Abstract
Background: Based on the idea of cooperative communication, recently a lot of attention has been drawn to cooperative spectrum access for the secure information transmission in a Cognitive Radio Network (CRN). Security is one of the most important aspects of these networks, as due to their open and dynamic nature, they are extremely vulnerable to malicious behavior. Cooperative cognitive radio has emerged as a dynamic spectrum access technique, where an unlicensed (secondary) user is allowed to simultaneously access the licensed channels dedicated to a Primary User (PU), as long as the Quality of Service (QoS) of primary communication is not affected.
Methods: This paper investigates the secrecy outage performance of threshold-based cognitive decode-andforward relay network, with interference constraints from primary licensed user. Threshold-based relaying is considered where; the source message is successfully decoded by the relay, only if the received SNR satisfies the particular threshold. Outage probability expressions have been derived for the worst-case scenario, where only the eavesdropper can achieve the advantage of diversity. The Selection Combining (SC) diversity scheme is employed only at the secondary eavesdropper.
Results: The system secrecy performance is better for SC diversity scheme at the eavesdropper than Maximal Ratio Combining (MRC) diversity scheme, as MRC has better diversity performance than SC. We have shown that the improvement in desired secrecy rate, predetermined threshold, eavesdropper channel quality and interference constraints affect the secrecy performance of the cognitive radio system. The outage probability decreases accordingly with an increase in the maximum tolerable interference level at primary destination. The outage probability of Optimal relay Selection (OS) scheme is derived for a multi-relay system, when either the Instantaneous Channel State Information (ICSI) or the Statistical Channel State Information (SCSI) is available. We have shown that the secrecy performance of the OS with ICSI of the system is better than with SCSI. Also, the OS improves the performance of the multi-relay system, when the number of relays is increased.
Conclusion: The secrecy outage probability of threshold-based DF underlay cognitive relay network is evaluated. Both interference and maximum transmit power constraints are considered at secondary source and secondary relay. Also, the relay can successfully decode the message, only if it meets the pre-defined threshold. We have investigated the performance of MRC and SC diversity schemes at the secondary eavesdropper and have shown that the system secrecy performance is better for SC than MRC, as MRC has better diversity performance than SC. We have shown that the system secrecy performance is significantly affected by the required secrecy rate, pre-defined threshold, interference constraints and choice of diversity scheme (MRC/SC) at the eavesdropper. The outage probability of OS scheme is derived for a multi-relay system, when either the ICSI or the SCSI is available. We have shown that the secrecy performance of the OS with ICSI of the system is better than with SCSI. Also, the OS improves the performance of the multi-relay system, when the number of relays is increased.
Keywords: Cognitive radio network, Decode-and-forward relay, selection combining, secrecy outage probability, thresholdbased, optimal relay selection.
Graphical Abstract
[http://dx.doi.org/10.1109/JSAC.2014.141121]
[http://dx.doi.org/10.1109/TWC.2010.120310.090852]
[http://dx.doi.org/10.1002/j.1538-7305.1975.tb02040.x]
[http://dx.doi.org/10.1109/TCOMM.2014.2377239]
[http://dx.doi.org/10.1049/iet-com.2011.0638]
[http://dx.doi.org/10.1049/iet-com.2012.0574]
[http://dx.doi.org/10.1049/iet-com.2011.0819]
[http://dx.doi.org/10.1109/LWC.2017.2778732]
[http://dx.doi.org/10.1049/iet-com:20070064]
[http://dx.doi.org/10.1109/TCOMM.2012.12.110670]
[http://dx.doi.org/10.1109/TSP.2012.2213080]
[http://dx.doi.org/10.1016/j.sigpro.2017.01.033]
[http://dx.doi.org/10.1049/iet-com.2016.1248]
[http://dx.doi.org/10.1109/LCOMM.2011.030911.102343]
[http://dx.doi.org/10.1049/iet-com.2008.0507]
[http://dx.doi.org/10.1109/LCOMM.2007.070065]
[http://dx.doi.org/10.1109/LWC.2014.2365808]
[http://dx.doi.org/10.1109/LCOMM.2016.2564380]
[http://dx.doi.org/10.1049/iet-com.2009.0634]
[http://dx.doi.org/10.1049/iet-com.2015.1060]
[http://dx.doi.org/10.1049/iet-com.2016.0917]
[http://dx.doi.org/10.1109/TWC.2015.2423290]
[http://dx.doi.org/10.1109/JSAC.2013.131011]