logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 10: 102308(2016) https://doi.org/10.1007/s11432-015-5451-2

Physical-layer secrecy outage of spectrum sharing CR systems over fading channels

More info
  • ReceivedJul 12, 2015
  • AcceptedAug 30, 2015
  • PublishedMar 16, 2016

Abstract

In this paper, we investigate the physical-layer secrecy outage performance of underlay spectrum sharing systems over Rayleigh and log-normal fading channels in the presence of one eavesdropper. In particular, the secondary transmitter sends data to the legitimate receiver under the constraints of the interference temperature at the primary receiver, while suffering the wiretap from the eavesdropper. Closed-form and approximated expressions are derived for the secrecy outage probability over Rayleigh and log-normal fading channels, respectively. The accuracy of our performance analysis is verified by simulation results.


Acknowledgment

Acknowledgments

This research was supported in part by National Natural Science Foundation of China (Grant Nos. 61401372, 61531016), Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130182120017), Natural Science Foundation Project of CQ CSTC (Grant No. cstc2013jcyjA40040), Fundamental Research Funds for the Central Universities (Grant No. XDJK2015B023), and National Undergraduate Training Programs for Innovation and Entrepreneurship (Grant No. 201410635005).


References

[1] Wyner D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355-1367 CrossRef Google Scholar

[2] Bloch M, Barros J, Rodrigues M R D, et al. Wireless information theoretic security. IEEE Trans Inf Theory, 2008, 54: 2515-2534 CrossRef Google Scholar

[3] Liu T, Shamai S. A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Trans Inf Theory, 2009, 55: 2547-2553 CrossRef Google Scholar

[4] Li Q, Song H, Huang K. Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels. IEEE Commu Lett, 2013, 17: 892-895 CrossRef Google Scholar

[5] Li Q, Ma W-K, Man-Cho So A. A safe approximation approach to secrecy outage design for MIMO wiretap channels. IEEE Sig Process Lett, 2014, 21: 118-121 CrossRef Google Scholar

[6] Sun X, Wang J, Xu W, et al. Performance of secure communications over correlated fading channels. IEEE Sig Process Lett, 2012, 19: 479-482 CrossRef Google Scholar

[7] Liu X. Secrecy capacity of wireless links subject to log-normal fading. In: Proceedings of 7th International Conference on Communications and Networking in China, Kunming, 2012. 167--172. Google Scholar

[8] Zhang X, Pan G, Tang C, et al. Performance analysis of physical layer security over independent/correlated log-normal fading channels. In: Proceedings of Australasian Telecommunication Networks and Applications Conference, Melbourne, 2014. 23--27. Google Scholar

[9] Zahurul M, Sarkar I, Ratnarajah T. Secrecy capacity over correlated log-normal fading channel. In: Proceedings of IEEE International Conference on Communications, Ottawa, 2012. 883--887. Google Scholar

[10] Mitola J. Cognitive radio: an integrated agent architecture for software defined radio. Dissertation for Ph.D. Degree. Stockholm: KTH, 2000. Google Scholar

[11] Shu Z, Qian Y, Ci S. On physical layer security for cognitive radio networks. IEEE Netw, 2013, 27: 28-33 Google Scholar

[12] Zou Y, Wang X, Shen W. Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans Commu, 2013, 61: 5103-5113 CrossRef Google Scholar

[13] Sakran H, Shokair M, Nasr O, et al. Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Commun, 2012, 6: 2676-2687 CrossRef Google Scholar

[14] Wen H, Li S, Zhu X, et al. A framework of the PHY-layer approach to defense against security threats in cognitive radio networks. IEEE Netw, 2013, 27: 34-39 Google Scholar

[15] Tang C, Pan G, Li T. Secrecy outage analysis of underlay cognitive radio unit over Nakagami-$m$ fading channels. IEEE Wirel Commun Lett, 2014, 3: 609-612 CrossRef Google Scholar

[16] Elkashlan M, Wang L, Duong T Q, et al. On the security of cognitive radio networks. IEEE Trans Veh Techol, 2015, 64: 3790-3795 CrossRef Google Scholar

[17] Papoulis A. Probability, Random Variables and Stochastic Processes. 4th ed. New York: McGraw Hill, 2001. Google Scholar

[18] He F, Man H, Wang W. Maximal ratio diversity combining enhanced security. IEEE Commun Lett, 2011, 15: 509-511 CrossRef Google Scholar

[19] Krishnamoorthy K. Handbook of Statistical Distributions with Applications. New York: Chapman & Hall, 2006. Google Scholar

[20] Fenton L. The sum of log-normal probability distributions in scatter transmission systems. IRE Trans Commun Syst, 1960, 8: 57-67 CrossRef Google Scholar

[21] Pan G, Tang C, Zhang X, et al. Physical layer security over non-small scale fading channels. IEEE Trans Veh Tech, 2016, 65: 1326-1339 CrossRef Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1