Reliability-Intercept Gap Analysis of Underlay Cognitive Networks Under Artificial Noise and Primary Interference

Underlay mode of cognitive radio networks (CRNs) permits secondary users (SUs) to simultaneously operate with primary users (PUs), inducing mutual interference between them. Nevertheless, primary interference (interference from PUs to SUs) is either neglected or treated as Gaussian noise in existing works. Moreover, artificial noise, which is deliberately introduced to harm signal reception of wire-tappers, can enhance information securing capability of CRNs. This paper analyzes a gap between reliability probability (successful decoding probability of legitimate receiver) and intercept probability (successful decoding probability of wire-tappers), which accounts for artificial noise, peak transmit power constraint, interference power constraint, and fading channels, and considers primary interference as non-Gaussian noise. Towards this end, exact closed-form expressions of reliability probability and intercept probability are first derived and then validated by computer simulations. Numerous results illustrate that both probabilities are saturated at either large peak interference power or large peak transmit power, the primary interference dramatically deteriorates them while the artificial noise creates a large gap between them, demonstrating its effectiveness in securing legitimate information.

[1]  Behrouz Maham,et al.  Cooperative Sensing With Joint Energy and Correlation Detection in Cognitive Radio Networks , 2017, IEEE Communications Letters.

[2]  Donatella Darsena,et al.  An Opportunistic Spectrum Access Scheme for Multicarrier Cognitive Sensor Networks , 2017, IEEE Sensors Journal.

[3]  Zhiyong Feng,et al.  A survey of security issues in Cognitive Radio Networks , 2015 .

[4]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead , 2017, IEEE Transactions on Wireless Communications.

[5]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[6]  Chen Gang,et al.  A SDN-based energy saving strategy in wireless access networks , 2015, China Communications.

[7]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[8]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[9]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[10]  Yueming Cai,et al.  Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise , 2016, IET Commun..

[11]  Shantanu Sharma,et al.  A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..

[12]  Tharmalingam Ratnarajah,et al.  On the security of cognitive radio networks: Cooperative jamming with relay selection , 2014, 2014 European Conference on Networks and Communications (EuCNC).

[13]  Wei Zhong,et al.  AN-Aided Secrecy Precoding for SWIPT in Cognitive MIMO Broadcast Channels , 2015, IEEE Communications Letters.

[14]  Shlomo Shamai,et al.  Fading Channels: Information-Theoretic and Communication Aspects , 1998, IEEE Trans. Inf. Theory.

[15]  Li Guo,et al.  Secure cognitive radio system with cooperative secondary networks , 2015, 2015 22nd International Conference on Telecommunications (ICT).

[16]  Xing Zhang,et al.  Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[17]  Xiuzhen Cheng,et al.  Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[18]  Mohammad Ali Khojastepour,et al.  Outage minimization and optimal power control for the fading relay channel , 2004, Information Theory Workshop.

[19]  Khuong Ho-Van Exact outage probability analysis of proactive relay selection in cognitive radio networks with MRC receivers , 2016, Journal of Communications and Networks.

[20]  Huawei Chen,et al.  QoS-based beamforming with cooperative jamming in Cognitive Radio Networks , 2013, 2013 International Conference on Communications, Circuits and Systems (ICCCAS).

[21]  Paschalis C. Sofotasios,et al.  Underlay cooperative cognitive networks with imperfect Nakagami-m fading channel information and strict transmit power constraint: Interference statistics and outage probability analysis , 2014, Journal of Communications and Networks.

[22]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[23]  Wei Zhong,et al.  Precoding and Artificial Noise Design for Cognitive MIMOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[24]  Xianfu Chen,et al.  Secure beamforming for cognitive radio networks with artificial noise , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[25]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[26]  Li Sun,et al.  Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[27]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[28]  Tharmalingam Ratnarajah,et al.  Securing cognitive radio with a combined approach of beamforming and cooperative jamming , 2017, IET Commun..

[29]  Hui-Ming Wang,et al.  Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.

[30]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .