A new secure multi-hop untrusted relaying scheme

A new secure multi-hop untrusted relaying scheme

Ali Kuhestani,, Milad Tatar Mamaghani, and Hamid Behroozi, 
A. Kuhestani and H. Behroozi are with the Electrical Engineering Department, Sharif University of Technology, Tehran, Iran. M. T. Mamaghani is with the School of Electrical Engineering, Monash University, Australia.

Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential eavesdroppers. To obviate this issue, a new cooperative jamming scheme is proposed in this paper, in which the data can be confidentially communicated from the source to the destination through multi-hop untrusted relays. Toward this end, we first consider a two successive untrusted relaying network, i.e, a three-hop communication network. In our proposed secure transmission scheme, all the legitimate nodes contribute to provide secure communication by smartly injecting artificial noises to the network in different communication phases. Given this system model, a novel closed-form expression is presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR). Furthermore, we evaluate the high SNR slope and power offset of the ESR to gain a basic comparison of the proposed secure transmission scheme and the state-of-arts. Our numerical results highlight that the proposed secure transmission scheme provides better secrecy rate compared with the two-hop untrusted relaying scheme as well as the direct transmission scheme.

Physical layer security, Untrusted relay, Multi-hop communication, Artificial noise injection.

I Introduction

Security in wireless communication networks is conventionally implemented above the physical layer using key based cryptography methods [1]. However, these methods may not be applicable to emerging Internet of Things (IoT) and ad-hoc networks. For instance, the time-varying network topologies require complicated key management which is difficult to implement in distributed networks. Additionally, the computing and processing abilities of the nodes may be limited and the complicated encryption calculations may not be supported. To complement these complex schemes, wireless transmitters can also be validated at the physical layer by exploiting the dynamic characteristics of the associated communication links [2]. To accomplish this idea, physical layer security (PLS) has been emerged as a promising paradigm for safeguarding 5G wireless communication networks without incurring additional security overhead [2].

In the context of PLS, cooperative jamming which involves the transmission of additional jamming signals to degrade the received signal-to-noise ratio (SNR) at the potential eavesdropper can be applied by any legitimate node of the network [1]. Recently, several works have considered the interesting scenario of untrusted relaying [3][7] where the cooperative jamming is performed by the intended receiver, which is named as destination-based jamming technique.

In real world, an untrusted relay may be assisted to provide a reliable communication. Several practical scenarios may include untrusted relay nodes, e.g., wireless sensor networks and IoT where low-cost intermediate nodes may be exploited to assist the source-to-destination transmission. In these networks, it is important to protect the confidentiality of information from the untrustworthy relay, while simultaneously exploiting its relaying capability to improve the data transmission rate. Thanks to the destination-based jamming strategy [3], positive secrecy rate can still be attained in untrusted relay networks. While the recent works [4][7] have focused on the simple scenario of two-hop untrusted relaying, it is of great interest to go beyond these investigations by considering secure communication in larger networks such as ad-hoc networks and IoT where more than two hops may be required to provide the source to destination communication [8], [9]. Extending the analysis from two-hop networks to multi-hop untrusted relaying networks is non-trivial, because using more hops means that more nodes are involved in the transmission as well as more chances for eavesdropping. In addition, the number of hops becomes a design parameter which affects on the end-to-end delay and throughput.

In this paper, we take into account secure transmission in a multi-hop amplify-and-forward untrusted relaying network where all nodes have a single antenna. Each relay is considered to be a mandatory helper and a potential eavesdropper. A new artificial noise injection protocol is proposed to keep the communication confidential from the internal eavesdroppers for any number of hops. For the special case of three-hop communication network, i.e., two successive untrusted relaying, the proposed secure transmission scheme is as follows: in the first phase, while the source transmits its confidential message to the first relay, the second relay injects artificial noise to confuse the first relay. In the second phase, when the first relay forwards the received signal to the second relay, the destination injects an artificial noise to disturb the signal at the second relay. Finally, in the third phase, when the second relay broadcasts its signal to the destination, the source sends an artificial noise to confuse the first relay. For this system model, we first derive a novel closed-form expression for the ergodic secrecy rate (ESR) of three-hop untrusted relaying at the high SNR regime. Furthermore, we characterize the high SNR slope and power offset of the ESR to provide a fundamental comparison of the proposed scheme. We then extend our scheme by proposing a general multi-hop untrusted relaying transmission scheme. Our numerical examples highlight that the proposed three-hop relaying scheme outperforms the traditional two-hop relaying and direct transmission schemes where low power IoT devices are exploited.

II System Model and Transmission Scheme

Fig. 1: System model of a three-hop secure wireless relaying network.

As illustrated in Fig. 1, a three-hop communication system is studied where the source node, denoted by (\mathcal{S}), sends the information signal to the destination (\mathcal{D}) with the help of two consecutive relays, namely \mathcal{R}_{1} and \mathcal{R}_{2}. The amplify-and-forward relay nodes are assumed to be untrusted and hence, they can overhear the transmitted information signal while relaying. Besides, all the involving nodes are equipped with a single antenna operating in half-duplex mode. We also assume that the consecutive relays are necessary helpers to deliver the information signal to the destination. This assumption is valid when the network nodes experience a heavy shadowing, or when the distance between terminals is large, or when the nodes suffer from limited power resources. We consider a time division duplex (TDD) system with channel reciprocity. The complex Gaussian channel gains from \mathcal{S} to \mathcal{R}_{1}, \mathcal{R}_{1} to \mathcal{R}_{2} and \mathcal{R}_{2} to \mathcal{D} are denoted by g\sim\mathcal{CN}(0,m_{g}), h\sim\mathcal{CN}(0,m_{h}) and f\sim\mathcal{CN}(0,m_{f}), respectively. We consider block fading such that the channel coefficients vary independently from one frame to another frame, but do not change within one frame. To make the analysis tractable, we consider the equal transmit power P by the nodes. We also define \gamma_{g}\lx@stackrel{{\scriptstyle\tiny\Delta}}{{=}}\rho|g|^{2}, \gamma_{h}\lx@stackrel{{\scriptstyle\tiny\Delta}}{{=}}\rho|h|^{2}, and \gamma_{f}\lx@stackrel{{\scriptstyle\tiny\Delta}}{{=}}\rho|f|^{2}, where \rho=\frac{P}{N_{0}} describes the transmit SNR per each node. Remarkably \gamma_{g}, \gamma_{h} and \gamma_{f} have exponential distributions with means \bar{\gamma}_{g}=\rho m_{g}, \bar{\gamma}_{h}=\rho m_{g}, and \bar{\gamma}_{f}=\rho m_{g}, respectively.

Without loss of generality, the power of additive white noise at each receiver is considered to be N_{0}. We also suppose that the nodes are aware from the necessary channel state informations (CSIs), by which the relays as well as the destination can thoroughly cancel the self-interference term from the received signal. Note that since this assumption leads to the maximum probability of eavesdropping at the relays, we are forced to design a more robust network against eavesdropping attack.

The proposed scheme for source-destination secure communication takes place in three phases as shown in Fig. 1. By considering equal time duration for each phase, the proposed protocol is as follows. In the first phase of communication, by using superposition coding \mathcal{S} transmits the information signal to \mathcal{R}_{1} and simultaneously, \mathcal{R}_{2} jams the first untrusted relay by transmitting the artificial noise, as demonstrated with solid lines in the figure. During the next phase, as depicted by dashed lines, \mathcal{R}_{1} forwards a scaled version of the received signal towards \mathcal{R}_{2}. Concurrently, \mathcal{D} jams \mathcal{R}_{2} via transmitting a jamming signal to guarantee secrecy. Finally, in the third phase, plotted by dotted lines, \mathcal{R}_{2} amplifies and broadcasts the received signal which can be further received by \mathcal{D} and \mathcal{R}_{1}. After self-interface cancellation at \mathcal{D}, the information signal can be extracted at \mathcal{D}. Notably during the last time slot, due to the fact that \mathcal{R}_{1} can overhear the broadcasted signal by \mathcal{R}_{2}, the node \mathcal{S} is forced to emit a jamming to enhance the confidentially of communication. As such, \mathcal{R}_{1} may fail to successfully eavesdrop.

Based on the above descriptions and after some manipulations, the exact signal-to-interference-plus-noise-ratios (SINRs) at \mathcal{R}_{1} in the first phase, at \mathcal{R}_{2}, at \mathcal{R}_{1}  in the third phase and at \mathcal{D}  are respectively, obtained as

\displaystyle\gamma^{(1)}_{R_{1}}\hskip-2.845276pt=\hskip-2.845276pt\frac{% \gamma_{g}}{\gamma_{h}\hskip-2.845276pt+\hskip-2.845276pt1},~{}~{}~{}\gamma_{R% _{2}}\hskip-2.845276pt=\hskip-2.845276pt\frac{\gamma_{g}\gamma_{h}}{\gamma_{g}% \gamma_{f}\hskip-1.166563pt+\hskip-1.166563pt\gamma_{h}\gamma_{f}\hskip-1.1665% 63pt+\hskip-1.166563pt2\gamma_{h}\hskip-1.166563pt+\hskip-1.166563pt\gamma_{g}% \hskip-1.166563pt+\hskip-1.166563pt\gamma_{f}\hskip-1.13811pt+\hskip-1.166563% pt1}, (1)
\displaystyle\gamma^{(3)}_{R_{1}} \displaystyle=\frac{\gamma_{g}\gamma_{h}^{2}}{\gamma^{2}_{h}+\gamma_{h}(\gamma% _{g}+1)^{2}+(\gamma_{g}+\gamma_{h}+1)^{2}(\gamma_{f}+1)}. (2)
\displaystyle\gamma_{D} \displaystyle=\frac{\gamma_{g}\gamma_{h}\gamma_{f}}{3\gamma_{h}\gamma_{f}+2% \gamma_{f}\gamma_{g}+\gamma_{g}\gamma_{h}+2\gamma_{f}+2\gamma_{h}+\gamma_{g}+1}, (3)

Under the high SNR assumption with \gamma_{k}\gg 1 for k\in\{g,h,f\}, the above SINRs are respectively, simplified as

\displaystyle\gamma^{(1)}_{R_{1}} \displaystyle\approx\frac{\gamma_{g}}{\gamma_{h}},~{}~{}~{}\gamma_{R_{2}}% \approx\frac{\gamma_{g}\gamma_{h}}{\gamma_{f}(\gamma_{g}+\gamma_{h})}, (4)
\displaystyle\gamma^{(3)}_{R_{1}} \displaystyle\approx\frac{\gamma_{g}\gamma_{h}^{2}}{(\gamma_{g}+\gamma_{h})^{2% }\gamma_{f}+2\gamma_{h}\gamma_{g}^{2}}. (5)
\displaystyle\gamma_{D} \displaystyle\approx\frac{\gamma_{g}\gamma_{h}\gamma_{f}}{3\gamma_{h}\gamma_{f% }+2\gamma_{f}\gamma_{g}+\gamma_{g}\gamma_{h}}. (6)

Expressions in (4) and (5) reveal that the amount of information leakage is saturated when the transmit SNR goes to infinity. However, the received SINR at the legitimate receiver is a monotonically increasing function on the transmit SNR. As a result, the achievable ESR is increased as the transmit SNR grows which is fundamentally different from the direct transmission scheme [5].

Remark 1: As can be understood, in the proposed scheme, when a node transmits the information signal in the line of destination, the node which is near to the receiving untrusted relay is forced to propagate artificial noise to confuse the eavesdropping node. As a consequence, this proposed scheme can be routinely extended to multi-hop untrusted relaying where more than two untrusted relays cooperate to forward a confidential message to the destination.

III Secrecy Performance Analysis

The ergodic secrecy rate (ESR), as a widely used secrecy criteria in the literature, characterizes the rate below which any average secure transmission rate can be obtained. In this section, we proceed to derive a new closed-form expression for the ESR of three-hop untrusted relaying.

Based on the definition, the instantaneous secrecy rate is achieved by subtracting the eavesdropping channel capacity from the legitimate channel capacity [1]. As such, the instantaneous secrecy rate, R_{s}, for a three-hop relaying is given by

R_{s}=\left[I_{D}-\max\{I^{(1)}_{R_{1}},I_{R_{2}},I^{(3)}_{R_{1}}\}\right]^{+}, (7)

where I_{K}=\frac{1}{3}\log_{2}(1+\gamma_{K}) with K~{}\in~{}{\mathcal{R}_{1}\mathcal{R}_{2}\mathcal{D}} and [x]^{+}=\max(x,0). Notably the pre-log factor \frac{1}{3} is due to the fact that one round of transmission is done during three phases.

Remark 2: It is worth noting that \gamma_{R_{2}}\gg\gamma^{(3)}_{R_{1}}, which can be readily concluded by comparing (4) and (5). Therefore, the maximum information leakage of three-hop untrusted relaying is simplified to \gamma_{E}\lx@stackrel{{\scriptstyle\tiny\Delta}}{{=}}\max{\{\gamma^{(1)}_{R_{% 1}},\gamma_{R_{2}}\}}.

The exact ESR expression of the proposed three-hop untrusted relaying is obtained by forming a multiple integral expression which can be calculated numerically. To present a new compact expression for the ESR, we first derive closed-form expressions for the ergodic legitimate rate and the ergodic eavesdropping rate and then, a tight lower-bound expression is presented for the ESR performance.

Lemma 1.

The lower-bound closed-form expression for the ergodic rate of the legitimate channel is given by

\displaystyle\bar{R}_{L}= \displaystyle\frac{1}{3\ln 2}\mathbb{E}\Big{\{}\ln(1+\gamma_{D})\Big{\}}
\displaystyle\geq\frac{1}{3\ln 2}\ln\Big{(}1+\exp\Big{[}-3\Phi+\ln({\bar{% \gamma}_{g}\bar{\gamma}_{h}\bar{\gamma}_{f}})
\displaystyle-\ln\Big{\{}3\bar{\gamma}_{h}\bar{\gamma}_{f}+2\bar{\gamma}_{f}% \bar{\gamma}_{g}+\bar{\gamma}_{g}\bar{\gamma}_{h}\Big{\}}\Big{]}\Big{)}% \lx@stackrel{{\scriptstyle\Delta}}{{=}}\bar{R}_{L}^{LB}, (8)

where \Phi\approx 0.577215 is the Euler constant.

Proof: The proof can be done straightforwardly by considering the facts that: 1) the Jensen’s inequality can apply on the concave function \ln(1+\exp{(x)}) with respect to x and, 2) for the exponential r.v. X with the mean of m_{X}, we have \mathbb{E}\{\ln(X)\}=-\Phi+\ln(m_{x}) [10, Eq. (4.331.1)].

Lemma 2.

The approximate closed-form expression for the ergodic rate of the eavesdropping channel is formulated as

\displaystyle\bar{R}_{E}=\frac{1}{3\ln 2}\mathbb{E}\Big{\{}\ln(1+\gamma_{E})% \Big{\}}=\frac{1}{3\ln 2}\Big{(}\mathcal{P}~{}T_{1}+(1-\mathcal{P})~{}T_{2}% \Big{)}, (9)

where \mathcal{P}=\Pr\{\gamma^{(1)}_{R_{1}}>\gamma_{R_{2}}\}, T_{1}=\mathbb{E}\Big{\{}\ln(1+\gamma^{(1)}_{R_{1}})\Big{\}} and T_{2}=\mathbb{E}\Big{\{}\ln(1+\gamma_{R_{2}})\Big{\}} are formulated as closed-form expressions in Appendix A.

Proposition 1.

The tight closed-form lower-bound expression for the ESR performance of the proposed three-hop untrusted relaying is given by

\displaystyle\bar{R}^{LB}_{s}= \displaystyle\frac{1}{3\ln 2}\Big{[}\bar{R}_{L}^{LB}-\bar{R}_{E}\Big{]}^{+}. (10)

IV Asymptotic Ergodic Secrecy Rate Analysis

In this section, we obtain the asymptotic ESR expressions when the transmit SNR of each node, \rho, goes to infinity by deriving the high SNR slope S_{\infty} in bits/s/Hz and the high SNR power offset L_{\infty} in 3 dB. These parameters are defined respectively, as [7]

S_{\infty}=\lim_{\rho\to\infty}\frac{\bar{R}_{s}}{\log_{2}\rho}~{}~{}\mathrm{% and}~{}~{}L_{\infty}=\lim_{\rho\to\infty}\big{(}{\log_{2}\rho}-\frac{\bar{R}_{% s}}{S_{\infty}}\big{)}, (11)

Following the same steps as in [7], the high SNR slope and power offset of the three-hop untrusted relaying is obtained as

\displaystyle S_{\infty} \displaystyle=\frac{1}{3}, (12)


\displaystyle L_{\infty} \displaystyle=\frac{1}{\ln(2)}\left(\frac{m_{h}}{m_{f}+m_{h}}\mathcal{B}+\frac% {m_{f}}{m_{f}+m_{h}}\mathcal{C}+\mathcal{A}\right), (13)

where \mathcal{A}=3\Phi-\ln\left(\frac{m_{g}m_{h}m_{f}}{3m_{f}m_{h}+2m_{f}m_{g}+m_{g% }m_{h}}\right),\mathcal{B}=\frac{m_{g}(\ln({m_{g}})-\ln({m_{h}}))}{m_{g}-m_{h}} and \mathcal{C}=\ln\left(\frac{m_{g}m_{h}+m_{f}m_{h}+m_{g}m_{f}}{m_{f}(m_{g}+m_{h}% )}\right). Expression (12) highlights that the channel powers has no impact on the ESR slope which is equal to the maximum multiplexing gain of the network. Furthermore, different from the high SNR slope, we find that the high SNR power offset in (13) is related to the all channel powers. As such, by properly positioning the relays between the source and destination, the high SNR power offset can be reduced. Notably, a decrease in the power offset corresponds to an increase in the ESR performance.

V Numerical Examples and Discussion

In this part, we prepare some numerical curves to reveal the accuracy of the presented closed-form expressions. Additionally, we compare the secrecy performance of the proposed multi-hop relaying scheme with two competitive counterparts: 1) the two-hop communication scheme where only one relay is selected for data transmission and the other relay is considered as pure eavesdropper, and 2) the direct transmission where the confidential information is forwarded to the destination directly without assisting the relays. In this case, both the relays are considered as pure eavesdroppers. The following simulation parameters are adopted in Figs. 2 and 3. For simplicity and without loss of generality, we assume that the nodes \mathcal{S}, \mathcal{D}, \mathcal{R}_{1}  and \mathcal{R}_{2}  are placed on one-dimensional space at positions -3, +3, -1 and +1, respectively. Additionally, the distance-dependent path loss factor is n= 2.7.

Fig. 2 depicts the ESR performance versus the transmit SNR \rho in dB for different secure transmission schemes. As can be seen in this figure, our proposed lower expression for the ESR in Proposition 1 agrees well with the exact ESR which is evaluated numerically by substituting (10)–(12) into (16). Furthermore, our asymptotic ESR performance in Section IV well-approximates the exact ESR in the high SNR regime. As observed from Fig. 2, the ESR curve corresponding to the case when considering only the first term of the infinite series (associated to the equivalent modified Bessel function of the second kind and first order) is so close to the exact ESR curve.

Fig. 2: Validating the obtained expressions for the ESR performance.

To reveal the advantage of the proposed three-hop untrusted relaying scheme, we compare the ESR performance of our new scheme with two well-known transmission schemes, i.e., two-hop untrusted relaying and direct transmission, in Fig. 3. Additionally, two network topologies is considered. In Topology 1, we have the same network structure as considered for Fig. 2, and for Topology 2, we have the scaled version of Topology 1 with factor of \frac{1}{3}, i.e., the nodes \mathcal{S}, \mathcal{D}, \mathcal{R}_{1} and \mathcal{R}_{2} are located at -1, +1, -\frac{1}{3} and +\frac{1}{3}, respectively. Note that under two-hop relaying scheme, we face with two cases. In Case I, the relay \mathcal{R}_{1}  is employed for data retransmission and the relay \mathcal{R}_{2}  is considered as pure eavesdropper. Whereas in Case II, the converse scenario is considered. i.e., the relay \mathcal{R}_{2}  is the helper node and \mathcal{R}_{1}  is considered as an idle eavesdropper. As observed in Fig. 3, the secrecy performance of the proposed three-hope relaying scheme always outperforms the two mentioned benchmarks for the transmit SNRs fewer than 25 dB (i.e., \rho< 25 dB). This result highlights the priority of our scheme compared with the state-of-arts in untrusted relaying networks. One can easily predict that the proposed scheme under Topology 1 outperforms the two-hop relaying schemes for \rho> 25 dB. Interestingly, under Topology 2 and for \rho> 25 dB, the two-hop relaying scheme with Case I provides better ESR compared with our scheme. The reason is that when the communication nodes are close together with much power budget, naturally, the two-hop relaying is sufficient to data transmission and hence, it is not necessary to implement multi-hop relaying scheme. Additionally, as proved in [7], the high SNR slope for two-hop relaying is S_{\infty}=\frac{1}{2} which is more than the high SNR slope of tree-hop relaying scheme, S_{\infty}=\frac{1}{3}, as we derived in (12). It is worth noting that in IoT and wireless sensor networks, the devices are power limited and thus, they cannot consume much power for data transmission/retransmission. As a result, the proposed secure three-hop relaying scheme in this paper is applicable for IoT where low or medium transmit SNRs can be supported by the devices. Finally, this figure depicts that the direct transmission scheme presents a near to zero, but non-zero, secrecy rate. As discussed in [7], even when the destination is very far from the source while the eavesdroppers locate between them, a positive secrecy rate is achievable.

Fig. 3: ESR versus transmit SNR for different transmission schemes.

VI Conclusions

In this contribution, we designed a new secure transmission scheme over multi-hop untrusted relaying networks. To this end, we first studied a three-hop communication network with two successive untrusted relays. Given this system model, a novel closed-form expression was derived in the high SNR regime for the ESR performance. We next evaluated the high SNR slope and power offset of the ESR. We finally generalized our system model to multi-hop untrusted relaying. Our numerical results presented that the proposed secure transmission scheme improves the secrecy performance compared with two-hop relaying and direct transmission schemes.

Appendix A Proof of Lemma 2

Before proving Lemma 2, we present the following necessary Lemma.

Lemma 3.

Let X and Y be exponential RVs with means m_{x} and m_{y}, respectively. Then the new RVs Z=\frac{X}{Y} and W=\frac{XY}{X+Y} have the following cumulative distribution functions (CDFs), respectively

\displaystyle F_{Z}(z) \displaystyle=\hskip-2.845276pt\frac{m_{y}z}{m_{y}z+m_{x}},
\displaystyle F_{W}(w) \displaystyle=\hskip-2.845276pt1-\hskip-2.845276pt\frac{2\omega}{\sqrt{m_{x}m_% {y}}}\exp\left(-\frac{\omega}{m_{x}}-\frac{\omega}{m_{y}}\right)~{}\mathrm{K}_% {1}\left(\frac{2\omega}{\sqrt{m_{x}m_{y}}}\right), (14)

where {K}_{\nu}(\cdot) is the modified Bessel function of the second kind and \nu-th order.

Proof: The proof is given in Appendix B.

In the following, we proceed to prove the different parts of Lemma 2.

A. Calculating \mathcal{P}: Plugging (4) into \mathcal{P}=\Pr\{\gamma^{(1)}_{R_{1}}>\gamma_{R_{2}}\}, and then defining X=\gamma_{f}, Y=\gamma_{h} and Z=\gamma_{g}, we get

\displaystyle\mathcal{P} \displaystyle=\Pr\{\gamma_{f}>\frac{\gamma^{2}_{h}}{\gamma_{g}+\gamma_{h}}\}=1% -\Pr\{X<\frac{Y^{2}}{Y+Z}\}
\displaystyle=\frac{1}{m_{y}m_{z}}\int_{0}^{\infty}\int_{0}^{\infty}\exp(-% \frac{y^{2}}{(y+z)m_{x}}-\frac{y}{m_{y}}-\frac{z}{m_{z}})dzdy
\displaystyle\lx@stackrel{{\scriptstyle(a)}}{{=}}\frac{1}{m_{y}m_{z}}\int_{0}^% {\infty}\int_{0}^{\infty}\exp(-\frac{v^{2}}{um_{x}}-\frac{v}{m_{y}}-\frac{u-v}% {m_{z}})dudv
\displaystyle\lx@stackrel{{\scriptstyle(b)}}{{=}}\sqrt{\frac{4}{m_{x}m_{y}m_{z% }}}\int_{0}^{\infty}\hskip-8.535827pt\exp(-v\frac{m_{y}-m_{z}}{m_{y}m_{z}})v{{% K}_{1}}\left(\sqrt{\frac{2}{{m_{x}m_{z}}}v}\right)\hskip-3.414331ptdv
\displaystyle\lx@stackrel{{\scriptstyle(c)}}{{=}}{\frac{\sqrt{m_{x}}{m_{z}}^{3% /2}}{m_{z}-m_{y}\,\sqrt{m_{x}}\sqrt{m_{z}}+2\,m_{z}\,m_{{\it y}}}}
\displaystyle\sum_{n=1}^{\infty}\sum_{i=1}^{n}\Lambda(1,n,i)i!\left({\frac{2m_% {z}\,m_{y}}{m_{z}-m_{y}\,\sqrt{m_{x}\,m_{z}}+2\,m_{z}\,m_{y}}}\right)^{i},
\displaystyle\lx@stackrel{{\scriptstyle(d)}}{{\approx}}{\frac{8\sqrt{m_{x}}{m_% {z}}^{5/2}m_{y}}{3\left(m_{z}-m_{y}\,\sqrt{m_{x}}\sqrt{m_{z}}+2\,m_{z}\,m_{y}% \right)^{2}}}, (15)

where (a) follows from defining the auxiliary variables u=y+z and v=y, (b) follows from using [10, Eq. (3.324.1)] and [10, Eq. (3.351.3)], (c) follows from substituting the infinite series equivalent modified Bessel function of the second kind and first order as presented in [11], which is a well-tight approximation with finite series, as observed later in numerical results. For \nu>0 and positive integer M, we have [11], {\sl K}_{\nu}(\beta x)\approx\exp(-\beta x)\sum\limits_{n=0}^{M}\sum_{i=0}^{n}% \Lambda(\nu,n,i)(\beta x)^{i-\nu}, where M\rightarrow\infty and \Lambda(\nu,n,i)=\frac{(-1)^{i}\sqrt{\pi}\Gamma(2\nu)\Gamma(n-\nu+\frac{1}{2})% \mathrm{L}(n,i)}{2^{\nu-i}\Gamma(\frac{1}{2}-\nu)\Gamma(n+\nu+\frac{1}{2})n!} in which \mathrm{L}(i,n)={{{n-1\choose i-1}}\frac{n!}{i!}} for n,i>0 represents the Lah numbers. Finally, (d) presents the first term of the infinite series given for M=1 to have a closed-form approximation. We will show in the simulation results how this simple closed-form expression works well.

B. Calculating T_{1}: Using Lemma 3, we can derive a closed-form expression for T_{1}, after assuming X=\frac{\gamma_{g}}{\gamma_{h}}, as

\displaystyle T_{1} \displaystyle=\mathbb{E}\Big{\{}\ln(1+\frac{\gamma_{g}}{\gamma_{h}})\Big{\}}=% \int_{0}^{\infty}\ln(1+x)f_{X}(x)~{}dx
\displaystyle=\int_{0}^{\infty}\frac{1-F_{X}(x)}{1+x}dx=\frac{m_{g}\ln(\frac{m% _{g}}{m_{h}})}{m_{g}-m_{h}}. (16)

C. Calculating T_{2}: The part T_{2} can be mathematically calculated as

\displaystyle T_{2} \displaystyle=\mathbb{E}\{\ln(1+\frac{\gamma_{g}\gamma_{h}}{\gamma_{f}(\gamma_% {g}+\gamma_{h})})\}\lx@stackrel{{\scriptstyle(a)}}{{\approx}}\ln\left(1+\frac{% \mathbb{E}\{\frac{\gamma_{g}\gamma_{h}}{\gamma_{g}+\gamma_{h}}\}}{\mathbb{E}\{% \gamma_{f}\}}\right)
\displaystyle\lx@stackrel{{\scriptstyle(b)}}{{=}}\ln\Big{(}1+\frac{m_{g}m_{h}% \Big{(}m_{g}^{2}-m_{h}^{2}-2\ln\frac{m_{g}}{m_{h}}\Big{)}}{3m_{f}(m_{g}-m_{h})% }\Big{)}, (17)

where (a) follows after using the approximation \mathbb{E}\{\log\left(1+\frac{X}{Y}\right)\}\approx\log\left(1+\frac{\mathbb{E% }\{X\}}{\mathbb{E}\{Y\}}\right) [12] and (b) follows from using Lemma 3 and MAPLE software.

Appendix B Proof of Lemma 3

The CDF of Z=\frac{X}{Y} has been derived in [5]. To obtain the CDF of W=\frac{XY}{X+Y}, we start from the definition of CDF as

\displaystyle F_{W}(\omega) \displaystyle=\Pr\Big{\{}\frac{XY}{X+Y}<\omega\Big{\}}=\Pr\Big{\{}XY-\omega(X+% Y)<0\Big{\}}
\displaystyle=\Pr\Big{\{}X<\frac{\omega Y}{Y-\omega}|Y-\omega\geq 0\Big{\}}\Pr% \{Y-\omega\geq 0\}
\displaystyle\quad+\lx@stackrel{{\scriptstyle}}{{\underset{=1}{\underbrace{\Pr% \Big{\{}X\geq\frac{\omega Y}{Y-\omega}|Y-\omega<0\Big{\}}}}}}\Pr\{Y-\omega<0\}
\displaystyle=\hskip-4.267913pt\int_{\omega}^{\infty}F_{X}\left(\frac{\omega y% }{y-\omega}\right)f_{Y}(y)dy+\int_{0}^{\omega}f_{Y}(y)dy
\displaystyle=\hskip-4.267913pt\int_{\omega}^{\infty}\hskip-4.267913pt\left[1-% \exp\left(-\frac{\omega y}{m_{x}(y-\omega)}\right)\right]f_{Y}(y)dy\hskip-0.85% 3583pt+\hskip-2.560748pt\int_{0}^{\omega}\hskip-5.406024ptf_{Y}(y)dy
\displaystyle=\hskip-2.845276pt1\hskip-2.845276pt-\hskip-2.845276pt\frac{1}{m_% {y}}\int_{\omega}^{\infty}\exp\left(-\frac{\omega y}{m_{x}(y-\omega)}-\frac{y}% {m_{y}}\right)dy
\displaystyle=\hskip-2.845276pt1\hskip-2.845276pt-\hskip-2.845276pt\frac{1}{m_% {y}}\hskip-1.451091pt\exp\hskip-1.451091pt\left(\hskip-2.845276pt-\frac{\omega% }{m_{x}}-\frac{\omega}{m_{y}}\right)\hskip-2.845276pt\int_{0}^{\infty}\hskip-8% .535827pt\exp\left(-\frac{\omega^{2}}{m_{x}y}-\frac{y}{m_{y}}\right)dy
\displaystyle\lx@stackrel{{\scriptstyle(a)}}{{=}}\hskip-2.845276pt1\hskip-2.84% 5276pt-\hskip-2.845276pt\frac{2\omega}{\sqrt{m_{x}m_{y}}}\exp\left(-\frac{% \omega}{m_{x}}-\frac{\omega}{m_{y}}\right)~{}\mathrm{K}_{1}\left(\frac{2\omega% }{\sqrt{m_{x}m_{y}}}\right), (18)

Finally, after calculating the integral term using [10, Eq. (3.324.1)], one can obtain the expression given in (3).


  • [1] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical-layer security in multiuser wireless networks: A survey,” IEEE Commun. Surveys and Tutorials, vol. 16, no. 3, pp. 3062-3080, Feb. 2014.
  • [2] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. D. Renzo, “Safeguarding 5G wireless communication networks using PLS,” IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
  • [3] X. He and A. Yener, “Two-hop secure communication using an untrusted relay: A case for cooperative jamming,” in Proc. IEEE Globecom, New Orleans, LA, Dec. 2008, pp. 1-5.
  • [4] L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, “Security-aware relaying scheme for cooperative networks with untrusted relay nodes,” IEEE Commun. Lett., vol. 19, no. 3, pp. 463-466, Sep. 2014.
  • [5] A. Kuhestani, A. Mohammadi and P. L. Yeoh, “Security-reliability trade-off in cyber-physical cooperative systems with non-ideal untrusted relaying,” 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, pp. 552 - 557.
  • [6] A. Kuhestani, et al., “Optimal power allocation by imperfect hardware analysis in untrusted relaying networks,” IEEE Trans. Wireless. Commun., vol. 17, no. 7, pp. 4302-4314, July 2018.
  • [7] A. Kuhestani, A. Mohammadi, and M. Mohammadi, “Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers,” IEEE Trans. Inf. Forens. Sec., vol. 13, no. 2, pp. 341–355, Feb. 2018.
  • [8] H. Wang, Y. Zhang, D. W. K. Ng and M. H. Lee, “Secure routing with power optimization for ad-hoc networks,” IEEE Trans. Commun., vol. 66, no. 10, pp. 4666-4679, Oct. 2018.
  • [9] J. Yao, X. Zhou, Y. Liu and S. Feng, “Secure transmission in linear multihop relaying networks,” IEEE Trans. Wireless. Commun., vol. 17, no. 2, pp. 822-834, Feb. 2018.
  • [10] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York: Academic, 2007.
  • [11] M. Molu, et al., “A novel equivalent definition of modified Bessel functions for performance analysis of multi-hop wireless communication systems”, IEEE Access, vol. 5, pp. 7594-7605, May 2017.
  • [12] E. Bjornson, M. Matthaiou and M. Debbah, “A new look at dual-hop relaying: Performance limits with hardware impairments,” IEEE Trans. Commun., vol. 61, no. 11, pp. 4512-4525, Nov. 2013.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
Add comment
Loading ...
This is a comment super asjknd jkasnjk adsnkj
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test description