Physical-layer security enhancement method for wireless HetNets via transmission pair scheduling

Ding Xiaojin1,2 Song Tiecheng2 Zhang Gengxin1

(1Jiangsu Engineering Research Center of Communication and Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China)(2National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096)

AbstractIn order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pair is opportunistically chosen at the beginning of the transmission slot, which can be used to assist the transmissions of other SD pairs. Under this framework, a transmit antenna selection assisted opportunistic SD pair scheduling (TAS-OSDS) scheme is proposed, and the intercept probability (IP) of the proposed TAS-OSDS, the conventional round-robin source-destination pair scheduling (RSDS) and the conventional non-cooperation (non-coop) schemes is also analyzed, where the RSDS and non-coop schemes are used for comparison with the proposed TAS-OSDS. Numerical results show that increasing the number of the SD pairs can effectively reduce the IP of the TAS-OSDS scheme, whereas the IP of the RSDS and the non-coop remain unchanged with an increasing number of the SD pairs. Furthermore, the TAS-OSDS scheme achieves a lower IP than that of the RSDS and the non-coop schemes, showing the superiority of the proposed TAS-OSDS.

Key wordswireless heterogeneous network; physical-layer security;source-destination pair scheduling

Wireless heterogeneous networks are capable of increasing the efficiency and flexibility of wireless systems, which are composed of various independent subsystems[1-2]. In a heterogeneous wireless network, various subsystems may be allowed to perform their respective wireless transmissions simultaneously. However, due to the broadcast nature of radio propagation[3], and the open system architecture of heterogeneous wireless networks[4], the confidential messages may be vulnerable to eavesdropping attacks when they are transmitted by heterogeneous wireless systems independently. Thus, the risk of confidential messages being successfully eavesdropped upon will be increased significantly. As a result, more research efforts should be devoted to protecting wireless transmissions transmitted by heterogeneous wireless networks against malicious eavesdropping.

Physical-layer security (PLS) [5-6] emerges as an effective method to guard against wiretapping with the aid of its ability to exploit the physical characteristics of wireless channels. Recently, PLS has also been designed for spectrum-sharing aided heterogeneous networks[7-8]. Jamming schemes were investigated in Ref.[9]. To be specific, in order to impose an interference on the eavesdroppers, the jammers were invoked to transmit jamming signals, whereas the amount of the interference imposed on the scheduled users was considered to be below a threshold. Single-input multiple-output (SIMO) and multiple-input multiple-output (MIMO) techniques[10-11] have been investigated to decrease the secrecy outage probability of wireless transmissions. In Ref.[12], the antenna selection was conceived to improve the PLS of wireless transmissions in the presence of an eavesdropper.

In this paper, we investigate the PLS of a heterogeneous wireless network consisting of multiple SD pairs in the presence of an eavesdropper. Differing from Refs.[7-12], the cooperation between various SD pairs has been explored to defend against malicious eavesdropping relying on a conceived cooperative framework. Moreover, we propose an SD pair scheduling scheme to improve the PLS of wireless transmissions. The main contributions of this paper can be summarized as follows. First, a heterogeneous cooperative framework is conceived to protect wireless transmissions against eavesdropping with the aid of two stages. Secondly, we propose a specific SD pair scheduling scheme, called the TAS-OSDS. In the TAS-OSDS scheme, one antenna of the chosen SD will be selected to transmit the repacked data to enhance the PLS of the transmitted data. Finally, it is shown that the IP of TAS-OSDS scheme will be beneficially reduced by increasing the number of SD transmission pairs.

1 System Model and Opportunistic SD Scheduling

1.1 System model

As shown in Fig.1, we investigate a wireless system consisting of M source-destination (SD) pairs in the presence of an eavesdropper E, where an source node (SN) Sm has the ability to communicate both with its corresponding destination node (DN) Dm,m∈{1,2,…,M}, and with other SNs at different transmission stages. For notational convenience, the set of SD pairs is assumed to be denoted as Φ. E with the aid of a wide-band receiver is deployed to wiretap the signal transmitted by the legitimate SD pairs. Moreover, we also assume that all DNs are connected with each other through the core network, and thus, each DN has the ability to forward the received data to other DNs. Furthermore, Rayleigh fading is used to characterize both the main links (spanning from the legitimate transmitters to the legitimate receivers) and the wiretap links (spanning from the legitimate transmitters to the eavesdropper).

Fig.1 A heterogeneous wireless network with M multiple source-destination pairs in the presence of an eavesdropper

In order to improve the PLS of wireless transmissions of the multiple SD pairs, a heterogeneous cooperative framework is invoked with the aid of two stages. More specifically, at the beginning of the first stage, an SD pair will be chosen to be a transmitting node relying on the criterions of the RSDS and the TAS-OSDS schemes. Then, in order to help other SNs to forward their data, the chosen SD pair will receive the data of other SNs through a high-reliability low-power interface, and then repack the received data and its own data. At the second stage, the specifically selected SN may forward the repacked packet to its DN. After decoding the packet, the DN will send the sub-packets to the other DNs relying on the index of the pair in the sub-packet via the core network.

1.2 Signal model

Without loss of generality, Sm is assumed to be the selected transmitting node in the first stage. As mentioned above, other SNs will transmit their signal to Sm. Moreover, we also assume that only one antenna of Sk is chosen to transmit its data to Sm, which is represented by antenna i. Hence, the signal received at Sm transmitted by Sk, kΦ-{m}, can be shown as

(1)

where Ps, xk, hskismj and nsm are the transmit power of Sk, the transmit signal of Sk, the instantaneous channel gain of the Ski-Smj link, and the thermal noise received at Sm, respectively. Moreover, NT is the number of antennas of Sm. Meanwhile, since the broadcast nature of radio propagation, E may also overhear the signal transmitted by Sk, which can be given as

(2)

where ne represents the thermal noise encountered at E, and hskieldenotes the channel gain of Ski-El link.

From Eq.(2), and using maximal-ratio combining (MRC), we can obtain the channel capacity of the Sk-E link as

(3)

where denotes the received signal-to-noise (SNR) at E of the Sk-E link; N0 denotes the variance of thermal noise of Dm and E; and NE denote the number of antennas of E.

In the second stage, we also assume that one antenna of Sm is invoked for forwarding the received data to Dm. Without loss of generality, we assume that the antenna i of Sm, i∈{1,2,…,NT}, is chosen to transmit packet xs to Dm. Hence, the signal received at Dm can be expressed as

(4)

where hsmidmj and ndm denote the channel gain of the Smi-Dmj link, and the thermal noise encountered at Sm, respectively. Moreover, NR denotes the number of antennas of Dm, and Pt represents the transmit power of Sm.

Similarly to Eq.(2), E may overhear the signal transmitted by Sm, which is

(5)

where hsmieldenotes the channel gain of the Smi-El link.

With the aid of Eq.(4) and MRC, the instantaneous channel capacity of the Sm-Dm link can be obtained as

Csmdm=log2(1+γsmdm)

(6)

Utilizing Eq.(5) and MRC, we can obtain the instantaneous channel capacity of the Sm-E link as

(7)

From Eq.(3) and Eq.(7), and utilizing the maximum of individual channel capacity of the Sm-E and Sk-E links in the first and second stages, we can obtain the overall capacity of the signal from Sk as

(8)

In contrast, since the signal from Sm is only transmitted at the second stage, the overall capacity of the signal of Sm can still be given as

(9)

Noting that given the chosen transmission pair, the signal of the chosen SD will only be overheard by E once, due to the fact that it is only transmitted at the second stage. Differing from the chosen SD, the signal of other SDs will be overheard both in the first state and in the second stage, which are represented by Eq.(2) and Eq.(5), respectively.

1.3 TAS assisted opportunistic SD scheduling scheme

In this subsection, a TAS assisted opportunistic SD scheduling (TAS-OSDS) scheme is proposed. Specifically, in order to enhance the PLS of wireless transmissions of multiple SD pairs, an SN with the maximal channel capacity in set Φ will be chosen to be as the transmitting node at the given time slot, which will help other SNs to forward their data to their DNs. Hence, relying on Eq.(6), the SD pair scheduling criterion of the TAS-OSDS scheme can be shown as

(10)

where o represents the index of the chosen SD pair in the TAS-OSDS scheme, and a denotes the index of the selected antenna of the chosen So. Moreover, Eq.(10) can be rewritten as

(11)

which can be performed in a distributed manner. The processing procedure of the TAS-OSDS scheme is shown as follows:

1) Assume that the number of SD pairs is M, and each SN is required to maintain NT timers.

2) At the beginning of the first stage, the TAS-OSDS scheme will be triggered.

3) Each SD estimates the instantaneous channel state information, and the initial value of each timer is set inversely proportionally to Thus, o and a can be determined, according to which the timer becomes zero first.

4) So will notify other SNs that it is the optimal node via broadcasting a notification. Then, other SNs transmit their data to So, which will repack the received data and their own data.

5) At the second stage, So will forward the repacked data to its corresponding DN relying on a-th antenna of So. Once the transmission is finished, Do will send other SNs’ data to their corresponding DNs relying on the core network.

2 Intercept Probability Analysis over Rayleigh Fading Channels

In this section, we analyze the intercept probability of the RSDS and TAS-OSDS schemes over Rayleigh fading channels.

2.1 Conventional RSDS scheme

As a benchmarking scheme, we present the IP analysis of the traditional RSDS scheme. With the conventional RSDS scheme, each SD pair in set Φ has the same chance to be chosen to transmit at the given time slot. Based on the definition of the IP[12], the IP of the signal from Sm and Sk in the first and second stages for the RSDS scheme relying on the Sm-Dm pair can be shown as

(12)

and

(13)

Combining Eqs.(6), (8) and (9), we can obtain

(14)

and

(15)

where Δ1=Pt/Ps. Additionally, from Eqs.(14) and (15), we can see that SD pairs are selected without taking the random variables (RVs) for i∈{1,2,…,NT}, j∈{1,2,…,NR}, are independent and identically distributed (i.i.d.) RVs having the same mean Similarly, the fading coefficients of the wiretap links |hsmiel|2 for i∈{1,2,…,NT}, l∈{1,2,…,NE}, are also assumed to be i.i.d RVs with the same average channel gain Then, denoting due to RVs can be shown as

FU(x1)fX1(x1)dx1

(16)

=

(17)

respectively, where FU(u) is the cumulative distribution function (CDF) of RV U, and fX1(x1) and fX2(x2) are the probability density function (PDF) of RVs X1 and X2, respectively. Based on Ref.[8], they can be given by

(18)

(19)

(20)

Substituting Eqs. (18) and (19) into Eq. (16) yields

(21)

Substituting Eqs.(18), (19) and (20) into Eq.(17) yields

(22)

where

dkd=

ckm=

We assume that each SD has the same weighting coefficient. Hence, the IP of the investigated system relying on Sm can be defined as

(23)

As previously mentioned, each SD pair can be selected to transmit with equal opportunity in the RSDS scheme. Moreover, relying on the law of total probability[13], the IP of the multiple SD pairs in the RSDS scheme can be given by

(24)

2.2 Proposed TAS-OSDS scheme

This subsection presents the IP analysis of the TAS-OSDS scheme. As shown in Eq.(10), the index of the chosen SD pair is denoted by o in the scheme. Hence, with the aid of the TAS-OSDS scheme, the IP of the signal transmitted by So and Sk can be formulated as

(25)

and

(26)

Using Eqs.(6) to (9), Eqs.(25) and (26) can be rewritten as

(27)

and


(28)

respectively, where Λ1=Pt/Ps. Based on Eq.(11), we can obtain

(29)

(30)

Moreover, denoting due to RVs Q, W1 and W2 being independent of each other, can be formulated as

(31)

(32)

Based on Ref.[10], FQ(w), fW1(w1) and fW2(w2) can be given as

(33)

(34)

(35)

Using Ref.[11] and substituting Eqs. (33) and (34) into Eq.(31) yields

(36)

Using Eqs.(33), (34) and (35), Eq.(32) can be obtained as

(37)

Then, with the aid of the definition in Eq.(23), the IP of the multiple SD pairs aided by the proposed TAS-OSDS scheme can be given by

(38)

From Eq.(38), we can not only evaluate the PLS of wireless transmissions, but also investigate the effects of the channel gain, the number of antennas, and the number of source-destination (SD) pairs on the attainable PLS level of wireless transmissions.

3 Numerical Results

In this section, we evaluate the IP of the proposed TAS-OSDS by comparing this scheme with the conventional RSDS scheme. In this evaluation, the analytic IP of the RSDS and TAS-OSDS schemes are evaluated by plotting Eq.(24) and Eq.(38), respectively. Moreover, we assume that the main-to-eavesdropper ratio (MER) For comparison purposes, the traditional non-cooperation (non-coop) transmission scheme is also presented, wherein the SD pairs work independently. For the sake of fair comparison of the above mentioned schemes, we assume that each pair only occupies 1/M times bandwidth of the whole spectrum. In contrast, the transmission SD pair can occupy the total shared spectrum due to only one SD pair being selected to perform transmission at the given transmission slot in the investigated cooperative method. Hence, the IP of the non-coop scheme is shown as

(39)

Similarly to Eq. (36), can be obtained as

=

(40)

Fig.2 shows the IP vs. MER of the traditional RSDS, non-coop as well as of the proposed TAS-OSDS schemes for different (NT,NR,NE) by plotting Eq.(24), Eq.(40) and Eq.(38), as a function of the MER. It is shown in Fig.2 that as the number of antennas (NT,NR,NE) increases from (NT,NR,NE)=(1,1,1) to (2,2,2), the IP of the RSDS, non-coop and TAS-OSDS schemes will be reduced correspondingly, which confirms that the PLS of wireless transmissions can be enhanced by increasing the number of antennas of the SD pairs. Moreover, Fig.2 also shows that although the IP of all schemes will be decreased as the MER increases from -10 to 15 dB, the proposed TAS-OSDS schemes can still achieve the lowest IP among the RSDS, non-coop, and TAS-OSDS schemes. Hence, at a given IP constraint, the proposed TAS-OSDS scheme can be used to guarantee the PLS of wireless transmission in a lower MER case.

Fig.2 Comparison of intercept probabilities under different MERs

Fig.3 illustrates the IP vs. the number of source-destination pairs M of the traditional RSDS, non-coop and the TAS-OSDS schemes for different numbers of antennas of E. As shown in Fig.3, increasing the number of antennas of E will increase the risk of the wireless transmission being eavesdropped upon successfully in the traditional RSDS, non-coop and the TAS-OSDS schemes, whereas the IP of the TAS-OSDS is lower than that of both the RSDS and non-coop schemes. Furthermore, it can be seen from Fig.3 that although the PLS of wireless transmissions will be degraded, the IP of wireless transmissions will be significantly decreased relying on increasing the number of SD pairs in the proposed scheme, demonstrating the superiority of the proposed TAS-OSDS scheme. This is due to the fact that the cooperation between SD pairs will be more beneficial for increasing the PLS of wireless transmissions in the proposed TAS-OSDS scheme, whereas no benefit can be achieved in either the RSDS or non-coop schemes.

Fig.3 Intercept probability with respect to the number of SD pairs M

4 Conclusion

1) In this paper, we study PLS for a heterogeneous wireless network including multiple SD pairs in the presence of an eavesdropper, where the SD pairs access the shared spectrum in a dynamic manner.

2) We explore a cooperation framework for SD pairs to protect against eavesdropping attacks. Specifically, an SD pair is chosen as the transmitting pair at the beginning of the given transmission slot, then it participates in collaborative transmitting among the SD pairs. Moreover, the IPs of the proposed TAS-OSDS as well as the conventional RSDS schemes are analyzed for comparison purposes.

3) It is shown that the TAS-OSDS scheme achieves a better IP performance than that of the RSDS and conventional non-cooperation schemes, where each source communicates with its corresponding destination without co-operating with other SD pairs in the non-cooperation scheme. Furthermore, with an increasing number of the SD pairs, the IP of the TAS-OSDS scheme will be reduced clearly.

References

[1] Kibria M G, Nguyen K, Villardi G P, et al. A stochastic geometry analysis of multiconnectivity in heterogeneous wireless networks[J]. IEEE Transactions on Vehicular Technology, 2018, 67(10): 9734-9746. DOI:10.1109/tvt.2018.2863280.

[2] Sharma D, Bhondekar A P. Traffic and energy aware routing for heterogeneous wireless sensor networks[J]. IEEE Communications Letters, 2018, 22(8): 1608-1611. DOI:10.1109/lcomm.2018.2841911.

[3] Zou Y L, Sun M, Zhu J, et al. Security-reliability tradeoff for distributed antenna systems in heterogeneous cellular networks[J]. IEEE Transactions on Wireless Communications, 2018, 17(12): 8444-8456. DOI:10.1109/twc.2018.2877610.

[4] Lv T, Gao H, Yang S S. Secrecy transmit beamforming for heterogeneous networks[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(6): 1154-1170. DOI:10.1109/jsac.2015.2416984.

[5] Wyner A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. DOI:10.1002/j.1538-7305.1975.tb02040.x.

[6] Leung-Yan-Cheong S K, Hellman M E. The Gaussian wiretap channel [J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-456. DOI:10.1109/tit.1978.1055917.

[7] Xu L, Cai L, Gao Y S, et al. Security-aware proportional fairness resource allocation for cognitive heterogeneous networks[J]. IEEE Transactions on Vehicular Technology, 2018, 67(12): 11694-11704. DOI:10.1109/tvt.2018.2873139.

[8] Zou Y L. Physical-layer security for spectrum sharing systems[J]. IEEE Transactions on Wireless Communications, 2017, 16(2): 1319-1329. DOI:10.1109/twc.2016.2645200.

[9] Tang W J, Feng S L, Ding Y H, et al. Physical layer security in heterogeneous networks with jammer selection and full-duplex users[J]. IEEE Transactions on Wireless Communications, 2017, 16(12): 7982-7995. DOI:10.1109/twc.2017.2755640.

[10] Bang I, Kim S M, Sung D K. Artificial noise-aided user scheduling from the perspective of secrecy outage probability[J]. IEEE Transactions on Vehicular Technology, 2018, 67(8): 7816-7820. DOI:10.1109/tvt.2018.2834562.

[11] Lei H J, Xu M, Ansari I S, et al. On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection[J]. IEEE Transactions on Green Communications and Networking, 2017, 1(2): 192-203. DOI:10.1109/tgcn.2017.2684827.

[12] He D X, Liu C X, Quek T Q S, et al. Transmit antenna selection in MIMO wiretap channels: A machine learning approach[J]. IEEE Wireless Communications Letters, 2018, 7(4): 634-637. DOI:10.1109/lwc.2018.2805902.

[13] Zou Y L, Zhu J, Zheng B Y, et al. An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks[J]. IEEE Transactions on Signal Processing, 2010, 58(10): 5438-5445. DOI:10.1109/tsp.2010.2053708.

无线异构网络中基于传输节点对调度的物理层安全增强方法

丁晓进1,2 宋铁成2 张更新1

(1南京邮电大学江苏省通信与网络技术工程研究中心,南京 210003) (2东南大学移动通信国家重点实验室,南京 210096)

摘要:为了增强无线异构网络中数据传输的物理层安全性能,采用了一个基于两阶段传输的协作框架.在传输时隙开始时,一个源节点-目的节点对将会被机会式选择,并被用于辅助其他源节点-目的节点对传输数据.在该协作框架下,提出了一种发射天线选择辅助的源节点-目的节点对调度方案,并分析了该方案、传统源节点-目的节点对轮询调度方案及传统非协作方案的窃听概率,其中传统轮询调度方案和非协作方案被用于与所提发射天线选择辅助的源节点-目的节点调度方案进行对比.数值结果表明,增加源节点-目的节点对的数量可以有效降低所提方案的窃听概率,而传统轮询调度方案和非合作方案的窃听概率随着源节点-目的节点对数量的增加而没有变化.此外,所提方案能够比轮询调度方案和非合作方案取得更低的窃听概率,显示了所提方案的优越性.

关键词:无线异构网络;物理层安全;源-目的节点对调度

DOI:10.3969/j.issn.1003-7985.2019.03.007

Received 2019-02-01, Revised 2019-07-20.

Biographies:Ding Xiaojin(1981—), male, doctor, lecturer; Song Tiecheng (corresponding author), male, doctor, professor, songtc@seu.edu.cn.

Foundation items:The National Natural Science Foundation of China (No.91738201), the China Postdoctoral Science Foundation (No.2018M632347), the Natural Science Research of Higher Education Institutions of Jiangsu Province (No.18KJB510030), the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (No.2018D16), the Open Research Fund of Jiangsu Engineering Research Center of Communication and Network Technology, NJUPT.

CitationDing Xiaojin, Song Tiecheng, Zhang Gengxin.Physical-layer security enhancement method for wireless HetNets via transmission pair scheduling[J].Journal of Southeast University (English Edition),2019,35(3):318-324.DOI:10.3969/j.issn.1003-7985.2019.03.007.

中图分类号:TN929.5