Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints
Physical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8910590/ |
_version_ | 1818412614497075200 |
---|---|
author | Mounia Bouabdellah Faissal El Bouanani Paschalis C. Sofotasios Sami Muhaidat Daniel Benevides Da Costa Kahtan Mezher Hussain Ben-Azza George K. Karagiannidis |
author_facet | Mounia Bouabdellah Faissal El Bouanani Paschalis C. Sofotasios Sami Muhaidat Daniel Benevides Da Costa Kahtan Mezher Hussain Ben-Azza George K. Karagiannidis |
author_sort | Mounia Bouabdellah |
collection | DOAJ |
description | Physical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a cost of increased computational complexity that needs to be maintained within sustainable levels. In the present contribution, we investigate the physical-layer security of a dual-hop energy RF-Powered cognitive radio network over realistic multipath fading conditions. Assuming a spectrum sharing scenario, our analysis assumes that a source S communicates with a destination D with the aid of a multi-antenna relay R and in the presence of an eavesdropper E who is attempting to overhear the communication of both S-R and R-D links. The involved relay is powered by the renewable energy harvested from the signal sent by the source based on the power-splitting energy harvesting strategy. Furthermore, the relay uses a maximum ratio combining technique to process effectively the received signals. In addition, owing to the underlying strategy, both S and R adjust their respective transmit powers in order to avoid causing interference to the primary network. By considering both the independent identically distributed and the independent but not necessarily identically distributed flat Rayleigh fading channels, closed-form expressions for the secrecy outage probability are derived, based on which an asymptotic analysis is carried out. Our results quantify the impact of the main key system parameters and point out the optimal values ensuring a high-security performance of such a communication system. The validity of the derived results is verified extensively through comparisons with respective Monte Carlo simulation results and useful theoretical and technical insights are developed which are expected to be useful in the design of future cooperative CRNs. |
first_indexed | 2024-12-14T10:50:07Z |
format | Article |
id | doaj.art-321ae290f5594e98ba571c6b4f430487 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-14T10:50:07Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-321ae290f5594e98ba571c6b4f4304872022-12-21T23:05:16ZengIEEEIEEE Access2169-35362019-01-01717332917334310.1109/ACCESS.2019.29552058910590Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security ConstraintsMounia Bouabdellah0https://orcid.org/0000-0003-0964-8914Faissal El Bouanani1https://orcid.org/0000-0001-8141-6793Paschalis C. Sofotasios2https://orcid.org/0000-0001-8389-0966Sami Muhaidat3https://orcid.org/0000-0003-4649-9399Daniel Benevides Da Costa4https://orcid.org/0000-0002-5439-7475Kahtan Mezher5https://orcid.org/0000-0001-6230-7823Hussain Ben-Azza6https://orcid.org/0000-0003-4087-7010George K. Karagiannidis7https://orcid.org/0000-0001-8810-0345ENSIAS, Mohammed V University at Rabat, Rabat, MoroccoENSIAS, Mohammed V University at Rabat, Rabat, MoroccoDepartment of Electrical and Computer Engineering, Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab EmiratesDepartment of Electrical and Computer Engineering, Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab EmiratesDepartment of Computer Engineering, Federal University of Ceará (UFC), Sobral, BrazilDepartment of Electrical and Computer Engineering, Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab EmiratesENSAM, Moulay Ismail University at Meknes, Meknes, MoroccoDepartment of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, GreecePhysical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a cost of increased computational complexity that needs to be maintained within sustainable levels. In the present contribution, we investigate the physical-layer security of a dual-hop energy RF-Powered cognitive radio network over realistic multipath fading conditions. Assuming a spectrum sharing scenario, our analysis assumes that a source S communicates with a destination D with the aid of a multi-antenna relay R and in the presence of an eavesdropper E who is attempting to overhear the communication of both S-R and R-D links. The involved relay is powered by the renewable energy harvested from the signal sent by the source based on the power-splitting energy harvesting strategy. Furthermore, the relay uses a maximum ratio combining technique to process effectively the received signals. In addition, owing to the underlying strategy, both S and R adjust their respective transmit powers in order to avoid causing interference to the primary network. By considering both the independent identically distributed and the independent but not necessarily identically distributed flat Rayleigh fading channels, closed-form expressions for the secrecy outage probability are derived, based on which an asymptotic analysis is carried out. Our results quantify the impact of the main key system parameters and point out the optimal values ensuring a high-security performance of such a communication system. The validity of the derived results is verified extensively through comparisons with respective Monte Carlo simulation results and useful theoretical and technical insights are developed which are expected to be useful in the design of future cooperative CRNs.https://ieeexplore.ieee.org/document/8910590/Cognitive radio networkenergy harvestingmaximum ratio combiningphysical layer securitypower splittinginterference |
spellingShingle | Mounia Bouabdellah Faissal El Bouanani Paschalis C. Sofotasios Sami Muhaidat Daniel Benevides Da Costa Kahtan Mezher Hussain Ben-Azza George K. Karagiannidis Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints IEEE Access Cognitive radio network energy harvesting maximum ratio combining physical layer security power splitting interference |
title | Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints |
title_full | Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints |
title_fullStr | Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints |
title_full_unstemmed | Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints |
title_short | Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints |
title_sort | cooperative energy harvesting cognitive radio networks with spectrum sharing and security constraints |
topic | Cognitive radio network energy harvesting maximum ratio combining physical layer security power splitting interference |
url | https://ieeexplore.ieee.org/document/8910590/ |
work_keys_str_mv | AT mouniabouabdellah cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints AT faissalelbouanani cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints AT paschaliscsofotasios cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints AT samimuhaidat cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints AT danielbenevidesdacosta cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints AT kahtanmezher cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints AT hussainbenazza cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints AT georgekkaragiannidis cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints |