Biblio
Filters: Author is Hamouda, Walaa [Clear All Filters]
Towards Improving the Security of Cognitive Radio Networks-Based Energy Harvesting. ICC 2022 - IEEE International Conference on Communications. :3436–3441.
.
2022. In this paper, physical-layer security (PLS) of an underlay cognitive radio network (CRN) operating over cascaded Rayleigh fading channels is examined. In this scenario, a secondary user (SU) transmitter communicates with a SU receiver through a cascaded Rayleigh fading channel while being exposed to eavesdroppers. By harvesting energy from the SU transmitter, a cooperating jammer attempts to ensure the privacy of the transmitted communications. That is, this harvested energy is utilized to generate and spread jamming signals to baffle the information interception at eavesdroppers. Additionally, two scenarios are examined depending on the manner in which eavesdroppers intercept messages; colluding and non-colluding eavesdroppers. These scenarios are compared to determine which poses the greatest risk to the network. Furthermore, the channel cascade effect on security is investigated. Distances between users and the density of non-colluding eavesdroppers are also investigated. Moreover, cooperative jamming-based energy harvesting effectiveness is demonstrated.
Secrecy Analysis for Energy Harvesting-Enabled Cognitive Radio Networks in Cascaded Fading Channels. ICC 2021 - IEEE International Conference on Communications. :1—6.
.
2021. Physical-layer security (PLS) for an underlay cognitive radio network (CRN)-based simultaneous wireless information and power transfer (SWIPT) over cascaded κ-µ fading channels is investigated. The network is composed of a pair of secondary users (SUs), a primary user (PU) receiver, and an eavesdropper attempting to intercept the data shared by the SUs. To improve the SUs’ data transmission security, we assume a full-duplex (FD) SU destination, which employs energy harvesting (EH) to extract the power required for generating jamming signals to be emitted to confound the eavesdropper. Two scenarios are presented and compared; harvesting and non-harvesting eavesdropper. Moreover, a trade-off between the system’s secrecy and reliability is explored. PLS is studied in terms of the probability of non-zero secrecy capacity and the intercept probability, whereas the reliability is studied in terms of the outage probability. Results reveal the great impact of jamming over the improvement of the SUs’ secrecy. Additionally, our work indicates that studying the system’s secrecy over cascaded channels has an influence on the system’s PLS that cannot be neglected.