Open Access Open Access  Restricted Access Subscription Access

SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING

Ngoc Pham Thi Dan, Khuong Ho Van, Hanh Dang Ngoc, Thiem Do Dac, Phong Nguyen Huu, Son Vo Que, Son Pham Ngoc, Lien Hong Pham

Abstract


This paper investigates a cognitive radio network where a secondary sender assists a primary
transmitter in relaying primary information to a primary receiver and also transmits its own information to
a secondary recipient. This sender is capable of jamming to protect secondary and/or primary information
against an eavesdropper and self-powering by harvesting radio frequency energy of primary signals.
Security capability of both secondary and primary networks are analyzed in terms of secrecy outage
probability. Numerous results corroborate the proposed analysis which serves as a design guideline
to quickly assess and optimize security performance. More importantly, security capability trade-off
between secondary and primary networks can be totally controlled with appropriate selection of system
parameters.



Keywords


Jamming; self-powering; cognitive radios; security.

Full Text:

PDF

References


S. K. Sharma, I. Woungang, A. Anpalagan, and S. Chatzinotas, “Towards Tactile Internet in Beyond 5G Era: Recent

Advances, Current Issues and Future Directions,” IEEE Access, accepted.

M. Tavana, A. Rahmati, V. Shah-Mansouri, and B. Maham, “Cooperative sensing with joint energy and correlation detection

in cognitive radio networks,” IEEE Communications Letters, vol. 21, pp. 132-135, 2017.

D. Feng, C. Jiang, G. Lim, L. J. Cimini, Jr., G. Feng, and G. Y. Li, “A survey of energy-efficient wireless communications,”

IEEE Communications Surveys & Tutorials, vol. 15, pp. 167-178, 2013.

A. Celik, A. Alsharoa, and A. E. Kamal, “Hybrid energy harvesting cooperative spectrum sensing in heterogeneous CRNs,”

in 2016 IEEE Globecom Workshops (GC Wkshps), 2016, pp. 1-6.

S. Buzzi, C.-L. I, T. E. Klein, H. V. Poor, C. Yang, and A. Zappone, “A survey of energy-efficient techniques for 5G

networks and challenges ahead,” IEEE Journal on Selected Areas in Communications, vol. 34, pp. 697-709, 2016.

F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, “Robust AN-aided beamforming and power splitting design for secure MISO

cognitive radio with SWIPT,” IEEE Transactions on Wireless Communications, vol. 16, pp. 2450-2464, 2017.

G. Pan, H. Lei, Y. Yuan, and Z. Ding, “Performance analysis and optimization for SWIPT wireless sensor networks,” IEEE

Transactions on Communications, vol. 65, pp. 2291-2302, 2017.

T. Liu, X. Wang, and L. Zheng, “A cooperative SWIPT scheme for wirelessly powered sensor networks,” IEEE Transactions

on Communications, vol. 65, pp. 2740-2752, 2017.

H. Ding, D. B. da Costa, H. A. Suraweera, and J. Ge, “Role selection cooperative systems with energy harvesting relays,”

IEEE Transactions on Wireless Communications, vol. 15, pp. 4218-4233, 2016.

Y. Gu and S. Aissa, “RF-based energy harvesting in decode-and-forward relaying systems: Ergodic and outage capacities,”

IEEE Transactions on Wireless Communications, vol. 14, pp. 6425-6434, 2015.

A. Rajaram, D. N. K. Jayakody, K. Srinivasan, B. Chen, and V. Sharma, “Opportunistic-Harvesting: RF Wireless Power

Transfer Scheme for Multiple Access Relays System,” IEEE Access, vol. 5, pp. 16084−16099, Aug. 2017.

J. Miao and Z. Zheng, “Cooperative Jamming for Secure UAV-Enabled Mobile Relay System,” IEEE Access, accepted.

F. Zhu and M. Yao, “Improving physical layer security for CRNs using SINR-based cooperative beamforming,” IEEE

Transactions on Vehicular Technology, vol. 65, pp. 1835-1841, 2016.

B. He and X. Zhou, “Secure on-off transmission design with channel estimation errors,” IEEE Transactions on Information

Forensics and Security, vol. 8, pp. 1923-1936, 2013.

I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE

Transactions on Wireless Communications, vol. 8, pp. 5003-5011, 2009.

S. Yan, N. Yang, R. Malaney, and J. Yuan, “Transmit antenna selection with Alamouti coding and power allocation in

MIMO wiretap channels,” IEEE Transactions on Wireless Communications, vol. 13, pp. 1656-1667, 2014.

I. Krikidis and B. Ottersten, “Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling,” IEEE

Signal Processing Letters, vol. 20, pp. 141-144, 2013.30

L. Jong-Ho, “Full-duplex relay for enhancing physical layer security in multi-hop relaying systems,” IEEE Communications

Letters, vol. 19, pp. 525-528, 2015.

K. Cao, B. Wang, H. Ding, T. Li, J. Tian, and F. Gong, “Secure Transmission Designs for NOMA Systems Against Internal

and External Eavesdropping,” IEEE Transactions on Information Forensics and Security, accepted.

R. Su, Y. Wang, and R. Sun, “Secure Cooperative Transmission in Cognitive AF Relay Systems with Destination-Aided

Jamming and Energy Harvesting,” in 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile

Radio Communications (PIMRC), 2019, pp. 1-5.

R. Su, Y. Wang, and R. Sun, “Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems,”

in 2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018, pp. 1-6.

D. Wang, F. Zhou, and V. C. M. Leung, “Primary Privacy Preserving with Joint Wireless Power and Information Transfer

for Cognitive Radio Networks,” IEEE Transactions on Cognitive Communications and Networking, accepted.

M. Xu, T. Jing, X. Fan, Y. Wen, and Y. Huo, “Secure transmission solutions in energy harvesting enabled cooperative

cognitive radio networks,” in 2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018, pp. 1-6.

M. Li, H. Yin, Y. Huang, Y. Wang, and R. Yu, “Physical Layer Security in Overlay Cognitive Radio Networks With Energy

Harvesting,” IEEE Transactions on Vehicular Technology, vol. 67, pp. 11274-11279, Sep. 2018.

P. M. Quang, T. T. Duy, and V. N. Q. Bao, “Performance evaluation of underlay cognitive radio networks over Nakagami-m

fading channels with energy harvesting,” in 2016 International Conference on Advanced Technologies for Communications

(ATC), 2016, pp. 108-113.

J. Zhang, G. Pan, and H.M. Wang, “On physical-layer security in underlay cognitive radio networks with full-duplex

wireless-powered secondary system,” IEEE Access, vol. 4, pp. 3887−3893, 2016.

W. Mou, W. Yang, X. Xu, X. Li, and Y. Cai, “Secure transmission in spectrum-sharing cognitive networks with wireless

power transfer,” in 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP), 2016,

pp. 1-5.

H. Lei, M. Xu, H. Zhang, G. Pan, I. S. Ansari, and K. A. Qaraqe, “Secrecy outage performance for underlay MIMO CRNs

with energy harvesting and transmit antenna selection,” in 2016 IEEE Globecom Workshops (GC Wkshps), 2016, pp. 1-6.

A. Singh, M. R. Bhatnagar, and R. K. Mallik, “Secrecy outage of a simultaneous wireless information and power transfer

cognitive radio system,” IEEE Wireless Communications Letters, vol. 5, pp. 288-291, 2016.

Y. Liu, L. Wang, S. A. R. Zaidi, M. Elkashlan, and T. Q. Duong, “Secure D2D communication in large-scale cognitive

cellular networks: A wireless power transfer model,” IEEE Transactions on Communications, vol. 64, pp. 329-342, 2016.

S. Raghuwanshi, P. Maji, S. D. Roy, and S. Kundu, “Secrecy performance of a dual hop cognitive relay network with an

energy harvesting relay,” in 2016 International Conference on Advances in Computing, Communications and Informatics

(ICACCI), 2016, pp. 1622-1627.

S. Zhihui, Q. Yi, and C. Song, “On physical layer security for cognitive radio networks,” IEEE Network, vol. 27, pp.

-33, May/June 2013.

R. Sharma and D. Rawat, “Advances on security threats and countermeasures for cognitive radio networks: A Survey,”

IEEE Communications Surveys & Tutorials, vol. 17, pp. 1023-1043, 2015.

V. D. Nguyen, T. Q. Duong, O. A. Dobre, and O. S. Shin, “Joint information and jamming beamforming for secrecy

rate maximization in cognitive radio networks,” IEEE Transactions on Information Forensics and Security, vol. 11, pp.

-2623, 2016.

B. Fang, Z. Qian, W. Shao, and W. Zhong, “Precoding and artificial noise design for cognitive MIMOME wiretap channels,”

IEEE Transactions on Vehicular Technology, vol. 65, pp. 6753-6758, 2016.31

Y. Wu, X. Chen, and X. Chen, “Secure beamforming for cognitive radio networks with artificial noise,” in 2015 International

Conference on Wireless Communications & Signal Processing (WCSP), 2015, pp. 1-5.

X. Hu, X. Zhang, H. Huang, and Y. Li, “Secure transmission via jamming in cognitive radio networks with possion spatially

distributed eavesdroppers,” in 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio

Communications (PIMRC), 2016, pp. 1-6.

Z. Li, T. Jing, X. Cheng, Y. Huo, W. Zhou, and D. Chen, “Cooperative jamming for secure communications in MIMO

Cooperative Cognitive Radio Networks,” in 2015 IEEE International Conference on Communications (ICC), 2015, pp.

-7614.

Y. Zou, “Physical-layer security for spectrum sharing systems,” IEEE Transactions on Wireless Communications, vol. 16,

pp. 1319-1329, 2017.

Y. Liu, L. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, “Relay selection for security enhancement in cognitive relay

networks,” Wireless Communications Letters, IEEE, vol. 4, pp. 46-49, 2015.

P. Chakraborty and S. Prakriya, “Secrecy performance of an idle receiver assisted underlay secondary network,” IEEE

Transactions on Vehicular Technology, vol. 66, pp. 9555-9560, 2017.

I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 6th ed. San Diego, CA: Academic, 2000.




DOI: https://doi.org/10.15625/1813-9663/36/3/14987 Display counter: Abstract : 143 views. PDF : 71 views.

Oktrik

Journal of Computer Science and Cybernetics ISSN: 1813-9663

Published by Vietnam Academy of Science and Technology