SlideShare a Scribd company logo
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 21, No. 2, February 2021, pp. 865~873
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i2.pp865-873  865
Journal homepage: http://ijeecs.iaescore.com
Physical layer security in DF full-duplex relaying network:
performance analysis
Phu Tran Tin1
, Tan N. Nguyen2
, Van-Duc Phan3
, Minh Tran4
1
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Ho Chi Minh City, Vietnam
2
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang
University, Ho Chi Minh City, Vietnam
3
Faculty of Automobile Technology, Van Lang University, Ho Chi Minh City, Vietnam
4
Optoelectronics Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University Ho Chi
Minh City, Vietnam
Article Info ABSTRACT
Article history:
Received Jul 15, 2020
Revised Sep 20, 2020
Accepted Oct 4, 2020
In this letter, the system performance of the DF full-duplex (FD) relaying
communication network is investigated with physical layer security (PLS). In
this system model, the source (S) and the destination (D) communicate via a
helping relay (R) in the presence of the eavesdropper (E). From the system
model, we derive the closed-form expressions for intercept probability (IP)
and secrecy outage probability (SOP). For verifying the correctness of the
analytical analysis, the Monte Carlo simulation is conducted. In addition, the
influence of the main system parameter on the system performance is
investigated. Finally, the results show that the analytical and the simulation
values agree well with each other.
Keywords:
Full-Duplex
IP
Monte carlo
Physical layer security
Relaying network This is an open access article under the CC BY-SA license.
Corresponding Author:
Van-Duc Phan
Faculty of Automobile Technology
Van Lang University
Ho Chi Minh City, Vietnam
Email: phanvanduc@vanlanguni.edu.vn
1. INTRODUCTION
In the comparison with the conventional communication network, the wireless communication
network the power supply from the nodes to nodes can be done via RF to avoid the process battery
replacement with some disadvantages, such as inconvenient, infeasible for some applications [1-10]. In the
last few years, wireless energy transfer (WET) technologies by supplying continuous and stable energy over
the air is a proposed solution for avoiding disadvantages. This method could significantly reduce the
maintenance cost and the frequency of energy outage events due to battery depletion [6-15]. Authors in [16]
investigated the outage probability and the throughput of an amplify-and-forward relaying system using
energy harvesting, and an amplify-and-forward (AF) relaying network is considered in [17], where an
energy-constrained relay node harvests energy from the received RF signal and uses that harvested energy to
forward the source information to the destination. Furthermore, authors in [18] proposed a dual-hop decode-
and-forward (DF) relaying network, where relays operate based on harvested energy from radio frequency
(RF) radiation and authors in [19] considered the generalized diversity combining of an energy-constrained
multiple antenna decode-and-forward relay network. Moreover, authors in [20] proposed and investigated
simultaneous wireless information and power transfer in two-way decode-and-forward (DF) relay networks,
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 865 - 873
866
where the relay is an energy-constrained node but is capable of harvesting energy from the radio frequency
signal transmitted by the source nodes for forwarding its information [21-26].
In this letter, the system performance of the DF full-duplex (FD) Relaying communication network
is investigated with physical layer security (PLS). In this system model, the source (S) and the destination
(D) communicate via a helping relay (R) in the presence of the eavesdropper (E). From the system model, we
derive the closed-form expressions for intercept probability (IP) and Secrecy Outage Probability (SOP). For
verifying the correctness of the analytical analysis, the Monte Carlo simulation is conducted. In addition, the
influence of the main system parameter on the system performance is investigated. Finally, the results show
that the analytical and the simulation values agree well with each other. The main contribution of the paper
can be summarized as the following:
a) The system model of the DF full-duplex (FD) Relaying communication network is investigated with
Physical layer security (PLS) is proposed.
b) The closed-form expressions for intercept probability (IP) and secrecy outage probability (SOP) are
derived.
c) The influence of the main system parameter on the system performance is investigated.
d) The Monte Carlo simulation is conducted for verifying the analytical analysis.
The rest of the manuscript can be provided as the following. The system model of the DF full-
duplex (FD) Relaying communication network is investigated with physical layer security (PLS) is drawn in
the Section 2. The IP and SOP analysis are presented in the Section 3. Then, the numerical results and some
discussions are presented in the Section 4. Finally, the Section 5 concludes this manuscript.
2. SYSTEM MODEL
In Figure 1, a source S communicates with a destination D via the help of a FD relay denoted by R
and one eavesdropper, which denoted by E want to overhear the information at the relay R [27-30]. Let us
denote SR
h
, RD
h
and RE
h
as the channel coefficients of the S R
 , R D
 and R E
 links, respectively. We
also denote RR
h
as the self-interference between the transmit antenna and the receive antenna of the relay R.
Figure 1. Pout versus the transmit power P3 with different P1 and P2 (P1, P2)
Cumulative distribution function (CDF) is given as
   
1 exp
i i
F x x
 
  
(1)
Where
 
, , ,
i SR RD RR RE

,
Here,
 
i i
d

 
(2)
where i
d
is link distance between correspondence nodes.
S
E
R
EH Link
D
IT Link
SR
h RD
h
RR
h
RE
h
Loopback Interference
Wiretap Link
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Physical layer security in DF full-duplex relaying network: performance analysis (Phu Tran Tin)
867
Then, the probability density function (PDF) of i

is expressed as,
   
exp
i i i
f x x
  
 
(3)
As shown in Figure 2, T denotes the total time interval, which is used for energy harvesting and
information transferring from S to D. In the first interval time αT (0<α<1), the relay R harvests energy from
the source. In the remaining interval (1-α)T, the source transfers the information to the destination D via the
helping relay R.
Figure 2. EH and IT phases
2.1. Energy harvesting and Information transmission phase
In this phase, the received signal at the relay can be formulated as,
R SR S RR R R
y h x h x n
  
(4)
And
 
2
S S
x P
 
,
 
2
,
R R
x P
   
 
is an expectation operator in which S
P
is average transmit
power at the source and R
P
is average transmit power at the relay.
As [28], the harvested power at the relay can be calculated as,
2
2
(1 )
S SR
h
R S SR S SR
TP h
E
P P h P
T T

  

   

(5)
Where 1




 in which 0 1

  .
The received signal at the destination can be expressed as:
D RD R D
y h x n
 
(6)
Where RD
h
is the relay to destination channel gain and D
n
is the AWGN with variance N0.
In our proposed system, we consider the decode and forward scheme as [29]. So, from (4), the
signal to noise ratio (SNR) at the relay can be formulated by,
2
2
0
S SR
R
RR R
P h
h P N
 

(7)
Substituting (5) into (7), we obtain:
2
2 2 2
0
1 1
S SR
R
RR
S RR SR RR
P h
P h h N h


