Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Secrecy Outage Performance of Cognitive Radio Network with Selection Combining at Eavesdropper

Author(s): Khyati Chopra*, Ranjan Bose and Anupam Joshi

Volume 13, Issue 5, 2020

Page: [987 - 998] Pages: 12

DOI: 10.2174/2213275912666190807122631

Price: $65

Abstract

Background: Based on the idea of cooperative communication, recently a lot of attention has been drawn to cooperative spectrum access for the secure information transmission in a Cognitive Radio Network (CRN). Security is one of the most important aspects of these networks, as due to their open and dynamic nature, they are extremely vulnerable to malicious behavior. Cooperative cognitive radio has emerged as a dynamic spectrum access technique, where an unlicensed (secondary) user is allowed to simultaneously access the licensed channels dedicated to a Primary User (PU), as long as the Quality of Service (QoS) of primary communication is not affected.

Methods: This paper investigates the secrecy outage performance of threshold-based cognitive decode-andforward relay network, with interference constraints from primary licensed user. Threshold-based relaying is considered where; the source message is successfully decoded by the relay, only if the received SNR satisfies the particular threshold. Outage probability expressions have been derived for the worst-case scenario, where only the eavesdropper can achieve the advantage of diversity. The Selection Combining (SC) diversity scheme is employed only at the secondary eavesdropper.

Results: The system secrecy performance is better for SC diversity scheme at the eavesdropper than Maximal Ratio Combining (MRC) diversity scheme, as MRC has better diversity performance than SC. We have shown that the improvement in desired secrecy rate, predetermined threshold, eavesdropper channel quality and interference constraints affect the secrecy performance of the cognitive radio system. The outage probability decreases accordingly with an increase in the maximum tolerable interference level at primary destination. The outage probability of Optimal relay Selection (OS) scheme is derived for a multi-relay system, when either the Instantaneous Channel State Information (ICSI) or the Statistical Channel State Information (SCSI) is available. We have shown that the secrecy performance of the OS with ICSI of the system is better than with SCSI. Also, the OS improves the performance of the multi-relay system, when the number of relays is increased.

Conclusion: The secrecy outage probability of threshold-based DF underlay cognitive relay network is evaluated. Both interference and maximum transmit power constraints are considered at secondary source and secondary relay. Also, the relay can successfully decode the message, only if it meets the pre-defined threshold. We have investigated the performance of MRC and SC diversity schemes at the secondary eavesdropper and have shown that the system secrecy performance is better for SC than MRC, as MRC has better diversity performance than SC. We have shown that the system secrecy performance is significantly affected by the required secrecy rate, pre-defined threshold, interference constraints and choice of diversity scheme (MRC/SC) at the eavesdropper. The outage probability of OS scheme is derived for a multi-relay system, when either the ICSI or the SCSI is available. We have shown that the secrecy performance of the OS with ICSI of the system is better than with SCSI. Also, the OS improves the performance of the multi-relay system, when the number of relays is increased.

Keywords: Cognitive radio network, Decode-and-forward relay, selection combining, secrecy outage probability, thresholdbased, optimal relay selection.

