Abstract
In cognitive radio networks, direct communications between a primary sender–recipient pair may be blocked due to uncertainties such as deep fading. Therefore, this paper studies overlay networks where the message of the primary sender is relayed by the secondary transmitter who also transmits its privacy message to support this communications. However, messages of the secondary transmitter may also be overheard by eavesdroppers. To secure these messages, jammers are exploited to restrict overhearing. Moreover, in order to improve energy efficiency, the secondary transmitter and all jammers only use energy harvested from primary signals for their transmission. To evaluate the security capability of both primary and secondary networks without exhaustive simulations, exact closed-form expressions of primary/secondary secrecy outage probabilities are first proposed. Then, multiple theoretical/simulated results show the validity of the proposed expressions and security improvement with increasing the number of jammers. Finally, exhaustive search based on the proposed expressions can find optimum design parameters, which perfectly serve as design instructions.
Similar content being viewed by others
Notes
The system model in [18] and [19] was studied in [23]. However, the secondary transmitter was assumed to harvest energy from the ambient rather than RF signals, considerably simplifying the analysis. Furthermore, [23] (similarly, [24]) did not employ the jamming technique. Therefore, references like [23] and [24] are not objectives to be surveyed.
In the case that N jammers are not colocated, the pdf of Z is derived by directly applying [33, eq. (5)]. However, the subsequent derivations for this case are the same as those described in this paper. Therefore, the extension of the analysis to this case is straightforward.
References
Wazid, M.; et al.: Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access 9, 4466–4489 (2020)
Gustavsson, U.; et al.: Implementation challenges and opportunities in beyond-5G and 6G communication. IEEE J. Microw. 1(1), 86–100 (2021)
López, O.L.A., et al.: Massive wireless energy transfer: enabling sustainable IoT towards 6G era. IEEE IoT J. (accepted)
Bany Salameh, H.: Quantifying the impact of time-sharing on route capacity in cognitive radio networks with full-duplex capability. IEEE Commun. Lett. 25(1), 94–98 (2021)
Zheng, K., et al.: Throughput maximization of wireless-powered communication networks: an energy threshold approach. IEEE Trans. Veh. Technol. 70(2), 1292–1306 (2021)
Zhang, M., et al.: Exploiting deep learning for secure transmission in an underlay cognitive radio network. IEEE Trans. Veh. Technol. 70(1), 726–741 (2021)
Ho-Van, K.; et al.: Security enhancement for energy harvesting cognitive networks with relay selection. Wire. Commun. Mob. Comput. 2020, 1–13 (2020)
Koca, M.; et al.: Empirical feasibility analysis for energy harvesting intravehicular wireless sensor networks. IEEE IoT J. 8(1), 179–186 (2021)
Schmickl, S.; et al.: An RF-energy harvester and ir-uwb transmitter for ultra-low-power battery-less biosensors. IEEE Trans. Circuits Syst. I Regul. Pap. 67(5), 1459–1468 (2020)
Le Anh, T.; et al.: Secrecy performance of a multi-NOMA–MIMO system in the UEH Relaying Network Using the PSO algorithm. IEEE Access 9, 2317–2331 (2020)
Nie, Y.; et al.: Achievable rate region of energy-harvesting based secure two-way buffer-aided relay networks. IEEE Trans. Inf. Forens. Secur. 16, 1610–1625 (2020)
Stai, E.; et al.: Optimal resource allocation in multihop wireless networks relying on energy harvesting. IEEE Commun. Lett. 25(1), 224–228 (2021)
Budhiraja, I., et al.: SWIPT-enabled D2D communication underlaying NOMA-based cellular networks in imperfect CSI. IEEE Trans. Veh. Technol. 70(1), 692–699 (2021)
Kim, B., et al.: Joint channel estimation, training design, Tx power allocation, and Rx power splitting for MIMO SWIPT systems. IEEE Commun. Lett. (accepted)
Masotti, D.; et al.: RF systems design for simultaneous wireless information and power transfer (SWIPT) in automation and transportation. IEEE J. Microw. 1(1), 164–175 (2021)
Thapar, S., et al.: Decoding orders for securing untrusted NOMA. IEEE Netw. Lett. 3(1), 27–30 (2021)
Abdullah, Z.; et al.: Enhanced secrecy performance of multihop iot networks with cooperative hybrid-duplex jamming. IEEE Trans. Inf. Forens. Secur. 16, 161–172 (2020)
Su, R., et al.: Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems. In: Proceedings of the IEEE WCNC, Barcelona, Spain, pp. 1–6 (2018)
Su, R., et al.: Secure cooperative transmission in cognitive AF relay systems with destination-aided jamming and energy harvesting. In: Proceedings of the IEEE PIMRC, Istanbul, Turkey, pp. 1–5 (2019)
Wang, D.; et al.: Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks. IEEE Trans. Cogn. Commun. Netw. 6(2), 683–693 (2020)
Xu, M.; et al.: Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks. In: Proceedings of the IEEE WCNC, Barcelona, Spain, pp. 1–6 (2018)
Dang-Ngoc, H., et al.: Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise. In: Proceedings of the IEEE SigTelCom, Hanoi, Vietnam, 28–29, pp. 77–81 (2020)
Chen, L.; et al.: Primary secrecy is achievable: optimal secrecy rate in overlay CRNs with an energy harvesting secondary transmitter. In: Proceedings of the ICCCN, Las Vegas, USA, pp. 1–6 (2015)
Li, M.; et al.: Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Trans. Veh. Technol. 67(11), 11274–11279 (2018)
Gradshteyn, I.S.; Ryzhik, I.M.: Table of Integrals, Series and Products, 6th edn. Academic, San Diego (2000)
Ho-Van, K.; et al.: Security performance of underlay cognitive relaying networks with energy harvesting. Wirel. Pers. Commun. 110(2), 829–846 (2020)
Ho-Van, K.; et al.: Security analysis for underlay cognitive network with energy scavenging capable relay over Nakagami-m fading channels. Wirel. Commun. Mob. Comput. 2019, 1–16 (2019)
Nguyen-Huu, P.; et al.: Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer. IET Commun. 13(13), 1877–1885 (2019)
Ge, L.; et al.: Performance analysis for multihop cognitive radio networks with energy harvesting by using stochastic geometry. IEEE IoT J. 7(2), 1154–1163 (2020)
Solanki, S.; et al.: Performance analysis of piece-wise linear model of energy harvesting-based multiuser overlay spectrum sharing networks. IEEE OJ-CS 1, 1820–1836 (2020)
Bayat, S.; et al.: Resource allocation for MC MISO-NOMA SWIPT-enabled hetnets with non-linear energy harvesting. IEEE Access 8, 192270–192281 (2020)
Wang, F., et al.: Secure resource allocation for polarization-based non-linear energy harvesting over 5G cooperative CRNs. IEEE Wire. Commun. Lett. (accepted)
Lei, H.; et al.: Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-\(m\) channels. IEEE Trans. Veh. Technol. 65(12), 10126–10132 (2016)
Acknowledgements
This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2019.318. We would like to thank Ho Chi Minh City University of Technology (HCMUT), VNU-HCM for the support of time and facilities for this study.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ho-Van, K., Do-Dac, T. Overlay Networks with Jamming and Energy Harvesting: Security Analysis. Arab J Sci Eng 46, 9713–9724 (2021). https://doi.org/10.1007/s13369-021-05492-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-021-05492-z