Intercept Probability of Underlay Uplink CRNs with Multi-Eavesdroppers

The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and that a jammer is randomly chosen from the remaining source nodes to send a jamming signal to the eavesdroppers. However, in an uplink underlay CRN, a friendly jammer is not always allowed to use its maximal transmit power as the secondary users are required to continuously adapt their power in order to avoid causing interference to the primary users. As a consequence, enhancing the system security using a jammer with low transmit power in the presence of numerous eavesdroppers turns out to be questionable. In this regard, we derive novel analytic expressions that assist in quantifying the achievable security levels and the corresponding limitations. This leads to the development of useful insights on the impact of network parameters on the performance of the system’s security. The offered analytic results are corroborated through Monte Carlo simulation. It is shown, that for a low transmit power of the friendly jammer, the system’s security can only be enhanced for a small number of eavesdroppers.

[1]  Tao Zhang,et al.  Secure Transmission in Spectrum Sharing Relaying Networks With Multiple Antennas , 2016, IEEE Communications Letters.

[2]  Mohamed-Slim Alouini,et al.  On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks Over Nakagami- $m$ Fading Channels , 2017, IEEE Transactions on Cognitive Communications and Networking.

[3]  A. Nallanthan Secure Communications in Cognitive Underlay Networks over Nakagami- m Channel , 2016 .

[4]  Imran Shafique Ansari,et al.  Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels , 2017, IEEE Transactions on Vehicular Technology.

[5]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[6]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[7]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[8]  Faissal El Bouanani,et al.  Secrecy Outage Performance for Dual-Hop Underlay Cognitive Radio System over Nakagami-m Fading , 2018, ICSDE'18.

[9]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[10]  A. Kilbas H-Transforms: Theory and Applications , 2004 .

[11]  François Gagnon,et al.  Cognitive radio network with secrecy and interference constraints , 2017, Phys. Commun..

[12]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[13]  Ho Van Khuong,et al.  Analysis of security performance of relay selection in underlay cognitive networks , 2018, IET Commun..