Abstract

In this paper, security issue in multiple input multiple output (MIMO) multicasting system has been analyzed in the presence of a group of eavesdroppers in cognitive radio networks (CRNs). Primary base station (PBS) and secondary base station (SBS) communicate with multiple primary and secondary receivers, respectively via a precoding relay having multiple antennas. At first, considering interference the secrecy multicast capacity at the primary receivers (PRs) and the secondary receivers (SRs) has been calculated and investigated the impact of interferences on it. Then, the zero-forcing (ZF) precoding technique at the relay has been employed which enhances the secrecy multicast capacity at the PRs and SRs by zeroing the impact of interference on each other. Secondly, the existing constructive interference energy of the communication medium employing selective precoding (SP) technique at the relay has been used to improve the secrecy multicast capacity of the PRs and SRs. Finally, phase alignment precoding (PAP) technique at the relay has been introduced which uses the destructive part of interference for further increase in the secrecy multicast capacity at the PRs and SRs. It is observed that among the three precoding techniques, the best performance is achieved by using the PAP at the relay in terms of secrecy multicast capacity and secure outage probability analysis. This is due to the fact that PAP technique at the relay not only uses the constructive interference part but also it rotates the destructive interference part in such a way that the resulting interference is always instantaneously constructive. So using these precoding relays interference power can be used to enhance system performance without increasing base station power.

Highlights

  • In modern communication world, researchers have shown their great interest on the study of cognitive radio networks (CRNs) due to its dynamic spectrum management technique

  • Considering the importance of secured wireless multicasting, in this paper, the secrecy multicast capacity (SMC) and Secure Outage Probability (SOP) of CRNs for compensating the effect of interferences using ZF precoding at the relay have been characterized

  • ZF precoding at the relay, the average received SNR per symbol at the primary receivers (PRs) and

Read more

Summary

Introduction

Researchers have shown their great interest on the study of CRNs due to its dynamic spectrum management technique. To overcome the problem of capacity degradation in wireless multicasting with the addition of new users to the system can be resolved efficiently by utilizing CRNs. The use of precoding techniques plays an important role in interference cancelation which is a considerable issue in CRNs. Christos et al in [1] used ZF precoding, SP and PAP for analysing the performance of cognitive relay assisted MIMO downlink channels in the absence of eavesdropper. Authors used ZF and SP precoding relay to enhance secrecy multicast capacity considering one user in [3]. Considering the importance of secured wireless multicasting, in this paper, the secrecy multicast capacity (SMC) and Secure Outage Probability (SOP) of CRNs for compensating the effect of interferences using ZF precoding at the relay have been characterized.

System Model and Problem Formulation
Transmission without Precoding Relay
Transmission with Precoding Relay
SMC with ZF Precoding Relay
SMC with SP Relay
SMC with PAP Relay
Numerical Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.