In this paper, the physical layer security (PLS) analysis for a decode-and-forward (DF) protocol based multi-hop hybrid radio frequency (RF)/ free space optics (FSO) is presented. Herein, two different scenarios are considered for detecting the secured information at the destination. In the first scenario, at each hop, the received signals with higher secrecy capacity are selected. However, in the second scenario, the RF and FSO signals are simply decoded and forwarded to the next hop and selection is done at the last hop only. Each node in the system is connected to its subsequent node through parallel RF and FSO links. The FSO links and RF links are characterized by Málaga ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$\mathcal {M}$</tex-math></inline-formula> ) and Nakagami- <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$m$</tex-math></inline-formula> composite distributions respectively. For both scenarios, the secrecy outage probability (SOP), strictly positive secrecy capacity (SPSC), intercept probability (IP), and effective secrecy throughput (EST) are obtained as performance metrics. These performance metrics are obtained by considering pointing error, different optical signal detection methods, turbulence effect, and the RF link fading parameter ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$m$</tex-math></inline-formula> ). Using the results, the security and reliability trade-off analysis is discussed for two scenarios. In addition, the asymptotic results are also obtained to study the system in depth. Further, the secrecy diversity order (SDO) and secrecy coding gain (SCG) are obtained to analyse the system in depth. Finally, Monte-Carlo Simulation is performed to verify the obtained results. The results manifest that the scenario with selection at each hop provides better secrecy performance than the scenario with selection at the last hop.
Read full abstract