SCIENCE CHINA Information Sciences, Volume 60, Issue 2: 022307(2017) https://doi.org/10.1007/s11432-015-0973-8

Secrecy outage analysis for underlay cognitive radio networks over correlated channels

More info
  • ReceivedJun 27, 2016
  • AcceptedAug 12, 2016
  • PublishedNov 17, 2016


This paper investigates the secrecy outage performance of underlay cognitive radio networks, in which a source in a secondary system transmits its confidential information to a legitimate destination in the presence of an eavesdropper. Specifically, the main (the source-to-destination) and eavesdropping (the source-to-eavesdropper) channels are assumed to be correlated. Moreover, it is also assumed that the main channel and the channel from the source to the primary user's receiver are correlated. Tight closed-form analytical expression for secrecy outage probability and the closed-form analytical expression for the probability of non-zero secrecy capacity are derived and validated by simulation results when the interference temperature limit is comparably large.

Funded by

Fundamental Research Funds for the Central Universities(XDJK2016A011)

Natural Science Foundation of CQ CSTC(cstc2013jcyjA40040)

National Natural Science Foundation of China(61531016)

Fundamental Research Funds for the Central Universities(XDJK2015B023)

Research Fund for the Doctoral Program of Higher Education of China(20130182120017)

National Natural Science Foundation of China(Grants Nos. 61401372)



This work was supported by National Natural Science Foundation of China (Grants Nos. 61401372, 61531016), Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130182120017), Natural Science Foundation of CQ CSTC (Grant No. cstc2013jcyjA40040), and Fundamental Research Funds for the Central Universities (Grant Nos. XDJK2015B023, XDJK2016A011).


[1] Wyner A. The wire-tap channel. Bell Syst Tech J, 1975, 5: 1355-1367 Google Scholar

[2] Liang Y B, Somekh-Baruch A, Poor H V, et al. Capacity of cognitive interference channels with and without secrecy. IEEE Trans Inf Theory, 2009, 55: 604-619 CrossRef Google Scholar

[3] Liang Y B, Poor H V, Ying L. Secure communications over wireless broadcast networks: stability and utility maximization. IEEE Trans Inf Foren Secur, 2011, 6: 682-692 CrossRef Google Scholar

[4] Bloch M, Barros J, Rodrigues M R D, et al. Wireless information-theoretic security. IEEE Trans Inf Theory, 2008, 54: 2515-2534 CrossRef Google Scholar

[5] Wang H-M, Zheng T-X, Yuan J, et al. Physical layer security in heterogeneous cellular networks. IEEE Trans Commun, 2016, 64: 1204-1219 CrossRef Google Scholar

[6] Wang H-M, Xia X-G. Enhancing wireless secrecy via cooperation: signal design and optimization. IEEE Commun Mag, 2015, 53: 47-53 Google Scholar

[7] Li Q, Song H, Huang K. Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels. IEEE Commun Lett, 2013, 17: 892-895 CrossRef Google Scholar

[8] Bashar S, Ding Z, Xiao C. On the secrecy rate of multi-antenna wiretap channel under finite-alphabet input. IEEE Commun Lett, 2011, 15: 527-529 CrossRef Google Scholar

[9] Haykin S. Cognitive radio: brain-empowered wireless communications. IEEE J Sel Areas Commun, 2005, 23: 201-220 CrossRef Google Scholar

[10] Hossain E, Bhargava V. Cognitive Wireless Communication Networks. New York: Springer, 2007. Google Scholar

[11] Sharma R K, Rawat D B. Advances on security thrats and countermeasures for cognitive radio networks: a survey. IEEE Commun Surv Tut, 2015, 57: 1023-1043 Google Scholar

[12] Zou Y, Zhu J, Yang L, et al. Securing physical-layer communications for cognitive radio networks. IEEE Commun Mag, 2015, 53: 48-54 Google Scholar

[13] Wang C, Wang H-M. On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans Inf Foren Secur, 2014, 9: 1814-1827 CrossRef Google Scholar

[14] Mokari N, Parsaeefard S, Saeedi H, et al. Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users. IEEE Trans Wirel Commun, 2014, 13: 1058-1073 CrossRef Google Scholar

[15] Alhakami W, Mansour A, Safdar G A, et al. A secure MAC protocol for cognitive radio networks (SMCRN). In: Proceedings of Science and Information Conference (SAI), London, 2013. 796--803. Google Scholar

[16] Tang C, Pan G, Li T. Secrecy outage analysis of underlay cognitive radio unit over Nakagami-m fading channels. IEEE Wirel Commun Lett, 2014, 3: 609-612 CrossRef Google Scholar

[17] Chen Y X, Tellambura C. Distribution functions of selection combiner output in equally correlated Rayleigh, Rician, and Nakagami-m fading channels. IEEE Trans Commun, 2004, 52: 1948-1956 CrossRef Google Scholar

[18] Papoulis A, Pillai S U. Probability, Random Variables and Stochastic Processes. 4th ed. New York: McGraw-Hill, 2001. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有