Opportunistic Relaying Technique over Rayleigh Fading Channel to Improve Multicast Security ()
1. Introduction
Because of the diversification of application fields and users’ mobility when using network components, wireless communication systems security is crucial. Furthermore, wireless communication is susceptible to fraud and wiretapping [1] [2] [3] . Video and voice conferencing and distance learning are examples of group-oriented applications where multicasting is a successful wireless data transmission technique [4] . Since wireless networks are open, they are susceptible to fraud and listening in. It is not possible to develop a secure foundation for multicasting using standard cryptology approaches. The physical layer security is essential for multicasting to obtain information-theoretic safety.
1.1. Related Works
Recently, in [5] , authors consider a multicast network and investigate the secrecy performance using PRS with selection diversity over Rayleigh fading channels. In [6] , authors focused only on one destination while analyzing the secrecy performance using PRS with selection diversity. In [7] , authors only analyze the PNSMC using opportunistic relaying over Nakagami-m fading channels. In [8] and [9] respectively, an exclusive OR (XOR) operated point-to-point communication and a cognitive radio network were examined using PRS under security constraints. In [10] , the diversity approach was applied under different fading environments. A multicasting cooperative network was also studied in [11] to investigate optimized secrecy performance. In [12] , provides an investigation of the secrecy performance of the switch and stay partial relay selection. In [13] , authors considered a multicast scenario that provides diversity to the destination users with opportunistic relaying in the absence of wiretapper. The multicast scenario with opportunistic relaying in the presence of combine effect of relays and branches at destinations and wiretappers, however, was not taken into consideration by the authors in the earlier publications. In order to minimize the loss of security caused by the impacts of relays, branches at destinations and wiretappers, as well as multicast users and wiretappers through opportunistic relaying, it is necessary to assure the security in wireless multicasting in this research.
1.2. Contributions
In this research, authors examined a secure wireless multicasting scenario over Rayleigh fading channels in the presence of multiple wiretappers. This study was inspired by the necessity of safety in multicasting and was based on the previously indicated condition that is documented in the literature. The authors created a mathematical model to forecast the safety in opportunistic relaying over Rayleigh fading channels. The following is a summary of this paper’s main contributions.
● At first, authors deduced the analytical expression for cumulative distribution functions (CDFs) of signal-to-noise ratio (SNR) of best relay for source-to-destination link and source-to-wiretapper’s link based on the probability density function (PDF) of Rayleigh fading channels.
● Secondly, authors generated the expression for PDFs of SNR of the best relay for source-to-destination link and source-to-wiretapper’s link from these CDFs.
● Thirdly, using these PDFs of SNR of the best relay for source-to-destination link and source-to-wiretapper’s link, authors deduced the expressions for the PDFs of minimum SNR of multicast channels and maximum SNR of wiretapper’s channels.
● Fourthly, the authors developed the expressions for PNSMC, ESMC, and SOPM using the PDFs of minimum SNR of multicast channels and maximum SNR of wiretapper’s channels. The PNSMC, ESMC, and SOPM will then be investigated based on the effect of relays, branches at destinations and wiretappers channels, multicast users and wiretappers, average SNR of the wiretappers channel.
● Finally, the provided analytical expressions are validated using Monte-Carlo simulation.
Following is how this document is structured for the remaining portions. System structure and Problem analysis are both treated in Sections II and III, respectively. The expressions for PNSMC, ESMC, and SOPM, respectively, are found in Sections IV, V, and VI. In Section VII, the numerical results are presented. Finally, the conclusions of this task are presented in Section VIII.
2. System Structure
In the presence of multiple wiretappers, Rayleigh fading channels are taken into consideration for the secure wireless multicasting communication circumstances depicted in Figure 1.
The elements of this image are single source S, a collection of K relays, P destinations, Q wiretappers and the number of Nm and Ne branches at destinations and wiretappers respectively. Relays are used by the source to transmit a shared stream of privileged data to the P destinations. The wiretappers are attempting to decrypt the private data. By preventing this wiretapping, the goal of this thesis is to ensure secure communication between source and destinations. Multicast channels are those between the source and the destinations, whereas wiretappers channels are those between the source and the wiretappers.
3. Problem Analysis
The development of closed-form analytical equations for PDFs of multicast channels and wiretappers channels is the purpose of this section.
3.1. Rayleigh Fading Channels PDF
The symbol
represents signal-to-noise ratio (SNR) of each sub-channel in a multicast channel. Then, for Rayleigh fading channels, PDF of
represented by
is given by ( [14] , eq. (7.9))
(1)
Putting the formula
in Equation (1), we get
(2)
where N is the number of branch and
is the average SNR for all branches.
3.2. PDF of SNR for Source-to-kth Relay
Let
represents SNR of source-to-kth relay. Then, PDF of
represented by
for Rayleigh fading channels is shown by,
(3)
where
,
.
3.3. PDF of SNR for kth Relay-to-ith Destination
Let
represents SNR of kth relay-to-ith destination. Then, PDF of SNR of
represented by
for Rayleigh fading channel is shown by,
(4)
where
,
.
3.4. PDF of SNR for kth Relay-to-jth Wiretapper
Let
represents SNR of kth relay-to-jth wiretapper. Then, PDF of SNR of
represented by
for Rayleigh fading channels is given by,
(5)
where
,
.
3.5. CDF of SNR of Best Relay for Source-to-ith Destination
Let
represents SNR of best relay for source-to-ith Destination. Then, CDF of
represented by
for Rayleigh fading channels is shown by,
(6)
where
and
. Putting the value of
and
, and using the following identity of
(7)
the value of
and
can be computed. Then, putting the value of
and
in Equation (6) and using the identity of
(8)
the expression for
can be derived as
(9)
where
,
.
3.6. CDF of SNR of Best Relay for Source-to-jth Wiretapper
Let
represents SNR of best relay for source-to-jth Eavesdropper. Then, CDF of
represented by
, for Rayleigh fading channels is shown by,
(10)
where
and
. Putting the value of
and
, and using the identities of Equations (7) and (8) the equation for the
can be deduced as
(11)
where
,
.
3.7. PDF of SNR of Best Relay for Source-to-ith Destination
The PDF of
denoted by
for Rayleigh fading channel is defined as
(12)
where the value of
can be derived from the expression which is stated as below
(13)
Putting the value of
in Equation (13) and after differentiation, the expression of
is given by,
(14)
where
and
. Finally, Putting the value of
and
in Equation (12) we get
(15)
where
,
.
3.8. PDF of SNR of Best Relay for Source-to-jth Wiretapper
The PDF of
denoted by
for Rayleigh fading channel is defined as
(16)
The value of
is determined as follows,
(17)
where
and
. Putting the value of
and
in Equation (16), the expression for
can be deduced as,
(18)
where
,
.
3.9. PDF of dmin
Let
represents SNR of multicast channel. Then, PDF of
represented by
, for Rayleigh fading channel is shown by [15] ,
(19)
Putting the value of
and
in Equation (19), the expression for the
can be deduced as
(20)
where
3.10. PDF of dmax
Let
represents maximum SNR of wiretapper’s channel. Then, PDF of
represented by
, for Rayleigh fading channel is shown by [15] ,
(21)
Putting the value of
and
in Equation (21), the expression for
can be deduced as
(22)
where
,
4. Probability of Non-Zero Secrecy Multicast Capacity
The PNSMC has the following mathematical definition: [5] ,
(23)
Putting the value of
and
in Equation (23) and using the identities of
(24)
and
(25)
the expression that was derived for the
is given by
(26)
5. Ergodic Secrecy Multicast Capacity
The ESMC can be expressed as [5] ,
(27)
Putting the value of
and
in Equation (27) and after integration by using the identity of ( [16] , eq. (4.222.8))
(28)
the expression for ESMC is shown by
(29)
6. Secure Outage Probability for Multicasting
For multicasting, the SOP is defined as [5] ,
(30)
where
,
,
and
represents target secrecy rate.
Putting the value of
and
in Equation (30) and using the identities of Equations (7) and (25), the deduced expression for the
is shown by
(31)
7. Numerical Results
According to different values of relays and branches at destinations, the PNSMC is shown in Figure 2 as a function of multicast channel’s average SNR. The figure indicates that PNSMC grows considerably as relays (K) and branches (Nm) at destinations increases. Additionally, this figure indicates that even while an increase in relays and branches at destinations separately causes the PNSMC to significantly improve, but their combined contribution results in a considerably better outcome than their individual results. This is due to the fact that secrecy multicast capacity rises as relays increase due to selection combining diversity offered by best relay.
According to different values of users and wiretappers, the PNSMC is shown in Figure 3 as a function of multicast channel’s average SNR. With increases users (P) and wiretappers (Q), we observe that PNSMC declines considerably. This is because more multicast users consume less bandwidth overall, which in turn lowers the multicast users’ capacity. Figure 4 displays the ESMC as a function of multicast channel’s average SNR for different values of relays and branches at destinations. We can see that when relays (K) and branches (Nm) at destinations increases, ESMC rises dramatically. Moreover, this figure shows that even if an increase in relays and branches at destinations causes the ESMC to improve significantly on its own, but their combined contribution results in a far better outcome than either factor acting alone. This is due to an increase in relays, which enhances the diversity benefit they deliver. Figure 5 illustrates the ESMC in relation to average SNR of multicast channel for various relay values and the number of wiretapper branches. It has been found that ESMC rises with an increase in relays (K) and falls with an increase in branches (Ne) at the wiretappers. This is because, due to selection combining diversity secrecy multicast capacity
Figure 2. Simulation and analytical findings of PNSMC for different values of relays and branches at destinations.
Figure 3. Simulation and analytical findings of PNSMC for various values of users and wiretappers.
Figure 4. Simulation and analytical findings of ESMC for various values of relays and branches at destinations.
rises as relays increases and falls as wiretapper branches increases. Figure 6 displays the ESMC, as a function of average SNR of multicast channel for different values of users and wiretappers. We see that ESMC decreases significantly
Figure 5. Simulation and analytical findings of ESMC for various values of relays and branches at wiretappers.
Figure 6. Simulation and analytical findings of ESMC for various values of users and wiretappers.
with the increase in users (P) as well as wiretappers (Q). This is because increasing in multicast users decreases the bandwidth of each user which in turn decrease the capacity of multicast user. Figure 7 shows the SOPM, as a function of average SNR of multicast channel for different values of branches at destinations and wiretappers. We see that SOPM grows with an increase in branches (Ne) at wiretappers while SOPM drastically drops with an increase in branches (Nm) at destinations. Figure 8 illustrates the SOPM, as a function of average SNR
Figure 7. Simulation and analytical findings of SOPM for different values of branches at destinations and wiretappers.
Figure 8. Simulation and analytical findings of SOPM for different values of users and wiretappers.
Figure 9. Simulation and analytical findings of SOPM for different values of relays.
of multicast channel for different values of users and wiretappers. As the rise of users (P) and wiretappers (Q), we can observe that SOPM also rises dramatically. This is due to the fact that an increasing in multicast users as well as wiretappers decreases the bandwidth. As a result, increase the outage probability for multicasting.
In relation to average SNR of multicast channel for different values of relays, Figure 9 illustrates the SOPM. Figure demonstrates that SOPM drastically decreases as relay (K) is increased. This happens when increases the diversity merit due to increase in relays.
Therefore, based on the observations of numerical data and analytical formulations for PNSMC, ESMC, and SOPM, the primary conclusions of this study can be summed up as follows: As Ne, P, and Q increase, the PNSMC and ESMC decline. As a result, a rise in Ne, P, and Q reduces system security. As opposed to this, if K and Nm rise, PNSMC and ESMC rise, and SOPM falls. Therefore, raising K and Nm improves system security.
8. Conclusion
This study focuses on creating a mathematical model for analytically to ensure the security in wireless multicasting using opportunistic relaying over Rayleigh fading channels. The closed-form analytical expressions for PNSMC, ESMC and SOPM are deduced in terms of parameters such as Nm, Ne, multicast users (P) and wiretappers (Q), and relays (K), which aid in gaining a clear understanding of the effects of anterior parameters. According to our findings, the security of wireless multicasting over Rayleigh fading channels declines as Ne, P, and Q grow. However, this loss of security can be reduced by simultaneously increasing relays (K) and branches (Nm) at destinations that compete using the opportunistic relaying technique to choose the best relay from a collection of relays. The effects of distributed switch and stay combining on the security in multicasting through Rayleigh fading channel are not considered in this paper. So the distributed switch and stay combining techniques can be used to enhance the security over Rayleigh fading channel. The accuracy of the analytical expression is finally verified using Monte Carlo simulation.