Next Article in Journal
Single-Wire Control and Fault Detection for Automotive Exterior Lighting Systems
Previous Article in Journal
Cross-Layer Design for Energy-Efficient Reliable Multi-Path Transmission in Event-Driven Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Physical Layer Security Performance of Multi-User Mixed Radio-Frequency/Free-Space-Optics System Based on Optimal User Interference

1
Key Laboratory of Electromagnetic Wave Information Technology and Metrology of Zhejiang Province, College of Information Engineering, China Jiliang University, Hangzhou 310018, China
2
State Key Laboratory of Coal Resources and Safe Mining, China University of Mining and Technology, Xuzhou 221116, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(14), 6523; https://doi.org/10.3390/s23146523
Submission received: 17 May 2023 / Revised: 4 July 2023 / Accepted: 17 July 2023 / Published: 19 July 2023
(This article belongs to the Section Communications)

Abstract

:
This paper presents research on the physical layer security performance of a multi-user mixed RF/FSO system based on optimal user interference. In this system model, the RF link experiences Rayleigh fading, and the FSO link follows the Fischer–Snedecor F distribution. The system adopts a double-hop-decode-and-forward (DF) relay scheme. We also consider the effect of directivity errors in the FSO link and assume the presence of an illegal eavesdropper with a single antenna near the RF link. The source node controls the energy collection and information forwarding using a multi-user structure based on simultaneous wireless information and power transfer (SWIPT). We select the optimal user to jam the eavesdropper’s communication. We derive closed-form expressions for the mixed RF/FSO communication system’s secrecy outage probability (SOP) and average secrecy capacity (ASC). Monte Carlo simulations are performed to verify the accuracy of these expressions. By formulating and simulating the simulation system, the impact of various important factors on the mixed system’s physical layer security (PLS) is analyzed. The analysis indicates that increasing the number of antennas and interference signal-to-noise ratio (SNR) of the optimal user, the time allocation factor and energy conversion efficiency, and the improvement in the quality of atmospheric channels with improved weather will significantly enhance this system’s PLS.

1. Introduction

The rapid scientific and technological development, and the growing network demand are overwhelming the radio frequency spectrum resources. Compared with traditional radio frequency (RF) communication, FSO (Free Space Optics) is a well-established wireless optical transmission technology. FSO communication has attracted a lot of interest as a potential solution to the short-range 5G wireless communication problem [1,2]. FSO communication has the advantages of being license-free and highly secure, as well as a low deployment cost and high traffic rate transmission, which is often used to solve the “last-kilometer” problem [3,4]. FSO provides a wide range of applications in outdoor and indoor services, for example, wireless video surveillance, data centers, terrestrial transmission, LAN connectivity, mobile cellular networks, last-mile solutions, space communications, radio astronomy, remote sensing, etc. [5,6]. However, FSO links are easily affected by directional errors, weather conditions, atmospheric turbulence and other factors, resulting in reduced communication quality or even interruption of communication. Therefore, although it has strong directivity and high security, it is not suitable for long-distance communication [7,8].
RF and FSO communication have their own advantages and disadvantages. Therefore, there are many technologies proposed to solve these problems. Using both RF and FSO technology is a very effective solution. This combination includes two possible configurations. The first one is the hybrid RF/FSO, in which an RF link is incorporated in parallel with an FSO link. The second combination is the mixed RF/FSO communication, in which RF communication is used at one hop and FSO communication at the other in dual-hop or relay-assisted networks [9]. We choose the mixed RF/FSO communication system to solve the aforementioned problems. The combination of RF communication reliability and FSO communication security under bad weather conditions can lead to better safety communication and also extend the information transmission distance [10]. The RF communication can be an easy target of eavesdropping by illegal eavesdroppers, because the RF link in the mixed communication system is a broadcast link. This problem seriously affects the security performance of the communication system; therefore, we further consider the mixed system’s physical layer security (PLS) performance. Secure communication can be achieved by just using the physical characteristics of wireless channels because the PLS does not need to rely on an enciphering algorithm. The PLS also has a low rate of complexity. Therefore, the mixed RF/FSO system’s PLS has received a significant amount of attention [11,12].
Compared with a single user, multiple users are usually more suitable for practical communication scenarios. The multiple users can improve the system throughput fault tolerance and reliability of RF links. For example, El-Malek et al. studied a multi-user mixed RF/FSO link model with a single input and multiple outputs. In particular, the FSO link is based on the Gamma–Gamma distribution, and the maximum proportional combination and selective combination schemes are used in the multi-antenna repeater, where the system selects the worst user to interfere with the eavesdropper [13]. The authors also studied the influence of RF channel co-frequency interference on the security performance of multi-user mixed RF/FSO communication systems under eavesdropping attack conditions [14]. Hu et al. studied the optimization problem based on the secrecy rate in multi-user mixed RF/FSO spectrum sharing networks [15].
The aforementioned studies are the only ones that consider multiple users in the PLS of mixed RF/FSO communication systems. The optimal user transmission and worst user interference schemes are used in these studies. The optimal user transmission is actually a single user transmission scheme, which can be easily affected by the external electromagnetic wave interference and the co-channel interference. The worst user cooperative jamming scheme has certain limitations, because it is limited by the transmitting power of the worst user and, therefore, the interference SNR is low and the interference effect on eavesdroppers is not obvious.
The Gamma–Gamma distribution is used for the FSO links in the above security performance studies of the mixed RF/FSO communication system with multi-user diversity. This distribution is mainly applicable to moderate and strong turbulence in the FSO link. Recently, an increasing amount of attention has been paid to the F distribution [16]. Peppas et al. proposed to use the F distribution to simulate the atmospheric turbulence on the FSO links. The results showed that the F distribution was more suitable for FSO fading models under all turbulence conditions, and the simulated experimental data matched closely with those in the actual communication scenario [17].
The F distribution is used to simulate the FSO link fading. Compared with the Gamma–Gamma and M distributions, it is more suitable for all turbulence conditions and has a higher computational efficiency. Furthermore, the experimental data are more suitable for actual communication scenarios; therefore, the F distribution can be used to evaluate the performance of communication systems [18].
The above research does not consider the optimal user jamming scheme when studying the multi-user mixed system, which has some limitations on the interference of eavesdroppers. There is also no literature on the application of F distribution to FSO links to study the physical layer security performance of mixed systems. In recent years, it is found that the simulation results of FSO link fading using F-distribution have a good fit compared with the experimental data.
To overcome the limitations of the existing techniques, this paper presents a multi-user mixed RF/FSO system with optimal user interference. The RF link experiences the Rayleigh fading distribution and the FSO link experiences the F fading distribution. SWIPT and multiple users are considered in the system. Optimal user interference, equal-gain-combining (EGC) receiving and decode-and-forward (DF) relaying schemes are invoked. In the first place, the probability density function (PDF) and cumulative distribution function (CDF) of the signal-to-interference noise ratio (SINR) of eavesdroppers under interference signals are studied, in which the interference signal is transmitted by the optimal user. Second, we obtain a unified CDF based on the system signal-to-noise ratio (SNR) of the DF trunking scheme. Based on CDF, we derive closed-form formulas for the mixed system’s SOP and ASC under the help of the Meijer G-function and the generalized Laguerre integration method, which are verified by Monte Carlo simulation. Through simulation, we analyzed the impact of factors such as the optimal number of interference-transmitting antennas, average interference SNR, energy conversion efficiency, time allocation factor, and atmospheric turbulence on the system’s safety performance.

2. System Model

Figure 1 shows a multi-user mixed RF/FSO system based on the optimal user interference. The system contains a multi-user source node S i ( i { 1 , , M } ), a single-input-and-single-output relay (R), a legitimate destination receiving user with a single receive antenna (D) and an illegal eavesdropper (E). The RF link experiences the Rayleigh fading distribution and the FSO link experiences the F fading distribution. The source node adopts the SWIPT technology and multi-user scheduling scheme and is equipped with an energy harvesting device. The source node utilizes the optimal user to transmit jamming signals to the illegal eavesdropper.
Figure 2 is a schematic diagram of the time slot switching protocol for SWIPT, where ρ and T are the time switching factor and the time period of the time slot switching protocol, respectively. The relay device first transmits the RF energy signal to the source node multi-user in the first time slot ρ T and the multi-user source node equipped with the energy harvesting device recognizes the received energy signal and stores it [19]. In the remaining time slot ( 1 ρ ) T , the optimal user of the source node transmits interference signals to the eavesdropper, and the relay receives signals sent by other users of the source node with the EGC technology.
In the energy harvesting phase, the relay node R sends a radio signal x R S i with a power of P R , which is transmitted to each user S i at the transmitter through the channel of R S i . The RF energy signal received by each user S i on the source node can be expressed as follows [20]:
y R S i = 1 d τ R S i P R h R S i x R S i + n S i
where P R and x R S i are the transmitted power and normalized signal of the relay node, respectively, h R S i is the channel coefficient between the users of the relay R and the source node, d R S i represents the distance between R and S i , τ is the path loss index, and n S i represents the additive white Gaussian noise with zero mean and variance σ R S i at each user. According to (1), it can be gathered from [21] that when noise influence is ignored, the energy stored by each user can be expressed as
E S i = ρ η | 1 d τ R S i P R h R S i | 2 T
where η is the energy conversion efficiency of the source node corresponding to the conversion of the RF signal into direct current (DC).
Defining the optimal user as S J , the RF signal received by it from the relay can be expressed as
y R S J = 1 d τ R S J P R h R S J x R S J + n S J
where h R S J and d R S J denote the channel coefficient between the relay R and the optimal user S J , respectively, and n S J denotes the additive white Gaussian noise with zero mean and variance σ R S J at the optimal user.
The energy received by the optimal user S J is expressed as [22]
E S J = ρ η | 1 d τ R S J P R h R S J | 2 T
The signal received by the relay after EGC is expressed as follows:
y S G R = 1 2 ( i = 1 ; i J M y S i ) 2 i = 1 ; i J M N i
where y S i and N i denote the SNR and additive white Gaussian noise at each branch, respectively.
As the optimal user at the source node has multiple RF transmit antennas, it generates a matrix W J with an orthogonal basis of null space N S J ( N S J 1 ) using the artificial interference generation method in [23]. The ε vector has ( N S J 1 ) independent and identically distributed complex Gaussian random elements with a normalized variance. Subsequently, the optimal user of the source node sends W ε as the interference signal. When the number of the optimal user’s interference transmit antennas is greater than 1, interference signals that are transmitted into the null space will not affect the main signal, as the null space is defined as the orthogonal complement of the signal space. Under the effect of the jamming signal transmitted by the optimal user, the received signal at the illegal eavesdropper can be expressed as
y S G E = P S G d τ S G E h S G E x S G R + P S J d τ S J E h S J E W J N S J 1 + n E
where h S G E is the channel coefficient between the source S G and the eavesdropper E, and n E expresses the additive white Gaussian noise with zero mean and variance σ   E 2 at the illegal eavesdropper node.

