Full Text:   <2332>

Summary:  <1707>

CLC number: TN929.5

On-line Access: 2016-08-31

Received: 2015-10-21

Revision Accepted: 2016-02-16

Crosschecked: 2016-08-16

Cited: 2

Clicked: 5832

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Gao-feng Pan

http://orcid.org/0000-0003-1008-5717

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.9 P.929-937

http://doi.org/10.1631/FITEE.1500351


Physical layer security of underlay cognitive radio using maximal ratio combining


Author(s):  Hui Zhao, Dan-yang Wang, Chao-qing Tang, Ya-ping Liu, Gao-feng Pan, Ting-ting Li, Yun-fei Chen

Affiliation(s):  School of Electronic and Information Engineering, Southwest University, Chongqing 400715, China; more

Corresponding email(s):   gfpan@swu.edu.cn

Key Words:  Cognitive radio networks, Maximal ratio combining, Secrecy outage probability, Single-input multiple-output


Hui Zhao, Dan-yang Wang, Chao-qing Tang, Ya-ping Liu, Gao-feng Pan, Ting-ting Li, Yun-fei Chen. Physical layer security of underlay cognitive radio using maximal ratio combining[J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17(9): 929-937.

@article{title="Physical layer security of underlay cognitive radio using maximal ratio combining",
author="Hui Zhao, Dan-yang Wang, Chao-qing Tang, Ya-ping Liu, Gao-feng Pan, Ting-ting Li, Yun-fei Chen",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="17",
number="9",
pages="929-937",
year="2016",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1500351"
}

%0 Journal Article
%T Physical layer security of underlay cognitive radio using maximal ratio combining
%A Hui Zhao
%A Dan-yang Wang
%A Chao-qing Tang
%A Ya-ping Liu
%A Gao-feng Pan
%A Ting-ting Li
%A Yun-fei Chen
%J Frontiers of Information Technology & Electronic Engineering
%V 17
%N 9
%P 929-937
%@ 2095-9184
%D 2016
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1500351

TY - JOUR
T1 - Physical layer security of underlay cognitive radio using maximal ratio combining
A1 - Hui Zhao
A1 - Dan-yang Wang
A1 - Chao-qing Tang
A1 - Ya-ping Liu
A1 - Gao-feng Pan
A1 - Ting-ting Li
A1 - Yun-fei Chen
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 17
IS - 9
SP - 929
EP - 937
%@ 2095-9184
Y1 - 2016
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1500351


Abstract: 
We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user (SU-TX) that transmits confidential messages to another secondary user (SU-RX) equipped with M (M≥1) antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with N (N≥1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.

This paper investigated the physical layer security in the cognitive radio networks with using maximal ratio combining. The closed-form expressions for the exact and asymptotic secrecy outage probability is derived. Overall, this paper is well written. The idea of this paper is acceptable, and the technical part is solid.

基于最大比合并的认知无线电物理层保密性能分析

概要:在瑞利衰落信道下,本文研究了认知无线电网络中最大比合并的保密中断性能。在一个单输入多输出窃密系统中,本文考虑一个次级用户向另一个装备多根接收天线并且采用最大比合并提高其合并信噪比的次级用户发送保密信息。与此同时,一个装备多根接收天线也采用最大比合并的窃密者窃听这对合法次级用户的信息。合法次级发送者采用Underlay策略与主用户共享频谱资源的同时亦不影响主用户的通信质量。考虑上述的窃密环境,本文分别得到了精确和近似保密中断概率的闭式表达式。
关键词:认知无线电网络;最大比合并;保密中断概率;单输入多输出

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Alves, H., Souza, R.D., Debbah, M., et al., 2012. Performance of transmit antenna selection physical layer security schemes. IEEE Signal Process. Lett., 19(6):372-375.

[2]Elkashlan, M., Wang, L., Duong, T.Q., et al., 2015. On the security of cognitive radio networks. IEEE Trans. Veh. Technol., 64(8):3790-3795.

[3]Gradshteyn, I.S., Ryzhik, I.M., 2007. Table of Integrals, Series, and Products. Academic Press, New York.

[4]He, F.M., Man, H., Wang, W., 2011. Maximal ratio diversity combining enhanced security. IEEE Commun. Lett., 15(5):509-511.

[5]Lee, J., Wang, H., Andrews, J.G., et al., 2011. Outage probability of cognitive relay networks with interference constraints. IEEE Trans. Wirel. Commun., 10(2):390-395.

[6]Liu, H.Q., Zhao, H., Jiang, H., et al., 2016. Physical-layer secrecy outage of spectrum sharing CR systems over fading channels. Sci. China Inform. Sci., in press.

[7]Liu, Y.w., Wang, L.F., Duy, T.T., et al., 2015. Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett., 4(1):46-49.

[8]Liu, Y.W., Wang, L.F., Zaidi, S.A.R., et al., 2016. Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Trans. Commun., 64(1):329-342.

[9]Pan, G.F., Tang, C.Q., Zhang, X., et al., 2015. Physical layer security over non-small scale fading channels. IEEE Trans. Veh. Techol., 65(3):1326-1339.

[10]Papoulis, A., Pillai, S.U., 2002. Two Random Variables. In: Howell, R.L., Morriss, J.M. (Eds.), Probability, Random Variables and Stochastic Processes. Tata McGraw-Hill Education, Noida, p.124-148.

[11]Prudnikov, A.P., Brychkov, Y.A., Marichev, O.I., 1986. Elementary Functions. In: Queen, N.M., translator, Integrals and Series. Gordon and Breach Science Publishers, Philadelphia, p.11-45.

[12]Shiu, Y.S., Chang, S.Y., Wu, H.C., et al., 2011. Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun., 18(2):66-74.

[13]Sun, X.J., Wang, J.H., Xu, W., et al., 2012. Performance of secure communications over correlated fading channels. IEEE Signal Process. Lett., 19(8):479-482.

[14]Tang, C.Q., Pan, G.F., Li, T.T., 2014. Secrecy outage analysis of underlay cognitive radio unit over Nakagami-m fading channels. IEEE Wirel. Commun. Lett., 3(6):609-612.

[15]Wang, L.F., Yang, N., Elkashlan, M., et al., 2014. Physical layer security of maximal ratio combining in two-wave diffuse power fading channels. IEEE Trans. Inform. Foren. Sec., 9(2):247-258.

[16]Wang, Q.H., Wang, H.M., Yin, Q.Y., 2014. Distributed beamforming for multi-relay cognitive radio systems. Sci. China Inform. Sci., 44(8):980-992 (in Chinese).

[17]Yang, N., Suraweera, H.A., Collings, I.B., et al., 2013a. Physical layer security of TAS/MRC with antenna correlation. IEEE Trans. Inform. Foren. Sec., 8(1):254-259.

[18]Yang, N., Yeoh, P.L., Elkashlan, M., et al., 2013b. Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Commun., 61(1):144-154.

[19]Zhang, X., Pan, G.F., Tang, C.Q., et al., 2014. Performance analysis of physical layer security over independent/correlated log-normal fading channels. IEEE Telecommunication Networks and Applications Conf., p.23-27.

[20]Zhao, H., Pan, G.F., 2016. The analysis on secure communications for DF and RF relaying SIMO system with Gauss errors. Sci. China Inform. Sci., 46(3):350-360 (in Chinese).

[21]Zhao, H., Liu, H.Q., Liu, Y.P., et al., 2015. Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels. IEEE Int. Conf. on Communication Software and Networks, p.201-205.

[22]Zou, Y.L., Champagne, B., Zhu, W.P., et al., 2015. Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans. Commun., 63(1):215-228.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE