Secrecy Outage Analysis for SIMO Underlay Cognitive Radio Networks over Generalized- $K$ Fading Channels

In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized-K channels, where the eavesdropper overhears the transmission from the secondary transmitter (ST) to the legitimate receiver. Both the primary user and the ST are equipped with a single antenna, whereas the legitimate and the eavesdropper receivers are equipped with multiple antennas. The close-form expression for the secrecy outage probability is derived. Simulations are presented to validate the accuracy of our proposed analytical results.

[1]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[3]  Mohamed-Slim Alouini,et al.  Coded Communication over Fading Channels , 2005 .

[4]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[5]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[6]  P. Mohana Shankar,et al.  Error Rates in Generalized Shadowed Fading Channels , 2004, Wirel. Pers. Commun..

[7]  Jaehoon Jung,et al.  Capacity and Error Probability Analysis of Diversity Reception Schemes Over Generalized- $K$ Fading Channels Using a Mixture Gamma Distribution , 2014, IEEE Transactions on Wireless Communications.

[8]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[9]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[10]  P. Mohana Shankar Performance Analysis of Diversity Combining Algorithms in Shadowed Fading Channels , 2006, Wirel. Pers. Commun..

[11]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[12]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[13]  Huan Zhang,et al.  Performance Analysis of Physical Layer Security Over Generalized-$K$ Fading Channels Using a Mixture Gamma Distribution , 2016, IEEE Communications Letters.

[14]  Mohamed-Slim Alouini,et al.  Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .

[15]  Halim Yanikomeroglu,et al.  On the approximation of the generalized-Κ distribution by a gamma distribution for modeling composite fading channels , 2010, IEEE Transactions on Wireless Communications.

[16]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[17]  Saad Al-Ahmadi,et al.  Asymptotic capacity of opportunistic scheduling over gamma-gamma (generalized-K) composite fading channels , 2012, IET Commun..

[18]  Imran Shafique Ansari,et al.  On Physical-Layer Security Over SIMO Generalized-$K$ Fading Channels , 2016, IEEE Transactions on Vehicular Technology.

[19]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[20]  Hai Jiang,et al.  A Mixture Gamma Distribution to Model the SNR of Wireless Channels , 2011, IEEE Transactions on Wireless Communications.

[21]  Gaofeng Pan,et al.  Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.

[22]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[23]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[24]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[25]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.