Next Article in Journal
Anchor-Free Object Detection with Scale-Aware Networks for Autonomous Driving
Previous Article in Journal
A Comparative Analysis of Bias Amplification in Graph Neural Network Approaches for Recommender Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Secrecy Performance of a Dual-Hop UAV-Assisted Relaying Network with Randomly Distributed Non-Colluding Eavesdroppers: A Stochastic Geometry Approach

by
Kehinde Oluwasesan Odeyemi
1,*,
Pius Adewale Owolawi
2 and
Oladayo Olufemi Olakanmi
1
1
Department of Electrical and Electronic Engineering, Faculty of Technology, University of Ibadan, Ibadan 200132, Nigeria
2
Department of Computer Systems Engineering, Tshwane University of Technology, Pretoria 0001, South Africa
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(20), 3302; https://doi.org/10.3390/electronics11203302
Submission received: 25 September 2022 / Revised: 7 October 2022 / Accepted: 11 October 2022 / Published: 13 October 2022

Abstract

:
Unmanned aerial vehicle (UAV)-based relaying has been considered to offer an excellent performance due to its flexible mobility, on-demand deployment, and cost effectiveness compared to conventional ground-relaying methods. This paper studies the secrecy performance of a dual-hop UAV-assisted relay network, where the base station communicates with the ground user via a low altitude UAV in the presence of randomly distributed eavesdroppers. A stochastic geometric approach is employed to model the spatial locations of the ground user and the eavesdroppers which follows a Homogeneous Poisson Point Process (HPPP). Based on this theory, cumulative distribution functions (CDF) of the ground user and the eavesdroppers are obtained. Considering the decode-and-forward (DF) relay protocol, the CDF equivalent end-to-end instantaneous signal-to-noise ratio (SNR) of the network is derived. To characterize the network secrecy performance, the exact analytical expressions for the network security outage probability (SOP), the strictly positive secrecy capacity (SPSC), and the average secrecy capacity (ASC) are derived. Moreover, a Monte-Carlo simulation is provided to show the accuracy of the derived analytical expressions. The results depict that both the network and channel parameters that include the fading parameter, the density of the eavesdroppers, the average SNR of the B-to-U link, the average SNR of the U-to-E link, the UAV altitude, and the coverage radius have a significant influence on the network secrecy performance.

1. Introduction

1.1. Background Information

Wireless transmission in some special scenarios such as those encountered in urban areas, remote areas, and disaster environments is highly challenging as a result of long distance and obstacles that make it difficult to establish a line-of-sight (LoS) between the source and destination. Under this circumstance, satellite communication has been suggested as a promising solution to provide wireless services due to its ability to offer long distance transmission and a wide coverage [1]. However, the high cost of the deployment of a satellite hinders its wide employment in civil communications [2]. As a results of this, unmanned aerial vehicles (UAVs) have recently attracted significant research attention since they can improve the reliability of communication systems by acting as flying wireless access platforms or relays [3]. Compared to conventional fixed terrestrial relays, a UAV-based relay can significantly overcome the coverage problems and adjust its position to accommodate changes in communication environments [4,5]. Owing to their flexible mobility, easy deployment, fast networking, and cost effectiveness, UAVs have the potential to enable connectivity during temporary events and after disasters [6]. Moreover, they have also found applications in weather-monitoring systems, forest fire prevention technology, cargo delivery, aerial cameras, and so on.
Despite the great benefits of UAV-relay technology, a UAV relay network is highly susceptible to wiretapping from eavesdroppers due to the inherent open medium and broadcasting features of wireless channels [7]. To guarantee the security of the network, a physical layer security technique has been suggested as a promising solution to complement and/or replace the conventional upper layer cryptography. This is because the advancement in computation resources has enabled the eavesdroppers to generate secret keys to decode encrypted information [8]. Therefore, a physical layer security technique can enhance the security of wireless transmissions by exploiting the wireless channel’s characteristics such as fading, interference, and noise to prevent the eavesdroppers from intercepting the network’s confidential information [9].

1.2. Prior Work

Consequently, the utilization of a UAV as a relay node to enhance the performance of wireless communication networks has been widely studied in the literature. The outage performance of a UAV-based relaying system was studied in [10] with energy-harvesting functionality in an urban environment. In [2], the authors presented the outage performance of a dual-hop UAV-relaying network with multiple sources and the destination was assumed to experience co-channel interference. Moreover, the performance of a multiple UAV-relay-assisted network in an internet of things system with energy harvesting applied was evaluated in [11], where the destination was subjected to co-channel interference. Alkama et al. [12] presented the analytical framework to analyze the coverage and capacity of a UAV-assisted network with 3D beamforming through the stochastic cellular network. In addition, the performance analysis of a UAV-assisted cellular network over a Nakagami-m channel with imperfect beam alignment was evaluated in [13]. In addition, the performance of a reconfigurable intelligent surface UAV-assisted dual-hop system was studied in [14] under the DF relaying protocol. Furthermore, the authors of [15] presented a UAV-based relay network with multiple ground users where the opportunistic user scheduling was employed over a Rician fading channel. In [16], the authors investigated the performance of a hybrid satellite/UAV terrestrial non-orthogonal multiple access (NOMA) network, where a satellite aims to communicate with ground users with the aid of a DF UAV relay. Under the influence of hardware impairments, the performance of a UAV-aided-relaying system was studied in [17] based on an amplified and forward (AF) relaying protocol. In addition, the authors of [18] evaluated the performance of a UAV-relaying-assisted wireless network by considering different energy-harvesting techniques for UAVs. Ajam et al. [19] presented the ergodic sum rate analysis of a UAV-based communication system with mixed radio frequency(RF)/free space optics (FSO) channels. In addition, the authors in [20] studied the outage performance of a UAV-based relay in FSO downlink satellite systems under the effect of hovering fluctuation of the links. However, in all these works on the UAV-assisted-relaying network, the physical layer’s security performance was not considered. More recently, the research studies on the security performance of UAV-assisted-relaying networks are gaining more attention in the research community. The security performance of UAV-enabled-relaying NOMA systems under the presence of an eavesdropper was presented in [21]. Furthermore, the secrecy performance of a low altitude UAV-enabled AF relaying network was presented in [22], where a cooperative jammer was adopted to secure the network. The authors of [23] investigated the security of a ground-wiretapped channel for which a UAV was employed to transmit a jammer signal.

1.3. Motivations and Contribution

As stated above, physical layer security has been studied in various UAV-assisted relay communication networks; however, none of the works have considered the spatial locations of the users and eavesdroppers, which motivates the current contribution. In this case, a stochastic geometry theory is employed as a suitable statistical description for the positions of the users and eavesdroppers in the network. This is because the locations of nodes can be treated as completely random according to an HPPP model. In this paper, the secrecy performance of a dual-hop UAV-assisted-relaying network is studied under the presence of randomly distributed non-colluding eavesdroppers. The spatial positions of both the ground user and eavesdroppers follow the HPPP and are modelled by the stochastic geometry approach. It is assumed that the base station to the UAV link follows a Nakagami-m distribution. In addition, the UAV’s connection to the ground user and eavesdroppers follows Rician and Rayleigh fading distributions, respectively. Through this, the CDF of the ground user and the eavesdroppers are derived. Based on these distributions, the network CDF equivalent end-to-end SNR is derived for the proposed network. Thus, the network’s SOP, SPSC, and ASC are obtained to quantify the secrecy performance of the network. The main contributions of this work are summarized as follows:
  • The CDF of the UAV with respect to the user and the eavesdroppers’ link are obtained through the stochastic geometric approach.
  • The network CDF equivalent end-to-end SNR is derived via the DF relaying protocol.
  • The analytical closed-form expressions of the security outage probability and strictly positive secrecy capacity (SPSC) at a lower bound are obtained for the proposed network.
  • The exact closed-form expression of the average secrecy capacity is derived for the proposed network.
  • With respect to [4], where the secrecy performance of a UAV-assisted-relaying network was studied under the presence of a single eavesdropper, the position of both the ground user and the eavesdropper were not considered. In this paper, the locations of nodes in the network are modeled through a stochastic geometric approach and multiple eavesdroppers are considered.
The rest of this paper is organized as follows. Section 2 illustrates the network description and channels’ model. In Section 3, the CDF equivalent end-to-end SNR for the network is presented based on a stochastic geometry approach. In Section 4, we conduct the secrecy performance analysis of the network. Numerical results and a discussion are detailed in Section 5; finally, conclusions are drawn in Section 6.

2. Network Description and Channels Model

The network scenario presented in this paper is based on a dual-hop cooperative network where a DF-UAV acts as a relay node between the base station (BS) and the ground user (D) under the presence of randomly distributed eavesdroppers (E), as demonstrated in Figure 1. The UAV is located at a constant height h u with a coverage radius R wherein the ground user is positioned. In addition, a number of randomly distributed non-colluding eavesdroppers are positioned across the infinite two-dimensional plane with powerful capacities to detect and decode the network’s confidential information. Owning to natural or man-made obstacles such as mountains or high buildings, the wireless link between the BS and the ground user is assumed to be negligible. Thus, it is assumed that the BS-to-UAV link and eavesdroppers-to-UAV link follow the Nakagami-m and Rayleigh fading distributions, respectively, while the UAV-to-user link experiences Rician fading distributions. The spatial positions of the ground user and the eavesdroppers are modeled using the HPPP model. Thus, the overall communication takes place in two phases for the base station to transmit its information to the ground user.

2.1. Base Station-to-UAV Link

During the first phase, the base station transmits its information to the UAV and the received signal at the UAV can be defined as:
y B U = P B g B U x B + n B U  
where P B denotes the base station’s transmission power, g B U is the B-to-UAV channel coefficient and is modeled by using the Nakagami-m fading distribution, x B signifies the BS information transmitted to the UAV, and n B U indicates the additive white Gaussian noise (AWGN) with zero mean and variance σ 2 . Thus, the instantaneous SNR of the link can be obtained as:
γ B U = P B g B U 2 σ 2 = γ ¯ B U g B U 2
where γ ¯ B U = P s / σ 2 denotes the average SNR of the link. The channel coefficient g B U is assumed to follow the Nakagami-m fading distribution, and the probability distribution function (PDF) of f γ B U can be expressed as [8]:
f γ B U γ = γ m s 1 Γ m s ψ m s exp γ ψ
where ψ = γ ¯ S R / m s in which m s denotes the fading parameter of the base station-to-UAV link. In addition, the CDF of F γ B U for the link can be defined as:
F γ B U γ = 1 exp γ ψ n = 0 m s 1 γ n ψ n n !

