DOI QR코드

DOI QR Code

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung (Wireless Communications Lab, Posts and Telecommunications Institute of Technology) ;
  • Son, Pham Ngoc (Ho Chi Minh City University of Technology and Education)
  • Received : 2015.06.01
  • Accepted : 2015.09.11
  • Published : 2015.11.30

Abstract

This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

Keywords

1. Introduction

Recently, multicast protocols have been gained much attention in the research field of wireless communication. Multicast transmission provides an efficient mechanism for communicating the same data between a single source and multiple destinations. Due to the broadcast nature of wireless channel, the source data in multicast technique can be delivered to the intended destinations simultaneously, which can achieve efficiency of spectrum use. Moreover, in order to improve the data communication reliability, the fundamental concept of cooperative communication [1] can be applied efficiently. In [2], a cooperative-based multicast protocol with decode-and-forward (DF) relay selection over Rayleigh fading channel was proposed and analyzed. The authors in [3] considered a generalized DF cooperative multicast protocol in which the system must resort the Nth-best relay to help the source-destination communication. Moreover, in [3], the effect of correlated co-channel interference was also taken into account in deriving exact expressions of the end-to-end outage probability. In [4]-[6], cognitive multicast protocols in underlay cognitive radio (CR) networks were investigated, where secondary transmitters use the multicast strategy to deliver their data to multiple secondary receivers under a maximum interference threshold set by primary network. In particular, [4]-[5] investigated average channel capacity and outage capacity of secondary network over fading channels, respectively, whereas, [6] proposed a distributed cooperative multicast protocol in CR networks which are composed multiple secondary sources, secondary relays, secondary destinations and primary users.

However, the broadcasting methods face with security issues because the transmitted data may be readily overheard by unauthorized parties or eavesdroppers. Recently, physical-layer security has become a promising method to guarantee the secure communication without using any complex encryption methods at higher layers [7]. Up to now, to improve secrecy performances, i.e., secrecy outage probability (SOP), average secrecy capacity (ASC) and non-zero secrecy capacity probability (NzSCP), for the existing wireless networks, cooperative transmission protocols with diversity relay schemes have been proposed. In [8]-[9], the authors mainly focused on security enhancement at the cooperative phase with proposed relay selection methods, where the security at the broadcast phase is assumed to be guaranteed due to short distances between the source and the potential relays. In [10]-[11], both decode-and-forward (DF) and randomize-and-forward (RF) secured communication methods were investigated. In the DF strategy, the source and the relay cooperate to forward the data to the destination by using the same codebook. Hence, the eavesdropper in this strategy can employ combining techniques to enhance decoding efficiency of the data overheard. Unlike the DF protocol, the relay in the RF protocol generates a randomized codebook to confuse the eavesdropper. In [12], an opportunistic relaying scheme using best regenerative relay was proposed. Similar to [8]-[9], the authors in [12] only evaluated the SOP at the cooperative phase with different combining techniques at the destination. Published works [13]-[14] introduced theoretical models for secured multicasting systems. In particular, the multi-user-based cooperative protocol was investigated in [13], while [14] considered the secured communication between a single-antenna transmitter and multiple multi-antenna receivers, in presence of multiple multi-antenna eavesdroppers.

To the best of our knowledge, there have been several reports on evaluating secrecy performances of cooperative multicast protocols in underlay CR networks [15]-[20]. In particular, the secured CR protocol in which transmit powers of secondary transmitters are fixed was proposed in [15]. Also, the authors in [15] made an assumption that the secondary eavesdropper cannot overhear the signals transmitted by the secondary source and again, only SOP of the second phase was considered. Similarly, [16] proposed various joint relay and jammer selection strategies to enhance the SOP of the secondary network at the second time slot. In [17], the authors proposed physical-layer security enhancement models in underlay cognitive multi-antenna wiretap channels. In [18], exact and asymptotic closed-form expressions of the end-to-end SOP for dual-hop underlay CR protocols with relay selection methods over independently but non-identically distributed (i.n.i.d.) Rayleigh fading channels were derived. Moreover, the secondary relays in [18] used the RF strategy to forward the data, in order to avoid the eavesdropper to combine the received data. The most related to our work is scheme proposed in [19]-[20]. In particular, [19] studied the secrecy outage performance of dual-hop relay protocols in underlay CR environment for both DF and RF techniques and [20] considered the opportunistic relay selection method using max-min criterion. However, [19] only provided a simple relay scenario with a single relay, while [20] evaluated the secrecy outage performance in independent and identically distributed (i.i.d.) networks for the RF technique. Moreover, the scheme in [20] requires full instantaneous channel state information (CSI) of the data, interference and eavesdropping links, which cannot be possible in practice. In this paper, we extend the scheme in [19] to multi-relay ones in the multicast CR context. Unlike [20], we assume that no eavesdropping information is supported and only channel state information (CSI) of the source-relay links are available to serve for the relay selection. The main contributions of this paper can be listed as follows:

The rest of this paper is organized as follows. The system model of the proposed protocols is described in section 2. In Section 3, the expressions of SOP, NzSCP and ASC are derived. The simulation results are shown in Section 4. Finally, this paper is concluded in Section 5.

Notations:

- hXY denotes the Rayleigh channel coefficient between nodes X and Y.

- γXY (γXY=|hXY|2) denotes channel gain of the X-Y link which has exponential distribution.

- λXY denotes parameter of the random variable (RV) γXY, i.e., λXY = 1/E{γXY} with E{γXY} is the expectation operator.

- xS is the original data of the source S, eS and eR are data encoded by the source and the relay, respectively.

- dXY and η defines the Euclidean distance between nodes X and Y, and the path-loss exponent, respectively. To take path-loss into account, we can model the parameter λXY as a function of the link distance (dXY) and path-loss (η) as in [1]: λXY = (dXY)η.

- nX denotes additive white Gaussian noises (AWGN) at the node X.

- E1 and ln (.) are exponential integral function and natural logarithm function [23], respectively.

- is coefficient of binomial expansion, where a and b are non-negative integers and b ≥ a .

- Function [x]+ is defined by [x]+ = max(0, x).

 

2. System Model

As illustrated in Fig. 1, the secured transmission protocol in multicast underlay CR network is considered, where a secondary source (S) attempts to transmit its data to N secondary destinations (D) via the assistance of M secondary relays (R), in the presence of an eavesdropper (E) who overhears the transmitted data. The source and relays utilize a spectrum licensed to a primary user (P) to transmit the source data to the destination.

Fig. 1.Secured communication for cooperative multicast protocols in underlay CR networks.

2.1 Assumptions

Throughout this paper, we consider the assumptions as follows.

2.2 Operation of the proposed protocols

Before transmitting the data, the transmit power of the source S and the relay Rm must be adapted to satisfy the interference constraint as presented in [24]-[25]:

where Ith is maximum tolerable interference power.

The data transmission is split into two orthogonal time slots. At the first time slot, the source (S) sends its data to the best relay which is selected by partial methods as [21]-[22]:

Equation (1) implies that the relay which offers the highest channel gain to the source is considered as the best relay for the cooperation. Next, the received data at the relay Rb can be given by

Due to the broadcast nature of wireless channel, the eavesdropper E can overhear the source data, and hence, the data received at this node can be expressed as

At the second time slot, the relay Rb employs either the DF technique or the RF technique to forward the source data to the destination. The received signal at the destination and the eavesdropper can be expressed, respectively by

From (1)-(6), the instantaneous signal-to-noise ratio (SNR) of the S → Rb, S → E and Rb → E links can be given respectively as

where Q = Ith / N0 is interference power to noise ratio.

Furthermore, the instantaneous SNR of Rb → D link is dominated by the weakest link between the relay Rb and destinations, which can expressed similarly as [3, eq. (4)]:

where

In the DF protocol, the best relay re-encodes the data, using the same code-book with the source, i.e., eS = eR. In this protocol, the achievable rate of the data link can be computed by

If the eavesdropper uses MRC combiner (named DF-MRC protocol), the achievable rate of the eavesdropping link can be formualted as

If the node E uses SC technique (named DF-SC protocol), the data rate obtained is

From (11)-(13), the end-to-end secrecy capacity of the DF-MRC and DF-SC schemes can be given, respectively as

For the RF protocol, the relay Rb uses a random codebook to avoid the eavesdropper to combine the received data, i.e., eR ≠ eS. Similar to [19, eq. (5)], the secrecy rate at the first hop and the second hop is respectively formulated by

Hence, the end-to-end secrecy capacity of the RF protocol can be obtained by (see [19, eq. (6)])

We can observe from (14), (15) and (17) that since ΨSE + ΨRbE > max (ΨSE,ΨRbE) and , hence we have the following inequality:

From (18), it is obvious that the performance of the RF protocol is the best, while that of the DF-SC protocol is between that of the RF and DF-MRC protocols, in terms of the SOP, NzSCP and ASC that will be derived in next section.

 

3. Performance Evaluation

3.1 Mathematical Preliminaries

In this subsection, an overview of well-known mathematical results that will be used throughout this paper is given. At first, let us consider an exponential RV X whose parameter is λX. The cumulative density function (CDF) and probability density function (PDF) of X can be expressed, respectively as

Considering the maximum of K RVs, i.e., where K is a positive integer and Xi is an exponential RV with parameter λXi, the CDF FXmax (x) can be given by

In addition, with the i.n.i.d. RVs, i.e., λXi ≠ λXj, ∀i ≠ j, we can express FXmax (x) as follows

Considering the i.i.d. RVs, i.e., λXi = λX, ∀i, equation (21) can be rewritten by

Next, considering the minimum of K exponential RVs, i.e., the CDF of Xmin can be formulated by (23) as

Then, with the i.n.i.d. and i.i.d. RVs, FXmin (x) can be respectively expressed by

3.2 Secrecy Outage Probability (SOP)

Secrecy outage probability (SOP) is defined as the probability that the end-to-end secrecy capacity is below a target secrecy rate, i.e., Rth (Rth > 0). In the following, the SOP of the DF-SC, DF-MRC and RF protocols will be respectively derived.

Proposition 1: In the i.n.i.d. networks, the SOP of the DF-SC protocol can be expressed by an exact closed-form formula as

where

Proof: See Appendix A.

From Proposition 1, we have the following corollary:

Corollary 1: In the i.n.i.d. networks, the approximate SOP of the DF-SC protocol is given by

Proof: At high Q region, i.e., Q >> 1, we can rewrite (15) by

and the approximate SOP can be formulated by

Then, using the same method presented in Appendix A, we can obtain (27).

From (26) and (27), it is obvious that only depends on the average CSI of all of the links but the value of Q. This implies that the diversity order of the DF-SC protocol equals zero.

Proposition 2: An exact closed-form expression of the SOP for the DF-MRC protocol in the i.n.i.d. networks can be calculated as

Proof: See Appendix B.

Similarly, an approximate SOP of the DF-MRC protocol can be given as in Corollary 2 below:

Corollary 2: At high Q regime, the SOP of the DF-MRC protocol in the i.n.i.d. networks converges to

Proof: Similar to that of Corollary 1.

Proposition 3: For the i.n.i.d. networks, the exact expression of SOP for the RF protocol can be obtained by

Proof: See Appendix C.

Next, can be approximated at high Q values as in Corollary 3:

Corollary 3: When Q → +∞, we can approximate the SOP of the RF protocol as

Proof: Similar to that of Corollary 1.

Next, let us consider the i.i.d. networks, i.e., λSRm = λSR, λRmD = λRD, λRmP = λRP and λRmE = λRE for all m. In this case, (26), (30) and (32) become

where

At high Q values, we can rewrite (34)-(36), respectively by

Note that the proof of (34)-(39) is skipped because it is similar with that in the i.n.i.d. networks.

3.3 Non-zero Secrecy Capacity Probability (NzSCP)

Non-zero secrecy capacity probability (NzSCP) is the probability that the secrecy capacity is larger than 0, which is equivalent to the probability that the capacity of the data channel is higher than that of the eavesdropping channel. Hence, the NzSCP can be formulated by

where PR indicates the protocol used, i.e., PR ∈ {DF-SC,DF-MRC,RF}, and is the asymptotic SOP calculated above.

From (40), the NzSCP of the considered protocols in the i.n.i.d. networks can be expressed as

where and

Finally, in the i.i.d. networks, we respectively obtain

where

3.4 Average Secrecy Capacity (ASC)

Firstly, from expressions of given by (26), (30), (32), (34)-(36), we replace ρth by a variable x (x ≥ 1). Next, differentiating with respect to x, we obtain Then, the average secrecy channel capacity (ASC) for the considered protocols can be given by an unified expression as follows: (see [26, eq. (33)])

Because it is impossible to find an closed-form expression for (47), it is calculated numerically by computer softwares such as Mathematica [27].

 

4. Simulation Results

In this section, Monte Carlo simulation results are presented to verify our theoretical derivations and to compare the secrecy performances of the considered protocols. In simulation environment, a two-dimensional XY-plane in which positions of the secondary source (S), the secondary relay (Rm), the secondary destination (Dn), the secondary eavesdropper (E) and the primary user (P) are (0,0), (xRi,0), (1,yDn), (xE,yE) and (xp,yp), respectively, where m ∈ {1,2,...,M}, n ∈ {1,2,...,N} and 0 < xRi < 1. Therefore, the link distances can given by: Moreover, in all of simulations, the path-loss exponent is fixed by 3, i.e., η = 3.

In Fig. 2, we present the secrecy outage probability (SOP) of the proposed protocols in the i.n.d. networks as a function of the interference power to noise ratio Q (Ith / N0) in dB. In this simulation, we set the target secrecy rate, the number of relays and the number of destinations by 0.1, 3 and 2, respectively. We also assume that three relays are placed at positions (0.7,0), (0.8,0) and (0.9,0), two destinations locate at (1,0.1) and (1,0.2), and the positions of the eavesdropper and the primary user are (1,-0.5) and (0.5,2), respectively. It is observed from Fig. 2 that the SOP of the RF protocol is lowest and that of the DF-SC is between that of the RF and DF-MRC protocol. In addition, the SOP of all the protocols decreases with increasing value of Q and converges to the asymptotic results at high Q region.

Fig. 2.Secrecy outage probability (SOP) as a function of Q in dB when 0.1, Rth = 0.1, M=3, N=2, {xR1,xR2,xR3}={0.7,0.8,0.9}, {yD1,yD2}={0.1,0.2}, {xE,yE}={1,-0.5} and {xP,yP}={0.5,2}.

Fig. 3 focuses on impact of the number of destinations on the SOP in i.i.d. networks, i.e., xRm = xR = 0.75 and yDn = yD = 0. The remaining parameters of this simulations are respectively fixed by Rth = 0.1, M=5, Q=2.5 dB, {xE, yE} = {1,-0.5} and {xP, yP} = {0.5,1.5}. It is seen that the SOP increases with increasing the number of destinations. Again, we can observe that the RF protocol provides significant performance gains as compared with the DF protocols.

Fig. 3.Secrecy outage probability (SOP) as a function of N when Rth = 0.1, M=5, Q=2.5 dB, xR = 0.75, yD = 0, {xE, yE} = {1,-0.5} and {xP, yP} = {0.5,1.5}.

In Fig. 4, we illustrate the probability of non-zero secrecy capacity (NzSCP) as a function of the number of relays in the i.i.d. networks when N=2, Q=5 dB, xR = 0.8, yD = 0, {xE, yE} = {1,-0.5} and {xP, yP} = {0.5,1}. As we can see, when the number of relays increases, the NzSCP significantly increases. It is due to the fact that the achievable rate of the data links is enhanced with higher number of relays. In Fig. 5, the impact of the eavesdropper’s positions on the NzSCP performance in i.n.i.d. network is investigated. In particular, we change the value xE from 0 to 1, while fixing the remaining parameters as follows: M=3, N=3, Q=0 dB, {xR1,xR2,xR3}={0.5,0.6,0.7}, {yD1,yD2,yD3}={0.1,0.15,0.2}, yE = -0.5 and {xP, yP}={0.5,1}. Similar to Fig. 4, the RF scheme obtains the best performance, while that of the DF-MRC is worst. In addition, we can observe that the performance of the considered schemes varies with different eavesdropper’s positions, and it becomes better when the eavesdropper is far from the source and the relays

Fig. 4.Non-zero secrecy capacity probability (NzSCP) as a function of M when N=2, Q=0 dB, xR = 0.8, yD = 0, {xE, yE} = {1,-0.5} and {xP, yP} = {0.5,1.5}.

Fig. 5.Non-zero secrecy capacity probability (NzSCP) as a function of xE when M=3, N=3, Q=0 dB, {xR1,xR2,xR3}={0.5,0.6,0.7}, {yD1,yD2,yD3}={0.1,0.15,0.2}, yE = -0.5 and {xP, yP}={0.5,1.5}.

Fig. 6 investigates the impact of the relays’ positions on the average secrecy capacity (ASC) in the i.i.d. networks with M=2, N=1, Q=5 dB, xR = 0.8, yD = 0, {xE, yE} = {1,-0.5} and {xP, yP} = {0.5,1}. We can observe that the ASC depends on the position of the relays. In addition, there exists an optimul relay position at which the ASC is highest.

Fig. 6.Average secrecy capacity (ASC) as a function of xR when M=2, N=1, Q=5 dB, xR = 0.8, yD = 0, {xE, yE} = {1,-0.5} and {xP, yP} = {0.5,1}.

From Fig. 2-6, it is worth noting that the simulation results (Sim) match very well with the theoretical results (Theory (Exact)), which validates our derivations.

 

5. Conclusions

This paper proposed three partial relay selection schemes to enhance secrecy performances of underlay multi-cast cognitive radio networks, in terms of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) and average secrecy capacity (ASC). The performances of the proposed protocols were evaluated by both simulation and analytical results. Results presented that the RF protocol always outperforms the DF ones. Moreover, it was also shown that the secrecy performances can be improved by increasing the number of relays, reducing the number of destinations and selecting the cooperative relays placed at the optimal positions.

References

  1. J.N. Laneman, D. N. C. Tse and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062 – 3080, December 2004. Article (CrossRef Link) https://doi.org/10.1109/TIT.2004.838089
  2. I.-H. Lee, H. Lee and H.-H. Choi, “Exact Outage Probability of Relay Selection in Decode-and-Forward Based Cooperative Multicast Systems,” IEEE Communications Letters, vol. 17, no. 3, pp. 483 – 486, March 2013. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2013.020413.122335
  3. P. Yang, Q. Zhang and J. Qin, “Exact Outage Probability of Nth-Best Multicast Relay Networks with Co-Channel Interference,” IEEE Wireless Communications Letters, vol. 2, no. 6, pp. 595 - 598, August 2013. Article (CrossRef Link) https://doi.org/10.1109/WCL.2013.081413.130438
  4. J. Ji, R. Ge and W. Chen, "Capacity Analysis of Cognitive MISO Multicast Network" in Proc. of International Conference on Wireless Communications & Signal Processing (WCSP'2012), pp. 1-5, Oct. 2012. Article (CrossRef Link)
  5. D. Xu and Q. Li, “On the Outage Capacity of Fading Cognitive Multicast Channel,” IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences, vol.E97-A, no. 11, pp. 2272-2275, Nov. 2014. Article (CrossRef Link) https://doi.org/10.1587/transfun.E97.A.2272
  6. S. Li, W. Xu, K. Yang, K. Niu and J. Lin, “Distributed Cooperative Multicast in Cognitive Multi-Relay Multi-Antenna Systems,” IEEE Signal Processing Letters, vol. 22, no. 3, pp. 288-292, March 2015. Article (CrossRef Link) https://doi.org/10.1109/LSP.2014.2357843
  7. A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, October 1975. Article (CrossRef Link) https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  8. I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5003–5011, October 2009. Article (CrossRef Link) https://doi.org/10.1109/TWC.2009.090323
  9. I. Krikidis, “Opportunistic relay selection for cooperative networks with secrecy constraints,” IET Communications, vol. 4, no. 15, pp. 1787–1791, October 2010. Article (CrossRef Link) https://doi.org/10.1049/iet-com.2009.0634
  10. J. Mo, M. Tao and Y. Liu, “Relay placement for physical layer security: A secure connection perspective,” IEEE Communications Letters, vol. 16, no. 6, pp. 878–881, June 2012. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2012.042312.120582
  11. T. T. Duy, V. N. Q. Bao and T. Q. Duong, "Secured Communication in Cognitive MIMO Schemes under Hardware Impairments," in Proc. of the International Conference on Advanced Technologies for Communications (ATC2014), pp. 109-112, October 2014. Article (CrossRef Link)
  12. F. S. Al-Qahtani, C. Zhong and H. M. Alnuweiri, “Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks,” IEEE Transactions on Communications, vol. 63, no. 5, pp. 1756 – 1770, May 2015. Article (CrossRef Link) https://doi.org/10.1109/TCOMM.2015.2412939
  13. X. Wang, M. Tao and Y. Xu, “Outage Analysis of Cooperative Secrecy Multicast Transmission,” IEEE Wireless Communications Letters, vol. 3, no. 2, pp. 161-164, April 2014. Article (CrossRef Link) https://doi.org/10.1109/WCL.2013.122113.130849
  14. J. Zhu, Y. Chen, Y. Nakamura, X. Jiang, O. Takahashi and N. Shiratori, "Outage Performance of Secure Multicasting in the Presence of Multiple Eavesdroppers," in Proc. of Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU2015), pp. 138 - 142, January 2015. Article (CrossRef Link)
  15. S. Wang, X. Xu and W. Yang, “Physical Layer Security in Underlay CCRNs with Fixed Transmit Power,” KSII Transactions on Internet and Information Systems, vol. 9, no. 1, pp. 260-279, January 2015. Article (CrossRef Link) https://doi.org/10.3837/tiis.2015.01.015
  16. Y. Liu, L. Wang, T. T. Duy, M. Elkashlan and Trung Q. Duong, “Relay Selection for Security Enhancement in Cognitive Relay Networks,” IEEE Wireless Communications Letters, vol. 4, no. 1, pp. 46-49, February 2015. Article (CrossRef Link) https://doi.org/10.1109/LWC.2014.2365808
  17. M. Elkashlan, L. Wang, T. Q. Duong, G. K. Karagiannidis and A. Nallanathan, “On the Security of Cognitive Radio Networks,” IEEE Transactions on Vehicular Technology, vol. 64, no. 8, pp. 3790 - 3795, August 2015. Article (CrossRef Link) https://doi.org/10.1109/TVT.2014.2358624
  18. T. Q. Duong, T. T. Duy, M. Elkashlan, N. H. Tran and O. A. Dobre, "Secured Cooperative Cognitive Radio Networks with Relay Selection," in Proc. of IEEE Global Communications Conference (Globecom2014), pp. 3074 - 3079, December 2014. Article (CrossRef Link)
  19. T. T. Duy and V. N. Q. Bao, "Secrecy Outage Performance of Relay Networks under Interference Constraint," in Proc. of the International Conference on Advanced Technologies for Communications (ATC2014), pp. 125-130, October 2014. Article (CrossRef Link)
  20. P.N. Son and H.Y. Kong, "The underlay cooperative cognitive network with secure transmission," in Proc. of 27th Biennial Symposium on Communications (QBSC2014), pp. 164 - 167, June 2014. Article (CrossRef Link)
  21. I. Krikidis, J. Thompson, S. McLaughlin and N. Goertz, “Amplify-and-forward with partial relay selection,” IEEE Communications Letters, vol. 12, no. 4, pp. 235–237, April 2008. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2008.071987
  22. T. T. Duy and H.Y. Kong, “Performance Analysis of Incremental Amplify-and-Forward Relaying Protocols with Nth Best Partial Relay Selection under Interference Constraint,” Wireless Personal Communications, vol. 71, no. 4, pp. 2741-2757, August 2013. Article (CrossRef Link) https://doi.org/10.1007/s11277-012-0968-9
  23. I. Gradshteyn and I. Ryzhik, Table of integrals, series, and products, 7th Edition, Academic Press, Inc, New York, London, 2007.
  24. T. Q. Duong, V. N. Q. Bao, H. Tran, G. C. Alexandropoulos, and H.–J. Zepernick, “Effect of primary network on the performance of spectrum sharing AF relaying,” Electronics Letters, vol. 48, no. 1, pp. 25–27, January 2012. Article (CrossRef Link) https://doi.org/10.1049/el.2011.3151
  25. V. N. Q. Bao, T. Q. Duong, D. B. Da Costa, G. C. Alexandropoulos and A. Nallanathan, “Cognitive amplify-and-forward relaying with best relay selection in non-identical Rayleigh fading,” IEEE Communications Letters, vol. 17, no. 3, pp. 475–478, March 2013. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2013.011513.122213
  26. T. T. Duy, T. Q. Duong, T. L. Thanh and V. N. Q. Bao, “Secrecy Performance Analysis with Relay Selection Methods under Impact of Co-channel Interference,” IET Communications, vol. 9, no. 11, pp. 1427-1435, July 2015. Article (CrossRef Link) https://doi.org/10.1049/iet-com.2014.1128
  27. http://www.wolfram.com/mathematica/

Cited by

  1. Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections vol.6, pp.3, 2015, https://doi.org/10.5573/ieiespc.2017.6.3.200
  2. On the secrecy outage probability and performance trade-off of the multi-hop cognitive relay networks vol.73, pp.3, 2015, https://doi.org/10.1007/s11235-019-00608-1