In this paper, we consider the physical-layer security for the primary system in an underlay cognitive radio model which comprises of a primary source–destination pair, a secondary receiver (SR), K secondary transmitters (STi, i = 1,…,K) and an eavesdropper (E). To protecting the transmission confidentiality of the primary transmission system against eavesdropping, we propose secondary transmitter (ST) aided opportunistic jamming transmission protocols. In our protocols, the selection of ST plays a crucial role. To this end, we propose the optimal secondary transmission selection (OSTS) and the Optimal Cooperative Jammer Selection (OCJS), respectively. For the non-security management, OSTS, OCJS schemes, we derive the closed-form expressions of the outage probability and the intercept probability for primary system, respectively. Furthermore, we also derive the closed-form expressions of the outage probability for the secondary user for the selective schemes. Numerical results show that the OCJS scheme has the best security performance and the conventional non-security management scheme has the worst security performance for primary system. In addition, the outage performances of OSTS and OCJS are better than the conventional non-security protocol in high secondary transmitting SNR region.
Read full abstract