Physical Layer Security in Cognitive Untrusted Relay Networks
In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link. Specifically, we first examine the connection...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8081736/ |
id |
doaj-b62d29a5a7a44c049ca94e7c22a67729 |
---|---|
record_format |
Article |
spelling |
doaj-b62d29a5a7a44c049ca94e7c22a677292021-03-29T20:36:10ZengIEEEIEEE Access2169-35362018-01-0167055706510.1109/ACCESS.2017.27627388081736Physical Layer Security in Cognitive Untrusted Relay NetworksDechuan Chen0Yunpeng Cheng1https://orcid.org/0000-0001-6991-6197Weiwei Yang2https://orcid.org/0000-0002-0220-4088Jianwei Hu3Yueming Cai4College of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaCollege of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaCollege of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaCollege of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaCollege of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaIn this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link. Specifically, we first examine the connection outage probability (COP) and secrecy outage probability (SOP) to investigate the reliability and security performance in two cases, where the secondary destination exploits the maximum ratio combining (MRC) scheme or the selection combining (SC) scheme. To characterize the tradeoff between reliability and security, we then investigate the effective secrecy throughput (EST) performance by including the COP and SOP in a unified manner. In order to gain additional insights from the performance evaluation, we also provide the asymptotic expressions for the COP, SOP, and EST in high signal-to-noise ratio region. It is demonstrated that the interference temperature constraint incurred from the primary network enables a tradeoff between reliability and security of the secondary network. Moreover, the resulting analysis shows that using the untrusted relay to forward the transmitted message is unnecessary when the secondary destination employs the SC scheme and the untrusted relay operates in half-duplex mode.https://ieeexplore.ieee.org/document/8081736/Cognitive radiountrusted relayoutage probabilitysecrecy throughput |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Dechuan Chen Yunpeng Cheng Weiwei Yang Jianwei Hu Yueming Cai |
spellingShingle |
Dechuan Chen Yunpeng Cheng Weiwei Yang Jianwei Hu Yueming Cai Physical Layer Security in Cognitive Untrusted Relay Networks IEEE Access Cognitive radio untrusted relay outage probability secrecy throughput |
author_facet |
Dechuan Chen Yunpeng Cheng Weiwei Yang Jianwei Hu Yueming Cai |
author_sort |
Dechuan Chen |
title |
Physical Layer Security in Cognitive Untrusted Relay Networks |
title_short |
Physical Layer Security in Cognitive Untrusted Relay Networks |
title_full |
Physical Layer Security in Cognitive Untrusted Relay Networks |
title_fullStr |
Physical Layer Security in Cognitive Untrusted Relay Networks |
title_full_unstemmed |
Physical Layer Security in Cognitive Untrusted Relay Networks |
title_sort |
physical layer security in cognitive untrusted relay networks |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link. Specifically, we first examine the connection outage probability (COP) and secrecy outage probability (SOP) to investigate the reliability and security performance in two cases, where the secondary destination exploits the maximum ratio combining (MRC) scheme or the selection combining (SC) scheme. To characterize the tradeoff between reliability and security, we then investigate the effective secrecy throughput (EST) performance by including the COP and SOP in a unified manner. In order to gain additional insights from the performance evaluation, we also provide the asymptotic expressions for the COP, SOP, and EST in high signal-to-noise ratio region. It is demonstrated that the interference temperature constraint incurred from the primary network enables a tradeoff between reliability and security of the secondary network. Moreover, the resulting analysis shows that using the untrusted relay to forward the transmitted message is unnecessary when the secondary destination employs the SC scheme and the untrusted relay operates in half-duplex mode. |
topic |
Cognitive radio untrusted relay outage probability secrecy throughput |
url |
https://ieeexplore.ieee.org/document/8081736/ |
work_keys_str_mv |
AT dechuanchen physicallayersecurityincognitiveuntrustedrelaynetworks AT yunpengcheng physicallayersecurityincognitiveuntrustedrelaynetworks AT weiweiyang physicallayersecurityincognitiveuntrustedrelaynetworks AT jianweihu physicallayersecurityincognitiveuntrustedrelaynetworks AT yuemingcai physicallayersecurityincognitiveuntrustedrelaynetworks |
_version_ |
1724194510076903424 |