2.2. UAV-to-User and Eavesdroppers’ Links

In the course of the second hop, the UAV decodes and forwards the source information to the ground user. The signal received by the ground user can be expressed as:
y U D = P U g U D x U + n U D
where P U is the UAV’s transmission power; g U D is the channel coefficient of the UAV-to destination link, which is model by using the Rician fading distribution; x U denotes the information transmitted by the UAV to the ground user; and n U D represents the AWGN with zero mean and variance σ 2 . During this time, the eavesdroppers thus attempt to intercept the UAV signal and the received signal at the i - t h eavesdropper can be expressed as:
y U E i = P U g U E i x U + n U E i
where g U E i is the channel-fading coefficient of the UAV-to-eavesdroppers links, and n U E i denotes the AWGN at the eavesdroppers with zero mean and variance σ 2 . The instantaneous SNR of the ground user can thus be expressed as:
γ U D = P u g U D 2 σ 2 d U D α g = γ ¯ U D g U D 2  
where γ ¯ U D = P u / σ 2 d U D α g is the average SNR of the link, in which d U D represents the distance between the ground user and the UAV and α g represents the path loss factor of the UAV-to-ground link. With the coordinates of the ground user and the UAV given as x U D , y U D , h u and 0 , 0 , h u , respectively, the distance d U D can be expressed as:
d U D = x U D 2 + y U D 2 + h u 2  
Since non-colluding eavesdroppers are considered in this paper, the instantaneous SNR of the eavesdroppers can be expressed as:
γ U E = γ ¯ U E max E ϵ Φ e g U E i 2  
where γ ¯ U E = P u / σ 2 is the average SNR of the link.
To achieve a better network performance, it is assumed that there is a LoS between the UAV and the ground user. Thus, the Rican fading distribution is considered to model the channel coefficient g U D and the PDF of f γ U D can be expressed as [10,14,24]:
f γ U D γ = ξ exp K exp ξ γ I o K ξ γ  
where ξ = d S U α g K + 1 / γ ¯ R D , while K denotes the Rician fading factor model as a function of the angle θ between the UAV and the ground user. Based on [25], it follows that K θ = a 2 exp b 2 θ , where a 2 = K 0 and b 2 = 2 π l n K 2 / π / K 0 . In addition, the CDF of F γ U D for the link can be expressed as:
F γ U D γ = 1 exp K p = 0 q = 0 p K p ξ q p ! q ! γ q exp ξ γ
Furthermore, the channel-fading coefficient g U E i for the UAV-to-eavesdroppers is assumed to follow Rayleigh fading distributions and the CDF of F γ U E γ can be expressed as [26]:
F γ U E γ = 1 exp γ γ ¯ U E i  

3. Statistical Characteristics of Equivalent SNR

Owing to the spatial location of the ground user and the eavesdroppers, the stochastic geometry approach is applied to describe their locations in a particular environment. Therefore, based on this theory, new channel statistics are derived for the user and the eavesdroppers in order to obtain the network’s CDF equivalent end-to-end SNR. In this case, the distribution of the ground user is modeled by HPPP D , which provides information about the user position w D , and the corresponding PDF can be defined as [27]:
f w D w D = 1 π R 2  
Hence, the CDF of g U D 2 can be expressed as:
F ¯ γ U D γ = U   1 p = 0 q = 0 p K p ξ q γ q 1 + r α g q exp K p ! q ! exp ξ γ 1 + r α g f w D w D d w D
1 2 R 2 0 R exp K p = 0 q = 0 p K p ξ q p ! q ! γ q r 1 + r α g q exp ξ γ 1 + r α g d r
Based on the binomial expansion given in ([28], Equation (1.111)), 1 + r α g q = t = 0 q q t r q α g ; therefore, (14) can be further expressed as:
F ¯ γ U D γ = 1 2 R 2 exp K p = 0 q = 0 p t = 0 q q t K p ξ q p ! q ! exp ξ γ γ q 0 R r q α g + 1 exp ξ γ r α g d r  
By applying (3.381.8) of [28], the CDF in (15) can be solved as:
F ¯ γ U D γ = 1 2 R 2 exp K p = 0 q = 0 p t = 0 q q t K p ξ q λ p ! q ! α g exp ξ γ γ q λ Υ λ , ξ γ R α g
where λ = α g q + 2 / α g and Υ . , . denotes the lower incomplete Gamma function.
Similarly, the eavesdroppers are distributed according to the independent HPPP Φ e with a density ρ e ; the CDF of g U E 2 can be expressed as:
F ¯ γ U E γ = Ε Φ e i ϵ Φ e F U E i γ  
By applying a probability-generating function for the HPPP Φ e , the CDF can be expressed as:
F ¯ γ U E γ = exp R 2   1 F U E γ r d r
By placing (12) into (18), (18) can be expressed as:
F ¯ γ U E γ = exp 2 π ρ e 0 r exp γ γ ¯ U E r α g d r  
By utilizing the (3.325.2) of [28] given as 0 x j exp τ x t = Γ Ε / t τ Ε with Ε = j + 1 / t , Equation (19) can be solved as:
F ¯ γ U E γ = exp η e γ β
where η e = 2 π ρ e α g γ ¯ U E β Γ β , β = 2 / α g and Γ . denotes the Gamma function.
In addition, the PDF of the link can be obtained by determining the derivative of the CDF given in (20) as:
f ¯ γ U E γ = d F ¯ U E γ d γ
β η e exp η e γ β γ β 1  
Thus, the CDF equivalent end-to-end SNR of the ground user for the proposed network can be defined as [29,30]:
  F γ e q γ = F γ B U γ + F ¯ γ U D γ F γ B U γ F ¯ γ U D γ
By putting (4) and (16) into (22), the equivalent end-to-end SNR can be obtained as:
F γ e q γ = 1 2 exp K R 2 p = 0 q = 0 p t = 0 q n = 0 m 1 q t K p ξ q λ p ! q ! n ! α g ψ n × exp 1 + ξ ψ ψ γ γ q + n λ Υ λ , ξ γ R α g

4. Secrecy Performance Analysis

In this section, the secrecy performance of the proposed network is characterized in terms of the SOP, SPSC, and ASC. Thus, the closed expressions for each are obtained through the CDF equivalent end-to-end SNR.

4.1. Secrecy Outage Probability (SOP)

In a wireless network, perfect secrecy is obtainable only if the value of the instantaneous secrecy capacity C s is higher than the predetermined threshold secrecy rate R s ; otherwise, an outage occurs. Thus, the lower bound SOP expression for the network can be defined as [31,32]:
S O P = 0 F e q γ φ f ¯ E U γ d γ  
where φ = exp R s .
By putting (23) and (21) into (24), the SOP of the system can be defined as:
S O P = 1 2 β η e exp K R 2 p = 0 q = 0 p t q n = 0 m s 1 q t K p ξ q λ φ q + n + z p ! q ! n ! α g ψ n
× 0 γ q + n λ β 1 exp η e γ β exp 1 + ξ ψ ψ φ γ Υ λ , ξ γ R α g d γ
By converting the exponential functions to a Meijer-G function through (11) of [33] and using the infinite series of the lower incomplete gamma function detailed in ([28], Equation (8.354(1)), the SOP can be further expressed as:
S O P = 1 2 β η e exp K R 2 p = 0 z = 0 q = 0 p t = 0 q n = 0 m s 1 q t 1 z K p ξ q λ ξ R α g λ + z φ q + n + z p ! q ! n ! z ! α g ψ n λ + z
× 0 γ q + n + z β 1 G 0 , 1 1 , 0 1 + ξ ψ ψ φ γ | 0 G 1 , 0 0 , 1 γ β η e | 1 d γ
By employing (21) of [33], the integral in (26) can be solved as:
S O P = 1 2 η e exp K R 2 2 π β 1 p = 0 z = 0 q = 0 p t = 0 q n = 0 m s 1 q t 1 z K p ξ q λ ξ R α g λ + z φ q + n + z p ! q ! n ! z ! α g ψ n λ + z
× β q + n + z β 1 ( ( 1 + ξ ψ ψ ) φ ) q + n + z β G 1 + β ,   0 0 ,   1 + β ψ β η e φ 1 + ξ ψ β | 1 ,   Δ β , 1 + β q n z
where Δ s ,   v = v s ,   v + 1 s , , v + s 1 s .
If we assume the path loss α a = 2 ; thus, β = 1 and Equation (27) can be expressed as:
S O P = 1 2 β η e exp K R 2 p = 0 z = 0 q = 0 p t = 0 q n = 0 m s 1 q t 1 z K p ξ q λ ξ R α λ + z φ q + n + z p ! q ! n ! z ! α ψ n λ + z
× ( 1 + ξ ψ ψ φ ) q + n + z β G 2 , 0 0 , 2 ψ η e φ 1 + ξ ψ | 1 ,   1 q n z + β

4.2. Strictly Positive Secrecy Capacity (SPSC)

In a secure network, the SPSC is another performance secrecy measure that is realizable only if the secrecy capacity holds a positive quantity, which is when the main link becomes superior to the eavesdropper’s link. Mathematically, it can be expressed as [34]:
S P S C = P r γ e q > γ
1 0 F e q γ f ¯ E U γ d γ
Hence,
S P S C = 1 S O P ,   for   φ = 1
Putting (27) into (30), the network SPSC can be derived as:
S P S C = 2 η e exp K R 2 2 π β 1 p = 0 z = 0 q = 0 p t = 0 q n = 0 m s 1 q t 1 z K p ξ q λ ξ R α g λ + z p ! q ! n ! z ! α g ψ n λ + z β q + n + z β 1
× 1 + ξ ψ ψ q + n + z β G 1 + β ,   0 0 ,   1 + β ψ β η e 1 + ξ ψ β | 1 ,   Δ β , 1 + β q n z

4.3. Average Secrecy Capacity

This is an important metric for evaluating the secrecy performance of active eavesdroppers and can be expressed as [32,35]:
C s = 0 F ¯ U E γ 1 + γ 1 F e q γ d γ
By substituting (20) and (23) into (32), the system security capacity can be defined as:
C s = 2 exp K R 2 p = 0 q = 0 p t q n = 0 m s 1 q t K p ξ q λ p ! q ! n ! α g ψ n
× 0 γ q + n λ 1 + γ exp η e γ β exp 1 + ξ ψ ψ γ Υ λ , ξ γ R α g d γ
By employing Taylor’s series expansion, exp η e γ β = k = 0 1 k k ! η e γ β k , (33) can be expressed as:
C s = 2 exp K R 2 p = 0 k = 0 q = 0 p t = 0 q n = 0 m s 1 q t 1 k K p ξ q λ η e k p ! q ! n ! k ! α g ψ n
× 0 γ q + n λ β k 1 + γ exp 1 + ξ ψ ψ γ Υ λ , ξ γ R α g d γ
By using (10) and (11) of [33] and (8.4.16.1) of [36], Equation (34) can be expressed in terms of the Meijer-G function, as follows:
C s = 2 exp K R 2 p = 0 k = 0 q = 0 p t = 0 q n = 0 m s 1 q t 1 k K p ξ q λ η e k p ! q ! n ! k ! α g ψ n
× 0 G 1 , 1 1 , 1 γ | q + n λ β k q + n λ β k G 0 , 1 1 , 0 γ | 0 G 1 , 2 1 , 1 ξ R α g γ | 1 λ ,   0 d γ
where = 1 + ξ ψ ψ .
By applying (20) of [37], the network average secrecy capacity can be obtained as:
C s = 2 exp K R 2 p = 0 k = 0 q = 0 p t = 0 q n = 0 m s 1 q t 1 k K p ξ q λ η e k p ! q ! n ! k ! α g ψ n
× G 1 , 0 : 1 , 1 : 1 , 2 1 , 0 : 1 , 1 : 1 , 1 1 | q + n λ β k q + n λ β k 1 λ ,   0   1 , ξ R α g

5. Numerical Results and Discussion

In this section, the numerical results are provided to quantify the security performance of the proposed UAV-assisted wireless network based on the derived exact analytical expressions of the SOP, SPSC, and ASC. In addition, Monte-Carlo simulations are conducted to validate the correctness of the derived analytical expressions. Except where otherwise stated, the target rate R s = 0.1   b / s / H z , path loss factor α g = 2 , fading parameter of BS-to-U link m s = 2 , R = 0.2   m , and the coordinate position of the ground user is set to 2 , 1 , 0 .
The SOP performance of the proposed network under the influence of the fading parameters of the BS-to-U link and the link average SNR is presented in Figure 2. The results show that the greater the increase in both the m s and γ ¯ B U of the link, the better the network secrecy performance. This is because a high value of m s denotes a better channel condition and at a high value of γ ¯ B U more power is used for information transmission. In addition, at a low average SNR of the U D link, the results show that there is no significant change in the network secrecy performance at any value of m s . This is because no information is leaked to the eavesdroppers as a of result the low transmission power to the ground user. In addition, it can be observed that the simulation results perfectly agreed with the analytical results, which proves the correctness of the derived analytical expression.
The impact of the UAV’s altitude and the density of the eavesdropper on the network SOP performance is depicted in Figure 3. It can be noticed that the network has a worse SOP performance at a high altitude compared to a lower altitude position. This shows that a better SOP can be achieved at a low UAV altitude. In addition, as the density of eavesdroppers increased within the network, the network SOP deteriorated to a greater extent. This is because a large value of ρ e indicates more eavesdroppers within a fixed range and a higher probability of information leakage.
In Figure 4, the effect of the UAV coverage under different UAV altitudes is illustrated. It can be deduced that the network SOP is improved with a decrease in the UAV’s altitude. In addition, the results depict that the SOP of the network degraded with an increase in the value of the UAV coverage radius R due to the closeness of the user to the eavesdroppers. Moreover, there is perfect collaboration between the simulation results and the analytical results, which validates the accuracy of the derived expression.
The influence of the average SNR at the eavesdroppers and the path loss exponent on the network SOP is demonstrated in Figure 5. The results show that the network SOP deteriorates as the eavesdroppers’ average SNR increases. This is because of the power utilized by the eavesdroppers to decode the UAV’s information. In addition, it can be noticed that the network secrecy performance worsens as the value of α g increases. This is because a high of value of α g indicates an unfavorable condition of the UAV channel.
The SPSC performance of the proposed network is presented in Figure 6 under different densities of the eavesdroppers at under different UAV coverage radii. It can be deduced from the results that the larger the density of eavesdroppers, the larger the SPSC network and the more information is leaked to the eavesdroppers. The results also show that the network SPSC improves with the decrease in the UAV coverage radius R , as the user is far away from the eavesdroppers.
The impact of the eavesdroppers’ average SNR at different UAV altitudes is presented in Figure 7. It can be noticed from the results that the network SPSC performance deteriorates with the increase in the eavesdroppers’ average SNR since more power is used by the eavesdroppers to decode network information. In addition, at a lower UAV altitude, a better SPSC performance is achieved due to the lower path loss experienced by the UAV.
The performance of the system’s ASC at different values of m s and γ ¯ B U of the BS-to-U link is demonstrated in Figure 8. The results show that the increase in the value of γ ¯ B U enhances the ASC performance of the network. In addition, the results depict that a better ASC performance is achieved at a high value of m s since the link experiences a weak fading condition. In addition, it is observed that the simulation results agreed with the analytical results, which proves the accuracy of the derived expression. Moreover, at a low value of the average SNR of the UD link, there is no significant variation in the network secrecy performance, which indicates that no information is leaked to the eavesdropper due to the low transmission power of the UAV to the ground user.
In Figure 9, the influence of the UAV’s altitude and coverage on the network ASC performance is illustrated. The results show that the increase in the UAV altitude significantly degrades the network ASC performance owing to the increase in path loss at high altitude. In addition, superior ASC performance is observed as the UAV coverage radius decreases since the user is far from the interception point of the eavesdroppers.
The impact of the path loss exponent on the network ASC performance is depicted in Figure 10. The results show that the network performance degrades as the path loss exponent of the UAV link to the ground increases, leading to a high fading condition for the network.

