Abstract

In the relay networks, two typical issues of physical layer security are selfishness and garbling. As a matter of fact, a certain nontypical but severely harmful misbehavior can also remove the cooperative diversity gain. Here, we coin the masquerading attack to indicate this kind of misbehavior. A masquerade relay can always pretend to be the best one to forward signals and, in consequence, deprive the others of the opportunities to cooperate. To the best of our knowledge, the impact of the masquerading attack has not yet been fully investigated. In this paper, multiple masquerade relays with random masquerading behavior are taken into account. Also, the complete channel effects, including the effects of the flat Rayleigh fading, log-normal shadowing, and path loss, are considered such that the geographical effects of the network topology can be completely captured. At last, the impact of the masquerade relays are evaluated in terms of the outage probability and end-to-end capacity.

1. Introduction

Nowadays, the hyperdense heterogeneous network (HetNet) has been widely recognized as a necessity to boost data rate for future generation of wireless communication systems [13]. With hyperdense deployment, the cooperative communication technologies can effectively extend system coverage and enhance quality of service (QoS). One important paradigm to accomplish these tasks is the cooperative relay networks [47]. In the literature, many aspects of the relay networks have been investigated, including the relay selection scheme, network code design, and power allocation. However, one important issue about the physical layer security in the relay networks is still not being completely inspected, i.e., the masquerading attack.

In the relay networks, two typical issues of physical layer security are the selfishness and garbling [8, 9]. In the selfishness scenarios, the hypocritical relays may forward signals using minimum transmission power or, even worse, refuse to transmit any in-transit messages [1012]. On the other hand, the in-transit messages may also be garbled [10, 13]. To unmask the hypocritical relays, some specific tracing symbols can be added to the informative messages [10, 13]; otherwise, the malicious detection can also be conducted blindly, based on the characteristics of hybrid automatic repeat request [11], the credit-based incentive transmission scheme [12], or the received signal’s correlation [14].

In addition to the selfishness and garbling, we find that a certain nontypical but severely harmful misbehavior can also deprive the relay networks of cooperative diversity gain. It is well-known that a cooperative relay can be opportunistically selected to forward signals based on the distributed network path selection (DNPS) protocol [15]. In DNPS, each candidate relay can set a timer according to channel gain; and the best cooperative relay can then be distributedly decided once its timer expires earlier than the others. However, in this scenario, it is highly possible that a hypocritical relay can maliciously set a timer which can always expire earliest, even though it owns the worst channel gain. Although the signals are forwarded, the degree of freedom (DoF) as well as the cooperative diversity gain can be seriously weakened [16]. As a result, the advantage of deploying the hyperdense relay networks can be seriously diluted. To clearly indicate this problem, we pioneeringly coin masquerading attack to describe this kind of misbehavior.

To the best of our knowledge, the masquerading attack has not yet been fully investigated. Although its impact has been analyzed in [16], only single masquerade relay was considered. Likewise, it neglected the complete channel effects; i.e., only the Rayleigh fading with different variances was included. In consequence, the geographical effects of the network topologies can not be completely characterized by the analytical results. Here, to capture the complete effects of fading environment, including the effects of flat Rayleigh fading, log-normal shadowing, and path loss, the composite exponential log-normal (CELN) distributed channel gain is considered [17]. Furthermore, multiple masquerade relays with random masquerading behavior are taken into account, i.e., the probability of a relay to become a masquerade relay and probability of a masquerade relay to become active. Then, the impact of the masquerading attack is evaluated in terms of the outage probability and end-to-end capacity. Note that part of this work has been presented in IEEE Wireless Communications and Networking Conference 2017 [18]. However, herein, some important related works are surveyed, and all the details of the mathematical derivations are provided. Furthermore, additional topologies of relay networks (as shown in Figures 2(b) and 5) are considered to investigate the influence of the masquerading attack on the device-to-device (D2D) and cellular networks.

The rest of this paper is organized as follows. In Section 2, the system model of the DNPS-based relay network is introduced. Also, the problem description is expounded therein. Section 3 mathematically describes the masquerading behaviors. Then, the outage probability and end-to-end capacity are derived in Section 4. Simulation results and conclusion remarks, including some suggestions for future works, are given in Sections 5 and 6, respectively.

2. System Model

Assume that relays are deployed to assist the data transmissions between the source and destination . The decode-and-forward protocol is applied for relay-assisted transmissions. That is, during Phase I’s transmission period, the -th node can be included into the decodable set when its normalized capacity is larger than the predefined threshold aswhere is the transmitting signal-to-noise ratio (SNR) at the source; is the source’s transmission power; is the power spectrum density of the additive white Gaussian noise; is the channel gain of the link between and . To capture the complete effects of fading environment, including the effects of flat Rayleigh fading, log-normal shadowing and path loss, the CELN distributed channel gain are considered [17]. Thus, the probability density function of can be modeled bywhere ; ; and is Euler’s constant; and are the mean and standard deviation (std.) of the log-normal shadowing in the dB domain during Phase I’s transmission period; . Note that the mean of is distance-dependent. Thus, a superscription is needed to distinguish and during Phase I from those during Phase II, i.e., and . Specifically, the and are associated with , where stands for the channel gain of the link between and . Since only one hop is required for the transmissions via the direct link, no superscription is needed for and (which are associated with ). Similarly, there is no superscription to distinguish and during Phase I from those during Phase II because the same environment is assumed for both Phases I and II. Moreover, the cumulative distribution function () of the CELN distribution can be obtained by integrating (2) as follows:

During Phase II’s transmission period, one of the candidate nodes in is selected to forward data packets to the destination using the DNPS protocol [15] (will be briefly introduced in the latter). Finally, at the destination, the signal directly from and that from the selected relay are combined according to the maximal ratio combining (MRC) rule, which gives the effective end-to-end capacity aswhere is the transmitting SNR at the relay; is relay’s transmission power; represents the channel gain of the direct link. Note that when is empty, only the signal received via the direct link, i.e., from to , is used for the demodulation process. In this case, the end-to-end capacity can be expressed as

2.1. DNPS Relay Selection

Generally speaking, the DNPS protocol is an efficient distributed algorithm for relay selection. In the DNPS protocol, each candidate relay belonging to sets a timer whose expiry period is set inversely proportional to its channel gain of the link towards the destination , i.e., . In other words, a relay with the largest channel gain in Phase II can expire earliest. Once a timer expires, the associated relay broadcasts a flag signal to inform the neighboring relays so that it can solely occupy the channel for delivering packets in Phase II. More details about the DNPS protocol can be found in [15].

2.2. Problem Description

To begin with, the “masquerader” and “nonmasquerader” are defined as the “masquerade” and “ordinary” relays, respectively. Now, it is assumed that the masqueraders attack the relay-assisted networks by mimicking virus’ behavior so that it can be violent and untraceable. Specifically, it can be contagious; and the infected relays can be asymptomatic carrier or explicitly symptomatic. To well describe this kind of masquerading attack, is defined as the probability for an ordinary relay to become a masquerader. Moreover, a masquerader can be active (i.e., explicitly symptomatic in other words) and attack with probability . Note that this kind of masquerading attack was ignored in the conventional counterpart [16]. Moreover, solely the Rayleigh fading with different variances (i.e., the exponential channel model) was considered therein. Figure 1 demonstrates the performance degradation for the infected relay-assisted cellular network under the exponential and CELN channel environments. Apparently, the masquerading attack can cause serious performance degradation. Moreover, the performance differences between the cases under the exponential and CELN channel environments are significant. Thus, one can tell that it is necessary and important to investigate the impact of the random masquerading attack by taking the CELN environment into account. Note that the larger dynamic range of the channel gain incurred by log-normal shadowing results in the higher diversity gain, which explains the better performance for the CELN environment.

3. Analytical Characteristics of Masquerader

The impact of masquerading attack will be evaluated in terms of the outage probability and end-to-end capacity in Section 4. To this end, two scenarios of the decodable set are firstly analyzed in this section, i.e., at least one masquerader in and no masqueraders in the nonempty .

3.1. At Least One Masquerader in

In this scenario, the impact of the ordinary relays belonging to can be ignored. This is because once an active masquerader exists in the decodable set , the ordinary relays can never be selected to forward packets during Phase II. To facilitate the presentation, some terminologies are defined as follows.(1): the relay set which includes all possible combinations (subsets in other words) of masqueraders, where . Specifically, that means out of the relays belonging to become masqueraders. Therefore, in this case, there are subsets in , which are denoted by .(2): under the condition of masqueraders, this relay set includes all possible combinations of decodable masqueraders, where . In other words, out of the masqueraders belonging to are decodable. Therefore, given , there are subsets in , which are denoted by .(3): under the conditions of masqueraders and decodable masqueraders, this relay set includes all possible combinations of active-and-decodable masqueraders, where . That means out of the masqueraders belonging to are decodable. In this case, there are subsets in , which are denoted by .

