Abstract

In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and interference limitation with respect to the primary user (PU) as well as secrecy outage constraints due to the EAV. Secrecy outage is achieved when the EAV cannot decode the targeted signal, but communications in the secondary network is still possible (non-zero capacity exists). Approximation expressions of the secrecy outage probability and the probability of non-zero secrecy capacity are derived to evaluate the secrecy performance. Monte Carlo simulations are provided to examine the accuracy of the derived approximation expressions. Based on this, power allocation policies for the SUs are derived, satisfying all the constraints while maximizing the secrecy performance as well as the quality of service performance of the secondary network. It can be concluded that with knowledge of the channel state information (CSI) of the EAV it is possible to calculate the optimal value for the secrecy outage threshold of the secondary user (SU) which in turn allows maximizing the secrecy performance. Most interestingly, our numerical results illustrate that the secrecy performance of the system is much improved when the parameters obtained using the CSI of the EAV are calculated optimally. Thence, the system can adjust the power allocation so that no eavesdropping occurs even without reducing quality of service (QoS) performance compared to a network without any EAV.

Highlights

  • The explosive growth of new wireless communication systems in the recent years has lead to spectrum shortage

  • NUMERICAL RESULTS illustrative examples are presented to highlight the impact of the power allocation policies on the secrecy outage probability for the considered

  • We see that when g0 increases from 5 to 10, the secrecy performance of the system is significantly improved in the low signal-tonoise ratio (SNR) regime of the primary user (PU)

Read more

Summary

INTRODUCTION

The explosive growth of new wireless communication systems in the recent years has lead to spectrum shortage. Due to the broadcast nature of wireless signals, security is one of the most challenging issues encountered in wireless networks This becomes even more serious in CRN as the spectrum band is shared by a secondary network and even more so when cooperative communications is introduced. This problem was addressed in [12] where the secrecy outage performance of cooperative cognitive radio networks (CCRN) was derived under interference constraints from the PU. Given the interference limitations from the PU and the secrecy constraints from the EAV, power allocation policies for the secondary network are obtained.

RELATED WORK
POWER ALLOCATION POLICIES
NUMERICAL RESULTS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call