Security and Communication Networks

Security and Communication Networks / 2017 / Article

Research Article | Open Access

Volume 2017 |Article ID 2569239 | 8 pages | https://doi.org/10.1155/2017/2569239

Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels

Academic Editor: Guangjie Han
Received05 Jul 2017
Accepted15 Aug 2017
Published17 Sep 2017

Abstract

This paper studies the relay selection schemes in mobile communication system over Nakagami-m channel. To make efficient use of licensed spectrum, both single relay selection (SRS) scheme and multirelays selection (MRS) scheme over the Nakagami-m channel are proposed. Also, the intercept probability (IP) and outage probability (OP) of the proposed SRS and MRS for the communication links depending on realistic spectrum sensing are derived. Furthermore, this paper assesses the manifestation of conventional direct transmission scheme to compare with the proposed SRS and MRS ones based on the Nakagami-m channel, and the security-reliability trade-off (SRT) performance of the proposed schemes and the conventional schemes is well investigated. Additionally, the SRT of the proposed SRS and MRS schemes is demonstrated better than that of direct transmission scheme over the Nakagami-m channel, which can protect the communication transmissions against eavesdropping attacks. Additionally, simulation results show that our proposed relay selection schemes achieve better SRT performance than that of conventional direct transmission over the Nakagami-m channel.

1. Introduction

Cognitive radio (CR) [1] is considered as one of the most promising technologies to significantly improve spectrum utilization [2]. According to obtained information in different environments, transmission parameters, such as frequency, transmission power, modulation, and bandwidth, can be adaptively changed in CR networks [3]. Based on the highly dynamic nature existing in architecture of CR networks, however, legitimate CR devices expose themselves to both internal and external attackers. The security problem is urgent to solve in order to devise dependable CR networks. Hence, the security problems of CR network [46] have attracted great attention in both academia and industry. Security and reliability are two vital indexes of communication systems, but they fail to have good performance simultaneously in many cases. Therefore, it is of great significance to enhance the security-reliability trade-off (SRT) [7] performance based on the CR network.

Physical-layer security is regarded as one of effective approaches to improve the security of the wireless communications. On the one hand, point-to-point (P2P) transmission techniques, such as MIMO diversity [8], jamming [9], and beamforming [10], have been developed in order to improve dependable wireless links. Also, since localization provides fundamental support for many location-aware protocols and applications in the communication networks, it is one of the key technologies in wireless sensor networks (WSNs) [11]. For the purpose of improving localization accuracy and energy consumption aspects which are essential factors of designing mobile communication network, a novel algorithm considering the aftermath of disasters based on wireless sensor networks (WSNs) was provided by Han and his colleagues [12]. As observed, in many literatures about physical-layer security, some scholars employ signal processing techniques such as the precoding and beaming to settle relevant issues aiming at obtaining better performance. Recently, an agile confidential transmission strategy combining big data driven cluster and opportunistic beamforming was well investigated [13]. On the other hand, the author in [14] explored a scenario where an eavesdropper appears to tap the transmissions of the source and the relays. Also, node cooperation is employed to overcome eavesdropping without upper layer data encryption and improve the performance of secure wireless communications in the physical-layer security aspect [15]. In addition, relays selection schemes over the Rayleigh fading channel were proposed to improve the SRT performance of the CR networks [16]. However, the Rayleigh channel fails to be corresponding to the characteristics of many actual channels.

The Nakagami-m channel is more accordant with channel characteristics in realistic communication systems compared with that of Rayleigh fading channel and Ricean channel. In addition, it is widely used for modeling wireless fading channels, including Rayleigh and the one-sided Gaussian distribution as special cases [1719]. However, few scholars have employed this kind of channels in SRT analysis. This causes the failure of previous SRT analysis to meet the performance in realistic mobile communication system in general. Motivated by the above considerations, a mobile communication network based on the Nakagami-m channel is conducted as a branch of CR networks. This network comprises one primary base station (PBS), eavesdropper (), some primary users (PUs), multiple mobile terminals (MT), multiple relays (MUR), and a secondary transmitter (ST). Different from [16], we propose a scenario that investigates the SRT performance over the Nakagami-m channel, which can better capture the characteristics of the physical channel [2023]. Specifically, relay selection schemes in mobile communication systems over the Nakagami-m channel are well investigated, and mathematical SRT analysis of the proposed SRS and MRS schemes over the Nakagami-m channel is first provided. Furthermore, simulation results show limpidly that the proposed SRS and MRS schemes over the Nakagami-m channel generally outperform the direct transmission scheme in their SRT.

The remainder of this paper is organized as below. Section 2 develops the system model. And the relay selection schemes over the Nakagami-m channel and mathematical analysis are provided in Section 3. In Section 4, simulation results and analysis are presented, which is followed by the conclusions in Section 5.

2. System Model

A typical mobile communication system is considered in Figure 1. As we know, the ST should detect by spectrum sensing whether the PBS occupies the licensed spectrum. In case of this situation, the ST cannot transmit randomly to avoid interference within the PUs. On the contrary, the licensed spectrum is not occupied. Meanwhile, tries to intercept the secondary transmission process. For convenience, we define and , respectively, as the cases in which the licensed spectrum is unoccupied and occupied by the PBS in a special time slot. Additionally, represents the status that the licensed spectrum is detected by spectrum sensing. Hence, the status of the spectrum is given aswhere the probability of the correct detection of the presence of PBS and the associated false alarm probability are noted as and , respectively. To ensure that the interference exerted on the PUs is below a tolerable level, we set and according to the IEEE 802.22 standard [14].

3. SRT Analysis over Nakagami-m Channel

In this section, we present the SRT analysis about the direct transmission and the SRS and MRS schemes over the Nakagami-m channel. As is analyzed in [14], IP and OP, respectively, represent the security and reliability which are experienced by the eavesdropper and destination. Hence, the channel capacities at the destination and eavesdropper are assumed as and and the OP and IP can be expressed as

3.1. Direct Transmission Scheme

In this section, we consider a conventional direct transmission scheme over the Nakagami-m channel. Let and denote the transmit powers of the ST and PBS, respectively. For the licensed spectrum is considered to be unoccupied by the ST (i.e., ), the signal received at the PBS can be expressed asHere, and represent the random symbols transmitted by the ST and the PBS at a special time instance. Also, without loss of generality, assume that , where is the expected value operator. At the same time, and are noted as the fading coefficients of the channel spanning from ST to MT and from PBS to MT, respectively. Furthermore, is the additive white Gaussian noise (AWGN). Then, the random variable can be given byHowever, for that the wireless medium has a broadcast nature, the signal of the ST which will be overheard by can be written bySupposing that a spectrum hole has been detected, from (5), we obtainwhere , , and . In (7), and can be obtained asFurthermore, we can observe from (3) that when the capacity of the ST- channel exceeds the data rate, an intercept event will occur. Hence, the corresponding IP is given byTo be specific, and are written as

3.2. Single Relay Selection

The SRS scheme over the Nakagami-m channel is investigated in this section. Specifically, once the licensed spectrum is deemed to be unoccupied, the ST first broadcasts its signal to the MUR, which attempts to decode from their received signals. For convenience, is denoted as the set of MUR that succeed in decoding . MUR are assumed in this network, which consist of possible subsets , and the sample space of can be formulated aswhere 0 and represent the empty set and the th nonempty subset of the relays. If the set is empty, no MUR successfully decodes . By contrast, a specific MUR is selected from to decode the signal and transmit it to the MT. Hence, given that , we can work out the signal received at a specific MUR-To make SRT analysis, noting that , the OP of the cognitive transmission depending on SRS can be denoted aswhere . Specifically, (13) consists of the following parts:Also, we discuss the IP of the SRS scheme. From (6), the IP can be given byHere, with the aids of functional analysis theory and multivariate integral theory, we express , , and as below.

3.3. Multirelays Selection Scheme

We provide the SRT analysis which is based on the MRS scheme over the Nakagami-m channel in this subsection. Specifically, is first transmitted to MUR over a detected spectrum hole. As is mentioned in Section 3.2, we denote by the set of SRS with successful decoding. If it is empty, all MUR fail to decode and will not pass the source signal forward, leading to the difficulty in decoding of MT and . If it is not empty, all MUR within will be utilized for simultaneously transmitting to MT. This is different from the SRS scheme. When it comes to power consumption, a fair comparison with the SRS scheme can be made under the conditions that the overall transmit power across all MUR is constrained to . For the sake of making good use of MRS, we define the weight vector as

And the signals received at MT and are expressed aswhere . Then based on the Nakagami-m channel, we study the SRT performance of the MRS scheme. Similar to (7), the OP analysis is obtained asThe IP analysis of the MRS scheme can be given as follows:To find a general closed-form OP and IP expression for the MRS scheme is quite a challenge, and thus we use computer simulations to get the numerical SRT performance of the MRS scheme. Clearly, when is given as the fading coefficients of the channel spanning from MUR- to PBS, we have . This leads to a performance gain for the MRS over that of SRS in terms of maximizing the legitimate transmission capacity. Furthermore, for a fixed outage requirement, the MRS scheme can, in comparison with the SRS scheme, realize a better intercept performance over the Nakagami-m channel. This is due to the fact that an outage reduction achieved by the capacity enhancement of the legitimate transmission relaying on MRS would be converted into an intercept improvement. Meanwhile, in the MRS scheme, when simultaneously transmitting to MT, it will require a high-complexity symbol-level synchronization for multiple distributed relays, whereas the SRS does not require such a complex synchronization process. Therefore, we can achieve a better performance of MRS over SRS at the expense of a higher implementation.

4. Numerical Results and Discussion

We give a numerical analysis of our expressions using different types of parameters in this section. Specifically, the OP and the IP in the direct transmission schemes, SRS schemes, and MRS schemes are investigated. Theoretical results and the simulation results are presented in the case under different conditions in the Nakagami-m channel model. Initially, is set to , while is 0.01. Also, we set the initial signal-to-noise ratio (SNR) as 10 dB and data rate is employed as  bit/s/Hz in this simulation.

Figure 2 shows the simulation results when and , the IP and OP of the direct transmission, along with the SRS and MRS schemes. Here the solid lines and discrete marker symbols each represent the theoretical and simulated results. As is shown in the figure, the proposed SRS and MRS schemes both attain lower OP (reliability) and IP (security) than the direct transmission scheme over the Nakagami-m channel. Also, the OP and IP of the MRS are lower than those of SRS scheme. Hence, we can conclude that the SRS and MRS schemes have better SRT performance than the direct transmission scheme. However, considering that the MRS scheme needs to work with very complex and high-cost symbol-level synchronization system, it is inappropriate for us to assert that the MRS scheme outweighs the SRS scheme.

Figure 3 illustrates the simulation results in the case of and . Compared with the simulation results shown in Figure 2, we can observe that, with the increasing number of the relays, the OP and IP are decreasing. Meanwhile, the performance of the SRS and MRS schemes significantly improves when the number of relays increases. Furthermore, similar to the analysis given in Figure 2, the superiority of the MRS over the SRS shows when elaborate symbol-level synchronization is required among the multiple relays for simultaneously transmitting to the relays or base stations.

In Figure 4, the simulation results under different fading exponents are presented, in which case is considered. Figure 4 shows that the proposed SRS and MRS schemes generally outstrip the conventional direct transmission in terms of IP and OP, in the case that . Moreover, compared with the results depicted in Figure 2, the SRT of the SRS and MRS schemes rises as the fading exponent increases from 2 to 3. Additionally, the MRS schemes outperform the SRS approach in the IP and OP analysis, which further confirms the strength of the MRS for protecting the MUR-PBS links against eavesdropping attacks.

