Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints

Physical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a...

Full description

Bibliographic Details
Main Authors: Mounia Bouabdellah, Faissal El Bouanani, Paschalis C. Sofotasios, Sami Muhaidat, Daniel Benevides Da Costa, Kahtan Mezher, Hussain Ben-Azza, George K. Karagiannidis
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8910590/
_version_ 1818412614497075200
author Mounia Bouabdellah
Faissal El Bouanani
Paschalis C. Sofotasios
Sami Muhaidat
Daniel Benevides Da Costa
Kahtan Mezher
Hussain Ben-Azza
George K. Karagiannidis
author_facet Mounia Bouabdellah
Faissal El Bouanani
Paschalis C. Sofotasios
Sami Muhaidat
Daniel Benevides Da Costa
Kahtan Mezher
Hussain Ben-Azza
George K. Karagiannidis
author_sort Mounia Bouabdellah
collection DOAJ
description Physical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a cost of increased computational complexity that needs to be maintained within sustainable levels. In the present contribution, we investigate the physical-layer security of a dual-hop energy RF-Powered cognitive radio network over realistic multipath fading conditions. Assuming a spectrum sharing scenario, our analysis assumes that a source S communicates with a destination D with the aid of a multi-antenna relay R and in the presence of an eavesdropper E who is attempting to overhear the communication of both S-R and R-D links. The involved relay is powered by the renewable energy harvested from the signal sent by the source based on the power-splitting energy harvesting strategy. Furthermore, the relay uses a maximum ratio combining technique to process effectively the received signals. In addition, owing to the underlying strategy, both S and R adjust their respective transmit powers in order to avoid causing interference to the primary network. By considering both the independent identically distributed and the independent but not necessarily identically distributed flat Rayleigh fading channels, closed-form expressions for the secrecy outage probability are derived, based on which an asymptotic analysis is carried out. Our results quantify the impact of the main key system parameters and point out the optimal values ensuring a high-security performance of such a communication system. The validity of the derived results is verified extensively through comparisons with respective Monte Carlo simulation results and useful theoretical and technical insights are developed which are expected to be useful in the design of future cooperative CRNs.
first_indexed 2024-12-14T10:50:07Z
format Article
id doaj.art-321ae290f5594e98ba571c6b4f430487
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-14T10:50:07Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-321ae290f5594e98ba571c6b4f4304872022-12-21T23:05:16ZengIEEEIEEE Access2169-35362019-01-01717332917334310.1109/ACCESS.2019.29552058910590Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security ConstraintsMounia Bouabdellah0https://orcid.org/0000-0003-0964-8914Faissal El Bouanani1https://orcid.org/0000-0001-8141-6793Paschalis C. Sofotasios2https://orcid.org/0000-0001-8389-0966Sami Muhaidat3https://orcid.org/0000-0003-4649-9399Daniel Benevides Da Costa4https://orcid.org/0000-0002-5439-7475Kahtan Mezher5https://orcid.org/0000-0001-6230-7823Hussain Ben-Azza6https://orcid.org/0000-0003-4087-7010George K. Karagiannidis7https://orcid.org/0000-0001-8810-0345ENSIAS, Mohammed V University at Rabat, Rabat, MoroccoENSIAS, Mohammed V University at Rabat, Rabat, MoroccoDepartment of Electrical and Computer Engineering, Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab EmiratesDepartment of Electrical and Computer Engineering, Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab EmiratesDepartment of Computer Engineering, Federal University of Ceará (UFC), Sobral, BrazilDepartment of Electrical and Computer Engineering, Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab EmiratesENSAM, Moulay Ismail University at Meknes, Meknes, MoroccoDepartment of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, GreecePhysical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a cost of increased computational complexity that needs to be maintained within sustainable levels. In the present contribution, we investigate the physical-layer security of a dual-hop energy RF-Powered cognitive radio network over realistic multipath fading conditions. Assuming a spectrum sharing scenario, our analysis assumes that a source S communicates with a destination D with the aid of a multi-antenna relay R and in the presence of an eavesdropper E who is attempting to overhear the communication of both S-R and R-D links. The involved relay is powered by the renewable energy harvested from the signal sent by the source based on the power-splitting energy harvesting strategy. Furthermore, the relay uses a maximum ratio combining technique to process effectively the received signals. In addition, owing to the underlying strategy, both S and R adjust their respective transmit powers in order to avoid causing interference to the primary network. By considering both the independent identically distributed and the independent but not necessarily identically distributed flat Rayleigh fading channels, closed-form expressions for the secrecy outage probability are derived, based on which an asymptotic analysis is carried out. Our results quantify the impact of the main key system parameters and point out the optimal values ensuring a high-security performance of such a communication system. The validity of the derived results is verified extensively through comparisons with respective Monte Carlo simulation results and useful theoretical and technical insights are developed which are expected to be useful in the design of future cooperative CRNs.https://ieeexplore.ieee.org/document/8910590/Cognitive radio networkenergy harvestingmaximum ratio combiningphysical layer securitypower splittinginterference
spellingShingle Mounia Bouabdellah
Faissal El Bouanani
Paschalis C. Sofotasios
Sami Muhaidat
Daniel Benevides Da Costa
Kahtan Mezher
Hussain Ben-Azza
George K. Karagiannidis
Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints
IEEE Access
Cognitive radio network
energy harvesting
maximum ratio combining
physical layer security
power splitting
interference
title Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints
title_full Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints
title_fullStr Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints
title_full_unstemmed Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints
title_short Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints
title_sort cooperative energy harvesting cognitive radio networks with spectrum sharing and security constraints
topic Cognitive radio network
energy harvesting
maximum ratio combining
physical layer security
power splitting
interference
url https://ieeexplore.ieee.org/document/8910590/
work_keys_str_mv AT mouniabouabdellah cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints
AT faissalelbouanani cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints
AT paschaliscsofotasios cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints
AT samimuhaidat cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints
AT danielbenevidesdacosta cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints
AT kahtanmezher cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints
AT hussainbenazza cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints
AT georgekkaragiannidis cooperativeenergyharvestingcognitiveradionetworkswithspectrumsharingandsecurityconstraints