Underlay Cognitive Radio With Instantaneous Interference Constraint: A Secrecy Performance

被引:6
作者
Thakur, Shilpa [1 ]
Singh, Ajay [1 ]
机构
[1] Indian Inst Technol Jammu, Dept Elect Engn, Jammu 181221, Jammu & Kashmir, India
关键词
Interference; Receiving antennas; Transmitting antennas; Rayleigh channels; Radio transmitters; Eavesdropping; Security; Antenna selection; cognitive radio networks; interference constraint; outdated channel state information; primary interference; secure communication; secrecy outage probability; ANTENNA SELECTION;
D O I
10.1109/TVT.2021.3093071
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We examine the secrecy performance of the receive antenna selection scheme in interference-limited underlay cognitive radio network (CRN) where the antenna that results in the highest signal-to-interference ratio at the secondary receiver is chosen to improve the secrecy performance of the secondary transmission. Exact and asymptotic expressions for the secrecy outage probability and intercept probability are derived for an interference-limited scenario over a general fading scenario with the assumption that the channel state information (CSI) on the secondary transmitter (ST)- primary receiver (PR) channel is perfect. However, CSI on the ST-PR channel may be outdated due to the time-varying properties or feedback latency from the PU. If the ST allocates transmission power using this outdated CSI, PR's interference constraint will not be satisfied. Therefore, we investigate the impact of outdated CSI on the secrecy performance of an interference-limited CRN when interference from the primary transmitter to SU exits under peak interference power constraint.
引用
收藏
页码:7839 / 7844
页数:6
相关论文
共 22 条
[1]   Asymptotic Performance Analysis of Generalized User Selection for Interference-Limited Multiuser Secondary Networks [J].
Al-Badarneh, Yazan H. ;
Georghiades, Costas N. ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2019, 5 (01) :82-92
[2]   On the Secrecy Performance of Generalized User Selection for Interference-Limited Multiuser Wireless Networks [J].
Al-Badarneh, Yazan H. ;
Georghiades, Costas N. ;
Radaydeh, Redha M. ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (12) :12442-12446
[3]   Asymptotic Performance Analysis of the kth Best Link Selection Over Wireless Fading Channels: An Extreme Value Theory Approach [J].
Al-Badarneh, Yazan H. ;
Georghiades, Costas N. ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (07) :6652-6657
[4]  
[Anonymous], 2015, P GLOB COMM C
[5]  
[Anonymous], 2008, Adaptive Filter Theory
[6]  
Bouabdellah M., 2019, P IEEE 30 ANN INT S, P1
[7]  
Buchholz H., 2013, CONFLUENT HYPERGEOME, V15
[8]   A Survey on Multiple-Antenna Techniques for Physical Layer Security [J].
Chen, Xiaoming ;
Ng, Derrick Wing Kwan ;
Gerstacker, Wolfgang H. ;
Chen, Hsiao-Hwa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1027-1053
[9]  
David H. A., 2004, Order Statistics
[10]   On the Security of Cognitive Radio Networks [J].
Elkashlan, Maged ;
Wang, Lifeng ;
Duong, Trung Q. ;
Karagiannidis, George K. ;
Nallanathan, Arumugam .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (08) :3790-3795