On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming

Authors

  • Quang Sang Nguyen Ho Chi Minh City University of Transport image/svg+xml
  • Van Hien Nguyen Posts and Telecommunications Institute of Technology, Vietnam
  • Trung Duy Tran Posts and Telecommunications Institute of Technology, Vietnam
  • Luong Nhat Nguyen Posts and Telecommunications Institute of Technology, Vietnam
  • Lam-Thanh Tu Ton Duc Thang University image/svg+xml

DOI:

https://doi.org/10.4108/eetinis.v10i4.4192

Keywords:

Fountain Codes, Intercept Probability, Outage Probability, Satellite-Terrestrial Communications

Abstract

The performance of the satellite-terrestrial network with Fountain codes (FCs) is conducted in the present work. More precisely, the air-to-ground link is modeled according to the shadow-Rician distribution to capture the strong light-of-sight (LOS) path as well as the impact of the shadowing. As a result, we employ the directional beamforming at both the satellite and relay to mitigate such an ultra-long transmission distance. We investigate the trade-off between the reliability and security aspects. Particularly, we derive the outage probability (OP) and intercept probability (IP) in the closed-form expressions. To further facilitate the security of the considered networks, the friendly jamming scheme is deployed as well. Finally, simulation results based on the Monte-Carlo method are given to corroborate the exactness of the developed mathematical framework and to identify key parameters such as antenna gain, and transmit power that have a big impact on the considered networks.

Downloads

Download data is not yet available.

References

Duong, T.Q., Nguyen, L.D., Bui, T.T., Pham, K.D. and Karagiannidis, G.K. (2023) Machine learning-aided real-time optimized multibeam for 6g integrated satellite-terrestrial networks: Global coverage for mobile services. IEEE Network 37(2): 86–93. doi:10.1109/mnet.003.2200275, URL https://doi.org/10.1109/mnet.003.2200275. DOI: https://doi.org/10.1109/MNET.003.2200275

Duong, T.Q., da Costa, D.B., Elkashlan, M. and Bao, V.N.Q. (2012) Cognitive amplify-and-forward relay networks over nakagami-m fading. IEEE Transactions on Vehicular Technology 61(5): 2368–2374. doi:10.1109/tvt.2012.2192509, URL https://doi.org/10.1109/tvt.2012.2192509. DOI: https://doi.org/10.1109/TVT.2012.2192509

Duy, T., Khan, L., Binh, N. and Nhat, N. (2021) Intercept probability analysis of cooperative cognitive networks using fountain codes and cooperative jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 8(26): 168229. doi:10.4108/eai.261-2021.168229, URL https://doi.org/10.4108/eai.26-1-2021.168229. DOI: https://doi.org/10.4108/eai.26-1-2021.168229

Douglass, N.P., Langel, J., Moore, W.J., Ng, L., Dudukovich, R.M. and Mal-Sarkar, S. (2023) Application of fountain code to highrate delay tolerant networks. IEEE Access : 1–1doi:10.1109/access.2023.3315659, URL https://doi.org/10.1109/access.2023.3315659. DOI: https://doi.org/10.1109/ACCESS.2023.3315659

Guo, K., Shuai, H., Li, X., Yang, L., Tsiftsis, T.A., Nallanathan, A. and Wu, M. (2023) Two-way satellite- HAP-terrestrial networks with non-orthogonal multiple access. IEEE Transactions on Vehicular Technology : 1–15doi:10.1109/tvt.2023.3307457, URL https://doi.org/10.1109/tvt.2023.3307457. DOI: https://doi.org/10.1109/TVT.2023.3307457

Zhang, Y., Zhang, H., Zhou, H. and Li, W. (2021) Interference cooperation based resource allocation in NOMA terrestrial-satellite networks. In 2021 IEEE Global Communications Conference (GLOBECOM) (IEEE). doi:10.1109/globecom46510.2021.9685107, URL https://doi.org/10.1109/globecom46510.2021.9685107. DOI: https://doi.org/10.1109/GLOBECOM46510.2021.9685107

Sheng, Z., Tuan, H.D., Duong, T.Q. and Hanzo, L. (2021) UAV-aided two-way multi-user relaying. IEEE Transactions on Communications 69(1): 246–260. doi:10.1109/tcomm.2020.3030679, URL https://doi.org/10.1109/tcomm.2020.3030679. DOI: https://doi.org/10.1109/TCOMM.2020.3030679

Nguyen, T.N., Chien, T.V., Tran, D.H., Phan, V.D., Voznak, M., Chatzinotas, S., Ding, Z. et al. (2023) Security reliability trade-offs for satellite-terrestrial relay networks with a friendly jammer and imperfect CSI. IEEE Transactions on Aerospace and Electronic Systems : 1-16doi:10.1109/taes.2023.3282934, URL https://doi.org/10.1109/taes.2023.3282934. DOI: https://doi.org/10.1109/TAES.2023.3282934

Li, X., Li, Y., Song, X., Shao, L. and Li, H. (2023) RIS assisted UAV for weather-dependent satellite terrestrial integrated network with hybrid FSO/RF systems. IEEE Photonics Journal : 1–16doi:10.1109/jphot.2023.3314664, URL https://doi.org/10.1109/jphot.2023.3314664. DOI: https://doi.org/10.1109/JPHOT.2023.3314664

Hung, D., Duy, T. and Trinh, D. (2019) Security reliability analysis of multi-hop LEACH protocol with fountain codes and cooperative jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 6(18): 157120. doi:10.4108/eai.28-3-2019.157120, URL https://doi.org/10.4108/eai.28-3-2019.157120. DOI: https://doi.org/10.4108/eai.28-3-2019.157120

Tu, L.T., Nguyen, T.N., Duy, T.T., Tran, P.T., Voznak, M. and Aravanis, A.I. (2022) Broadcasting in cognitive radio networks: A fountain codes approach. IEEE Transactions on Vehicular Technology 71(10): 11289–11294. doi:10.1109/TVT.2022.3188969. DOI: https://doi.org/10.1109/TVT.2022.3188969

Ngoc, L.N., Tu, L.T., Tan, N., Nguyen, P.L. and Nguyen, Q.S. (2022) Performance on cognitive broadcasting networks employing fountain codes and maximal ratio transmission. Radioengineering Vol 32. doi:10.13164/re.2023.0001. DOI: https://doi.org/10.13164/re.2023.0001

Tu, L.T., Nguyen, T.N., Tran, P.T., Duy, T.T. and Nguyen, Q.S. (2023) Performance statistics of broadcasting networks with receiver diversity and fountain codes. Journal of Information and Telecommunication : 1–17doi:10.1080/24751839.2023.2225254, URL https://doi.org/10.1080/24751839.2023.2225254. DOI: https://doi.org/10.1080/24751839.2023.2225254

Jameel, F., Wyne, S., Kaddoum, G. and Duong, T.Q. (2019) A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Communications Surveys & Tutorials 21(3): 2734–2771. doi:10.1109/comst.2018.2865607, URL https://doi.org/10.1109/comst.2018.2865607. DOI: https://doi.org/10.1109/COMST.2018.2865607

Anh, N., Minh, N., Duy, T., Hanh, T. and Hai, H. (2021) Reliability-security analysis for harvest-tojam based multi-hop cluster MIMO networks using cooperative jamming methods under impact of hardware impairments. EAI Endorsed Transactions on Industrial

Networks and Intelligent Systems 8(28): 170963. doi:10.4108/eai.17-9-2021.170963, URL https://doi.org/10.4108/eai.17-9-2021.170963. DOI: https://doi.org/10.4108/eai.17-9-2021.170963

Nguyen, Q.S., Nguyen, T.N. and Tu, L.T. (2023) On the security and reliability performance of SWIPT-enabled full-duplex relaying in the non-orthogonal multiple access networks. Journal of Information and Telecommunication: 1–15doi:10.1080/24751839.2023.2218046, URL https://doi.org/10.1080/24751839.2023.2218046. DOI: https://doi.org/10.1080/24751839.2023.2218046

Wu, Y., Duong, T.Q. and Swindlehurst, A.L. (2019) Safeguarding 5g-and-beyond networks with physical layer security. IEEE Wireless Communications 26(5): 4–5. doi:10.1109/mwc.2019.8883122, URL https://doi.org/10.1109/mwc.2019.8883122. DOI: https://doi.org/10.1109/MWC.2019.8883122

Nguyen, N.P., Tu, L.T., Duong, T.Q. and Nallanathan, A. (2017) Secure communications in cognitive underlay networks over nakagamim channel. Physical Communication 25: 610–618. doi:https://doi.org/10.1016/j.phycom.2016.05.003. DOI: https://doi.org/10.1016/j.phycom.2016.05.003

Toan, N.V., Duy, T.T., Son, P.N., Hung, D.T., Sang, N.Q. and Tu, L.T. (2023) Outage performance of hybrid satellite-terrestrial relaying networks with rateless codes in co-channel interference environment. In 2023 International Conference on System Science and Engineering (ICSSE) (IEEE). doi:10.1109/icsse58758.2023.10227228, URL https://doi.org/10.1109/icsse58758.2023.10227228. DOI: https://doi.org/10.1109/ICSSE58758.2023.10227228

Kapetanovic, D., Zheng, G.,Wong, K.K. and Ottersten, B. (2013) Detection of pilot contamination attack using random training and massive MIMO. In 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (IEEE). doi:10.1109/pimrc.2013.6666096, URL https://doi.org/10.1109/pimrc.2013.6666096. DOI: https://doi.org/10.1109/PIMRC.2013.6666096

Xiong, Q., Liang, Y.C., Li, K.H. and Gong, Y. (2015) An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. IEEE Transactions on Information Forensics and Security 10(5): 932–940. doi:10.1109/tifs.2015.2392564, URL https://doi.org/10.1109/tifs.2015.2392564. DOI: https://doi.org/10.1109/TIFS.2015.2392564

Hoang, T.M., Duong, T.Q., Tuan, H.D., Lambotharan, S. and Hanzo, L. (2021) Physical layer security: Detection of active eavesdropping attacks by support vector machines. IEEE Access 9: 31595–31607.doi:10.1109/access.2021.3059648, URL https://doi.org/10.1109/access.2021.3059648. DOI: https://doi.org/10.1109/ACCESS.2021.3059648

Nguyen, T.N., Tu, L.T., Tran, D.H., Phan, V.D., Voznak, M., Chatzinotas, S. and Ding, Z. (2022) Outage performance of satellite terrestrial full-duplex relaying networks with co-channel interference. IEEE Wireless Communications Letters 11(7): 1478–1482. doi:10.1109/LWC.2022.3175734. DOI: https://doi.org/10.1109/LWC.2022.3175734

Gradshteyn, I.S. and Ryzhik, I.M. (2007) Table of integrals, series, and products (Elsevier/Academic Press, Amsterdam), seventh ed.

Nguyen, T.N., Tu, L.T., Fazio, P., Chien, T.V., Le, C.V., Binh, H.T.T. and Voznak, M. (2023) On the dilemma of reliability or security in unmanned aerial vehicle communications assisted by energy harvesting relaying. IEEE Journal on Selected Areas in Communications: 1–1 doi:10.1109/jsac.2023.3322756, URL https://doi.org/10.1109/jsac.2023.3322756. DOI: https://doi.org/10.1109/JSAC.2023.3322756

Tu, L.T., Phan, V.D., Nguyen, T.N., Tran, P.T., Duy, T.T., Nguyen, Q.S., Nguyen, N.T. et al. (2023) Performance analysis of multihop full-duplex NOMA systems with imperfect interference cancellation and near-field pathloss. Sensors 23(1): 524. doi:10.3390/s23010524, URL https://doi.org/10.3390/s23010524. DOI: https://doi.org/10.3390/s23010524

Di Renzo, M., Zappone, A., Tu, L.T. and Debbah, M. (2019) Spectral-energy efficiency pareto front in cellular networks: A stochastic geometry framework. IEEE Wireless Communications Letters 8(2): 424–427. doi:10.1109/LWC.2018.2874642. DOI: https://doi.org/10.1109/LWC.2018.2874642

Goldsmith, A. (2005) Wireless Communications (Cambridge University Press). doi:10.1017/cbo9780511841224, URL https://doi.org/10.1017/cbo9780511841224. DOI: https://doi.org/10.1017/CBO9780511841224

Tu, L.T. and Di Renzo, M. (2017) Analysis of millimeter wave cellular networks with simultaneous wireless information and power transfer. In 2017 International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom): 39–43. doi:10.1109/SIGTELCOM.2017.7849792. DOI: https://doi.org/10.1109/SIGTELCOM.2017.7849792

Downloads

Published

07-12-2023

How to Cite

Nguyen, Q. S., Nguyen, V. H., Tran, T. D., Nguyen, L. N., & Tu, L.-T. (2023). On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 10(4), e3. https://doi.org/10.4108/eetinis.v10i4.4192

Funding data