Secrecy outage performance analysis of MIMO underlay cognitive radio networks with delayed CSI and transmitter antenna selection

被引:7
作者
Thakur, Anshu [1 ]
Kumar, Ashok [1 ]
Gupta, Nitin [2 ]
Singh, Ajay [3 ]
机构
[1] Natl Inst Technol Hamirpur, Dept Elect & Commun Engn, Hamirpur, India
[2] Natl Inst Technol Hamirpur, Dept Comp Sci & Engn, Hamirpur, India
[3] Indian Inst Technol Jammu, Dept Elect Engn, Jammu, Jammu & Kashmir, India
关键词
cognitive radio network; outdated channel state information; secrecy outage probability; transmit antenna selection; PHYSICAL LAYER SECURITY; SYSTEMS; CHANNEL;
D O I
10.1002/dac.4106
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive radio network is an emerging solution to deal with spectrum scarcity and to utilize the radio spectrum in opportunistic and efficient manner. Secure data transmission is one of the important issues in these kind of networks. This work studies the secrecy outage performance of a multiple-input multiple-output underlay cognitive wiretap radio network system over Rayleigh fading channel with delayed channel state information. This work considers that the secondary transmitter is equipped with multiple antennas and confidential information is transmitted from to multiantenna receiver in the presence of multiantenna eavesdropper. Further, the transmit antenna selection scheme is considered at secondary transmitter to reduce the complexity of antenna selection and to make it more practicable. To improve the quality of signal, this work considers maximal ratio combining (MRC) at secondary receiver, while selection combining and MRC techniques are utilized at the eavesdropper. The closed form expression for exact, asymptotic, and intercept secrecy outage probability has been derived, and the simulation is done for the validation of analytical results. The derived results reveal deterioration of channel secrecy performance with outdated channel state information, and the eavesdropper with outdated channel state information has also an adverse effect. Moreover, the diversity order that can be achieved in underlay cognitive radio network with outdated channel state information is unity.
引用
收藏
页数:10
相关论文
共 33 条
  • [1] Wiretap channel with side information
    Chen, Yanling
    Vinck, A. J. Han
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 395 - 402
  • [2] Chetry S, 2018, PHYS LAYER SECURITY, P1
  • [3] On the Security of Cognitive Radio Networks
    Elkashlan, Maged
    Wang, Lifeng
    Duong, Trung Q.
    Karagiannidis, George K.
    Nallanathan, Arumugam
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (08) : 3790 - 3795
  • [4] Gupta N, 2019, COGNITIVE RADIO NETW, P491
  • [5] Secrecy Outage on Transmit Antenna Selection With Weighting Errors at Maximal-Ratio Combiners
    Hu, Yujia
    Tao, Xiaofeng
    [J]. IEEE COMMUNICATIONS LETTERS, 2015, 19 (04) : 597 - 600
  • [6] Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI
    Huang, Yuzhen
    Al-Qahtani, Fawaz S.
    Duong, Trung Q.
    Wang, Jinlong
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (08) : 2959 - 2971
  • [7] An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty
    Hyadi, Amal
    Rezki, Zouheir
    Alouini, Mohamed-Slim
    [J]. IEEE ACCESS, 2016, 4 : 6121 - 6132
  • [8] A survey of overlay and underlay paradigms in cognitive radio networks
    Kumar, Bhoopendra
    Dhurandher, Sanjay Kumar
    Woungang, Isaac
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (02)
  • [9] Secrecy analysis of MRT/RAS system under Nakagami-m fading channels in the presence of imperfect channel state information
    Kumar, Rajiv
    Chauhan, Sudakar Singh
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2018, 85 : 68 - 73
  • [10] On Secure NOMA Systems With Transmit Antenna Selection Schemes
    Lei, Hongjiang
    Zhang, Jianming
    Park, Ki-Hong
    Xu, Peng
    Ansari, Imran Shafique
    Pan, Gaofeng
    Alomair, Basel
    Alouini, Mohamed-Slim
    [J]. IEEE ACCESS, 2017, 5 : 17450 - 17464