Abstract

In this paper, we propose a trustworthy friendly jammer selection scheme with truth-telling for wireless cooperative systems. We first utilize the reverse auction scheme to enforce truth-telling as the dominant strategy for each candidate friendly jammer. Specifically, we consider two auction cases: (1) constant power (CP) case and (2) the utility of the BS maximization (UBM) case. In both cases, the reverse auction scheme enforces truth-telling as the dominant strategy. Next, we introduce the trust category and trust degree to evaluate the trustworthiness of each Helper transmitter (Helper-Tx). Specifically, an edge controller calculates the reputation value of each Helper-Tx periodically using an additive-increase multiplicative-decrease algorithm by observing its jamming behavior. With the historical reputation values, the edge controller (EC) classifies a Helper-Tx into one of four trust categories and calculates its trust degree. Then, the EC selects the best Helper-Tx based on the trust category and trust degree. Lastly, we present numerical results to demonstrate the performance of our proposed jammer selection scheme.

1. Introduction

Cooperative jamming enables two wireless nodes to exchange secret messages in the presence of an eavesdropper without encryption [1, 2]. It is an information-theoretic security approach that exploits the physical characteristics of the wireless channel, which does not depend on the assumption of computational hardness. In cooperative jamming, a selected friendly jammer sends out artificial noise (i.e., jamming signal) at the same time when a sender transmits a message to a receiver [3, 4]. The artificial noise is aimed at creating intentional interference at the eavesdropper. If the channel condition between the sender-receiver is better than that of the channel between the sender-eavesdropper, the sender and receiver can exchange secure messages at a certain rate.

Friendly jammer selection plays a fundamental role in maximizing the secure message exchange rate (i.e., secrecy rate) in cooperative jamming [5, 6]. In general, there are two phases in a jammer selection scheme. In the first phase, each candidate jammer reports its private information (e.g., battery state) to the sender (also known as the source node or mechanism designer) through a common control channel [7, 8]. According to the reported private information, the sender selects a suitable candidate as the jammer. In the second phase, the selected jammer sends out sufficient jamming signals to create desired interference at the eavesdropper (Eve).

There are challenges that need to address in both phases. In the first phase, since each candidate wants to be selected to get payment, it may not be telling the truth in reporting its private information so as to increase the chance of being selected. A candidate without truth-telling can cause unfairness and degrade the secrecy performance of the entire network. Therefore, it is necessary to develop a mechanism to ensure truth-telling for each candidate. In the second phase, a selected jammer may transmit a partial (or even none) jamming signal due to various reasons. We call it an untrusted friendly jammer. An untrusted jammer can also lead to unfairness and a decrease in the secrecy rate. Hence, it is important to avoid untrusted jammers.

To address the aforementioned challenges, we propose a trustworthy friendly jammer selection scheme with truth-telling for a wireless cooperative system (WCS). Firstly, we utilize the reverse auction scheme to enforce truth-telling under two cases: (1) constant power (CP) case and (2) utility of the BS maximization (UBM) case. In these two cases, we enforce truth-telling as the dominant strategy of each candidate jammer. In the auction scheme, helper transmitters (Helper-Txs) are edge devices that function as candidate jammers. Spectrum resources of a base station (BS) are revenues for Helper-Txs. In the CP case, the BS assigns a fixed transmission power to the jammer. In the UBM case, the utility of the BS is approximately maximized.

Secondly, we introduce trust categories and trust degree to evaluate the trustworthiness of each Helper-Tx. Specifically, an edge controller (EC) is introduced to calculate the reputation value of each Helper-Tx periodically using an additive-increase multiplicative-decrease (AIMD) algorithm by observing its jamming behavior. Subsequently, the EC classifies each Helper-Tx into one of four trust categories based on its historical reputation values. The trust degree of each Helper-Tx is obtained by averaging its reputation values over time. If a Helper-Tx belongs to a certain trust category and meets the trust degree requirement, it can be regarded as a trustworthy jammer.

The main contributions of this paper are summarized as follows: (i)We prove that the BS can achieve the highest secrecy rate by selecting a one best Helper-Tx as the jammer. More than one jammer can lead to a decreased secrecy performance(ii)We utilize the reverse auction scheme to stimulate truth-telling of Helper-Txs. In the reverse auction scheme, we consider two cases: (1) CP case and (2) UBM case. In both cases, the reverse auction scheme can guarantee incentive compatible (IC) and individual rationality (IR). In both cases, we show numerical results that the reverse auction scheme outperforms the widely used Vickrey auction scheme(iii)We propose two metrics (i.e., trust category and degree) to measure the trustworthiness of a selected jammer. We adopt the AIMD algorithm to promote trustworthy behavior and penalize selfish conducts

The rest of the paper is organized as follows. Related work is given in Section 2. In Section 3, an overview of the network model and some preliminaries are presented. In Section 4, we give out the auction scheme and related solutions. In Section 5, the trust management process and the jammer selection scheme are described. Numerical results are given in Section 6, and conclusions are drawn in Section 7.