2.1. RF Channel Model

The jamming signal is designed in such a way that it will only affect the illegal eavesdropper without degrading the quality of the main transmission. When communicating, the signal interference to noise ratio (SINR) of the illegal eavesdropper can be written as follows:
γ S G S J E = γ S G E γ S J E + 1
where γ S G E = P S G σ E 2 d S G E τ | h S G E | 2 , γ S J E = P S J σ E 2 d S J E τ ( N S J 1 ) h S J E W 2 = ρ η P R | h R S J | 2 h S J E W 2 ( 1 ρ ) N 0 ( N S J 1 ) d R S J τ d S J E τ .
The RF links between source and relay obey the Rayleigh fading. The Instantaneous SNR γ k ’s PDF and CDF at the RF link can be mathematically expressed as the following formula:
f γ k ( γ ) = 1 Ω k e xp ( γ k Ω k )
F γ k ( γ ) = 1 - e xp ( γ k Ω k )
where k { S G R , S G E } , and Ω S G R = P S G λ S G R σ R 2 d S G R τ and Ω S G E = P S G λ S G E σ E 2 d S G E τ represent the average power channel gain between the corresponding RF channels, respectively.
It is known from [24] that the CDF of the optimal user is
pr { max ( x 1 , x 2 , x 3 , x M ) < x } = p r { x 1 < x } p r { x 2 < x } p r { x 3 < x } p r { x M < x } = F M ( x )
Using (9) and (10), the CDF of the instantaneous SNR of the optimal user interference γ S J E is obtained as follows:
F γ S J E ( γ ) = [ 1 exp ( γ S J E Ω S J E ) ] M = h = 0 M ( M h ) [ 1 exp ( γ S J E Ω S J E ) ] h
Calculating the corresponding derivative of (11) gives the PDF of the instantaneous interference SNR of the optimal user as
f γ S J E ( γ ) = M [ 1 e xp ( γ S J E Ω S J E ) ] M 1 1 Ω S J E exp ( γ S J E Ω S J E )
where Ω S J E = Ψ λ S J E d S J E τ is the average power channel gain between the optimal user S J and the illegal eavesdropper E, and Ψ = ρ η P R N S J ( 1 ρ ) σ E 2 d R S J τ .
The CDF of the instantaneous SNR γ S G S J E can be obtained using (7)–(9) and (12) as follows [25]:
F γ S G S J E ( γ S G E γ S J E + 1 < γ th ) = 0 F γ S G E [ γ t h ( γ I + 1 ) ] f γ S J E ( γ I ) d γ I = M Ω S J E h = 0 M 1 C M 1 h ( 1 ) h [ Ω S J E h + 1 e xp ( γ t h Ω S G E ) 1 γ t h Ω S G E + h + 1 Ω S J E ]
Applying the derivative operation to the CDF represented by (13), the corresponding PDF is obtained as
f S G S J E ( γ ) = M Ω S J E h = 0 M 1 C M 1 h ( 1 ) h [ 1 Ω S G E e xp ( γ Ω S G E ) ( 1 γ Ω S G E + h + 1 Ω S J E + 1 ( γ Ω S G E + h + 1 Ω S J E ) 2 ) ]

2.2. FSO Channel Model

The optical signal received by the target node from the relay through the FSO link can be represented as [26,27]:
y D = I F S O r 2 G [ 1 + η e r 2 ( h S G R x S G R + n S G R ) ] + n R D
where η e represents the electro-optical conversion efficiency, and G represents the gain factor. The value of r represents the type of detection method (r = 1: heterodyne detection (HD); r = 2: direct detection (DD)), y S G R indicating the signal received by the source node. I F S O represents the channel coefficient of the FSO link and n R D represents the zero-mean AWGN with variance σ R D 2 .
The PDF and CDF of the FSO fading channel are expressed as follows [28]:
f γ R D ( γ R D ) = ξ mod 2 r Γ ( a ) Γ ( b ) γ R D G 2 , 2 2 , 1 [ a ϕ γ R D 1 r ( b 1 ) μ r 1 r ¯ | 1 b , ξ mod 2 + 1 a , ξ mod 2 ]
F γ R D ( γ R D ) = 1 ξ mod 2 r Γ ( a ) Γ ( b ) H 3 , 3 3 , 1 [ a ϕ γ R D 1 r ( b 1 ) μ r 1 r ¯ | ( 1 b , 1 ) , ( ξ mod 2 + 1 , 1 ) , ( 1 , 1 r ) ( 0 , 1 r ) , ( a , 1 ) , ( ξ mod 2 , 1 ) ]
where μ r is the average telecom noise ratio, r = 1 represents the heterodyne detection (HD), and r = 2 represents the direct detection (DD).
μ 1 = μ H D = γ R D ¯ ( H D ) ,   μ 2 = μ D D = a ϕ ( ξ mod 2 + 2 ) ( b 2 ) γ R D ¯ ( D D ) [ ( b 1 ) ( a + 1 ) ( ξ mod 2 + 1 ) ] ,   ϕ = ξ mod 2 ξ mod 2 + 1
In the above expressions, ξ mod 2 is related to the equivalent beam width w L e q , and a and b denote the turbulence parameters. The value of ξ mod 2 increases as the pointing error decreases. When there is no pointing error, ξ mod 2 .

