Contact Us Search Paper

Security-Reliability Tradeoffs for Dual-Hop Satellite Communication Systems with AF Relaying Protocol

Yeqiu Xiao1,2, Jin Liu1,2, and Shuangrui Zhao3,4,*

Corresponding Author:

Shuangrui Zhao

Affiliation(s):

1 School of Computer Science and Engineering, Xi’an University of Technology, Xi’an, 710048, China

2 Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an, 710048, China

3 School of Computer Science and Technology, Xidian University, Xi’an, 710071, China

4 Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi’an, 710071, China

*Corresponding author

Abstract:

Satellite communication systems serve as an indispensable component of heterogeneous wireless networks in the next generation era for providing various critical civil and military applications. However, due to the broadcast nature and full accessibility of the wireless medium, such systems exist serious security threats. As an effort to address this issue, this paper, for the first time, investigates secure communication in a dual-hop communication system consisting of a satellite working as an amplified-and-forward relay. We first provide the theoretical modeling to analyze the fundamental system metrics in terms of secrecy outage probability and connection outage probability. By using the modeling, we then study the security-reliability tradeoffs and propose to transmit power schemes depending on the search algorithm. We further analyze asymptotic expressions of outage performance, which was further utilized to simplify the transmit power schemes. Simulation results show the validation of the proposed secure transmission model and design schemes of transmit power. Results also illustrate that transmit power schemes based on asymptotic analysis effectively achieve the optimal performance for the relay satellite communication system.

Keywords:

Dual-hop satellite communication, physical layer security, secrecy outage probability, connection outage probability, security-reliability tradeoffs

Downloads: 89 Views: 675
Cite This Paper:

Yeqiu Xiao, Jin Liu, and Shuangrui Zhao (2022). Security-Reliability Tradeoffs for Dual-Hop Satellite Communication Systems with AF Relaying Protocol. Journal of Networking and Network Applications, Volume 2, Issue 2, pp. 68–77. https://doi.org/10.33969/J-NaNA.2022.020202.

References:

[1] Y. Xu, J. Liu, Y. Shen, J. Liu, X. Jiang, and T. Taleb, “Incentive jamming-based secure routing in decentralized internet of things,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 3000–3013, 2020.

[2] A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, 1975.

[3] S. Zhao, J. Liu, Y. Shen, X. Jiang, and N. Shiratori, “Secure and energy-efficient precoding for mimo two-way untrusted relay systems,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3371–3386, 2021.

[4] D. K. Petraki, M. P. Anastasopoulos, and S. Papavassiliou, “Secrecy capacity for satellite networks under rain fading,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 5, pp. 777–782, 2010.

[5] G. Zheng, P.-D. Arapoglou, and B. Ottersten, “Physical layer security in multibeam satellite systems,” IEEE Transactions on wireless commu-nications, vol. 11, no. 2, pp. 852–863, 2011.

[6] W. Lu, K. An, and T. Liang, “Robust beamforming design for sum secrecy rate maximization in multibeam satellite systems,” IEEE Trans-actions on Aerospace and Electronic Systems, vol. 55, no. 3, pp. 1568–1572, 2019.

[7] R. Wang and F. Zhou, “Physical layer security for land mobile satellite communication networks with user cooperation,” IEEE Access, vol. 7, pp. 29 495–29 505, 2019.

[8] V. Bankey and P. K. Upadhyay, “Physical layer security of multiuser multirelay hybrid satellite-terrestrial relay networks,” IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2488–2501, 2019.

[9] P. Yan, Y. Zou, X. Ding, and J. Zhu, “Energy-aware relay selection improves security-reliability tradeoff in energy harvesting cooperative cognitive radio systems,” IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 5115–5128, 2020.

[10] Z. Cao, X. Ji, J. Wang, S. Zhang, Y. Ji, and J. Wang, “Security-reliability tradeoff analysis for underlay cognitive two-way relay networks,” IEEE Transactions on Wireless Communications, vol. 18, no. 12, pp. 6030–6042, 2019.

[11] Y. Zou, M. Sun, J. Zhu, and H. Guo, “Security-reliability tradeoff for distributed antenna systems in heterogeneous cellular networks,” IEEE Transactions on Wireless Communications, vol. 17, no. 12, pp. 8444–8456, 2018.

[12] M. Lin, Q. Huang, T. de Cola, J.-B. Wang, J. Wang, M. Guizani, and J.-Y. Wang, “Integrated 5g-satellite networks: A perspective on physical layer reliability and security,” IEEE Wireless Communications, vol. 27, no. 6, pp. 152–159, 2020.

[13] B. Li, Z. Fei, C. Zhou, and Y. Zhang, “Physical-layer security in space information networks: A survey,” IEEE Internet of things journal, vol. 7, no. 1, pp. 33–52, 2019.

[14] L. Bai, L. Zhu, X. Zhang, W. Zhang, and Q. Yu, “Multi-satellite relay transmission in 5g: Concepts, techniques, and challenges,” IEEE Network, vol. 32, no. 5, pp. 38–44, 2018.

[15] N. I. Miridakis, D. D. Vergados, and A. Michalas, “Dual-hop com-munication over a satellite relay and shadowed rician channels,” IEEE Transactions on Vehicular Technology, vol. 64, no. 9, pp. 4031–4040, 2014.

[16] K. Guo, D. Guo, Y. Huang, X. Wang, and B. Zhang, “Performance anal-ysis of a dual-hop satellite relay network with hardware impairments,” in Proc. of 25th Wireless and Optical Communication Conference (WOCC). IEEE, 2016, pp. 1–5.

[17] R. Xu, X. Da, H. Hu, Y. Liang, and L. Ni, “Power and time slot allocation method for secured satellite transmission based on weighted fractional data carrying artificial noise,” IEEE Access, vol. 6, pp. 65 043–65 054, 2018.

[18] R. Xu, X. Da, H. Hu, L. Ni, and Y. Pan, “A secure hybrid satellite-terrestrial communication network with af/df and relay selection,” IEEE Access, vol. 7, pp. 171 980–171 994, 2019.

[19] Y. Xu, J. Liu, Y. Shen, X. Jiang, and N. Shiratori, “Physical layer security-aware routing and performance tradeoffs in ad hoc networks,” Computer Networks, vol. 123, pp. 77–87, 2017.

[20] A. Abdi, W. C. Lau, M.-S. Alouini, and M. Kaveh, “A new simple model for land mobile satellite channels: First-and second-order statistics,” IEEE Transactions on Wireless Communications, vol. 2, no. 3, pp. 519–528, 2003.

[21] R. H. Y. Louie, Y. Li, H. A. Suraweera, and B. Vucetic, “Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation,” IEEE Trans. Wirel. Commun., vol. 8, no. 6, pp. 3132–3141, 2009. [Online]. Available: https://doi.org/10.1109/TWC.2009.080807.

[22] A. M. Salhab, F. S. Al-Qahtani, S. A. Zummo, and H. M. Alnuweiri, “Performance analysis of amplify-and-forward relay systems with interference-limited destination in various rician fading channels,” Wirel. Pers. Commun., vol. 77, no. 3, pp. 1751–1773, 2014. [Online]. Available: https://doi.org/10.1007/s11277-014-1607-4

[23] I. Wolfram Research, Mathematica,Version 12.1. Champaign, IL, 2020.

[24] I. S. Gradshteyn, I. M. Ryzhik, I. S. Gradshteyn, and I. M. Ryzhik, -Table of Integrals, Series, and Products (Eighth Edition), 1980, vol. 20, no. 96.