Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information
نویسندگان
چکیده
This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source’s signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.
منابع مشابه
Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network
This paper evaluates the intercept and outage probability of a decode-and-forward (DF) underlay cognitive radio network. The secondary users are subject to interference limitations from the primary network, with an eavesdropper tapping the second hop of cognitive network, when all the links undergo Rayleigh fading. For this threshold-based system, without assuming that the DF relays can always ...
متن کاملSecure Switch-and-Stay Combining with Multiple Antennas in Cognitive Radio Relay Networks
Eavesdropping is a major concern in Cognitive Radio relay systems, due to the broadcast nature of these systems. Physical Layer Security (PLS) has been seen as a good alternative to enhance the secrecy performance of these networks. Based on the concept of perfect secrecy, PLS uses an information-theoretic approach to prevent secondary transmissions from malicious attacks. In this paper, the Se...
متن کاملUnderlay Cognitive Networks with Partial Relay Selection and Primary-User Interference
Most related works addressing cognitive relaying networks focus on the impact of the interference constraint imposed by the primary receivers on the performance of the secondary network, while neglecting the interference coming from the primary transmitters. In this paper, we assess the outage performance of a cognitive relaying network composed by a source communicating with a destination unde...
متن کاملSimultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast...
متن کاملPerformance Analysis of Relay Subset Selection for Amplify-and-Forward Cognitive Relay Networks
Cooperative communication is regarded as a key technology in wireless networks, including cognitive radio networks (CRNs), which increases the diversity order of the signal to combat the unfavorable effects of the fading channels, by allowing distributed terminals to collaborate through sophisticated signal processing. Underlay CRNs have strict interference constraints towards the secondary use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- TIIS
دوره 9 شماره
صفحات -
تاریخ انتشار 2015