Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3289100.3289112acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsdeConference Proceedingsconference-collections
research-article

Secrecy Outage Performance for Dual-Hop Underlay Cognitive Radio System over Nakagami-m Fading

Published: 18 October 2018 Publication History

Abstract

In this paper, the security performance of a dual-hop underlay cognitive radio (CR) system is investigated. In this system, we consider that the transmitted information by a source node S is forwarded by a multi-antenna relay R to its intended destination D. The relay performs the maximal-ratio combining (MRC) technique to process the multiple copies of the received signal. We also consider the presence of an eavesdropper who is attempting to intercept the transmitted information at both communication links, (i.e, S-R and R-D). In underlay cognitive radio networks (CRN), the source and the relay are required to adjust their transmission power to avoid causing interference to the primary user. Under this constraint, a closed-form expression of the secrecy outage probability is derived subject to Nakagami-m fading model. The derived expression is validated using Monte-Carlo simulation for various values of fading severity parameters as well as the number of MRC branches.

References

[1]
N. Nguyen, T. Thanh, T. Duong, and A. Nallanathan, "Secure communications in cognitive underlay networks over Nakagami-m channel", Physical Commun., vol. 25, pp. 610--618, June 2017.
[2]
H. Lei, C. Gao, I. Ansari, Y. Guo, Y. Zou, G. Pan, and K.Qaraqe, "Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami-m Channels", IEEE Trans. Veh. Technol., vol. 66, no. 3, pp. 2237--2250, March 2017.
[3]
H. Lei, H. I. S. Zhang, Ansari, Z. Ren, G. Pan, K. A. Qaraqe, and M. S. Alouini, "On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks Over Nakagami-m Fading Channels", IEEE Trans. Cog. Commun. and Netw., vol. 3, no 4, pp. 614--627, Dec. 2017.
[4]
H. Tran, G. Kaddoum, F. Gagnon, and L. Sibomana, "Cognitive radio network with secrecy and interference constraints", Physical Commun., vol. 22, pp. 32--41, Dec. 2016.
[5]
M. Elkashlan, L. Wang, T. Q. Duong, G. K. Karagiannidis, and A. Nallanathan, "On the security of cognitive radio networks", IEEE Trans. Veh. Technol., vol. 64, no 8, pp. 3790--3795, Aug. 2015.
[6]
K. Ho-Van and T. Do-Dac, "Analysis of security performance of relay selection in underlay cognitive networks", IET Commun., vol. 12, no. 1, pp. 102--108, January 2018.
[7]
Y. Liu, L. Wang, T. Duy, M. Elkashlan, and T. Duong, "Relay Selection for Security Enhancement in Cognitive Relay Networks", IEEE Wireless Commun. Letters, vol. 4, no. 1, pp. 46--49, Feb. 2015.
[8]
M. Bouabdellah, F. El Bouanani, and H. Ben-azza, "Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels", Advanced Communication Technologies and Networking (CommNet), 2018 International Conference on. IEEE, pp. 1--5, 2018.
[9]
Y. Ortega, P. Upadhyay, D. B. da Costa, P. Bithas, A. Kanatas, U. Dias and R. de Sousa Junior, "Joint effect of jamming and noise on the secrecy outage performance of wiretap channels with feedback delay and multiple antennas", Trans. on Emerging Telecommunications Technologies, vol. 28, no. 11, pp. e3191, May 2017.
[10]
I. Gradshteyn, I. Ryzhik, A. Jeffrey and D. Zwillinger, Table of integrals, series and products. Oxford: Academic, 2007.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICSDE'18: Proceedings of the 2nd International Conference on Smart Digital Environment
October 2018
214 pages
ISBN:9781450365079
DOI:10.1145/3289100
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • University of Houston

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cognitive radio networks
  2. Nakagami-m fading channels
  3. maximal-ratio combining
  4. physical layer security
  5. secrecy outage probability

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICSDE'18

Acceptance Rates

ICSDE'18 Paper Acceptance Rate 32 of 80 submissions, 40%;
Overall Acceptance Rate 68 of 219 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 47
    Total Downloads
  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)3
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media