Secure Wireless Multicasting through Nakagami-m Fading Channels with Multi-Hop Relaying

Abstract

The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity gain. The development of an analytical mathematical model of ensuring security in multicasting through fading channels incorporating this benefit of multi-hop relaying is still an open problem. Motivated by this issue, this paper considers a secure wireless multicasting scenario employing multi-hop relaying technique over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security against multiple eavesdroppers. This mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to ensure the security in the presence of multiple eavesdroppers. Moreover, the effects of the fading parameter of multicast channel, the number of hops and eavesdropper are investigated. The results show that the security in multicasting through Nakagami-m fading channel with multi-hop relaying system is more sensitive to the number of hops and eavesdroppers. The fading of multicast channel helps to improve the secrecy multicast capacity and is not the enemy of security in multicasting.

Share and Cite:

Rahman, M.M., Sarkar, M.Z.I. and Hasan, M.M. (2023) Secure Wireless Multicasting through Nakagami-m Fading Channels with Multi-Hop Relaying. Journal of Computer and Communications, 11, 177-193. doi: 10.4236/jcc.2023.115013.

1. Introduction

The multi-hop technique enhances the system performance significantly over Nakagami-m Fading channel [1] . On the other hand, multicasting is an efficient wireless communication technique for group-oriented and personal communication such as video-conferencing, e-learning etc. Due to the increase of application areas and the mobility of users with network components, the security is a crucial aspect in wireless multicasting systems because of the fact that the medium of wireless multicasting is open and susceptible to eavesdropping and fraud.

1.1. Related Works

Recently, Srinivas et al. [2] studied multicast capacity of wireless ad-hoc networks over Nakagami-m fading channel. In [3] , G. C. Alexandropoulos et al. analyzed decode-and-forward dual-hop networks over Nakagami-m fading channel and showed that the relaying is always beneficial for system performance. Chun.et al. [4] , studied the multicast transmission capacity (MTC) and multicast outage probability of multi-hop wireless network and showed that an appropriate number of retransmission can significantly enhances the MTC. In [5] , Y. Zou et al. studied the relay selection for improving physical layer security in cooperative wireless network. Nguyen et al. [6] , analyzed the performance of wireless energy harvest cluster based multi-hop networks. The technique of enhancing security using partial relay selection strategy was studied in [7] . In [8] , authors studied multicasting through multicellular networks and showed how the loss of security due to the effects of interference power can be compensated using the opportunistic relaying technique. The diversity order provided by the asymmetric cooperative relays was used in [9] to enhance the security of multicast networks. In [10] , A. S. M. Badrudduza et al. studied the effects of correlation on the security in multicasting and showed how the effects of correlated can be compensated by using the opportunistic relaying technique. In [11] , D. K. Sarkar et al. developed a mathematical model to enhance the security of wireless multicasting using the additional diversity provided by the best relay among a number of amplify-and-forward cooperative relays. A. P. Shrestha et al. [12] developed a mathematical model for the physical layer security of cooperative multi-hop routing wireless network. Toan et al. [13] studied the end-to-end performance of multi-hop wireless-powered relaying networks cognitively operating with primary networks over Nakagami-m fading channels. In [14] , A. K. Kamboj et al. developed the machine learning algorithms for relay selection to improve the physical layer security of a dual-hop non-regenerative wireless cooperative network.

However, to the best of authors knowledge, the aforementioned works did not develop an analytical mathematical model to ensure the security in multicasting considering the diversity order provided by the multi-hop relaying technique. This research gap is fulfilled in this paper considering a multicasting scenario through Nakagami-m fading channel with multi-hop relaying technique.

1.2. Contributions

Based on the aforementioned scenario available in the literature and motivated by the benefits of multi-hop technique. This paper considers a secure wireless multicasting scenario over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security of the proposed model incorporating the benefits of the multi-hop relaying technique. The major contributions of this paper can be summarized as follows.

· At first, based on the probability density function (PDF) of multi-hop relaying technique over frequency selective Nakagami-m fading channels, the expressions for the PDFs of the minimum signal-to-noise ratio (SNR) of multicast channels and the maximum SNR of eavesdropper’s channels, and denote them by f d min ( γ M n 1 ) and f d max ( γ E n 2 ) , respectively are derived.

· Secondly, using the analytical expressions of f d min ( γ M n 1 ) and f d max ( γ E n 2 ) , the closed-form analytical expressions for the PNSMC and the SOPM are derived.

· Finally, the effects of the fading parameter of multicast channel, the SNR of eavesdropper’s channel, and the number of hops and eavesdroppers on the the PNSMC and SOPM have been investigated. Also the concept of enhancing the level of security of the proposed model minimizing the loss of security due to the effects of eavesdroppers and the SNR of eavesdropper’s channel has been explained in this work.

The remainder of this paper is organized as follows. Sections II and III describe the system model and problem formulation, respectively. The expressions for the PNSMC and the SOPM are derived, respectively in Section IV and V. Numerical results are presented in Section VI. Finally, Section VII draws the conclusions of this work.

2. System Model

A secure wireless multicasting scenario as shown in Figure 1 is considered through multi-hop Nakagami-m fading channel in the presence of P eavesdroppers. A transmitter equipped with nt antennas sends a common stream of information to the M multicast users and P eavesdroppers observe the communication between transmitter and multicast users. The key objective of this research is to protect this information from eavesdropping. Each multicast user and eavesdropper are equipped with nr and ne antennas, respectively. The channel between transmitter and multicast user is known as multicast channel and the channel between transmitter and eavesdropper is known as eavesdropper’s channel. Both the multicast and eavesdropper’s channels are assumed to be Nakagami-m fading channels. m1 is the fading parameter of the each multicast channel and m2 is the fading parameter of each eavesdropper’s channel. γ ¯ n 1 and γ ¯ n 2 are the average SNR of the multicast channels and eavesdropper’s channel respectively. There are N hops between transmitter and multicast users.

3. Problem Formulation

In this section, this paper explores the PDFs of the multicast channels and eavesdropper’s channels from the PDFs of their sub-channels.

Figure 1. System model.

Let γ i denotes the SNR of ith hop of multi-hop Nakagami-m fading channel. Then, the PDF of γ i , denoted by f γ i ( γ i ) is given by [1] :

f γ i ( γ i ) = ( m i ) m i γ i m i 1 e m i γ i γ ¯ i ( γ ¯ i ) m i Γ ( m i ) , (1)

where m i Nakagami-m fading parameter of ith hop and i = 1 , , N . Let γ e n d denotes the end-to-end SNR i.e. SNR at the destination user, then γ e n d = i = 1 N γ i .

3.1. PDF and CDF of Each Sub-Channel of Multicast Channels

Let γ M n 1 denotes the SNR of n1th multicast channel. Then, following equation (i), the PDF of γ M n 1 over multi-hop Nakagami-m fading channel is given by [15]

f γ M n 1 ( γ M n 1 ) = ( m n 1 ) m n 1 γ M n 1 m n 1 1 e m n 1 γ M n 1 γ ¯ n 1 ( γ ¯ n 1 ) m n 1 Γ ( m n 1 ) = A 1 γ M n 1 m n 1 1 e B 1 γ M n 1 , (2)

where A 1 = ( m n 1 ) m n 1 ( γ ¯ n 1 ) m n 1 Γ ( m n 1 ) , B 1 = m n 1 γ ¯ n 1 and n 1 = 1 , , M . The CDF of n1th multicast channel denoted by F γ M n 1 ( γ M n 1 ) is defined as [15]

F γ M n 1 ( γ M n 1 ) = 0 γ M n 1 f γ M n 1 ( γ M n 1 ) d γ M n 1 . (3)

Substituting the value of f γ M n 1 ( γ M n 1 ) from Equation (2) and performing integration by using identity 3.381(8) of [16]

0 u x m e β x n d x = γ ( v , β u n ) n β v

and identity 8.354(1) of [16]

γ ( x , α ) = n = 0 1 n x α + n n ! ( α + n )

it can be found,

F γ M n 1 ( γ M n 1 ) = A 1 A 3 γ M i m n 1 , (4)

where A 3 = q 1 = 0 ( 1 ) q 1 B 1 q 1 q 1 ! ( m n 1 + q 1 ) .

3.2. PDF and CDF of Each Sub-Channel of Eavesdropper’s Channels

Let γ E n 2 denotes the SNR of n2th eavesdropper’s channel. Then, the PDF of γ E n 2 over multi-hop Nakagami-m fading channel is given by [15]

f γ E n 2 ( γ E n 2 ) = ( m n 2 ) m n 2 γ E n 2 m n 2 1 e m n 2 γ E n 2 γ ¯ n 2 ( γ ¯ n 2 ) m n 2 Γ ( m n 2 ) = A 2 γ E n 2 m n 2 1 e B 2 γ E n 2 , (5)

where A 2 = ( m n 2 ) m n 2 ( γ ¯ n 2 ) m n 2 Γ ( m n 2 ) , B 2 = m n 2 γ ¯ n 2 and n 2 = 1 , , P . The CDF of n2th eavesdropper’s channel denoted by F γ E n 2 ( γ E n 2 ) is defined as [15]

F γ E n 2 ( γ E n 2 ) = 0 γ E n 2 f γ E n 2 ( γ E n 2 ) d γ E n 2 . (6)

Substituting the value of f γ E n 2 ( γ E n 2 ) from Equation (5) and performing integration,using identity 3.381(8) and 8.354(1) of [16] it can be found

F γ E n 2 ( γ E n 2 ) = A 2 γ E n 2 m n 2 q 2 = 0 ( 1 ) q 2 B 2 q 2 γ E n 2 q 2 q 2 ! ( m n 2 + q 2 ) (7)

3.3. PDF of Minimum SNR of Multicast Channels

Let d min = min 1 n 1 M γ M n 1 . Then, the PDF of d min denoted by f d min ( γ M n 1 ) can be defined as [15]

f d min ( γ M n 1 ) = M f γ M n 1 ( γ M n 1 ) × { 1 F γ M n 1 ( γ M n 1 ) } M 1 (8)

Substituting the values of f γ M n 1 ( γ M n 1 ) and F γ M n 1 ( γ M n 1 ) from Equations (2) and (4), respectively and performing integration and simplifying by the use of identity 1.110 of [16] it is found

f d min ( γ M n 1 ) = M A 1 γ M i m n 1 1 e B 1 γ M i ( M 1 ) M A 3 × [ A 1 2 γ M i v 1 1 e B 1 γ M i ( M 2 ) M A 1 3 A 3 γ M i v 2 1 2 ] , (9)

where v 1 = 2 m n 1 + q 1 and v 2 = 3 m n 1 + 2 q 1 .

3.4. PDF of Maximum SNR of Eavesdropper’s Channels

Let d max = max 1 n 2 P γ E n 2 . Then, the PDF of d max denoted by f d max ( γ E n 2 ) can be defined as [15]

f d max ( γ E n 2 ) = P f γ E n 2 ( γ E n 2 ) { F γ E n 2 ( γ E n 2 ) } P 1 (10)

Substituting the values of f γ E n 2 ( γ E n 2 ) and F γ E n 2 ( γ E n 2 ) from equations (5) and (7), respectively and performing integration and simplifying by the use of identity 0.314 of [16] it can be found

f d max ( γ E n 2 ) = C 0 P A 2 A 4 γ E n 2 P m n 2 1 e B 2 γ E n 2 + C 1 P A 2 A 4 γ E n 2 m n 2 + v 3 1 e B 2 γ E n 2 , (11)

where v 3 = P m n 2 m n 2 + 1 , A 4 = ( A 2 ) P 1 , C 0 = ( 1 m n 2 ) P 1 and C 1 = ( m n 2 ) 2 P ( P 1 ) ( B 2 m n 2 + 1 ) .

4. Probability of Non-Zero Secrecy Multicast Capacity

The probability of non-zero secrecy multicast capacity denoted by P r ( C s m c a s t > 0 ) can be defined as [17]

P r ( C s m c a s t > 0 ) = 0 f d min ( γ M n 1 ) × { 0 γ M n 1 f d max ( γ E n 2 ) d γ E n 2 } d γ M n 1 (12)

Substituting the values of f d min ( γ M n 1 ) and f d max ( γ E n 2 ) in Equation (12) and performing integration, the closed-form analytical expression for the P r ( C s m c a s t > 0 ) is given in,

P r ( C s m c a s t > 0 ) = M P A 1 A 2 A 4 [ { C 0 A 5 Γ w 1 B 1 w 1 + C 1 A 6 Γ w 2 B 1 w 2 } ( M 1 ) A 1 A 3 { C 0 A 5 Γ w 3 B 1 w 3 + C 1 A 6 Γ w 4 B 1 w 4 } 1 2 ( M 1 ) ( M 2 ) A 1 2 A 3 2 { C 0 A 5 Γ w 5 B 1 w 5 + C 1 A 6 Γ w 6 B 1 w 6 } ] (13)

where A 5 = q 3 = 0 ( 1 ) q 3 B 2 q 3 q 3 ! ( p m n 2 + q 3 ) , A 6 = q 4 = 0 ( 1 ) q 4 B 2 q 4 q 4 ! ( m n 2 + v 3 + q 4 ) , w 1 = m n 1 + p m n 2 + q 3 , w 2 = m n 1 + p m n 2 + 1 + q 4 , w 3 = 2 m n 1 + p m n 2 + q 1 + q 3 , w 4 = 2 m n 1 + p m n 2 + q 1 + q 4 + 1 w 5 = 3 m n 1 + p m n 2 + 2 q 1 + q 3 and w 6 = 3 m n 1 + p m n 2 + 2 q 1 + q 4 .

5. Secure Outage Probability for Multicasting

The secure outage probability for multicasting denoted by P o u t ( R s m c a s t ) can be defined as [18]

P o u t ( R s m c a s t ) = 1 0 f d max ( γ E n 2 ) × { x f d min ( γ M n 1 ) d γ M n 1 } d γ E n 2 , (14)

where x = e 2 R s m c a s t ( 1 + γ n 2 ) 1 and R s m c a s t denotes the target secrecy multicast rate. Substituting the values of f d min ( γ M n 1 ) and f d max ( γ E n 2 ) in Equation (14) and performing integration, the closed-form analytical expression for the P o u t ( R s m c a s t ) is given in,

P o u t ( R s m c a s t ) = 1 M P A 1 A 2 A 4 A 1 3 [ C 0 { A 7 A 10 Γ u 1 B 4 u 1 ( M 1 ) A 1 A 3 A 8 A 11 Γ u 2 B 4 u 2 + ( M 2 ) ( M 1 ) 2 A 1 2 A 3 2 A 9 A 12 Γ u 3 B 4 u 3 } + C 1 { A 7 A 10 Γ u 4 B 4 u 4 ( M 1 ) A 1 A 3 A 8 A 11 Γ u 5 B 4 u 5 + ( M 2 ) ( M 1 ) 2 × A 1 2 A 3 2 A 9 A 12 Γ u 6 B 4 u 6 } ] (15)

where A 7 = Γ m n 1 B 1 m n 1 q 5 = 0 m n 1 1 B 1 q 5 q 5 ! , A 8 = Γ v 1 B 1 v 1 q 6 = 0 v 1 1 B 1 q 6 q 6 ! , A 9 = Γ v 2 B 1 v 2 q 7 = 0 v 2 1 B 1 q 7 q 7 ! , A 10 = k 1 = 0 q 5 q 5 ! k 1 ! ( q 5 k 1 ) ! ( e 2 R s 1 ) k 1 ( e 2 R s ) q 5 + k 1 , B 4 = B 2 + B 3 , A 11 = k 2 = 0 q 6 q 6 ! k 2 ! ( q 6 k 2 ) ! ( e 2 R s 1 ) k 2 ( e 2 R s ) q 6 + k 2 , B 3 = B 1 e 2 R s , A 12 = k 3 = 0 q 7 q 7 ! k 3 ! ( q 7 k 3 ) ! ( e 2 R s 1 ) k 3 ( e 2 R s ) q 7 + k 3 , A 13 = e B 1 ( e 2 R s 1 ) , u 1 = p m n 2 + q 5 k 1 , u 2 = p m n 2 + q 6 k 2 , u 3 = p m n 2 + q 7 k 3 , u 4 = p m n 2 + 2 m n 2 + q 5 k 1 + 1 , u 5 = p m n 2 + 2 m n 2 + q 6 k 2 + 1 and u 6 = p m n 2 + 2 m n 2 + q 7 k 3 + 1 .

6. Numerical Results

In this section, some analytical results are shown from the closed-form analytical expressions of the PNSMC and the SOPM. The analytical results are verified via Monte-Carlo simulation. In order to generate the simulation results, at first, the Nakagami-m fading channel is modeled using MATLAB code. Then, by using this channel, PNSMC and the SOPM are calculated considering multi-hop relaying from transmitter to receivers and eavesdroppers. More than 110,000 realizations for the PNSMC and the SOPM are taken and averaged to find the final simulation results of PNSMC and the SOPM.

The PNSMC, P r ( C s m c a s t > 0 ) is shown in Figure 2 as a function of the average SNR of the multicast channel, γ ¯ n 1 , for selected values of P. This figure describes the effects of P on the P r ( C s m c a s t > 0 ) for selected values of system parameters. It is observed that the P r ( C s m c a s t > 0 ) decreases with P. This is because, the probability of eavesdropping increasing with P which causes a reduction

Figure 2. The effects of the number of eavesdropper, P, on the P r ( C s m c a s t > 0 ) with m n 1 = m 1 = 2 , m n 2 = m 2 = 0.1 , M = 1 , γ ¯ n 2 = γ ¯ e = 30 dB and N = 2 .

in the secrecy multicast capacity.

Figure 3 shows the P r ( C s m c a s t > 0 ) as a function of γ ¯ n 1 , for selected values of m n 1 with the system parameters mentioned on the figure. It is observed that P r ( C s m c a s t > 0 ) increases with m 1 . Because, fading in the multicast channels create a protection against eavesdropping which causes an improvement in the secrecy capacity.

The P r ( C s m c a s t > 0 ) is shown in Figure 4 as a function of γ ¯ n 1 for selected values of the number of hops, N. This figure describes the effects of N on the P r ( C s m c a s t > 0 ) for selected values of system parameters. It is found that the P r ( C s m c a s t > 0 ) increases with N. This is because, the cooperative diversity provided by the relays increases with N which causes an improvement in the secrecy capacity. Figure 5 shows the effects of N on the P r ( C s m c a s t > 0 ) for different values of m n 1 (denoted by m 1 ). It is observed that the P r ( C s m c a s t > 0 ) increases when the value of m 1 increases from 2 to 4 with N = 2 . But the P r ( C s m c a s t > 0 ) increases with keeping the value of m 1 = 2 , as one expects.

The P r ( C s m c a s t > 0 ) is shown in Figure 6 as a function of γ ¯ n 1 for selected values of N and P. This figure describes the effects of N for different values of P on the P r ( C s m c a s t > 0 ) . It is observed that, at N = 2 , P r ( C s m c a s t > 0 ) decreases

Figure 3. The effects of fading parameter of multicast channel, m n 1 (denoted by m 1 ), on the P r ( C s m c a s t > 0 ) for m n 2 = m 2 = 0.1 , M = 1 , P = 2 , γ ¯ n 2 = γ ¯ e = 20 dB and N = 1 .

Figure 4. The effects of the number of hop, N, on the P r ( C s m c a s t > 0 ) for m n 1 = m 1 = 3 , m n 2 = m 2 = 0.1 , M = 1 , P = 2 and γ ¯ n 2 = γ ¯ e = 30 dB .

Figure 5. The effects of number of hop, N, for selected values of m n 1 (denoted as m 1 ) on the P r ( C s m c a s t > 0 ) with m n 2 = m 2 = 0.1 , M = 1 , P = 2 and γ ¯ n 2 = γ ¯ e = 30 dB .

Figure 6. The effects of number of hop, N, for selected values of P on the P r ( C s m c a s t > 0 ) with m n 1 = m 1 = 2 , m n 2 = m 2 = 0.1 , M = 1 and γ ¯ n 2 = γ ¯ e = 30 dB .

Figure 7. The effects of the number of eavesdropper, P, on the P r ( C s m c a s t > 0 ) as a function of N when m n 1 = m 1 = 1 , m n 2 = m 2 = 0.1 , M = 1 , γ ¯ n 1 = γ ¯ m = 10 dB and γ ¯ n 2 = γ ¯ e = 20 dB .

with P. But this reduction of P r ( C s m c a s t > 0 ) can be compensated by increasing the value of N.

Figure 7 shows the P r ( C s m c a s t > 0 ) as a function of N for selected values of P. This figure describes the effects of P on the P r ( C s m c a s t > 0 ) for selected values of system parameters. It is observed that the P r ( C s m c a s t > 0 ) decreases with P. This is because, the probability of eavesdropping increases with P and causes a reduction in the secrecy capacity.

The P r ( C s m c a s t > 0 ) is shown in Figure 8 as a function of N, for selected values of fading parameter of multicast channel, m n 1 (denoted by m 1 on the figure). This figure describes the effects of m 1 on the P r ( C s m c a s t > 0 ) for selected values of system parameters. Clearly it is found that P r ( C s m c a s t > 0 ) increases with N and m 1 . But the effects of both N and m 1 decreases at the higher values of N and m 1 .

The secure outage probability for multicasting denoted by P o u t ( R s m c a s t ) shown in Figure 9 as a function of γ ¯ n 1 for selected values of P. It is observed that the P o u t ( R s m c a s t ) increases with P which causes the reduction in the secrecy multicast capacity.

Figure 10 shows the P o u t ( R s m c a s t ) as a function of γ ¯ n 1 for selected values of number of hop N. it is found that the P o u t ( R s m c a s t ) decreases with N. This is

Figure 8. The effects of fading parameter of multicast channel, m n 1 (denoted as m 1 ), on the P r ( C s m c a s t > 0 ) as a function of N for m n 2 = m 2 = 0.1 , M = 1 , P = 3 , γ ¯ n 1 = γ ¯ m = 10 and γ ¯ n 2 = γ ¯ e = 20 dB .

Figure 9. The effects of the number of eavesdropper, P, on the P o u t ( R s m c a s t ) with m n 1 = m 1 = 2 , m n 2 = m 2 = 0.5 , M = 1 , γ ¯ n 2 = γ ¯ e = 20 dB , R s = 0.5 and N = 2 .

Figure 10. The effects of number of hop, N, on the P o u t ( R s m c a s t ) with m n 1 = m 1 = 2 , m n 2 = m 2 = 1 , M = 1 , P = 1 , γ ¯ n 2 = γ ¯ e = 30 dB and R s = 0.5 .

because, the cooperative diversity provided by the relays increases the secrecy capacity. Moreover, the cooperative diversity increases with the number of hops which enhances the level of security.

Figure 11 shows the effects of N on the P o u t ( R s m c a s t ) for selected values of P. It is observed that, when N = 2 , P o u t ( R s m c a s t ) increases with P. It means that the security degrades with P. On the other hand, when P = 3 , P r ( C s m c a s t > 0 ) decreases with N which means that the security enhances with N. Therefore, the loss of security due to the effects of P can be compensated by increasing the number of hops, N.

Figure 12 shows the effects of N on the P o u t ( R s m c a s t ) for selected values of m n 1 (denoted as m 1 ). It is observed that, when N = 2 , P o u t ( R s m c a s t ) decreases with m 1 . It means that the security enhances with m 1 . On the other hand, when m 1 = 1.5 , P r ( C s m c a s t > 0 ) decreases with N which means that the security enhances with N. Fading parameter is the property of wireless medium, the manual change of which is not possible. But the improvement of security by increasing the number of hops is a practical case.

The P o u t ( R s m c a s t ) is shown in Figure 13 as a function of N for selected values of m n 1 (denoted as m 1 ) and P. This figure describes the effects of m 1 and P on the P o u t ( R s m c a s t ) for selected values of system parameters. We see that the P o u t ( R s m c a s t ) increases with P which indicates that the security degrades with P. on the other hand, P o u t ( R s m c a s t ) decreases with m 1 which indicates that the

Figure 11. The effects of number of hop, N, on the P o u t ( R s m c a s t ) for selected values of P with m n 1 = m 1 = 2 , m n 2 = m 2 = 0.3 , M = 1 , γ ¯ n 2 = γ ¯ e = 20 dB and R s = 0.5 .

Figure 12. The effect of number of hop, N, on the P o u t ( R s m c a s t ) for selected values of m n 1 (denoted as m 1 ) with m n 2 = m 2 = 0.5 , M = 1 , P = 2 , R s = 0.5 and γ ¯ n 2 = γ ¯ e = 20 dB .

Figure 13. The effect of number of eavesdropper, P, on the P o u t ( R s m c a s t ) for selected values of m n 1 (denoted as m 1 ) with m n 2 = m 2 = 0.5 , M = 1 , N = 2 , R s = 0.5 and γ ¯ n 2 = γ ¯ e = 20 dB .

security enhances with m 1 . In the above figures, the matching between the simulation and analytical results justifies the validity of derived analytical expressions for the PNSMC and SOPM.

Based on the observations of above numerical results, the main findings of this paper can be summarized as follows:

· The mathematical model developed in this paper to ensure the security in multicasting through Nakagami-m fading channels employing multi-hop relaying is a valid model and this model can be further extended to enhance the security level employing opportunistic relaying technique.

· The degradation of security levels in multicasting through Nakagami-m fading channels due to the effects of the number of eavesdroppers [19] and the SNR of eavesdropper’s channel can be compensated by increasing the number of hops. The optimum number of hops can also be determined for a particular number of eavesdroppers.

· The fading of multicast channel enhances the security level and is not the enemy of secrecy multicast capacity [19] . Like jamming against the eavesdroppers, the fading of multicast channel protects the eavesdroppers to decode any information from the multicast channels.

7. Conclusion

This paper focuses on the development of an analytical mathematical model to ensure the security in wireless multicasting through Nakagami-m fading channels employing multi-hop relaying. The validity of developed analytical model is verified via Monte-Carlo simulation. This model is helpful to realize the insight of the effects of system parameters such as fading parameter of multicast channel, the number of eavesdroppers and the number of hops on the security in wireless multicasting through multi-hop Nakagami-m fading channels. The observation of numerical results concludes that the loss of security due to the effects of the number of eavesdroppers and the SNR of eavesdropper’s channel can be compensated by increasing the number of hops and without increasing the transmit signal power. This work has been carried out in a multicasting scenario with multiple hop system, but this research pave the way of employing different relaying techniques such as opportunistic relaying, asymmetric relaying, multiple cooperative relaying to enhance the security of wireless multicasting without changing the transmit signal power.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

[1] Karagiannidis, G.K., Tsiftsis, T.A. and Mallik, R.K. (2006) Bounds for Multi-Hop Relayed Communications in Nakagami-m Fading. IEEE Transactions on Communications, 54, 18-22.
https://doi.org/10.1109/TCOMM.2005.861679
[2] Shakkottai, S., Liu, X. and Srikant, R. (2007) The Multicast Capacity of Large Multihop Wireless Networks. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Montreal, 9-14 September 2007, 247-255.
https://doi.org/10.1145/1288107.1288141
[3] Alexandropoulos, G.C., Papadogiannis, A. and Berberidis, K. (2010) Performance Analysis of Cooperative Networks with Relay Selection over Nakagami-m Fading Channels. IEEE Signal Processing Letters, 17, 441-444.
https://doi.org/10.1109/LSP.2010.2042992
[4] Liu, C.H. and Andrews, J.G. (2011) Multicast Outage Probability and Transmission Capacity of Multi-Hop Wireless Networks. IEEE Transactions on Information Theory, 57, 4344-4358.
https://doi.org/10.1109/TIT.2011.2146030
[5] Zou, Y., Wang, X. and Shen, W. (2013) Optimal Relay Selection for Physical Layer Security in Cooperative Wireless Networks. IEEE Journal on Selected Areas in Communications, 31, 2099-2111.
https://doi.org/10.1109/JSAC.2013.131011
[6] Van, N.T., Do, T.N., Bao, V.N.Q. and An, B. (2018) Performance Analysis of Wireless Energy Harvesting Multihop Cluster-Based Networks over Nakagami-m Fading Channels. IEEE Access, 6, 3068-3084.
https://doi.org/10.1109/ACCESS.2017.2787055
[7] Sarkar, D.K., Sarkar, M.Z.I. and Anower, M.S. (2021) Enhancing Security in Multicasting with Partial Relay Selection over Composite Fading Channels. Wireless Personal Communications, 121, 1067-1084.
https://doi.org/10.1007/s11277-021-08672-0
[8] Ali, S.M.R. and Sarkar, M.Z.I. (2022) Enhancing Security in Multicellular Multicast Channels Reducing Interference Power with the Best Relay Selection. Journal of Computer and Communications, 10, 1-26.
https://doi.org/10.4236/jcc.2022.101001
[9] Sarkar, D.K., Sarkar, M.Z.I. and Anower, M.S. (2022) Multicast Network Security with Asymmetric Cooperative Relaying. International Journal of Wireless Information Networks, 29, 303-313.
https://doi.org/10.1007/s10776-022-00566-7
[10] Badrudduza, A.S.M., Sarkar, M.Z.I. and Kundu, M.K. (2020) Enhancing Security in Multicasting through Correlated Nakagami-m Fading Channels with Opportunistic Relaying. Physical Communication, 43, Article ID: 101177.
https://doi.org/10.1016/j.phycom.2020.101177
[11] Sarkar, D.K., Sarkar, M.Z.I. and Anower, M.S. (2018) Secure Wireless Multicasting through AF-Cooperative Networks with Best Relay Selection. Wireless Networks, 26, 1717-1730.
https://doi.org/10.1007/s11276-018-1861-6
[12] Shrestha, A.P., Jung, J. and Kwak, K.S. (2013) Secure Wireless Multicasting in Presence of Multiple Eavesdroppers. Proceedings of 13th International Symposium on Communications and Information Technologies (ISCIT), Surat Thani, 4-6 September 2013, 814-817.
https://doi.org/10.1109/ISCIT.2013.6645929
[13] Nguyen, T.V. and An, B. (2019) Cognitive Multihop Wireless Powered Relaying Networks over Nakagami-m Fading Channels. IEEE Access, 7, 154600-154616.
https://doi.org/10.1109/ACCESS.2019.2949081
[14] Kamboj, A.K., Jindal, P. and Verma, P. (2021) Intelligent Physical Layer Secure Relay Selection for Wireless Cooperative Networks with Multiple Eavesdroppers. Wireless Personal Communications, 120, 2449-2472.
https://doi.org/10.1007/s11277-021-08458-4
[15] Hasan, M.M. and Sarkar, M.Z.I. (2022) Security in Multicast Over α-μ Fading Channels with Orthogonal Frequency Division Multiplexing. Journal of Computer and Communications, 10, 72-90.
https://doi.org/10.4236/jcc.2022.1011006
[16] Gradshteyn, I.S. and Ryzhik, I.M. (2007) Table of Integrals, Series, and Products. 7th Edition. Academic Press, Cambridge.
[17] Sarkar, M.Z.I. and Ratnarajah, T. (2011) Secure Wireless Multicasting through Nakagami-m Fading Miso Channel. 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), Pacific Grove, 6-9 November 2011, 300-304.
https://doi.org/10.1109/ACSSC.2011.6190006
[18] Sarkar, M.Z.I. and Ratnarajah, T. (2010) Information-Theoretic Security in Wireless Multicasting. International Conference on Electrical & Computer Engineering (ICECE 2010), Dhaka, 18-20 December 2010, 53-56.
https://doi.org/10.1109/ICELCE.2010.5700551
[19] Badrudduza, A., Sarkar, M. and Kundu, M.K. (2020) Enhancing Security in Multicasting through Correlated Nakagami-m Fading Channels with Opportunistic Relaying. Physical Communication, 43, Article ID: 101177.
https://doi.org/10.1016/j.phycom.2020.101177

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.