 
  

(8)
From (6), the SNR at the destination can be computed as,
T
EHat R
T
 (1 )T


IT
S R D

 

 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 865 - 873
868
2 2 2
2 2
0 0
R RD S SR RD
D SR RD SR RD
P h P h h
h h
N N

    
     
(9)
Where 0
S
P
N
 
The end to end SNR can be claimed by,
 
min ,
DF R D
  

(10)
Next, the eavesdropper overhears the information of the relay. Hence, the received signal at the
eavesdropper can be expressed by,
E RE R E
y h x n
 
(11)
E successfully decodes the information from the relay with the following SNR:,
2
2 2
0
R RE
E SR RE SR RE
P h
h h
N
    
    
(12)
Here, the data rate for the data and eavesdropping links can be formulated, respectively by,
 
 
2
2
(1 ) log 1
(1 ) log 1
DF DF
E E
C
C
 
 
   
   
(13)
3. PERFORMANCE ANALYSIS
3.1. Intercept probability (IP) analysis
As [31], the IP can be defined by
 
Pr E th
IP C C
 
(14)
Where th
C
is the predetermined data rate threshold.
Substituting (13) into (14) and then combining with (12), we can obtain:
   
0
Pr 1 Pr
1 Pr 1 | ( )
SR RE
SR RE th SR RE th
th th
SR RE
RE
IP
F f d
 
       
 
    
   

      
   
      
   
 
 
 

(15)
Where
1
2 1
th
C
th

 
 
Using results from (1) and (3), (15) can be reformulated by,
   
0 0
1 1 exp exp exp exp
th SR th SR
RE RE RE RE
IP d d
   
       
   
 
 
   
 
         
 
   
 
 
   
 
 
(16)
Applying (3.324,1) of [32], we obtain:
1
2 2
th SR RE th SR RE
IP K
     
 
 
   
 
 
  (17)
Where
( )
v
K 
is the modified Bessel function of the second kind and vth
order.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Physical layer security in DF full-duplex relaying network: performance analysis (Phu Tran Tin)
869
3.2. Secrecy outage probability (SOP) analysis
The secrecy capacity can be defined as,
 
Sec
2 max 0,
e e DF E
C C C
 
(18)
So, the SOP of the system can be formulated by,
   
Sec
2 1 2
1
Pr Pr 2 Pr
1
th
C
DF
e e th DF E
E
SOP C C

   

 

      
 

  (19)
Where 1 2 1
th
C
  
and 2 2 th
C
 
In the high SNR regime, (19) can be approximated by,
 
2
Pr 2 Pr
th
C
DF
DF E
E
SOP

  

 
   
 
  (20)
Combining (8), (9), (10) and (12), (20) can be rewritten as,
2
2
0
1
Pr min ,
1
Pr min , ( )
SR
SR RD SR RE
RR
RD RE
RR
SOP
x x f x dx

      

    


 
 
 
   
 
 
 
 
 
 
 
 
    
 
 
 
 
 

(21)
The probabilyity in (21) can be written by,
   
1
1
1 2 2
0
Pr | ( )
RE
DF
DF RE RE
P x F x f d


          

      

(22)
Where
1 1
min ,
DF RD
RR
x
  

 
 
 
 
Next, we find the CDF of
1
DF

. We can express as:
   
1
1 1 1
( ) Pr Pr min , 1 Pr Pr
DF
DF RD RD
RR RR
F y y x y y x y

    
 
 
   
 
          
 
   
 
   
  (23)
The first term of (23) can be calculated by,
11
1
Pr 1 exp RR
RR
P
y y


 
   
    
   
    (24)
Next, 12
P
can be computed by,
 
12 1 Pr 1 Pr exp RD
RD RD
y y
P x y
x x

  
 
   
        
   
 
    (25)
Substituting (24), (25) into (23), we have:
( ) 1 1 exp exp 1 exp exp
DF
RR RD RD RD RR
y y y
F y
y x x x y

    
    
 
   
     
           
 
   
   
  
   
 
   
 
%
(26)
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 865 - 873
870
Substituting (26) into (22), we claim:
 
 
2
1
0 2 2
2
2 2 2
2
0 0
1 exp
( )
exp
1 exp exp
RE
RD
RR
RD
RR
RE RD RE RE RD RE
P f d
x
d d
x

 
 

 
  

           
  

 
 
  
 
 
 
 
 
 
 

 
 
 
       
 

 

 
(27)
From (27), the first integral can be easily calculated by,
 
 
1 2
2
0
exp RE
RE RD RE
RD RE
I d

     
  

   


(28)
Next, the second integral can be obtained as,
 
2 2 2
2
0
exp RR
RE RD RE
I d
x

     
  

 
   
 

 

(29)
Applying (3.324,1) of [32], we have,
 
 
2
2 1
2 2
2 2 2
2 2 RR RD RE
RR
RE
RD RE
I K
x x
   


      
 

 
 
 
  
  (30)
Then, substituting (28) and (30) into (27), we have:
 
 
2
1 1
2 2
2 2 2 2
1 2 2 RR RD RE
RE RR
RE
RD RE RD RE
P K
x x
   
 

         
 

 
   
 
   
  (31)
Finally, substituting (31) into (21), we obtain:
1/2
1
2
0
2 2
1 exp( )
RE RE SR
SR
a ab
SOP x x K dx
b b x
  


  
       
 

(32)
Where
2
2
RR
a

 


and 2 RD RE
b   
 
Using result from (26) of [33], the SOP can be claimed as,
3,0 2 2
0,3
2
1 1 1
1 | , ,
2 2 2
SR RE
RE
SR
a
SOP G a b
b b
 



 
     
  (33)
Where
1
,
,
1
,...,
|
,...,
p
m n
p q
q
a a
G z
b b
 
 
  is the Meijer G function.
4. NUMERICAL RESULTS AND DISCUSSION
The system IP and SOP versus α are investigated in Figures 3 and 4, respectively. In Figure 3, the main
system parameters are set as the following ψ= 5 dB, Cth=0.25, and η= 0.5, 0.85, 1, respectively. From Figure 3,
we can see that the system IP has a huge increase when α varies from 0 to 0.7 and the decreases significantly.
The maximum value of the system IP can be obtained with α near 0.7. Furthermore, the main system parameters
are set as Cth=0.25, ψ=10 dB, and η= 0.5, 0.85,1, respectively. As shown in Figure 4, the system SOP increase
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Physical layer security in DF full-duplex relaying network: performance analysis (Phu Tran Tin)
871
massively with rising of α from 0 to 1. In Figures 3 and 4, it can be observed that the simulation and analytical
curves are the same to verify the correctness of the analytical above section [27-36].
Figure 3. IP versus α Figure 4. SOP versus α
In addition, the effect of Cth on the system IP is illustrated in Figure 5 with the primary system
parameter as ψ=10 dB, η=1, and α=0.3, 0.5, 0.85, respectively. From the result, the system IP falls
considerably with the increase of Cth from 0 to 1 bit/s/Hz. Moreover, we considered the system SOP as the
function of η with the main system parameters as Cth=0.25, ψ=10 dB, α=0.3, 0.5, 0.85 as proposed in Figure
6. As drawn in Figure 6, the system SOP increases significantly while η rises from 0 to 1. As shown in
Figures 5 and 6, the simulation curve agrees well with the analytical curve to convince the correctness of the
analytical section.
Figure 5. IP versus Cth Figure 6. SOP versus η
Finally, the system IP and SOP versus ψ are presented in Figures. 7 and 8, respectively. In Figures 7
and 8, we set η=1, α=0.3, Cth= 0.24, 0.5 and 1. As shown in Figures 7 and 8, the system Ip and SOP has a
massive increase while ψ rises from -10 dB to 20 dB. From the research results, we can see that the analytical
are the same with the simulation values.
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 865 - 873
872
Figure 7. IP versus ψ Figure 8. SOP versus ψ
5. CONCLUSION
In this letter, the system performance of the DF FD Relaying communication network is
investigated with PLS. From the system model, we derive the closed-form expressions for IP and SOP. For
verifying the correctness of the analytical analysis, the Monte Carlo simulation is conducted. Moreover, the
influence of the main system parameter on the system performance is investigated. Finally, the results show
that the analytical and the simulation values agree well with each other.
REFERENCES
[1] Wong, K. Daniel. "Fundamentals of Wireless Communication Engineering Technologies." 12, 2011.
doi:10.1002/9781118121115.
[2] Bi, S., Ho, C. K., & Zhang, R. “Wireless powered communication: Opportunities and challenges”. IEEE
Communications Magazine, vol. 53, no. 4, pp. 117-125, 2015. doi:10.1109/mcom.2015.7081084
[3] Niyato, D., Kim, D. I., Maso, M., & Han, Z. “Wireless Powered Communication Networks: Research Directions
and Technological Approaches”. IEEE Wireless Communications, pp. 2-11, 2017. doi:10.1109/mwc.2017.1600116
[4] Yu, H., Lee, H., & Jeon, H. “What is 5G? Emerging 5G Mobile Services and Network Requirements”.
Sustainability, vol. 9, no. 10, p. 1848, 2017. doi:10.3390/su9101848.
[5] Zhou, Xun, Rui Zhang, and Chin Keong Ho. "Wireless Information and Power Transfer: Architecture Design and
Rate-Energy Tradeoff." IEEE Transactions on Communications, vol. 61, no. 11, pp. 4754-767, 2017.
doi:10.1109/tcomm.2013.13.120855.
[6] Bi, Suzhi, Chin Keong Ho, and Rui Zhang. "Recent Advances in Joint Wireless Energy and Information Transfer."
2014 IEEE Information Theory Workshop (ITW 2014), 11 2014. doi:10.1109/itw.2014.6970850.
[7] Kawabata, Hiroki, and Koji Ishibashi. "RF Energy Powered Feedback-aided Cooperation." 2014 IEEE 25th Annual
International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC), 09 2014.
doi:10.1109/pimrc.2014.7136211.
[8] Huang, Kaibin, and Vincent K. N. Lau. "Enabling Wireless Power Transfer in Cellular Networks: Architecture,
Modeling and Deployment." IEEE Transactions on Wireless Communications, vol. 13, no. 2, pp. 902-12, 2014.
doi:10.1109/twc.2013.122313.130727.
[9] Medepally, Bhargav, and Neelesh B. Mehta. "Voluntary Energy Harvesting Relays and Selection in Cooperative
Wireless Networks." IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3543-553, 2014.
doi:10.1109/twc.2010.091510.100447.
[10] Zhou, Xun, Rui Zhang, and Chin Keong Ho. "Wireless Information and Power Transfer: Architecture Design and
Rate-energy Tradeoff." 2012 IEEE Global Communications Conference (GLOBECOM), 12 2012.
doi:10.1109/glocom.2012.6503739.
[11] Song, Changick, Cong Ling, Jaehyun Park, and Bruno Clerckx. "MIMO Broadcasting for Simultaneous Wireless
Information and Power Transfer: Weighted MMSE Approaches." 2014 IEEE Globecom Workshops (GC Wkshps),
12 2014. doi:10.1109/glocomw.2014.7063588.
[12] Varshney, Lav R. "Transporting Information and Energy Simultaneously." 2008 IEEE International Symposium on
Information Theory, 07 2008. doi:10.1109/isit.2008.4595260.
[13] Salari, Soheil, Il-Min Kim, Dong In Kim, and Francois Chan. "Joint EH Time Allocation and Distributed
Beamforming in Interference-Limited Two-Way Networks With EH-Based Relays." IEEE Transactions on
Wireless Communications, vol. 16, no. 10, pp. 6395-408, 10 2017. doi:10.1109/twc.2017.2723466.
[14] Liu, Liang, Rui Zhang, and Kee-Chaing Chua. "Wireless Information and Power Transfer: A Dynamic Power
Splitting Approach." IEEE Transactions on Communications, vol. 61, no. 9, pp. 3990-4001, 09 2013.
doi:10.1109/tcomm.2013.071813.130105.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Physical layer security in DF full-duplex relaying network: performance analysis (Phu Tran Tin)
873
[15] Jameel, Furqan, Shurjeel Wyne, and Zhiguo Ding. "Secure Communications in Three-Step Two-Way Energy
Harvesting DF Relaying." IEEE Communications Letters, vol. 22, no. 2, pp. 308-11, 2018.
doi:10.1109/lcomm.2017.2772244.
[16] Chen, Yunfei. "Energy-Harvesting AF Relaying in the Presence of Interference and Nakagami-m Fading." IEEE
Transactions on Wireless Communications, vol. 15, no. 2, pp. 1008-017, 2016. doi:10.1109/twc.2015.2481393.
[17] Nasir, Ali A., Xiangyun Zhou, Salman Durrani, and Rodney A. Kennedy. "Relaying Protocols for Wireless Energy
Harvesting and Information Processing." IEEE Transactions on Wireless Communications, vol. 12, no. 7, pp. 3622-
636, 2013. doi:10.1109/twc.2013.062413.122042.
[18] Do, Nhu Tri, Vo Nguyen Quoc Bao, and Beongku An. "A Relay Selection Protocol for Wireless Energy Harvesting
Relay Networks." 2015 International Conference on Advanced Technologies for Communications (ATC), 2015.
doi:10.1109/atc.2015.7388327.
[19] Nguyen, Sang Quang, and Hyung Yun Kong. "Generalized Diversity Combining of Energy Harvesting Multiple
Antenna Relay Networks: Outage and Throughput Performance Analysis." Annals of Telecommunications, vol. 71,
no. 5-6, pp. 265-77, 04, 2016. doi:10.1007/s12243-016-0508-9.
[20] Peng, Chunling, Fangwei Li, and Huaping Liu. "Optimal Power Splitting in Two-Way Decode-and-Forward Relay
Networks." IEEE Communications Letters, vol. 21, no. 9, pp. 2009-012, 2017. doi:10.1109/lcomm.2017.2671363.
[21] Liu, R.; Maric, I.; Spasojevic, P.; Yates, R.D. “Discrete Memoryless Interference and Broadcast Channels with
Confidential Messages: Secrecy Rate Regions”. IEEE Trans. Inf. Theory, vol. 54, pp. 2493-2507, 2008.
doi:10.1109/tit.2008.921879.
[22] Gopala, P.K.; Lai, L.; El Gamal, H. “On the Secrecy Capacity of Fading Channels”. IEEE Trans. Inf. Theory, vol.
54, pp. 4687-4698, 2008. doi:10.1109/TIT.2008.928990
[23] Zhang, J.; Duong, T.Q.; Woods, R.; Marshall, A. “Securing Wireless Communications of the Internet of Things
from the Physical Layer, An Overview”. Entropy, vol. 19, p. 420, 2017. doi:10.3390/e19080420.
[24] Sun, L.; Qinghe, D. “A Review of Physical Layer Security Techniques for Internet of Things: Challenges and
Solutions”. Entropy, vol. 20, p. 730, 2018. doi:10.3390/e20100730.
[25] Sun, L.; Qinghe, D. “Physical Layer Security with Its Applications in 5G Networks: A Review”. China Commun,
vol. 14, pp. 1-14, 2017. doi:10.1109/cc.2017.8246328.
[26] Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. “Safeguarding 5G Wireless Communication
Networks Using Physical Layer Security”. IEEE Commun. Mag, vol. 53, pp. 20-27, 2015.
doi:10.1109/mcom.2015.7081071.
[27] Bhatnagar, M. R. "On the Capacity of Decode-and-Forward Relaying over Rician Fading Channels." IEEE
Communications Letters, vol. 17, no. 6, pp. 1100-103, 06 2013. doi:10.1109/lcomm.2013.050313.122813.
[28] Tan N. Nguyen, T.H.Q.Minh, Phuong T. Tran and Miroslav Voznak. “Energy Harvesting over Rician Fading
Channel: A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments”.
Sensors, vol. 18, 2018.
[29] Tan N. Nguyen, T.H.Q.Minh, Phuong T. Tran and Miroslav Voznak. “Adaptive Energy Harvesting Relaying
Protocol for Two-Way Half Duplex System Network over Rician Fading Channel”. Wireless Communications and
Mobile Computing, 2018.
[30] Nguyen, T. N., T. T. Duy, G.-T. Luu, P. T. Tran, and M. Voznak. "Energy Harvesting-based Spectrum Access with
Incremental Cooperation, Relay Selection and Hardware Noises." Radio engineering, vol. 26, no. 1, pp. 240-50, 04,
2017. doi:10.13164/re.2017.0240.
[31] Ngo Hoang An, Minh Tran, Tan N. Nguyen and Duy-Hung Ha, "Physical Layer Security in Hybrid TPSR Two-
Way Half-Duplex Relaying Network over Rayleigh Fading Channel: Outage and Intercept Probability Analysis",
Electronics, vol. 9, no. 3, Art, p. 428, 2020.
[32] “Table of Integrals, Series, and Products”, 2015. doi:10.1016/c2010-0-64839-5
[33] Phu Tran Tin, Bach Dinh Hoang, Tan N. Nguyen, Duy Hung Ha and Tran Thanh Trang, "Power Beacon-Assisted
Energy Harvesting Wireless Physical Layer Cooperative Relaying Networks: Performance Analysis", Symmetry,
vol. 12, no. 1, Art, p. 106, 2020.
[34] Tan N. Nguyen, T.H.Q.Minh, Duy-Hung Ha, Thanh-Long Nguyen and Miroslav Voznak, "Energy harvesting based
two-way full-duplex relaying network over Rician fading environment: performance analysis", Proceedings of the
Estonian Academy of Sciences, vol. 68, no. 1, pp. 111-123, 2019.
[35] Tan N. Nguyen, Minh Tran, Duy-Hung Ha, Tran Thanh Trang and Miroslav Voznak, "Multi-Source in DF
Cooperative Networks With PSR protocol Based Full-Duplex Energy Harvesting Over Rayleigh Fading Channel:
Performance Analysis", Proceedings of the Estonian Academy of Sciences, vol. 68, no. 3, pp. 264-275, 2019.
[36] Tan N. Nguyen, Miroslav Voznak, Tran Hoang Quang Minh, Phuong T. Tran, Phu Tran Tin, Thanh-Long Nguyen.
"Outage Probability Analysis of Power Splitting PowerBeacon Assisted Energy Harvesting Relay Wireless
Communication Networks", 2018 IEEE/ACM 22nd International Symposium on Distributed Simulation and Real
Time Applications (DS-RT), 2018.

More Related Content

PDF
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
PDF
Hybrid protocol for wireless EH network over weibull fading channel: performa...
PDF
Physical security with power beacon assisted in half-duplex relaying networks...
PDF
Physical security layer with friendly jammer in half-duplex relaying networks...
PDF
Outage performance of underlay cognitive radio networks over mix fading envir...
PDF
Performance analysis for power-splitting energy harvesting based two-way full...
PDF
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
PDF
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid protocol for wireless EH network over weibull fading channel: performa...
Physical security with power beacon assisted in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
Outage performance of underlay cognitive radio networks over mix fading envir...
Performance analysis for power-splitting energy harvesting based two-way full...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...

Similar to Physical layer security in DF full-duplex relaying network: performance analysis (20)

PDF
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
PDF
Adaptive relaying protocol for wireless energy harvesting and information pro...
PDF
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
PDF
Security performance analysis for power domain NOMA employing in cognitive ra...
PDF
Intercept probability analysis in DF time switching full-duplex relaying netw...
PDF
Performance enhancement of wireless sensor network by using non-orthogonal mu...
PDF
Investigation on energy harvesting enabled device-to-device networks in prese...
PDF
Performance Analysis of Differential Beamforming in Decentralized Networks
PDF
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
PDF
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
PDF
Outage performance analysis of non-orthogonal multiple access systems with RF...
PDF
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
PDF
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
PDF
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
PDF
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
PDF
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
PDF
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
PDF
Channel Estimation Scheme for the Enhanced Reliability in the Flying Ad-hoc N...
PDF
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
PDF
Secured binary codes generation for computer network communication
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Adaptive relaying protocol for wireless energy harvesting and information pro...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Security performance analysis for power domain NOMA employing in cognitive ra...
Intercept probability analysis in DF time switching full-duplex relaying netw...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Investigation on energy harvesting enabled device-to-device networks in prese...
Performance Analysis of Differential Beamforming in Decentralized Networks
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Outage performance analysis of non-orthogonal multiple access systems with RF...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
Channel Estimation Scheme for the Enhanced Reliability in the Flying Ad-hoc N...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Secured binary codes generation for computer network communication
Ad

More from nooriasukmaningtyas (20)

PDF
Analysis of active islanding detection techniques for gridconnected inverters...
PDF
Influence of non-sinusoidal power supply on the performance of a single-phase...
PDF
Cellular automata model for emergent properties of pressure flow in single ne...
PDF
Load shifting impact on generating adequacy assessment during peak period
PDF
Performance comparison and impact of weather conditions on different photovol...
PDF
Emergency congestion management of power systems by static synchronous series...
PDF
Analysis and comparison of a proposed mutation operator and its effects on th...
PDF
Social cyber-criminal, towards automatic real time recognition of malicious p...
PDF
Music genres classification by deep learning
PDF
Predicting students' learning styles using regression techniques
PDF
Soft computing techniques for early diabetes prediction
PDF
Different analytical frameworks and bigdata model for Internet of Things
PDF
Network intrusion detection system: machine learning approach
PDF
An unsupervised generative adversarial network based-host intrusion detection...
PDF
Crime prediction using a hybrid sentiment analysis approach based on the bidi...
PDF
Hybrid dynamic chunk ensemble model for multi-class data streams
PDF
Chaotic elliptic map for speech encryption
PDF
Efficient processing of continuous spatial-textual queries over geo-textual d...
PDF
Modular reduction with step-by-step using of several bits of the reducible nu...
PDF
An efficient and robust parallel scheduler for bioinformatics applications in...
Analysis of active islanding detection techniques for gridconnected inverters...
Influence of non-sinusoidal power supply on the performance of a single-phase...
Cellular automata model for emergent properties of pressure flow in single ne...
Load shifting impact on generating adequacy assessment during peak period
Performance comparison and impact of weather conditions on different photovol...
Emergency congestion management of power systems by static synchronous series...
Analysis and comparison of a proposed mutation operator and its effects on th...
Social cyber-criminal, towards automatic real time recognition of malicious p...
Music genres classification by deep learning
Predicting students' learning styles using regression techniques
Soft computing techniques for early diabetes prediction
Different analytical frameworks and bigdata model for Internet of Things
Network intrusion detection system: machine learning approach
An unsupervised generative adversarial network based-host intrusion detection...
Crime prediction using a hybrid sentiment analysis approach based on the bidi...
Hybrid dynamic chunk ensemble model for multi-class data streams
Chaotic elliptic map for speech encryption
Efficient processing of continuous spatial-textual queries over geo-textual d...
Modular reduction with step-by-step using of several bits of the reducible nu...
An efficient and robust parallel scheduler for bioinformatics applications in...
Ad

Recently uploaded (20)

PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
web development for engineering and engineering
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Digital Logic Computer Design lecture notes
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Well-logging-methods_new................
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Construction Project Organization Group 2.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
web development for engineering and engineering
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
OOP with Java - Java Introduction (Basics)
Digital Logic Computer Design lecture notes
CH1 Production IntroductoryConcepts.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Well-logging-methods_new................
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Construction Project Organization Group 2.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx

Physical layer security in DF full-duplex relaying network: performance analysis

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 2, February 2021, pp. 865~873 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i2.pp865-873  865 Journal homepage: http://ijeecs.iaescore.com Physical layer security in DF full-duplex relaying network: performance analysis Phu Tran Tin1 , Tan N. Nguyen2 , Van-Duc Phan3 , Minh Tran4 1 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Ho Chi Minh City, Vietnam 2 Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam 3 Faculty of Automobile Technology, Van Lang University, Ho Chi Minh City, Vietnam 4 Optoelectronics Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University Ho Chi Minh City, Vietnam Article Info ABSTRACT Article history: Received Jul 15, 2020 Revised Sep 20, 2020 Accepted Oct 4, 2020 In this letter, the system performance of the DF full-duplex (FD) relaying communication network is investigated with physical layer security (PLS). In this system model, the source (S) and the destination (D) communicate via a helping relay (R) in the presence of the eavesdropper (E). From the system model, we derive the closed-form expressions for intercept probability (IP) and secrecy outage probability (SOP). For verifying the correctness of the analytical analysis, the Monte Carlo simulation is conducted. In addition, the influence of the main system parameter on the system performance is investigated. Finally, the results show that the analytical and the simulation values agree well with each other. Keywords: Full-Duplex IP Monte carlo Physical layer security Relaying network This is an open access article under the CC BY-SA license. Corresponding Author: Van-Duc Phan Faculty of Automobile Technology Van Lang University Ho Chi Minh City, Vietnam Email: phanvanduc@vanlanguni.edu.vn 1. INTRODUCTION In the comparison with the conventional communication network, the wireless communication network the power supply from the nodes to nodes can be done via RF to avoid the process battery replacement with some disadvantages, such as inconvenient, infeasible for some applications [1-10]. In the last few years, wireless energy transfer (WET) technologies by supplying continuous and stable energy over the air is a proposed solution for avoiding disadvantages. This method could significantly reduce the maintenance cost and the frequency of energy outage events due to battery depletion [6-15]. Authors in [16] investigated the outage probability and the throughput of an amplify-and-forward relaying system using energy harvesting, and an amplify-and-forward (AF) relaying network is considered in [17], where an energy-constrained relay node harvests energy from the received RF signal and uses that harvested energy to forward the source information to the destination. Furthermore, authors in [18] proposed a dual-hop decode- and-forward (DF) relaying network, where relays operate based on harvested energy from radio frequency (RF) radiation and authors in [19] considered the generalized diversity combining of an energy-constrained multiple antenna decode-and-forward relay network. Moreover, authors in [20] proposed and investigated simultaneous wireless information and power transfer in two-way decode-and-forward (DF) relay networks,
  • 2.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 865 - 873 866 where the relay is an energy-constrained node but is capable of harvesting energy from the radio frequency signal transmitted by the source nodes for forwarding its information [21-26]. In this letter, the system performance of the DF full-duplex (FD) Relaying communication network is investigated with physical layer security (PLS). In this system model, the source (S) and the destination (D) communicate via a helping relay (R) in the presence of the eavesdropper (E). From the system model, we derive the closed-form expressions for intercept probability (IP) and Secrecy Outage Probability (SOP). For verifying the correctness of the analytical analysis, the Monte Carlo simulation is conducted. In addition, the influence of the main system parameter on the system performance is investigated. Finally, the results show that the analytical and the simulation values agree well with each other. The main contribution of the paper can be summarized as the following: a) The system model of the DF full-duplex (FD) Relaying communication network is investigated with Physical layer security (PLS) is proposed. b) The closed-form expressions for intercept probability (IP) and secrecy outage probability (SOP) are derived. c) The influence of the main system parameter on the system performance is investigated. d) The Monte Carlo simulation is conducted for verifying the analytical analysis. The rest of the manuscript can be provided as the following. The system model of the DF full- duplex (FD) Relaying communication network is investigated with physical layer security (PLS) is drawn in the Section 2. The IP and SOP analysis are presented in the Section 3. Then, the numerical results and some discussions are presented in the Section 4. Finally, the Section 5 concludes this manuscript. 2. SYSTEM MODEL In Figure 1, a source S communicates with a destination D via the help of a FD relay denoted by R and one eavesdropper, which denoted by E want to overhear the information at the relay R [27-30]. Let us denote SR h , RD h and RE h as the channel coefficients of the S R  , R D  and R E  links, respectively. We also denote RR h as the self-interference between the transmit antenna and the receive antenna of the relay R. Figure 1. Pout versus the transmit power P3 with different P1 and P2 (P1, P2) Cumulative distribution function (CDF) is given as     1 exp i i F x x      (1) Where   , , , i SR RD RR RE  , Here,   i i d    (2) where i d is link distance between correspondence nodes. S E R EH Link D IT Link SR h RD h RR h RE h Loopback Interference Wiretap Link
  • 3. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Physical layer security in DF full-duplex relaying network: performance analysis (Phu Tran Tin) 867 Then, the probability density function (PDF) of i  is expressed as,     exp i i i f x x      (3) As shown in Figure 2, T denotes the total time interval, which is used for energy harvesting and information transferring from S to D. In the first interval time αT (0<α<1), the relay R harvests energy from the source. In the remaining interval (1-α)T, the source transfers the information to the destination D via the helping relay R. Figure 2. EH and IT phases 2.1. Energy harvesting and Information transmission phase In this phase, the received signal at the relay can be formulated as, R SR S RR R R y h x h x n    (4) And   2 S S x P   ,   2 , R R x P       is an expectation operator in which S P is average transmit power at the source and R P is average transmit power at the relay. As [28], the harvested power at the relay can be calculated as, 2 2 (1 ) S SR h R S SR S SR TP h E P P h P T T           (5) Where 1      in which 0 1    . The received signal at the destination can be expressed as: D RD R D y h x n   (6) Where RD h is the relay to destination channel gain and D n is the AWGN with variance N0. In our proposed system, we consider the decode and forward scheme as [29]. So, from (4), the signal to noise ratio (SNR) at the relay can be formulated by, 2 2 0 S SR R RR R P h h P N    (7) Substituting (5) into (7), we obtain: 2 2 2 2 0 1 1 S SR R RR S RR SR RR P h P h h N h         (8) From (6), the SNR at the destination can be computed as, T EHat R T  (1 )T   IT S R D    
  • 4.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 865 - 873 868 2 2 2 2 2 0 0 R RD S SR RD D SR RD SR RD P h P h h h h N N             (9) Where 0 S P N   The end to end SNR can be claimed by,   min , DF R D     (10) Next, the eavesdropper overhears the information of the relay. Hence, the received signal at the eavesdropper can be expressed by, E RE R E y h x n   (11) E successfully decodes the information from the relay with the following SNR:, 2 2 2 0 R RE E SR RE SR RE P h h h N           (12) Here, the data rate for the data and eavesdropping links can be formulated, respectively by,     2 2 (1 ) log 1 (1 ) log 1 DF DF E E C C             (13) 3. PERFORMANCE ANALYSIS 3.1. Intercept probability (IP) analysis As [31], the IP can be defined by   Pr E th IP C C   (14) Where th C is the predetermined data rate threshold. Substituting (13) into (14) and then combining with (12), we can obtain:     0 Pr 1 Pr 1 Pr 1 | ( ) SR RE SR RE th SR RE th th th SR RE RE IP F f d                                                    (15) Where 1 2 1 th C th      Using results from (1) and (3), (15) can be reformulated by,     0 0 1 1 exp exp exp exp th SR th SR RE RE RE RE IP d d                                                       (16) Applying (3.324,1) of [32], we obtain: 1 2 2 th SR RE th SR RE IP K                     (17) Where ( ) v K  is the modified Bessel function of the second kind and vth order.
  • 5. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Physical layer security in DF full-duplex relaying network: performance analysis (Phu Tran Tin) 869 3.2. Secrecy outage probability (SOP) analysis The secrecy capacity can be defined as,   Sec 2 max 0, e e DF E C C C   (18) So, the SOP of the system can be formulated by,     Sec 2 1 2 1 Pr Pr 2 Pr 1 th C DF e e th DF E E SOP C C                      (19) Where 1 2 1 th C    and 2 2 th C   In the high SNR regime, (19) can be approximated by,   2 Pr 2 Pr th C DF DF E E SOP                (20) Combining (8), (9), (10) and (12), (20) can be rewritten as, 2 2 0 1 Pr min , 1 Pr min , ( ) SR SR RD SR RE RR RD RE RR SOP x x f x dx                                                           (21) The probabilyity in (21) can be written by,     1 1 1 2 2 0 Pr | ( ) RE DF DF RE RE P x F x f d                       (22) Where 1 1 min , DF RD RR x             Next, we find the CDF of 1 DF  . We can express as:     1 1 1 1 ( ) Pr Pr min , 1 Pr Pr DF DF RD RD RR RR F y y x y y x y                                          (23) The first term of (23) can be calculated by, 11 1 Pr 1 exp RR RR P y y                      (24) Next, 12 P can be computed by,   12 1 Pr 1 Pr exp RD RD RD y y P x y x x                              (25) Substituting (24), (25) into (23), we have: ( ) 1 1 exp exp 1 exp exp DF RR RD RD RD RR y y y F y y x x x y                                                             % (26)
  • 6.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 865 - 873 870 Substituting (26) into (22), we claim:     2 1 0 2 2 2 2 2 2 2 0 0 1 exp ( ) exp 1 exp exp RE RD RR RD RR RE RD RE RE RD RE P f d x d d x                                                                         (27) From (27), the first integral can be easily calculated by,     1 2 2 0 exp RE RE RD RE RD RE I d                  (28) Next, the second integral can be obtained as,   2 2 2 2 0 exp RR RE RD RE I d x                        (29) Applying (3.324,1) of [32], we have,     2 2 1 2 2 2 2 2 2 2 RR RD RE RR RE RD RE I K x x                            (30) Then, substituting (28) and (30) into (27), we have:     2 1 1 2 2 2 2 2 2 1 2 2 RR RD RE RE RR RE RD RE RD RE P K x x                                   (31) Finally, substituting (31) into (21), we obtain: 1/2 1 2 0 2 2 1 exp( ) RE RE SR SR a ab SOP x x K dx b b x                    (32) Where 2 2 RR a      and 2 RD RE b      Using result from (26) of [33], the SOP can be claimed as, 3,0 2 2 0,3 2 1 1 1 1 | , , 2 2 2 SR RE RE SR a SOP G a b b b                (33) Where 1 , , 1 ,..., | ,..., p m n p q q a a G z b b       is the Meijer G function. 4. NUMERICAL RESULTS AND DISCUSSION The system IP and SOP versus α are investigated in Figures 3 and 4, respectively. In Figure 3, the main system parameters are set as the following ψ= 5 dB, Cth=0.25, and η= 0.5, 0.85, 1, respectively. From Figure 3, we can see that the system IP has a huge increase when α varies from 0 to 0.7 and the decreases significantly. The maximum value of the system IP can be obtained with α near 0.7. Furthermore, the main system parameters are set as Cth=0.25, ψ=10 dB, and η= 0.5, 0.85,1, respectively. As shown in Figure 4, the system SOP increase
  • 7. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Physical layer security in DF full-duplex relaying network: performance analysis (Phu Tran Tin) 871 massively with rising of α from 0 to 1. In Figures 3 and 4, it can be observed that the simulation and analytical curves are the same to verify the correctness of the analytical above section [27-36]. Figure 3. IP versus α Figure 4. SOP versus α In addition, the effect of Cth on the system IP is illustrated in Figure 5 with the primary system parameter as ψ=10 dB, η=1, and α=0.3, 0.5, 0.85, respectively. From the result, the system IP falls considerably with the increase of Cth from 0 to 1 bit/s/Hz. Moreover, we considered the system SOP as the function of η with the main system parameters as Cth=0.25, ψ=10 dB, α=0.3, 0.5, 0.85 as proposed in Figure 6. As drawn in Figure 6, the system SOP increases significantly while η rises from 0 to 1. As shown in Figures 5 and 6, the simulation curve agrees well with the analytical curve to convince the correctness of the analytical section. Figure 5. IP versus Cth Figure 6. SOP versus η Finally, the system IP and SOP versus ψ are presented in Figures. 7 and 8, respectively. In Figures 7 and 8, we set η=1, α=0.3, Cth= 0.24, 0.5 and 1. As shown in Figures 7 and 8, the system Ip and SOP has a massive increase while ψ rises from -10 dB to 20 dB. From the research results, we can see that the analytical are the same with the simulation values.
  • 8.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 865 - 873 872 Figure 7. IP versus ψ Figure 8. SOP versus ψ 5. CONCLUSION In this letter, the system performance of the DF FD Relaying communication network is investigated with PLS. From the system model, we derive the closed-form expressions for IP and SOP. For verifying the correctness of the analytical analysis, the Monte Carlo simulation is conducted. Moreover, the influence of the main system parameter on the system performance is investigated. Finally, the results show that the analytical and the simulation values agree well with each other. REFERENCES [1] Wong, K. Daniel. "Fundamentals of Wireless Communication Engineering Technologies." 12, 2011. doi:10.1002/9781118121115. [2] Bi, S., Ho, C. K., & Zhang, R. “Wireless powered communication: Opportunities and challenges”. IEEE Communications Magazine, vol. 53, no. 4, pp. 117-125, 2015. doi:10.1109/mcom.2015.7081084 [3] Niyato, D., Kim, D. I., Maso, M., & Han, Z. “Wireless Powered Communication Networks: Research Directions and Technological Approaches”. IEEE Wireless Communications, pp. 2-11, 2017. doi:10.1109/mwc.2017.1600116 [4] Yu, H., Lee, H., & Jeon, H. “What is 5G? Emerging 5G Mobile Services and Network Requirements”. Sustainability, vol. 9, no. 10, p. 1848, 2017. doi:10.3390/su9101848. [5] Zhou, Xun, Rui Zhang, and Chin Keong Ho. "Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff." IEEE Transactions on Communications, vol. 61, no. 11, pp. 4754-767, 2017. doi:10.1109/tcomm.2013.13.120855. [6] Bi, Suzhi, Chin Keong Ho, and Rui Zhang. "Recent Advances in Joint Wireless Energy and Information Transfer." 2014 IEEE Information Theory Workshop (ITW 2014), 11 2014. doi:10.1109/itw.2014.6970850. [7] Kawabata, Hiroki, and Koji Ishibashi. "RF Energy Powered Feedback-aided Cooperation." 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC), 09 2014. doi:10.1109/pimrc.2014.7136211. [8] Huang, Kaibin, and Vincent K. N. Lau. "Enabling Wireless Power Transfer in Cellular Networks: Architecture, Modeling and Deployment." IEEE Transactions on Wireless Communications, vol. 13, no. 2, pp. 902-12, 2014. doi:10.1109/twc.2013.122313.130727. [9] Medepally, Bhargav, and Neelesh B. Mehta. "Voluntary Energy Harvesting Relays and Selection in Cooperative Wireless Networks." IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3543-553, 2014. doi:10.1109/twc.2010.091510.100447. [10] Zhou, Xun, Rui Zhang, and Chin Keong Ho. "Wireless Information and Power Transfer: Architecture Design and Rate-energy Tradeoff." 2012 IEEE Global Communications Conference (GLOBECOM), 12 2012. doi:10.1109/glocom.2012.6503739. [11] Song, Changick, Cong Ling, Jaehyun Park, and Bruno Clerckx. "MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer: Weighted MMSE Approaches." 2014 IEEE Globecom Workshops (GC Wkshps), 12 2014. doi:10.1109/glocomw.2014.7063588. [12] Varshney, Lav R. "Transporting Information and Energy Simultaneously." 2008 IEEE International Symposium on Information Theory, 07 2008. doi:10.1109/isit.2008.4595260. [13] Salari, Soheil, Il-Min Kim, Dong In Kim, and Francois Chan. "Joint EH Time Allocation and Distributed Beamforming in Interference-Limited Two-Way Networks With EH-Based Relays." IEEE Transactions on Wireless Communications, vol. 16, no. 10, pp. 6395-408, 10 2017. doi:10.1109/twc.2017.2723466. [14] Liu, Liang, Rui Zhang, and Kee-Chaing Chua. "Wireless Information and Power Transfer: A Dynamic Power Splitting Approach." IEEE Transactions on Communications, vol. 61, no. 9, pp. 3990-4001, 09 2013. doi:10.1109/tcomm.2013.071813.130105.
  • 9. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Physical layer security in DF full-duplex relaying network: performance analysis (Phu Tran Tin) 873 [15] Jameel, Furqan, Shurjeel Wyne, and Zhiguo Ding. "Secure Communications in Three-Step Two-Way Energy Harvesting DF Relaying." IEEE Communications Letters, vol. 22, no. 2, pp. 308-11, 2018. doi:10.1109/lcomm.2017.2772244. [16] Chen, Yunfei. "Energy-Harvesting AF Relaying in the Presence of Interference and Nakagami-m Fading." IEEE Transactions on Wireless Communications, vol. 15, no. 2, pp. 1008-017, 2016. doi:10.1109/twc.2015.2481393. [17] Nasir, Ali A., Xiangyun Zhou, Salman Durrani, and Rodney A. Kennedy. "Relaying Protocols for Wireless Energy Harvesting and Information Processing." IEEE Transactions on Wireless Communications, vol. 12, no. 7, pp. 3622- 636, 2013. doi:10.1109/twc.2013.062413.122042. [18] Do, Nhu Tri, Vo Nguyen Quoc Bao, and Beongku An. "A Relay Selection Protocol for Wireless Energy Harvesting Relay Networks." 2015 International Conference on Advanced Technologies for Communications (ATC), 2015. doi:10.1109/atc.2015.7388327. [19] Nguyen, Sang Quang, and Hyung Yun Kong. "Generalized Diversity Combining of Energy Harvesting Multiple Antenna Relay Networks: Outage and Throughput Performance Analysis." Annals of Telecommunications, vol. 71, no. 5-6, pp. 265-77, 04, 2016. doi:10.1007/s12243-016-0508-9. [20] Peng, Chunling, Fangwei Li, and Huaping Liu. "Optimal Power Splitting in Two-Way Decode-and-Forward Relay Networks." IEEE Communications Letters, vol. 21, no. 9, pp. 2009-012, 2017. doi:10.1109/lcomm.2017.2671363. [21] Liu, R.; Maric, I.; Spasojevic, P.; Yates, R.D. “Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions”. IEEE Trans. Inf. Theory, vol. 54, pp. 2493-2507, 2008. doi:10.1109/tit.2008.921879. [22] Gopala, P.K.; Lai, L.; El Gamal, H. “On the Secrecy Capacity of Fading Channels”. IEEE Trans. Inf. Theory, vol. 54, pp. 4687-4698, 2008. doi:10.1109/TIT.2008.928990 [23] Zhang, J.; Duong, T.Q.; Woods, R.; Marshall, A. “Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview”. Entropy, vol. 19, p. 420, 2017. doi:10.3390/e19080420. [24] Sun, L.; Qinghe, D. “A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions”. Entropy, vol. 20, p. 730, 2018. doi:10.3390/e20100730. [25] Sun, L.; Qinghe, D. “Physical Layer Security with Its Applications in 5G Networks: A Review”. China Commun, vol. 14, pp. 1-14, 2017. doi:10.1109/cc.2017.8246328. [26] Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. “Safeguarding 5G Wireless Communication Networks Using Physical Layer Security”. IEEE Commun. Mag, vol. 53, pp. 20-27, 2015. doi:10.1109/mcom.2015.7081071. [27] Bhatnagar, M. R. "On the Capacity of Decode-and-Forward Relaying over Rician Fading Channels." IEEE Communications Letters, vol. 17, no. 6, pp. 1100-103, 06 2013. doi:10.1109/lcomm.2013.050313.122813. [28] Tan N. Nguyen, T.H.Q.Minh, Phuong T. Tran and Miroslav Voznak. “Energy Harvesting over Rician Fading Channel: A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments”. Sensors, vol. 18, 2018. [29] Tan N. Nguyen, T.H.Q.Minh, Phuong T. Tran and Miroslav Voznak. “Adaptive Energy Harvesting Relaying Protocol for Two-Way Half Duplex System Network over Rician Fading Channel”. Wireless Communications and Mobile Computing, 2018. [30] Nguyen, T. N., T. T. Duy, G.-T. Luu, P. T. Tran, and M. Voznak. "Energy Harvesting-based Spectrum Access with Incremental Cooperation, Relay Selection and Hardware Noises." Radio engineering, vol. 26, no. 1, pp. 240-50, 04, 2017. doi:10.13164/re.2017.0240. [31] Ngo Hoang An, Minh Tran, Tan N. Nguyen and Duy-Hung Ha, "Physical Layer Security in Hybrid TPSR Two- Way Half-Duplex Relaying Network over Rayleigh Fading Channel: Outage and Intercept Probability Analysis", Electronics, vol. 9, no. 3, Art, p. 428, 2020. [32] “Table of Integrals, Series, and Products”, 2015. doi:10.1016/c2010-0-64839-5 [33] Phu Tran Tin, Bach Dinh Hoang, Tan N. Nguyen, Duy Hung Ha and Tran Thanh Trang, "Power Beacon-Assisted Energy Harvesting Wireless Physical Layer Cooperative Relaying Networks: Performance Analysis", Symmetry, vol. 12, no. 1, Art, p. 106, 2020. [34] Tan N. Nguyen, T.H.Q.Minh, Duy-Hung Ha, Thanh-Long Nguyen and Miroslav Voznak, "Energy harvesting based two-way full-duplex relaying network over Rician fading environment: performance analysis", Proceedings of the Estonian Academy of Sciences, vol. 68, no. 1, pp. 111-123, 2019. [35] Tan N. Nguyen, Minh Tran, Duy-Hung Ha, Tran Thanh Trang and Miroslav Voznak, "Multi-Source in DF Cooperative Networks With PSR protocol Based Full-Duplex Energy Harvesting Over Rayleigh Fading Channel: Performance Analysis", Proceedings of the Estonian Academy of Sciences, vol. 68, no. 3, pp. 264-275, 2019. [36] Tan N. Nguyen, Miroslav Voznak, Tran Hoang Quang Minh, Phuong T. Tran, Phu Tran Tin, Thanh-Long Nguyen. "Outage Probability Analysis of Power Splitting PowerBeacon Assisted Energy Harvesting Relay Wireless Communication Networks", 2018 IEEE/ACM 22nd International Symposium on Distributed Simulation and Real Time Applications (DS-RT), 2018.