Visible to the public Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User

TitleSecurity Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
Publication TypeConference Paper
Year of Publication2018
AuthorsMu, Li, Mianquan, Li, Yuzhen, Huang, Hao, Yin, Yan, Wang, Baoquan, Ren, Xiaofei, Qu, Rui, Yu
Conference Name2018 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)
ISBN Number978-1-5386-7946-3
KeywordsCognitive radio, Cognitive Radio Security, diversity reception, Maximum ratio combining, maximum ratio combining scheme, MRC scheme, overlay cognitive wireless networks, physical layer security, power system reliability, primary transmission security, primary user information secrecy performance, primary user information security, probability, programmable logic arrays, pubcrawl, radio transmitters, relay links, Relays, resilience, Resiliency, secondary cooperative node, secrecy outage probability, security, security analysis, Signal to noise ratio, SOP, source information, telecommunication security, tight lower bound expression, transmission secrecy performance, transmit power, untrusted energy-limited secondary cooperative user, untrusted relaying, untrusted secondary user, wireless networks
Abstract

In this article, we study the transmission secrecy performance of primary user in overlay cognitive wireless networks, in which an untrusted energy-limited secondary cooperative user assists the primary transmission to exchange for the spectrum resource. In the network, the information can be simultaneously transmitted through the direct and relay links. For the enhancement of primary transmission security, a maximum ratio combining (MRC) scheme is utilized by the receiver to exploit the two copies of source information. For the security analysis, we firstly derive the tight lower bound expression for secrecy outage probability (SOP). Then, three asymptotic expressions for SOP are also expressed to further analyze the impacts of the transmit power and the location of secondary cooperative node on the primary user information security. The findings show that the primary user information secrecy performance enhances with the improvement of transmit power. Moreover, the smaller the distance between the secondary node and the destination, the better the primary secrecy performance.

URLhttps://ieeexplore.ieee.org/document/8567754
DOI10.1109/ICSPCC.2018.8567754
Citation Keymu_security_2018