Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints

Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum...

Full description

Bibliographic Details
Main Authors: Suneel Yadav, Anshul Pandey, Dinh-Thuan Do, Byung Moo Lee, Adão Silva
Format: Article
Language:English
Published: MDPI AG 2021-10-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/21/21/7160
_version_ 1827677781930016768
author Suneel Yadav
Anshul Pandey
Dinh-Thuan Do
Byung Moo Lee
Adão Silva
author_facet Suneel Yadav
Anshul Pandey
Dinh-Thuan Do
Byung Moo Lee
Adão Silva
author_sort Suneel Yadav
collection DOAJ
description Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio vehicular network, where all the nodes in the network are moving vehicles and the channels between them are modeled as double-Rayleigh fading. Furthermore, adopting an underlay approach, the communication between secondary nodes can be performed by employing two interference constraint strategies at the primary receiver; (1) Strategy I: the secondary transmitter power is constrained by the interference threshold of the primary receiver, and (2) Strategy II: the secondary transmitter power is constrained by both the interference threshold of the primary receiver and the maximum transmit power of the secondary network. Under the considered strategies, we derive the exact secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) expressions over double-Rayleigh fading. Moreover, by analyzing the asymptotic SOP behavior, we show that a full secrecy diversity of 1 can be achieved, when the average channel gain of the main link goes to infinity with a fixed average wiretap channel gain. From the ESC analysis, it is revealed that the ESC follows a scaling law of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>Θ</mo><mfenced separators="" open="(" close=")"><mo form="prefix">ln</mo><mfenced open="(" close=")"><mfrac><msubsup><mo>Ω</mo><mrow><mi>m</mi></mrow><mn>2</mn></msubsup><msubsup><mo>Ω</mo><mrow><mi>e</mi></mrow><mn>2</mn></msubsup></mfrac></mfenced></mfenced></mrow></semantics></math></inline-formula> for large <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mo>Ω</mo><mi>m</mi></msub></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mo>Ω</mo><mi>e</mi></msub></semantics></math></inline-formula>, where <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mo>Ω</mo><mi>m</mi></msub></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mo>Ω</mo><mi>e</mi></msub></semantics></math></inline-formula> are the average channel gains of the main link and wiretap link. The numerical and simulation results verify our analytical findings.
first_indexed 2024-03-10T05:52:33Z
format Article
id doaj.art-0b6000ba4d5647279b7a1d39f1747114
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T05:52:33Z
publishDate 2021-10-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-0b6000ba4d5647279b7a1d39f17471142023-11-22T21:37:29ZengMDPI AGSensors1424-82202021-10-012121716010.3390/s21217160Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing ConstraintsSuneel Yadav0Anshul Pandey1Dinh-Thuan Do2Byung Moo Lee3Adão Silva4Department of Electronics and Communication Engineering, Indian Institute of Information Technology Allahabad, Prayagraj 211015, IndiaSecure Systems Research Center, Technology Innovation Institute, Abu Dhabi 9639, United Arab EmiratesDepartment of Computer Science and Information Engineering, College of Information and Electrical Engineering, Asia University, 500 Lioufeng Rd., Wufeng, Taichung 41354, TaiwanDepartment of of Intelligent Mechatronics Engineering, and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, KoreaInstituto de Telecomunicações (IT) and Departamento de Eletrónica, Telecomunicações e Informática (DETI), University of Aveiro, 3810-193 Aveiro, PortugalVehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio vehicular network, where all the nodes in the network are moving vehicles and the channels between them are modeled as double-Rayleigh fading. Furthermore, adopting an underlay approach, the communication between secondary nodes can be performed by employing two interference constraint strategies at the primary receiver; (1) Strategy I: the secondary transmitter power is constrained by the interference threshold of the primary receiver, and (2) Strategy II: the secondary transmitter power is constrained by both the interference threshold of the primary receiver and the maximum transmit power of the secondary network. Under the considered strategies, we derive the exact secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) expressions over double-Rayleigh fading. Moreover, by analyzing the asymptotic SOP behavior, we show that a full secrecy diversity of 1 can be achieved, when the average channel gain of the main link goes to infinity with a fixed average wiretap channel gain. From the ESC analysis, it is revealed that the ESC follows a scaling law of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>Θ</mo><mfenced separators="" open="(" close=")"><mo form="prefix">ln</mo><mfenced open="(" close=")"><mfrac><msubsup><mo>Ω</mo><mrow><mi>m</mi></mrow><mn>2</mn></msubsup><msubsup><mo>Ω</mo><mrow><mi>e</mi></mrow><mn>2</mn></msubsup></mfrac></mfenced></mfenced></mrow></semantics></math></inline-formula> for large <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mo>Ω</mo><mi>m</mi></msub></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mo>Ω</mo><mi>e</mi></msub></semantics></math></inline-formula>, where <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mo>Ω</mo><mi>m</mi></msub></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mo>Ω</mo><mi>e</mi></msub></semantics></math></inline-formula> are the average channel gains of the main link and wiretap link. The numerical and simulation results verify our analytical findings.https://www.mdpi.com/1424-8220/21/21/7160physical-layer securitycognitive radio vehicular networks (CRVNs)secrecy outage probability (SOP)ergodic secrecy capacity (ESC)double-Rayleigh fading channels
spellingShingle Suneel Yadav
Anshul Pandey
Dinh-Thuan Do
Byung Moo Lee
Adão Silva
Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
Sensors
physical-layer security
cognitive radio vehicular networks (CRVNs)
secrecy outage probability (SOP)
ergodic secrecy capacity (ESC)
double-Rayleigh fading channels
title Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_full Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_fullStr Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_full_unstemmed Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_short Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_sort secure cognitive radio enabled vehicular communications under spectrum sharing constraints
topic physical-layer security
cognitive radio vehicular networks (CRVNs)
secrecy outage probability (SOP)
ergodic secrecy capacity (ESC)
double-Rayleigh fading channels
url https://www.mdpi.com/1424-8220/21/21/7160
work_keys_str_mv AT suneelyadav securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints
AT anshulpandey securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints
AT dinhthuando securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints
AT byungmoolee securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints
AT adaosilva securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints