 3 , v . Moreover, SO P k L v (and the end-to-end SOP) increases when P S / σ 2 increases.
Lemma 2.
When α 0 > 0 and α 3 , v < 0 , an exact expression of SO P k L v can be given as
SO P k L v = 1 + n = 1 N D 2 m = 0 N E 1 1 n + m + 1 β 0 α 0 + exp β 1 y exp β 2 y d y .
Proof. 
Similar to (28), SO P k L v in this case can be written by
SO P k L v = Pr α 0 α 3 , v γ T k , b , E g γ T k , b , T k + 1 , c < α 1 , v + α 2 γ T k , b , E g = Pr γ T k , b , T k + 1 , c < α 1 , v + α 2 γ T k , b , E g α 0 α 3 , v γ T k , b , E g = 0 + F γ T k , b , T k + 1 , c α 1 , v + α 2 x α 0 α 3 , v x f γ T k , b , E g x d x .
With the same manner as deriving SO P k L v in (28), we can obtain (35). ☐
Corollary 2.
At high transmit SNR, SO P k L v in (35) can be approximated by
SO P k L v P S / σ 2 + 1 exp λ T k , T k + 1 α 2 α 3 , v N D 2 .
Proof. 
Similar to the proof of Corollary 1, we have
SO P k L v = Pr α 0 γ T k , b , T k + 1 , c < α 1 , v + α 2 γ T k , b , E g + α 3 , v γ T k , b , T k + 1 , c γ T k , b , E g P S / σ 2 + Pr α 3 , v γ T k , b , T k + 1 , c γ T k , b , E g < α 2 γ T k , b , E g P S / σ 2 + F γ T k , b , T k + 1 , c α 2 α 3 , v .
Substituting (10) into (38), we then obtain (37). ☐
Comment 4: Combining (22), (23), (35), and (37), we obtain exact and asymptotic expressions of the end-to-end SOP when α 0 > 0 and α 3 , v < 0 . Equation (37) also shows that at high transmit SNR, SO P k L v (and the end-to-end SOP) decreases as P S / σ 2 increases.
Lemma 3.
When α 0 > 0 and α 3 , v = 0 , SO P k L v is given by an exact closed-form expression as
SO P k L v = 1 + n = 1 N D 2 m = 0 N E 1 1 n + m N D 2 n N E 1 m N E λ T k , E m + 1 λ T k , E + n λ T k , T k + 1 α 2 / α 0 exp n λ T k , T k + 1 α 1 , v α 0 .
Proof. 
In this case, we have
SO P k L v = Pr α 0 γ T k , b , T k + 1 , c < α 1 , v + α 2 γ T k , b , E g = 0 + F γ T k , b , T k + 1 , c α 1 , v α 0 + α 2 α 0 x f γ T k , b , E g x d x .
Substituting CDF of γ T k , b , T k + 1 , c in (10), and PDF of γ T k , b , E g in (15) into (40), after some manipulations, we can obtain (39), and finish the proof. ☐
Corollary 3.
When α 0 > 0 and α 3 = 0 , SO P k L v can be approximated by
SO P k L v P S / σ 2 + 1 + n = 1 N D 2 m = 0 N E 1 1 n + m N D 2 n N E 1 m N E λ T k , E m + 1 λ T k , E + n λ T k , T k + 1 α 2 / α 0 .
Proof. 
In this case, we have the following approximation:
SO P k L v = Pr α 0 γ T k , b , T k + 1 , c < α 1 , v + α 2 γ T k , b , E g P S / σ 2 + Pr α 0 γ T k , b , T k + 1 , c < α 2 γ T k , b , E g P S / σ 2 + 0 + F γ T k , b , T k + 1 , c α 2 α 0 x f γ T k , b , E g x d x .
 ☐
Substituting CDF of γ T k , b , T k + 1 , c , and PDF of γ T k , b , E g into (42), after some manipulations, we can obtain (41).
Comment 5: Equation (41) shows that SO P k L v , as well as the end-to-end SOP at high transmit SNR, do not depend on P S / σ 2 . It is worth noting that this paper considers a generalized system model where the hardware impairment levels on the data links and eavesdropping links can be different or the same. Moreover, we can observe from Lemmas 1–3 that the secrecy outage probability of the proposed protocol is only expressed by an exact closed-form formula when α 3 = 0 .

3.3. Probability of Non-Zero Secrecy Capacity (PNSC)

In this subsection, we analyze the end-to-end PNSC of the proposed protocol, which can be formulated by
PNSC = Pr ( C Sec e 2 e > 0 ) = Pr min k = 1 , 2 , , K C Sec , k > 0 = k = 1 K Pr C Sec , k > 0 = k = 1 K PNS C k ,
where PNS C k = Pr C Sec , k > 0 is the probability of non-zero secrecy capacity at the k-th hop.
Lemma 4.
The exact expressions of PNS C k can be given by
PNS C k = v = 1 M Pr P k , b = L v × n = 1 N D 2 m = 0 N E 1 1 n + m + 1 χ 0 0 1 exp χ 1 y exp χ 2 y d y , if κ D 2 > κ E 2 n = 1 N D 2 m = 0 N E 1 1 n + m + 1 χ 0 1 + exp χ 1 y exp χ 2 y d y , if κ D 2 < κ E 2 n = 1 N D 2 m = 0 N 1 1 n + m N D 2 n N E 1 m N E λ T k , E m + 1 λ T k , E + n λ T k , T k + 1 , if κ D 2 = κ E 2
where Pr P k , b = L v is calculated as in (24), and
χ 0 = N D 2 n N E 1 m N E λ T k , E σ 2 L v κ D 2 κ E 2 exp n λ T k , T k + 1 m + 1 λ T k , E σ 2 L v κ D 2 κ E 2 , χ 1 = m + 1 λ T k , E σ 2 L v κ D 2 κ E 2 , χ 2 = n λ T k , T k + 1 σ 2 L v κ D 2 κ E 2 .
Proof. 
Similar to (23), we can formulate PNS C k as
PNS C k = v = 1 M Pr P k , b = L v × Pr 1 + L v γ T k , b , T k + 1 , c κ D 2 L v γ T k , b , T k + 1 , c + σ 2 1 + L v γ T k , b , E g κ E 2 L v γ T k , b , E g + σ 2 > 1 = v = 1 M Pr P k , b = L v × 1 lim ρ 1 SO P k L v .
Next, by substituting ρ = 1 , α 0 = 1 , α 1 , v = 0 , α 2 = 1 into α 3 , v = L v κ D 2 κ E 2 / σ 2 in (27), (35), and (39), we can obtain (45). ☐
Comment 6: Similar to [37], the end-to-end PNSC can be obtained with three different cases, i.e., κ D 2 > κ E 2 , κ D 2 < κ E 2 , and κ D 2 = κ E 2 . Moreover, when κ D 2 = κ E 2 , we obtain the exact closed-form expression of the end-to-end PNSC. Finally, with κ D 2 = κ E 2 , the end-to-end PNSC value does not depend on the transmit SNR as well as the hardware impairment levels.

4. Simulation Results

In this section, we present Monte Carlo simulations to verify the theoretical results obtained in Section 3 by using MATLAB 2014a. For Monte Carlo experiments, we perform 10 5 5 10 6 independent trials, and in each trial, the Rayleigh channel coefficients for all of the links are generated to obtain the end-to-end secrecy performance. For the theoretical results, the expressions derived in Section 3 are used to present them.
In the simulation environment, a two-dimensional Oxy plane is considered, where the primary user (PU), the power beacon (PB), the secondary eavesdropper (E), and the secondary node ( T k ) are located at ( x P , y P ) , ( x B , y B ) , ( x E , y E ) , and k / K , 0 , respectively, where k = 0 , 1 , , K . In all of the simulations, we fix the path-loss exponent β by 3, the number of transmit power levels W by 8, the variance of Gaussian noises σ 2 by 1, and the block time ( T ) by 1. Moreover, we assume that P B = 2 P S = 4 I th , and the total hardware impairment level κ P 2 equals 0. It is noted from figures that simulation results (Sim) are presented by markers, while the theoretical results including exact ones (Exact) and asymptotic ones (Asym) are presented by solid and dash lines, respectively.
In Figure 2, we present the average transmit power of the secondary transmitters as a function of P S . In this simulation, the number of hops (K) is 3, the number of antennas at the node T k N D equals 3, the energy conversion efficiency η by 0.25, and the fraction of time spent for the EH phase ε is 0.25. In addition, the co-ordinates of PB and PU are 0.4 , 0.3 and 0.6 , 0.5 , respectively. We can observe from Figure 2 that the average transmit power of the source ( T 0 ) is highest because the Euclidean distance between T 0 and PU is farthest. We also see that the average transmit power of T 0 , T 1 , and T 2 linearly increases as P S increases. It is worth noting that the simulation results match very well with the theoretical ones, which validates our derivations.
Figure 3 investigates the impact of the positions of PU and PB on the average transmit power of the secondary transmitters. Particularly, we change x B from 0.1 to 0.9, and x P is calculated by x P = 1 x B . Moreover, we fix the values of y B and y P by 0.3 and –0.5, respectively. It can be seen from Figure 3 that the average transmit power of T 0 , T 1 , and T 2 varies with different positions of PB and PU. For example, when x B = 0.1 , the positions of PB and PU are (0.1, 0.3) and (0.9, –0.5), respectively. In this case, the average transmit power of T 2 is lowest because this node is nearest to PU. For another example, x B = 0.5 , the distances between T 1 and PU, and between T 2 and PU are the same, and hence the average transmit power of T 1 and T 2 is almost the same. For the nodes T 1 and T 2 , we see that there exist positions of PB and PU at which their average transmit power is lowest. However, the average transmit power of T 0 always decreases as x B increases.
Figure 4 presents the end-to-end SOP as a function of P S with different number of antennas at E. In this simulation, the total hardware impairment levels of the data and eavesdropping links are given as κ D 2 = 0.01 and κ E 2 = 0 , respectively, and hence the conditions in Lemma 1 are satisfied, i.e., α 0 > 0 and α 3 , v > 0 . It can be seen from this figure that simulation results match very well with theoretical ones. Moreover, we see that the exact end-to-end SOP converges to the approximate one at high P S values, which verifies the derived expressions obtained in Lemma 1 and Corollary 1. As proved in Corollary 1, the end-to-end SOP at high P S regime increases with the increasing of P S . In addition, Figure 4 shows that there exists an optimal value of P S at which the SOP value is lowest. Finally, we can see that the secrecy performance of the proposed protocol is worse with higher number of antennas at E.
In Figure 5, we present the end-to-end SOP as a function of P S with various number of hops K . In this figure, we assume that the transceiver hardware of the authorized nodes is better than that of the eavesdropper, i.e., κ D 2 = 0 and κ E 2 = 0.01 , which satisfy the conditions in Lemma 2, i.e., α 0 > 0 and α 3 , v < 0 . It is seen from Figure 5 that the end-to-end SOP rapidly decreases as P S increases. Moreover, the secrecy performance significantly enhances with higher number of hops. Finally, the simulation results again validate the theoretical results obtained from Lemma 2 and Corollary 2.
In Figure 6, we consider the cases where α 3 , v = 0 or ρ 1 κ D 2 κ E 2 + κ D 2 ρ κ E 2 = 0 . As proved in Lemma 3 and Corollary 3, we can see from Figure 6 that the exact end-to-end SOP rapidly converges to the asymptotic one which does not depend on P S . It is also seen that the hardware impairment levels κ D 2 and κ E 2 significantly impact on the secrecy performance. In this figure, the value of SOP is lowest when the transceiver hardware of the authorized nodes and the eavesdropper is perfect, i.e., κ D 2 = κ E 2 = 0 .
Figure 7 presents the SOP performance of the proposed protocol as a function of the fraction of time spent for the EH process ε . As illustrated in this figure, the end-to-end SOP increases with higher value of ε . Moreover, when ε is very small, the probability Pr P k , b = L v in (23) ( v 1 ) converges to zero, and hence the end-to-end SOP also goes to zero. Next, similar to Figure 5, the secrecy performance significantly enhances when the hardware impairment level of the data links κ D 2 is lower than that of the eavesdropping links κ E 2 .
In Figure 8, we investigate the impact of the number of hops K on the end-to-end SOP. In this simulation, we assume that the number of antennas at the T k and E nodes is same, i.e., N D = N E , and the transceiver hardware of these nodes is perfect, i.e., κ D 2 = κ E 2 = 0 . As we can see, the values of SOP almost decrease as increasing the number of hops. However, in the case that N D = N E = 1 , the end-to-end SOP is highest when the number of hops equals 2. When K 2 , it is seen that the SOP performance in case that N D = N E = 3 is best. Moreover, the value of SOP in this case rapidly decreases with the increasing of K.
In Figure 9, we present the end-to-end PNSC as a function of P S with various values of κ D 2 as κ E 2 is fixed by 0.05. As observed, the PNSC performance is better with the decreasing of κ D 2 . Moreover, as κ D 2 < κ E 2 κ D 2 > κ E 2 , the value of PNSC increases (decreases) with higher value of P S , and in the case that κ D 2 = κ E 2 , this value does not depend on P S . It is worth noting that the simulation and theoretical results match very well with each other, which validates the formulas derived in Lemma 4.
Figure 10 presents the end-to-end PNSC as a function of κ D 2 with different number of hops (K). As shown in this figure, the PNSC performance significantly decreases when the hardware impairment level of the data link increases. Moreover, at high κ D 2 values, the end-to-end PNSC is worse with high number of hops.

5. Conclusions

This paper proposed and evaluated the secrecy performance of the TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under the joint impact of the interference constraint, the limited-energy source, and the hardware impairments. The main contribution of this paper is to derive new exact and asymptotic expressions of the end-to-end SOP and PNSC over Rayleigh fading channel, which can be used to design and optimize the performance of the considered networks, with any hardware impairment levels, as well as other system parameters, in the practical considerations. The interesting results obtained in this paper can be listed as follows:
  • The hardware impairments have a significant impact on the secrecy performance. Particularly, when the transceiver hardware of the authorized nodes is better than that of the eavesdropper, the proposed protocol obtains high secrecy performance. Otherwise, the SOP and PNSC performance is significantly degraded.
  • The secrecy performance of the proposed protocol can be enhanced with higher number of antennas equipped at the authorized nodes.
  • By optimally designing the number of hops and the fraction of time spent for the energy harvesting phase, the secrecy performance of the proposed protocol can be significantly improved.

Author Contributions

The main contributions of P.T.T. (Phu Tran Tin) and P.M.N. were to create the main ideas and execute performance evaluation by extensive simulations, while T.T.D., P.T.T. (Phuong T. Tran) and M.V. worked as the advisers of P.T.T. (Phu Tran Tin) and P.M.N. to discuss, create, and advise the main ideas and performance evaluations together.

Funding

This research received no external funding.

