Professional Documents
Culture Documents
Commnet19v2
Commnet19v2
Commnet19v2
Abstract—This paper investigates the secrecy outage perfor- electromagnetic wave for conveying both information sig-
mance of an energy harvesting-based dual-hop amplify-and- nal as well as energy one, exploited to power the node’s
forward (AF) mixed radio-frequency/underwater optical wireless battery. Interestingly, two practical system designs, namely
communication (RF/UOWC) system. A single-antenna source
node (S) is considered, communicating with one legitimate time switching (TS), and power splitting (PS), allows the
destination node (D) with the aid of a multi-antenna AF relay (R) simultaneous processing of information and energy signals.
device. In this setup, the relay node receives the incoming signal Underwater optical wireless communication (UOWC) tech-
from S via an RF link, which is subject to Rayleigh fading, then nology has attracted remarkable interest as a promising tech-
performs maximal-ratio-combining (MRC) followed by a fixed- nology for high-speed underwater transmissions [8]. It may
gain amplification, before transmitting it to the destination via
a UOWC link, subject to mixture Exponential-Gamma fading. provide a considerably higher data rate (i.e., tens of Gbps)
Assuming the presence of a malicious eavesdropper attempting at midway propagation distance [9], in addition to its low
to intercept the S-R hop, a closed-form expression for the secrecy latency, highly secure communication links, as well as energy
outage probability is retrieved. The derived results provide useful efficiency [10]. However, in spite of all of these promising
insights into the influence of key system parameters on the secrecy features, light propagation in the marine environment is signif-
outage performance. Our analytical results are corroborated
through computer simulations, which verifies their validity. icantly corrupted by the turbulence phenomenon [11], caused
by pressure and temperature inhomogeneities encountered in
I. I NTRODUCTION the underwater medium as well as by ocean currents [10],
[9]. Interestingly, very few works reported on the modelling
In the last decade, with the emergence of the internet of of UOWC channel’s turbulence impairment. Specifically, the
things (IoT) as well as machine-to-machine (M2M) paradigms, authors in [10] proposed the mixture Exponential-Gamma
future wireless networks are targetting new critical services UOWC turbulence-induced fading model, where the vast ma-
such as remote healthcare, surveillance, transportation, etc [1]. jority of turbulence conditions in the underwater medium
In this regard, energy efficiency has been recently among (weak to strong), over both fresh and salt waters.
hottest spots in the design of future cellular networks such It is recalled that due to the broadcast nature of the RF links,
as 5G [2], as well as in wireless sensors network (WSN), the security level of next-generation wireless communication
where power consumption is becoming a major concern in systems has been of paramount importance recently because of
addition to other performance metrics [2], [3]. Indeed, the its vulnerability to intrusion threats of potential eavesdroppers
connected devices in M2M network or WSN are low-cost, [12]. In fact, higher layers consider the security paradigm as
with limited energy resources (e.g., battery), and are typically an application of cryptographic and authentication protocols.
deployed in difficult-to-access scenarios , e.g., structural health Nevertheless, these security protocols are performed assuming
monitoring, mine tunnels, that sense and collect information ideal security at the physical layer [13]. Interestingly, the
from the surrounding area [4], [5], which makes the battery notion of physical layer security, introduced pioneeringly by
recharging or replacement impractical in most of these cases. Wyner in [14], aims at establishing perfectly secure communi-
Recently, energy harvesting has been widely advocated as a cation by exploiting the random characteristics of the wireless
promising solution to overcome the finite-energy dilemma in channel alongside with channel coding [13].