In Figure 5, and are set 0.9 and 0.1, respectively. From Figures 2 and 5, we observe the proposed SRS and MRS schemes perform better than the direct transmission in terms of OP and IP aspect, and the SRT performance improves when . It illustrates that the SRT performance of the SRS and MRS schemes improves when the correct detection probability increases. Additionally, the MRS schemes outperform the SRS approach in the SRT analysis, which implies the strength of the MRS for protecting the MUR-PBS links against eavesdropping attacks although it needs complex synchronization system.

5. Conclusion

We propose new relay selection schemes over the Nakagami-m channel in the mobile communication system in this paper. SRS and MRS schemes are presented to assess the security and reliability of the communication links. Meanwhile, simulation results indicate a better performance of the SRS and MRS schemes than the direct transmission scheme over the Nakagami-m channel. Additionally, with the increasing number of the relays, the SRT performance of both the SRS and the MRS schemes improves remarkably, which demonstrates their benefits in enhancing both the security and reliability of the mobile communication system.

Conflicts of Interest

The authors declare no conflicts of interest.

Authors’ Contributions

Hongji Huang and Wanyou Sun derived the performance bound and designed the experiments; Hongji Huang and Guan Gui performed the experiments; Hongji Huang and Jie Yang analyzed the data; Hongji Huang and Guan Gui wrote the paper.

Acknowledgments

This work is supported by National Natural Science Foundation of China Grants (no. 61401069, no. 61671252, no. 61471202, and no. 61322112), Jiangsu Specially Appointed Professor Grant (RK002STP16001), high-level talent startup grant of Nanjing University of Posts and Telecommunications (XK0010915026), and “1311 Talent Plan” of Nanjing University of Posts and Telecommunications.