3. End-to-End SNR Statistics

Under DF relaying, the end-to-end instantaneous SNR is denoted by
γ S G R D = γ S G R γ R D γ S G R + γ R D + 1 min ( γ S G R , γ R D )
The mixed channel’s CDF is denoted by [29]
F γ S G R D = P r [ min ( γ S G R , γ R D ) < γ ] = F γ S G R ( γ ) + F γ R D ( γ ) F γ S G R ( γ ) F γ R D ( γ )
Substituting (9) and (17) into (19) results in the following equation
F γ S G R D ( γ ) = 1 exp ( γ Ω S G R ) ξ mod 2 r Γ ( a ) Γ ( b ) H 3 , 3 3 , 1 [ a ϕ γ 1 r ( b 1 ) μ r 1 r | ( 1 b , 1 ) , ( ξ mod 2 + 1 , 1 ) , ( 1 , 1 r ) ( 0 , 1 r ) , ( a , 1 ) , ( ξ mod 2 , 1 ) ]

4. Secrecy Outage Probability Analysis

The Secrecy Outage Probability (SOP) is a benchmark for secrecy, indicating the probability of the occurrence of an event where the instantaneous secrecy capacity falls below the target secrecy rate R S . The mixed system’s SOP lower bound formula is defined as follows [30]:
P out L ( R S ) = 0 F S G R D ( θ γ ) f S G S J E ( γ ) d γ
where θ = exp ( R s ) . Substituting (8) and (20) into (21), and then combining the relevant expressions given in [31] and the generalized Laguerre polynomial [32], after some simplifying mathematical operations, the SOP can be obtained as follows:
P o u t L ( R S ) = j = 1 n H j Y j 0.5 exp ( Y j ) M Ω S J E h = 0 M 1 C M 1 h ( 1 ) h × [ 1 Ω S G E exp ( Y j Ω S G E ) ( 1 Y j Ω S G E + h + 1 Ω S J E + 1 ( Y j Ω S G E + h + 1 Ω S J E ) 2 ) ] × { 1 exp ( θ Y j Ω S G R ) ξ mod 2 r Γ ( a ) Γ ( b ) H 3 , 3 3 , 1 [ a ϕ θ Y j 1 r ( b 1 ) μ r 1 r | ( 1 b , 1 ) , ( ξ mod 2 + 1 , 1 ) , ( 1 , 1 r ) ( 0 , 1 r ) , ( a , 1 ) , ( ξ mod 2 , 1 ) ] }
H j = Γ ( n + 1 / 2 ) Y j n ! ( n + 1 ) 2 [ L n ( 1 / 2 ) ( Y j ) ] 2 , Y j means the jth root of the generalized Laguerre polynomial L n ( 1 2 ) ( Y ) .

5. Average Secrecy Capacity Analysis

The Average Secrecy Capacity (ASC) is a critical metric for assessing the active-eavesdropping’s security performance and can be expressed as follows:
C S ¯ = 0 F S G S J E ( γ ) 1 + γ [ 1 F S G R D ( γ ) ] d γ
Substituting (13) and (20) into (23) and after a few mathematical simplifications described above, we obtain
C S ¯ = j = 1 n H j Y j 0.5 exp ( Y j ) 1 1 + Y j M Ω S J E h = 0 M 1 C M 1 h ( 1 ) h × ( Ω S J E h + 1 exp ( Y j Ω S G E ) 1 Y j Ω S G E + h + 1 Ω S J E ) exp ( Y j Ω S G R ) ξ mod 2 r Γ ( a ) Γ ( b ) H 3 , 3 3 , 1 [ a ϕ Y j 1 r ( b 1 ) μ r 1 r | ( 1 b , 1 ) , ( ξ mod 2 + 1 , 1 ) , ( 1 , 1 r ) ( 1 , 1 r ) , ( a , 1 ) , ( ξ mod 2 , 1 ) ]

