This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the normal interference constraint imposed by the primary user (PU). Thus, the SU must have a suitable power allocation policy which does not only satisfy the constraints of the PU but also the security constraints such that it obtains a reasonable performance for the SU, without exposing information to the eavesdropper. We derive four power allocation policies for different scenarios corresponding to whether or not the channel state information of the PU and the eavesdropper are available at the SU. Further, we introduce the concept secure and reliable communication probability (SRCP) as a performance metric to evaluate the considered system, as well as the efficiency of the four power allocation policies. Finally, we present numerical examples to illustrate the power allocation polices, and the impact of these policies on the SRCP of the SU.
1 Introduction
A cognitive radio network (CRN) is widely known as a promising solution to enhance spectrum utilization by means of dynamic spectrum access techniques [1‐10]. In a CRN, there are two types of users known as primary user (PU) and secondary user (SU), where the (SU) is allowed to access the spectrum licensed to the (PU) as long as it does not degrade the performance of the (PU). Due to this, the (SU) must be equipped with advanced sensing techniques to detect vacant spectrum (known as a spectrum hole) and the channel state information (CSI) of the PU [6, 11]. This, in turn, implies that the \(\hbox {PU}_{\mathrm{s}}\) and \(\hbox {SU}_{\mathrm{s}}\) may be exposed to internal or external attackers who pretend to be sensing devices [12‐14]. Furthermore, malicious attackers can abuse the adaptive abilities of the (CRN) causing negative effects to the radio environment, e.g., by generating interference, which may degrade the performance, reveal the secrete communication information, or even cause malfunction to the operations of the legitimate users. Clearly, secure and reliable communication between \(\hbox {SU}_{\mathrm{s}}\) can be obtained only if neither the secrecy nor the reliable communication outage events happen. Therefore, solving the security problems from all aspects of the networking architecture becomes one of the most challenging problems with CRN [13, 15].
Recently, physical layer security has emerged as an effective approach to protect the communication of legitimate users from eavesdropping attacks, by e.g., using the characteristics of wireless channels such as multipath fading [16‐18]. It has been proven that if the channel from the source to the destination is better than the one from the source to the eavesdropper, the communication of the legitimate users can be secure and reliable at a non-zero data rate [19]. To quantify the security performance more specifically, Wyner has introduced a secrecy capacity concept [16] which is defined as the difference between the capacity of the main channel and the illegitimate channel. Later on, the secrecy capacity concept was extended to include wireless channels, e.g., Gaussian and multipath fading [17, 20]. It revealed that the secrecy capacity may be reduced due to the effect of multipath fading in wireless channels.
Anzeige
Motivated by all the above works and the references therein, in this paper, we evaluate secure and reliable communication for a single-input multiple-output (SIMO) CRN. More specifically, we assume that the secondary transmitter (STx) and the primary transmitter (p-Tx) are equipped with a single antenna, while the primary receiver (P-Rx), secondary receiver (S-Rx), and the eaversdropper (EAV) have multiple antennas. This system model is considered as an instance of a practical scenario where the P-Tx and S-Tx may be wireless sensors or mobile users, while the P-Rx and S-Rx may be access points or base stations. Here, the EAV tries to overhear the information transmitted by the S-Tx. Thus, the S-Tx must have flexible power control policies to protect its secret information, and not cause harmful interference to the PU. Accordingly, a performance metric in terms of secure and reliable communication probability is introduced to evaluate the considered CRN performance. Our major contributions in this paper are summarised as follows:
Based on the CSI available at the S-Tx, power allocation policies are derived for four scenarios as follows. Scenario 1 (\(S_1\)): The S-Tx does not have the CSI of both the P-Tx\(\rightarrow \)P-Rx and the S-Tx\(\rightarrow \)EAV links; Scenario 2 (\(S_2\)): The S-Tx has the CSI of the S-Tx\(\rightarrow \)EAV but not the P-Tx\(\rightarrow \)P-Rx link; Scenario 3 (\(S_3\)): The S-Tx has the CSI of the P-Tx\(\rightarrow \)P-Rx but not the S-Tx\(\rightarrow \)EAV links; Scenario 4 (\(S_4\)): The S-Tx has the CSI of both the P-Tx\(\rightarrow \)P-Rx and the S-Tx\(\rightarrow \)EAV links. Accordingly, a power allocation algorithm corresponding to the four scenarios is introduced.
Given the four power allocation policies, the the secure and reliable communication probability (SRCP) is introduced to analyse the performance of the considered CRN.
Our numerical results show that the SRCP of Scenario 1 and Scenario 2 (Scenario 3 and Scenario 4) are only different in the low signal-to-noise ratio (SNR) regime of the P-Tx, but they are the same in the high SNR regime of the P-Tx.
To the best of the authors’ knowledge, there are no previous publications addressing this problem.
The remainder of this paper is organized as follows. The related work is introduced in Sect. 2, whereas in Sect. 3 the system model, assumptions, constraints corresponding to four scenarios for the CSI at the S-Tx together with problem statement for a SIMO CRN are introduced. In Sect. 4, power allocation policies corresponding to four scenarios are obtained. Further, a closed-form expression for the SRCP is derived. In Sect. 5, the numerical results and discussions are provided. Finally, conclusions are given in Sect. 6.
2 Related work
The general security performance of the CRN has been studied in [15, 21‐23]. More specifically, in [15], the authors studied the primary user emulation (PUE) attack and proposed a solution to reduce the PUE attack in CRN operating in the frequency digital TV (DTV) band. This approach can effectively mitigate PUE attacks with the addition of a plugin AES chip to the system hardware. In [24], a robust Markov decision process for secure power control schemes of cognitive radios was proposed. In [25], the ergodic secrecy capacity for a CRN under the effects of fast fading channels has been analyzed. More recently, communication protocols and signal processing techniques was proposed to enhance the secrecy performance of the CRN in [13, 26‐30]. In [30], an optimal relay selection scheme to minimize the secrecy outage probability of the cognitive cooperative radio network (CCRN) with decode-and-forward (DF) relays was investigated. In [31], a performance analysis in terms of average secrecy capacity with a CCRN having multiple reactive DF relays was studied, and the obtained results showed that using relay networks can enhance the secrecy performance. Taking advantage of multi-antenna techniques, beamforming and cooperative jamming techniques for \(\hbox {CRN}_{\mathrm{s}}\) was studied in [26‐28, 32, 33]. Considering the security for multiple users in the \(\hbox {CRN}_{\mathrm{s}}\), a scheduling scheme to enhance the security of communication was proposed in [29]. In [34] and [35], game theory cooperation strategies have been applied to investigate the security for a CRN scenario. Bandwidth assignment strategies and power allocation policies have been proposed to enhance the security of the PU communication. In [27], two secure transmission schemes, termed nonadaptive and adaptive secure transmission strategy, were developed to maximize the throughput for a multiple-input single-out (MISO) CRN over a slow fading channel. An approximation for the optimal rate parameters of the nonadaptive secure transmission strategy was achieved at the high SNR regime. In [36], the impact of secondary user communication on the security of the primary user have been studied. The results showed that the security of the primary network strongly depends on the channel condition of the SU transmitter to the EAV link and the transmit power policy of the S-Tx. Most recently, subject to the maximal tolerable interference threshold of the PU, the secrecy outage probability has been evaluated for various scheduling schemes in [22], in which the S-Tx is overheard by multiple \(\hbox {EAV}_{\mathrm{v}}\). However, the impact of the P-Tx\(\rightarrow \)P-Rx link on the secure performance has not been considered. In [37], the authors have analyzed the intercept behavior of industrial wireless sensor networks with different scheduling schemes. However, this study is only for conventional wireless sensor networks, and thus the security and reliable criteria have not been considered. Up to now, the performance analysis for the physical layer security of \(\hbox {CRN}_{\mathrm{s}}\), in terms of non-zero secrecy capacity, probability of outage secrecy capacity, and ergodic secrecy capacity, have obtained great achievements [22, 27, 33, 37‐39]. However, not many publications investigate the performance analysis in terms of reliable and security communication, which is considered as one of the most important criteria in the industry and internet of things (IoT) era.
×
3 System model
Let us consider a system model as shown in Fig. 1 in which there are three types of user in the same area, termed the SU, PU, and EAV. The PU allows the SU to re-utilize its licensed spectrum provided that the SU does not cause harmful interference to the PU. On the other hand, the EAV wants to eavesdrop the information of the su’s communication over a wiretap channel. In fact, the EAV can overhear the information of both the S-Tx and P-Tx, but in this system model the EAV wants to utilize the interference from the P-Tx to exploit the exchange of information from the SU. Here, we assume that the S-Tx and P-Tx are equipped with a single antenna while the S-Rx, P-Rx, and EAV have \(N_s\), \(N_p\), and \(N_{e}\) antennas, respectively. This system model is considered as an instance of practical scenario where the P-Tx and S-Tx may be mobile users while the P-Rx and S-Rx are base stations or access points. Note that the PU can transmit with an optional power level for its communication without caring about the existence of the SU. On the other hand, the SU should keep the interference inflicted onto the PU below a predefined threshold. Hence, the SU should have channel mean gain of the S-Tx\(\rightarrow \)P-Rx link (not instantaneous channel gains) to adjust its transmit power. This is based on the fact that the SU and the PU can collaborate using a localization service where the channel mean gains of the PU and SU such as transmission distance, antenna gain, and so on, can be exchanged [40, 41]. Moreover, the S-Tx and P-Tx are assumed to have full CSI of the S-Tx\(\rightarrow \)S-Rx and P-Tx\(\rightarrow \)P-Rx links, respectively. This is reasonable due to the fact that both SU and PU are in the same systems and they should have dedicated feedback channels. In addition, the channel mean gain of the S-Tx\(\rightarrow \)EAV can be selected offline following [42‐44].
Anzeige
Further, all channels are subject to Rayleigh fading and the channel gains are independent random variables distributed following an exponential distribution. Accordingly, the probability density function (PDF) and cumulative distribution function (CDF) of random variables (\(\hbox {RV}_{\mathrm{s}}\)) having exponential distribution are expressed, respectively, as
where the RV X refers to the channel gain, and \(\Omega _X={{\mathrm{\mathbf {E}}}}[X]\) is the channel mean gain. More specifically, the channel gains, S-Tx\(\rightarrow \)S-Rx and P-Tx\(\rightarrow \)P-Rx of communication links, are denoted, respectively, by \(g_m\), \(h_n\). The channel gains of S-Tx\(\rightarrow \)P-Rx, P-Tx\(\rightarrow \)S-Rx, and P-Tx\(\rightarrow \)EAV interference links are denoted by \(\varphi _m,~\beta _n\), and \(\rho _{t}\), respectively. The channel gain of the S-Tx\(\rightarrow \)EAV illegitimate links is denoted by \(\alpha _{t}\). Here, m, n, and t (\(m \in \{1,\ldots ,N_p\}\), \(n \in \{1,\ldots ,N_{e}\}\), and \(t \in \{1,\ldots ,N_s\}\)), denote the antenna indexes of the S-Rx, EAV, and P-Rx, respectively. In the following, the P-Rx, S-Rx, and EAV are assumed to use SC to process the received signal, i.e., the antenna having the highest signal-to-interference-plus-noise ratio (SINR) will be used to process the received message.
It is a fact that the SU and PU share the same spectrum and thus they may cause mutual interference to each other due to power emission. According to Shannon’s theorem, the PU channel capacity subject to interference of the SU can be expressed
in which \(P^{}_{p}\) and \( P^{}_{s}\) are transmit powers of the P-Tx and S-Tx, respectively. Symbol \(N_0\) is the noise power defined by \(N_0=B\mathcal {N}_0\); B and \(\mathcal {N}_0\) are system bandwidth and noise power spectral density, respectively. Since the SU re-utilizes the PU spectrum band for its communication, the S-Rx suffers from the interference of the P-Tx, and hence the channel capacity of the SU subject to the interference from the P-Tx can be formulated as
It should be noted that the EAV overhears the SU information, but it is also subject to interference caused by the P-Tx. Accordingly, the channel capacity of the EAV is given as
In the considered system, the transmit power of the SU is subject to its own security constraint and the interference constraint given by the PU. Thus, the SU must have a suitable power allocation policy which does not only satisfy the above constraints but also can obtain a reasonable performance. We assume that the Wyner wiretap code [16] is used for SU communication, and hence a positive rate, \(R_{0}>0\), should be maintained to provide secure communication for the SU, which can be defined by [42, 45]
where \(R_s\) and \(R_{e}\) are the code word transmission rate and secret information rate of the SU, respectively.
Accordingly, the perfect secrecy communication of the SU may be obtained if the capacity at the EAV is less than \(R_0\), i.e., \(C_{e} < R_{0}\). In other words, the outage secrecy event of the SU occurs when \(C_{e} > R_{0}\), and hence the secrecy outage probability of the SU can be formulated as
Moreover, due to the randomness of wireless channels and interference caused by the SU, reliable communication of the PU may not be obtained if the code word transmission rate of the PU is greater than the channel capacity, i.e. \(R_p >C_{p}\). It implies that the communication outage event of the PU is expressed as
Clearly, secure and reliable communication of the SU can be obtained if and only if both secrecy and reliable communication outage events do not happen. This can be interpreted into secure and reliable communication probability as
where \(C_{s}\) and \(C_{e}\) are formulated in (5) and (7), respectively.
3.2 Constraints for transmit power of the SU
In this section, we adopt a common assumption in the literature of the physical security that the CSI is available, together with the S-Tx\(\rightarrow \)EAV wiretap link [46]. This can be obtained when the EAV is active in the network and its behavior may be monitored [47]. In the following, we introduce four communication scenarios in which we study the power allocation policy for the SU.
1)
Scenario 1 (\(S_1\)): S-Tx does not have the CSI of neither P-Tx\(\rightarrow \)P-Rx nor theS-Tx\(\rightarrow \)EAV links
In this scenario, the S-Tx transmits its confidential information without knowing the existence of the EAV. Also the S-Tx does not have the CSI of the P-Tx\(\rightarrow \)P-Rx communication link. Accordingly, the S-Tx only regulates its transmit power on the basis of the interference constraint given by the PU as
where \(Q_{pk}\) is peak interference level that the PU can tolerate. This can be interpreted as that the S-Tx is allowed to cause limited interference to the P-Rx, however, the probability of the interference caused by the S-Tx should be kept below a predefined threshold \(\xi \) to not interrupt the PU communication. As a result, the constraints setting on the transmit power of the S-Tx should satisfy two conditions as follows:
where \(\xi \) and \(P^{max}_{s}\) are communication outage threshold given by the PU and the maximal transmit power of the S-Tx, respectively.
2)
Scenario 2 (\(S_2\)): S-Tx has the CSI of the S-Tx\(\rightarrow \)EAV but not P-Tx\(\rightarrow \)P-Rx
In this scenario, the S-Tx knows the existence of the EAV in its coverage range and the CSI of the S-Tx\(\rightarrow \)S-Rx link is available at the S-Tx. However, the S-Tx does not have the CSI of the P-Tx\(\rightarrow \)P-Rx link. Consequently, the transmit power of the S-Tx should satisfy three constraints as follows:
where \(\epsilon \) is the secrecy outage constraint given by the SU and \(\mathcal {O}_{I}\) and \(\mathcal {O}_{sec}\) are defined in (10) and (13), respectively.
3)
Scenario 3 (\(S_3\)): S-Tx has the CSI of the P-Tx\(\rightarrow \)P-Rx but not S-Tx\(\rightarrow \)EAV
In this scenario, the S-Tx has the CSI of the P-Tx\(\rightarrow \)P-Rx communication link. However, it does not know the existence of the EAV. Accordingly, the constraints for the S-Tx is as follows:
where \(\mathcal {O}_{p}\) is defined in (11), and \(\theta \) is the communication outage constraint of the PU. In other words, the transmit power of the S-Tx should keep the outage probability of the PU below a given constraint.
4)
Scenario 4 (\(S_4\)):S-Tx has the CSI of both the P-Tx\(\rightarrow \)P-Rx and S-Tx\(\rightarrow \)EAV
In this scenario, the S-Tx adjust its transmit power to not reveal its confidential information to the EAV and to not cause harmful interference to the P-Rx. Thus, the transmit power of the S-Tx is subject to three constraints as follows:
where \(\mathcal {O}_{p}\) and \(\mathcal {O}_{sec}\) are defined in (11) and (10).
4 Performance analysis
In this section, we first derive the power allocation policy for the S-Tx, and then use it to calculate the amount of fading, and outage performance of the S-Tx. Let us commence by considering a property as follows.
property 1
Let a, b, and c be positive constants. Random variables \(X_i\) and \(Y_i\) are independent and exponentially distributed with mean values \(\Omega _X\) and \(\Omega _Y\), respectively. An RV U defined by
To derive the power allocation policies for the S-Tx, we need to calculate the secrecy outage probability of the SU given in (10), the outage probability of the PU given in (11), and the outage probability given in (13), respectively.
4.1.1 The transmit power of S-Tx under the interference threshold of the PU
From (14), we can calculate \(\mathcal {O}_{I}\) as follows
4.1.2 The transmit power of the S-Tx under the secrecy outage constraint
Here, we assume that the EAV may have an advanced background noise filter, and the EAV is only interfered by the outburst transmit power from the P-Tx. In other words, we consider the worst case where the background noise is cancelled significantly and the outburst interference from the P-Tx to the EAV is much higher than the background noise. Therefore, the SINR of the EAV given in (8) can be rewritten as
where \(\gamma ^{p}_{th}=2^{\frac{R_p}{B}}-1\). Using the help of (25) in Property 1 for (34) by setting \(a=P^{}_{p}\), \(b=P^{}_{s}\), \(c=N_0\), \(\Omega _X=\Omega _h\), \(\Omega _Y=\Omega _{\varphi }\), and \(u=\gamma ^{p}_{th}\), a closed-form expression for PU is obtained as
Accordingly, the power allocation algorithm corresponding to four scenarios is given in Algorithm 1.
×
4.2 Secure and reliable communication probability
Recall that the safe and secure communication probability is defined as the probability that the S-Tx can communicate with the S-Rx without exposing the information to the EAV. Given the obtained power allocation policies and mutually independent channels, we can rewrite the safe and secure communication probability in (12) as
Finally, a closed-form expression of the safe and secure communication probability is obtained by substituting (44) and (45) into (43), where \(\mathcal {P}_{}\)\(\in \)\(\left\{ \mathcal {P}_{S_1},\mathcal {P}_{S_2}, \mathcal {P}_{S_3},\mathcal {P}_{S_4}\right\} \) is the transmit power allocation policy of the S-Tx.
5 Numerical results
In this section, we present numerical examples to examine the power allocation policies and the SRCP for the considered model. To gain more insights, we make comparisons between the scenario S\(_1\) and the scenario S\(_2\), the scenario S\(_3\) and the scenario S\(_4\). In this work, we assume that S-Tx, S-Rx, P-Rx, EAV, and P-Tx are located at (0, 0), \((-1,2)\), (0.5, 1), (0, 2.5), and (0, 2) on the 2D plane, respectively. Unless otherwise stated, the parameter settings used in the numerical results are derived from existing wireless networks such [49, 50] as follows:
System bandwidth: B= 5 MHz;
SU target rate: \(R_s\)=128 Kbps;
PU target rate: \(R_p\)=64 Kbps;
SU secrecy information rate: \(R_{e}\)=64 Kbps;
Pathloss exponent \(\nu =4\);
Outage probability constraints of the PU and SU: \(\theta =\xi =0.01\);
Outage probability constraint of the EAV: \(\epsilon =0.1\);
The maximal transmit SNR of the S-Tx: \(\gamma ^{\max }_{s}=10\) (dB);
Peak interference level of the PU: \(Q_{pk}=-5\) (dB)
Without loss generality, we denote \(\bar{\gamma }_{s}=\frac{\mathcal {P}_{}}{N_0}\) and \(\bar{\gamma }_{p}=\frac{P_p}{N_0}\) as the transmit SNR of the S-Tx and P-Tx, respectively.
×
Figure 2 shows the transmit SNR of the S-Tx as a function of the P-Tx transmit SNR. Firstly, we observe the behavior of the transmit SNR of the S-Tx in the scenarios \(S_1\) and \(S_2\), and can see that the transmit SNR of the S-Tx in scenario \(S_1\) is constant for the entire range of the P-Tx SNR. This result matches (38) where the transmit SNR of the S-Tx does not depend on the transmit SNR of the P-Tx. In contrast to scenario \(S_1\), the S-Tx linearly increases with an increase of the S-Tx transmit SNR in scenario \(S_2\),. However, when the transmit SNR of the P-Tx increases beyond 10 dB (\(A_1\)), the transmit SNR of the S-Tx is saturated. This can be explained by the fact that the transmit SNR of the S-Tx is allocated using Eq. (39). Thus, in the regime \([-16,10]\) dB, the transmit SNR of the S-Tx is controlled by the constraint of the EAV. However, if the transmit SNR of the P-Tx increases further, the transmit SNR of the S-Tx is subject to the minimum value of the first term and third term in Eq. (39), i.e., in the high regime of the transmit SNR of P-Tx, the transmit SNR of the S-Tx is similar to the one in Scenario 1. It is easy to understand that the transmit SNR of the S-Tx in scenario \(S_1\) is always less than or equal to the one in scenario \(S_2\) since the transmit SNR S-Tx in \(S_2\) is subject to a additional constraint, i.e., the outage constraint of the EAV. Secondly, we observe the behavior of the transmit SNR of the S-Tx in scenarios \(S_3\) and \(S_4\). It can be seen that the transmit SNR of the S-Tx in the scenario \(S_4\) is always less than the one of the scenario \(S_3\). However, in the high regime of the transmit SNR of the P-Tx, e.g. \(\bar{\gamma }_p \ge 16\) dB, they are equal and saturated at \(A_2\). This is because the transmit SNR of the S-Tx in scenario \(S_4\) endures more constraints than the one of scenario \(S_3\), i.e., the constraint of the EAV. Finally, we can conclude that the appearance of the EAV leads to that the power allocation policy for the S-Tx is more complicated and may degrade the performance of the SU.
Figure 3 plots the transmit SNR of the S-Tx as a function of the P-Rx antennas, \(N_p\). We can see that the transmit SNR of the S-Tx in scenarios \(S_1\) and \(S_3\) is much higher than the one in scenarios \(S_2\) and \(S_4\). This happens for the same reason as in Fig. 2, i.e., when the S-Tx is subject to the additional constraint of the EAV, the transmit SNR of the S-Tx is degraded. In addition, when the number of antennas of the P-Rx increases, the transmit SNR of the S-Tx in scenario \(S_1\) decreases slightly. It is due to the fact that increasing the number of antennas of the P-Rx leads to increase in the constraints for the S-Tx. Thus, the S-Tx must decrease its transmit SNR to not cause harmful interference to the P-Rx (see Eq.(13)). It is interesting to see that the transmit SNR of scenarios \(S_2\) and \(S_4\) are the same for the whole considered range of \(N_p\). This is due to the fact that the constraint of the EAV is the strongest one (see Eq. (33)). Accordingly, the transmit SNR of the S-Tx under the constraint of the EAV becomes the minimum value in both (39) and (42) in the considered range of \(N_p\), i.e.,
Figure 4 shows the impact of the number of antennas on the EAV on the transmit SNR of the S-Tx. Firstly, we observe the behavior of the transmit SNR of the S-Tx in scenarios \(S_1\) and \(S_3\) and see that the transmit SNR of the S-Tx does not change following the change of \(N_e\). This is because the S-Tx does not know the existence of the EAV. However, when the S-Tx knows the existence of the EAV as in scenarios \(S_2\) and \(S_4\), the transmit SNR degrades significantly as the number of antennas of the EAV increases. This is due to the fact that increasing the number of antennas of the EAV leads to an improvement its eavesdropping probability. As a result, the S-Tx in scenarios \(S_2\) and \(S_4\) must reduce its transmit SNR to secure the communication information.
×
In Fig. 5, we show the impact of the P-Tx transmit SNR on the SRCP of the SU. It can be observed that the SRCP of the scenario \(S_2\) (scenario \(S_4\)) is always better than the one in scenario \(S_1\) (scenario \(S_3\)) in the low regime of the P-Tx SNR \(\bar{\gamma }_{p}\le -4\) dB (\(\bar{\gamma }_{p}\le 2\) dB). However, when the P-Tx SNR is increased further, the SRCP of scenarios \(S_1\) and \(S_2\) (scenarios \(S_3\) and \(S_4\)) are identical. This is because when the P-Tx transmit SNR is in the low regime, the S-Tx transmit SNR in scenario \(S_1\) (scenario \(S_3\)) is greater than the one of scenario \(S_2\) (scenario \(S_4\)). Accordingly, the secure probability of the SU degrades significantly, while the safe communication probabilities are not much different. As a result, the SRCP of scenario \(S_1\) (scenario \(S_3\)) is smaller than the one of scenario \(S_2\) (scenario \(S_4\)) (see (43)). When the P-Tx SNR increases further, e.g. 2 (dB) \(\le \bar{\gamma }_{p} \le 14\) (dB), the S-Tx can adjust its transmit power to the maximal value in all scenarios. This leads to the SRCP for scenarios \(S_1\) and \(S_2\) (scenarios \(S_3\) and \(S_4\)) being identical. Most interestingly, in the high regime of the P-Tx SNR, the SRCP for scenarios \(S_1\) and \(S_2\) (scenarios \(S_3\) and \(S_4\)), e.g \(\bar{\gamma }_{p} \ge 6\) (dB) or \( \bar{\gamma }_{p} \ge 14\) (dB) are degraded. This is due to the fact that in the low regime of the P-Tx SNR, the S-Tx can regulate its transmit SNR to satisfy the given constraints. However, when the transmit SNR of P-Tx increases further, it becomes a strong interference source to S-Rx, which leads to degrade the SRCP of the SU.
×
In Fig. 6, we show the impact of number of antennas of the P-Rx on the SRCP of the SU. The \(\hbox {SRCP}_{\mathrm{s}}\) are identical and slight increasing for scenarios \(S_1\) and \(S_2\). This can be explained as the P-Rx can tolerate more interference from the S-Tx as its number of antennas increases. Consequently, the S-Tx can increase its transmit power to enhance the SRCP. However, under the constraints of peak interference level \(Q_{pk}\), outage probability constraint \(\xi \), as well as secrecy outage constraint \(\epsilon \), the transmit power of the S-Tx is identical for both scenarios \(S_1\) and \(S_2\). Thus, the SRCP are identical. In contrast to scenarios \(S_1\) and \(S_2\), the SRCP in scenario \(S_4\) outperforms the one of the scenario \(S_3\). This is because that the S-Tx in the scenario \(S_3\) does not care about the existence of the EAV, thus it can transmit with maximal transmit power and its information communication may be revealed to the EAV. Alternatively, in scenario \(S_4\), the S-Tx knows the existence of the EAV, thus it adjusts its transmit power to not reveal information to the EAV. Accordingly, the SRCP in scenario \(S_4\) outperforms the one in the scenario \(S_3\).
×
×
Finally, we examine the impact of the number of antennas of the EAV on the SRCP of the SU as shown in Fig. 7. It can be seen that the SRCP for scenarios \(S_1\) and \(S_3\), where the secure constraint are not considered, are degraded rapidly. Alternatively, the SRCP in scenarios \(S_2\) and \(S_4\), where the secure constraint is integrated, degrade gradually. Clearly, the scenarios with the CSI of the EAV can make the information communication of the SU more secure and reliable.
6 Conclusions
In this paper, we have investigated how to obtain secure and reliable communication in a CRN in which the SU transmitter is subject to eavesdropping. Given the constraints of the PU, EAV, and SU, we derive four power allocation polices corresponding to four different scenarios depending on which type of CSI that is available. Accordingly, a performance measure in terms of secure and reliable communication probability is introduced to evaluate the considered system. Our results show that the security constraint only effects the SRCP of the SU in the low regime of the transmit SNR of the P-Tx. Further, the system performance degrades significantly when the security constraints are not considered and the number of antennas of the EAV increases. Finally, simulations validate our analytical results.
Acknowledgements
The research leading to these results has been performed in the research project of Ministry of Education and Training, Vietnam (No. B2017-TNA-50), and the SafeCOP project which is funded from the ECSEL Joint Undertaking under grant agreement n\(^{0}\) 692529, and from National funding.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.