Browse > Article
http://dx.doi.org/10.7236/JIIBC.2014.14.1.179

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security  

Pham, Ngoc Son (School of Electrical Engineering, University of Ulsan)
Kong, Hyung-Yun (School of Electrical Engineering, University of Ulsan)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.14, no.1, 2014 , pp. 179-187 More about this Journal
Abstract
The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.
Keywords
Cognitive radio; Interference constraint; Physical layer security; Underlay protocol; Cooperative communication; Amplify-and-forward; Opportunistic relay selection;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Sang-Young Park; Hyung-Yun Kong, "Multihop Transmission in Cognitive Underlay Network Over Rayleigh Fading Channels", Journal of the Institute of Webcasting, Internet and Telecommunication (IWIT), vol.12, no.6, pp. 291-296, Dec. 2012.   DOI   ScienceOn
2 Hussain, S.I.; Abdallah, M.M.; Alouini, M.-S.; Hasna, M.; Qaraqe, K., "Performance Analysis of Selective Cooperation in Underlay Cognitive Networks over Rayleigh Channels", IEEE 12th International Workshop on Signal Processing Advances in Wireless Communications, p.116-120, 2011.
3 Nam-Soo Kim, "Performance of DOT Relay System with MRC/GSC receiver in Rayleigh Fading Channels", Journal of the Institute of Webcasting, Internet and Telecommunication(IWIT), vol. 12, no. 5, pp. 11-16, Oct. 2012.   DOI
4 Nam-Soo Kim, "Incremental Best Relay Selection System with Outdate CSI in Rayleigh Fading Channels", Journal of the Institute of Webcasting, Internet and Telecommunication(IWIT), vol. 12, no. 5, pp. 17-23, Oct. 2012.
5 Lun Dong; Zhu Han; Petropulu, A.P.; Poor, H.V., "Improving Wireless Physical Layer Security via Cooperating Relays", IEEE Transactions on Signal Processing, vol 58, no. 3, pp.1875-1888, 2010.   DOI   ScienceOn
6 Xiaojun Sun; Wei Xu; Ming Jiang; Chunming Zhao, "Opportunistic Selection for Decode-and-Forward Cooperative Networks with Secure Probabilistic Constraints", Wireless Personal Communications, vol. 70, no. 4, pp. 1633-1652, June 2013.   DOI
7 Minghua Xia; Aissa, S., "Cooperative AF Relaying in Spectrum-Sharing Systems: Outage Probability Analysis under Co-Channel Interferences and Relay Selection", IEEE Transactions on Wireless Communications, vol. 60, no. 11, pp. 3252-3262, 2012.   DOI   ScienceOn