On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection

In this paper, we consider an underlay multiple-input-multiple-output (MIMO) cognitive radio network (CRN) including a pair of primary nodes, a couple of secondary nodes, and an eavesdropper, where the secondary transmitter is powered by the renewable energy harvested from the primary transmitter in order to improve both energy efficiency and spectral efficiency. Based on whether the channel state information of wiretap links are available or not, the secrecy outage performance of the optimal antenna selection (OAS) scheme and suboptimal antenna selection (SAS) scheme for underlay MIMO CRN with energy harvesting are investigated and compared with traditional space-time transmission scheme. The closed-form expressions for exact and asymptotic secrecy outage probability are derived. Monte-Carlo simulations are conducted to testify the accuracy of the analytical results. The analysis illustrates that the OAS scheme outperforms SAS scheme. Furthermore, the asymptotic result shows that no matter which scheme is considered, the OAS and SAS schemes can achieve the same secrecy diversity order.

[1]  Yiyuan Xie,et al.  Secrecy outage performance for wireless-powered relaying systems with nonlinear energy harvesters , 2017, Frontiers of Information Technology & Electronic Engineering.

[2]  Jia Zhu,et al.  Secrecy outage analysis of multi-user multi-eavesdropper cellular networks in the face of cochannel interference , 2015 .

[3]  Rajeevan Amirtharajah,et al.  Self-powered signal processing using vibration-based power generation , 1998, IEEE J. Solid State Circuits.

[4]  Imran Shafique Ansari,et al.  Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels , 2017, IEEE Transactions on Vehicular Technology.

[5]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[6]  Derrick Wing Kwan Ng,et al.  Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems , 2015, IEEE Communications Letters.

[7]  Gaofeng Pan,et al.  Outage Analysis of Wireless-Powered Relaying MIMO Systems with Non-Linear Energy Harvesters and Imperfect CSI , 2016, IEEE Access.

[8]  Mohamed-Slim Alouini,et al.  An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty , 2016, IEEE Access.

[9]  Yunfei Chen,et al.  Secrecy Performance Analysis for SIMO Simultaneous Wireless Information and Power Transfer Systems , 2015, IEEE Transactions on Communications.

[10]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .

[11]  Huan Zhang,et al.  Secrecy Outage Analysis for SIMO Underlay Cognitive Radio Networks over Generalized- $K$ Fading Channels , 2016, IEEE Signal Processing Letters.

[12]  Jiaru Lin,et al.  Simultaneous wireless information and power transfer for cognitive two-way relaying networks , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[13]  Huan Zhang,et al.  Performance Analysis of Physical Layer Security Over Generalized-$K$ Fading Channels Using a Mixture Gamma Distribution , 2016, IEEE Communications Letters.

[14]  Hui Tian,et al.  Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks , 2016, IEEE Communications Letters.

[15]  Yunfei Chen,et al.  On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI , 2016, IEEE Transactions on Communications.

[16]  Huan Zhang,et al.  Secrecy Outage Performance for SIMO Underlay Cognitive Radio Systems With Generalized Selection Combining Over Nakagami-$m$ Channels , 2016, IEEE Transactions on Vehicular Technology.

[17]  Hui-Ming Wang,et al.  On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system , 2016, IEEE Access.

[18]  Tolga Soyata,et al.  RF Energy Harvesting for Embedded Systems: A Survey of Tradeoffs and Methodology , 2016, IEEE Circuits and Systems Magazine.

[19]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[20]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[21]  Honggang Wang,et al.  A hierarchical packet forwarding mechanism for energy harvesting wireless sensor networks , 2015, IEEE Communications Magazine.

[22]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[23]  Kaibin Huang,et al.  Opportunistic Wireless Energy Harvesting in Cognitive Radio Networks , 2013, IEEE Transactions on Wireless Communications.

[24]  Trung Quang Duong,et al.  Secure Transmission in Spectrum Sharing MIMO Channels With Generalized Antenna Selection Over Nakagami- $m$ Channels , 2016, IEEE Access.

[25]  Tao Zhang,et al.  Secure Full-Duplex Spectrum-Sharing Wiretap Networks With Different Antenna Reception Schemes , 2017, IEEE Transactions on Communications.

[26]  Sungsoo Park,et al.  Cognitive Radio Networks with Energy Harvesting , 2013, IEEE Transactions on Wireless Communications.

[27]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[28]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[29]  Aria Nosratinia,et al.  Antenna selection in MIMO systems , 2004, IEEE Communications Magazine.

[30]  Trung Q. Duong,et al.  Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model , 2016, IEEE Transactions on Communications.

[31]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[32]  Hongbo Zhu,et al.  Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels , 2016, IEEE Transactions on Information Forensics and Security.

[33]  Ranjan K. Mallik,et al.  Secrecy Outage of a Simultaneous Wireless Information and Power Transfer Cognitive Radio System , 2016, IEEE Wireless Communications Letters.

[34]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[35]  H. Vincent Poor,et al.  Cooperative Energy Harvesting Networks With Spatially Random Users , 2013, IEEE Signal Processing Letters.

[36]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[37]  I. S. Ansari,et al.  Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.

[38]  Matti Latva-aho,et al.  Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter , 2015, IEEE Access.

[39]  George K. Karagiannidis,et al.  Wireless Networks with Energy Harvesting and Power Transfer: Joint Power and Time Allocation , 2016, IEEE Signal Processing Letters.

[40]  Qi Zhang,et al.  Robust Transceiver Design for Wireless Information and Power Transmission in Underlay MIMO Cognitive Radio Networks , 2014, IEEE Communications Letters.

[41]  Shi Jin,et al.  Large System Analysis of Cognitive Radio Network via Partially-Projected Regularized Zero-Forcing Precoding , 2015, IEEE Transactions on Wireless Communications.

[42]  Hui Tian,et al.  Energy-Efficient Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks , 2015 .

[43]  Zhiguo Ding,et al.  Performance Analysis and Optimization for SWIPT Wireless Sensor Networks , 2017, IEEE Transactions on Communications.

[44]  Hai Jiang,et al.  Secure Communications in Underlay Cognitive Radio Networks: User Scheduling and Performance Analysis , 2016, IEEE Communications Letters.

[45]  Yunfei Chen,et al.  Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[46]  George K. Karagiannidis,et al.  On Secrecy Performance of Antenna-Selection-Aided MIMO Systems Against Eavesdropping , 2015, IEEE Transactions on Vehicular Technology.

[47]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.

[48]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[49]  Simon L. Cotton,et al.  Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..

[50]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[51]  Shiva Prakash,et al.  Effects of Channel Prediction for Transmit Antenna Selection With Maximal-Ratio Combining in Rayleigh Fading , 2011, IEEE Transactions on Vehicular Technology.