Abstract
Underlay mode of cognitive radio networks (CRNs) permits secondary users (SUs) to simultaneously operate with primary users (PUs), inducing mutual interference between them. Nevertheless, primary interference (interference from PUs to SUs) is either neglected or treated as Gaussian noise in existing works. Moreover, artificial noise, which is deliberately introduced to harm signal reception of wire-tappers, can enhance information securing capability of CRNs. This paper analyzes a gap between reliability probability (successful decoding probability of legitimate receiver) and intercept probability (successful decoding probability of wire-tappers), which accounts for artificial noise, peak transmit power constraint, interference power constraint, and fading channels, and considers primary interference as non-Gaussian noise. Towards this end, exact closed-form expressions of reliability probability and intercept probability are first derived and then validated by computer simulations. Numerous results illustrate that both probabilities are saturated at either large peak interference power or large peak transmit power, the primary interference dramatically deteriorates them while the artificial noise creates a large gap between them, demonstrating its effectiveness in securing legitimate information.
Similar content being viewed by others
Notes
This can be alternatively interpreted that artificial noise is transmitted in the null space to D.
References
Panwar, N., Sharma, S., & Singh, A. K. (2016). A survey on 5G: The next generation of mobile communication. Elsevier Physical Communication, 18(2), 64–84.
Tavana, M., Rahmati, A., Shah-Mansouri, V., & Maham, B. (2017). Cooperative sensing with joint energy and correlation detection in cognitive radio networks. IEEE Communications Letters, 21(1), 132–135.
Ho-Van, K., Sofotasios, P. C., & Freear, S. (2014). Underlay cooperative cognitive networks with imperfect Nakagami-m fading channel information and strict transmit power constraint: Interference statistics and outage probability analysis. IEEE/KICS Journal of Communications and Networks, 16(1), 10–17.
Darsena, D., Gelli, G., & Verde, F. (2017). An opportunistic spectrum access scheme for multicarrier cognitive sensor networks. IEEE Sensors Journal, 17(8), 2596–2606.
Liu, Y., Chen, H. H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Communications Surveys and Tutorials, 19(1), 347–376. (first quarter).
Zhihui, S., Yi, Q., & Song, C. (2013). On physical layer security for cognitive radio networks. IEEE Network, 27, 28–33.
Li, J., Feng, Z., Feng, Z., & Zhang, P. (2015). A survey of security issues in Cognitive Radio Networks. China Communications, 12, 132–150.
Yulong, Z., Jia, Z., Liuqing, Y., Ying-chang, L., & Yu-dong, Y. (2015). Securing physical-layer communications for cognitive radio networks. IEEE Communications Magazine, 53, 48–54.
Sharma, R., & Rawat, D. (2015). Securing physical-layer communications for cognitive radio networks: A Survey. IEEE Communications Surveys and Tutorials, 17, 1023–1043.
Zheng, T. X., & Wang, H. M. (2016). Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers. IEEE Transactions on Vehicular Technology, 65(10), 8812–8817.
Hu, J., Cai, Y., Yang, N., Zhou, X., & Yang, W. (2017). Artificial-noise-aided secure transmission scheme with limited training and feedback overhead. IEEE Transactions on Wireless Communications, 16(1), 193–205.
Wang, C., & Wang, H. M. (2014). On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Transactions on Information Forensics and Security, 9(11), 1814–1827.
Ho-Van, K. (2016). Exact outage probability analysis of proactive relay selection in cognitive radio networks with MRC receivers. IEEE/KICS Journal of Communications and Networks, 18(3), 288–298.
Wang, D., Ren, P., Du, Q., Sun, L., & Wang, Y. (2016). Cooperative relaying and jamming for primary secure communication in cognitive two-way networks. In Proceedings of IEEE VTC, Nanjing, China, 15–18 May (pp. 1–5).
Fang, B., Qian, Z., Zhong, W., & Shao, W. (2015). AN-aided secrecy precoding for SWIPT in cognitive MIMO broadcast channels. IEEE Communications Letters, 19(9), 1632–1635.
Nguyen, V. D., Duong, T. Q., Dobre, O. A., & Shin, O. S. (2016). Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Transactions on Information Forensics and Security, 11(11), 2609–2623.
Fang, B., Qian, Z., Shao, W., & Zhong, W. (2016). Precoding and artificial noise design for cognitive MIMOME wiretap channels. IEEE Transactions on Vehicular Technology, 65(8), 6753–6758.
Wu, Y., Chen, X., & Chen, X. (2015). Secure beamforming for cognitive radio networks with artificial noise. In: Proceedings of IEEE WCSP, Nanjing, China, 15–17 Oct (pp. 1–5).
Hu, X., Zhang, X., Huang, H., & Li, Y. (2016). Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers. In Proceedings of IEEE PIMRC, Valencia, Spain, 4–7 Sept (pp. 1–6).
Cai, Y., Xu, X., & Yang, W. (2016). Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise. IET Communications, 10(15), 1904–1913.
Li, Z., Jing, T., Cheng, X., Huo. Y., Zhou, W., & Chen, D. (2015). Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks. In Proceedings of IEEE ICC, London, UK, 8–12 Jun (pp. 7609–7614).
Liu, W., Guo, L., Kang, T., Zhang, J., & Lin, J. (2015). Secure cognitive radio system with cooperative secondary networks. In Proceedings of IEEE ICT, Sydney, Australia (27–29 pp. 6–10.)
He, T., Chen, H., & Liu, Q. (2013). QoS-based beamforming with cooperative jamming in Cognitive Radio Networks. In Proceedings of ICCCAS, Chengdu, China, 15–17 Nov (pp. 42–45).
Liu, W., Sarkar, M. Z. I., & Ratnarajah, T. (2014). On the security of cognitive radio networks: Cooperative jamming with relay selection. In Proceedings of EuCNC, Bologna, Italy, 23–26 June (pp. 1–5).
Liu, W., Sarkar, M. Z. I., Ratnarajah, T., & Du, H. (2017). Securing cognitive radio with a combined approach of beamforming and cooperative jamming. IET Communications, 11(1), 1–9.
Zou, Y. (2017). Physical-layer security for spectrum sharing systems. IEEE Transactions on Wireless Communications, 16(2), 1319–1329.
Biglieri, E., Proakis, J., & Shamai, S. (1998). Fading channels: Information-theoretic and communications aspects. IEEE Transactions on Information Theory, 44(6), 2619–2692.
Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series and products (6th ed.). San Diego, CA: Academic.
Ahmed, N., Khojastepour, M., & Aazhang, B. (2004). Outage minimization and optimal power control for the fading relay channel. In Proceedings of IEEE Information Theory Workshop (pp. 458–462). San Antonio, TX, USA
Acknowledgements
This research is funded by Vietnam National University Ho Chi Minh City (VNU-HCM) under grant number B2019-20-01.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ho-Van, K., Do-Dac, T. Reliability-Intercept Gap Analysis of Underlay Cognitive Networks Under Artificial Noise and Primary Interference. Wireless Pers Commun 105, 709–724 (2019). https://doi.org/10.1007/s11277-018-6044-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-6044-3