Secrecy outage analysis on underlay cognitive radio using selection combining

被引:0
作者
Youyu T. [1 ]
Gaofeng P. [1 ]
Hui Z. [1 ]
机构
[1] School of Electronic and Information Engineering, Southwest University, Chongqing
来源
Journal of China Universities of Posts and Telecommunications | 2016年 / 23卷 / 03期
基金
高等学校博士学科点专项科研基金; 美国国家科学基金会;
关键词
cognitive radio; secrecy outage probability; selection combining; underlay;
D O I
10.1016/S1005-8885(16)60032-8
中图分类号
学科分类号
摘要
Secure data transmission in future high-capacity high-coverage multi-tier hierarchical networks, for which cognitive radio (CR) has emerged as an essential recipe, is of utmost importance. This paper investigates the secrecy outage performance of selection combining (SC) in CR networks (CRNs) over Rayleigh fading channels. In a single-input multiple-output (SIMO) wiretap channel, a secondary user transmits confidential messages to another secondary user, which is equipped with antennas. Meanwhile, a passive eavesdropper, which is equipped with antennas, intends to overhear the messages. Both the legal receiver and the eavesdropper adopt SC scheme to process the received multiple signals. The secondary transmitter uses the underlay strategy to guarantee the quality of service of the primary user without spectrum sensing. Compared to the work proposed by Maged Elkashlan et al. in Ref. [1], we present an alternative method to derive the closed-form expression for the secrecy outage probability (SOP) and develop a simplified SOP when the maximal transmit power at the secondary user is sufficiently high. Our results reveal the impact of the primary network on the secondary network with a multi-antenna wiretap channel and simulations are conducted to validate the accuracy of our proposed analytical models. © 2016 The Journal of China Universities of Posts and Telecommunications
引用
收藏
页码:51 / 56
页数:5
相关论文
共 22 条
  • [1] Elkashlan M., Wang L., Duong T.Q., Et al., On the security of cognitive radio networks, IEEE Trans Veh Techol, 64, 8, pp. 3790-3795, (2015)
  • [2] Shiu Y.-S., Chang S.Y., Wu H.-C., Et al., Physical layer security in wireless networks: A tutorial, IEEE Wireless Commun, 18, 2, pp. 66-74, (2011)
  • [3] Wyner A.D., The wire-tap channel, Bell Syst Tech J, 54, 8, pp. 1355-1387, (1975)
  • [4] Sun X., Wang J., Xu W., Et al., Performance of secure communications over correlated fading channels, IEEE Sig Process Lett, 19, 8, pp. 479-482, (2012)
  • [5] Zhang X., Pan G.F., Tang C.Q., Et al., Performance analysis of physical layer security over independent/correlated log-normal fading channels. ATNAC 2014, Nov. 25−27, 2014, pp. 23-27, (2014)
  • [6] Pan G.F., Tang C.Q., Zhang X., Et al., Physical layer security over non-small scale fading channels, IEEE Trans Veh Techol, 65, 3, pp. 1326-1339, (2016)
  • [7] He F., Man H., Wang W., Maximal ratio diversity combining enhanced security, IEEE Commun Lett, 15, 5, pp. 509-511, (2011)
  • [8] Prabhu V.U., Rodrigues M.R.D., On wireless channels with M antenna eavesdroppers: Characterization of the outage probability and ɛ-outage secrecy capacity, IEEE Trans Inf Forensics Security, 6, 3, pp. 853-860, (2011)
  • [9] Alves H., Souza R.D., Debbah M., Et al., Performance of transmit antenna selection physical layer security schemes, IEEE Signal Process Lett, 19, 6, pp. 372-375, (2012)
  • [10] Yang N., Yeoh P.L., Elkashlan M., Et al., Transmit antenna selection for security enhancement in MIMO wiretap channels, IEEE Trans Commun, 61, 1, pp. 144-154, (2013)