Physical layer security of underlay cognitive radio using maximal ratio combining

Hui ZHAO, Dan-yang WANG, Chao-qing TANG, Ya-ping LIU, Gao-feng PAN, Ting-ting LI, Yun-fei CHEN

PDF(380 KB)
PDF(380 KB)
Front. Inform. Technol. Electron. Eng ›› 2016, Vol. 17 ›› Issue (9) : 929-937. DOI: 10.1631/FITEE.1500351
Article
Article

Physical layer security of underlay cognitive radio using maximal ratio combining

Author information +
History +

Abstract

We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user (SU-TX) that transmits confidential messages to another secondary user (SU-RX) equipped with M (M 1) antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with N (N 1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.

Keywords

Cognitive radio networks / Maximal ratio combining / Secrecy outage probability / Single-input multiple-output

Cite this article

Download citation ▾
Hui ZHAO, Dan-yang WANG, Chao-qing TANG, Ya-ping LIU, Gao-feng PAN, Ting-ting LI, Yun-fei CHEN. Physical layer security of underlay cognitive radio using maximal ratio combining. Front. Inform. Technol. Electron. Eng, 2016, 17(9): 929‒937 https://doi.org/10.1631/FITEE.1500351

References

[1]
Alves, H., Souza, R.D., Debbah, M., , 2012. Performance of transmit antenna selection physical layer security schemes. IEEE Signal Process. Lett., 19(6):372–375. http://dx.doi.org/10.1109/LSP.2012.2195490
[2]
Elkashlan, M., Wang, L., Duong, T.Q., , 2015. On the security of cognitive radio networks. IEEE Trans. Veh. Technol., 64(8):3790–3795. http://dx.doi.org/10.1109/TVT.2014.2358624
[3]
Gradshteyn, I.S., Ryzhik, I.M., 2007. Table of Integrals, Series, and Products. Academic Press, New York.
[4]
He, F.M., Man, H., Wang, W., 2011. Maximal ratio diversity combining enhanced security. IEEE Commun. Lett., 15(5):509–511. http://dx.doi.org/10.1109/LCOMM.2011.030911.102343
[5]
Lee, J., Wang, H., Andrews, J.G., , 2011. Outage probability of cognitive relay networks with interference constraints. IEEE Trans. Wirel. Commun., 10(2):390–395. http://dx.doi.org/10.1109/TWC.2010.120310.090852
[6]
Liu, H.Q., Zhao, H., Jiang, H., , 2016. Physical-layer secrecy outage of spectrum sharing CR systems over fading channels. Sci. China Inform. Sci., in press. http://dx.doi.org/10.1007/s11432-015-5451-2
[7]
Liu, Y.W., Wang, L.F., Duy, T.T., , 2015. Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett., 4(1):46–49. http://dx.doi.org/10.1109/LWC.2014.2365808
[8]
Liu, Y.W., Wang, L.F., Zaidi, S.A.R., , 2016. Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Trans. Commun., 64(1):329–342. http://dx.doi.org/10.1109/TCOMM.2015.2498171
[9]
Pan, G.F., Tang, C.Q., Zhang, X., , 2015. Physical layer security over non-small scale fading channels. IEEE Trans. Veh. Techol., 65(3):1326–1339. http://dx.doi.org/10.1109/TVT.2015.2412140
[10]
Papoulis, A., Pillai, S.U., 2002. Two Random Variables. In: Howell, R.L., Morriss, J.M. (Eds.), Probability, Random Variables and Stochastic Processes. Tata McGraw-Hill Education, Noida, p.124–148.
[11]
Prudnikov, A.P., Brychkov, Y.A., Marichev, O.I., 1986. Elementary Functions. In: Queen, N.M., translator, Integrals and Series. Gordon and Breach Science Publishers, Philadelphia, p.11–45.
[12]
Shiu, Y.S., Chang, S.Y., Wu, H.C., , 2011. Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun., 18(2):66–74. http://dx.doi.org/10.1109/MWC.2011.5751298
[13]
Sun, X.J., Wang, J.H., Xu, W., , 2012. Performance of secure communications over correlated fading channels. IEEE Signal Process. Lett., 19(8):479–482. http://dx.doi.org/10.1109/LSP.2012.2203302
[14]
Tang, C.Q., Pan, G.F., Li, T.T., 2014. Secrecy outage analysis of underlay cognitive radio unit over Nakagamim fading channels. IEEE Wirel. Commun. Lett., 3(6):609–612. http://dx.doi.org/10.1109/LWC.2014.2350501
[15]
Wang, L.F., Yang, N., Elkashlan, M., , 2014. Physical layer security of maximal ratio combining in two-wave diffuse power fading channels. IEEE Trans. Inform. Foren. Sec., 9(2):247–258. http://dx.doi.org/10.1109/TIFS.2013.2296991
[16]
Wang, Q.H., Wang, H.M., Yin, Q.Y., 2014. Distributed beamforming for multi-relay cognitive radio systems. Sci. China Inform. Sci., 44(8):980–992 (in Chinese). http://dx.doi.org/10.1360/N112013-00174
[17]
Yang, N., Suraweera, H.A., Collings, I.B., , 2013a. Physical layer security of TAS/MRC with antenna correlation. IEEE Trans. Inform. Foren. Sec., 8(1):254–259. http://dx.doi.org/10.1109/TIFS.2012.2223681
[18]
Yang, N., Yeoh, P.L., Elkashlan, M., , 2013b. Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Commun., 61(1):144–154. http://dx.doi.org/10.1109/TCOMM.2012.12.110670
[19]
Zhang, X., Pan, G.F., Tang, C.Q., , 2014. Performance analysis of physical layer security over independent/correlated log-normal fading channels. IEEE Telecommunication Networks and Applications Conf., p.23–27. http://dx.doi.org/10.1109/ATNAC.2014.7020868
[20]
Zhao, H., Pan, G.F., 2016. The analysis on secure communications for DF and RF relaying SIMO system with Gauss errors. Sci. China Inform. Sci., 46(3):350–360 (in Chinese).
[21]
Zhao, H., Liu, H.Q., Liu, Y.P., , 2015. Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels. IEEE Int. Conf. on Communication Software and Networks, p.201–205. http://dx.doi.org/10.1109/ICCSN.2015.7296154
[22]
Zou, Y.L., Champagne, B., Zhu, W.P., , 2015. Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEETrans. Commun., 63(1): 215–228. http://dx.doi.org/10.1109/TCOMM.2014.2377239

RIGHTS & PERMISSIONS

2016 Zhejiang University and Springer-Verlag Berlin Heidelberg
PDF(380 KB)

Accesses

Citations

Detail

Sections
Recommended

/