Acknowledgments

This work was supported by the grant SGS reg. No. SP2019/41 conducted at VSB Technical University of Ostrava, Czech Republic, and partially was funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2017.317.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ledwaba, L.P.I.; Hancke, G.P.; Venter, H.S.; Isaac, S.J. Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices. IEEE Access 2018, 6, 9303–9323. [Google Scholar] [CrossRef]
  2. Liu, Z.; Choo, K.-K.R.; Grossschadl, J. Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Commun. Mag. 2018, 56, 158–162. [Google Scholar] [CrossRef]
  3. Wyner, A.D. The Wire-tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  4. Csiszar, I.; Korner, J. Broadcast Channels With Confidential Messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef]
  5. Gopala, P.K.; Lai, L.; Gamal, H.E. On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698. [Google Scholar] [CrossRef]
  6. Li, Z.; Jing, T.; Ma, L.; Huo, Y.; Qian, J. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks. Sensors 2016, 16, 339. [Google Scholar] [CrossRef] [PubMed]
  7. Tang, X.; Cai, Y.; Yang, W.; Yang, W.; Chen, D.; Hu, J. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks. Sensors 2018, 18, 331. [Google Scholar] [CrossRef]
  8. Yang, M.; Zhang, B.; Huang, Y.; Yang, N.; Guo, D.; Gao, B. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming. Sensors 2016, 16, 1908. [Google Scholar] [CrossRef]
  9. Yang, N.; Yeoh, P.L.; Elkashlan, M.; Schober, R.; Collings, I.B. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels. IEEE Trans. Commun. 2013, 61, 144–154. [Google Scholar] [CrossRef]
  10. Xiong, J.; Tang, Y.; Ma, D.; Xiao, P.; Wong, K.-K. Secrecy Performance Analysis for TAS-MRC System with Imperfect Feedback. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1617–1629. [Google Scholar] [CrossRef]
  11. Krikidis, I. Opportunistic Relay Selection For Cooperative Networks with Secrecy Constraints. IET Commun. 2010, 4, 1787–1791. [Google Scholar] [CrossRef]
  12. Liu, Y.; Wang, L.; Tran, T.D.; Elkashlan, M.; Duong, T.Q. Relay Selection for Security Enhancement in Cognitive Relay Networks. IEEE Wirel. Commun. Lett. 2015, 4, 46–49. [Google Scholar] [CrossRef] [Green Version]
  13. Duy, T.T.; Duong, T.Q.; Thanh, T.L.; Bao, V.N.Q. Secrecy Performance Analysis with Relay Selection Methods under Impact of Co-channel Interference. IET Commun. 2015, 9, 1427–1435. [Google Scholar] [CrossRef]
  14. Zhong, B.; Zhang, Z. Secure Full-Duplex Two-Way Relaying Networks With Optimal Relay Selection. IEEE Commun. Lett. 2017, 21, 1123–1126. [Google Scholar] [CrossRef]
  15. Kuhestani, A.; Mohammadi, A.; Mohammadi, M. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2018, 13, 341–355. [Google Scholar] [CrossRef]
  16. Mo, J.; Tao, M.; Liu, Y. Relay Placement for Physical Layer Security: A Secure Connection Perspective. IEEE Commun. Lett. 2012, 16, 878–881. [Google Scholar]
  17. Hu, L.; Wen, H.; Wu, B.; Pan, F.; Liao, R.-F.; Song, H.; Tang, J.; Wang, X. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things. IEEE Internet Things J. 2018, 5, 219–228. [Google Scholar] [CrossRef]
  18. Ma, H.; Cheng, J.; Wang, X.; Ma, P. Robust MISO Beamforming with Cooperative Jamming for Secure Transmission From Perspectives of QoS and Secrecy Rate. IEEE Trans. Commun. 2018, 66, 767–780. [Google Scholar] [CrossRef]
  19. Zhang, G.; Xu, J.; Wu, Q.; Cui, M.; Li, X.; Lin, F. Wireless Powered Cooperative Jamming for Secure OFDM System. IEEE Trans. Veh. Technol. 2018, 67, 1331–1346. [Google Scholar] [CrossRef] [Green Version]