References

  1. G. Han, L. Liu, S. Chan, R. Yu, and Y. Yang, “HySense: a hybrid mobile crowd sensing framework for sensing opportunities compensation under dynamic coverage constraint,” IEEE Communications Magazine, vol. 55, no. 3, pp. 93–99, 2017. View at: Publisher Site | Google Scholar
  2. Y. Zhang, Y. Xie, Y. Liu, Z. Feng, P. Zhang, and Z. Wei, “Outage probability analysis of cognitive relay networks in nakagami-m fading channels,” in Proceedings of the 76th IEEE Vehicular Technology Conference (VTC Fall '12), 5, p. 1, Quebec City, Canada, September 2012. View at: Publisher Site | Google Scholar
  3. S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, 2005. View at: Publisher Site | Google Scholar
  4. J. Mitola and G. Q. Maguire, “Cognitive radio: making software radios more personal,” IEEE Personal Communications, vol. 6, no. 4, pp. 13–18, 1999. View at: Publisher Site | Google Scholar
  5. H. Chen, M. Zhou, L. Xie, and J. Li, “Cooperative spectrum sensing with M-ary quantized data in cognitive radio networks under SSDF attacks,” IEEE Transactions on Wireless Communications, vol. 16, no. 8, pp. 5244–5257, 2017. View at: Publisher Site | Google Scholar
  6. G. Baldini, T. Sturman, A. R. Biswas, R. Leschhorn, G. Gódor, and M. Street, “Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead,” IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 355–379, 2012. View at: Publisher Site | Google Scholar
  7. R. Yin, S. Wei, J. Yuan, X. Shan, and X. Wang, “Tradeoff between reliability and security in block ciphering systems with physical channel errors,” in Proceedings of the IEEE Military Communications Conference (MILCOM '10), pp. 2156–2161, San Jose, Claif, USA, November 2010. View at: Publisher Site | Google Scholar
  8. J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure communications in MIMO relay networks,” IEEE Transactions on Signal Processing, vol. 59, no. 10, pp. 4871–4884, 2011. View at: Publisher Site | Google Scholar | MathSciNet
  9. H. Long, W. Xiang, J. Wang, Y. Zhang, and W. Wang, “Cooperative jamming and power allocation with untrusty two-way relay nodes,” IET Communications, vol. 8, no. 13, pp. 2290–2297, 2014. View at: Publisher Site | Google Scholar
  10. C. Jeong, I.-M. Kim, and D. I. Kim, “Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system,” IEEE Transactions on Signal Processing, vol. 60, no. 1, pp. 310–325, 2012. View at: Publisher Site | Google Scholar | MathSciNet
  11. G. Han, J. Jiang, C. Zhang, T. Q. Duong, M. Guizani, and G. K. Karagiannidis, “A survey on mobile anchor node assisted localization in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2220–2243, 2016. View at: Publisher Site | Google Scholar
  12. G. Han, X. Yang, L. Liu, M. Guizani, and W. Zhang, “A disaster management-oriented path planning for mobile anchor node-based localization in wireless sensor networks,” IEEE Transactions on Emerging Topics in Computing, no. 99, article 1, 2017. View at: Publisher Site | Google Scholar
  13. S. Han, S. Xu, W. Meng, and C. Li, “An agile confidential transmission strategy combining big data driven cluster and OBF,” IEEE Transactions on Vehicular Technology, no. 99, article 1, 2017. View at: Publisher Site | Google Scholar
  14. Y. Zou, X. Wang, W. Shen, and L. Hanzo, “Security versus reliability analysis of opportunistic relaying,” IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2653–2661, 2014. View at: Publisher Site | Google Scholar
  15. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875–1888, 2010. View at: Publisher Site | Google Scholar | MathSciNet
  16. Y. Zou, B. Champagne, W.-P. Zhu, and L. Hanzo, “Relay-selection improves the security-reliability trade-off in cognitive radio systems,” IEEE Transactions on Communications, vol. 63, no. 1, pp. 215–228, 2015. View at: Publisher Site | Google Scholar
  17. H. Lei, C. Gao, I. S. Ansari et al., “Secrecy outage performance of transmit antenna selection for MIMO underlay cognitive radio systems over nakagami-m channels,” IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2237–2250, 2017. View at: Publisher Site | Google Scholar
  18. Z. Shi, S. Ma, G. Yang, K. Tam, and M. Xia, “Asymptotic outage analysis of HARQ-IR over time-correlated nakagami-m fading channels,” IEEE Transactions on Wireless Communications, no. 99, article 1, 2017. View at: Publisher Site | Google Scholar
  19. M. O. Hasna and M.-S. Alouini, “Outage probability of multihop transmission over Nakagami fading channels,” IEEE Communications Letters, vol. 7, no. 5, pp. 216–218, 2003. View at: Publisher Site | Google Scholar
  20. IEEE 802.22 Working Group, IEEE P802.22/D1.0 draft standard for wireless regional area networks part 22: Cognitive wireless RAN medium access control (MAC) and physical layer (PHY) specifications: Policies and procedures for operation in the TV bands, Apr. 2008.
  21. J. Zhang, Y. Zhang, Y. Yu, R. Xu, Q. Zheng, and P. Zhang, “3-D MIMO: how much does it meet our expectations observed from channel measurements?” IEEE Journal on Selected Areas in Communications, vol. 35, no. 8, pp. 1887–1903, 2017. View at: Publisher Site | Google Scholar
  22. J. Zhang, P. Tang, L. Tian, Z. Hu, T. Wang, and H. Wang, “6–100 GHz research progress and challenges from a channel perspective for fifth generation (5G) and future wireless communication,” Science China Information Sciences, vol. 60, no. 8, 2017. View at: Publisher Site | Google Scholar
  23. T. S. Rappaport, Y. Xing, G. R. MacCartney, A. F. Molisch, E. Mellios, and J. Zhang, “Overview of millimeter wave communications for fifth-generation (5G) wireless networks-with a focus on propagation models,” IEEE Transactions on Antennas and Propagation, no. 99, article 1, 2017. View at: Publisher Site | Google Scholar

Copyright © 2017 Hongji Huang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

678 Views | 485 Downloads | 1 Citation
 PDF  Download Citation  Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.