153
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Physical layer security in wireless sensors networks: secrecy outage probability analysis

, ORCID Icon &
Received 14 Nov 2023, Accepted 04 May 2024, Published online: 18 May 2024

ABSTRACT

The secrecy performance of wireless networks powered up by a dedicated power beacon (PB) is addressed in this work. Particularly, the closed-form expression of the secrecy outage probability (SOP) under the presence of multiple eavesdroppers is given. The considered networks are asymmetric since there are multiple eavesdroppers but only a single legitimate receiver. As a consequence, two wiretap schemes are employed, namely, non-colluding and colluding schemes, to take advantage of multiple eavesdroppers. To draw insights from the derived framework, the asymptotic framework of the SOP under the high transmit power regime is also provided. Next, Monte Carlo simulations are provided to validate the theoretical foundations of the proposed approach. Our findings show that by increasing the transmit power from −10 dB to 30 dB, the SOP ameliorates almost a thousand times. Additionally, the SOP is a monotonic decreasing function with a time-switching ratio. We also make comparisons with work in the literature in which the full-duplex relay is employed to help the legitimate link. Numerical results illustrate that the proposed network outperforms those described in the literature. Particularly, through reliance on the setup, the SOP under the proposed system is better than those of the literature by about twofold.

1. Introduction

Smart cities, multimodal virtual reality, and mobile streaming media are just a few examples among numerous applications supported by next-generation communication (5G and beyond) and the Internet of Things (IoT) networks (T. T. H. Nguyen et al., Citation2023, november). Yet, as IoT devices are typically battery-limited, one of the most popular recognized difficulties is how to autonomously maintain connectivity and the network lifespan. Although the battery can be recharged or replaced, some deployments/specific conditions such as in hazardous environments, underground or isolated areas, and areas of catastrophic devastation make these approaches impractical, expensive, and/or impossible (Al Hajj et al., Citation2020). Recently, wireless power transfer (WPT) has emerged as a potential technique to extend the lifetime of energy-constrained wireless networks such as wireless sensor networks (WSN) and/or postdisaster emergency communications (Zhao et al., Citation2019). There are two different types of WPT-based networks. The first is the simultaneous wireless information and power transfer (SWIPT) (Q. S. Nguyen et al., Citation2023), in which radio frequency (RF) signals are used not only for bearing information but also for charging the energy-harvesting (EH) receiver. This kind of SWIPT-enabled receiver exhibits a symmetric structure since the transceiver comprises the EH circuit and decoding circuit. Additionally, to realize such a technique, three popular protocols are proposed in the literature including time switching (TS), power splitting (PS), and antenna-splitting (if the receiver has at least two antennae) protocols. The second type of this network is called the wireless powered communications network (WPCN) in which the battery of the EH-based devices is solely powered by dedicated power stations such as a power beacon (PB) or a hybrid access point (HAP). Additionally, information security has become a considerable concern in wireless communications due to the nature of broadcasting which introduces vulnerability to many types of wiretap activity. The security issue in IoT networks is even more serious. This is because most IoT networks, such as LoRa, SigFox, and WiFi HaLow, are employed in unlicensed bands. Additionally, as the number of IoT devices connecting to the wireless network increases exponentially year by year, they become more vulnerable to wiretap activities even from the intranetworks. Thus, it is important to examine the secrecy performance in IoT networks. Recently, the topic of physical layer security (PLS) has gained increased attention since it exploits the characteristics of the wireless channel instead of cryptography to secure communications (Duc et al., Citation2022; Tin et al., Citation2017). As a result, even if eavesdroppers have advanced computing capabilities, secure communications can still be assured. The performance of the wireless-powered transfer-based networks and PLS is outlined in the next literature review section.

2. State of the art

The performance of two WPT models, namely, PB-based and SWIPT, has been studied widely in the literature. For SWIPT, the authors in Cao et al. (Citation2022) investigated the maximization problem of energy efficiency (EE) of the system under the constraints of quality of service (QoS) and transmission power. Additionally, the performance of the wireless network under both TS and PS protocols was addressed in Do et al. (Citation2020). Moreover, performance evaluations and optimizations of SWIPT-based networks combined with cooperative relaying (Chen et al., Citation2020), cognitive radio (Tin et al., Citation2021), cellular networks (Aravanis et al., Citation2019), device-to-device (D2D) communications (H. N. Nguyen et al., Citation2018), and distributed antenna systems (Huang et al., Citation2018) were also thoroughly investigated. The authors in T. N. Nguyen et al. (Citation2016) investigated the performance of random networks with three user selection protocols under the PS protocol. In Tin et al. (Citation2021), the outage probability (OP) of the cooperative cognitive radio network (CCRN) under the PS protocol was studied. Furthermore, Tan and other authors derived the throughput of the SWIPT-enabled IoT networks over the independent and nonidentical distribution (i.n.i.d.) Rayleigh fading (T. N. Nguyen et al., Citation2021). In Huynh et al. (Citation2017), the authors studied throughput analysis of the best relay selections network with in-phase and Quadrature-phase Imbalances (IQI) under TS protocol. For WPCN, it is suitable for long-distance communications (T. H. Nguyen et al., Citation2020). Moreover, a PB-based WPCN is suggested as a potential contender for powering up wireless networks and for enabling a huge number of applications requiring high EE (Tin et al., Citation2020). In T. T. Nguyen, Nguyen et al. (Citation2019), a hybrid access point employed PB to provide data transmission in WPCN, with the channel coefficient between users being symmetrical. The OP and ergodic capacity of the energy harvesting-enabled full-duplex (FD) nonorthogonal multiple access (NOMA) networks were addressed in Toan et al. (Citation2020). To be more precise, the relay was operated in the FD mode instead of in the half-duplex mode as in conventional relaying. Moreover, the impact of the near user on the relay was taken into account. The authors, however, did not consider the secrecy performance of the considered networks. The related works for WPCN focused on the applications to relaying networks (Zhong et al., Citation2018), cognitive radio networks (Zhai et al., Citation2018), and cellular networks (Lam & Di Renzo, Citation2020). More specifically, the authors in Lam and Di Renzo (Citation2020) investigated the EE of the two-tier cellular networks where a tier of the base station (BS) relies only on renewable sources to operate. Both BSs and end users are modelled according to the Poison Point Process (PPP) to capture the randomness of the wireless networks. Their results show that there exists an optimal value of the transmit power for maximizing the multitier cellular networks.

