Abstract
Energy harvesting has lately been of particular attention to researchers. In addition, cognitive radio networks (CRNs) are recognized as an attainable measure for the problem of radio spectrum shortage in next generation radio access. A combination of these two technologies, which forms energy harvesting CRNs (EHCRNs), allows wireless communication terminals to prolong their operation time in limited spectrum scenarios. Nonetheless, that CRNs create opportunities for secondary users to access primary users’ spectrum induces vulnerability of message security. So far, security capability analysis of EHCRNs has been limited to Rayleigh fading whilst Nakagami-m fading is more common than Rayleigh fading and better reflects distinct fading severity degrees in practical scenarios. Accordingly, this paper firstly offers the precise security capability analysis of EHCRNs under interference power constraint, Nakagami-m fading, maximum transmit power constraint, and primary interference. Then, the offered analysis is ratified by computer simulations. Ultimately, multiple results reveal that the security capability is considerably improved with smaller primary interference and lower required security threshold. Moreover, the security capability is significantly impacted by channel severity and is optimized with appropriate selection of time percentage.
Similar content being viewed by others
References
Ding, X., Zou, Y., Zhang, G., Chen, X., Wang, X., & Hanzo, L. (2019). The security–reliability tradeoff of multiuser scheduling-aided energy harvesting cognitive radio networks. IEEE Transactions on Communications, 67(6), 3890–3904. https://doi.org/10.1109/TCOMM.2019.2904258.
Lopez-Yela, A., & Segovia-Vargas, D. (2017). A triple-band bow-tie rectenna for RF energy harvesting without matching network. In Paper presented at the 2017 IEEE wireless power transfer conference (WPTC).
Zhao, N., Zhang, S., Yu, F. R., Chen, Y., Nallanathan, A., & Leung, V. C. M. (2017). Exploiting interference for energy harvesting: A survey, research issues, and challenges. IEEE Access, 5, 10403–10421.
Huang, K., & Zhou, X. (2015). Cutting the last wires for mobile communications by microwave power transfer. IEEE Communications Magazine, 53(6), 86–93.
Bito, J., Palazzi, V., Hester, J., Bahr, R., Alimenti, F., Mezzanotte, P., & Tentzeris, M. M. (2017). Millimeter-wave ink-jet printed RF energy harvester for next generation flexible electronics. In Paper presented at the 2017 IEEE wireless power transfer conference (WPTC).
Khattab, A., Elgaml, N., & Mourad, H. (2019). Single-channel slotted contention in cognitive radio vehicular networks. IET Communications, 13(8), 1078–1089.
Liu, M., Zhang, J., Lin, Y., Wu, Z., Shang, B., & Gong, F. (2019). Carrier frequency estimation of time-frequency overlapped MASK signals for underlay cognitive radio network. IEEE Access, 7, 58277–58285.
Moualeu, J. M., Sofotasios, P., Benevides, D., Muhaidat, S., Hamouda, W., & Dias, U. (2019). Physical-layer security of SIMO communication systems over multipath fading conditions. IEEE Transactions on Sustainable Computing,. https://doi.org/10.1109/TSUSC.2019.2915547.
Lei, H., Yang, Z., Park, K., Ansari, I. S., Guo, Y., Pan, G., et al. (2019). Secrecy outage analysis for cooperative NOMA systems with relay selection schemes. IEEE Transactions on Communications,. https://doi.org/10.1109/TCOMM.2019.2916070.
Singh, A., Bhatnagar, M. R., & Mallik, R. K. (2016). Secrecy outage of a simultaneous wireless information and power transfer cognitive radio system. IEEE Wireless Communications Letters, 5(3), 288–291.
Yan, P., Zou, Y., & Zhu, J. (2018). Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems. IEEE Transactions on Vehicular Technology, 67(3), 2084–2096.
