 Research
 Open Access
 Published:
Distributed sourcerelay selection scheme for vehicular relaying networks under eavesdropping attacks
EURASIP Journal on Wireless Communications and Networking volume 2014, Article number: 109 (2014)
Abstract
The recent development of vehicular networking technologies brings the promise of improved driving safety and traffic efficiency. Cooperative communication is recognized as a lowcomplexity solution for enhancing both the reliability and the throughput of vehicular networks. However, due to the openness of wireless medium, the vehicular wireless communications (VWC) is also vulnerable to potential eavesdropping attacks. To tackle with this issue, we in this paper propose a novel usercooperation scheme with antieavesdropping capabilities. Specifically, prior to any frame transmission, a sourcerelay pair is jointly selected to maximize the achievable secrecy rate. After that, the selected relay assists the source to deliver its data to the destination. The proposed selection scheme can be realized in a fully distributed manner, and the security is guaranteed without using any encryption techniques at the upper layers. The closedform expressions for the secrecy outage probability and the intercept probability are derived, and the achievable diversity order is also analyzed. Simulation results show that the proposed scheme outperforms the competing counterparts in terms of both the secrecy outage probability and the average secrecy rate.
1 Introduction
During the past few years, vehicular networks have received increasing attentions due to their potentials in enhancing road safety, improving traffic efficiency, and providing mobile infotainment services[1]. In vehicular networks, the information exchange among the vehicles can be typically performed in two modes, namely, vehicletovehicle (V2V) and vehicletoinfrastructure (V2I). The V2V communications do not rely on the existence of the central unit, and the vehicles can communicate with each other directly via either singlehop or multihop connections. Comparably, in V2I communications, data is transferred between the vehicle and the fixed infrastructure deployed along the roadside, which is often called the roadside unit (RSU) in the literature. The coexistence of these two modes makes the vehicular networks a hybrid network that supports both the infrastructurebased and ad hoc communications.
The interests in vehicular networking dates back to late 1980s. Since then, the idea of leveraging wireless technologies for vehicular communications has fascinated researchers around the globe, and great efforts have been made to develop new architectures, protocols, algorithms, and applications for vehicular networks. Many governmental projects or plans have been set up to explore the potentials of vehicular wireless communications (VWC), including the VSC and VII in United States, the eSafety in Europe, and the ASV series in Japan[2]. From the industrial perspective, several standards have been created, among which the most important ones are the IEEE 802.11p and IEEE 1609 protocol suites. IEEE 802.11p specifies the physical layer (PHY) and medium access control (MAC) layer features such that the existing IEEE 802.11 can work in vehicular environments, and IEEE 1609 mainly deals with the multichannel operation, routing, and security issues. The academic research in the field of VWC is also fruitful, ranging from the modeling of vehicular channels[3] to the development of MAC and routing algorithms[4–7]. Besides that, some field trials have also been carried out in many countries for objective performance evaluation[8].
So far, simple and basic solutions at almost all layers have been devised for vehicular communications. However, the unique features of vehicular networks make the design of efficient VWC protocols challenging. First, the vehicular networks are expected to support the mixture of both the realtime and nonrealtime services. As a result, it is difficult to satisfy the diverse qualityofservice (QoS) requirements by simply adopting the existing techniques. Second, the fast movement of the vehicles makes the network topology and the vehicle density highly dynamic, and hence, the connectivity among the vehicles is hard to be guaranteed. Third, due to the existence of various obstacles along the roads, the propagation conditions for VWC is harsher than those for general mobile ad hoc networks. All these factors indicate the necessity for developing innovative wireless techniques to support the emerging applications in vehicular networks.
Among many candidates of VWC technologies, cooperative communication is widely regarded as a promising solution to enhance the performance of vehicular networks from various layers. The key idea of cooperative communication is to let the neighboring terminals relay information for each other. In this way, the spatial diversity gain as well as the spatial multiplexing gain can be harvested without the deployment of multiple antennas. The research in cooperative communications is pioneered by Sendonaris et al.[9]. In[10], several basic cooperative relaying protocols were proposed, and their outage performances were analyzed. Since these two seminal papers, a large body of literature has been devoted to the design, analysis, and implementation of cooperative schemes for various scenarios. In[11], the authors proposed a constellation reassignment scheme at the relay to minimize the symbol error rate at the destination node. In[12], a link adaptive regeneration strategy was developed for decodeandforward (DF) systems. These works, however, are concerned about the simple scenario where there is only one source and one relay. For multiplerelay systems, advanced relaying mechanisms such as distributed spacetime coding[13], relay selection[14], network coding[15], and collaborative beamforming[16] were investigated to further benefit the cooperative systems. Based on the work in[14], the joint sourcerelay selection schemes were proposed in[17, 18] for multisource multirelay networks to exploit both the cooperative diversity and the multiuser diversity.
In vehicular networks, there are often a large number of vehicles that can serve as relays to facilitate both the V2V and V2I communications. Therefore, the application of cooperative relaying in vehicular communications is a natural choice. In[19], a dualhop intervehicular transmission with relay selection was considered, and the outage performance as well as the achievable diversity order was analyzed. By incorporating a highway mobility model, the authors in[20] proposed a scheme for locating and selecting the optimal relay station for multihop vehicular networks. While[19] and[20] mainly focused on the PHYlayer issues,[5] dealt with the relayaided MAC protocol design for vehicular communications. Specifically, by adaptively choosing the relay node and the cooperative mode, the proposed protocol can optimize the system throughput and extend the service range. In[21], the crosslayer routing was studied using cooperative relaying technique. Through investigations, the authors pointed out that cooperative transmission can yield more efficient routes than the competing counterparts in terms of both the reliability and the energy consumption. To fully characterize the performance of vehicular relay networks,[22] developed an analytical model and analyzed the access probability and the connectivity probability.
Although there are plenty of schemes proposed so far to take full advantages of cooperative communications to improve the link reliability, increase the achievable throughput, extend the service coverage, and lower the energy consumption, very few works address the security issue for relayaided vehicular networks, which is also of vital importance due to the openness of wireless channels. Consider a vehicular network consisting of multiple source nodes, multiple relay nodes, and one destination node. The relays can help the sources to deliver their messages to the destination. However, these messages can also be overheard by some eavesdropper nearby the destination. Therefore, the developed relaying protocols should provide the antieavesdropping capabilities. Traditional approaches to securing communications rely heavily on the data encryption at the upper layers of the protocol stack. However, since data security is critically important, it is reasonable to incorporate the security measures at all layers, including the physical layer. Since the seminal work of[23] and[24], more and more attentions have been paid to PHY security from an informationtheoretic point of view[25–27].
Recently, the secrecy problem in cooperative communications networks has emerged as a hot research topic. In[28], three cooperative schemes, namely, DF, amplifyandforward (AF), and cooperative jamming (CJ), are utilized to secure the sourcedestination communications. By allocating transmit power at the source and relays and determining the relay weights, the achievable secrecy rate is maximized subject to the total power budget. PHY security can also be realized via the appropriate selection of relay nodes. Following the idea of jamming, the authors in[29] proposed to select two relays to simultaneously serve the legitimate user and confuse the eavesdropper. For the same system model,[30] also adopts the relay selection and cooperative jamming to secure communications, but the jamming signal is sent from the destination rather than the selected relay. In our previous work[31], the securityembedded relay selection scheme is devised, where the selected relay transmits the superposition of the informationbearing signal and the artificial noise. We have shown through rigorous analysis that full diversity is achieved despite the existence of the eavesdropper. Although the injection of artificial noise is useful in improving the system security level, it also causes additional energy consumption. Aiming at this problem,[32] presents the AF and DFbased optimal relay selection to maximize the secrecy rate, without using artificial noise. Common to the works[28–32] is that they all assume that there is only one eavesdropper within the considered area. In comparison,[33] studied the relay selection issue for dualhop networks with multiple eavesdroppers.
Although the aforementioned works[28–33] have exhibited the potentials of physicallayer techniques in securing the wireless cooperative networks, all of them assumed that there is only one node having message to transmit. This assumption simplifies the protocol design and the performance analysis, but may not be realistic for vehicular networks. Different from these works, we in this paper consider a more practical scenario where there are multiple sources sharing the same pool of multiple relays. For this scenario, a sourcerelay selection strategy with antieavesdropping capabilities is proposed. The selected sourcerelay pair is the one that offers the maximum secrecy rate. A significant advantage of the proposed scheme is that it can be implemented in a distributed manner, which is attractive for vehicular networks.
The rest of this paper is organized as follows. Section 2 presents the system model and introduced the basic assumptions. In Section 3, we give a detailed description of the proposed sourcerelay selection scheme. In Section 4, we evaluate the system performance in terms of the secrecy outage probability, the intercept probability, and the achievable diversity order. Simulation results are shown in Section 5, from which the superiority of our scheme can be observed. Finally, we conclude our work in Section 6.
2 System model
As is shown in Figure1, we consider a V2I communications scenario where K vehicles (source nodes) want to deliver their confidential messages to the RSU (the destination), which is located beyond the transmission range of the vehicles, and thus, the direct links between the sources and the destination do not exist. However, there are M trusted vehicles that do not have message to transmit and can serve as relay nodes to help the sources. Meanwhile, near the destination, there exists a malicious node (eavesdropper) that tries to intercept the information intended for the destination. The sources, the relays, the destination, and the eavesdropper are denoted by S_{ k },(k = 1,2,…,K), R_{ m },(m = 1,2,…,M), D, and E, respectively. It is noted that K ≥ 1, i.e., there might be several sources having data to transmit at any time instant. To avoid the intervehicle interferences and reduce the implementation complexity, we employ a TDMAbased scheduler which selects a single sourcerelay pair to access the channel during one scheduling unit (the selection criterion will be given in the next section). To facilitate the presentations, we denote the selected source and selected relay as${S}_{{k}^{\ast}}$ and${R}_{{m}^{\ast}}$, respectively. After the scheduling is completed, the transmission is carried out in a twophase manner. Specifically,${S}_{{k}^{\ast}}$ transmits its data to${R}_{{m}^{\ast}}$ in the first phase, and${R}_{{m}^{\ast}}$ retransmits the received signal to D using standard AF protocol[10] in the second phase. The destination as well as the eavesdropper can hear the transmission from${R}_{{m}^{\ast}}$ and will perform decoding at the end of the second phase. Here, we assume that the first phase is secure and the information leakage only occurs during the second phase, which is attributed to the fact the the eavesdropper is near the destination and outside the transmission range of the first hop. It is further assumed that the channel state information (CSI) pertaining to the eavesdropper’s channels is available at the legitimate nodes. This assumption is commonly adopted in the PHYsecurity literature such as[26],[28], and[32], and can be satisfied in cases where the eavesdropper is active and its transmission can be monitored.
Each node is equipped with a single antenna and operates in a halfduplex mode. All channels are assumed to be independent and modeled as flat block fading, which remain constant within one frame (a twophase duration) and vary independently from frame to frame. The channel coefficient between node i and node j is represented by h_{ ij }, which is a complex circularly symmetric Gaussian variable with mean zero and variance μ_{ ij }. That is, h_{ ij } ∼ CN(0,μ_{ ij }). The average transmit powers at the selected source and the selected relay are denoted by P_{S} and P_{R} respectively, and we assume P_{S} = P_{R} = P for simplicity. The additive noise at each receiver is modeled as a complex Gaussian variable with mean zero and variance N_{0}. The notation ρ = P/N_{0} is used to represent the average signaltonoiseratio (SNR) of the system.
3 Distributed sourcerelay selection under eavesdropping attacks
3.1 Selection criterion
As is mentioned above, a single sourcerelay pair is selected for any frame transmission. According to the principle of the AF protocol and the considered system model, the k th (1 ≤ k ≤ K) source’s received SNR at the destination, with the help of the m th (1 ≤ m ≤ M) relay, can be expressed as
where${\gamma}_{{s}_{k}{r}_{m}}=P{h}_{{s}_{k}{r}_{m}}{}^{2}/{N}_{0}$ and${\gamma}_{{r}_{m}d}=P{h}_{{r}_{m}d}{}^{2}/{N}_{0}$ are the instantaneous received SNR at the m th relay from the k th source and at the destination from the m th relay, respectively.
Similarly, the received SNR at the eavesdropper can be calculated as well by simply replacing${\gamma}_{{r}_{m}d}$ in (1) by${\gamma}_{{r}_{m}e}$, where${\gamma}_{{r}_{m}e}=P{h}_{{r}_{m}e}{}^{2}/{N}_{0}$ is the instantaneous SNR of the link R_{ m } → D. Therefore, the instantaneous secrecy rate, defined as the difference between the achievable rate of the sourcedestination link and that of the sourceeavesdropper link, can be formulated as
where [x]^{+} = max(0,x). In order to minimize the secrecy outage probability, defined as the probability that the instantaneous secrecy rate falls below a target secrecy rate, our criterion is to select such a sourcerelay pair (k^{∗},m^{∗}) that can maximize the secrecy rate in (2). That is,
With this criterion, the achievable secrecy outage probability can be expressed as
where R_{S} represents the target secrecy rate, and$v={2}^{2{R}_{\mathrm{S}}}$. Since R_{S} is positive, v should be larger than 1.
If the global CSI is available at some node, e.g., the RSU, the criterion in (3) can be implemented in a centralized manner. However, it is nontrivial to obtain the CSI of all the involved links, especially for the networks with a large number of nodes. This motivates us to develop the distributed algorithm with low complexity, the details of which will be given in the next subsection.
3.2 Lowcomplexity distributed scheme
The proposed lowcomplexity design is based on the observation of (3), which tells us that the achievable secrecy rate is determined by${\gamma}_{e2e}^{\left({k}^{\ast},{m}^{\ast}\right)}$, the maximum of$K\times M{\gamma}_{e2e}^{(k,m)}$’s. According to the selection criterion in Sect. III. A,${\gamma}_{e2e}^{\left({k}^{\ast},{m}^{\ast}\right)}$ can also be viewed as${\gamma}_{e2e}^{\left({k}^{\ast},{m}^{\ast}\right)}={max}_{1\le m\le M}\{{\gamma}_{e2e}^{m}\}$, where${\gamma}_{e2e}^{m}$ is defined as
With the above observation in mind, we can divide the overall selection procedure into three steps. First, every relay node independently evaluates its eligibility for cooperation. After that, each eligible relay selects an appropriate source to maximize its contribution to the achievable secrecy rate. In this way, all the candidate sourcerelay pairs are generated. Finally, a single pair with the maximum${\gamma}_{e2e}^{(k,m)}$ is screened out from the candidate pairs to access the channel. The details of these steps are given in the following:

Step 1: Generating the Set of Eligible Relays. For any relay node R_{ m }, it can be deduced from (3) that if${\gamma}_{{r}_{m}d}<{\gamma}_{{r}_{m}e}$, then${\gamma}_{e2e}^{(k,m)}$ will be less than 1, irrespective of the source index k. In other words, the system will be in outage if this relay node is selected to access the channel, no matter which source is chosen to form the pair.
Further, when${\gamma}_{{r}_{m}d}\ge {\gamma}_{{r}_{m}e}$, the secrecy outage probability, with R_{ m } being the selected relay, can be expressed as
where (a) stems from the fact that$\frac{b+1}{a+1}<\frac{b}{a}$ for a < b. If${\gamma}_{{r}_{m}e}<{\gamma}_{{r}_{m}d}<v{\gamma}_{{r}_{m}e}$, we have$v{\gamma}_{{r}_{m}e}\left(1+{\gamma}_{{r}_{m}d}\right){\gamma}_{{r}_{m}d}\left(1+{\gamma}_{{r}_{m}e}\right)>0$ and${\gamma}_{{s}_{{k}^{\ast}}{r}_{m}}\left({\gamma}_{{r}_{m}d}v{\gamma}_{{r}_{m}e}\right)<0$. Therefore, the probability provided by (6) equals to 1, implying that the outage event definitely occurs if we choose such a relay to cooperate.
Summarizing the discussions above, we can conclude that to support the target secrecy rate, the selected relay has to satisfy the following condition:
In other words, if the channel gains regarding R_{ m } does not meet (7), R_{ m } cannot be selected. In steps 2 and 3, we will only focus on the eligible relays satisfying (7).
It should be emphasized that the eligibility determination process requires the knowledge of${\gamma}_{{r}_{m}d}$ and${\gamma}_{{r}_{m}e}$ at R_{ m }. However, this can be guaranteed because we have assumed that both the RSU and the eavesdropper are active entities which will transmit control information or messages, and the corresponding channel gains can be estimated at the relays using the pilots from the received signals.

Step 2: Source Selection at Eligible Relays. After step 1 has been finished, all the relays satisfying (7) broadcast flag signals to declare its eligibility for cooperation. Upon receiving the flag signals, all the sources will send an ACK to respond. With the received ACKs, any eligible relay R_{ m } can estimate${\gamma}_{{s}_{k}{r}_{m}}$ for all k s. After that, R_{ m } supposes itself to be the selected relay and chooses the ‘best’ source which can contribute most to${\gamma}_{e2e}^{(k,m)}$. To elaborate on how to find such a source node, a lemma will be introduced first.
Lemma 1. The function
where γ_{1}and γ_{2}are two constants with γ_{1}being larger than γ_{2}, is an increasing function of γ.
Proof. By taking the derivative of f(γ) with respect to γ, we can obtain
which is obviously larger than 0 for γ_{1} > γ_{2}. Therefore, f(γ) is an increasing function of γ. □
Based on this lemma, the ‘best’ source for R_{ m }, i.e.,${S}_{{k}^{\ast}(m)}$, should be the one with the following property:
It is no doubted that step 2 also enjoys a distributed implementation since the source selection is performed at the eligible relays, and there is no information exchange among different relay nodes.

Step 3: Distributed SourceRelay Pair Selection. Upon the completion of step 1 and step 2, we can formulate the expression for the maximum achievable secrecy rate by utilizing the m th relay as
$${C}_{\mathrm{S}}^{m}=\frac{1}{2}{log}_{2}\left\{\frac{1+\frac{{\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}{\gamma}_{{r}_{m}d}}{1+{\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}+{\gamma}_{{r}_{m}d}}}{1+\frac{{\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}{\gamma}_{{r}_{m}e}}{1+{\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}+{\gamma}_{{r}_{m}e}}}\right\}$$(11)
To select the optimal sourcerelay pair, we adopt the method based on the distributed timer[14]. Specifically, after calculating${C}_{\mathrm{S}}^{m}$, each eligible relay R_{ m } will start its timer with the initial value inversely proportional to${C}_{\mathrm{S}}^{m}$. Therefore, the relay with the largest${C}_{\mathrm{S}}^{m}$, namely${R}_{{m}^{\ast}}$, has its timer expired first.${R}_{{m}^{\ast}}$ then broadcasts the flag signal and the rest of the relays will back off after receiving the flag signal. Noticing the fact that the ‘best’ source for${R}_{{m}^{\ast}}$ has already been determined to be${S}_{{k}^{\ast}(m\ast )}$ in step 2, we now have the selected sourcerelay pair.
Remark 1. The proposed sourcerelay selection scheme has two advantages. First, it can be realized in a distributed way, yielding a low implementation complexity. This is of practical significance for vehicular networks. Second, the distributed method, despite of its simplicity, is an optimal solution in the sense that it can select the ‘best’ sourcerelay pair to minimize the system secrecy outage probability.
4 Performance analysis
4.1 Secrecy outage probability
The secrecy outage probability (SOP) is widely adopted as a performance metric to evaluate the PHYsecurity protocol in wireless fading channels. As previously mentioned, it is defined as the probability that the instantaneous secrecy rate falls below a target secrecy rate R_{S} > 0. By noticing that the M${\gamma}_{e2e}^{m}$’s are independent random variables, the SOP can be expressed as
By combining (5) and (10),${\gamma}_{e2e}^{m}$ can be expressed as
where${\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}=\underset{1\le k\le K}{\text{max}}\left\{{\gamma}_{{s}_{k}{r}_{m}}\right\}$.
Therefore, denoting${\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}$,${\gamma}_{{r}_{m}d}$, and${\gamma}_{{r}_{m}e}$ by X, Y, and Z, respectively, the probability$\text{Pr}\left({\gamma}_{e2e}^{m}<v\right)$ can be calculated as
where f_{ X }(x) is the probability density function (PDF) of the random variable X. The intractability of the PDF of${\gamma}_{e2e}^{m}$ makes it rather difficult to calculate the accurate result of the integral in the second part of (14). Therefore, we resort to the approximation$\frac{{\gamma}_{1}{\gamma}_{2}}{1+{\gamma}_{1}+{\gamma}_{2}}\approx min\{{\gamma}_{1},{\gamma}_{2}\}$, which is rather tight for large values of γ_{1} and γ_{2}[34]. Then, the second part of the righthand side of (14), denoted by I, is approximated as
Combining (14) and (15), the approximate expression for the probability$\text{Pr}\left({\gamma}_{e2e}^{m}<v\right)$ can be given by
For the considered Rayleigh fading channels, γ_{ ij } follows the exponential distribution with the rate parameter λ_{ ij } = (ρ μ_{ ij })^{1}. Therefore, I_{1} in (16) can be obtained as
On the other hand,$X={\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}$ is the maximum of K independently and nonidentically distributed exponential random variables. According to the order statistics, I_{2} in (16) can be simplified as
where we have utilized the multinomial expansion identity given by[35], e.q. (7). After some tedious calculations, I_{2} can be finally simplified as
Substituting (17) and (19) into (16), the closedform expression for$\text{Pr}\left({\gamma}_{e2e}^{m}<v\right)$ is obtained, and the SOP of the system can also be derived by substituting this result into (12). However, we omit these expressions here due to space limitation. In the next section, we will show through simulations that the derived theoretical result is tight enough for medium to high SNR values.
4.2 Intercept probability
The intercept probability, which is also a key metric in evaluating the performance of PHYlayer security schemes, is defined as the probability that the capacity of the legitimate link falls below that of the wiretap link[32]. Mathematically speaking, the intercept probability can be expressed as
According to the expression for${\gamma}_{e2e}^{m}$ in (13), the event${\gamma}_{e2e}^{m}<1$ is equivalent to
Therefore,$\text{Pr}\left[{\gamma}_{e2e}^{m}<1\right]$ can be calculated as
where$X={\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}},Y={\gamma}_{{r}_{m}d}$, and$Z={\gamma}_{{r}_{m}e}$. The probability in the second integral in (22) can be rewritten as
which is always zero for y > z. By inserting this result into (22), we have
Combing (24) with (20), the exact expression for the intercept probability can be given by
4.3 Diversity order
In order to gain some useful insights into the system performance, we proceed to analyze the achievable diversity order. Since the the intercept probability is not a function of the average SNR, the traditional definition of diversity order is not applicable here. Instead, we adopt the definition of generalized diversity order given in[32], which is formulated as
where κ_{ de } = μ_{ sd }/μ_{ se } is known as the maintoeavesdropper ratio (MER), defined as the ratio of the average channel gain of the sourcedestination link to that of the sourcetoeavesdropper link.
To simplify the discussions, we assume that there is only one source node. Denoting${\mu}_{{r}_{m}d}={\mu}_{\mathit{\text{sd}}}{\alpha}_{{r}_{m}d}$ and${\mu}_{{r}_{m}e}={\mu}_{\mathit{\text{se}}}{\alpha}_{{r}_{m}e}$, the intercept probability in (25) can be rewritten as
where we have introduced α_{ m } to represent$\frac{{\alpha}_{{r}_{m}d}}{{\alpha}_{{r}_{m}e}}$.
Based on the calculations above, the diversity order can be derived as
5 Simulation results and discussions
In this section, we present the simulation results to validate the proposed sourcerelay selection scheme. In the following simulations, all the nodes (including the sources, the relays, the destination, and the eavesdropper) are distributed in a 2D plane. The direct links of S_{ k } → D and S_{ k } → E are assumed to be absent for all k’s, and the the channel gains are modeled according to the system model in Section 2. To be specific, h_{ ij } ∼ CN(0,μ_{ ij }), where${\mu}_{\mathit{\text{ij}}}={d}_{\mathit{\text{ij}}}^{\theta}$ with d_{ ij } being the distance between any node pair (i,j) and θ being the path loss exponent. In our simulations, θ is fixed as 3. Unless otherwise stated, the target secrecy rate R_{S} is set to be 0.1 bit/s/Hz, and the notation ‘SNR’ is used to represent the ratio of P versus N_{0}, i.e., ρ in the previous sections.
In Figures2 and3, we consider the system with three sources and two relays, i.e., K = 3 and M = 2. These nodes are uniformly generated in the circle with center (0,0) and radius 1. The destination and the eavesdropper are located at (2,0) and (2,2), respectively. Figure2 shows the SOPSNR curves for the proposed antieavesdropping selection scheme and the conventional joint sourcerelay selection scheme[17]. The theoretical result is also given to verify the correctness of the analysis in Section 4.1. From Figure2, it can be seen that by taking the security constraints into account, the proposed scheme brings nonnegligible gains compared to the conventional scheme, which only considers the channel qualities regarding the legitimate links. In addition, there is an excellent match between the theoretical curve and the simulated one for medium to high SNR values, implying the soundness of the theoretical analysis.
In Figure3a, we compare the ergodic secrecy capacity of the proposed scheme (C_{1}) and that of the conventional scheme (C_{2}). To illustrate the capacity loss incurred by the secrecy constraint, we calculate the ergodic capacity for the system without eavesdroppers (C_{0}) and present the differences C_{0}C_{1} and C_{0}C_{2} in Figure3b^{a}. One can observe from Figure3a that the proposed scheme outperforms the conventional scheme in terms of the secrecy capacity. However, the secrecy capacities of both the two schemes almost saturate as the SNR tends to infinity. This is because that as SNR gets larger, the achievable rate of the legitimate link as well as the eavesdropper link increases. Comparably, without the existence of the eavesdroppers, the system capacity increases linearly with SNR, which is due to the multiuser diversity gain[17]. This explains the phenomenon in Figure3b, which clearly reflects the capacity penalty to support the secrecy constraints.
Figure4 plots the system intercept probability as a function of the MER κ_{ de }. In this figure, we assume K = 1 and fix SNR to be 20 dB. The source node and destination node are located at (0,0) and (2,0), respectively. The location of the eavesdropper is determined according to the value of κ_{ de }. Other simulation parameters are the same as those for producing the results in Figures2 and3. From Figure4, it can be seen that for various values of M, the theoretical results exactly match the simulated ones, indicating the correctness of the performance analysis in Section 4.2. In addition, the slopes of the curves illustrate that the diversity order of M is achieved by our protocol, which is in accordance with the analysis in Section 4.3.
In Figures5,6,7 and8, the impact of some key parameters on the system secrecy performance will be examined. In these figures, we locate the K = 3 sources at$\left(\frac{1}{\sqrt{2}},\frac{1}{\sqrt{2}}\right)$,$\left(\frac{1}{\sqrt{2}},0\right)$, and$\left(\frac{1}{\sqrt{2}},\frac{1}{\sqrt{2}}\right)$. The M = 2 relays are distributed at$\left(\frac{1}{2},\frac{1}{2}\right)$ and$\left(\frac{1}{2},\frac{1}{2}\right)$. In Figures5 and6, the positions of the destination and the eavesdropper are fixed as (2,0) and (2,2), respectively. In Figures7 and8, the destination is also located at (2,0), whereas the eavesdropper’s position varies within the rectangular region [3,3] × [3,3].
Figure5 presents the curve of the system secrecy outage probability and exhibits how it varies with the target secrecy rate R_{S}. In this figure, five representative SNR values are considered. As expected, when the target rate increases, the SOP increases as well.
In Figure6, the effect of the power allocation ratio on the achievable SOP is investigated. Specifically, given the total transmit power P_{tot}, we allocate α P_{tot} to the selected source, and (1  α)P_{tot} to the selected relay. As α changes from 0 to 1, the SOP as a function of α is shown in Figure6. Here, we plot a set of SOP curves, each corresponding to a specific SNR value. It should be pointed out that in Figure6, the notation ‘SNR’ represents the ratio of the total transmit power for two phases versus N_{0}, which is different from the previous figures. An important observation from Figure6 is that in order to optimize the system performance, α should be neither too large nor too small. The reasons can be briefly given as follows. If α is too large, the relaydestination link will be in poor channel quality, which significantly limits the achievable rate at the destination. On the other hand, if α is too small, implying that more power is allocated to the relay node, the eavesdropper will benefit from the improved quality of the relaying channel, which also decreases the secrecy rate. From Figure6, we can also find that the system performance is satisfactory for α = 0.5. Therefore, the equal power allocation scheme, which is assumed in our work, is nearoptimal despite its simplicity.Figure7 shows the relationship between the eavesdropper’s location and the intercept probability. From this figure, we can observe that the intercept probability increases significantly when the eavesdropper moves towards the relay nodes. This is obvious because the closer the eavesdropper to the relays, the better the channel quality of the relayeavesdropper link. Figure8 presents the secrecy outage probability versus the eavesdropper’s location. As expected, the impact of the eavesdropper’s location on the SOP is similar to that on the intercept probability.
6 Conclusions
In this paper, a joint sourcerelay selection scheme is proposed for vehicular networks under eavesdropping attacks. The proposed scheme maximizes the instantaneous secrecy rate of the system and, hence, can minimize the achievable secrecy outage probability. We present the selection criterion and also give a lowcomplexity method to realize this criterion in a distributed manner. The system performance is analyzed in terms of the secrecy outage probability, the intercept probability, and the achievable diversity order. Finally, the effectiveness of the proposed scheme and the correctness of the theoretical analysis are verified through extensive simulations.
There are several interesting issues worthy of further investigations. For example, in this work, we assume that the channel gains regarding the eavesdropper’s link is available, which may not be realistic for some scenarios where the eavesdroppers are passive entities. Besides that, it will be of practical significance to generalize the proposed work to the systems with multiple eavesdroppers and (or) multiple destinations.
Endnote
^{a}For the multisource multirelay network without eavesdroppers, the best sourcerelay pair is selected according to the method in[17].
References
 1.
Hartenstein H, Laberteaux KP: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag 2008, 46(6):164171.
 2.
Karagiannis G, Altintas O, Ekici E, Heijenk G, Jarupan B, Lin K, Weil T: Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Commun. Surv. Tutor 2011, 13(4):584616.
 3.
Mecklenbrauker CF, Molisch AF, Karedal J, Tufvesson F, Paier A, Bemado L, Zemen T, Klemp O, Czink N: Vehicular channel characterization and its implications for wireless system design and performance. Proc. IEEE 2011, 99(7):11891212.
 4.
Harigovindan VP, Babu AV, Jacob L: Ensuring fair access in IEEE 802.11pbased vehicletoinfrastructure networks. EURASIP J. Wireless Commnun. Netw 2012, 2012: 17. doi:10.1186/1687–14992012168 10.1186/16871499201217
 5.
Zhou T, Sharif H, Hempel M, Mahasukhon P, Wang W, Ma T: A novel adaptive distributed cooperative relaying MAC protocol for vehicular networks. IEEE J. Select. Areas Commun 2011, 29(1):7282.
 6.
Nzouonta J, Rajgure N, Wang G, Borcea C: VANET routing on city roads using realtime vehicular traffic information. IEEE Trans. Veh. Technol 2009, 58(6):36093626.
 7.
Eiza MH, Ni Q: An evolving graphbased reliable routing scheme for VANETs. IEEE Trans. Veh. Technol 2013, 62(4):14931504.
 8.
Lin JC, Lin CS, Liang CN, Chen BC: Wireless communication performance based on IEEE 802.11p R2V field trails. IEEE Commun. Mag 2012, 50(5):184191.
 9.
Sendonaris A, Erkip E, Aazhang B: User cooperation diversity  part I: system description. IEEE Trans. Commun 2003, 51(11):19271938. 10.1109/TCOMM.2003.818096
 10.
Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans. Inf. Theory 2004, 50(12):30623080. 10.1109/TIT.2004.838089
 11.
Seddik KG, Ibrahim AS, Liu KJR: Transmodulation in wireless relay networks. IEEE Commun. Lett 2008, 12(3):170172.
 12.
Wang T, Giannakis GB, Wang R: Smart regenerative relays for linkadaptive cooperative communications. IEEE Trans. Commun 2008, 56(11):19501960.
 13.
Zhang W, Letaief KB: Fullrate distributed spacetime codes for cooperative communications. IEEE Trans. Wireless Commun 2008, 7(7):24462451.
 14.
Bletsas A, Khisti A, Reed DP, Lippman A: A simple cooperative diversity method based on network path selection. IEEE J. Select. Areas Commun 2006, 24(3):659672.
 15.
Ding Z, Leung KK, Goeckel DL, Towsley D: On the study of network coding with diversity. IEEE Trans. Wireless Commun 2009, 8(3):12471259.
 16.
Zeng M, Zhang R, Cui S: On the design of distributed beamforming for twoway relay networks. IEEE Trans. Signal Process 2011, 59(5):22842295.
 17.
Sun L, Zhang T, Lu L, Niu H: On the combination of cooperative diversity and multiuser diversity in multisource multirelay wireless networks. IEEE Signal Process Lett 2010, 17(6):535538.
 18.
Ding H, Ge J, da Costa DB, Jiang Z: A new efficient lowcomplexity scheme for multisource multirelay cooperative networks. IEEE Trans. Veh. Technol 2011, 60(2):716722.
 19.
Seyfi M, Muhaidat S, Liang J, Uysal M: Relay selection in dualhop vehicular networks. IEEE Signal Process Lett 2011, 18(2):134137.
 20.
Ge Y, Wen S, Ang YH, Liang YC: Optimal relay selection in IEEE 802.16j multihop relay vehicular networks. IEEE Trans. Veh. Technol 2010, 59(5):21982206.
 21.
Ding Z, Leung KK: Crosslayer routing using cooperative transmission in vehicular adhoc networks. IEEE J. Select. Areas Commun 2011, 29(3):571581.
 22.
Ng SC, Zhang W, Zhang Y, Yang Y, Mao G: Analysis of access and connectivity probabilities in vehicular relay networks. IEEE J. Select. Areas Commun 2011, 29(1):140150.
 23.
Wyner AD: The wiretap channel. Bell Syst. Tech. J 1975, 54(8):13551387. 10.1002/j.15387305.1975.tb02040.x
 24.
Csiszár I, Körner J: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24(3):339348. 10.1109/TIT.1978.1055892
 25.
Bloch M, Barros J, Rodrigues MRD, McLaughlin SW: Wireless informationtheoretic security. IEEE Trans. Inf. Theory 2008, 54(6):25152534.
 26.
Tekin E, Yener A: The general Gaussian multipleaccess and twoway wiretap channels: achievable rates and cooperative jamming. IEEE Trans. Inf. Theory 2008, 54(6):27352751.
 27.
Krikidis I, Thompson JS, McLaughlin S, Grant PM: A feedbackbased transmission for wireless networks with energy and secrecy constraints. EURASIP J. Wireless Commun. Netw 2011, 2011: 11. doi:10.1155/2011/313269 10.1186/16871499201111
 28.
Dong L, Han Z, Petropulu AP, Poor HV: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process 2010, 58(3):18751888.
 29.
Krikidis I, Thompson JS, McLaughlin S: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wireless Commun 2009, 8(10):50035011.
 30.
Liu Y, Li J, Petropulu AP: Destination assisted cooperative jamming for wireless physicallayer security. IEEE Trans. Inf. Forensic Secur 2013, 8(4):682694.
 31.
Sun L, Du Q, Ren P: Secrecyenhanced data dissemination using cooperative relaying in vehicular networks. Int. J. Distrib. Sens. Netw 2013, 2013: 505831.
 32.
Zou Y, Wang X, Shen W: Optimal relay selection for physicallayer security in cooperative wireless networks. IEEE J. Select. Areas Commun 2013, 31(10):20992111.
 33.
Bao V, LTrung N, Debbah M: Relay selection schemes for dualhop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wireless Commun 2013, 12(12):60766085.
 34.
Ikki S, Ahmed MH: Performance analysis of cooperative diversity wireless networks over Nakagamim fading channel. IEEE Commun. Lett 2007, 11(4):334336.
 35.
Xu F, Lau FCM, Zhou QF, Yue DW: Outage performance of cooperative communication systems using opportunistic relaying and selection combining receiver. IEEE Signal Process Lett 2009, 16(4):237240.
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (No. 61201207), the National Science and Technology Major Project of China (No. 2013ZX03003004003), the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (No. 2012D04), and the Fundamental Research Funds for the Central Universities of China.
Author information
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
About this article
Cite this article
Sun, L., Ren, P. & Du, Q. Distributed sourcerelay selection scheme for vehicular relaying networks under eavesdropping attacks. J Wireless Com Network 2014, 109 (2014). https://doi.org/10.1186/168714992014109
Received:
Accepted:
Published:
Keywords
 Vehicular relaying networks
 Cooperative communications
 Physical layer security
 Sourcerelay selection
 Distributed implementation