Professional Documents
Culture Documents
Abstract— In this paper, we investigate the security and relia- to the limitations of WSN nodes on size, cost, and power
bility trade-off (SRT) for a wireless sensor network (WSN) which energy, their computing power and transmission capacity
consists of one cluster head (CH), multiple users, and one eaves- are much weaker than other networks, which makes WSN
dropper (E), where the eavesdropper attempts to tap the con-
fidential transmission between multiple users and CH. We first vulnerable to attacks. And, security has become one of the
present two multiuser scheduling schemes, namely the selection main obstacles for large-scale application of WSNs, which
combining (SC) scheme and the switch-and-examine combining has attracted extensive attention from researchers and brought
with post-selection (SECps) scheme to enhance physical-layer about a variety of security techniques [1]–[5]. There are dif-
security (PLS) of the WSN system. For comparison purposes, ferent security mechanisms at different layers of WSNs, such
the round-robin scheduling (RRS) scheme is also considered as
a baseline. Then, we analyze the SRT of the RRS, SECps, and as key management mechanisms, cryptography algorithms,
SC schemes by deriving their closed-form outage and intercept identity authentication, two-way authentication schemes, and
probability expressions under the joint impact of hardware so on [6]. However, these security mechanisms require high
impairment (HI) and co-channel interference (CCI). And, secrecy computing power and energy of WSN nodes.
diversity analysis of the three schemes is also carried out. Numer- Alternatively, physical-layer security (PLS) [7] which
ical results show that the SC and SECps scheme outperform the
RRS scheme in terms of the SRT performance, where the SC is to encrypt symbols at the bottom layer can reduce the
scheme can achieve the best SRT performance at the cost of an complexity of encryption algorithms and achieve a good
increased channel estimation complexity. Moreover, a trade-off defense against illegal base stations and eavesdroppers. After
between the security and reliability can be achieved for each of decades of research, various PLS techniques [8], such as
the RRS, SECps, and SC schemes by adjusting the overall data cooperative jamming [9], [10], cooperative relaying [11]–[13],
rate and signal-to-noise ratio (SNR).
non-orthogonal multiple access (NOMA) [14]–[16], multiple-
Index Terms— Physical-layer security, security-reliability input-multiple-output (MIMO) [17], [18], multiuser
trade-off, multiuser scheduling, hardware impairment, diversity [19]–[23], and so on, have emerged. Among
co-channel interference, wireless sensor network.
them, multiuser scheduling is widely used because it does not
require additional resources. In [19], the PLS of multiuser
I. I NTRODUCTION
wireless networks is reviewed. In [20], multiuser scheduling
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
7012 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
LI et al.: IMPACT OF HI AND CCI ON SRT FOR WSNs 7013
zero-mean complex Gaussian random variables with variances Accordingly, the channel capacity of main and wiretap
2 2 channel can be obtained as
of σic and σie , respectively. Hence, the received signals at CH
and eavesdropper can be written as
Cc = log2 (1 + SINRc ) , (7)
K
yc = PU hum c (xm +ηm )+ PI gik (sik +ηik )+ηc +nc, and
k=1
Ce = log2 (1 + SINRe ) , (8)
(1)
where SINRc and SINRe are given by (5) and (6), respectively.
and As discussed in [13], if the capacity of wiretap channel is
L
larger than the difference between the overall rate (Ro ) and
ye = PU hum e (xm +ηm )+ PI gil (sil +ηil )+ηe +ne , secrecy rate (Rs ), there will be an intercept event, while if the
l=1 capacity of main channel is smaller than Ro , there will be an
(2) outage event. Thus, we can describe the intercept and outage
where ηm , ηik , and ηil are the distortion noises at the sched- probability of our system as
uled user and interferers due to the transmit HIs, ηc , ηe are Pint = Pr (Ce > Ro − Rs ) , (9)
the distortion noises at the CH and eavesdropper due to the
receive HIs, nc and ne stand for the zero-mean additive white and
Gaussian noises (AWGNs) received at CH and eavesdropper
Pout = Pr (Cc < Ro ) . (10)
with variance N0 .
Following [38], the distortion noises ηm , ηik , ηil ,
III. M ULTIUSER S CHEDULING S CHEMES AND
ηc , and ηe can be respectively modeled as zero-mean
S ECURITY-R ELIABILITY T RADE -O FF A NALYSIS
circularly-symmetric complex Gaussian distribution with
2 2 K 2 Messages transmitted over the network have different
variance σm , σi2k , σi2l , σc2 |hum c | PU + k=1 |gik | PI , and
L requirements of reliability and security. Security is more
2 2
σe2 |hum e | PU + l=1 |gil | PI . Without loss of generality, important for confidential messages, while reliability is
we consider that the cluster head and eavesdropper have more important for other messages. The goal of multiuser
different HI levels, while the multiple users and the co-channel scheduling is to reduce the intercept probability of the
2
interferers have the same HI level, i.e., σm = σi2k = network when the reliability of the network is satisfied, and
2 2
σil = σ1 . Hence, the received signal-to-interference-plus-noise vice versa. In this section, two multiuser scheduling schemes
ratio (SINR) at CH can be formulated as are proposed to improve the SRT of our system, including SC
and SECps schemes. For comparison purposes, the traditional
SINRc
2
RRS scheme is also considered as a benchmark. The closed-
ψ|hum c | form intercept and outage probabilities of the SC, SECps as
= ,
2
K
2 well as RRS schemes are derived under the joint impact of
(σ12 + σc2 ) ψ|hum c | + |gik | (1 + σ12 + σc2 )ψ + 1
k=1 HI and CCI.
(3)
A. RRS Scheme
where ψ = PNU0 and ψ = N PI
0
denote the signal-to-noise The RRS scheme allows all users of the system to com-
ratio (SNR) and interference-to-noise ratio (INR), respectively. municate with the CH in turn. Now, it is Um ’ turn to send
Similarly, the received SINR at eavesdropper can be expressed its confidential message to the CH. Here, we derive the
as closed-form outage and intercept probability expressions of
SINRe RRS scheme.
2 1) Outage Probability: Combining (5) and (7) with (10),
ψ|hum e |
= . the outage probability of the Um -CH transmission can be
2 2 2
K
2 2 2
(σ1 + σe ) ψ|hum c | + |gik | (1 + σ1 + σe )ψ + 1 given by
k=1 RRS
(4) Pout,m ⎛ ⎞
Let μ1 = σ12 + σc2 and μ2 = σ12 + σe2 , (3) and (4) can be ⎜ ψ|hum c |2 ⎟
⎜ ⎟
further rewritten as = Pr ⎜ < Δ1 ⎟ ,
⎝
K ⎠
2 μ1 ψ|hum c |2 + (1 + μ1 ) ψ |gik |2 + 1
ψ|hum c | k=1
SINRc = , (5) (11)
2
K
2
μ1 ψ|hum c | + (1 + μ1 )ψ |gik | + 1
k=1 where Δ1 = 2Ro − 1.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
7014 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
RRS SC
where Pint,m is given by (17). where Pout,I is given by (23).
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
LI et al.: IMPACT OF HI AND CCI ON SRT FOR WSNs 7015
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
7016 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
outage probability of SECps scheme can be formulated as μ2 ≥ Δ−1 2 , the outage and intercept probabilities of the
⎛ ⎞ system are 1 and 0, respectively, which is no need for analysis.
1 − μ1 Δ1 2
⎜ ψ|hus c | ⎟ According to [41], we derive an asymptotic outage prob-
Δ1
Pout,I = Pr ⎜ ⎟
SECps
⎝ K ⎠ ability expression as a function of the intercept probability
2
< (1 + μ1 )ψ |gik | + 1 with γ → ∞, then we derive the secrecy diversity gain as a
k=1
∞ ratio of the logarithmic asymptotic outage probability to the
Δ1 logarithmic γ, which is described as
= Fδ x fY1 (x) dx, (30)
1 1 − μ1 Δ1
log Pout (γ, Pint )
where ‘us ’ denotes the selected user. ds = − lim . (39)
γ→∞ log γ
Proceeding as in Appendix C, (30) can be further obtained
where Pout (γ, Pint ) denotes an outage probability as a func-
as
⎧ tion of an intercept probability Pint and SNR γ.
⎪ Δ1
⎨ Ξ1 + Ξ2 , if δT ≥
SECps
Pout,I = 1 − μ1 Δ1 (31) A. RRS Scheme
⎪ Δ1
⎩ Ξ3 , if δT < In this subsection, we present the secrecy diversity analysis
1 − μ1 Δ1
for the conventional RRS scheme. Based on the above assump-
where Ξ1 , Ξ2 , and Ξ3 are given by (32), (33), and (34), shown tions, (13) and (17) can be simplified as
at the bottom of the next page, respectively.
Δ1
Finally, the outage probability of SECps scheme is RRS
Pout,m = 1 − exp − 2
, (40)
expressed as (1 − μ1 Δ1 ) γσuc
and
1, if μ1 ≥ Δ−1
SECps
Pout = 1
(35) Δ2
Pout,I , if μ1 < Δ−1
SECps Pint,m = exp −
RRS
2
. (41)
1 (1 − μ2 Δ2 ) γσue
SECps
where Pout,I is given by (31). Combining (41) with Δ2 = 2Ro −Rs − 1, we have
2) Intercept Probability: Similarly, if μ2 ≥ Δ2 −1 , then 2
γσue ln Pint,m
RRS
Ro Rs
SECps
Pint = 0, and if μ2 < Δ2 −1 , then the intercept probability 2 =2 2 ln P RRS − 1
+1 . (42)
μ2 γσue int,m
of SECps scheme is formulated as
M When γ → ∞, by using the formula ex − 1 ∼ x (x → 0),
SECps
Pint,I = Fδm (δT )Pint,I
SC
+ (1 − Fδ1 (δT )) Pint,1
RRS (40) can be further obtained as
m=1 Δ1
M m−1
lim P RRS = 2
(43)
γ→∞ out,m (1 − μ1 Δ1 ) γσuc
+ Fδq (δT ) (1 − Fδm (δT )) Pint,m
RRS
. (36)
m=2 q=1
Substituting (42) and Δ1 = 2Ro − 1 into (43) yields (44),
shown at the bottom of the next page. Therefore, we can
Substituting (17), (27), (C.2), and (C.4) into (36), we can readily have (45), shown at the bottom of the next page, which
express the intercept probability of SECps scheme as (37), shows that the conventional RSS scheme achieves a secrecy
shown at the bottom of the next page. diversity order of one. This means that as the SNR γ increases
Finally, the intercept probability of SECps scheme can be to infinity, the outage probability would approach to zero with
obtained as a required intercept probability constraint.
SECps 0, if μ2 ≥ Δ−12
Pint = (38) B. SC Scheme
Pint,I , if μ2 < Δ−1
SECps
2
In this subsection, we present the secrecy diversity analysis
SECps
where Pint,I is given by (37). for proposed SC scheme. Similarly to (40) and (41), (23) and
(27) can be simplified as
IV. S ECRECY D IVERSITY G AIN A NALYSIS M
Δ1
SC
Pout = 1 − exp − 2
, (46)
In this section, we present the secrecy diversity gain analysis (1 − μ1 Δ1 ) γσuc
for the proposed SECps and SC schemes as well as the and
conventional RRS scheme by characterizing an asymptotic M−1
behavior of the outage probability with an intercept probability m 1 Δ2
Pint = M
SC
(−1) exp − 2
,
constraint in the high SNR region. We consider a special m=0
m+1 (1 − μ2 Δ2 ) γσuc
scenario where the effect of CCI is ignored. For the purpose (47)
of mathematical tractability, we assume that the Rayleigh
M−1
m 1
fading coefficients of all main and wiretap channels, i.e., hum c where M (−1) m+1 can be mathematically transformed
and hum e (m = 1, 2, . . . , M ), are i.i.d. zero-mean complex m=0
Gaussian random variables with a variance of σuc 2 2
and σue , to 1, hence, we can obtain 2Ro from (47) as
respectively. Moreover, only the case of μ1 < Δ−1 1 and Ro Rs
2
γσue ln Pint
SC
2 =2 +1 . (48)
μ2 < Δ−1 2 is considered, because when μ1 ≥ Δ−1 1 and 2 ln P SC − 1
μ2 γσue int
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
LI et al.: IMPACT OF HI AND CCI ON SRT FOR WSNs 7017
Substituting (48) into (46) yields (49), shown at the bottom C. SECps Scheme
of the page. Therefore, the secrecy diversity gain of proposed
SC scheme is In this subsection, we present the secrecy diversity analysis
for proposed SECps scheme. (31) and (36) can be sim-
log Pout
SC plified as (51), shown at the bottom of the next page,
s = − lim
dSC
γ→∞ log γ
= M, (50) and
⎛ ⎞ K
M
2 −1 γ K, λic + λum c ξ
γ (K, λic ξ) |D w | ⎝ λic ⎠ m∈D w
Ξ1 = + (−1) exp − λum c , (32)
(K − 1)! w=1 w
λic + λum c (K − 1)!
m∈D
m∈D w
K M
Γ (K, λic ξ) Γ (K, (λic + λu1 c ) ξ) λic
Ξ2 = − exp (−λu1 c ) − exp (−λum c )
(K − 1)! (K − 1)! λic + λu1 c m=2
⎡ ⎛ ⎞⎤
2m−1
−1 K
v
|D | δT ⎠⎦ Γ (K, (λic + λum c ) ξ) λic
×⎣1 + (−1) exp ⎝− , (33)
v=1
ψσu2 q c (K − 1)! λic + λum+1 c
q∈D v
⎡ ⎛ ⎞⎤
−K M 2m−1
−1
λu1 c ⎣1 +
v
|D | δ T ⎠⎦
Ξ3 = 1 − exp (−λu1 c ) 1 + − (−1) exp ⎝− 2
λic m=2 v=1 v
ψσ uq c
q∈D
−K
λum c
× exp (−λum c ) 1 + . (34)
λic
⎡ M ⎤
2 −1
|D w | δT
= ⎣1 + ⎦
SECps
Pint,I (−1) exp −
w=1
ψσu2 m c
m∈D w
⎡ ⎛ ⎞−1 ⎤
M
2M
−1
−1 σu2 c
⎢ ⎥
(−1)| r | ⎝1 +
Dt r ⎠
× ⎣1 + 2 ⎦
r=1 t=1
σu c
m∈Drt m
L L
λie δT λie
× exp(−λur e ) + exp − 2 exp(−λu1 e )
λie + λur e ψσu1 c λie + λu1 e
⎡ ⎛ ⎞ ⎤
M 2m−1
−1 δT
⎣ |D v |
+ 1+ (−1) exp ⎝− 2
⎠⎦
m=2 v=1 v
ψσ u c
q∈D q
L
δT λie
× exp − 2 exp(−λum e ) (37)
ψσum c λie + λum e
⎛⎛ ⎞−1 ⎞−1
−1
2
⎜⎝ Rs γσue ln Pint,m
RRS
2 ⎟
lim Pout,m
RRS
=⎝ 2 2 ln P RRS −
+1 −1 − μ1 ⎠ γσuc ⎠ . (44)
γ→∞ μ2 γσue int,m 1
log Pout,m
RRS
dRRS
s = − lim = 1, (45)
γ→∞ log γ
⎛⎛ ⎞−1 ⎞−1
−1
2
⎜⎝ Rs γσue ln Pint,m
SC
2 ⎟
lim Pout
SC
= M⎝ 2 2 ln P SC
+1 −1 − μ1 ⎠ γσuc ⎠ (49)
int,m − 1
γ→∞ μ2 γσue
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
7018 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
⎧ M
⎪
⎪ Δ1 Δ1
⎪
⎪ 1 − exp − , if δT ≥
⎪
⎪ ⎡
2
(1 − μ1 Δ1 ) γσuc ⎤ 1 − μ1 Δ1
⎪
⎪
⎪
⎪ Δ1
⎪
⎪ 1 − exp −
⎨⎢⎢
2
(1 − μ1 Δ1 ) γσuc ⎥
⎥
SECps
Pout = ⎢⎢ M m−1 ⎥
⎥ (51)
⎪
⎪ ⎢ δT ⎥ , if δT < Δ1
⎪
⎪ ⎢ − 1 − exp − ⎥
⎪
⎪ ⎢ m=2 γσ 2
⎥ 1 − μ1 Δ1
⎪
⎪ ⎢
uc
⎪
⎪ ⎥
⎪
⎪ ⎣ Δ1 ⎦
⎩ × exp − 2
(1 − μ1 Δ1 ) γσuc
⎧
⎪
⎪ Δ1 Δ1
⎨M 2
, if δT ≥
SECps (1 − μ1 Δ1 ) γσuc 1 − μ1 Δ1
lim Pout = Δ1 1 Δ1 (55)
γ→∞ ⎪
⎪
⎩ − δT 2
, if δT <
(1 − μ1 Δ1 ) γσuc 1 − μ1 Δ1
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
LI et al.: IMPACT OF HI AND CCI ON SRT FOR WSNs 7019
Fig. 4. SRT of the RRS, SECps, and SC schemes for different HI levels with
M = 5, SNR ∈ [0, 20 dB], INR = 4 dB, Ro = 2 bit/s/Hz, K = L = 2,
δT = 8 dB, and MER = 3 dB. Fig. 5. SRT of the RRS, SECps, and SC schemes for different INRs with
M = 5, SNR ∈ [0, 20 dB], MER = 3 dB, Ro = 2 bit/s/Hz, K = L = 2,
δT = 8 dB, and μ1 = μ2 = 0.03.
the RRS, SECps, and SC schemes increase, and vice versa.
This indicates that the improvement of transmission security
comes at the cost of the decrease of reliability, which means
a trade-off between security and reliability. It is also shown
from Fig. 3 that the SECps and SC schemes always perform
better than the RRS scheme in terms of their SRT performance
for both cases of MER = 2 and 6 dB, where the SC scheme
achieves the best SRT performance under the joint impact of
HI and CCI. Moreover, as MER increases from 2 to 6 dB,
the SRT performance of the RRS, SECps, and SC schemes is
obviously improved.
Fig. 4 demonstrates the SRT of the RRS, SECps, and
SC schemes for different HI levels with M = 5, SNR ∈
[0, 20 dB], INR = 4 dB, Ro = 2 bit/s/Hz, K = L = 2, δT =
8 dB, and MER = 3 dB. It is shown from Fig. 4 that the SRT
performance of the SECps and SC schemes outperforms that of
RRS scheme. It needs to be pointed out that the SECps scheme Fig. 6. SRT of the RRS, SECps, and SC schemes for different values of M
has a close SRT performance to the SC scheme when the with INR = 4 dB, SNR ∈ [0, 20 dB], MER = 3 dB, Ro = 2 bit/s/Hz,
received SNR at CH is less than the given threshold. Moreover, K = L = 2, δT = 8 dB, and μ1 = μ2 = 0.03.
as HI increases from 0.03 to 0.09, the SRT performance of the
three presented schemes all decline slightly. improved significantly, whereas the RRS scheme achieves no
Fig. 5 depicts the SRT of the RRS, SECps, and SC improvement. For the SECps scheme, with an increase of the
schemes for different INRs with M = 5, SNR ∈ [0, 20 dB], number of users, when SNR is less than the threshold, the SRT
MER = 3 dB, Ro = 2 bit/s/Hz, K = L = 2, δT = 8 dB, and performance improvement is obvious. However, when SNR is
μ1 = μ2 = 0.03. We can observe from Fig. 5 that the SRT larger than the threshold, the SECps scheme has little or no
performance of the SECps and SC schemes is better than that SRT performance improvement. This is because that when
of the RRS scheme. In particular, when the received SNR SNR is large enough, after estimating the channels of the
is greater than the given threshold, the SC scheme performs first few users, the acceptable user can be found. As a result,
better than the SECps scheme in terms of the SRT performance increasing the number of users does not lead to significant
at the cost of estimating more wireless channels. Additionally, SRT performance improvement for the SECps scheme.
with an increase of INR, the SRT performance of the RRS, Fig. 7 depicts the SRT of the RRS, SECps, and SC schemes
SECps, and SC all decrease a bit. for different values of the average main and wiretap channel
Fig. 6 shows the SRT of the RRS, SECps, and SC schemes gains with INR = 4 dB, SNR ∈ [0, 20 dB], Ro = 2 bit/s/Hz,
for different number of users with INR = 4 dB, SNR ∈ K = L = 2, δT = 8 dB, and μ1 = μ2 = 0.03.
[0, 20 dB], MER = 3 dB, Ro = 2 bit/s/Hz, K = L = 2, As illustrated in Fig. 7, when the average gain of wiretap
δT = 8 dB, and μ1 = μ2 = 0.03. We can see from Fig. 6 that channel is set to 0.5, the SRT performance of the conventional
the SC scheme has the best SRT performance, followed by RRS, SECps, and SC schemes can be improved as the average
the SECps scheme, while the RRS scheme has the worst gain of main channel increases from 0.5 to 1. On the contrary,
SRT performance. Moreover, as the number of users increases when the average gain of main channel is set to 0.5, as the
from 5 to 10, the SRT performance of SC scheme can be average gain of wiretap channel increases from 0.1 to 0.5,
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
7020 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
Fig. 7. SRT of the RRS, SECps, and SC schemes for different values of the Fig. 9. Sum of outage and intercept probability for the RRS, SECps, and
average main and wiretap channel gains with INR = 4 dB, SNR ∈ [0, 20 dB], SC schemes versus SNR for different MERs with INR = 4 dB, M = 15,
Ro = 2 bit/s/Hz, K = L = 2, δT = 8 dB, and μ1 = μ2 = 0.03. Ro = 2 bit/s/Hz, K = L = 2, δT = 8 dB, and μ1 = μ2 = 0.03.
Fig. 8. Sum of outage and intercept probability for the RRS, SECps, and Fig. 10. Sum of outage and intercept probability for the RRS, SECps, and
SC schemes versus δT with SNR = 10 dB, M = 5, Ro = 2 bit/s/Hz, SC schemes versus Ro for different HIs with SNR = 10 dB, INR = 4 dB,
K = L = 2, INR = 4 dB, MER = 8 dB, and μ1 = μ2 = 0.03. M = 15, K = L = 2, δT = 5 dB, and MER = 8 dB.
the SRT performance of the conventional RRS, SECps, and in Fig. 9, all curves of the RRS, SECps, and SC schemes
SC schemes all degrade. regarding the sum of outage and intercept probability are
Fig. 8 illustrates the Sum of outage and intercept probability concave curves, and there is a minimum value on each of
for the RRS, SECps, and SC schemes versus δT with SNR = these curves, indicating that better SRT performance of the
10 dB, M = 5, Ro = 2 bit/s/Hz, K = L = 2, INR = 4 dB, three presented multiuser scheduling schemes can be achieved
MER = 8 dB, and μ1 = μ2 = 0.03. From Fig. 8, we can by adjusting SNR. Moreover, the sum of outage and intercept
see that the sum of outage and intercept probability for the probability for the RRS, SECps, and SC schemes significantly
SECps scheme is close to that for the RRS scheme when decreases as MER increases from 4 to 8 dB.
the threshold is small. With an increase of δT , the sum Fig. 10 depicts the sum of outage and intercept probability
of outage and intercept probability for the SECps scheme for the RRS, SECps, and SC schemes versus Ro for different
constantly decreases until it converges to a floor which is the HIs with SNR = 10 dB, INR = 4 dB, M = 15, K = L = 2,
sum of outage and intercept probability for the SC scheme, δT = 5 dB, and MER = 8 dB. One can observe from
as expected. In addition, it is worth noting that when the given Fig. 10, with an increase of Ro , the sum of outage and
threshold is much higher than the actual received SNR at CH, intercept probability for the RRS, SECps, and SC schemes
the SECps scheme will gradually degenerate into SC scheme. goes down to its lowest and up again. This means that we
Fig. 9 shows the sum of outage and intercept probability for can adjust Ro to get better SRT performance of the RRS,
the RRS, SECps, and SC schemes versus SNR for different SECps, SC schemes. Additionally, as the HI level increases
MERs with INR = 4 dB, M = 15, Ro = 2 bit/s/Hz, from 0.03 to 0.09, the sum of outage and intercept probability
K = L = 2, δT = 8 dB, and μ1 = μ2 = 0.03. As observed for the RRS, SECps, and SC schemes declines in low Ro
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
LI et al.: IMPACT OF HI AND CCI ON SRT FOR WSNs 7021
TABLE I
P ROPOSED G OLDEN S EARCH I TERATIVE M ETHOD FOR A CHIEVING THE O PTIMAL SNR
Fig. 11. SRT of the RRS, SECps, and SC schemes with different HI levels
for different devices when M = 5, SNR = 10 dB, INR = 4 dB, Ro = Fig. 12. Sum of outage and intercept probability for the RRS, SECps, and
2 bit/s/Hz, K = L = 2, δT = 8 dB, and MER = 8 dB. SC schemes versus M for different number of interferers with SNR = 10
dB, Ro = 2 bit/s/Hz, INR = 4 dB, δT = 5 dB, MER = 8 dB, and
μ1 = μ2 = 0.03.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
7022 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
in the face of an eavesdropper. We presented the SECps and (B.1) can be expanded as
SC schemes to enhance transmission security and reliability M
of the system. Conventional RRS scheme was considered 1 − e−λum c α
for comparison purposes. Specifically, in the SECps scheme, m=1
a user whose SNR is greater than a given threshold would M
2 −1
|D w |
be selected to communicate with CH rather than the best = 1+ (−1) exp − λum c α , (B.2)
one, which can reduce the complexity of wireless channel w=1 m∈D w
estimations. We derived closed-form expressions of outage where Dw stands for the w-th non-empty subset of U and
and intercept probability and carried out secrecy diversity |Dw | denotes the set cardinality of Dw .
analysis for the RRS, SECps, and SC schemes over Rayleigh When μ1 < Δ1 −1 , the equation (22) can be further obtained
fading channels. Moreover, numerical results illustrated that as
the SECps and SC schemes outperform the RRS scheme in ∞
terms of their SRT performance. It was also shown that a
SC
Pout,I = FX2 (α)fY1 (α) dα. (B.3)
1
trade-off between security and reliability can be achieved by
Substituting (B.2) and (A.2) into (B.3), we have
adjusting the overall data rate and SNR for each of the RRS, ⎡ ⎤
SECps, and SC schemes. ∞ M
2 −1
w
SC
Pout,I = ⎣1 + (−1)|D | exp − λum c α ⎦
1 w=1 m∈D w
A PPENDIX A
D ERIVATION OF (13) λK
ic K−1
× (α − 1) e−λic (α−1) dα. (B.4)
Denoting X1 = 1−μ1 Δ1
ψ |hum c |2
and Y1 = (K − 1)!
Δ1
K Similar to the derivation of (13), we can arrive at (23) from
(1 + μ1 ) ψ |gik |2 + 1, the CDF of X1 is given by (B.4) through integral operation.
