1. Introduction
The rapid scientific and technological development, and the growing network demand are overwhelming the radio frequency spectrum resources. Compared with traditional radio frequency (RF) communication, FSO (Free Space Optics) is a well-established wireless optical transmission technology. FSO communication has attracted a lot of interest as a potential solution to the short-range 5G wireless communication problem [
1,
2]. FSO communication has the advantages of being license-free and highly secure, as well as a low deployment cost and high traffic rate transmission, which is often used to solve the “last-kilometer” problem [
3,
4]. FSO provides a wide range of applications in outdoor and indoor services, for example, wireless video surveillance, data centers, terrestrial transmission, LAN connectivity, mobile cellular networks, last-mile solutions, space communications, radio astronomy, remote sensing, etc. [
5,
6]. However, FSO links are easily affected by directional errors, weather conditions, atmospheric turbulence and other factors, resulting in reduced communication quality or even interruption of communication. Therefore, although it has strong directivity and high security, it is not suitable for long-distance communication [
7,
8].
RF and FSO communication have their own advantages and disadvantages. Therefore, there are many technologies proposed to solve these problems. Using both RF and FSO technology is a very effective solution. This combination includes two possible configurations. The first one is the hybrid RF/FSO, in which an RF link is incorporated in parallel with an FSO link. The second combination is the mixed RF/FSO communication, in which RF communication is used at one hop and FSO communication at the other in dual-hop or relay-assisted networks [
9]. We choose the mixed RF/FSO communication system to solve the aforementioned problems. The combination of RF communication reliability and FSO communication security under bad weather conditions can lead to better safety communication and also extend the information transmission distance [
10]. The RF communication can be an easy target of eavesdropping by illegal eavesdroppers, because the RF link in the mixed communication system is a broadcast link. This problem seriously affects the security performance of the communication system; therefore, we further consider the mixed system’s physical layer security (PLS) performance. Secure communication can be achieved by just using the physical characteristics of wireless channels because the PLS does not need to rely on an enciphering algorithm. The PLS also has a low rate of complexity. Therefore, the mixed RF/FSO system’s PLS has received a significant amount of attention [
11,
12].
Compared with a single user, multiple users are usually more suitable for practical communication scenarios. The multiple users can improve the system throughput fault tolerance and reliability of RF links. For example, El-Malek et al. studied a multi-user mixed RF/FSO link model with a single input and multiple outputs. In particular, the FSO link is based on the Gamma–Gamma distribution, and the maximum proportional combination and selective combination schemes are used in the multi-antenna repeater, where the system selects the worst user to interfere with the eavesdropper [
13]. The authors also studied the influence of RF channel co-frequency interference on the security performance of multi-user mixed RF/FSO communication systems under eavesdropping attack conditions [
14]. Hu et al. studied the optimization problem based on the secrecy rate in multi-user mixed RF/FSO spectrum sharing networks [
15].
The aforementioned studies are the only ones that consider multiple users in the PLS of mixed RF/FSO communication systems. The optimal user transmission and worst user interference schemes are used in these studies. The optimal user transmission is actually a single user transmission scheme, which can be easily affected by the external electromagnetic wave interference and the co-channel interference. The worst user cooperative jamming scheme has certain limitations, because it is limited by the transmitting power of the worst user and, therefore, the interference SNR is low and the interference effect on eavesdroppers is not obvious.
The Gamma–Gamma distribution is used for the FSO links in the above security performance studies of the mixed RF/FSO communication system with multi-user diversity. This distribution is mainly applicable to moderate and strong turbulence in the FSO link. Recently, an increasing amount of attention has been paid to the
distribution [
16]. Peppas et al. proposed to use the
distribution to simulate the atmospheric turbulence on the FSO links. The results showed that the
distribution was more suitable for FSO fading models under all turbulence conditions, and the simulated experimental data matched closely with those in the actual communication scenario [
17].
The
distribution is used to simulate the FSO link fading. Compared with the Gamma–Gamma and M distributions, it is more suitable for all turbulence conditions and has a higher computational efficiency. Furthermore, the experimental data are more suitable for actual communication scenarios; therefore, the
distribution can be used to evaluate the performance of communication systems [
18].
The above research does not consider the optimal user jamming scheme when studying the multi-user mixed system, which has some limitations on the interference of eavesdroppers. There is also no literature on the application of distribution to FSO links to study the physical layer security performance of mixed systems. In recent years, it is found that the simulation results of FSO link fading using F-distribution have a good fit compared with the experimental data.
To overcome the limitations of the existing techniques, this paper presents a multi-user mixed RF/FSO system with optimal user interference. The RF link experiences the Rayleigh fading distribution and the FSO link experiences the fading distribution. SWIPT and multiple users are considered in the system. Optimal user interference, equal-gain-combining (EGC) receiving and decode-and-forward (DF) relaying schemes are invoked. In the first place, the probability density function (PDF) and cumulative distribution function (CDF) of the signal-to-interference noise ratio (SINR) of eavesdroppers under interference signals are studied, in which the interference signal is transmitted by the optimal user. Second, we obtain a unified CDF based on the system signal-to-noise ratio (SNR) of the DF trunking scheme. Based on CDF, we derive closed-form formulas for the mixed system’s SOP and ASC under the help of the Meijer G-function and the generalized Laguerre integration method, which are verified by Monte Carlo simulation. Through simulation, we analyzed the impact of factors such as the optimal number of interference-transmitting antennas, average interference SNR, energy conversion efficiency, time allocation factor, and atmospheric turbulence on the system’s safety performance.
2. System Model
Figure 1 shows a multi-user mixed RF/FSO system based on the optimal user interference. The system contains a multi-user source node
(
), a single-input-and-single-output relay (R), a legitimate destination receiving user with a single receive antenna (D) and an illegal eavesdropper (E). The RF link experiences the Rayleigh fading distribution and the FSO link experiences the
fading distribution. The source node adopts the SWIPT technology and multi-user scheduling scheme and is equipped with an energy harvesting device. The source node utilizes the optimal user to transmit jamming signals to the illegal eavesdropper.
Figure 2 is a schematic diagram of the time slot switching protocol for SWIPT, where
and T are the time switching factor and the time period of the time slot switching protocol, respectively. The relay device first transmits the RF energy signal to the source node multi-user in the first time slot
and the multi-user source node equipped with the energy harvesting device recognizes the received energy signal and stores it [
19]. In the remaining time slot
, the optimal user of the source node transmits interference signals to the eavesdropper, and the relay receives signals sent by other users of the source node with the EGC technology.
In the energy harvesting phase, the relay node
sends a radio signal
with a power of
, which is transmitted to each user
at the transmitter through the channel of
. The RF energy signal received by each user
on the source node can be expressed as follows [
20]:
where
and
are the transmitted power and normalized signal of the relay node, respectively,
is the channel coefficient between the users of the relay
and the source node,
represents the distance between R and
,
is the path loss index, and
represents the additive white Gaussian noise with zero mean and variance
at each user. According to (1), it can be gathered from [
21] that when noise influence is ignored, the energy stored by each user can be expressed as
where
is the energy conversion efficiency of the source node corresponding to the conversion of the RF signal into direct current (DC).
Defining the optimal user as
, the RF signal received by it from the relay can be expressed as
where
and
denote the channel coefficient between the relay
and the optimal user
, respectively, and
denotes the additive white Gaussian noise with zero mean and variance
at the optimal user.
The energy received by the optimal user
is expressed as [
22]
The signal received by the relay after EGC is expressed as follows:
where
and
denote the SNR and additive white Gaussian noise at each branch, respectively.
As the optimal user at the source node has multiple RF transmit antennas, it generates a matrix
with an orthogonal basis of null space
using the artificial interference generation method in [
23]. The
vector has
independent and identically distributed complex Gaussian random elements with a normalized variance. Subsequently, the optimal user of the source node sends
as the interference signal. When the number of the optimal user’s interference transmit antennas is greater than 1, interference signals that are transmitted into the null space will not affect the main signal, as the null space is defined as the orthogonal complement of the signal space. Under the effect of the jamming signal transmitted by the optimal user, the received signal at the illegal eavesdropper can be expressed as
where
is the channel coefficient between the source
and the eavesdropper E, and
expresses the additive white Gaussian noise with zero mean and variance
at the illegal eavesdropper node.
2.1. RF Channel Model
The jamming signal is designed in such a way that it will only affect the illegal eavesdropper without degrading the quality of the main transmission. When communicating, the signal interference to noise ratio (SINR) of the illegal eavesdropper can be written as follows:
where
,
=
.
The RF links between source and relay obey the Rayleigh fading. The Instantaneous SNR
’s PDF and CDF at the RF link can be mathematically expressed as the following formula:
where
, and
and
represent the average power channel gain between the corresponding RF channels, respectively.
It is known from [
24] that the CDF of the optimal user is
Using (9) and (10), the CDF of the instantaneous SNR of the optimal user interference
is obtained as follows:
Calculating the corresponding derivative of (11) gives the PDF of the instantaneous interference SNR of the optimal user as
where
is the average power channel gain between the optimal user
and the illegal eavesdropper E, and
.
The CDF of the instantaneous SNR
can be obtained using (7)–(9) and (12) as follows [
25]:
Applying the derivative operation to the CDF represented by (13), the corresponding PDF is obtained as
2.2. FSO Channel Model
The optical signal received by the target node from the relay through the FSO link can be represented as [
26,
27]:
where
represents the electro-optical conversion efficiency, and G represents the gain factor. The value of r represents the type of detection method (r = 1: heterodyne detection (HD); r = 2: direct detection (DD)),
indicating the signal received by the source node.
represents the channel coefficient of the FSO link and
represents the zero-mean AWGN with variance
.
The PDF and CDF of the FSO fading channel are expressed as follows [
28]:
where
is the average telecom noise ratio, r = 1 represents the heterodyne detection (HD), and r = 2 represents the direct detection (DD).
In the above expressions, is related to the equivalent beam width , and a and b denote the turbulence parameters. The value of increases as the pointing error decreases. When there is no pointing error, .
6. Results and Analysis
In this part, the simulation data of the multi-user mixed RF/FSO system under diverse parameters with optimal user interference are presented. Monte Carlo simulations verify the numerical results’ accuracy. The FSO link distance is 100 m and the wavelength is 785 nm, the optical wave number
;
is the atmospheric refractive index structure constant of medium turbulence, and the target secrecy rate
. Furthermore, the Instantaneous SNR of the FSO link is
, the instantaneous SNR of the RF link is
, and the instantaneous SNR of the eavesdropping link is
. On the RF link,
, and
. The other parameters are
,
,
,
,
,
, and
. The specific simulation parameters are shown in
Table 1.
The above parameter values are used in the following simulations. When the generalized Laguerre orthogonal numerical integration method is used, j is considered as 30 in order to make the series converge. The Monte Carlo simulation results confirm the validity of the analytical expressions. The numerical and simulation results are in good agreement, which verifies the accuracy of the proposed expressions.
Figure 3 shows the mixed system’s SOP as a function of the variation of the RF link’s Instantaneous SNR
for diverse numbers of the optimal user’s interfering antennas. It can be known that the mixed system’s SOP with different number of interfering antennas
decreases as the
increases. When
and
and 8, the mixed system’s SOP are
,
,
and
, respectively. This set of simulation data shows the mixed system’s SOP decreases as the number of interfering antennas of the optimal user increases. Therefore, it can be gathered that the mixed system’s security performance could be effectively enhanced by enlarging the optimal user interference antennas’ number at the source node.
As the spatial degree of freedom of the optimal user increases with an increase in the number of optimal user interference antennas, the eavesdropping channel quality degrades based on its state information at the eavesdropping node. For the same value of SOP, increasing the optimal user’s number of jamming antennas results in lower transmission power for each antenna in the scheme. In addition, the cost of increasing the antennas’ number is lower than that of adding jammers outside the mixed RF/FSO system. Increasing the number of jamming antennas provides a good schedule for the design of the optimal user transmitting jamming signals and reducing the power consumption of the source node.
The relationship between the SOP and the RF link’s instantaneous SNR
in a mixed RF/FSO system is shown in
Figure 4. The system is based on multi-user SWIPT, and the illegal eavesdropper experiences interference from the optimal user. Based on the simulation results, increasing
reduces the SOP of the system in a gradual manner. When
and
2, 4, 6 and 8 dB, the mixed system’s SOP are
,
,
and
. Based on the findings, increasing
decreases the system’s SOP, indicating that the optimal user’s jamming signal to the eavesdropper improves PLS performance in the mixed system. Increasing the interference SNR of the optimal user can reduce eavesdropping channel quality, but it is restricted by transmission power. Thus, introducing optimal user interference and selecting appropriate transmit power can enhance the mixed system’s secrecy performance.
Figure 5 depicts the mixed system’s SOP as a function of the RF link’s Instantaneous SNR
when the optimal user at the source node adopts different values of energy conversion efficiency
. The figure shows that the mixed system’s SOP diminishes as
increases for different values of
. When
and
= 0.3, 0.5, 0.7 and 0.9, the mixed system’s SOP are
,
,
and
, respectively. As the energy conversion efficiency of the optimal user increases, the SOP of the system decreases.
The energy harvesting multi-user source node efficiently converts the relay’s RF energy signal into DC, boosting both the stored energy and interference power of the optimal user relative to the illegal eavesdropper. Consequently, the jamming effect is improved, the communication quality of the illegal eavesdropper deteriorates, and the mixed system’s PLS performance is improved. By improving the optimal user energy conversion efficiency scheme, the collected energy is more stable and that makes the system more secure.
Figure 6 shows the ASC of the mixed RF/FSO system as a function of the instantaneous SNR
of the RF link when the optimal user adopts different time allocation factors
. The simulation results show that the ASC of the system increases as
increases. When
and
, 0.3, 0.5 and 0.7, the ASC values of the system are 1.8957, 1.9088, 1.9242 and 1.9464, respectively. This set of simulation data shows that the ASC of the mixed RF/FSO system can be effectively increased by increasing the time allocation factor
. This is because as the time allocation factor
increases, the time taken by the relay to transmit the RF energy signal to the optimal user of the source node becomes longer in the first time slot and the RF energy received by the source node increases. The energy stored is higher, and the power of the optimal user to transmit interference signal to the eavesdropper is enhanced at the same time, which increases the interference effect of the optimal user on the illegal eavesdropper. Therefore, the communication quality and the mixed system’s PLS performance are improved.
In
Figure 7, the ASC is plotted against the RF link’s instantaneous SNR
in the mixed system, while the eavesdropper experiences varying levels of interference SNR
from the optimal user. Simulation results show an ascending trend of the ASC alongside increasing
. When
,
2, 3, 6 and 9 dB, the system’s ASC values of 1.95, 1.96, 1.98, and 2.01 support the conclusion that higher interference SNR
from the optimal user boosts the ASC to a certain degree. This affirms that transmitting jamming signals from the optimal user to the eavesdropper enhances the security of the communication system, and higher transmission power bolsters the PLS performance.
The graphic in
Figure 8 plots the mixed system’s ASC against the FSO link’s instantaneous SNR
model which is based on the
distribution under the optimal user interference for different turbulence conditions. The figure shows that when
= 30 dB, the ASC of the system is 2.08 in weak turbulence conditions of a = 2.33 and b = 4.53. When a = 1.83 and b = 3.94, the ASC of the system is 2.02. The ASC of the system is 1.94 in the case of strong turbulence with a = 1.43 and b = 3.53. As the atmospheric turbulence intensity increases, the ASC of the system decreases. This shows that the FSO link is sensitive to weather conditions, and a bad weather environment will seriously affect the security performance of the FSO link.
7. Conclusions
In this paper, the PLS performance of a mixed RF/FSO communication system with multi-user SWIPT under optimal user interference was studied. The mixed system’s SOP and ASC were researched theoretically and through simulations, with the derived expressions’ validity verified using the Monte Carlo method. The impacts of the number of jamming antennas, average jamming SNR, energy conversion efficiency, time allocation factor and atmospheric turbulence on the mixed system’s security performance were mainly studied. Simulation results indicated that as the RF link’s instantaneous SNR increased, the system’s SOP gradually decreased while the ASC increased. When the number of antennas from which the optimal user transmitted the interference signals was enlarged, the mixed system’s SOP was reduced. Increasing the number of the optimal user’s jamming antennas could enhance the interference effect and reduce the transmit power of each single antenna, which was an effective scheme to enhance the mixed system’s security performance. When the optimal user interference SNR increased, the mixed system’s SOP decreased and ASC gradually increased. This showed that the interference effect on the eavesdropper could be enhanced by increasing the optimal user interference SNR, which improved the mixed system’s security performance. On the other hand, improving the energy conversion efficiency of the optimal user simultaneously enabled the energy harvesting device to store more energy and increase the power of the interference signal transmitted by the energy harvesting device, which in turn enhanced the secrecy ability of the mixed system. By using the SWIPT technology to adjust the time allocation factor, the optimal user energy harvester could prolong the receiving time of the RF energy signal sent by the relay. This phenomenon increased the energy required by the optimal user to transmit the interference signals to the illegal eavesdropper and enhance the mixed system’s security performance. Additionally, the system’s ASC demonstrates an increase as the FSO link’s instantaneous SNR increases with optimal user interference. Notably, when turbulence factors a, b of the distribution are adjusted from strong to weak turbulence, the system’s ASC increases, suggesting that improved weather conditions can enhance the PLS performance. It can be seen that the mixed RF/FSO system based on optimal user interference limits the eavesdropping SNR of potential illegal eavesdrops to a large extent, thereby increasing the average security capacity of the mixed system and reducing its security outage probability. This scheme not only improves the communication quality of the mixed system, but also significantly improves the physical layer security of the system, which is of great significance to solve the problem of interception in the mixed system. With the development of science and technology, there may be potential eavesdroppers in the FSO link of mixed system. Therefore, the application of the optimal user jamming scheme into the mixed system with eavesdroppers in both links in the future has important research value to improve the security performance of the system.