Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Secure transmission for mixed FSO-RF relay networks with physical-layer key encryption and wiretap coding

Open Access Open Access

Abstract

In this paper, we propose a secure transmission scheme to protect the confidential messages in a mixed free space optical-radio frequency (FSO-RF) relay network against malicious eavesdroppers. In the proposed scheme, the physical-layer key generation, encryption method and physical-layer wiretap coding are exploited to protect the FSO and RF links. Specifically, the overall transmission is divided into two time slots. In the first time slot, the transmitter and relay of the FSO link utilize the channel reciprocity of the FSO link to generate key packets. In the second time slot, the confidential messages will be securely transmitted from the transmitter to the receiver assisted by the relay over two phases. In the first phase, the transmitter sends the confidential messages to the relay through the FSO link encrypted by the generated key packets. In the second phase, the relay will forward these confidential messages to the receiver through the RF link protected by the physical-layer wiretap coding. For the proposed scheme, the key generation rate can be obtained. In addition, we analyze the performance of the connection outage probability and the secrecy outage probability, and optimally design the target transmission rate and secrecy rate such that the average secrecy rate is maximized. Numerical results are presented to demonstrate the performance superiority of the proposed scheme in terms of the average secrecy rate.

© 2017 Optical Society of America

1. Introduction

Free space optical (FSO) communication is considered as a promising technique for developing the next generation networks due to its desirable features of license free operation, flexibility, rapid deployment time, low-cost and so on [1]. FSO communication has been proposed in front-haul of the cloud radio access network, building communications, emergency situation recovery, military applications [2], and it is regarded as a complementary technology for the radio frequency (RF) communication. However, FSO communication depends on the line-of-sight channel quality of the FSO link, which limits its applications. To overcome this limitation, the mixed FSO-RF relay scheme, which utilizes RF communication to replace FSO for the scenarios when FSO links cannot be utilized, has attracted much recent research attention [3,4].

In the FSO-RF relay network, the messages are transmitted in two-hop (FSO and RF). The performance superiority of the FSO-RF relay network in terms of outage probability, bit-error rate, ergodic capacity, has been established in [5–9]. In addition, the user schedule [10, 11], relay selection method [12], and information combining technique [13] are exploited to further improve the performance of the FSO-RF relay network. In the above works, the authors typically assumed that the FSO link is secure. However, when the main lobe of the laser beam is considerably wider than the receiver aperture size and/or there is a pointing error, the FSO-RF relay network still faces the eavesdropping threat from one or more malicious eavesdroppers. Moreover, due to the broadcast nature of the wireless media, the RF link can also be threatened by malicious eavesdropping. Traditionally, the upper-layer cryptographic algorithms, which assume limited computational capability at the eavesdropper, are sufficient to protect the confidential messages. Due to the complexity in key generation and allocation as well as the current advanced hardware at the eavesdropper, these cryptographic algorithms cannot satisfy secure requirements in future wireless networks. Besides these upper-layer algorithms, physical-layer key generation and encryption method (which exploits the channel reciprocity to generate key packets [14]) and physical-layer wiretap coding (which exploits the channel quality difference between the channels from the transmitter to the receiver and from the transmitter to the eavesdropper to protect the confidential messages [15, 16]) can be utilized to protect the confidential messages in the FSO-RF relay network.

The information security in the FSO-RF relay network was first studied in [17] where the physical-layer security method of cooperative jamming was utilized to secure the RF link. Also, the reliability and security tradeoff of the proposed scheme was investigated. However, the FSO link in [17] was assumed to be perfectly secure and the authors did not study the security issues associated with the FSO link. For the security of the FSO link, the authors in [18] first proposed a physical-layer key generation and sharing scheme to encrypt the confidential messages. But the pointing error that will affect the key generation rate was not considered in [18]. Besides the physical-layer key encryption scheme, the authors in [19] investigated the secrecy performance with a physical-layer security method. Since the FSO requires line-of-sight transmission, those physical layer security methods designed for RF communication cannot be utilized to protect the confidential messages. For example, the eavesdropper is a passive user and the cooperative jammer cannot find the eavesdropper to jam. Therefore, in this paper, we propose a new secure transmission scheme by utilizing the physical-layer key encryption and wiretap coding to protect the confidential messages for a mixed FSO-RF relay network where both the FSO and RF links are protected. To the best of the authors’ knowledge, this is the first work that considers secure transmission for both FSO and RF links.

In this paper, we propose a secure transmission scheme to protect an FSO-RF relay network against a malicious eavesdropper. In the proposed scheme, the physical-layer key encryption method and the physical-layer wiretap coding are utilized to protect both FSO and RF links. Specifically, for the FSO link, we utilize the channel reciprocity of the FSO link to generate key packets and these key packets will encrypt the confidential messages in the following transmission. By taking into account of the pointing error, the key generation rate can be obtained from our analysis. For the RF link, the physical-layer wiretap coding is adopted to protect the confidential messages. In the proposed scheme, we analyze the connection outage probability (COP) and the secrecy outage probability (SOP), and optimally design the target transmission rate and the secrecy rate under the constraint of the maximum permitted COP such that the average secrecy rate is maximized. Since we take advantages of both the FSO and RF links, the confidential messages can be efficiently and securely transmitted. Numerical results are presented to demonstrate the performance superiority of the proposed scheme in terms of the average secrecy rate.

The rest of this paper is organized as follows. Section 2 describes the system model of the proposed scheme. In Section 3, we demonstrate the key generation process and study the key generation rate. We interpret the information transmission process and formulate the optimization problem in Section 4. Extensive simulation results are presented in Section 5, and Section 6 concludes the paper.

2. System model

We consider a mixed FSO-RF network shown in Fig. 1 in which Alice wants to securely transmit the confidential messages to Bob, and her transmission is assisted by a relay node, which is called Relay. There is no direct link between Alice and Bob, and Relay adopts the decode-and-forward (DF) relay protocol to forward the confidential messages. Alice is equipped with a single photon-aperture transmitter; Relay is equipped with a single photon-aperture receiver from one side and a single antenna transmitter from the other side; Bob is equipped with a single antenna receiver. Therefore, Alice will transmit her confidential messages to Relay through the FSO link and Relay will forward these messages to Bob over the RF link. In addition, there is an eavesdropper (Eve) who can eavesdrop Alice’s confidential messages. For the FSO link, when there is a broad laser beam at Relay or when there is pointing error, the FSO link can be eavesdropped. For the RF link, due to the broadcast nature of the wireless media, Eve can receive the confidential messages. Thus, both the FSO and RF links require to be protected. This communication scenario can capture, for example, an unmanned aerial vehicle (UAV) based cloud radio access network where Alice contains the baseband units (BBUs) that are being housed on a UAV plane, Relay is the remote radio head (RRH) and the FSO fronthaul link will provide reliable and secure communication between Alice and Relay.

 figure: Fig. 1

Fig. 1 The mixed FSO-RF relay system model.

Download Full Size | PDF

The upper layer data packets are divided into equal frame. In each frame, a packet will be transmitted from Alice to Bob assisted by Relay. The channel variables of Alice → Relay, Alice → Eve, Relay → Bob and Relay → Eve are denoted as har, hae, hrb and hre, respectively. har denotes the FSO link that consists of path loss, atmospheric turbulence, and pointing errors [5], i.e., har=harlharahare where harl denotes the path loss; hara denotes the atmospheric turbulence attenuation modeled by a Gamma-Gamma distribution; hare denotes the pointing error. Utilizing the Beer-Lambert law, harl can be derived as [20]

harl=exp(λL)
where λ is the atmospheric attenuation coefficient and L is the distance between Alice and Relay. Then, by applying the coherent modulation technique and the pointing error model in [21], the probability density function (PDF) of har is given by [5]
fhar(x)=ξ2αβA0harlΓ(α)Γ(β)G1,33,0(αβA0harlx|ξ2ξ21,α1,β1)
where Gm,mp,q() is the Meijer’s G-function [22]; α and β are atmospheric turbulence parameters [20]; A0 and ξ represent the parameters relating the pointing error and they are defined in [21]. For the RF links, we assume that each frame experiences stationary, ergodic, independent, and flat Rayleigh fading. Therefore, the channel power gains grb = |hrb|2 and gre = |hre|2 follow the exponential distribution with parameters σrb2 and σre2, respectively. Moreover, we assume that all noise variables in the RF link are zero-mean circularly-symmetric Gaussian random variables with variance N0, and all noise in the FOS link are shot-noise that can be modeled as additive white Gaussian noise (AWGN) with variance Nf = 2qRploΔf, where q is electronic charge, R is the responsibility, plo is the local oscillator power, and Δf is the noise equivalent bandwidth of the photoelectric [25,26]. The transmit powers of Alice and Relay are denoted as pa and pr, respectively.

In the proposed scheme, each frame, denoted as T, is equally divided into two slots as T1 and T2 with T1 + T2 = T shown in Fig. 2. In the first time slot, Alice and Relay will generate key packets to encrypt the confidential messages. In the second time slot, Alice first transmits her confidential messages to Relay encrypted by the key encryption, and then Relay will forward these confidential messages to Bob by utilizing the wiretap coding. For the wiretap coding, the target transmission rate Rb and secrecy rate Rs are selected, and the difference between Rb and Rs, denoted as Re = RbRs, is the information redundancy against eavesdropping. In the following, we will describe in details the key generation and information transmission processes.

 figure: Fig. 2

Fig. 2 Two time slots required to transmit one data packet from Alice to Bob via Relay.

Download Full Size | PDF

3. Key generation

In this section, we first interpret the key generation process. Then, we will investigate the key generation rate.

3.1. Key generation process

The key generation process is divided into two stages. During the first stage with duration T12, Alice sends a known sequence SA with T12 symbols to Relay.. We select the integer that is nearest to T12 and less than T12. The received signal at Relay is

YR=paharSA+nR
where nR is the noise sequence at Relay with each element being a shot-noise variable [25, 26]. In the second stage, Relay transmits a known sequence SR with T12 symbols to Alice. The received signal at Alice is
YA=prharSR+nA
where nA is the noise sequence at Alice with each element being a shot-noise variable [25, 26]. From Eqs. (3) and (4), Alice and Relay can estimate the FSO channel har as [18]
YR=paharSA+nRh˜ar,r=SATpa|SA|YR=har+NR
and
YA=prharSR+nAh˜ar,a=SRTpa|SR|YA=har+NA
where NR=SATpa|SA|nR with |SA|=paT12; NA=SRTpr|SR|nA with |SR|=prT12. In addition, Eve also receives SR and SA that are given by
YE1=pahaeSA+nE1
and
YE2=prhreSR+nE2
where nE1 and nE2 are, respectively, the noise variables at the first and second stages. Since har is independent of hae and hre, YE1 and YE2 are independent of ar,r and ar,a. Therefore, the generated key packets cannot be decoded by Eve. After the channel estimation, Alice and Relay will agree with a common random key based on their estimation of the channel gain by employing Slepian-Wolf source coding [14].

3.2. Key generation rate

According to Eq. (5), the PDF of ar is derived as

fh˜ar(x)=fhar(x)*fNR(x)
where “ * “ denotes the convolution operation. The PDF of NR is
fNR(x)=12πσNRexp(x22σNR2)
with σNR2=N0pa. Substituting Eq. (2) into Eq. (9), far (x) is derived as
fh˜ar(x)=ξ2αβA0harlΓ(α)Γ(β)G1,33,0(αβA0harlx|ξ2ξ21,α1,β1)*12πσNRexp(x22σNR2)=ξ2αβ2πσNRA0harlΓ(α)Γ(β)0G1,33,0(αβA0harlt|ξ2ξ21,α1,β1)×exp((xt)22σNR2)dt=ξ2αβA0hsrlΓ(α)Γ(β)00Γ(ξ21s)Γ(α1s)Γ(β1s)2πiΓ(ξ2s)×(αβA0hsrlt)sexp(x22xt+t22σNa2)dsdt=(a)ξ2αβA0hsrlΓ(α)Γ(β)0Γ(ξ21s)Γ(α1s)Γ(β1s)2πiΓ(ξ2s)×(αβA0hsrl)s(1σNa2)s+12Γ(s+1)exp(x24σNa2)D(s+1)(xσNa)ds
where (a) is derived according to Eq. (3.462.1) in [29] and
D(s+1)(xσNa)=2s+12exp(x24σNa2)(πΓ(s+22)Φ(s+12,12;x22σNa2)+2πxσNaΓ(s+12)Φ(s+22,32;x22σNa2))
which is defined in Eq. (9.240) in [29] and Φ (·, ·; ·) is the confluent hypergeometric function [29]. Therefore, far (x) is derived as
fh˜h˜ar(x)=σNaξ2αβ2A0hsrlΓ(α)Γ(β)0G1,33,0(αβA0hsrlt|ξ2ξ21,α1,β1)×(πΓ(s+22)Φ(s+12,12;x22σNa2)+2πxσNaΓ(s+12)Φ(s+22,32;x22σNa2))ds.

According to the common channel state information between Alice and Relay, the key generation rate is derived as [18]

Rk=T1TI(h˜ar,h˜ra)=T1T(H(h˜ar)H(h˜ra|h˜ra))=T1T(H(h˜ar)H(h˜raSRT|SR|nA+SAT|SA|nR|h˜ra)).
Since ra, SR, SA, nR and nA are independent of each other, the key generation rate is derived as
Rk=T1T(H(h˜ar)H(h˜ra|h˜ra)H(SRT|SR|nA|h˜ra)H(SAT|SA|nR|h˜ra))=T1T(H(h˜ar)H(SRT|SR|nA)H(SAT|SA|nR))=T1T(H(h˜ar)H(SRT|SR|nA+SAT|SA|nR))
where H (ar) is derived as
H(h˜ar)=fh˜ar(x)log2fh˜ar(x)dx
and
H(SRT|SR|nA+SAT|SA|nR)=12log2(2πeσNA2Nf+2πeσNR2Nf)
with σNA2=N0pr. Therefore, substituting Eqs. (13), (16) and (17) into Eq. (15), the key generation rate is obtained.

4. Secure transmission

After the generation of the key packets, Alice will securely transmit the confidential messages to Bob over two phases. In the first phase with duration T22, Alice transmits the confidential messages to Relay encrypted by the key packets. Then, in the second phase with duration T22, Relay will forward the confidential messages to Bob protected by the physical-layer wiretap coding.

4.1. Information transmission

In the first phase, the confidential messages are encrypted by the key packets through the XOR operation. In this paper, we adopt the coherent optical receiver to process the received signal and, the information rate at Relay is derived as [23, 24, 26]

RarT22Tlog2(1+paRAharqΔf)
where A denotes the detector area. Since Alice utilizes the key packets to encrypt the confidential messages, the following condition must satisfy RarRk. Since Eve does not know the key packets, she cannot decode the confidential message. Therefore, the information rate Rar is the secrecy rate.

In the second phase, Relay will decode the encrypted message and re-encode the confidential messages through physical-layer security wiretap coding. Then, the information rate at Bob is given by

Rrb=T22Tlog2(1+prgrbN0).
In addition, Eve also eavesdrops the confidential messages with rate
Rre=T22Tlog2(1+prgreN0).

In the first phase, the confidential messages are encrypted by the key packets and the secrecy rate is Rar. In the second phase, according to the wiretap coding, the secrecy rate is

Rsec2=(RrbRre)+
where (a)+ = max (0, a). According to Eqs. (18), (19) and (20), the secrecy rate of the proposed scheme is derived as
Rsec=min(Rar,(RrbRre)+).
Since the channel state information (CSI) associated with Eve is always difficult to acquire, in the following, we will analyze the outage performance and optimal the target transmission rate and secrecy rate.

Remark: For the proposed scheme, since the confidential messages are encrypted by the key packets in the FSO link, the transmission link for the FSO link Rar should not be larger than the key generation rate Rk. According to Eq. (22), RsecRk. From Eq. (15), we observe that Rk is a monotonically increasing function of T1. Therefore, we should increase T1 to increase the key generation rate. However, since from Eq. (21), we can observe that Rsec2 is a monotonically increasing function of T2 and T1 + T2 = T; therefore, there is a trade-off between the maximum secrecy rate and the time allocation. Since Rk in Eq. (15) is too complex to analyze, it is challenging to derive the optimal time allocation, and we will study this problem in our future work.

Remark: For the proposed scheme, in this first slot, Relay will first generate key packets and consume an energy of prT12 for transmitting the known signal sequences. during the channel estimation and key generation processes, Alice and Relay will consume some time and energy for processing the channel estimation and key generation. In the second slot, Relay first processes the decoding and re-encoding of the confidential messages and then, consumes an energy of prT22 for relaying. This consumption of time and energy will guarantee the security of the confidential messages. In addition, for the slow fading channel scenarios, the generated key packets can be utilized for a long period of time until the channel changes.

4.2. The optimal transmission scheme

In the proposed scheme, when the transmission rate is less than Rb, the confidential messages will experience connection outage; when the eavesdropping rate is larger than Re = RbRs, the confidential messages will experience secrecy outage. In order to securely and reliably transmit the confidential messages, we first investigate the performances of COP and SOP, and then optimally design the target transmission rate and secrecy rate to maximize the average secrecy rate.

4.2.1. COP and SOP

In the first phase, the transmission will experience connection outage when Rar < Rb. There fore, the COP for the FSO link is

Pcop,ar=Pr(Rar<Rb)=ξ2Γ(α)Γ(β)G2,43,1(ξ2αβξ2+1R^bμ|1,ξ2+1ξ2,α,β,0)
where R^b=qΔfpaRA(2TRbT21) and μ=ξ2(ξ2+2)A02hl2αβ(α+1)(β+1)(ξ2+1)2. In the second phase, the transmission will experience connection outage when Rrb < Rb. Therefore, the COP for the RF link is
Pcop,rb=Pr(Rrb<Rb)=1exp(RˇbPrσrb2)
where Rˇb=N0pr(2TRbT21). Therefore, the COP for the proposed scheme is
Pcop=1(1Pcop,ar)(1Pcop,rb).

In the FSO link, since the confidential messages are encrypted by the key packets, Eve cannot decode the confidential messages. In the RF link, when the eavesdropper rate is greater than Re, the secrecy outage will occur with probability

Psop=Pr(RreRe)=exp(R^ePrσre2)
where R^e=N0pr(2T(RbRs)T21). Then, the average secrecy rate is Rs (1 − Psop).

4.2.2. Optimal transmission design

In order to maximize the average secrecy rate, we formulate the optimization problem as

P1:maxRb,RsRs(1Psop)s.t.Pcop<Pupper,Rsmin{Rb,Rar}Rk
where the first constraint is the reliability requirement; the second constraint indicates that the target secrecy rate should be less than the information rates in both the FSO and RF links.

To solve P1, we first set a target secrecy rate Rs. Then, P1 can be rewritten as

P2:minRbPsops.t.Pcop<Pupper,Rsmin{Rb,Rar}Rk.
According to Eqs. (23) and (24), we can easily verify that Pcop,ar and Pcop,rb are monotonically increasing functions of Rb. From Eq. (25), we can show that Pcop is an increasing function of Rb. Therefore, we can acquire the optimal Rbmax that satisfies Pcop = Pupper. Substituting the optimal Rbmax into P2, this problem can be rewritten as
P3:minRsRs(1Psop)s.t.Rsmin{Rbmax,Rar}Rk.
Set F = Rs (1 − Psop). The first-order and second-order derivatives of F with respect to Rs are derived as
{dFdRs=1(1+Rsprσre2)exp(RbmaxRsPrσre2),d2FdRs2=(2Rsprσre2+Rspr2σre4)exp(RbmaxRsPrσre2).
Since d2FdRs2<0, F is convex with respect to Rs. We can solve P3 through the traditional convex optimization methods. Therefore, we can derive the optimal target transmission rate and secrecy rate.

5. Simulation results

In this section, we will simulate the proposed scheme with empirical parameters. For the FSO link, we consider the air-to-ground communication scenario over the atmospheric turbulence channel by considering the pointing error. In addition, according to the plane wave propagation in the absence of inner scale, the parameters of α and β are respectively derived as α=(exp(0.49σR2(1+1.11σR125)76)1)1 and β=(exp(0.51σR2(1+0.69σR65)56)1)1, where σR2=1.23Cn2(2πλ)76L116 is the Rytov variance, Cn2 denotes the refractive-index structure parameter, λ is the wavelength, and L is the transmission distance [5, 20]. In our simulation, λ is set to 1550 nm [27, 28]; Cn2 is set to 2×1014m23 for the moderate turbulence case and 5×1014m23 for the strong turbulence case [18, 20, 29, 30]. For the RF link, we adopt the Rayleigh fading scenario. In addition, we also simulate the average secrecy rate in [17] and the key generation rate in [18] for comparison.

In Fig. 3, we plot the key generation rate versus Alice’s transmit power pa under different turbulence conditions. In Fig. 3, we can observe that the key generation rate is an increasing function of pa. The reason is that when more power is allocated for the training sequence, Alice and Relay can estimate the common channel state information with high precision. Therefore, the key generation rate will increase. In addition, since the moderate turbulence has less effect on the channel estimation, the key generation rate under moderate turbulence will be larger than the key generation rate under strong turbulence condition. Moreover, we also simulate the key generation rate in [18]. Since the pointing error is not considered in [18], the key generation rate in the contrast key generation scheme is slightly larger than the proposed scheme. Furthermore, the performance trends of the proposed scheme and the comparison scheme are the same.

 figure: Fig. 3

Fig. 3 The key generation rate of the proposed scheme is a function of Alice’s transmit power pa.

Download Full Size | PDF

In Fig. 4, we plot the average secrecy rate versus Relay’s transmit power pr under different turbulence conditions. In this figure, we can observe that the average secrecy rate is a monotonically increasing function of pr. The reason is that a large value of pr indicates that more power is allocated for the reliable and secure transmission. Therefore, the average secrecy rate will increase. However, since the SOP is an increasing function of pr, the average secrecy rate will increase slowly under a large value of pr. In addition, under the moderate turbulence condition, the key generation rate will increase, resulting in an increase of the average secrecy rate. Moreover, we also simulate the average secrecy rate in [17] for comparison. Since the comparison scheme has not considered the information security in the FSO link, its average secrecy rate is lower than the proposed scheme.

 figure: Fig. 4

Fig. 4 The average secrecy rate of the proposed scheme is a function of Relay’s transmit power pr.

Download Full Size | PDF

In Fig. 5, we plot the average secrecy rate versus the maximum permitted COP Pupper under different turbulence conditions. In this figure, we can observe that the average secrecy rate is an increasing function of Pupper. The reason is that under the constraint of strict COP requirement, the reliability requirements of both the FSO and RF links limit the increase of the average secrecy rate. On the contrary, under a large value of Pupper, the SOP will limit the increase of the average secrecy rate. Similarly, under the moderate turbulence condition, the key generation rate will increase, resulting in an increase of the average secrecy rate. Since the comparison scheme in [17] has not considered the information security in the FSO link, the average secrecy rate of the contrast scheme is lower than that of the proposed scheme.

 figure: Fig. 5

Fig. 5 The average secrecy rate of the proposed scheme is a function of the maximum permitted COP.

Download Full Size | PDF

6. Conclusion

In this paper, we proposed a secure transmission scheme to protect the confidential messages in a mixed FSO-RF relay network against malicious eavesdroppers. In the proposed scheme, the physical-layer key encryption and wiretap coding techniques were utilized to protect the FSO and RF links. By taking into account of the pointing error, we derived the key generation rate. In addition, we investigated the COP and SOP performances, and optimally designed the target transmission rate and secrecy rate such that the average secrecy rate is maximized. Since we take advantages of both the FSO and RF links, the confidential messages can be efficiently and securely transmitted. Numerical results are demonstrated to prove the performance superiority of the proposed scheme in terms of the average secrecy rate.

Funding

National Natural Science Foundation of China (61431011); Key Laboratory of Wireless Sensor Network and Communication, Chinese Academy of Sciences (NO. 2015003); and the Fundamental Research Funds for the Central Universities.

References and links

1. D. Kedar and S. Arnon, “Urban optical wireless communication networks: The main challenges and possible solutions,” IEEE Commun. Mag. 42(5), S2–S7 (2004). [CrossRef]  

2. D. J. T. Heatley, “Optical wireless: The story so far,” IIEEE Commun. Mag. 36(12), 72–74 (1988). [CrossRef]  

3. E. Lee, J. Park, D. Han, and G. Yoon, “Performance analysis of the asymmetric dual-hop relay transmission with mixed RF/FSO links,” IEEE Photon. Technol. Lett. 23(21), 1642–1644 (2011). [CrossRef]  

4. I. S. Ansari, F. Yilmaz, and M.-S. Alouini, “Impact of pointing errors on the performance of mixed RF/FSO dual-hop transmission systems,” IEEE Wireless Commun. Lett. 2(3), 351–354 (2013). [CrossRef]  

5. E. Zedini, H. Soury, and M. -S. Alouini, “On the performance analysis of dual-hop mixed FSO/RF systems,” IEEE Trans. on Commun. 15(5), 3679–3689 (2016).

6. I. S. Ansari, M. M. Abbdallah, M. -S. Alouini, and K. A. Qaraqe, “Outage performance analysis of underlay cognitive RF and FSO wireless channels,” The 3rd International Workshop in Optical Wireless Communications (IWOW) (2014).

7. L. Kong, W. Xu, L. Hanzo, H. Zhang, and C. Zhao, “Performance of a free-space-optical relay-assisted hybrid RF/FSO system in generalized M-distributed channels,” IEEE Photonics J. 64(6), 1–19 (2015). [CrossRef]  

8. L. Yang, M. O. Hasna, and X. Gao, “Performance of mixed RF/FSO with variable gain over generalized atmospheric turbulence channels,” IEEE J. Sel. Areas Commun. 33(9), 1913–1924 (2015). [CrossRef]  

9. S. Anees and M. R. Bhatnagar, “Performance of an amplify-and-forward dual-hop asymmetric RF-FSO communication system,” IEEE/OSA J. Opt. Commun. Networking 7(2), 124–135 (2015). [CrossRef]  

10. A. M. Salhab, F. S. Al-Qahtani, R. M. Radaydeh, S. A. Zummo, and H. Alnuweiri, “Power allocation and performance of multiuser mixed RF/FSO relay networks with opportunistic scheduling and outdated channel information,” J. Lightwave Technol. 34(13), 3259–3272 (2016). [CrossRef]  

11. N. I. Miridakis, M. Matthaiou, and G. K. Karagiannidis, “Multiuser relaying over mixed RF/FSO links,” IEEE Trans. on Commun. 62(5), 1634–1645 (2014). [CrossRef]  

12. M. I. Petkovic, A. M. Cvetkovic, G. T. Djordjevic, and G. K. Karagiannidis, “Partial relay selection with outdated channel state estimation in mixed RF/FSO systems,” J. Lightwave Technol. 33(13), 2860–2867 (2015). [CrossRef]  

13. B. Makki, T. Svensson, T. Eriksson, and M. -S. Alouini, “On the performance of RF-FSO links with and without hybrid ARQ,” IEEE Trans. on Wireless Commun. Accepted, (2016). [CrossRef]  

14. L. Lai, Y. Lang, and W. Du, “Cooperative key generation in wireless networks,” IEEE J. Sel. Areas Commun. 30(8), 1578–1588 (2012). [CrossRef]  

15. Y. Shiu, S. Chang, H. Wu, S. Huang, and H. Chen, “Physical layer security in wireless networks: A tutorial,” IEEE Commun. Mag. 18(2), 66–74 (2011).

16. H. V. Poor, “Information and inference in the wireless physical layer,” IEEE Commun. Mag. 19(1), 40–47 (2012).

17. A. H. A. El-Malek, A. M. Salhab, S. A. Zummo, and M. -S. Alouini, “Security-reliability trade-off analysis for multiuser SIMO mixed RF/FSO relay networks with opportunistic user scheduling,” IEEE Trans. on Commun. 15(9), 5904–5918 (2016).

18. N. Wang, X. Song, J. Cheng, and V. C. M. Leung, “Enhancing the security of free-space optical communications with secret sharing and key agreement,” IEEE/OSA J. Opt. Commun. Networking 6(12), 1072–1081 (2014). [CrossRef]  

19. F. J. Lopez-Martinez, G. Gomez, and J. M. Garrido-Balsells, “Physical-layer security in free-space optical communications,” IEEE Photonics J. 7(2), 1–14 (2015). [CrossRef]  

20. G. T. Djordjevic, M. I. Petkovic, A. M. Cvetkovic, and G. K. Karagiannidis, “Mixed RF/FSO relaying with outdated channel state information,” IEEE J. Sel. Areas Commun. 33(9), 1935–1948 (2015). [CrossRef]  

21. A. A. Farid and S. Hranilovic, “Outage capacity optimization for frees pace optical links with pointing errors,” J. Lightw. Technol. 25(7), 1702–1710 (2007). [CrossRef]  

22. I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 7th ed. (Academic2007).

23. A. Belmonte and J. M. Kahn, “Capacity of coherent free-space optical links using diversity-combining techniques,” Opt. Express 17(15), 12601–12611 (2009). [CrossRef]   [PubMed]  

24. A. Belmonte and J. M. Kahn, “Capacity of coherent free-space optical links using atmospheric compensation techniques,” Opt. Express 17(4), 2763–2773 (2009). [CrossRef]   [PubMed]  

25. Q. Gao, C. Gong, and Z. Xu, “Joint transceiver and offset design for visible light communications with input-dependent shot noise,” Accepted by IEEE Trans. Wireless Commun. (2017). [CrossRef]  

26. M. Niu, J. Cheng, and J. F. Holzman, “Error rate analysis of M-ary coherent free-space optical communication systems with K -distributed turbulence,” IEEE Trans. Wireless Commun. 59(3), 664–668 (2011). [CrossRef]  

27. B. Zhu, J. Cheng, M. -S. Alouini, and L. Wu, “Relay placement for FSO multihop DF systems with link obstacles and infeasible regions,” IEEE Trans. Wireless Commun. 14(9), 5240–5250 (2015). [CrossRef]  

28. Y. Yang, Z. Zeng, J. Cheng, and C. Guo, “Spatial dimming scheme for optical OFDM based visible light communication,” Opt. Express , 24(28), 30254–30263 (2016). [CrossRef]  

29. X. Tang, Z. Ghassemlooy, S. Rajbhandari, W. O. Popoola, and C. G. Lee, “Coherent polarization shift keying modulated free space optical links over a Gamma-Gamma turbulence channel,” Amer. J. Eng. Appl. Sci. 4(4), 520–530 (2012).

30. M. Toyoshima, H. Takenaka, and Y. Takayama, “Atmospheric turbulence-induced fading channel model for space-to-ground laser communications links,” Opt. Express 19(17), 15965–15975 (2011). [CrossRef]   [PubMed]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (5)

Fig. 1
Fig. 1 The mixed FSO-RF relay system model.
Fig. 2
Fig. 2 Two time slots required to transmit one data packet from Alice to Bob via Relay.
Fig. 3
Fig. 3 The key generation rate of the proposed scheme is a function of Alice’s transmit power pa.
Fig. 4
Fig. 4 The average secrecy rate of the proposed scheme is a function of Relay’s transmit power pr.
Fig. 5
Fig. 5 The average secrecy rate of the proposed scheme is a function of the maximum permitted COP.

Equations (30)

Equations on this page are rendered with MathJax. Learn more.

h ar l = exp ( λ L )
f h ar ( x ) = ξ 2 α β A 0 h ar l Γ ( α ) Γ ( β ) G 1 , 3 3 , 0 ( α β A 0 h ar l x | ξ 2 ξ 2 1 , α 1 , β 1 )
Y R = p a h ar S A + n R
Y A = p r h ar S R + n A
Y R = p a h ar S A + n R h ˜ ar , r = S A T p a | S A | Y R = h ar + N R
Y A = p r h ar S R + n A h ˜ ar , a = S R T p a | S R | Y A = h ar + N A
Y E 1 = p a h ae S A + n E 1
Y E 2 = p r h re S R + n E 2
f h ˜ ar ( x ) = f h ar ( x ) * f N R ( x )
f N R ( x ) = 1 2 π σ N R exp ( x 2 2 σ N R 2 )
f h ˜ ar ( x ) = ξ 2 α β A 0 h ar l Γ ( α ) Γ ( β ) G 1 , 3 3 , 0 ( α β A 0 h ar l x | ξ 2 ξ 2 1 , α 1 , β 1 ) * 1 2 π σ N R exp ( x 2 2 σ N R 2 ) = ξ 2 α β 2 π σ N R A 0 h ar l Γ ( α ) Γ ( β ) 0 G 1 , 3 3 , 0 ( α β A 0 h ar l t | ξ 2 ξ 2 1 , α 1 , β 1 ) × exp ( ( x t ) 2 2 σ N R 2 ) d t = ξ 2 α β A 0 h sr l Γ ( α ) Γ ( β ) 0 0 Γ ( ξ 2 1 s ) Γ ( α 1 s ) Γ ( β 1 s ) 2 π i Γ ( ξ 2 s ) × ( α β A 0 h sr l t ) s exp ( x 2 2 x t + t 2 2 σ N a 2 ) d s d t = ( a ) ξ 2 α β A 0 h sr l Γ ( α ) Γ ( β ) 0 Γ ( ξ 2 1 s ) Γ ( α 1 s ) Γ ( β 1 s ) 2 π i Γ ( ξ 2 s ) × ( α β A 0 h sr l ) s ( 1 σ N a 2 ) s + 1 2 Γ ( s + 1 ) exp ( x 2 4 σ N a 2 ) D ( s + 1 ) ( x σ N a ) d s
D ( s + 1 ) ( x σ N a ) = 2 s + 1 2 exp ( x 2 4 σ N a 2 ) ( π Γ ( s + 2 2 ) Φ ( s + 1 2 , 1 2 ; x 2 2 σ N a 2 ) + 2 π x σ N a Γ ( s + 1 2 ) Φ ( s + 2 2 , 3 2 ; x 2 2 σ N a 2 ) )
f h ˜ h ˜ ar ( x ) = σ N a ξ 2 α β 2 A 0 h sr l Γ ( α ) Γ ( β ) 0 G 1 , 3 3 , 0 ( α β A 0 h sr l t | ξ 2 ξ 2 1 , α 1 , β 1 ) × ( π Γ ( s + 2 2 ) Φ ( s + 1 2 , 1 2 ; x 2 2 σ N a 2 ) + 2 π x σ N a Γ ( s + 1 2 ) Φ ( s + 2 2 , 3 2 ; x 2 2 σ N a 2 ) ) d s .
R k = T 1 T I ( h ˜ ar , h ˜ ra ) = T 1 T ( H ( h ˜ ar ) H ( h ˜ ra | h ˜ ra ) ) = T 1 T ( H ( h ˜ ar ) H ( h ˜ ra S R T | S R | n A + S A T | S A | n R | h ˜ ra ) ) .
R k = T 1 T ( H ( h ˜ ar ) H ( h ˜ ra | h ˜ ra ) H ( S R T | S R | n A | h ˜ ra ) H ( S A T | S A | n R | h ˜ ra ) ) = T 1 T ( H ( h ˜ ar ) H ( S R T | S R | n A ) H ( S A T | S A | n R ) ) = T 1 T ( H ( h ˜ ar ) H ( S R T | S R | n A + S A T | S A | n R ) )
H ( h ˜ ar ) = f h ˜ ar ( x ) log 2 f h ˜ ar ( x ) d x
H ( S R T | S R | n A + S A T | S A | n R ) = 1 2 log 2 ( 2 π e σ N A 2 N f + 2 π e σ N R 2 N f )
R ar T 2 2 T log 2 ( 1 + p a RA h ar q Δ f )
R rb = T 2 2 T log 2 ( 1 + p r g rb N 0 ) .
R re = T 2 2 T log 2 ( 1 + p r g re N 0 ) .
R sec 2 = ( R rb R re ) +
R sec = min ( R ar , ( R rb R re ) + ) .
P cop , ar = Pr ( R ar < R b ) = ξ 2 Γ ( α ) Γ ( β ) G 2 , 4 3 , 1 ( ξ 2 α β ξ 2 + 1 R ^ b μ | 1 , ξ 2 + 1 ξ 2 , α , β , 0 )
P cop , rb = Pr ( R rb < R b ) = 1 exp ( R ˇ b P r σ rb 2 )
P cop = 1 ( 1 P cop , ar ) ( 1 P cop , rb ) .
P sop = Pr ( R re R e ) = exp ( R ^ e P r σ re 2 )
P 1 : max R b , R s R s ( 1 P sop ) s . t . P cop < P upper , R s min { R b , R ar } R k
P 2 : min R b P sop s . t . P cop < P upper , R s min { R b , R ar } R k .
P 3 : min R s R s ( 1 P sop ) s . t . R s min { R b max , R ar } R k .
{ d F d R s = 1 ( 1 + R s p r σ re 2 ) exp ( R b max R s P r σ re 2 ) , d 2 F d R s 2 = ( 2 R s p r σ re 2 + R s p r 2 σ re 4 ) exp ( R b max R s P r σ re 2 ) .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.