Notations: and denote the Hermitian transpose and the absolute value, respectively. denotes the trace operator. is the vector of all ones. The normal distribution with the mean and the variance is denoted as . . () means that is a Hermitian positive semidefinite (definite) matrix.

Conventional cryptographic-based methods at the upper layer are of high complexity due to the expensive operations such as the encryption and decryption [911]. Physical layer security approaches with the advantages of low complexity and resource savings have been explored both as an alternative and a complementary to conventional cryptographic-based methods [1214]. Physical layer security approaches with the cooperation of helping nodes (cooperative relaying and jamming) have been extensively investigated [1518]. Recently, some new physical layer security technologies have been proposed for secure communication, e.g., unmanned aerial vehicle- (UAV-) aided jamming [19], intelligent reflecting surfaces- (IRS-) assisted jamming [20], and learning-aided cooperative relays [21, 22].

Considering that the helping nodes consume energy during cooperation, it is necessary to investigate how to incentivize users to cooperate for security enhancement [2325]. Therefore, game theory is employed in physical layer security to study the interactions between the source and helping nodes, where helping nodes would gain some payoffs [26, 27]. However, in most of the current cooperative networks, the helping nodes are assumed honest and ready to disclose their true private information, which is usually not realistic [28, 29]. In practice, helping nodes may exaggerate their private information to maximize their payoffs, which is a key issue in cooperative networks.

To address this issue, a mechanism designer aims to motivate the helping nodes to disclose their private information by designing the payoff structure [3033]. Authors of [31] designed different “transfer payment” functions to the payoff of each relay and proved that each relay gains its maximum payoff when it truthfully reports its private information. In [33], the author proposed a truth-telling based mechanism, where the selected relays’ energy harvesting requirements would be fulfilled if they tell the truth. Otherwise, the relays are penalized by the transfer payment.

Besides cooperative relays, cooperative jammers are also important helping nodes for physical layer security in cooperative networks [6, 34, 35]. In [6], the authors investigated the physical layer security of amplify-and-forward (AF) relaying networks with the aid of the joint relay and jammer selection. Authors in [34] proposed three categories of relay and jammer selection for a two-way cooperative communication scenario. In [35], the authors proposed a joint relay and jammer selection scheme and derived a closed-form suboptimal solution to maximize the secrecy rate.

In addition, untrusted jammers were investigated in [5, 36]. Specifically, the authors of [36] investigated a social-tie-based jammer selection scheme, allocating power appropriately to the source node and the cooperative jammer node to maximize the worst-case ergodic secrecy rate. In [5], the authors investigated how to select jammers for device to device users to thwart eavesdroppers by exploiting social relationship with the help of full CSI and partial CSI, respectively.

In the above literatures, the jammers are assumed honest, and the private information are perfectly known at the source node. However, the optimal solutions in these works would not hold if the jammers report their private information untruthfully. In addition, the trust degree of a jammer was only considered to be one of the parameters to analyze the secrecy performance. To the best of our knowledge, how to incentive cooperative jammers to report their private information and do trustworthiness analysis for a jammer has never been investigated, which motivates the study of this paper.

3. An Overview

In this paper, we consider a WCS that consists of a BS, users, an Eve, an EC, and pairs of Helper-Tx/Rx as shown in Figure 1. The BS is a type of edge device that functions as a user data entry point to the primary network. Helper-Tx/Rxs are another type of edge device that protects user data from being intercepted by Eve. Both types of edge devices are managed by the EC that is a controller that can be configured to match multiple specific requirements.

3.1. Transmission Phases

In the WCS, from the perspective of the jammer, there are two transmission phases (the jamming phase and the accessing phase) with a duration of length .

3.1.1. Jamming Phase

In the jamming phase of length , the BS wants to send a message to a user (e.g., user1) on the data link. Meanwhile, there is an Eve that wants to intercept and decode the message on the wiretap link. To protect the transmitted message from being eavesdropped, the BS selects Helper-Txs as friendly jammers to interfere with Eve on the jamming link.

In the WCS, the selected Helper-Tx (the jammer) is an edge device of user1; thus, it is assumed that the jamming signal cannot be known previously by user1. It means that user1 cannot remove the jamming signal from the received signal. Instead, the beamforming vector of the jammer () needs to be designed to ensure that the interference imposed at user1 is lower than a temperature limit. In the WCS, we would first analyze the secrecy performance of the BS through cooperative jamming and then select the appropriate Helper-Txs. In what follows, we would calculate the secrecy rate to measure the secrecy performance of the BS.

It is assumed that the BS is able to acquire the CSI of the data link through pilot sequences [37]. Each Helper-Tx measures its CSI between itself and user1, i.e., , and reports the CSI to the EC. The EC would share the CSI of Helper-Txs with the BS via a secure channel, such as a common control channel [38]. Finally, the CSI of users and Helper-Txs are both available at the BS. Thus, we assume that the perfect CSI of the data link is available. For the CSI of wiretap link, there are two cases: (i)Perfect CSI Case. In some special cases, one of the legitimate users (e.g., untrusted relays) may be considered to be a potential Eve [39]. In other words, Eve is one of the legitimate users; thus, we can obtain the perfect CSI of the wiretap link. Specifically, the instantaneous CSI of and is known.(ii)Statistical CSI Case. In most cases, accurate CSI for passive Eve cannot be acquired. However, the statistical CSI for wiretap links can be obtained by some measurement methods. Therefore, it is assumed that we can obtain the statistical CSI of the wiretap link. Specifically, the covariance matrices of and are known, i.e., and .

In this paper, we only consider the perfect CSI case. In the case with statistical CSI, the design and analysis for reverse auction and trust management can be treated similarly in our previous work [40], which is omitted for brevity.

In the WCS, the BS is equipped with antennas, and Helper-Txs are equipped with antennas. All users, Eve, the EC, and Helper-Rxs are all equipped with a single antenna. The transmit beamforming vectors of the BS () and () are both designed at the BS. Next, the BS delivers the related beamforming vector () to the EC, and the EC applies the beamforming vector () to .

With the CSI and beamforming vectors, the received signals at user1, the EC, and Eve at time index can be expressed as respectively, where , , are the links from the transmitters (the BS, ) to the receivers (user1, the EC, and Eve). with and denoting the complex link vectors and the corresponding path loss from to link, respectively. The path loss can be expressed as ([m]), where is the distances between transmitters and receivers. and are beamforming vectors of the BS and , respectively. is the message signal transmitted from the BS. is the jamming signal transmitted from , where . is the additive white Gaussian noise (AWGN) with two-sided power spectral density . It is assumed that , where and is the link bandwidth. All links are assumed to be subject to independent Rayleigh fading.

3.1.2. Accessing Phase

In the accessing phase of length , the selected Helper-Txs are allowed to access the data link when the data link is idle so that they can transmit their messages to intended Helper-Rxs.

3.2. Trustworthy and Truth-Telling Challenges

In the WCS, note that the secrecy rate is provided by a Helper-Tx; the selection of an appropriate Helper-Tx as the cooperative jammer plays a critical role in improving the secrecy rate. Specifically, the selection of an appropriate Helper-Tx faces two challenges as follows: (i)Truth-Telling Challenge. Since the selected Helper-Txs may have greater opportunity to access the data link, all the Helper-Txs will be naturally interested in participating in the WCS. However, there is no guarantee that they would report its private information (the battery state) to the BS honestly. In practice, the issue is that Helper-Txs may exaggerate their private information to enhance their chance to be selected, hoping to maximize their transmission time in the data link.(ii)Trustworthy Challenge. A selected jammer may transmit a partial (or even none) jamming signal due to various reasons. We call it an untrusted friendly jammer. An untrusted jammer cannot improve the secrecy performance of the WCS. In addition, an untrusted jammer can obtain undeserved utility, leading to unfairness to other trustworthy jammers.

To address these challenges, we propose a framework as shown in Figure 2, consisting of Auction Scheme, Jamming Detection, and Trust Management. The auction scheme is introduced in Section 4 to prevent Helper-Txs from cheating so that Helper-Txs are self-enforced to reveal the truth. Jamming detection is investigated in our previous work [40], where the EC is adopted to detect whether the artificial noise is absent or present by using an energy detection method. In Section 5, we adopt trust management to evaluate the trustworthiness of Helper-Tx and select a trustworthy jammer.

4. Auction Scheme

In this section, we utilize the reverse auction scheme to incentivize Helper-Txs to report their private information truthfully. In the reverse auction scheme, the number of jammers () is a critical parameter for the jammer selection. Therefore, we first investigate the optimal number of so that the BS can select an appropriate number of Helper-Txs as jammers. Next, we consider the utility design of the reverse auction scheme in the CP case and UBM case. In both two cases, we prove that the reverse auction scheme satisfies IC and IR.

