 Research
 Open access
 Published:
Virtual fullduplex bufferaided relay selection schemes for secure cooperative wireless networks
EURASIP Journal on Wireless Communications and Networking volume 2022, Article number: 44 (2022)
Abstract
This paper considers secure communication in bufferaided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes. It is assumed that the relays employ the randomizeandforward (RF) strategy such that the eavesdropper can only decode the signals received in the two hops independently. Two cooperative secure transmission schemes, i.e., hybrid imitating fullduplex maxmaxratio relay selection (HyIFD) scheme and thresholdbased link selection (TBLS) scheme are proposed for adaptive and fixedrate transmissions aiming at improving the secrecy throughput and secrecy outage probability, respectively. For adaptiverate transmissions (ART), the proposed scheme switches among three substrategies according to different conditions such as the number of relays and transmit power. Different relays are chosen for reception and transmission according to the ratio of the legitimate channels to the eavesdropper channels to imitate the fullduplex transmission mode. For fixedrate transmissions (FRT), a hybrid HD/FD transmission mode is designed to increase the transmission probabilities of two hops under the transmission quality constraint. Two parameters are introduced and optimized to minimize the secrecy outage probability. A suboptimal TBLS (SOTBLS) scheme is also given. Theoretical analysis of the secrecy throughput and the secrecy outage probability are provided and the closedform expressions are derived, and verified by numerical results. It is shown that the proposed schemes outperform benchmark schemes in terms of secrecy throughput and secrecy outage probability.
1 Introduction
1.1 Motivation
Wireless communication technologies play an important role in military and civil applications, and have become a necessitative part of our daily life [1]. However, the broadcast nature of wireless medium makes the communication over wireless networks susceptible to the interception attacks from unauthorized users (eavesdroppers), and thus guaranteeing the security of wireless communication has become an increasingly urgent demand [2].
Traditionally, the security mechanism of wireless communication network is mainly learned from wired computer network, in which the problem of information confidentiality is mainly solved by encryption algorithms based on symmetric key and public key system. The security of encryption algorithms is guaranteed by the extremely high computational complexity required to crack the password [3]. However, with the improvement of computing capability and speed of the devices, more and more complicated algorithms are required to guarantee the same level of security as before.
On the other hand, physical layer security techniques provide a new way to enhance the security of wireless transmission from a new perspective. The core idea is to improve the information confidentiality from coding in information theory, which is highly promising to guarantee everlasting secure communication for wireless networks and has received a lot of attentions [4,5,6,7,8,9, 16,17,18,19,20,21,22,23,24,25]. In the seminal work by Wyner [5], the wiretap channel model was introduced and the possibility of creating perfectly secure communication links without relying on secret keys was demonstrated.
Moreover, cooperative communication is also a building block of current communication systems. The main idea of this technique is to enhance the system performance by providing additional paths between the source and the destination via the relays. It is worth noting that, cooperative relays can provide additional degrees of freedom and more flexible implementations for improving physical layer security. In [6], the relayeavesdropper channel was studied and different node cooperation strategies were analyzed. It has been shown that cooperative communication provides an effective way to improve the secrecy capacity. On top of that, several relay strategies have been designed in literature [7,8,9].
Meanwhile, the use of buffers at the relays makes it possible to store packets and transmit them in more favorable wireless conditions, which greatly increases the network’s resiliency, throughput and diversity, and has therefore been widely applied in cooperative networks to improve the system performance [10,11,12,13,14,15]. For instance, in [10], the authors applied the deep reinforcement learning for the relay selection in the delayconstrained bufferaided relay networks. Two asynchronous learning algorithms for joint hybrid nonorthogonalmultipleaccess (NOMA)/OMA relay selection and power allocation in bufferaided delayconstrained networks were proposed in [11]. A bufferaided relay selection scheme was presented in [12] to seamlessly include both NOMA and OMA transmission in the Internet of Things. The authors in [13] designed the bufferaided adaptive transmission scheme for the bufferaided wireless powered cooperative NOMA relaying network. A novel bufferaided relay selection scheme which is able to balance the outage performance and packet delay was proposed in [14]. In [15], NOMA, bufferaided fullduplex (FD) relaying and broadcasting were combined to improve the relay selection with low complexity.
Furthermore, the bufferaided relay is widely used in the research area of physical layer security due to the advantage of improving the secrecy performance [16,17,18,19,20,21,22,23,24,25]. For instance, in [16], we have designed the link selection and power control policies for secure communication over a bufferaided two hop communication link. In [17], the multiagent deep reinforcement learning based joint design of relay selection and intelligent reflecting surface reflection coefficients was investigated in IRSassisted secure bufferaided cooperative networks. In [18], the authors proposed several secure transmission schemes for an energyharvesting based secure twoway relay network. The use of data and energy buffering in wireless powered relays was proposed while scheduling schemes were also designed to increase the secrecy throughput in [19]. In [20], the authors applied the reinforcement learning in the joint relay selection and power allocation in the secure cognitive radio (CR) relay network, where the data buffers and fullduplex jamming were applied at the relay nodes.
In general, there are three main techniques utilized to protect the confidential messages and improve the secrecy capacity in a cooperative network, including the beamforming [26, 27], the jamming [28, 29] and the relay selection [6, 24, 30]. In this work, we investigate the relay selection policies for achieving better security performance.
Note that a relay usually operates in either FD or halfduplex (HD) mode. In FD relaying, the relays transmit and receive at the same time and frequency, at the cost of hardware complexity [31, 32]. In HD relaying, relays are incapable of transmitting and receiving simultaneously, thus leading to reduced capacity of the whole network. Hence, we expect to achieve virtual FD communication with HD relays via link selection. Inspired by the space fullduplex maxmax relay selection (SFDMMRS) scheme in [33], which mimics FD relaying with HD relays via link selection. In this paper, we propose two novel maxratio relay selection schemes for adaptive and fixedrate secure transmission in HD randomizeandforward (RF) bufferaided cooperative network with an eavesdropper which can intercept signals from both the source and relay nodes. It is worth noting that in such a scenario, the sourcetorelay and relaytodestination transmissions have different statistical characterizations even if the channel statistics are the same.

The overall basic idea of the proposed hybrid imitate fullduplex (HyIFD) maxratio relay selection scheme is that different relays are chosen for simultaneously reception and transmission according to the ratio of the legitimate channels to the eavesdropper channels to imitate the fullduplex transmission mode. In view of the asymmetry of twohop channel in secure communication under the full CSI assumption, the proposed HyIFD scheme switches among three substrategies with different preference on the twohops according to different conditions such as relay numbers and transmit power aiming at improving the secrecy throughput performance for adaptive rate transmissions (ART).

The overall basic idea of the proposed thresholdbased link selection (TBLS) scheme is that a hybrid HD/FD link selection policy is designed to increase the transmission probabilities of two hops under the transmission quality constraint. Two nonnegative scalars were introduced to determine the threshold for choosing when the relay listens or transmits and optimized to assess the quality of both the \(SR\) link and the \(RD\) link in order to improve the secrecy outage probability performance for fixed rate transmissions (FRT).
A suboptimal TBLS (SOTBLS) scheme is then considered as a good alternative to TBLS with lower requirements for computational complexity by setting appropriate values for these two parameters. Numerical results in accordance with theoretical analysis show the superiority of the proposed schemes over the existing maxratio schemes in terms of secrecy throughput and secrecy outage probability.
1.2 Contributions
The main contributions of this paper can be summarized as follows:

1
We propose a novel HyIFD maxratio relay selection scheme for ART in a secure bufferaided RF cooperative system, in which different relays are selected for simultaneously reception and transmission to imitate the fullduplex transmission. Also, we derive the associated closedform expressions for the secrecy throughput and obtain the asymptotic limit.

2
We propose a TBLS maxratio relay selection scheme for FRT in a secure bufferaided RF multirelay network, where HD/FD modes are switched to maximize the transmission opportunity of two hops under transmission quality constraint. We derive the closedform expressions for the secrecy outage probability of the TBLS scheme. We also propose a suboptimal TBLS scheme with performance close to the optimal one.

3
Numerical results in accordance with theoretical analysis validate that the proposed schemes can further improve the secrecy throughput and secrecy outage probability performance compared with benchmark schemes. It is also shown that the relay with the best channel quality for the firsthop is preferred in the highSNR regime while the relay with the best channel quality in the secondhop is always favored in the lowSNR regime.
1.3 Organization
The reminder of this paper is organized as follows. Section 2 presents the system model. Two existing maxratio relay selection schemes for secure bufferaided cooperative wireless networks are briefly introduced in Sect. 3. Section 4 gives the introduction of the HyIFD scheme, comprehensive analysis of the achievable secrecy throughput and the asymptotic closedform expressions for the throughput performance limit. Section 5 proposes a TBLS scheme and analyzes the secrecy outage probability. Numerical results are provided in Sect. 6. Finally, conclusions are drawn in Sect. 7 with some lengthy proofs in the Appendices.
2 System model
We consider a HD twohop wireless system formed by one source node S, a set of K RF relays \(\{R_{1},\ldots ,R_{K}\}\), one destination node D, and one eavesdropper E which can intercept signals from both the source and relay nodes, as shown in Fig. 1. All nodes are assumed to be equipped with a single antenna. Under the RF decoding strategy, the relay uses a codebook different from that used by source, so the eavesdropper can only independently decode the message received in the two hops [9]. We assume that there is a buffer of infinite length at each relay such that each relay can store the information received from the source and transmit it in later time.
We assume that the distance between the source and destination is large enough and the communications can be established only via relays. We use \(h_{sr_{k}}(t)\), \(h_{se}(t)\), \(h_{r_{k}d}(t)\) and \(h_{r_{k}e}(t)\) to denote the channel coefficients for \(SR_k\), \(SE\), \(R_{k}D\) and \(R_{k}E\) links at time t, respectively. The channel is assumed to be stationary and ergodic. We consider the Rayleigh block fading where the channel coefficients remain constant during one time slot and vary independently from one to another. In addition to fading, all wireless links are impaired by additive white Gaussian noise (AWGN) with variance \(N_0\). Without loss of generality, we assume that the noise variances at the receiving nodes are equal to one, i.e., \(N_{0}=1\). The transmit power of the source and relays are assumed to be \(P_S\) and \(P_R\), respectively.
We assume that all \(SR_k\), \(SE\), \(R_{k}D\), and \(R_{k}E\) links are independent and identically distributed (i.i.d.) fading, which is a typical assumption to facilitate analysis [21]. We assume that the mean of \(SR_k\), \(SE\), \(R_{k}D\) and \(R_{k}E\) channel gains are \({{\mathbb {E}}}[h_{sr_{k}}^{2}]=\gamma _{sr}\), \({{\mathbb {E}}}[h_{se}^{2}]=\gamma _{se}\), \({\mathbb E}[h_{r_{k}d}^{2}]=\gamma _{rd}\) and \({\mathbb E}[h_{r_{k}e}^{2}]=\gamma _{re}\), respectively, where \({\mathbb E}[\cdot ]\) denotes the expectation. Same as [16] and [24], we assume the instantaneous channel state information (CSI) of legitimate channels (i.e., \(h_{sr_{k}}^{2}\) and \(h_{r_{k}d}^{2}\)) are always known. Regarding the knowledge of eavesdropper CSI, we consider the perfect CSI case where the instantaneous eavesdropper CSI (i.e., \(h_{se}^{2}\) and \(h_{r_{k}e}^{2}\)) are known. Note however that, when the eavesdropper is passive and its behavior can not be monitored, the assumption of the exact CSI of the eavesdropper’s link might be unrealistic. We also consider the partial CSI case where only the average gains of the eavesdropping channels are available. Since the derivations are similar and much more simple, they are omitted in this paper due to the limit of space.
3 Existing relaying schemes
In this part, we review two existing relay selection protocols for secure bufferaided cooperative wireless networks.
3.1 Maxminratio relay selection
With the RF relaying strategy applied at the relays, the instantaneous secrecy rate for the bufferaided multirelay systems is obtained as [6]
where \([\cdot ]^{+}=\max \{\cdot ,0\}\). The secrecy throughput is given by \({{\mathbb {E}}}[C_{k}]\). The best relay node can be selected with the maximum \(C_{k}(t)\). This scheme is termed as the maxminratio relay selection. For convenience in development, the time index t is ignored in the rest of the paper unless necessary.
3.2 Maxlinkratio relay selection
This protocol chooses the best link with the highest gain ratio among all available sourcetorelay and relaytodestination links [24]. If the exact knowledge of all channels, including the eavesdropping channels \(h_{se}\) and \(h_{r_{k}e}\), are available, the maxlinkratio selects the best relay \(R_k\) as
4 The proposed methods for adaptiverate transmissions
In this section, we propose a HyIFD relay selection scheme with three modes for ART and analyze its performance in terms of secrecy throughput. Based on the overall system power constraint, we define the maximal achievable secrecy throughput and obtain the asymptotic characterizations of the maximum achievable secrecy throughput in the highSNR regime.
4.1 Three substrategies of HyIFD policy
In ART, the source and relays can adjust their transmission rate according to the channel gains without causing outages. In view of the asymmetry of twohop channel in secure communication under the full CSI assumption, we have three different modes with different preference on the twohops.
4.1.1 Mode I
In mode I, the two hops are given the same priority and the relays with the best bottleneck link of the two hops are chosen in each time slot. Specifically, this mode is similar to [33] whereas the eavesdropper channel is also included. First, we set the best and the second best relay for reception \(R_{r_{1}}\) and \(R_{r_{2}}\) respectively based on
and then set the best and the second best relay for transmission \(R_{t_{1}}\) and \(R_{t_{2}}\) respectively according to
Denote
Let
When the same relay share the best \(SR\) and the best \(RD\) channel, we would like to choose between the following two possibilities. One is to select the relay with the second best \(SR\) channel \(R_{r_{2}}\) and the relay with the best \(RD\) channel \(R_{t_{1}}\) for reception and transmission, respectively. The other is to select the relay with the best \(SR\) channel \(R_{r_{1}}\) and the relay with the second best \(RD\) channel \(R_{t_{2}}\) for reception and transmission, respectively. And the value Q defined here is used to indicate that which of the two options with the better bottleneck link.
Then, in the mode I, the relays selected for reception \(R_{{\bar{r}}}\) and transmission \(R_{{\bar{t}}}\) are chosen as
4.1.2 Mode II
In the mode II, the best \(SR\) link will always be selected if the same relay is the best relay for both the SR and RD links, and the relays selected for reception \(R_{{\bar{r}}}\) and transmission \(R_{{\bar{t}}}\) are chosen as
4.1.3 Mode III
In the mode III, the \(RD\) link is given higher priority, and the relays selected for reception \(R_{{\bar{r}}}\) and transmission \(R_{{\bar{t}}}\) are chosen as
Besides, we should note that because of the buffers used at the relay, the proposed scheme introduces a delay in the network. It is expected that when more relays are employed in the network and no delay constraint is imposed, some packets may experience increased delays. The better secrecy throughput performance may at the cost of higher average delay. The analysis of involving average delay in the design would be interesting and are left for future research. For instance, statistical delay constraints can be considered [34,35,36].
4.2 Secrecy throughput analysis
In this part, we perform the secrecy throughput analysis for the above three modes, respectively.
4.2.1 Mode I
Considering that we employ the RF relaying strategy [8], the eavesdropper cannot combine the data transmitted by source and relay at each time slot. Same as [33], we assume that there is no interrelay links and also no interrelay interference when the receiving and transmitting relays are active in the same timeslot. In practice, this assumption is valid if the relays are located far away from each other or if fixed infrastructurebased relays with directional antennas are used [37]. Therefore, when either the source wishes to transmit confidential information to the relay or the relay sends private message to the destination, it can be viewed as a single hop transmission in the presence of the interference from the other hop.
Assuming that the eavesdropper employs decoding with successful interference cancellation and the decoding order at the eavesdropper is not known at the source or the relays, the maximum eavesdropping data rate is assumed to be upperbounded by \(\log _{2}(1+P_{S}h_{se}^{2})\) for the link \(SE\), and \(\log _{2}(1+P_{R}h_{r_{k}e}^{2})\) for the link \(R_{k}E\). If the relay \(R_k\) is selected for the data transmission, the instantaneous secrecy rate of the first and second hop are lowerbounded by
respectively. In the following, we adopt the lowerbound for the analysis, which represents the worst case and specifies the minimum throughput achievable.
The secrecy throughput for the bufferaided multirelay system is given by [38]
where \({{\mathbb {E}}}[C_{SR}]\) and \({{\mathbb {E}}}[C_{RD}]\) denote the average secrecy throughput of the \(SR\) and \(RD\) links, respectively.
The average secrecy rate of the first and second hop, \({\overline{C}}_{k}\), \(k\in \{SR,RD\}\), can be expressed as [33, (9)]
where \(p_s\) denote the probability that \(r_1=t_1\), \({\overline{C}}_{k,1}\) is the average throughput of the best channel of the first and second hop, \(k\in \{SR,RD\}\), \({\overline{C}}_{k,21}\) and \({\overline{C}}_{k,22}\) denote the average throughput of the best channel and the second best channel of the first and second hop when \(Q>0\) and \(Q<0\), respectively.
Note that our selection policy involves eight independent channel coefficients, and hence finding the closedform expressions is very tricky, if not intractable. So we derive the approximate closedform expressions for the average secrecy throughput of the mode I.
The approximate secrecy throughput for the mode I is given by
Proposition 1
The average secrecy rate of the first hop for mode I can be approximately expressed as
where \(p_s\) denotes the probability that \(r_1=t_1\), \(p_{12}\) denotes the probability that \(Q>0\), \(p_{21}\) denotes the probability that \(Q<0\), i.e., \(p_{21}=1p_{12}\), \({{\mathbb {E}}}[C_{SR,1}]\) and \({{\mathbb {E}}}[C_{SR,2}]\) denote the average secrecy capacity of the best and the second best \(SR\) channel, respectively. Similarly, the average secrecy rate of the second hop for mode I can be approximately given as
where \({{\mathbb {E}}}[C_{RD,1}]\) and \({{\mathbb {E}}}[C_{RD,2}]\) denote the average secrecy capacity of the best and the second best \(RD\) channel, respectively.
Proof
Based on (12), we can divide the time index t into three cases correspondingly. If \(r_{1}\ne t_{1}\), we select the relay \(R_{r_1}\) for reception and the relay \(R_{t_1}\) for transmission. We denote such indices as \(t\in \Omega _{1}\). If \(r_{1}=t_{1}\), we need to determine whether Q is positive or negative. If \(Q>0\), we select the relay \(R_{r_1}\) for reception and the relay \(R_{t_2}\) for transmission. We denote such time indices as \(t\in \Omega _{2}\). Inversely, if \(Q<0\), we select the relay \(R_{r_2}\) for reception and \(R_{t_1}\) for transmission, and denote such time indices as \(t\in \Omega _{3}\). Let \(N_{1}\) denote the number of times in N transmissions that \(r_{1}=t_{1}\), and hence \(N_{12}\) denote the number of time instances in \(N_{1}\) transmissions that \(Q>0\), and \(N_{21}\) denote the number of time instances in \(N_{1}\) transmissions that \(Q<0\), i.e., \(p_{s}=\frac{N_{1}}{N}\), \(p_{12}=\frac{N_{12}}{N_{1}}\), and \(p_{21}=\frac{N_{21}}{N_{1}}=1p_{12}\).
The average secrecy rate of the first hop is given by
The average secrecy rate of the second hop can be proved by the same logic. \(\square\)
Proposition 2
Given \(P_{S}\) and \(P_{R}\), the detailed expressions for the terms in (20) and (21) can be expressed as follows:
where
Proof
Please see Appendix A. \(\square\)
Remark 1
Note that \({{\mathbb {E}}}[C_{SR}^{\text {I}}]\) and \({\mathbb E}[C_{RD}^{\text {I}}]\) can be obtained by substituting the above equations into (20) and (21). Finally, the approximate closedform expression of the secrecy throughput for the mode I is obtained by substituting (20) and (21) into (19).
4.2.2 Mode II
The secrecy throughput for the mode II can be expressed as
Based on (13), the average secrecy rate of the first hop for the mode II is given by
And the average secrecy rate of the second hop for the mode II can be expressed as
Note that \({{\mathbb {E}}}[C_{SR}^{\text {II}}]\) and \({\mathbb E}[C_{RD}^{\text {II}}]\) can be obtained by substituting the Eqs. (23), (24), (26) and (27) into (32) and (33), respectively. Finally, the approximate closedform expression of the secrecy throughput for the mode II is obtained by substituting (32) and (33) into (31).
4.2.3 Mode III
The secrecy throughput of mode III can be expressed as
Based on (14), the average secrecy rate of the first hop for the mode III can be expressed as
And the average secrecy rate of the second hop for the mode III can be expressed as
Note that \({{\mathbb {E}}}[C_{SR}^{\text {III}}]\) and \({\mathbb E}[C_{RD}^{\text {III}}]\) can be obtained by substituting the Eqs. (23), (24), (25) and (26) into (35) and (36) respectively. Finally, the approximate closedform expression of the secrecy throughput for mode III is obtained by substituting (35) and (36) into (34).
It is worth noting that the values of \(C_{\text {I}}\), \(C_{\text {II}}\), and \(C_{\text {III}}\) only depend on the transmit power values, the total number of relays K, and the channel statistics. Therefore, given these parameters, we can compute the values of \(C_{\text {I}}\), \(C_{\text {II}}\), and \(C_{\text {III}}\) offline and conduct the following design on the optimal power allocation in advance.
Given the total power constraint denoted as SNR of the network, we can allocate the total power to the source and relays to achieve the best performance.

HyIFD: We ought to allocate transmit energy to source and K relays. The sources work for all time slots, therefore, we should have \((P_{S}+KP_{R}) \le \mathrm{SNR}\).

MaxLinkRatio: We are supposed to allocate transmit power to the source and K relays for each time slot to enable each link to be capable of being selected for reception or transmission, so we should have \((P_{S}+KP_{R}) \le \mathrm{SNR}\) as well.

MaxMinRatio: We should allocate transmit energy to the source and K relays, albeit the data transmission occupies two time slots, so we should have \(\frac{1}{2}(P_{S}+KP_{R}) \le \mathrm{SNR}\).
Consider the derived expressions of secrecy throughput. Once given the total power SNR, it is obvious that when \(P_{S}\) is small, the throughput is limited by first hop. On the other hand, when \(P_R\) is small, the second hop will be the bottleneck of the system. Therefore, there is always an optimal power allocation that maximizes the secrecy throughput.
Definition 1
The maximum secrecy throughput of the mode I is given by
Similarly, we can define the maximum secrecy throughput for mode II and mode III, which can be denoted as \(C_{\text {II}}^{\max}\) and \(C_{\text {III}}^{\max}\), respectively. And the maximum secrecy throughput for the maxminratio scheme and maxlinkratio scheme can be defined in the same way.
4.3 HyIFD policy
The proposed HyIFD scheme can finally be expressed as
That is, the HyIFD policy selects mode i which maximizes the secrecy throughput.
4.4 Asymptotic analysis
In this part, to see the performance gain more clearly, we perform the asymptotic analysis for the maximum achievable secrecy throughput of the proposed HyIFD scheme in the highSNR regime. Let \({\widehat{C}}_{i}^{j}\) denote the average secrecy rate of the ith hop for mode j of the proposed HyIFD scheme in the high SNR regime, with \(i\in \{SR,RD\}\) and \(j\in \{\text {I},\text {II},\text {III}\}\). We have the following result.
Theorem 1
The maximum achievable secrecy throughput of the proposed mode I as the total power SNR increases, is upperbounded by \(C_{\text {I}}^{limit}\), which is given by
where
with
Proof
Please see Appendix B. \(\square\)
Corollary 1
The performance limit to the maximum achievable secrecy throughput for the mode II and mode III can be obtained by
where
Note that \({\widehat{C}}_{SR}^{\text {II}}\) and \({\widehat{C}}_{RD}^{\text {II}}\) can be obtained by substituting the Eqs. (23), (42), (44) and (45) into (51) and (52), respectively. Then the asymptotic closedform expression for the maximum achievable secrecy throughput limit of mode II is obtained by substituting (51) and (52) into (49). And \(C_{\text {III}}^{limit}\) can be obtained in a similar way.
Proof
The proof is similar to that for mode I and hence is omitted here.
Finally, the closedform expressions for the limit to the maximum achievable secrecy throughput of the proposed HyIFD scheme, which is denoted as \(C_{HyIFD}^{limit}\), can be obtained by
\(\square\)
It can be seen from the above formula that when the transmit power is relatively large, the secrecy throughput no longer increases with the transmit power, but only depends on the number of available relays and channel statistics. This is easy to understand because the increase in the transmit power is beneficial not only to the legitimate receiver but also to the eavesdropper, and the secrecy throughput is limited mainly by the difference in channel quality between the legitimate channels and eavesdropper channels. It is worth noting that the designed HyIFD policy takes into account both acquiring a larger channel gain ratio and balancing the gain of the two hops by switching between the three modes according to different conditions such as transmit power and channel statistics, thus can be seen as a more flexible and comprehensive scheme for such a system.
5 The proposed methods for fixedrate transmissions
In this section, we first propose a novel link selection policy for FRT and analyze its performance in terms of secrecy outage probability (SOP). Subsequently, a suboptimal TBLS scheme with lower computational complexity is provided as well.
5.1 Link selection policy
In FRT, the source and relays transmit with a constant rate \(R_{s}\), and the relevant performance metric is the outage probability \(P_{out}\). As another the most commonly used security measure for wiretap channels, SOP provides an idea about the fraction of fading realizations for which the channel can support a certain rate (or user’s desired rate). Aiming at improving the SOP performance for FRT, we propose a TBLS scheme where two nonnegative scalars \(\lambda\) and \(\mu\) are introduced to determine the threshold for choosing when the relay listens or transmits. The conditions are used to assess the quality of both the \(SR\) link and the \(RD\) link in order to provide good SOP performance.
In the proposed TBLS scheme, the relays selected for reception \(R_{{\bar{r}}}\) and transmission \(R_{{\bar{t}}}\) are chosen as
where \(z_{r_1}\), \(z_{t_1}\), and \(z_{t_2}\) have been defined in (7), (9), and (10), respectively. Obviously, this scheme is a hybrid HD/FD relaying scheme, which adapts reception and transmission time slots based on channel quality. Under the premise of ensuring transmission quality, the proposed TBLS scheme selects two relays for reception and transmission respectively if possible, which considers both the transmission efficiency and security.
5.2 Secrecy outage probability analysis
In this part, we perform the SOP analysis for the proposed TBLS scheme. The SOP is defined as the probability that the instantaneous secrecy capacity falls below a target secrecy rate \(R_{s}\), i.e., the equivalent instantaneous z falls below a certain threshold \(z_{th}\) such that errorfree transmission with rate \(R_{s}\) is not possible [41], i.e., \(P_{out}= P(z\le z_{th})\).
Proposition 3
The SOP for the proposed TBLS scheme can be expressed as
where \(z_{th_1}=2^{R_{s}}\) and \(z_{th_2}=2^{2R_{s}}\).
Proof
Please see Appendix C. \(\square\)
Note that when \(\lambda =\mu =z_{th_2}\), the proposed scheme only fails to transmit data when both \(z_{r_1}\) and \(z_{t_1}\) are less than \(z_{th_2}\). This scheme reduces to a scheme similar to maxlinkratio selection scheme, the secrecy outage performance is the same, i.e., \(P_{out}=P\{ z_{r_1}<z_{th_2}, z_{t_1}<z_{th_2}\}=P\{\max \{z_{r_1},z_{t_1}\}<z_{th_2}\}\), but with one difference that, the maxlinkratio selection scheme only selects one link for one time slot while the proposed TBLS scheme selects two if possible, i.e., the transmission probabilities of the first and the second hop of TBLS are definitely higher than that of the maxlinkratio scheme, so is the throughput.
Proposition 4
Given the policy, i.e., \(\lambda\) and \(\mu\), the closedform expressions for the SOP of the proposed TBLS scheme is given by
where
Proof
Please see Appendix D. \(\square\)
There is always an optimal pair of \(\lambda\) and \(\mu\) that minimize the SOP. That makes sense because as \(\lambda\) and \(\mu\) increase, the requirement for the quality of the transmission link is higher, and correspondingly, the outage probability of the transmission is reduced, while the probability of choosing not to transmit due to the higher transmission requirement, which is also counted as outage, is increased. So there is a tradeoff between a reduced outage probability of the transmission and an increased outage probability of no transmission due to unmet requirements, which is also confirmed in the later simulation.
It is worth noting that the values of SOP for the proposed TBLS scheme only depend on the transmit power values, the total number of relays K, the target secrecy rate \(R_{s}\) and the channel statistics, as is shown in (58). Therefore, given these parameters, we can compute the values of SOP for the proposed TBLS scheme offline and search for the optimal pair of \(\lambda\) and \(\mu\) in advance.
5.3 A suboptimal TBLS scheme
Considering that the search for the optimal pair of \(\lambda\) and \(\mu\) may bring extra computational complexity in implementation, we try to give the optimal values of \(\lambda\) and \(\mu\) from the perspective of theoretical analysis. It is however very tricky to find the minimum for such a complex ninesegment piecewise function whose stationary points are very hard to express. So we consider a suboptimal TBLS (SOTBLS) scheme, we set \(\lambda =\mu =z_{th_1}\) in the TBLS scheme proposed in the previous section.
The SOP of the proposed suboptimal TBLS scheme is given by
which can be obtained directly by the substituting \(\lambda =\mu =z_{th_1}\) into (58).
6 Results and discussion
In this section, we evaluate the proposed HyIFD scheme and TBLS scheme respectively.
6.1 The HyIFD performance
In this part, simulation results are given to verify the closedform secrecy throughput for the proposed HyIFD scheme. We assume that \(\gamma _{sr} = \gamma _{rd} = \gamma _{se} = \gamma _{re} = 2\), unless specified otherwise.
Figure 2 plots the secrecy throughput versus \(P_{S}/P_{R}\) of each scheme, where the relay number is set as \(K=5\). We assume \(\mathrm{SNR}=10\) dB. We can find that the secrecy throughput always has a peak value as \(P_{S}/P_{R}\) varies, and the proposed HyIFD scheme will work in mode I for the given setting, which achieves the largest maximum secrecy throughput. It is interesting that, each scheme does not achieve the maximum secrecy throughput when \(\frac{P_{S}}{P_{R}}=1\), i.e., \(P_{S}=P_{R}\), which would be the case for throughput maximization with symmetric channel conditions [33]. This is because, the equivalent channel distributions for the two hops is not symmetric even if the channel statistics for the links are the same, which can also be seen from (7)–(10). We also note that the analytical results obtained based on the derivation in Section III match the simulation results, which verifies the approximate closedform secrecy throughput obtained in this paper.
In Fig. 3, we compare the maximum secrecy throughput of the proposed scheme with that of two existing maxratio schemes as SNR varies, where the relay number is set as \(K=3\). It is clearly shown that the proposed HyIFD scheme switches between the three modes to achieve the best performance with power allocation. The approximate expression holds for a wide range of SNR values. Also, we can find that the secrecy throughput improvement diminishes in the highSNR regime, i.e., there is a performance limit to throughput as the transmit power increases, in consistence with the closedform expression derived in Section IIID.
Figure 4 plots the maximum secrecy throughput of each scheme versus the number of relays for \(\mathrm{SNR}=10\) dB. We can find that the proposed HyIFD scheme achieves the best performance in all cases. It is interesting that for a given SNR, the proposed scheme achieves the best performance at a mediate number of relays, and the maxlinkratio scheme achieves the best performance when \(K=4\). This is generally due to the tradeoff between the reduction in the power allocated to source and relays and the increased probability of choosing better channel as K increases considering the total power constraint.
Figure 5 shows how the proposed HyIFD scheme switches between the three modes as the SNR and the number of relays change. We can find that mode II is more preferred in the highSNR regime and mode III is more preferred in the lowSNR regime, i.e., the relay with the best channel quality for the firsthop is preferred in the highSNR regime while the relay with the best channel quality in the secondhop is always favored in the lowSNR regime to achieve better throughput performance. This is because, for the highSNR regime, the secrecy throughput depends mainly on the channel gain and the throughput is limited by the first hop considering (7)–(10), so the better throughput performance can be obtained by prioritizing the first hop. On the contrary, for the lowSNR regime, the secrecy throughput is mainly affected by the transmit power, more power ought to be allocated to the source than the transmitting relay to better utilize the total power, which means the second hop will be the bottleneck of the system, so the selection policy that be in favor of the second hop will get better throughput performance.
6.2 The TBLS performance
In this part, simulation results are given to verify the closedform secrecy outage probability for the proposed TBLS scheme. The transmission powers are normalized to unity, i.e., \(P_{S}=P_{R}=1\). We set the average channel gains of the sourcerelay and relaydestination links as \(\gamma _{sr} = \gamma _{rd} =10\)dB. We set the channel gain ratio \(\alpha\) and \(\beta\) as \(\alpha =\beta =5\) and the average eavesdropping channel gains as \(\gamma _{se}=\frac{\gamma _{sr}}{\alpha }\) and \(\gamma _{re}=\frac{\gamma _{rd}}{\beta }\), unless specified otherwise.
In Fig. 6, we plot the secrecy outage probability of the proposed TBLS scheme versus \(\lambda\) and \(\mu\). We assume that the target secrecy rate \(R_{s}=1\) and the relay number is set as \(K=5\). We can find that it has different functional relationship with these two parameters in different regions, and the secrecy throughput always has a valley value as \(\lambda\) and \(\mu\) varies, i.e., we can optimize these two parameters to achieve the best secrecy outage performance, which verifies our previous analysis. We also add the contour for this figure, and we can see that the two parameters do not have exactly the same effect on the secrecy outage probability. Note that the contour goes through the point \(\lambda = \mu = 2\), which means \(\lambda = \mu = z_{th_1}\) is not the optimal choice.
In Fig. 7, we plots the secrecy outage probability for each scheme as the target secrecy rate varies, where the relay number is set as \(K=5\). We can find that the proposed scheme performs better than two existing maxratio relay selection schemes in terms of secrecy outage probability. The theoretical and simulation results are shown to essentially perfectly match, which verifies the closedform secrecy outage probability obtained in this paper. We can also see that the performance of SOTBLS is very close to that of TBLS, which indicates that SOTBLS can be a good alternative to TBLS without searching for the optimal \(\lambda\) and \(\mu\). Note that we search for \(\lambda\) and \(\mu\) within an interval with a step size of 0.2 in simulation, and we believe that if the search accuracy is improved, so is the secrecy outage performance of the proposed TBLS scheme.
Figure 8 plots the secrecy outage probability of each scheme versus the number of relays for \(R_{s}=1\). It is clearly shown that the increase in the relay number can significantly improve the secrecy outage performance and the proposed TBLS scheme achieves the best performance, which agree with the theoretical analysis. We can see that SOTBLS performs almost as well as TBLS with the given parameters.
Figure 9 plots the secrecy outage probability of each scheme versus the channel gain ratio, which reflects the change in the intensity of the main channel. We assume \(\alpha =\beta\). The relay number is set as \(K=5\) and the target secrecy rate is set as \(R_{s}=1\). It is obvious that the secrecy outage probability decreases as the main channel becomes stronger and the proposed TBLS scheme achieves best performance.
7 Conclusion
In this paper, we studied the relay selection schemes for secure bufferaided cooperative relay networks. We first proposed a HyIFD policy that switches between these three substrategies according to the different conditions to improve the secrecy throughput performance for ART transmissions. With the help of buffers at the relays, different relays for reception and transmission were selected with the largest or the second largest ratio among \(SR\) and \(RD\) links respectively, to simultaneously receive and transmit. Then, we proposed a hybrid HD/FD transmission scheme named TBLS protocol aiming at improving the secrecy outage performance for FRT transmissions. We introduced and optimized two selection parameters to ensure the transmission quality of both two hops. We also considered a SOTBLS scheme as a good alternative to TBLS with lower requirements for computational complexity. We considered the RF strategy such that the eavesdropper can only independently decode the signals received in the two hops. Both the closedform expressions for the secrecy throughput of the proposed HyIFD scheme and that for the secrecy outage probability of the proposed TBLS scheme were derived. The Numerical results in consistence with the analytical expressions demonstrated the performance superiority of the proposed schemes in secrecy throughput and secrecy outage probability compared with the benchmark schemes.
Availability of data and materials
The datasets used or analyzed during the current study are available from the corresponding author on reasonable request.
Abbreviations
 FD:

Fullduplex
 HD:

Halfduplex
 SFDMMRS:

Space fullduplex maxmax relay selection
 RF:

Randomizeandforward
 HyIFD:

Hybrid imitate fullduplex
 TBLS:

Thresholdbased link selection
 SOTBLS:

Suboptimal thresholdbased link selection
 ART:

Adaptive rate transmissions
 FRT:

Fixed rate transmissions
 SNR:

Signaltonoiseratio
 AWGN:

Additive white Gaussian noise
 i.i.d.:

Independent and identically distributed
 CSI:

Channel state information
 SOP:

Secrecy outage probability
 CDF:

Cumulative distribution function
References
M. Agiwal, A. Roy, N. Saxena, Next generation 5g wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutor. 18(3), 1617–1655 (2016)
T. Karygiannis, L. Owens, Wireless network security. NIST Special Publication 800, 48 (2002)
W. Stallings, Cryptography and Network Security: Principles and Practice, 5th edn. (PrenticeHall, Englewood Cliffs, 2010)
M. Bloch, J. Barros, PhysicalLayer Security: From Information Theory to Security Engineering (Cambridge University Press, Cambridge, 2011)
A.D. Wyner, The wiretap channel. Bell Syst. Tech. J. 54(8), 1355–1387 (1975)
L. Lai, H.E. Gamal, The relay eavesdropper channel: cooperation for secrecy. IEEE Trans. Inf. Theory. 54(9), 4005–4019 (2008)
L. Dong, Z. Han, A.P. Petropulu, H.V. Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010)
O.O. Koyluoglu, C.E. Koksal, H. El Gamal, On secrecy capacity scaling in wireless networks. IEEE Trans. Inf. Theory. 58(5), 3000–3015 (2012)
J. Mo, M. Tao, Y. Liu, Relay placement for physical layer security: a secure connection perspective. IEEE Commun. Lett. 16(6), 878–881 (2012)
C. Huang, G. Chen, Y. Gong, DelayConstrained bufferaided relay selection in the internet of things with decisionassisted reinforcement learning. IEEE Internet Things J. 8(12), 10198–10208 (2021)
C. Huang, G. Chen, Y. Gong, P. Xu, Z. Han, J.A. Chambers, BufferAided relay selection for cooperative hybrid NOMA/OMA networks with asynchronous deep reinforcement learning. IEEE J. Sel. Areas Commun. 39(8), 2514–2525 (2021)
M. Alkhawatrah, Y. Gong, G. Chen, S. Lambotharan, J.A. Chambers, BufferAided relay selection for cooperative NOMA in the internet of things. IEEE Internet Things J. 6(3), 5722–5731 (2019)
X. Lan, Y. Zhang, Q. Chen, L. Cai, Energy efficient bufferaided transmission scheme in wireless powered cooperative NOMA relay network. IEEE Trans. Commun. 68(3), 1432–1447 (2020)
Y. Gong, G. Chen, T. Xie, Using buffers in trustaware relay selection networks with spatially random relays. IEEE Trans. Wirel. Commun. 17(9), 5818–5826 (2018)
N. Nomikos, T. Charalambous, D. Vouyioukas, R. Wichman, G.K. Karagiannidis, Integrating broadcasting and NOMA in fullduplex bufferaided opportunistic relay networks. IEEE Trans. Veh. Technol. 69(8), 9157–9162 (2020)
J. Wan, D. Qiao, H. Wang, H. Qian, Bufferaided twohop secure communications with power control and link selection. IEEE Trans. Wirel. Commun. 17(11), 7635–7647 (2018)
C. Huang, G. Chen, K. Wong, Multiagent reinforcement learningbased bufferaided relay selection in IRSassisted secure cooperative networks. IEEE Trans. Inf. Forensics Secur. 16, 4101–4112 (2021)
Y. Nie, X. Lan, Y. Liu, Q. Chen, G. Chen, L. Fan, D. Tang, Achievable rate region of energyharvesting based secure twoway bufferaided relay networks. IEEE Trans. Inf. Forensics Secur. 16, 1610–1625 (2021)
J. Ren, X. Lei, P.D. Diamantoulakis, Q. Chen, G.K. Karagiannidis, Bufferaided secure relay networks with SWIPT. IEEE Trans. Veh. Technol. 69(6), 6485–6499 (2020)
C. Huang, G. Chen, Y. Gong, Z. Han, Joint bufferaided hybridduplex relay selection and power allocation for secure cognitive networks with double deep Qnetwork. IEEE Trans. Cogn. Commun. Netw. 7(3), 834–844 (2021)
X. Liao, Y. Zhang, Z. Wu, Y. Shen, X. Jiang, H. Inamura, On securitydelay tradeoff in twohop wireless networks with bufferaided relay selection. IEEE Trans. Wirel. Commun. 17(3), 1893–1906 (2018)
K.T. Phan, Y. Hong, E. Viterbo, Adaptive resource allocation for secure twohop relaying communication. IEEE Trans. Wirel. Commun. 17(12), 8457–8472 (2018)
D. Wang, P. Ren, J. Cheng, Cooperative secure communication in twohop bufferaided networks. IEEE Trans. Commun. 66(3), 972–985 (2018)
G. Chen, Z. Tian, Y. Gong, Z. Chen, J.A. Chambers, Maxratio relay selection in secure bufferaided cooperative wireless networks. IEEE Trans. Inf. Forensics Secur. 68(4), 719–729 (2014)
X. Tang, Y. Cai, Y. Huang, T.Q. Duong, W. Yang, W. Yang, Secrecy outage analysis of bufferaided cooperative MIMO relaying systems. IEEE Trans. Veh. Technol. 67(3), 2035–2048 (2018)
C. Wang, H. Wang, D.W.K. Ng, X. Xia, C. Liu, Joint beamforming and power allocation for secrecy in peertopeer relay networks. IEEE Trans. Wirel. Commun. 14(6), 3280–3293 (2015)
H. Deng, H. Wang, W. Guo, W. Wang, Secrecy transmission with a helper: to relay or to jam. IEEE Trans. Inf. Forensics Secur. 10(2), 293–307 (2014)
Z. Chu, K. Cumanan, Z. Ding, M. Johnston, S.Y. Le Goff, Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Trans. Veh. Technol. 64(5), 833–1847 (2015)
X. Lu, RCd. Lamare, Opportunistic relaying and jamming based on secrecyrate maximization for multiuser bufferaided relay systems. IEEE Trans. Veh. Technol. 69(12), 15269–15283 (2020)
R. Nakai, S. Sugiura, Physical layer security in bufferstatebased maxratio relay selection exploiting broadcasting with cooperative beamforming and jamming. IEEE Trans. Inf. Forensics Secur. 14(2), 431–444 (2019)
M. Jain et al., Practical, realtime, full duplexing wireless, in Proceedings of the ACM Mobile Computing and Networking (MobiCom) (Las Vegas, USA, 2011)
D. Bharadia, E. McMilin, S. Katti, Full duplex radio, in Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (Hong Kong, China, 2013)
A. Ikhlef, J. Kim, R. Schober, Mimicking fullduplex relaying using halfduplex relays with buffers. IEEE Trans. Veh. Technol. 61(7), 3025–3037 (2012)
D. Qiao, M.C. Guroy, S. Velipasalar, Secure wireless communications and optimal power control under statistical queueing constraints. IEEE Trans. Inf. Forensics Secur. 6(3), 628–639 (2011)
L. Qian, X. Chi, L. Zhao, M. Obeed, A. Chaaban, Usercentric secure cell formation for visible light networks with statistical delay guarantees. IEEE Trans. Wirel. Commun. 20(3), 1831–1846 (2021)
C. Li, C. She, N. Yang, T.Q.S. Quek, Secure transmission rate of short packets with queueing delay requirement. IEEE Trans. Wirel. Commun. 21(1), 203–218 (2022)
S. Wang, M. Xia, K. Huang, Y. Wu, Wirelessly powered twoway communication with nonlinear energy harvesting model: rate regions under fixed and mobile relay. IEEE Trans. Wirel. Commun. 16(12), 8190–8204 (2017)
B. Xia, Y. Fan, J. Thompson, H. Vincent, Poor, Buffering in a threenode relay network. IEEE Trans. Wirel. Commun. 7(11), 4492–4496 (2008)
D. Barry, J.Y. Parlange, L. Li, Approximation for the exponential integral (Theis well function). J. Hydrol. 227(14), 287–291 (2000)
H.A. David, H.N. Nagaraja, Order Statistics, 3rd edn. (Wiley, New York, 2003)
M. Bloch, J. Barros, M.R.D. Rodrigues, S.W. McLaughlin, Wireless informationtheoretic security. IEEE Trans. Inf. Theory. 54(6), 2525–2534 (2008)
Acknowledgements
Not applicable.
Funding
This work is supported in part by the National Natural Science Foundation of China (61671205), in part by the Shanghai RisingStar Program (21QA1402700), and also in part by the open research fund of National Mobile Communications Research Laboratory, Southeast University (No. 2020D02). Haifeng Qian was supported by National Natural Science Foundation of China (61571191, 61632012) and the “Shuguang Program” supported by Shanghai Education Development Foundation and Shanghai Municipal Education Commission (No. 16SG21).
Author information
Authors and Affiliations
Contributions
JZ was responsible for the theoretical analysis, numerical simulation, and manuscript writing of this research. DQ and HQ contributed to the model construction and revised the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
1.1 Proof of Proposition 2
The probability that the best \(SR\) and the best \(RD\) channels share the same relay is \(p_{s}=\frac{1}{K}\) [33], it follows directly from the fact that the channels for both \(SR\) and \(RD\) links are i.i.d. And it is obvious that we have \(p_{21}=1p_{12}\). So, to compute the secrecy throughput of the proposed HyIFD scheme, we need to find \({{\mathbb {E}}}[C_{SR,1}]\), \({{\mathbb {E}}}[C_{RD,1}]\), \({{\mathbb {E}}}[C_{SR,2}]\), \({\mathbb E}[C_{RD,2}]\) and \(p_{12}\).
a) Computation of \({\mathbb {E}}[C_{SR,1}]\): In this case, we denote \(z_{r_1}=\frac{1+P_{S}x}{1+P_{S}y}\), where \(x=\max \{x_{k}\}\) with \(x_{k}=h_{sr_{k}}^{2}, k\in \{1,2,\ldots ,K\}\), and \(y=h_{se}^{2}\). Therefore, to derive \({{\mathbb {E}}}[C_{SR,1}]\), we need to compute the cumulative distribution function (CDF) of \(z_{r_1}\). We first compute the CDF of x, the CDF of x can be obtained as
Since x is independent of y, we have \(f_{XY}(x,y)=f_{X}(x)f_{Y}(y)\). Then the CDF of \(z_{r_1}\) can be calculated as
Then, we have
where \(E_{1}(x)=\int _{x}^\infty (e^{t}/t)dt, x>0\) is the exponential integral function.
b) Computation of \({\mathbb {E}}[C_{RD,1}]\): In this case, we denote \(z_{t_1}=\max \limits _{k\in \{1,2,\ldots ,K\}}\{z_{k}\}\), where \(z_{k}=\frac{1+P_{R}x_{k}}{1+P_{R}y_{k}}\) with \(x_{k}=h_{r_{k}d}^{2}\) and \(y_{k}=h_{r_{k}e}^{2}\). Since \(x_{k}\) is independent of \(y_{k}\), we have \(f_{X_{k}Y_{k}}(x_{k},y_{k})=f_{X_{k}}(x_{k})f_{Y_{k}}(y_{k})\). We first compute the CDF of \(z_{k}\), the CDF of \(z_{k}\) can be obtained as
Then the CDF of \(z_{t_1}\) can be calculated as
After computation of \(F_{Z_{t_1}}(z)\) and after some simplifications, \({{\mathbb {E}}}[C_{RD,1}]\) can be obtained as
c) Computation of \({\mathbb {E}}[C_{SR,2}]\) and \({{\mathbb {E}}}[C_{RD,2}]\): To compute \({\mathbb E}[C_{SR,2}]\) and \({{\mathbb {E}}}[C_{RD,2}]\), we need to compute the CDF of \(z_{r_2}\) and \(z_{t_2}\), so we consider the following theory of order statistics [40]:
Let \(Z_{1},\ldots ,Z_{n}\) be n independent variates, each with cdf F(z). Let \(Z_{1},\ldots ,Z_{n}\) denote the increasing order of \(Z_{1},\ldots ,Z_{n}\), i.e., \(Z_{(1)}\le Z_{(2)}\le Z_{(n)}\). Let \(F_{(r)}(z),(r=1,\ldots ,n)\) denote the cdf of the r th order statistic \(Z_{(r)}\). Then the cdf of \(Z_{(r)}\) is given by
Based on (69), we obtain
Since the computation of \({{\mathbb {E}}}[C_{SR,2}]\) and \({\mathbb E}[C_{RD,2}]\) are similar to that of \({{\mathbb {E}}}[C_{SR,1}]\) and \({{\mathbb {E}}}[C_{RD,1}]\) respectively, the detailed expressions of \({{\mathbb {E}}}[C_{SR,2}]\) and \({{\mathbb {E}}}[C_{RD,2}]\) are directly given above by (25) and (27), respectively.
d) Computation of \(p_{12}\): Given that \(z_{r_1}>z_{r_2}\), \(z_{t_1}>z_{t_2}\), we have
Since we have obtained the CDF of \(z_{r_2}\) and \(z_{t_2}\), we can express the probability of \(Q>0\), i.e., \(p_{12}\), as an integral form and calculate its value numerically.
1.2 Proof of Theorem 1
First, to compute the secrecy throughput for mode I of the proposed HyIFD scheme in high SNR regime, we need to find \({\mathbb E}[C_{SR,1}]\), \({{\mathbb {E}}}[C_{RD,1}]\), \({{\mathbb {E}}}[C_{SR,2}]\), \({{\mathbb {E}}}[C_{RD,2}]\) and \(p_{12}\) in high SNR regime, which is denoted as \({\widehat{C}}_{SR,1}\), \({\widehat{C}}_{RD,1}\), \({\widehat{C}}_{SR,2}\), \({\widehat{C}}_{RD,2}\) and \({\widehat{p}}_{12}\), respectively.
a) Computation of \({\widehat{C}}_{SR,1}\): As the total power \(\mathrm{SNR}\rightarrow \infty\), we know that \(P_{S}\rightarrow \infty\), and \({\widehat{C}}_{SR,1}\) can be obtained as
where equality (a) is obtained comes from the fact that as \(P_{S}\rightarrow \infty\), \(e^{\frac{r}{P_{S}\gamma _{sr}}}\rightarrow 1\), \(e^{\frac{1}{P_{S}\gamma _{se}}}\rightarrow 1\), and an approximation has been used for the exponential integral function \(E_{1}(x)\) [39]:
where \(\gamma \approx 0.5772156649\) is the Euler constant.
b) Computation of \({\widehat{C}}_{RD,1}\): As the total power \(\mathrm{SNR}\rightarrow \infty\), we also have \(P_{R}\rightarrow \infty\), and \({\widehat{C}}_{RD,1}\) can be obtained as
where equality (b) is obtained comes from the fact that as \(P_{R}\rightarrow \infty\), \(e^{\frac{r}{P_{R}}\left( \frac{1}{\gamma _{rd}}+\frac{1}{\gamma _{re}}\right) }\rightarrow 1\), \(e^{\frac{r}{P_{R}\gamma _{re}}}\rightarrow 1\), \((\frac{r}{P_{R}\gamma _{re}})^{j}\rightarrow 0\) as \(j\ne 0\) and \((\frac{r}{P_{R}\gamma _{re}})^{j}\rightarrow 1\) as \(j=0\). We first consider the term \(\lim \limits _{P_{R}\rightarrow \infty }A\). Here, we use the approximation (74) for the calculation process. Then the value of A as \(P_{R}\rightarrow \infty\) can be calculated as
Then \({\widehat{C}}_{RD,1}\) can be obtained by
c) Computation of \({\widehat{C}}_{SR,2}\) and \({\widehat{C}}_{RD,2}\): The computation of \({\widehat{C}}_{SR,2}\) and \({\widehat{C}}_{RD,2}\) is similar to that of \({\widehat{C}}_{SR,1}\) and \({\widehat{C}}_{RD,1}\), respectively. The details of the computation are hence omitted here, and the detailed expressions of \({{\mathbb {E}}}[C_{SR,2}]\) and \({\mathbb E}[C_{RD,2}]\) are given above by (43) and (45), respectively.
d) Computation of \({\widehat{p}}_{12}\): The \({\widehat{p}}_{12}\) can be obtained as
For brevity, we denote \(\lim \limits _{P_{S}\rightarrow \infty }f_{Z_{r_2}}(z)\) and \(\lim \limits _{P_{R}\rightarrow \infty }F_{Z_{t_2}}(z)\) as \({\widehat{f}}_{Z_{r_2}}(z)\) and \({\widehat{F}}_{Z_{t_2}}(z)\), respectively. And due to space constraints, the detailed expressions are given above by (47) and (48), respectively.
1.3 Proof of Proposition 3
Based on the link selection policy given in (56), the proposed TBLS scheme contains six cases that work in either FD or HD mode. Note that for FD mode, each of the two hops has one link transmitting in one time slot, the outage means that at least one of the two hops cannot successfully transmit, and the threshold \(z_{th_1}\), corresponding to the target secrecy rate \(R_{s}\), is \(z_{th_1}=2^{R_{s}}\). While for HD mode, only one link is transmitting in one time slot, the outage occurs when that transmission hop fails to achieve the target transmission rate, and the threshold \(z_{th_2}\), corresponding to \(R_{s}\), is \(z_{th_2}=2^{2R_{s}}\). The term “\(2R_{s}\)” is due to the fact that it takes two time slots to transmit one packet from S to D [24, 25]. Denote \(P_{out}^{i}\) as the the probability of being at case i and having an outage event, the SOP for six cases can be correspondingly analyzed as follows.