Mobini, Z., & Mohammadi, M. (2017). Secure spectrum-sharing networks with full-duplex multiple-antenna wireless-powered secondary system. In Paper presented at the 2017 IEEE international black sea conference on communications and networking (BlackSeaCom).
Lei, H., Xu, M., Ansari, I. S., Pan, G., Qaraqe, K. A., & Alouini, M. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transactions on Green Communications and Networking, 1(2), 192–203.
Liu, Y., Wang, L., Zaidi, S. A. R., Elkashlan, M., & Duong, T. Q. (2016). Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model. IEEE Transactions on Communications, 64(1), 329–342.
Mou, W., Yang, W., Xu, X., Li, X., & Cai, Y. (2016). Secure transmission in spectrum-sharing cognitive networks with wireless power transfer. In Paper presented at the 2016 8th international conference on wireless communications & signal processing (WCSP).
Ho-Van, K., & Do-Dac, T. (2019). Performance analysis of jamming technique in energy harvesting cognitive radio networks. Telecommunication Systems, 70(3), 321–336.
Hieu, T. D., Duy, T. T., & Choi, S. G. (2018). Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper. In Paper presented at the 2018 20th international conference on advanced communication technology (ICACT).
Maji, P., Prasad, B., Roy, S. D., & Kundu, S. (2018). Secrecy outage of a cognitive radio network with selection of energy harvesting relay and imperfect CSI. Wireless Personal Communications, 100(2), 571–586.
Benedict, F. P., Maji, P., Roy, S. D., & Kundu, S. (2017). Secrecy analysis of a cognitive radio network with an energy harvesting AF relay. In Paper presented at the 2017 international conference on wireless communications, signal processing and networking (WiSPNET).
Maji, P., Roy, S. D., & Kundu, S. (2018). Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link. IET Communications, 12(11), 1389–1395.
Raghuwanshi, S., Maji, P., Roy, S. D., & Kundu, S. (2016). Secrecy performance of a dual hop cognitive relay network with an energy harvesting relay. In Paper presented at the 2016 international conference on advances in computing, communications and informatics (ICACCI).
Ho-Van, K., & Do-Dac, T. (2018). Eavesdropping-decoding compromise in spectrum sharing paradigm with ES-capable AF relay. Wireless Networks,. https://doi.org/10.1007/s11276-018-1878-x.
Ho-Van, K., & Do-Dac, T. (2019). Relaying communications in energy scavenging cognitive networks: Secrecy outage probability analysis. Wireless Communications and Mobile Computing,. https://doi.org/10.1155/2019/2109837.
Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series, and products, edited by A. New York: Jeffrey Academic.
Ho-Van, K., & Do-Dac, T. (2018). Security performance analysis of underlay cognitive networks with helpful jammer under interference from primary transmitter. Mobile Networks and Applications,. https://doi.org/10.1007/s11036-018-1185-x.
Ho-Van, K. (2017). Influence of channel information imperfection on outage probability of cooperative cognitive networks with partial relay selection. Wireless Personal Communications, 94(4), 3285–3302.
Yulong, Z., Xianbin, W., & Weiming, S. (2013). Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Transactions on Communications, 61(12), 5103–5113.
Papoulis, A., & Pillai, S. U. (2002). Probability, random variables, and stochastic processes. New York: Tata McGraw-Hill Education.
Acknowledgements
This paper was funded by the scientific research fund of Thu Dau Mot University through a scientific topic called Physical Performance Information Security Analysis in Cognitive Radio Network.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1: Proof of Theorem 1
Rewrite \(\varUpsilon \left( {{P_s}} \right) \) in (18) as
Conditioned on \(P_s\), \(\varPsi _d\) and \(\varPsi _e\) are statistically independent. Accordingly, the jointly conditional PDF of \(\varPsi _d\) and \(\varPsi _e\), \({{f_{{\varPsi _d},{\varPsi _e}}}\left( {\left. {x,y} \right| {P_s}} \right) }\), can be rewritten as a product of marginal PDFs: \({f_{{\varPsi _d},{\varPsi _e}}}\left( {\left. {x,y} \right| {P_s}} \right) = {f_{{\varPsi _d}}}\left( {\left. x \right| {P_s}} \right) {f_{{\varPsi _e}}}\left( {\left. y \right| {P_s}} \right). \) Inserting this result into (45), one has
To numerically evaluate (46), one needs to obtain two expressions of \({F_{{\varPsi _d}}}\left( {\left. \rho \right| {P_s}} \right) \) and \({f_{{\varPsi _e}}}\left( {\left. y \right| {P_s}} \right) \). In the sequel, they are derived.
