Dipti R. Pattanayak;Vishal Narain Saxena;Vivek K. Dwivedi;Ghanshyam Singh
{"title":"Security–Reliability Tradeoff Analysis for SWIPT-Enabled Dual-Hop Vehicular Communication System Over Double Nakagami-m Channels","authors":"Dipti R. Pattanayak;Vishal Narain Saxena;Vivek K. Dwivedi;Ghanshyam Singh","doi":"10.1109/JIOT.2024.3498873","DOIUrl":null,"url":null,"abstract":"Simultaneous wireless information and power transmission (SWIPT)-enabled vehicle-to-vehicle (V2V) systems use radio frequency (RF) signals for both information transmission and power. It reduces energy consumption, increases spectrum efficiency, and optimizes resource allocation to improve overall system performance. In this article, we investigate the physical-layer security (PLS) for a SWIPT enabled V2V cooperative communication system in which a source vehicle (S) transmits information to a destination vehicle (D) through an intermediate vehicle treated as relay node (R). During analysis, it is assumed that two independent vehicular nodes in the same road, i.e., eavesdroppers (<inline-formula> <tex-math>$E_{1}$ </tex-math></inline-formula> and <inline-formula> <tex-math>$E_{2}$ </tex-math></inline-formula>) are trying to intercept the information from different legitimate channels. The communication links are assumed to follow the double Nakagami-m (DNm) fading distribution. The study examines the security performance of the networks by calculating the secrecy outage probability (SOP), strictly positive secrecy capacity (SPSC), intercept probability (IP), and connection outage probability (COP). Next, we extend to the analysis of tradeoff between security and reliability as well as tradeoff between secrecy rate and secrecy outage which are termed as security and reliability tradeoff (SRT) and effective secrecy throughput (EST). For a comprehensive analysis, the results are produced for different values of the fading parameter <inline-formula> <tex-math>$(m)$ </tex-math></inline-formula>, power splitting factor <inline-formula> <tex-math>$(\\rho)$ </tex-math></inline-formula>, and secrecy thresholds. The results clearly indicate that an increase in m leads to an enhancement in the secrecy performance. Additionally, the results show that secrecy performance improves as <inline-formula> <tex-math>$\\rho $ </tex-math></inline-formula> decreases. Finally, the Monte-Carlo simulation results are presented to verify our proposed analytical models.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 7","pages":"8192-8205"},"PeriodicalIF":8.9000,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10756795/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Simultaneous wireless information and power transmission (SWIPT)-enabled vehicle-to-vehicle (V2V) systems use radio frequency (RF) signals for both information transmission and power. It reduces energy consumption, increases spectrum efficiency, and optimizes resource allocation to improve overall system performance. In this article, we investigate the physical-layer security (PLS) for a SWIPT enabled V2V cooperative communication system in which a source vehicle (S) transmits information to a destination vehicle (D) through an intermediate vehicle treated as relay node (R). During analysis, it is assumed that two independent vehicular nodes in the same road, i.e., eavesdroppers ($E_{1}$ and $E_{2}$ ) are trying to intercept the information from different legitimate channels. The communication links are assumed to follow the double Nakagami-m (DNm) fading distribution. The study examines the security performance of the networks by calculating the secrecy outage probability (SOP), strictly positive secrecy capacity (SPSC), intercept probability (IP), and connection outage probability (COP). Next, we extend to the analysis of tradeoff between security and reliability as well as tradeoff between secrecy rate and secrecy outage which are termed as security and reliability tradeoff (SRT) and effective secrecy throughput (EST). For a comprehensive analysis, the results are produced for different values of the fading parameter $(m)$ , power splitting factor $(\rho)$ , and secrecy thresholds. The results clearly indicate that an increase in m leads to an enhancement in the secrecy performance. Additionally, the results show that secrecy performance improves as $\rho $ decreases. Finally, the Monte-Carlo simulation results are presented to verify our proposed analytical models.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.