DOI QR코드

DOI QR Code

Secrecy Performance of Multi-Antenna Satellite-Terrestrial Relay Networks with Jamming in the Presence of Spatial Eavesdroppers

  • Wang, Xiaoqi (School of Surveying and Land Information Engineering, Henan Polytechnic University) ;
  • Hou, Zheng (School of Surveying and Land Information Engineering, Henan Polytechnic University) ;
  • Zhang, Hanwei (Institute of Resources & Environment, Henan Polytechnic University)
  • Received : 2022.03.29
  • Accepted : 2022.08.10
  • Published : 2022.09.30

Abstract

This work investigates the physical layer secrecy of a multi-antenna hybrid satellite-terrestrial relay networks (HSTRN) with jamming, in which a satellite aims to make communication with a destination user by means of a relay, along with spatially random eavesdroppers. In order to weaken the signals of eavesdroppers, the conventional relay can also generate intentional interference, besides forwarding the received signal. Shadowed-Rician fading is adopted in satellite link, while Rayleigh fading is adopted in terrestrial link, eavesdropper link and jamming link. The analytical and asymptotic formulas for the system secrecy outage probability (SOP) are characterized. Practical insights on the diversity order of the network are revealed according to the asymptotic behavior of SOP at high signal-to-noise ratio (SNR) regime. Then, analysis of the system throughput is examined to assess the secrecy performance. In the end, numerical simulation results are presented to validate the theoretical analysis and point out: (1) The secrecy performance of the considered network is affected by the channel fading scenario, the system configuration; (2) Decrease of the relay coverage airspace can provide better SOP performance; (3) Jamming from the relay can improve secrecy performance without additional network resources.

Keywords

1. Introduction

The ever-increasing demand for high-speed and broadband have stimulated the development of wireless communication. Meanwhile, satellite communication is gaining more attention for its advantage of long distance, large capacity, wide coverage, high quality and low cost [1,2], and it has been applied widely in navigation, location, disaster response, military, resource exploration, topographic mapping and so on [1,3].

Unfortunately, obstacles or shadowing in the satellite-terrestrial communication may cause the inaccessibility of the line-of-sight (LOS) [4], and this will seriously reduce the communication quality of the satellite network. Thus, hybrid satellite-terrestrial relay networks (HSTRN) integrated with satellite-terrestrial communication and relay is proposed [5-8], and it has a bright application prospect because of more diversity gain, wider coverage, better reliability, less power consumption and other advantages [9-11]. This framework has been already included in the standard of DVB-SH [12]. Hence, most research works have focused on different methods to improve the performance of HSTRN [2,13,14]. [2] and [13] investigated the outage performance of their proposed frameworks applying amplify-and-forward (AF) and decode-and-forward (DF) protocol respectively. [14] derived the average symbol error rate (ASER) and the diversity order of the HSTRN with co-channel interferes (CCI) using moment generating function (MGF), and demonstrated the impact of CCI on the system performance.

On the other hand, given that multiple-input-multiple-output (MIMO) technology in terrestrial networks can obtain more diversity gain, further interest has risen in the possibility of applying the same principle to satellite networks. Therefore, more and more research efforts have been performed on incorporating MIMO technology into satellite networks with multiple antennas in [15,16]. [15] investigated a multi-antenna AF relaying scheme, and revealed that the number of transmit and receive antennas has impacts on the outage performance and ergodic capacity of the system. Researchers of [16] assumed a multi-antenna HSTRN corrupted by multiple CCI at relay and destination, indicating that the performance degradation of the HSTRN was resulted from CCI through reducing the array gain.

As is known to all, the security performance is a very important problem in the development of wireless communication. Comparing to traditional encryption method at upper layers, physical layer secrecy has become a popular approach for its advantage of preventing information delivery from eavesdropping [17]. And research on physical layer secrecy in HSTRN has become an attractive concern [18-20]. [18] gave a performance comparison of AF and DF HSTRN based on multi-antenna relay, and indicated that the proposed DF HSTRN always had a better secrecy performance than AF HSTRN. [19] considered a HSTRN composed of a multi-antenna satellite, multiple relays and users with multiple eavesdroppers, and presented a selection rule of best user-relay pair aiming at minimizing secrecy outage probability(SOP). In [20], authors investigated a multi-hop HSTRN, and characterized accurate and asymptotic expressions for SOP to explore the physical layer secrecy performance. And on this basis, relays or even the destinations themselves can be used to help provide additional jamming to confuse the eavesdropper. This approach termed as cooperative jamming has been explored in lots of works. In order to protect the message from wiretapping in a HSTRN, [21] investigated power allocation schemes to optimize the secrecy rate with constraint of entire relay power by means of jamming. The same to optimize the secrecy rate, [22] jointly optimized the beamforming vector of relay as well as the covariance matrix of artificial noise. [23] explored a selection of joint relay and a scheme of user scheduling with jamming so as to obtain the balance of the performance and implementation. Considering of eavesdroppers in the airspace, [24] presented a communication network with unmanned aerial vehicle (UAV) in existence of spatial eavesdroppers, and gave an investigation of physical layer secrecy.

In general, most researches have focused on physical layer secrecy of HSTRN ignoring the spatial distribution of eavesdroppers. While in practical scenarios, the positions of eavesdroppers may vary in different conditions. That will affect the eavesdropper link quality, and then affect the security performance of the entire network. In addition, multi-antenna technology is favored as a MIMO technology with satellite communication, and jamming signal can be used to degrade the eavesdropper link. In light of the above discussion, the secrecy performance analysis of a multi-antenna HSTRN with jamming is investigated in this work, in which a multi-antenna satellite aims to make a communication with a multi-antenna ground user via a relay in exist of spatially random eavesdroppers. The relay here can not only forward the signal using DF protocol, but also generate intentional jamming to eavesdroppers simultaneously. Shadowed-Rician fading is considered for satellite link [25] while Rayleigh fading for terrestrial link, eavesdropper link and jamming link [14]. The main works can be summarized as:

(1) A multi-antenna HSTRN with jamming was proposed. Considering the spatial random distribution of eavesdroppers, the probability density function (PDF) and the cumulative distribution function (CDF) of eavesdropper link SNR are derived;

(2) In the basis of the proposed network, the analytical and asymptotic formulas for the SOP are deduced;

(3) The diversity order of the network is obtained according to the asymptotic behavior of SOP and the system throughput is explored;

(4) Numericalsimulations are operated to validate the correctness of the theoretical analysis, revealing that the secrecy performance of the considered HSTRN relies on its some key parameters.

The contents of this work are organized as the following layouts. Section 2 describes the models of the system and channel. Section 3 investigates the secrecy performance of the network, deriving formulas of the theoretical, asymptotic SOP, and exploring the system throughput. Computer simulation and numerical results are included in Section 4. Conclusion is given in Section 5.

Notations: Vectors are characterized by lowercase bold letters. (⦁) means conjugate transpose; ∥⦁∥ means Frobenius norm; |⦁| delegates absolute value; E[⦁] represents expectation operator; n! denotes factorial; (⦁)n symbolizes the Pochhammer symbol; fX(⦁) and FX(⦁) represent PDF and CDF; Pr(⦁) symbolizes the probability of a variable.

2. HSTRN Description

2.1 System Model

Considering the configuration of a multi-antenna HSTRN is presented in Fig. 1, where one geostationary (GEO) satellite source ( S ) aims to make communication with a terrestrial destination user ( DN ) through a DF relay ( R ), along with a group of eavesdroppers ( E ). The eavesdroppers distributed randomly in the space or on the ground try to eavesdrop the information from satellite S to the terrestrial user over an eavesdropper channel. Here we assume that each node operates in half-duplex mode. The satellite S and the terrestrial user ( DN ) are installed with M and N antennas, and the relay ( R ) is deployed at the vertical height h, with a single antenna. Here assuming that DN is located in a circle with a radius of r. During the long satellite-terrestrial communication, clouds, hills, mountains and other obstacles or shadowing cause masking effect, which will lead to the unavailability of LOS communication, and then seriously degrade the performance of the satellite communication. Based on this, assuming that there is no direct link in S − DN and S − E [2,26,27]. All the nodes in this network are affected by the additive white Gaussian noise (AWGN) (variance denoted with σ2).

E1KOBZ_2022_v16n9_3152_f0001.png 이미지

Fig. 1. Model of the multi-antenna HSTRN with Spatial Eavesdroppers.

In view of one relay, the communication process can be separated into two transmission phases.

In the first phase, the satellite source beamforms the signal xs(t) (E[|xs(t)|2]=1) to the relay applying maximum ratio transmission (MRT) principle, so the received signal of the relay can be shown as

\(\begin{aligned}y_{r}=\sqrt{P_{s}} \mathbf{h}_{s r}^{\dagger} \mathbf{w}_{s r} x_{s}+n_{r}\end{aligned}\),       (1)

where Ps means the transmit power at S, hsr ∈ ℂMx1 representsthe channel coefficient vector of S − R, \(\begin{aligned}\mathbf{w}_{s r} \triangleq \frac{\mathbf{h}_{s r}}{\left\|\mathbf{h}_{s r}\right\|}\left(\mathbf{w}_{s r} \in \mathbb{C}^{M \times 1}\right)\end{aligned}\), is the M ×1 transmit weight vector, and n0 denotes the AWGN at R [15].

Thus the received SNR of the signals at R can be obtained as

γsr = ηs∥hsr2       (2)

where \(\begin{aligned}\eta_{s}=\frac{P_{s}}{\sigma^{2}}\end{aligned}\).

In the second phase, as a conventional relay, it can forward its signal received to the terrestrial user applying DF protocol. The DF protocol is used here because it can remove the channel effects from the first phase on the received signal in the second phase. Otherwise, as a jammer, the relay performs can not only forward the fully decoded signal to the terrestrial user, but also simultaneously transmit intentional interference using parts of its own power. In the meantime, the eavesdropper also intends to wiretap the signal from the relay. In this work, it is assumed that jamming signal is cognized by the legitimate destination according to the apriori knowledge, and hence the jamming effect can be eliminated when decoding the received signal [28]. Considering the jamming signal as well as the unavailability of S − D and S − E, the signal received at the destination based on the principle of maximum ratio combining (MRC) can be formulated as

\(\begin{aligned}y_{d}=\sqrt{P_{r}} \mathbf{w}_{r d}^{\dagger} \mathbf{h}_{r d} x_{0}+\mathbf{w}_{r d}^{\dagger} \mathrm{n}_{d}\end{aligned}\),       (3)

and signal received at the eavesdropper is expressed as

\(\begin{aligned}y_{e}=\sqrt{P_{r}} h_{r e} x_{0}+\sqrt{P_{j}} h_{j e} x_{0}+n_{e}\end{aligned}\),       (4)

where Pr represents the transmit power at R, hrd ∈ ℂN×1 rd is the channel coefficient vector of R − DN, \(\begin{aligned}\mathbf{w}_{r d} \triangleq \frac{\mathbf{h}_{r d}}{\left\|\mathbf{h}_{r d}\right\|}\left(\mathbf{w}_{r d} \in \mathbb{C}^{M \times 1}\right)\end{aligned}\), is the N×1 receive weight vector, and nd ∈ ℂN×1 is the N×1 AWGN vector at DN [15].

Thus the instantaneous received SNR of the signals at DN and E can be obtained as

γrd = ηr∥hrd2       (5)

and

\(\begin{aligned}\gamma_{e}=\frac{P_{r}\left|h_{r e}\right|^{2}}{P_{j}\left|h_{j e}\right|^{2}+\sigma^{2}}=\frac{\gamma_{r e}}{\gamma_{j e}+1}\end{aligned}\),       (6)

where γre = ηr|hre|2 and γje = ηj|hje|2, with \(\begin{aligned}\eta_{r}=\frac{P_{r}}{\sigma^{2}}\end{aligned}\) and \(\begin{aligned}\eta_{j}=\frac{P_{j}}{\sigma^{2}}\end{aligned}\).

2.2 Channel Model

According to most of the previous literatures [15,25], the satellite link undergoes the independent shadowed-Rician distribution. The PDF of |hsr|2 is expressed as

\(\begin{aligned}f_{\left|h_{s s}\right|^{2}}(x)=\alpha_{s} \sum_{k=0}^{m_{s}} \zeta(k) x^{k} e^{-\left(\beta_{s}-\delta_{s}\right) x}\end{aligned}\)       (7)

where αs = (2bsms / (2bsms + Ωs))m/ 2bs , βs = 1/2bs , δs = Ωs / 2bs(2bsms + Ωs) and ζ(k) = (-1)k(1-ms)kδsk / (k!)2 , bs being multipath components, ms being fading severity parameter and δs being LOS average power.

Theorem 1: The PDF and CDF of γsr following Shadowed-Rician fading are given as

\(\begin{aligned}f_{\gamma_{s r}}(x)=\sum_{k_{1}=0}^{m_{s}-1} \cdots \sum_{k_{M}=0}^{m_{s}-1} \frac{\Xi(M)}{\eta_{s}^{\phi}} x^{\phi-1} e^{-\left(\frac{\beta_{s}-\delta_{s}}{\eta_{s}}\right) x}\end{aligned}\)       (8)

and

\(\begin{aligned}F_{\gamma_{s r}}(x)=1-\sum_{k_{1}=0}^{m_{s}-1} \cdots \sum_{k_{M}=0}^{m_{s}-1} \frac{\Xi(M)}{\eta_{s}^{\phi}} \sum_{p=0}^{\phi-1} \frac{\Gamma(\phi)}{p !}\left(\frac{\beta_{s}-\delta_{s}}{\eta_{s}}\right)^{-(\phi-p)} x^{p} e^{-\left(\frac{\beta_{s}-\delta_{s}}{\eta_{s}}\right) x}\end{aligned}\)       (9)

Proof. Let \(\begin{aligned}z=\left|h_{s r_{1}}\right|^{2}+\left|h_{s r_{2}}\right|^{2}+\cdots+\left|h_{s r_{N s}}\right|^{2}\end{aligned}\), using convolution and recursion, fz(z) can be obtained as

\(\begin{aligned}f_{z}(z)=\sum_{k_{1}=0}^{m_{s}-1} \cdots \sum_{k_{M}=0}^{m_{s}-1} \Xi(M) z^{\phi-1} e^{-\left(\beta_{s}-\delta_{s}\right) z}\end{aligned}\)        (10)

where \(\begin{aligned}\Xi(M)=\alpha_{s}^{M} \prod_{i=1}^{M} \zeta\left(k_{i}\right) \prod_{j=1}^{M-1} B\left(\sum_{l=1}^{j} k_{l}+j, k_{j+1}+1\right)\end{aligned}\), and \(\begin{aligned}\phi=\sum_{i}^{M} k_{i}+M\end{aligned}\).

Making a variable substitution for (7) and after some algebra processing, the PDF of γsr is deduced as (8). Then integrating the PDF of γsr, the CDF of γsr can be formulated as (9).

Given the advantage of Rayleigh distributions in modeling multipath fading with no LOS, Rayleigh fading is considered for the link between the relay and the ground user as well as the eavesdroppers. Importantly, it is applicable for other fading models as well. For the links of R − DN and R − E, the channel coefficient |hri*| (i = {d,e,j}) follows Rayleigh fading distribution, and the CDF and PDF are respectively formulated as

\(\begin{aligned}F_{\left|h_{r i}^{*}\right|^{2}}(x)=1-e^{-\frac{x}{\Omega_{i}}}\end{aligned}\)       (11)

and

\(\begin{aligned}f_{\left|h_{r i}^{*}\right|^{2}}(x)=\frac{1}{\Omega_{i}} e^{-\frac{x}{\Omega_{i}}}\end{aligned}\),       (12)

where Ωi means the average power of the corresponding transmission link.

Then, take a similar proof of Theorem 1, the PDF and CDF of γrd are calculated respectively as

\(\begin{aligned}f_{\gamma_{r d}}(x)=\frac{x^{N-1}}{\Gamma(N)\left(\eta_{r} \Omega_{d}\right)^{N}} e^{-\frac{x}{\eta_{r} \Omega_{d}}}\end{aligned}\)       (13)

and

\(\begin{aligned}F_{\gamma_{r d}}(x)=1-\sum_{p=0}^{N-1} \frac{x^{p} e^{-\frac{x}{\eta_{r} \Omega_{d}}}}{p !\left(\eta_{r} \Omega_{d}\right)^{p}}\end{aligned}\).       (14)

For the jamming link, the PDF and CDF of γje are described as

\(\begin{aligned}f_{\gamma_{j e}}(x)=\frac{1}{\gamma_{j e}} e^{-\frac{x}{\gamma_{j e}}}\end{aligned}\)       (15)

and

\(\begin{aligned}F_{\gamma_{j e}}(x)=1-e^{-\frac{x}{\gamma_{j e}}}\end{aligned}\)       (16)

where \(\begin{aligned}\overline{\gamma_{j e}}\end{aligned}\) denotes the average SNR of the jamming link.

3. Secrecy Performance Analysis

Secrecy performance investigation is examined in this section, including the theoretical deduction of the SOP formula, the asymptotic behavior analysis of SOP and the exploration of the system throughput.

3.1 SOP Analysis

The instantaneous channel capacity of S − R, R − DN and R − E links can be defined as (17-19), respectively.

\(\begin{aligned}C_{s r}=\frac{1}{2} \log _{2}\left(1+\gamma_{s r}\right)\end{aligned}\)       (17)

\(\begin{aligned}C_{r d}=\frac{1}{2} \log _{2}\left(1+\gamma_{r d}\right)\end{aligned}\)       (18)

\(\begin{aligned}C_{e}=\frac{1}{2} \log _{2}\left(1+\gamma_{e}\right)\end{aligned}\)       (19)

And the definition of secrecy capacity is the capacity difference of the legitimate link and eavesdropper link. Given no direct link of S − E, the secrecy capacity of S − R and R − DN link can be represented as (17) and (20).

\(\begin{aligned}C_{d}=\left[C_{r d}-C_{e}\right]^{+}=\left[\frac{1}{2} \log _{2}\left(\frac{1+\gamma_{r d}}{1+\gamma_{e}}\right)\right]^{+}\end{aligned}\),       (20)

where [⦁]+ = max(⦁,0) .

For convenience of analysing, the secrecy SNR is denoted as \(\begin{aligned}\gamma_{d}=\frac{1+\gamma_{r d}}{1+\gamma_{e}}\end{aligned}\) and (20) can be expressed as

\(\begin{aligned}C_{d}=\left[\frac{1}{2} \log _{2} \gamma_{d}\right]^{+}\end{aligned}\).       (21)

For the DF relaying network, secrecy outage will occur when the transmission process in any phase is incompletely decoded or not totally safe. Considering no direct link of S − DN, the secrecy SNR of the overall network is given as

γsys = min{γsr, γd}.        (22)

Therefore, the system secrecy outage depends on the weakest phase. Thus the secrecy capacity can be obtained as

Cs = min{Csr, Cd}.       (23)

Secrecy outage of the network happens as its secrecy capacity Cs is less than a setting secrecy rate threshold Cth,

Psec = Pr(Cs < Cth).       (24)

Assuming that all the links are independent of each other, the SOP of the network can be derived as

\(\begin{aligned}\begin{array}{l}P_{\mathrm{sec}}=\operatorname{Pr}\left(C_{s}<C_{t h}\right)=\operatorname{Pr}\left(\min \left\{C_{s r}, C_{d}\right\}<C_{t h}\right) \\ =1-\left(1-\operatorname{Pr}\left(C_{s r}<C_{t h}\right)\right)\left(1-\operatorname{Pr}\left(C_{d}<C_{t h}\right)\right) \\ =1-\left(1-\operatorname{Pr}\left(\frac{1}{2} \log _{2}\left(1+\gamma_{s r}\right)<C_{t h}\right)\right)\left(1-\operatorname{Pr}\left(\frac{1}{2} \log _{2} \gamma_{d}<C_{t h}\right)\right), \\ =F_{\gamma_{s r}}\left(\gamma_{t h}-1\right)+\left(F_{\gamma_{s r}}\left(\gamma_{t h}-1\right)+1\right) F_{\gamma_{d}}\left(\gamma_{t h}\right)\end{array}\end{aligned}\)       (25)

where γth = 22Cth.

Next, we will require \(\begin{aligned}F_{\gamma_{s r}}\end{aligned}\) and \(\begin{aligned}F_{\gamma_{d}}\end{aligned}\) respectively to obtain the SOP of the entire network.

(1) The first phase

The CDF of secrecy SNR γsr of S − R link can be obtained as (9).

(2) The second phase

During the second phase, the channel coefficient hre from the relay to the eavesdroppers can be expressed as

\(\begin{aligned}h_{r e}=\frac{h_{r e}^{*}}{\sqrt{1+d_{e}^{v}}}\end{aligned}\)       (26)

where de denotes the distance between the relay and the eavesdroppers; v represents the path loss exponent; (0,0,h) and (x, y,0) symbolize the coordinates of relay and the eavesdroppers. Thus, the distance de can be formulated as

\(\begin{aligned}d_{e}=\sqrt{x^{2}+y^{2}+h^{2}}\end{aligned}\).       (27)

For briefness, in this work the coverage airspace of the relay is supposed as a sphere with radius D shown in Fig. 2. The location of eavesdroppers on the ground or in the air are modeled randomly following an independent homogeneous Poisson point process. To evaluate the performance of eavesdroppers, the distribution of de should be obtained first. Therefore, the sphere is divided into two parts VH and VL illustrated as Fig. 2. The volume proportions of the two parts are respectively formulated as \(\begin{aligned}P_{L}=\frac{\left(D^{2}-h^{2}\right) h}{\Xi}\end{aligned}\) and \(\begin{aligned}P_{H}=\frac{2 D^{2}(D+h)}{\Xi}\end{aligned}\) \(\begin{aligned}\left(\Xi=2 D^{3}+3 D^{2} h-h^{3}\right)\end{aligned}\).

E1KOBZ_2022_v16n9_3152_f0002.png 이미지

Fig. 2. The distribution of de.

Theorem 2. The CDF of de is given as below:

\(\begin{aligned}F_{d_{e}}(x)=\left\{\begin{array}{cc}0, & x \leq 0 \\ \frac{4 x^{3}}{\Xi},(0<x \leq h) \\ \frac{2 x^{3}+3 h x^{2}-h^{3}}{\Xi}, & (h<x \leq D) \\ 1, & x>D\end{array}\right.\end{aligned}\).       (28)

Proof. In part VL, when 0 < x ≤ h, \(\begin{aligned}F_{d_{e}}{ }^{L}(x)=\int_{0}^{x} \int_{\pi-\arccos \frac{h}{D}}^{\pi} \int_{0}^{2 \pi} \frac{3 d^{2}}{\pi \Xi} \sin \phi d \theta d(d) d \phi=\frac{(D-h) 2 x^{3}}{D \Xi}\end{aligned}\), and when h < x ≤ D, \(\begin{aligned}F_{d_{e}}{ }^{L}(x)=\int_{\pi-\arccos \frac{h}{x}}^{\pi} \int_{0}^{\frac{-h}{\cos \phi}} \int_{0}^{2 \pi} \frac{3 d^{2}}{\pi \Xi} \sin \phi d \theta d(d) d \phi+\int_{0}^{x} \int_{\pi-\arccos \frac{h}{D}}^{\pi-\arccos \frac{h}{x}} \int_{0}^{2 \pi} \frac{3 d^{2}}{\pi \Xi} \sin \phi d \theta d(d) d \phi=\frac{3 D h x^{2}-2 h x^{3}-D h^{3}}{D \Xi}\end{aligned}\).

Thus, we can obtain (29).

\(\begin{aligned}F_{d_{e}}{ }^{L}(x)=\left\{\begin{array}{c}0, \quad x \leq 0 \\ \frac{(D-h) 2 x^{3}}{D \Xi},(0<x \leq h) \\ \frac{3 D h x^{2}-2 h x^{3}-D h^{3}}{D \Xi},(h<x \leq D) \\ 1, \quad x>D\end{array}\right.\end{aligned}\) .      (29)

In part VH, \(\begin{aligned}F_{d_{e}}{ }^{H}(x)=\int_{0}^{x} \int_{0}^{\pi-\arccos \frac{h}{D}} \int_{0}^{2 \pi} \frac{3 d^{2}}{\pi \Xi} \sin \phi d \theta d \phi d(d)=\frac{2(D+h) x^{3}}{\Xi D}\end{aligned}\). Then, we willobtain (30).

\(\begin{aligned}F_{d_{e}}^{H}(x)=\left\{\begin{array}{cl}0, & x \leq 0 \\ \frac{2(D+h) x^{3}}{\Xi D}, & 0<x \leq D \\ 1, & x>D\end{array}\right.\end{aligned}\)        (30)

Adding (29) and (30), (28) can be gained.

Then, by derivation of (28), the PDF of de is calculated as

\(\begin{aligned}f_{d_{e}}(x)=\left\{\begin{array}{cc}\frac{12 x^{2}}{\Xi},(0<x \leq h) \\ \frac{6 x^{2}+6 h x}{\Xi}, & (h<x \leq D) . \\ 1, & \text { else }\end{array}\right.\end{aligned}\)        (31)

Theorem 3. The CDF of γre is derived as

\(\begin{aligned}F_{\gamma_{r e}}(x)=1-\frac{6}{\Xi} \sum_{n=0}^{\infty} \frac{(-1)^{n}}{\left(\overline{\gamma_{e}}\right)^{n} n !}\left(\frac{1}{3+v n}\left(h^{3+v n}+D^{3+v n}\right)+\frac{h}{2+v n}\left(D^{2+v n}-h^{2+v n}\right)\right) x^{n} e^{-\frac{x}{\gamma_{e}}}\end{aligned}\)        (32)

where \(\begin{aligned}\overline{\gamma_{e}}=\eta_{r} \Omega_{e}\end{aligned}\).

Proof. Based on (12) and (31), using series exploration of ϒ(⋅,⋅)[29], the CDF of |hre|2 can be deduced as (33).

\(\begin{aligned} F_{\left|h_{r e}\right|^{2}}(x) & =\operatorname{Pr}\left(\frac{\left|h_{r e}^{*}\right|^{2}}{1+d_{e}^{v}} \leq x\right)=\int_{0}^{D}\left(F_{\left|h_{r e}\right|^{2}}\left(x\left(1+d_{e}^{v}\right)\right)\right) f_{d}\left(d_{e}\right) d\left(d_{e}\right) \\ & =\int_{0}^{h}\left(1-e^{-\frac{x\left(1+d_{e}^{v}\right)}{\Omega_{e}}}\right) \frac{12 d_{e}^{2}}{\Xi} d\left(d_{e}\right)+\int_{h}^{D}\left(1-e^{-\frac{x\left(1+d_{e}^{v}\right)}{\Omega_{e}}}\right) \frac{6 d_{e}^{2}+6 h d_{e}}{\Xi} d\left(d_{e}\right) \\ & =1-\frac{6 e^{-\frac{x}{\Omega_{e}}}}{\Xi v}\left(\frac{\Upsilon\left(\frac{3}{v}, \frac{x}{\Omega_{e}} h^{v}\right)}{\left(\frac{x}{\Omega_{e}}\right)^{\frac{3}{v}}}+\frac{\Upsilon\left(\frac{3}{v}, \frac{x}{\Omega_{e}} D^{v}\right)}{\left(\frac{x}{\Omega_{e}}\right)^{\frac{3}{v}}}+h \frac{\left(\frac{2}{v}, \frac{x}{\Omega_{e}} D^{v}\right)}{\left(\frac{x}{\Omega_{e}}\right)^{\frac{2}{v}}}-h \frac{\Upsilon\left(\frac{2}{v}, \frac{x}{\Omega_{e}} h^{v}\right.}{\left(\frac{x}{\Omega_{e}}\right)^{\frac{2}{v}}}\right)\end{aligned}\)       (33)

Then applying variable substitution and algebra processing, the CDF of γre is gained as (32).

After derivation of (32), the PDF of γre is expressed as

\(\begin{aligned}f_{\gamma_{r e}}=\frac{1}{\gamma_{e}} e^{-\frac{x}{\gamma_{e}}}-\sum_{n=1}^{\infty} \mathrm{T}\left(n x^{n-1} e^{-\frac{x}{\gamma_{e}}}-\frac{1}{\overline{\gamma_{e}}} x^{n} e^{-\frac{x}{\gamma_{e}}}\right)\end{aligned}\),       (34)

where \(\begin{aligned}\mathrm{T}=\frac{6}{\Xi} \frac{(-1)^{n}}{\left(\overline{\gamma_{e}}\right)^{n} n !}\left(\frac{1}{3+v n}\left(h^{3+v n}+D^{3+v n}\right)+\frac{h}{2+v n}\left(D^{2+v n}-h^{2+v n}\right)\right)\end{aligned}\).

Theorem 4. The CDF of γd is formulated as below:

\(\begin{aligned}\begin{array}{l}F_{\gamma_{d}}\left(\gamma_{t h}\right)=1-\sum_{k=0}^{N-1} \frac{\gamma_{t h}{ }^{k}}{k !\left(\eta_{r} \Omega_{r}\right)^{k}} \frac{k !}{\frac{\gamma_{e}}{}}\left(\frac{\gamma_{t h}}{\eta_{r} \Omega_{r}}+\frac{1}{\overline{\gamma_{e}}}\right)^{-k-1} \\ -\frac{e^{\frac{1}{\gamma_{j e,}}}-\frac{2}{\gamma_{j e, l}\left(\delta_{i}+1\right)}}{\Gamma(N)\left(\eta_{r} \Omega_{r}\right)^{N}} \frac{\pi \gamma_{t h}{ }^{N}}{2 N_{0}} \sum_{i=0}^{N_{0}}\left(\frac{\left(\delta_{i}+1\right)}{2}\right)^{N-1} \sqrt{1-\delta_{i}^{2}} \frac{N !}{\overline{\gamma_{e}}}\left(\frac{\gamma_{t h}\left(\delta_{i}+1\right)}{2 \eta_{r} \Omega_{r}}+\frac{1}{\overline{\gamma_{e}}}\right)^{-N-1}\end{array}\\ \begin{array}{l}+\sum_{k=0}^{N-1} \frac{\gamma_{t h}{ }^{k}}{k !\left(\eta_{r} \Omega_{r}\right)^{k}} \sum_{n=1}^{\infty} \mathrm{T}\left(n(k+n-1) !\left(\frac{\gamma_{t h}}{\eta_{r} \Omega_{r}}+\frac{1}{\overline{\gamma_{e}}}\right)^{-(k+n)}-\frac{(k+n) !}{\overline{\gamma_{e}}}\left(\frac{\gamma_{t h}}{\eta_{r} \Omega_{r}}+\frac{1}{\overline{\gamma_{e}}}\right)^{-(k+n)-1}\right) \\ +\frac{e^{\frac{1}{\gamma_{\gamma_{e, l}}}-\frac{2}{\gamma_{j e, l}}\left(\delta_{i}+1\right)}}{\Gamma(N)\left(\eta_{r} \Omega_{r}\right)^{N}} \frac{\pi \gamma_{t h}{ }^{N}}{2 N_{0}} \sum_{i=0}^{N_{0}} \sum_{n=1}^{\infty}\left(\frac{\left(\delta_{i}+1\right)}{2}\right)^{N-1} \sqrt{1-\delta_{i}{ }^{2}} \\ \times \mathrm{T}\left(n(N+n-1) !\left(\frac{\gamma_{t h}\left(\delta_{i}+1\right)}{2 \eta_{r} \Omega_{r}}+\frac{1}{\overline{\gamma_{e}}}\right)^{-(N+n)}-\frac{(N+n) !}{\overline{\gamma_{e}}}\left(\frac{\gamma_{t h}\left(\delta_{i}+1\right)}{2 \eta_{r} \Omega_{r}}+\frac{1}{\overline{\gamma_{e}}}\right)^{-(N+n)-1}\right) \\\end{array}\\\end{aligned}\)       (35)

Proof. Based on (6), after the approximation \(\begin{aligned}\frac{1+x}{1+y} \approx \frac{x}{y}\end{aligned}\), the PDF of γd is derived as

\(\begin{aligned}F_{\gamma_{d}}\left(\gamma_{t h}\right)=\operatorname{Pr}\left(\frac{1+\gamma_{r d}}{1+\gamma_{e}}<\gamma_{t h}\right) \approx \operatorname{Pr}\left(\frac{\gamma_{r d}\left(\gamma_{j e}+1\right)}{\gamma_{r e}}<\gamma_{t h}\right)=\int_{0}^{\infty} F_{A}\left(\gamma_{t h} \gamma_{r e}\right) f_{\gamma_{r e}}\left(\gamma_{r e}\right) d \gamma_{r e}\end{aligned}\)       (36)

where A = γrdje + 1).

To proceed, FA(z) is derived as

\(\begin{aligned}F_{A}(z)=\operatorname{Pr}\left(\gamma_{r d}\left(\gamma_{j e}+1\right)<z\right)=\int_{0}^{z} F_{\gamma_{j e}}\left(\frac{z}{\gamma_{r d}}-1\right) f_{\gamma_{r d}}\left(\gamma_{r d}\right) d \gamma_{r d}=\int_{0}^{z}\left(1-e^{-\frac{\frac{z}{x_{1}-1}}{\gamma_{j e}}}\right) \frac{x^{N-1}}{\Gamma(N)\left(\eta_{r} \Omega_{r}\right)^{N}} e^{-\frac{x}{\eta_{r} \Omega_{r}}} d x\end{aligned}\)       (37)

Invoking (13) and (16) into (37), after algebra processing and approximation based on Gaussian-Chebyshev [30], FA(z) is derived as (38).

\(\begin{aligned}F_{A}(z) \approx 1-\sum_{k=0}^{N-1} \frac{z^{k} e^{-\frac{z}{\eta_{,} \Omega_{r}}}}{k !\left(\eta_{r} \Omega_{r}\right)^{k}}-\frac{\frac{1}{\hat{\gamma}_{\gamma_{e, t}}}}{\Gamma(N)\left(\eta_{r} \Omega_{r}\right)^{N}} \frac{\pi z^{N}}{2 N_{0}} \sum_{i=0}^{N_{0}}\left(\frac{\delta_{i}+1}{2}\right)^{N-1} e^{-\frac{2}{\gamma_{\gamma_{e, l}}\left(\delta_{i}+1\right)} \frac{z\left(\delta_{i}+1\right)}{2 \eta_{r}, \Omega_{r}}} \sqrt{1-\delta_{i}^{2}}\end{aligned}\)       (38)

Now, substituting (34) and (38) into (36), and doing some algebra processing, the CDF of γd can be obtained as (35).

(3) SOP of the network

Invoking (9) and (35) into (25), the SOP of the entire network is formulated as

\(\begin{aligned}P_{\mathrm{sec}}=1-\left(\sum_{k_{1}=0}^{m_{s}-1} \cdots \sum_{k_{M}=0}^{m_{s}-1} \frac{\Xi(M)}{\eta_{s}^{\phi}} \sum_{p=0}^{\phi-1} \frac{\Gamma(\phi)}{p !}\left(\frac{\beta_{s}-\delta_{s}}{\eta_{s}}\right)^{-(\phi-p)}\left(\gamma_{t h}-1\right)^{p} e^{-\left(\frac{\beta_{s}-\delta_{s}}{\eta_{s}}\right)\left(\gamma_{t h}-1\right)}\right)\\ \begin{array}{l}\left(\sum_{k=0}^{N-1} \frac{\gamma_{t h}{ }^{k}}{k !\left(\eta_{r} \Omega_{r}\right)^{k}} \frac{k !}{\gamma_{e}}\left(\frac{\gamma_{t h}}{\eta_{r} \Omega_{r}}+\frac{1}{\overline{\gamma_{e}}}\right)^{-k-1}+\frac{e^{\frac{1}{\gamma_{j_{e, l}}}-\frac{2}{\gamma_{j e,}}\left(\delta_{i}+1\right)}}{\Gamma(N)\left(\eta_{r} \Omega_{r}\right)^{N}} \frac{\pi \gamma_{t h}{ }^{N}}{2 N_{0}} \sum_{i=0}^{N_{0}}\left(\frac{\delta_{i}+1}{2}\right)^{N-1} \sqrt{1-\delta_{i}{ }^{2}} \frac{N !}{\overline{\gamma_{e}}}\left(\frac{\gamma_{t h}\left(\delta_{i}+1\right)}{2 \eta_{r} \Omega_{r}}+\frac{1}{\overline{\gamma_{e}}}\right)^{-N-1}\right) \\ \times-\sum_{k=0}^{N-1} \frac{\gamma_{t h}{ }^{k}}{k !\left(\eta_{r} \Omega_{r}\right)^{k}} \sum_{n=1}^{\infty} \mathrm{T}\left(n(k+n-1) !\left(\frac{\gamma_{t h}}{\eta_{r} \Omega_{r}}+\frac{1}{\gamma_{e}}\right)^{-(k+n)}-\frac{(k+n) !}{\gamma_{e}}\left(\frac{\gamma_{t h}}{\eta_{r} \Omega_{r}}+\frac{1}{\gamma_{e}}\right)^{-(k+n)-1}\right) \\ -\frac{e^{\frac{1}{\gamma_{j e,}}-\frac{2}{\gamma_{j e l}\left(\delta_{i}+1\right)}}}{\Gamma(N)\left(\eta_{r} \Omega_{r}\right)^{N}} \frac{\pi \gamma_{t h}{ }^{N}}{2 N_{0}} \sum_{i=0}^{N_{0}} \sum_{n=1}^{\infty}\left(\frac{\delta_{i}+1}{2}\right)^{N-1} \sqrt{1-\delta_{i}^{2}} \\ \times \mathrm{T}\left(n(N+n-1) !\left(\frac{\gamma_{t h}\left(\delta_{i}+1\right)}{2 \eta_{r} \Omega_{r}}+\frac{1}{\gamma_{e}}\right)^{-(N+n)}-\frac{(N+n) !}{\overline{\gamma_{e}}}\left(\frac{\gamma_{t h}\left(\delta_{i}+1\right)}{2 \eta_{r} \Omega_{r}}+\frac{1}{\overline{\gamma_{e}}}\right)^{-(N+n)-1}\right) \\\end{array}\\\end{aligned}\)       (39)

3.2 Asymptotic Behavior Analysis

In order to reveal further realization of the network performance, the asymptotic behavior is examined at high SNR regime (ηs → ∞), and the diversity order of the network is obtained.

Theorem 5. The asymptotic formula for the SOP of the network is denoted as

\(\begin{aligned}\begin{array}{l}P_{\mathrm{sec}}^{\infty} \approx \frac{\alpha_{s}{ }^{M}}{M ! \eta_{s}^{M}}\left(\gamma_{t h}-1\right)^{M}+\left(\frac{\alpha_{s}^{M}}{M ! \eta_{s}^{M}}\left(\gamma_{t h}-1\right)^{M}+1\right) \\ \times \frac{\gamma_{t h}{ }^{N}}{\left(\eta_{r} \Omega_{r}\right)^{N}}\left(\frac{1}{N !}-\frac{e^{\frac{1}{\gamma_{j e t}}}}{(N-1) !} \frac{\pi}{2 N_{0}} \sum_{i=0}^{N_{0}}\left(\frac{\delta_{i}+1}{2}\right)^{N-1} e^{-\frac{2}{\gamma_{\gamma_{e l}}\left(\delta_{i}+1\right)}} \sqrt{1-\delta_{i}^{2}}\right) \\ \times\left(N !\left(\frac{1}{\overline{\gamma_{e}}}\right)^{-N}-\sum_{n=1}^{\infty} \mathrm{T}(n(N+n-1) !-(N+n) !)\left(\frac{1}{\overline{\gamma_{e}}}\right)^{-N-n}\right)\end{array}\end{aligned}\)       (40)

Proof. At high SNR regime, expanding the exponential function using Maclaurin series expansion [31], the asymptotic formulas of \(\begin{aligned}F_{\gamma_{s r}}\end{aligned}\) and \(\begin{aligned}F_{\gamma_{d}}\end{aligned}\) are given as

\(\begin{aligned}F_{\gamma_{s r}}(x) \approx \frac{\alpha_{s}^{M}}{M ! \eta_{s}^{M}} x^{M}\end{aligned}\)        (41)

and

\(\begin{aligned}f_{\gamma_{r d}}(x) \approx \frac{x^{N-1}}{(N-1) !\left(\eta_{r} \Omega_{d}\right)^{N}}\end{aligned}\)        (42)

Base on (16) and (42), the asymptotic expressions of (37) can be formulated as

\(\begin{aligned}F_{A}(z) \approx \frac{z^{N}}{\left(\eta_{r} \Omega_{r}\right)^{N}}\left(\frac{1}{N !}-\frac{e^{\frac{1}{\gamma_{j e, l}}}}{(N-1) !} \frac{\pi}{2 N_{0}} \sum_{i=0}^{N_{0}}\left(\frac{\delta_{i}+1}{2}\right)^{N-1} e^{-\frac{2}{\gamma_{j e, l}\left(\delta_{i}+1\right)}} \sqrt{1-\delta_{i}^{2}}\right)\end{aligned}\)       (43)

Substituting (34) and (43) into (36), after some algebra processing, the asymptotic formula of Fγdth) can be acquired as

\(\begin{aligned}F_{\gamma_{d}}\left(\gamma_{t h}\right) \approx\left(N !\left(\frac{1}{\overline{\gamma_{e}}}\right)^{-N}-\sum_{n=1}^{\infty} \mathrm{T}(n(N+n-1) !-(N+n) !)\left(\frac{1}{\overline{\gamma_{e}}}\right)^{-N-n}\right)\end{aligned}\)       (44)

Then, combining (41), (44) and (25), (40) can be derived.

Corollary 1. The diversity order of the system at high SNR regime can be obtained by the following derivation.

\(\begin{aligned}d=-\lim _{\eta_{s} \rightarrow \infty} \frac{\log \left(P_{\mathrm{sec}}^{\infty}\right)}{\log \eta_{s}}=\left\{\begin{array}{cc}M, & M<N \\ M=N, & M=N \\ N, & M>N\end{array}\right.\end{aligned}\)       (45)

Remark 1. From Corollary 1, it is observed that the diversity order of the system at high SNR regime is different in different system configurations, represented as min{M, N}. This is to say that the average SNR increase is helpful for the improvement of the system secrecy performance, but it is also subject to the system configuration (the number of transmit/receive antennas).

3.3 Throughput Analysis

To further evaluate the secrecy of the considered HSTRN, the system throughput is investigated in this work. According to pertinent literature [32], the throughput is defined as

\(\begin{aligned}R_{t h r}=\frac{C_{t h}}{2} \times\left(1-P_{\mathrm{sec}}\left(C_{t h}\right)\right)\end{aligned}\)        (46)

where the \(\begin{aligned}\frac{1}{2}\end{aligned}\) denotes the two phases of the communication process, and Psec(Cth)can be acquired from the preceding equation. Then, invoking (39) into (46), the system throughput expression can be derived accordingly.

4. Numerical and Simulation Results

Numerical results from the preceding derivations are showed in this section. For purpose of validating the theoretical analysis results, computer simulations are performed by means of Monte-Carlo. Herein, the SOP performance and throughput analysis are explored based on different fading channel settings, and ηs = ηr is set as transmit SNR. Unless otherwise described, the setting parameters of this work are shown as Table 1 [9,32,33].

Table 1. Table of parameter settings

E1KOBZ_2022_v16n9_3152_t0001.png 이미지

Fig. 3 shows the SOP curves versus ηs for different system configurations and S − R link in different Shadowing-Rician fading scenarios. The analytical and asymptotic SOP curves are drawn respectively according to (39) and (40). The theoretical numerical curves keep complete consistency with the computer simulation curves. Simulation results are obtained through 106 Monte-Carlo simulations, which provide a further verification of the theoretical analysis. The analytical and asymptotic SOP curves almost overlap at moderate-to-high SNR regime. As can be observed, for different system configurations (here referring the antennas number at transmit and receive node), the SOP performance gets better with the SNR increasing, and the SOP in average shadowing scenario is always better than heavy shadowing scenario. Also, notice that the 3 × 3 ( M = 3, N = 3 ) scenario outperforms the 2 × 4 scenario, which outperforms the 2 × 2 scenario. This agrees with (45). Moreover, the diversity order of 3 × 3 system is higher than 2 × 4 system, although they have the same total antennas number. Therefore, the same antennas number at transmit and receive node is a preferable choice, and this may be quite a practical result from an engineering viewpoint.

E1KOBZ_2022_v16n9_3152_f0007.png 이미지

Fig. 3. SOP versus ηs for different system configurations.

Fig. 4 plots the SOP curves for the 2 × 2 scenario versus ηs for different radius of the relay coverage airspace in different shadowing scenarios of Shadowing-Rician fading. Herein, \(\begin{aligned}\overline{\gamma_{r e}}\end{aligned}\) and \(\begin{aligned}\overline{\gamma_{j e}}\end{aligned}\). From the figure, we can notice that the SOP performance is improved due to the increasing of relay coverage airspace. This results from the worse eavesdropping channels, in which more path loss is caused by longer distance between the relay and the eavesdropper.

E1KOBZ_2022_v16n9_3152_f0003.png 이미지

Fig. 4. SOP versus ηs for different D.

Fig. 5 plots the SOP curves for the 2 × 2 scenario versus ηs for different secrecy rate threshold Cth in different scenarios of Shadowing-Rician fading. As is expected, with the decreasing of secrecy rate threshold, the SOP performance improvement of the considered HSTRN is very obvious. However, the achieve order of the network keeps unchanged despite Cth increasing.

E1KOBZ_2022_v16n9_3152_f0004.png 이미지

Fig. 5. SOP versus ηs for different Cth.

Fig. 6 plots a comparison of the SOP performance in the 2 × 2 scenario versus ηs for different \(\begin{aligned}\overline{\gamma_{j e}}\end{aligned}\) in different fading scenarios. Here, we suppose \(\begin{aligned}\overline{\gamma_{r e}}\end{aligned}\). As shown in the figure, the network has a better SOP performance due to the SNR increasing of the jamming link. This can attribute to the jamming signal, which can weaken the eavesdropper link. In other word, the jamming signal has a great effect on the secrecy performance improvement of the network.

E1KOBZ_2022_v16n9_3152_f0005.png 이미지

Fig. 6. SOP versus ηs for different \(\begin{aligned}\overline{\gamma_{j e}}\end{aligned}\).

Fig. 7 describes the system throughput versus ηs for different system configurations in different fading scenarios. As can be noted, the throughputs for different system configurations increase with ηs increasing and then trend to a fixed constant. This result is due to the SOP performance which gets close to zero at high SNR regime. Obviously, the throughputs in average shadowing scenario are higher than heavy shadowing scenario. Moreover, the throughputs for 3 × 3 scenario in the three scenarios ( 2 × 2, 2 × 4, 3 × 3) are far superior to the other two, which agree well with the SOP performance presented in Fig. 3.

E1KOBZ_2022_v16n9_3152_f0006.png 이미지

Fig. 7. System throughput versus ηs for different system configurations.

5. Conclusion

This work explores a physical layer secrecy investigation based on a multi-antenna HSTRN with jamming in the presence of spatial eavesdroppers. Assuming Shadowed-Rician fading for satellite link while Rayleigh fading for terrestrial link, eavesdropper link and jamming link, the theoretical expression for SOP has been deduced. Also, the diversity order of the network is obtained and the system throughput is explored. Then computer simulation is operated to validate the correctness of the theoretical analysis. The investigation illustratesthat the channel fading scenario, the jammer, the relay coverage airspace and the number of transmit and receive antennas contribute much to the secrecy performance improvement of the considered HSTRN. Moreover, the location optimization of the relay in such system could be our further research.

Acknowledgement

This work was supported by the National Natural Science Foundation of China (42074002,41931075), key scientific and technological project of Henan province (212102310436), key scientific research projects of colleges and universities in Henan Province (22A420005), the fundamental research funds for the universities of Henan Province (NSFRF210329), and doctoral fund of Henan Polytechnic University (B2021-18).

References

  1. A. Vanelli-Coralli, G. Corazza, G. Karagiannidis, T. Mathiopoulos, and S. Scalise. "Satellite communications: Research trends and open issues," in Proc. of International Workshop on Satellite and Space Communications, Sept., 2007.
  2. K. An, M. Lin, T. Liang, "On the performance of multiuser hybrid satellite-terrestrial relay networks with opportunistic scheduling," IEEE Communications Letters, vol. 19, no. 10, pp. 1722-1725, Oct. 2015. https://doi.org/10.1109/LCOMM.2015.2466535
  3. K. F. Guo, B. N. Zhang, Y. Z. Huang, D. X. Guo, "Performance analysis of two-way satellite terrestrial relay networks with hardware impairments," IEEE Wireless Communications Letters, vol. 6, no. 4, pp. 430-433, Aug. 2017. https://doi.org/10.1109/LWC.2017.2700797
  4. N. A. Sarker, M. F. Samad, "Capacity and outage performance analysis of secure cooperative RFFSO relaying system in the presence of multiple eavesdroppers," Physical Communication, vol. 49, pp. 1-11, Dec. 2021.
  5. B. Evans, M. Werner, E. Lutz, M. Bousquet, G. E. Corazza, G. Maral and R. Rumeau, "Integration of satellite and terrestrial systems in future multimedia communications," IEEE Wireless Communication, vol. 12, no. 5, pp. 72-80, Oct. 2005. https://doi.org/10.1109/MWC.2005.1522108
  6. S. Kim, H. W. Kim, K. Kang and D. S. Ahn, "Performance Enhancement in Future Mobile Satellite Broadcasting Services," IEEE Communications Magazine, vol. 46, no. 7, pp. 118-124, July 2008. https://doi.org/10.1109/MCOM.2008.4557053
  7. Y. Bu, M. Lin, K. An, J. Ouyang, and C. Yuan, "Performance analysis of hybrid satellite-terrestrial cooperative systems with fixed gain relaying," Wireless Personal Communications, vol. 89, no. 2, pp. 427-445, March 2016. https://doi.org/10.1007/s11277-016-3278-9
  8. S. Sreng, B. Escrig and M. L. Boucheret, "Exact Symbol Error Probability of Hybrid/Integrated Satellite-Terrestrial Cooperative Network," IEEE Transactions on Wireless Communications, vol. 12, no. 3, pp. 1310-1319, March 2013. https://doi.org/10.1109/TWC.2013.013013.120899
  9. X. W. Li, Q. S. Wang, H. X. Peng, H. Zhang, and C. C, Cavalcante, "A unified framework for HSUAV NOMA networks: Performance analysis and location optimization," IEEE Access, vol. 8, pp. 13329-13340, Jan. 2020. https://doi.org/10.1109/access.2020.2964730
  10. X. W. Li, Q. S. Wang, Y. Liu, T. A. Tsiftsis, Z. G. Ding and A. Nallanathan, "UAV-aided multiway NOMA networks with residual hardware impairments," IEEE Wireless Communications Letters, vol. 9, no. 9, pp. 1538-1542, May, 2020. https://doi.org/10.1109/lwc.2020.2996782
  11. X. W. Li, M. L. Zhao, M. Zeng, S. Mumtaz, V. Menon, Z. G. Ding, and O. A. Dobre, "Hardware impaired ambient backscatter NOMA system: Reliability and security," IEEE Transactions Communications, vol. 69, no. 4, pp. 2723- 2736, April. 2021. https://doi.org/10.1109/TCOMM.2021.3050503
  12. Digital video broadcasting (DVB); system specifications for Satellite services to Handheld sevices (SH) below 3 GHz, ETSI EN 102 585 V1.1.2, 2008.
  13. V. K. Sakarellos, C. Kourogiorgas, and A. D. Panagopoulos, "Cooperative hybrid land mobile satellite-terrestrial broadcasting systems: Outage probability evaluation and accurate simulation," Wireless Personal Communications, vol. 79, no. 2, pp. 1471-1481, July 2014. https://doi.org/10.1007/s11277-014-1941-6
  14. M. Lin, Y. W. Jiang, J. Ouyang and K. An, "The performance of a hybrid satellite-terrestrial cooperative networks with interferences," Acta Electronica Sinica, vol. 46, no. 1, pp. 8-14, Jan. 2018.
  15. N. I. Miridakis, D. D. Vergados, and A. Michalas, "Dual-Hop Communication over a Satellite Relay and Shadowed Rician Channels," IEEE Transactions on Vehicular Technology, vol. 64, no. 9, pp. 4031-4040, Sept. 2015. https://doi.org/10.1109/TVT.2014.2361832
  16. K. An, M. Lin, T. Liang, J. B. Wang, J. Wang, Y. Huang and A. L. Swindlehurst, "Performance analysis of multi-antenna hybrid satellite-terrestrial relay networks in the presence of interference," IEEE Transactions on Communications, vol. 63, no. 11, pp. 4390-4404, Nov. 2015. https://doi.org/10.1109/TCOMM.2015.2474865
  17. Wyner A D, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  18. Q. Huang, M. Lin, K. An, J. Ouyang, and W. P. Zhu, "Secrecy performance of hybrid satelliteterrestrial relay networks in the presence of multiple eavesdroppers," IET Communications, vol. 12, no. 1, pp. 26-34, 2018. https://doi.org/10.1049/iet-com.2017.0948
  19. V. Bankey and P. K. Upadhyay, "Physical layer security of multiuser multirelay hybrid satelliteterrestrial relay networks," IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2488- 2501, Jan. 2019. https://doi.org/10.1109/tvt.2019.2893366
  20. X. Q. Wang, H. W. Zhang, and Z. Hou, "Physical Layer Secrecy Analysis of Multi-Hop Hybrid Satellite-Terrestrial Relay Networks with Jamming," Wireless Communications and Mobile Computing, vol. 2021, pp. 1-13, June 2021.
  21. S. Yan, X. Wang, Z. Li, B. Li, and Z. Fei, "Cooperative jamming for physical layer security in hybrid satellite terrestrial relay networks," China Communications, vol. 16, no. 12, pp. 154-164, Dec. 2019. https://doi.org/10.23919/jcc.2019.12.012
  22. Y. Yan, B. Zhang, D. Guo, S. Li, X. Wang, "Joint beamforming and jamming design for secure cooperative hybrid satellite-terrestrial relay network," in Proc. of 25th Wireless and Optical Communication Conference, July, 2016.
  23. K. F. Guo, K. An, B. N. Zhang, Y. Z. Huang, and D. X. Guo, "Physical layer security for hybrid satellite terrestrial relay networks with joint relay selection and user scheduling," IEEE Access, vol. 6, pp. 55 815-55 827, Oct. 2018. https://doi.org/10.1109/access.2018.2872718
  24. J. Ye, C. Zhang, G. Pan, Y. Chen, and Z. Ding, "Secrecy analysis for spatially random UAV systemsm" in Proc. of 2018 IEEE Globecom Workshops, Aug., 2018.
  25. A. Abdi, W. C. Lau, M. S. Alouini, and M. Kaveh, "A new simple model for land mobile satellite channels: first-and second-order statistics," IEEE Transactions on Wireless Communications, vol. 2, no. 3, pp. 519-528, June 2003. https://doi.org/10.1109/TWC.2003.811182
  26. A. Pandey and S. Yadav, "Physical Layer Security in Cooperative AF Relaying Networks With Direct Links Over Mixed Rayleigh and Double-Rayleigh Fading Channels," IEEE Transactions on Vehicular Technology, vol. 67, no. 11, pp. 10615-10630, Nov. 2018. https://doi.org/10.1109/tvt.2018.2866590
  27. L. Fan, N. Yang, T. Q. Duong, M. Elkashlan, and G. K. Karagiannidis, "Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks," IEEE Transactions on Wireless Communications, vol. 15, no. 6, pp. 3856-3867, June 2016. https://doi.org/10.1109/TWC.2016.2530068
  28. E. R. Alotaibi and K. A. Hamdi, "Secure Relaying in Multihop Communication Systems," IEEE Wireless Communications Letters, vol. 20, no. 6, pp. 1120-1123, June 2016. https://doi.org/10.1109/LCOMM.2016.2550025
  29. I. S. Gradshteyn, I. M. Ryzhik, Tables of integrals, series and products, 6th ed., Academic Press, New York, USA, 2000.
  30. D. D. Tran, D. B. Ha, "Secrecy performance analysis of QoS-based non-orthogonal multiple access networks over Nakagami-m fading," in Proc. of 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing, Jan., 2018.
  31. P. L. Yeoh, M. Elkashlan and I. B. Collings, "Selection relaying with transmit beamforming: a comparison of fixed and variable gain relaying," IEEE Transactions on Communications, vol. 59, no. 6, pp. 1720-1730, June 2011. https://doi.org/10.1109/TCOMM.2011.042111.100055
  32. K. F. Guo, K. An, B. N. Zhang, Y. Z. Huang, D. X. Guo, G. Zheng and S. Chatzinotas. "On the performance of the uplink satellite multi-terrestrial relay networks with hardware impairments and interference," IEEE Systems Journal, vol. 13, no. 3, pp. 2297-2308, Sept. 2019. https://doi.org/10.1109/jsyst.2019.2901800
  33. Loo C, "A statistical model for a land mobile satellite link," IEEE Transactions on Vehicular Technology, vol. 34, no. 3, pp. 122-127, Aug. 1985. https://doi.org/10.1109/T-VT.1985.24048