A. The expression of \({F_{{\varPsi _d}}}\left( {\left. \rho \right| {P_s}} \right) \)
Conditioned on \({P_s}\), the CDF of \(\varPsi _d\) is derived by using its explicit form in (11) as
Using (1) for \({f_{{g_6}}}\left( \cdot \right) \) and (3) for \({F_{{g_3}}}\left( \cdot \right) \), one rewrites (47) as
Utilizing the binomial expansion in [24, Eq. (1.111)], (48) is simplified as
The last integral in (49) is computed with the aid of [24, Eq. (3.381.4)] as
B. The expression of \({f_{{\varPsi _e}}}\left( {\left. x \right| {P_s}} \right) \)
Following the derivation of (50), one can obtain the CDF of \(\varPsi _e\) as
By taking the derivative of \({F_{{\varPsi _e}}}\left( {\left. x \right| {P_s}} \right) \) with respect to x, one represents the conditional PDF of \(\varPsi _e\) as
where \(H_1\) is given by (38) and
C. The expression of \(\varUpsilon \left( {{P_s}} \right) \)
Substituting \(\rho ={{2^{{C_0}}}\left( {1 + x} \right) - 1}\) into (50) results in
Performing the binomial expansion to \({{{\left( {x + 1 - {2^{ - {C_0}}}} \right) }^t}}\) and after some simplifications, one can write (58) in a compact form as
where \(Q_1\) and \(Q_3\) are respectively given by (33) and (35), and
Inserting (59) and (52) into (46), one obtains
The integrals in (63) are solved with the aid of Lemmas 2 and 3, reducing (63) to
Inserting \({{\bar{H}}}_2\), \({{\bar{H}}}_3\), \({{\bar{H}}}_4\), \({{\bar{H}}}_5\), \(\bar{H}_6\), \({{\bar{Q}}}_2\), \({{\bar{Q}}}_4\), \({{\bar{Q}}}_5\) in (53), (54), (55), (56), (57), (60), (61), (62) into (64) and then using the new notations of \(Q_2\), \(Q_4\), \(Q_5\), \(H_2\), \(H_3\) in (34), (36), (37), (39), (40), respectively, one can reduce (64)–(31), finishing the proof.
Appendix 2: Proof of Theorem 2
According to the definition of the CDF, one obtains
It is recalled that \(\gamma \left( {a,u} \right) = \int \limits _0^u {{e^{ - t}}{t^{a - 1}}dt}\) and \(\varGamma \left( {a,u} \right) = \int \limits _u^\infty {{e^{ - t}}{t^{a - 1}}dt}\) where u is a function of x. Applying the Leibnitz differentiation [28], the first derivatives of \(\gamma \left( {a,u} \right) \) and \(\varGamma \left( {a,u} \right) \) with respect to x are respectively given by
The PDF of \(P_s\) can be achieved by taking the derivative of \({F_{{P_s}}}\left( x \right) \) in (66) with respect to x as
By applying the results in (67) and (68) and after some simplifications, one reduces (69)–(41). This completes the proof.
Rights and permissions
About this article
Cite this article
Do-Dac, T., Ho-Van, K. Energy harvesting cognitive radio networks: security analysis for Nakagami-m fading. Wireless Netw 27, 1561–1572 (2021). https://doi.org/10.1007/s11276-019-02132-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-019-02132-1