Secrecy Outage Analysis on Underlay Cognitive Radio System With Full-Duplex Secondary User

In this paper, an underlay cognitive radio system, which consists of a primary-user (PU) transmitter (TX), a PU receiver (RX), a secondary-user (SU) TX, and a SU_RX, is considered. Benefitting from the underlay mode, SU_TX can deliver its information to SU_RX by sharing the spectrum resource authorized to PU. It is assumed that SUs are equipped with a single transmitting antenna and a single receiving antenna, which are isolated, and work in full-duplex (FD) mode. By considering that the information signal transmitted from PU_TX to PU_RX may be eavesdropped by SU_TX if SU_TX is malicious, we investigate the secrecy outage performance of the PU system. The approximated closed-form expression for secrecy outage probability (SOP) and the lower boundary of the asymptotic SOP have been derived and verified by simulation results. Our results reveal the impact of the eavesdropping of the SU and the FD mode adopted at the SU transmitter on the secrecy performance of the PU system in underlay spectrum sharing mode.

[1]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[2]  Victor C. M. Leung,et al.  Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.

[3]  Yunfei Chen,et al.  Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[4]  Zhiguo Ding,et al.  On Secure VLC Systems With Spatially Random Terminals , 2017, IEEE Communications Letters.

[5]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[6]  Naofal Al-Dhahir,et al.  Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.

[7]  Gaofeng Pan,et al.  Probability of Secrecy Outage in Cognitive Radio Networks over Rician-Fading Channels , 2016 .

[8]  Gaofeng Pan,et al.  Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.

[9]  Huan Zhang,et al.  Secrecy Outage Analysis for SIMO Underlay Cognitive Radio Networks over Generalized- $K$ Fading Channels , 2016, IEEE Signal Processing Letters.

[10]  Lei Chen,et al.  Fast Power Allocation for Secure Communication With Full-Duplex Radio , 2017, IEEE Transactions on Signal Processing.

[11]  Zhiguo Ding,et al.  Secure Hybrid VLC-RF Systems With Light Energy Harvesting , 2017, IEEE Transactions on Communications.

[12]  Hui-Ming Wang,et al.  On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system , 2016, IEEE Access.

[13]  Matti Latva-aho,et al.  On the Performance of Secure Full-Duplex Relaying under Composite Fading Channels , 2015, IEEE Signal Processing Letters.

[14]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[15]  Yunfei Chen,et al.  Physical layer security of underlay cognitive radio using maximal ratio combining , 2016, Frontiers of Information Technology & Electronic Engineering.

[16]  Yunfei Chen,et al.  Secrecy outage performance for partial relay selection schemes in cooperative systems , 2015, IET Commun..

[17]  Yunfei Chen,et al.  Physical-layer secrecy outage of spectrum sharing CR systems over fading channels , 2015, Science China Information Sciences.

[18]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[19]  Tao Zhang,et al.  Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.

[20]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[21]  Yi Sun,et al.  Interference Alignment Based on Antenna Selection With Imperfect Channel State Information in Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[22]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[23]  Gaofeng Pan,et al.  Secrecy outage analysis for underlay cognitive radio networks over correlated channels , 2015, Science China Information Sciences.

[24]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Yunfei Chen,et al.  Physical-Layer Security Over Non-Small-Scale Fading Channels , 2016, IEEE Transactions on Vehicular Technology.

[26]  Nan Zhao,et al.  Adaptive Power Allocation Schemes for Spectrum Sharing in Interference-Alignment-Based Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[27]  Baoyun Wang,et al.  Robust Secure Beamforming for Wireless Powered Full-Duplex Systems With Self-Energy Recycling , 2017, IEEE Transactions on Vehicular Technology.

[28]  Yunfei Chen,et al.  Secrecy Performance Analysis for SIMO Simultaneous Wireless Information and Power Transfer Systems , 2015, IEEE Transactions on Communications.

[29]  Yunfei Chen,et al.  On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI , 2016, IEEE Transactions on Communications.

[30]  Huan Zhang,et al.  Secrecy Outage Performance for SIMO Underlay Cognitive Radio Systems With Generalized Selection Combining Over Nakagami-$m$ Channels , 2016, IEEE Transactions on Vehicular Technology.

[31]  Thinh Phu Do,et al.  Power Allocation and Performance Comparison of Full Duplex Dual Hop Relaying Protocols , 2015, IEEE Communications Letters.

[32]  Imran Shafique Ansari,et al.  Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels , 2017, IEEE Transactions on Vehicular Technology.

[33]  Halim Yanikomeroglu,et al.  Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.