Professional Documents
Culture Documents
On The Physical Layer Security of Underlay
On The Physical Layer Security of Underlay
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
1
Abstract—In this paper, we study the underlay relay-aided PHY security is independent of the computational complexity
Device-to-Device (D2D) communications to improve the physical as compared to the cryptography in the higher layers. As a
layer (PHY) security of the cellular network. We propose a result, eavesdroppers that have high powerful computational
cooperative scheme, whereby the D2D pair, in return of being
allowed to share the spectrum band of the cellular network, serves abilities do not affect the level of security. In addition, PHY
as a friendly jammer, through its multiple-input multiple-output security approaches have a high scalability [4].
relay, to degrade the wiretapped signal at an eavesdropper. This The advantages of cooperative communications, in the con-
paper aims to show that spectrum sharing is advantageous for text of PHY security, have been extensively studied. More
both D2D communications and cellular networks with respect specifically, both relaying and diversity techniques have been
to reliability and robustness for the former, and the physical
layer security enhancement for the latter. To assess the proposed extensively utilized to increase the security level against eaves-
cooperative system model, closed-form expressions for the D2D dropper attacks in the wireless transmission [5]. Moreover, co-
outage probability, the secrecy outage probability, and the proba- operative jamming has also been comprehensively investigated
bility of non-zero secrecy capacity are derived. More importantly, to increase the secrecy capacity. To this end, a relay terminal is
the benefits due to the cooperation scheme are verified through chosen to interfere with the wiretapping signal by transmitting
numerical and simulation results.
a jamming signal [6], [7]. With this in mind, cooperative
Index Terms—Device-to-Device communications, physical layer jamming and relaying [8], [9] have been considered as leading
security, outage probability, secrecy outage probability. approaches to increase the security level efficiently.
As a matter of fact, multiple-input multiple-output (MIMO)
I. I NTRODUCTION relays are extensively utilized in PHY security to increase the
secrecy capacity of the cellular networks. The opportunities
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
2
B. Main Contributions
In this work, the PHY security of the cellular network is • A cooperative system is introduced where the MIMO
examined. In the proposed scenario, the D2D communica- relay helps as a friendly jammer while transmitting the
tions are used to generate jamming signals to enhance the D2D data.
security level of the cellular network in return of sharing • An antenna selection strategy is employed to enhance the
its spectrum. Unlike the exiting work on the PHY security secrecy capacity of the cellular network by degrading the
of underlay D2D communication in the cellular network, we wiretapped signal at an eavesdropper and to improve the
investigate the PHY security of the cellular network where traffic capacity for D2D communication.
a MIMO relay serves the D2D pairs. To do so, the antenna • Considering perfect and outdated CSI cases, the analysis
selection approach is utilized to simultaneously enhance the is carried out to evaluate the secrecy performance of
security level of the cellular network and improve the D2D the cellular network with respect to the secrecy outage
data transmission. To confound the eavesdropper, the transmit probability (SOP) and the non-zero secrecy capacity. Fur-
antenna selection at the MIMO relay is used to generate thermore, the outage probability of D2D communication
jamming signals. Consequently, the secrecy capacity of the is also analyzed. Additionally, closed-form expressions
cellular network is increased. At the same time, the reliability are derived.
and robustness of the D2D communications are improved as • Asymptotic analysis is carried out in high transmit power
a result of utilizing the relay through antenna selection. By regime for the cellular network.
using antenna selection strategy at the relay, the high hardware • Simulations results are presented where the derived ex-
complexity of multiple antennas is avoided, while its reliability pressions are evaluated and verified. The advantages due
and robustness advantages, and diversity is maintained. to the presence of D2D communications are highlighted.
