Reliability-Intercept Gap Analysis of Underlay Cognitive Networks Under Artificial Noise and Primary Interference | Wireless Personal Communications Skip to main content
Log in

Reliability-Intercept Gap Analysis of Underlay Cognitive Networks Under Artificial Noise and Primary Interference

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Underlay mode of cognitive radio networks (CRNs) permits secondary users (SUs) to simultaneously operate with primary users (PUs), inducing mutual interference between them. Nevertheless, primary interference (interference from PUs to SUs) is either neglected or treated as Gaussian noise in existing works. Moreover, artificial noise, which is deliberately introduced to harm signal reception of wire-tappers, can enhance information securing capability of CRNs. This paper analyzes a gap between reliability probability (successful decoding probability of legitimate receiver) and intercept probability (successful decoding probability of wire-tappers), which accounts for artificial noise, peak transmit power constraint, interference power constraint, and fading channels, and considers primary interference as non-Gaussian noise. Towards this end, exact closed-form expressions of reliability probability and intercept probability are first derived and then validated by computer simulations. Numerous results illustrate that both probabilities are saturated at either large peak interference power or large peak transmit power, the primary interference dramatically deteriorates them while the artificial noise creates a large gap between them, demonstrating its effectiveness in securing legitimate information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. This can be alternatively interpreted that artificial noise is transmitted in the null space to D.

References

  1. Panwar, N., Sharma, S., & Singh, A. K. (2016). A survey on 5G: The next generation of mobile communication. Elsevier Physical Communication, 18(2), 64–84.

    Article  Google Scholar 

  2. Tavana, M., Rahmati, A., Shah-Mansouri, V., & Maham, B. (2017). Cooperative sensing with joint energy and correlation detection in cognitive radio networks. IEEE Communications Letters, 21(1), 132–135.

    Article  Google Scholar 

  3. Ho-Van, K., Sofotasios, P. C., & Freear, S. (2014). Underlay cooperative cognitive networks with imperfect Nakagami-m fading channel information and strict transmit power constraint: Interference statistics and outage probability analysis. IEEE/KICS Journal of Communications and Networks, 16(1), 10–17.

    Article  Google Scholar 

  4. Darsena, D., Gelli, G., & Verde, F. (2017). An opportunistic spectrum access scheme for multicarrier cognitive sensor networks. IEEE Sensors Journal, 17(8), 2596–2606.

    Article  Google Scholar 

  5. Liu, Y., Chen, H. H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Communications Surveys and Tutorials, 19(1), 347–376. (first quarter).

    Article  Google Scholar 

  6. Zhihui, S., Yi, Q., & Song, C. (2013). On physical layer security for cognitive radio networks. IEEE Network, 27, 28–33.

    Article  Google Scholar 

  7. Li, J., Feng, Z., Feng, Z., & Zhang, P. (2015). A survey of security issues in Cognitive Radio Networks. China Communications, 12, 132–150.

    Article  Google Scholar 

  8. Yulong, Z., Jia, Z., Liuqing, Y., Ying-chang, L., & Yu-dong, Y. (2015). Securing physical-layer communications for cognitive radio networks. IEEE Communications Magazine, 53, 48–54.

    Google Scholar 

  9. Sharma, R., & Rawat, D. (2015). Securing physical-layer communications for cognitive radio networks: A Survey. IEEE Communications Surveys and Tutorials, 17, 1023–1043.

    Article  Google Scholar 

  10. Zheng, T. X., & Wang, H. M. (2016). Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers. IEEE Transactions on Vehicular Technology, 65(10), 8812–8817.

    Article  Google Scholar 

  11. Hu, J., Cai, Y., Yang, N., Zhou, X., & Yang, W. (2017). Artificial-noise-aided secure transmission scheme with limited training and feedback overhead. IEEE Transactions on Wireless Communications, 16(1), 193–205.

    Article  Google Scholar 

  12. Wang, C., & Wang, H. M. (2014). On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Transactions on Information Forensics and Security, 9(11), 1814–1827.

    Article  Google Scholar 

  13. Ho-Van, K. (2016). Exact outage probability analysis of proactive relay selection in cognitive radio networks with MRC receivers. IEEE/KICS Journal of Communications and Networks, 18(3), 288–298.

