1 Introduction

The open broadcast nature of wireless media, though makes communications ubiquitously accessible as the world has witnessed in the past decades, leads the security requirement to be a paramount challenge of such communications systems [1]. Indeed, the flow of a large amount of data over wireless links that potentially may be sensitive in nature is more vulnerable than other transmission links to various security breaches such as location privacy [2] and eavesdropping attacks. Security in wireless communication networks is conventionally implemented above the physical layer using key-based cryptography methods [3]. However that these computationally-based security methods have worked well in conventional systems, they may not be applicable to the emerging fifth generation and beyond (B5G) wireless networks for the Internet of Things (IoT) which includes a broad range of applications such as unmanned aerial vehicle (UAV) networks, vehicular and ad-hoc networks (VANET), Internet of Vehicles (IoV), massive machine communication (MMC), and so forth [4]. As a matter of fact, these types of time-varying network topologies require complicated key management and sharing which is difficult to implement in distributed networks. Additionally, the computation and processing abilities of the nodes may be naturally limited and the complicated encryption calculations may not be supported [5].

To complement these complex schemes, wireless transmitters can also be validated at the physical layer by exploiting the dynamic characteristics of the associated communication links [6]. To accomplish this idea, physical layer security (PLS) has been emerged as a promising paradigm and an unbreakable security approach from the information-theoretic perspective, and provisioned for safeguarding 5G wireless communications networks against eavesdropping attacks without incurring additional security overhead [6, 7]. The fundamental notion of PLS is to intelligently exploit the characteristics of wireless channels and their impairments, eg., noise, fading, diversity, etc, and possibly the information source [8]. Indeed, the main design goal of PLS is to establish a performance gap between the link of the legitimate receiver, also known as Main link and that of the eavesdropper, or the so called Wiretap link, by using some well-designed secure transmission techniques (see, eg., [9] and references therein).

In the context of PLS, cooperative jamming, which involves the transmission of some artificial noise signals to degrade the quality of received signal-to-noise ratio (SNR) at the potential eavesdropper while maintaining that at the intended destination, has been contemplated a powerful security technique [3]. Further, cooperative jamming transmissions can be applied by any legitimate node of the network such as source [10], wherein some artificial noise is transmitted alongside the information signal, some dedicated authorized nodes [11, 12], wherein extra helper entities are employed for the jamming transmission, or even intended receivers, which is named as destination-assisted jamming technique [13,14,15]. Based on this technique, the decoding of the jammed signal by the authenticated user (destination) at some appropriate rate is possible, owing to the fact that the destination is able to receive quite a clean signal after self-interference cancellation, whereas the eavesdropper is kept unable to distinguish information-bearing signal from jamming transmitted by the destination.

Recently, the relay-assisted communications wherein low-cost intermediate nodes may be exploited to assist the source-to-destination transmission, has attracted the attention of many researchers. Indeed, relaying technology can assist in providing reliable communication between the long-distance users, and improve the spectral efficiency and coverage. Additionally, it has been viewed as a pervasive technology for the wireless sensor networks (WSN) and 5G IoT networks on the grounds that it can be adopted over a wide domain of applications such as smart homes, health-care services, device-to-device (D2D), IoV, and UAV communications [7, 13, 16,17,18]. For example, the authors in [13] explored the end-to-end communications between long-distance users via UAV-assisted relaying. The authors in [18] have considered a multi-hop scenario for a wireless sensor network and then applied a Genetic algorithm based optimization to enhance the energy expenditures, scalability, and lifetime of the WSN. Further, [19] presented a novel interference mitigation algorithm with low complexity to improve the throughput and the outage performances for Heterogeneous Networks (HetNets). The problem of designing the optimum beamforming vector for multiuser multiple-input and multiple-output (MU-MIMO) wireless communication system to minimize interference has also been investigated in [20] where the authors analyzed the Ergodic sum-rate capacity with Rician fading channels. However, it should be mentioned that the aforementioned research works have considered the end-to-end communications via trusted intermediate nodes, while the security issues of intermediate nodes have not been taken into account.

Nonetheless, several practical scenarios mentioned above may include untrusted relay nodes, i.e., the intermediate nodes which lack perfect security clearance, from which the source-destination pair wishes to keep the confidential information to be exchanged secret in spite of enlisting their help for the purpose of reliable communications [7, 21]. Hence, in these networks, it is important to protect the confidentiality of information from the untrustworthy relay, while simultaneously exploiting its relaying capability to improve the data transmission rate. In the area of untrusted relaying, an obvious yet thought-provoking question might initially arise is whether or not a chain of untrusted relays can be beneficial for the secure transmission of source-destination pair?

1.1 Related works

In the past decade, several works have considered the interesting scenario of untrusted relaying [22,23,24,25,26,27,28,29,30]. Thanks to the destination-based jamming strategy [22], it is shown that a positive secrecy rate can still be attained in untrusted relay networks. The authors in [26] proposed a joint relay selection and power allocation scheme for an untrusted relaying scenario in the presence of either non-colluding passive eavesdroppers or colluding ones. We note that non-colluding eavesdroppers independently try to obtain the confidential information without cooperating with each other. However, colluding eavesdroppers can potentially pose more harmful attacks by cooperatively attempting in decoding the confidential messages which are common in large-scale distributed networks [31]. Further, Mamaghani et al. by performing secrecy performance analyses, thoroughly investigated a two-way secure untrusted amplify-and-forward (AF) relaying in the presence of an extra jammer [15, 24, 25]. In their system model, the energy-limited intermediate nodes are powered via simultaneous wireless information and power transfer (SWIPT) technique to establish a self-reliant secure relaying network.

Notably, most of the recent works [23,24,25,26] have focused on the simple scenario of two-hop untrusted relaying. In some communication networks such as ad-hoc and IoT, it is of great interest to develop a communication network with more than two hops to provide the source-to-destination communication [28,29,30]. Note that the consecutive relays may be necessary helpers to deliver the information signal to the destination. This is particularly valid when the communications channels experience a heavy shadowing where the communication environment gets harsh, or when the distance between terminals is large, or even when the nodes suffer from limited power resources. Amongst the real-world communication systems that developing multiple relays might be crucial for message transmission are WSN, 5G IoT communications, and UAV-based relaying. For the latter application as an example, the wireless communication links may be easily blocked due to mountains and terrains in rural areas, or high-rise buildings in a metropolitan urban, which usually demands employing multiple UAV-relays to resolve the blockage or long-distance issues [27].

Having said that, extending the analysis from two-hop to multi-hop untrusted relaying networks is non-trivial because using more hops means that more nodes get involved in the transmission as well as more chances for eavesdropping. In addition, the number of hops becomes a design parameter that affects the end-to-end delay and throughput. Interestingly, He et al. in [30] demonstrated that a non-negative secrecy rate can be achieved for such a network by properly exploiting friendly jamming transmission from the appropriate nodes including both untrusted relays and destination. The main research question of that paper was whether an achievable non-vanishing perfect secrecy rate is attainable regardless of how many unauthenticated intermediate nodes are required for establishing source-destination communication? They showed that by employing an intelligent combination of some coding schemes, this goal could be achieved. It is worth pointing out that the untrusted relays considered in [30] adopt compute-and-forward (CF) protocol for data transmission. However, in 5G IoT wireless networks which devices are low-power with limited computational capability, the designers aim at implementing architectures with low computational complexity, eg., [32]. With that in mind, taking into account the CF relaying protocol, as investigated in [30], might become costly owing to the fact that each intermediate node needs to reliably retrieve the message from the received signal and then retransmit what decoded to the next subsequent node. Therefore, this relaying scheme may not be suitable for the computationally-limited intermediate nodes to be employed for end-to-end transmission protocol. As such, to the best of the authors’ knowledge, the problem of low-complex untrusted relaying with more than two hops has not yet been extensively addressed.

1.2 Our contribution

In this paper, considering the need for multiple relays for reliable communications, differing from [23,24,25,26], and motivated by the solid work [30], we take into account secure transmission in a multi-hop AF untrusted relaying network. In the considered system model, a chain of intermediate nodes with low computational capabilities is necessary to facilitate end-to-end communications but a potential eavesdropper resides at each of them posing an eavesdropping attack. Note that in AF relaying, the intermediate nodes simply forward what they have received without attempting in decoding the information signal. Therefore, compared to CF relaying [30], AF relaying enjoys more simplex structure.

The main contributions of this research work are threefold summarized as:

  1. 1.

    We propose a new artificial noise injection based secure transmission protocol in a multi-hop amplify-and-forward untrusted relaying network to keep the communication confidential from the internal eavesdroppers for any number of hops.

  2. 2.

    We derive a novel closed-form expression for the ESR of three-hop untrusted relaying as a special case of multi-hop communications with two successive untrusted relays, at the high-SNR regime. Furthermore, we characterize the high-SNR slope corresponding to the maximum multiplexing gain of the network, and the high-SNR power offset metric to obtain an insightful comparison of the proposed secure transmission scheme and the other benchmarks.

  3. 3.

    We validate the theoretical analysis by comparing them with Monte–Carlo simulations, and demonstrate the significant secrecy performance improvement of the proposed cooperative jamming based multi-hop relaying over the conventional competitive benchmarks. We further study the impacts of some key system parameters such as nodes distance, environmental path-loss, and transmission power on the overall system performance.

The rest of this paper is organized as follows. System model is given in Sect. 2, followed by detailing the proposed multi-hop transmission scheme with two relays and then deriving SNR representation at all the nodes in Sect. 3. Section 4 is dedicated for the secrecy performance analysis of the proposed secure protocol where we derive new closed-form expressions for the ESR, as well as analyze the asymptotic SNR metrics including the high-SNR slope and the high-SNR power offset. Next, numerical results and discussions are provided in Sect. 5 to illustrate the performance of the secure transmission scheme and obtain some key design insight into the proposed system model. Finally, conclusions are drawn in Sect. 6.

2 System model

We propose a secure communications system via multi-hop untrusted relaying, as illustrated in Fig. 1, where the source node, denoted by (\({{\mathcal {S}}}\)), sends the information signal to the destination (\({{\mathcal {D}}}\)) with the help of multiple consecutive relays, denoted by \({{\mathcal {R}}}_i\) where \(i = 1, 2, \ldots N\). We assume all the involving nodes are equipped with a single antenna operating in half-duplex mode, i.e., sending and receiving can not be done concurrently. In the so-called line network, it is also assumed that each node \({\mathcal {R}}_i\) can communicate with its two neighbors \({\mathcal {R}}_{i-1}\) and \({\mathcal {R}}_{i+1}\) on the grounds that the channel quality between non-consecutive nodes is too weak to establish communications. Further, the AF relaying architecture is assumed operating at the relays where the relay simply forwards what they have received and so is very inexpensive to implement. Besides that, the intermediate nodes are assumed to be untrustworthy and hence, they would overhear the transmitted information signal while relaying. Moreover, we assume that the relays are non-colluding, as for the line network taken into account it is less likely that non-consecutive intermediate illegitimate nodes could share their information and collude with each other due to the channel conditions of these nodes. To be specific, it is assumed that the untrusted relays, at which the eavesdroppers residing, adopt selection combining (SC) processing technique to extract the information solely based on their own findings similar to [23, 26]. Additionally, the channel between any two consecutive nodes is assumed to follow channel reciprocity obeying complex Gaussian distribution.Footnote 1

Fig. 1
figure 1

System model of secure multi-hop untrusted relaying

Now, we turn our focus to the proposed secure transmission protocol and provide a detailed explanation with analysis for the considered system model when the number of relays is two, i.e., three-hop untrusted relaying, and then discuss the system performance for the higher number of relays, from engineering perspectives.

3 Transmission protocol

The proposed multi-hop secure untrusted relaying with two relays, i.e., \({\mathcal {R}}_1\)  and \({\mathcal {R}}_2\), can be detailed as follows. Considering a time division multiple access (TDMA) scheme, wherein the communication link is divided into separate time slots while sharing the same frequency band, one frame of transmission from \({\mathcal {S}}\) to \({\mathcal {D}}\) takes place in three phases, lasting \(\frac{T}{3}\) seconds each, as shown in Fig. 2. At the outset, during the first phase of communication, \({\mathcal {S}}\) transmits the information signal to \({\mathcal {R}}_1\) using superposition coding, and simultaneously, \({\mathcal {R}}_2\) jams the first untrusted relay (\({\mathcal {R}}_1\)) by transmitting an artificial noise. During the next phase, \({\mathcal {R}}_1\) forwards a scaled version of the received signal towards \({\mathcal {R}}_2\). Concurrently, \({\mathcal {D}}\) jams \({\mathcal {R}}_2\) via transmitting a jamming signal to guarantee secrecy. Finally, in the third phase, \({\mathcal {R}}_2\) amplifies and broadcasts the received signal which can be further received by \({\mathcal {D}}\) and \({\mathcal {R}}_1\). After self-interface cancellation at \({\mathcal {D}}\), the information signal can be extracted at \({\mathcal {D}}\). Notably, during the last time slot, since \({\mathcal {R}}_1\) can overhear the broadcasted signal by \({\mathcal {R}}_2\), the node \({\mathcal {S}}\) is forced to emit jamming to enhance the confidentiality of communication. As such, \({\mathcal {R}}_1\) may fail to successfully eavesdrop during the last phase, as well. Note that depending on the level of security required, \({\mathcal {S}}\)  might be idle in the last phase, and therefore, an appropriate power allocation scheme plays an important role in the proposed cooperative jamming based untrusted relaying.

Fig. 2
figure 2

Secure transmission protocol of three-hop untrusted relaying

Now, let assume that the complex Gaussian channel gains from \({\mathcal {S}}\) to \({\mathcal {R}}_1\) \({\mathcal {R}}_1\) to \({\mathcal {R}}_2\), and \({\mathcal {R}}_2\) to \({\mathcal {D}}\) are denoted by \(g\sim {\mathcal {CN}}(0,m_g)\), \(h\sim {\mathcal {CN}}(0,m_h)\) and \(f\sim {\mathcal {CN}}( 0,m_f)\), respectively. We here consider block fading channel model such that the channel coefficients vary independently from one frame to another frame, but do not change within one frame. To make the analysis tractable, we consider the equal transmit power P by the nodes, i.e., \(P_s = P_{r_1}=P_{r_2}=P_d = P\). We also define \({\gamma_g}{\mathop {=}\limits ^{\tiny \Delta }}\rho |g|^2\), \({\gamma_h}{\mathop {=}\limits ^{\tiny \Delta }}\rho |h|^2\), and \({\gamma_f}{\mathop {=}\limits ^{\tiny \Delta }}\rho |f|^2\), where \(\rho =\frac{P}{N_0}\) describes the transmit SNR per each node. Remarkably \({\gamma_g}\), \({\gamma_h}\) and \({\gamma_f}\) follow exponential distributions with means \(\bar{{\gamma}_g}=\rho m_g\), \(\bar{{\gamma}_h}=\rho m_h\), and \(\bar{{\gamma}_f}=\rho m_f\), respectively. Without loss of generality, the power of additive white Gaussian noise (AWGN) at each receiver is considered to be \(N_0\). We also suppose that the nodes are aware from the necessary channel state information (CSI), by which the relays as well as the destination can thoroughly cancel the self-interference term from the received signal. Note that this assumption leads to the maximum probability of eavesdropping at the relays, and in some sense, can be considered as the worst case scenario.

Based on the above descriptions and after some mass manipulations, the exact signal-to-interference-plus-noise-ratios (SINRs) at \({\mathcal {R}}_1\) in the first phase, at \({\mathcal {R}}_2\) in the second phase, at \({\mathcal {R}}_1\) and \({\mathcal {D}}\) in the third phase, are respectively, obtained as

$$\begin{aligned} \gamma ^{(1)}_{R_1}= \frac{{\gamma_g}}{{\gamma_h}+1}, \end{aligned}$$
(1)
$$\begin{aligned} {\gamma^{(2)}_{R_2}}= \frac{{\gamma_g}{\gamma_h}}{{\gamma_g}}{\gamma_f} + {\gamma_h}{\gamma_f}+2{\gamma_h}+{\gamma_g}+{\gamma_f}+1, \end{aligned}$$
(2)
$$\begin{aligned} \gamma ^{(3)}_{R_1}= \frac{{\gamma_g}{\gamma_h}^2}{{\gamma^2_h}}+{\gamma_h}({\gamma_g}+1)^2 + ({\gamma_g}+{\gamma_h}+1)^2({\gamma_f}+1), \end{aligned}$$
(3)
$$\begin{aligned} \gamma ^{(3)}_{D}= \frac{{\gamma_g}{\gamma_h}{\gamma_f}}{3}{\gamma_h}{\gamma_f} + 2{\gamma_f}{\gamma_g}+ {\gamma_g}{\gamma_h}+2{\gamma_f}+2{\gamma_h}+{\gamma_g}+1, \end{aligned}$$
(4)

where superscripts represent the phase of transmission. Under the high-SNR regime with \({\gamma_k}\gg 1\) for \(k\in \{g, h, f\}\), the above exact SINRs derived can be respectively, simplified as

$$\begin{aligned}\gamma ^{(1)}_{R_1}\approx \frac{{\gamma_g}}{{\gamma_h}}, {\gamma ^{(2})}_{R_2}\approx \frac{{\gamma_g}{\gamma_h}}{{\gamma_f}({\gamma_g}+{\gamma_h})}, \gamma ^{(3)}_{R_1}\approx \frac{{\gamma_g}{\gamma_h}^2}{({\gamma_g}+{\gamma_h})^2{\gamma_f}+2{\gamma_h}{\gamma_g}^2}, \end{aligned}$$
(5)
$$\begin{aligned} \gamma ^{(3)}_{D}\approx \frac{{\gamma_g}{\gamma_h}{\gamma_f}}{3}{\gamma_h}{\gamma_f} + 2{\gamma_f}{\gamma_g}+{\gamma_g}{\gamma_h}. \end{aligned}$$
(6)

Remark 1

The SINR expressions in (5) reveal that the amount of information leakage is saturated when the transmit SNR goes to infinity. However, the received SINR at the legitimate receiver is a monotonically increasing function of the transmit SNR. As a result, the achievable ESR is increased as the transmit SNR grows which is fundamentally different from the direct transmission scheme [14].

Remark 2

As can be understood, in the proposed scheme, when a node transmits the information signal in the line of destination, the node which is near to the receiving untrusted relay is forced to propagate artificial noise to confuse the eavesdropping node. As a consequence, this proposed scheme can be routinely extended to multi-hop untrusted relaying in which more than two untrusted relays cooperate to forward a confidential message to the destination. Specifically, when \({\mathcal {R}}_{i-1}\) forwards the received signal to \({\mathcal {R}}_{i}\)\({\mathcal {R}}_{i+1}\) jams the eavesdropper \({\mathcal {R}}_i\), and likewise, when re-transmitting the amplified version of the received signal by \({\mathcal {R}}_{i+1}\) to the next node, the nearest node to the transmitting relay, i.e., \({\mathcal {R}}_{i}\) may pose an eavesdropping attack, therefore, the relay \({\mathcal {R}}_{i-1}\) is scheduled to send artificial jamming signals to make the wiretap link of \({\mathcal {R}}_{i}\) degraded. Setting \({\mathcal {R}}_0\) and \({\mathcal {R}}_{N+1}\) to be \({\mathcal {S}}\) and \({\mathcal {D}}\), respectively, the above explanation, can be readily extended for the multi-hop untrusted relaying. However, this extension gets too involved to analyze, and more importantly, may not be efficient for a large number of hops. Since the latency of the network grows by increasing the number of intermediate nodes [21]. This is not acceptable in real-time communication scenarios. Furthermore, in IoT networks with low-cost and low-power equipment, the need for large overhead for the training process is challenging, especially when the environment is dynamic and thus, the coherence time of the wireless channel is short. As a result, in this work the three-hop untrusted scenario is considered for the purpose of analysis, though, may not be the optimal choice in terms of the number of relays. However, as we shall see later, the proposed multi-hop untrusted relaying with two relays improves the system performance.

Remark 3

It is worth pointing out that in the considered line network in which the end-to-end message delivery is conducted via multiple untrusted relays, we need to have careful scheduling and synchronization of transmissions based on the proposed TDMA-based protocol. Hence, all the network nodes are assumed to perform their transmissions in the equally-allocated time slots. Practically speaking, the communication channel, which could be considered as a sub-carrier of orthogonal frequency-division multiplexing (OFDM) system, is divided into separate time slots, and then, the communication process is accomplished through the mentioned multiple-phase protocol. Note that in this work, we have not considered scheduling and synchronization errors, each of which is worthy of deep investigation.

4 Secrecy performance analysis

Note that the Ergodic secrecy rate (ESR), as a widely used secrecy criteria in the literature, characterizes the rate below which any average secure transmission rate can be obtained. In this section, we proceed to derive a new closed-form expression for the ESR of three-hop untrusted relaying.

Based on the definition, the instantaneous secrecy rate is achieved by subtracting the eavesdropping channel capacity from the legitimate channel capacity [3]. Since the untrusted relays are non-colluding and they adopt SC technique, the instantaneous secrecy rate, \(R_{s}\), for a three-hop relaying can be evaluated by

$$\begin{aligned} R_{s}=\frac{1}{3}\left[ I^{(3)}_{D}-\max \{I^{(1)}_{R_1}, I^{(2)}_{R_2}, I^{(3)}_{R_1}\}\right] ^+, \end{aligned}$$
(7)

where \( I_{K}=\log _{2}(1+{\gamma_{K}})\) with \(K\in \) {\({\mathcal {R}}_1\)\({\mathcal {R}}_2\)\({\mathcal {D}}\)} and \([x]^+ = \max (x,0)\). Notably, the pre-log factor \(\frac{1}{3}\) is due to the fact that one round of transmission is done in three hops.

Remark 4

It is worth noting that \(\gamma ^{(2)}_{R_2}\gg \gamma ^{(3)}_{R_1}\), which can be readily concluded by invoking \(\gamma ^{(2)}_{R_2}\) and \(\gamma ^{(3)}_{R_1}\) expressions given in (5). Therefore, the maximum information leakage of three-hop untrusted relaying can be simplified as

$$\begin{aligned} {\gamma_E} {\mathop {=}\limits ^{\tiny \Delta }}\max \left\{ \gamma ^{(1)}_{R_1}, \gamma ^{(2)}_{R_2}\right\} , \end{aligned}$$
(8)

The exact ESR expression of the proposed three-hop untrusted relaying can be obtained by forming a multiple integral expression as

$$\begin{aligned} \bar{R}_s&= {\mathbb{E}}\{R_s\}=\int _{0}^{\infty }\int _{0}^{\infty }\int _{0}^{\infty }R_s(p,q,r)f_{{\gamma_g}}(p)f_{{\gamma_h}}(q)f_{{\gamma_f}}(r){\mathrm{d}}p {\mathrm{d}}q {\mathrm{d}}r, \end{aligned}$$
(9)

where in \(R_s(p,q,r)\) is given in (7), and the probability density functions (PDFs) \(f_{{\gamma_t}}(s)=\frac{1}{{\bar{\gamma}}_t}\exp \left( -\frac{s}{\bar{\gamma}_t}\right) \) with \(s\ge 0\) for \(t\in \) {g, h, f}. Although, the integral expression given above can be calculated numerically, in order to obtain deep insight into the impact of parameters in secrecy rate, we are interested in obtaining a new compact expression for the ESR. To that aim, we first derive closed-form expressions for the Ergodic legitimate rate \(\bar{R}_L\) and the Ergodic eavesdropping rate \(\bar{R}_E\) in the following lemmas, and thereafter, we will be ready to present a tight lower-bound expression for the ESR performance in Proposition 1.

Lemma 1

The lower-bound closed-form expression for the Ergodic rate of the legitimate channel, without pre-log factor, is given by

$$\begin{aligned} \bar{R}_L&={\mathbb{E}}\Big \{\log _2(1+\gamma _D)\Big \} \\ &\quad \ge \log _2\left( 1+\exp \left[ -3\Phi +\ln \left( \frac{\bar{\gamma }_g\bar{\gamma }_h\bar{\gamma }_f}{3\bar{\gamma }_h\bar{\gamma }_f+2\bar{\gamma }_f\bar{\gamma }_g+\,\bar{\gamma }_g\bar{\gamma }_h}\right) \right] \right) \\ &\quad {\mathop{=}\limits ^{\Delta }} \bar{R}_L^{LB}, \end{aligned}$$
(10)

where \(\Phi \approx 0.577215\) is the Euler constant.

Proof

The proof can be done straightforwardly by considering the facts that: (1) the Jensen’s inequality can apply on the convex function \(\ln (1+\exp {(x)})\) with respect to x and, (2) for the exponential random variable (RV) X with the mean of \(m_X\), we have \({\mathbb{E}}\{\ln (X)\}=-\Phi +\ln (m_x)\) [33, Eq. (4.331.1)]. \(\square \)

Before proceeding further to derive an analytical expression for \(\bar{R}_E\), we present the following fruitful Lemma.

Lemma 2

Let X and Y be exponential RVs with means \(m_x\) and \(m_y\), respectively. Then the new RVs \(Z=\frac{X}{Y}\) and \(W=\frac{XY}{X+Y}\) have the following cumulative distribution functions (CDFs), respectively, as

$$\begin{aligned} F_Z(z)&=\frac{m_yz}{m_yz+m_x}, \end{aligned}$$
(11)
$$\begin{aligned} F_W(w)&=1-\frac{2\omega }{\sqrt{m_x m_y}}\exp \left( -\frac{\omega }{m_x}-\frac{\omega }{m_y}\right) {\mathrm {K}}_1\left( \frac{2\omega }{\sqrt{m_xm_y}}\right) , \end{aligned}$$
(12)

where \({\mathrm {K}}_\nu (\cdot )\) is the modified Bessel function of the second kind and \(\nu \)-th order.

Proof

See “Appendix A”. \(\square \)

Lemma 3

The closed-form expression for the Ergodic rate of the eavesdropping channel, without pre-log factor, is formulated as

$$\begin{aligned} \bar{R}_E&={\mathbb{E}}\Big \{\log _2(1+\gamma _E)\Big \}\nonumber \\&=\frac{1}{\ln 2}{\mathbb{E}}\left\{ \ln \left( 1+{\mathbb {1}}_{\left\{ \gamma ^{(1)}_{R_1}\ge \gamma ^{(2)}_{R_2}\right\} }\gamma ^{(1)}_{R_1} \right. \right. \nonumber \\&\left. \left. +\, {\mathbb {1}}_{\left\{ \gamma ^{(2)}_{R_2}> \gamma ^{(1)}_{R_1}\right\} }\gamma ^{(2)}_{R_2} \right) \right\} \nonumber \\&=\frac{1}{\ln 2}{\mathbb{E}}\left\{ {\mathbb {1}}_{\left\{ \gamma ^{(1)}_{R_1}\ge \gamma ^{(2)}_{R_2}\right\} }\ln \left( 1+ \gamma ^{(1)}_{R_1} \right) \right. \nonumber \\&\left. \quad +\,{\mathbb {1}}_{\left\{ \gamma ^{(2)}_{R_2}> \gamma ^{(1)}_{R_1}\right\} }\ln \left( 1+ \gamma ^{(2)}_{R_2} \right) \right\} \nonumber \\&=\frac{1}{\ln 2}\Big ({\mathcal {P}} T_{1}+(1-{\mathcal {P}})T_2\Big ), \end{aligned}$$
(13)

where \({\mathbb {1}}_{\left\{ X\right\} } = {\left\{ \begin{array}{ll} 1 &\quad {\text {if }}{\text {{X}} = True} \\ 0 & \quad {\text {o.w.}}, \end{array}\right. }\)  represents the indicator function which is one iff its condition is satisfied, and the last equation follows from total probability theorem or simply considering the expectation of indicator function which can be further calculated analytically as

$$\begin{aligned} {\mathcal {P}}&={\mathbb{E}}\left\{ {\mathbb {1}}_{\left\{ \gamma ^{(1)}_{R_1}\ge \gamma ^{(2)}_{R_2}\right\} }\right\} \nonumber \\&=\Pr \left\{ \gamma ^{(1)}_{R_1}\ge \gamma ^{(2)}_{R_2}\right\} \nonumber \\&={\frac{\sqrt{\bar{\gamma }_f}{\bar{\gamma }_g}^{3/2}}{\bar{\gamma }_g-\bar{\gamma }_h\,\sqrt{\bar{\gamma }_f}\sqrt{\bar{\gamma }_g} +2\,\bar{\gamma }_g\,\bar{\gamma }_h}}\nonumber \\&\times \sum _{n=1}^{M}\sum _{i=1}^{n}\Lambda (1,n,i)i!\left( {\frac{2\bar{\gamma }_g\,\bar{\gamma }_h}{\bar{\gamma }_g-\bar{\gamma }_h\,\sqrt{\bar{\gamma }_f\,\bar{\gamma }_g} +2\,\bar{\gamma }_g\,\bar{\gamma }_h}} \right) ^i, \end{aligned}$$
(14)

where the parameter M holds an arbitrary positive integer value controlling the approximation accuracy. Also,

$$\begin{aligned}&\Lambda (\nu , n, i)= \frac{(-1)^i\sqrt{\pi }\Gamma (2\nu )\Gamma (n-\nu +\frac{1}{2}){\mathrm {L}}(n,i)}{2^{\nu -i}\Gamma (\frac{1}{2}-\nu )\Gamma (n+\nu +\frac{1}{2})n!}, \end{aligned}$$

where \({\mathrm {L}}(i,n)={{{n-1\atopwithdelims ()i-1}}\frac{n!}{i!}}\) for \(n, i >0\) represents the Lah numbers [34], \(\Gamma (x)\) is the Gamma function [33, Eq. (8.31)]. Furthermore,

$$\begin{aligned}&T_{1}=\frac{\bar{\gamma }_g\ln (\frac{\bar{\gamma }_g}{\bar{\gamma }_h})}{\bar{\gamma }_g-\bar{\gamma }_h}, \end{aligned}$$
(15)
$$\begin{aligned}&T_{2}=\ln \left( 1+\frac{\bar{\gamma }_g \bar{\gamma }_h \Big (\bar{\gamma }_g^2 -\bar{\gamma }_h^2-2\bar{\gamma }_g\bar{\gamma }_h\ln \frac{\bar{\gamma }_g}{\bar{\gamma }_h}\Big )}{ \bar{\gamma }_f (\bar{\gamma }_g-\bar{\gamma }_h)^3}\right) , \end{aligned}$$
(16)

Proof

See “Appendix B”. \(\square \)

Proposition 1

The tight closed-form lower-bound expression for the ESR performance of the proposed three-hop untrusted relaying is given by

$$\begin{aligned} \bar{R}^{LB}_{s}=\frac{1}{3}\Big [\bar{R}_L^{LB}-\bar{R}_E\Big ]^+. \end{aligned}$$
(17)

4.1 Asymptotic ergodic secrecy rate analysis

Now , we are going to obtain the asymptotic expression for the ESR performance, denoted by \( R^{\infty }_s\), when the transmit SNR of each node, \(\rho \), goes to infinity by deriving the high-SNR slope \(S_{\infty }\) in bits/s/Hz and the high-SNR power offset \(L_{\infty }\) in 3dB unit. These parameters are defined, respectively, as [26]

$$\begin{aligned}&S_{\infty }=\lim _{\rho \rightarrow \infty }\frac{\bar{R}_{s}}{\log _{2}\rho }\nonumber \\&\quad {\mathrm {and}}~~ L_{\infty }=\lim _{\rho \rightarrow \infty }\big ({\log _{2}\rho }-\frac{\bar{R}_{s}}{S_{\infty }}\big ), \end{aligned}$$
(18)
$$\begin{aligned}&R^{\infty }_s = S_{\infty } \left( \log _2 \rho - L_{\infty }\right) , \end{aligned}$$
(19)

Following the same steps as in [24], the high-SNR slope and power offset of the three-hop untrusted relaying are obtained as

$$\begin{aligned} S_{\infty }=\frac{1}{3}, \end{aligned}$$
(20)

and

$$\begin{aligned} L_{\infty }&=\frac{3\Phi }{\ln 2} +\log _2\left( \frac{3}{m_g}+\frac{2}{m_h}+\frac{1}{m_f}\right) \nonumber \\&\quad + {\mathcal {P}}_1{\mathcal {A}} +(1-{\mathcal {P}}_1)~\mathcal {B}, \end{aligned}$$
(21)

where

$$\begin{aligned} {\mathcal {A}}&=\frac{m_g(\log _2({m_g})-\log _2({m_h}))}{m_g-m_h}, \end{aligned}$$
(22)
$$\begin{aligned} \mathcal {B}&=\log _2\left[ 1+\frac{m_g m_h \left( m_g + m_h -2m_h{\mathcal {A}}\right) }{ m_f (m_g-m_h)^2}\right] , \end{aligned}$$
(23)

Proof

The analytical expressions of \(S_{\infty }\) and \(L_{\infty }\) can be readily obtained by plugging (1), while considering Remark 1, into the definition of high-SNR slope and power offset given by (18) and using the approximation \(\log (1+x)\approx \log (x)\) when \(x\gg 1\). Besides, \({\mathcal {P}}_1\) is defined in “Appendix A”. Hence, we skipped the details for the sake of brevity.

Expression (20) highlights that the channel powers have no impact on the ESR slope which is equal to the maximum multiplexing gain of the network. Furthermore, different from the high-SNR slope, we find that the high-SNR power offset in (21) is related to the all channel powers. As such, by properly positioning the relays between the source and destination, the high-SNR power offset can be reduced. Notably, a decrease in the power offset corresponds to an increase in the ESR performance.

5 Numerical results and discussions

In this section, we prepare some simulations to reveal the accuracy of the presented closed-form expressions. Additionally, we compare the secrecy performance of the proposed multi-hop relaying scheme with two competitive counterparts: (1) the two-hop communication scheme where only one relay is selected for data transmission and the other relay is considered as pure eavesdropper, and (2) the direct transmission where the confidential information is directly forwarded to the destination without getting assistance from the two relays. In this case, both the relays are considered as pure eavesdroppers. Unless otherwise stated, the following simulation parameters are adopted. We assume that the nodes \({\mathcal {S}}\)\({\mathcal {D}}\)\({\mathcal {R}}_1\), and \({\mathcal {R}}_2\) are placed on one-dimensional space at positions \(-3\), \(+3\), \(-1\) and \(+1\), respectively. Additionally, the large-scale path-loss factor is chosen \(\eta \)= 2.7. Besides, for Mont-Carlo simulations we averaged over \(10^5\) channel realizations.