The main contributions of this paper are listed as follows. The rest of this paper is arranged as follows: In Section
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
3
addition, σc2 , σr2 , σe2 , and σd2 represent the variances of the
additive white Gaussian noise (AWGN) at C, R, E, and
D, respectively. It is assumed that T and R have the same
transmitted power, P . With this in mind, the received signal
at TR, in the first phase, can be expressed as
√
yR = P htr xd + nr , (1)
where xd is the D2D transmitted signal, and nr is the AWGN
at R. The transmitting antenna RD, in the second phase, is
chosen to maximize the instantaneous signal-to-noise ratio
(SNR) at D. Then using the relaying gain G, RD re-transmits
the amplified signal to D. Thus, the received signal at D can
be expressed as
√ p
yD =G hrd P htr xd + nr + PB hbd xb
(2)
Fig. 1. System Model. p
+ PJ hjd xj + nd ,
where xb is the BS transmitted signal, PJ is the jamming
II, the system model is illustrated. The performance of the transmitted power, xj is the jamming signal, and nd is the
cooperative system model is investigated in Section III. The AWGN at D. It is assumed that the interference at D from RJ
performance with outdated CSI is studied in Section IV. can be eliminated by using interference cancellation [30] since
In Section V, the main results are discussed. Finally, the the coefficient hjd and the jamming power PJ are presumed
conclusions are drawn in Section VI. A list of symbols utilized to be available at D. The received signal at C, in the second
in this paper is presented in Table I. phase, can be expressed as
p p
II. SYSTEM MODEL yC = PB hbc xb + PJ hjc xj + nc , (3)
As depicted in Fig. 1, an underlay D2D network with MIMO where nc is the AWGN at C. Similarly, at E, the received
relaying sharing the spectral with the cellular network in a signal, in the second phase, can be expressed by
particular environment is considered. The cellular network p p
consists of a BS as well as a cellular user, C, communicating yE = PB hbe xb + PJ hje xj + ne , (4)
in the presence of an eavesdropper, E, each equipped with a where ne is the AWGN at the E. We assume that the received
single antenna. The D2D communications consist of a D2D signals at C and E are not affected by the interference from T
transmitter, T , a D2D receiver, D, and a MIMO amplify-and- since T is located far away from both C and E, and transmits
forward (AF) relaying, R, equipped with NJ antennas for with low power [31], [32]. It is noteworthy that since the
sending jamming signals to confound E and ND data antennas data transmission power of RD is lower than the jamming
for receiving D2D signal at R and re-transmitting the signal transmission power of RJ, the interference at C, which is
to D. Besides, all the channels coefficients are modeled as to generated by RD, can be neglected. It is also notable that the
experience flat fading with Rayleigh distribution. Furthermore, D2D users are unlikely to be wiretapped as a result of their
the transmission of D2D users is set up during two phases, low transmit power as compared to cellular users. Therefore,
while the cellular transmissions occur once in one phase. To as common in the literature (e.g., [24] and [33]), in this work,
this end, cellular and D2D transmissions are considered to we only investigate the secrecy performance of the cellular
be fully synchronized for each phase. In the first phase, T network. More importantly, in this paper, our main goal is to
transmits the D2D signal to R, while C remains silent to investigate the mutual benefit of the cooperation between the
guarantee the cellular link security [28], [29]. In the second cellular and the D2D networks. In particular, the potential of
phase, at R, the amplified signal is re-transmitted to D. As the relay-aided D2D communication to enhance the security
compensation for security provisioning of the cellular network, of the cellular network, while improving its reliability and
the D2D pairs are permitted to share spectrum bandwidth; spectral efficiency is studied. Towards this end, the relaying
that is, high spectral efficiency is gained. Therefore, for both gain G, for AF relaying scheme, is given by [34], [35]
networks, a win-win situation is enabled. To simplify matters, s
we indicate TR as the receiving antenna in the first phase, and P
G= 2 . (5)
RD as the transmitting antenna in the second phase. Similarly, P |htr | + σr2
RJ denotes the jamming antenna.
The channel coefficients for the T → TR, RD → D, RJ → For the end-to-end D2D link, the instantaneous signal-to-
E, RJ → C, RJ → D, BS → C, BS → D, BS → E links are interference-and-noise ratio (SINR), γD2D , can be obtained
denoted as htr , hrd , hje , hjc , hjd , hbc , hbd , and hbe , respec- by plugging (5) into (2) as
2 2 2
tively. Also, |hab | represents the channel power gains, which G 2 P |htr | |hrd |
are independent and exponentially distributed with a mean of γD2D = 2 2 , (6)
2 G 2 |hrd | σr2 + PB |hbd | + σd2
λab = E[|hab | ], where ab ∈ {bc, bd, tr, rd, be, je, jd, jc}. In
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
4
After some algebraic manipulations, one can get where FγR (.) and FγD (.) are the cumulative distribution
γR γD functions (CDFs) of γR and γD , respectively. The PDF of γR
γD2D = , (7) in (12) can be expressed in terms of the binomial expansion
γR + γD + 1
as [39, eq. (1.111)]
where γR represent the SINR at R, which can be expressed
ND −1
as
ND X ND − 1 γ (k + 1)
P 2 2
γR = 2 |htr | = γ̄r |htr | , (8) fγR (γ) = (−1)k exp − .
σr µ1 k µ1
k=0
(17)
and γD represents the SINR at D, which can be expressed as To derive fγD (γ), we use [38]
2
P |hrd | γrd Z ∞
γD = 2 = , (9) fγD (γ) = (x + 1)fγrd (γ(x + 1))fγbd (x) dx, (18)
σd2 + PB |hbd | 1 + γbd 0
2 2 Pd where fγrd (.) is given by
where γrd = γ̄d |hrd | , γbd = γ̄bd |hbd | , γ̄d = σd2
, and
PB
γ̄bd = Let us define µ1 = γ̄r λtr , µ2 = γ̄d λrd , and
σd2
. ND X
ND −1
ND − 1
γ (k + 1)
µ3 = γ̄bd λbd . The receiving antenna at R is selected for fγrd (γ) = (−1)k exp − ,
µ2 k µ2
the best data transmission performance in the D2D network. k=0
(19)
Moreover, the maximum channel gain can be determined by
and fγbd (.) is given by
using
2 2
|htr | = max |hti | , (10) 1 γ
i=1,..ND fγbd (γ) = exp − . (20)
µ3 µ3
and
2 2 By plugging (19) and (20) into (18), the PDF of γD , after
|hrd | = max |hid | , (11)
i=1,..ND some algebraic manipulations, can be obtained as
2 ND −1
The probability density function (PDF) of |hυ | is given by
ND X k ND − 1 γ (k + 1)
fγD (γ) = (−1) exp −
ND
γ
γ
ND −1 µ2 µ3 k µ2
k=0
f|hυ |2 (γ) = exp − 1 − exp − .
λυ λυ λυ γ(k+1) 1
(12) 1 + µ2 + µ3
× 2 .
where υ ∈ {tr, rd}. γ(k+1) 1
µ2 + µ3
(21)
III. P ERFORMANCE A NALYSIS
From (17) and (21), FγR (γ) and FγD (γ) are easily obtained
In this section, a thorough analysis of the proposed system is as
performed. In particular, closed-form expressions of the main
NX D −1
(−1)k NDk−1
performance metrics, i.e., the D2D outage probability, the SOP, γ (k + 1)
FγR (γ) = ND 1 − exp − ,
and the probability of non-zero secrecy capacity are provided. (k + 1) µ1
k=0
Moreover, the advantages of the proposed scheme are investi- (22)
gated. Furthermore, the asymptotic analysis is presented. and
NXD −1
(−1)k NDk−1 exp − γ (k+1)
µ2
A. D2D Outage Probability FγD (γ) = ND 1 − .
(k + 1) 1+ γ (k+1)µ3
k=0 µ2
The outage probability of D2D communication, Pout , is
(23)
given by
By substituting (22), (23) in (16), Pout can be obtained as in
Pout = Pr (γD2D ≤ ϕ) , (13) (24) at the top of the next page.
where ϕ = 2Rd − 1, and Rd is the data rate of the D2D
communications. Since the expression in (7) is mathematically B. Secrecy Outage Probability
intractable, a tight upper bound, γup , is utilized to find the The secrecy capacity, CS , can be expressed as
SINR of the D2D communications as [36], [37]
CC − CE , γC > γE
CS = (25)
4
γD2D ≤ γup = min (γR , γD ) . (14) 0, γC ≤ γE
where CC and CE are the cellular and eavesdropper capacities,
Hence, Pout can be expressed as
respectively. In this respect, CC can be obtained by
Pout = Pr (γup ≤ ϕ)
(15) γbc
= Pr (min (γR , γD ) ≤ ϕ) . CC = log2 (1 + γC ) = log2 1 + , (26)
1 + γjc
Pout can be further expressed as [38] 2 2 PB
where γbc = γ̄c |hbc | , γjc = γ̄jc |hjc | , γ̄c = σc2 , and γ̄jc =
Pout = FγR (ϕ) + FγD (ϕ) − FγR (ϕ)FγD (ϕ), Pj
(16) σc2 . Let us define ω1 = γ̄c λbc , and ω2 = γ̄jc λjc .
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
5
D −1
NX
D −1
NX
(−1)k NDk−1 (−1)m NDm−1
2 − 1 1
Pout =ND − − ND
k+1 exp ϕ (k+1) exp ϕ (k+1) 1+ ϕ (k+1)µ3
m=0
m+1
k=0 µ1 µ2 µ2
1 exp − ϕ (m+1)
µ2
× 1− 1− .
ϕ (k+1) ϕ (m+1)µ3
exp µ1 1 + µ2
(24)
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
6
α NJ −1
NJ ω1 J −1
NX (−1)k
exp − ω1
k(A3 − A1 )
Ei [−A4 A2 ] Ei [−A4 A1 ]
SOPI =1 − −
ω2 ω4 β (A1 − A2 ) (A1 − A2 ) exp (−A4 A2 ) exp (−A4 A1 ) (35)
k=0
A4 Ei [−A4 A2 ] 1
+ (A3 − A2 ) + ,
exp (−A4 A2 ) A2
h i
B3 ω3
NJ ω1 exp − ωα1 (B − B ) Ei − ω4 Ei [−B B ]
ω3
2 1 3 1
SOPII =1 − − + B2 −
ω2 ω4 β B1 − ω 3
B1 − ω 3
exp − B3ω4ω3 exp (−B3 B1 ) ω4
ω4 ω4
h i (40)
B3 Ei − B3ω4ω3 ω
× + 4 ,
exp − B3 ω3 ω3
ω4
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
7
h i
ω1 ω1 +ω3
NJ ω1 (−1) J −1
NX A 3 − k NJ −1 Ei − A 2
Pr(CS > 0)I = ω2 k
ω1 ω3
ω2 ω4 ω1
− A ω1
− A exp − ω1 +ω3
A
k=0 ω2 2 ω2 2 ω1 ω3 2
h i h i (48)
ω1 +ω3 ω1 +ω3
Ei − ω2 ω3 ω1 ω3 Ei − ωω11+ω ω3
3
A2 1
− + (A3 − A2 ) + .
exp − ωω12+ω 3
exp − ω1 +ω3
A A2
ω3 ω1 ω3 2
h i
N ω B2 − NJω2ω1 Ei − ωω11+ω ω4
3
NX
D −1
ND − 1
FγeR (γ) =ND (−1)k
k Proof: See Appendix D.
k=0
(k+1)γ
(52)
1 − exp − ∆tr (k+1)+ρ 2 µ
1 Lemma 5: SOPI can be obtained as in (55) at the top
tr
× , ω3 (k+1)
(k + 1) of the next page. where D1 = ∆ (k+1)+ρ , and
( je je 4 )
2 ω
ω3 (k+1)
D2 = ω3 1 + ∆ (k+1)+ρ
where ∆tr = 1 − ρ2tr µ1 . ( je
.
je 4 )
2 ω
Lemma 3: FγeD can be obtained as 2) Case I : In the following lemma, SOPII is derived for
Case II.
D −1
NX
(−1)k NDk−1
Lemma 6: SOPII can be obtained as in (56) at the
top of the
FγeD (γ) =ND
k+1 1
next page, where H1 = β α + N ∆ +ρ2 ωNJ ω1
.
k=0 ( J jc jc 2 )
(k+1) γ
(53)
exp − ∆rd (k+1)+ρ 2
× 1 − rd µ2
, Proof: See Appendix F.
(k+1) µ3 γ
1+ ∆rd (k+1)+ρ2rd µ2 V. R ESULTS AND D ISCUSSION
where ∆rd = 1 − ρ2rd µ2 . In this section, we present the numerical and simulation
results to verify the analysis carried out in the above sections.
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
8
NJ −1 ω1 +ω2 α
exp − ωα1
NJ ω1 J −1
NX (−1)k k D2 − β ω2
SOPI =1 −
ω2 β ∆je (k + 1) + ρ2je ω4 ω1 +ω2 α
− D ω1 +ω2 α
− D
k=0 β ω2 1 β ω2 1
h i h i
(ω1 +ω3 β) (ω1 +ω3 β) (ω1 +ω2 α)
Ei − ω1 ω3 D1 Ei − ω1 ω3 β ω2
× − + (D2 − D1 ) (55)
(ω1 +ω3 β) (ω1 +ω3 β) (ω1 +ω2 α)
exp − ω1 ω3 D 1 exp − ω1 ω3 β ω2
h i
ω1 +ω3 β
ω1 ω3 Ei − ω1ω+ω 1 ω3
3 β
D1 1
× + ,
exp − ω1 +ω3 β
D D 1
ω1 ω3 1
h i
ω4 +1 β ω3 +ω1
NJ ω1 exp − ωα1 ω3 ω4 − H 1 Ei − ω1 ω4
SOPII =1 −
ω3 ω3 β ω3 +ω1
2
NJ ∆jc + ρjc ω2 ω4 β H1 − ω4 H1 − ω4 exp − ω1 ω4
h i h i (56)
β ω3 +ω1 β ω +ω β ω3 +ω1
Ei − ω1 ω3 H1
ω + 1
ω
ω
3
ω
1
Ei − ω ω ω
4 3 1 3 1 4 4
− + − + ,
exp − β ω3 +ω1
H ω 3 ω 4 ω 4 exp − β ω3 +ω1 ω3
ω1 ω3 1 ω1 ω4
10-1
Pout
10-2
- = 5 dB
- = 10 dB
- = 15 dB
10-2
10-3 1 2 3 4 5 6 7 8 9
0 10 20
- (dB) 30 40 ND
Fig. 2. Simulation and analysis plots of the D2D outage probability, Pout , Fig. 3. The analysis plot of the D2D outage probability, Pout , vs number of
vs SNR, γ̄, for different number of jammimg antennas, ND , where γ̄ = γ̄r jammimg antennas, ND , for different SNR γ̄, where µ3 = 10 dB, and Rd =
= γ̄d , µ3 = 10 dB, and Rd = 1 b/s/Hz. 1 b/s/Hz.
Throughout the obtained results, the impact of the jamming between the simulation and numerical results, verifying the
power, the average SINRs, and the number of antenna at preciseness of the analytical lower bound expression in (14).
the jammer, NJ , on the secrecy performance of the cellular In Fig. 3, Pout is plotted versus ND . In this respect, the
network are studied. Without loss of generality, the variances impact of ND on the D2D performance is determined and it
of the noise at all nodes are normalized to unity. Unless stated, can be seen that Pout improves continuously with increasing
ω2 is 10 dB. ND . Obviously, Pout decreases as ND increases, as expected.
In Fig. 2, the exact (simulation) and the lower bound Numerical results match well with the simulation results, thus
(analysis) outage probability, Pout , for D2D communications validating our analysis.
is depicted versus γ̄, where γ̄ = γ̄r = γ̄d . It turns out For Case I, SOPI is depicted in Fig. 4 versus γ̄c . In this
that Pout of the D2D link decreases as γ̄ increases without respect, the average SNR of the E, γ̄e , is set to 5 dB and 15
any outage floor. In addition, we find that Pout improves dB, and Rs is 1 b/s/Hz. With this in mind, it can be clearly
significantly with increasing ND . Moreover, the performance observed that SOPI decreases as NJ increases at the MIMO
of D2D communications improves by using multiple antennas relay given the fact that the wiretapped signal is degraded. The
relay in comparison to a single antenna relay. It is also generating jamming signals interfere with E, which means
noteworthy that there is a perfect agreement, at high SNR, that secure data transmission is guaranteed. Moreover, SOPI
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
9
0 0
10 10
- = 15 dB
e
-1
10 -
- -1
= 5 dB 10
e - = 15 dB
e
N = 10 Simulation N =3 Simulation
J
J
Analysis Conventional System
Asymptotic Analysis
10-3 10-2
0 10 20 30 40 0 5 10 15 20 25 30
- (dB) - (dB)
c c
Fig. 4. Analytical and Monte-Carlo simulation (Case I) of the secrecy outage Fig. 6. Analytical and simulation plots (Case I) of the probability of non-zero
probability, SOPI , vs SNR, γ̄c , for different γ̄e and NJ , where ω4 = 10 dB, secrecy capacity, Pr (CS > 0)I , vs SNR, γ̄c , for different γ̄e and NJ , where
and Rs = 1 b/s/Hz. ω4 = 10 dB.
0
10 100
- = 15 dB
e
10-1 -
II
= 5 dB
Pr(C > 0)
e
SOPII
-1
10
S
- = 5 dB -
e = 15 dB
e
-2
10 Conventional System
NJ = 3 Simulation
NJ = 10 Simulation
NJ = 10 Simulation
NJ = 3 Simulation
Analysis
Asymptotic Conventional System
10-3
Analysis
0 10 20 30 40 10-2
0 5 10
- (dB) -15(dB) 20 25 30
c c
Fig. 5. Analytical and Monte-Carlo simulation (Case II) of the secrecy outage Fig. 7. Analytical and simulation plots (Case II) of the probability of non-
probability, SOPII , vs SNR, γ̄c , for different γ̄e and NJ , where ω4 = 10 dB, zero secrecy capacity, Pr (CS > 0)II , vs SNR, γ̄c , for different γ̄e and NJ ,
and Rs = 1 b/s/Hz. where ω4 = 10 dB.
increases as γ̄c decreases and γ̄e increases, as expected. With In the conventional system, there is no relay and T transmits
respect to Case II, Fig. 5 shows SOPII , versus γ̄c . It is directly to R. Each transmission from T to R occurs in one
clearly that, for both γ̄e = 5 and 15 dB, SOPII increases phase and the cellular transmits in the same phase. Equal
with more jamming antennas as shown in Fig. 5. Additionally, transmit power in both schemes, i.e., the conventional one
we can observe that SOPII decreases as γ̄c increases and and the proposed one, is assumed to ensure a fair comparison.
γ̄e decreases, as expected. Furthermore, for both cases, the It is worth mentioning that, when NJ = 1, both schemes
asymptotic results are provided, where a perfect match with have the same performance. In this particular case, there is
the exact results can be observed as γ c → ∞. Again, there no advantage of the proposed scheme. However, it can be
is a tight agreement between the simulation and numerical observed that the secrecy performance of the cellular network
results, verifying the correctness of our analysis. It is worth significantly improves as NJ increases. At SOPII = 10−3 ,
mentioning that in both Cases I and II, the secrecy capacity we note a security improvement of 10 dB and 5 dB of the
of the cellular network increases as a result of using jamming proposed scheme over the conventional one when NJ = 10
antenna at R. and NJ = 3, respectively. According to Fig. 5, SOPII de-
To support our contribution, Figs. 4 and 5 illustrate the creases from 0.015 to 0.0035 at 30 dB as the number of
security advantages that the cellular user can gain as compared jamming antenna increases from 1 to 10. With this in mind, it
to the conventional system model, where there is no relay [41]. is worthy for the cellular system to be silent in the first phase
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
10
10
0
100 - = 15 dB
e
10
-1 10-1
|
SOPII
| -
Pout
= 5 dB
e
10
-2 10-2
= 0.1 Simulation
jc
= 0.1 Exact (Simulation) = 0.9 Simulation
jc
= 0.9 Exact (Simulation) =1 Simulation
jc
= 1 Exact (Simulation)
Analysis
10-3
Analytical Lower Bound
10-3 10 15 20 25 30 35 40
0 10 20 30 40
- (dB) -c(dB)
Fig. 8. The D2D outage probability, Pout , of outdated CSI vs SNR, γ̄, for Fig. 10. The secrecy outage probability, SOPII , of Outdated CSI (Case II) vs
different correlation coefficient values ρ, where ρ = ρtr = ρrd , γ̄ = γ̄r = γ̄d , SNR, γ̄c , for different correlation coefficient values ρjc and γ̄e , where the
ND = 3, µ3 = 10 dB, and Rd = 1 b/s/Hz. number of jamming antennas NJ = 3 and Rs = 1 b/s/Hz.
jamming antennas.
100 -
e
= 15 dB Regarding outdated CSI, Fig. 8 shows the exact (simula-
tion) and lower bound (analysis) outage probability, Pout , for
different values of the correlation coefficient ρ where ρ = ρtr
-1 = ρrd . We note that as ρ increases to unity, the performance
10 gain enhances substantially. Therefore, it can be concluded
|
that the availability of the CSI is essential in enhancing the
I
-
SOP
= 5 dB
e outage probability performance of the D2D communication.
Furthermore, a good match between the exact (simulation) and
-2
10 lower bound (analysis) at high SNR can also be observed.
= 0.1 Simulation To study the influence of the outdated CSI case on the
je
= 0.9 Simulation
je secrecy performance, Fig. 9 illustrates SOPI for outdated CSI
=1 Simulation
je Case I versus SNR, γ̄c , for different values of γ̄e and NJ
Analysis
-3 set to 3. Without loss of generality, the correlation coefficient
10
0 10 - 20 30 40 values ρje are set to 0.1, 0.9, and 1. From this figure, we can
(dB)
c observe that SOPI increases as γ̄c decreases and γ̄e inecreases.
Fig. 9. The secrecy outage probability, SOPI , of Outdated CSI (Case I) vs
In addition, we can clearly note that SOPI improves as ρje
SNR, γ̄c , for different correlation coefficient values ρje and γ̄e , where the increases to 1 because the secrecy capacity impoves with
number of jamming antennas NJ = 3 and Rs = 1 b/s/Hz. perfect CSI.
Figure 10 illustrates SOPII for outdated CSI Case II. As
can be seen, for a fixed ρjc , namely, ρjc ∈ {0.1, 0.9, 1},
to guarantee secure data transmission in the second phase. In SOPII improves as γ̄c increases and ρjc increases to unity.
summary, the proposed system model has many advantages This clearly suggest that the outdated CSI can have a harmful
over the conventional system such as improving the secrecy influence on the secrecy capacity for the cellular network.
performance of the cellular network, as shown in Figs. 4 and Therefore, Figs. 9 and 10 clearly show that, in both Cases I and
5 and increasing the reliability and robustness of the D2D II, the jamming antenna selection at the MIMO relay increases
communications, as shown in Figs. 2 and 3. the secrecy capacity for the cellular network. Furthermore, in
Figure 6 shows the probability of non-zero secrecy capacity, both cases, there is no outage floor. Moreover, the analytical
Pr(CS > 0)I , for Case I versus γ̄c . It is obvious that results and the simulation results match perfectly.
Pr(CS > 0)I increases as γ̄c increases for a fixed γ̄e . However,
Pr(CS > 0)I decreases with increasing γ̄e . Moreover, we note
that Pr(CS > 0)I decreases as NJ decreases. Simulation re- VI. C ONCLUSION
sults are seen to conform with the analytical results, validating In this paper, a cooperative system model to simultaneously
the analysis. Furthermore, Fig. 7 represents Pr(CS > 0)II for increase the D2D reliability and robustness, and enhance the
Case II versus γ̄c . Both simulation and analytical results are secrecy capacity of the cellular network, in an inband underlay
shown, and match perfectly. It is clearly shown in Fig. 7 that, D2D cellular system, is introduced. Towards this end, a MIMO
for both γ̄e = 5 and 15 dB, Pr(CS > 0)II increases with more relay is utilized to confound the eavesdropper by transmitting
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
11
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
12
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2020.2994505, IEEE
Transactions on Vehicular Technology
13
security perspective,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. Telex M. N. Ngatched (M’05–SM’17) received
946–960, Apr. 2018. the B.Sc. degree and the M.Sc. degree in elec-
[27] N. K. Pratas and P. Popovski, “Low-rate machine-type commu- tronics from the University of Yaoundé, Cameroon,
nication via wireless device-to-device (d2d) links,” arXiv preprint in 1992 and 1993, respectively, the MscEng (Cum
arXiv:1305.6783, 2013. Laude) in electronic engineering from the University
[28] T. Kim and M. Dong, “An iterative hungarian method to joint relay se- of Natal, Durban, South Africa, in 2002, and the
lection and resource allocation for d2d communications,” IEEE Wireless Ph.D. in electronic engineering from the University
Commun. Lett., vol. 3, no. 6, pp. 625–628, Dec. 2014. of KwaZulu-Natal, Durban, South Africa, in 2006.
[29] J. M. Moualeu, T. M. Ngatched, and D. B. da Costa, “Sequential relay From July 2006 to December 2007, he was with
selection in d2d-enabled cellular networks with outdated csi over mixed the University of KwaZulu-Natal as Postdoctoral
fading channels,” IEEE Wireless Commun. Lett., vol. 8, no. 1, pp. 245– Fellow, and from 2008 to 2012 with the Department
248, Sep. 2018. of Electrical and Computer Engineering, University of Manitoba, Canada, as
[30] Z. Zhang, X. Chai, K. Long, A. V. Vasilakos, and L. Hanzo, “Full du- a Research Associate. He joined Memorial University in August 2012, where
plex techniques for 5g networks: self-interference cancellation, protocol he is currently an Associate Professor and Coordinator of the Engineering
design, and relay selection,” IEEE Commun. Mag., vol. 53, no. 5, pp. One program at Grenfell Campus. His research interests include 5G and 6G
128–137, May 2015. enabling technologies, visible light communications, power-line communica-
[31] J. Lee, H. Wang, J. G. Andrews, and D. Hong, “Outage probability tions, optical communications, and underwater communications. Dr. Ngatched
of cognitive relay networks with interference constraints,” IEEE Trans. serves as the Managing Editor of the IEEE Communications Magazine and as
Wireless Commun., vol. 10, no. 2, pp. 390–395, Dec. 2010. an Associate Editor of the IEEE Open Journal of the Communications Society.
[32] H. Lei, C. Gao, I. S. Ansari, Y. Guo, Y. Zou, G. Pan, and K. A. Qaraqe, He was the publication chair of the IEEE CWIT 2015, the Managing Editor of
“Secrecy outage performance of transmit antenna selection for mimo the IEEE Communications Letters from September 2018 to March 2020, an
underlay cognitive radio systems over nakagami-m channels,” IEEE Associate Editor with the IEEE Communications Letters from 2015 to 2019,
Trans. Veh. Tech., vol. 66, no. 3, pp. 2237–2250, May 2016. and Technical Program Committee (TPC) member and session chair for many
[33] Y. Zhang, Y. Shen, X. Jiang, and S. Kasahara, “Mode selection and prominent IEEE conferences including IEEE GLOBECOM, IEEE ICC, IEEE
spectrum partition for d2d inband communications: A physical layer WCNC, IEEE VTC, and IEEE PIMRC. He was a recipient of the Best Paper
security perspective,” IEEE Trans. Commun., vol. 67, no. 1, pp. 623– Award at the IEEE Wireless Communications and Networking Conference
638, Jan. 2019. (WCNC) in 2019. He is a Professional Engineer (P. Eng.) registered with the
[34] J. N. Laneman, D. N. Tse, and G. W. Wornell, “Cooperative diversity Professional Engineers and Geoscientists of Newfoundland and Labrador, St.
in wireless networks: Efficient protocols and outage behavior,” IEEE John’s, NL, Canada.
Trans. Inf. Theory, vol. 50, no. 12, pp. 3062–3080, Nov. 2004.
[35] I. Krikidis, J. S. Thompson, S. McLaughlin, and N. Goertz, “Max-min
relay selection for legacy amplify-and-forward systems with interfer-
ence,” IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 3016–3027,
Jun. 2009.
[36] A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, “A simple cooperative
diversity method based on network path selection,” IEEE J. Sel. Areas
Commun., vol. 24, no. 3, pp. 659–672, Mar. 2006.
[37] S. S. Ikki and S. Aissa, “Performance analysis of two-way amplify-
and-forward relaying in the presence of co-channel interferences,” IEEE
Trans. Commun., vol. 60, no. 4, pp. 933–939, Feb. 2012.
[38] A. Papoulis and S. U. Pillai, Probability, random variables, and stochas-
tic processes. Tata McGraw-Hill Education, 2002.
[39] I. S. Gradshteyn and I. M. Ryzhik, Table of integrals, series, and
MOHAMED H. AHMED (M’96–SM’07) obtained
products. Academic press, 2014.
his Ph.D. degree in Electrical Engineering in 2001
[40] J. L. Vicario, A. Bel, J. A. Lopez-Salcedo, and G. Seco, “Opportunistic
from Carleton University, Ottawa, where he worked
relay selection with outdated csi: outage probability and diversity
from 2001 to 2003 as a senior research associate.
analysis,” IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 2872–2876,
In 2003, he joined the Faculty of Engineering and
Jun. 2009.
Applied Science, Memorial University where he has
[41] W. Wang, K. C. Teh, and K. H. Li, “Enhanced physical layer security in
worked as a Full Professor until Dec. 2019 and as
d2d spectrum sharing networks,” IEEE Wireless Commun. Lett., vol. 6,
an adjunct Professor from Jan. 2020. Dr. Ahmed
no. 1, pp. 106–109, Dec. 2016.
is currently an LTA Professor at the University of
Ottawa. He has published more than 155 papers in
international journals and conferences. He served as
an Editor for IEEE Communication Surveys and Tutorials from 2007 to 2018
and as a Guest Editor of a special issue on Fairness of Radio Resource
Allocation, EURASIP JWCN in 2009, and as a Guest Editor of a special
issue on Radio Resource Management in Wireless Internet, Wiley Wireless
and Mobile Computing Journal, 2003. Dr. Ahmed is a Senior Member of the
MAJID H. KHOSHAFA (S’18) received his B.Sc. IEEE. He served as a cochair of the Signal Processing Track in ISSPIT’14
in Communication Engineering from Ibb University, and served as a cochair of the Transmission Technologies Track in VTC’10-
Ibb, Yemen, in 2007 and his M.Sc. in Telecommu- Fall, and the multimedia and signal processing symposium in CCECE’09. Dr.
nications Engineering from King Fahd University of Ahmed won the Ontario Graduate Scholarship for Science and Technology
Petroleum and Minerals (KFUPM), Dhahran, Saudi in 1997, the Ontario Graduate Scholarship in 1998, 1999, and 2000, and
Arabia, in 2017. From 2009 to 2010, he worked as a the Communication and Information Technology Ontario (CITO) graduate
Radio Network Planning and Optimization Engineer award in 2000. His research interests include radio resource management in
in MTN Telecommunications, Sana’a, Yemen. He wireless networks, multi-hop relaying, cooperative communication, vehicular
was a Researcher and Teaching Assistant with the ad-hoc networks, cognitive radio networks, and wireless sensor networks. Dr.
Electrical Department, Faculty of Engineering, Ibb Ahmed’s research is sponsored by NSERC, CFI, QNRF, Bell/Aliant and other
University, from 2010 to 2013. He is currently governmental and industrial agencies. Dr. Ahmed is a registered Professional
pursuing the Ph.D. degree with the Memorial University of Newfoundland, St. Engineer (P.Eng.) in the province of Newfoundland, Canada.
John’s, NL, Canada. His research interests include wireless communications,
physical layer security, 5G enabling technologies, D2D communications, and
cognitive radio.
0018-9545 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 27,2020 at 03:25:45 UTC from IEEE Xplore. Restrictions apply.