On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming
DOI:
https://doi.org/10.4108/eetinis.v10i4.4192Keywords:
Fountain Codes, Intercept Probability, Outage Probability, Satellite-Terrestrial CommunicationsAbstract
The performance of the satellite-terrestrial network with Fountain codes (FCs) is conducted in the present work. More precisely, the air-to-ground link is modeled according to the shadow-Rician distribution to capture the strong light-of-sight (LOS) path as well as the impact of the shadowing. As a result, we employ the directional beamforming at both the satellite and relay to mitigate such an ultra-long transmission distance. We investigate the trade-off between the reliability and security aspects. Particularly, we derive the outage probability (OP) and intercept probability (IP) in the closed-form expressions. To further facilitate the security of the considered networks, the friendly jamming scheme is deployed as well. Finally, simulation results based on the Monte-Carlo method are given to corroborate the exactness of the developed mathematical framework and to identify key parameters such as antenna gain, and transmit power that have a big impact on the considered networks.
Downloads
References
Duong, T.Q., Nguyen, L.D., Bui, T.T., Pham, K.D. and Karagiannidis, G.K. (2023) Machine learning-aided real-time optimized multibeam for 6g integrated satellite-terrestrial networks: Global coverage for mobile services. IEEE Network 37(2): 86–93. doi:10.1109/mnet.003.2200275, URL https://doi.org/10.1109/mnet.003.2200275. DOI: https://doi.org/10.1109/MNET.003.2200275
Duong, T.Q., da Costa, D.B., Elkashlan, M. and Bao, V.N.Q. (2012) Cognitive amplify-and-forward relay networks over nakagami-m fading. IEEE Transactions on Vehicular Technology 61(5): 2368–2374. doi:10.1109/tvt.2012.2192509, URL https://doi.org/10.1109/tvt.2012.2192509. DOI: https://doi.org/10.1109/TVT.2012.2192509
Duy, T., Khan, L., Binh, N. and Nhat, N. (2021) Intercept probability analysis of cooperative cognitive networks using fountain codes and cooperative jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 8(26): 168229. doi:10.4108/eai.261-2021.168229, URL https://doi.org/10.4108/eai.26-1-2021.168229. DOI: https://doi.org/10.4108/eai.26-1-2021.168229
Douglass, N.P., Langel, J., Moore, W.J., Ng, L., Dudukovich, R.M. and Mal-Sarkar, S. (2023) Application of fountain code to highrate delay tolerant networks. IEEE Access : 1–1doi:10.1109/access.2023.3315659, URL https://doi.org/10.1109/access.2023.3315659. DOI: https://doi.org/10.1109/ACCESS.2023.3315659
Guo, K., Shuai, H., Li, X., Yang, L., Tsiftsis, T.A., Nallanathan, A. and Wu, M. (2023) Two-way satellite- HAP-terrestrial networks with non-orthogonal multiple access. IEEE Transactions on Vehicular Technology : 1–15doi:10.1109/tvt.2023.3307457, URL https://doi.org/10.1109/tvt.2023.3307457. DOI: https://doi.org/10.1109/TVT.2023.3307457
Zhang, Y., Zhang, H., Zhou, H. and Li, W. (2021) Interference cooperation based resource allocation in NOMA terrestrial-satellite networks. In 2021 IEEE Global Communications Conference (GLOBECOM) (IEEE). doi:10.1109/globecom46510.2021.9685107, URL https://doi.org/10.1109/globecom46510.2021.9685107. DOI: https://doi.org/10.1109/GLOBECOM46510.2021.9685107
Sheng, Z., Tuan, H.D., Duong, T.Q. and Hanzo, L. (2021) UAV-aided two-way multi-user relaying. IEEE Transactions on Communications 69(1): 246–260. doi:10.1109/tcomm.2020.3030679, URL https://doi.org/10.1109/tcomm.2020.3030679. DOI: https://doi.org/10.1109/TCOMM.2020.3030679
Nguyen, T.N., Chien, T.V., Tran, D.H., Phan, V.D., Voznak, M., Chatzinotas, S., Ding, Z. et al. (2023) Security reliability trade-offs for satellite-terrestrial relay networks with a friendly jammer and imperfect CSI. IEEE Transactions on Aerospace and Electronic Systems : 1-16doi:10.1109/taes.2023.3282934, URL https://doi.org/10.1109/taes.2023.3282934. DOI: https://doi.org/10.1109/TAES.2023.3282934
Li, X., Li, Y., Song, X., Shao, L. and Li, H. (2023) RIS assisted UAV for weather-dependent satellite terrestrial integrated network with hybrid FSO/RF systems. IEEE Photonics Journal : 1–16doi:10.1109/jphot.2023.3314664, URL https://doi.org/10.1109/jphot.2023.3314664. DOI: https://doi.org/10.1109/JPHOT.2023.3314664
Hung, D., Duy, T. and Trinh, D. (2019) Security reliability analysis of multi-hop LEACH protocol with fountain codes and cooperative jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 6(18): 157120. doi:10.4108/eai.28-3-2019.157120, URL https://doi.org/10.4108/eai.28-3-2019.157120. DOI: https://doi.org/10.4108/eai.28-3-2019.157120
Tu, L.T., Nguyen, T.N., Duy, T.T., Tran, P.T., Voznak, M. and Aravanis, A.I. (2022) Broadcasting in cognitive radio networks: A fountain codes approach. IEEE Transactions on Vehicular Technology 71(10): 11289–11294. doi:10.1109/TVT.2022.3188969. DOI: https://doi.org/10.1109/TVT.2022.3188969
Ngoc, L.N., Tu, L.T., Tan, N., Nguyen, P.L. and Nguyen, Q.S. (2022) Performance on cognitive broadcasting networks employing fountain codes and maximal ratio transmission. Radioengineering Vol 32. doi:10.13164/re.2023.0001. DOI: https://doi.org/10.13164/re.2023.0001
Tu, L.T., Nguyen, T.N., Tran, P.T., Duy, T.T. and Nguyen, Q.S. (2023) Performance statistics of broadcasting networks with receiver diversity and fountain codes. Journal of Information and Telecommunication : 1–17doi:10.1080/24751839.2023.2225254, URL https://doi.org/10.1080/24751839.2023.2225254. DOI: https://doi.org/10.1080/24751839.2023.2225254
Jameel, F., Wyne, S., Kaddoum, G. and Duong, T.Q. (2019) A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Communications Surveys & Tutorials 21(3): 2734–2771. doi:10.1109/comst.2018.2865607, URL https://doi.org/10.1109/comst.2018.2865607. DOI: https://doi.org/10.1109/COMST.2018.2865607
Anh, N., Minh, N., Duy, T., Hanh, T. and Hai, H. (2021) Reliability-security analysis for harvest-tojam based multi-hop cluster MIMO networks using cooperative jamming methods under impact of hardware impairments. EAI Endorsed Transactions on Industrial
Networks and Intelligent Systems 8(28): 170963. doi:10.4108/eai.17-9-2021.170963, URL https://doi.org/10.4108/eai.17-9-2021.170963. DOI: https://doi.org/10.4108/eai.17-9-2021.170963
Nguyen, Q.S., Nguyen, T.N. and Tu, L.T. (2023) On the security and reliability performance of SWIPT-enabled full-duplex relaying in the non-orthogonal multiple access networks. Journal of Information and Telecommunication: 1–15doi:10.1080/24751839.2023.2218046, URL https://doi.org/10.1080/24751839.2023.2218046. DOI: https://doi.org/10.1080/24751839.2023.2218046
Wu, Y., Duong, T.Q. and Swindlehurst, A.L. (2019) Safeguarding 5g-and-beyond networks with physical layer security. IEEE Wireless Communications 26(5): 4–5. doi:10.1109/mwc.2019.8883122, URL https://doi.org/10.1109/mwc.2019.8883122. DOI: https://doi.org/10.1109/MWC.2019.8883122
Nguyen, N.P., Tu, L.T., Duong, T.Q. and Nallanathan, A. (2017) Secure communications in cognitive underlay networks over nakagamim channel. Physical Communication 25: 610–618. doi:https://doi.org/10.1016/j.phycom.2016.05.003. DOI: https://doi.org/10.1016/j.phycom.2016.05.003
Toan, N.V., Duy, T.T., Son, P.N., Hung, D.T., Sang, N.Q. and Tu, L.T. (2023) Outage performance of hybrid satellite-terrestrial relaying networks with rateless codes in co-channel interference environment. In 2023 International Conference on System Science and Engineering (ICSSE) (IEEE). doi:10.1109/icsse58758.2023.10227228, URL https://doi.org/10.1109/icsse58758.2023.10227228. DOI: https://doi.org/10.1109/ICSSE58758.2023.10227228
Kapetanovic, D., Zheng, G.,Wong, K.K. and Ottersten, B. (2013) Detection of pilot contamination attack using random training and massive MIMO. In 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (IEEE). doi:10.1109/pimrc.2013.6666096, URL https://doi.org/10.1109/pimrc.2013.6666096. DOI: https://doi.org/10.1109/PIMRC.2013.6666096
Xiong, Q., Liang, Y.C., Li, K.H. and Gong, Y. (2015) An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. IEEE Transactions on Information Forensics and Security 10(5): 932–940. doi:10.1109/tifs.2015.2392564, URL https://doi.org/10.1109/tifs.2015.2392564. DOI: https://doi.org/10.1109/TIFS.2015.2392564
Hoang, T.M., Duong, T.Q., Tuan, H.D., Lambotharan, S. and Hanzo, L. (2021) Physical layer security: Detection of active eavesdropping attacks by support vector machines. IEEE Access 9: 31595–31607.doi:10.1109/access.2021.3059648, URL https://doi.org/10.1109/access.2021.3059648. DOI: https://doi.org/10.1109/ACCESS.2021.3059648
Nguyen, T.N., Tu, L.T., Tran, D.H., Phan, V.D., Voznak, M., Chatzinotas, S. and Ding, Z. (2022) Outage performance of satellite terrestrial full-duplex relaying networks with co-channel interference. IEEE Wireless Communications Letters 11(7): 1478–1482. doi:10.1109/LWC.2022.3175734. DOI: https://doi.org/10.1109/LWC.2022.3175734
Gradshteyn, I.S. and Ryzhik, I.M. (2007) Table of integrals, series, and products (Elsevier/Academic Press, Amsterdam), seventh ed.
Nguyen, T.N., Tu, L.T., Fazio, P., Chien, T.V., Le, C.V., Binh, H.T.T. and Voznak, M. (2023) On the dilemma of reliability or security in unmanned aerial vehicle communications assisted by energy harvesting relaying. IEEE Journal on Selected Areas in Communications: 1–1 doi:10.1109/jsac.2023.3322756, URL https://doi.org/10.1109/jsac.2023.3322756. DOI: https://doi.org/10.1109/JSAC.2023.3322756
Tu, L.T., Phan, V.D., Nguyen, T.N., Tran, P.T., Duy, T.T., Nguyen, Q.S., Nguyen, N.T. et al. (2023) Performance analysis of multihop full-duplex NOMA systems with imperfect interference cancellation and near-field pathloss. Sensors 23(1): 524. doi:10.3390/s23010524, URL https://doi.org/10.3390/s23010524. DOI: https://doi.org/10.3390/s23010524
Di Renzo, M., Zappone, A., Tu, L.T. and Debbah, M. (2019) Spectral-energy efficiency pareto front in cellular networks: A stochastic geometry framework. IEEE Wireless Communications Letters 8(2): 424–427. doi:10.1109/LWC.2018.2874642. DOI: https://doi.org/10.1109/LWC.2018.2874642
Goldsmith, A. (2005) Wireless Communications (Cambridge University Press). doi:10.1017/cbo9780511841224, URL https://doi.org/10.1017/cbo9780511841224. DOI: https://doi.org/10.1017/CBO9780511841224
Tu, L.T. and Di Renzo, M. (2017) Analysis of millimeter wave cellular networks with simultaneous wireless information and power transfer. In 2017 International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom): 39–43. doi:10.1109/SIGTELCOM.2017.7849792. DOI: https://doi.org/10.1109/SIGTELCOM.2017.7849792
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.
Funding data
-
Posts and Telecommunications Institute of Technology
Grant numbers 12-2023-HV-VT2