Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network

نویسندگان

  • Khyati Chopra
  • Ranjan Bose
  • Anupam Joshi
چکیده

This paper evaluates the intercept and outage probability of a decode-and-forward (DF) underlay cognitive radio network. The secondary users are subject to interference limitations from the primary network, with an eavesdropper tapping the second hop of cognitive network, when all the links undergo Rayleigh fading. For this threshold-based system, without assuming that the DF relays can always decode the message correctly, here we consider that only a set of relays whose SNR satisfies a predetermined threshold can decode the message successfully. We have obtained asymptotic analysis for both cases, when average SNRs of secondary source-relay and relay-destination links are balanced or unbalanced. We have shown that the desired secrecy rate, predetermined threshold, eavesdropper channel quality and interference power limitations significantly affects the secrecy performance of the cognitive radio system. We have investigated the outage and intercept probability of relay selection scheme, when either full instantaneous channel state information (ICSI) or statistical channel state information (SCSI) of all the links is available. We have shown that the optimal relay selection improves the performance of the multi-relay cognitive system, when the number of relays is increased.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

مدیریت تداخل در شبکه‌های رادیوشناختگر با استفاده از شکل‌دهی پرتو همکارانه تحت اطلاعات غیر دقیق کانال

In this paper, a more realistic cognitive radio network is proposed which considers several secondary links, some secondary relays, and one primary link. In the network, there are two steps of transmission from secondary sources to secondary destinations. At the first step, when primary link is idle, all of the secondary sources simultaneously broadcast their information to the relays. At the s...

متن کامل

Performance Analysis of cooperative SWIPT System: Intelligent Reflecting Surface versus Decode-and-Forward

In this paper, we explore the impacts of utilizing intelligent reflecting surfaces (IRS) in a power-splitting based simultaneous wireless information and power transfer (PS-SWIPT) system and compare its performance with the traditional decode and forward relaying system. To analyze a more practical system, it is also assumed that the receiving nodes are subject to decoding cost, and they are on...

متن کامل

Cooperation Based on Decode-and-Forward Plus Cooperative Jamming for

We employed node cooperation in a cooperative wireless network to achieve physical layerbased security. The case of a source-destination pair that works with the assistance of multiple cooperating nodes in the presence of an eavesdropper was considered in this study to improve the performance of secure wireless communications. A novel cooperative scheme, called the decode-and-forward plus coope...

متن کامل

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IET Communications

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2017