Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels

In this paper, the secrecy performance of cooperative heterogeneous networks with unreliable backhaul over Nakagami-m fading channels is investigated. To secure the proposed system, a friendly jammer is considered to confuse eavesdroppers. To transmit the signals from the source to the destination, a two-phase transmitter/relay selection scheme is proposed. The best transmitter is selected when the signal-to-noise ratio at the relays is maximized. In the second phase, the best relay is chosen when the jamming signal-to-interference-plus-noise ratio of the eavesdroppers is minimized. To investigate the system performance, closed -form expressions are derived for the secrecy outage probability, ergodic capacity and non-zero achievable secrecy rate. In order to gain an insight into the system, asymptotic analysis is also provided. The results show that the degree of cooperative transmission and backhaul reliability are key parameters in the system and these parameters determine the secrecy performance.


Introduction
Due to the increasing wireless data traffic demand, future networks will become more dense and heterogeneous.In heterogeneous networks (HetNets), macro cells and small cells will be used to increase the capacity needed for this rise in traffic demand and to offload traffic.A backhaul link will connect these small cells with the core network.The traditional backhaul is wired and can ensure the connection.However, the cost of the deployment and maintenance is high, especially when a large number of small cells is needed to cover dense scenarios.Moreover, small cells may not need such a highly reliable backhaul as traditional macro cells do [27].This is because small cells serve a lower traffic capacity than macro cells.In this way, wireless backhaul has emerged as an alternative and attractive approach due to its low cost and flexibility.However, wireless backhaul is not as reliable as its wired backhaul counterpart due to wireless channel impairments such as non-line-of-sight (nLOS) propagation and channel fading [10].
The reliability of the backhaul is an important factor in HetNets and research has been undertaken to investigate how the backhaul reliability can affect the system performance [2, 10-15, 19-22, 31].In [2], the authors considered co-channel inter-cell interference (ICI) in HetNets with unreliable backhaul and coordinated multi-point (CoMP) transmission was considered to reduce the interference.In [12-15, 22, 31], the impact of unreliable backhaul on cooperative relay systems was investigated.The outage probability of finite-sized selective relaying systems with unreliable backhaul was studied in [15].A cognitive network with unreliable backhaul was investigated in [21], and asymptotic analysis showed that performance was mainly decided by backhaul reliability.For all the research mentioned on unreliable backhaul connections, backhaul reliability is a key factor in the system performance.Therefore, in a Het-Net context it is essential for us to investigate backhaul reliability.
Another aspect that cannot be ignored is security [5].For a complete study in HetNets system, security needs to be considered.The traditional way to enhance security is deploying cryptographic techniques across upper layers.However, it consumes significant power to encrypt and decrypt data [25].In addition, with the development of quantum computing, key schemes can be broken and the key infrastructure become insecure [30].In recent years, physical layer security (PLS) has become increasingly popular to secure wireless communications [9,26,28].The main idea of PLS is that the wireless channels are random and unpredictable, thus this can be exploited to keep the information confidential from eavesdroppers.Wyner proposed that when the main channel has better propagation conditions than the eavesdroppers', the communication between legitimate users could be secure [29].However, when the wiretap channel is better, the secrecy rate can even drop to zero [7].Various PLS techniques have been investigated to tackle this problem and enhance the security of the main channel; one of the main techniques is using cooperative jamming to generate artificial noise to confuse eavesdroppers [1,4,6,7,16,17,23,32].In [6,32], the authors considered PLS and energy harvesting with a friendly jammer, and the authors in [6] also proposed joint jammer and relay selection schemes.In related work [16], a jammer is assumed to be an energy constrained node with no power of its own and can harvest power from the source node, but cooperative relaying was not considered in this work.However, all of the research above ignored the reliability of the backhaul.As discussed an unreliable wireless backhaul results in poor performance.It is essential to consider backhaul reliability when studying PLS in a small cell HetNet contexts.
Research in [13,14,22,31] has taken into account PLS in relay systems with unreliable backhaul.In [31], the authors studied PLS and energy harvesting.In [14], the authors studied PLS in full-duplex cooperative relay systems.In [13], multiple eavesdroppers that can wiretap information from relay and transmitters are considered in a finite-sized cooperative system.In [22], a friendly jammer was used to confuse eavesdroppers in single carrier systems.
Cooperative jamming in the presence of wireless backhaul over Nakagami-m fading channels has not been studied yet.In this research, we investigate the cooperative jamming in a small cells HetNet context with unreliable backhaul over Nakagami-m fading channel.In our system model, an outage occurs when the system is either not reliable or not secure, hence we assess the secrecy outage probability as a performance parameter.Our main contributions are summarized as below: -We investigate the secrecy performance of cooperative systems by exploiting cooperative relay and jamming signals in the presence of unreliable backhaul links between macro-cells and small-cells over Nakagami-m fading channels.-A two-phase transmitter/relay selection scheme is proposed.The achievable SNR at the relays is maximized by applying the best small cell transmitter selection in the first phase.The relay selection scheme is deployed in the second phase to minimize the instantaneous signal-to-interference-plus-noise ratio (SINR) at the eavesdroppers.-Analytical expressions to evaluate the secrecy outage probability, non-zero achievable secrecy rate, and ergodic capacity are derived in closed-form.The asymptotic secrecy expressions are also attained to gain full insights into the impact of backhaul reliability on the network secrecy performance in the high SNR regime.-The effect of the number of small-cell transmitters, relays, eavesdroppers and backhaul reliability on the system performance is investigated.
The remainder of the paper is organized as follows.System and channel models are described in Section 2. Derivation of the SNR distributions in the proposed system is obtained in Section 3. The closed-form expressions for outage probability, ergodic capacity and symbol error rate as well as the asymptotic analysis are carried out in Section 4, while numerical results are presented in Section 5. Finally, the paper is concluded in Section 6.
Notation: P [•] is the probability of occurrence of an event.For a random variable X, F X (•) denotes its cumulative distribution function (CDF) and f X (•) denotes the corresponding probability density function (PDF).max (•) and min (•) denote the maximum and minimum of their arguments, respectively.

System model
We consider a HetNet system with a macro base station, S, K small cells, and a destination, D, as shown in Fig. 1. S is connected to T k via wireless backhaul.We assume that there is no direct link between T k and D because of the poor channel condition.T k sends information to D with the help of R m .A single J transmits jamming signals in the system, and we assume that the jamming signals can be nulled out at D [6].E n wiretaps the information transmitted from R m .All of the nodes are equipped with single antenna and operate in half-duplex.We assume that all the channels are Nakagami-m fading, and the channel power gains are gamma distributed.The cumulative distribution function (CDF) and probability density function (PDF) of the random variable X can be written as ( 1 ) Where (•, •) is the incomplete gamma function [8,Eq. (8.352.6)].
Backhaul reliability is modeled as a Bernoulli process I k with success probability s k where P(I k * = 1) = s k and P(I k * = 0) = 1 − s k .This indicates that T k is participating in the transmission if the message is successfully delivered over its dedicated backhaul with probability s k whereas it defers its transmission with probability 1 − s k .
We assume the global channel state information (CSI) is available, which is a common assumption in PLS [22].The CSI of the eavesdroppers can be known when eavesdroppers are active in the network and their status can be monitored [3].
In the first hop, the received signals at R m are of the form where P t is the transmit power at T k and h T k R m is the channel coefficient of the link T k − R m , x is the unit power transmitted symbol and z is the complex additive white Gaussian noise (AWGN) with zero mean and variance σ , i.e., z ∼ CN(0, σ ).The path loss component corresponding to h T k R m is denoted as α k,m T , respectively.In the second hop, the received signals at D are of the form where P r is the transmit power at relays and h R m D is the channel coefficient of the link R m − D. The path loss component corresponding to h R m D is represented by α m D , respectively.
Similarly, the received signals at E are of the form where P j is the transmit power at the jammer, h R m E n is the channel coefficient of the link R m − E n and h J E n is the channel coefficient of the link J − E n .The path loss component corresponding to h R m E n and h J E n are denoted as α m,n E and α n J , respectively.We assume that the unreliable backhaul links are independent from the indices of the K transmitters, i.e., s k = s, ∀k.

SNR distributions
In this section, SNR distributions are derived firstly which are necessary for system secrecy performance analysis in the next section.
From Eq. 3, the SNR from T k and R m can be given as where α R = Similarly, according to Eqs. 4 and 5, the SNR between R m and D and the SINR between R m and E n can be obtained as where In order to achieve a high performance of the considered system, our selection scheme is to maximize the performance at the relays and destination and minimize the performance at the eavesdroppers.

Distribution of the link T k * − R m
In the first hop, each relay selects a small cell that can achieve the best performance of the link T k − R m .In this way, the best small cell is selected as Corresponding CDF of SNR T K * R m is given as The proof is given in Appendix A.

Distribution of the link R m − E n *
In the second hop, the eavesdropper is selected when the SINR between R m and E n is maximum to enhance its performance,

Distribution of the link R m * − E n *
The relay is selected when the SNR of the link R m − E n * is minimized.It can be formulated as corresponding PDF of SI NR R m * E n * can be derived according to Appendix C and corresponding CDF of SI NR R m * E n * can be obtained as

Distribution of the end-to-end SNR
The relays use decode-and-forward (DF) protocol for its high system performance.This is because the interference is lower in DF protocol compared with amplify-andforward (AF) protocol [31].In this way, the end-to-end SNR of the considered system at the destination is given by where SNR T k * R m * is the SNR from the selected small cell transmitter to the selected relay, and SNR R m * D is the SNR from the selected relay to the destination.
Corresponding CDF of the end-to-end SNR DF can be obtained as According to Eq. 15 and by applying binomial and multinomial theorems, the CDF of the end-to-end SNR obtained at D can be given as

Secrecy performance analysis
This section derives the performances of secrecy outage probability, non-zero achievable secrecy rate and ergodic capacity utilizing the SNR distributions obtained in the previous section.Towards deriving these performances, secrecy rate is required to be defined first.Secrecy capacity is equal to the difference between main channel and the wiretap channel, which is given by [31] where [x] + = max(x, 0).In addition, log 2 (1 + SNR DF ) is the instantaneous capacity obtained at D from selected relay and log 2 (1 + SNR R m * E n * ) is the instantaneous capacity of the channel from selected relay to the selected eavesdropper.

Secrecy outage probability
The secrecy outage probability is introduced to evaluate the system security and it is defined as the probability that the instantaneous secrecy capacity is less than a positive target secrecy rate θ [31], i.e., Substitute ( 15) and ( 32) into (18), and with the help of [24, Eq. (2.3.6.9)],[8, Eq. (9.211.4)], the expression for secrecy outage probability can be given as (19). where In addition, To provide full insights into the impact of unreliable backhaul connections, the asymptotic expression for the secrecy outage probability can be obtained as Eq.20. where

Probability of non-zero secrecy rate
The probability of non-zero secrecy rate is the probability that secrecy rate is more than zero, or another way SNR T k * D is higher than SI NR R m * E n * .The probability of none-zero secrecy rate can be obtained as [31 Using Eqs. 15 and 32 and with the help of [24, Eq. (2.3.6.9)].The closed-form expression for the probability of non-zero achievable secrecy rate is given as, Eq. 22.

P r(C
where To investigate the asymptotic behavior of the probability of non-zero achievable secrecy rate in high SNR regime, the asymptotic expression is given as Eq.23.

P r(C
where

Ergodic capacity
The ergodic capacity is defined as the average secrecy rate averaged over all the SNR distributions.
⎡ ⎢ ⎣ To gain the full insights of the system, the asymptotic ergodic capacity is given as Eq. 26.

Numerical results
In this section, numerical results along with simulations are shown for the analysis carried out on the proposed system.The threshold of secrecy outage probability is fixed at θ = 1 bits/s/Hz.The binary phase-shift keying (BPSK) modulation is adopted in the simulations with transmission block size S = 64 symbols.In figures, "Sim" represents the simulation results, "Ana" represents the analytical results and "Asy" represents the asymptotic analysis results.We investigate the network performance with various parameters to examine the effects of the degrees of cooperative transmission and backhaul reliability.We can observe that the number of relays and eavesdroppers strongly affects the secrecy outage probability.Specifically, when N = 1, the secrecy outage probability decreases when the number of relay increases, thus achieving a better system performance.By contrast, when M = 1, the secrecy outage probability increases when the number of eavesdropper increases.We can also observe that our results approach asymptotic results in the high SNR regime.{10, 10, 10} dB.We can observe from the figures that when K = 1, the secrecy outage probability decreases when the backhaul reliability gets higher.If the system has more reliable backhaul, it performs better.

Secrecy outage probability
In addition, when s = 0.95 and the number of small-cell transmitters increases from K = 1 to K = 3, the secrecy outage probability decreases due to the increased received signal power at D.
Figure 4 shows the effects of dense networks on secrecy outage probability versus number of relays M with K = 10, s = 0.998, {m R , m E , m J , m D } = {2, 2, 2, 3}, and {θ R , θ E , θ J , θ D } = {10, 10, 10, 10} dB.We can observe that for all N = {1, 5, 10}, secrecy outage probability decreases when there are more relays due to the cooperative communication.In addition, with the increase of N from N = 1 to N = 10, the secrecy outage probability increases.This is because the achievable capacity in the wiretap channels gets higher.capacity increases when the number of relay grows.Also, when M = 1, ergodic capacity decreases when the number of eavesdroppers increases.In addition, when K = 1, the ergodic capacity increases when the backhaul is more reliable, and when s = 0.95, the ergodic capacity increases when the number of small-cell transmitters increases.In the figure, simulation results match well with the numerical results, thus, validating the analysis presented in the paper.

Conclusions
This paper investigates the secrecy performance of cooperative heterogeneous networks with unreliable backhaul links.A two phase transmitter/relay selection scheme was proposed to maximize the SNR at the relays and minimize the SINR at the eavesdroppers.Closed-form expressions are derived and asymptotic expressions are also provided.Results show that when the number of small-cell transmitters and relays increases, the system can achieve a better performance.However, the increase of eavesdroppers can significantly degrade the system performance.Moreover, backhaul reliability is a key parameter for the improvement of secrecy performance.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http:// creativecommons.org/licenses/by/4.0/),which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Appendix A
Since all the channels follow Nakagami-m fading, and the CDF and PDF can be found in Eqs. 1 and 2. The CDF and PDF of SNR T k R m can be written as where δ(.) denotes the Dirac delta function.Since the best transmitter T k * is selected, the CDF of SNR T k * R m can be given as After some simple manipulations, we can derive (10).

Appendix B
The CDF of SI NR R m E n can be obtained as .( 29) Since the frequency selective fading channels between the relay to the eavesdroppers independent identically distributed, the CDF of the SI NR E n * is given as F SI NR RmE n * (x) = [F SI NR RmEn (x)] N .(30)

Fig. 1
Fig.1A cooperative heterogeneous network with multiple small cell transmitters, relays and a friendly jammer in the presence of eavesdroppers

Fig. 2
Fig. 2 investigates the secrecy outage probability for various M and N. The network parameters are set as K = 3, s = 0.998, {m R , m E , m J , m D } = {2, 2, 2, 3}, and {θ R , θ E , θ J } = {10, 10, 10} dB.We can observe that the number of relays and eavesdroppers strongly affects the secrecy outage probability.Specifically, when N = 1, the secrecy outage probability decreases when the number of

Figure 3 Fig. 2
Fig. 2 Secrecy outage probability for various M, N

Fig. 4
Fig. 4 Impact of the dense networks on the secrecy outage probability

Fig. 5
Fig. 5 Ergodic capacity for various M, N

Figures 5
Figures 5 and 6 depict the effect of the number of smallcell transmitters, the number of relays and eavesdroppers and backhaul reliability on the ergodic capacity.Parameters are the same in the corresponding figures of the ergodic capacity and secrecy outage probability.Effects of the degree of cooperative transmission and reliability of backhaul are complementary on ergodic secrecy rate and secrecy outage probability.When secrecy outage probability decreases, the ergodic secrecy rate would increase.We can observe in the figures that when N = 1, the ergodic

Figures 7
Figures 7 and 8 show the same performances as of secrecy outage probability and ergodic secrecy rate with the same parameters, correspondingly.The observations are similar in all the cases.In the figure, simulation results match well with the numerical results, thus, validating the analysis presented in the paper.