DOI QR코드

DOI QR Code

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Received : 2014.07.15
  • Accepted : 2014.12.20
  • Published : 2015.01.31

Abstract

In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.

Keywords

1. Introduction

Cognitive radio (CR) has emerged as a promising solution to optimize spectrum resources exploitation [1] [2]. The improvement is achieved by allowing the secondary users (SUs) to exploit the originally spectrum of the licensed primary users (PUs). One of the cognitive modes defining this coexistence between PUs and SUs is the “underlay” approach. In which, the SUs and PUs can exist in the same frequency band simultaneously as long as the SUs strictly satisfies the interference constraint at the primary receiver. To fulfill this constraint limit, SUs generally use relatively low transmit power which eventually limits the reliable and coverage performance of the secondary system.

In order to enhance the performance of secondary systems, cooperative relaying, as a way to achieve the space diversity, has been further exploited in cognitive ratio networks (CRNs). The performance of decode-and-forward (DF) and amplify-and-forward (AF) relaying in underlay cooperative CRNs (CCRNs) has been widely investigated in [3-9]. Different from the non-cooperative CRNs, both the SUs and the relays should maintain the interference constraint to fulfill the requirement of PUs in underlay CCRNs. In general, there are two transmit power control strategies to keep the induced interference always below a given allowable threshold [10]. One is adaptive transmit power (ATP) control, by which the secondary transmitters can adjust their transmit power to satisfy the interference constraint. The other is fixed transmit power (FTP) control, by which the secondary transmitters use their maximum available power when the primary interference constraint is verified, and remain silent otherwise. Although the use of FTP slightly deteriorates the system performance, it significantly alleviates the signaling requirements and implement complexity compared to ATP [10].

On the other hand, due to the broadcasting nature of wireless channel and the openness of cognitive radio architecture, security against overhearing of the eavesdroppers is one of the important issues [11]. Traditionally, the cryptographic techniques relying on secret keys have been employed to protect the communication confidentiality against eavesdropping attacks, however, which increases the computational and communication overheads and introduces additional system complexity for the secret key distribution and management [12]. Recently, physical layer security (PLS) is drawing a lot of attentions as a promising technique to achieve secure communication by exploiting the physical characteristics of wireless channels [13].

More recently, PLS has been considered for underlay CRNs in [14-21]. Different from non-cognitive wireless networks, there are some unique challenges to be addressed for physical layer security in cognitive radio networks, e.g., the PU’s QoS protection issue and the mitigation of mutual interference between PUs and SUs. The first attempt to address the secure transmission for underlay CRNs from the information theoretic perspective has been made in [14] - [16]. In [17], Zou et al. investigate the multiuser scheduling issues in CRNs for physical layer security transmission against eavesdropping attacks. Secure resource allocation problems for underlay CRNs are investigated in [18]. The authors in [19] indicated that user cooperation not only improves the reliability and coverage performance of cognitive radio networks, but also has great potential to enhance physical layer security against eavesdropping [19]. In [20], the authors introduce cooperative secure resource allocation to maximize the secondary secrecy rate subject to maintaining a certain level quality of service for PUs via the interference threshed constraint. In [21], the secure transmission issue for a cognitive radio network has investigated over the slow fading channel, which aims to maximize the secrecy throughput of the primary transmission. Recently, the authors attempt to enhance wireless transmission security in underlay CCRNs by relay selection in [22], where the secondary source sends confidential information to a secondary destination with the assist of multiple DF relays, and the adaptive transmit power (ATP) control strategy is used to fulfill the interference power constraints. The proposed relay selection scheme in [22] selects a trusted relay to assist the secondary transmitter and maximize the achievable secrecy rate under the availability of perfect channel state information (CSI) of all channels. However, it is often difficult or impossible for the transmitter to know the accuracy of the eavesdropper’s channel, especially for the passive eavesdropping scenario.

Moreover, in underlay CCRNs, PUs and SUs can transmit signals simultaneously by sharing the same spectrum recourses. As a result, the relays and secondary destination inevitable suffer interference from PUs, which comes in the form of co-channel interference (CCI). However, most of previous work have not taken the interference from PUs into consideration or just have translated PUs’ interference into the noise term of SUs.

Motivated by the above discussions, in this paper, we investigate physical layer security in underlay CCRNs consisting of one primary transmitter, one primary receiver, one secondary source, multiple secondary relays, and one secondary destination, where one eavesdropper are ready to intercept the transmissions from the secondary relays to the secondary destination. The FTP strategy is adopted at the secondary transmitters, including the secondary source and multiple secondary relays, which significantly depress signal burden and implement complexity. As compared with the existing works, the main contributions of this paper are exhibited as follows:

1) To the best of author’s knowledge, this paper is the first attempt to investigate physical layer security for underlay CCRNs employing FTP control strategy under passive eavesdropping attacks. Furthermore, different from previous works, the impact of PU’s interference on the relays and secondary destination also is considered.

2) Different from [22], we propose a new relay selection scheme in underlay CCRNs to achieving trade-off between complexity and secure performance, where a secondary relay that satisfies the primary interference constraint and successfully decodes the source message will be selected based on the instantaneous knowledge of all legitimate links and the statistical knowledge of the eavesdropper channels. Thus, our proposed relay selection scheme does not require the estimation of the instantaneous eavesdropper link and thus seems to be an efficient solution with practical interest.

3) We derive the closed-form expressions for the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) over independent and non-identically distributed Rayleigh channels. Moreover, we also conduct the asymptotic analysis for the SOP to provide insights on the impact of some critical parameters, such as the transmit power of the secondary users, the interference constraint, and the number of relays, on the secrecy diversity order performance. Simulation results verify the theoretical analysis, and illustrate that the secure diversity order is same as the number of secondary relays which depicts the fact that full secure diversity is achieved by the proposed relay selection scheme.

4) Furthermore, simulation and theoretical results show that, due to FTP strategy and interference constraint considered, the secure performance in underlay CCRNs is not a monotonically decreasing/increasing function of the transmit signal-to-noise ratio (SNR) anymore. After the SNR approaches a certain level, further increasing SNR may sharply degrade the secrecy performance. Therefore, a proper transmit SNR for secondary transmitter is preferred to be energy-efficient and improve the secure performance.

5) In addition, the interference constraint significantly affects the relay selection process. A strict interference constraint will drop the secondary relays from the active set and thereby reduce the secure performance. As the interference constraint approach infinity, the secure performance is limited by the second hop, and then converges to constant values as the performance floors.

Throughout this paper, the following notations will be used. The channel fading gain of link x → y is denoted by |hxy|2 , with mean of  x ∈ {s, r1,⋯, rM, u} and y ∈ {s, r1,⋯, rM, d, e, v}. Ex is the transmit power of node x and N0 is variance of the zero-mean additive white Gaussian (AWGN) at each node. γxy = Ex|hxy|2 / N0 and stand for the instantaneous SNR and the average SNR of link x → y , respectively. fx(·) and FX(·) represent the probability density function (PDF) and the cumulative distribution function (CDF) of random variable (RV) X , respectively.

 

2. System Model and Relay Selection Scheme

2.1 System Model

We consider a secrecy communication scenario in underlay CCRNs shown as Fig. 1. In the primary network, a primary source u sends data to a primary destination v . In the secondary network, a secondary source s sends confidential information to a secondary destination d by employing the assistance of M secondary relays ( ri,i=1,2,⋯,M ). An eavesdropper e is located around the secondary destination overhearing the transmission from the relays. All the nodes are equipped with single antenna and work in the half-duplexing mode. For notational convenience, M relays are denoted by R={ri|i=1,2,⋯,M} , where the DF relay protocol is employed. Different from [23] and [24], we assume that the direct links from s to d and e are not available, e.g., d and e both are out of the coverage area, which avoids considering the two-hop leakages and simplifies the system model. At each secondary transmitter, including s and ri,i=1,2,⋯,M , the FTP strategy [10] is adapted instead of ATP control to depress the system complexity. Each link in the underlay CCRN is subjected to an AWGN with zero mean and variance N0 . More specially, the mutual interference exists between primary and cognitive transmissions in underlay CCRNs.

Fig. 1.System model

The channels between nodes x ∈ {s, r1,⋯, rM, u} and y ∈ {r1,⋯, rM, d, e, v} are modeled as independent and non-identically distributed Rayleigh fading random variable. Thus, the channel fading gains, denoted by |hxy|2 , are independent and exponential random variables with means of δ2xy.

The interference level at primary destination caused by the secondary transmitters (source and relays) must be below an interference constraint, noted I0 . Using a FTP Ex(x ∈ {s, r1,⋯, rM}), the interference caused by a secondary transmitter x ( s or ri ), noted Ix is written as Ix = Ex|hxy|2. Without loss of generality, we assume that all relays have the same transmit power, e. g., Eri = Er,∀ri ∈ R . Thereby, each secondary transmitter may be activated with the probability of Px,I0 = Pr(Ix ˂ I0) , otherwise, keep silent with the probability of It is implied that the whole transmission starts only if s satisfies the interference constraint with the probability of Ps,I0. Meanwhile, some secondary relays in R fall short of the interference constraint and thus they remain silent. The other relays, which meet the interference constraint, are activated and compose a new set A . Given M relays in secondary network, there are 2M possible combinations from the full set R . Thus, the active relay set is given by

where ϕ represents the empty set, while Am is a non-empty subset from R . If the active set A is empty, the confidential message is unable to reach the destination.

The scenario of A =ϕ is described as

Similarly, the event A = Am is formulated as

Given a non-empty Am, the relays in this set will try to decode its received signal. When s broadcasts it’s confidential message, the relays in Am receive both the useful data from s and the interference from u . The instantaneous channel capacity of s → ri link can be given by

where  Eu is the transmission power at the primary transmitter. The capacity is halved because two time slots are required for completing the whole transmission.

When the capacity is large than a predetermined transmission rate threshold RS, i.e., Csri ˃ RS, ri is able to decode x successfully. Those relays that successfully decode the secondary source signal are represented as the decoding set D . Given an active set Am with the cardinality of |Am|, the decoding set is given by

If the decoding set D is empty, the confidential message is also unable to reach the destination and the transmission outage occurs; otherwise a best relay will be chosen to forward the decoded signal. The scenario of D =ϕ is described as

Similarly, the event D = Dn is formulated as

Given that D = Dn and the selected relay according to the next subsection is rD ∈ D , rD encodes the decoding confidential message by the widely-adopted wiretap code [25]. The corresponding instantaneous channel capacity of link rD → d and link rD → e are given by respectively

where

Hence, combining (8) and (9), the instantaneous secrecy capacity condition on D = Dn and the selected relay rD is given by [26]

where [x]+ denotes max(0, x) .

2.2 Proposed Suboptimal Relay Selection Scheme

According to (8), (9), and (10), the relay selection scheme with best secrecy capacity performance condition on D = Dn should be implemented as

However, this optimal relay selection has not only to consider the instantaneous CSI of the legitimate link, but also needs to take the instantaneous CSI of eavesdropper link into consideration. Although this is a common assumption in the physical layer security literature, it is not practical in most passive eavesdropping attack scenarios. Furthermore, the instantaneous CSI of u → d and u → e interference links is not available for cognitive networks.

Although the tacking of the instantaneous ri → e link seems to be impossible for practical applications, knowledge of the average channels can be estimated and obtained by long-term monitoring the eavesdropper’s transmission. Thus, we consider a suboptimal relay selection scheme, which selects the relay based on the instantaneous CSI of ri → d link and the statistical CSI of ri → e link. In this paper, the relay selection rule can be formulated as

Specially, if assuming which correspond to the scenario where the relays are close to each other and forming a cluster, our proposed relay selection scheme would be totally independent of CSI of the eavesdropper links, and can be implemented as the traditional relay selection scheme in [27], e.g.

 

3. Secrecy Performance for Underlay CCRNs

In this section, we characterize the secrecy performance of our proposed relay selection scheme for underlay CCRNs with FTP in term of probability of non-zero secrecy capacity, exact secrecy outage probability, and asymptotic secrecy outage probability over independent and non-identically distributed Rayleigh fading channels.

3.1 Preliminaries

Firstly, we present the probabilities of the occurrence of active relay set A and the decoding set D , respectively, to facilitate the following secrecy performance analysis.

Since the channel gain , ∀ri ∈ R of different relays are independent of each other and obey exponential distribution with parameter the probability of the event A = ϕ is obtained from (2) as

Similarly, the probability of the occurrence A = Am is obtained from (3) as

Meanwhile, given a non-empty Am, the probability of the event D = ϕ is obtained from (7) as

where θ1 = 22Rs-1.

Similarly, the conditional probability of the occurrence D = Dn given the non-empty Am is given by

Next, given a non-empty Dn , we will provide the conditional CDF of according to our proposed relay selection scheme in (11).

Lemma 1: Given a non-empty Dn , the conditional CDF of is given by

where When |B|= 0 , we define

Proof : Given decoding set D = Dn , if the relay rD is selected according to (11), it must satisfy the fact that

from which we derive the probability as

Thus, the conditional CDF of can be derived as

Following the multinomial identity and simple integral, we can obtain (16).

3.2 Probability of Non-Zero Secrecy Capacity

In this subsection, we examine the condition for the existence of non-zero secrecy capacity, which depicts the possibility of achievable secure communication.

By imposing the fact that the secrecy capacity is zero when s keep silent, or the active relay set A is empty, or the decoding relay setD is empty, or the signal-to-interference-plus-noise ratio (SINR) from the chosen relay to the destination is lower than that to the eavesdropper. Thus, the probability of non-zero secrecy capacity is given by

where According to (10), the conditional probability Pr{Cs(D = Dn)˃0, rD= ri|D = Dn} can be further expressed as

where denote the SINR of the link ri → d and link ri → e , respectively. Since and can be expressed as respectively, the conditional probability is totally independently with the transmit power Er of the secondary relays in (20). And the impact of Er on the probability of non-zero secrecy capacity embodies in limiting the candidates of active relays by (12) and (13).

Since γud is an exponential RV, we can obtain the conditional CDF of U1,i using Lemma 1 as

From e ’s point of view, the optimum relay selection for d is a random relay selection, as the link ri → d and link ri → e are uncorrelated. Thus, we can obtain the conditional PDF of U2,i as

Thereby, using (20), (21) and (22), and applying [28, 3.352.4] and [28, 3.353.3], the conditional probability Pr{Cs(D = Dn)˃0, rD= ri|D = Dn} can be given by

where and Ei(·) is the exponential integral function [28].

Finally, the closed-form expression for the probability of non-zero secrecy capacity can be obtained by substituting (13), (15) and (23) into (19).

3.3 Exact Secrecy Outage Probability

The secrecy outage probability is defined as the probability that the achievable secrecy rate is less than a given secrecy transmission rate RS [29]. Based on the data transmission and our proposed relay selection scheme in previous section, we can find that the secure transmission outage occurs if s keep silent, or the active relay set A is empty, or the decoding relay set D is empty, or the SINR from the chosen relay to the destination is lower than the eavesdropper SINR. Hence, using the law of total probability, the SOP can be formulated as

Using (20), (21) and (22), and applying [28, 3.352.4] and [28, 3.353.3], the conditional probability Pr{Cs(D = Dn)˂RS, rD= ri|D = Dn} can be given by

where θ2=22Rs,

Thereby, the exact closed-form expression for the SOP is derived by substituting (12), (13), (14), (15) and (25) into (24). It is worth pointing out that the closed-form expression for the SOP in (24) is useful to evaluate the impacts of the transmit power of the secondary users, the interference constraint, and the number of relays on the secure performance of underlay CCRNs with fixed transmit power control.

3.4 Asymptotic Behavior of Secrecy Outage Probability

Since the exact SOP analysis results are too complicated to render insight on the impact of system parameters, we will investigate the asymptotic behavior of the SOP by some special cases in this subsection.

1) Case of I0 → 0 or Es = Er → ∞ : From (24), we directly obtain Pso(RS) → 1 as I0 → 0 or Es = Er → ∞, which illustrates the huge impact of the interference constraint on the underlay CCRNs with FPT strategy. Given a limited I0 , increase of transmit power will not always lead to the improvement of secure performance, which is significantly different from the traditional wireless communication systems. Therefore, a proper transmit power is preferred for secondary relays to be energy-efficient and improve the secure performance.

2) Case of I0 → ∞ and  → ∞, ∀ri ∈ R : This case corresponds to the scenario where the primary destination can tolerate an unlimited interference and the relays is close to the secondary source. Notice that when → 0 , the probability of successful decoding will go to one, thus Pso(RS) → 1. As such, we omit this case in this paper.

When I0 → ∞ and → ∞, ∀ri ∈ R, from (13) and (15), we have Pr(Is ≤ I0)=1,

and

Therefore, the SOP in (24) can be simplified as

where Pr{Cs(D = R)˂RS, rD= ri|D = R} can be derived by substituting Dn = R into (25). Thus,

Remark: Traditionally, the diversity order is used to evaluate the wireless transmission reliability performance in [30], which characterizes the slope of bit error rate (BER) curve as SNR tends to infinity. However, in the presence of eavesdropping attack, the SOP is used to evaluate the secure performance. Moreover, it is observed from (24) the SOP is independent of the transmit power in the high SNR. Thus, the traditional diversity order is not applicable to measure the secure performance. To provide an insight into the impact of the number of the relays on the secrecy performance, we investigate the generalized secure diversity order introduced in [27].

3) Case of I0 → ∞, → ∞, ∀ri ∈ R, and λme → ∞ : where represent the reference channel gains of the legitimate links and the eavesdropper links, respectively, and the main-to-eavesdropper ratio (MER) [22]. Here, me λme → ∞ corresponds to the scenario where the secondary destination is located much closer to the relays than the eavesdropper, which is a practical scenario of interest [29].

In [27], a generalized secure diversity order can be expressed as

where Pint denotes the intercept probability, which is the occuring probability of an intercept event when the secrecy capacity becomes negative in [27].

As such, when I0 → ∞ and → ∞, ∀ri ∈ R, by setting RS = 0, mathematically, the value of probability Pso(RS) is equal to Pint, e.g. To derive the secure diversity order of this case, we first derive the approximate analysis of the SOP as λme → ∞.

Lemma 2: For I0 → ∞ and → ∞, ∀ri ∈ R, and λme → ∞, we can obtain as

Proof : Letting λme → ∞, we have

Accordingly, the conditional CDF of in (16) with Dn = R can be approximated as

where (a) follows from the fact that γ(n,x) ≈ xn / n as x → 0.

Then, the conditional CDF of Ui,1 is approximated as

Therefore, using (34) and (22), we can derive

Using [28, 3.352.4], the approximated probability can be given by (31).

From (31), we can observe that the SOP behaves as (1/λme)M as λme → ∞. Substituting (31) into (30), we can obtain the secure diversity order of our proposed relay selection scheme same as [27]

which shows the secure diversity order is same as the number of secondary relays, revealing the fact that full secure diversity is achieved by the proposed relay selection scheme. It also indicates that although the PU’s interference definitely degrades the SOP, it does not affect the speed at which the SOP decreases as λme → ∞ when I0 → ∞, and → ∞, ∀ri ∈ R. In contrast, increasing the number of secondary relay, the SOP will decrease at a faster speed. Therefore, exploiting multiple relay with relay selection can effectively improve the secrecy performance.