k=1
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
LI et al.: IMPACT OF HI AND CCI ON SRT FOR WSNs 7023
⎧ ⎡ ⎡ M ⎤ ⎤
⎪
⎪ Δ1
⎪
⎪ ⎢ ξ⎢ Fδm (x + 1) ⎥ ⎥
⎪
⎪ ⎢ ⎢ m=1 1 − μ1 Δ1 ⎥ ⎥
⎪
⎪ ⎢ ⎢ ⎥ ⎥
⎪
⎪ ⎢ ⎣ ⎦ ⎥
⎪
⎪ ⎢ 0 K
λic ⎥
⎪
⎪ ⎢ × xK−1 −λic x
e dx ⎥
⎪
⎪ ⎢ (K − 1)! ⎥
⎪
⎪ ⎢ " #$ % ⎥
⎪
⎪ ⎢ ⎥
⎪
⎪ ⎢ Ξ1 ⎥
⎪
⎪ ⎢ ⎡ ⎤ ⎥
⎪
⎪ ⎢ Δ1 ⎥
⎪
⎪ ⎢ ⎥
⎪
⎪
⎪ ⎢ ⎢ Fδ1 1 − μ1 Δ1 (x + 1) ⎥ ⎥ Δ1
⎪
⎪ ⎢ ⎢ ⎥ ⎥ , if δT ≥
⎪
⎪ ⎢ ∞⎢ M
m−1 ⎥ ⎥ 1 − μ1 Δ1
⎪
⎪ ⎢ ⎢ ⎥ ⎥
⎪
⎪ ⎢ + ⎢− F (δ ) ⎥ ⎥
⎪
⎪ ⎢ ⎢ δq T ⎥ ⎥
⎪
⎪ ⎢ ξ ⎢ m=2 q=1 ⎥ ⎥
⎪
⎪ ⎢ ⎢ ⎥ ⎥
⎪
⎪ ⎢ ⎣ Δ1 ⎦ ⎥
⎪
⎪ ⎢ × 1 − Fδm (x + 1) ⎥
⎪
⎪ ⎢ 1 − μ1 Δ1 ⎥
⎪
⎨ ⎢ ⎥
⎢ ⎥
SECps
= ⎢ λK
ic ⎥
Pout,I
⎪ ⎢ × xK−1 e−λic x dx ⎥ (C.1)
⎪
⎪ ⎣ (K − 1)! ⎦
⎪
⎪ " #$ %
⎪
⎪
⎪
⎪ ⎡ Ξ2 ⎤
⎪
⎪
⎪
⎪
⎪
⎪ ⎢ ⎡ ⎤ ⎥
⎪
⎪ ⎢ Δ1 ⎥
⎪
⎪
⎪
⎪
⎢
⎢ ⎢ Fδ1 1 − μ1 Δ1 (x + 1) ⎥ ⎥
⎥
⎪
⎪ ⎢ ⎢ ⎥ ⎥
⎪
⎪ ⎢ ∞⎢⎢ M m−1
⎥ ⎥
⎪
⎪ ⎢ ⎥ ⎥
⎪
⎪ ⎢ ⎢ − F (δ ) ⎥ ⎥
⎪
⎪ ⎢ 0 ⎢ ⎢ δq T ⎥ ⎥ Δ1
⎪
⎪ ⎢ m=2 q=1 ⎥ ⎥ , if δT <
⎪
⎪ ⎢ ⎢ ⎥ ⎥
⎪
⎪ ⎢ ⎣ Δ ⎦ ⎥ 1 − μ1 Δ1
⎪
⎪ ⎢ × 1 − Fδm
1
(x + 1) ⎥
⎪
⎪ ⎢ 1 − μ1 Δ1 ⎥
⎪
⎪ ⎢ ⎥
⎪
⎪ ⎢ K ⎥
⎪
⎪ ⎢ λ ic ⎥
⎪
⎪ ⎢× xK−1 e−λic x dx ⎥
⎪
⎪ ⎣ (K − 1)! ⎦
⎪
⎩ " #$ %
Ξ3
⎛ ⎛ ⎛ ⎞⎞ ⎞
∞ M
2m−1
−1
⎝1− ⎝1 + |D v | δT ⎠⎠
Ξ2 = (−1) exp ⎝− exp (−λum c (x + 1)) − exp (−λu1 c (x + 1))⎠
ξ m=2 v=1
ψσu2 q c
q∈D v
λK
ic
× xK−1 exp (−λic x) dx. (C.6)
(K − 1)!
⎛ ⎛ ⎛ ⎞⎞ ⎞
∞ M
2m−1
−1
⎝1− ⎝1 + |D |v δT ⎠⎠
Ξ3 = (−1) exp ⎝− exp (−λum c (x + 1)) − exp (−λu1 c (x + 1))⎠
0 m=2 v=1
ψσu2 q c
q∈D v
λK
ic
× xK−1 exp (−λic x) dx (C.7)
(K − 1)!
μ n
By using the formula 0 xm e−βx dx = γ(n,βμ )
n
nβ v v = R EFERENCES
m+1
n [42, eq.3.381.8], (C.5) can be further obtained as (32).
[1] Y. Liu, M. Dong, K. Ota, and A. Liu, “ActiveTrust: Secure and trustable
Substituting (C.2) and (C.4) into Ξ2 yields (C.6), shown at routing in wireless sensor networks,” IEEE Trans. Inf. Forensics Security,
the top of the page. n
vol. 11, no. 9, pp. 2013–2027, Sep. 2016.
∞
By employing the formula μ xm e−βx = Γ(v,βμ )
n
nβ v v= [2] D. He, C. Chen, S. Chan, J. Bu, and L. T. Yang, “Security analysis and
m+1 improvement of a secure and distributed reprogramming protocol for
n [42, eq.3.381.9], we can arrive at (33) from (C.6). wireless sensor networks,” IEEE Trans. Ind. Electron., vol. 60, no. 11,
Substituting (C.2) and (C.4) into Ξ3 yields (C.7), shown at pp. 5348–5354, Nov. 2013.
∞
the top of the page. By utilizing the formulas 0 xv−1 e−ux = [3] J. Duan, D. Gao, D. Yang, C. H. Foh, and H.-H. Chen,
1 “An energy-aware trust derivation scheme with game theo-
uv Γ (v) [42, eq. (3.381.4)] and Γ (v) = (v − 1)! retic approach in wireless sensor networks for IoT applica-
[42, eq. (8.339.1)] again, Ξ3 can be further obtained tions,” IEEE Internet Things J., vol. 1, no. 1, pp. 58–69,
as (34). Feb. 2014.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
7024 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
[4] A. Rasheed and R. N. Mahapatra, “The three-tier security scheme [26] J. Zhu, D. W. K. Ng, N. Wang, R. Schober, and V. K. Bhargava,
in wireless sensor networks with mobile sinks,” IEEE Trans. Parallel “Analysis and design of secure massive MIMO systems in the presence
Distrib. Syst., vol. 23, no. 5, pp. 958–965, May 2012. of hardware impairments,” IEEE Trans. Wireless Commun., vol. 16,
[5] J. Shen, T. Zhou, J. Lai, P. Li, and S. Moh, “Secure and efficient data no. 3, pp. 2001–2016, Mar. 2017.
sharing in dynamic vehicular networks,” IEEE Internet Things J., vol. 7, [27] E. Bjornson, M. Matthaiou, and M. Debbah, “A new look at dual-hop
no. 9, pp. 8208–8217, Sep. 2020. relaying: Performance limits with hardware impairments,” IEEE Trans.
[6] I. Tomic and J. A. McCann, “A survey of potential security issues in Commun., vol. 61, no. 11, pp. 4512–4525, Nov. 2013.
existing wireless sensor network protocols,” IEEE Internet Things J., [28] S. Javed, O. Amin, S. S. Ikki, and M.-S. Alouini, “Multiple antenna
vol. 4, no. 6, pp. 1910–1923, Dec. 2017. systems with hardware impairments: New performance limits,” IEEE
[7] S. Leung-Yan-Cheong and M. Hellman, “The Gaussian wire-tap chan- Trans. Veh. Technol., vol. 68, no. 2, pp. 1593–1606, Feb. 2019.
nel,” IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451–456, Jul. 1978. [29] K. Guo, M. Lin, B. Zhang, W.-P. Zhu, J.-B. Wang, and T. A. Tsiftsis, “On
[8] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: the performance of LMS communication with hardware impairments
Technical challenges, recent advances, and future trends,” Proc. IEEE, and interference,” IEEE Trans. Commun., vol. 67, no. 2, pp. 1490–1505,
vol. 104, no. 9, pp. 1727–1765, Sep. 2016. Feb. 2019.
[9] L. Hu et al., “Cooperative jamming for physical layer security enhance- [30] L. Yu et al., “Spectrum availability prediction for cognitive radio
ment in Internet of Things,” IEEE Internet Things J., vol. 5, no. 1, communications: A DCG approach,” IEEE Trans. Cognit. Commun.
pp. 219–228, Feb. 2018. Netw., vol. 6, no. 2, pp. 476–485, Jun. 2020.
[10] B. Li, Y. Zou, J. Zhou, F. Wang, W. Cao, and Y.-D. Yao, “Secrecy [31] B. Li, J. Zhou, Y. Zou, and F. Wang, “Closed-form secrecy outage
outage probability analysis of friendly jammer selection aided multiuser analysis of cellular downlink systems in the presence of co-channel inter-
scheduling for wireless networks,” IEEE Trans. Commun., vol. 67, no. 5, ference,” IEEE Trans. Wireless Commun., vol. 17, no. 7, pp. 4721–4734,
pp. 3482–3495, May 2019. Jul. 2018.
[11] Y. Zou, X. Wang, W. Shen, and L. Hanzo, “Security versus reliability [32] C. Luo, J. Ji, Q. Wang, X. Chen, and P. Li, “Channel state information
analysis of opportunistic relaying,” IEEE Trans. Veh. Technol., vol. 63, prediction for 5G wireless communications: A deep learning approach,”
no. 6, pp. 2653–2661, Jul. 2014. IEEE Trans. Netw. Sci. Eng., vol. 7, no. 1, pp. 227–236, Jan. 2020.
[12] K. Lee, J.-P. Hong, H.-H. Choi, and M. Levorato, “Adaptive wireless- [33] B. Li, J. Zhou, Y. Zou, F. Wang, and W. Cao, “Secrecy versus
powered relaying schemes with cooperative jamming for two-hop secure computation overhead for wireless networks in the face of co-channel
communication,” IEEE Internet Things J., vol. 5, no. 4, pp. 2793–2803, interference,” IEEE Trans. Commun., vol. 67, no. 3, pp. 2306–2320,
Aug. 2018. Mar. 2019.
[13] Y. Zou, J. Zhu, X. Li, and L. Hanzo, “Relay selection for wireless [34] M. Ju and K.-S. Hwang, “Outage equivalence of opportunistic relaying
communications against eavesdropping: A security-reliability trade-off and selection cooperation in presence of co-channel interference,” IEEE
perspective,” IEEE Netw., vol. 30, no. 5, pp. 74–79, Sep. 2016. Trans. Wireless Commun., vol. 14, no. 6, pp. 2981–2991, Jun. 2015.
[35] J. A. Hussein, S. Boussakta, and S. S. Ikki, “Performance study of a
[14] L. Dai, B. Wang, Y. Yuan, S. Han, I. Chih-lin, and Z. Wang, “Non-
UCRN over Nakagami-m fading channels in the presence of CCI,” IEEE
orthogonal multiple access for 5G: Solutions, challenges, opportunities,
Trans. Cogn. Commun. Netw., vol. 3, no. 4, pp. 752–765, Dec. 2017.
and future research trends,” IEEE Commun. Mag., vol. 53, no. 9,
[36] S. W. Kim, Y. J. Chun, and S. Kim, “Co-channel interference cancel-
pp. 74–81, Sep. 2015.
lation using single radio frequency and baseband chain,” IEEE Trans.
[15] B. Di, L. Song, and Y. Li, “Sub-channel assignment, power allo-
Commun., vol. 58, no. 7, pp. 2169–2175, Jul. 2010.
cation, and user scheduling for non-orthogonal multiple access net-
[37] A. Afana and S. Ikki, “Analytical framework for space shift keying
works,” IEEE Trans. Wireless Commun., vol. 15, no. 11, pp. 7686–7698,
MIMO systems with hardware impairments and co-channel interfer-
Nov. 2016.
ence,” IEEE Commun. Lett., vol. 21, no. 3, pp. 488–491, Mar. 2017.
[16] J.-B. Kim and I.-H. Lee, “Non-orthogonal multiple access in coordinated [38] T. T. Duy, T. Q. Duong, D. B. da Costa, V. N. Q. Bao, and M. Elkashlan,
direct and relay transmission,” IEEE Commun. Lett., vol. 19, no. 11, “Proactive relay selection with joint impact of hardware impairment
pp. 2037–2040, Nov. 2015. and co-channel interference,” IEEE Trans. Commun., vol. 63, no. 5,
[17] D. B. Rawat, T. White, M. S. Parwez, C. Bajracharya, and M. pp. 1594–1606, May 2015.
Song, “Evaluating secrecy outage of physical layer security in [39] J. A. Hussein, S. S. Ikki, S. Boussakta, and C. C. Tsimenidis, “Per-
large-scale MIMO wireless communications for cyber-physical sys- formance analysis of opportunistic scheduling in dual-hop multiuser
tems,” IEEE Internet Things J., vol. 4, no. 6, pp. 1987–1993, underlay cognitive network in the presence of cochannel interference,”
Dec. 2017. IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8163–8176, Oct. 2016.
[18] D. Kapetanovic, G. Zheng, and F. Rusek, “Physical layer security [40] H. Yu, I.-H. Lee, and G. L. Stuber, “Outage probability of decode-
for massive MIMO: An overview on passive eavesdropping and and-forward cooperative relaying systems with co-channel interference,”
active attacks,” IEEE Commun. Mag., vol. 53, no. 6, pp. 21–27, IEEE Trans. Wireless Commun., vol. 11, no. 1, pp. 266–274, Jan. 2012.
Jun. 2015. [41] Y. Zou, “Intelligent interference exploitation for heterogeneous cellular
[19] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, networks against eavesdropping,” IEEE J. Sel. Areas Commun., vol. 36,
“Principles of physical layer security in multiuser wireless networks: no. 7, pp. 1453–1464, Jul. 2018.
A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550–1573, [42] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and
3rd Quart., 2014. Products, 7th ed. San Diego, CA, USA: Academic, 2007.
[20] Y. Zou, X. Wang, and W. Shen, “Physical-layer security with multiuser
scheduling in cognitive radio networks,” IEEE Trans. Commun., vol. 61,
no. 12, pp. 5103–5113, Dec. 2013.
[21] H. Deng, H.-M. Wang, W. Wang, and M. H. Lee, “Dual user selection
for security enhancement in uplink multiuser systems,” IEEE Commun.
Lett., vol. 20, no. 9, pp. 1900–1903, Sep. 2016.
[22] M. Yang, D. Guo, Y. Huang, T. Q. Duong, and B. Zhang, “Physi-
cal layer security with threshold-based multiuser scheduling in multi-
antenna wireless networks,” IEEE Trans. Commun., vol. 64, no. 12,
pp. 5189–5202, Dec. 2016.
[23] L. Bai, L. Zhu, T. Li, J. Choi, and W. Zhuang, “An efficient hybrid Bin Li received the B.E. degree in power engi-
transmission method: Using nonorthogonal multiple access and multi- neering from Southeast University (SEU), Nanjing,
user diversity,” IEEE Trans. Veh. Technol., vol. 67, no. 3, pp. 2276–2288, China, in 2004, the M.S. degree in information
Mar. 2018. and telecommunications engineering from the Nan-
[24] M. Mokhtar, A.-A.-A. Boulogeorgos, G. K. Karagiannidis, and jing University of Posts and Telecommunications
N. Al-Dhahir, “OFDM opportunistic relaying under joint trans- (NUPT), Nanjing, in 2009, and the Ph.D. degree
mit/receive I/Q imbalance,” IEEE Trans. Commun., vol. 62, no. 5, in communication and information system from the
pp. 1458–1468, May 2014. Nanjing University of Aeronautics and Astronau-
[25] E. Costa and S. Pupolin, “M-QAM-OFDM system performance in tics (NUAA), Nanjing, in 2019. He is currently a
the presence of a nonlinear amplifier and phase noise,” IEEE Trans. Lecturer with NUPT. His research interests include
Commun., vol. 50, no. 3, pp. 462–472, Mar. 2002. wireless security and cooperative communications.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.
LI et al.: IMPACT OF HI AND CCI ON SRT FOR WSNs 7025
Yulong Zou (Senior Member, IEEE) received the Weifeng Cao received the B.E. degree in informa-
B.Eng. degree in information engineering from tion engineering from Soochow University, Suzhou,
the Nanjing University of Posts and Telecommu- China, in 2004, and the M.S. degree in pattern
nications (NUPT), Nanjing, China, in July 2006, recognition from the Nanjing University of Posts
the Ph.D. degree in electrical engineering from and Telecommunications, Nanjing, China, in 2008,
the Stevens Institute of Technology, NJ, USA, where she is currently pursuing the Ph.D. degree.
in May 2012, and the Ph.D. degree in signal and Her research interests include satellite communi-
information processing from NUPT in July 2012. cations, cooperative communications, and physical
He is currently a Full Professor and a Doctoral layer security.
Supervisor with NUPT. He has acted as a TPC
Member for various IEEE sponsored conferences,
such as IEEE ICC, IEEE GLOBECOM, IEEE WCNC, IEEE VTC, and IEEE
ICCC. He was awarded the Ninth IEEE Communications Society Asia–Pacific
Best Young Researcher in 2014 and a co-receipt of the Best Paper Award at
the 80th IEEE Vehicular Technology Conference in 2014. He has served as an
Editor for the IEEE C OMMUNICATIONS S URVEYS AND T UTORIALS , IEEE
C OMMUNICATIONS L ETTERS , EURASIP Journal on Advances in Signal
Processing, IET Communications, and China Communications.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 11:32:21 UTC from IEEE Xplore. Restrictions apply.