Abstract
In this paper, we consider the physical-layer security for the primary system in an underlay cognitive radio model which comprises of a primary source–destination pair, a secondary receiver (SR), K secondary transmitters (STi, i = 1,…,K) and an eavesdropper (E). To protecting the transmission confidentiality of the primary transmission system against eavesdropping, we propose secondary transmitter (ST) aided opportunistic jamming transmission protocols. In our protocols, the selection of ST plays a crucial role. To this end, we propose the optimal secondary transmission selection (OSTS) and the Optimal Cooperative Jammer Selection (OCJS), respectively. For the non-security management, OSTS, OCJS schemes, we derive the closed-form expressions of the outage probability and the intercept probability for primary system, respectively. Furthermore, we also derive the closed-form expressions of the outage probability for the secondary user for the selective schemes. Numerical results show that the OCJS scheme has the best security performance and the conventional non-security management scheme has the worst security performance for primary system. In addition, the outage performances of OSTS and OCJS are better than the conventional non-security protocol in high secondary transmitting SNR region.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.