Abstract
Vehicular communication is an emergent technology with promising future, which can promote the development of mobile vehicular networks. Due to the broadcast nature of wireless channels, vehicular user mobility, and the diversity of vehicular network structures, the physical layer security issue of the mobile vehicular networks is a major concern. In this paper, the physical layer security performance of the mobile vehicular networks over N-Nakagami fading channels is investigated. Exact closed-form expressions for the probability of strictly positive secrecy capacity (SPSC), secrecy outage probability (SOP), and average secrecy capacity (ASC) are derived. Monte-Carlo simulation is used to verify the secrecy performance under different conditions. We further investigate the relationship between secrecy performance and the system parameters.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Since mobile user spend significant amounts of time in vehicles, the mobile vehicular computing and communication applications have increased dramatically in recent years [1,2,3]. Mobile vehicular communication has attracted wide research interest in the development of a wide range of applications based on user quality of experience (QoE) [4,5,6].
To support various types of mobile vehicular applications, the fifth generation (5G) mobile communication technologies are promising candidates [7]. A novel and practical 5G-enabled smart collaborative vehicular network architecture was introduced in [8]. [9] exploited 5G mmWave communication for vehicle positioning.5G-enabled software defined vehicular networks were proposed in [10].
Due to the vehicular user mobility, the physical layer security of 5G mobile vehicular networks is of significant interest [11,12,13]. An integrated network architecture was proposed for secure group communication in vehicular networks [14]. Based on a cooperative authentication method, [15] proposed an anonymous authentication protocol for vehicular networks. Closed-form expressions for the probability of strictly positive secrecy capacity (SPSC) over Rician fading channels were derived in [16], and secrecy outage probability (SOP) over correlated log-normal fading channels was investigated in [17]. In [18], the probability of SPSC with multiple eavesdroppers over log-normal fading channels. Closed-form expressions for the probability of SPSC and a lower bound on the SOP over generalized Gamma fading channels were derived in [19]. In [20], in the presence of an eavesdropper, the transmission of confidential messages in a single-input multiple-output (SIMO) system over identically independent Generalized-K fading channels was investigated. The physical-layer security of cooperative wireless networks with amplify-and-forward (AF) and decode-and-forward (DF) relaying were investigated in [21]. In [22], the outage probability (OP) of single-relay and multi-relay selection schemes in the presence of an eavesdropper was analyzed. [23] investigated the secure performances over non-small-scale fading channels, considering the independent log-normal fading, correlated lognormal fading, or independent composite fading. [24] proposed two schemes to improve the sum rate of secondary users (SUs) while guaranteeing the secrecy rate of primary user (PU). By aligning the jamming signal together with interference among users cooperatively, an anti-jamming scheme was proposed in [25]. The authors proposed an artificial noise assisted interference alignment scheme with wireless power transfer in [26].
However, the effects of mobile communication is far severe than what can be modeled using the classical Rayleigh, Rician, Nakagami, log-normal and Generalized-K fading channels. They are not the best channel models for practical mobile scenarios. The N-Rayleigh and N-Nakagami fading channels were adopted in [27,28,29] to provide a realistic mobile channel model. In [30,31,32], the OP performance of mobile cooperative networks with incremental AF and DF protocols was investigated.
To date, research on physical layer security has focused on Rayleigh, Rice, Nakagami-m log-normal and Generalized-K fading channels. To the best of our knowledge, physical layer security over N-Nakagami fading channels has not been considered in the literature. As a consequence, the main contributions of this paper are as follows:
- 1.
For practical mobile scenarios, it is well known that N-Nakagami fading channels are more general and flexible, and include the Rayleigh and Nakagami-m fading channels. Thus, we investigate the secrecy performance of the mobile vehicular networks model over N-Nakagami fading channels.
- 2.
Closed-form expressions are derived for the average secrecy capacity (ASC), a lower bound on the SOP, and the probability of SPSC over N-Nakagami fading channels.
- 3.
Monte-Carlo simulation is used to verify the accuracy of the theoretical results obtained.
The rest of the paper is organized as follows. The mobile vehicular networks model is presented in Section 2, and closed-form expressions for the ASC are derived in Section 3. A lower bound on the SOP and the probability of SPSC are presented in Sections 4 and 5, respectively. Monte-Carlo simulation results are provided in Section 6 to verify the analysis in the previous sections. Finally, some concluding remarks are given in Section 7.
2 System model
The mobile vehicular networks model is shown in Fig. 1. It consists of a mobile source (S) vehicle, a mobile eavesdropper (E) vehicle, and a mobile destination (D) vehicle, all of which are equipped with a single antenna. The S vehicle acts as a legal transmitter, the D vehicle acts as a legitimate receiver. When the S vehicle communicates with the D vehicle, the E vehicle can wiretap the information.
We use h = hk, k∈{D,E}, to represent the complex channel coefficients of the S → D and S → E links, respectively. The probability density function (PDF) of h is given as [28].
where G[·] is Meijer’s G-function.
S transmits the signal x, and the received signals rD and rE are given as
where E is the energy used by S, the mean and variance of nD and nE are 0 and N0/2.Here, we use GD and GE to represent the relative geometrical gain of the S → D channel and the S → E channel, respectively [33].
D receives the signal-to-noise ratio (SNR) as
where K is the relative SNR gain.
The received SNR at the E is given as
The cumulative distribution function (CDF) of γk is given as
and the corresponding PDF is given as
3 Average secrecy capacity
The instantaneous secrecy capacity is given as [34].
The average secrecy capacity (ASC) is the average of Cs. The ASC is given as
With the help of [35], V1 is given as
V2 is given as
and V3 is given as
4 Secrecy outage probability
The SOP is the probability that the instantaneous secrecy capacity falls below a target threshold,which an important performance measure. The SOP is given as
where γth is a secrecy capacity threshold. The integral in (16) has no closed-form form because of Meijer’s G-function. With the aid of the results in [36,37,38], a lower bound on the SOP can be obtained as
5 Probability of SPSC
The probability of SPSC means the existence of secrecy capacity,which is a fundamental benchmark in secure communications. It is given as
and substituting (9) and (10) in (19) gives
6 Numerical results
In this section, Monte-Carlo simulation results are presented to confirm the analysis in the previous sections. Figure 2 presents the ASC performance versus K for \( \overline{\gamma} \)=10 dB. The simulation parameters are given in Table 1. Combinations of mD and mE are denoted as (mD, mE). Figure 2 shows that the Monte-Carlo simulation results match very well with the analytical results. For a fixed K, the ASC performance is improved with increasing mD and decreasing mE. The ASC performance for (2,1) is better than that of (1,1) and (1,2). This is because the fading severity of an N-Nakagami channel is less for a larger m. Further, it is observed that the ASC performance improves as K increases. This is because a higher K means that the S → D channel is better than the S → E channel.
Figure 3 presents the ASC performance versus K with (1,1). The other simulation parameters are \( \overline{\gamma} \) =5 dB, 10 dB, 15 dB, 20 dB. The simulation parameters are given in Table 2.This again shows that the Monte-Carlo simulation results match the analytical results. For fixed K, the ASC performance is improved as \( \overline{\gamma} \) increases. This is because the S → D channel is better than the S → E channel.
Figure 4 presents the SPSC performance versus K with \( \overline{\gamma} \) =10 dB. The simulation parameters are given in Table 1. This confirms the analysis given previously as it matches the Monte-Carlo simulation results. For fixed K, the SPSC performance is improved as mD increases and mE decreases. The SPSC performance for (2,1) is best. Further, it is clear that the SPSC performance improves as K increases. This is because the S → D channel is better than the S → E channel.
Figure 5 presents the SPSC performance versus K with \( \overline{\gamma} \) =0 dB, 5 dB, 10 dB, 15 dB, 20 dB. The simulation parameters are given in Table 3. This shows that the SPSC performance cannot be improved by increasing \( \overline{\gamma} \). This observation matches the results obtained from (21)–(22).
Figure 6 presents the SOP performance versus K with (2,1). The simulation parameters are \( \overline{\gamma} \)=0 dB, 10 dB, 20 dB, 30 dB, 40 dB, GD = 5 dB, GE = 1 dB, ND = NE = 2, and γth = 0 dB. This shows that the analytical bound on the SOP cannot be improved by increasing \( \overline{\gamma} \). This observation confirms the results obtained from (18)–(20). As \( \overline{\gamma} \) increases, the Monte-Carlo simulation results approach the analytical bound on the SOP.
Figure 7 presents the SOP performance versus K with \( \overline{\gamma} \) =20 dB,and γth = 0 dB. The simulation parameters are given in Table 4. This again shows that the Monte-Carlo simulation results match the analytical results. For fixed K, the SOP performance is improved with increasing mD and decreasing mE. The SOP performance of (2,1) is the best. Further, the SOP performance improves as K increases.
Figure 8 presents the ASC performance under different channels with \( \overline{\gamma} \)=5 dB. The simulation parameters are given in Table 5. For fixed K, the ASC performance under 2-Nakagami channels is the best. This is because the fading severity of 2-Nakagami channels is larger than Nakagami and Rayleigh channels. Further, the ASC performance improves as K increases. This is because the S → D channel is better than the S → E channel.
7 Conclusion
In this paper, the secrecy performance of the mobile vehicular networks over N-Nakagami fading channels has been investigated. Exact closed-form expressions for the probability of strictly positive secrecy capacity (SPSC), secrecy outage probability (SOP), and average secrecy capacity (ASC) were derived and verified via Monte-Carlo simulations. The simulation results showed that the m, N, GD, and GE had a significant effect on the secrecy performance.
References
Liu X, Liu YX, Xiong NN, Zhang N, Liu AF, Shen H, Huang CQ (2018) Construction of large-scale low-cost delivery infrastructure using vehicular networks. IEEE Acc 6:21482–21497
Hou XM, Fu, Zhang Q, Liu D (2017) Dynamic coordination process based on predictive graph in Mobile cloud environment. J Liaocheng Univ (Natural Sci Edit) 30(4):96–100
Ahmed E, Gharavi H (2018) Cooperative vehicular networking: a survey. IEEE Trans Intell Trans Syst 19(3):996–1014
Li JQ (2018) Solving reverse logistic problem in prefabricate system by a discrete artificial bee Colony algorithm. J Liaocheng Univ (Natural Sci Ed) 31(2):102–110
Yu X, Chu Y, Jiang F, Guo Y, Gong DW (2018) SVMs classification based two-side cross domain collaborative filtering by inferring intrinsic user and item features. Knowl-Based Syst 141:80–91
Tian QY (2017) Various alternatives for optimization of open-pit-mine integrated Fleet haulage dispatching. J Liaocheng Univ (Natural Sci Edit) 30(3):88–92
Qiao J, He YJ, Shen XM (2018) Improving video streaming quality in 5G enabled vehicular networks. IEEE Wirel Commun 25(2):133–139
Dong P, Zheng T, Yu S, Zhang HK, Yan XY (2017) Enhancing vehicular communication using 5G-enabled smart collaborative networking. IEEE Wirel Commun 24(6):72–79
Wymeersch H, Seco-Granados G, Destino G, Dardari D, Tufvesson F (2017) 5G mmWave positioning for vehicular networks. IEEE Wirel Commun 24(6):80–86
Huang XM, Yu R, Kang JW, He YJ, Zhang Y (2017) Exploring Mobile edge computing for 5G-enabled software defined vehicular networks. IEEE Wirel Commun 24(6):55–63
Bernardinia C, Asgharb MR, Crispocd B (2017) Security and privacy in vehicular communications: challenges and opportunities. Veh Commun 4(10):13–28
Manvi SS, Tangade S (2017) A survey on authentication schemes in VANETs for secured communication. Veh Commun 4(9):19–30
Lin ME (2016) Computer network attack modeling method based on attack graph. J Liaocheng Univ (Natural Sci Edit) 29(3):100–104
Lai CZ, Zhou HB, Cheng N, Shen XS (2017) Secure group communications in vehicular networks: a software-defined network-enabled architecture and solution. IEEE Veh Technol Mag 12(4):40–49
Jo HJ, Kim IS, Lee DH (2018) Reliable cooperative authentication for vehicular networks. IEEE Trans Intell Trans Syst 19(4):1065–1079
Liu X (2013) Probability of strictly positive secrecy capacity of the Rician-Rician fading channel. IEEE Wireless Commun Lett 2(1):50–53
Liu X (2013) Outage probability of secrecy capacity over correlated log-normal fading channels. IEEE Commun Lett 17(2):289–292
Liu X (2014) Strictly positive secrecy capacity of log-normal fading channel with multiple eavesdroppers. In: IEEE International Conference on Communications (ICC), Sydney, pp 775–779
Lei H, Gao C, Guo Y, Pan G (2015) On physical layer security over generalized gamma fading channels. IEEE Commun Lett 19(7):1257–1260
Lei H, Gao C, Ansari IS, Guo Y, Pan G, Qaraqe KA (2016) On physical layer security over SIMO generalized-K fading channels. IEEE Trans Vehic Tech 65(9):7780–7785
Zou Y, Wang X, Shen W (2013) Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J Select Areas Commun 31(10):2099–2111
Zou Y, Champagne B, Zhu WP, Hanzo L (2015) Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans Commun 63(1):215–228
Pan G, Tang C, Zhang X, Li T, Weng Y (2016) Physical-layer security over non-small-scale fading channels. IEEE Trans Vehic Tech 65(3):1326–1339
Cao Y, Zhao N, Richard Yu F, Jin M, Chen Y, Tang J, Leung VCM (2018) Optimization or Alignment: Secure Primary Transmission Assisted by Secondary Networks. IEEE J Sel Areas in Comm (JSAC) 36(4):905–917
Zhao N, Yu FR, Li M, Yan Q, Leung VCM (2016) Physical layer security issues in interference- alignment-based wireless networks. IEEE Commun Mag 54(8):162–168
Zhao N, Cao Y, Yu R, Chen Y, Jin M, Leung VCM (2018) Artificial Noise Assisted Secure Interference Networks with Wireless Power Transfer. IEEE Trans Vehic Tech
Salo J, El-Sallabi HM, Vainikainen P (2006) The distribution of the product of independent Rayleigh random variables. IEEE Trans Antennas Prop 54(2):639–643
Karagiannidis GK, Sagias NC, Mathiopoulos PT (2007) N*Nakagami: a novel stochastic model for cascaded fading channels. IEEE Trans Commun 55(8):1453–1458
Xu L, Yu X, Wang H, X Wang, J Wang (2018) Secrecy performance of mobile image transmission networks. 11th EAI International Conference on Mobile Multimedia Communications
Xu L, Wang J, Liu Y, Shi W, Gulliver TA (2018) Outage performance for IDF relaying Mobile cooperative networks. Netw Appl 23(6):1496–1501
Xu LW, Zhang H, Wang JJ, Gulliver TA (2017) Joint TAS/SC and power allocation for IAF relaying D2D cooperative networks. Wirel Netw 23(7):2135–2143
Xu LW, Wang JJ, Zhang H, Gulliver TA (2017) Performance analysis of IAF relaying mobile D2D cooperative networks. J Frankl Inst 354(2):902–916
Ilhan H, Uysal M, Altunbas I (2009) Cooperative diversity for intervehicular communication: performance analysis and optimization. IEEE Trans Vehic Tech 58(7):3301–3310
Bloch M, Barros J, Rodrigues MR, McLaughlin SW (2008) Wireless information-theoretic security. IEEE Trans Vehic Tech 54(6):2515–2534
The Wolfram Functions Site. http://functions.wolfram.com/HypergeometricFunctions/MeijerG/21/02/04/
Lei H, Ansari IS, Pan G, Alomair B, Alouini MS (2017) Secrecy capacity analysis over α−μ fading channels. IEEE Commun Lett 21(6):1445–1448
Yang Q, Wang H (2015) Toward trustworthy vehicular social networks. IEEE Commun Mag 53(8):42–47
Yang Q, Lim A, Li S, Fang J, Agrawal P (2010) ACAR: Adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios. Mobile Netw Appl 15(1):36–60
Acknowledgements
This work was supported by the National Natural Science Foundation of China (No. U1806201, 61671261, 61304222, 61402246, 61771271, 61802217), Shandong Province Natural Science Foundation (No. ZR2017BF023), Shandong Province Postdoctoral Innovation Project (No. 201703032), Open Fund Project of Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University) (No. MJUKF-IPIC201806), the Opening Foundation of Key Laboratory of Opto-technology and Intelligent Control(Lanzhou Jiaotong University), Ministry of Education (Grant No. KFKT2018-2),State Key Laboratory of Millimeter Waves (No. K201824),the University Science and Technology Planning Project of Shandong Province (No. J17KA058), the Doctoral Found of QUST (No. 0100229029),China Postdoctoral Science Foundation (No. 2017 M612223), Project of Shandong Province Higher Educational Science and Technology Program (No. J18KA315).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Xu, L., Yu, X., Wang, H. et al. Physical Layer Security Performance of Mobile Vehicular Networks. Mobile Netw Appl 25, 643–649 (2020). https://doi.org/10.1007/s11036-019-01224-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01224-8