Secrecy outage analysis on underlay cognitive radio system with full-duplex secondary user

Chao Zhang, Danyang Wang, Jia Ye, Hongjiang Lei, Jiliang Zhang, Gaofeng Pan*, Quanyuan Feng

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

9 引用 (Scopus)
Plum Print visual indicator of research metrics
  • Citations
    • Citation Indexes: 9
  • Captures
    • Readers: 2
see details

摘要

In this paper, an underlay cognitive radio system, which consists of a primary-user (PU) transmitter (TX), a PU receiver (RX), a secondary-user (SU) TX, and a SU_RX, is considered. Benefitting from the underlay mode, SU_TX can deliver its information to SU_RX by sharing the spectrum resource authorized to PU. It is assumed that SUs are equipped with a single transmitting antenna and a single receiving antenna, which are isolated, and work in full-duplex (FD) mode. By considering that the information signal transmitted from PU_TX to PU_RX may be eavesdropped by SU_TX if SU_TX is malicious, we investigate the secrecy outage performance of the PU system. The approximated closed-form expression for secrecy outage probability (SOP) and the lower boundary of the asymptotic SOP have been derived and verified by simulation results. Our results reveal the impact of the eavesdropping of the SU and the FD mode adopted at the SU transmitter on the secrecy performance of the PU system in underlay spectrum sharing mode.

源语言英语
文章编号8094223
页(从-至)25696-25705
页数10
期刊IEEE Access
5
DOI
出版状态已出版 - 1 11月 2017
已对外发布

指纹

探究 'Secrecy outage analysis on underlay cognitive radio system with full-duplex secondary user' 的科研主题。它们共同构成独一无二的指纹。

引用此

Zhang, C., Wang, D., Ye, J., Lei, H., Zhang, J., Pan, G., & Feng, Q. (2017). Secrecy outage analysis on underlay cognitive radio system with full-duplex secondary user. IEEE Access, 5, 25696-25705. 文章 8094223. https://doi.org/10.1109/ACCESS.2017.2769131