期刊文献+

Secrecy outage analysis on underlay cognitive radio using selection combining

Secrecy outage analysis on underlay cognitive radio using selection combining
原文传递
导出
摘要 Secure data transmission in future high-capacity high-coverage multi-tier hierarchical networks, for which cognitive radio (CR) has emerged as an essential recipe, is of utmost importance. This paper investigates the secrecy outage performance of selection combining (SC) in CR networks (CRNs) over Rayleigh fading channels. In a single-input multiple-output (SIMO) wiretap channel, a secondary user transmits confidential messages to another secondary user, which is equipped with n B (nB ≥1) antennas. Meanwhile, a passive eavesdropper, which is equipped with nE (n E ≥1) antennas, intends to overhear the messages. Both the legal receiver and the eavesdropper adopt SC scheme to process the received multiple signals. The secondary transmitter uses the underlay strategy to guarantee the quality of service of the primary user without spectrum sensing. Compared to the work proposed by Maged Elkashlan et al. in Ref. [ 1 ], we present an alternative method to derive the closed-form expression for the secrecy outage probability (SOP) and develop a simplified SOP when the maximal transmit power at the secondary user is sufficiently high. Our results reveal the impact of the primary network on the secondary network with a multi-antenna wiretap channel and simulations are conducted to validate the accuracy of our proposed analytical models. Secure data transmission in future high-capacity high-coverage multi-tier hierarchical networks, for which cognitive radio (CR) has emerged as an essential recipe, is of utmost importance. This paper investigates the secrecy outage performance of selection combining (SC) in CR networks (CRNs) over Rayleigh fading channels. In a single-input multiple-output (SIMO) wiretap channel, a secondary user transmits confidential messages to another secondary user, which is equipped with n B (nB ≥1) antennas. Meanwhile, a passive eavesdropper, which is equipped with nE (n E ≥1) antennas, intends to overhear the messages. Both the legal receiver and the eavesdropper adopt SC scheme to process the received multiple signals. The secondary transmitter uses the underlay strategy to guarantee the quality of service of the primary user without spectrum sensing. Compared to the work proposed by Maged Elkashlan et al. in Ref. [ 1 ], we present an alternative method to derive the closed-form expression for the secrecy outage probability (SOP) and develop a simplified SOP when the maximal transmit power at the secondary user is sufficiently high. Our results reveal the impact of the primary network on the secondary network with a multi-antenna wiretap channel and simulations are conducted to validate the accuracy of our proposed analytical models.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第3期51-56,共6页 中国邮电高校学报(英文版)
基金 supported in part by the National Science Foundation (61401372, 61531016) Research Fund for the Doctoral Program of Higher Education of China(20130182120017) Natural Science Foundation of CQ CSTC(cstc2013jcyj A40040) the Fundamental Research Funds for the Central Universities (XDJK2015B023, XDJK2016A011)
关键词 secrecy outage probability cognitive radio selection combining underlay secrecy outage probability, cognitive radio, selection combining, underlay
  • 相关文献

参考文献22

  • 1Elkashlan M, Wang L and Duong T Q, et al. On the security of cognitive radio networks. IEEE Trans Veh Techol, 2015, 64(8): 3790-3795.
  • 2Shiu Y -S, Chang S Y, Wu H -C, et al. Physical layer security in wireless networks: A tutorial. IEEE Wireless Commun, 2011, 18(2): 66-74.
  • 3Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54(8): 1355-1387.
  • 4Sun X, Wang J, Xu W, et al. Performance of secure communications over correlated fading channels. IEEE Sig Process Lett, 2012, 19(8): 479-482.
  • 5Zhang X, Pan G F, Tang C Q, et al. Performance analysis of physical layer security over independent/correlated log-normal fading channels. ATNAC 2014, Nov. 25-27, 2014, Melbourne, Australia, Piscataway, NJ, USA: IEEE,2014: 23- 27.
  • 6Pan G F, Tang C Q, Zhang X, et al. Physical layer security over non-small scale fading channels. IEEE Trans Veh Techol, 2016, 65(3): 1326-1339.
  • 7He F, Man H, and Wang W. Maximal ratio diversity combining enhanced security. IEEE Commun Lett, 2011, 15(5): 509-511.
  • 8Prabhu V U, and Rodrigues M R D. On wireless channels with M antenna eavesdroppers: Characterization of the outage probability and e-outage secrecy capacity. IEEE Trans Inf Forensics Security, 2011, 6(3): 853-860.
  • 9Alves H, Souza R D, Debbah M, et al. Performance of transmit antenna selection physical layer security schemes. 1EEE Signal Process Lett, 2012, 19(6): 372-375.
  • 10Yang N, Yeoh P L, Elkashlan M, et al. Transmit antenna selection for security enhancement in MIMO wiretap channels. 1EEE Trans Commun, 2013, 61(1): 144-154.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部