1 Introduction

Rapid proliferation of smart vehicles leveraged with wireless communication capabilities have allowed vehicular networks to support various exciting intelligent transportation system (ITS) applications such as, traffic management, payment services, and infotainment [1,2,3]. Moreover, coupling vehicular networks with cooperative relaying communications can enhance reliability, efficiency, and coverage of ITS applications and services [4,5,6]. Such relay assisted vehicular networks can be termed as cooperative vehicular relaying networks (CVRNs). Some traditional relaying protocols such as amplify-and-forward (AF) and decode-and-forward (DF) can be applied in such networks. The AF relaying protocol has attracted significant interest over DF protocol as it is easy to implement and offers shorter latency. Moreover, based on the channel state information (CSI), it can operate under fixed gain relaying or variable gain relaying. In particular, the variable gain AF relaying requires instantaneous CSI, whereas the fixed gain relay needs only statistical CSI. Through vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) modes of communication in CVRNs, information can be disseminated among the vehicles, roadside infrastructures, and users. Despite several advantages, such networks come with their own set of challenges, particularly in the domains of privacy and security [7,8,9]. Due to the inherent open nature of wireless medium, mobility, cooperativeness, and lack of central points, such networks are vulnerable to various security attacks [7] such as, eavesdropping, jamming, identity theft etc. Recently, there has been a growing interest for ensuring information security in CVRNs. Various upper-layer security mechanisms [9,10,11] are used to ensure the security in such networks. However, the dynamic nature of vehicular networks and lack of trusted central infrastructure entity can make the secret key distribution process vulnerable [12]. Moreover, such security mechanisms could become inefficient when the eavesdropper have the access to infinite computing capabilities. Amid these challenges, physical-layer security has emerged as an attractive option to compliment the existing cryptography based security infrastructure [13, 14]. It guarantees secure transmission by exploiting the inherent randomness of the wireless channel such as, fading, interferences etc. [15,16,17].

1.1 Related Works

Recently, physical-layer security in non-vehicular cooperative relaying networks have attracted considerable attention in the literature (see [18,19,20,21,22,23,24,25,26] and the references therein). However, all of them [18,19,20,21,22,23,24,25,26] are limited to the scenario where the nodes are stationary and the channel between the terminals can be distributed as Rayleigh fading or Nakagami-m fading. The authors in [27, 28] have investigated the secrecy performance of variable gain AF relay based CVRNs by considering the classical Rayleigh fading to model the V2V channel. However, cascaded fading models [29, 30] are found to be more appropriate to provide a realistic description of V2V channels, which can be produced by multiplying the channel gains of independent groups of scatterers around the mobile units. The performance of CVRNs by considering the cascaded channel modeling for V2V links have been investigated in [31,32,33,34,35,36]. Specifically, the authors in [31] have analyzed the performance of a multihop network under cascaded Rayleigh fading. The authors in [32] have evaluated the performance of DF-based multi-relay CVRNs under double-Rayleigh channels. In [33], the authors have investigated the performance of DF-based CVRN, where the end-to-end communication is assisted by both the mobile and fixed infrastructure units under mixed Rayleigh and double-Rayleigh fading. The authors in [34] have investigated the performance of CVRNs with variable gain AF relaying protocol under mixed Nakagami-m and double-Nakagami-m fading environment. Recently, the authors in [35] have analyzed the performance of a CVRN with incremental hybrid decode-amplify-and-forward relaying under double-Rayleigh fading. Further, the authors in [36] have evaluated the performance of fixed gain AF relay based CVRNs under cascaded Nakagami-m fading channels.

Although, these works [31,32,33,34,35,36] have investigated the performance of CVRNs, however, none of them has explored the security issues in CVRNs. So far, the open literature exploiting the physical-layer security aspects in the CVRNs is very limited [37,38,39,40]. The authors in [37] have evaluated the secrecy performance of non-cooperative vehicular networks under double-Rayleigh channels. In [38], the authors have evaluated the secrecy performance of DF-based CVRNs over double-Rayleigh fading channels. Very recently, the authors in [39, 40] have evaluated the performance of cooperative variable gain AF-based vehicular network under mixed Rayleigh and double-Rayleigh fading environments.

1.2 Motivation

Extensive exploration and investigation on the physical-layer security aspects in securing non-vehicular relaying networks exist in the literature [18,19,20,21,22,23,24,25,26] and is still growing on. Such networks correspond to the scenario where the communicating terminals are stationary and the channel between them can be modeled as Rayleigh distributed or Nakagami-m distributed. The physical-layer security aspects in CVRNs systems have been well studied in [27, 28, 38,39,40]. In particular, the authors in [27, 28] have evaluated the physical-layer security aspects in CVRNs, however, the analysis was carried out by assuming classical Rayleigh fading for both V2V and V2I channels. Experimentally and theoretically, it is shown that V2V links are different from V2I links, and hence the cascaded channel models are found more suited for V2V links [29]. The authors in [38] have studied the secrecy performance of DF-based CVRNs in the presence of double-Rayleigh fading. Moreover, the authors in [39] have evaluated the secrecy performance of an AF-based CVRN by considering the relay and eavesdropper as vehicular terminals (channel between them is modeled as double-Rayleigh fading), and source and destination as the fixed infrastructure (channel between them is modeled as Rayleigh fading). Further, the authors in [40] have investigated the secrecy performance of AF-based CVRNs by considering source, relay, and eavesdropper as vehicles, and destination as the fixed terminal.

Therefore, based on the open literature and to the best of authors’ knowledge, the secrecy analysis for AF-based CVRNs by considering all terminals as moving vehicle under both fixed and variable gain relaying in the presence of double-Rayleigh fading channels is yet to be investigated. Moreover, there is lack of performance evaluation measures, i.e., intercept probability and ergodic secrecy capacity (ESC) in terms of CVRNs with all vehicular communications links. Motivating ourselves from the above research gaps, we develop this treatise and want to fill these important research gaps.

1.3 Contributions

In this paper, we consider a dual-hop CVRN where the communication between a source vehicle and a destination vehicle is assisted by an AF relay vehicle in the presence of a passive eavesdropper vehicle. We consider two AF relaying strategies: (1) fixed gain relaying which requires partial CSI, and (2) variable gain relaying which requires full CSI. By modeling the vehicular communication links as double-Rayleigh fading channels, we derive the novel expressions for the intercept probability and ESC under both fixed and variable gain relaying of the considered system. With the help of numerical and simulation results, we corroborate our analytical findings. We further illustrate the effects of channel conditions and relay and eavesdropper locations on the system security performance. Our results reveal that the fixed gain AF relaying can achieve comparable secrecy performance to that of variable gain AF relaying protocol, without necessitating full CSI.

1.3.1 Notations

\({\mathbb {E}}[X]\) denotes the expectation of a random variable (RV) X. \(F_{X}(\cdot )\) and \(f_{X}(x)\) denote the cumulative distribution function (CDF) and probability density function (PDF) of X. \({\mathcal {K}}_{v}(\cdot )\) denotes the v-th order modified Bessel function of second kind [41, Eq. (8.432)], \(G^{m, n}_{p, q}\big (x\big |^{a_{1},\ldots , a_{p}}_{b_{1},\ldots , b_{q}}\big )\) is the Meijer-G function [41, Eq. (9.301)], \(_2F_{1}(\cdot ,\cdot ;\cdot ;\cdot )\) is the hypergeometric function [41, Eq. (9.111)], \(G^{m_{1}, n_{1}:n_{2}, m_{2} :n_{3}, m_{3}}_{p_{1},q_{1} :p_{2},q_{2}:p_{3},q_{3}}\big (x,y\big |^{a_{1},\ldots , a_{p_{1}}}_{b_{1},\ldots , b_{q_{1}}}\big |^{c_{1},\ldots , c_{p_{1}}}_{d_{1},\ldots , d_{q_{2}}}\big |^{e_{1},\ldots , e_{p_{3}}}_{f_{1},\ldots , f_{q_{3}}}\big )\) is the extended generalized bivariate Meijer-G function [42, Eq. (07.34.21.0081.01)], \(\varPsi (\cdot )\) denotes the psi function [41, Eq. (8.360.1)], and \(\varGamma (\cdot )\) denotes the complete gamma function [41, Eq. (8.350)].

2 System and Channel Models

We consider a secure CVRN (as shown in Fig. 1), in which a legitimate source vehicle \({\text {S}}\) communicates with the legitimate destination vehicle \({\text {D}}\) by the assistance of an AF relay vehicle \({\text {R}}\) in the presence of a passive eavesdropper vehicle \({\text {E}}\). All vehicles are equipped with a single antenna. The direct links between \({\text {S}}\) and \({\text {D}}\), and \({\text {S}}\) and \({\text {E}}\) are absent due to the heavy path-loss and shadowing. We assume that all channels are assumed to be quasi-static, reciprocal, and subject to independent and non-identically distributed (i.ni.d.) double-Rayleigh fading. In particular, the channel coefficients \(h_{\imath \jmath }\) for \(\{\imath \jmath \} \in \{{\text {SR}}, {\text {RD}}, {\text {RE}}\}\) can be modeled as the product of \(h_{\imath \jmath ,1}\) and \(h_{\imath \jmath ,2}\), where \(h_{\imath \jmath ,1}\) and \(h_{\imath \jmath ,2}\) are independent complex Gaussian random variables (RVs) having zero mean and variance \(\varOmega _{\imath \jmath ,1}\) and \(\varOmega _{\imath \jmath ,2}\), respectively. We also assume the additive white Gaussian noise (AWGN) with zero mean and \(N_{0}\) variance for each link.

Fig. 1
figure 1

System model for secure cooperative vehicular relaying network

The communication from \({\text {S}}\) to \({\text {D}}\) in the presence of a passive \({\text {E}}\) will be accomplished via \({\text {R}}\) in two transmission phases. In the first transmission phase, \({\text {S}}\) transmits its unit energy signal \(x_{s}\) with power \(P_{s}\). The signal received at \({\text {R}}\) can be expressed as \(y_{r}=\sqrt{P_{s}}h_{{\text {SR}}}x_{s}+n_{r}\), where \(n_{r}\) is the AWGN at \({\text {R}}\). During the second transmission phase, R amplifies the received signal \(y_{r}\) with some amplification factor \({\mathcal {G}}\), and the signal received at \({\text {D}}\) and \({\text {E}}\) can be given, respectively, as

$$\begin{aligned} y_{d}&={\mathcal {G}}h_{{\text {RD}}}\left( \sqrt{P_{s}}h_{{\text {SR}}}x_{s}+n_{r}\right) +n_{d}, \end{aligned}$$
(1)
$$\begin{aligned} y_{e}&={\mathcal {G}}h_{{\text {RE}}}\left( \sqrt{P_{s}}h_{{\text {SR}}}x_{s}+n_{r}\right) +n_{e}, \end{aligned}$$
(2)

where \(n_{d}\) and \(n_{e}\) are the AWGNs at \({\text {D}}\) and \({\text {E}}\), and the amplification factor \({\mathcal {G}}\) is selected at \({\text {R}}\) to satisfy its power constraint. If \({\text {R}}\) has instantaneous knowledge of the fading channel, \(h_{{\text {SR}}}\), it can apply variable gain relaying with \({\mathcal {G}}^{{\mathrm{v}}}=\sqrt{\frac{P_{r}}{{\mathbb {E}}_{x_{s}, n_{r}}\{|y_{r}|\}^{2}}}\), where \(P_{r}\) denotes the relay power. Otherwise, fixed gain relaying (using only statistical CSI) with \({\mathcal {G}}^{{\mathrm{f}}}=\sqrt{\frac{P_{r}}{{\mathbb {E}}_{x_{s},h_{{\text {SR}}}, n_{r}}\{|y_{r}|\}^{2}}}\) can be employed. For the fixed and variable gain relaying, the amplification factor \({\mathcal {G}}\) can be considered as

$$\begin{aligned} {\mathcal {G}}^{{\mathrm{f}}}&=\sqrt{\frac{P_{r}}{P_{s}{\mathbb {E}}_{|h_{{\text {SR}}}|^{2}} \left\{ |h_{{\text {SR}}}|^{2}\right\} +N_{0}}}, \end{aligned}$$
(3)
$$\begin{aligned} {\mathcal {G}}^{{\mathrm{v}}}&=\sqrt{\frac{P_{r}}{P_{s}|h_{{\text {SR}}}|^{2}+N_{0}}}, \end{aligned}$$
(4)

respectively. Further, using the expressions \({\mathcal {G}}^{{\mathrm{f}}}\) and \({\mathcal {G}}^{{\mathrm{v}}}\), and after some algebraic manipulations, we can express the instantaneous end-to-end signal-to-noise ratios (SNRs) at \({\text {D}}\) and \({\text {E}}\) for the fixed gain relaying as

$$\begin{aligned} \varLambda _{{\text {D}}}^{{\mathrm{f}}}=\frac{\lambda _{{\text {SR}}}\lambda _{{\text {RD}}}}{C+\lambda _{{\text {RD}}}} \quad {\text{ and }}\quad \varLambda _{{\text {E}}}^{{\mathrm{f}}}=\frac{\lambda _{{\text {SR}}}\lambda _{{\text {RE}}}}{C+\lambda _{{\text {RE}}}}, \end{aligned}$$
(5)

and for the variable gain relaying as

$$\begin{aligned} \varLambda _{{\text {D}}}^{{\mathrm{v}}}=\frac{\lambda _{{\text {SR}}}\lambda _{{\text {RD}}}}{\lambda _{{\text {SR}}}+\lambda _{{\text {RD}}}+1} \quad {\text{ and }}\quad \varLambda _{{\text {E}}}^{{\mathrm{v}}}=\frac{\lambda _{{\text {SR}}}\lambda _{{\text {RE}}}}{\lambda _{{\text {SR}}}+\lambda _{{\text {RE}}}+1}, \end{aligned}$$
(6)

where \(\lambda _{{\text {SR}}}=\frac{P_{s}}{N_{0}}|h_{{\text {SR}}}|^{2}\), \(\lambda _{{\text {RD}}}=\frac{P_{r}}{N_{0}}|h_{{\text {RD}}}|^{2}\), \(\lambda _{{\text {RE}}}=\frac{P_{r}}{N_{0}}|h_{{\text {RE}}}|^{2}\), and \(C=\frac{P_{r}}{N_{0}\big ({\mathcal {G}}^{{\mathrm{f}}}\big )^{2}}\) is a constant for fixed \({\mathcal {G}}^{{\mathrm{f}}}\).

Moreover, the capacities pertaining to \({\text {S}}\rightarrow {\text {R}}\rightarrow {\text {D}}\) and \({\text {S}}\rightarrow {\text {R}}\rightarrow {\text {E}}\) links of the considered system can be defined as \({\mathcal {C}}_{{\text {D}}}^{\flat }=\frac{1}{2}\log _{2}(1+\varLambda _{{\text {D}}}^{\flat })\) and \({\mathcal {C}}_{{\text {E}}}^{\flat }=\frac{1}{2}\log _{2}(1+\varLambda _{{\text {E}}}^{\flat })\), for \(\flat =\{{\text{ f }}, {\text{ v }} \}\), respectively.

Thus, the secrecy capacity of the considered system can be expressed as

$$\begin{aligned} {\mathcal {C}}_{{\text {SEC}}}^{\flat }=\max \left\{ {\mathcal {C}}_{{\text {D}}}^{\flat }-{\mathcal {C}}_{{\text {E}}}^{\flat },0\right\} , \end{aligned}$$
(7)

where \(\flat =\{{\text{ f }}, {\text{ v }} \}\).

3 Performance Analysis

Here, we analyze the intercept probability and ergodic secrecy capacity (ESC) of the considered system for fixed and variable gain relaying under double-Rayleigh fading channels. Note that \(h_{\imath \jmath }\) for \(\{\imath \jmath \} \in \{{\text {SR}}, {\text {RD}}, {\text {RE}}\}\) is distributed as double-Rayleigh fading, therefore, the CDF and PDF for the channel gain \(|h_{ \imath \jmath }|^{2}\) are given as \(F_{|h_{\imath \jmath }|^{2}}(x) = 1- (2/\varOmega _{\imath \jmath })\sqrt{x}{\mathcal {K}}_{1}\left( (2/\varOmega _{\imath \jmath })\sqrt{x} \right)\), \(x>0\) and \(f_{|h_{\imath \jmath }|^{2}}(x)= (2/\varOmega _{ \imath \jmath }^{2}) {\mathcal {K}}_{0}\left( (2/\varOmega _{\imath \jmath })\sqrt{x} \right)\), \(x>0\),(assuming \(\varOmega _{\imath \jmath ,1}=\varOmega _{\imath \jmath ,2}=\varOmega _{\imath \jmath }\)) respectively. This will help us to conduct the analytical derivation of performance metrics under investigation in what follows.

3.1 Intercept Probability

The intercept probability is an important performance measure used to evaluate the secrecy performance of cooperative relaying networks. It is defined as the probability that the eavesdropper succeeds to intercept the signal forwarded for the legitimate receiver or in other words, the secrecy capacity falls below zero [18]. Mathematically, for the considered system under fixed and variable gain relaying, it can be written as

$$\begin{aligned} {\mathcal {P}}_{{\text {int}}}^{\flat }={\mathbf{Pr }} \left[ {\mathcal {C}}_{{\text {D}}}^{\flat }-{\mathcal {C}}_{{\text {E}}}^{\flat }<0\right] , \end{aligned}$$
(8)

where \(\flat =\{{\text{ f }}, {\text{ v }} \}\).

3.1.1 Fixed Gain Relaying

For fixed gain relaying scenario, the intercept probability of the considered system can be expressed as

$$\begin{aligned} {\mathcal {P}}_{{\text {int}}}^{{\mathrm{f}}}&={\mathbf{Pr }} \left[ {\mathcal {C}}_{{\text {D}}}^{{\mathrm{f}}}-{\mathcal {C}}_{{\text {E}}}^{{\mathrm{f}}}<0\right] \nonumber \\&={\mathbf{Pr }}\left[ \varLambda _{{\text {D}}}^{{\mathrm{f}}}-\varLambda _{{\text {E}}}^{{\mathrm{f}}}<0\right] \nonumber \\&={\mathbf{Pr }}\left[ \frac{\lambda _{{\text {SR}}}\lambda _{{\text {RD}}}}{C+\lambda _{{\text {RD}}}}<\frac{\lambda _{{\text {SR}}}\lambda _{{\text {RE}}}}{C+\lambda _{{\text {RE}}}}\right] , \end{aligned}$$
(9)

which after some simplifications can be expressed as

$$\begin{aligned} {\mathcal {P}}_{{\text {int}}}^{{\mathrm{f}}}&={\mathbf{Pr }}[\lambda _{{\text {RD}}}<\lambda _{{\text {RE}}}]\nonumber \\&=\int _{0}^{\infty }F_{\lambda _{{\text {RD}}}}(y)f_{\lambda _{{\text {RE}}}}(y)dy. \end{aligned}$$
(10)

Invoking the CDF of \(\lambda _{{\text {RD}}}\) and the PDF of \(\lambda _{{\text {RE}}}\) into (10), \({\mathcal {P}}_{{\text {int}}}^{{\mathrm{f}}}\) can be expressed as

$$\begin{aligned} {\mathcal {P}}_{{\text {int}}}^{{\mathrm{f}}}=\int _{0}^{\infty }\,\left( 1-2 \alpha _{{\text {RD}}}\sqrt{y}{\mathcal {K}}_{1}\left( 2\alpha _{{\text {RD}}}\sqrt{y}\right) \right) \,2 \alpha _{{\text {RE}}}^{2}\,{\mathcal {K}}_{0}\left( 2\alpha _{{\text {RE}}}\sqrt{y}\right) dy. \end{aligned}$$
(11)

Further, making the change of variable \(y=t^{2}\) within the integral and then using [41, Eq. (6.576.4)], we can obtain the intercept probability under fixed gain relaying, \({\mathcal {P}}_{{\text {int}}}^{{\mathrm{f}}}\), as

$$\begin{aligned} {\mathcal {P}}_{{\text {int}}}^{{\mathrm{f}}}=1-\frac{\alpha _{{\text {RE}}}^{2}}{2 \alpha _{{\text {RD}}}^{2}}\varGamma (2,2,1,1)\, _2F_{1}\left( 2,1;3;1-\frac{\alpha _{{\text {RE}}}^{2}}{\alpha _{{\text {RD}}}^{2}}\right) , \end{aligned}$$
(12)

where \(\alpha _{{\text {RD}}}=\frac{\sqrt{N_{0}}}{\sqrt{P_{r}}\varOmega _{{\text {RD}}}}\), \(\alpha _{{\text {RE}}}=\frac{\sqrt{N_{0}}}{\sqrt{P_{r}}\varOmega _{{\text {RE}}}}\), and \(\varGamma (a_{1},\ldots , a_{p})=\prod _{k=1}^{p}\varGamma (a_{k})\).

We can see from (12) that the intercept probability expression involves powers, incomplete gamma function, and hypergeometric function containing the transmit powers and average channel gains, which can be easily calculated via software packages such as Matlab or Mathematica.

3.1.2 Variable Gain Relaying

Under variable gain relaying scenario, the intercept probability of the considered system can be given by

$$\begin{aligned} {\mathcal {P}}_{{\text {int}}}^{{\mathrm{v}}}&={\mathbf{Pr }}[{\mathcal {C}}_{{\text {D}}}^{{\mathrm{v}}}-{\mathcal {C}}_{{\text {E}}}^{{\mathrm{v}}}<0]\nonumber \\&={\mathbf{Pr }}[\varLambda _{{\text {D}}}^{{\mathrm{v}}}-\varLambda _{{\text {E}}}^{{\mathrm{v}}}<0]. \end{aligned}$$
(13)

With the fact that \(\frac{XY}{X+Y}<\min (X,Y)\), the \(\varLambda _{{\text {D}}}^{{\mathrm{v}}}\) and \(\varLambda _{{\text {E}}}^{{\mathrm{v}}}\) can be tightly upper bounded as \(\varLambda _{{\text {D}}}^{{\mathrm{v}}}<\min (\lambda _{{\text {SR}}},\lambda _{{\text {RD}}})\, {\text{ and }}\, \varLambda _{{\text {E}}}^{{\mathrm{v}}}<\min (\lambda _{{\text {SR}}},\lambda _{{\text {RE}}})\). However, it is noted that such an upper bound can be treated as tight approximation over the entire range of operating SNR. Consequently, we can express (13) as

$$\begin{aligned} {\mathcal {P}}_{{\text {int}}}^{{\mathrm{v}}}\approx \int _{0}^{\infty }F_{\varLambda _{{\text {D}}}^{{\mathrm{v}}}}(y)f_{\varLambda _{{\text {E}}}^{{\mathrm{v}}}}(y)dy, \end{aligned}$$
(14)

where

$$\begin{aligned} F_{\varLambda _{{\text {D}}}^{{\mathrm{v}}}}\left( x\right)&={\mathbf{Pr }}\left[ \min \left( \lambda _{{\text {SR}}},\lambda _{{\text {RD}}}\right) <x\right] \nonumber \\&=F_{\lambda _{{\text {SR}}}}\left( x\right) +F_{\lambda _{{\text {RD}}}}\left( x\right) -F_{\lambda _{{\text {SR}}}}\left( x\right) F_{\lambda _{{\text {RD}}}}\left( x\right) \nonumber \\&=1-4 \alpha _{{\text {SR}}}\alpha _{{\text {RD}}}x{\mathcal {K}}_{1}\left( 2\alpha _{{\text {SR}}}\sqrt{x}\right) {\mathcal {K}}_{1}\left( 2\alpha _{{\text {RD}}}\sqrt{x}\right) ,\end{aligned}$$
(15)
$$\begin{aligned} f_{\varLambda _{{\text {E}}}^{{\mathrm{v}}}}\left( x\right)&=\frac{\partial }{\partial x} \left\{ {\mathbf{Pr }}\left[ \min \left( \lambda _{{\text {SR}}},\lambda _{{\text {RE}}}\right) <x\right] \right\} \nonumber \\&=4 \alpha _{{\text {SR}}}^{2}\alpha _{{\text {RE}}}\sqrt{x}{\mathcal {K}}_{0}\left( 2\alpha _{{\text {SR}}}\sqrt{x}\right) {\mathcal {K}}_{1}\left( 2\alpha _{{\text {RE}}}\sqrt{x}\right) \nonumber \\&\quad +4 \alpha _{{\text {SR}}}\alpha _{{\text {RE}}}^{2}\sqrt{x}{\mathcal {K}}_{1}\left( 2\alpha _{{\text {SR}}}\sqrt{x}\right) {\mathcal {K}}_{0}\left( 2\alpha _{{\text {RE}}}\sqrt{x}\right) , \end{aligned}$$
(16)

where we have used the fact that \(\frac{\partial ^{n}}{\partial x^{n}}[x^{\frac{v}{2}}{\mathcal {K}}_{v}(a\sqrt{x})]=(-\frac{a}{2})^{n}x^{\frac{(v-n)}{2}}{\mathcal {K}}_{v-n}(a\sqrt{x})\) [43, Eq. (1.14.1.4)] to obtain the second equality in (16), and \(\alpha _{{\text {SR}}}=\frac{\sqrt{N_{0}}}{\sqrt{P_{s}}\varOmega _{{\text {SR}}}}\).

Now, invoking (15) and (16) into (14), and after evaluating the required integrals, the intercept probability under variable gain relaying can be obtained as per following theorem.

Theorem 1

The intercept probability for variable gain relaying scenario under double-Rayleigh fading channels can be expressed as

$$\begin{aligned} {\mathcal {P}}_{{\text {int}}}^{{\mathrm{v}}}&=1-\frac{\sqrt{\pi }}{2} \frac{\alpha _{{\text {SR}}}\alpha _{{\text {RE}}}}{\alpha _{{\text {RD}}}^{2}} G_{4,2:0,2:0,2}^{0,4:2,0:2,0} \left( \, _{0,-0.5}^{-0.5,-0.5,0.5,0.5}\big |_{2,1}\big |_{0.5,-0.5}\big |\frac{\alpha _{{\text {RD}}}^{2}}{4 \alpha _{{\text {SR}}}^{2}}, \frac{\alpha _{{\text {RE}}}^{2}}{4 \alpha _{{\text {SR}}}^{2}}\right) \nonumber \\&\quad -\frac{\sqrt{\pi }}{2}\frac{\alpha _{{\text {RE}}}^{2}}{ \alpha _{{\text {RD}}}^{2}}G_{3,1:0,2:0,2}^{0,3:2,0:2,0}\left( \, _{-0.5}^{0,-1,1}\big |_{2,1}\big |_{0,0}\big |\frac{\alpha _{{\text {RD}}}^{2}}{4 \alpha _{{\text {SR}}}^{2}}, \frac{\alpha _{{\text {RE}}}^{2}}{4 \alpha _{{\text {SR}}}^{2}}\right) . \end{aligned}$$
(17)

Proof

See “Appendix 1” for the proof. □

It can be observed from (17) that the intercept probability expression involves powers and extended generalized bivariate Meijer-G functions containing the transmit powers and average channel gains, which can be easily evaluated using the Matlab or Mathematica softwares.

3.2 Ergodic Secrecy Capacity (ESC)

It can be easily observed from (7) that the achievable secrecy capacity \({\mathcal {C}}_{{\text {SEC}}}^{\flat }=0\) when \({\mathcal {C}}_{{\text {D}}}^{\flat }\le {\mathcal {C}}_{{\text {E}}}^{\flat }\), for \(\flat =\{{\text{ f }}, {\text{ v }} \}\), therefore, the secrecy capacity can only be achieved for the case when \({\mathcal {C}}_{{\text {D}}}^{\flat }> {\mathcal {C}}_{{\text {E}}}^{\flat }\). Consequently, the ESC for the considered system under fixed and variable gain relaying can be mathematically expressed as

$$\begin{aligned} \overline{{\mathcal {C}}}_{{\text {SEC}}}^{\flat }&={\mathbb {E}} \left[ {\mathcal {C}}_{{\text {D}}}^{\flat }-{\mathcal {C}}_{{\text {E}}}^{\flat }\right] \nonumber \\&=\frac{1}{2}{\mathbb {E}}\left[ \log _{2}\left( 1+\varLambda _{{\text {D}}}^{\flat }\right) \right] -\frac{1}{2}{\mathbb {E}}\left[ \log _{2}\left( 1+\varLambda _{{\text {E}}}^{\flat }\right) \right] , \end{aligned}$$
(18)

where \(\flat = \{{\text {f}}, {\text {v}}\}\).

3.2.1 Fixed Gain Relaying

Under fixed gain relaying scenario, the ESC using (5) and (18) can be expressed as

$$\begin{aligned} \overline{{\mathcal {C}}}_{{\text {SEC}}}^{{\mathrm{f}}}&=\frac{1}{2}\bigg \{{\mathbb {E}}\Big [\log _{2}\Big (1+\frac{\lambda _{{\text {SR}}}\lambda _{{\text {RD}}}}{C+\lambda _{{\text {RD}}}}\Big )\Big ]-{\mathbb {E}}\Big [\log _{2}\Big (1+\frac{\lambda _{{\text {SR}}}\lambda _{{\text {RE}}}}{C+\lambda _{{\text {RE}}}}\Big )\Big ]\bigg \}\nonumber \\&=\frac{1}{2\ln (2)}\bigg \{\underbrace{{\mathbb {E}}\Big [\ln \Big (1+\frac{\lambda _{{\text {SR}}}\lambda _{{\text {RD}}}}{C+\lambda _{{\text {RD}}}}\Big )\Big ]}_{\triangleq \overline{{\mathcal {C}}}_{{\text {D}}}^{{\mathrm{f}}}}-\underbrace{{\mathbb {E}}\Big [\ln \Big (1+\frac{\lambda _{{\text {SR}}}\lambda _{{\text {RE}}}}{C+\lambda _{{\text {RE}}}}\Big )\Big ]}_{\triangleq \overline{{\mathcal {C}}}_{{\text {E}}}^{{\mathrm{f}}}}\bigg \}, \end{aligned}$$
(19)

which can be then evaluated and presented in the following theorem.

Theorem 2

For the fixed gain relaying, the ESC can be obtained as

$$\begin{aligned} \overline{{\mathcal {C}}}_{{\text {SEC}}}^{{\mathrm{f}}}&=\frac{1}{2 \ln (2)}\Bigg \{\alpha _{{\text {SR}}}^{2}\alpha _{{\text {RD}}}^{2}C\sum _{k=0}^{\infty }\frac{1}{k!}\Big (\frac{-1}{C\alpha _{{\text {RD}}}^{2}}\Big )^{k}G_{3,7}^{6,2}\bigg (\alpha _{{\text {SR}}}^{2}\alpha _{{\text {RD}}}^{2}C\Big |_{0,0,k,k,k-1,k-1,k}^{0,k-1,k}\bigg )\nonumber \\&\quad -G_{4,2}^{1,4}\bigg (\frac{1}{\alpha _{{\text {RD}}}^{2}C}\Big |_{1,0}^{0,0,1,1}\bigg )+G_{4,2}^{1,4}\bigg (\frac{1}{\alpha _{{\text {RE}}}^{2}C}\Big |_{1,0}^{0,0,1,1}\bigg )\nonumber \\&\quad -\alpha _{{\text {SR}}}^{2}\alpha _{{\text {RE}}}^{2}C\sum _{k=0}^{\infty }\frac{1}{k!}\Big (\frac{-1}{C\alpha _{{\text {RE}}}^{2}}\Big )^{k}G_{3,7}^{6,2}\bigg (\alpha _{{\text {SR}}}^{2}\alpha _{{\text {RE}}}^{2}C\Big |_{0,0,k,k,k-1,k-1,k}^{0,k-1,k}\bigg )\Bigg \}. \end{aligned}$$
(20)

Proof

See “Appendix 2” for the detailed derivation. □

The expression in (20) can be easily evaluated via Matlab or Mathematica softwares. It is also worth mentioning that (20) contains the infinite series expansion, which converges fast as shown numerically in Sect. 4.

3.2.2 Variable Gain Relaying

Under variable gain relaying scenario, the ESC of the considered system is presented in Theorem 3.

Theorem 3

For variable gain relaying scenario, the ESC can be given by

$$\begin{aligned} \overline{{\mathcal {C}}}_{{\text {SEC}}}^{{\mathrm{v}}}=\frac{1}{2\ln (2)}\big [{\mathcal {T}}_{1}-{\mathcal {T}}_{2}-{\mathcal {T}}_{3}+{\mathcal {T}}_{4}\big ], \end{aligned}$$
(21)

where

$$\begin{aligned} {\mathcal {T}}_{1}&=\xi _{1}\Big (\frac{1}{\alpha _{RD}^{2}}\Big ), \end{aligned}$$
(22)
$$\begin{aligned} {\mathcal {T}}_{2}&=\xi _{1}\Big (\frac{1}{\alpha _{RE}^{2}}\Big ), \end{aligned}$$
(23)
$$\begin{aligned} {\mathcal {T}}_{3}&=\xi _{1}\Big (\frac{M}{\alpha _{RD}^{2}}\Big )-\frac{\alpha _{RD}^{2}}{M}\xi _{2}\Big (1,0,0,0, \alpha _{SR}^{2}, \frac{\alpha _{RD}^{2}}{M}\Big )+\xi _{1}\Big (\frac{1}{\alpha _{SR}^{2}}\Big )\nonumber \\&\quad -\alpha _{SR}^{2}\xi _{2}\Big (0,0,1,0,\alpha _{SR}^{2}, \frac{\alpha _{RD}^{2}}{M}\Big )+\sum _{k=2}^{M}\bigg \{-\xi _{1}\Big (\frac{1}{\alpha _{RD}^{2}\tau _{k-1}}\Big )+\xi _{1}\Big (\frac{1}{\alpha _{RD}^{2}\tau _{k}}\Big )\nonumber \\&\quad +\alpha _{SR}\alpha _{RD}\sqrt{(1-\tau _{k-1})\tau _{k-1}}\xi _{2}\Big (0.5,0.5,0.5,-0.5, \alpha _{SR}^{2}(1-\tau _{k-1}), \alpha _{RD}^{2}\tau _{k-1}\Big )\nonumber \\&\quad +\alpha _{RD}^{2}\tau _{k-1}\xi _{2}\Big (1,0,0,0, \alpha _{SR}^{2}(1-\tau _{k-1}), \alpha _{RD}^{2}\tau _{k-1}\Big )\nonumber \\&\quad -\alpha _{RD}^{2}\tau _{k}\xi _{2}\Big (1,0,0,0, \alpha _{SR}^{2}(1-\tau _{k-1}), \alpha _{RD}^{2}\tau _{k}\Big )-\alpha _{SR}\alpha _{RD}\sqrt{(1-\tau _{k-1})\tau _{k}}\nonumber \\&\quad \times \xi _{2}\Big (0.5,0.5,0.5,-0.5, \alpha _{SR}^{2}(1-\tau _{k-1}), \alpha _{RD}^{2}\tau _{k-1}\Big ) \bigg \}, \end{aligned}$$
(24)
$$\begin{aligned} {\mathcal {T}}_{4}&=\xi _{1}\Big (\frac{M}{\alpha _{RE}^{2}}\Big )-\frac{\alpha _{RE}^{2}}{M}\xi _{2}\Big (1,0,0,0, \alpha _{SR}^{2}, \frac{\alpha _{RE}^{2}}{M}\Big )+\xi _{1}\Big (\frac{1}{\alpha _{SR}^{2}}\Big )\nonumber \\&\quad -\alpha _{SR}^{2}\xi _{2}\Big (0,0,1,0, \alpha _{SR}^{2}, \frac{\alpha _{RE}^{2}}{M}\Big )+\sum _{k=2}^{M}\bigg \{-\xi _{1}\Big (\frac{1}{\alpha _{RE}^{2}\tau _{k-1}}\Big )+\xi _{1}\Big (\frac{1}{\alpha _{RE}^{2}\tau _{k}}\Big )\nonumber \\&\quad +\alpha _{SR}\alpha _{RE}\sqrt{(1-\tau _{k-1})\tau _{k-1}} \xi _{2}\Big (0.5,0.5,0.5,-0.5, \alpha _{SR}^{2}(1-\tau _{k-1}), \alpha _{RE}^{2}\tau _{k-1}\Big )\nonumber \\&\quad +\alpha _{RE}^{2}\tau _{k-1}\xi _{2}\Big (1,0,0,0, \alpha _{SR}^{2}(1-\tau _{k-1}), \alpha _{RE}^{2}\tau _{k-1}\Big )\nonumber \\&\quad -\alpha _{RE}^{2}\tau _{k}\xi _{2}\Big (1,0,0,0, \alpha _{SR}^{2}(1-\tau _{k-1}), \alpha _{RE}^{2}\tau _{k}\Big )-\alpha _{SR}\alpha _{RE}\sqrt{(1-\tau _{k-1})\tau _{k}}\nonumber \\&\quad \times \xi _{2}\Big (0.5,0.5,0.5,-0.5, \alpha _{SR}^{2}(1-\tau _{k-1}), \alpha _{RE}^{2}\tau _{k-1}\Big ) \bigg \}, \end{aligned}$$
(25)
$$\begin{aligned} \xi _{1}(a)&=G_{4,2}^{1,4}\big (a\big |_{1,0}^{0,0,1,1}\big ), \end{aligned}$$
(26)
$$\begin{aligned} \xi _{2}\left( a,b, c, d, e,f\right)&=G_{2,2:0,2:0,2}^{2,1:2,0:2,0} \left( _{-1,-1}^{-1,0}\big |_{a,b}\big |_{c,d}\big |e,f\right) , \end{aligned}$$
(27)

with \(\tau _{k}=\frac{k}{M}\) and \(\tau _{k-1}=\frac{k-1}{M}\).

Proof

The proof is given in “Appendix 3”. □

The ESC expression under variable gain relaying consists of finite summations with powers, Meijer-G functions, and extended generalized bivariate Meijer-G functions consisting of transmit powers and average channel gains, which can be evaluated via Matlab or Mathematica software packages.

4 Numerical Results and Discussion

In this section, we provide our derived analytical results for intercept probability and ESC for the considered system under fixed and variable gain relaying protocols with the help of numerical results (using Mathematica) and Monte-Carlo simulations (using Matlab). We consider a path-loss model with an exponent of four. Without loss of generality, we denote \(d_{\imath \jmath }\) as the distance between the nodes \(\imath\) and \(\jmath\), where \(\imath \jmath \in \{{\text {SR}}, {\text {RD}}, {\text {RE}}\}\). We also consider a normalized square area (a two dimensional network topology), where the coordinates of node \({\text {S}}, {\text {R}}, {\text {D}}\), and \({\text {E}}\) are (0, 0) , \((x_{{\text {R}}},0)\), (1, 0) , and \((x_{{\text {E}}},y_{{\text {E}}})\), respectively. Accordingly, we have \(d_{{\text {SR}}}= x_{{\text {R}}}\), \(d_{{\text {RD}}}= 1-x_{{\text {R}}}\), and \(d_{{\text {RE}}}= \sqrt{(x_{{\text {R}}}-x_{{\text {E}}})^{2}+y_{{\text {E}}}^{2}}\). Let the mean values of the average channel gains of the links \({\text {S}}\rightarrow {\text {R}}\), \({\text {R}}\rightarrow {\text {D}}\), and \({\text {R}}\rightarrow {\text {E}}\) are denoted by \(\gamma _{{\text {SR}}}\), \(\gamma_{{\text {RD}}}\), and \(\gamma_{{\text {RE}}}\), respectively, and the main-to-eavesdropper ratio (MER) for the relay link is given as \(\lambda =\frac{\gamma_{{\text {RD}}}}{\gamma _{{\text {RE}}}}\). Accordingly, the average channel gain between the nodes \(\imath\) and \(\jmath\) is set to \(\varOmega _{\imath \jmath }=d_{\imath \jmath }^{-4}\lambda _{\imath \jmath }\), where \(\imath \jmath \in \{{\text {SR}}, {\text {RD}}, {\text {RE}}\}\). We set \(\gamma_{{\text {SR}}}=\gamma_{{\text {RD}}}=1\) and \(\gamma_{{\text {RE}}}=\frac{1}{\lambda }\). We also assume \(P_{s}=P_{r}=P\) and \(\rho =\frac{P}{N_{0}}\).

Fig. 2
figure 2

Intercept probability versus MER with fixed gain AF relaying

Fig. 3
figure 3

Intercept probability versus MER with variable gain AF relaying

Figures 2 and 3 depict the intercept probability performance of the considered system as a function of MER under fixed and variable gain AF relaying strategies, respectively, for different eavesdropper locations (i.e., \(x_{{\text {E}}}\) and \(y_{{\text {E}}}\)) when \(\rho =10\) dB. As can be seen from Figs. 2 and 3 that the derived analytical expressions of intercept probability for fixed and variable gain relaying are matched perfectly with the simulation results over the entire MER regime. This validates the correctness of the derived analytical expressions. Also, we can observe that the system intercept probability decreases as \(\lambda\) increases for fixed and variable gain relaying. This is due to the fact that with the increase in MER (\(\lambda\)), \({\text {R}}\rightarrow {\text {E}}\) link quality worsens compared to \({\text {R}}\rightarrow {\text {D}}\) link quality. In addition, it is also seen that a shorter \({\text {R}}\rightarrow {\text {E}}\) link (small \(d_{{\text {RE}}}\)) improves the eavesdropper ability to intercept, which is because of the fact that the shorter \(d_{{\text {RE}}}\) helps in strengthening the quality of wiretap \({\text {R}}\rightarrow {\text {E}}\) link. Moreover, one can observe from Figs. 2 and 3 that the intercept probability of fixed gain relaying is nearer to that of variable gain relaying. Thus, the fixed gain relaying can bring almost comparable intercept probability performance to variable gain relaying, without the need for full CSI.

Fig. 4
figure 4

ESC versus \(\lambda\) for different eavesdropper locations

Fig. 5
figure 5

Impact of relay-to-eavesdropper distance on the ESC performance

Figure 4 plots the ESC versus MER for both fixed and variable gain relaying strategies for various values of \(x_{{\text {E}}}\) and \(y_{{\text {E}}}\), when \(M=20\) and \(\rho =10\) dB. It can be seen from the plots that the derived analytical ESC results for both fixed and variable gain relaying are in good agreement with the simulation results over the entire range of operating MER. The analytical curves for ESC under variable gain relaying are obtained by truncating the infinite series expansion over index k in (20) to first few terms. As expected, the ESC performance under both relaying scenarios improves with increase in MER, irrespective of the eavesdropper location. This is owing to the better \({\text {R}}\rightarrow {\text {D}}\) link quality than \({\text {R}}\rightarrow {\text {E}}\) link quality. However, the ESC curves saturate in the high MER regime as ESC grows logarithmically with MER. Also, the ESC performance of the considered system under both the strategies degrades as \(d_{{\text {RE}}}\) shortens. This is because of the reason that a shorter \(d_{{\text {RE}}}\) results into a better wiretap channel quality. For instance, for variable gain AF (fixed gain AF) strategy with \(\lambda = 18\) dB, when \((x_{E},y_{E})=(0.5,0.5)\) so that \(d_{RE}=0.50\), the ESC is 3.70076 bps/Hz (3.4815 bps/Hz), while for \((x_{E},y_{E})=(0.6,0.8)\) so that \(d_{RE}=0.806\), the ESC is 0.3.96311 bps/Hz (3.6620 bps/Hz). Further, we can observe that the variable gain relaying provides a slightly better ESC performance in the medium-to-high MER than the fixed gain AF relaying.

Figure 5 illustrates the impact of relay-to-eavesdropper distance, \(d_{{\text {RE}}}\) upon ESC performance under both the relaying schemes for different values of MERs (\(\lambda\)), when \(M=20\), \(x_{{\text {R}}}=x_{{\text {E}}}=0.5\), and \(\rho = 10\) dB. Also, we have \(d_{{\text {RE}}}=\sqrt{(x_{{\text {E}}}-0.5)^{2}+y_{{\text {E}}}^{2}}\) and \(y_{{\text {E}}}\) moves from 0.1 to 3 (corresponding to \(d_{{\text {RE}}}\) from 0.1 to 3). As can be seen from the Fig. 5 that the ESC performance under both fixed and variable gain relaying improves with the increase in \(d_{{\text {RE}}}\), irrespective of \(\lambda\). This is owing to the reason that as \(d_{{\text {RE}}}\) increases, \({\text {R}}\rightarrow {\text {E}}\) link quality becomes poorer. Further, we can see that the ESC performance improves under both the relaying strategies as MER increases. This improvement in the ESC performance is because of the reason that the legitimated channel quality improves with the increase in MER. Also, we can see that the variable gain relaying provides a slightly better ESC performance than the fixed gain AF relaying for medium-to-high values of \(d_{{\text {RE}}}\). For low values of \(d_{{\text {RE}}}\), fixed gain AF relaying can achieve a marginally better ESC performance to that of variable gain AF relay. Therefore, we can see from Figs. 4 and 5 that fixed gain relaying can provide comparable ESC performance to that of variable gain AF relay strategy.

Fig. 6
figure 6

Impact of relay location on the ESC performance under fixed gain relaying

Fig. 7
figure 7

Impact of relay location on the ESC performance under variable gain relaying

Figures 6 and 7 illustrate the impact of relay location on the ESC performance under both the relaying strategies, for various values of \(x_{{\text {E}}}\) and \(y_{{\text {E}}}\), when \(M=20\), \(\rho = 10\) dB, and \(\lambda = 10\) dB. From the plots for the fixed gain relaying in Fig. 6, it can be seen that the relay location for maximum ESC is affected by the \({\text {R}}\rightarrow {\text {E}}\) link only. In particular, from the plots of Fig. 6, it can be observed that when \(x_{E}>0.5\) and \(y_{E}\lessgtr 0.5\), the ESC achieves a maximum value for relay location \(x_{R}\)Footnote 1 i.e., \(x_{R}^{*}\le 0.5\), whereas for \(x_{E}<0.5\) and \(y_{E}\lessgtr 0.5\), the maximum ESC occurs at \(x_{R}^{*}\ge 0.5\). For instance, when \(x_{E}=0.2, y_{E}= 0.2\), the maximum ESC occurs at \(x_{R}^{*}= 0.65\), whereas for \(x_{E}= 0.8\) and \(y_{E}= 0.2\), it occurs at \(x_{R}^{*}= 0.40\). Similarly, under variable gain relaying in Fig. 7, we can observe that when \(x_{E}>0.5\) and \(y_{E}\lessgtr 0.5\), maximum ESC value occurs for \(x_{R}^{*}\le 0.5\), whereas for \(x_{E}<0.5\) and \(y_{E}\lessgtr 0.5\), the maximum ESC occurs at \(x_{R}^{*}\ge 0.5\).

5 Conclusion

We evaluated the secrecy performance of a CVRN where a source vehicle communicates with a destination vehicle by the assistance of an AF relay vehicle in the presence of a passive eavesdropper vehicle. By considering both fixed and variable gain AF relaying protocols, we deduced the new expressions for the intercept probability and ESC of the considered system under double-Rayleigh fading channels. The analytical findings were corroborated with the help of numerical and simulation results. We have also examined the impacts of channel conditions and relay and eavesdropper locations on the secrecy performance. From a practical standpoint, our results also revealed that the fixed gain relaying can bring a comparable intercept probability and ESC performances to variable gain relaying, without requiring full CSI. Therefore, the fixed gain relaying can be an attractive option in CVRNs due to its ease in implementation and reduced complexity.