 

4. Numerical Results and Discussions

This section presents the numerical results to exam the impacts of the transmit power of the secondary users, the interference constraint, and the number of relays on the secure performance of CCRNs with fixed transmit power control. In all cases, RS = 0.5 bits/s/Hz , Eu / N0 = 5dB , ∀ri ∈ R . All the nodes are equipped with single antenna and work in the half-duplexing mode. Each link in the underlay CCRN is subjected to an AWGN with zero mean and variance N0 . All the channels are modeled as independent and non-identically distributed Rayleigh fading random variables. We see from the figures that the exact curves precisely agree with the simulations, which validate the accuracy of our analytical results. We further plot asymptotic curves to predict the secure diversity order. Most importantly, we compare the secrecy performance of our proposed relay selection scheme (PRS) with the traditional relay selection scheme (TRS) in [27] and the optimal relay selection scheme (ORS) in [22].

4.1 Impact of Transmit Power of Secondary Users

The impact of the transmit power of the secondary users on secure performance in term of the probability of non-zero secure capacity and the secrecy outage probability is illustrated in Fig. 2 and Fig. 3, respectively. We consider an equal average energy strategy at the secondary source and relays (i.e. Es = Er = ET), and the equal SNR is defined as ET / N0 . And we set M = 3 , I0 / N0 =15dB, ∀ri ∈ R .

Fig. 2.Probability of non-zero secure capacity versus ET / N0.

Fig. 3.Secrecy outage probability versus ET / N0.

Observe that as ET / N0 → 0 , the probability of non-zero achievable secrecy rate approaches 0 and the secrecy outage probability approaches 1, due to all the s → ri links are under outage and no confidential message can be delivered to the destination. We can also see that the secure performance keeps improving as ET / N0 increases to about 10dB while an unexpected decrease occures when ET / N0 keeps rising. Specially, as ET / N0 → ∞ , the probability of non-zero achievable secrecy rate approaches 0 and the secrecy outage probability approaches 1. This is because that at the low-to-medium SNR region secure performance is dominated by outage probibility of the s → ri links while at the high SNR region the finite interference constraint (I0 = 15dB) drops all the relays from the candidate pool. Obviously, due to FTP strategy and interference constraint considered, the secure performance in underlay CCRNs is not a monotonically decreasing/increasing function of the transmit signal-to-noise ratio (SNR) anymore. After the SNR approaches a certain level, further increasing SNR may sharply degrade the secrecy performance. As shown in Fig. 2 and Fig. 3, the best secure performance has been achieved when ET / N0 ≈ 7dB, and further increasing the transmit power can not improve the secrecy performance. Thus, a fixed and proper ET / N0 is preferred for secondary relays to be energy-efficient and significantly improve the secure performance.

As can be seen, TRS is not efficient for configurations with the eavesdropper and perform the worst secure performance. On the other hand, ORS achieves the best secrecy performance owing to the availability of the eavesdropper’s instantaneous CSI. However, for most of passive eavesdropping attacks, assuming perfect knowledge of the eavesdropper’s CSI is often difficult and impossible. PRS has a complexity overhead similar to TRS as it does not require the estimation of the instantaneous eavesdropper link and thus seems to be an efficient solution with practical interest.

4.2 Impact of Interference Constraint

In Fig. 4 and Fig. 5, the probability of non-zero secure capacity and secrecy outage probability curves for the relay selection schemes versus interference constraint I0 are plotted respectively. We set that M = 3 , Es / N0 = Er / N0 = 10 dB , ∀ri ∈ R .

Fig. 4.Probability of non-zero secure capacity versus I0.

Fig. 5.Secrecy outage probability versus I0.

The figures show that as I0 → 0, the probability of non-zero secure capacity approaches 0 and the secrecy outage probability approaches 1 since in this case all the relays are dropped from the active selection pool and keep silent during the transmission. Along with the increase of I to about 15dB, the secure performance improves sloely. This improvement lies mainly in the fact that with a rise or an absolute relax of the interference constraint, there are more secondary relays satisfying the interference constrains and participating in the selection during the second time slot, which obviously results in better performance. As I0 → ∞, the secure performance is limited by the second hop, and then converges to the constant value as the performance floor.

4.3 Impact of the number of relays M

The impact of M on the secrecy outage probability and the secure diversity order is illustrated in Fig. 6. In order to give prominence to the parameter M , we focus on the special case where the primary destination can tolerate an unlimited interference from the secondary transmitters and all the relay nodes successfully decode the source transmission, e.g. I0 → ∞, → ∞, ∀ri ∈ R . We set that Es / N0 = Er / N0 = 10 dB, ∀ri ∈ R . Fig. 6 plots the exact and asymptotic secrecy outage probability versus MER for various M . We see a pronounced SNR advantage with increasing M . This can be explained by the fact that M exerts an increasing effect on the secure diversity order via its proportional contribution.

Fig. 6.Secrecy outage probability versus MER λme with Er / N0 = 10 dB.

 

5. Conclusion

In this paper, we have evaluated physical layer security of multiple DF relaying underlay CCRNs with fixed transmit power control in the presence of one eavesdropper. Considered the interference power constraint at PU and modeled CCIs from PU to the secondary system, we proposed a new and simple relay selection scheme, where the relay that satisfies the primary interference constraint and successfully decodes the source message will be selected based on the instantaneous knowledge of all legitimate links and the statistical knowledge of the eavesdropper channels. The exact closed-form expressions for the probability of non-zero secure capacity and the secrecy outage probability have been derived. In order to predict the secure diversity order, moreover, the asymptotic secrecy outage probability analysis is also given. Simulation results are presented to confirm the validity of our theoretical analysis, and illustrate that due to FTP strategy and interference constraint considered, the secure performance in underlay CCRNs is not a monotonically decreasing/increasing function of the transmit signal-to-noise ratio (SNR) anymore. After the SNR approaches a certain level, further increasing SNR may sharply degrade the secrecy performance.

While this paper considered the case when the direct links form the secondary source to the destination and the eavesdropper are ignorable, only one eavesdropper overhear the transmission form the relays, and all nodes are equipped with single antenna, secure communication for the general cases with multiple eavesdroppers, multiple antenna node, and the direct links to the eavesdropper is a challenging problem, which is remained for future work.

References

  1. S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb.2005. https://doi.org/10.1109/JSAC.2004.839380
  2. Z. Xu, W. Qin, Q. Tang, and D. Jiang, "Energy-efficient cognitive access approach to convergence communications," SCIENCE CHINA Information Sciences, vol. 57, no. 4, pp. 1-12, April. 2014. 2014, 57(4): 1-12. http://www.cnki.com.cn/Article/CJFDTotal-JFXG201404006.htm
  3. K. Tourki, Khalid. A. Qaraqe, and M. -S. Alouini, "Outage analysis for underlay cognitive networks using incremental regenerative relaying," IEEE Trans. Veh. Technol., vol. 62, no. 2, pp. 721-734, Feb. 2013. https://doi.org/10.1109/TVT.2012.2222947
  4. Y. Zou, J. Zhu, B. Zheng and Y.-D. Yao, "An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks," IEEE Trans. Sig. Pross., vol. 58, no. 10, pp. 5438-5445, Oct. 2010. https://doi.org/10.1109/TSP.2010.2053708
  5. T. Q. Duong, V. N. Q. Bao, H. Tran, G. C. Alexandropoulos., and H.-J. Zepernick, "Effect of primary network on performance of spectrum sharing AF relaying," Electron, Lett., vol. 48, no. 1, pp. 25-27, 2012. https://doi.org/10.1049/el.2011.3151
  6. W. Xu, J. Zhang, P. Zhang, and C. Tellambure, "Outage probability os denode-and-forword cognitive relay in presence of primary user's interference," IEEE Commun. Lett., vol. 16, no. 8, pp. 1252-1255, Aug. 2012. https://doi.org/10.1109/LCOMM.2012.061912.120770
  7. S. I. Hussain, M. M. Abdallah, M.-S. Alouini, M. O. Hasna, K. Qaraqe, "Performance analysis of selective cooperation in underlay cognitive networks over Rayleigh channels," in Proc. of IEEE SPAWC, 2011.
  8. S. I. Hussain, M.-S. Alouini, K. Qaraqe, and M. Hasna, "Reactive relay selection in underlay cognitive networks with fixed gain relays," in Proc. of IEEE ICC. 2012.
  9. S. I. Hussain, M.-S. Alouini, K. Qaraqe, and M. Hasna, "Outage Analysis of Selective Cooperation in Underlay Cognitive Networks with Fixed Gain Relays and Primary Interference Modeling," in Proc. of IEEE PIMRC, 2012.
  10. H. Hakim, H. Boujemmaa, and W. Ajib, "Performance comparison between adaptive and fixed transmit power in underlay cognitive radio networks," IEEE Trans. Commun. vol.61, no. 12, pp. 4836-4846, Dec. 2013. https://doi.org/10.1109/TCOMM.2013.110413.120578
  11. Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Network, vol. 12, no. 5, pp. 28-33, 2013. https://doi.org/10.1109/65.730749
  12. H. Delfs, and H. Knebl, Introduction to cryptography: principles and applications, 2nd edn. Springer, 2007.
  13. A Mukherjee, S. A. Fakoorian, J. Huang and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless network: a survey," IEEE Commun. Survey & Tutorials, vol. 16, no. 3, pp. 1550-1573, 2014. https://doi.org/10.1109/SURV.2014.012314.00178
  14. B. Makki and T. Eriksson, "Secure spectrum sharing via rate adaptation," in Proc. of ICNC, 2013.
  15. Y. Pei, Y.-C. Liang, K. C. The, and K. H. Li, "Achieving cognitive and secure transmissions using multiple antennas," in Proc. of IEEE PIMRC, 2009.
  16. Y. Pei, Y.-C. Liang, K. C. The, and K. H. Li, "Secure communication over MISO cognitive ratio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010. https://doi.org/10.1109/TWC.2010.04.090746
  17. Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitve radio networks," IEEE Trans. Commun. vol.61, no. 12, pp. 5103-5113, Dec. 2013. https://doi.org/10.1109/TCOMM.2013.111213.130235
  18. Y. Wu and K. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sept. 2011. https://doi.org/10.1109/TIFS.2011.2144585
  19. P. N. Son and H. Y. Kong, "The underlay cooperative cognitive network with secure transmission," Communications (QBSC), 27th Biennial Symposium on, pp. 164 - 167, June 2014.
  20. N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, "Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users," IEEE Trans.Wireless Commun., vol. 13, no. 2, pp. 1058-1073, Feb. 2013.
  21. C. Wang and H. -M. Wang, "On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1814-1827, Nov. 2014. https://doi.org/10.1109/TIFS.2014.2356339
  22. H. Sakran, M. Shokair, O. Nasr, S. El-Rabaie, and A. A. El-Azm, "Proposed relay selection scheme for physical layer security in cognitive ratio networks," IET Commun., vol. 6, iss. 16, pp. 2676-2687, Jun. 2012. https://doi.org/10.1049/iet-com.2011.0638
  23. J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011. https://doi.org/10.1109/TSP.2011.2161295
  24. H. -M. Wang, M. Luo, X. -G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE signal process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013. https://doi.org/10.1109/LSP.2012.2227725
  25. A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  26. F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011. https://doi.org/10.1109/TIT.2011.2158487
  27. Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099 - 2111, Oct. 2013. https://doi.org/10.1109/JSAC.2013.131011
  28. I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th edition. Academic Press, San Diego, 2007. http://www.scirp.org/reference/ReferencesPapers.aspx? ReferenceID=697112
  29. N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun. vol.61, no. 1, pp. 144-154, Jan. 2013. https://doi.org/10.1109/TCOMM.2012.12.110670
  30. L. Zheng and D. Tse, "Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels," IEEE Trans. Inf. Theory, vol. 49, no.5, pp. 1073-1096, May 2003. https://doi.org/10.1109/TIT.2003.810646

Cited by

  1. Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information vol.9, pp.11, 2015, https://doi.org/10.3837/tiis.2015.11.021