Relay-and-Jammers Selection for Performance Improvement of Energy Harvesting Underlay Cognitive Networks

This paper adopts a relay among available secondary relays and exploits non-selected relays as jammers to maintain and secure legitimate secondary source-to-destination communications in energy harvesting underlay cognitive networks (EHUCNs) as their direct communications is in outage. All relays harvest radio frequency energy in signals transmitted by primary and secondary transmitters and consume the harvested energy for their jamming-and-relaying operations. Under Rayleigh fading, peak transmission power restriction, interference power restriction, primary interference and power splitting-based energy scavenging method, we propose exact closed-form formulas of outage and intercept probabilities to promptly assess both security and reliability performances of the suggested relay-and-jammers selection in EHUCNs. The suggested expressions are corroborated by computer simulations. Numerous results indicate the efficacy of the relay-and-jammers selection in improving both security and reliability for source–destination communications. Moreover, the security and reliability performances are saturated at large maximum transmit/interference powers and considerably degraded by the primary interference. Furthermore, the reliability performance can be optimized by splitting appropriately the received power for information decoding and energy harvesting at the relays.

[1]  Santi P. Maity,et al.  On outage secrecy minimisation in an energy harvesting relay assisted cognitive radio networks , 2018, IET Commun..

[2]  Mohamed-Slim Alouini,et al.  Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .

[3]  Tran Trung Duy,et al.  Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[4]  Xiuzhen Cheng,et al.  Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[5]  Khuong Ho-Van Exact outage analysis of underlay cooperative cognitive networks over Nakagami-mfading channels , 2013 .

[6]  Khuong Ho-Van,et al.  Outage analysis in cooperative cognitive networks with opportunistic relay selection under imperfect channel information , 2015 .

[7]  Yang Wang,et al.  Energy-Efficient Data and Energy Integrated Management Strategy for IoT Devices Based on RF Energy Harvesting , 2021, IEEE Internet of Things Journal.

[8]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.

[9]  Oukas Nourredine,et al.  A New Stochastic Petri Nets Modeling for Dual Cluster Heads Configuration in Energy-Harvesting WSNs , 2021, 2020 2nd International Workshop on Human-Centric Smart Environments for Health and Well-being (IHSH).

[10]  Sumit Kundu,et al.  Physical Layer Security with Non-Linear Energy Harvesting Relay , 2019, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[11]  Yueming Cai,et al.  Physical Layer Security in an Untrusted Energy Harvesting Relay Network , 2019, IEEE Access.

[12]  You Xiaohu,et al.  Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks , 2021, IEEE Access.

[13]  Sanjay Dhar Roy,et al.  Secrecy Outage of a Cognitive Radio Network with Selection of Energy Harvesting Relay and Imperfect CSI , 2018, Wirel. Pers. Commun..

[14]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[15]  Ho Van Khuong,et al.  Security Performance of Underlay Cognitive Relaying Networks with Energy Harvesting , 2020, Wirel. Pers. Commun..

[16]  Wei Zhao,et al.  Security Energy Efficiency Maximization for Two-Way Relay Assisted Cognitive Radio NOMA Network With Self-Interference Harvesting , 2019, IEEE Access.

[17]  Yuan Gao,et al.  Secrecy Performance of Cognitive Radio Sensor Networks with an Energy-Harvesting based Eavesdropper and Imperfect CSI , 2018, 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).

[18]  Manav R. Bhatnagar,et al.  Secrecy Capacity in CRN With Malicious Energy Harvester Using Game Theoretic Techniques , 2017, IEEE Transactions on Cognitive Communications and Networking.

[19]  Ying Wang,et al.  Secure Cooperative Transmission in Cognitive AF Relay Systems with Destination-Aided Jamming and Energy Harvesting , 2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).

[20]  Zhongyuan Zhao,et al.  Joint Optimization of Computation Offloading, Data Compression, Energy Harvesting, and Application Scenarios in Fog Computing , 2021, IEEE Access.

[21]  Xing Zhang,et al.  Secure Transmission via Jamming in Wireless Networks with Possion Spatially Distributed Eavesdroppers , 2016, 2016 International Conference on Networking and Network Applications (NaNA).

[22]  Victor C. M. Leung,et al.  Resource Allocation for Secure MISO-NOMA Cognitive Radios Relying on SWIPT , 2018, 2018 IEEE International Conference on Communications (ICC).

[23]  Ha H. Nguyen,et al.  Performance of Wireless Powered Cognitive Radio Sensor Networks With Nonlinear Energy Harvester , 2019, IEEE Sensors Letters.

[24]  Zhengyu Zhu,et al.  Outage-Constrained Secrecy Energy Efficiency Optimization for CRNs With Non-Linear Energy Harvesting , 2019, IEEE Access.

[25]  Ho Van Khuong,et al.  Security Enhancement for Energy Harvesting Cognitive Networks with Relay Selection , 2020, Wirel. Commun. Mob. Comput..

[26]  Khuong Ho-Van,et al.  Energy Harvesting Cooperative Cognitive Networks: Relay Selection for Information Security , 2019, 2019 International Symposium on Electrical and Electronics Engineering (ISEE).

[27]  Zhenyu Na,et al.  Energy Efficiency Optimization for NOMA-Based Cognitive Radio With Energy Harvesting , 2019, IEEE Access.

[28]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[29]  Wei Zhong,et al.  Precoding and Artificial Noise Design for Cognitive MIMOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[30]  Xianfu Chen,et al.  Secure beamforming for cognitive radio networks with artificial noise , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[31]  George K. Karagiannidis,et al.  Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints , 2019, IEEE Access.

[32]  R. Tallarida Table of Integrals , 1999 .

[33]  Shahid Mumtaz,et al.  Secrecy Performance Analysis of UAV Assisted Relay Transmission for Cognitive Network With Energy Harvesting , 2020, IEEE Transactions on Vehicular Technology.

[34]  Xing Zhang,et al.  Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[35]  Khuong Ho-Van,et al.  Security Analysis for Cognitive Radio Network with Energy Scavenging Capable Relay over Nakagami-m Fading Channels , 2019, 2019 International Symposium on Electrical and Electronics Engineering (ISEE).

[36]  Dawei Wang,et al.  Primary Privacy Preserving With Joint Wireless Power and Information Transfer for Cognitive Radio Networks , 2020, IEEE Transactions on Cognitive Communications and Networking.

[37]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[38]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[39]  Paschalis C. Sofotasios,et al.  Symbol Error Probability of DF Relay Selection over Arbitrary Nakagami- Fading Channels , 2013 .

[40]  Shankar Prakriya,et al.  Secrecy Performance of an Idle Receiver Assisted Underlay Secondary Network , 2017, IEEE Transactions on Vehicular Technology.

[41]  Yongqiang Cui,et al.  Self-Sustainable Long-Range Backscattering Communication Using RF Energy Harvesting , 2021, IEEE Internet of Things Journal.