Abstract

This paper investigates the secrecy performance of a single-input multiple-output (SIMO) based underlay cognitive radio networks. In particular, a single-antenna secondary transmitter transmits its secret message to a multi-antenna equipped secondary node in the presence of a multi-antenna equipped passive eavesdropper under a peak interference constraint at the single-antenna primary receiver. We proficiently derive the expressions for secrecy outage probability (SOP), intercept probability, and ergodic secrecy capacity (ESC) for the considered system over $\alpha -\mu $ fading channels. Further, we carry out the asymptotic analysis of SOP and intercept probability under two cases of interest; 1) when the average signal-to-noise ratio (SNR) of the main link, i.e., between the secondary source and secondary destination, goes to infinity with a fixed average SNR of wiretap link between the secondary source and secondary eavesdropper, and 2) when the SNRs of both the main and wiretap links tend to infinity. We can infer that a secrecy diversity order of $\frac {\alpha _{D}N_{D}\mu _{D}}{2}$ can be achieved under case 1, where $\alpha _{D}$ and $\mu _{D}$ are the main link fading parameters, and $N_{D}$ denotes the number of antennas at the destination. Whereas, under case 2, the system’s secrecy diversity order becomes zero. Moreover, we also present some interesting findings for the ESC when the interference constrained secondary transmitter power is considerably high. Further, we validate our analytical framework through extensive simulation and numerical results, and demonstrate the effects of system/channel parameters on the secrecy performance of the considered system. Our results reveal that the higher number of eavesdropper antennas can have a more deleterious impact on the system’s secrecy performance.

Highlights

  • A secrecy outage event happens when Csec falls below a certain target secrecy rate Rs, and the secrecy outage probability (SOP) can be formulated as Psoeuct = Pr[max{CD − CE, 0} < Rs]

  • As the infinite series is involved in the SOP and ergodic secrecy capacity (ESC) expressions, we show that the accurate results can be obtained by considering a few terms (n = 5) and after that, it converges

  • We can observe from this figure that the ESC performance significantly improves as the number of antennas at the legitimated destination, ND, increases, for all values of γ D

Read more

Summary

INTRODUCTION

S. Gurjar: Secrecy Performance of SIMO Underlay Cognitive Radio Networks Over α − μ Fading Channels security in wireless communications is a challenging task. B. RELATED WORKS The secrecy performance of underlay CRNs over different fading channels under PHY-security aspects has been studied in [14], [28]. The secrecy performance of SISO cooperative cognitive relay networks has been evaluated in [17] over Rayleigh fading channels. PHY-security in SISO cooperative cognitive vehicular relay networks has been studied in [19], [20] over mixed Rayleigh and doubleRayleigh fading channels. The secrecy outage performance of an underlay cognitive decode-andforward relay network over Nakagami-m fading channels is investigated in [22]. Our aim in this paper is to fill this critical gap

MOTIVATION AND CONTRIBUTIONS
ORGANIZATION
PERFORMANCE ANALYSIS
EXACT SOP ANALYSIS
ASYMPTOTIC SOP ANALYSIS
INTERCEPT PROBABILITY ANALYSIS
ASYMPTOTIC INTERCEPT PROBABILITY ANALYSIS
CONVERGENCE FOR INFINITE SUMMATIONS
NUMERICAL RESULTS AND DISCUSSION
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.