  20. Zhou, X.; Zhang, R.; Ho, C.-K. Wireless information and power transfer: Architecture design and rate-energy tradeoff. IEEE Trans. Commun. 2013, 61, 4754–4767. [Google Scholar] [CrossRef]
  21. Nasir, A.A.; Zhou, X.; Durrani, S.; Kennedy, R.A. Relaying protocols for wireless energy harvesting and information processing. IEEE Trans. Wirel. Commun. 2013, 12, 3622–3636. [Google Scholar] [CrossRef]
  22. Atapattu, S.; Evans, J. Optimal Energy Harvesting Protocols for Wireless Relay Networks. IEEE Trans. Wirel. Commun. 2016, 15, 5789–5803. [Google Scholar] [CrossRef]
  23. Xu, C.; Zheng, M.; Liang, W.; Yu, H.; Liang, Y.-C. Outage Performance of Underlay Multihop Cognitive Relay Networks with Energy Harvesting. IEEE Commun. Lett. 2016, 20, 1148–1151. [Google Scholar] [CrossRef]
  24. Xu, C.; Zheng, M.; Liang, W.; Yu, H.; Liang, Y.-C. End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting. IEEE Trans. Wirel. Commun. 2017, 16, 3561–3572. [Google Scholar] [CrossRef]
  25. Hieu, T.D.; Duy, T.T.; Dung, L.T.; Choi, S.G. Performance Evaluation of Relay Selection Schemes in Beacon-Assisted Dual-hop Cognitive Radio Wireless Sensor Networks under Impact of Hardware Noises. Sensors 2018, 18, 1843. [Google Scholar] [CrossRef] [PubMed]
  26. Sun, A.; Liang, T.; Li, B. Secrecy Performance Analysis of Cognitive Sensor Radio Networks with an EH-Based Eavesdropper. Sensors 2017, 17, 1026. [Google Scholar] [CrossRef] [PubMed]
  27. Hieu, T.D.; Duy, T.T.; Kim, B.-S. Performance Enhancement for Multi-hop Harvest-to-Transmit WSNs with Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises. IEEE Sens. J. 2018, 18, 5173–5186. [Google Scholar] [CrossRef]
  28. Mokhtar, M.; Gomaa, A.; Al-Dhahir, N. OFDM AF relaying under I/Q imbalance: Performance analysis and baseband compensation. IEEE Trans. Commun. 2013, 61, 1304–1313. [Google Scholar] [CrossRef]
  29. Björnson, E.; Matthaiou, M.; Debbah, M. A new look at dual-hop relaying: Performance limits with hardware impairments. IEEE Trans. Commun. 2013, 61, 4512–4525. [Google Scholar] [CrossRef]
  30. Solanki, S.; Upadhyay, P.K.; da Costa, D.B.; Bithas, P.S.; Kanatas, A.G.; Dias, U.S. Joint Impact of RF Hardware Impairments and Channel Estimation Errors in Spectrum Sharing Multiple-Relay Networks. IEEE Trans. Commun. 2018, 66, 3809–3824. [Google Scholar] [CrossRef]
  31. Boulogeorgos, A.A.; Karas, D.S.; Karagiannidis, G.K. How much does I/Q Imbalance affect secrecy capacity? IEEE Commun. Lett. 2016, 20, 1305–1308. [Google Scholar] [CrossRef]
  32. Zhu, J.; Ng, D.W.K.; Wang, N.; Schober, R.; Bhargava, V.K. Analysis and Design of Secure Massive MIMO Systems in the Presence of Hardware Impairments. IEEE Trans. Wirel. Commun. 2017, 16, 2001–2016. [Google Scholar] [CrossRef] [Green Version]
  33. Lee, J.-H. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems. IEEE Commun. Lett. 2015, 19, 525–528. [Google Scholar] [CrossRef]
  34. Lee, J.-H.; Sohn, I.; Kim, Y.-H. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks. Sensors 2016, 16, 1726. [Google Scholar] [CrossRef] [PubMed]
  35. Tian, F.; Chen, X.; Liu, S.; Yuan, X.; Li, D.; Zhang, X.; Yang, Z. Secrecy Rate Optimization in Wireless Multi-Hop Full Duplex Networks. IEEE Access 2018, 6, 5695–5704. [Google Scholar] [CrossRef]
  36. Alotaibi, E.R.; Hamdi, K.A. Secure Relaying in Multihop Communication Systems. IEEE Commun. Lett. 2016, 20, 1120–1123. [Google Scholar] [CrossRef]
  37. Tin, P.T.; Hung, D.T.; Duy, T.T.; Voznak, M. Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels. Radio Eng. 2016, 25, 774–782. [Google Scholar]
  38. Yao, J.; Liu, Y. Secrecy Rate Maximization with Outage Constraint in Multihop Relaying Networks. IEEE Commun. Lett. 2018, 22, 304–307. [Google Scholar] [CrossRef]
  39. Qi, X.; Huang, K.; Zhong, Z.; Kang, X.; Zhong, Z. Physical layer security of multi-hop aided downlink MIMO heterogeneous cellular networks. Chin. Commun. 2016, 13, 120–130. [Google Scholar] [CrossRef]
  40. Lee, J.-H. Confidential Multicasting Assisted by Multi-Hop Multi-Antenna DF Relays in the Presence of Multiple Eavesdroppers. IEEE Trans. Commun. 2016, 64, 4295–4304. [Google Scholar] [CrossRef]
  41. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  42. Bao, V.N.Q.; Trung, N.L.; Debbah, M. Relay selection scheme for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 2013, 12, 6076–6085. [Google Scholar] [CrossRef]
  43. Vo, V.N.; Tran, D.-D.; Chakchai, S.-I.; Tran, H. Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things with Untrusted Relays. IEEE Access 2018, 6, 48247–48258. [Google Scholar]
  44. Huang, Y.; Zhang, P.; Wu, Q.; Wang, J. Secrecy Performance of Wireless Powered Communication Networks with Multiple Eavesdroppers and Outdated CSI. IEEE Access. 2018, 6, 33774–33788. [Google Scholar] [CrossRef]
  45. Lee, K.; Choi, H.-H. Secure Analog Network Coding with Wireless Energy Harvesting under Multiple Eavesdroppers. IEEE Access. 2018, 6, 76289–76301. [Google Scholar] [CrossRef]
  46. Laneman, J.N.; Tse, D.N.; Wornell, G.W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inf. Theory 2004, 50, 3062–3080. [Google Scholar] [CrossRef]
  47. Matthaiou, M.; Papadogiannis, A. Two-way relaying under the presence of relay transceiver hardware impairments. IEEE Commun. Lett. 2013, 17, 1136–1139. [Google Scholar] [CrossRef]
  48. Duy, T.T.; Duong, Q.T.; da Costa, D.B.; Bao, V.N.Q.; Elkashlan, M. Proactive Relay Selection with Joint Impact of Hardware Impairment and Co-channel Interference. IEEE Trans. Commun. 2015, 63, 1594–1606. [Google Scholar] [CrossRef]
  49. Sharma, P.K.; Upadhyay, P.K. Cognitive relaying with transceiver hardware impairments under interference constraints. IEEE Commun. Lett. 2016, 20, 820–823. [Google Scholar] [CrossRef]
Figure 1. System model of the proposed scheme.
Figure 1. System model of the proposed scheme.
Sensors 19 01160 g001
Figure 2. Average transmit power of the secondary transmitters as a function of P S when K = 3 , N D = 3 , ε = 0.25 , η = 0.25 , x B = 0.4 , y B = 0.3 , x P = 0.6 , and y P = 0.5 .
Figure 2. Average transmit power of the secondary transmitters as a function of P S when K = 3 , N D = 3 , ε = 0.25 , η = 0.25 , x B = 0.4 , y B = 0.3 , x P = 0.6 , and y P = 0.5 .
Sensors 19 01160 g002
Figure 3. Average transmit power of the secondary transmitters as a function of x B when P S = 10 dB, K = 3 , N D = 3 , ε = 0.25 , η = 0.25 , y B = 0.3 , x P = 1 x B , and y P = 0.5 .
Figure 3. Average transmit power of the secondary transmitters as a function of x B when P S = 10 dB, K = 3 , N D = 3 , ε = 0.25 , η = 0.25 , y B = 0.3 , x P = 1 x B , and y P = 0.5 .
Sensors 19 01160 g003
Figure 4. End-to-end secrecy outage probability as a function of P S when K = 3 , N D = 2 , ε = 0.25 , η = 0.25 , C th = 0.2 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ D 2 = 0.01 , and κ E 2 = 0 .
Figure 4. End-to-end secrecy outage probability as a function of P S when K = 3 , N D = 2 , ε = 0.25 , η = 0.25 , C th = 0.2 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ D 2 = 0.01 , and κ E 2 = 0 .
Sensors 19 01160 g004
Figure 5. End-to-end secrecy outage probability as a function of P S when N D = 2 , N E = 2 , ε = 0.25 , η = 0.25 , C th = 0.2 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ D 2 = 0 , and κ E 2 = 0.01 .
Figure 5. End-to-end secrecy outage probability as a function of P S when N D = 2 , N E = 2 , ε = 0.25 , η = 0.25 , C th = 0.2 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ D 2 = 0 , and κ E 2 = 0.01 .
Sensors 19 01160 g005
Figure 6. End-to-end secrecy outage probability as a function of P S when K = 3 , N D = 2 , N E = 2 , ε = 0.25 , η = 0.25 , C th = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , and y E = 0.5 .
Figure 6. End-to-end secrecy outage probability as a function of P S when K = 3 , N D = 2 , N E = 2 , ε = 0.25 , η = 0.25 , C th = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , and y E = 0.5 .
Sensors 19 01160 g006
Figure 7. End-to-end secrecy outage probability as a function of ε when P S = 10 dB, K = 4 , N D = 2 , N E = 2 , η = 0.1 , C th = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , and y E = 0.5 .
Figure 7. End-to-end secrecy outage probability as a function of ε when P S = 10 dB, K = 4 , N D = 2 , N E = 2 , η = 0.1 , C th = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , and y E = 0.5 .
Sensors 19 01160 g007
Figure 8. End-to-end secrecy outage probability as a function of K when P S = 0 dB, ε = 0.1 , η = 0.1 , C th = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ D 2 = 0 , and κ E 2 = 0 .
Figure 8. End-to-end secrecy outage probability as a function of K when P S = 0 dB, ε = 0.1 , η = 0.1 , C th = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ D 2 = 0 , and κ E 2 = 0 .
Sensors 19 01160 g008
Figure 9. End-to-end probability of non-zero secrecy capacity as a function of P S when K = 3 , ε = 0.25 , η = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ E 2 = 0.05 , N D = 1 , and N E = 2 .
Figure 9. End-to-end probability of non-zero secrecy capacity as a function of P S when K = 3 , ε = 0.25 , η = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ E 2 = 0.05 , N D = 1 , and N E = 2 .
Sensors 19 01160 g009
Figure 10. End-to-end probability of non-zero secrecy capacity as a function of κ D 2 when K = 3 , ε = 0.1 , η = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ E 2 = 0.2 , N D = 2 , and N E = 2 .
Figure 10. End-to-end probability of non-zero secrecy capacity as a function of κ D 2 when K = 3 , ε = 0.1 , η = 0.25 , x B = 0.5 , y B = 0.3 , x P = 0.5 , y P = 0.5 , x E = 0.5 , y E = 0.5 , κ E 2 = 0.2 , N D = 2 , and N E = 2 .
Sensors 19 01160 g010

Share and Cite

MDPI and ACS Style

Tin, P.T.; Minh Nam, P.; Trung Duy, T.; Tran, P.T.; Voznak, M. Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection. Sensors 2019, 19, 1160. https://doi.org/10.3390/s19051160

AMA Style

Tin PT, Minh Nam P, Trung Duy T, Tran PT, Voznak M. Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection. Sensors. 2019; 19(5):1160. https://doi.org/10.3390/s19051160

Chicago/Turabian Style

Tin, Phu Tran, Pham Minh Nam, Tran Trung Duy, Phuong T. Tran, and Miroslav Voznak. 2019. "Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection" Sensors 19, no. 5: 1160. https://doi.org/10.3390/s19051160

APA Style

Tin, P. T., Minh Nam, P., Trung Duy, T., Tran, P. T., & Voznak, M. (2019). Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection. Sensors, 19(5), 1160. https://doi.org/10.3390/s19051160

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop