DOI QR코드

DOI QR Code

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran (VSB Technical University of Ostrava) ;
  • Nam, Pham Minh (Faculty of Electronics Technology, Industrial University of Ho Chi Minh City) ;
  • Duy, Tran Trung (Department of Telecommunications, Posts and Telecommunications Institute of Technology) ;
  • Voznak, Miroslav (VSB Technical University of Ostrava)
  • Received : 2017.02.04
  • Accepted : 2017.03.20
  • Published : 2017.06.30

Abstract

In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Keywords

References

  1. M.O. Hasna and M.S. Alouini, "Outage probability of multihop transmission over nakagami fading channels," IEEE Communication Letters, vol. 7, no. 5, pp. 216-218, 2003. https://doi.org/10.1109/LCOMM.2003.812178
  2. G. K. Karagiannidis, "Performance bounds of multihop wireless communications with blind relays over generalized fading channels," IEEE Transactions on Wireless Communications, vol. 5, no. 3, pp. 498-503, 2006. https://doi.org/10.1109/TWC.2006.1611077
  3. Z. Yi, M. Ju, H.-K. Song, and I.-M. Kim, "Relay ordering in a multi-hop cooperative diversity network," IEEE Transactions on Communications, vol. 57, pp. 2590-2596, 2009. https://doi.org/10.1109/TCOMM.2009.09.070595
  4. C. Coone and I1-Min Kim, "Outage Probability of Multi-hop Amplify-and-forward Relay Systems", IEEE Transactions on Wireless Communications, vol.9, no.3, pp. 1139-1149, 2010. https://doi.org/10.1109/TWC.2010.03.090609
  5. B. An, T. D. Tran and H.Y. Kong, "A Cooperative Transmission Strategy using Entropy-based Relay Selection in Mobile Ad-hoc Wireless Sensor Networks with Rayleigh Fading Environments", KSII Transactions on Internet and Information Systems (TIIS), vol. 3, no. 2, pp.147-162, 2009. https://doi.org/10.3837/tiis.2009.02.002
  6. J. N. Laneman, D. N. C. Tse, G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transactions on Information Theory, Vol. 50, No. 12, pp. 3062-3080, 2004. https://doi.org/10.1109/TIT.2004.838089
  7. Q. Deng, A. G. Klein, "Diversity of multi-hop cluster-based routing with arbitrary relay selection", IET Communications, vol. 6, no. 9, pp. 1054-1060, 2012. https://doi.org/10.1049/iet-com.2011.0457
  8. P. T. Tin, T. D. Tran, T. T. Phuong and M. Voznak, "Secrecy Performance of Joint Relay and Jammer Selection Methods in Cluster Networks: With and Without Hardware Noises", in Proc. of AETA2016, pp. 769-779, 2016.
  9. J. Lee, H. Wang, J. G. Andrews and D. Hong, "Outage Probability of Cognitive Relay Networks with Interference Constraints," IEEE Transactions on Wireless Communications, vol. 10, no. 2, pp. 390-395, 2011. https://doi.org/10.1109/TWC.2010.120310.090852
  10. H. Kim, H. Wang, D. Hong, "On Power Allocation Schemes for Bi-directional Communication in a Spectrum Sharing-based Cognitive Radio System", IEIE Transactions on Smart Processing and Computing, vol. 3, no. 5, pp. 285-297, 2014. https://doi.org/10.5573/IEIESPC.2014.3.5.285
  11. M. Sundararajan, U. Govindaswamy, "Performance Analysis of Uplink Cognitive Radio Transmission based on Overloaded MC-DS-CDMA", IEIE Transactions on Smart Processing and Computing, vol. 3, no. 4, pp. 181-190, 2014. https://doi.org/10.5573/IEIESPC.2014.3.4.181
  12. Y. Guo, G. Kang, N. Zhang, W. Zhou, P. Zhang, "Outage Performance of Relay assisted Cognitive-radio System under Spectrum-sharing Constraints,'' Electronics Letters, vol. 46, pp. 182-184, 2010. https://doi.org/10.1049/el.2010.2159
  13. K. Tourki, K. A. Qaraqe and M.-S. Alouini, "Outage Analysis for Underlay Cognitive Networks Using Incremental Regenerative Relaying," IEEE Transactions on Vehicular Technology, vol. 62, no. 2, pp. 721-734, 2013. https://doi.org/10.1109/TVT.2012.2222947
  14. Khalife, H., Malouch, N.; Fdida, S., "Multihop cognitive radio networks: to route or not to route", IEEE Network, vol. 23, no. 4, pp. 23-25, 2009.
  15. Y. Shi, Y. T. Hou, S. Kompella, H. D. Sherali, "Maximizing Capacity in Multihop Cognitive Radio Networks under the SINR Model", IEEE Transactions on Mobile Computing, vol. 10, no. 7, pp. 954 - 967, 2011. https://doi.org/10.1109/TMC.2010.204
  16. N. Sang, H.Y. Kong, T. T. Duy, "Cognitive Multihop Cluster-based Transmission under Interference Constraint", in Proc. of ISCE 2014, pp. 1-3, Jun. 2014.
  17. A. D. Wyner, "The wire-tap channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  18. Y. Liu, L. Wang, D. Tran, M. Elkashlan, Trung Q. Duong, "Relay Selection for Security Enhancement in Cognitive Relay Networks", IEEE Wireless Communications Letters, vol. 4, no. 1, pp. 46-49, Feb. 2015. https://doi.org/10.1109/LWC.2014.2365808
  19. T. T. Duy, P. N. Son, "Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information", KSII Transactions on Internet and Information Systems, vol. 9, no. 11, pp. 4623-4643, Nov. 2015. https://doi.org/10.3837/tiis.2015.11.021
  20. Y. Zou, B. Champagne, W. P. Zhu and L. Hanzo, "Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems," IEEE Transactions on Communications, vol. 63, no. 1 pp. 215-228, Nov. 2015. https://doi.org/10.1109/TCOMM.2014.2377239
  21. P. T. D. Ngoc, T. T. Duy, V. N. Q. Bao and N. L. Nhat, "Security-Reliability Analysis for Underlay Cognitive Radio Networks with Relay Selection Methods under Impact of Hardware Noises," in Proc. of ATC 2016, pp. 174-179, 2016.
  22. N. T. T. Nga, N. K. Khanh, S. N. H., "Entropy-based Correlation Clustering for Wireless Sensor Networks in Multi-Correlated Regional Environments", IEIE Transactions on Smart Processing and Computing, vol. 5, no. 2, pp. 85-93, 2016. https://doi.org/10.5573/IEIESPC.2016.5.2.085
  23. E. Bjornson, M. Matthaiou and M. Debbah, "A New Look at Dual-hop Relaying: Performance Limits with Hardware Impairments," IEEE Transactions on Communications, vol. 61, no. 11, pp. 4512-4525, 2013. https://doi.org/10.1109/TCOMM.2013.100913.130282
  24. M. Matthaiou, A. Papadogiannis, "Two-way relaying under the presence of relay transceiver hardware impairments," IEEE Communications Letters, vol. 17, no. 6, pp. 1136-1139, 2013. https://doi.org/10.1109/LCOMM.2013.042313.130191
  25. A. Bletsas, A. Khisti, D. P. Reed, A. Lippman, "A Simple Cooperative Diversity Method based on Network Path Selection," IEEE Journal on Selected Areas in Communications, vol. 24, no. 3, pp. 659-672, 2006. https://doi.org/10.1109/JSAC.2005.862417
  26. J. Mo, M. Tao and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Communications Letters, vol. 16, no. 6, pp. 878-881, 2012. https://doi.org/10.1109/LCOMM.2012.042312.120582
  27. T. T. Duy and H.Y. Kong, "Performance Analysis of Incremental Amplify-and-Forward Relaying Protocols with Nth Best Partial Relay Selection under Interference Constraint," Wireless Personal Communications, vol. 71, no. 4, pp. 2741-2757, 2013. https://doi.org/10.1007/s11277-012-0968-9