On the other hand, the secrecy performance from the physical layer point of view was addressed in Wang et al. (Citation2017), Le et al. (Citation2023), Wang et al. (Citation2017), Lai et al. (Citation2019), T. N. Nguyen, Tran, Van Chien, Phan, Voznak et al. (Citation2022), Zou et al. (Citation2015), Tu and Bradai (Citation2021), Wang et al. (Citation2015), Park et al. (Citation2013), Oleiwi and Al-Raweshidy (Citation2022), T. T. Nguyen et al. (Citation2022), Tu et al. (Citation2023) and Mitev et al. (Citation2022). More precisely, a link selection strategy for a buffer-aided relaying network was discussed in Wang et al. (Citation2017). The secrecy performance of an ambient backscatter communication (ABC) system was significantly enhanced by employing reconfigurable intelligent surfaces (RIS) (Le et al., Citation2023). By utilizing cooperative jamming and superposition coding techniques, secrecy outage probability (SOP) and feasible secrecy rate for a vehicle relay network were examined in Wang et al. (Citation2017). A symmetrically distributed secure switch-and-stay combined strategy to protect communications was put forth in Lai et al. (Citation2019). In T. N. Nguyen, Tran, Van Chien, Phan, Voznak et al. (Citation2022), the author investigated the security and reliability of the satellite network with a friendly jammer applied from the satellite to the relay to improve the security of the transmission. The PLS was enhanced by applying a diversity of techniques in Zou et al. (Citation2015). Several methods were proposed to deteriorate the quality of wiretapped signals at the eavesdroppers, including RIS (Tu & Bradai, Citation2021) and artificial noise (Wang et al., Citation2015). The authorized receiver selects a relay to weaken eavesdropper signals by transmitting jamming signals (Park et al., Citation2013). Cooperative jamming and cooperative relaying (Oleiwi & Al-Raweshidy, Citation2022) have been proven to be effective ways to boost the secrecy capability in cooperative networks. Moreover, the works in T. T. Nguyen et al. (Citation2022) and Tu et al. (Citation2023) examined the PLS of cooperative systems in the nonorthogonal multiple access networks. The authors in Mitev et al. (Citation2022) studied the PLS via the physical unclonable functions, RF fingerprinting/proximity-based authentication, and secret key generation (SKG), while the present work focuses on SOP. Moreover, these authors only considered a single eavesdropper, while we study the scenario where multiple eavesdroppers are present. Additionally, their work was merely suitable for indoor environments, while we include arbitrary environments.

There is limited work that on the combination of PLS and energy harvesting (Ghosh et al., Citation2023; T. N. Nguyen, Tran, Van Chien, Phan, Voznak, Tin et al., Citation2022; Viet Tuan et al., Citation2020). More specifically, the authors in Ghosh et al. (Citation2023) investigated the secrecy performance of an underwater optical communication (UOWC)-radio frequency (RF) network, while we studied the case of fully wireless networks. Additionally, they considered the relay in order to help transform the optical signals into electrical signals, while we do not employ relays to transform the signal form. Furthermore, we apply EH-enabled communications at the source node to improve the EE of the whole network, while they do not consider this technique in their work. On the other hand, Nguyen and other authors in T. N. Nguyen, Tran, Van Chien, Phan, Voznak, Tin et al. (Citation2022) derived the OP and intercept probability (IP), while in the present work, we study the SOP, which is more challenging since it involves many correlated variables from both the legitimate and wiretap links. Moreover, they solely consider a single eavesdropper, while we consider multiple ones. Another divergent point between the two works is that they employed SWIPT, while we consider the PB to power the wireless devices. The secrecy performance of a two-way relaying SWIPT network with a hidden eavesdropper was investigated in Viet Tuan et al. (Citation2020). In particular, they jointly optimized the downlink beamforming vectors, power splitting ratio, and uplink transmission power. However, they considered a single eavesdropper scenario which is much easier than using several eavesdropper scenarios. Additionally, they aimed to minimize the number of transmissions at both the uplink and downlink, while we concentrated on the SOP and its insights when the system is on the high transmit power regime.

Based on these motivations, in this paper, we investigate the performance of EH-based asymmetric wireless networks where a source is charged by harvested energy from a PB in the presence of multiple eavesdroppers. This network topology is asymmetric, as there is a single legitimate user versus many eavesdroppers. compares the uniqueness of our research to related articles. This paper's main contributions and novelties are summarized as follows:

  • We considered an EH-based wireless network comprising a source, a destination, a PB, and multiple eavesdroppers. More precisely, the operations of the source solely reply to the harvested energy from the PB, thus significantly enhancing the EE of the considered networks. Additionally, we consider two eavesdropper schemes, i.e. colluding and noncolluding schemes.

  • We analyzed the security performance of the considered networks. The closed-form expression of the SOP under both schemes is provided. To provide insight into the proposed networks, the asymptotic framework of the SOP is also given.

  • Monte Carlo simulations are provided to evaluate the validity of our framework and findings. The impact of some key parameters on the performance of the SOP is also discussed.

Table 1. Comparison of the uniqueness of our research to related articles.

Compared with the related works in the literature, our paper's strengths and weaknesses can be briefly summarized in view of the advantages of the considered networks:

  • We compute the SOP in the closed-form expression. It should be noted that it is not a trivial task since the SOP involves many correlated variables, i.e. the channel gain from the PB to the source node, in both the legitimate and eavesdropper receivers. Additionally, many works in the literature have only examined the IP, which is far easier compared to computing the SOP. The main rationale behind this statement is that under the IP, one only considers the random variables relevant to the eavesdropper links, while in the SOP, both the main and wiretap links are taken into consideration via a rational function.

  • We take into account two kinds of combinations of multiple eavesdroppers cases.

  • We apply the energy-harvesting technique to improve the EE of the whole network. However, regarding the expense of such techniques compared with conventional communications (nonenergy harvesting), under EH-enabled communications, the transmit power is no longer a constant number but a random variable. As a result, it is extremely difficult to derive the mathematical framework to derive the closed-form expression.

  • We provide an asymptotic framework of the SOP under the high transmit power regime which provides several insights into the considered networks. For example, the SOP under the colluding scheme scales with the number of eavesdroppers.

  • We provide simulation results based on the Monte Carlo approach to consolidate the accuracy of the derived framework as well as to highlight the impact of some vital parameters on the performance metric.

  • We compare our work with other work in the literature to highlight the advantages of the considered networks.

A few drawbacks of the considered networks are as follows:

  • We do not apply the reconfigurable intelligent surfaces technique to actively control the channel coefficient so that we can both improve the channel gain of the legitimated link and suppress the eavesdropper link (provided that the global channel state information (CSI) is available as the source node), thus significantly enhancing the system performance. However, estimating the channel coefficient in RIS-assisted systems is a nontrivial task and still in its infancy since the RIS generally comprises passive devices, and thus we leave this technique to future work.

  • Another minor weakness of the proposed networks is the application of tools from stochastic geometry (SG) to better capture the position of all nodes. However, its mathematical framework can not generally be obtained in the closed-form expression and is thus not able to reveal certain engineering insights. We therefore also leave this issue to our future work.

A concise summary of the contributions and novelties of the present work compared to existing literature is provided in . The remainder of this paper is organized as follows: Section 3 presents the system model, Section 4 outlines the derivation of the secrecy performance analysis, Section 5 provides the numerical results, and Section 6 concludes the paper.

3. System model

In this paper, we consider a wirelessly powered network that includes a source (denoted by S), a destination (denoted by D), and N eavesdroppers denoted by En,1nN as shown in . Moreover, we also have a PB (denoted by P) which is replenished by the battery of the source node S. We assume that all transmission links are modelled by a complex Gaussian random variable (RV) with zero mean and Ω variance, CN(0,Ω). Particularly, hPSCN(0,ΩPS) is the channel coefficient from P to S, hSDCN(0,ΩSD) is the channel coefficient from S to D, and hSEnCN(0,ΩSEn) is the channel coefficient from S to En. ΩPS,ΩSD,andΩSEn are the variance of the corresponding channels. As a consequence, the channel gain from PS, SD, and SEn,∀n denoted as |hPS|2,|hSD|2 and |hSEn|2,∀n are followed by an exponential RV. Additionally, we assume that all nodes are only equipped with a single antenna. The extension of multiple antennae is a promising extension of the current work. Furthermore, we also consider the scenario where the fading changes independently between each transmission and remains constant during each transmission. Additionally, the flowchart in illustrates the sequence describing the proposed system.

Figure 1. The considered EH-based wireless networks.

Figure 1. The considered EH-based wireless networks.

Figure 2. The flowchart describes the sequence of the proposed system.

Figure 2. The flowchart describes the sequence of the proposed system.

The whole transmission occurs in two phases. In the first phase, the source S harvests energy from the PB signals, and in the second phase, the source node spends all the harvested energy at the first phase to send data to the destination by virtue of the harvest-then-use protocol being employed at the source node.

3.1. Energy harvesting

In the EH phase, P transmits energy signals to S for a period of time αT where α(0,1) is the time-switching ratio and T is the time duration for the whole procedure. Without loss of generality, we assume that T = 1 second. The harvested energy at S is given as follows Tin et al. (Citation2020): (1) ES=αTηPP|hPS|2,(1) where η(0,1) denotes the energy conversion efficiency, and PP is the transmit power of P. As a result, the transmit power of S at the second phase is computed as (2) PS=ES(1α)T=αηP|hPS|2(1α)=χPP|hPS|2,(2) where χ=αη(1α). We observe that if α=12, we have a symmetrical setup where half the duration is for harvesting energy and the other is for decoding information.

3.2. Data transmission

In the data transmission phase, S transmits unit power signals x to D, i.e. E{|x|2}=1 where E{.} is the expectation operator. Therefore, the received signals at D are given as follows: (3) yD=PShSDx+nD.(3) Here, nDCN(0,N0) is the additive white Gaussian noise (AWGN) of the destination and N0 is the noise variance. The signal-to-noise ratio (SNR) at D is then given as follows: (4) γD=PS|hSD|2N0.(4) With the help of (Equation2), the SNR at D is rewritten as (5) γD=PPχ|hSD|2|hPS|2N0=ρχ|hSD|2|hPS|2,(5) where ρ=PPN0. Moreover, the received signals at En, n{1,,N} are given as (6) yEn=PShSEnx+nEn,(6) where nEnCN(0,N0) is the AWGN at En,∀n. In this paper, we consider two wiretap schemes: (1) the non-colluding scheme where each eavesdropper decodes messages independently and (2) the colluding scheme where all eavesdroppers' signals are processed by a single central node. Under the non-colluding scheme, the eavesdropper who experiences the best channel gain is selected to evaluate the secrecy performance because the systems will be secured if the best eavesdropper is not able to wiretap the secure information (Wang et al., Citation2017). As a result, the SNR under the non-colluding scheme denoted by γEnon is formulated as (7) γEnon=PSmax1nN[|hSEn|2]N0=PPχZSE|hPS|2NE=ρEχZSE|hPS|2,(7) where ρE=PPNE and ZSE=max1nN[|hSEn|2]. On the other hand, under the colluding scheme, a central node combines all the eavesdropper's signals to maximize the wiretap probability (Tin et al., Citation2017). Thus, the SNR under the colluding scheme denoted by γEcon and is computed as (8) γEcon=PSn=1N[|hSEn|2]N0=PPχZ~SE|hPS|2σE2=ρEχZ~SE|hPS|2,(8) where Z~SE=n=1N[|hSEn|2]. The instantaneous capacity of the main and eavesdropper links under the v{non,con} scheme is given by (9) CD=log2[1+γD],(9) and (10) CEv=log2[1+γEv].(10) With the instantaneous capacity of both links, we can derive the secrecy performance of the considered systems, as presented in the next section.

4. Secrecy performance analysis

In this section, we address the performance of the SOP under both the non-colluding and colluding schemes. The SOP is the probability that the instantaneous rate of the main link divided by the instantaneous rate of the eavesdropper link is smaller than a given threshold. For deriving the SOP, two Lemmas 4.1 and 4.2 can be used.

Lemma 4.1

Consider a set of independent and identically distributed (i.i.d.) exponential RVs Xn, n{1,,N} with parameter Ω. The cumulative distribution function (CDF) and probability density function (PDF) of the maximum of these RVs, Z=maxn{1,,N}{Xn}, are then given as (11) FZ(x)=1a=1N(Na)(1)a1eaxΩ,(11) (12) fZ(x)=a=1N(Na)a(1)a1ΩeaxΩ.(12)

Proof.

The definition of the CDF of the maximal RV Z=maxn{1,,N}{Xn} is as follows: (13) FZ(x)=Pr{maxn{1,,N}{Xn}<x}=(a)n=1NFXn(x)=(b)(1exp(xΩ))N=1a=1N(Na)(1)a1eaxΩ.(13) Here, (a) and (b) are obtained via the i.i.d. property of these RVs combining with the CDF of an exponential RV with parameter Ω, and the last equation is obtained by applying the binomial theorem. To derive the PDF, we simply take the first-order derivative of the CDF with respect to x. Mathematical speaking, we have the following (14) fZ(x)=dFZ(x)dx=a=1N(Na)a(1)a1ΩeaxΩ.(14) This completes the proof.

Lemma 4.2

Consider a set of i.i.d. exponential RVs Xn, n{1,,N} with parameter Ω. The cumulative distribution function and probability density function of the sum of these RVs, Z=n=1NXn, are given as follows: (15) FZ~(x)=1Γ(N)γ(N,xΩ),(15) (16) fZ~(x)=xN1ΩNΓ(N)exΩ,(16) where Γ(.) and γ(a,b) are the Gamma function and the lower incomplete Gamma function, respectively (Gradshteyn & Ryzhik, Citation2014).

Proof.

The proof is immediately obtained by employing the results in T. N. Nguyen, Nguyen et al. (Citation2022).

In the next section, we present the derivation of the security aspect of the considered networks via the SOP metric with the help of the above Lemmas.

4.1. Secrecy outage probability analysis

The SOP under both schemes, i.e. colluding and non-colluding schemes, are computed in this section.Footnote1 We begin with the case of the non-colluding eavesdroppers.

4.1.1. Non-colluding scheme

Under the non-colluding scheme, each eavesdropper will individually attempt to wiretap the secure information from S to D. As a result, the system will be called in an outage event if the instantaneous rate of the legitimate link is lower than the best eavesdropper link. Mathematically speaking, the SOP under the non-colluding scheme is formulated and computed as follows: (17) SOPnon=Pr([CDCEnon]+<Rth)=Pr(log2[1+γD1+γEnon]<Rth)=1a=1N(Na)2ΩSD(1)a1γthρEΩSE+ΩSD×γ¯thρχΩPSΩSDK1(2γ¯thρχΩPSΩSD),(17) where Kv() is the modified Bessel function of the second kind with vth order, [x]+=max(0,x), and Rth (in bits/s/Hz) is the target secrecy rate.

Proof.

The proof begins with the definition of the SOP as follows Lysiak (Citation2023): (18) SOPnon=Pr(log2[1+γD1+γEnon]<Rth)=Pr(1+γD1+γEnon<γth)=Pr(1+ρχ|hSD|2|hPS|21+ρEχZSE|hPS|2<γth)(18) (19) =1Pr(|hPS|2>γ¯thρχ|hSD|2γthρEχZSE)(19) (20) =10fZSE(x)γthρExρf|hSD|2(y)×[1F|hPS|2(γ¯thρχyγthρEχx)]dydx,(20) where γth=2Rth, γ¯th=γth1. With the help of Lemma 4.1 and the definition of the PDF of an exponential RV, the SOPnon is expressed as follows: (21) SOPnon=1a=1N(cNa)a(1)a1ΩSE×0eaxΩSEγthρExρ1ΩSDeyΩSD×eγ¯thρχyΩPSγthρEχxΩPSdydx.(21) To compute (Equation21), we change the variable as follows: t=ρχΩPSyγthρEχΩPSy=t+γthρEχΩPSxρχΩPSdt=ρχΩPSdy. Then, (Equation21) can be rewritten as (Equation22). (22) SOPnon=11ρχΩPSΩSDa=1N(cNa)a(1)a1ΩSE0eγthρExρΩSD0etρχΩPSΩSDeγ¯thtdtdx=(a)1a=1N(cNa)a(1)a1ΩSE2γ¯thρχΩPSΩSDK1(2γ¯thρχΩPSΩSD)0eaxΩSEeγthρExρΩSDdx=1a=1N(cNa)2ΩSD(1)a1γthρEΩSE+ΩSDγ¯thρχΩPSΩSDK1(2γ¯thρχΩPSΩSD),(22) Where (a) is obtained by borrowing the results from (Gradshteyn & Ryzhik, Citation2014, 3.324.1), the last equation is derived by computing the integration, thus concluding the proof.

4.1.2. Colluding scheme

Under the colluding scheme, there exists a central eavesdropper that collects information from all eavesdroppers and then decodes the data sent by S to D. Mathematical speaking, the SOP under the colluding scheme is computed as follows: (23) SOPcon=12(ρΩSDρΩSD+γthρEΩSE)N×γ¯thρχΩPSΩSDK1(2γ¯thρχΩPSΩSD).(23)

Proof.

Let us start the derivation by rewriting the definition under the colluding scheme as follows Guerraiche et al. (Citation2023): (24) SOPcon=Pr(log2[1+γD1+γEcon]<Rth)=Pr(1+γD1+γEcon<γth)=Pr(1+ρχ|hSD|2|hPS|21+ρEχZ~SE|hPS|2<γth)=1Pr(|hPS|2>γ¯thρχ|hSD|2γthρEχZ~SE)=10fZ~SE(x)γthρExρf|hSD|2(y)×[1F|hPS|2(γ¯thρχyγthρEχx)]dydx,(24) With the help of Lemma 4.2, (Equation24) is then computed as follows: (25) SOPcon=11ΩSENΓ(N)0xN1exΩSE×γthρExρ1ΩSDeyΩSDeγ¯thρχyΩPSγthρEχxΩPSdydx=12[ΩSE]NΓ(N)γ¯thρχΩPSΩSDK1(2γ¯thρχΩPSΩSD)×0xN1eρΩSD+γthρEΩSEρΩSDΩSExdx=12(ρΩSDρΩSD+γthρEΩSE)N×γ¯thρχΩPSΩSDK1(2γ¯thρχΩPSΩSD).(25) The last equation is held by applying (Gradshteyn & Ryzhik, Citation2014, Equation (3.351.3)), thus concluding the proof.

The complexity of the considered networks primarily depends on the evaluation of the modified Bessel function of the second kind with 1st order, i.e. K1(x). Fortunately, this function is readily available in a variety of numerical computation software packages such as Matlab, Mathematica, and Python Numpy. In these environments, the computation time typically falls below 50 milliseconds (Takekawa, Citation2022).

4.2. Secrecy outage probability asymptotic framework

In this section, we provide insights into the considered networks when the transmit power of the PB goes without bound, i.e. ρ. In particular, we derive the asymptotic framework of SOP under both schemes, i.e. the non-colluding and colluding schemes, given as follows Pandey and Yadav (Citation2018): (26) SOPnon,1a=1N(cNa)ΩSD(1)a1ΩSD+γthρEΩSE,1(ρΩSDρΩSD+γthρEΩSE)N,(26)

Proof.

Let us start the proof with the non-colluding scheme as follows: (27) SOPnon,Pr(γDγEnon<γth)=1Pr(|hSD|2>γthρEZSEρ)=10fZSE(x)[1F|hSD|2(γthρExρ)]dx=1a=1N(cNa)a(1)a1ΩSE0eaxΩSEγthρExΩSDρdx=1a=1N(cNa)ΩSD(1)a1ΩSD+γthρEΩSE.(27) Next, by following the same steps as those in the non-colluding scheme, the closed-form expression under the colluding scheme is computed as follows: (28) SOPcon,=1(ρΩSDρΩSD+γthρEΩSE)N.(28) The proof is thus completed.

5. Numerical results

In this section, simulation results based on the Monte Carlo method (N. T. Nguyen et al., Citation2018; T. N. Nguyen, Minh et al., Citation2019; T. N. Nguyen, Tran et al., Citation2019; Phu et al., Citation2020) are provided to verify the accuracy of the derived mathematical frameworks as well as to identify the insights of the SOP with respect to some key parameters. Without loss of generality, the following parameters are employed through this section: the target secrecy rate Rth=0.1, α=0.2, η=0.8, ΩPS=ΩSD=1, ΩSE=0.1, and ρE=10 [dB]. The short-hand Sim. and Ana. are used to denote the results from simulations and mathematical framework.

In , SOP is plotted versus ρ [dB] with two schemes, non-colluding and colluding, respectively. The exact analytical curves are generated from the expression derived in (Equation17) and (Equation23), and the asymptotic curves are plotted from (Equation26). As shown in the figure, the gap between the exact and asymptotic framework is negligible when ρ1 acts as a lower bound of the exact expressions. Accordingly, it is possible to closely monitor the impact of network parameters under high SNR regimes via easy-to-understand approximations. Furthermore, we notice that the larger the ρ is, the smaller the SOP. Additionally, the SOP of the non-colluding scheme is better than that of the other.

Figure 3. The SOP versus ρ [dB].

Figure 3. The SOP versus ρ [dB].

shows the SOP versus ρ [dB] with different ρE of the eavesdroppers. We can straightforwardly observe that increasing ρE will lead to the increase of the SOP, thus reducing the security of the considered systems.

Figure 4. The SOP of the proposed system versus ρ [dB] with different ρE [dB].

Figure 4. The SOP of the proposed system versus ρ [dB] with different ρE [dB].

illustrates the performance of the SOP with respect to α with different values of ρ [dB]. We see that the SOP is a monotonic decrease function of α. Moreover, when α approaches 1, we achieve the best performance of the SOP.

Figure 5. The SOP of the proposed system versus α with different ρ[dB].

Figure 5. The SOP of the proposed system versus α with different ρ[dB].

illustrates the performance of the SOP concerning ρE with various values of ρ. It is evident that the larger ρE is, the worse the SOP becomes. This is due to the fact that the received SNR of the eavesdropper is proportional to ρE, hence, the higher the SNR at the eavesdropper, the higher the probability that the eavesdropper successfully wiretaps the secure information. Fortunately, this issue can be effectively mitigated by increasing ρ. We observe that the larger ρ is, the lower the SOP, and thus, the better the system performance.

Figure 6. The SOP versus ρE with different ρ.

Figure 6. The SOP versus ρE with different ρ.

illustrates the impact of energy efficiency conversion, denoted as η, on SOP performance. It is evident that increasing η benefits the SOP. However, this improvement necessitates greater expense and complexity at the receiver. Thus, there exists a trade-off between system performance and receiver complexity in practice. Nonetheless, this intriguing issue remains open for future investigation. Additionally, this figure also reveals that a longer time interval for energy harvesting leads to better SOP performance. Further insights into the impact of α on SOP performance are provided in .

Figure 7. The SOP versus η with different α.

Figure 7. The SOP versus η with different α.

The performance of the SOP regarding the ratio of the channel gain of the legitimate and wiretap links, ΩSDΩSE, are supplied in . We observe that if the channel gain of the main link is favorable compared to the eavesdropper links, the SOP is significantly improved; otherwise, the SOP is almost 1, and the system is not able to transmit secure information. Nonetheless, the performance can be ameliorated by simply adding some artificial noise at the eavesdropper as proposed in Wang et al. (Citation2015).

Figure 8. The SOP versus ΩSDΩSE.

Figure 8. The SOP versus ΩSDΩSE.

Comparison with the state-of-the-art

addresses the performance of the SOP with respect to the targeted rate Rth. It is evident that increasing Rth will simply increase SOP, thus degrading the system performance. In this figure, we also compare the performance of the proposed systems with the ones in Tin et al. (Citation2020). Particularly, curves from Tin et al. (Citation2020) are denoted by ‘Simu-Non-Lit.’ and ‘Simu-Con-Lit.’ for the non-colluding and colluding schemes. We observe that there is a large gap between the proposed networks and the ones in Tin et al. (Citation2020). More precisely, when Rth is equal to 0.4, the SOP under the non-colluding scheme of the proposed networks is just above 0.4, while for the work in Tin et al. (Citation2020), the SOP is around 0.8, which is two-fold higher than that of the proposed system. Additionally, we confirm again that the SOP under the colluding scheme is worse than its counterpart for both systems.

Figure 9. The SOP versus Rth [bits/s/Hz]. The curves ‘Simu-Non-Lit.’ and ‘Simu-Con-Lit.’ are plotted by employing Monte Carlo simulations of the works in Tin et al. (Citation2020) with the following setup parameters: ηR = η = 0.8, ΩSR=ΩRD=2, ΩRR=0.1, and ΩRE=0.3. The power splitting ratio is 0.5.

Figure 9. The SOP versus Rth [bits/s/Hz]. The curves ‘Simu-Non-Lit.’ and ‘Simu-Con-Lit.’ are plotted by employing Monte Carlo simulations of the works in Tin et al. (Citation2020) with the following setup parameters: ηR = η = 0.8, ΩSR=ΩRD=2, ΩRR=0.1, and ΩRE=0.3. The power splitting ratio is 0.5.

The impact of the number of eavesdroppers N on the performance of the SOP is given in under the proposed networks and Tin et al. (Citation2020). It is certain that scaling up N will have a negative effect on the system performance regardless of the networks and schemes. However, the increasing pace of the SOP is divergent between the considered networks and Tin et al. (Citation2020). Specifically, we see that when N goes from 2 to 8 eavesdroppers, the SOP under the colluding scheme of the considered networks only goes up from less than 0.05 to under 0.1, while in Tin et al. (Citation2020), the SOP rises from above 0.15 to above 0.25. Additionally, the impact of N on the non-colluding scheme is almost constant for both proposed systems and Tin et al. (Citation2020).

Figure 10. The SOP versus N. The curves ‘Simu-Non-Lit.’ and ‘Simu-Con-Lit.’ are plotted by employing Monte Carlo simulations of the works in Tin et al. (Citation2020) with the following setup parameters: ηR = η = 0.8, ΩSR=ΩRD=2, ΩRR=0.1, and ΩRE=0.3. The power splitting ratio is 0.5.

Figure 10. The SOP versus N. The curves ‘Simu-Non-Lit.’ and ‘Simu-Con-Lit.’ are plotted by employing Monte Carlo simulations of the works in Tin et al. (Citation2020) with the following setup parameters: ηR = η = 0.8, ΩSR=ΩRD=2, ΩRR=0.1, and ΩRE=0.3. The power splitting ratio is 0.5.

6. Conclusions

In this paper, we discussed an EH-based wireless network composed of a source node, which is operated by the harvested energy from the power beacon and sends secure information to a destination in the presence of multiple eavesdroppers. Particularly, we considered two wiretap schemes, i.e. the colluding and non-colluding schemes. In this context, we derived the secrecy outage probability at the receiver for both schemes. Numerical results were also provided to demonstrate the accuracy of our studies. Moreover, we performed a comparison with the state-of-the-art approaches, and the numerical results showed that the proposed networks outperformed those described in the literature.

The findings of this research can inspire intriguing follow-up works in several directions. One of the feasible directions is to employ relaying networks where the relay not only helps to forward information to the main destination but also to create a jamming signal to all eavesdroppers so that the secrecy performance can be enhanced dramatically. Beside the help from relays, it is also promising to use RIS to both strengthen the main link and suppress the wiretap link provided that the global channel state information is available at the source node. Another well-known approach is to deploy multiple antennae at the source and/or destination so that a diversity of transmitting and receiving techniques can be used to boost the secrecy performance as well.

Supplemental material

JIT_revised_version.zip

Download Zip (675.6 KB)

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This research is funded by Ton Duc Thang University under grant number FOSTECT.2023.31.

Notes

1 The adopted methodology can be readily applied to other significant metrics such as average secrecy rate and intercept probability. Nonetheless, we defer the exploration of these interesting problems to future work, as the present manuscript is focused on comprehensively investigating the secrecy outage probability.

References

  • Al Hajj, M., Wang, S., Thanh Tu, L., Azzi, S., & Wiart, J. (2020). A statistical estimation of 5G massive MIMO networks' exposure using stochastic geometry in mmWave bands. Applied Sciences, 10(23), 8753. https://doi.org/10.3390/app10238753
  • Aravanis, A. I., Tu Lam, T., Muñoz, O., Pascual-Iserte, A., & Di Renzo, M. (2019). A tractable closed form approximation of the ergodic rate in Poisson cellular networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1–16. https://doi.org/10.1186/s13638-019-1499-9
  • Cao, Y., Zhong, Y., Peng, C., Peng, X., & Pan, S. (2022). Energy efficiency optimization for SWIPT-enabled IoT network with energy cooperation. Sensors, 22(13), 5035. https://doi.org/10.3390/s22135035
  • Chen, W., Ding, H., Wang, S., da Costa, D. B., & Gong, F. (2020). Impartial SWIPT-assisted user cooperation schemes. IEEE Transactions on Wireless Communications, 19(5), 3361–3375. https://doi.org/10.1109/TWC.7693
  • Do, D. T., Le, A. T., & Lee, B. M. (2020). NOMA in cooperative underlay cognitive radio networks under imperfect SIC. IEEE Access, 8, 86180–86195. https://doi.org/10.1109/Access.6287639
  • Duc, V. P., Luan, T. N., Tin, P. T., & Vinh, V. N. (2022). Reliability-security in wireless-powered cooperative network with friendly jammer. Advances In Electrical and Electronic Engineering, 20(4), 584–591.
  • Ghosh, M. K., Kundu, M. K., Ibrahim, M., Badrudduza, A. S. M., Anower, M. S., I. S. Ansari, Shaikhi, A. A., & Mohandes, M. A. (2023). Secrecy outage analysis of energy harvesting relay-based mixed UOWC-RF network with multiple eavesdroppers. arXiv preprint arXiv:2302.10257.
  • Gradshteyn, I. S., & Ryzhik, I. M. (2014). Table of integrals, series, and products. Academic Press.
  • Guerraiche, K., Midouni, F., Sahraoui, N. E., & Dekhici, L. (2023, February). Application of equilibrium optimizer algorithm for solving linear and non linear coordination of directional overcurrent relays. Advances in Electrical and Electronic Engineering, 20(4), 537–548. https://doi.org/10.15598/aeee.v20i4.4647
  • Huang, Y., Liu, M., & Liu, Y. (2018). Energy-efficient SWIPT in IoT distributed antenna systems. IEEE Internet of Things Journal, 5(4), 2646–2656. https://doi.org/10.1109/JIOT.2018.2796124
  • Huynh, T. P., Son, P. N., & Voznak, M. (2017). Exact throughput analyses of energy-harvesting cooperation scheme with best relay selections under I/Q imbalance. Advances in Electrical and Electronic Engineering, 15(4), 585–590. https://doi.org/10.15598/aeee.v15i4.2302
  • Lai, X., Fan, L., Lei, X., Li, J., Yang, N., & Karagiannidis, G. K. (2019). Distributed secure switch-and-stay combining over correlated fading channels. IEEE Transactions on Information Forensics and Security, 14(8), 2088–2101. https://doi.org/10.1109/TIFS.10206
  • Lam, T. T., & Di Renzo, M. (2020). On the energy efficiency of heterogeneous cellular networks with renewable energy sources—A stochastic geometry framework. IEEE Transactions on Wireless Communications, 19(10), 6752–6770. https://doi.org/10.1109/TWC.7693
  • Le, A. T., Nguyen, T. N., Tu, L. T., Tran, T. P., Duy, T. T., Voznak, M., & Ding, Z. (2023). Performance analysis of RIS-assisted ambient backscatter communication systems. IEEE Wireless Communications Letters, 13(3), 791–795. https://doi.org/10.1109/LWC.2023.3344113
  • Lysiak, V. H. (2023, September). Mathematical modeling of multi-units pumping station with asynchronous electric drive of centrifugal pumps. Advances in Electrical and Electronic Engineering, 21(3), 226–234. https://doi.org/10.15598/aeee.v21i3.4718
  • Mitev, M., Shakiba-Herfeh, M., Chorti, A., Reed, M., & Baghaee, S. (2022). A physical layer, zero-round-trip-time, multifactor authentication protocol. IEEE Access, 10, 74555–74571. https://doi.org/10.1109/ACCESS.2022.3187967
  • Nguyen, H. N., Dang, H. P., Le, S. P., Le, T. D., Do, D. T., Voznak, M., & Zdralek, J. (2018). Enabling D2D transmission mode with energy harvesting and information transfer in heterogeneous networks. Advances in Electrical and Electronic Engineering, 16(2), 178–184. https://doi.org/10.15598/aeee.v16i2.2393
  • Nguyen, N. T., Tran, T. P., & Miroslav, V. (2018). Power-splitting-based energy harvesting protocol for wireless powered communication networks with a bidirectional relay. International Journal of Communication Systems, 31(13), e3721. https://doi.org/10.1002/dac.v31.13
  • Nguyen, Q. S., Nguyen, T. N., & Tu, L. T. (2023, June). On the security and reliability performance of SWIPT-enabled full-duplex relaying in the non-orthogonal multiple access networks. Journal of Information and Telecommunication, 7(4), 462–476. https://doi.org/10.1080/24751839.2023.2218046
  • Nguyen, T. H., Jung, W. S., Tu, L. T., Van Chien, T., Yoo, D., & Ro, S. (2020). Performance analysis and optimization of the coverage probability in dual hop LoRa networks with different fading channels. IEEE Access, 8, 107087–107102. https://doi.org/10.1109/Access.6287639
  • Nguyen, T. N., Duy, T. T., Tran, P. T., & Voznak, M. (2016). Performance evaluation of user selection protocols in random networks with energy harvesting and hardware impairments. Advances in Electrical and Electronic Engineering, 14(4), 372–377. https://doi.org/10.15598/aeee.v14i4.1783
  • Nguyen, T. N., Minh, T., Nguyen, T. L., Ha, D. H., & Miroslav, V. (2019). Multi-source power splitting energy harvesting relaying network in half-duplex system over block rayleigh fading channel: System performance analysis. Electronics, 8(4), 448. https://doi.org/10.3390/electronics8040448
  • Nguyen, T. N., Nguyen, V. S., Nguyen, H. G., Tu, L. T., Van Chien, T., & Nguyen, T. H. (2022). On the performance of underlay device-to-device communications. Sensors, 22(4), 1456. https://doi.org/10.3390/s22041456
  • Nguyen, T. N., Tran, D. H., Phan, V. D., Voznak, M., Chatzinotas, S., Ottersten, B., & Poor, H. V. (2021). Throughput enhancement in FD-and SWIPT-enabled IoT networks over nonidentical Rayleigh fading channels. IEEE Internet of Things Journal, 9(12), 10172–10186. https://doi.org/10.1109/JIOT.2021.3120766
  • Nguyen, T. N., Tran, D. H., Van Chien, T., Phan, V. D., Voznak, M., & Chatzinotas, S. (2022). Security and reliability analysis of satellite-terrestrial multirelay networks with imperfect CSI. IEEE Systems Journal, 17(2), 2824–2835. https://doi.org/10.1109/JSYST.2022.3201128
  • Nguyen, T. N., Tran, D. H., Van Chien, T., Phan, V. D., Voznak, M., Tin, P. T., & Poor, H. V. (2022). Security–reliability tradeoff analysis for SWIPT-and AF-based IoT networks with friendly jammers. IEEE Internet of Things Journal, 9(21), 21662–21675. https://doi.org/10.1109/JIOT.2022.3182755
  • Nguyen, T. N., Tran, H. Q. M., Nguyen, T. L., Ha, D. H., & Miroslav, V. (2019). Performance analysis of a user selection protocol in cooperative networks with power splitting protocol based energy harvesting over Nakagami-m/Rayleigh channel. Electronics, 8(1), 67. https://doi.org/10.3390/electronics8010067
  • Nguyen, T. T., Nguyen, S. Q., Nguyen, P. X., & Kim, Y. H. (2022). Evaluation of full-duplex SWIPT cooperative NOMA-based IoT relay networks over Nakagami-m fading channels. Sensors, 22(5), 1974. https://doi.org/10.3390/s22051974
  • Nguyen, T. T., Nguyen, V. D., Lee, J. H., & Kim, Y. H. (2019). Sum rate maximization for multi-user wireless powered IoT network with non-linear energy harvester: Time and power allocation. IEEE Access, 7, 149698–149710. https://doi.org/10.1109/Access.6287639
  • Nguyen, T. T. H., Nguyen, T. N., Duy, T. T., Son, N. H., Hanh, T., Vu, M. B., & L. T. Tu (2023, November). Coverage probability of energy harvesting enabled LoRa networks with stochastic geometry. Journal of Information and Telecommunication, 8(2), 262–279. https://doi.org/10.1080/24751839.2023.2281144
  • Oleiwi, H. W., & Al-Raweshidy, H. (2022). Cooperative SWIPT THz-NOMA/6G performance analysis. Electronics, 11(6), 873. https://doi.org/10.3390/electronics11060873
  • Pandey, A., & Yadav, S. (2018). Physical layer security in cooperative AF relaying networks with direct links over mixed Rayleigh and double-Rayleigh fading channels. IEEE Transactions on Vehicular Technology, 67(11), 10615–10630. https://doi.org/10.1109/TVT.2018.2866590
  • Park, K. H., Wang, T., & Alouini, M. S. (2013). On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming. IEEE Journal on Selected Areas in Communications, 31(9), 1741–1750. https://doi.org/10.1109/JSAC.2013.130908
  • Phan, V. D., Nguyen, T. L., Phu, T. T., & Nguyen, V. V. (2023). Reliability-security in wireless-powered cooperative network with friendly jammer. Advances in Electrical and Electronic Engineering, 20(4), 584–591. https://doi.org/10.15598/aeee.v20i4.4511
  • Phu, T. T., Nguyen, N. T., Tran, D. H., Miroslav, V., Phan, V. D., & Symeon, C. (2020). Performance enhancement for full-duplex relaying with time switching-based SWIPT in wireless sensors networks. Sensors, 21(11), 3847.
  • Ssettumba, T., Abd El-Malek, A. H., Elsabrouty, M., & Abo-Zahhad, M. (2019). Physical layer security enhancement for internet of things in the presence of co-channel interference and multiple eavesdroppers. IEEE Internet of Things Journal, 6(4), 6441–6452. https://doi.org/10.1109/JIoT.6488907
  • Takekawa, T. (2022, January). Fast parallel calculation of modified Bessel function of the second kind and its derivatives. SoftwareX, 17, 100923. https://doi.org/10.1016/j.softx.2021.100923
  • Tin, P. T., Dinh, B. H., Nguyen, T. N., Ha, D. H., & Trang, T. T. (2020). Power beacon-assisted energy harvesting wireless physical layer cooperative relaying networks: performance analysis. Symmetry, 12(1), 106. https://doi.org/10.3390/sym12010106
  • Tin, P. T., Hung, T. D., Duy, T. T., & Voznak, M. (2017). Security-reliability analysis of noma-based multi-hop relay networks in presence of an active eavesdropper with imperfect eavesdropping CSI. Advances In Electrical and Electronic Engineering, 15(4), 591–597.
  • Tin, P. T., Phan, V. D., Nguyen, T. N., Tu, L. T., Minh, B. V., Voznak, M., & Fazio, P. (2021). Outage analysis of the power splitting based underlay cooperative cognitive radio networks. Sensors, 21(22), 7653. https://doi.org/10.3390/s21227653
  • Toan, H. V., Hoang, T. M., Duy, T. T., & Dung, L. T. (2020). Outage probability and ergodic capacity of a two-user NOMA relaying system with an energy harvesting full-duplex relay and its interference at the near user. Sensors, 20(22), 6472. https://doi.org/10.3390/s20226472
  • Tu, L. T., & Bradai, A (2021). On the performance of physical layer security of RIS-aided communications. In 2021 IEEE Conference on Antenna Measurements & Applications (CAMA) (pp. 570–574). https://doi.org/10.1109/CAMA49227.2021.9703543
  • Tu, L. T., Phan, V. D., Nguyen, T. N., Tran, P. T., Duy, T. T., Nguyen, Q. S., & Voznak, M. (2023). Performance analysis of multihop full-duplex NOMA systems with imperfect interference cancellation and near-field path-loss. Sensors, 23(1), 524. https://doi.org/10.3390/s23010524
  • Viet Tuan, P., Ngoc Son, P., Trung Duy, T., Nguyen, S. Q., Ngo, V. Q. B., Vinh Quang, D., & Koo, I. (2020). Optimizing a secure two-way network with non-linear SWIPT, channel uncertainty, and a hidden eavesdropper. Electronics, 9(8), 1222. https://doi.org/10.3390/electronics9081222
  • Wang, D., Ren, P., & Cheng, J. (2017). Cooperative secure communication in two-hop buffer-aided networks. IEEE Transactions on Communications, 66(3), 972–985. https://doi.org/10.1109/TCOMM.2017.2776114
  • Wang, D., Ren, P., Du, Q., Sun, L., & Wang, Y. (2017). Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition. IEEE Transactions on Vehicular Technology, 66(12), 10732–10747. https://doi.org/10.1109/TVT.2017.2703780
  • Wang, H. M., Wang, C., & Ng, D. W. K. (2015). Artificial noise assisted secure transmission under training and feedback. IEEE Transactions on Signal Processing, 63(23), 6285–6298. https://doi.org/10.1109/TSP.2015.2465301
  • Yan, P., Yang, J., Liu, M., Sun, J., & Gui, G. (2020). Secrecy outage analysis of transmit antenna selection assisted with wireless power beacon. IEEE Transactions on Vehicular Technology, 69(7), 7473–7482. https://doi.org/10.1109/TVT.25
  • Zhai, C., Chen, H., Yu, Z., & Liu, J. (2018). Cognitive relaying with wireless powered primary user. IEEE Transactions on Communications, 67(3), 1872–1884. https://doi.org/10.1109/TCOMM.2018.2886002
  • Zhao, N., Lu, W., Sheng, M., Chen, Y., Tang, J., Yu, F. R., & Wong, K. K. (2019). UAV-assisted emergency networks in disasters. IEEE Wireless Communications, 26(1), 45–51. https://doi.org/10.1109/MWC.2018.1800160
  • Zhong, C., Liang, H., Lin, H., Suraweera, H. A., Qu, F., & Zhang, Z. (2018). Energy beamformer and time split design for wireless powered two-way relaying systems. IEEE Transactions on Wireless Communications, 17(6), 3723–3736. https://doi.org/10.1109/TWC.2018.2815563
  • Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015). Improving physical-layer security in wireless communications using diversity techniques. IEEE Network, 29(1), 42–48. https://doi.org/10.1109/MNET.2015.7018202