Abstract

This paper proposes a jamming technique which employs a self-powered secondary jammer to interfere a wire-tapper, who eavesdrops communications between a self-powered secondary source and a secondary destination in energy harvesting cognitive radio networks (EHCRNs). For generality, interference from a primary source, maximum transmit power constraint and interference power constraint are considered in analyzing security performance of the proposed jamming technique in terms of security-reliability compromise. Towards this end, exact expressions of detection/eavesdropping outage probabilities at the destination/the wire-tapper are first proposed and then verified by computer simulations. Finally, results are provided to demonstrate the efficacy of the jamming technique and the key effects (interference from the primary user, power constraints, interference power distribution factor, and time splitting factor) on security performance of EHCRNs.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.