Abstract

This paper mainly describes the transmission reliability and physical layer security of multiantenna decode-and-forward relay networks over the - shadowed fading distribution. We consider the existence of residual hardware impairments (RHIs) and channel estimation errors (CEEs) at the same time. Firstly, we give the network model. On this basis, we analyze the reliability and security by deriving the exact expressions of outage probability (OP) and intercept probability (IP). To further verify and investigate the theoretical derivation, the approximate analysis of OP is obtained under the high signal-to-noise ratio. In addition, we also use an optimized antenna selection technology at the transmitter to improve the security performance. Finally, through the comparative study of theoretical simulation and Monte Carlo simulation results, the factors affecting network transmission and security are acquired. The interesting conclusion is that both RHIs and CEEs can increase OP and decrease IP; that is to say, the existence of RHIs and CEEs can reduce reliability and enhance security.

1. Introduction

With the widespread application of wireless communication technology, physical layer security (PLS) technology is highly concerned by scholars because it can take advantage of channel fading to improve antieavesdropping performance. The PLS was first proposed in [1]. Then, Yang et al. in [2] described that one of the dominating troubles faced by the 5G network is how to ensure the security of wireless data transmission. PLS have been generally studied in different system models, such as cooperative nonorthogonal multiple access (NOMA) systems [3], green communication systems based on relay selection [4], and multihop relay systems [5]. Moreover, Zhu and Yao in [6] also designed a cooperative beamforming scheme to enhance the PLS of cognitive radio networks. The authors of [7] investigated the reliability of quasistatic Rayleigh fading by deriving its outage probability (OP). The authors in [8] proposed a PLS project based on channel precompensation to improve the anti-interference of the polarization shift keying modulation system. Fan et al. in [9] used the relay selection to improve PLS when there are multiple users and multiple eavesdroppers.

In the actual communication process, interference from obstacles or other factors will be encountered inevitably, and the phenomenon that causes the power of the received signals to change with time and position is called channel fading. On account of the rapid development of communication networks, the researches on the transmission and security performances of various models under fading channels have been more and more favored by scholars. The authors in [10] studied the security of the fading channels when there was an eavesdropper in the system model. The authors of [11] explored the channel capacity of multiple-input multiple-output (MIMO) systems under Rayleigh fading. Zhu et al. in [12] considered the full-duplex decode-and-forward (DF) system in the Rayleigh fading and gave the upper and lower bound expressions of its OP. New closed-form expressions of the strictly positive secrecy capacity (SPSC) and secure outage probability (SOP) over - fading channels were given in [13]. Badarneh et al. deduced the precise expression of the th moment of the dual - fading in [14]. And the performance was researched in terms of channel quality estimation index and average channel capacity (ACC). By deriving the precise expressions of average duration of fades (ADF) and probability density function (PDF) for dual Hoyt fading in [15], the authors investigated the statistical characteristics of the fading model of the narrow-band amplify and forward (AF) in this fading environment. In [16], the OP of double shadowed - fading was analyzed, and the effect of double shadowed on wireless fading channels was discussed. The authors of [17] derived the accurate expressions of PDF and cumulative distribution function (CDF) of amplitude and signal-to-noise ratio (SNR) of multicascade - fading channels and obtained the closed-form expressions of OP, average symbol error probability (ASEP), and ACC.

In wireless communication networks, cooperative relay technology can improve system reliability, energy efficiency, and system coverage, which has been studied extensively [1824]. The authors in [18] researched the performance of the double-hop relay system. The application of a full-duplex AF relay system in vehicle-to-vehicle (V2V) was investigated in [19]. Majhi et al. of [20] deduced an accurate expression of the OP of orthogonal frequency division multiplexing (OFDM) relay system. The authors in [21] considered the selection of relay antenna in the V2V communication model using both physical-layer network coding and AF schemes in dual Nakagami- channels. The OP of the two-way relay DF system under the packet fading channels was investigated in [22]. The authors in [23] studied the influence of the relay selection scheme and the number of relays on the outage performance of cognitive radio networks (CRN) by analyzing the OP. The authors of [24] analyzed the security of relay systems using AF under generalized- fading.

Due to the time-varying characteristics of the communication state, radio frequency devices will be affected by many factors, such as phase noise and power amplifier nonlinearity. These irreparable hardware impairments (HIs) will distort the signals in transmission, so it is necessary to consider the HIs in a communication system. In addition to the above-mentioned HIs that will threaten the accurate transmission of the signal, the existence of CEEs is also one of the reasons for the mismatch between the expected signal and the actual transmission signal. To make the research more practical, many researchers have considered the influence of transceiver HIs and CEEs on the system during modeling and analysis [2531], such as cognitive amplification and forwarding multirelay networks [25], beyond fifth-generation Internet of Things collaborative NOMA relay system [26], and ambient backscatter NOMA systems [27]. The authors of [28] described the performance of multiple relay systems when there were both transceiver HIs and CEEs. The authors in [29] studied the influence of RHIs and CEEs on cooperative NOMA systems by analyzing OP and the energy efficiency. The influences of the MIMO system with CEEs, RHIs, and imperfect successive interference cancellation effects on Nakagami- fading were investigated in [30]. Li et al. of [31] researched the reliability and security performance of cooperative multirelay systems with RHIs and CEEs by deriving and analyzing the accurate expressions of OP and IP.

Through studying the existing fading channels, we found that the newly emerging - shadowed fading can characterize many fading channels by changing its parameters, such as Rice, Nakagami-, Rayleigh, and -. The - shadowed fading was first proposed in [32]. Due to its composite characteristics, the channels can be applied to many scenarios. As shown in [33], a secure multicast scheme under - shadowed fading with multiple users and multiple eavesdroppers was studied. Sun et al. in [34] investigated the security performance of the single-input multiple-output relay communication architecture over the - shadowed distribution by deriving the precise and approximate expressions of SOP and SPSC. The closed-form expressions of the OP and the ASEP of the two-hop multiantenna wireless transmission system based on the AF relay node of the - shadowed fading system were deduced in [35]. Illi et al. in [36] researched the security of a dual-hop underwater communication system based on the - shadowed architecture. The authors in [37] studied the performance of the dual-hop autofocus communication network over the - shadowed fading.

References [1017] mainly described the research of scholars on wireless fading channel in recent years, [1824] were aimed at elaborating a widely used cooperative relay technology, [2531] presented the performance of the system when scholars consider the existence of CEEs and HIs in different models in recent years, and [3237] described the relevant researches on - shadowed fading channel in recent years. Synthesizing the above researches, to the author’s knowledge, no scholars have studied the effects of RHIs and CEEs with DF under - shadowed fading. Therefore, we develop this work. First of all, we consider an eavesdropping model with DF relay and study the influence of CEEs and RHIs on the transmission performance and anti-interference ability of the network over - shadowed fading channels. In addition, to further verify and analyze the theoretical derivation, the high SNR approximate analysis of OP is obtained. Moreover, we also compared the ideal and nonideal situations

The rest of this article is organized as follows. In Section 2, the statistical characteristics of the system model and the - shadowed fading are given, and the expressions of each parameter are analyzed when the RHIs and CEEs are considered simultaneously. In Section 3, the antenna selection scheme at the transmitter is given first; then, the precise expressions of OP and IP under ideal and nonideal situations are described. In Section 4, the approximate expressions of high SNR of OP under fixed value and varying function of channel estimation variance are derived. In Section 5, the numerical simulation results are discussed in detail. Section 6 summarizes the article, and the next section is the appendix.

2. System Model and Statistical Features

2.1. System Model

In Figure 1, we consider the classic Wyner wiretapping model. The model includes a transmitter (), a relay (), a receiver user (), and an eavesdropper (). The is equipped with antennas , and legitimate have an antenna, and has antennas . On account of the existence of the shadowed fading, all signals from the can only be transmitted to and cannot be directly sent to or . In addition, the information transmission mode at the relay is assumed to be DF.

As can be seen, the communication system of this model is divided into two time slots: (i) sends the original signals to ; (ii) the decodes the signals and forwards them to . To improve the antieavesdropping ability, we have added artificial noise to the model. Since it is difficult to acquire the channel state information (CSI) of all nodes, the effective way to solve this problem is channel estimation which can be divided into three types, including reference signal-based estimation [38], blind estimation [39], and semiblind estimation [40]. The method used in this paper belongs to the first category that uses training sequences to estimate the CSI. According to the method in reference [41], the actual communication channel is expressed as

In (1), , is the channel coefficient, and denotes the channel estimation of . represents the CEEs and denotes the estimated variance. We assume two typical conditions: (i) , where is a nonnegative value; (ii) , where , , and represent the variance of the channel gain, the quality parameter of the CEEs, and the variance of the average SNR, respectively.

2.2. The First Transfer Process

During this course, the signals from to are represented as , and . We considered both RHIs and defective CSI, so the information at the can be described as where represents the channel from the antenna chosen by the to . The total transmit power is , and is employed to represent the selected antenna power allocation factor, and indicates the power allocation factor of the unchecked antenna. Here, we employ to indicate the power of the , then . is the valid signal from to , , and is the additive white Gaussian noise (AWGN). and are, respectively, expressed as the distortion noise caused by RHIs at the transmitting and the receiving terminal.

2.3. The Second Transfer Process

At , the relay forwards the decoding of the signal to and . To improve the antieavesdropping ability, when transmits information to and , the influence of artificial noise is also considered. In the actual communication system, due to the existence of CEEs at , there will be some artificial noise and residual interference [4244]. In summary, the information at and can be written as where and represent the actual signals transmitted to and with . and are, respectively, denoted as the signals sent to and with artificial noise. And . and separately describe the factitious noise quantization coefficients at and . and , respectively, represent the composite AWGN with mean value 0 and variance and . and represent the transmit power of relay and factitious noise and . and are, respectively, expressed as the distortion noise caused by RHIs during to communication. and are, respectively, expressed as the distortion noise caused by RHIs during to communication. As mentioned in [45], the distortion noise can be written as

The distortion noise was regarded as the product of , , and . For an achievable channel , the composite distortion power at the receiving terminal can be described as

From (6), we can get that power only rests with the and the . Where , the messages at , , and were described as where the comprehensive distortion noises from RHIs at , , and are, respectively, expressed as , , and . Besides, , , and .

The signal-to-interference-plus-noise ratios (SINRs) of , , and are given as where , , and .

2.4. Statistical Features

In the model, we consider the widely applied - shadowed fading, and the PDF of the channel gain has been given in [46] as

After some mathematical operations, the CDF expression of the channel gain can be obtained as

The meanings of , , and in (13) and (14) are all channel parameters, where is the shaping parameter of Nakagami- fading, and is related to the number of received signal groups. is a positive number, represents the total power of the dominating constituent, and is the total power of the scattered wave. , and indicates the amplitude of the channel. The capacity formula of the Shannon theorem is defined as

According to (10) and (11), we can get the expression of the instantaneous channel capacity of and as

The eavesdropper employs multiple relay combining (MRC) algorithm to intercept legal information; the SINR at is

The SINR of is expressed as

So we can get the instantaneous capacity of as

3. Performance Analysis of Outage Probability (OP) and Intercept Probability (IP)

To improve the performance of the communication systems, we use the optimal transmit antenna selection (OTAS) strategy at the transmitter with multiple antennas and deduce the precise expressions of OP and IP to analyze its reliability and security.

3.1. OP Analysis

In this section, we discuss the transmission performance of multiantenna cooperative communication systems in the existence of RHIs and CEEs from the perspective of OP.

3.2. Outage Probability

The OP of the system model can be indicated as where the target threshold is .

Under the premise of CEEs and RHIs, using the OTAS protocol, the channel gain containing the estimation error can be obtained as

The CDF of the channel gain during transmission is written as

With the DF algorithm, the channel capacity in the information transmission of and is expressed as

Through the above analysis, in the following theorem, we will research the exact expression of the OP of the - shadowed fading with RHIs and CEEs.

Theorem 1. For - shadowed fading, the accurate expressions of OP for two scenes are expressed as follows: (1)Nonideal condition (with RHIs and CEEs)To ensure that OP is not zero, we set and . and correspond to equations (35) and (36) in the appendix, respectively. (2)Ideal condition ( and )where and .

Proof. See Appendix A.

3.3. IP Analysis

IP means the probability that the capacity of the eavesdropping channel is greater than , which is written as

For the precise expressions of IP under the - shadowed fading, the two scenes will be given below.

3.4. Nonideal Condition

Substituting (20) into (27), we obtain where , , and . Substituting (14) into (28), we can get the exact expression of OP as where .

3.5. Ideal Condition

Similar to the derivation of (29), we obtain where , , and and we set .

4. Asymptotic Analysis

To further verify and investigate the theoretical derivation, we give the asymptotic analysis of the high SNR approximation of OP. It can be divided into the following two conditions: nonideal case and ideal case.

Theorem 2. The precise expressions of the asymptotic analysis of the high SNR approximation of OP are as follows: (1)Nonideal caseWhen , equation (42) can be obtained from Appendix B. When , where is a constant, , and . (2)Ideal case

Proof. See Appendix B.

5. Numerical Analysis

In this section, we exhibit the comparison charts between theoretical derivations and Monte Carlo simulations in Figures 27. As can be seen from the graphs, the numerical results coincide well with the simulation, which confirms the validity of the deduced results. In the simulation, our parameters are set as follows: , , , , , , , , and . It should be noted that although the theoretical formulas of IP and op contain infinite series, it will not affect the simulation results, because the theoretical formulas will converge when the number of cycles is greater than 45.

Figure 2 describes the variation of OP and IP with the power distribution factor and distortion noise . It can be concluded that as increases, OP gradually becomes smaller, while IP continues to rise. And the increase of the distortion noise parameter will reduce the reliability and improve the antieavesdropping ability.

Figure 3 illustrates the changes of OP and IP with transmit power under different artificial quantization coefficients. Both ideal situations (, ) and nonideal situations (, ) are considered. It can be seen that as augments, OP gradually aggrandizes, and the reliability of the system decreases. And due to distortion, the value of OP under ideal conditions is always lower than that with RHIs. In addition, increasing the value of will raise the IP, which means that the security of the channel will be reduced.

Figure 4 plots the impact of different antenna numbers and CEEs on OP. We clearly find that the increase of transmission power can enhance the transmission performance, while the augment of CEEs will impair the reliability. When the number of antennas is less than 4 dB, the OP decreases as the number of antennas adds. When is greater than 4 dB, the OP changes less, which shows that the application of OTAS to improve the reliability of the system is more suitable when the number of antennas is small.

Figure 5 presents the variation of OP and IP with transmission power when RHIs and CEEs exist at the same time. The figure shows that with the increases of , OP increases while IP decreases. The results illustrate that RHIs are detrimental to the reliability of the system. And OP has an error floor under nonideal conditions. In addition, there is an optimal transmission power, which can balance the security and reliability in the communication process.

Figure 6 illustrates the change of OP and IP with the transmit power under different CEE conditions. The approximate curves in Figure 6 are drawn based on (31) and (32). We can see that in nonideal situations, with the increase of , the reliability of the channel decreases and there exists an error floor. And the value of OP under the nonideal case is always greater than under the ideal case. In addition, compared with OP, CEEs have less impact on IP. This manifests that CEEs play an important role in the reliability but has little impact on the security.

Figure 7 plots the variation of OP under the conditions of different antenna numbers and parameters . In this simulation, we set an ideal case (, ) and a nonideal case (, ). It can be concluded that due to the existence of fixed CEEs, there exists an error floor independent of transmission power under nonideal condition. And because of the existence of CEEs and RHIs, the nonideal situation of OP has been worse than the ideal situation. At the same time, we can see that the augment of and can make the system more reliable.

6. Conclusion

This paper mainly studies the influence over the - shadowed fading when RHIs and CEEs exist simultaneously. Meanwhile, we used the multiantenna selection scheme on the transmitting terminal and discussed the multiantenna receiving technology on the eavesdropping transmitting terminal. In addition, we employed the DF method to transmit the destination signal and then verified the correctness of the derivation through simulation We discover that large , large , large , and small can reduce the reliability. In addition, small , large , and large can improve the antieavesdropping ability on the - shadowed network. Finally, it is concluded that RHIs and CEEs can reduce the reliability and enhance its security, because RHIs and CEEs often appear in the practical communication network. It is very meaningful to do performance analysis on this premise. As an extension of this work, we will study the scenario of multiple base stations and multiple receivers with different relay protocols.

Appendix

A. The Proof of Theorem 1

Combining (21) and (24), the expression of OP can be obtained as

In the following process of solving the closed-form expressions of and , we set . Then, we substitute (16) into (33) and obtain where we set Finally, substituting (23) into (34), we get the exact expression of as

Similar to the method of solving , we substitute (24) into (33) to gain formula (36), and then, we combine (14) and (36) to get the exact expression of as where we set After further simplification, can be expressed as

Substitute the obtained and into (33), and finally, acquire (25). Moreover, we can obtain the ideal expression of OP in (26) by setting and .

B. The Proof of Theorem 2

B.1. Nonideal Situation

(1)When

When seeking the approximation of high SNR, we can employ a similar method to [47] to obtain the following expression for the CDF of the channel gain of the - shadowed fading as

According to (38), we can get the approximate expression (39) of the CDF as

Similar to the method in Appendix A, the expressions of and can be written as

In summary, we can get the approximate expression of OP at high SNR as (2)When ( is a fixed value)

When we set , the expressions of and channel capacity under high SNR are deduced as

Combined with the method in Appendix A, the formula of OP at high SNR can be obtained as where and are, respectively, expressed as where By substituting the calculated and into (45), the precise expression (31) of the OP under high SNR can be obtained.

B.2. Ideal Situation

When the high SNR of OP under ideal case can be approximated as

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there is no conflict of interest about the publication of this paper.

Acknowledgments

This work was supported in part by the Key Scientific Research Projects of Higher Education Institutions in Henan Province under Grant 20A510007 and in part by the Doctoral Fund of Henan Polytechnic University under Grant B2022-13.