Journal of Electrical and Computer Engineering

Journal of Electrical and Computer Engineering / 2021 / Article

Research Article | Open Access

Volume 2021 |Article ID 5547658 | https://doi.org/10.1155/2021/5547658

Phu Tran Tin, Van-Duc Phan, Dong Si Thien Chau, Tan N. Nguyen, Phu X. Nguyen, "Performance Analysis in DF Energy Harvesting Full-Duplex Relaying Network with MRC and SC at the Receiver under Impact of Eavesdropper", Journal of Electrical and Computer Engineering, vol. 2021, Article ID 5547658, 9 pages, 2021. https://doi.org/10.1155/2021/5547658

Performance Analysis in DF Energy Harvesting Full-Duplex Relaying Network with MRC and SC at the Receiver under Impact of Eavesdropper

Academic Editor: Jit S. Mandeep
Received12 Jan 2021
Revised02 Apr 2021
Accepted19 Jun 2021
Published28 Jun 2021

Abstract

This paper investigates the decode-and-forward (DF) full-duplex (FD) relaying system under the presence of an eavesdropper. Moreover, the relay node is able to harvest energy from a transmitter, and then it uses the harvested energy for conveying information to the receiver. Besides, both two-hop and direct relaying links are taking into consideration. In the mathematical analysis, we derived the exact expressions for intercept probability and outage probability (OP) by applying maximal ratio combining (MRC) and selection combining (SC) techniques at the receiver. Next, the Monte Carlo simulation is performed to validate the mathematical analysis. The results show that the simulation curves match the mathematic expressions, which confirms the analysis section.

1. Introduction

Radio frequency- (RF-) enabled wireless power transfer (WPT) has recently become a promising technique to overcome the energy limitation for wireless communication networks [110]. Moreover, because RF signal is able to carry both energy and information, one attractive direction is to transmit information and energy simultaneously (SWIPT) jointly. The SWIPT relaying networks have been intensively studied in [1116]. Besides energy harvesting, physical layer security for relay networks received great attention from researchers [1722]. Recent advances in self-interference cancellation (SIC) techniques achieve high SI reduction. Therefore, FD relaying communications become a promising solution to overcome the spectrum scarcity of wireless systems [2325].

In this paper, we consider a new system model to investigate the trade-off between physical layer security (PLS) and reliability for an energy-constrained FD relaying network. Further, the direct link between transmitter and receiver is taken into account to improve the total network performance. Moreover, the maximal ratio combining (MRC) and selection combining (SC) protocols are exploited at the eavesdropper and destination to enhance their received rate. The research contributions are summarized as follows:(i)We present an FD- and SWIPT-assisted relaying network in decode-and-forward (DF) under the presence of a direct link. Particularly, an eavesdropper is able to overhear the information transmission from source to destination via a relay. Moreover, an FD-enabled relay node is able to get energy from a transmitter and use it to transfer signals to the a receiver. Notably, the relay node can simultaneously receive information from the source and transmit it to the destination using the FD technique.(ii)We derive closed-form expressions of intercept probability (IP) at the eavesdropper E and outage probability (OP) at the destination D in maximal ratio combining (MRC) and selection combining (SC) techniques.(iii)The correctness of the developed analysis is validated through the Monte Carlo simulation. On one hand, we investigate the security perspective in terms of intercept probability. On the other hand, system reliability is also studied through outage probability. Consequently, a trade-off between IP and OP can provide many insightful and useful perspectives for system designers.

2. System Model

In Figure 1, we consider a relaying network where a relay R aids in conveying data from a transmitter S to a receiver D in the presence of one eavesdropper E. In particular, an eavesdropper is trying to get the information from S and R by applying maximal ratio combining (MRC) and selection combining (SC) techniques. In Figure 2, the relay R can harvest energy from the source during . In the remaining time, , the information process is executed.