Graphical Abstract

[1]
Y. Zou, X. Li, and Y-C. Liang, "Secrecy outage and diversity analysis of cognitive radio systems", IEEE J. Sel. Areas Comm., vol. 32, no. 11, pp. 2222-2236, 2014.
[http://dx.doi.org/10.1109/JSAC.2014.141121]
[2]
J. Lee, H. Wang, J.G. Andrews, and D. Hong, "Outage probability of cognitive relay networks with interference constraints", IEEE Trans. Wirel. Commun., vol. 10, no. 2, pp. 390-395, 2011.
[http://dx.doi.org/10.1109/TWC.2010.120310.090852]
[3]
A.D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
[http://dx.doi.org/10.1002/j.1538-7305.1975.tb02040.x]
[4]
Y. Zou, B. Champagne, W-P. Zhu, and L. Hanzo, "Relay-selection improves the security-reliability trade-off in cognitive radio systems", IEEE Trans. Commun., vol. 63, no. 1, pp. 215-228, 2015.
[http://dx.doi.org/10.1109/TCOMM.2014.2377239]
[5]
Q. Gu, G. Wang, R. Fan, and Z. Zhong, "Secure performance analysis of cognitive two-way relay system with an eavesdropper", Proc. IEEE/CIC International Conference on Communications in China (ICCC), 2014pp. 176-180
[6]
M. Al-jamali, A. Al-Nahari, and M.M. AlKhawlani, "Relay selection scheme for improving the physical layer security in cognitive radio networks", Proc. IEEE 23th Signal Processing and Communications Applications Conference (SIU), 2015pp. 495-498
[7]
H. Sakran, M. Shokair, O. Nasr, S. El-Rabaie, and A.A. El-Azm, "Proposed relay selection scheme for physical layer security in cognitive radio networks", IET Commun., vol. 6, no. 16, pp. 2676-2687, 2012.
[http://dx.doi.org/10.1049/iet-com.2011.0638]
[8]
A. Taherpour, M. Nasiri-Kenari, and A. Jamshidi, "Efficient cooperative spectrum sensing in cognitive radio networks",
[9]
M. Ghaznavi, and A. Jamshidi, "Efficient method for reducing the average control bits in a distributed cooperative sensing in cognitive radio system", IET Commun., vol. 7, no. 9, pp. 867-874, 2013.
[http://dx.doi.org/10.1049/iet-com.2012.0574]
[10]
A. Ahhmadfard, A. Jamshidi, and M. Biguesh, "Capacity and power allocation for spectrum sharing in cognitive radio systems under unknown channel state information and imperfect spectrum sensing", IET Commun., vol. 6, no. 15, pp. 2387-2394, 2012.
[http://dx.doi.org/10.1049/iet-com.2011.0819]
[11]
F. Benedetto, and G. Giunta, "A theoretical analysis of asymptotical performance of cooperative spectrum sensing in the presence of malicious users", IEEE Wirel. Commun. Lett., vol. 7, no. 3, pp. 380-383, 2017.
[http://dx.doi.org/10.1109/LWC.2017.2778732]
[12]
F. Benedetto, "A reputation-based cooperative spectrum sensing in the presence of malicious byzantine users",
[13]
A. Jamshidi, M. Nasiri-Kenari, Z. Zeinalpour, and A. Taherpour, "Space–frequency coded cooperation in OFDM multiple-access wireless networks", IET Commun., vol. 1, no. 6, pp. 1152-1160, 2007.
[http://dx.doi.org/10.1049/iet-com:20070064]
[14]
G. Ardeshiri, A. Jamshidi, and A. Keshavarz-Haddad, "Performance analysis of decode and forward relay network in diffusion based molecular communication", Proc. IEEE Iranian Conference on Electrical Engineering (ICEE), 2017pp. 1992-1997
[15]
L. Chen, Y. Yang, and G. Wei, "Physical layer security enhancement with generalized selection diversity combining",
[16]
N. Yang, P.L. Yeoh, M. Elkashlan, R. Schober, and I.B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels", IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, 2013.
[http://dx.doi.org/10.1109/TCOMM.2012.12.110670]
[17]
M.Z.I. Sarkar, and T. Ratnarajah, "Bounds on the secrecy capacity with diversity combining techniques", Proc. IEEE Wireless Communications and Networking Conference (WCNC), 2012pp. 2847-2851
[18]
M.Z.I. Sarkar, and T. Ratnarajah, "Secrecy capacity over log-normal fading channel with diversity combining techniques", Proc. IEEE Wireless Communications and Networking Conference (WCNC), 2013pp. 2457-2461
[19]
X. Lei, L. Fan, R.Q. Hu, D.S. Michalopoulos, and P. Fan, "Secure multiuser communications in multiple decode-and-forward relay networks with direct links", Proc. IEEE Global Communications Conference (GLOBECOM), 2014pp. 3180-3185
[20]
