Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers

被引:1
作者
Wang, Fan [1 ]
Li, Cuiran [1 ]
Xie, Jianli [1 ]
Su, Lin [1 ]
Liu, Yadan [2 ]
Du, Shaoyi [3 ]
机构
[1] Lanzhou Jiaotong Univ, Sch Elect & Informat Engn, Lanzhou 730070, Peoples R China
[2] Longyan Univ, Sch Phys & Mech & Elect Engn, Longyan 364012, Peoples R China
[3] Xi An Jiao Tong Univ, Inst Artificial Intelligence & Robot, Coll Artificial Intelligence, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
cooperative cognitive vehicular networks; physical-layer security; throughput; secrecy outage probability; PHYSICAL LAYER SECURITY; TRANSMISSION DESIGN; OUTAGE PERFORMANCE; FADING CHANNELS; AF;
D O I
10.3390/electronics13040777
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cooperative communication and cognitive radio can effectively improve spectrum utilization, coverage range, and system throughput of vehicular networks, whereas they also incur several security issues and wiretapping attacks. Thus, security and threat detection are vitally important for such networks. This paper investigates the secrecy and throughput performance of an underlay cooperative cognitive vehicular network, where a pair of secondary vehicles communicate through a direct link and the assistance of a decode-and-forward (DF) secondary relay in the presence of Poisson-distributed colluding eavesdroppers and under an interference constraint set by the primary receiver. Considering mixed Rayleigh and double-Rayleigh fading channels, we design a realistic relaying transmission scheme and derive the closed-form expressions of secrecy and throughput performance, such as the secrecy outage probability (SOP), the connection outage probability (COP), the secrecy and connection outage probability (SCOP), and the overall secrecy throughput, for traditional and proposed schemes, respectively. An asymptotic analysis is further presented in the high signal-to-noise ratio (SNR) regime. Numerical results illustrate the impacts of network parameters on secrecy and throughput and reveal that the advantages of the proposed scheme are closely related to the channel gain of the relay link compared to the direct link.
引用
收藏
页数:19
相关论文
共 53 条
[1]  
[Anonymous], The Wolfram functions site. http://functions.wolfram.com
[2]   Performance analysis of vehicle-to-vehicle communication with full-duplex amplify-and-forward relay over double-Rayleigh fading channels [J].
Ba Cao Nguyen ;
Tran Manh Hoang ;
Le The Dung .
VEHICULAR COMMUNICATIONS, 2019, 19
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]   A PHY Layer Security Analysis of Uplink Cooperative Jamming-Based Underlay CRNs With Multi-Eavesdroppers [J].
Bouabdellah, Mounia ;
El Bouanani, Faissal ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2020, 6 (02) :704-717
[5]   When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? [J].
Cai, Chunxiao ;
Cai, Yueming ;
Zhou, Xiangyun ;
Yang, Weiwei ;
Yang, Wendong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) :624-632
[6]   Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network [J].
Chopra, Khyati ;
Bose, Ranjan ;
Joshi, Anupam .
IET COMMUNICATIONS, 2017, 11 (09) :1396-1406
[7]   Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks [J].
Fan, Lisheng ;
Yang, Nan ;
Duong, Trung Q. ;
Elkashlan, Maged ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) :3856-3867
[8]   Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach [J].
Feng, Jie ;
Yu, F. Richard ;
Pei, Qingqi ;
Chu, Xiaoli ;
Du, Jianbo ;
Zhu, Li .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07) :6214-6228
[9]  
Ghadi FR, 2023, Arxiv, DOI arXiv:2309.07738
[10]  
Gradshteyn I.S., 2000, Table of Integrals, Series, and Products, V6th