Secure Transmission via a Wireless-Powered Untrusted Relay in Underlay CRNs

In this paper, we consider a underlay cognitive radio network (CRN), in which a secondary source (S) transmits information to a secondary destination (D) via an energy harvesting (EH) untrusted relay. Being an EH node, the relay harvests energy from the received RF signals based on power-splitting (PS) policy. Using the harvested energy, the relay not only help but also intercept the secondary transmission. To realize the positive secrecy rate, a secure scheme based on destination-aided jamming strategy is proposed. Jointly considering the secure requirement of the secondary network and the interference threshold of the primary network, the performance of the proposed secure scheme is evaluated in terms of probability of successfully secure transmission ($P_{SST}$). The closed-form expression of $P_{SST}$ is derived. Numerical results show that, the closed form expression of $P_{SST}$ coincides with the simulation result perfectly. Moreover, the proposed secure scheme outperforms an intuitive secure scheme under similar power consumption.

[1]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[2]  Hai Jiang,et al.  Secure Communications in Underlay Cognitive Radio Networks: User Scheduling and Performance Analysis , 2016, IEEE Communications Letters.

[3]  Hui-Ming Wang,et al.  On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system , 2016, IEEE Access.

[4]  Dongtang Ma,et al.  Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.

[5]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[6]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[7]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[8]  Yu-Dong Yao,et al.  An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[9]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[10]  Ali A. Nasir,et al.  Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis , 2013, IEEE Transactions on Communications.

[11]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[12]  Gaofeng Pan,et al.  Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.

[13]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[14]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.