Secrecy and throughput performance of an energy harvesting hybrid cognitive radio network with spectrum sensing

In this paper, we evaluate the secrecy outage performance and throughput of a hybrid cognitive radio network, where a secondary user (SU) accesses the primary spectrum either in underlay or overlay mode based on spectrum sensing decision. In underlay, the transmit power of the SU as well as the relay is limited by the maximum acceptable interference at primary user (PU) receiver as required by an PU outage constraint, a quality of service for PU. The secondary network employs a decode and forward relay which harvests energy from the radio frequency signal of SU following a time switching relaying protocol. We develop analytical expressions for secrecy outage considering the impact of sensing decision and sensing time. Impact of sensing time, imperfect channel state information of interfering link, energy harvesting time, acceptable interference threshold and PU outage constraint on the secrecy outage probability, as well as throughput of SU are investigated. Further, an interplay between throughput performance and secrecy outage of the network is highlighted.

[1]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[2]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[3]  Victor C. M. Leung,et al.  Artificial Noise Assisted Secure Interference Networks With Wireless Power Transfer , 2017, IEEE Transactions on Vehicular Technology.

[4]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[5]  Sanjay Dhar Roy,et al.  Secrecy Outage of a Cognitive Radio Network with Selection of Energy Harvesting Relay and Imperfect CSI , 2018, Wirel. Pers. Commun..

[6]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..

[7]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[8]  Victor C. M. Leung,et al.  Wireless energy harvesting in interference alignment networks , 2015, IEEE Communications Magazine.

[9]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[10]  Victor C. M. Leung,et al.  Exploiting Interference for Energy Harvesting: A Survey, Research Issues, and Challenges , 2017, IEEE Access.

[11]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[12]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[13]  Yue Gao,et al.  Outage Performance Study of Cognitive Relay Networks with Imperfect Channel Knowledge , 2013, IEEE Communications Letters.

[14]  Sanjay Dhar Roy,et al.  Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link , 2018, IET Commun..

[15]  Wan Choi,et al.  On the Optimal Switching Probability for a Hybrid Cognitive Radio System , 2013, IEEE Transactions on Wireless Communications.

[16]  A. Anpalagan,et al.  Throughput Analysis of Opportunistic Access Strategies in Hybrid Underlay—Overlay Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.

[17]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[18]  Mansoor Shafi,et al.  Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge , 2010, IEEE Transactions on Vehicular Technology.

[19]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[20]  H. Urkowitz Energy detection of unknown deterministic signals , 1967 .

[21]  Helmut Knebl,et al.  Introduction to Cryptography: Principles and Applications (Information Security and Cryptography) , 2007 .

[22]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[23]  Sanjay Dhar Roy,et al.  Outage performance of cognitive relay network with imperfect channel estimation under proactive DF relaying , 2014, 2014 Twentieth National Conference on Communications (NCC).

[24]  Qian Zhang,et al.  Cooperative relay to improve diversity in cognitive radio networks , 2009, IEEE Commun. Mag..

[25]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.