Skip to main content

Advertisement

Log in

Relay-and-Jammers Selection for Performance Improvement of Energy Harvesting Underlay Cognitive Networks

  • Research Article-Electrical Engineering
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

This paper adopts a relay among available secondary relays and exploits non-selected relays as jammers to maintain and secure legitimate secondary source-to-destination communications in energy harvesting underlay cognitive networks (EHUCNs) as their direct communications is in outage. All relays harvest radio frequency energy in signals transmitted by primary and secondary transmitters and consume the harvested energy for their jamming-and-relaying operations. Under Rayleigh fading, peak transmission power restriction, interference power restriction, primary interference and power splitting-based energy scavenging method, we propose exact closed-form formulas of outage and intercept probabilities to promptly assess both security and reliability performances of the suggested relay-and-jammers selection in EHUCNs. The suggested expressions are corroborated by computer simulations. Numerous results indicate the efficacy of the relay-and-jammers selection in improving both security and reliability for source–destination communications. Moreover, the security and reliability performances are saturated at large maximum transmit/interference powers and considerably degraded by the primary interference. Furthermore, the reliability performance can be optimized by splitting appropriately the received power for information decoding and energy harvesting at the relays.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. [26] is a short and extended version of [25] by considering source–destination direct communications.

  2. A link is a multi-hop communication link through which the secondary source connects the secondary destination via several secondary relays, each on one hop.

  3. The connection outage probability indicates the probability that the received SNR subceeds a threshold.

  4. The intercept outage probability signifies the probability that the SNR at the eavesdropper subceeds a threshold.

  5. Because the system models in [23, 25] and ours are completely different, it is impossible to compare their security and reliability performances under same specifications.

  6. It is obvious that this paper completely differs [24] because the former proposes the relay selection while the latter proposed the link selection.

  7. It has been popularly acknowledged in the literature (e.g., [8,9,10,11,12,13, 17]) that the power consumption of the information decoder is negligible.

  8. \(h_{\texttt {mn}}\sim {{\mathcal {CN}}}(0,\mu _{\texttt {mn}})\) denotes a zero-mean \(\mu _{\texttt {mn}}\)–variance complex Gaussian random variable.

  9. For example, [29,30,31,32,33,34,35,36,37,38,39] recommended a cooperative handshaking solely among \(\text {R}_j\), \(\text {D}\) and \(\text {PR}\) for \(\text {R}_j\) to share securely the seed of its jamming generator with \(\text {D}\) and \(\text {PR}\).

  10. \(\text {E}\) can apply other signal combining techniques (e.g., equal gain combining and maximum ratio combining) for better performance but with higher complexity [40].

References

  1. Tian, Z.; et.al.: Matching theory based physical layer secure transmission strategy for cognitive radio networks. IEEE Access, accepted.

  2. Ho-Van, K.: Outage analysis in cooperative cognitive networks with opportunistic relay selection under imperfect channel information, AEU - Inter. J. Elec. Commun. 69(11), 1700–1708 (2015)

    Google Scholar 

  3. Ho-Van, K.; et al.: Exact outage analysis of underlay cooperative cognitive networks over Nakagami-m fading channels. IET Commun. 7(12), 1254–1262 (2013)

    Article  Google Scholar 

  4. Alexandropoulos, G.; et al.: Symbol error probability of DF relay selection over arbitrary Nakagami-m fading channels. J. Eng. 325045, 1–6 (2013)

    Google Scholar 

  5. Bai, W.; et al.: Joint optimization of computation offloading, data compression, energy harvesting, and application scenarios in fog computing. IEEE Access, accepted.

  6. Wang, Y.; et al.: Energy efficient data and energy integrated management strategy for IoT devices based on RF energy harvesting. IEEE IoT J., accepted.

  7. Tang, X.; et al.: Self-sustainable long range backscattering communication using RF energy harvesting. IEEE IoT J., accepted.

  8. Nourredine, O.; et al.: A new stochastic petri nets modeling for dual cluster heads configuration in energy-harvesting WSNs. In: Proceedings of IHSH, pp. 142–147. Algeria (2021)

  9. Ni, L.; et al.: Outage-constrained secrecy energy efficiency optimization for CRNs with non-linear energy harvesting. IEEE Access 7, 175213–175221 (2019)

    Article  Google Scholar 

  10. Lei, H.; et al.: On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Trans. Green Commun. Netw. 1(2), 192–203 (2017)

    Article  Google Scholar 

  11. Wang, X.; et al.: Energy efficiency optimization for NOMA-based cognitive radio with energy harvesting. IEEE Access 7, 139172–139180 (2019)

    Article  Google Scholar 

  12. Ghosh, S.; et al.: Secrecy capacity in CRN with malicious energy harvester using game theoretic techniques. IEEE Trans. Cogn. Commun. Netw. 3(3), 343–360 (2017)

    Article  Google Scholar 

  13. Zhou, F.; et al.: Resource allocation for secure MISO-NOMA cognitive radios relying on SWIPT. In: Proceedings of IEEE ICC, pp. 1–6. USA (2018)

  14. Tan, R.; et al.: Secrecy performance of cognitive radio sensor networks with an energy-harvesting based eavesdropper and imperfect CSI. In: Proceedings of AsianHOST, pp. 80–85. Hong-Kong (2018)

  15. Ho-Van, K.; et al.: Security performance of underlay cognitive relaying networks with energy harvesting. Wirel. Per. Commun. 110(2), 829–846 (2020)

    Article  Google Scholar 

  16. Shi, H.; et al.: Physical layer security in an untrusted energy harvesting relay network. IEEE Access 7, 24819–24828 (2019)

    Article  Google Scholar 

  17. Bouabdellah, M.; et al.: Cooperative energy harvesting cognitive radio networks with spectrum sharing and security constraints. IEEE Access 7, 173329–173343 (2019)

    Article  Google Scholar 

  18. Pham-Thi-Dan, N.; et al.: Security analysis for cognitive radio network with energy scavenging capable relay over Nakagami-m fading channels. In: Proceedings of IEEE ISEE, pp. 68–72. Vietnam (2019)

  19. Ji, B.; et al.: Secrecy performance analysis of UAV assisted relay transmission for cognitive network with energy harvesting. IEEE Trans. Veh. Technol. 69(7), 7404–7415 (2020)

    Article  Google Scholar 

  20. Maji, P.; et al.: Physical layer security with non-linear energy harvesting relay. In: Proceedings of IEEE ICCCNT, pp. 1–6. India (2019)

  21. Zhao, W.; et al.: Security energy efficiency maximization for two-way relay assisted cognitive radio NOMA network with self-interference harvesting. IEEE Access 7, 74401–74411 (2019)

    Article  Google Scholar 

  22. Banerjee, A.; et al.: On outage secrecy minimisation in an energy harvesting relay assisted cognitive radio networks. IET Commun. 12(18), 2253–2265 (2018)

    Article  Google Scholar 

  23. Maji, P.; et al.: Secrecy outage of a cognitive radio network with selection of energy harvesting relay and imperfect CSI. Wirel. Per. Commun. 100(2), 571–586 (2018)

    Article  Google Scholar 

  24. Hieu, T.D.; et al.: Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper. In: Proceedings of IEEE ICACT, pp. 323–328. Korea (2018)

  25. Ho-Van, K.; et al.: Security enhancement for energy harvesting cognitive networks with relay selection. Wirel. Commun. Mobile Comput. 2, 1–13 (2020)

  26. Pham-Thi-Dan, N.; et al.: Energy harvesting cooperative cognitive networks: relay selection for information security. In: Proceedings of IEEE ISEE, pp. 93–96. Vietnam (2019)

  27. Gurjar, D.S.; et al.: Performance of wireless powered cognitive radio sensor networks with nonlinear energy harvester. IEEE Sens. Lett. 3(8), 1–4 (2019)

    Article  Google Scholar 

  28. Bletsas, A.; et al.: A simple Cooperative diversity method based on network path selection. IEEE JSAC 24(3), 659–672 (2006)

    MathSciNet  Google Scholar 

  29. Chakraborty, P.; et al.: Secrecy performance of an idle receiver assisted underlay secondary network. IEEE Trans. Veh. Technol. 66(10), 9555–9560 (2017)

    Article  Google Scholar 

  30. Su, R.; et al.: Secure cooperative transmission in cognitive AF relay systems with destination-aided jamming and energy harvesting. In: Proceedings of IEEE PIMRC, pp. 1–5. Turkey (2019)

  31. Wang, D.; et al.: Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks. IEEE Trans. Cog. Commun. Netw. 6(2), 683–693 (2020)

  32. Zou, Y.: Physical-layer security for spectrum sharing systems. IEEE Trans. Wirel. Commun. 16(2), 1319–1329 (2017)

    Article  Google Scholar 

  33. Hu, X.; et al.: Secure transmission via jamming in cognitive radio networks with Possion spatially distributed eavesdroppers. In: Proceedings of IEEE PIMRC, pp. 1–6. Spain (2016)

  34. Li, Z.; et al.: Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks. In: Proceedings of IEEE ICC, pp. 7609–7614. UK (2015)

  35. Shu, Z.; et al.: On Physical layer security for cognitive radio networks. IEEE Netw. 27(3), 28–33 (2013)

    Article  Google Scholar 

  36. Wu, Y.; et al.: Secure beamforming for cognitive radio networks with artificial noise. In: Proceedings of IEEE WCSP, pp. 1–5. China (2015)

  37. Fang, B.; et al.: Precoding and artificial noise design for cognitive MIMOME wiretap channels. IEEE Trans. Veh. Technol. 65(8), 6753–6758 (2016)

    Article  Google Scholar 

  38. Nguyen, V.D.; et al.: Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans. Info. Forensics Secur. 11(11), 2609–2623 (2016)

    Article  Google Scholar 

  39. Wang, F.; Wirel. Commun. Lett., accepted.

  40. Simon, M.K.; et al.: Digital Communication over Fading Channels, 2nd edn. Wiley, Hoboken (2005)

    Google Scholar 

  41. Gradshteyn, I.S.; et al.: Table of Integrals, 6th edn. Series and ProductsAcademic Press, San Diego (2000)

    MATH  Google Scholar 

  42. Ho-Van, K.: Exact outage probability analysis of proactive relay selection in cognitive radio networks with MRC receivers. J. Commun. Netw. 18(3), 288–298 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2019.318. We would like to thank Ho Chi Minh City University of Technology (HCMUT), VNU-HCM for the support of time and facilities for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thiem Do-Dac.

Appendix: Asymptotic Results when \(I_t \rightarrow \infty \)

Appendix: Asymptotic Results when \(I_t \rightarrow \infty \)

When primary receivers tolerate any interference level from secondary transmitters, the case of \(I_t \rightarrow \infty \) holds. For instance, secondary transmitters are distant from primary receivers so that interference caused by secondary transmitters upon primary receivers is negligible, and then, the interference power restriction relating to \(I_t\) is relaxed. Another example is that secondary transmitters operate in the non-cognitive mode, and then, the interference power restriction is ignored.

This appendix shows asymptotic results for IP and OP when \(I_t \rightarrow \infty \). In this asymptotic region, \(P_s\) in (23), \(P_{r_b}\) in (24) and \({\bar{P}}_s\) in (25) become \(P_{sm}\), \(P_{r_bm}\) and \(P_{sm}\), respectively. Therefore, (55) is approximated as

$$\begin{aligned} I{^{\mathrm{asym}}} = 1 - I_1^{\mathrm{asym}}\sum \limits _{b = 1}^K {\left( {1 - I_{2111}^{\mathrm{asym}}} \right) I_{22}}, \end{aligned}$$
(72)

where \(I_{22}\) is given by (49).

\(I_1^{\mathrm{asym}}\) is obtained from \(I_{1t}\) in (29) with the substitution of \(P_s\) with \(P_{sm}\), i.e.,

$$\begin{aligned} I_1^{\mathrm{asym}} = 1 - {e^{ - \frac{{{{{\bar{\gamma }} }_e}\sigma _e^2}}{{{P_{sm}}{\mu _{se}}}}}}{\left( {\frac{{{P_p}{{{\bar{\gamma }} }_e}{\mu _{pe1}}}}{{{P_{sm}}{\mu _{se}}}} + 1} \right) ^{ - 1}}. \end{aligned}$$
(73)

Similarly, \(I_{2111}^{\mathrm{asym}}\) is obtained from (38) with the substitution of \(P_{r_b}\) with \(P_{r_bm}\), i.e.,

$$\begin{aligned} I_{2111}^{\mathrm{asym}} = {e^{ - \frac{{\sigma _e^2{{{\bar{\gamma }} }_e}}}{{{P_{{r_b}m}}{\mu _{{r_b}e}}}}}}\sum \limits _{k = 1}^K {{{\left( {\frac{{{{{\bar{\gamma }} }_e}{M_k}}}{{{P_{{r_b}m}}{\mu _{{r_b}e}}}} + 1} \right) }^{ - 1}}{L_k}}. \end{aligned}$$
(74)

In the asymptotic region, (71) is approximated as

$$\begin{aligned} {O^{\mathrm{asym}}} = 1 - \sum \limits _{b = 1}^K {O_1^{\mathrm{asym}}O_2^{\mathrm{asym}}}, \end{aligned}$$
(75)

where \(O_2^{\mathrm{asym}}\) is computed in the same way as \(I_1^{\mathrm{asym}}\), resulting in

$$\begin{aligned} O_2^{\mathrm{asym}} = {e^{ - \frac{{{{{\bar{\gamma }} }_d}\sigma _d^2}}{{{P_{{r_b}m}}{\mu _{{r_b}d}}}}}}{\left( {1 + \frac{{{P_p}{{{\bar{\gamma }} }_d}{\mu _{pd}}}}{{{P_{{r_b}m}}{\mu _{{r_b}d}}}}} \right) ^{ - 1}}. \end{aligned}$$
(76)

With the substitution of \(P_s\) with \(P_{sm}\), the event \(\left\{ {{P_s} > \frac{{{{{\bar{\gamma }} }_d}}}{{{\phi _{{r_b}}}}}} \right\} \) in (58) is equivalent to \(\left\{ {{\phi _{{r_b}}} > \frac{{{{{\bar{\gamma }} }_d}}}{{{P_{sm}}}}} \right\} \). Therefore, \(O_1\) in (58) is approximated as

$$\begin{aligned} O_1^{\mathrm{asym}} = \int \limits _{\frac{{{{{\bar{\gamma }} }_d}}}{{{P_{sm}}}}}^\infty {\left\{ {\prod \limits _{j \in {{{\mathcal {J}}}}} {\left( {1 - {B_j}\frac{{{e^{ - {A_j}x}}}}{{x + {B_j}}}} \right) } } \right\} {f_{{\phi _{{r_b}}}}}\left( x \right) \mathrm{d}x} = {O_{11}}, \end{aligned}$$
(77)

where \(O_{11}\) is given by (64).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ho-Van, K., Do-Dac, T. Relay-and-Jammers Selection for Performance Improvement of Energy Harvesting Underlay Cognitive Networks. Arab J Sci Eng 47, 2649–2661 (2022). https://doi.org/10.1007/s13369-021-05935-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-021-05935-7

Keywords

Navigation