M.Z.I. Sarkar, and T. Ratnarajah, "Enhancing security in correlated channel with maximal ratio combining diversity", IEEE Trans. Signal Process., vol. 60, no. 12, pp. 6745-6751, 2012.
[http://dx.doi.org/10.1109/TSP.2012.2213080]
[21]
A. Ahmadfard, A. Jamshidi, and A. Keshavarz-Haddad, "Probabilistic spectrum sensing data falsification attack in cognitive radio networks", Signal Processing, vol. 137, pp. 1-9, 2017.
[http://dx.doi.org/10.1016/j.sigpro.2017.01.033]
[22]
M. Ghaznavi, and A. Jamshidi, "Defence against primary user emulation attack using statistical properties of the cognitive radio received power", IET Commun., vol. 11, no. 9, pp. 1535-1542, 2017.
[http://dx.doi.org/10.1049/iet-com.2016.1248]
[23]
H. Zhao, H. Liu, Y. Liu, C. Tang, and G. Pan, "Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels", Proc. IEEE International Conference on Communications Software and Networks (ICCSN), 2015pp. 201-205
[24]
F. He, H. Man, and W. Wang, "Maximal ratio diversity combining enhanced security", IEEE Commun. Lett., vol. 15, no. 5, pp. 509-511, 2011.
[http://dx.doi.org/10.1109/LCOMM.2011.030911.102343]
[25]
M. Ghaznavi, and A. Jamshidi, "A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network", IEEE Sens. J., vol. 15, no. 3, pp. 1810-1816, 2015.
[26]
A. Jamshidi, "Performance analysis of low average reporting bits cognitive radio schemes in bandwidth constraint control channels", IET Commun., vol. 3, no. 9, pp. 1544-1556, 2009.
[http://dx.doi.org/10.1049/iet-com.2008.0507]
[27]
M.Z.I. Sarkar, and T. Ratnarajah, "On the secrecy mutual information of Nakagami-m fading SIMO channel", Proc. IEEE International Conference on Communications (ICC), 2010pp. 1-5
[28]
H. Lei, H. Zhang, I. S. Ansari, C. Gao, Y. Guo, G. Pan, and K. A. Qaraqe, Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-m channels.
[29]
J. Hu, and N.C. Beaulieu, "Performance analysis of decode-and-forward relaying with selection combining", IEEE Commun. Lett., vol. 11, no. 6, pp. 489-491, 2007.
[http://dx.doi.org/10.1109/LCOMM.2007.070065]
[30]
W. Yang, X. Xu, Y. Cai, and B. Zheng, "Secrecy outage analysis for cooperative DF underlay CRNs with outdated CSI", Proc. IEEE Wireless Communications and Networking Conference (WCNC), 2014pp. 416-421
[31]
T.Q. Duong, T.T. Duy, M. Elkashlan, N.H. Tran, and O.A. Dobre, "Secured cooperative cognitive radio networks with relay selection", Proc. IEEE Global Communications Conference (GLOBECOM), 2014pp. 3074-3079
[32]
Y. Liu, L. Wang, T.T. Duy, M. Elkashlan, and T.Q. Duong, "Relay selection for security enhancement in cognitive relay networks", IEEE Wirel. Commun. Lett., vol. 4, no. 1, pp. 46-49, 2015.
[http://dx.doi.org/10.1109/LWC.2014.2365808]
[33]
L. Sibomana, H-J. Zepernick, and H. Tran, "On physical layer security for reactive DF cognitive relay networks",
[34]
P. Chakraborty, and S. Prakriya, "Secrecy outage performance of a cooperative cognitive relay network", IEEE Commun. Lett., vol. 21, no. 2, pp. 326-329, 2017.
[http://dx.doi.org/10.1109/LCOMM.2016.2564380]
[35]
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints", IET Commun., vol. 4, no. 15, pp. 1787-1791, 2010.
[http://dx.doi.org/10.1049/iet-com.2009.0634]
[36]
S. Ghose, C. Kundu, and R. Bose, "Secrecy performance of dual-hop decode-and-forward relay system with diversity combining at the eavesdropper", IET Commun., vol. 10, no. 8, pp. 904-914, 2016.
[http://dx.doi.org/10.1049/iet-com.2015.1060]
[37]
K. Chopra, R. Bose, and A. Joshi, "Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network", IET Commun., vol. 11, no. 9, pp. 1396-1406, 2017.
[http://dx.doi.org/10.1049/iet-com.2016.0917]
[38]
C. Kundu, S. Ghose, and R. Bose, "Secrecy outage of dual-hop regenerative multi-relay system with relay selection", IEEE Trans. Wirel. Commun., vol. 14, no. 8, pp. 4614-4625, 2015.
[http://dx.doi.org/10.1109/TWC.2015.2423290]
[39]
J. Proakis, Digital Communications., 4th ed McGraw-Hill: New York, NY, USA, 2001.
[40]
Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks", IEEE J. Sel. Areas Comm., vol. 31, no. 10, pp. 2099-2111, 2013.
[http://dx.doi.org/10.1109/JSAC.2013.131011]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy