SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING
Keywords:Jamming, self-powering, cognitive radios, security.
AbstractThis paper investigates a cognitive radio network where a secondary sender assists a primary
transmitter in relaying primary information to a primary receiver and also transmits its own information to
a secondary recipient. This sender is capable of jamming to protect secondary and/or primary information
against an eavesdropper and self-powering by harvesting radio frequency energy of primary signals.
Security capability of both secondary and primary networks are analyzed in terms of secrecy outage
probability. Numerous results corroborate the proposed analysis which serves as a design guideline
to quickly assess and optimize security performance. More importantly, security capability trade-off
between secondary and primary networks can be totally controlled with appropriate selection of system
S. K. Sharma, I. Woungang, A. Anpalagan, and S. Chatzinotas, “Towards Tactile Internet in Beyond 5G Era: Recent
Advances, Current Issues and Future Directions,” IEEE Access, accepted.
M. Tavana, A. Rahmati, V. Shah-Mansouri, and B. Maham, “Cooperative sensing with joint energy and correlation detection
in cognitive radio networks,” IEEE Communications Letters, vol. 21, pp. 132-135, 2017.
D. Feng, C. Jiang, G. Lim, L. J. Cimini, Jr., G. Feng, and G. Y. Li, “A survey of energy-efficient wireless communications,”
IEEE Communications Surveys & Tutorials, vol. 15, pp. 167-178, 2013.
A. Celik, A. Alsharoa, and A. E. Kamal, “Hybrid energy harvesting cooperative spectrum sensing in heterogeneous CRNs,”
in 2016 IEEE Globecom Workshops (GC Wkshps), 2016, pp. 1-6.
S. Buzzi, C.-L. I, T. E. Klein, H. V. Poor, C. Yang, and A. Zappone, “A survey of energy-efficient techniques for 5G
networks and challenges ahead,” IEEE Journal on Selected Areas in Communications, vol. 34, pp. 697-709, 2016.
F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, “Robust AN-aided beamforming and power splitting design for secure MISO
cognitive radio with SWIPT,” IEEE Transactions on Wireless Communications, vol. 16, pp. 2450-2464, 2017.
G. Pan, H. Lei, Y. Yuan, and Z. Ding, “Performance analysis and optimization for SWIPT wireless sensor networks,” IEEE
Transactions on Communications, vol. 65, pp. 2291-2302, 2017.
T. Liu, X. Wang, and L. Zheng, “A cooperative SWIPT scheme for wirelessly powered sensor networks,” IEEE Transactions
on Communications, vol. 65, pp. 2740-2752, 2017.
H. Ding, D. B. da Costa, H. A. Suraweera, and J. Ge, “Role selection cooperative systems with energy harvesting relays,”
IEEE Transactions on Wireless Communications, vol. 15, pp. 4218-4233, 2016.
Y. Gu and S. Aissa, “RF-based energy harvesting in decode-and-forward relaying systems: Ergodic and outage capacities,”
IEEE Transactions on Wireless Communications, vol. 14, pp. 6425-6434, 2015.
A. Rajaram, D. N. K. Jayakody, K. Srinivasan, B. Chen, and V. Sharma, “Opportunistic-Harvesting: RF Wireless Power
Transfer Scheme for Multiple Access Relays System,” IEEE Access, vol. 5, pp. 16084−16099, Aug. 2017.
J. Miao and Z. Zheng, “Cooperative Jamming for Secure UAV-Enabled Mobile Relay System,” IEEE Access, accepted.
F. Zhu and M. Yao, “Improving physical layer security for CRNs using SINR-based cooperative beamforming,” IEEE
Transactions on Vehicular Technology, vol. 65, pp. 1835-1841, 2016.
B. He and X. Zhou, “Secure on-off transmission design with channel estimation errors,” IEEE Transactions on Information
Forensics and Security, vol. 8, pp. 1923-1936, 2013.
I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE
Transactions on Wireless Communications, vol. 8, pp. 5003-5011, 2009.
S. Yan, N. Yang, R. Malaney, and J. Yuan, “Transmit antenna selection with Alamouti coding and power allocation in
MIMO wiretap channels,” IEEE Transactions on Wireless Communications, vol. 13, pp. 1656-1667, 2014.
I. Krikidis and B. Ottersten, “Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling,” IEEE
Signal Processing Letters, vol. 20, pp. 141-144, 2013.30
L. Jong-Ho, “Full-duplex relay for enhancing physical layer security in multi-hop relaying systems,” IEEE Communications
Letters, vol. 19, pp. 525-528, 2015.
K. Cao, B. Wang, H. Ding, T. Li, J. Tian, and F. Gong, “Secure Transmission Designs for NOMA Systems Against Internal
and External Eavesdropping,” IEEE Transactions on Information Forensics and Security, accepted.
R. Su, Y. Wang, and R. Sun, “Secure Cooperative Transmission in Cognitive AF Relay Systems with Destination-Aided
Jamming and Energy Harvesting,” in 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile
Radio Communications (PIMRC), 2019, pp. 1-5.
R. Su, Y. Wang, and R. Sun, “Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems,”
in 2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018, pp. 1-6.
D. Wang, F. Zhou, and V. C. M. Leung, “Primary Privacy Preserving with Joint Wireless Power and Information Transfer
for Cognitive Radio Networks,” IEEE Transactions on Cognitive Communications and Networking, accepted.
M. Xu, T. Jing, X. Fan, Y. Wen, and Y. Huo, “Secure transmission solutions in energy harvesting enabled cooperative
cognitive radio networks,” in 2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018, pp. 1-6.
M. Li, H. Yin, Y. Huang, Y. Wang, and R. Yu, “Physical Layer Security in Overlay Cognitive Radio Networks With Energy
Harvesting,” IEEE Transactions on Vehicular Technology, vol. 67, pp. 11274-11279, Sep. 2018.
P. M. Quang, T. T. Duy, and V. N. Q. Bao, “Performance evaluation of underlay cognitive radio networks over Nakagami-m
fading channels with energy harvesting,” in 2016 International Conference on Advanced Technologies for Communications
(ATC), 2016, pp. 108-113.
J. Zhang, G. Pan, and H.M. Wang, “On physical-layer security in underlay cognitive radio networks with full-duplex
wireless-powered secondary system,” IEEE Access, vol. 4, pp. 3887−3893, 2016.
W. Mou, W. Yang, X. Xu, X. Li, and Y. Cai, “Secure transmission in spectrum-sharing cognitive networks with wireless
power transfer,” in 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP), 2016,
H. Lei, M. Xu, H. Zhang, G. Pan, I. S. Ansari, and K. A. Qaraqe, “Secrecy outage performance for underlay MIMO CRNs
with energy harvesting and transmit antenna selection,” in 2016 IEEE Globecom Workshops (GC Wkshps), 2016, pp. 1-6.
A. Singh, M. R. Bhatnagar, and R. K. Mallik, “Secrecy outage of a simultaneous wireless information and power transfer
cognitive radio system,” IEEE Wireless Communications Letters, vol. 5, pp. 288-291, 2016.
Y. Liu, L. Wang, S. A. R. Zaidi, M. Elkashlan, and T. Q. Duong, “Secure D2D communication in large-scale cognitive
cellular networks: A wireless power transfer model,” IEEE Transactions on Communications, vol. 64, pp. 329-342, 2016.
S. Raghuwanshi, P. Maji, S. D. Roy, and S. Kundu, “Secrecy performance of a dual hop cognitive relay network with an
energy harvesting relay,” in 2016 International Conference on Advances in Computing, Communications and Informatics
(ICACCI), 2016, pp. 1622-1627.
S. Zhihui, Q. Yi, and C. Song, “On physical layer security for cognitive radio networks,” IEEE Network, vol. 27, pp.
-33, May/June 2013.
R. Sharma and D. Rawat, “Advances on security threats and countermeasures for cognitive radio networks: A Survey,”
IEEE Communications Surveys & Tutorials, vol. 17, pp. 1023-1043, 2015.
V. D. Nguyen, T. Q. Duong, O. A. Dobre, and O. S. Shin, “Joint information and jamming beamforming for secrecy
rate maximization in cognitive radio networks,” IEEE Transactions on Information Forensics and Security, vol. 11, pp.
B. Fang, Z. Qian, W. Shao, and W. Zhong, “Precoding and artificial noise design for cognitive MIMOME wiretap channels,”
IEEE Transactions on Vehicular Technology, vol. 65, pp. 6753-6758, 2016.31
Y. Wu, X. Chen, and X. Chen, “Secure beamforming for cognitive radio networks with artificial noise,” in 2015 International
Conference on Wireless Communications & Signal Processing (WCSP), 2015, pp. 1-5.
X. Hu, X. Zhang, H. Huang, and Y. Li, “Secure transmission via jamming in cognitive radio networks with possion spatially
distributed eavesdroppers,” in 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio
Communications (PIMRC), 2016, pp. 1-6.
Z. Li, T. Jing, X. Cheng, Y. Huo, W. Zhou, and D. Chen, “Cooperative jamming for secure communications in MIMO
Cooperative Cognitive Radio Networks,” in 2015 IEEE International Conference on Communications (ICC), 2015, pp.
Y. Zou, “Physical-layer security for spectrum sharing systems,” IEEE Transactions on Wireless Communications, vol. 16,
pp. 1319-1329, 2017.
Y. Liu, L. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, “Relay selection for security enhancement in cognitive relay
networks,” Wireless Communications Letters, IEEE, vol. 4, pp. 46-49, 2015.
P. Chakraborty and S. Prakriya, “Secrecy performance of an idle receiver assisted underlay secondary network,” IEEE
Transactions on Vehicular Technology, vol. 66, pp. 9555-9560, 2017.
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 6th ed. San Diego, CA: Academic, 2000.
How to Cite
License1. We hereby assign copyright of our article (the Work) in all forms of media, whether now known or hereafter developed, to the Journal of Computer Science and Cybernetics. We understand that the Journal of Computer Science and Cybernetics will act on my/our behalf to publish, reproduce, distribute and transmit the Work.
2. This assignment of copyright to the Journal of Computer Science and Cybernetics is done so on the understanding that permission from the Journal of Computer Science and Cybernetics is not required for me/us to reproduce, republish or distribute copies of the Work in whole or in part. We will ensure that all such copies carry a notice of copyright ownership and reference to the original journal publication.
3. We warrant that the Work is our results and has not been published before in its current or a substantially similar form and is not under consideration for another publication, does not contain any unlawful statements and does not infringe any existing copyright.
4. We also warrant that We have obtained the necessary permission from the copyright holder/s to reproduce in the article any materials including tables, diagrams or photographs not owned by me/us.