Overlay Networks with Jamming and Energy Harvesting: Security Analysis

被引:0
|
作者
Khuong Ho-Van
Thiem Do-Dac
机构
[1] Ho Chi Minh City University of Technology (HCMUT),
[2] Vietnam National University Ho Chi Minh City,undefined
[3] Thu Dau Mot University,undefined
关键词
Jamming; Energy harvesting; Overlay; Security performance;
D O I
暂无
中图分类号
学科分类号
摘要
In cognitive radio networks, direct communications between a primary sender–recipient pair may be blocked due to uncertainties such as deep fading. Therefore, this paper studies overlay networks where the message of the primary sender is relayed by the secondary transmitter who also transmits its privacy message to support this communications. However, messages of the secondary transmitter may also be overheard by eavesdroppers. To secure these messages, jammers are exploited to restrict overhearing. Moreover, in order to improve energy efficiency, the secondary transmitter and all jammers only use energy harvested from primary signals for their transmission. To evaluate the security capability of both primary and secondary networks without exhaustive simulations, exact closed-form expressions of primary/secondary secrecy outage probabilities are first proposed. Then, multiple theoretical/simulated results show the validity of the proposed expressions and security improvement with increasing the number of jammers. Finally, exhaustive search based on the proposed expressions can find optimum design parameters, which perfectly serve as design instructions.
引用
收藏
页码:9713 / 9724
页数:11
相关论文
共 50 条
  • [41] Security Performance Analysis for Best Relay Selection in Energy-Harvesting Cooperative Communication Networks
    Zhang, Guangna
    Gao, Yuanyuan
    Luo, Huadong
    Wang, Shire
    Guo, Mingxi
    Sha, Nan
    IEEE ACCESS, 2020, 8 : 26 - 36
  • [42] Exact Outage Analysis of Cognitive Energy Harvesting Relaying Networks under Physical Layer Security
    Nguyen S.Q.
    Nguyen H.T.
    Van D.D.
    Hwang W.-J.
    EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2019, 6 (18)
  • [43] Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
    Li Mu
    Li Mianquan
    Huang Yuzhen
    Yin Hao
    Wang Yan
    Ren Baoquan
    Qu Xiaofei
    Yu Rui
    2018 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2018,
  • [44] Mitigating Jamming Attacks Using Energy Harvesting
    Rezgui, Gada
    Belmega, E. Veronica
    Chordi, Arsenia
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (01) : 297 - 300
  • [45] Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks
    Hema, P. P.
    Babu, A. V.
    SECURITY AND PRIVACY, 2024, 7 (03)
  • [46] Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link
    Maji, Pranabesh
    Roy, Sanjay Dhar
    Kundu, Sumit
    IET COMMUNICATIONS, 2018, 12 (11) : 1389 - 1395
  • [49] Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges
    Tedeschi, Pietro
    Sciancalepore, Savio
    Di Pietro, Roberto
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04): : 2658 - 2693
  • [50] Energy Harvesting Cooperative Cognitive Networks: Relay Selection for Information Security
    Ngoc Pham-Thi-Dan
    Khuong Ho-Van
    Thiem Do-Dac
    Son Vo-Que
    Son Pham-Ngoc
    2019 INTERNATIONAL SYMPOSIUM ON ELECTRICAL AND ELECTRONICS ENGINEERING (ISEE 2019), 2019, : 93 - 96