CLC number: TN929.5
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2016-08-16
Cited: 2
Clicked: 6552
Hui Zhao, Dan-yang Wang, Chao-qing Tang, Ya-ping Liu, Gao-feng Pan, Ting-ting Li, Yun-fei Chen. Physical layer security of underlay cognitive radio using maximal ratio combining[J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17(9): 929-937.
@article{title="Physical layer security of underlay cognitive radio using maximal ratio combining",
author="Hui Zhao, Dan-yang Wang, Chao-qing Tang, Ya-ping Liu, Gao-feng Pan, Ting-ting Li, Yun-fei Chen",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="17",
number="9",
pages="929-937",
year="2016",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1500351"
}
%0 Journal Article
%T Physical layer security of underlay cognitive radio using maximal ratio combining
%A Hui Zhao
%A Dan-yang Wang
%A Chao-qing Tang
%A Ya-ping Liu
%A Gao-feng Pan
%A Ting-ting Li
%A Yun-fei Chen
%J Frontiers of Information Technology & Electronic Engineering
%V 17
%N 9
%P 929-937
%@ 2095-9184
%D 2016
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1500351
TY - JOUR
T1 - Physical layer security of underlay cognitive radio using maximal ratio combining
A1 - Hui Zhao
A1 - Dan-yang Wang
A1 - Chao-qing Tang
A1 - Ya-ping Liu
A1 - Gao-feng Pan
A1 - Ting-ting Li
A1 - Yun-fei Chen
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 17
IS - 9
SP - 929
EP - 937
%@ 2095-9184
Y1 - 2016
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1500351
Abstract: We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user (SU-TX) that transmits confidential messages to another secondary user (SU-RX) equipped with M (M≥1) antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with N (N≥1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.
This paper investigated the physical layer security in the cognitive radio networks with using maximal ratio combining. The closed-form expressions for the exact and asymptotic secrecy outage probability is derived. Overall, this paper is well written. The idea of this paper is acceptable, and the technical part is solid.
[1]Alves, H., Souza, R.D., Debbah, M., et al., 2012. Performance of transmit antenna selection physical layer security schemes. IEEE Signal Process. Lett., 19(6):372-375.
[2]Elkashlan, M., Wang, L., Duong, T.Q., et al., 2015. On the security of cognitive radio networks. IEEE Trans. Veh. Technol., 64(8):3790-3795.
[3]Gradshteyn, I.S., Ryzhik, I.M., 2007. Table of Integrals, Series, and Products. Academic Press, New York.
[4]He, F.M., Man, H., Wang, W., 2011. Maximal ratio diversity combining enhanced security. IEEE Commun. Lett., 15(5):509-511.
[5]Lee, J., Wang, H., Andrews, J.G., et al., 2011. Outage probability of cognitive relay networks with interference constraints. IEEE Trans. Wirel. Commun., 10(2):390-395.
[6]Liu, H.Q., Zhao, H., Jiang, H., et al., 2016. Physical-layer secrecy outage of spectrum sharing CR systems over fading channels. Sci. China Inform. Sci., in press.
[7]Liu, Y.w., Wang, L.F., Duy, T.T., et al., 2015. Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett., 4(1):46-49.
[8]Liu, Y.W., Wang, L.F., Zaidi, S.A.R., et al., 2016. Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Trans. Commun., 64(1):329-342.
[9]Pan, G.F., Tang, C.Q., Zhang, X., et al., 2015. Physical layer security over non-small scale fading channels. IEEE Trans. Veh. Techol., 65(3):1326-1339.
[10]Papoulis, A., Pillai, S.U., 2002. Two Random Variables. In: Howell, R.L., Morriss, J.M. (Eds.), Probability, Random Variables and Stochastic Processes. Tata McGraw-Hill Education, Noida, p.124-148.
[11]Prudnikov, A.P., Brychkov, Y.A., Marichev, O.I., 1986. Elementary Functions. In: Queen, N.M., translator, Integrals and Series. Gordon and Breach Science Publishers, Philadelphia, p.11-45.
[12]Shiu, Y.S., Chang, S.Y., Wu, H.C., et al., 2011. Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun., 18(2):66-74.
[13]Sun, X.J., Wang, J.H., Xu, W., et al., 2012. Performance of secure communications over correlated fading channels. IEEE Signal Process. Lett., 19(8):479-482.
[14]Tang, C.Q., Pan, G.F., Li, T.T., 2014. Secrecy outage analysis of underlay cognitive radio unit over Nakagami-m fading channels. IEEE Wirel. Commun. Lett., 3(6):609-612.
[15]Wang, L.F., Yang, N., Elkashlan, M., et al., 2014. Physical layer security of maximal ratio combining in two-wave diffuse power fading channels. IEEE Trans. Inform. Foren. Sec., 9(2):247-258.
[16]Wang, Q.H., Wang, H.M., Yin, Q.Y., 2014. Distributed beamforming for multi-relay cognitive radio systems. Sci. China Inform. Sci., 44(8):980-992 (in Chinese).
[17]Yang, N., Suraweera, H.A., Collings, I.B., et al., 2013a. Physical layer security of TAS/MRC with antenna correlation. IEEE Trans. Inform. Foren. Sec., 8(1):254-259.
[18]Yang, N., Yeoh, P.L., Elkashlan, M., et al., 2013b. Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Commun., 61(1):144-154.
[19]Zhang, X., Pan, G.F., Tang, C.Q., et al., 2014. Performance analysis of physical layer security over independent/correlated log-normal fading channels. IEEE Telecommunication Networks and Applications Conf., p.23-27.
[20]Zhao, H., Pan, G.F., 2016. The analysis on secure communications for DF and RF relaying SIMO system with Gauss errors. Sci. China Inform. Sci., 46(3):350-360 (in Chinese).
[21]Zhao, H., Liu, H.Q., Liu, Y.P., et al., 2015. Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels. IEEE Int. Conf. on Communication Software and Networks, p.201-205.
[22]Zou, Y.L., Champagne, B., Zhu, W.P., et al., 2015. Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans. Commun., 63(1):215-228.
Open peer comments: Debate/Discuss/Question/Opinion
<1>