Secrecy diversity analysis with Multi-user scheduling for overlay cognitive radio systems

In this paper, we consider a cognitive radio (CR) network which is made up of multiple secondary users (SUs), a secondary destination (SD) and an eavesdropper (E) which may overhear the legitimate communication between SUs and SD. In order to ensure the secure communication from SUs to SD, we investigate round-robin scheduling and optimal user scheduling to prohibit eavesdropper attacking. In optimal user scheduling, the channel state information (CSI) of all links including SUs-D, SUs-E, primary user (PU)-D and PU-E are available. Because of intercept probability is an important metric of security for wireless communications, we discuss the intercept probability of both scheduling. To further present the impact of number of users on secrecy performance, we also analyze the secrecy diversity of round robin scheduling and optimal user scheduling. Final results indicate that round robin scheduling obtains only one diversity order, however optimal user scheduling achieves full diversity order. Additionally, optimal user scheduling performs better than round robin scheduling in terms of intercept probability and the secrecy performance will significantly improve as the number of users increases.

[1]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part I: Two User Networks , 2007, IEEE Transactions on Wireless Communications.

[2]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  Do-Hoon Kim,et al.  Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.

[5]  Gongpu Wang,et al.  Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.

[6]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[7]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.