Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access

Wepropose a robustwireless relay scheme in narrow-band communications for IoT access, whichmatches the typical features of IoT often carrying relatively low data rate with limited bandwidth. This framework is towards offering robustness in QoS guarantees with emphases on security and/or reliability, and we use the security-assured network as the typical scenario. In particular, we consider a dual-hop relay network including a transmitter, a receiver, an amplify-and-forward (AF) untrusted relay, and a jamming node. The jamming node is treated as a helper. Specifically, the jammer broadcasts artificial noise (AN), which in fact pollutes both the untrusted relay and the destination node’s signals. However, we show that such AN can be effectively mitigated after the destination node obtains the forwarded signal from the relay, while the untrusted relay node cannot do so. The core idea for robustness assurance is to exploit higher signal dimensions at the receiver over the untrusted relay node. Simulations and analyses are also conducted to demonstrate that our proposed scheme can make the performance at the untrusted relay an interferencelimited manner while completely removing the interferences at the receiver, therefore corroborating our claim in robustness in terms of security and reliability.


Introduction
In the Internet of Things (IoT) vision, every physical object plays the role in both providing and consuming diverse service resources, making the wireless networks efficiently connected yet highly heterogonous [1].In a typical wireless access framework for IoT, heterogeneous wireless networks often coexist, especially when the mobile communications evolve to the 5th generation (5G) era.In 5G network, diverse networks, such as macro/small cellular networks [2,3], vehicular and transportation networks [4,5], cognitive radio networks [6,7], and device-to-device networks [8][9][10], all need to be effectively integrated to implement seamless communications in future wireless networks.Such an interconnection will bring unprecedented convenience for users as well as economical opportunities for market, but it will also require robust and sophisticated approaches to ensure quality of service (QoS) requirements for services, especially on the security and reliability.On the one hand, the physical accessibility to the large amount of objects and the openness of wireless channels make security assurance for IoT much more challenging than the traditional network.Consequently, a great deal of research efforts have been dedicated to the security of IoT, which cover all protocol layers [11][12][13][14][15].Among diverse security techniques, physicallayer security (PLS), which can take advantage of wireless channels' features to protect secrecy, has become a research hotspot [16][17][18][19][20]. On the other hand, cooperative communications have been widely recognized as a key component to increase the capacity and enhance the reliability for wireless communication systems [21][22][23].Thus, security and reliability enhancement via physical-layer technologies over cooperative networks have attracted special interests [10,[18][19][20][23][24][25][26][27][28][29] in the research community.
While diverse techniques have been developed for security and reliability enhancement [10,[18][19][20][23][24][25][26][27][28][29], applying these existing techniques for IoT access still faces the major challenge.Because IoT access often involves low-cost nodes 2 Journal of Sensors with limited wireless-connecting capability, too much information exchange and too complicated cooperation protocols are hard to implement.This issue imposes the urgent needs on robust and lightweight approaches in cooperative IoT access scenarios with QoS provisioning on reliability as well as security.
To address this problem, we propose a simple yet robust wireless relay scheme with a coexisting jamming node for the narrow-band communications scenario.The narrowband communications well fit the features of IoT.As IoT communications typically deal with services having relatively low traffic load, narrower bandwidths are often assigned to users so that more simultaneous accesses can be accommodated.Furthermore, unlike the wide-band communications, the narrow-band assignment is immune to the frequencyselective fading, thus benefiting the implementation of lowcost equipment with low processing complexity.In our framework, there are four nodes in the network where the source can potentially utilize an amplify-and-forward (AF) relay to augment the direct link to the destination.In the meantime, there is another node who broadcasts jamming signals (can be also characterized as interfering signals) and actually degrades the quality of the relay's and destination's channels.Because the destination is able to obtain high signal dimensions from both direct link and relay transmissions, the jamming signals can be well suppressed.
Our proposed relay scheme with coexisting interferences can be applied in the following two typical cases towards the robustness of security and reliability provisioning, respectively, for IoT access.(1) Security assurance: the transmitted messages need to be kept confidential to the relay that is also termed untrusted relay [23][24][25][26][27], even though it fulfils the source's request by forwarding signals to the destination.The node who broadcasts jamming signals, often modeled by artificial noise (AN), can be seen as a friendly but noncooperative jammer.The friendliness comes from the fact that the jamming signals prevent the untrusted relay from decoding the confidential data.The noncooperation implies that jamming strategy does not vary with the channel state information (CSI) of the network, thus making the protocol simpler and more practical.(2) Interference suppression: for this case, the node broadcasting interfering signals play the role of transmitter of a coexisting link within the same radio band.The destination node can exploit signal dimensions obtained from both direct link and relay link to remove the interference, such that the system is not interference-limited and can successfully fulfil the reliability requirements.In this sense, our scheme is capable of offering robustness in terms of both reliability and security assurance.For convenience, in this paper we use security assurance as the typical framework to present our design.
The rest of this paper is organized as follows.Section 2 describes the system model for our framework towards robust IoT access, with security assurance as the typical scenario.Section 3 studies three detection approaches for our robust relay framework.Section 4 analyzes the upper and/or lower bounds of ergodic secrecy throughput (EST) under diverse detection approaches.In Section 5, we show some simulation results and meaningful discussions.The paper concludes with Section 6.Some notations used in this paper are summarized as follows.Bold uppercase and bold lowercase letters denote matrices and vectors, respectively.Transpose operation, conjugate transpose, and inverse operation for matrices are denoted by (⋅)  , (⋅)  , and (⋅) −1 , respectively.A  is the element (, ) of matrix A, a  is the th element in vector a, and â is the estimation of a.I  is the identity matrix of order  and 0 is the zero matrix.The subscript on I  is neglected when the size is obvious from the context.The notation | ⋅ | represents Euclidean norm.log(⋅) is logarithm of base .E(⋅) is the expectation operator, Var{⋅} denotes the variance of a random variable, and [] + ≜ max(0, ).

System Model
A two-hop wireless relay network is considered in this paper, as depicted in Figure 1(a), where there are four nodes in the network, including one source (), one relay (), one destination (), and one jammer ().Each node has only a single transmit antenna and a single receive antenna and operates in the half-duplex fashion.There exists the direct link between the source and destination.In the meantime, the relay node uses the amplify-and-forward (AF) mechanism to assist the source to deliver the data to the destination.The transmit power of each node is set equal to .
As aforementioned, we concentrate on narrow-band communications, and thus wireless channels can be modeled as flat-fading channels.The channel between node  and node  is characterized by a multiplicative coefficient ℎ  , which is a zero-mean circularly symmetric complex Gaussian random variable.Note that for ℎ  , the subscripts  and  could be , , , and , representing different nodes, but  and  cannot be the same node simultaneously.All channel coefficients remain constant within one time frame with a fixed length but vary independently from one frame to another.The additive thermal noise at each receiver is characterized by a zeromean complex Gaussian random variable with variance  2 .Throughout this paper, we define   ≜ |ℎ  | 2 / 2 as channel state information (CSI).We further assume that the CSI of all links illustrated in Figure 1(a) can be accurately estimated and are known to the destination node .This assumption is rational as all four users are neighbours to each other within one network.They can periodically exchange CSI to maintain connections to each other and thus all channel coefficients are known to node .The accuracy of channels can be obtained by applying sophisticated and advanced estimation algorithms such as [30,31].However, it is worth noting that, in practical systems, the CSI and the corresponding rate adaptation are usually quantified to simplify implementation.Also, the exchange of CSI often introduces considerable overhead.Therefore, in practical systems, the actual performance will tradeoff with the resolution of system adaptation as well as the amount of introduced overhead.
The relay procedures are illustrated in Figure 1(b) and the physical-layer signal model is described as follows.Each time frame is divided equally into two phases.During the first phase, node  transmits signal  with power .In the meantime, node  functioning as a noncooperative jammer broadcasts the artificial noise (AN) denoted by   , which is the zero-mean complex Gaussian white noise with variance .Evidently, the artificial noise will disturb both the relay node  and the destination node .The signals received by node  and node  in the first phase are denoted by  1 and  1 , respectively, which can be written by where  1 ,  1 ∼ (0,  2 ),   ∼ (0, 1),   ≜ √ ℎ    +  1 , and thus   ∼ (0, |ℎ  | 2 + 2 ).Here (⋅, ⋅) denotes the circularly symmetric complex Gaussian random variable, where the first parameter denotes the mean and the second is the variance.
In the second phase, node  amplifies and forwards the received signal.Meanwhile, it attempts to decode the received signal to retrieve the confidential information.Therefore, node  is actually an untrusted relay node.For security requirements, the task of our design is to prevent  from successfully decoding while enhancing the destination node 's QoS, such as secrecy, throughput, and bit error rate (BER).The signal received by node  in the second phase is given by where From the above equations, we can readily obtain We assume that node  remains idle in the second phase, and thus the received signal  2 is not polluted by the artificial noise.As aforementioned, our framework can be applied to the cases for security and reliability assurance.For the security assurance case, node  plays a role of helper but with limited cooperation.This is because the artificial noise can disturb the untrusted relay , such that it cannot successfully decode the data.The limited cooperation comes from the fact the artificial noise does not adapt with the CSI of any links.In the reliability assurance case, node  can be treated as the transmitter of another existing link within the same bandwidth.Correspondingly, our target would be how to suppress the interference at the destination by combining the signals received in the two phases.As the two cases share the same model, we in this paper mainly use the security assurance case as the typical case to study and analyze our design.

Detection Schemes at the Destination Node
The core idea for security assurance is to exploit higher signal dimensions at the legitimate destination user, that is, node , over the untrusted relay .Specifically, we can see from (2b) and (4c) that the destination node  can receive two versions of the signals with independent channel fading in two phases.In contrast, the untrusted relay node  has only the signals received in the first phase.This promises that  is able to suppress the interferences, that is, the artificial noise broadcast by  in the first phase, but  cannot do so.
Making use of this advantage, we can potentially keep  from decoding the signals while assuring the security requirement for the destination node .As mentioned previously, the jamming behaviour of  does not vary with the channel state information of the network.Consequently, our concentration will be dedicated to the processing at . Particularly, we study three detection principles, namely, zero forcing (ZF), minimum mean-square error (MMSE), and maximum likelihood (ML), respectively, and derived the corresponding detectors in the following sections.

Zero Forcing (ZF) Detection.
Zero forcing detector is known for complete elimination of the interferences.The detailed ZF detection for our case is derived by the following procedures.By combining (4b) with (2a), we arrive at Rewriting ( 5) in a matrix form, we get where y = ( 1 ,  2 )  , b = (,   )  , n = ( 1 ,   )  , and R is denoted by In this section, we apply ZF detector at node  to suppress the interference.Node  will judge transmitted signal  based on the result of received signal vector y multiplied with the matrix L ZF , where L ZF = R −1 according to the zero forcing criterion.The estimation of transmitted signal x is determined by After using (6), we have According to the principal of ZF detector which aims to eliminate the interference in b, we reach the conclusion that (L ZF y) 1 is the sufficient statistics of the transmitted signal .
(L ZF y) 1 can be written as where Noticing that  1 and   are independent, we obtain the instantaneous signal-to-interference plus noise ratio (SINR) at node  is given by In order to make it concise, we hereby denote all the SINRs' subscripts , , , ,  as the index 1, 2, 3, 4, 5, respectively.After using the following definitions: SINR ZF  can be further rewritten as

Minimum Mean-Square Error (MMSE) Detection.
For MMSE, the detector matrix L MMSE meets By using the Projection Theorem, we obtain the following equation: After a series of simplification, the detector matrix L MMSE is given by where R is defined in (7) and I  is defined as where  =   /(  +  +1)+1.Similar to the ZF detection, we focus on the first element of b to adjudge .Moreover, b1 is given by where L  ≜ (R  + I  (R  ) −1 ) −1 , R  ≜ R/, and y  ≜ y/.From (21) we have the distribution of b1 , which is omitted due to the lack of space.Finally, we have the SINR of node  which can be expressed as where A and B are defined in ( 13) and ( 15), respectively.
Journal of Sensors 5

Maximum Likelihood (ML) Detection.
In this subsection, we have the new simultaneous equations: by combining (2b) with (4c).Transforming ( 23) into a matrix form, we obtain where H and ñ's definition can be easily get by comparing (23) with (24).Since it is easy to analyze the covariance matrix of the noise vector ñ, we directly give E{ññ  } =  2 N where N is defined by with  =   /(  +   + 1) + 1.
Based on noise-whiting method and N's unitary decomposition N =  2 uΛu  , whitening matrix M is given by M = (1/) √ Λ −1 u  .Therefore, we have where H = MH and ñ = Mn  .Obviously, E{ñ  ñ } =  2 I holds.According to the principle of maximal ratio combining (MRC), the output is a weighted sum of all branches and the weights should be proportional to the branch SINRs.Thus, the SINR of the combiner output is the sum of SINRs on each branch.After using MRC of ỹ, the judgment result x from ỹ naturally meets x = arg min  {|ỹ − H| 2 }.Intuitively, the output SINR of ML detection can be expressed as The analytical expression of SINR ML  can not be obtained, caused by the complexity of unitary decomposition of symbolic expression in (25).But luckily and unexpectedly, we will find that SINR ML  is equal to SINR MMSE  in Section 4.4.Furthermore, this result will be confirmed through numerical simulations in Section 5.

Ergodic Secrecy Throughput of Three Detection Approaches
In this section, we adopt the Rayleigh fading model and derive the closed-form expressions for the lower bound and the upper bound of EST.We assume   ,  = 1, . . ., 5, is independent identically distributed (i.i.d) random variable and subject to exponential distribution with the same expectation .In the following parts of this paper, we call  the signal-tonoise ratio (SNR) of our system.
The instantaneous secrecy rate [16] of this general scheme can be written as And EST is given by   = E{  }.

Lower Bound of ZF's EST.
For ZF, we have where the inequality is due to the simple fact that E{max(, )} ≥ max(E{}, E{}).The lower bound of EST can be characterized by where A, B, and B  are defined as before.In (30),  ZF  can be further lower bounded by In ( 31), () is obtained from Jensen's inequality and the convexity of log(1 +   ) for  > 0. Similarly, () is obtained from Jensen's inequality and the convexity of logarithmic function.
For Rayleigh fading,   obeys exponential distribution with the same rate parameter 1/, where  is the average SNR of our system.Recalling A's definition in (13), probability density function (PDF) of A when A > 0 is given by where BesselK[], ] is modified Bessel function of second kind.According to the definition of A given in (15) and the assumptions that all SNRs are independent and identically distributed, it is evident that the distribution of A is symmetric for regions A > 0 and A < 0, leading to ℎ() = ℎ(−).
Further letting K = A 2 , we can obtain the PDF of K by As shown in (31),  1 = E{log K}.Thus, we have The double integral in (34) can not be simplified in closedform.We can figure out  1 by numerical integration. 2 can be solved as In ( 35), () holds due to the property of mathematical expectation and () holds due to   ,  = 1, . . ., 5, being i.i.d random variable and subject to exponential distribution with the expectation .In addition, it is easy to get that where  is the Euler constant defined in [32].On the other hand, By substituting (34), ( 35), (36), and (37) into (30), we can arrive at the lower bound of EST under ZF strategy:

Upper Bound of ZF's EST. The upper bound of EST
for the ZF detection approach can be obtained as follows.
Because  ZF  is the secrecy throughput and  ZF  represents the maximum achievable rate with malicious users (see ( 29)- (30) for definitions of the two notations), we can readily have In ( 39), () obviously holds and () holds due to B  >  3 .

Lower Bound of MMSE's EST.
To obtain the lower bound of EST under MMSE approach, we first introduce Theorem 1.

Theorem 1. One has
To prove Theorem 1, we just need to prove  > 1.By substituting ( 16) and ( 22) into (43), we immediately obtain where C =  4 A 2 +  5 A 2 B. From the definition of A, we arrive at In addition, we have following simple inequality Applying ( 45), (46), and the simple fact that the last item in the molecule of  is positive into (44), we immediately have  > 1.Thus Theorem 1 follows.
On the basis of Theorem 1, which indicates that MMSE has a higher instantaneous SINR, we draw the conclusion that the EST of MMSE is lower bounded by that of ZF.

Analysis of ML's EST.
Solving the EST under ML detection needs to find the exact value of SINR ML  .In order to analyze this problem, we first introduce the following lemma.
Lemma 2. The result of MMSE for the initial model (6) and the noise whitening model ( 26) is consistent.
Proof.The proof of Lemma 2 is omitted for the lack of space.Theorem 3. In our jamming-aided Security provisioning scheme, MMSE and ML are essentially the same.That is to say Proof.We rewrite (26) as where ñ 1 , ñ 2 ∼ (0, 1) and H1 , H2 are fixed real number.(For simplicity, we have such assumption.In fact they are complex numbers.But we can multiply the observed sample by the corresponding opposite phase to transform them into real numbers.)As given in Section 3.3,

xML = Hỹ
(49) and ( 27) holds.On the other hand, by applying the method similar to Section 3.2, L  which meets arg min L {| − Lỹ| 2 } is given by Then, we obtain By comparing (49) with (51), we find that the difference between them is a consistent which will not have any impact on the judgment.Finally, considering Lemma 2, Theorem 3 follows.
Based on Theorem 3, we draw a conclusion that the performance of ML is equal to MMSE, thus offering the potential low computational complexity.Correspondingly, EST of ML is equal to that of MMSE.

Simulation Results and Discussions
This section presents some numerical results to verify the previous theoretical analyses.The simulation environment is based on the system model described in Section 2. In  Figures 2-5, we assumed that all channel coefficients are submitted to Rayleigh fading with the same mean, which is so-called average SNR.Without loss of generality, we assumed the power of the transmitting node  and the jamming node  is equal to 1.In Figure 2, all the nodes use QPSK modulation.In addition, ZF technique is prone to high errors as the channel coefficients cannot be estimated perfectly.The readers can refer to the rich literature to study the impact of channel estimation errors.
Figure 2 shows the simulation results of the receiving node  and the relay node 's bit error rate (BER) with the change of the average SNR, which illustrates the reliability of our proposed network.From Figure 2, we observe that the relay node  has a significant error floor, caused by the jamming node 's artificial noise.In high SNR regime, SINR  ≈  1 / 4 .We immediately have 's BER given by )) ≈ 0.172, where Erfc(⋅) is complementary error function defined in [32].But in our network, node 's BER rapidly declines with the growth of SNR, which benefits from node  having higher signal dimensions to effectively suppress the interference.All the detectors can gather the interfered signal of the two phases and carry out a joint decision.Thus the reliability for data transmissions is assured.Additionally, the slope of the BERs of three detection approaches in high SNR regime relative to the SNR is approximately −0.5, which indicates our robustness provisioning scheme achieves a half-order diversity gain.Figure 3 illustrates the change of the EST with the average SNR, from which it can be seen that, as expected, the ESTs under the three approaches increase with the increase of the average SNR.As the average SNR increases, the difference between the EST of the three detection methods becomes smaller, which is consistent with the fact that MMSE detector degenerate into ZF detector with increase of SNR.The performances of the MMSE detector and the ML detector are close to each other and have the best performances.It can be seen that the exact values and the lower bounds given in (38) agree well for high SINRs, at the same time, the exact values and the upper bound given in (41) agree well for low SNRs.As a result of inequality of () and () in (39), the difference between upper bound and exact values is large in high SNR regime.
Finally, in Figures 4 and 5 we plot the secrecy outage probability (SOP) curves with respect to the average SNR and secrecy throughput threshold, respectively.In Figure 4 secrecy throughput thresholds corresponding to the solid line and dashed line are 0 nats/s/Hz and 1 nats/s/Hz, respectively.Because solid line corresponds to a smaller threshold, solid line's SOP is smaller than dashed line's SOP under the same average SNR.For a fixed secrecy throughput threshold, SOP decreases as the average SINR increases.SOP under ZF detection approach is higher than it is under the other detection approaches.The main reason for this phenomenon is briefly given as follows: ZF criterion only aims to reduce the interference between signal and AN, but MMSE criterion additionally considers the character of noise.Besides, ML detector as the optimal detector certainly has the best performance, and its performance is equal to MMSE in our proposed scheme, which supports our conclusion in Section 4. In Figure 5, the average SNRs corresponding to the solid line and dashed line are 20 dB and 40 dB, respectively.SOP corresponding to each curve increases with the increase of the security throughput threshold.

Conclusion
In this paper, we present a comprehensive analysis of the robust relay aided by an uncooperative jamming node in narrow-band communications for ubiquitous IoT access, which is further modeled as a two-hop AF cooperative system.We first focus on the three typical detection approaches to exploit potential security and robustness in our transmission scheme and derive the lower bounds and/or the upper bounds of the ESTs.Then we reveal that, in our framework, ML detection and MMSE detection in fact are equivalent, offering the potential low computational complexity.All the theoretical contributions are validated by numerical and

Figure 1 :
Figure 1: System model of the two-hop AF relay network with a noncooperative jammer.(a) Network topology.(b) Transmission procedures.

Figure 2 :
Figure 2: Bit error rate (BER) versus the average system SNR.

Figure 4 :Figure 5 :
Figure 4: Secrecy outage probability (SOP) versus the average SNR, where endnotes 1 and 2 represent the situation when the threshold of secrecy throughput is 0 nats/s/Hz and 1 nats/s/Hz, respectively.