TY - JOUR
T1 - Secrecy outage analysis on underlay cognitive radio system with full-duplex secondary user
AU - Zhang, Chao
AU - Wang, Danyang
AU - Ye, Jia
AU - Lei, Hongjiang
AU - Zhang, Jiliang
AU - Pan, Gaofeng
AU - Feng, Quanyuan
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/11/1
Y1 - 2017/11/1
N2 - In this paper, an underlay cognitive radio system, which consists of a primary-user (PU) transmitter (TX), a PU receiver (RX), a secondary-user (SU) TX, and a SU_RX, is considered. Benefitting from the underlay mode, SU_TX can deliver its information to SU_RX by sharing the spectrum resource authorized to PU. It is assumed that SUs are equipped with a single transmitting antenna and a single receiving antenna, which are isolated, and work in full-duplex (FD) mode. By considering that the information signal transmitted from PU_TX to PU_RX may be eavesdropped by SU_TX if SU_TX is malicious, we investigate the secrecy outage performance of the PU system. The approximated closed-form expression for secrecy outage probability (SOP) and the lower boundary of the asymptotic SOP have been derived and verified by simulation results. Our results reveal the impact of the eavesdropping of the SU and the FD mode adopted at the SU transmitter on the secrecy performance of the PU system in underlay spectrum sharing mode.
AB - In this paper, an underlay cognitive radio system, which consists of a primary-user (PU) transmitter (TX), a PU receiver (RX), a secondary-user (SU) TX, and a SU_RX, is considered. Benefitting from the underlay mode, SU_TX can deliver its information to SU_RX by sharing the spectrum resource authorized to PU. It is assumed that SUs are equipped with a single transmitting antenna and a single receiving antenna, which are isolated, and work in full-duplex (FD) mode. By considering that the information signal transmitted from PU_TX to PU_RX may be eavesdropped by SU_TX if SU_TX is malicious, we investigate the secrecy outage performance of the PU system. The approximated closed-form expression for secrecy outage probability (SOP) and the lower boundary of the asymptotic SOP have been derived and verified by simulation results. Our results reveal the impact of the eavesdropping of the SU and the FD mode adopted at the SU transmitter on the secrecy performance of the PU system in underlay spectrum sharing mode.
KW - Cognitive radio
KW - Full-duplex
KW - Secrecy outage probability
KW - Underlay spectrum sharing
UR - http://www.scopus.com/inward/record.url?scp=85033404071&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2017.2769131
DO - 10.1109/ACCESS.2017.2769131
M3 - Article
AN - SCOPUS:85033404071
SN - 2169-3536
VL - 5
SP - 25696
EP - 25705
JO - IEEE Access
JF - IEEE Access
M1 - 8094223
ER -