Abstract

This work explores the physical layer security of an underlay cognitive radio network (CRN) in the presence of a powerful interferer called a primary transmitter (PT) under peak interference power constraint. Under this scenario, the secondary transmitter (Alice) transmits secret information on a single antenna with the highest signal-to-interference plus noise ratio (SINR) to a legitimate receiver (Bob), and an eavesdropper (Eve) attempts to intercept that information. Depending upon the availability of channel state information (CSI) of the eavesdropper channel, we investigate the secrecy performance of the proposed network in the Rayleigh fading environment for both passive and active eavesdropping scenarios. We obtain analytical expressions for the secrecy outage probability, intercept probability, and <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$\epsilon$</tex-math></inline-formula> -outage secrecy capacity in a passive eavesdropping scenario. A complete investigation of the average secrecy capacity (ASC) has been made, and novel expressions for the exact and asymptotic ASC have been obtained for active eavesdropping. Bolstering these results, we also define a high SINR power offset, which quantifies the significance of main system parameters on the ASC explicitly. Further, the effect of outdated CSI of Alice to primary receiver link on the various performance metrics with the concept of interference-outage is also studied.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.