Figure 3 is plotted to depict the ESR performance versus the transmit SNR \(\rho \) (in dB). As can be seen in this figure, our proposed lower-bound expression for the ESR in Proposition 1 agrees well with the exact ESR. Furthermore, our asymptotic ESR performance given by (19) well-approximates the exact ESR in the high-SNR regime. As observed from Fig. 3, the ESR curve corresponding to the case when considering only the first term of the equivalent series, denoted by Theory with \(M=1\) is so close to the exact ESR curve, especially in high-SNR regime. This reaffirms the accuracy and tightness of analytical expressions we obtained.

Fig. 3
figure 3

Validation of theoretical results for the ESR performance

To reveal the advantage of the proposed three-hop untrusted relaying scheme, we compare the ESR performance of our new scheme with two well-known transmission schemes, i.e., two-hop untrusted relaying and direct transmission. Note that under two-hop relaying scheme, we face with two cases. In Case I, the relay \({\mathcal {R}}_1\) is employed for data re-transmission and the relay \({\mathcal {R}}_2\) is considered as a pure eavesdropper, as illustrated in Fig. 4a. Whereas, in Case II, the converse scenario is considered, i.e., the relay \({\mathcal {R}}_2\) is the helper node and \({\mathcal {R}}_1\) is considered as an idle eavesdropper, as illustrated in Fig. 4b. Additionally, two network topologies are considered. In Topology 1, we have the same network structure as considered in Fig. 3, and for Topology 2, we have the scaled version of Topology 1 with the factor of 3, i.e., the nodes \({\mathcal {S}}\)\({\mathcal {D}}\)\({\mathcal {R}}_1\) and \({\mathcal {R}}_2\) are located at \(-9\), \(+9\), \(-3\) and \(+3\), respectively.

Fig. 4
figure 4

Considered two-hop untrustworthy relaying as benchmarks

Fig. 5
figure 5

ESR versus transmit SNR for different transmission schemes and topologies

As it can be observed in Fig. 5, the secrecy performance of the proposed three-hope relaying scheme always outperforms the mentioned two benchmarks for the transmit SNRs fewer than approximately 36 dB (i.e., \(\rho<\) 36 dB). This result highlights the priority of our scheme compared with the state-of-the-arts in untrusted relaying networks. One can easily predict that the proposed scheme under Topology 2 outperforms the two-hop relaying schemes for \(\rho>\) 36 dB. Interestingly, under Topology 1 and for \(\rho>\) 36 dB, the two-hop relaying scheme with Case I would provide a better ESR compared with our scheme. The reason is that when the communication nodes are close together with much power budget, naturally, the two-hop relaying would be sufficient for data transmission and hence, it is not necessary to implement multi-hop relaying scheme. Additionally, as proved in [26], the high-SNR slope for two-hop relaying is \(S_\infty =\frac{1}{2}\) which is more than the high-SNR slope of tree-hop relaying scheme, \(S_\infty =\frac{1}{3}\), as we derived in (20). It is worth noting that in IoT and WSNs, the devices are power-limited and thus, they cannot consume much power for data transmission/forwarding. As a result, the proposed secure three-hop relaying scheme in this paper is applicable for IoT networks where low or medium transmit SNRs can be supported by the devices. Finally, this figure depicts that the direct transmission scheme presents a near to zero, but non-zero, secrecy rate. As discussed in [26], even when the destination is very far from the source while the eavesdroppers locate between them, a positive secrecy rate is achievable.

Fig. 6
figure 6

ESR versus path-loss exponent for different transmission schemes. SNR is set to \(\rho = 20\)dB

Figure 6 exhibits the ESR performances of the proposed multi-hop untrusted relaying and the known schemes against the path-loss exponent. Obviously, the ESR gets decreased for higher order of path-loss values which demonstrates severe fading or blockage results in lower ESR. Nonetheless, the proposed scheme with two relays provides a significantly pronounced ESR performance for practical values of \(\eta \). For example, the ESR of the proposed scheme has threefold improvement compared to that of the two-hop relaying for the path-loss of 3. This again boosts the effectiveness of our proposed secure scheme in real-world applications such as WSN and low-altitude UAV-based relaying networks [13] wherein fading or blockage are undeniable.

6 Conclusions

In this contribution, we designed a new secure transmission scheme over a multi-hop untrusted relaying network. To this end, we first studied a three-hop communication network with two successive untrusted relays. Given this system model, a novel closed-form expression was derived in the high-SNR regime for the ESR performance. We next evaluated the high-SNR slope and power offset of the ESR. Our numerical results presented that the proposed secure transmission scheme improves the secrecy performance compared with the competitive benchmarks, i.e., the two-hop relaying and the conventional direct transmission schemes. As future work, we could consider the impacts of imperfect CSI and hardware impairments on the secrecy performance of the considered multi-hop untrusted relaying as well as resource allocation problem for such a network.