Physical layer security of underlay cognitive radio using maximal ratio combining

Hui ZHAO , Dan-yang WANG , Chao-qing TANG , Ya-ping LIU , Gao-feng PAN , Ting-ting LI , Yun-fei CHEN

Front. Inform. Technol. Electron. Eng ›› 2016, Vol. 17 ›› Issue (9) : 929 -937.

PDF (380KB)
Front. Inform. Technol. Electron. Eng ›› 2016, Vol. 17 ›› Issue (9) : 929 -937. DOI: 10.1631/FITEE.1500351
Article
Article

Physical layer security of underlay cognitive radio using maximal ratio combining

Author information +
History +
PDF (380KB)

Abstract

We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user (SU-TX) that transmits confidential messages to another secondary user (SU-RX) equipped with M (M 1) antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with N (N 1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.

Keywords

Cognitive radio networks / Maximal ratio combining / Secrecy outage probability / Single-input multiple-output

Cite this article

Download citation ▾
Hui ZHAO, Dan-yang WANG, Chao-qing TANG, Ya-ping LIU, Gao-feng PAN, Ting-ting LI, Yun-fei CHEN. Physical layer security of underlay cognitive radio using maximal ratio combining. Front. Inform. Technol. Electron. Eng, 2016, 17(9): 929-937 DOI:10.1631/FITEE.1500351

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Alves, H., Souza, R.D., Debbah, M., , 2012. Performance of transmit antenna selection physical layer security schemes. IEEE Signal Process. Lett., 19(6):372–375.

[2]

Elkashlan, M., Wang, L., Duong, T.Q., , 2015. On the security of cognitive radio networks. IEEE Trans. Veh. Technol., 64(8):3790–3795.

[3]

Gradshteyn, I.S., Ryzhik, I.M., 2007. Table of Integrals, Series, and Products. Academic Press, New York.

[4]

He, F.M., Man, H., Wang, W., 2011. Maximal ratio diversity combining enhanced security. IEEE Commun. Lett., 15(5):509–511.

[5]

Lee, J., Wang, H., Andrews, J.G., , 2011. Outage probability of cognitive relay networks with interference constraints. IEEE Trans. Wirel. Commun., 10(2):390–395.

[6]

Liu, H.Q., Zhao, H., Jiang, H., , 2016. Physical-layer secrecy outage of spectrum sharing CR systems over fading channels. Sci. China Inform. Sci., in press.

[7]

Liu, Y.W., Wang, L.F., Duy, T.T., , 2015. Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett., 4(1):46–49.

[8]

Liu, Y.W., Wang, L.F., Zaidi, S.A.R., , 2016. Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Trans. Commun., 64(1):329–342.

[9]

Pan, G.F., Tang, C.Q., Zhang, X., , 2015. Physical layer security over non-small scale fading channels. IEEE Trans. Veh. Techol., 65(3):1326–1339.

[10]

Papoulis, A., Pillai, S.U., 2002. Two Random Variables. In: Howell, R.L., Morriss, J.M. (Eds.), Probability, Random Variables and Stochastic Processes. Tata McGraw-Hill Education, Noida, p.124–148.

[11]

Prudnikov, A.P., Brychkov, Y.A., Marichev, O.I., 1986. Elementary Functions. In: Queen, N.M., translator, Integrals and Series. Gordon and Breach Science Publishers, Philadelphia, p.11–45.

[12]

Shiu, Y.S., Chang, S.Y., Wu, H.C., , 2011. Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun., 18(2):66–74.

[13]

Sun, X.J., Wang, J.H., Xu, W., , 2012. Performance of secure communications over correlated fading channels. IEEE Signal Process. Lett., 19(8):479–482.

[14]

Tang, C.Q., Pan, G.F., Li, T.T., 2014. Secrecy outage analysis of underlay cognitive radio unit over Nakagamim fading channels. IEEE Wirel. Commun. Lett., 3(6):609–612.

[15]

Wang, L.F., Yang, N., Elkashlan, M., , 2014. Physical layer security of maximal ratio combining in two-wave diffuse power fading channels. IEEE Trans. Inform. Foren. Sec., 9(2):247–258.

[16]

Wang, Q.H., Wang, H.M., Yin, Q.Y., 2014. Distributed beamforming for multi-relay cognitive radio systems. Sci. China Inform. Sci., 44(8):980–992 (in Chinese).

[17]

Yang, N., Suraweera, H.A., Collings, I.B., , 2013a. Physical layer security of TAS/MRC with antenna correlation. IEEE Trans. Inform. Foren. Sec., 8(1):254–259.

[18]

Yang, N., Yeoh, P.L., Elkashlan, M., , 2013b. Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Commun., 61(1):144–154.

[19]

Zhang, X., Pan, G.F., Tang, C.Q., , 2014. Performance analysis of physical layer security over independent/correlated log-normal fading channels. IEEE Telecommunication Networks and Applications Conf., p.23–27.

[20]

Zhao, H., Pan, G.F., 2016. The analysis on secure communications for DF and RF relaying SIMO system with Gauss errors. Sci. China Inform. Sci., 46(3):350–360 (in Chinese).

[21]

Zhao, H., Liu, H.Q., Liu, Y.P., , 2015. Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels. IEEE Int. Conf. on Communication Software and Networks, p.201–205.

[22]

Zou, Y.L., Champagne, B., Zhu, W.P., , 2015. Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEETrans. Commun., 63(1): 215–228.

RIGHTS & PERMISSIONS

Zhejiang University and Springer-Verlag Berlin Heidelberg

AI Summary AI Mindmap
PDF (380KB)

Supplementary files

FITEE-0929-16007-HZ_suppl_1

FITEE-0929-16007-HZ_suppl_2

2694

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/