6. Results and Analysis

In this part, the simulation data of the multi-user mixed RF/FSO system under diverse parameters with optimal user interference are presented. Monte Carlo simulations verify the numerical results’ accuracy. The FSO link distance is 100 m and the wavelength is 785 nm, the optical wave number k = 2 π / λ ; C n 2 = 10 11   m 2 / 3 is the atmospheric refractive index structure constant of medium turbulence, and the target secrecy rate R S = 0.01 nat / s . Furthermore, the Instantaneous SNR of the FSO link is γ R D = 20   dB , the instantaneous SNR of the RF link is γ S R = 15   dB , and the instantaneous SNR of the eavesdropping link is γ S E = 10   dB . On the RF link, d S E = d S R = 10   m , and d R E = 5   m . The other parameters are η = 0.8 , ρ = 0.8 , N J = 2 , r = 1 , a = 1.83 , b = 3.94 , and ξ mod = 0.84 . The specific simulation parameters are shown in Table 1.
The above parameter values are used in the following simulations. When the generalized Laguerre orthogonal numerical integration method is used, j is considered as 30 in order to make the series converge. The Monte Carlo simulation results confirm the validity of the analytical expressions. The numerical and simulation results are in good agreement, which verifies the accuracy of the proposed expressions.
Figure 3 shows the mixed system’s SOP as a function of the variation of the RF link’s Instantaneous SNR λ S R for diverse numbers of the optimal user’s interfering antennas. It can be known that the mixed system’s SOP with different number of interfering antennas N J decreases as the λ S R increases. When λ S R = 3 0   dB and N J = 2 , 4 , 6 and 8, the mixed system’s SOP are 9.7 × 10 4 , 3.0 × 10 4 , 1.3 × 10 4 and 6.9 × 10 5 , respectively. This set of simulation data shows the mixed system’s SOP decreases as the number of interfering antennas of the optimal user increases. Therefore, it can be gathered that the mixed system’s security performance could be effectively enhanced by enlarging the optimal user interference antennas’ number at the source node.
As the spatial degree of freedom of the optimal user increases with an increase in the number of optimal user interference antennas, the eavesdropping channel quality degrades based on its state information at the eavesdropping node. For the same value of SOP, increasing the optimal user’s number of jamming antennas results in lower transmission power for each antenna in the scheme. In addition, the cost of increasing the antennas’ number is lower than that of adding jammers outside the mixed RF/FSO system. Increasing the number of jamming antennas provides a good schedule for the design of the optimal user transmitting jamming signals and reducing the power consumption of the source node.
The relationship between the SOP and the RF link’s instantaneous SNR λ S R in a mixed RF/FSO system is shown in Figure 4. The system is based on multi-user SWIPT, and the illegal eavesdropper experiences interference from the optimal user. Based on the simulation results, increasing λ S R reduces the SOP of the system in a gradual manner. When λ S R = 3 0   dB and λ J E = 2, 4, 6 and 8 dB, the mixed system’s SOP are 9.6 × 10 4 , 2.9 × 10 4 , 1.4 × 10 4 and 4.0 × 10 5 . Based on the findings, increasing λ J E decreases the system’s SOP, indicating that the optimal user’s jamming signal to the eavesdropper improves PLS performance in the mixed system. Increasing the interference SNR of the optimal user can reduce eavesdropping channel quality, but it is restricted by transmission power. Thus, introducing optimal user interference and selecting appropriate transmit power can enhance the mixed system’s secrecy performance.
Figure 5 depicts the mixed system’s SOP as a function of the RF link’s Instantaneous SNR λ S R when the optimal user at the source node adopts different values of energy conversion efficiency η . The figure shows that the mixed system’s SOP diminishes as λ S R increases for different values of η . When λ S R = 3 0   dB and η = 0.3, 0.5, 0.7 and 0.9, the mixed system’s SOP are 9.7 × 10 4 , 4.2 × 10 4 , 2.2 × 10 4 and 1.3 × 10 4 , respectively. As the energy conversion efficiency of the optimal user increases, the SOP of the system decreases.
The energy harvesting multi-user source node efficiently converts the relay’s RF energy signal into DC, boosting both the stored energy and interference power of the optimal user relative to the illegal eavesdropper. Consequently, the jamming effect is improved, the communication quality of the illegal eavesdropper deteriorates, and the mixed system’s PLS performance is improved. By improving the optimal user energy conversion efficiency scheme, the collected energy is more stable and that makes the system more secure.
Figure 6 shows the ASC of the mixed RF/FSO system as a function of the instantaneous SNR λ S R of the RF link when the optimal user adopts different time allocation factors ρ . The simulation results show that the ASC of the system increases as λ S R increases. When λ S R = 3 0   dB and ρ = 0.1 , 0.3, 0.5 and 0.7, the ASC values of the system are 1.8957, 1.9088, 1.9242 and 1.9464, respectively. This set of simulation data shows that the ASC of the mixed RF/FSO system can be effectively increased by increasing the time allocation factor ρ . This is because as the time allocation factor ρ increases, the time taken by the relay to transmit the RF energy signal to the optimal user of the source node becomes longer in the first time slot and the RF energy received by the source node increases. The energy stored is higher, and the power of the optimal user to transmit interference signal to the eavesdropper is enhanced at the same time, which increases the interference effect of the optimal user on the illegal eavesdropper. Therefore, the communication quality and the mixed system’s PLS performance are improved.
In Figure 7, the ASC is plotted against the RF link’s instantaneous SNR λ S R in the mixed system, while the eavesdropper experiences varying levels of interference SNR λ J E from the optimal user. Simulation results show an ascending trend of the ASC alongside increasing λ J E . When λ S R = 3 0   dB , λ J E = 2, 3, 6 and 9 dB, the system’s ASC values of 1.95, 1.96, 1.98, and 2.01 support the conclusion that higher interference SNR λ J E from the optimal user boosts the ASC to a certain degree. This affirms that transmitting jamming signals from the optimal user to the eavesdropper enhances the security of the communication system, and higher transmission power bolsters the PLS performance.
The graphic in Figure 8 plots the mixed system’s ASC against the FSO link’s instantaneous SNR λ R D model which is based on the F distribution under the optimal user interference for different turbulence conditions. The figure shows that when λ R D = 30 dB, the ASC of the system is 2.08 in weak turbulence conditions of a = 2.33 and b = 4.53. When a = 1.83 and b = 3.94, the ASC of the system is 2.02. The ASC of the system is 1.94 in the case of strong turbulence with a = 1.43 and b = 3.53. As the atmospheric turbulence intensity increases, the ASC of the system decreases. This shows that the FSO link is sensitive to weather conditions, and a bad weather environment will seriously affect the security performance of the FSO link.

7. Conclusions

In this paper, the PLS performance of a mixed RF/FSO communication system with multi-user SWIPT under optimal user interference was studied. The mixed system’s SOP and ASC were researched theoretically and through simulations, with the derived expressions’ validity verified using the Monte Carlo method. The impacts of the number of jamming antennas, average jamming SNR, energy conversion efficiency, time allocation factor and atmospheric turbulence on the mixed system’s security performance were mainly studied. Simulation results indicated that as the RF link’s instantaneous SNR increased, the system’s SOP gradually decreased while the ASC increased. When the number of antennas from which the optimal user transmitted the interference signals was enlarged, the mixed system’s SOP was reduced. Increasing the number of the optimal user’s jamming antennas could enhance the interference effect and reduce the transmit power of each single antenna, which was an effective scheme to enhance the mixed system’s security performance. When the optimal user interference SNR increased, the mixed system’s SOP decreased and ASC gradually increased. This showed that the interference effect on the eavesdropper could be enhanced by increasing the optimal user interference SNR, which improved the mixed system’s security performance. On the other hand, improving the energy conversion efficiency of the optimal user simultaneously enabled the energy harvesting device to store more energy and increase the power of the interference signal transmitted by the energy harvesting device, which in turn enhanced the secrecy ability of the mixed system. By using the SWIPT technology to adjust the time allocation factor, the optimal user energy harvester could prolong the receiving time of the RF energy signal sent by the relay. This phenomenon increased the energy required by the optimal user to transmit the interference signals to the illegal eavesdropper and enhance the mixed system’s security performance. Additionally, the system’s ASC demonstrates an increase as the FSO link’s instantaneous SNR increases with optimal user interference. Notably, when turbulence factors a, b of the F distribution are adjusted from strong to weak turbulence, the system’s ASC increases, suggesting that improved weather conditions can enhance the PLS performance. It can be seen that the mixed RF/FSO system based on optimal user interference limits the eavesdropping SNR of potential illegal eavesdrops to a large extent, thereby increasing the average security capacity of the mixed system and reducing its security outage probability. This scheme not only improves the communication quality of the mixed system, but also significantly improves the physical layer security of the system, which is of great significance to solve the problem of interception in the mixed system. With the development of science and technology, there may be potential eavesdroppers in the FSO link of mixed system. Therefore, the application of the optimal user jamming scheme into the mixed system with eavesdroppers in both links in the future has important research value to improve the security performance of the system.

Author Contributions

Methodology, Z.S. and J.W.; software, Z.S.; validation, Z.S. and J.W.; formal analysis, Y.W.; writing—original draft preparation, Z.S.; writing—review and editing, Z.S. and Y.W.; supervision, Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Research Fund of State Key Laboratory of Coal Resources and safe Mining, CUMT (SKLCRSM21KF010); the National Natural Science Foundation of China (No. 51704267).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

RF   Radio Frequency
FSO   Free Space Optical
DF   Decode and Forward
5G   5th Generation
SWIPT   Simultaneous Wireless Information and Power Transfer
EGC   Equal Gain Combining
DC   Direct Current
HD   Heterodyne Detection
DD   Direct Detection
SOP   Secrecy Outage Probability
ASC   Average Secrecy Capacity
PLS   Physical Layer Security
SNR   Signal-to-noise Ratio
SINR   Signal Interference to Noise Ratio
CDF   Cumulative Distribution Function
PDF   Probability Density Function

References

  1. Nace, D.; Pióro, M.; Poss, M.; D’Andreagiovanni, F.; Kalesnikau, I.; Shehaj, M.; Tomaszewski, A. An optimization model for robust FSO network dimensioning. Opt. Switch. Netw. 2019, 32, 25–40. [Google Scholar] [CrossRef]
  2. Aliqab, K.; Ali, F.; Armghan, A. Integrated Free-Space Optics and Fiber Optic Network Performance Enhancement for Sustaining 5G High Capacity Communications. Int. J. Opt. 2023, 2023, 8685686. [Google Scholar]
  3. Suman, M.; Yeon Ho, C.; Prasant Kumar, S. On the performance of a hybrid frequency–phase-keying-based MIMO hybrid RF/FSO communication link. J. Opt. Commun. Netw. 2022, 14, 840–851. [Google Scholar]
  4. Pattanayak, D.R.; Dwivedi, V.K.; Karwal, V.; Upadhya, A.; Lei, H.; Singh, G. Secure Transmission for Energy Efficient Parallel Mixed FSO/RF System in Presence of Independent Eavesdroppers. IEEE Photonics J. 2022, 14, 7307714. [Google Scholar] [CrossRef]
  5. Jahid, A.; Alsharif, M.H.; Hall, T.J. A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction. J. Netw. Comput. Appl. 2022, 200, 103311. [Google Scholar] [CrossRef]
  6. Ebrahimi, F.; Ghassemlooy, Z.; Olyaee, S. Investigation of a hybrid OFDM-PWM/PPM visible light communications system. Opt. Commun. 2018, 429, 65–71. [Google Scholar] [CrossRef] [Green Version]
  7. Kaur, P.; Jain, V.K.; Kar, S. Performance Analysis of FSO Array Receivers in Presence of At-mospheric Turbulence. IEEE Photonics Technol. Lett. 2014, 26, 1165–1168. [Google Scholar]
  8. Malik, S.; Sahu, P. Free space optical system design using particle swarm optimization. Int. J. Commun. Syst. 2020, 33, e4452. [Google Scholar] [CrossRef]
  9. Ben Yahia, O.; Erdogan, E.; Kurt, G.K.; Altunbas, I.; Yanikomeroglu, H. A Weather-Dependent Hybrid RF/FSO Satellite Communication for Improved Power Efficiency. IEEE Wirel. Commun. Lett. 2022, 11, 573–577. [Google Scholar] [CrossRef]
  10. Saber, M.J.; Mazloum, J.; Sazdar, A.M.; Keshavarz, A.; Piran, M.J. On Secure Mixed RF-FSO Decode-and-Forward Relaying Systems with Energy Harvesting. IEEE Syst. J. 2020, 14, 4402–4405. [Google Scholar] [CrossRef]
  11. Lei, H.; Dai, Z.; Park, K.-H.; Lei, W.; Pan, G.; Alouini, M.-S. Secrecy Outage Analysis of Mixed RF-FSO Downlink SWIPT Systems. IEEE Trans. Commun. 2018, 66, 6384–6395. [Google Scholar] [CrossRef] [Green Version]
  12. Pattanayak, D.R.; Dwivedi, V.K.; Karwal, V.; Ansari, I.S.; Lei, H.; Alouini, M.-S. On the Physical Layer Security of a Decode and Forward Based Mixed FSO/RF Co-Operative System. IEEE Wirel. Commun. Lett. 2022, 9, 1031–1035. [Google Scholar] [CrossRef] [Green Version]
  13. El-Malek, A.H.A.; Salhab, A.M.; Zummo, S.A.; Alouini, M.-S. Security-Reliability Trade-Off Analysis for Multiuser SIMO Mixed RF/FSO Relay Networks with Opportunistic User Scheduling. IEEE Trans. Wirel. Commun. 2016, 15, 5904–5918. [Google Scholar] [CrossRef]
  14. El-Malek, A.H.A.; Salhab, A.M.; Zummo, S.A.; Alouini, M.-S. Effect of RF Interference on the Security-Reliability Tradeoff Analysis of Multiuser Mixed RF/FSO Relay Networks with Power Allocation. J. Light. Technol. 2017, 35, 1490–1505. [Google Scholar] [CrossRef]
  15. Hu, Z.; Chen, C.; Zhang, Z.; Zhang, H. Secure Cooperative Transmission for Mixed RF/FSO Spectrum Sharing Networks. IEEE Trans. Commun. 2020, 68, 3010–3023. [Google Scholar] [CrossRef]
  16. Yoo, S.K.; Cotton, S.L.; Sofotasios, P.C. The Fisher-Snedecor F distribution: A Simple and Accurate Composite Fading Model. IEEE Commun. Lett. 2017, 21, 1661–1664. [Google Scholar] [CrossRef] [Green Version]
  17. Peppas, K.P.; Alexandropoulos, G.C.; Xenos, E.D.; Maras, A. The Fischer-Snedecor F-Distribution Model for Turbulence-Induced Fading in Free-Space Optical Systems. J. Light. Technol. 2020, 38, 1286–1295. [Google Scholar] [CrossRef]
  18. Shakir, W.M.R.; Alouini, M.-S. Secrecy Performance Analysis of Parallel FSO/mm-wave System Over Unified Fisher-Snedecor Channels. IEEE Photonics J. 2020, 14, 7317013. [Google Scholar] [CrossRef]
  19. Singh, R.; Rawat, M.; Jaiswal, A. On the Physical Layer Security of Mixed FSO-RF SWIPT System with Non-Ideal Power Am-plifier. IEEE Photonics J. 2021, 13, 7300517. [Google Scholar] [CrossRef]
  20. Lei, H.; Luo, H.; Park, K.-H.; Ansari, I.S.; Lei, W.; Pan, G.; Alouini, M.-S. On Secure Mixed RF-FSO Systems with TAS and Imperfect CSI. IEEE Trans. Commun. 2020, 68, 4461–4475. [Google Scholar] [CrossRef] [Green Version]
  21. Odeyemi, K.O.; Pius, O. Security outage performance of partial relay selection in AF mixed RF/FSO system with outdated channel state information. Trans. Emerg. Telecommun. Technol. 2019, 30, e3555. [Google Scholar] [CrossRef]
  22. Wang, Y.; Zhan, Z.; Shen, Z. On Secrecy Performance of SWIPT Energy-Harvesting Relay Jamming Based Mixed RF-FSO Systems. Photonics 2022, 9, 374. [Google Scholar] [CrossRef]
  23. Kang, J.-M.; Kim, I.-M. Optimal User Grouping for Downlink NOMA. IEEE Wirel. Commun. Lett. 2018, 7, 724–727. [Google Scholar] [CrossRef]
  24. Duarte, F.L.; de Lamare, R.C. Cloud-Driven Multi-Way Multiple-Antenna Relay Systems: Joint Detection, Best-User-Link Selection and Analysis. IEEE Trans. Commun. 2020, 68, 3342–3354. [Google Scholar] [CrossRef]
  25. Zhang, X.; Zhou, X.; McKay, M.R. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels. IEEE Trans. Veh. Technol. 2013, 62, 2170–2181. [Google Scholar] [CrossRef]
  26. Yang, F.; Cheng, J.L.; Tsiftsis, T.A. Free-Space Optical Communication with Nonzero Boresight Pointing Errors. IEEE Trans. Commun. 2014, 62, 713–725. [Google Scholar] [CrossRef]
  27. Arezumand, H.; Zamiri-Jafarian, H.; Soleimani-Nasab, E. Exact and Asymptotic Analysis of Partial Relay Selection for Cog-nitive RF-FSO Systems with Non-Zero Boresight Pointing Errors. IEEE Access 2019, 7, 58611–58625. [Google Scholar] [CrossRef]
  28. Ding, J.; Xie, X.; Tan, L.; Ma, J.; Kang, D. Dual-hop RF/FSO systems over -shadowed and fisher-snedecor F fading channels with non-zero boresight pointing errors. J. Light. Technol. 2020, 40, 708–719. [Google Scholar] [CrossRef]
  29. Ashrafzadeh, B.; Soleimani-Nasab, E.; Kamandar, M.; Uysal, M. A Framework on the Performance Analysis of Dual-Hop Mixed FSO-RF Cooperative Systems. IEEE Trans. Commun. 2019, 67, 4939–4954. [Google Scholar] [CrossRef]
  30. Zhang, R.; Ho, C.K. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [Google Scholar] [CrossRef] [Green Version]
  31. Lei, H.; Gao, C.; Guo, Y.; Pan, G. On Physical Layer Security Over Generalized Gamma Fading Channels. IEEE Commun. Lett. 2016, 19, 1257–1260. [Google Scholar] [CrossRef]
  32. Concus, P.; Cassatt, D.; Jaehnig, G.; Melby, E. Tables for the Evaluation of by Gauss-Laguerre Quadrature. Math. Comput. 1963, 17, 245–256. [Google Scholar] [CrossRef] [Green Version]
Figure 1. A multi-user mixed RF/FSO system based on optimal user interference.
Figure 1. A multi-user mixed RF/FSO system based on optimal user interference.
Sensors 23 06523 g001
Figure 2. Time slot switching (TS) protocol for SWIPT.
Figure 2. Time slot switching (TS) protocol for SWIPT.
Sensors 23 06523 g002
Figure 3. Simulation of the SOP and the Instantaneous SNR of RF link for the RF/FSO system with the optimal user’s different numbers of interference antennas N J .
Figure 3. Simulation of the SOP and the Instantaneous SNR of RF link for the RF/FSO system with the optimal user’s different numbers of interference antennas N J .
Sensors 23 06523 g003
Figure 4. Simulation of the SOP and the instantaneous SNR of the RF link of the RF/FSO system under different interference SNR λ J E of the optimal user.
Figure 4. Simulation of the SOP and the instantaneous SNR of the RF link of the RF/FSO system under different interference SNR λ J E of the optimal user.
Sensors 23 06523 g004
Figure 5. Simulation of the security outage probability and the instantaneous signal-to-noise ratio of the RF link in RF/FSO system under different energy conversion efficiency η of the optimal user.
Figure 5. Simulation of the security outage probability and the instantaneous signal-to-noise ratio of the RF link in RF/FSO system under different energy conversion efficiency η of the optimal user.
Sensors 23 06523 g005
Figure 6. Simulation of the average secrecy capacity and the instantaneous SNR of RF link in RF/FSO system when the optimal user uses different time allocation factors ρ .
Figure 6. Simulation of the average secrecy capacity and the instantaneous SNR of RF link in RF/FSO system when the optimal user uses different time allocation factors ρ .
Sensors 23 06523 g006
Figure 7. Simulation of the average secrecy capacity and the instantaneous SNR of the RF link of the RF/FSO system under different interference SNRS λ J E of the optimal user.
Figure 7. Simulation of the average secrecy capacity and the instantaneous SNR of the RF link of the RF/FSO system under different interference SNRS λ J E of the optimal user.
Sensors 23 06523 g007
Figure 8. Simulation of the ASC of the RF/FSO system with different turbulence factors a, b and the instantaneous SNR λ R D of the FSO link under optimal user interference.
Figure 8. Simulation of the ASC of the RF/FSO system with different turbulence factors a, b and the instantaneous SNR λ R D of the FSO link under optimal user interference.
Sensors 23 06523 g008
Table 1. Selection of simulation parameters for the mixed RF/FSO system.
Table 1. Selection of simulation parameters for the mixed RF/FSO system.
System ParametersSymbolValueSystem ParametersSymbolValue
Laser wavelength λ 785 nmLink distance per hopd100 m
Weak turbulence positive parametera2.33Weak turbulence fading parametersb4.53
Medium turbulence positive parametera1.83Medium turbulence fading parametersb3.94
Strong turbulence positive parametera1.43Strong turbulence fading parametersb3.53
Electro-optic conversion efficiency ω 0.8 target secrecy rate R S 0.01 nat/s
atmospheric refractive index structure constant C n 2 10 11   m 2 / 3 Energy conversion efficiency η 0.8
Time switching factor ρ 0.8 the instantaneous SNR of the FSO link γ R D 20 dB
the instantaneous SNR of the RF link γ S R 15 dBNumber of interfering antennas N J 2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shen, Z.; Wang, Y.; Wu, J. Physical Layer Security Performance of Multi-User Mixed Radio-Frequency/Free-Space-Optics System Based on Optimal User Interference. Sensors 2023, 23, 6523. https://doi.org/10.3390/s23146523

AMA Style

Shen Z, Wang Y, Wu J. Physical Layer Security Performance of Multi-User Mixed Radio-Frequency/Free-Space-Optics System Based on Optimal User Interference. Sensors. 2023; 23(14):6523. https://doi.org/10.3390/s23146523

Chicago/Turabian Style

Shen, Zihe, Yi Wang, and Jiamin Wu. 2023. "Physical Layer Security Performance of Multi-User Mixed Radio-Frequency/Free-Space-Optics System Based on Optimal User Interference" Sensors 23, no. 14: 6523. https://doi.org/10.3390/s23146523

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop