Skip to main content
Top
Published in: Wireless Personal Communications 2/2017

20-05-2017

Exact Outage Probability Analysis of a Dual-Hop Cognitive Relaying Network Under the Overhearing of an Active Eavesdropper

Authors: Sang Quang Nguyen, Hyung Yun Kong

Published in: Wireless Personal Communications | Issue 2/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we study the secure communication of dual-hop cognitive relaying networks. An eavesdropper can combine two received signals from two hops by using the maximum ratio combining technique. The data transmission from the secondary source to the secondary destination is assisted by the best decode-and-forward relay, which is selected from four relay selection schemes. The first scheme, MaSR, is based on the maximum channel gain from the source to the relays. In the second scheme, MaRD, the best relay is selected on the basis of the maximum channel gain from the relays to the destination. In the third scheme, MiRE, the gain to the eavesdroppers is instead minimized. Finally, optimal relay selection is considered as the fourth scheme. For these four schemes, we study the system security performance by deriving the exact analytical secrecy outage probability. These analytical expressions are then verified by comparing them with the results of Monte Carlo simulations. Herein, we evaluate and discuss the outage performance of the schemes while varying important system parameters: the number and locations of the relay nodes, primary user node, and eavesdropper; the transmit power threshold; and the target secure rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Silva, E. D., Santos, A. L. D., Albini, L. C. P., & Lima, M. N. (2008). Identity-based key management in mobile ad hoc networks: Schemes and applications. IEEE Wireless Communications, 15(5), 46–52.CrossRef Silva, E. D., Santos, A. L. D., Albini, L. C. P., & Lima, M. N. (2008). Identity-based key management in mobile ad hoc networks: Schemes and applications. IEEE Wireless Communications, 15(5), 46–52.CrossRef
4.
go back to reference Leung-Yan-Cheong, S., & Hellman, M. (1978). The Gaussian wire-tap channel. IEEE Transaction on Information Theory, 24(4), 451–456.MathSciNetCrossRefMATH Leung-Yan-Cheong, S., & Hellman, M. (1978). The Gaussian wire-tap channel. IEEE Transaction on Information Theory, 24(4), 451–456.MathSciNetCrossRefMATH
5.
go back to reference Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.MathSciNetCrossRefMATH Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.MathSciNetCrossRefMATH
6.
go back to reference Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure Communication Over Fading Channels. IEEE Transactions on Information Theory, 54(6), 2470–2492.MathSciNetCrossRefMATH Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure Communication Over Fading Channels. IEEE Transactions on Information Theory, 54(6), 2470–2492.MathSciNetCrossRefMATH
7.
go back to reference Barros, J., & Rodrigues, M. (2006). Secrecy capacity of wireless channels. In Proceedings of IEEE ISIT (pp. 356–360). Barros, J., & Rodrigues, M. (2006). Secrecy capacity of wireless channels. In Proceedings of IEEE ISIT (pp. 356–360).
8.
go back to reference Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.MathSciNetCrossRefMATH Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.MathSciNetCrossRefMATH
9.
go back to reference Nosratinia, A., Hunter, T. E., & Hedayat, A. (2004). Cooperative communication in wireless networks. IEEE Communications Magazine, 42(10), 74–80.CrossRef Nosratinia, A., Hunter, T. E., & Hedayat, A. (2004). Cooperative communication in wireless networks. IEEE Communications Magazine, 42(10), 74–80.CrossRef
10.
go back to reference Laneman, J. N., Tse, D. N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transaction on Information Theory, 50(12), 3062–3080.MathSciNetCrossRefMATH Laneman, J. N., Tse, D. N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transaction on Information Theory, 50(12), 3062–3080.MathSciNetCrossRefMATH
11.
go back to reference Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.MathSciNetCrossRef Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.MathSciNetCrossRef
12.
go back to reference Wang, L., Kim, K. J., Duong, T. Q., Elkashlan, M., & Poor, H. V. (2014). On the security of cooperative single carrier systems. In Proceedings of IEEE GLOBECOM (pp. 1956–1601). Wang, L., Kim, K. J., Duong, T. Q., Elkashlan, M., & Poor, H. V. (2014). On the security of cooperative single carrier systems. In Proceedings of IEEE GLOBECOM (pp. 1956–1601).
13.
go back to reference Fan, L., Lei, X., Duong, T. Q., Elkashlan, M., & Karagiannidis, G. K. (2014). Secure multiuser communications in multiple amplify-and-forward relay networks. IEEE Transactions on Communications, 62(9), 3299–3310.CrossRef Fan, L., Lei, X., Duong, T. Q., Elkashlan, M., & Karagiannidis, G. K. (2014). Secure multiuser communications in multiple amplify-and-forward relay networks. IEEE Transactions on Communications, 62(9), 3299–3310.CrossRef
14.
go back to reference Lee, J.-H. (2015). Cooperative relaying protocol for improving physical layer security in wireless decode-and-forward relaying networks. Wireless Personal Communications, 83(4), 3033–3044.CrossRef Lee, J.-H. (2015). Cooperative relaying protocol for improving physical layer security in wireless decode-and-forward relaying networks. Wireless Personal Communications, 83(4), 3033–3044.CrossRef
15.
go back to reference Fan, L., Yang, N., Duong, T. Q., Elkashlan, M., & Karagiannidis, G. K. (2016). Exploiting direct links for physical layer security in multi-user multi-relay networks. IEEE Transactions on Wireless Communications, 15(6), 3856–3867.CrossRef Fan, L., Yang, N., Duong, T. Q., Elkashlan, M., & Karagiannidis, G. K. (2016). Exploiting direct links for physical layer security in multi-user multi-relay networks. IEEE Transactions on Wireless Communications, 15(6), 3856–3867.CrossRef
16.
go back to reference Akyildiz, L. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2008). A survey on spectrum management in cognitive radio networks. IEEE Communications Magazine, 46(4), 40–48.CrossRef Akyildiz, L. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2008). A survey on spectrum management in cognitive radio networks. IEEE Communications Magazine, 46(4), 40–48.CrossRef
17.
go back to reference Duong, T. Q., Costa, D. B., Tsiftsis, T. A., Zhong, C., & Nallanathan, A. (2012). Outage and diversity of cognitive relaying systems under spectrum sharing environments in Nakagami-m fading. IEEE Communications Letters, 16(12), 2075–2078.CrossRef Duong, T. Q., Costa, D. B., Tsiftsis, T. A., Zhong, C., & Nallanathan, A. (2012). Outage and diversity of cognitive relaying systems under spectrum sharing environments in Nakagami-m fading. IEEE Communications Letters, 16(12), 2075–2078.CrossRef
18.
go back to reference Najafi, M., Ardebilipour, M., Nasab, E. S., & Vahidian, S. (2015). Multi-hop cooperative communication technique for cognitive DF and AF relay networks. Wireless Personal Communications, 83(4), 3209–3221.CrossRef Najafi, M., Ardebilipour, M., Nasab, E. S., & Vahidian, S. (2015). Multi-hop cooperative communication technique for cognitive DF and AF relay networks. Wireless Personal Communications, 83(4), 3209–3221.CrossRef
19.
go back to reference Zhang, Q., Feng, Z., Yang, T., & Li, W. (2015). Optimal power allocation and relay selection in multi-hop cognitive relay networks. Wireless Personal Communications, 86(3), 1673–1692.CrossRef Zhang, Q., Feng, Z., Yang, T., & Li, W. (2015). Optimal power allocation and relay selection in multi-hop cognitive relay networks. Wireless Personal Communications, 86(3), 1673–1692.CrossRef
20.
go back to reference Duong, T. Q., Duy, T. T., Elkashlan, M., Tran, N. H., & Dobre, O. A. (2014). Secured cooperative cognitive radio networks with relay selection. In Proceedings of IEEE GLOBECOM (pp. 3074–3079). Duong, T. Q., Duy, T. T., Elkashlan, M., Tran, N. H., & Dobre, O. A. (2014). Secured cooperative cognitive radio networks with relay selection. In Proceedings of IEEE GLOBECOM (pp. 3074–3079).
21.
go back to reference Liu, Y., Wang, L., Duy, T. T., Elkashlan, M., & Duong, T. Q. (2015). Relay selection for security enhancement in cognitive relay networks. IEEE Wireless Communications Letters, 4(1), 46–49.CrossRef Liu, Y., Wang, L., Duy, T. T., Elkashlan, M., & Duong, T. Q. (2015). Relay selection for security enhancement in cognitive relay networks. IEEE Wireless Communications Letters, 4(1), 46–49.CrossRef
22.
go back to reference Gradshteyn, I. S., & Ryzhik, I. M. (2007). Table of integrals, series, and products (7th ed.). Waltham: Academic.MATH Gradshteyn, I. S., & Ryzhik, I. M. (2007). Table of integrals, series, and products (7th ed.). Waltham: Academic.MATH
Metadata
Title
Exact Outage Probability Analysis of a Dual-Hop Cognitive Relaying Network Under the Overhearing of an Active Eavesdropper
Authors
Sang Quang Nguyen
Hyung Yun Kong
Publication date
20-05-2017
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4297-x

Other articles of this Issue 2/2017

Wireless Personal Communications 2/2017 Go to the issue