6. Conclusions

This paper studied the secrecy performance of a dual-hop UAV-assisted-relaying network with randomly distributed non-colluding eavesdroppers. It is assumed that the position of both the ground user and eavesdroppers follow the HPPP model. Based on a DF relaying protocol, the equivalent end-to-end distribution at the ground user was derived. Thus, the closed-form expressions of the network SOP, SPSC, and ASC were derived. A Monte-Carlo simulation was provided to verify the correctness of the derived expressions. The results demonstrated that the network and channel parameters such as the fading parameter m s , density of eavesdroppers ρ e , average SNR of the B-to-U link γ ¯ B U , average SNR of U-to-E link γ ¯ U E , UAV altitude h u , and UAV coverage R exhibit significant effects on the secrecy performance of the UAV-assisted wireless network.

Author Contributions

Conceptualization, K.O.O.; methodology, K.O.O.; software, K.O.O. and O.O.O.; validation, K.O.O., P.A.O. and O.O.O.; formal analysis, K.O.O.; writing—original draft preparation, K.O.O.; writing—review and editing, K.O.O., P.A.O. and O.O.O.; supervision, P.A.O. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Odeyemi, K.O.; Owolawi, P.A. A Mixed FSO/RF Integrated Satellite-High Altitude Platform Relaying Networks for Multiple Terrestrial Users with Presence of Eavesdropper: A Secrecy Performance. Photonics 2022, 9, 32. [Google Scholar] [CrossRef]
  2. Dan, Z.; Wu, X.; Zhu, S.; Zhuang, T.; Wang, J.-Y. On the outage performance of dual-hop UAV relaying with multiple sources. In Proceedings of the 2019 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), Taiyuan, China, 18–21 July2019; pp. 1–3. [Google Scholar]
  3. Dang-Ngoc, H.; Nguyen, D.N.; Ho-Van, K.; Hoang, D.T.; Dutkiewicz, E.; Pham, Q.-V.; Hwang, W.-J. Secure Swarm UAV-assisted Communications with Cooperative Friendly Jamming. IEEE Internet Things J. 2022. [Google Scholar] [CrossRef]
  4. Bao, T.; Yang, H.-C.; Hasna, M.O. Secrecy Performance Analysis of UAV-Assisted Relaying Communication Systems. IEEE Trans. Veh. Technol. 2019, 69, 1122–1126. [Google Scholar] [CrossRef]
  5. Qin, Y.; Kishk, M.A.; Alouini, M.-S. Stochastic Geometry-based Analysis of Multi-Purpose UAVs for Package and Data Delivery. arXiv 2022, arXiv:2209.05173. [Google Scholar]
  6. Hou, T.; Liu, Y.; Song, Z.; Sun, X.; Chen, Y. Multiple Antenna Aided NOMA in UAV Networks: A Stochastic Geometry Approach. IEEE Trans. Commun. 2018, 67, 1031–1044. [Google Scholar] [CrossRef] [Green Version]
  7. Odeyemi, K.O.; Owolawi, P.A. Physical layer security in mixed Rf/FSO system under multiple eavesdroppers collusion and non-collusion. Opt. Quantum Electron. 2018, 50, 298. [Google Scholar] [CrossRef]
  8. Yu, C.; Ko, H.-L.; Peng, X.; Xie, W. Secrecy Outage Performance Analysis for Cooperative NOMA Over Nakagami-m Channel. IEEE Access 2019, 7, 79866–79876. [Google Scholar] [CrossRef]
  9. Yu, X.; Xu, D.; Sun, Y.; Ng, D.W.K.; Schober, R. Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces. IEEE J. Sel. Areas Commun. 2020, 38, 2637–2652. [Google Scholar] [CrossRef]
  10. Yang, L.; Chen, J.; Hasna, M.O.; Yang, H.-C. Outage Performance of UAV-Assisted Relaying Systems with RF Energy Harvesting. IEEE Commun. Lett. 2018, 22, 2471–2474. [Google Scholar] [CrossRef]
  11. Ji, B.; Li, Y.; Zhou, B.; Li, C.; Song, K.; Wen, H. Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced with Energy Harvesting. IEEE Access 2019, 7, 38738–38747. [Google Scholar] [CrossRef]
  12. Alkama, D.; Ouamri, M.A.; Alzaidi, M.S.; Shaw, R.N.; Azni, M.; Ghoneim, S.S.M. Downlink Performance Analysis in MIMO UAV-Cellular Communication With LOS/NLOS Propagation Under 3D Beamforming. IEEE Access 2022, 10, 6650–6659. [Google Scholar] [CrossRef]
  13. Ouamri, M.A.; Alkanhel, R.; Gueguen, C.; Alohali, M.A.; Ghoneim, S.S.M. Modeling and Analysis of UAV-Assisted Mobile Network with Imperfect Beam Alignment. Comput. Mater. Contin. 2022, 74, 453–467. [Google Scholar] [CrossRef]
  14. Yang, L.; Meng, F.; Zhang, J.; Hasna, M.O.; Di Renzo, M. On the Performance of RIS-Assisted Dual-Hop UAV Communication Systems. IEEE Trans. Veh. Technol. 2020, 69, 10385–10390. [Google Scholar] [CrossRef]
