{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T22:40:27Z","timestamp":1721515227540},"reference-count":56,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"FCT\/MCTES","award":["UIDB\/50008\/2020-UIDP\/50008\/2020"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio vehicular network, where all the nodes in the network are moving vehicles and the channels between them are modeled as double-Rayleigh fading. Furthermore, adopting an underlay approach, the communication between secondary nodes can be performed by employing two interference constraint strategies at the primary receiver; (1) Strategy I: the secondary transmitter power is constrained by the interference threshold of the primary receiver, and (2) Strategy II: the secondary transmitter power is constrained by both the interference threshold of the primary receiver and the maximum transmit power of the secondary network. Under the considered strategies, we derive the exact secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) expressions over double-Rayleigh fading. Moreover, by analyzing the asymptotic SOP behavior, we show that a full secrecy diversity of 1 can be achieved, when the average channel gain of the main link goes to infinity with a fixed average wiretap channel gain. From the ESC analysis, it is revealed that the ESC follows a scaling law of \u0398ln\u03a9m2\u03a9e2 for large \u03a9m and \u03a9e, where \u03a9m and \u03a9e are the average channel gains of the main link and wiretap link. The numerical and simulation results verify our analytical findings.<\/jats:p>","DOI":"10.3390\/s21217160","type":"journal-article","created":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T03:52:35Z","timestamp":1635479555000},"page":"7160","source":"Crossref","is-referenced-by-count":1,"title":["Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8734-3791","authenticated-orcid":false,"given":"Suneel","family":"Yadav","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Indian Institute of Information Technology Allahabad, Prayagraj 211015, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7911-3451","authenticated-orcid":false,"given":"Anshul","family":"Pandey","sequence":"additional","affiliation":[{"name":"Secure Systems Research Center, Technology Innovation Institute, Abu Dhabi 9639, United Arab Emirates"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2072-069X","authenticated-orcid":false,"given":"Dinh-Thuan","family":"Do","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, College of Information and Electrical Engineering, Asia University, 500 Lioufeng Rd., Wufeng, Taichung 41354, Taiwan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3675-929X","authenticated-orcid":false,"given":"Byung Moo","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of of Intelligent Mechatronics Engineering, and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7008-6773","authenticated-orcid":false,"given":"Ad\u00e3o","family":"Silva","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es (IT) and Departamento de Eletr\u00f3nica, Telecomunica\u00e7\u00f5es e Inform\u00e1tica (DETI), University of Aveiro, 3810-193 Aveiro, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/JPROC.2019.2961937","article-title":"Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities","volume":"108","author":"Zhou","year":"2020","journal-title":"Proc. IEEE."},{"key":"ref_2","unstructured":"Fallgren, M. (2021, October 18). 5GCAR: Executive Summary. Available online: https:\/\/5gcar.eu\/wp-content\/uploads\/2019\/12\/5GCAR-Executive-Summary-White-Paper.pdf."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Wong, V.W., Schober, R., Ng, D.W.K., and Wang, L.C. (2017). Key Technologies for 5G Wireless Systems, Cambridge University Press.","DOI":"10.1017\/9781316771655"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/978-81-322-1665-0_20","article-title":"Enhanced caching for geocast routing in vehicular Ad Hoc network","volume":"Volume 243","author":"Kaiwartya","year":"2014","journal-title":"Intelligent Computing, Networking, and Informatics"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/MCOM.2015.7158273","article-title":"Cognitive vehicular communication for 5G","volume":"53","author":"Mumtaz","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1049\/iet-net.2017.0225","article-title":"Cognitive radio-enabled Internet of Vehicles: A cooperative spectrum sensing and allocation for vehicular communication","volume":"7","author":"Eze","year":"2018","journal-title":"IET Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MVT.2012.2190177","article-title":"Smart Radios for Smart Vehicles: Cognitive Vehicular Networks","volume":"7","author":"Chowdhury","year":"2012","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MCOM.2015.7263345","article-title":"Securing physical-layer communications for cognitive radio networks","volume":"53","author":"Zou","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MNET.2013.6523805","article-title":"On physical layer security for cognitive radio networks","volume":"27","author":"Shu","year":"2013","journal-title":"IEEE Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","article-title":"A survey on wireless security: Technical challenges, recent advances, and future trends","volume":"104","author":"Zou","year":"2016","journal-title":"Proc. IEEE."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1626","DOI":"10.1109\/LCOMM.2020.2995731","article-title":"Amount of secrecy loss: A novel metric for physical layer security analysis","volume":"24","author":"Li","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1109\/COMST.2016.2633387","article-title":"A survey on multiple-antenna techniques for physical layer security","volume":"19","author":"Chen","year":"2017","journal-title":"IEEE Commun. Surv. Tut."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"6483","DOI":"10.1109\/TCOMM.2019.2921966","article-title":"Transmit antenna selection in secure MIMO systems over \u03b1-\u03bc fading channels","volume":"67","author":"Moualeu","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1109\/LCOMM.2019.2958809","article-title":"Secure communications with a full-duplex relay network under residual self-interference","volume":"24","author":"Park","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"5179","DOI":"10.1109\/TVT.2020.2979988","article-title":"Secrecy under Rayleigh-dual correlated Rician fading employing opportunistic relays and an adaptive encoder","volume":"69","author":"Le","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/TWC.2016.2617328","article-title":"Optimal relay selection for secure cooperative communications with an adaptive eavesdropper","volume":"16","author":"Yang","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"7599","DOI":"10.1109\/TVT.2017.2669240","article-title":"Secrecy cooperative networks with outdated relay selection over correlated fading channels","volume":"66","author":"Fan","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"7168","DOI":"10.1109\/TCOMM.2019.2926719","article-title":"Secrecy analysis in DF relay over Generalized-K fading channels","volume":"67","author":"Zhao","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Madeira, J., Guerreiro, J., Dinis, R., Carvalho, P., and Campos, L. (2019). On the physical layer security characteristics for MIMO-SVD techniques for SC-FDE schemes. Sensors, 19.","DOI":"10.3390\/s19214757"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Madeira, J., Guerreiro, J., Serra, H., Dinis, R., Carvalho, P., and Campos, L. (2020). A physical layer security technique for NOMA systems with MIMO SC-FDE schemes. Electronics, 9.","DOI":"10.3390\/electronics9020240"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"113311","DOI":"10.1109\/ACCESS.2019.2934632","article-title":"Delimitated anti jammer scheme for Internet of Vehicle: Machine learning based security approach","volume":"7","author":"Kumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1109\/LCOMM.2016.2564380","article-title":"Secrecy outage performance of a cooperative cognitive relay network","volume":"21","author":"Chakraborty","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"6678","DOI":"10.1109\/ACCESS.2017.2686984","article-title":"Secure cooperative half-duplex cognitive radio networks with K-th best relay selection","volume":"5","author":"Nguyen","year":"2017","journal-title":"IEEE Access."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/JCN.2018.000054","article-title":"Secrecy performance of threshold-based cognitive relay network with diversity combining","volume":"20","author":"Chopra","year":"2018","journal-title":"J. Commun. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TCCN.2019.2957081","article-title":"A PHY layer security analysis of uplink cooperative jamming-based underlay CRNs with multi-eavesdroppers","volume":"6","author":"Bouabdellah","year":"2020","journal-title":"IEEE Trans. Cog. Commun. Netw."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3836","DOI":"10.1109\/JSYST.2018.2873891","article-title":"On residual energy maximization in cognitive relay networks with eavesdropping","volume":"13","author":"Banerjee","year":"2019","journal-title":"IEEE Syst. J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"8212","DOI":"10.1109\/ACCESS.2016.2608966","article-title":"Secure transmission in cognitive MIMO relaying networks with outdated channel state information","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2222","DOI":"10.1109\/JSAC.2014.141121","article-title":"Secrecy outage and diversity analysis of cognitive radio systems","volume":"32","author":"Zou","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Li, M., Yin, H., Huang, Y., Fu, T., Wang, Y., and Yu, R. (2018, January 25\u201327). Secrecy performance analysis in MISOSE cognitive radio networks over correlated fading. Proceedings of the 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC 2018), Xi\u2019an, China.","DOI":"10.1109\/IMCEC.2018.8469556"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"11011","DOI":"10.1109\/TVT.2017.2722014","article-title":"Physical layer security of a multiantenna-based CR network with single and multiple primary users","volume":"66","author":"Singh","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1109\/TCCN.2018.2833848","article-title":"Secure communication in spectrum-sharing massive MIMO systems with active eavesdropping","volume":"4","author":"Timilsina","year":"2018","journal-title":"IEEE Trans. Cog. Commun. Netw."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1961","DOI":"10.1049\/iet-com.2017.0131","article-title":"Secrecy performance analysis of SIMO underlay cognitive radio systems with outdated CSI","volume":"11","author":"Lei","year":"2017","journal-title":"IET Commun."},{"key":"ref_33","unstructured":"Andersen, J.B. (2002, January 17\u201324). Statistical distributions in mobile communications using multiple scattering. Proceedings of the 27th URSI General Assembly, Maastricht, The Netherlands."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3114","DOI":"10.1109\/TAP.2006.883964","article-title":"Statistical analysis of the multiple scattering radio channel","volume":"54","author":"Salo","year":"2006","journal-title":"IEEE Trans. Antennas Propag."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"10615","DOI":"10.1109\/TVT.2018.2866590","article-title":"Physical layer security in cooperative AF relaying networks with direct links over mixed Rayleigh and double-Rayleigh fading channels","volume":"67","author":"Pandey","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_36","unstructured":"Kov\u00e1cs, I.Z., Eggers, P.C., Olesen, K., and Petersen, L.G. (2001, January 7\u201311). Radio channel description and quality of service for TETRA direct mode operation in forest environments. Proceedings of the IEEE 54th Vehicular Technology Conference, VTC Fall, Atlantic City, NJ, USA."},{"key":"ref_37","unstructured":"Kov\u00e1cs, I.Z., Eggers, P.C., Olesen, K., and Petersen, L.G. (2002, January 24\u201328). Investigations of outdoor-to-indoor mobile-to-mobile radio communication channels. Proceedings of the IEEE 56th Vehicular Technology Conference, Vancouver, BC, Canada."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.aeue.2016.10.014","article-title":"Secrecy outage analysis with Kth best relay selection in dual-hop inter-vehicle communication systems","volume":"71","author":"Zhang","year":"2017","journal-title":"AEU\u2014Int. J. Electron. Commun."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2733","DOI":"10.1007\/s11277-020-07500-1","article-title":"Secrecy analysis of cooperative vehicular relaying networks over double-Rayleigh fading Channels","volume":"114","author":"Pandey","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1049\/iet-com.2019.0584","article-title":"Physical layer security in cooperative amplify-and-forward relay networks over mixed Nakagami-M Double Nakagami-m Fading Channels: Perform. Eval. Optimisation","volume":"14","author":"Pandey","year":"2020","journal-title":"IET Commun."},{"key":"ref_41","unstructured":"Arai, K., Bhatia, R., and Kapoor, S. (2019). Vehicle Communication Using Secrecy Capacity. Proceeding FTC, Springer International Publishing."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1049\/iet-com.2015.0236","article-title":"Outage performance of cognitive cooperative networks with relay selection over double-Rayleigh fading channels","volume":"10","author":"Duy","year":"2016","journal-title":"IET Commun."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"10335","DOI":"10.1109\/TVT.2019.2938308","article-title":"Performance analysis for multi-hop cognitive radio networks over cascaded Rayleigh fading channels with imperfect channel state information","volume":"68","author":"Lee","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"e4244","DOI":"10.1002\/dac.4244","article-title":"Secrecy outage probability of inter-vehicular cognitive radio networks","volume":"33","author":"Ata","year":"2019","journal-title":"Int. J. Commun. Sys."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Tashman, D.H., and Hamouda, W. (2020, January 7\u201311). Physical-layer security for cognitive radio networks over cascaded Rayleigh fading channels. Proceedings of the IEEE Global Communications Conference (GLOBECOM 2020), Taipei, Taiwan.","DOI":"10.1109\/GLOBECOM42002.2020.9348134"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Yadav, S., and Pandey, A. (2020, January 26\u201329). Secrecy performance of cognitive vehicular radio networks: Joint impact of nodes mobility and imperfect channel estimates. Proceedings of the IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Odessa, Ukraine.","DOI":"10.1109\/BlackSeaCom48709.2020.9235018"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/OJVT.2021.3087637","article-title":"Joint impact of nodes mobility and imperfect channel estimates on the secrecy performance of cognitive radio vehicular networks over Nakagami-M Fading Channels","volume":"2","author":"Pandey","year":"2021","journal-title":"IEEE Open J. Veh. Technol."},{"key":"ref_48","unstructured":"Gradshteyn, I.S., and Ryzhik, I.M. (2000). Tables of Integrals, Series, and Products, Academic Press. [6th ed.]."},{"key":"ref_49","unstructured":"(2021, October 18). The Wolfram Functions Site [Online]. Available online: Http:\/\/functions.wolfram.com."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TCOMM.2005.858678","article-title":"Simulation of Rayleigh-faded mobile-to-mobile communication channels","volume":"53","author":"Patel","year":"2005","journal-title":"IEEE Trans. Commun."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/TWC.2008.05913","article-title":"Modeling, analysis, and simulation of MIMO mobile-to-mobile fading channels","volume":"7","author":"Patzold","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TWC.2007.05447","article-title":"Fundamental limits of spectrum-sharing in fading environments","volume":"6","author":"Ghasemi","year":"2007","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"2368","DOI":"10.1109\/TVT.2012.2192509","article-title":"Cognitive amplify-and-forward relay networks over Nakagami-m fading","volume":"61","author":"Duong","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_54","unstructured":"Abramowitz, M., and Stegun, I.A. (1972). Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, National Bureau of Standards."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.1109\/TCOMM.2011.063011.100303A","article-title":"A new formula for the BER of binary modulations with dual-branch selection over generalized-K composite fading channels","volume":"59","author":"Ansari","year":"2011","journal-title":"IEEE Trans. Commun."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/LCOMM.2015.2504580","article-title":"Performance analysis of physical layer security over generalized-K fading channels using a mixture Gamma distribution","volume":"20","author":"Lei","year":"2016","journal-title":"IEEE Commun. Lett."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/21\/7160\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T22:12:28Z","timestamp":1721513548000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/21\/7160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,28]]},"references-count":56,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2021,11]]}},"alternative-id":["s21217160"],"URL":"https:\/\/doi.org\/10.3390\/s21217160","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,28]]}}}