    Article  Google Scholar 

  14. Wang, D., Ren, P., Du, Q., Sun, L., & Wang, Y. (2016). Cooperative relaying and jamming for primary secure communication in cognitive two-way networks. In Proceedings of IEEE VTC, Nanjing, China, 15–18 May (pp. 1–5).

  15. Fang, B., Qian, Z., Zhong, W., & Shao, W. (2015). AN-aided secrecy precoding for SWIPT in cognitive MIMO broadcast channels. IEEE Communications Letters, 19(9), 1632–1635.

    Article  Google Scholar 

  16. Nguyen, V. D., Duong, T. Q., Dobre, O. A., & Shin, O. S. (2016). Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Transactions on Information Forensics and Security, 11(11), 2609–2623.

    Article  Google Scholar 

  17. Fang, B., Qian, Z., Shao, W., & Zhong, W. (2016). Precoding and artificial noise design for cognitive MIMOME wiretap channels. IEEE Transactions on Vehicular Technology, 65(8), 6753–6758.

    Article  Google Scholar 

  18. Wu, Y., Chen, X., & Chen, X. (2015). Secure beamforming for cognitive radio networks with artificial noise. In: Proceedings of IEEE WCSP, Nanjing, China, 15–17 Oct (pp. 1–5).

  19. Hu, X., Zhang, X., Huang, H., & Li, Y. (2016). Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers. In Proceedings of IEEE PIMRC, Valencia, Spain, 4–7 Sept (pp. 1–6).

  20. Cai, Y., Xu, X., & Yang, W. (2016). Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise. IET Communications, 10(15), 1904–1913.

    Article  Google Scholar 

  21. Li, Z., Jing, T., Cheng, X., Huo. Y., Zhou, W., & Chen, D. (2015). Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks. In Proceedings of IEEE ICC, London, UK, 8–12 Jun (pp. 7609–7614).

  22. Liu, W., Guo, L., Kang, T., Zhang, J., & Lin, J. (2015). Secure cognitive radio system with cooperative secondary networks. In Proceedings of IEEE ICT, Sydney, Australia (27–29 pp. 6–10.)

  23. He, T., Chen, H., & Liu, Q. (2013). QoS-based beamforming with cooperative jamming in Cognitive Radio Networks. In Proceedings of ICCCAS, Chengdu, China, 15–17 Nov (pp. 42–45).

  24. Liu, W., Sarkar, M. Z. I., & Ratnarajah, T. (2014). On the security of cognitive radio networks: Cooperative jamming with relay selection. In Proceedings of EuCNC, Bologna, Italy, 23–26 June (pp. 1–5).

  25. Liu, W., Sarkar, M. Z. I., Ratnarajah, T., & Du, H. (2017). Securing cognitive radio with a combined approach of beamforming and cooperative jamming. IET Communications, 11(1), 1–9.

    Article  Google Scholar 

  26. Zou, Y. (2017). Physical-layer security for spectrum sharing systems. IEEE Transactions on Wireless Communications, 16(2), 1319–1329.

    Article  Google Scholar 

  27. Biglieri, E., Proakis, J., & Shamai, S. (1998). Fading channels: Information-theoretic and communications aspects. IEEE Transactions on Information Theory, 44(6), 2619–2692.

    Article  MathSciNet  MATH  Google Scholar 

  28. Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series and products (6th ed.). San Diego, CA: Academic.

    MATH  Google Scholar 

  29. Ahmed, N., Khojastepour, M., & Aazhang, B. (2004). Outage minimization and optimal power control for the fading relay channel. In Proceedings of IEEE Information Theory Workshop (pp. 458–462). San Antonio, TX, USA

Download references

Acknowledgements

This research is funded by Vietnam National University Ho Chi Minh City (VNU-HCM) under grant number B2019-20-01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khuong Ho-Van.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ho-Van, K., Do-Dac, T. Reliability-Intercept Gap Analysis of Underlay Cognitive Networks Under Artificial Noise and Primary Interference. Wireless Pers Commun 105, 709–724 (2019). https://doi.org/10.1007/s11277-018-6044-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-6044-3

Keywords

Navigation