  15. Alnagar, S.I.; Salhab, A.M.; Zummo, S.A. Unmanned Aerial Vehicle Relay System: Performance Evaluation and 3D Location Optimization. IEEE Access 2020, 8, 67635–67645. [Google Scholar] [CrossRef]
  16. Li, X.; Wang, Q.; Peng, H.; Zhang, H.; Do, D.-T.; Rabie, K.M.; Kharel, R.; Cavalcante, C.C. A Unified Framework for HS-UAV NOMA Networks: Performance Analysis and Location Optimization. IEEE Access 2020, 8, 13329–13340. [Google Scholar] [CrossRef]
  17. Zan, J.; Lu, G.; Ye, Y. Outage performance of UAV-assisted AF relaying with hardware impairments. Phys. Commun. 2021, 46, 101334. [Google Scholar] [CrossRef]
  18. Kim, Y.H.; Chowdhury, I.A.; Song, I. Design and Analysis of UAV-Assisted Relaying with Simultaneous Wireless Information and Power Transfer. IEEE Access 2020, 8, 27874–27886. [Google Scholar] [CrossRef]
  19. Ajam, H.; Najafi, M.; Jamali, V.; Schober, R. Ergodic Sum Rate Analysis of UAV-Based Relay Networks with Mixed RF-FSO Channels. IEEE Open J. Commun. Soc. 2020, 1, 164–178. [Google Scholar] [CrossRef] [Green Version]
  20. Odeyemi, K.O.; Owolawi, P.A. Outage Performance of UAV-Based Relay in FSO Downlink Satellite Communication Networks Under Hovering Fluctuations. Int. J. Microw. Opt. Technol. 2022, 17, 303–310. [Google Scholar]
  21. Zhang, J.; Zheng, X.; Pan, G.; Xie, Y. On secrecy analysis of UAV-enabled relaying NOMA systems. Phys. Commun. 2020, 45, 101263. [Google Scholar] [CrossRef]
  22. Mamaghani, M.T.; Hong, Y. On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying with Cooperative Jamming and SWIPT. IEEE Access 2019, 7, 153060–153073. [Google Scholar] [CrossRef]
  23. Li, A.; Wu, Q.; Zhang, R. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel. IEEE Wirel. Commun. Lett. 2018, 8, 181–184. [Google Scholar] [CrossRef]
  24. Li, S.; Yang, L.; da Costa, D.B.; Yu, S. Performance Analysis of UAV-Based Mixed RF-UWOC Transmission Systems. IEEE Trans. Commun. 2021, 69, 5559–5572. [Google Scholar] [CrossRef]
  25. Shimamoto, S. Channel characterization and performance evaluation of mobile communication employing stratospheric platforms. IEICE Trans. Commun. 2006, 89, 937–944. [Google Scholar]
  26. Li, X.; Zhao, M.; Gao, X.-C.; Li, L.; Do, D.-T.; Rabie, K.M.; Kharel, R. Physical Layer Security of Cooperative NOMA for IoT Networks Under I/Q Imbalance. IEEE Access 2020, 8, 51189–51199. [Google Scholar] [CrossRef]
  27. Wang, Q.; Li, X.; Bhatia, S.; Liu, Y.; Alex, L.T.; Khowaja, S.A.; Menon, V.G. UAV-enabled non-orthogonal multiple access networks for ground-air-ground communications. IEEE Trans. Green Commun. Netw. 2022, 6, 1340–1354. [Google Scholar] [CrossRef]
  28. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products; Academic Press: Cambridge, MA, USA, 2014. [Google Scholar]
  29. Odeyemi, K.O.; Owolawi, P.A.; Olakanmi, A.O.O. On the performance of reconfigurable intelligent surface in cooperative decode-and-forward relaying for hybrid RF/FSO systems. Prog. Electromagn. Res. M 2022, 110, 157–169. [Google Scholar] [CrossRef]
  30. Sun, Q.; Zhang, Z.; Zhang, Y.; Lopez-Benitez, M.; Zhang, J. Performance Analysis of Dual-Hop Wireless Systems Over Mixed FSO/RF Fading Channel. IEEE Access 2021, 9, 85529–85542. [Google Scholar] [CrossRef]
  31. Lou, Y.; Sun, R.; Cheng, J.; Liu, S.; Zhou, F.; Qiao, G. Physical-layer security for two-hop air-to-underwater communication systems with fixed-gain amplify-and-forward relaying. arXiv 2020, arXiv:2009.09550. [Google Scholar]
  32. Odeyemi, K.O.; Owolawi, P.A.; Olakanmi, O.O. Secrecy performance of cognitive underlay hybrid RF/FSO system under pointing errors and link blockage impairments. Opt. Quantum Electron. 2020, 52, 1–16. [Google Scholar] [CrossRef]
  33. Adamchik, V.; Marichev, O. The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system. In Proceedings of the International Symposium on Symbolic and Algebraic Computation, Tokyo, Japan, 20–24 August 1990; pp. 212–224. [Google Scholar]
  34. Lei, H.; Zhang, H.; Ansari, I.S.; Gao, C.; Guo, Y.; Pan, G.; Qaraqe, K.A. Performance Analysis of Physical Layer Security Over Generalized-K Fading Channels Using a Mixture Gamma Distribution. IEEE Commun. Lett. 2015, 20, 408–411. [Google Scholar] [CrossRef]
  35. Lei, H.; Dai, Z.; Ansari, I.S.; Park, K.H.; Pan, G.; Alouini, M.-S. On Secrecy Performance of Mixed RF-FSO Systems. IEEE Photon. J. 2017, 9, 1–14. [Google Scholar] [CrossRef]
  36. Prudnikov, A.P.; Brychkov, Y.A.; Marichev, O.I.; Romer, R.H. (Eds.) Integrals and Series; American Association of Physics Teachers: College Park, MD, USA, 1988. [Google Scholar]
  37. Lei, H.; Gao, C.; Ansari, I.S.; Guo, Y.; Pan, G.; Qaraqe, K.A. On Physical-Layer Security Over SIMO Generalized- K Fading Channels. IEEE Trans. Veh. Technol. 2015, 65, 7780–7785. [Google Scholar] [CrossRef]
Figure 1. Basic model for a dual-hop UAV-based relay network.
Figure 1. Basic model for a dual-hop UAV-based relay network.
Electronics 11 03302 g001
Figure 2. SOP performance of the network under different values of m s and average SNR of the B-to-UAV link at h u = 1   km , ρ e = 3 × 10 2 , and γ ¯ U E = 2   dB .
Figure 2. SOP performance of the network under different values of m s and average SNR of the B-to-UAV link at h u = 1   km , ρ e = 3 × 10 2 , and γ ¯ U E = 2   dB .
Electronics 11 03302 g002
Figure 3. Impact of UAV height h u and eavesdroppers’ density ρ e on the network SOP when γ ¯ B U = 35   dB and γ ¯ U E = 10   dB .
Figure 3. Impact of UAV height h u and eavesdroppers’ density ρ e on the network SOP when γ ¯ B U = 35   dB and γ ¯ U E = 10   dB .
Electronics 11 03302 g003
Figure 4. SOP performance under different values of h u and R for γ ¯ B U = 25   dB , γ ¯ U E = 10   dB , and ρ e = 3 × 10 2 .
Figure 4. SOP performance under different values of h u and R for γ ¯ B U = 25   dB , γ ¯ U E = 10   dB , and ρ e = 3 × 10 2 .
Electronics 11 03302 g004
Figure 5. The influence of average SNR at eavesdroppers and path loss factor on the network SOP under γ ¯ B U = 35   dB and h u = 1   km .
Figure 5. The influence of average SNR at eavesdroppers and path loss factor on the network SOP under γ ¯ B U = 35   dB and h u = 1   km .
Electronics 11 03302 g005
Figure 6. Effect of eavesdroppers’ density ρ e and R on the network SPSC when γ ¯ B U = 5   dB and γ ¯ U E = 10   dB .
Figure 6. Effect of eavesdroppers’ density ρ e and R on the network SPSC when γ ¯ B U = 5   dB and γ ¯ U E = 10   dB .
Electronics 11 03302 g006
Figure 7. The impact of eavesdroppers average SNR on the network SPSC at different values of UAV height under γ ¯ B U = 5   dB and ρ e = 4 × 10 2 .
Figure 7. The impact of eavesdroppers average SNR on the network SPSC at different values of UAV height under γ ¯ B U = 5   dB and ρ e = 4 × 10 2 .
Electronics 11 03302 g007
Figure 8. ASC performance under different values of m s and γ ¯ U E when ρ e = 3 × 10 6 , γ ¯ B U = 15   dB , and h u = 5   km .
Figure 8. ASC performance under different values of m s and γ ¯ U E when ρ e = 3 × 10 6 , γ ¯ B U = 15   dB , and h u = 5   km .
Electronics 11 03302 g008
Figure 9. Impact of h u on the ASC performance at different values of R when γ ¯ B U = 25   dB , γ ¯ U E = 10   dB , and ρ e = 3 × 10 6 .
Figure 9. Impact of h u on the ASC performance at different values of R when γ ¯ B U = 25   dB , γ ¯ U E = 10   dB , and ρ e = 3 × 10 6 .
Electronics 11 03302 g009
Figure 10. Effect of path loss factor α g on the network ASC when γ ¯ B U = 15   dB , γ ¯ U E = 5   dB , and ρ e = 4 × 10 8 .
Figure 10. Effect of path loss factor α g on the network ASC when γ ¯ B U = 15   dB , γ ¯ U E = 5   dB , and ρ e = 4 × 10 8 .
Electronics 11 03302 g010
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Odeyemi, K.O.; Owolawi, P.A.; Olakanmi, O.O. On Secrecy Performance of a Dual-Hop UAV-Assisted Relaying Network with Randomly Distributed Non-Colluding Eavesdroppers: A Stochastic Geometry Approach. Electronics 2022, 11, 3302. https://doi.org/10.3390/electronics11203302

AMA Style

Odeyemi KO, Owolawi PA, Olakanmi OO. On Secrecy Performance of a Dual-Hop UAV-Assisted Relaying Network with Randomly Distributed Non-Colluding Eavesdroppers: A Stochastic Geometry Approach. Electronics. 2022; 11(20):3302. https://doi.org/10.3390/electronics11203302

Chicago/Turabian Style

Odeyemi, Kehinde Oluwasesan, Pius Adewale Owolawi, and Oladayo Olufemi Olakanmi. 2022. "On Secrecy Performance of a Dual-Hop UAV-Assisted Relaying Network with Randomly Distributed Non-Colluding Eavesdroppers: A Stochastic Geometry Approach" Electronics 11, no. 20: 3302. https://doi.org/10.3390/electronics11203302

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop