Skip to main content

Advertisement

Log in

Overlay Networks with Jamming and Energy Harvesting: Security Analysis

  • Research Article-Electrical Engineering
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

In cognitive radio networks, direct communications between a primary sender–recipient pair may be blocked due to uncertainties such as deep fading. Therefore, this paper studies overlay networks where the message of the primary sender is relayed by the secondary transmitter who also transmits its privacy message to support this communications. However, messages of the secondary transmitter may also be overheard by eavesdroppers. To secure these messages, jammers are exploited to restrict overhearing. Moreover, in order to improve energy efficiency, the secondary transmitter and all jammers only use energy harvested from primary signals for their transmission. To evaluate the security capability of both primary and secondary networks without exhaustive simulations, exact closed-form expressions of primary/secondary secrecy outage probabilities are first proposed. Then, multiple theoretical/simulated results show the validity of the proposed expressions and security improvement with increasing the number of jammers. Finally, exhaustive search based on the proposed expressions can find optimum design parameters, which perfectly serve as design instructions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. The system model in [18] and [19] was studied in [23]. However, the secondary transmitter was assumed to harvest energy from the ambient rather than RF signals, considerably simplifying the analysis. Furthermore, [23] (similarly, [24]) did not employ the jamming technique. Therefore, references like [23] and [24] are not objectives to be surveyed.

  2. The message decoder assumably consumes negligible power. The negligible power consumption of the message decoder is widely acknowledged in existing publications (e.g., [20, 26,27,28,29,30,31]).

  3. In [20], \(\texttt {S}\) always relays \(\texttt {P}\)’s message in the Stage 2. This can cause error propagation for \(\texttt {P}\)’s message. However, [20] did not analyze the SOP of both primary and secondary networks, and hence, error propagation was not accounted for the SOP analysis.

  4. For example, [18,19,20,21] and [32] proposed a collaborative hand-shaking merely among \(\texttt {J}_j, \texttt {R}\) and \(\texttt {D}\) for \(\texttt {J}_j\) to securely share the seed of its jamming signal generator with \(\texttt {R}\) and \(\texttt {D}\).

  5. In the case that N jammers are not colocated, the pdf of Z is derived by directly applying [33, eq. (5)]. However, the subsequent derivations for this case are the same as those described in this paper. Therefore, the extension of the analysis to this case is straightforward.

References

  1. Wazid, M.; et al.: Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access 9, 4466–4489 (2020)

    Article  Google Scholar 

  2. Gustavsson, U.; et al.: Implementation challenges and opportunities in beyond-5G and 6G communication. IEEE J. Microw. 1(1), 86–100 (2021)

    Article  Google Scholar 

  3. López, O.L.A., et al.: Massive wireless energy transfer: enabling sustainable IoT towards 6G era. IEEE IoT J. (accepted)

  4. Bany Salameh, H.: Quantifying the impact of time-sharing on route capacity in cognitive radio networks with full-duplex capability. IEEE Commun. Lett. 25(1), 94–98 (2021)

    Article  Google Scholar 

  5. Zheng, K., et al.: Throughput maximization of wireless-powered communication networks: an energy threshold approach. IEEE Trans. Veh. Technol. 70(2), 1292–1306 (2021)

  6. Zhang, M., et al.: Exploiting deep learning for secure transmission in an underlay cognitive radio network. IEEE Trans. Veh. Technol. 70(1), 726–741 (2021)

  7. Ho-Van, K.; et al.: Security enhancement for energy harvesting cognitive networks with relay selection. Wire. Commun. Mob. Comput. 2020, 1–13 (2020)

    Article  Google Scholar 

  8. Koca, M.; et al.: Empirical feasibility analysis for energy harvesting intravehicular wireless sensor networks. IEEE IoT J. 8(1), 179–186 (2021)

    Google Scholar 

  9. Schmickl, S.; et al.: An RF-energy harvester and ir-uwb transmitter for ultra-low-power battery-less biosensors. IEEE Trans. Circuits Syst. I Regul. Pap. 67(5), 1459–1468 (2020)

    Article  Google Scholar 

  10. Le Anh, T.; et al.: Secrecy performance of a multi-NOMA–MIMO system in the UEH Relaying Network Using the PSO algorithm. IEEE Access 9, 2317–2331 (2020)

    Article  Google Scholar 

  11. Nie, Y.; et al.: Achievable rate region of energy-harvesting based secure two-way buffer-aided relay networks. IEEE Trans. Inf. Forens. Secur. 16, 1610–1625 (2020)

    Article  Google Scholar 

  12. Stai, E.; et al.: Optimal resource allocation in multihop wireless networks relying on energy harvesting. IEEE Commun. Lett. 25(1), 224–228 (2021)

    Article  MathSciNet  Google Scholar 

  13. Budhiraja, I., et al.: SWIPT-enabled D2D communication underlaying NOMA-based cellular networks in imperfect CSI. IEEE Trans. Veh. Technol. 70(1), 692–699 (2021)

  14. Kim, B., et al.: Joint channel estimation, training design, Tx power allocation, and Rx power splitting for MIMO SWIPT systems. IEEE Commun. Lett. (accepted)

  15. Masotti, D.; et al.: RF systems design for simultaneous wireless information and power transfer (SWIPT) in automation and transportation. IEEE J. Microw. 1(1), 164–175 (2021)

    Article  Google Scholar 

  16. Thapar, S., et al.: Decoding orders for securing untrusted NOMA. IEEE Netw. Lett. 3(1), 27–30 (2021)

  17. Abdullah, Z.; et al.: Enhanced secrecy performance of multihop iot networks with cooperative hybrid-duplex jamming. IEEE Trans. Inf. Forens. Secur. 16, 161–172 (2020)

    Article  Google Scholar 

  18. Su, R., et al.: Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems. In: Proceedings of the IEEE WCNC, Barcelona, Spain, pp. 1–6 (2018)

  19. Su, R., et al.: Secure cooperative transmission in cognitive AF relay systems with destination-aided jamming and energy harvesting. In: Proceedings of the IEEE PIMRC, Istanbul, Turkey, pp. 1–5 (2019)

  20. Wang, D.; et al.: Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks. IEEE Trans. Cogn. Commun. Netw. 6(2), 683–693 (2020)

    Article  Google Scholar 

  21. Xu, M.; et al.: Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks. In: Proceedings of the IEEE WCNC, Barcelona, Spain, pp. 1–6 (2018)

  22. Dang-Ngoc, H., et al.: Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise. In: Proceedings of the IEEE SigTelCom, Hanoi, Vietnam, 28–29, pp. 77–81 (2020)

  23. Chen, L.; et al.: Primary secrecy is achievable: optimal secrecy rate in overlay CRNs with an energy harvesting secondary transmitter. In: Proceedings of the ICCCN, Las Vegas, USA, pp. 1–6 (2015)

  24. Li, M.; et al.: Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Trans. Veh. Technol. 67(11), 11274–11279 (2018)

    Article  Google Scholar 

  25. Gradshteyn, I.S.; Ryzhik, I.M.: Table of Integrals, Series and Products, 6th edn. Academic, San Diego (2000)

    MATH  Google Scholar 

  26. Ho-Van, K.; et al.: Security performance of underlay cognitive relaying networks with energy harvesting. Wirel. Pers. Commun. 110(2), 829–846 (2020)

    Article  Google Scholar 

  27. Ho-Van, K.; et al.: Security analysis for underlay cognitive network with energy scavenging capable relay over Nakagami-m fading channels. Wirel. Commun. Mob. Comput. 2019, 1–16 (2019)

    Google Scholar 

  28. Nguyen-Huu, P.; et al.: Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer. IET Commun. 13(13), 1877–1885 (2019)

    Article  Google Scholar 

  29. Ge, L.; et al.: Performance analysis for multihop cognitive radio networks with energy harvesting by using stochastic geometry. IEEE IoT J. 7(2), 1154–1163 (2020)

    Google Scholar 

  30. Solanki, S.; et al.: Performance analysis of piece-wise linear model of energy harvesting-based multiuser overlay spectrum sharing networks. IEEE OJ-CS 1, 1820–1836 (2020)

    Google Scholar 

  31. Bayat, S.; et al.: Resource allocation for MC MISO-NOMA SWIPT-enabled hetnets with non-linear energy harvesting. IEEE Access 8, 192270–192281 (2020)

    Article  Google Scholar 

  32. Wang, F., et al.: Secure resource allocation for polarization-based non-linear energy harvesting over 5G cooperative CRNs. IEEE Wire. Commun. Lett. (accepted)

  33. Lei, H.; et al.: Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-\(m\) channels. IEEE Trans. Veh. Technol. 65(12), 10126–10132 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2019.318. We would like to thank Ho Chi Minh City University of Technology (HCMUT), VNU-HCM for the support of time and facilities for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thiem Do-Dac.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ho-Van, K., Do-Dac, T. Overlay Networks with Jamming and Energy Harvesting: Security Analysis. Arab J Sci Eng 46, 9713–9724 (2021). https://doi.org/10.1007/s13369-021-05492-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-021-05492-z

Keywords

Navigation