contemporary wireless networks, more particularly in energy- Due to the incurred limitations of OWC by the turbulence,
constrained networks [6]. In practice, energy can be harvested relay-based mixed dual-hop RF/OWC systems have been
from environmental sources such as solar or thermal, or from broadly inspected in the literature as an effective solution to
other wireless radio-frequency (RF) based energy sources [3], mitigate optical channel’s limitations. In this mixed architec-
[7]. In M2M and WSN contexts, the communicating nodes ture, the source transmits the information signal through an RF
harvests energy from either the access points or continuously- link to the relay node. This latter converts the received infor-
powered fixed nodes/control stations [2]. Simultaneous wire- mation signal into an optical light wave and conveys it through
less information and power transfer (SWIPT) technique has either a free-space optical (FSO), visible light communication
attracted significant attention, since it uses the same emitted (VLC), or UOW link to the destination node. The relaying can
be performed with either amplify-and-forward (AF) or decode- to the battery-equipped relay (R), while in the remaining part
and-forward (DF) protocols [15]. In this context, several works of this time slot (i.e., (1 − ε) T0 ), the source node radiates an
such as [16], [17], [18] dealt with the performance analysis energy signal to the relay for energy harvesting purpose. The
of a dual-hop mixed RF/OWC system, where the RF link was relay employs Nr -branch MRC diversity technique for both
subject to Nakagami-m, while the OWC was either a FSO signals, namely the information and the energy one. Thereafter,
or UOW link, subject to Gamma-Gamma, Málaga, or mixture it converts the received electromagnetic wave into an electrical
Exponential-Gamma turbulence fading models. Interestingly, power, stores it on its finite-capacity battery, and exploits it
from a PHY security perspective, several contributions such to forward the information signal, after amplifying it by a
in [9], [18], [19], [20] analyzed the secrecy performance of fixed gain, to the legitimate destination (D) through an UOW
mixed set-ups of either RF/FSO or RF/UOWC systems. link. The end-to-end communication is performed under the
Motivated by the above discussion, we aim herein to malicious attempt of a distant eavesdropper (E) to overhear
determine the secrecy outage probability performance of an the RF communication side.
energy harvesting-based RF/UOWC system with a multiple-
antenna AF relay in the presence of a single wiretapper.
In the considered network, the source node, consisting of A. First time slot: RF links
a distant terrestrial control station, communicates with an 1) Information signal transmission and interception:
underwater destination node (e.g., submarine, sensor) through Within this time slot, S sends the information signal xs to
a moving relay node. The relay performs energy harvesting R during the first εT0 seconds. By its turn, E attempts to
and information forwarding to the destination node via an overhear the broadcasted information signal from S during
UOW link, after amplifying it with a fixed gain. It is worthy this period.
to mention that the considered setup is of practical use in
The instantaneous SNR at each relay branches (Ri )i=1,...,Nr
relay-based wireless sensors networks (WSN) in commercial
as well as at E can be generalized as
as well as military applications. To the best of our knowledge,
the secrecy performance of dual-hop energy harvesting-based PS 2
mixed RF-UOWC systems has not been explored yet in the γSX = |hX | , X = {Ri , E}, (1)
dδX N0X
literature.
The main contributions of this paper are summarized below: with PS denotes the transmit power, dX is the S-X distance,
• The statistical properties of the end-to-end signal-to-noise δ is the free space path-loss exponent, hX , refers to the fading
ratio (SNR) of the legitimate link, as well as of the overall coefficienti of the S-X linkshwith average fading powers ΩX =
wiretap channel SNR are derived, by considering time-
h i
2 2
E |hX | , and N0X = E |nX | stands for power spectral
switching (TS) energy harvesting at the relay.
density (PSD) of the additive white Gaussian noise (AWGN)
• The secrecy outage probability (SOP) performance of
process. It is noteworthy to mention that dRi = dR .
the analyzed network is derived, formulated in terms
of the hypergeometric incomplete Fox’s H-function, and In the sequel, Nakagami-m fading model is taken into
involving the system parameters. Both legitimate and account for representing the channel gain distribution for both
wiretap RF links are subject to Nakagami-m fading. S-Ri and S-E links. Consequently, the received SNR for
Particularly, independent and not identically distributed the S-Ri and S-E links are Gamma-distributed, and their
(i.n.i.d) fading amplitudes are considered for the main respective PDF/CDF expressions are given as [21]
link, while the UOWC channel is modeled by the mixture m
z mv −1
Exponential-Gamma fading. mX mX
fγSX (z) = exp − z , (2)
The remainder of this paper is organized as follows: Section γX Γ (mX ) γX
II introduces the system and channel models, while in Section γinc mX , m
γX z
X
Fγ(1)
PE ; if ER < BR (z) = 1 − ωE(z, 1, λ) − (1 − ω) E(z, α, β), (18)
PR = , (10) eq
PB ; if ER ≥ BR
with
where PE = ETR1 , and PB = BTR1 , with BR denoting the relay
battery capacity. x m mX I −1 X
j
Similarly to (5) and (6), the PDF/CDF of the power PE can 1 ∆Ψz − γI z j
E(z, x, y) = e I
be approximated, using (9) and (10), as Γ (x) Γ (mI ) y k
j=0 k=0
y mI −1 j−k
fPR (y) ≈ ΨmI exp (−Ψy) , (11) mI
γI z
Γ (mI ) ∆Ψz −; −
× G3,0
0,3 .
γinc (mI , Ψy) j! y 0, mI − x, k − x; −
FPR (y) ≈ , (12) (19)
Γ (mI )
and and
m E l−j
j−k " mE mI −1 l mI
m
m I −1 X
l mI # γE − γE 1
−1
X X γI
γI z
(1−ω) T (x, y) = e E 2RS
Γ(α) W
(α, β)
mI
− z
X
Fγ(2) (z) = 1−e γI
, Γ (x) Γ (mE )
l=0 j=0
j!(l − j)!
eq
j=0 k=0
k!(j − k)! +ωW (1, λ)
mXE −1
m −1−n
2 RS − 1
E
(20) mE − 1
−; −
× Υ1−n−l+j
with W (x, y) = 2,0
G0,2 (y) , 2 RS mE n
n=0
x, k; −
j − l − n, 1, Υ 2R − 1 ; −
(ai )i=1:p
2,1 ∆
Gm,n z , p ≥ n, and q ≥ m, refers to the × M1,2 ,
p,q
(bk )k=1:q PB yΥ (x, 1, 1), (j, 1, 1) ; −
Meijer’s G-function [24, Eqs. (1.111), (1.112)], (y) = P∆ z, (24)
By
∆ = κCm
γI
I
, κ = E [I] /µr , E [I] = ωλ + (1 − ω)αβ denoting mI mE m,n (ai , Ai , αi )i=1:p
with Υ = γ + γ 2Rs , and Mp,q x
the average value of the received light irradiance, and I E (bk , Bk , βk )k=1:q
µr = ηE[I]
N0D .
is the upper incomplete Fox’s H-function defined as [25].
Proof: The proof is provided in Appendix A. Proof: See Appendix B.
Remark 1. It is worthy to mention that at RS = 0, the SOP
formula corresponds to the intercept probability (IP) metric.
IV. S ECRECY ANALYSIS
B. Diversity Order
The closed-form SOP expression of the considered PS
At high S-R average SNR values (i.e., ξ = N0R → ∞), the
RF/UOWC system is derived in the following subsection. SOP formula can be expanded as
−Gd
Psop ∼ (Gc ξ) , (25)
A. Secrecy outage probability
which can be formulated similarly as
The SOP is defined as the probability that the secrecy log (Psop ) ∼ −Gd (log (Gc ) + log (ξ)) (26)
capacity, being the difference between the main link capacity
(i.e., S-R-D link) and he wiretap link one, drops below a given with Gc and Gd referring to the coding gain and the diversity
threshold rate RS . In this case, the eavesdropper believably order, respectively.
wiretaps the confidential message. Mathematically, SOP is be So as to evaluate this latter, we consider the equation (26)
expressed as [18] evaluated at two high average SNR values, namely ξ1 and ξ2 .
That is, the diversity order Gd is obtained as
Z ∞
log (Psop2 ) − log (Psop1 )
Fγeq 2R (z + 1) − 1 fγSE (z)dz.
Psop = (21) ∼ Gd , (27)
0 log (ξ1 ) − log (ξ2 )
which provides useful insights on the impact of the involved
Proposition 2. The SOP of the considered communication average SNRs on the system performance.
system can be expressed as
V. N UMERICAL RESULTS
BR The derived analytical results, which are endorsed by re-
Psop = FPr (1 − ωS (1, λ) − (1 − ω) S (α, β))
T1 spective Monte Carlo simulations, are employed to analyze
BR
the secrecy performance of the considered energy harvesting-
+ 1 − FPr (1 − ωT (1, λ) − (1 − ω) T (α, β)) , based mixed RF/UOWC system. Without loss of generality, the
T1
(22) system and channel parameters are set to, mE = 2, ΩE = 2
for the S-E link. The number of antennas at the relay is
where chosen as Nr = {2, 3, 4}, mRi = {1, 2, 3, 3.5, 1}, ΩRi =
{1.5, 2.5, 2, 3} are the fading parameter and average power
of the S-R hop, α = 6.7615, β = 0.3059, λ = 0.1992,
x m E
κmI ΨC mE m I −1 Xj
γI y γE X j ω = 0.5717, η = 0.7, µr = 5 dB stand for the R-D link
S(x, y) =
Γ (x) Γ (mI ) mE 1
−1 k parameters. Futhermore, the harvester conversion efficiency
Γ (mE ) e γE R
2 S j=0 k=0
j−k was fixed to θ = 0.7, the transmit power PS = 10 W, the
mI mXE −1 RS
mE −1−n time slots T = T = 1s, the free space path-loss coefficient
2 −1 0 1
γI mE − 1
× was fixed to δ = 2, and the battery size BR = 500 mAh ×
j! n Υ1+x+j−k+n 2RS mE
n=0
V. In addition, the threshold rate is fixed to RS = 0 (intercept
−x − j + k − n, 1, Υ 2RS − 1 ; − probability case).
3,1 ∆Ψ
× M1,3 ,
y (0, 1, 1), (mI − x, 1, 1), (k − x, 1) ; − In fig. 1, the IP is depicted as a function of the transmit
(23) power to noise ratio NP0R S
in dB, for various values of relay
10 0
10 -1
10 -2
PIP
10 -3
10 -4
10 -5
antennas Nr , NP0E
30
S
= 3 dB, dE = 20 m, and ε = 0.7. 25
50
20 40
15 30
20
PS dR [m] 10
antennas Nr = {2, 3, 4}, and considering N0E = 3 dB, 5
10 PS
N0R [dB]
0
dR = 10 m, and dE = 20 m. One can remark evidently that
the analytical results plotted from (22) by setting RS = 0,
match tightly with its Monte Carlo counterpart, which shows
the accuracy of the adopted approximation of the PDF (22) Fig. 2: IP performance versus PS /N0R , and the distance dR ,
used in the SOP derivation. Furthermore, it is remarkably with NP0E
S
= 3 dB, dE = 20 m, and ε = 0.7.
noticed that the secrecy performance of the system gets better
by increasing the ratio NP0R S
. That is, the greater the harvested
power or the lower is the relay’s receiver noise power, the more
secure the system is. In addition, the IP drops significantly by
increasing the number of receive antennas at the relay.
In fig. 2 shows the IP performance in three dimensions
(3D) versus the S-R distance dR as well as NP0R S
. One can
ascertain from this figure that the IP metric is affected by
the distance dR . In fact, the farther the source and the relay
node are, the lower the received signal power due to path-loss,
and consequently, the greater is the probability to intercept
10 0
the information signal by the wiretapper E. For instance, we
notice that at lower NP0R
S
(e.g., lower transmit power), the path-
loss affects significantly the IP performance, that reaches about 10 -2
1 for NP0R
S
= 0 dB and dR = 30 m.
PIP
0.4 20 PS
greater the time ratio dedicated to energy harvesting, the more α N0R [dB]
0.2 10
secure the overall system is. 0 0
In fig. 4 shows the IP performance in three dimensions
(3D) versus the NP0R S
as well as NP0E S
, for fixed relay and
eavesdropper distances to the source. It is evidently seen that
Fig. 3: IP performance versus the harvester efficiency ε and
the IP is significantly affected by the S-R and S-E links signal
PS /N0R , with NP0E
S
= 3 dB, and dE = 20 m.
to noise ratio. In particular, we can remark that for lower NP0E S
PS
values, the IP drops notably by increasing the N0R . On the
other hand, at higher S-E average SNR values, even increasing
closed-form expression for the secrecy outage probability was
derived, expressed by either the incomplete Fox’s H-function,
based on which the impact of the system parameters on the
overall secrecy performance was inspected. It was shown that
the system’s security improves significantly by increasing the
number of antennas, the legitimate link parameters (i.e., aver-
10 0
age S and R transmit powers (i.e., average S-R SNRs/transmit
power) as well as decreasing the S-R distance. Furthermore,
10 -2 it has been shown also that the harvester efficiency impacts
significantly the secrecy performance, particularly for higher
PIP
j 0
m I −1
mI C
X γI z 1 + x
xu−1 E(2RS (1 + z) − 1, 1, λ)
× R∞
j! BR
= FPr 1 − 0 +E(2RS (1 + z) − 1, α, β) ,
j=0
T1
κΨx −; − ×fγSE (z)dz
× G2,0 dx. (36)
0,2 0, mI − u; −
v
| {z }
J
j and
Relying on the binomial expansion of m I C
γI z 1 + x ,
BR
Z ∞
Fγ(2) 2RS (1 + z) − 1 fγSE (z)dz,
with the help the identity (07.34.03.0228.01) of [26] as well T = FPr
T1 0
eq