Jamming signal and primary interference in spectrum sharing environment: Performance analysis

Spectrum sharing environment permits secondary users (SUs) to utilize radio spectrum of primary users (PUs) but creates cross-interference between SUs and PUs. Moreover, jamming signal is useful in improving information security by deliberately corrupting received signals at eavesdroppers. The current paper presents an analytical framework on communication reliability and information security, which takes into account jamming signal, primary interference, maximum transmit power constraint, interference power constraint, Rayleigh fading. The analytical framework includes two exact closed-form formulas of detection outage probability and interception outage probability. Its validity is corroborated by computer simulations. Various results illustrate that the primary interference dramatically deteriorates both probabilities while the jamming signal creates their large difference, highlighting its efficacy in enhancing information security.

[1]  Tharmalingam Ratnarajah,et al.  On the security of cognitive radio networks: Cooperative jamming with relay selection , 2014, 2014 European Conference on Networks and Communications (EuCNC).

[2]  Paschalis C. Sofotasios,et al.  Exact bit-error-rate analysis of underlay decode-andforward multi-hop cognitive networks with estimation errors , 2013, IET Commun..

[3]  Shankar Prakriya,et al.  Secrecy Performance of an Idle Receiver Assisted Underlay Secondary Network , 2017, IEEE Transactions on Vehicular Technology.

[4]  Khuong Ho-Van,et al.  On information securing capability of cognitive radio networks under primary interference and artificial noise , 2017, 2017 International Conference on System Science and Engineering (ICSSE).

[5]  Huawei Chen,et al.  QoS-based beamforming with cooperative jamming in Cognitive Radio Networks , 2013, 2013 International Conference on Communications, Circuits and Systems (ICCCAS).

[6]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[7]  Tharmalingam Ratnarajah,et al.  Securing cognitive radio with a combined approach of beamforming and cooperative jamming , 2017, IET Commun..

[8]  Li Guo,et al.  Secure cognitive radio system with cooperative secondary networks , 2015, 2015 22nd International Conference on Telecommunications (ICT).

[9]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[10]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[11]  Xiuzhen Cheng,et al.  Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).