Secrecy Outage Analysis of CR-SWIPT Networks With Artificial Noise and Spatially Random Secondary Terminals

被引:13
作者
Ma, Yuanyuan [1 ]
Lv, Tiejun [1 ]
Liu, Han [2 ]
Li, Tingting [3 ]
Zeng, Jie [4 ]
Pan, Gaofeng [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
[2] Sch Informat & Elect, Beijing Inst Technol, Beijing 100081, Peoples R China
[3] Southwest Univ, Sch Math & Stat, Chongqing 400715, Peoples R China
[4] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[5] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
Artificial noise (AN); asymptotic analysis; cognitive radio (CR); multiple-input multiple-output (MIMO); secrecy outage probability (SOP); simultaneous wireless information and power transfer (SWIPT); WIRELESS INFORMATION; ANTENNA SELECTION;
D O I
10.1109/TCCN.2021.3130968
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, the secrecy outage performance of cognitive radio (CR) systems with simultaneous wireless information and power transfer (SWIPT) is investigated, in which non-colluding eavesdroppers (Eves) are randomly located in a 2-dimensional disk and artificial noise is added to safeguard the secrecy performance of the targeted information delivery in the secondary network. The secondary users coexist with primary users in the same bands while the secondary user transmitter (SU-TX) transmits confidential messages to a legitimate receiver (Bob) and energy to multiple energy-receivers (ERs) via the same radio frequency signals. Apart from harvesting energy, these ERs may act as Eves to overhear the confidential information only for Bob. SU-TX equipped with multiple antennas performs beamforming to Bob, which is equipped with multiple antennas and adopts selection combining (SC) scheme. To enhance the secure performance of the considered CR-SWIPT system, SU-TX adds artificial noise (AN) to the original signal designed for Bob according to the instantaneous channel state information (CSI) between SU-TX and Bob, where the artificial noise and original signals for Bob are orthogonal so that Bob can cancel this noise. On ERs' side, the total received energy for harvesting is not degraded, and a lower signal-to-interference-plus-noise ratio for eavesdropping on the information between SU-TX and Bob is introduced. The approximated closed-form expression for the secrecy outage probability (SOP) is derived by using Gauss-Laguerre quadrature, as well as the asymptotic results are valid in the high signal to noise ratio region. Finally, Monte-Carlo simulations are presented to validate the correctness of the derived analytical results.
引用
收藏
页码:931 / 945
页数:15
相关论文
共 34 条
  • [1] Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers
    Abbas, Mohammed Adil
    Song, Hojin
    Hong, Jun-Pyo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 969 - 980
  • [2] Secrecy Rate Analysis of Opportunistic User Scheduling in Uplink Networks With Potential Eavesdroppers
    Bang, Inkyu
    Jung, Bang Chul
    [J]. IEEE ACCESS, 2019, 7 : 127078 - 127089
  • [3] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [4] Secure Wireless Powered and Cooperative Jamming D2D Communications
    Chu, Zheng
    Nguyen, Huan X.
    Tuan Anh Le
    Karamanoglu, Mehmet
    Ever, Enver
    Yazici, Adnan
    [J]. IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2018, 2 (01): : 1 - 13
  • [5] Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer
    Chu, Zheng
    Cumanan, Kanapathippillai
    Ding, Zhiguo
    Johnston, Martin
    Le Goff, Stephane Y.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (05) : 1833 - 1847
  • [6] E. W. at Wolfram Research, GAUSS LAGUERRE QUADR
  • [7] Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers
    Geraci, Giovanni
    Singh, Sarabjot
    Andrews, Jeffrey G.
    Yuan, Jinhong
    Collings, Iain B.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (05) : 2931 - 2943
  • [8] Secrecy Capacity in CRN With Malicious Energy Harvester Using Game Theoretic Techniques
    Ghosh, Saptarshi
    Bhatnagar, Manav R.
    Singh, Ajay
    Panigrahi, Bijaya K.
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2017, 3 (03) : 343 - 360
  • [9] Guaranteeing secrecy using artificial noise
    Goel, Satashu
    Negi, Rohit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) : 2180 - 2189
  • [10] Cognitive radio: Brain-empowered wireless communications
    Haykin, S
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (02) : 201 - 220