Skip to main content
Erschienen in: Wireless Personal Communications 2/2020

20.09.2019

Security Performance of Underlay Cognitive Relaying Networks with Energy Harvesting

verfasst von: Khuong Ho-Van, Thiem Do-Dac

Erschienen in: Wireless Personal Communications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An unlicensed relay is located between an unlicensed sender and an unlicensed recipient for securing the sender’s message against a wire-tapper in underlay cognitive networks when the sender–recipient channel is inaccessible. The energy in the sender’s signals is harvested by the relay which utilizes that harvested energy for its signal transmission. To assess expeditiously the security capability, a precise formula of secrecy outage probability is suggested. This formula is then substantiated by computer simulations. Notably, the appropriate selection of system specifications including the time percentage, the relay’s location, the power percentage can drastically enhance the security capability of underlay cognitive relaying networks with energy harvesting. Also, the security capability is constant when one of two power curtailments of unlicensed senders (interference power curtailment and peak transmit power curtailment) is relaxed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
In this paper, “transmitter”, “receiver”, “sender”, “recipient” are the short forms of “licensed transmitter”, “licensed receiver”, “unlicensed sender”, “unlicensed recipient”, respectively.
 
2
The possibility which the signal-to-noise ratio (SNR) is lower than a preset level is called the COP.
 
3
The PSCP is the likelihood which the secrecy capacity is positive [10].
 
4
The SOP is the likelihood which the secrecy capacity is lower than a predetermined security level [10].
 
5
In this paper, “direct transmission” or “direct communication” refers to the communication paradigm in which no relay is employed to connect the sender with the recipient.
 
6
It is assumed that the energy consumption of the message decoder is neglected, which is a common assumption in most published works (e.g., [8, 9, 1115] and references therein).
 
7
In underlay cognitive networks, licensed transmitters beget interferences on unlicensed recipients. These interferences are ignorable because either they are assumed to follow the Gaussian distribution or the transmitter–recipient distance is sufficiently distant. The assumption on ignoring these interferences is quite common in researching the cognitive radio technology (e.g., [1820] and references therein).
 
Literatur
1.
Zurück zum Zitat Ali, Z., Sidhu, G. A. S., et al. (2019). A joint optimization framework for energy harvesting based cooperative CR networks. IEEE Transactions on Cognitive Communications and Networking, 5(2), 452–462.CrossRef Ali, Z., Sidhu, G. A. S., et al. (2019). A joint optimization framework for energy harvesting based cooperative CR networks. IEEE Transactions on Cognitive Communications and Networking, 5(2), 452–462.CrossRef
2.
Zurück zum Zitat Miridakis, N. I., Tsiftsis, T. A., et al. (2017). Simultaneous spectrum sensing and data reception for cognitive spatial multiplexing distributed systems. IEEE Transactions on Wireless Communications, 16(5), 3313–3327.CrossRef Miridakis, N. I., Tsiftsis, T. A., et al. (2017). Simultaneous spectrum sensing and data reception for cognitive spatial multiplexing distributed systems. IEEE Transactions on Wireless Communications, 16(5), 3313–3327.CrossRef
3.
Zurück zum Zitat Lei, H., Xu, M., et al. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transactions on Green Communications and Networking, 1(2), 192–203.CrossRef Lei, H., Xu, M., et al. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transactions on Green Communications and Networking, 1(2), 192–203.CrossRef
4.
Zurück zum Zitat Shi, H., Cai, Y., et al. (2019). Physical layer security in an untrusted energy harvesting relay network. IEEE Access, 7, 24819–24828.CrossRef Shi, H., Cai, Y., et al. (2019). Physical layer security in an untrusted energy harvesting relay network. IEEE Access, 7, 24819–24828.CrossRef
5.
Zurück zum Zitat Miridakis, N. I., Tsiftsis, T. A., et al. (2018). MIMO underlay cognitive radio: Optimized power allocation, effective number of transmit antennas and harvest-transmit tradeoff. IEEE Transactions on Green Communications and Networking, 2(4), 1101–1114.CrossRef Miridakis, N. I., Tsiftsis, T. A., et al. (2018). MIMO underlay cognitive radio: Optimized power allocation, effective number of transmit antennas and harvest-transmit tradeoff. IEEE Transactions on Green Communications and Networking, 2(4), 1101–1114.CrossRef
6.
Zurück zum Zitat Mishra, D., & Alexandropoulos, G. C. (2018). Transmit precoding and receive power splitting for harvested power maximization in MIMO SWIPT systems. IEEE Transactions on Green Communications and Networking, 2(3), 774–786.CrossRef Mishra, D., & Alexandropoulos, G. C. (2018). Transmit precoding and receive power splitting for harvested power maximization in MIMO SWIPT systems. IEEE Transactions on Green Communications and Networking, 2(3), 774–786.CrossRef
8.
Zurück zum Zitat Quang, P. M., Duy, T. T., et al. (October, 2016). Performance evaluation of underlay cognitive radio networks over Nakagami-m fading channels with energy harvesting. In Proceedings of the IEEE international conference on advanced technologies for communications, HaNoi, Vietnam, 10–12 (pp. 108–113). Quang, P. M., Duy, T. T., et al. (October, 2016). Performance evaluation of underlay cognitive radio networks over Nakagami-m fading channels with energy harvesting. In Proceedings of the IEEE international conference on advanced technologies for communications, HaNoi, Vietnam, 10–12 (pp. 108–113).
9.
Zurück zum Zitat Zhang, J., Pan, G., et al. (2016). On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system. IEEE Access, 4, 3887–3893.CrossRef Zhang, J., Pan, G., et al. (2016). On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system. IEEE Access, 4, 3887–3893.CrossRef
10.
Zurück zum Zitat Alexandropoulos, G. C., & Peppas, K. P. (2018). Secrecy outage analysis over correlated composite Nakagami-\(m\)/Gamma fading channels. IEEE Communications Letters, 22(1), 77–80.CrossRef Alexandropoulos, G. C., & Peppas, K. P. (2018). Secrecy outage analysis over correlated composite Nakagami-\(m\)/Gamma fading channels. IEEE Communications Letters, 22(1), 77–80.CrossRef
11.
Zurück zum Zitat Mou, W., Yang, W., et al. (October, 2016). Secure transmission in spectrum-sharing cognitive networks with wireless power transfer. In Proceedings of the IEEE international conference on wireless communications and signal processing, JiangSu, China, 13–15, pp. 1–5. Mou, W., Yang, W., et al. (October, 2016). Secure transmission in spectrum-sharing cognitive networks with wireless power transfer. In Proceedings of the IEEE international conference on wireless communications and signal processing, JiangSu, China, 13–15, pp. 1–5.
12.
Zurück zum Zitat Lei, H., Xu, M., et al. (December, 2016). Secrecy outage performance for underlay MIMO CRNs with energy harvesting and transmit antenna selection. In Proceedings of the IEEE global communications conference, Washington DC, USA, 4–8, pp. 1–6. Lei, H., Xu, M., et al. (December, 2016). Secrecy outage performance for underlay MIMO CRNs with energy harvesting and transmit antenna selection. In Proceedings of the IEEE global communications conference, Washington DC, USA, 4–8, pp. 1–6.
13.
Zurück zum Zitat Singh, A., Bhatnagar, M. R., et al. (2016). Secrecy outage of a simultaneous wireless information and power transfer cognitive radio system. IEEE Wireless Communications Letters, 5(3), 288–291.CrossRef Singh, A., Bhatnagar, M. R., et al. (2016). Secrecy outage of a simultaneous wireless information and power transfer cognitive radio system. IEEE Wireless Communications Letters, 5(3), 288–291.CrossRef
14.
Zurück zum Zitat Liu, Y., Wang, L., et al. (2016). Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Transactions on Communications, 64(1), 329–342.CrossRef Liu, Y., Wang, L., et al. (2016). Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Transactions on Communications, 64(1), 329–342.CrossRef
15.
Zurück zum Zitat Raghuwanshi, S., Maji, P., et al. (September, 2016). Secrecy performance of a dual hop cognitive relay network with an energy harvesting relay. In Proceedings of the IEEE international conference on advances in computing, communications and informatics, Jaipur, India, 21–24, pp. 1622–1627. Raghuwanshi, S., Maji, P., et al. (September, 2016). Secrecy performance of a dual hop cognitive relay network with an energy harvesting relay. In Proceedings of the IEEE international conference on advances in computing, communications and informatics, Jaipur, India, 21–24, pp. 1622–1627.
16.
Zurück zum Zitat Zhou, X., Zhang, R., et al. (2013). Wireless information and power transfer: Architecture design and rate-energy trade-off. IEEE Transactions on Communications, 61(11), 4754–4767.CrossRef Zhou, X., Zhang, R., et al. (2013). Wireless information and power transfer: Architecture design and rate-energy trade-off. IEEE Transactions on Communications, 61(11), 4754–4767.CrossRef
17.
Zurück zum Zitat Nasir, A. A., Zhou, X., et al. (2013). Relaying protocols for wireless energy harvesting and information processing. IEEE Transactions on Wireless Communications, 12(7), 3622–3636.CrossRef Nasir, A. A., Zhou, X., et al. (2013). Relaying protocols for wireless energy harvesting and information processing. IEEE Transactions on Wireless Communications, 12(7), 3622–3636.CrossRef
18.
Zurück zum Zitat Zhang, X., Xing, J., et al. (2013). Outage performance study of cognitive relay networks with imperfect channel knowledge. IEEE Communications Letters, 17(1), 27–30.CrossRef Zhang, X., Xing, J., et al. (2013). Outage performance study of cognitive relay networks with imperfect channel knowledge. IEEE Communications Letters, 17(1), 27–30.CrossRef
19.
Zurück zum Zitat Seyfi, M., Muhaidat, S., et al. (2013). Relay selection in cognitive radio networks with interference constraints. IET Communications, 7(10), 922–930.CrossRef Seyfi, M., Muhaidat, S., et al. (2013). Relay selection in cognitive radio networks with interference constraints. IET Communications, 7(10), 922–930.CrossRef
20.
Zurück zum Zitat Nguyen, M., Nguyen, N., et al. (2017). Secure cooperative half-duplex cognitive radio networks with \(K\)-th best relay selection. IEEE Access, 5, 6678–6687.CrossRef Nguyen, M., Nguyen, N., et al. (2017). Secure cooperative half-duplex cognitive radio networks with \(K\)-th best relay selection. IEEE Access, 5, 6678–6687.CrossRef
21.
Zurück zum Zitat Zhao, R., Yuan, Y., et al. (2017). Secrecy performance analysis of cognitive decode-and-forward relay networks in Nakagami-\(m\) fading channels. IEEE Transactions on Communications, 65(2), 549–563.CrossRef Zhao, R., Yuan, Y., et al. (2017). Secrecy performance analysis of cognitive decode-and-forward relay networks in Nakagami-\(m\) fading channels. IEEE Transactions on Communications, 65(2), 549–563.CrossRef
22.
Zurück zum Zitat Biglieri, E., Proakis, J., et al. (1998). Fading channels: information-theoretic and communications aspects. IEEE Transactions on Information Theory, 44(6), 2619–2692.MathSciNetCrossRef Biglieri, E., Proakis, J., et al. (1998). Fading channels: information-theoretic and communications aspects. IEEE Transactions on Information Theory, 44(6), 2619–2692.MathSciNetCrossRef
23.
Zurück zum Zitat Zou, Y., Wang, X., et al. (2013). Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Transactions on Communications, 61(12), 5103–5113.CrossRef Zou, Y., Wang, X., et al. (2013). Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Transactions on Communications, 61(12), 5103–5113.CrossRef
Metadaten
Titel
Security Performance of Underlay Cognitive Relaying Networks with Energy Harvesting
verfasst von
Khuong Ho-Van
Thiem Do-Dac
Publikationsdatum
20.09.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06758-4

Weitere Artikel der Ausgabe 2/2020

Wireless Personal Communications 2/2020 Zur Ausgabe

Neuer Inhalt