4.1. Optimal Number of Jammers

In this paper, it is assumed that Helper-Txs are independent and competing with each other. Therefore, we do not consider that there is cooperation between jammers. Furthermore, if there is cooperation between multiple Helper-Txs, then we consider these cooperative Helper-Txs as a more powerful Helper-Tx that is competing with other Helper-Txs. It can be obtained that different can lead to different results in the total secrecy rate. In this paper, we only investigate the optimal number of jammers in the case with perfect CSI, provided that the result is no difference from the case with statistical CSI. Specifically, in the case with perfect CSI, we can obtain the achieved SINRs of at user1 and Eve as where , , , , , and .

The achievable secrecy rate is defined as the transmission rate at which Eve is unable to decode the transmitted message [41]. It is equal to the capacity difference between the data link and the wiretap link. Thus, the secrecy rate achieved by can be calculated as

Let . Sort in a descending order, and get , . Based on (3), we can obtain that the Helper-Tx which has a larger also has a larger . It is assumed that is the best jammer which has the largest secrecy rate, is the second best, and so forth. Thus, the jammer selection scheme is designed as follows:

Step 1. Select Helper-Tx1 as a jammer. Let and calculate .

Step 2. For , calculate , where

If , proceed to Step 3, and if , skip to Step 4.

Step 3. Select as jammer, then let and go back to Step 2.

Step 4. Let and stop.

Proposition 1. The optimal secrecy rate can be achieved by selecting Helper-Tx as jammer, where is decided by the process above.

Proof. See the appendix.

From the Proposition 1, we can obtain that the BS may only select a single best Helper-Tx as jammer. More than one jammer would lead to a reduction in the secrecy rate of the WCS.

4.2. Utility Design and Objective
4.2.1. Utility of the BS with Perfect CSI

For each , the utility of the BS can be characterized as: where is the revenue per unit secrecy rate obtained by the BS from a user. is the payment per unit secrecy rate for the jammer. is the monetary cost incurred due to the interference caused by the jammer.

4.2.2. Utility of the BS with Statistical CSI

In this section, we focus on the utility design in the case with statistical CSI. As we only know statistical CSI of the wiretap link, the beamforming vectors of the BS and the jammer are both designed as homogeneous isotropic. The CSI of is denoted as . Specifically, it means that have the covariance matrices i.e., . have the covariance matrices , i.e., . In this case, the accurate secrecy rate cannot be calculated. Instead, we calculate the probabilities of the transmission and secrecy outage events. On the basis of the probabilities, the utility of the BS is defined as efficient transmission throughput (ETT), which can be found in our previous work [40].

When is selected as a jammer, the instantaneous output SINRs at user and Eve are calculated as follows where

In (7), are the transmit powers of the BS and the jammer. represents the instantaneous signal to noise ratios (SNRs) from node to node . As the CSI are perfectly known, we can calculate the transmission rate of BS as . For the statistical CSI , according to equation (26) in our previous work [40], we can obtain the probability density function of expressed as .

To evaluate the secrecy performance, we adopt Wyner’s encoding scheme with the target transmission rate and the target secrecy rate [42]. The difference between and is used as a redundancy rate against eavesdropping. Therefore, the user can decode the received signal with arbitrarily low error rate only if the instantaneous capacity of the user is larger than the transmission rate, i.e., ; otherwise, a transmission outage event occurs. Besides, secrecy outage may occur when the instantaneous capacity of Eve is larger than the redundance rate, i.e., . The probabilities of the transmission and secrecy outage events provided by are denoted as and , respectively. We can obtain the probability of transmission event as

The secrecy outage probability can be derived as where . Thus, the ETT that can provide is expressed as

4.2.3. Utility of the Jammer

In the perfect CSI case, when is selected as a jammer, its utility is given by: where is the payment made by the BS to the jammer. is the energy cost incurred by the jammer. In the statistical CSI case, the only difference in the utility of jammer is to replace the secrecy rate with ETT. Let denotes the transmission power of ; we assume that the energy cost is a linear function of and is expressed as: where is the cost per unit power, i.e., the valuation that has for its power. In general, with a lower battery power would value its power highly and assign a higher .

4.2.4. Objective

In this subsection, our objective is to design reverse auctions for the BS to select a jammer. Specifically, the auction has to satisfy IR and IC. IR means that each Helper-Tx gets a positive utility under any outcome of the auction. An auction satisfies IC if revealing its true valuation () is the dominant strategy for each Helper-Tx. To design reverse auctions that satisfy IC and IR, we consider two cases: (a)CP Case. In this case, the BS assigns a fixed transmission power () to each Helper-Tx. In general, the BS needs to do secrecy rate maximization to design an optimal transmission power of a selected jammer. Although the optimal transmission power design leads to a higher secrecy performance, there is higher computational complexity when the number of Helper-Tx increases. In the process of auction scheme, it is necessary to evaluate the secrecy performance that each Helper-Tx can achieve and selects a suitable one as candidate. In fact, the optimal transmission power design needs to be completed on all Helper-Txs. Therefore, for the optimal power allocation design, there is higher computational complexity when the number of Helper-Tx increases. For the constant power case, we can allocate a fixed power to each Helper-Tx and evaluate the secrecy performance of all Helper-Txs. As an alternative, the constant power allocation with lower computational complexity is easier to implement, and the loss in performance is acceptable.(b)UBM Case. In this case, we aim to design a reverse auction scheme to approximately maximize the utility of the BS.

4.3. Auction Scheme

In this section, we present the reverse auction scheme for the CP case and UBM case.

4.3.1. CP Case

In the CP case, the Vickrey auction selects a Helper-Tx with the lowest price . However, the Vickrey auction has several limitations shown as follows:

Secrecy performance: the Vickrey auction scheme ignores the secrecy performance achieved by a jammer.

Utility: from (5), the utility of the BS is an increasing function of the secrecy rate, which means that the Vickrey auction scheme also ignores the utility of the BS.

Interference: the Vickrey scheme does not consider the interference cost to the BS.

To avoid the above limitations, we utilize the reverse auction scheme in the CP case to select a Helper-Tx as a jammer.

Lemma 2. The utility of the auction winner Helper-Txi can be given by:

Proof. The utility of a selected is expressed as:

Each Helper-Tx reports its valuation , and we calculate the weight of each Helper-Tx as: where is calculated for each Helper-Tx with a fixed transmission power . We denote that we select as the auction winner that is functioned as a jammer. For a , it is assumed that where represents the auction winner when does not participate in the auction. We define that for the auction winner , the payment is given by: thus the utility of the auction winner is calculated as:

Proposition 3. The reverse auction in the CP case satisfies IR and IC.

Proof. When is the auction winner, from (19), we can obtain that

We can obtain that for so that participating in the reverse auction is the optimal choice for each . Thus, the reverse auction in the constant case satisfies IR.

If is the auction winner whether reporting true valuation or false valuation , we can obtain from (19) that cannot change its utility. In addition, let us consider the case that is not the auction winner when it reports its true valuation . We assume that is the auction winner when it reports a false valuation . In this case, we can obtain that then, the utility of is calculated as

Therefore, reporting the true valuation is the dominant strategy for each , which means that the reverse auction satisfies IC in the CP case.

In this paper, the utility of the jammer is converted into spectrum resources, i.e., the transmission time in the primary channel. Therefore, we can obtain that where is the transmission time per utility of the jammer. Therefore, we can obtain the transmission time fraction of expressed as:

4.3.2. UBM Case

In the UBM case, we aim to approximately maximize the BS’s utility. As the Vickrey auction does not specify how the transmit power of the jammer, it is not applicable in this case. Therefore, in this subsection, we utilize the reverse auction scheme in the case that BS requests a jammer to transmit at a power that approximately maximize the BS’s utility.

Let denote the power at which the BS requires to transmit. The utility of can be expressed as:

The utility of the BS can be calculated as:

As the reverse auction satisfies IR, we can obtain that , i.e., . From (26), the utility of the BS is maximized when ; thus, the maximum contribution to the utility of the BS when is selected as a jammer and transmits at power can be expressed as:

In (34), the only variable is ; thus, we aim to find the optimal transmit power to maximizes . Specifically, we focus the secrecy rate maximization to obtain the optimal transmit power to approximately maximize the utility of the BS. To obtain the optimal secrecy rate, we formulate an optimal beamforming design problem, which is divided into a two-part optimization problem. By solving this two-part optimization problem, we can obtain the optimal beamforming vectors of the BS and the jammer.

When a Helper-Tx (e.g., ) is selected as a jammer, the achievable secrecy rate can be calculated as where where and .

To obtain the optimal beamforming vectors of the BS and , the secrecy rate maximization problem is mathematically characterized as where (30b) is the interference temperature limit () imposed at user1 from the jammer. (30c) and (30d) are the transmit power limits of the BS and , respectively. (30e) and (30f) are rank-one constraints of beamforming vectors and , respectively. Actually, the nulling beamformer designed at Helper-Txs is a suboptimal solution that cannot achieve the optimal secrecy performance, which has been demonstrated in the literature. Specifically, based on (30b), the optimal beamforming vector of artificial noise can guarantee that the resulting interference power at the legitimate user is kept below the interference temperature limit, which can achieve a similar effect to nulling beamformer.

In this subsection, we come up with a solution to the secrecy rate maximization problem. Due to fractional forms in the objective function, problem (30) is nonconvex and difficult to solve. First, we introduce a slack variable , and problem (30) can be equivalently transformed into

Based on [39], problem (31) can be solved optimally by reformulating it into a two-part optimization problem. The outer part is a one-dimensional line search problem with , i.e., where is the objective function of the inner part optimization problem to be described below. The lower bound about can be obtained directly from (31b), i.e., . The upper bound is derived from the fact that the secrecy rate is greater than or equal to zero, i.e., . For a fixed , the inner part can be expressed as

Suppose that we can obtain by solving problem (33) for any fixed . Then, we can solve problem (32) by applying the one-dimensional line search method, e.g., Golden Section Search to the interval . Therefore, the key step lies in computing for a fixed , which requires solving the nonconvex problem (33). Applying the semidefinite relaxation (SDR) technique, problem (33) can be solved by dropping two rank-one constraints [43]. When the problem (33) is solved, we can obtain the optimal solution of problem (30), i.e., (, ).

Therefore, the optimal transmit power of jammer is =. Then, the maximum contribution to the utility of the BS from the jammer is:

In the reverse auction, each Helper- reports its valuation to the BS. Then, we calculate the approximately maximized utility of the BS . We denote that

In this case, we select as the auction winner. For , we assume that

When is the auction winner, the payment is given by:

Then, the utility of can be calculated as:

In the UBM case, the reverse auction scheme also satisfies IR and IC. The proof is similar to Proposition 3, which is omitted here.

Similarly, in the UBM case, we can obtain the transmission time fraction of expressed as:

To ensure that the selected (auction winner) is trustworthy as a jammer, we would evaluate the Helper-Tx’s trustworthiness in the next section.

5. Trust Management and Jammer Selection

In this framework, we apply two trustworthiness metrics, i.e., the trust category and the trust degree to evaluate the trustworthiness of . Based on these two trustworthiness metrics, we can select a trustworthy Helper-Tx as a jammer.

5.1. Trust Category

is given an initial reputation . In general, the value of is half less than the maximum value of the reputation, i.e., . The reason is that a high value may bring selfish behavior while a low value may be unfair to a newly joined Helper-Tx.

According to detection results, some policies can be adopted to encourage to cooperate. Specifically, the EC takes an additive increase/multiplicative decrease (AIMD) mechanism to update s reputation based on the energy detection results [44]. The AIMD mechanism consists of reward and penalty; then, s reputation can be updated as where , and are weight factors that satisfy . They can be changed based on the requirement of the WCS. When the long term of the reputation plays a more important role, we increase . On the contrary, when the demand for the sensitivity of reputation collection is higher, we increase . is the detection round during the detection duration . is the historical reputation of , and is the updated reputation of . As shown below, is the reputation evidence of , which depends on the detection result at round . This reputation evidence can determine whether the AIMD mechanism is reward or penalty. When the detection result shows that there is artificial noise (): , then an additive increase () for the value of the reputation is used. When the detection result shows there is no artificial noise (): , then a multiplicative decrease () for the value of the reputation is used.

The value of is the degree of penalty, which determines how severe is the penalty imposed on . The basic setting principle of the AIMD mechanism is to slow down the increasing rate and speed up the decreasing rate of the value of reputation.

Input:;
Output:;
1: Initialize , , ;
2: Set ;
3: The reputation evidence of round is ;
4: repeat
5: ;
6: ;
7: ifthen
8:  ;
9: end if
10: Set ;
11: until;
12: if () then
13:  , A reputable user;
14: else if ()then
15:  , an unstable user;
16: else if () then
17:  , A selfish user;
18: else if () then
19: , A greedy user;
20: end if
21: ;
22: Return , .

Based on the number of inflection points of the reputation update curve and the initial reputation evidence, we propose a classification algorithm as shown in Algorithm 1. Then, can be classified into one of the following four trust categories. (i)A Reputable User. As shown in Figure 3, if the detection results show that continuously sends out the artificial noise, the value of its reputation increases gradually to 1. Then, is considered to be a reputable user.(ii)A Selfish User. As shown in Figure 4, s reputation update curve is serrated, which means that intermittently sends out the artificial noise. Then, is considered to be a selfish user.(iii)An Unstable User. As shown in Figure 5, does not send the artificial noise for a while, but it recovers quickly and continues sending the artificial noise. It is assumed that the situation is caused by hardware damage or mobility, and is considered to be an unstable user.(iv)A Greedy User. As shown in Figure 6, we consider as a greedy user if it never sends the artificial noise, or it stops sending out the artificial noise in the middle time and never recovers.

5.2. Trust Degree

To evaluate the trustworthiness of , we adopt the concept of trust degree . The trust degree of is calculated by averaging the reputation, shown as

In the case with perfect CSI, we have to guarantee that is trustworthy enough to reach the target secrecy performance threshold . In the case with statistical CSI, the target ETT performance threshold is defined as . The calculation process of trust degree provides no different from the case with perfect CSI. It means that there is a target trust degree threshold . Next, we investigate how to calculate this threshold.

We adopt the concept of expected secrecy rate to evaluate the secrecy performance. When is trusted (the artificial noise is present), the secrecy rate can be expressed as where the SINRs are expressed as

When is untrusted (artificial noise is absent), the secrecy rate can be expressed as where the SINRs are expressed as

In this paper, it is assumed that the trust degree represents the probability that a Helper-Tx sends the artificial noise. Thus, we can obtain the expected secrecy rate as

For the given target secrecy performance threshold , the expected secrecy rate has to satisfy that then we can calculate the target trust degree threshold as

5.3. Jammer Selection

According to the classification algorithm, the trust degree of is updated, and is classified into one of four trust categories. As shown in Figure 2, would be selected as a cooperative friendly jammer if the following conditions are achieved at the same time: (i)s trust degree satisfies that (ii) is classified as a reputable user or an unstable user

Otherwise, would be kicked out of the network, and we go back to the auction scheme to select another Helper-Tx.

6. Numerical Results

In this section, we present some numerical results of the reverse auction and the AIMD algorithm. In this paper, we consider that the WCS is static at a certain time duration. Therefore, it is assumed that the distances between users are fixed in this time duration, while the results of a static WCS can be well applied to a dynamic WCS. The simulation parameters are shown in Table 1. The values of these parameters are set according to the general guidelines in the existing literatures.

6.1. Auction Scheme Evaluation

In the WCS, each Helper-Tx reports its private information to the BS. It is assumed that each Helper-Tx does not know the reported valuation of other Helper-Txs. The reported valuation of each Helper-Tx obeys the probability density function: , where the random variable ( and ). In the simulation, we adopt random variable instead of calculating . This randomly generated variable does not affect the outcome of the mechanism. For simplicity, we assume that the price paid per unit of secrecy rate is .

Specifically, we consider a system with Helper-Txs, and the BS would select jammer. A random sample of these jammers’ secrecy rates is obtained as [1.3610, 0.5184, 0.3954, 1.5313, 0.9302]. Figure 7 shows the expected payoff of each Helper-Tx versus the reported valuation. Specifically, the payoff of each Helper-Tx is the transmission time to access the data link. At each reported valuation, a large number () of sample values is randomly generated to calculate the utility of each Helper-Tx. We can obtain that truth-telling is the dominant strategy in the reverse auction. Each Helper-Tx can expect its maximum payoff when reporting its valuation truthfully. For example, the true valuation of is , and as we can see in Figure 7, gets the maximum utility when it reports its true valuation. Furthermore, a Helper-Tx with a lager valuation can gain a larger utility. As each selected has to pay a transfer payment, the maximum expected utility of the Helper-Tx is less than .

In Figure 8, we illustrate the expected utility versus the reported valuation of with different . It is obtained that gains the maximum expected utility when it reports the true valuation () with different . With increases, gains a higher expected utility. It is because that as increases, the probability that is being selected as a jammer becomes higher. Furthermore, it is observed that when , the expected utility tends to be fixed as the reported valuation increases.

In Figure 9, we compare the BS’s utility under the reverse auction scheme with two cases and the Vickrey auction. It shows that the UBM case outerforms the CP case in terms of the BS’s utility. In addition, we can see that for the two cases, the reverse auction scheme outperforms the Vickrey auction scheme. These results show that the reverse auction scheme is valid and has a better performance than the Vickrey auction scheme.

Figure 10 compares the secrecy rate under the reverse auction scheme for UBM case, CP case, and the Vickrey auction scheme. We can see that the reverse auction scheme has a better secrecy performance than the Vickrey auction. It can be explained that our reverse auction takes the secrecy performance of each Helper-Tx into consideration, while the Vickrey auction only considers the price of each Helper-Tx.

In Figure 11, we illustrate the interference cost under CP case and the Vickrey auction scheme. In the UBM case, there is almost no interference cost and can be ignored. It shows that as the transmission power of jammer increases, a higher interference cost is incurred to the BS. In addition, the Vickrey auction scheme causes more interference cost to the BS than the reverse auction scheme. This result shows that the reverse auction scheme has a better performance to degrade the interference to the BS.

6.2. Optimal Beamforming Evaluation in the UBM Case

In this subsection, we focus on the joint beamforming optimization of the BS and jammers. In Figure 12, we illustrate the total secrecy rate versus the transmitted power of the BS with jammers at the same location ( m,  m). It is observed that with the number of jammers increases, the secrecy rate decreases. It means that more jammers can not further improve the secrecy rate. This figure validates the Proposition 1, where the optimal secrecy rate can be achieved by selecting a one best Helper-Tx as jammer, i.e., .

In Figure 13, we compare the secrecy performance of the proposed algorithm (“Joint opt.” in the figure) with the jammer-only optimization (“Jammer-only opt.”) algorithm. In the proposed algorithm, both the beamforming vector of the BS () and the beamforming vector of the jammer () are optimized. In the jammer-only optimization algorithm, the beamforming vector of the BS () is designed as homogeneous isotropic, and only the beamforming vector of the jammer is optimized. Figure 13 shows the performance improvement by the proposed joint optimization algorithm compared with the jammer-only optimization algorithm. In this figure, we select and jammers at the same location with the jammer-only optimization algorithm. We can obtain that in jammer-only optimization algorithm, more jammers cannot cause more interference to Eve.

In Figure 14, we illustrate the secrecy rate of Helper-Txs at different locations. The location of a Helper-Tx represents its private information (the CSI). It is obvious to see that the secrecy rate would be worse when decreases or increases. It can be explained that when decreases or increases, the jammer would cause more interference to the data link or less interference to the wiretap link, respectively. This result shows that the location of a Helper-Tx is critical to be selected as a jammer. Thus, a mechanism to make sure each Helper-Tx reports their CSI truthfully is the main task in a jammer selection scheme.

Figure 15 illustrates the performance comparison with regard to the trust degree for different distances between the jammer and user1. As we can see, the expected secrecy rate increases with a higher trust degree. Thus, we consider a Helper-Tx with a higher trust degree as a more trustworthy friendly jammer. Besides, Figure 15 also leads us to the conclusion that we can get a better expected secrecy rate when the jammer is farther to user1. The reason is that jammer would cause more interference when it is closer to user1, which means the distance is also an important design parameter in the jammer selection scheme.

In this paper, the jamming distance is defined as the distance between the friendly jammer and Eve, i.e., . It is assumed that Eve is one of legitimate users; thus, we can obtain the jamming distance. In Figure 16, we illustrate the optimal transmit power of the jammer over different maximus power of the BS (). Obviously, as increases, the jammer should transmit the artificial noise with a higher power. The reason is that the transmited message of a higher power needs more artificial noise to protect. Figure 16 also shows that with the jamming distance increases, a higher transmit power of the friendly jammer is required. Then, there is a higher upper bound of the jammer’s residual energy. In other words, a jammer farther away from Eve should have more residual energy to guarantee the secrecy performance.

6.3. AIMD Mechanism Evaluation

In Figure 17, taking an unstable user as an example, we illustrate the reputation update process with different kinds of AIMD mechanisms. As we can see in Figure 17, when goes up and goes down, both the rates of increasing and decreasing slow down. In such a situation, the historical reputation plays a more important role while the AIMD mechanism is not sensitive to current reputation. Figure 17 also leads us to the conclusion that when decreases, the rate of increasing stays the same while the rate of decreasing slows down. As the value of is the degree of penalty, and it is related to the damage level caused by selfish behavior of a jammer. Thus, a lower value of means a lower penalty while the reward stays the same.

7. Conclusion

This paper presents a trustworthy friendly jammer selection scheme with truth-telling for WCS. We develop a reverse auction scheme to enforce truth-telling as the dominant strategy for each Helper-Tx. We prove that the BS can achieve the highest secrecy rate by selecting a one best Helper-Tx as the jammer. Furthermore, we introduce trust category and trust degree to evaluate the trustworthiness of each Helper-Tx. We then design a selection scheme based the trust category and trust degree for the EC to select a one best Helper-Tx. Lastly, we present numerical results to demonstrate the performance of our proposed jammer selection scheme. As a part of our future work, we plan to investigate the problem of joint relay and jammer selection in the WCS.

Appendix

Proof of Proposition 1

According to (3), the secrecy rate of the WCS when selecting Helper-Txs can be expressed as . When , could be obtained, leading to the largest . As a result, it is the optimal choice to select Helper-Txs as jammers in the WCS.

It is assumed that and . Thus, we can omit and in the denominator of and , respectively. As , we could obtain that

Then, we obtain the result expressed as

It is assumed that and . We can compare and as

Thus, is the optimal choice in the jammer selection scheme, which completes the proof of Proposition 1.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported in part by the Fundamental Research Funds for the Central Universities under Grant No. 2019JBZ001, in part by the National Natural Science Foundation of China under Grant No. 61871023 and Grant No. 61931001, and in part by Beijing Natural Science Foundation under Grant 4202054.