Secure Transmission in Cognitive Wiretap Networks

In this paper, we analyze the secrecy performance of multi-antenna cognitive wiretap network, where the secondary transmitter (Alice) communicates with the secondary receiver (Bob) in the presence of an eavesdropper (Eve). Specifically, we investigate the cases of maximal-ratio combining (MRC) with half-duplex (HD) and selection combining/Zero forcing beamforming (SC/ZFB) scheme with full-duplex (FD) operation, respectively. Assuming the Rayleigh fading, closed-form expressions for the secrecy outage probability of cognitive wiretap channels with MRC and SC/ZFB are derived. Furthermore, we provide simple asymptotic approximations for the secrecy outage probability and find that both schemes achieve full diversity. In addition, simulation results reveal that MRC outperforms SC/ZBF in the low interference threshold regime, while the opposite holds in the high interference threshold regime.

[1]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[2]  Il-Min Kim,et al.  Secure communications with untrusted secondary users in cognitive radio networks , 2014, 2012 IEEE Global Communications Conference (GLOBECOM).

[3]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[4]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[5]  Miguel R. D. Rodrigues,et al.  On Wireless Channels With ${M}$-Antenna Eavesdroppers: Characterization of the Outage Probability and $\varepsilon $-Outage Secrecy Capacity , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Hong Man,et al.  Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.

[7]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[8]  Miguel R. D. Rodrigues,et al.  On Wireless Channels with M-Antenna Eavesdroppers: Characterization of the Outage Probability and Outage Secrecy Capacity , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[9]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[10]  Hyungsik Ju,et al.  Improving efficiency of resource usage in two-hop full duplex relay systems based on resource sharing and interference cancellation , 2009, IEEE Transactions on Wireless Communications.

[11]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).