When \(z_{r_1}\ge \lambda\) and \(z_{t_1}\ge \mu\), there are three possibilities:

1
If \(r_{1}\ne t_{1}\), we select the relay \(R_{r_1}\) for reception and the relay \(R_{t_1}\) for transmission in this time slot. Record this case as case 1. Case 1 works in FD mode and the equivalent instantaneous \(z=\min \{z_{r_1}, z_{t_1}\}\). The SOP for case 1 is obtained as
$$\begin{aligned} P_{out}^{1}=(1p_{s})P\{\min \{z_{r_1}, z_{t_1}\}< z_{th_1}, z_{r_1}\ge \lambda , z_{t_1}\ge \mu \}. \end{aligned}$$(79) 
2
If \(r_{1}=t_{1}\) and \(z_{t_2}\ge \mu\), we select the relay \(R_{r_1}\) for reception and the relay \(R_{t_2}\) for transmission in this time slot. Record this case as case 2. Case 2 works in FD mode and the equivalent instantaneous \(z=\min (z_{r_1}, z_{t_2})\). The SOP for case 2 is given by
$$\begin{aligned} P_{out}^{2}=p_{s}P\{\min \{z_{r_1}, z_{t_2}\}< z_{th_1}, z_{r_1}\ge \lambda , z_{t_2}\ge \mu \}. \end{aligned}$$(80) 
3
If \(r_{1}=t_{1}\) and \(z_{t_2}<\mu\), we only select the relay \(R_{r_1}\) for reception in this time slot. Record this case as case 3. Case 3 works in HD mode and the equivalent instantaneous \(z=z_{r_1}\). The SOP for case 3 can be expressed as
$$\begin{aligned} P_{out}^{3}=p_{s}P\{z_{r_1}<z_{th_2}, z_{r_1}\ge \lambda , z_{t_1}\ge \mu >z_{t_2}\}. \end{aligned}$$(81)

1

When \(z_{r_1}>\lambda\) and \(z_{t_1}<\mu\), we only select the relay \(R_{r_1}\) for reception in this time slot. Record this case as case 4. Case 4 works in HD mode and the equivalent instantaneous \(z=z_{r_1}\). The SOP for case 4 is
$$\begin{aligned} P_{out}^{4}=P\{z_{r_1}<z_{th_2}, z_{r_1}\ge \lambda , z_{t_1}<\mu \}. \end{aligned}$$(82) 
When \(z_{r_1}<\lambda\) and \(z_{t_1}>\mu\), we only select the relay \(R_{t_1}\) for transmission in this time slot. Record this case as case 5. Case 5 works in HD mode and the equivalent instantaneous \(z=z_{t_1}\). The SOP for case 5 is given as
$$\begin{aligned} P_{out}^{5}=P\{z_{t_1}<z_{th_2}, z_{r_1}<\lambda , z_{t_1}\ge \mu \}. \end{aligned}$$(83) 
When \(z_{r_1}<\lambda\) and \(z_{t_1}<\mu\), the relay neither receives nor transmits message in this time slot. Record this case as case 6. Case 6 can be directly considered as an outage. The SOP for case 6 is
$$\begin{aligned} P_{out}^{6}=P\{ z_{r_1}<\lambda , z_{t_1}<\mu \}. \end{aligned}$$(84)
Considering all possible cases above, the SOP of the TBLS scheme can finally be expressed by summing up the SOP for all cases. It is given by
1.4 Proof of Proposition 4
Following the discussions in Section IVB, the SOP of the proposed TBLS scheme is given as
So, to compute the SOP of the proposed TBLS scheme, we could compute the term A, B, C, D, E and F separately.
We first consider the term A. It can be calculated as
The value of B can be obtained in a similar manner, and is given by
The value of C can be obtained as
The value of D can be calculated as
The computation of E and F are similar and can be obtained as
Finally, substituting (87)–(92) into (86) yields (58), which completes the proof.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Zhou, J., Qiao, D. & Qian, H. Virtual fullduplex bufferaided relay selection schemes for secure cooperative wireless networks. J Wireless Com Network 2022, 44 (2022). https://doi.org/10.1186/s13638022021271
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638022021271