TY - JOUR
T1 - Secrecy outage analysis on underlay cognitive radio using selection combining
AU - Youyu, Tan
AU - Gaofeng, Pan
AU - Hui, Zhao
N1 - Publisher Copyright:
© 2016 The Journal of China Universities of Posts and Telecommunications
PY - 2016/6/1
Y1 - 2016/6/1
N2 - Secure data transmission in future high-capacity high-coverage multi-tier hierarchical networks, for which cognitive radio (CR) has emerged as an essential recipe, is of utmost importance. This paper investigates the secrecy outage performance of selection combining (SC) in CR networks (CRNs) over Rayleigh fading channels. In a single-input multiple-output (SIMO) wiretap channel, a secondary user transmits confidential messages to another secondary user, which is equipped with antennas. Meanwhile, a passive eavesdropper, which is equipped with antennas, intends to overhear the messages. Both the legal receiver and the eavesdropper adopt SC scheme to process the received multiple signals. The secondary transmitter uses the underlay strategy to guarantee the quality of service of the primary user without spectrum sensing. Compared to the work proposed by Maged Elkashlan et al. in Ref. [1], we present an alternative method to derive the closed-form expression for the secrecy outage probability (SOP) and develop a simplified SOP when the maximal transmit power at the secondary user is sufficiently high. Our results reveal the impact of the primary network on the secondary network with a multi-antenna wiretap channel and simulations are conducted to validate the accuracy of our proposed analytical models.
AB - Secure data transmission in future high-capacity high-coverage multi-tier hierarchical networks, for which cognitive radio (CR) has emerged as an essential recipe, is of utmost importance. This paper investigates the secrecy outage performance of selection combining (SC) in CR networks (CRNs) over Rayleigh fading channels. In a single-input multiple-output (SIMO) wiretap channel, a secondary user transmits confidential messages to another secondary user, which is equipped with antennas. Meanwhile, a passive eavesdropper, which is equipped with antennas, intends to overhear the messages. Both the legal receiver and the eavesdropper adopt SC scheme to process the received multiple signals. The secondary transmitter uses the underlay strategy to guarantee the quality of service of the primary user without spectrum sensing. Compared to the work proposed by Maged Elkashlan et al. in Ref. [1], we present an alternative method to derive the closed-form expression for the secrecy outage probability (SOP) and develop a simplified SOP when the maximal transmit power at the secondary user is sufficiently high. Our results reveal the impact of the primary network on the secondary network with a multi-antenna wiretap channel and simulations are conducted to validate the accuracy of our proposed analytical models.
KW - cognitive radio
KW - secrecy outage probability
KW - selection combining
KW - underlay
UR - http://www.scopus.com/inward/record.url?scp=84994715812&partnerID=8YFLogxK
U2 - 10.1016/S1005-8885(16)60032-8
DO - 10.1016/S1005-8885(16)60032-8
M3 - Article
AN - SCOPUS:84994715812
SN - 1005-8885
VL - 23
SP - 51
EP - 56
JO - Journal of China Universities of Posts and Telecommunications
JF - Journal of China Universities of Posts and Telecommunications
IS - 3
ER -