We assume that the channel between two users follows block Rayleigh fading, where channel coefficients are unchanged during a time frame and change independently across time frames. Moreover, let us denote for as the channel coefficient of the link between nodes X and Y. Because the channels are Rayleigh distribution, the channel gains such as and are exponential random variables (RVs) whose cumulative distribution function (CDF) and probability density function (PDF) are, respectively, represented aswhere is rate parameter of exponential distribution.

The received signal at the relay can be expressed aswhere is the energy symbol and is the loopback interference due to full-duplex relaying and satisfies , where denotes the expectation operation. denotes the zero mean additive white Gaussian noise (AWGN) with variance N0.

At the first phase, the harvested energy at the relay can be computed bywhere denotes the energy conversion efficiency.

From (3), the average transmit power of the relay node can be obtained aswhere

Next, in the second phase, the eavesdropper E may intercept signals from both relay R and source S. Nevertheless, source S also generates artificial noise to prevent E from overhearing the source information. Moreover, since the relay R and destination D are legitimate users, they are assumed to know the artificial noise created by S. Consequently, they can cancel the artificial noise at the receiver circuit. Therefore, the received signal at E from relay R and source S can be, respectively, expressed aswhere is the AWGN with variance N0.

Since we adopt the decode-and-forward (DF) protocol, the signal to interference noise ratios (SINR) at the eavesdropper in the second phase from (5) are, respectively, given bywhere

As mentioned in the above discussion, the destination D can cancel the artificial noise from source S. Consequently, the received signal at the destination from relay R and source S during the second phase can be expressed aswhere is the AWGN with variance N0.

3. Intercept Probability (IP) Analysis

Destination D will be intercepted if E can successfully wiretap signal; that is, where and R is the target rate.

Therefore, the IP of the system can be expressed as

3.1. Instantaneous End-to-End SNR at E Using the MRC Technique

In this case, the end-to-end SNR at E from (6) can be given by

Then, the IP in (7) can be rewritten aswhere

In order to find the probability in (10), we have to find the CDF of X and PDF of Y. So, the CDF of X can be calculated by

By applying (Eq. 3.324.1, [26]), (11) can be obtained by

Next, the CDF of Y can be formulated as

The PDF of Y is given by

Applying (12) and (14), the IP, in this case, can be claimed by

3.2. Instantaneous End-to-End SNR at E Using the SC Technique

In this case, the end-to-end SNR at E can be given by

Then, the IP can be expressed as

By applying (12) and (13), the expression of can be expressed as

4. Outage Probability (OP) Analysis

The OP can be defined by

4.1. Instantaneous End-to-End SNR at D Using the MRC Technique

From (2) and (7), outage probability of relay link can be computed at

From (20), we can see that, to successfully receive data at the destination D, the system needs to decode in the first and second hop.

Equivalently, we can represent the end-to-end SINR of the relay path by

By using MRC technique, the received SINR at destination can be given aswhere .

The OP, in this case, can be expressed by

From (21), can be calculated aswhere

Substituting (23) and (24) into (22), can be mathematically calculated as

By substituting (25) into (21), can be given by

4.2. Instantaneous End-to-End SNR at D Using the SC Technique

Similar to MRC technique as mentioned above, the overall SNR at D can be given by

Hence, the OP can be calculated aswhere

Finally, substituting (28) and (29) into (27), the OP in this scenario can be expressed as

5. Simulation Results

The simulation results are given to validate the performance, that is, IP and OP, of our proposed schemes under maximal ratio combining (MRC) and selection combining (SC) techniques. The results are obtained by averaging 105 Rayleigh channels [2729].

In Figures 3 and 4, we investigate the IP and OP as functions of where . One can observe from Figure 3 that as increases from −5 to 20 dB, the IP performance improves accordingly The source’s transmit power is proportional to value, since is defined as a ratio between source transmit power and additive white Gaussian noise. Thus, the higher the value is, the better the SNR at eavesdropper can be obtained. Furthermore, the IP of the MRC technique outperforms that of the SC technique. It is because the eavesdropper can overhear information from both source S and relay R using MRC while only receiving signals from the source with the SC technique. In Figure 4, the outage performance of MRC is superior to that of the SC method. It is because the destination can combine signals from relay and source in MRC, which only receives this information from relay user in the SC method. As shown from Figures 3 and 4, the performances of both destination D and eavesdropper E can be continuously improved by increasing the transmit power. Thus, the designer should select a suitable value of when designing in practice for trade-off between security and reliability of the system.

Figures 5 and 6 show the IP and OP as a function of for the time-switching relaying (TSR) protocol, where . The value of is crucial, since it influences both the harvested energy at the relay and the information transmission from the relay to the destination. As a result, the higher the value of is, the more energy the relay can harvest. However, there is less time for information transmission to the destination. Therefore, the OP can obtain the best value at the optimal point of ; then the performance worsens. Notably, when the value of is small, the eavesdropper has a low probability of intercepting the information. For instance, the IPs of MRC and SC are 0.073 and 0.0068, respectively, when α equals 0.05. When α is higher than the optimal value, the outage performance and system security are worse. It provides useful information for designing a practical system.

In Figures 7 and 8 , we investigate the IP and OP as a function of rate threshold requirement to decode the signal successfully, where . As observed from Figures 7 and 8, as the rate threshold increases from 0.25 to 4 bps/Hz, the IP and OP performance degrades accordingly It is expected since when the rate requirement is higher, the eavesdropper and destination need to obtain a higher transmission rate to decode the signal. However, the transmission rate is limited by many factors such as channel gain and allocated time for data transmission. One more interesting point is that the IP and OP performances of MRC and SC are converged to a saturation value when the rate threshold increases.

In Figures 9 and 10, we study the influences of energy conversion efficiency on the network performance, that is, IP and OP. It can be seen that both IP and OP are improved with higher values of IP and OP. This can be explained by the fact that the higher the conversion rate is, the more transmit power at the relay R can be obtained, which improves the channel gain to eavesdropper and destination. Moreover, similar to Figures 38, the IP and OP performance of the MRC is better than that of the SC, which shows the superiority of the MRC technique. However, the MRC technique requires more complicated hardware, which is not always suitable in practice. Thus, the evaluations in our work give different scenarios for the designer to build a system in reality.

6. Conclusion

This paper investigated the decode-and-forward (DF) full-duplex (FD) relaying networks under the presence of a direct link. Specifically, the relay node can harvest energy from the source and use it to transmit information to the destination. By considering the above discussions, we derive the closed-form expressions of the intercept probability (IP) and the outage probability (OP) in both maximal ratio combining (MRC) and selection combining (SC) techniques at the receiver. Besides, the simulation results show the exactness of the mathematical results compared to simulation ones. Besides, the IP and OP of the MRC technique obtain better performance in comparison to those of the SC technique. In particular, the system security is improved significantly when the time splitting factor value is small. We can extend this work to the case where the source and eavesdropper are equipped with multiple antennas.

Data Availability

No data were used in this paper. The authors just proposed the system and simulated it by MATLAB.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Authors’ Contributions

Phu Tran Tin (phutrantin@iuh.edu.vn) was the main performer, while Dong Si Thien Chau (dongsithienchau@tdtu.edu.vn), Van-Duc Phan (duc.pv@vlu.edu.vn), Tan N. Nguyen (nguyennhattan@tdtu.edu.vn), and Phu X. Nguyen (phunx4@fpt.edu.vn, phunx4@fe.edu.vn) worked as the advisors of Phu Tran Tin.

Acknowledgments

This research was supported by the Industrial University of Ho Chi Minh City (IUH), Vietnam, under Grant no. 72/HD-DHCN.

References

  1. L. R. Varshney, “Transporting information and energy simultaneously,” in Proceedings of the 2008 IEEE International Symposium on Information Theory, pp. 1612–1616, Toronto, Canada, July 2008. View at: Publisher Site | Google Scholar
  2. T. Dinh Hieu, T. T. Duy, and S. G. Choi, “Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper,” in Proceedings of the 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 1-2, Chuncheon, Korea (South), February 2018. View at: Publisher Site | Google Scholar
  3. Z. Mobini, M. Mohammadi, and C. Tellambura, “Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, pp. 621–634, 2019. View at: Publisher Site | Google Scholar
  4. T. D. Hieu, G. Sumit, C. Symeon, and O. Bjorn, “Throughput maximization for wireless communication systems with backscatter- and cache-assisted UAV technology,” https://arxiv.org/abs/2011.07955. View at: Google Scholar
  5. P. Grover and A. Sahai, “Shannon meets tesla: wireless information and power transfer,” in Proceedings of the 2010 IEEE International Symposium on Information Theory, pp. 2363–2367, Austin, TX, USA, June 2010. View at: Publisher Site | Google Scholar
  6. T. N. Nguyen, M. Tran, T.-L. Nguyen, Duy-hung Ha, and Miroslav voznak, “Performance analysis of a user selection protocol in cooperative networks with power splitting protocol-based energy harvesting over nakagami-m/Rayleigh channels,” Electronics, vol. 8, pp. 1–14, 2019. View at: Publisher Site | Google Scholar
  7. D. H. Tran, T. D. Le, and B. S. Kim, “Stability-aware geographic routing in energy harvesting wireless sensor networks,” Sensors, vol. 16, pp. 1–15, 2016. View at: Publisher Site | Google Scholar
  8. T. N. Nguyen, T. H. Quang Minh, T. Phuong, P. T. Tran et al., “Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods,” Ad Hoc Networks, vol. 84, pp. 178–187, 2019. View at: Publisher Site | Google Scholar
  9. D.-H. Tran, T. X. Vu, S. Chatzinotas, S. ShahbazPanahi, and B. Ottersten, “Coarse trajectory design for energy minimization in UAV-enabled,” IEEE Transactions on Vehicular Technology, vol. 69, no. 9, pp. 9483–9496, 2020. View at: Publisher Site | Google Scholar
  10. T. N. Nguyen, T. Minh, P. T. Tran, and M. Voznak, “Adaptive energy harvesting relaying protocol for two-way half duplex system network over rician fading channels,” Wireless Communications and Mobile Computing, vol. 2018, Article ID 7693016, 10 pages, 2018. View at: Publisher Site | Google Scholar
  11. R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wireless information and power transfer,” IEEE Transaction on Wireless Communications, vol. 12, no. 5, pp. 1989–2001, 2013. View at: Publisher Site | Google Scholar
  12. L. Dai, B. Wang, M. Peng, and S. Chen, “Hybrid precoding-based millimeter-wave massive mimo-noma with simultaneous wireless information and power transfer,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 1, pp. 131–141, 2019. View at: Publisher Site | Google Scholar
  13. T. N. Nguyen, P. T. Tran, and M. Voznak, “Wireless energy harvesting meets receiver diversity: a successful approach for two-way half-duplex relay networks over block Rayleigh fading channel,” Computer Networks, vol. 172, Article ID 107176, 2020. View at: Publisher Site | Google Scholar
  14. A. Prathima, D. S. Gurjar, H. H. Nguyen, and A. Bhardwaj, “Performance analysis and optimization of bidirectional overlay cognitive radio networks with hybrid-SWIPT,” IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13467–13481, 2020. View at: Publisher Site | Google Scholar
  15. Y. Liu, Y. Ye, H. Ding, F. Gao, and H. Yang, “Outage performance analysis for SWIPT-based incremental cooperative NOMA networks with non-linear harvester,” IEEE Communications Letters, vol. 24, no. 2, pp. 287–291, 2020. View at: Publisher Site | Google Scholar
