Impact of secondary user communication on security communication of primary user

نویسندگان

  • Louis Sibomana
  • Hung Tran
  • Quang Anh Tran
چکیده

Recently, spectrum sharing has been considered as a promising solution to improve the spectrum utilization. It however may be vulnerable to security problems as the primary and secondary network access the same resource. Therefore, in this paper, we focus on the performance analysis of a cognitive radio network in the presence of an eavesdropper (EAV) who illegally listens to the primary user (PU) communication in which the transmit power of the secondary transmitter (SU-Tx) is subject to the joint constraint of peak transmit power of the SU-Tx and outage probability of the PU. Accordingly, an adaptive transmit power policy and an analytical expression of symbol error probability are derived for the SU. Most importantly, security evaluations of primary network in terms of the probability of existence of non-zero secrecy capacity and outage probability of secrecy capacity are obtained. Numerical results reveal a fact that the security of the primary network does not only depends on the channel mean powers between primary and secondary networks, but also strongly depends on the channel condition of the SU-Tx→EAV link and transmit power policy of the SU-Tx.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Telepathic Communication Generation using Nano Fiber Ring

The communication security is set up by registration during the first beliefand get in touch between two human beings. The safety codes among them aregenerated and the records are blocked by these protection codes if the end user is not therequired one. On the other hand, the unlocked records are transmitted if the required enduser is confirmed by the feedback brain signals via the comments min...

متن کامل

A Novel Multi-user Detection Approach on Fluctuations of Autocorrelation Estimators in Non-Cooperative Communication

Recently, blind multi-user detection has become an important topic in code division multiple access (CDMA) systems. Direct-Sequence Spread Spectrum (DSSS) signals are well-known due to their low probability of detection, and secure communication. In this article, the problem of blind multi-user detection is studied in variable processing gain direct-sequence code division multiple access (VPG D...

متن کامل

Allocation Strategy for Wireless Communication Channel of Coal Mine Underground

This paper proposes an improved wireless communication channel reservation policy to address the impact on network performance cannot be analyzed under the original model with the primary and secondary users communication channel occupancy rates, and the problem that the secondary user blocking state is significantly higher than the primary user blocking probability under the original model. Si...

متن کامل

Optimal Power Allocation for Secrecy Fading Channels Under Spectrum-Sharing Constraints

In the spectrum-sharing technology, a secondary user may utilize the primary user’s licensed band as long as its interference to the primary user is below a tolerable value. In this paper, we consider a scenario in which a secondary user is operating in the presence of both a primary user and an eavesdropper. Hence, the secondary user has both interference limitations and security consideration...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2015