Advertisement

Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections

  • Jinghua ZhangEmail author
  • Chinmoy Kundu
  • Emi Garcia-Palacios
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 261)

Abstract

In this paper, we investigate the secrecy performance of underlay cognitive small-cell radio network with unreliable backhaul connections. The secondary cognitive small-cell transmitters are connected to macro base station by wireless backhaul links. The small-cell network is sharing the same spectrum with the primary network ensuring that a desired outage probability constraint in the primary network is always satisfied. We propose an optimal transmitter selection (OTS) scheme for small-cell network to transfer information to the destination. The closed-form expression of secrecy outage probability are derived. Our result shows that increasing the primary transmitter’s transmit power and the number of small-cell transmitter can improve the system performance. The backhaul reliability of secondary and the desired outage probability of the primary also have significant impact on the system.

Keywords

Unreliable backhaul Cognitive radio network Small-cell network Physical layer security Secrecy outage probability 

Notes

Acknowledgment

This work was supported in part by the Royal Society-SERB Newton International Fellowship under Grant NF151345.

References

  1. 1.
    Andrews, J.G., Buzzi, S., Choi, W., et al.: What will 5G be? IEEE Trans. Signal Process. 32(6), 1065–1082 (2014)Google Scholar
  2. 2.
    Tipmongkolsilp, O., Zaghloul, S., Jukan, A.: The evolution of cellular backhaul technologies: current issues and future trends. IEEE Commun. Surv. Tutor. 13(1), 97–113 (2011)CrossRefGoogle Scholar
  3. 3.
    Ge, X.H., Cheng, H., Guizani, M., et al.: 5G wireless backhaul networks: challenges and research advances. IEEE Netw. 28(6), 6–11 (2014)CrossRefGoogle Scholar
  4. 4.
    Kim, K.J., Yeoh, P.L., Orlik, P.V., et al.: Secrecy performance of finite-sized cooperative single carrier systems with unreliable backhaul connections. IEEE Trans. Signal Process. 64(17), 4403–4416 (2016)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Kolodzy, P.: Avoidance, interference: spectrum policy task force. Federal Communications Commission, Washington, DC, Report ET Docket, vol. 40, no. 4, pp. 147–158 (2002)Google Scholar
  6. 6.
    Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)CrossRefGoogle Scholar
  7. 7.
    Zhang, J.H., Nguyen, N.P., Zhang, J.Q., et al.: Impact of primary networks on the performance of energy harvesting cognitive radio networks. IET Commun. 10(18), 2559–2566 (2016)CrossRefGoogle Scholar
  8. 8.
    Lee, S., Zhang, R.: Cognitive wireless powered network: spectrum sharing models and throughput maximization. IEEE Trans. Cogn. Commun. Netw. 1(3), 335–346 (2015)CrossRefGoogle Scholar
  9. 9.
    Nguyen, N.P., Duong, T.Q., Ngo, H.Q., et al.: Secure 5G wireless communications: a joint relay selection and wireless power transfer approach. IEEE Access 4, 3349–3359 (2016)CrossRefGoogle Scholar
  10. 10.
    Bao, V.N.Q., Duong, T.Q., Da Costa, D.B., et al.: Cognitive amplify-and-forward relaying with best relay selection in non-identical Rayleigh fading. IEEE Commun. Lett. 17(3), 475–478 (2013)CrossRefGoogle Scholar
  11. 11.
    Kundu, C., Ngatched, T.M.N., Dobre, O.A.: Relay selection to improve secrecy in cooperative threshold decode-and-forward relaying. In: Proceedings of IEEE GLOBECOM 2016, Washington, DC, USA, 4–8 (2016)Google Scholar
  12. 12.
    Zhang, J., Kundu, C., Nguyen, N.P., et al.: Cognitive wireless powered communication networks with secondary user selection and primary QoS constraint. IET Commun. 12, 1873–1879 (2018)CrossRefGoogle Scholar
  13. 13.
    Huang, Y.Z., Wang, J.L., Zhong, C.J., et al.: Secure transmission in cooperative relaying networks with multiple antennas. IEEE Trans. Wirel. Commun. 15(10), 6843–6856 (2016)CrossRefGoogle Scholar
  14. 14.
    Yin, C., Nguyen, H.T., Kundu, C., et al.: Secure energy harvesting relay networks with unreliable backhaul connections. IEEE Access 6, 12074–12084 (2018)CrossRefGoogle Scholar
  15. 15.
    Vu, T., Nguyen, M.N., Kundu, C., et al.: Secure cognitive radio networks with source selection and unreliable backhaul connections. IET Commun. 12, 1771–1777 (2017)Google Scholar
  16. 16.
    Kundu, C., Jindal, A., Bose, R.: Secrecy outage of dual-hop amplify-and-forward relay system with diversity combining at the eavesdropper. Wireless Pers. Commun. 97, 539–563 (2017)CrossRefGoogle Scholar
  17. 17.
    Khan, T.A., Orlik, P., Kim, K.J., et al.: Performance analysis of cooperative wireless networks with unreliable backhaul links. IEEE Commun. Lett. 19(8), 1386–1389 (2015)CrossRefGoogle Scholar
  18. 18.
    Nguyen, H.T., Duong, T.Q., Hwang, W.J.: Multiuser relay networks over unreliable backhaul links under spectrum sharing environment. IEEE Commun. Lett. 21(10), 2314–2317 (2017)CrossRefGoogle Scholar
  19. 19.
    Nguyen, H.T., Zhang, J.Q., Yang, N., et al.: Secure cooperative single carrier systems under unreliable backhaul and dense networks impact. IEEE Access 5, 18310–18324 (2017)CrossRefGoogle Scholar
  20. 20.
    Wang, L.F., Elkashlan, M., Huang, J., et al.: Secure transmission with antenna selection in MIMO Nakagami-\( m \) fading channels. IEEE Trans. Wireless Commun. 13(11), 6054–6067 (2014)CrossRefGoogle Scholar
  21. 21.
    Wang, L.F., Kim, K.J., Duong, T.Q., et al.: Security enhancement of cooperative single carrier systems. IEEE Trans. Inf. Forensics Secur. 10(1), 90–103 (2015)CrossRefGoogle Scholar
  22. 22.
    Yang, N., Yeoh, P.L., Elkashlan, M., et al.: Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Commun. 61(1), 144–154 (2013)CrossRefGoogle Scholar
  23. 23.
    Jeffrey, A., Zwillinger, D.: Table of Integrals, Series and Products, 7th edn. Academic Press, Cambridge (2007)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Jinghua Zhang
    • 1
    Email author
  • Chinmoy Kundu
    • 1
  • Emi Garcia-Palacios
    • 1
  1. 1.Queen’s University BelfastBelfastUK

Personalised recommendations