  16. D. S. Gurjar, H. H. Nguyen, and P. Pattanayak, “Performance of wireless powered cognitive radio sensor networks with nonlinear energy harvester,” IEEE Sensors Letters, vol. 3, no. 8, Article ID 7500704, pp. 1–4, 2019. View at: Publisher Site | Google Scholar
  17. D.-H. Ha, T. N. Nguyen, M. H. Q. Tran, X. Li, P. T. Tran, and M. Voznak, “Security and reliability analysis of a two-way half-duplex wireless relaying network using partial relay selection and hybrid TPSR energy harvesting at relay nodes,” IEEE Access, vol. 8, pp. 187165–187181, 2020. View at: Publisher Site | Google Scholar
  18. Q. V. Do, T.-N.-K. Hoan, and I. Koo, “Optimal power allocation for energy-efficient data transmission against full-duplex active eavesdroppers in wireless sensor networks,” IEEE Sensors Journal, vol. 19, no. 13, pp. 5333–5346, 2019. View at: Publisher Site | Google Scholar
  19. P. T. Tin, B. H. Dinh, T. N. Nguyen, D. H. Ha, and T. T. Trang, “Power beacon-assisted energy harvesting wireless physical layer cooperative relaying networks: performance analysis,” Symmetry, vol. 12, no. 1, 2020. View at: Publisher Site | Google Scholar
  20. A. Arafa, W. Shin, M. Vaezi, and H. V. Poor, “Secure relaying in non-orthogonal multiple access: trusted and untrusted scenarios,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 210–222, 2020. View at: Publisher Site | Google Scholar
  21. Tin Phu Tran, Dang The Hung, N. Tan, D. Tran, and M. Voznak, “Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments,” Entropy, vol. 21, no. 2, pp. 1–16, 2019. View at: Publisher Site | Google Scholar
  22. L. Xingwang, Z. Mengle, L. Yuanwei, L. Lihua, D. Zhiguo, and N. Arumugam, “Secrecy analysis of ambient backscatter NOMA systems under I/Q imbalance,” IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 12286–12290, 2020. View at: Google Scholar
  23. H. Dinh Tran, D. Trung Tran, and S. G. Choi, “Secrecy performance of a generalized partial relay selection protocol in underlay cognitive networks,” International Journal of Communication Systems, vol. 31, no. 17, Article ID e3806, 2018. View at: Publisher Site | Google Scholar
  24. T. N. Nguyen, M. Tran, D. H. Ha, T. T. Trang, and M. Voznak, “Multi-source in DF cooperative network with PRS protocol based full-duplex energy harvesting over a Rayleigh fading channel: performance analysis,” Proceedings of the Estonian Academy of Sciences, vol. 68, no. 3, 2019. View at: Publisher Site | Google Scholar
  25. D. H. Tran, V. D. Nguyen, G. Sumit, C. Symeon, X. T. Vu, and O. Bjorn, “UAV relay-assisted emergency communications in IoT networks: resource allocation and trajectory optimization,” https://arxiv.org/abs/2008.00218. View at: Google Scholar
  26. D. Zwillinger, Table of Integrals, Series, and Products, Academic Press, Springer, New York, NY, USA, 2015.
  27. T. Nguyen, T. Quang Minh, P. Tran, and M. Vozňák, “Energy harvesting over rician fading channel: a performance analysis for half-duplex idirectional sensor networks under hardware impairments,” Sensors, vol. 18, no. 6, 2018. View at: Publisher Site | Google Scholar
  28. P. Tran Tin, T. N. Nguyen, M. Tran, and L. Sevcik, “Exploiting direct link in two-way half-duplex sensor network over block Rayleigh fading channel: upper bound ergodic capacity and exact SER analysis,” Sensors, vol. 20, no. 4, 1165 pages, 2020. View at: Publisher Site | Google Scholar
  29. D. Le, D. H. Tran, S. Choi, B. Kim, and B. An, “Impact of beamforming on the path connectivity in cognitive radio ad-hoc networks,” Sensors, MDPI, vol. 17, no. 4, 2016. View at: Publisher Site | Google Scholar

Copyright © 2021 Phu Tran Tin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Related articles

No related content is available yet for this article.
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views456
Downloads410
Citations

Related articles

No related content is available yet for this article.

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.