Abstract

In this paper, we investigate the physical-layer security in an energy-harvesting (EH) multiuser network with the help of a friendly jammer (J), where multiple eavesdroppers are considered to tap the information transmission from users (Us) to base station (BS). In this system, a power beacon (PB) transmits radio frequency (RF) signals to Us for charging. In order to enhance the security of wireless transmission, we propose non-energy-aware multiuser scheduling (NEAMUS) scheme and energy-aware multiuser scheduling (EAMUS) scheme. For the purpose of comparison, we introduce conventional round robin multiuser scheduling (CRRMUS) scheme. The closed-form outage probability (OP) and intercept probability (IP) expressions of NEAMUS, EAMUS, and CRRMUS schemes are derived over Rayleigh fading channels. Additionally, we analyze the security-reliability tradeoff (SRT) of NEAMUS, EAMUS, and CRRMUS schemes in terms of OP and IP. Numerical results show that the proposed EAMUS scheme is superior to the CRRMUS scheme and NEAMUS scheme in terms of SRT, demonstrating the advantage of the proposed EAMUS scheme in improving the physical-layer security and reliability. Moreover, SRT performance of NEAMUS and EAMUS schemes can also be improved by increasing the number of users.

1. Introduction

1.1. Background

With the rapid development of IOT and wireless communications [14], the energy supply of devices will face great challenges. Since mobile terminals are generally powered by the energy limited batteries instead of fixed power sources. Energy harvesting (EH), which can capture energy from surrounding environments such as wind energy, solar energy, and radio frequency (RF) energy, is regarded as a promising technology to enhance energy efficiency of mobile terminals and has been widely used in wireless communications [57]. Simultaneous wireless information and power transfer (SWIPT) transmits both message and energy to destinations [8]. Typically, there are two widely adopted SWIPT protocols, namely, time-switching protocol (TSP) and power-splitting protocol (PSP) [9]. Specifically, TSP divides the transmission timeslot into two phases. The devices harvest energy from received RF signals in the first phase and the harvested energy is used for information transmission in the remaining phase. By contrast, in PSP, the power splitter is used to divide the received RF signal power into two parts, one for information processing and the remaining for energy harvesting [10].

Wireless security has attracted more and more attention of researchers in recent years [1113]. Due to the broadcast characteristics of wireless links, legitimate transmission is more vulnerable to eavesdropping attacks. Traditional wireless security protocol is based on cryptographic technologies, which use the public-private key pair to encrypt the data in the network layer. However, traditional cryptographic technologies impose extra computational overhead and additional system complexity. As an alternative, physical-layer security [1417], which relies on utilizing the characteristics of wireless links to against eavesdropping attacks, is a promising technology to improve wireless transmission security. In [18], Wyner proposed the concept of secrecy capacity, which refers to the difference between the main link capacity (spanning from sources to destinations) and the wiretap link capacity (spanning from sources to eavesdroppers). Furthermore, Wyner also proved that an eavesdropping event happens when the secrecy capacity is lower than zero, which will lead to the insecure transmission of information.

1.2. Related Works

For the past few years, various signal processing methods have been introduced to improve physical-layer security. In [19, 20], multiple-input-multiple-output (MIMO) scheme was presented to enhance secrecy capacity of the wireless network. Relay selection technologies [21, 22] were invoked for the sake of enhancing wireless security against eavesdropping attack by selecting an optimal relay to forward information. User scheduling schemes [23, 24] were conceived for achieving high security of wireless transmission. Additionally, jamming technologies [25, 26] were introduced to improve the secrecy performance against eavesdropping attacks by transmitting artificial noise to eavesdroppers. In [27], a user scheduling scheme based on optimal friendly jammer selection is proposed in the multiuser uplink network by combining jamming technology with user scheduling technology. Moreover, the simulated results showed that the combination of jamming and user scheduling technologies indeed enhances the physical-layer security. Additionally, Yan et al. proposed optimal and suboptimal antenna selection schemes in [28] for improving the wireless transmission security in MIMO networks. The results indicated that the antenna selection schemes can improve secrecy performance in MIMO networks.

As a further development, the combination of physical-layer security and EH networks has been drawing an increasing attention [2935]. In [29], the authors studied wireless security of multiuser scheduling aided EH cognitive radio system. Security and reliability tradeoff of proposed user scheduling schemes was analyzed in terms of outage probability and intercept probability. Additionally, in [30], multiantenna transmission schemes were proposed to protect the secure transmission between legitimate user and base station. Furthermore, the secrecy outage probability and average secrecy rate expressions of both proposed schemes were obtained. Differing from [29, 30], where friendly jammers were not used against eavesdropping attacks, [3134] investigated the physical-layer security with the aid of friendly jammers. Specifically, in [31], EH jammer selection schemes were investigated in uplink non-orthogonal multiple access (NOMA) networks. In order to enhance physical-layer security, the authors proposed random EH jammer selection (REJS), maximal EH jammer selection (MEJS), and optimal EH jammer selection (OEJS) schemes. Numerical results showed that the proposed OEJS scheme is better than conventional scheme without a jammer. In [32], a communication protocol was presented in EH jammer aided wireless networks to enable secure communication. Under the constraint of secrecy outage probability, the authors optimized the rate parameters to obtain the best throughput. For improving the security of EH wireless system, [33] selected a pair of intermediate nodes as a jammer and a relay to send jamming and legitimate messages to the eavesdropper and legitimate user, respectively. The secrecy outage probability was derived over Rayleigh fading channels. And in [34], the authors proposed an optimal sensor scheduling scheme to improve the security in energy harvesting wireless sensor networks.

In this paper, we study the physical-layer security for a multiuser EH wireless network consisting of multiple EH users (Us) in the face of multiple eavesdroppers (Es), where the Us, powered by a dedicated power beacon (PB), communicate with a base station (BS) with the help of a friendly jammer (J). In contrast to [2934], we consider multiple users, multiple eavesdroppers, and a friendly jammer in this paper. Moreover, the Es and BS are equipped with multiple antennas. The main contributions of this paper can be summarized as follows:(i)We propose the non-energy-aware multiuser scheduling (NEAMUS) scheme and energy-aware multiuser scheduling (EAMUS) scheme in EH wireless network to protect the secure transmission of information from Us to BS. Specifically, in the NEAMUS scheme, the user maximizing the main link gain of Us-BS will be selected to transmit signals. By contrast, the user maximizing the capacity of main link spanning from Us to BS will be chosen for information transmission in EAMUS scheme, which relies on both the main channel gain of Us-BS and the harvested energy.(ii)We derive the closed-form outage probability (OP) and intercept probability (IP) expressions of NEAMUS and EAMUS schemes. For the purpose of comparison, we examine the OP and IP of the conventional round robin multiuser scheduling (CRRMUS) scheme. We further analysis the security-reliability tradeoff (SRT) of EAMUS, NEAMUS, and CRRMUS schemes. It is shown that the EAMUS scheme is better than NEAMUS and CRRMUS schemes in terms of SRT.(iii)In [34], the authors have been proposed the best-node scheduling scheme, which corresponds to the NEAMUS scheme as introduced in this paper. Differing from [34], we propose EAMUS scheme, which significantly performs better than NEAMUS scheme in terms of SRT. Moreover, we consider the Es and BS are equipped with multiple antennas, which is much more challenging and more practical to analyze the secrecy performance. Additionally, [34] have assumed that the eavesdroppers work independently, but colluding eavesdroppers are considered in our paper.

The rest of this paper is organized as follows. In Section 2, we introduce the system model of an EH multiuser wireless network in the face of multiple eavesdroppers. Section 3 analyzes the SRT performance of the CRRMUS, NEAMUS, and EAMUS schemes in terms of IP versus OP over Rayleigh fading channels. In Section 4, we provide the numerical results and discussions. Finally, we conclude this paper in Section 5.

2. System Model and Problem Formulation

2.1. System Model

As shown in Figure 1, we present an EH wireless network where Us, denoted by , , communicate with a BS in the face of Es, denoted by , , with the help of a friendly jammer (J). Each is equipped with an energy harvester to harvest energy from a PB in the EH phase. The system model shown in Figure 1 can be applied to the scenarios such as mobile communications networks and wireless sensor networks with energy harvesting. We assume that the BS and Es are equipped with and receiving antennas, respectively, while PB and each only have a single antenna. Additionally, all wireless channels are subject to independent quasi-static Rayleigh fading [32], where the black solid lines, the black dashed lines, the black dot dashed lines, and red dot dashed lines denote the main links (spanning from Us to BS), wiretap links (spanning from Us to Es), energy links (spanning from PB to Us), and artificial-noise links (spanning from J to BS and Es), respectively. Let , , and , , , , and , respectively, represent the frequency non-selective Rayleigh fading channel coefficients of the , , , and links, and and denote the th antenna of the BS and th antenna of , respectively. The , , , and obey the exponentially distribution with the means of , , , and , respectively. Additionally, we assume that the noise for any receiver of Figure 1 is an additive white Gaussian noise (AWGN) with a zero-mean and variance.

The total transmission timeslot can be divided into two phases according to the time-switching ratio , . In the first phase , the PB transmit signals to Us, and all Us harvest energy from received RF signals. In the remaining phase , the user who is selected will send message to BS and the J will transmit jamming signal to Es at the same time. Hence, the harvested energy of user node can be expressed aswhere represents the transmit power of the PB and is the energy conversion efficiency of the energy harvester, . The EH model is often assumed along with the perfect CSI and the hardware impairment is neglected for the purpose of tractability, which has been widely adopted in the existing literature [9, 10, 16, 17, 2834]. It is indeed interesting to explore a general scenario with imperfect CSI and hardware impairment, which is out of the scope of this paper and considered for future work. From (1), the transmit power of can be obtained aswhere . In the remaining , a user is chosen to send message to the BS and BS receives the signals with antennas. Without loss of generality, we assume that the is chosen to transmit signal () with the power of to BS. Hence, we can express the signal received at BS with antennas aswhere and is an -dimensional AWGN vector at BS. Adopting MRC at BS, the channel capacity from to BS can be expressed aswhere .

Meanwhile, due to the broadcast nature of the wireless channel, the eavesdroppers attempt to tap the information transmission between Us and BS. Friendly jammer can help to improve security of -BS links against eavesdropping attacks. As described in [36], the friendly jammer emits artificial noise using pseudo-random sequences, which are known to BS and not available to Es. Therefore, the artificial noise can be canceled at BS but cannot be removed at the Es [27, 31, 34, 36]. Assuming that the J transmits an artificial noise with the power of , therefore, the received signal at can be obtained aswhere , , and is an -dimensional AWGN vector at E. The channel capacity of MRC from to with the assistance of the J can be obtained aswhere .

In this paper, we assume that Es wiretap the transmission between Us and BS cooperatively by MRC. Therefore, the channel capacity of the wiretap link can be expressed as

2.2. Non-Energy-Aware Multiuser Scheduling

Here, we present the non-energy-aware multiuser scheduling (NEAMUS) scheme, in which the user maximizing CSI of the main link will be selected to send messages. Therefore, the multiuser scheduling criterion of the NEAMUS scheme can be defined as

Combining (8) and (4), we can obtain the channel capacity of -BS aswhere and , respectively, denote the wireless channel fading coefficients of PB- and -BS. Meanwhile, the capacity of wiretap link is rewritten aswhere represents the Rayleigh fading coefficient of wiretap link.

2.3. Energy-Aware Multiuser Scheduling

This subsection proposes the energy-aware multiuser scheduling (EAMUS) scheme. In EAMUS scheme, the user maximizing the channel capacity of -BS is chosen to transmit data. This differs from NEAMUS scheme which only relies on the main link gain. Therefore, the multiuser scheduling criterion of EAMUS scheme can be defined as

Combining (11) and (4), we can obtain the channel capacity of -BS aswhere and , respectively, denote the fading coefficients of PB- and -BS. Meanwhile, the capacity of wiretap link can be expressed aswhere represents the wireless channel fading coefficient of wiretap link.

3. Security and Reliability Analysis over Rayleigh Fading Channels

This section provides the SRT performance analysis for NEAMUS and EAMUS schemes in terms of OP versus IP. For the purpose of comparison, the SRT performance analysis for CRRMUS scheme is presented.

3.1. CRRMUS Scheme

In this section, we present the SRT performance analysis of the CRRMUS scheme as a benchmark. In the CRRMUS scheme, each user has the equal chance to be chosen to transmit its message. Without loss of generality, we assume the user is selected. Following the literature [37], an outage event happens when the main channel capacity drops below the data rate of the main link . Therefore, we can express the definition of OP for the CRRMUS scheme aswhere denotes the user who is chosen. According to the theory of total probability [37], the OP of CRRMUS scheme can be obtained as

In the CRRMUS scheme, each user has the equal chance to be selected to transmit its data. Therefore, (15) can be rewritten aswhere is given by

Substituting (4) into (17) yieldswhere .

Based on Appendix A, can be expressed aswhere is the modified Bessel function of order [38]. Substituting from (19) into (16), can be obtained.

Based on [37], an intercept event happens when the capacity of wiretap link is higher than , where is a secrecy rate. Thus, the IP of the CRRMUS scheme can be defined aswhere .

According to the theory of total probability [37], (20) can be expressed as

Similarly to (16), we can rewritten aswhere

Substituting (7) into (23), can be rewritten aswhere .

Based on Appendix B, can be expressed as (25), shown at the top of this page, where , and . Substituting from (25) into (22), the intercept probability of CRRMUS scheme can be obtained.

3.2. NEAMUS Scheme

In this subsection, we propose the SRT analysis of NEAMUS scheme over Rayleigh fading channels. As mentioned above, a user maximizing the main link gain will be selected in the NEAMUS scheme. Similarly to (14), we can obtain the OP of NEAMUS scheme aswhere is given by (9).

According to the theory of total probability [37], combining (9) and (26) yieldswhere can be expressed aswhere represents the set of users.

According to Appendix C, can be obtained aswhere ,

Substituting (29) into (27), the OP of NEAMUS scheme can be obtained.

Similarly to (20), we can obtain the IP of NEAMUS scheme aswhere is given by (10).

Combining (10) and (31), can be expressed aswhere is given by

Based on Appendix D, can be formulated aswhere is given by (25). Substituting (34) into (32), can be obtained.

3.3. EAMUS Scheme

This section presents EAMUS scheme to improve the physical-layer security in terms of SRT performance. As mentioned above, a user maximizing the channel capacity of -BS is chosen. Therefore, the OP of EAMUS scheme can be defined aswhere is given by (12).

Substituting (12) into (35) yieldswhere is given by (19).

Relying on the definition of IP in (20), we can obtain the IP of EAMUS scheme aswhere is given by (13).

According to the theory of total probability [37], we can rewrite (37) aswhere can be expressed as

With our existing knowledge, it is very challenging to derive the closed-form expression of of Appendix E. For simplicity, as discussed in [32, 39], since the optimal user selection does not rely on the CSI of wiretap link, the best user scheduling for BS can be regarded as equivalent to random user scheduling for eavesdroppers. Therefore, the PDF of random variables of is the same as . Hence, we can rewrite (37) as

After further manipulations, (40) can be expressed as (41) shown at the top of this page, where .

4. Numerical Results and Discussion

In this section, we present the numerical results and discussions for the CRRMUS, NEAMUS, and EAMUS schemes. The OP and IP of CRRMUS, NEAMUS, and EAMUS schemes are evaluated by using (16), (22), (27), (34), (38), and (40). In our analysis model, we assume that the transmission links between any two nodes of Figure 1 are Rayleigh fading channels. Following the existing literature [2628, 36, 39], the average channel gains of , , ,  ms,  bit/s/Hz,  bit/s/Hz, are used for both the analysis and the simulation, unless otherwise stated. For simplicity, let “T” denote the theoretical result and “S” represent the simulated result.

As shown in Figure 2, we present the OP and IP versus of the CRRMUS, NEAMUS, and EAMUS schemes. In Figure 2, the theoretical results match well with the simulated results, which demonstrates the correctness of our analysis. Figure 2 shows that, with the increase of , the OP of CRRMUS, NEAMUS, and EAMUS schemes are significantly reduced, whereas the IP of three schemes increase, implying that a security and reliability tradeoff between the IP and OP exists in our proposed EH network. Figure 2 also demonstrates that the EAMUS scheme performs better than CRRMUS and NEAMUS schemes in terms of OP. Meanwhile, the IP of the EAMUS scheme is almost identical to that of the NEAMUS and CRRMUS schemes. This is due to the fact that the best user scheduling for BS can be regarded as equivalent to random user scheduling for eavesdroppers [32, 39]. However, the following SRT analysis shows that the physical-layer security can still be enhanced, because the improvement of reliability can be translated into the enhancement of security.

Figure 3 shows IP and OP versus energy conversion efficiency of the CRRMUS, NEAMUS, and EAMUS schemes. As shown in Figure 3, as the energy conversion efficiency increases, the OP of all CRRMUS, NEAMUS, and EAMUS schemes decreases, while the IP of CRRMUS, NEAMUS, and EAMUS schemes increases accordingly. This is due to the fact that, with the increase of energy conversion efficiency , the users convert more energy from received RF signals for information transmission, which leads to a lower OP. Meanwhile, the increase of user transmission power is beneficial not only for BS but also for Es, which causes a higher IP.

Figure 4 shows IP versus OP of the CRRMUS, NEAMUS, and EAMUS schemes for different number of users . It can be seen from Figure 4 that the EAMUS scheme is better than the NEAMUS scheme and CRRMUS scheme in terms of SRT, and the CRRMUS scheme is the worst of the three schemes. That means the proposed NEAMUS and EAMUS schemes can achieve the benefit of wireless security. One can also observe from Figure 4 that as the number of users increases from to , the SRT performances of NEAMUS and EAMUS schemes improve, illustrating that increasing the number of users can effectively improve the physical-layer security performance. Moreover, as the number of users increases from 2 to 6, the SRT performance gap of EAMUS scheme is more significant than that of NEAMUS scheme, which also further shows the superiority of the proposed EAMUS scheme in terms of SRT. However, as increases from 2 to 6, the SRT of CRRMUS scheme has not changed, due to the fact that the CRRMUS scheme randomly selects user without cooperation between users.

Figure 5 depicts IP versus OP of the CRRMUS, NEAMUS, and EAMUS schemes for different . As seen from Figure 5, for both  dB and  dB, the SRT performance of EAMUS scheme is always better than that of NEAMUS and CRRMUS schemes in the whole region. Additionally, with the increases from 5 dB to 10 dB, the SRT performances of CRRMUS, NEAMUS, and EAMUS schemes all have been improved, implying significant SRT benefit achieved with the increases of . That is to say, the wireless transmission security of the proposed EH network can be improved by increasing the transmission power of the jammer for all three user scheduling schemes.

In Figure 6, we show IP versus OP of the CRRMUS, NEAMUS, and EAMUS schemes for different MER, where represents the main-to-eavesdropping ratio [27, 28]. As shown in Figure 6, with the increasing of MER from −5 dB to 5 dB, the SRT performances of CRRMUS, NEAMUS, and EAMUS schemes all improve, accordingly. Specifically, given a special OP value, the IP of the CRRMUS, NEAMUS, and EAMUS schemes decreases with the increase of MER. That is to say, the physical-layer security of the proposed EH network can be effectively improved by increasing MER.

Figure 7 depicts the secrecy rate versus of the CRRMUS, NEAMUS, and EAMUS schemes for different number of users . As shown in Figure 7, as the increase of , the secrecy rate of CRRMUS, NEAMUS, and EAMUS schemes improves, accordingly, and then the secrecy rates of the three schemes all keep in a stable state. It can also be observed from Figure 7 that, with the increase of the number of users from to , the secrecy rate of both NEAMUS and EAMUS schemes improves, implying that the wireless transmission security of NEAMUS and EAMUS schemes can be improved by increasing the number of users. Additionally, Figure 7 also shows that the EAMUS scheme has the largest secrecy rate among the three schemes, demonstrating that the proposed EAMUS scheme can improve the physical-layer security significantly.

5. Conclusion

This paper investigated the physical-layer security for an EH wireless network consisting of multiple EH users, a base station, a friendly jammer, and multiple eavesdroppers. In order to improve the physical-layer security, we proposed energy-aware multiuser scheduling (EAMUS) scheme and non-energy-aware multiuser scheduling (NEAMUS) scheme depending on whether the CSI of energy link is available or not. Also, the conventional round Robin multiuser scheduling (CRRMUS) scheme is considered as a benchmark. Closed-form expressions of OP and IP for EAMUS, NEAMUS, and CRRMUS schemes are derived to evaluate the reliability and security achieved by the proposed schemes. Additionally, we presented the SRT performance analysis for CRRMUS, NEAMUS, and EAMUS schemes. Numerical results showed that the proposed EAMUS scheme is superior to the NEAMUS and CRRMUS schemes in terms of SRT. That is to say, the proposed EAMUS scheme can significantly improve the physical-layer security in the EH multiuser network. Additionally, the SRT performance of NEAMUS and EAMUS schemes can also be improved by increasing the number of users.

Appendix

A. Derivation of (19)

Assume that the fading coefficients of and are independent and identical distributed (i.i.d.) random variables with means of and , respectively. Denote and . Therefore, the probability density functions (PDFs) of X and Y can be written as

The cumulative distribution function (CDF) of can be obtained as

Therefore, can be rewritten as

B. Derivation of (25)

For simplicity, we assume that the fading coefficients of , , and , , , and , are independent and identical distributed (i.i.d.) random variables with the means of , , and , respectively. Denote , , and . Therefore, we can express the PDFs of X, Y, and Z as

The CDF of X can be obtained as

Therefore, (25) can be rewritten as

Using (B.4), can be expressed aswherein can be expanded as

Combining (B.5), (B.6), and (B.7), can be expressed aswhere andwhere . Letting , we can rewrite aswhere

Similarly to (B.7), can be expanded as

Substituting (B.12) into (B.11) yields

Letting , when , can be derived as

When , can be calculated as

When , can be obtained as

Finally, by substituting (B.10) and the results of into (B.8), can be expressed as (B.17), shown at the top of the following page.

C. Derivation of (29)

Assume that the fading coefficients of and , and , are i.i.d. random variables with the means of and , respectively. Denote and . Similarly to (B.1), the PDF of can be expressed as

can be rewritten aswherein can be expressed as

Applying successive binomial expansion on , we havewhere ,

Substituting (C.4) into (C.2), can be expressed aswhere and can be given by

Substituting (C.7) and (C.8) into (C.6), we can obtain as

D. Derivation of (34)

Denote , and , and all random variables are independent of each other. Therefore, can be rewritten as

Letting , similarly to (B.3) and (B.4), can be expressed as

Combining (D.2) and (B.6), we can obtain aswhich complete the proof of (34).

E

Let , , , , , and . For simplicity, we assume that the fading coefficients of , , , and , , , and , are i.i.d. random variables with the means of , , , and , respectively. Therefore, the CDFs of and can be expressed as

Similarly to (B.6), can be obtained aswherein can be expressed as

Substituting (E.3) into (E.2) yieldswhere , and

Therefore, can be rewritten aswhere is given by (E.5), and can be computed as

Data Availability

The data that support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

The work was sponsored in part by the National Key R&D Program of China (no. 2018YFB1003201), the National Natural Science Foundation of P. R. China (nos. 61672296, 61872196, 61872194, and 61902196), Scientific and Technological Support Project of Jiangsu Province (nos. BE2017166 and BE2019740), Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province (no. 18KJA520008), and Six Talent Peaks Project of Jiangsu Province (RJFW-111).