Abstract
In this article, we derive the Secrecy Outage Probability (SOP) and the Probability of Strictly Positive Secrecy Capacity (SPSC) for Cognitive Radio Networks with Adaptive Transmit Power. Our analysis takes into consideration the interference between primary and secondary nodes. The Secondary Source \(S_S\) and relays \(R_k\) adapt their power to generate low interference at Primary Receiver (\(P_R\)). We derive the SOP and SPSC at the secondary destination in the presence of an eavesdropper.
Similar content being viewed by others
Availability of data and materials
Data and material are not available.
References
Fang, D., Qian, Y., & Hu, H. U. (2018). Security for 5G mobile wireless networks. IEEE Access, 6, 4850–4874.
Bloch, M., & Barros, J. (2011). Physical-layer security: From information theory to security engineering. Cambridge University Press.
Zhang, Y., Wang, H.-M., Yang, Q., et al. (2016). Secrecy sum rate maximization in non-orthogonal multiple access. IEEE Communications Letters, 20(5), 930–933.
Zhijin, Q., Yuanwei, L., & Zhiguo, D., et al. (2016). Physical layer security for 5G non-orthogonal multiple access in large-scale networks. In 2016 IEEE international conference on communications (ICC) pp. 1–6. IEEE.
Yuanwei, L., Zhijin, Q., Maged, E., et al. (2017). Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Transactions on Wireless Communications, 16(3), 1656–1672.
He, B., Lv, L., Yang, L., & Chen, J. (2020). Enhancing secrecy for NOMA untrusted relay networks with user scheduling and jamming. IEEE Communications Letters, 24(12), 2682–2686.
Thapar, S., Mishra, D., & Saini, R. (2020). Novel outage-aware NOMA protocol for secrecy fairness maximization among untrusted users. IEEE Transactions on Vehicular Technology, 69(11), 13259–13272.
Webb, H., Yin, C., Nguyen, D. N., Le, T. T. N., Van Do, H., Van Hoang, D., & Van Nguyen, N. (2020). Secrecy outage analysis in energy harvesting relay networks with a friendly jammer. In 2020 4th international conference on recent advances in signal processing, telecommunications and computing (SigTelCom).
Dang-Ngoc, H., Ho-Quoc, B., & Ho-Van, K. (2020) Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise. In 4th International conference on recent advances in signal processing, telecommunications and computing (SigTelCom).
Trinh, P. V., Carrasco-Casado, A., Pham, A. T., & Toyoshima, M. (2020). Secrecy analysis of FSO systems considering misalignments and eavesdropper’s location. IEEE Transactions on Communications, 68(12), 7810–7823.
You, B., Lee, I. H., & Jung, H. (2020). Exact secrecy rate analysis of antenna subset modulation schemes. IEEE Systems Journal, 15(4), 4827–4830.
Kumar, S., Garg, A., & Bhatnagar, M. R. (2020). Physical layer secrecy performance analysis of imperfect feedback based 4 1 MISO system. In International conference on signal processing and communications (SPCOM).
Khojastehnia, M., & Loyka, S. (2020). Comments on Precoding for secrecy rate maximisation in cognitive MIMO wiretap channels. Electronics Letters, 56(17), 902–904.
Li, C., He, J., Liu, S., Guo, D., & Song, L. (2020). On Secrecy key of a class of secure asymmetric multilevel diversity coding system. In 2020 IEEE international symposium on information theory (ISIT).
Shkel, Y. Y., & Poor, H. V. (2020). A compression perspective on secrecy measures. In 2020 IEEE international symposium on information theory (ISIT).
Khodeir, M. A., & Alrayahneh, W. S. (2022). Physical-layer security in underlay cognitive radio system with full-duplex secondary user over Nakagami-m fading channel. In 2022 13th International conference on information and communication systems (ICICS).
Nguyen, P. X., Nguyen, H. V., Nguyen, V. D., & Shin, O. S. (2021) UAV-enabled cooperative jamming for physical layer security in cognitive radio network. In Autonomous airborne wireless networks.
Krayani, A., Alam, A. S., Marcenaro, L., Nallanathan, A., & Regazzoni, C. (2022). An emergent self-awareness module for physical layer security in cognitive uav radios. IEEE Transactions on Cognitive Communications and Networking, 8(2), 888–906.
Son, V. P., Nguyen, T. T., & Hai, N. T. (2021). Physical layer security in cooperative cognitive radio networks with relay selection methods. In 2021 International conference on advanced technologies for communications (ATC).
Soni, B., Patel, D. K., Kavaiya, S., Hasna, M. O., & Lopez-Benitez, M. (2021). On Physical layer security of correlated multiantenna cognitive radio receivers. In 2021 National conference on communications (NCC).
Hasna, M., & Alouini, M. S. (2003). End-to-end performance of transmission systems with relays over Rayleigh fading channels. IEEE Transactions on Wireless Communications, 2, 1126–1131.
Hussain, S.I., Alouini, M.S., Qarage, K., & Hasna, M. (2012). Reactive relay selection in underlay cognitive networks with fixed gain relays. In IEEE international conference on commmunications pp. 1784–1788.
Funding
This publication was supported by the Deanship of Scientific Research at Prince Sattam bin Abdulaziz University, Alkharj, Saudi Arabia.
Author information
Authors and Affiliations
Contributions
This article is the contribution of Prof. Faisal Alanazi.
Corresponding author
Ethics declarations
conflict of interest
There is no conflict of interest for this paper.
code available
Software application and custom code are non available.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A
We can write
Appendix B
If \(\frac{T}{|h_{SP_R}|^2}>E_{max}\), the SINR at E is equal to
The CDF of the SINR is equal to
We deduce
We have
Appendix C
If \(\frac{T}{|h_{SP_R}|^2}<E_{max}\), the SINR at E is equal to
For Rayleigh channels, \(|h_{SE}|^{2}\),\(|h_{SP_{R}}|^{2}\) and \(|h_{P_TE}|^{2}\) have an exponential distribution with mean \(\beta _{i}=E(U_{i})\).
We have
Let \(U=N_0+E_{P_{T}}|h_{P_TE}|^{2}\). The CDF and PDF of U are equal to
Equation 28 can be expressed as
We have
Using (31) and (32), we deduce
Let
We deduce
where
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alanazi, F. Secrecy Outage Probability and Strictly Positive Secrecy Capacity of Cognitive Radio Networks with Adaptive Transmit Power. Wireless Pers Commun 130, 609–624 (2023). https://doi.org/10.1007/s11277-023-10301-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10301-x