Consider a masquerader being selected from a particular subset . Since , the joint probability for this case can be expressed as (6).Apparently, we can haveAlso, the conditional probability can be expressed aswhere is the set-operator to remove set from set ;where . Sincewe can haveMoreover, it is intuitional to obtainAt last, multiplying (7), (8), and (12) gives (6). It should be noticed that, with , the following performance metric (i.e., the outage probability and capacity in Section 4) should be averaged over the cases. This is because each of the masquerade relays individually sets a timer such that it can expire earliest. Then, the relay selection in Phase II becomes a random selection approach, which means each of them can be selected with probability .

3.2. No Active Masqueraders in the Nonempty

As implied by the name, this scenario means that all the relays belonging to are ordinary ones. Thus, it includes three cases, i.e., Case : no relays become the masqueraders; Case : no masqueraders are decodable; and Case : no decodable masqueraders are active. Some terminologies are defined as follows:(1): the relay set includes all possible combinations of nonmasqueraders, where . Thus, there are subsets in , which are denoted by .(2): under the condition of nonmasqueraders, this relay set includes all possible combinations of decodable nonmasqueraders, where . That means given , there are subsets in , which are denoted by .(3): the relay set consists of the same masqueraders as . However, all of the masqueraders are nondecodable. By definition, we can have .(4): the relay set consists of the same masqueraders as . However, all the decodable masqueraders are inactive. Given , we can have .

(1) Case : No Relays Become the Masqueraders. Firstly, all the relays are well-behaved with probabilityand the conditional probability can be obtained by replacing , , , and in (8) with , , , and , respectively.

(2) Case : No Masqueraders Are Decodable. Consider that occurs on a given condition of . The conditional probability can be written asAssume that out of the rest nonmasqueraders belonging to are decodable. Let represent these decodable nonmasqueraders. Then, replacing , , and in (8) with , , and gives .

(3) Case : No Decodable Masqueraders Are Active. Consider that occurs on the given conditions of and . Then, it leads to the conditional probability asAssume that out of the remaining nonmasqueraders belonging to are decodable. Let represent these decodable nonmasqueraders; and then we can have the conditional probability by replacing , , , and in (8) with , , , and , respectively.

4. Performance Analysis

Let the -th relay be selected to forward packets during Phase II. Therefore, must belong to a particular subset of or , e.g., the aforementioned , , , or in Section 3. To ease the presentation, let ; and then stands for the mean of in the dB domain, which leads to . Moreover, and represent the and of , respectively. Similarly, let ; and, in consequence, we can have to represent the mean of in the dB domain, which leads to . Likewise, and stand for the and of .

Denote and as the outage probability for the cases of belonging to a subset of or , respectively, while denotes that with an empty decodable set . Also, let , , and represent the corresponding average end-to-end capacity. Since , , and are mutually exclusive, the overall outage probability can be expressed asSimilarly, we can haveIn the following, we derive the mathematical expressions of , , and . The closed form expressions of , , and will be derived as well.

4.1. At Least One Masquerader in

To facilitate the presentation, denote as the probability of the selected -th relay belonging to the subset . Then, it givesLet and represent the conditional outage probability and end-to-end capacity. Given , , and , it follows thatandrespectively. Finally, the overall outage probability and end-to-end capacity for the case with at least one masquerader in can be expressed asand

and are derived as follows.

(1) . Recall that there are active-and-decodable masqueraders in the subset . When , one of the active-and-decodable masqueraders is randomly selected to forward packets during Phase II’s transmission period. Thus, the conditional outage probability should be averaged over these cases. Then, can be expressed aswhere . Substituting (2) and (3) into (23) gives Let and . Then, (25) can be rewritten as whereSince there is no closed form expression for (26), it can only be reduced to

(2)  . Similar to (23), can be expressed aswhere is the operator to take expectation. Substituting (2) into (29) renders (30).Let and which leads to It is known that the Hermite polynomial approach can be applied to calculate the following integration:where and are the abscissas and the weight factor of the Hermite polynomials with order , respectively [20]. Applying (32) into (31) renders

4.2. No Active Masqueraders in the Nonempty

According to Section 3.2, three cases should be considered in this scenario; i.e., the -th relay is selected from , , or . Similar to Section 4.1, let , , and denote the outage probability for these cases. Also, , , and are the corresponding end-to-end capacity, respectively. Then, we can haveand

(1) Case : No Relays Become the Masqueraders. Denote and the outage probability and end-to-end capacity when the -th relay is selected from under the condition of . Similar to the procedures of deriving (21) and (22), the average outage probability and end-to-end capacity can be expressed asandrespectively.

(a) . Regardless of which relay is selected from in Phase II, an outage event can occur when the end-to-end capacity of all the relays belonging to is below the target value, i.e., . Let denote the of this case. Referring to (3), the outage probability with a given can be written asThen, similar to (24), the outage probability in this case can be expressed as

Applying the same procedures of deriving (28) gives where is the same as that in (27).

(b) . In this case, the end-to-end capacity can be written aswhere represents the corresponding of (38). Taking derivation of (38) giveswhere associated with the -th relay in is similar to associated with the -th relay in . Then, the average end-to-end capacity can be expressed as Letting and gives Applying the Hermite polynomial approach into (44) renders

(2) Case : No Masqueraders Are Decodable. Denote by and the conditional outage probability and end-to-end capacity when the -th relay is selected from under the conditions of and . Then, the outage probability and end-to-end capacity can be expressed as (46) and (47), respectively. Applying the same procedures as mentioned in Case by replacing in (40) and (45) with gives the conditional outage probability and end-to-end capacity for this case.

(3) Case : No Decodable Masqueraders Are Active. Similar to Cases and , let and represent the conditional outage probability and end-to-end capacity when the -th relay is selected from under the conditions of , , and . Moreover, the outage probability and end-to-end capacity can be expressed as (48) and (49), respectively. At last, replacing in (40) and (45) with gives and .

4.3. Empty Decodable Set

Denote by the empty decodable set. Then, we can have the occurring probability for this case as

(1) . With , the outage probability can be expressed aswhere can also be derived aswhere .

(2) . The capacity can be expressed aswhere can be expressed as Following the procedure of deriving (33), we can have the numerical expression of (54) as

5. Numerical Results

In this section, the relay-assisted D2D and cellular networks are considered to evaluate the exactness of the analytical model and investigate the performance degradation caused by the masquerading attack. In either scenario, the unit-variance Rayleigh fading is assumed. Also, the path loss exponent is 3.5 and the standard deviation of the Log-Normal shadowing is 6 in the dB domain. All the simulation results are obtained by averaging over 200,000 rounds.

5.1. D2D Network

Here, the vertical deployment of the relay network (as shown in Figure 2(a)) is firstly applied for investigating the impact of the masquerading attack. Then, the horizontal deployment of Figure 2(b) is used to quantitatively investigate the effect of the location of a single designated masquerader. As shown in the figures, the distance between and is m; and that between two neighboring relays is m. The transmission power of the source is set so that the thermal noise outage () at the destination can be 0.2 [19]. Similarly, the transmission power of each relay is set so that can be achieved by the central relay (e.g., with or with ). Note that the required SNR corresponding to is defined as 0 dB, whereas, for the purpose of evaluating the outage probability, the SNR threshold is 8 dB. Also, the capacity threshold in Sections 2, 3, and 4 can be obtained by substituting the SNR threshold into the well-known equation of Shannon capacity.

Figure 6 shows the (a) outage probability and (b) average end-to-end capacity with respect to for the relay-assisted D2D network under the CELN channel environment, where ; , , and relays are placed according to the vertical deployment as illustrated in Figure 2(a). Apparently, the analytic and simulation results match with each other quite well. Most importantly, as demonstrated in the figures, the masquerading attack can cause significant performance degradation. For example, as the increases from 0 to 0.4, the outage probability for the case with can increase from 0.03 to 0.16. In addition, it can lead to 16% capacity loss (from 2.95 to 2.49 bps/Hz). Moreover, as keeps growing, its impact becomes marginal. It should be noticed that the equivalent activity of the masquerading behavior for each relay is , whereas the overall masquerading behavior across the whole network is . Thus, with , , and , solely (or overall ) equivalent activity of the masqueraders can cause capacity loss (from 2.95 to 2.68), while the outage probability can increase from 0.03 to 0.1. When the equivalent activity becomes (or overall ), it ends in capacity loss and unacceptably high outage probability of 0.23 (667% rise).

This phenomenon can become deteriorated when the number of relays increases. For example, comparing the curve of at , using relays can result in additional 6% capacity loss (from 2.49 to 2.34 bps/Hz), and higher outage probability (increasing from 0.16 to 0.21). Moreover, as grows to one, 34% capacity loss can be resulted; and the outage probability can be extremely risen by 6310%. It should be noticed that, in general, using more relays can contribute to a better system performance. However, the masqueraders seriously dilute the diversity gain. Thus, how to tackle the issue of masqueraders could be an important issue for the future generation of hyperdense relay networks. Figure 3 shows the (a) outage probability and (b) average end-to-end capacity with respect to for the relay-assisted D2D network under the CELN channel environment, where ; , , and relays are placed according to the vertical deployment as illustrated in Figure 2(a).

Figure 4 shows the (a) outage probability and (b) average end-to-end capacity for the relay-assisted D2D network under the CELN environment with a single designated masquerader according to the horizontal deployment as illustrated in Figure 2(b), where and . Note that the cases without masquerader mean that all the relays are ordinary ones, whereas the cases with masquerader mean that there is only one masquerader indicated by the horizontal axis. In addition to the similar phenomenon observed from Figure 6 (i.e., the significant performance degradation caused by the masquerader), one can also find that the masquerader located farther from the destination can cause severer performance degradation. This explains the lowest capacity and highest outage probability for the case of the first relay (i.e., ) being the designated masquerader. Therefore, it can be expected that a masquerader can possibly incur a serious bottleneck effect on the multihop transmissions in the future generation of wireless communication systems.

5.2. Cellular Network

In the cellular scenario, one cell with three sectors is considered. As per the parameter setting in Figure 1, the simulation is conducted for the network topologies illustrated in Figures 5(a) and 5(b). Therein, and 9 relays are fixed at the middles or uniformly distributed over its coverage area, respectively. In the latter case, the minimum distance between a relay and BS is 100 m. Also, in both cases, the location of MS is uniformly spread over the sector. Since the analytical results are obtained by averaging over 100 randomly generated network topologies, the time required to calculate all the cases discussed in Sections 3 and 4 can be prohibitively prolonged when . Thus, only is considered for generating the analytical results. Firstly, the exactness of the analytical results can still be verified. Secondly, as observed in the D2D network, more stringent performance degradation can be incurred by the larger amount of relays. Thirdly, the masquerading attack can cause more significant performance degradation for the cases with uniformly distributed relays. For the example with uniformly distributed relays, serious masquerading attack can cause 30% capacity loss (from 4.93 to 3.46 bps/Hz). However, the loss becomes 18% (from 3.71 to 3.05 bps/Hz) when the relays are fixed at the middles of the sector. Note that the larger diversity gain can be obtained when the relays are “not fixed” at the middles of the sector (which explains the better performance for the cases with uniformly distributed relays as well). However, the masquerading attack dilutes the achievable diversity gain and causes larger performance degradation for the cases with larger diversity gain (as aforementioned).

6. Conclusions

In this paper, we have defined the masquerading attack for the relay-assisted networks. For the purpose of numerically characterizing the masquerading attack, the mathematical expressions for the end-to-end capacity and outage probability have been derived. To make the discussions more complete, the CELN channel model was taken into account such that the geographic effects of the network topology can be captured. Moreover, the random masquerading behavior was considered as well, including the probability of a relay to become a masquerader and probability of a masquerader to become active. Via the analytical and simulation results, it was found that the masquerading attack can cause and capacity loss for considered D2D and cellular networks. Also, the corresponding outage probability can be extremely risen.

Nowadays, the necessity of relay-assisted transmission scheme for the next generation of wireless communication networks has been widely recognized. With the aid of relay, the performance of secondary users in the cognitive network can be improved [21]; the physical layer security in the large-scale fifth-generation network can be strengthened [22]; the energy efficiency and link reliability for the vehicular ad hoc networks can be enhanced [23]; the cellular coverage area can be extended via multihop D2D communications [6, 7, 24], especially for the millimeter-wave-based systems [2527] and Internet-of-Things [28]; the high quality transmissions for the sensor network can be achieved [29] as well. However, based on the finding of this paper, the achievable diversity gain via relay transmissions will be seriously diluted under the masquerading attack. De facto, in addition to the DNPS protocol, any arbitrary relay networks (especially for the ones operating in the distributed mode) can encounter this kind of threat, which hypocritically forwards packets and removes the diversity gain in silence. Thus, how to evaluate and alleviate the impact of the masqueraders could be a critical issue to fully utilize the advantages of relay-assisted transmissions. This paper can be recognized as a first step to inspire the investigation of the masquerading attack for the relay networks.

Data Availability

All the analytical and numerical results can be reproduced by using the source codes at http://140.116.92.1/SourceCode/WCMC/experiment. The Matlab codes used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The author declares that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by the Ministry of Science and Technology, Taiwan, under Contract 105-2221-E-006-034.