Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 10/2021

17.03.2021 | Research Article-Electrical Engineering

Overlay Networks with Jamming and Energy Harvesting: Security Analysis

verfasst von: Khuong Ho-Van, Thiem Do-Dac

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 10/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In cognitive radio networks, direct communications between a primary sender–recipient pair may be blocked due to uncertainties such as deep fading. Therefore, this paper studies overlay networks where the message of the primary sender is relayed by the secondary transmitter who also transmits its privacy message to support this communications. However, messages of the secondary transmitter may also be overheard by eavesdroppers. To secure these messages, jammers are exploited to restrict overhearing. Moreover, in order to improve energy efficiency, the secondary transmitter and all jammers only use energy harvested from primary signals for their transmission. To evaluate the security capability of both primary and secondary networks without exhaustive simulations, exact closed-form expressions of primary/secondary secrecy outage probabilities are first proposed. Then, multiple theoretical/simulated results show the validity of the proposed expressions and security improvement with increasing the number of jammers. Finally, exhaustive search based on the proposed expressions can find optimum design parameters, which perfectly serve as design instructions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
The system model in [18] and [19] was studied in [23]. However, the secondary transmitter was assumed to harvest energy from the ambient rather than RF signals, considerably simplifying the analysis. Furthermore, [23] (similarly, [24]) did not employ the jamming technique. Therefore, references like [23] and [24] are not objectives to be surveyed.
 
2
The message decoder assumably consumes negligible power. The negligible power consumption of the message decoder is widely acknowledged in existing publications (e.g., [20, 2631]).
 
3
In [20], \(\texttt {S}\) always relays \(\texttt {P}\)’s message in the Stage 2. This can cause error propagation for \(\texttt {P}\)’s message. However, [20] did not analyze the SOP of both primary and secondary networks, and hence, error propagation was not accounted for the SOP analysis.
 
4
For example, [1821] and [32] proposed a collaborative hand-shaking merely among \(\texttt {J}_j, \texttt {R}\) and \(\texttt {D}\) for \(\texttt {J}_j\) to securely share the seed of its jamming signal generator with \(\texttt {R}\) and \(\texttt {D}\).
 
5
In the case that N jammers are not colocated, the pdf of Z is derived by directly applying [33, eq. (5)]. However, the subsequent derivations for this case are the same as those described in this paper. Therefore, the extension of the analysis to this case is straightforward.
 
Literatur
1.
Zurück zum Zitat Wazid, M.; et al.: Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access 9, 4466–4489 (2020)CrossRef Wazid, M.; et al.: Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access 9, 4466–4489 (2020)CrossRef
2.
Zurück zum Zitat Gustavsson, U.; et al.: Implementation challenges and opportunities in beyond-5G and 6G communication. IEEE J. Microw. 1(1), 86–100 (2021)CrossRef Gustavsson, U.; et al.: Implementation challenges and opportunities in beyond-5G and 6G communication. IEEE J. Microw. 1(1), 86–100 (2021)CrossRef
3.
Zurück zum Zitat López, O.L.A., et al.: Massive wireless energy transfer: enabling sustainable IoT towards 6G era. IEEE IoT J. (accepted) López, O.L.A., et al.: Massive wireless energy transfer: enabling sustainable IoT towards 6G era. IEEE IoT J. (accepted)
4.
Zurück zum Zitat Bany Salameh, H.: Quantifying the impact of time-sharing on route capacity in cognitive radio networks with full-duplex capability. IEEE Commun. Lett. 25(1), 94–98 (2021)CrossRef Bany Salameh, H.: Quantifying the impact of time-sharing on route capacity in cognitive radio networks with full-duplex capability. IEEE Commun. Lett. 25(1), 94–98 (2021)CrossRef
5.
Zurück zum Zitat Zheng, K., et al.: Throughput maximization of wireless-powered communication networks: an energy threshold approach. IEEE Trans. Veh. Technol. 70(2), 1292–1306 (2021) Zheng, K., et al.: Throughput maximization of wireless-powered communication networks: an energy threshold approach. IEEE Trans. Veh. Technol. 70(2), 1292–1306 (2021)
6.
Zurück zum Zitat Zhang, M., et al.: Exploiting deep learning for secure transmission in an underlay cognitive radio network. IEEE Trans. Veh. Technol. 70(1), 726–741 (2021) Zhang, M., et al.: Exploiting deep learning for secure transmission in an underlay cognitive radio network. IEEE Trans. Veh. Technol. 70(1), 726–741 (2021)
7.
Zurück zum Zitat Ho-Van, K.; et al.: Security enhancement for energy harvesting cognitive networks with relay selection. Wire. Commun. Mob. Comput. 2020, 1–13 (2020)CrossRef Ho-Van, K.; et al.: Security enhancement for energy harvesting cognitive networks with relay selection. Wire. Commun. Mob. Comput. 2020, 1–13 (2020)CrossRef
8.
Zurück zum Zitat Koca, M.; et al.: Empirical feasibility analysis for energy harvesting intravehicular wireless sensor networks. IEEE IoT J. 8(1), 179–186 (2021) Koca, M.; et al.: Empirical feasibility analysis for energy harvesting intravehicular wireless sensor networks. IEEE IoT J. 8(1), 179–186 (2021)
9.
Zurück zum Zitat Schmickl, S.; et al.: An RF-energy harvester and ir-uwb transmitter for ultra-low-power battery-less biosensors. IEEE Trans. Circuits Syst. I Regul. Pap. 67(5), 1459–1468 (2020)CrossRef Schmickl, S.; et al.: An RF-energy harvester and ir-uwb transmitter for ultra-low-power battery-less biosensors. IEEE Trans. Circuits Syst. I Regul. Pap. 67(5), 1459–1468 (2020)CrossRef
10.
Zurück zum Zitat Le Anh, T.; et al.: Secrecy performance of a multi-NOMA–MIMO system in the UEH Relaying Network Using the PSO algorithm. IEEE Access 9, 2317–2331 (2020)CrossRef Le Anh, T.; et al.: Secrecy performance of a multi-NOMA–MIMO system in the UEH Relaying Network Using the PSO algorithm. IEEE Access 9, 2317–2331 (2020)CrossRef
11.
Zurück zum Zitat Nie, Y.; et al.: Achievable rate region of energy-harvesting based secure two-way buffer-aided relay networks. IEEE Trans. Inf. Forens. Secur. 16, 1610–1625 (2020)CrossRef Nie, Y.; et al.: Achievable rate region of energy-harvesting based secure two-way buffer-aided relay networks. IEEE Trans. Inf. Forens. Secur. 16, 1610–1625 (2020)CrossRef
12.
Zurück zum Zitat Stai, E.; et al.: Optimal resource allocation in multihop wireless networks relying on energy harvesting. IEEE Commun. Lett. 25(1), 224–228 (2021)MathSciNetCrossRef Stai, E.; et al.: Optimal resource allocation in multihop wireless networks relying on energy harvesting. IEEE Commun. Lett. 25(1), 224–228 (2021)MathSciNetCrossRef
13.
Zurück zum Zitat Budhiraja, I., et al.: SWIPT-enabled D2D communication underlaying NOMA-based cellular networks in imperfect CSI. IEEE Trans. Veh. Technol. 70(1), 692–699 (2021) Budhiraja, I., et al.: SWIPT-enabled D2D communication underlaying NOMA-based cellular networks in imperfect CSI. IEEE Trans. Veh. Technol. 70(1), 692–699 (2021)
14.
Zurück zum Zitat Kim, B., et al.: Joint channel estimation, training design, Tx power allocation, and Rx power splitting for MIMO SWIPT systems. IEEE Commun. Lett. (accepted) Kim, B., et al.: Joint channel estimation, training design, Tx power allocation, and Rx power splitting for MIMO SWIPT systems. IEEE Commun. Lett. (accepted)
15.
Zurück zum Zitat Masotti, D.; et al.: RF systems design for simultaneous wireless information and power transfer (SWIPT) in automation and transportation. IEEE J. Microw. 1(1), 164–175 (2021)CrossRef Masotti, D.; et al.: RF systems design for simultaneous wireless information and power transfer (SWIPT) in automation and transportation. IEEE J. Microw. 1(1), 164–175 (2021)CrossRef
16.
Zurück zum Zitat Thapar, S., et al.: Decoding orders for securing untrusted NOMA. IEEE Netw. Lett. 3(1), 27–30 (2021) Thapar, S., et al.: Decoding orders for securing untrusted NOMA. IEEE Netw. Lett. 3(1), 27–30 (2021)
17.
Zurück zum Zitat Abdullah, Z.; et al.: Enhanced secrecy performance of multihop iot networks with cooperative hybrid-duplex jamming. IEEE Trans. Inf. Forens. Secur. 16, 161–172 (2020)CrossRef Abdullah, Z.; et al.: Enhanced secrecy performance of multihop iot networks with cooperative hybrid-duplex jamming. IEEE Trans. Inf. Forens. Secur. 16, 161–172 (2020)CrossRef
18.
Zurück zum Zitat Su, R., et al.: Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems. In: Proceedings of the IEEE WCNC, Barcelona, Spain, pp. 1–6 (2018) Su, R., et al.: Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems. In: Proceedings of the IEEE WCNC, Barcelona, Spain, pp. 1–6 (2018)
19.
Zurück zum Zitat Su, R., et al.: Secure cooperative transmission in cognitive AF relay systems with destination-aided jamming and energy harvesting. In: Proceedings of the IEEE PIMRC, Istanbul, Turkey, pp. 1–5 (2019) Su, R., et al.: Secure cooperative transmission in cognitive AF relay systems with destination-aided jamming and energy harvesting. In: Proceedings of the IEEE PIMRC, Istanbul, Turkey, pp. 1–5 (2019)
20.
Zurück zum Zitat Wang, D.; et al.: Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks. IEEE Trans. Cogn. Commun. Netw. 6(2), 683–693 (2020)CrossRef Wang, D.; et al.: Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks. IEEE Trans. Cogn. Commun. Netw. 6(2), 683–693 (2020)CrossRef
21.
Zurück zum Zitat Xu, M.; et al.: Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks. In: Proceedings of the IEEE WCNC, Barcelona, Spain, pp. 1–6 (2018) Xu, M.; et al.: Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks. In: Proceedings of the IEEE WCNC, Barcelona, Spain, pp. 1–6 (2018)
22.
Zurück zum Zitat Dang-Ngoc, H., et al.: Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise. In: Proceedings of the IEEE SigTelCom, Hanoi, Vietnam, 28–29, pp. 77–81 (2020) Dang-Ngoc, H., et al.: Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise. In: Proceedings of the IEEE SigTelCom, Hanoi, Vietnam, 28–29, pp. 77–81 (2020)
23.
Zurück zum Zitat Chen, L.; et al.: Primary secrecy is achievable: optimal secrecy rate in overlay CRNs with an energy harvesting secondary transmitter. In: Proceedings of the ICCCN, Las Vegas, USA, pp. 1–6 (2015) Chen, L.; et al.: Primary secrecy is achievable: optimal secrecy rate in overlay CRNs with an energy harvesting secondary transmitter. In: Proceedings of the ICCCN, Las Vegas, USA, pp. 1–6 (2015)
24.
Zurück zum Zitat Li, M.; et al.: Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Trans. Veh. Technol. 67(11), 11274–11279 (2018)CrossRef Li, M.; et al.: Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Trans. Veh. Technol. 67(11), 11274–11279 (2018)CrossRef
25.
Zurück zum Zitat Gradshteyn, I.S.; Ryzhik, I.M.: Table of Integrals, Series and Products, 6th edn. Academic, San Diego (2000)MATH Gradshteyn, I.S.; Ryzhik, I.M.: Table of Integrals, Series and Products, 6th edn. Academic, San Diego (2000)MATH
26.
Zurück zum Zitat Ho-Van, K.; et al.: Security performance of underlay cognitive relaying networks with energy harvesting. Wirel. Pers. Commun. 110(2), 829–846 (2020)CrossRef Ho-Van, K.; et al.: Security performance of underlay cognitive relaying networks with energy harvesting. Wirel. Pers. Commun. 110(2), 829–846 (2020)CrossRef
27.
Zurück zum Zitat Ho-Van, K.; et al.: Security analysis for underlay cognitive network with energy scavenging capable relay over Nakagami-m fading channels. Wirel. Commun. Mob. Comput. 2019, 1–16 (2019) Ho-Van, K.; et al.: Security analysis for underlay cognitive network with energy scavenging capable relay over Nakagami-m fading channels. Wirel. Commun. Mob. Comput. 2019, 1–16 (2019)
28.
Zurück zum Zitat Nguyen-Huu, P.; et al.: Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer. IET Commun. 13(13), 1877–1885 (2019)CrossRef Nguyen-Huu, P.; et al.: Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer. IET Commun. 13(13), 1877–1885 (2019)CrossRef
29.
Zurück zum Zitat Ge, L.; et al.: Performance analysis for multihop cognitive radio networks with energy harvesting by using stochastic geometry. IEEE IoT J. 7(2), 1154–1163 (2020) Ge, L.; et al.: Performance analysis for multihop cognitive radio networks with energy harvesting by using stochastic geometry. IEEE IoT J. 7(2), 1154–1163 (2020)
30.
Zurück zum Zitat Solanki, S.; et al.: Performance analysis of piece-wise linear model of energy harvesting-based multiuser overlay spectrum sharing networks. IEEE OJ-CS 1, 1820–1836 (2020) Solanki, S.; et al.: Performance analysis of piece-wise linear model of energy harvesting-based multiuser overlay spectrum sharing networks. IEEE OJ-CS 1, 1820–1836 (2020)
31.
Zurück zum Zitat Bayat, S.; et al.: Resource allocation for MC MISO-NOMA SWIPT-enabled hetnets with non-linear energy harvesting. IEEE Access 8, 192270–192281 (2020)CrossRef Bayat, S.; et al.: Resource allocation for MC MISO-NOMA SWIPT-enabled hetnets with non-linear energy harvesting. IEEE Access 8, 192270–192281 (2020)CrossRef
32.
Zurück zum Zitat Wang, F., et al.: Secure resource allocation for polarization-based non-linear energy harvesting over 5G cooperative CRNs. IEEE Wire. Commun. Lett. (accepted) Wang, F., et al.: Secure resource allocation for polarization-based non-linear energy harvesting over 5G cooperative CRNs. IEEE Wire. Commun. Lett. (accepted)
33.
Zurück zum Zitat Lei, H.; et al.: Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-\(m\) channels. IEEE Trans. Veh. Technol. 65(12), 10126–10132 (2016)CrossRef Lei, H.; et al.: Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-\(m\) channels. IEEE Trans. Veh. Technol. 65(12), 10126–10132 (2016)CrossRef
Metadaten
Titel
Overlay Networks with Jamming and Energy Harvesting: Security Analysis
verfasst von
Khuong Ho-Van
Thiem Do-Dac
Publikationsdatum
17.03.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 10/2021
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-05492-z

Weitere Artikel der Ausgabe 10/2021

Arabian Journal for Science and Engineering 10/2021 Zur Ausgabe

Research Article-Electrical Engineering

Primary Frequency Regulation by Demand Side Response

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.