Beruflich Dokumente
Kultur Dokumente
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
1
I. I NTRODUCTION
A. Background
The Internet of Things (IoT), which has aroused great
interest in the research community, is expected to provide
ubiquitous connectivity and information exchange among a
variety of physical objects (e.g., sensors, vehicles, mobile
phones) in any place and at any time [1], [2]. It enables
objects possessing sensorial and computing capabilities to
work together efficiently. Meanwhile, it also facilitates the
delivering of mobile content based on the concept of social
networks [3], [4]. Those physical objects in IoT are more intelligent than before as they can see, hear, think and cooperate
with one another [5]. With such smart objects deployed in
Qian Xu, Pinyi Ren, and Qinghe Du are with the School of Electronic
and Information Engineering, Xian Jiaotong University, Xian, China, and
also with the Shaanxi Smart Networks and Ubiquitous Access Research
Center, Xian Jiaotong University, China (e-mails: xq1216@stu.xjtu.edu.cn;
pyren@mail.xjtu.edu.cn; duqinghe@mail.xjtu.edu.cn). Houbing Song is with
the Department of Electrical and Computer Engineering, West Virginia
University, Montgomery, USA (e-mail: h.song@ieee.org).
Corresponding author: Pinyi Ren (email: pyren@mail.xjtu.edu.cn).
This work was supported by the National Natural Science Foundation of
China (NSFC) under Grant No. 61431011, the Research Fund for the Doctoral
Program of Higher Education of China under Grant No. 20120201110066 and
the Fundamental Research Funds for the Central Universities.
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
2
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
3
omit the proof here. The above conclusion implies that the
power 2 , i.e., = P/ 2 , with the assumption that the noise
scenario considered in this paper is a worse case.
power at all the receivers is the same. Denote the transmit
Although the introduction of relay can improve commuSNRs at the source and the relay as 1 and 2 , respectively.
nication reliability, it may bring a higher risk of information
An aggregate transmit power (transmit SNR) constraint 0 is
leakage since the message is transmitted for two times over the
assumed, i.e., 1 + 2 0 . According to the aforementioned
two-phase transmission. For traditional relay strategies such as
RF strategy, the source and the relay use different codebooks
DF or amplify-and-forward (AF), eavesdropper can enhance
to transmit the same confidential message. Therefore, we aim
the decoding capability by combining the two observations toto maximize the instantaneous secrecy rate with the given CSI
gether. However, by using the RF strategy, the combination of
of main links by optimizing the rates of the two codebooks
the two observations will not help recovering the confidential
and the power allocation between the source and relay. Based
message if the message in each phase is irrecoverable [32].
on the above discussions, the optimization problem can be
In other words, securing each phase of the transmission is
formulated as the problem P1 :
sufficient to ensure the security of the whole transmission.
Thus, the secure transmission probability for the relay network
max
Ts
(4a)
Rt,1 ,Rt,2 ,Rs ,1 ,2
can be written as
s.t.
Pout ,
(4b)
Psec = Psec,1 Psec,2 ,
(1)
0 Rt,1 CM,1 , 0 Rt,2 CM,2 , (4c)
where Psec,i (i = 1, 2) denotes the secure transmission
0 Rs min{Rt,1 , Rt,2 },
(4d)
probability for the ith phase.
1 + 2 0 , 1 0, 2 0,
(4e)
According to [32], RF strategy means that the source and the
relay use different codebooks with independent randomness, where Ts = 21 Rs is the secrecy rate which is half of the rate
and for each transmission phase the source (relay) adopts the of the confidential message due to the two-hop transmission.
well-known Wyners wiretap code [16]. The encoder needs The constraint in (4b) limits the secrecy outage probability, the
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
4
Main Link
Eavesdropping Link
Main Link
Eve
Eve
Eve
Eve
Relay
(R)
Source
(S)
Eavesdropping Link
Eve
Eve
Relay
(R)
Eve
Source
(S)
Phase 1
Eve
Destination
(D)
Phase 2
Destination
(D)
Fig. 1. System model: the source node S is transmitting confidential message to the destination node D with the help of a selected relay R. Randomly
distributed eavesdroppers are trying to intercept the message.
(5)
and
2
CM,2 = log2 1 + 2 |hRD | d
RD ,
(6)
respectively.
Similarly, due to the assumption of the non-colluding eavesdropping scenario, we only need to calculate the channel
capacity of the best eavesdropping link for each phase, respectively given as
2
CE,1 = log2 1 + max 1 hSEj dSEj
(7)
Ej E,1
and
CE,2
2
= log2 1 + max 2 hREj dREj .
Ej E,2
(8)
Y
Rs
2 1+1 |hSR |2 d
2
SR
= EE,1
Pr hSEj <
E,1
1 2Rs d
SEj
EjE,1
"
!#
2
Y
Rs
1 + 1 |hSR | d
SR 2
= EE,1
1 exp
1 2Rs d
SEj
EjE,1
!
Z2Z
2
Rs
1
+
|h
|
d
2
(a)
1
SR
SR
= exp E
r exp
drd
1 2Rs r
0 0
!
Rs
1 2
(b)
,
=exp
(9)
2
Rs
1 + 1 |hSR | d
SR 2
where = 2E (2/) / and = 2/. (a) is calculated in a
polar coordinate based on the probability generating functional
lemma over PPP [37]. In this coordinate, the source is located
at the origin and the location of Ej is denoted as (rj , j ) R2 .
(b) is obtained by using the formula [38, Eq. (3.326.2)].
Similarly, the secure transmission probability for the second
phase is given by
!
Rs
2 2
. (10)
Psec,2 = exp
2
Rs
1 + 2 |hRD | d
RD 2
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
5
By plugging (9) and (10) into (3), we obtain the secrecy outage
probability for the whole transmission as
"
1 2Rs
Pout = 1 exp
Rs
1 + 1 |hSR | d
SR 2
! !# (11)
2 2Rs
.
2
Rs
1 + 2 |hRD | d
RD 2
>
2
1
d
/
|h
SR
2
RD |
SR
RD
hold. When the transmission is carried out, one can validate
that Pout /1 < 0 and Pout /2 < 0, which shows
that the increase of transmit SNR will lower the secrecy
outage probability. This result seems not so intuitive since
the received SNR at eavesdropper rises with the increase of
transmit power, which will result in higher secrecy outage
probability. However, the capacity of the main link is also
enhanced, which enables higher codeword rate as well as
higher redundancy rate. Note that higher redundancy rate
can decrease the secrecy outage probability, as discussed in
Section II-A. After taking all these into consideration and
averaging the outage probability over eavesdroppers locations
and channel states, we find that it is still beneficial to improve
the transmit power.
In addition, since Pout /Rs > 0, the maximum Rs that
satisfies the outage probability constraint is reached when
Pout = . Then, according to the derivative rule for implicit
functions, we have
dRs
Pout
=
di
i
Pout
> 0, i = 1, 2.
Rs
(12)
This shows that improving the transmit power will enhance the
maximum rate of the confidential message, which completes
our proof.
Thus, we can use a power allocation parameter to describe
the power allocation scheme where 0 denotes the transmit
SNR of the source and (1 )0 denotes the transmit SNR of
the relay. The secrecy rate maximization problem P1 can now
be transformed into the following power allocation problem
P2 :
max
,Rs
s.t.
Ts
(13a)
Pout ,
0 1,
(13b)
(13c)
2
0
Pout = 1 exp
2
Rs
1 + 0 |hSR | d
SR 2
! !#
(1)0 2Rs
+
.
2
Rs
1+(1)0 |hRD | d
RD 2
(14)
The constraint in (4c) is omitted since we set the rate of the
transmitted codeword as the channel capacity. The constraint
in (4d) has been considered in the derivation process of Pout
so it is also omitted in the problem P2. We now give the
optimal solution to problem P2, as shown in the following
proposition.
channel gains of the main
Proposition
1: For the given
2
links h = |hSR | , |hRD | , only when h H can transmission be carried out. Denote the optimal power allocation
parameter as (h). The optimal rate settings are
1
+
(h)
|h
|
d
R
(h)
=
log
0
SR
2
t,1
SR ,
2
(h)
=
log
R
1
+
(1
(h))
|h
|
d
, (15)
0
RD
2
t,2
RD
s (, h) |= (h) ,
Rs (h) = R
2
1
RD
= 1.
2
Rs
1 + 0 |hSR | d
SR 2
(16)
Denote the maximum achievable secrecy rate for any given
s (, h). Thus, the maximum secrecy rate
by Ts (, h) = 12 R
for given main channel states is
(
1
2 Rs (h), h H,
(17)
Ts (h) = Ts (, h) |= (h) =
0,
h
/ H,
where the transmission set is
2
2
< .
H= h1exp dSR /|hSR | + dRD /|hRD |
(18)
Proof: Note that the above optimal settings are related
to h since we adjust transmission strategy based on main
channels instantaneous CSI. As mentioned in previous paragraphs, to maximize Rs , the transmitted codeword rate Rt,1
and Rt,2 should be set as the maximum value.
Hence, we
2
have Rt,1 = CM,1 = log2 1 + 0 |hSR | dSR and Rt,2 =
2
CM,2 = log2 1 + (1 )0 |hRD | d
RD . The derivation of
(h) is given as follows.
For any fixed , since Pout /Rs > 0, the maximum
s (, h),
achievable rate of confidential message, denoted as R
Rs (, h)
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
6
with which the capacities of main links in the two phases are
the same.
Proof: Substituting = 2 and = 1 into (16), we get
2
Rs
1 + (1 )0 |hRD | d2
RD 2
gout =
!
Rs
0 2
2
Rs
1+0 |hSR | d
SR 2
(1)0 2
Rs
Rs
1 + 0 |hSR | d2
SR 2
Rs
1+(1)0 |hRD | d
RD2
.
(20)
gout
Rs
, (21)
= 2 1
(1)I2+1
I1+1
2
Rs
where I1 = 1 + 0 |hSR | d
and I2 = 1 + (1
SR 2
2
)0 |hRD | dRD 2Rs . Note that 2Rs 1 0 always holds
since Rs 0. Hence, when
gout / 0, the following
inequality should hold, given as
1
1+
1
I2
1.
(22)
I1
|
{z
}
L()
(h) =
|hRD | d2
RD
2
2
|hSR | d2
SR + |hRD | dRD
(24)
= 1.
(25)
|hSR |
|hRD |
which does not depend on the total transmit SNR 0 or power
allocation parameter .
Proof: When 0 , the secrecy outage probability in
(14) can be simplified as
Pout |0 = =
1exp
2Rs
2
|hSR | d
SR
!
. (27)
+
2
|hRD | d
RD
2 Rs
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
7
2
= log2 1 + max 1
hSEj
d
SEj ,
Ej E,1
(29)
(31)
Y
1
(a)
= EE,1
(NE , cj )
(NE )
Ej E,1
Z
1
= exp E
1
(NE , cj ) dxEj
(NE )
R2
"
#
Z
NX
E 1 m
cj
(b)
cj
=exp E
e
dxEj
m!
R2
m=0
"
!
Z2Z
2
Rs
1+1 khSR k d
SR 2
= exp E
r exp
1 2Rs r
0 0
!m
#
NX
2
E 1
Rs
1 1+1 khSR k d
SR 2
drd
m!
1 2Rs r
m=0
!
NX
E 1
Rs
(m+)
1 2
2E
(c)
,
= exp
2
Rs
m=0
m!
1+1 khSR k d
SR 2
(32)
where (a) is obtained by using the formula [38, Eq. (8.350.1)]
(a, x) is the incomplete gamma function (a, x) =
Rand
x t a1
e
t
dt. (b) follows from the expression for (a, x)
0
in [38, Eq. (8.352.6)] when a is a positive integer. (c) is
calculated by the formula in [38, Eq. (3.326.2)] with the
variable transformation = 2/.
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
8
!
N
E1
Rs
X
(33)
(m+)
2 2
2E
.
exp
2
m=0 m!
1+2 khRD k dRD2Rs
According to the expression in (3), the secrecy outage
probability for the whole transmission can be derived as
!
"
1 2Rs
Pout = 1 exp
2
Rs
1+1 khSR k d
SR 2
! !#
2 2 R s
+
,
2
Rs
1 + 2 khRD k d
RD 2
(34)
where =
2E
NP
E 1
m=0
(m+)
.
m!
find that the secrecy outage probabilities for the two systems
have the similar expressions. Actually, (11) can be directly
obtained from (34) by setting NE = 1, after which we have
|NE =1 = . This is because the source and the destination
in both systems are equipped with single antenna, in which
case we can only transmit one data stream in the network.
Moreover, we only employ MRT beamforming at the multiantenna relay without broadcasting artificial noise. Thus, the
single-antenna system is a special case of the multi-antenna
system with NR = 1 and NE = 1.
Since the expression in (34) is similar to the expression
in (11), we can directly use the results given in Section III
to derive the optimal solution to problem P1 for the multiantenna system. Likewise, according to Lemma 1, we change
the inequality constraint in (4e) to an equality constraint
with power allocation parameter . Thus, the optimization
problem P1 can now be transformed into the following power
allocation problem P3 :
max
,Rs
s.t.
where Pout is given as
"
Pout = 1 exp
Ts
(35a)
Pout ,
0 1,
(35b)
(35c)
0 2Rs
Rs
1 + 0 khSR k d
SR 2
! !#
(1 )0 2Rs
.
2
Rs
1 + (1 )0 khRD k d
RD 2
(36)
The optimal solution to problem P3 can be directly obtained based on the Proposition 1. We omit the derivations here
and present the optimal solutions in the following proposition.
Proposition
2: For the given
channel gains of the main
2
2
links h = khSR k , khRD k , only when h H can transmission be carried out. Denote the optimal power allocation
parameter as (h). The optimal rate settings are
SR ,
2
R
(h)
=
log
1
+
(1
(h))
kh
k
d
, (37)
0
RD
2
t,2
RD
s (, h) |= (h) ,
Rs (h) = R
s (, h) is the unique root of Pout = for any given
where R
. The value of (h) is the unique root of the following
equation
!1+
1
2
Rs
1 + (1 )0 khRD k d
1
RD 2
= 1.
2
Rs
1 + 0 khSR k d
SR 2
(38)
Denote the maximum achievable secrecy rate for any given
s (, h). Thus, the maximum secrecy rate
by Ts (, h) = 12 R
for given main channel states is
(
1
2 Rs (h), h H,
Ts (h) = Ts (, h) |= (h) =
(39)
0,
h
/ H,
where the transmission set is
2
2
< .
H= h1exp dSR /khSRk + dRD /khRDk
(40)
Remark 1: The above proposition presents the optimal solution to problem P1 in a more generalized scenario where
both eavesdroppers and the relay are equipped with multiple
antennas. Therefore, in the following simulations we use the
results in Proposition 2 to validate the optimization of our
proposed scheme and evaluate the secrecy performance of the
relay system. Note that the two corollaries given in Section III
2
2
can also be generalized by replacing |hSR | and |hRD | with
2
2
khSR k and khRD k , respectively.
V. N UMERICAL R ESULTS
In this section, we present numerical results to evaluate the
secrecy performance of the relay transmission. As aforementioned, when the rate of transmitted codeword for each phase
is maximized, i.e., Rt,i = CM,i (i = 1, 2), the optimization
problem P1 is equivalent to the power allocation problem P3.
In this case, the transmission strategy is only determined by
and the optimal transmission scheme is simplified into the
optimal power allocation scheme. In the following simulations,
unless otherwise noted, the distances between legitimate nodes
is fixed as dSR = 6 m and dRD = 8 m, and the secrecy-outageprobability constraint is set as = 0.2.
First of all, we run Monte Carlo simulations to validate the
theoretical result given in (36). We consider a two dimensional
circular area with radius 2000 m. The source is located at the
origin (the center of the circle) of the polar coordinate and
the relay is located at (dSR , 0). Eavesdroppers are distributed
according to the PPP with E = 103 units/m2 . The total
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
9
0.8
1
Theoretical Result (NE = 1)
Monte Carlo Simulation (NE = 1)
0.9
0.7
0.6
0.7
Ts (, h) (bps/Hz)
0.8
0.6
0.5
0.4
0.2
0.5
0.4
0 = 30dB
E = 5 104 units/m2
0.3
0.2
=3
0 = 30dB
E = 103 units/m2
= 0.5
0.3
=2
=3
=4
= 2 Optimal
= 3 Optimal
= 4 Optimal
0.1
0
0.1
0
0.2
0.4
0.6
0.8
1.2
1.4
1.6
0.1
0.2
0.3
0.4
0.5
0.6
0.8
0.9
(a)
Fig. 2. Monte Carlo simulation results and the theoretical results for secrecy
outage probability.
1
0.9
-3
E = 0.510
-3
-3
E = 0.110 -3 Optimal
0.7
Ts (, h) (bps/Hz)
E = 0.110
E = 110
0.8
E = 0.510 -3 Optimal
E = 110 -3 Optimal
0.6
0.5
0.4
=3
0 = 30dB
0.3
0.2
0.1
0
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
(b)
1.1
1
0.9
0.8
Ts (, h) (bps/Hz)
0.7
0.7
=3
E = 5 104 units/m2
0.6
0.5
0.4
= 30dB
0
= 40dB
0
0.3
0 = 50dB
0.2
0 = 30dB Optimal
= 40dB Optimal
0
0.1
= 50dB Optimal
0
0
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
(c)
Fig. 3. Maximum achievable secrecy rate as a function of power allocation
parameter with different simulation settings. (a) Different path-loss exponents.
(b) Different densities of eavesdropper. (c) Different total transmit SNRs.
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
10
1.4
NR = 4
NE = 1
0.9
=3
0 = 30dB
E = 5 104 units/m2
=3
E = 5 104 units/m2
0.7
Equal number of
antennas at relay
and eavesdropper
0.6
0.5
1.2
NR = 2
NE = 1
NR = 32
NE = 32
0.4
NR = 64
NE = 64
NR = 4
NE = 4
0.3
Tsave ()(bps/Hz)
Tsave ( (h))(bps/Hz)
0.8
0.8
0.6
0.4
NR = 1
NE = 1
0.2
0.2
NR = 4
NE = 8
0.1
0
0
1
20
25
30
where Pt is the transmission probability. Note that the transmission set given by (40) is not a function of . Thus, we have
Pt = Pr {h H} for all power allocation schemes. Moreover,
it is easy to show that the distributions of main channel gains
2
2
are khSR k (NR , 1) and khRD k (NR , 1). However,
it is difficult to derive the closed-form expression for Tsave ()
since the expressions for Pt and Ts (, h) are complicated.
Thus, we only provide numerical results of Tsave () in the
text below.
Fig. 4 shows the average achievable secrecy throughput with
optimal power allocation (h) under different antenna setups.
It is observed that when NR > NE the secrecy throughput
40
45
50
1.4
dSD = 8m
1.2
Tsave ( (h))(bps/Hz)
35
0 (dB)
0.8
Direct
Transmission
0.6
Direct
Transmission
dSD = 12m
0.4
dSD = 15m
0.2
dSD = 18m
0
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
dSR /dSD
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
25
20
Tsave ( (h))
= 0.1 bps/Hz
15
20
10
0.9
0.7
0.3
S
10
-5
-10
0.1
0.5
15
y(m)
11
0.15
0.2
0.25
-15
Direct Transmission
Relay Transmission
0.3
0.35
0.4
Secrecy-Outage-Probability Constraint
(a)
-20
-20
=3
= 0.2
0 = 40dB
E = 5 104 units/m2
-15
-10
-5
10
15
20
x(m)
(b)
Fig. 7. Maximum achievable communication distance dSD for given required throughput Tsave ( (h)). (a) Comparisons between relay transmission and
direct transmission, where = 3, = 0.2, 0 = 40 dB, and E = 5 104 units/m2 . The relay is located at the midpoint between the source and the
destination. (b) Secure coverage range within two-hop transmission where the locations of the source and relay are fixed. All points on the same contour line
achieve the same secrecy throughput Tsave ( (h)).
we introduce two other allocation schemes as baseline algorithms. One is the equal power allocation scheme with eql =
0.5. The other is the capacity
balancing allocation scheme
with
2
2
2
bal = khRD k d
/
kh
k
d
+
kh
k
d
SR
RD
RD
SR
RD , which
makes the capacities of S R link and R D link equal.
As illustrated in Fig. 5, the optimal scheme outperforms the
two baseline schemes, especially the equal power allocation
scheme. Moreover, the performance difference between the
optimal scheme and the capacity balancing scheme is small,
which indicates that the optimal scheme also tends to equalize
the capacities of two main links, as discussed in Corollary 1
for the special case = 2. Thus, we can simply use the
suboptimal solution bal instead of opt without obvious performance loss. In addition, with the rise of 0 , the performance
differences among the three schemes are negligible, which
validates the analysis in Corollary 2.
Finally, we compare the secrecy performance of relay transmission with direct transmission, where the optimal power
allocation (h) is adopted for relay transmission. In order to
make a fair comparison which is independent of the number
of antennas, we assume a single-antenna relay and singleantenna eavesdroppers in the following simulations. For direct
transmission, similar to Lemma 1, it can also be proved that
all the transmit power should be utilized. Thus, the secrecy
outage probability can be derived as
!
Rs
2
0
direct
, (42)
Pout
= 1exp
2
Rs
1+0 |hSD | d
2
SD
where and are given in (34). Accordingly, for given
2
main channel gain h = |hSD | , the maximum achievable rate
of confidential message, denoted as Rs (h), is the root of
direct
Pout
= . Note that for direct transmission, the maximum
secrecy rate Ts (h) is the same as Rs (h) since there is only
one transmission phase. With some abuse of notation, we still
use Tsave () to denote the average achievable secrecy throughput for direct transmission although it is actually independent
of . The expression of Tsave () for direct transmission is
given by
Z
ave
Ts () = Pt
Ts (h) dh,
(43)
hH
< .
H = h 1 exp dSD / |hSD |
Fig. 6 depicts the average achievable secrecy throughput as
a function of relays location, where the source, relay, and the
destination lie on a straight line. It is observed that the optimal
location for relay is the midpoint between the source and the
destination. The points with dSR /dSD = 0 or dSR /dSD = 1
actually describe the performance of direct transmission. As
illustrated in Fig. 6, when the communication distance dSD
is short (e.g., dSD = 8 m), it is not wise to adopt relay
transmission. When the communication distance is long, relay
transmission can significantly increase the secrecy throughput.
This is because the retransmission of relay provides eavesdroppers additional chance to intercept the confidential message.
Thus, only when the propagation loss of direct link (SD link)
is large can relay transmission improve the secrecy throughput.
Fig. 7(a) makes a comparison of maximum achievable
communication distance between relay transmission and direct
transmission. Inspired by the results in Fig. 6, the relay is
always placed at the midpoint between the source and the
destination, namely, dSR = dRD = 12 dSD . It is observed that in
some cases relay transmission can enhance the communication
distance but in some cases it cannot. This is because the
high secrecy throughput limits the achievable communication
distance. With such short distance it is unnecessary to employ
a relay for message retransmission, which gives eavesdroppers
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
12
[3] Z. Su, Q. Xu, H. Zhu, and Y. Wang, A novel design for content delivery
over software defined mobile social networks, IEEE Network, vol. 29,
no. 4, pp. 6267, Jul. 2015.
[4] Z. Su, Q. Xu, and Q. Qi, Big data in mobile social networks: A QoEoriented framework, IEEE Network, vol. 30, no. 1, pp. 5257, Jan.
2016.
[5] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and
M. Ayyash, Internet of Things: A survey on enabling technologies,
protocols, and applications, IEEE Commun. Surv. Tutor., vol. 17, no. 4,
pp. 23472376, Nov. 2015.
[6] M. Weiser, The computer for the 21st century, Sci. Amer., vol. 265,
no. 3, pp. 94104, 1991.
[7] A. Gupta and R. K. Jha, A survey of 5G network: Architecture and
emerging technologies, IEEE Access, vol. 3, pp. 12061232, Aug. 2015.
[8] Q. Du, H. Song, Q. Xu, P. Ren, and L. Sun, Interference-controlled
D2D routing aided by knowledge extraction at cellular infrastructure
towards ubiquitous CPS, Personal and Ubiquitous Computing, vol. 19,
no. 7, pp. 10331043, Oct. 2015.
[9] P. Ren, Y. Wang, and Q. Du, CAD-MAC: A channel-aggregation diversity based MAC protocol for spectrum and energy efficient cognitive ad
hoc networks, IEEE J. Sel. Areas Commun., vol. 32, no. 2, pp. 237250,
Feb. 2014.
[10] S. L. Keoh, S. S. Kumar, and H. Tschofenig, Securing the Internet of
Things: A standardization perspective, IEEE IoT J., vol. 1, no. 3, pp.
265275, Jun. 2014.
[11] J. Granjal, E. Monteiro, and J. S. Silva, Security for the Internet of
Things: A survey of existing protocols and open research issues, IEEE
Commun. Surv. Tutor., vol. 17, no. 3, pp. 12941312, Aug. 2015.
[12] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. D. Renzo,
Safeguarding 5G wireless communication networks using physical
layer security, IEEE Commun. Mag., vol. 53, no. 4, pp. 2027, Apr.
2015.
[13] A. Mukherjee, Physical-layer security in the Internet of Things: Sensing
and communication confidentiality under resource constraints, Proc.
IEEE, vol. 103, no. 10, pp. 17471761, Oct. 2015.
[14] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, On secure wireless
communications for IoT under eavesdropper collusion, IEEE Trans.
Autom. Sci. Eng., vol. PP, no. 99, pp. 113, Dec. 2015.
[15] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst,
Principles of physical layer security in multiuser wireless networks:
A survey, IEEE Commun. Surv. Tutor., vol. 16, no. 3, pp. 15501573,
Aug. 2014.
[16] A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J., vol. 54, no. 8,
pp. 13551387, Oct. 1975.
[17] I. Csiszar and J. Korner, Broadcast channels with confidential messages, IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339348, May 1978.
[18] Y. Zou, X. Wang, and W. Shen, Optimal relay selection for physicallayer security in cooperative wireless networks, IEEE J. Sel. Areas
Commun., vol. 31, no. 10, pp. 20992111, Oct. 2013.
[19] S. Goel and R. Negi, Guaranteeing secrecy using artificial noise, IEEE
Trans. Wireless Commun., vol. 7, no. 6, pp. 21802189, Jun. 2008.
[20] W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, QoS-based transmit
beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach, IEEE Trans. Signal Process., vol. 59, no. 3, pp.
12021216, Mar. 2011.
[21] M. Hussain, Q. Du, L. Sun, and P. Ren, Security enhancement for video
transmission via noise aggregation in immersive systems, Multimedia
Tools and Applications, pp. 113, Sep. 2015.
[22] L. Sun, P. Ren, Q. Du, and Y. Wang, Fountain-coding aided strategy for
secure cooperative transmission in industrial wireless sensor networks,
IEEE Trans. Ind. Inf., vol. 12, no. 1, pp. 291300, Feb. 2016.
[23] I. Krikidis, J. S. Thompson, and S. Mclaughlin, Relay selection for
secure cooperative networks with jamming, IEEE Trans. Wireless
Commun., vol. 8, no. 10, pp. 50035011, Oct. 2009.
[24] J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, Joint relay and jammer
selection for secure two-way relay networks, IEEE Trans. Inf. Forensics
Secur., vol. 7, no. 1, pp. 310320, Feb. 2012.
[25] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, Improving wireless
physical layer security via cooperating relays, IEEE Trans. Signal
Process., vol. 58, no. 3, pp. 18751888, Mar. 2010.
[26] J. Li, A. P. Petropulu, and S. Weber, On cooperative relaying schemes
for wireless physical layer security, IEEE Trans. Signal Process.,
vol. 59, no. 10, pp. 49854997, Oct. 2011.
[27] T. X. Zheng, H. M. Wang, F. Liu, and M. H. Lee, Outage constrained
secrecy throughput maximization for DF relay networks, IEEE Trans.
Commun., vol. 63, no. 5, pp. 17411755, May 2015.
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2016.2575863, IEEE Access
13
2169-3536 (c) 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.