Physical layer security of underlay cognitive radio using maximal ratio combining
Hui ZHAO, Dan-yang WANG, Chao-qing TANG, Ya-ping LIU, Gao-feng PAN, Ting-ting LI, Yun-fei CHEN
Physical layer security of underlay cognitive radio using maximal ratio combining
We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user (SU-TX) that transmits confidential messages to another secondary user (SU-RX) equipped with M (M ≥1) antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with N (N ≥1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.
Cognitive radio networks / Maximal ratio combining / Secrecy outage probability / Single-input multiple-output
[1] |
Alves, H., Souza, R.D., Debbah, M.,
|
[2] |
Elkashlan, M., Wang, L., Duong, T.Q.,
|
[3] |
Gradshteyn, I.S., Ryzhik, I.M., 2007. Table of Integrals, Series, and Products. Academic Press, New York.
|
[4] |
He, F.M., Man, H., Wang, W., 2011. Maximal ratio diversity combining enhanced security. IEEE Commun. Lett., 15(5):509–511. http://dx.doi.org/10.1109/LCOMM.2011.030911.102343
|
[5] |
Lee, J., Wang, H., Andrews, J.G.,
|
[6] |
Liu, H.Q., Zhao, H., Jiang, H.,
|
[7] |
Liu, Y.W., Wang, L.F., Duy, T.T.,
|
[8] |
Liu, Y.W., Wang, L.F., Zaidi, S.A.R.,
|
[9] |
Pan, G.F., Tang, C.Q., Zhang, X.,
|
[10] |
Papoulis, A., Pillai, S.U., 2002. Two Random Variables. In: Howell, R.L., Morriss, J.M. (Eds.), Probability, Random Variables and Stochastic Processes. Tata McGraw-Hill Education, Noida, p.124–148.
|
[11] |
Prudnikov, A.P., Brychkov, Y.A., Marichev, O.I., 1986. Elementary Functions. In: Queen, N.M., translator, Integrals and Series. Gordon and Breach Science Publishers, Philadelphia, p.11–45.
|
[12] |
Shiu, Y.S., Chang, S.Y., Wu, H.C.,
|
[13] |
Sun, X.J., Wang, J.H., Xu, W.,
|
[14] |
Tang, C.Q., Pan, G.F., Li, T.T., 2014. Secrecy outage analysis of underlay cognitive radio unit over Nakagamim fading channels. IEEE Wirel. Commun. Lett., 3(6):609–612. http://dx.doi.org/10.1109/LWC.2014.2350501
|
[15] |
Wang, L.F., Yang, N., Elkashlan, M.,
|
[16] |
Wang, Q.H., Wang, H.M., Yin, Q.Y., 2014. Distributed beamforming for multi-relay cognitive radio systems. Sci. China Inform. Sci., 44(8):980–992 (in Chinese). http://dx.doi.org/10.1360/N112013-00174
|
[17] |
Yang, N., Suraweera, H.A., Collings, I.B.,
|
[18] |
Yang, N., Yeoh, P.L., Elkashlan, M.,
|
[19] |
Zhang, X., Pan, G.F., Tang, C.Q.,
|
[20] |
Zhao, H., Pan, G.F., 2016. The analysis on secure communications for DF and RF relaying SIMO system with Gauss errors. Sci. China Inform. Sci., 46(3):350–360 (in Chinese).
|
[21] |
Zhao, H., Liu, H.Q., Liu, Y.P.,
|
[22] |
Zou, Y.L., Champagne, B., Zhu, W.P.,
|
/
〈 | 〉 |