scholarly journals Relaying Communications in Energy Scavenging Cognitive Networks: Secrecy Outage Probability Analysis

2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

This paper exploits a self-powered secondary relay to not only maintain but also secure communications between a secondary source and a secondary destination in cognitive radio networks when source-destination channel is unavailable. The relay scavenges energy from radio frequency (RF) signals of the primary transmitter and the secondary source and consumes the scavenged energy for its relaying activity. Under the maximum transmit power constraint, Rayleigh fading, the primary outage constraint, and the interference from the primary transmitter, this paper suggests an accurate closed-form expression of the secrecy outage probability to promptly assess the security performance of relaying communications in energy scavenging cognitive networks. The validity of the proposed expression is verified by computer simulations. Numerous results demonstrate the security performance saturation in the range of large maximum transmit power or high required outage probability of primary users. Moreover, the security performance is a function of several system parameters among which the relay’s position, the power splitting factor, and the time splitting factor can be optimized to achieve the minimum secrecy outage probability.

2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

This study suggests an energy-scavenging capable unlicensed relay not only to retain communications between an unlicensed sender-recipient pair in underlay cognitive networks but also to secure these communications against eavesdropping of malicious users. Message-securing capability of such a network configuration is assessed through secrecy outage probability (SOP). For this purpose, a precise closed-form formula of the SOP accounting for interference power restriction, Nakagami-m fading, and maximum transmit power restriction is first proposed. Then, the proposed formula is validated by computer simulations. Ultimately, various results are supplied to contrive that the relay position, the time percentage, and the power percentage of the energy-scavenging technique should be appropriately chosen for achieving the best security performance. Moreover, the SOP decreases with lower severity fading level and is constant in the range of high maximum interference power or high maximum transmit power.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Kyusung Shim ◽  
Beongku An

In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of one base station, multinear user, multifar user, and one eavesdropper. To improve the secrecy performance, we propose the users selection scheme, called best-secure-near-user best-secure-far-user (BSNBSF) scheme. The BSNBSF scheme aims to select the best near-far user pair, whose data transmission is the most robust against the overhearing of an eavesdropper. In order to facilitate the performance analysis of the BSNBSF scheme in terms of secrecy outage performance, we derive the exact closed-form expression for secrecy outage probability (SOP) of the selected near user and the tight approximated closed-form expression for SOP of the selected far user, respectively. Additionally, we propose the descent-based search method to find the optimal values of the power allocation coefficients that can minimize the total secrecy outage probability (TSOP). The developed analyses are corroborated through Monte Carlo simulation. Comparisons with the random-near-user random-far-user (RNRF) scheme are performed and show that the proposed scheme significantly improves the secrecy performance.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Jinglan Ou ◽  
Hangchuan Shi ◽  
Liubin Wang ◽  
Rui Ma ◽  
Haowei Wu

Simultaneous wireless information and power transfer (SWIPT) is a major breakthrough in the field of low-power wireless information transmissions. In this paper, the secrecy performance of the SWIPT-enabled relay network with full-duplex destination-aided jamming is assessed, where both the power-splitting (PS) and time-switching (TS) schemes at the relay are considered with the linear and nonlinear energy harvesting models. The relay harvests energy from the confidential signal and artificial noise sent by the source and destination, respectively, and forwards the amplified signal to the destination, in the presence of an eavesdropper. The analytical closed-form expressions of the connection outage probability (COP), secrecy outage probability (SOP), and transmission outage probability (TOP) for PS- and TS-based schemes are derived, and the closed-form expression of the lower bound of ergodic secrecy capacity (ESC) is calculated. The asymptotic-form expressions of the COP, SOP, TOP, and ESC are further analyzed to capture the valuable information in the high SNR regime. Numerical results verify the correctness of analytical results, reveal the effects of the PS/TS ratio, and transmit the signal-to-noise ratio on secrecy performance.


2021 ◽  
Author(s):  
Shu Xu ◽  
Chen Liu ◽  
Hong Wang ◽  
Mujun Qian ◽  
Wenfeng Sun

Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay-antenna selection (RAS) to enhance physical-layer security (PLS) of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency (RF) chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining (MRC) or selection combining (SC) to process the received signals. Under the condition that the channel state information (CSI) of the eavesdropping channel is available or unavailable, two e↵ective relay-antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay-antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access (OMA) scheme obviously.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 79637-79649
Author(s):  
Tung Pham Huu ◽  
Tam Ninh Thi-Thanh ◽  
Chi Nguyen-Yen ◽  
Hung Tran ◽  
Viet Nguyen Dinh ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document