Skip to main content
Top
Published in: Wireless Networks 3/2021

09-09-2019

Energy harvesting cognitive radio networks: security analysis for Nakagami-m fading

Authors: Thiem Do-Dac, Khuong Ho-Van

Published in: Wireless Networks | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Energy harvesting has lately been of particular attention to researchers. In addition, cognitive radio networks (CRNs) are recognized as an attainable measure for the problem of radio spectrum shortage in next generation radio access. A combination of these two technologies, which forms energy harvesting CRNs (EHCRNs), allows wireless communication terminals to prolong their operation time in limited spectrum scenarios. Nonetheless, that CRNs create opportunities for secondary users to access primary users’ spectrum induces vulnerability of message security. So far, security capability analysis of EHCRNs has been limited to Rayleigh fading whilst Nakagami-m fading is more common than Rayleigh fading and better reflects distinct fading severity degrees in practical scenarios. Accordingly, this paper firstly offers the precise security capability analysis of EHCRNs under interference power constraint, Nakagami-m fading, maximum transmit power constraint, and primary interference. Then, the offered analysis is ratified by computer simulations. Ultimately, multiple results reveal that the security capability is considerably improved with smaller primary interference and lower required security threshold. Moreover, the security capability is significantly impacted by channel severity and is optimized with appropriate selection of time percentage.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Lopez-Yela, A., & Segovia-Vargas, D. (2017). A triple-band bow-tie rectenna for RF energy harvesting without matching network. In Paper presented at the 2017 IEEE wireless power transfer conference (WPTC). Lopez-Yela, A., & Segovia-Vargas, D. (2017). A triple-band bow-tie rectenna for RF energy harvesting without matching network. In Paper presented at the 2017 IEEE wireless power transfer conference (WPTC).
3.
go back to reference Zhao, N., Zhang, S., Yu, F. R., Chen, Y., Nallanathan, A., & Leung, V. C. M. (2017). Exploiting interference for energy harvesting: A survey, research issues, and challenges. IEEE Access, 5, 10403–10421.CrossRef Zhao, N., Zhang, S., Yu, F. R., Chen, Y., Nallanathan, A., & Leung, V. C. M. (2017). Exploiting interference for energy harvesting: A survey, research issues, and challenges. IEEE Access, 5, 10403–10421.CrossRef
4.
go back to reference Huang, K., & Zhou, X. (2015). Cutting the last wires for mobile communications by microwave power transfer. IEEE Communications Magazine, 53(6), 86–93.MathSciNetCrossRef Huang, K., & Zhou, X. (2015). Cutting the last wires for mobile communications by microwave power transfer. IEEE Communications Magazine, 53(6), 86–93.MathSciNetCrossRef
5.
go back to reference Bito, J., Palazzi, V., Hester, J., Bahr, R., Alimenti, F., Mezzanotte, P., & Tentzeris, M. M. (2017). Millimeter-wave ink-jet printed RF energy harvester for next generation flexible electronics. In Paper presented at the 2017 IEEE wireless power transfer conference (WPTC). Bito, J., Palazzi, V., Hester, J., Bahr, R., Alimenti, F., Mezzanotte, P., & Tentzeris, M. M. (2017). Millimeter-wave ink-jet printed RF energy harvester for next generation flexible electronics. In Paper presented at the 2017 IEEE wireless power transfer conference (WPTC).
6.
go back to reference Khattab, A., Elgaml, N., & Mourad, H. (2019). Single-channel slotted contention in cognitive radio vehicular networks. IET Communications, 13(8), 1078–1089.CrossRef Khattab, A., Elgaml, N., & Mourad, H. (2019). Single-channel slotted contention in cognitive radio vehicular networks. IET Communications, 13(8), 1078–1089.CrossRef
7.
go back to reference Liu, M., Zhang, J., Lin, Y., Wu, Z., Shang, B., & Gong, F. (2019). Carrier frequency estimation of time-frequency overlapped MASK signals for underlay cognitive radio network. IEEE Access, 7, 58277–58285.CrossRef Liu, M., Zhang, J., Lin, Y., Wu, Z., Shang, B., & Gong, F. (2019). Carrier frequency estimation of time-frequency overlapped MASK signals for underlay cognitive radio network. IEEE Access, 7, 58277–58285.CrossRef
10.
go back to reference Singh, A., Bhatnagar, M. R., & Mallik, R. K. (2016). Secrecy outage of a simultaneous wireless information and power transfer cognitive radio system. IEEE Wireless Communications Letters, 5(3), 288–291.CrossRef Singh, A., Bhatnagar, M. R., & Mallik, R. K. (2016). Secrecy outage of a simultaneous wireless information and power transfer cognitive radio system. IEEE Wireless Communications Letters, 5(3), 288–291.CrossRef
11.
go back to reference Yan, P., Zou, Y., & Zhu, J. (2018). Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems. IEEE Transactions on Vehicular Technology, 67(3), 2084–2096.CrossRef Yan, P., Zou, Y., & Zhu, J. (2018). Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems. IEEE Transactions on Vehicular Technology, 67(3), 2084–2096.CrossRef
12.
go back to reference Mobini, Z., & Mohammadi, M. (2017). Secure spectrum-sharing networks with full-duplex multiple-antenna wireless-powered secondary system. In Paper presented at the 2017 IEEE international black sea conference on communications and networking (BlackSeaCom). Mobini, Z., & Mohammadi, M. (2017). Secure spectrum-sharing networks with full-duplex multiple-antenna wireless-powered secondary system. In Paper presented at the 2017 IEEE international black sea conference on communications and networking (BlackSeaCom).
13.
go back to reference Lei, H., Xu, M., Ansari, I. S., Pan, G., Qaraqe, K. A., & Alouini, M. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transactions on Green Communications and Networking, 1(2), 192–203.CrossRef Lei, H., Xu, M., Ansari, I. S., Pan, G., Qaraqe, K. A., & Alouini, M. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transactions on Green Communications and Networking, 1(2), 192–203.CrossRef
14.
go back to reference Liu, Y., Wang, L., Zaidi, S. A. R., Elkashlan, M., & Duong, T. Q. (2016). Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model. IEEE Transactions on Communications, 64(1), 329–342.CrossRef Liu, Y., Wang, L., Zaidi, S. A. R., Elkashlan, M., & Duong, T. Q. (2016). Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model. IEEE Transactions on Communications, 64(1), 329–342.CrossRef
15.
go back to reference Mou, W., Yang, W., Xu, X., Li, X., & Cai, Y. (2016). Secure transmission in spectrum-sharing cognitive networks with wireless power transfer. In Paper presented at the 2016 8th international conference on wireless communications & signal processing (WCSP). Mou, W., Yang, W., Xu, X., Li, X., & Cai, Y. (2016). Secure transmission in spectrum-sharing cognitive networks with wireless power transfer. In Paper presented at the 2016 8th international conference on wireless communications & signal processing (WCSP).
16.
go back to reference Ho-Van, K., & Do-Dac, T. (2019). Performance analysis of jamming technique in energy harvesting cognitive radio networks. Telecommunication Systems, 70(3), 321–336.CrossRef Ho-Van, K., & Do-Dac, T. (2019). Performance analysis of jamming technique in energy harvesting cognitive radio networks. Telecommunication Systems, 70(3), 321–336.CrossRef
17.
go back to reference Hieu, T. D., Duy, T. T., & Choi, S. G. (2018). Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper. In Paper presented at the 2018 20th international conference on advanced communication technology (ICACT). Hieu, T. D., Duy, T. T., & Choi, S. G. (2018). Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper. In Paper presented at the 2018 20th international conference on advanced communication technology (ICACT).
18.
go back to reference Maji, P., Prasad, B., Roy, S. D., & Kundu, S. (2018). Secrecy outage of a cognitive radio network with selection of energy harvesting relay and imperfect CSI. Wireless Personal Communications, 100(2), 571–586.CrossRef Maji, P., Prasad, B., Roy, S. D., & Kundu, S. (2018). Secrecy outage of a cognitive radio network with selection of energy harvesting relay and imperfect CSI. Wireless Personal Communications, 100(2), 571–586.CrossRef
19.
go back to reference Benedict, F. P., Maji, P., Roy, S. D., & Kundu, S. (2017). Secrecy analysis of a cognitive radio network with an energy harvesting AF relay. In Paper presented at the 2017 international conference on wireless communications, signal processing and networking (WiSPNET). Benedict, F. P., Maji, P., Roy, S. D., & Kundu, S. (2017). Secrecy analysis of a cognitive radio network with an energy harvesting AF relay. In Paper presented at the 2017 international conference on wireless communications, signal processing and networking (WiSPNET).
20.
go back to reference Maji, P., Roy, S. D., & Kundu, S. (2018). Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link. IET Communications, 12(11), 1389–1395.CrossRef Maji, P., Roy, S. D., & Kundu, S. (2018). Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link. IET Communications, 12(11), 1389–1395.CrossRef
21.
go back to reference Raghuwanshi, S., Maji, P., Roy, S. D., & Kundu, S. (2016). Secrecy performance of a dual hop cognitive relay network with an energy harvesting relay. In Paper presented at the 2016 international conference on advances in computing, communications and informatics (ICACCI). Raghuwanshi, S., Maji, P., Roy, S. D., & Kundu, S. (2016). Secrecy performance of a dual hop cognitive relay network with an energy harvesting relay. In Paper presented at the 2016 international conference on advances in computing, communications and informatics (ICACCI).
24.
go back to reference Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series, and products, edited by A. New York: Jeffrey Academic.MATH Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series, and products, edited by A. New York: Jeffrey Academic.MATH
26.
go back to reference Ho-Van, K. (2017). Influence of channel information imperfection on outage probability of cooperative cognitive networks with partial relay selection. Wireless Personal Communications, 94(4), 3285–3302.CrossRef Ho-Van, K. (2017). Influence of channel information imperfection on outage probability of cooperative cognitive networks with partial relay selection. Wireless Personal Communications, 94(4), 3285–3302.CrossRef
27.
go back to reference Yulong, Z., Xianbin, W., & Weiming, S. (2013). Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Transactions on Communications, 61(12), 5103–5113.CrossRef Yulong, Z., Xianbin, W., & Weiming, S. (2013). Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Transactions on Communications, 61(12), 5103–5113.CrossRef
28.
go back to reference Papoulis, A., & Pillai, S. U. (2002). Probability, random variables, and stochastic processes. New York: Tata McGraw-Hill Education. Papoulis, A., & Pillai, S. U. (2002). Probability, random variables, and stochastic processes. New York: Tata McGraw-Hill Education.
Metadata
Title
Energy harvesting cognitive radio networks: security analysis for Nakagami-m fading
Authors
Thiem Do-Dac
Khuong Ho-Van
Publication date
09-09-2019
Publisher
Springer US
Published in
Wireless Networks / Issue 3/2021
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-02132-1

Other articles of this Issue 3/2021

Wireless Networks 3/2021 Go to the issue