Physical Layer Security in Cognitive Untrusted Relay Networks

In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link. Specifically, we first examine the connection...

Full description

Bibliographic Details
Main Authors: Dechuan Chen, Yunpeng Cheng, Weiwei Yang, Jianwei Hu, Yueming Cai
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8081736/
id doaj-b62d29a5a7a44c049ca94e7c22a67729
record_format Article
spelling doaj-b62d29a5a7a44c049ca94e7c22a677292021-03-29T20:36:10ZengIEEEIEEE Access2169-35362018-01-0167055706510.1109/ACCESS.2017.27627388081736Physical Layer Security in Cognitive Untrusted Relay NetworksDechuan Chen0Yunpeng Cheng1https://orcid.org/0000-0001-6991-6197Weiwei Yang2https://orcid.org/0000-0002-0220-4088Jianwei Hu3Yueming Cai4College of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaCollege of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaCollege of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaCollege of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaCollege of Communications Engineering, PLA Army Engineering University, Nanjing, ChinaIn this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link. Specifically, we first examine the connection outage probability (COP) and secrecy outage probability (SOP) to investigate the reliability and security performance in two cases, where the secondary destination exploits the maximum ratio combining (MRC) scheme or the selection combining (SC) scheme. To characterize the tradeoff between reliability and security, we then investigate the effective secrecy throughput (EST) performance by including the COP and SOP in a unified manner. In order to gain additional insights from the performance evaluation, we also provide the asymptotic expressions for the COP, SOP, and EST in high signal-to-noise ratio region. It is demonstrated that the interference temperature constraint incurred from the primary network enables a tradeoff between reliability and security of the secondary network. Moreover, the resulting analysis shows that using the untrusted relay to forward the transmitted message is unnecessary when the secondary destination employs the SC scheme and the untrusted relay operates in half-duplex mode.https://ieeexplore.ieee.org/document/8081736/Cognitive radiountrusted relayoutage probabilitysecrecy throughput
collection DOAJ
language English
format Article
sources DOAJ
author Dechuan Chen
Yunpeng Cheng
Weiwei Yang
Jianwei Hu
Yueming Cai
spellingShingle Dechuan Chen
Yunpeng Cheng
Weiwei Yang
Jianwei Hu
Yueming Cai
Physical Layer Security in Cognitive Untrusted Relay Networks
IEEE Access
Cognitive radio
untrusted relay
outage probability
secrecy throughput
author_facet Dechuan Chen
Yunpeng Cheng
Weiwei Yang
Jianwei Hu
Yueming Cai
author_sort Dechuan Chen
title Physical Layer Security in Cognitive Untrusted Relay Networks
title_short Physical Layer Security in Cognitive Untrusted Relay Networks
title_full Physical Layer Security in Cognitive Untrusted Relay Networks
title_fullStr Physical Layer Security in Cognitive Untrusted Relay Networks
title_full_unstemmed Physical Layer Security in Cognitive Untrusted Relay Networks
title_sort physical layer security in cognitive untrusted relay networks
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link. Specifically, we first examine the connection outage probability (COP) and secrecy outage probability (SOP) to investigate the reliability and security performance in two cases, where the secondary destination exploits the maximum ratio combining (MRC) scheme or the selection combining (SC) scheme. To characterize the tradeoff between reliability and security, we then investigate the effective secrecy throughput (EST) performance by including the COP and SOP in a unified manner. In order to gain additional insights from the performance evaluation, we also provide the asymptotic expressions for the COP, SOP, and EST in high signal-to-noise ratio region. It is demonstrated that the interference temperature constraint incurred from the primary network enables a tradeoff between reliability and security of the secondary network. Moreover, the resulting analysis shows that using the untrusted relay to forward the transmitted message is unnecessary when the secondary destination employs the SC scheme and the untrusted relay operates in half-duplex mode.
topic Cognitive radio
untrusted relay
outage probability
secrecy throughput
url https://ieeexplore.ieee.org/document/8081736/
work_keys_str_mv AT dechuanchen physicallayersecurityincognitiveuntrustedrelaynetworks
AT yunpengcheng physicallayersecurityincognitiveuntrustedrelaynetworks
AT weiweiyang physicallayersecurityincognitiveuntrustedrelaynetworks
AT jianweihu physicallayersecurityincognitiveuntrustedrelaynetworks
AT yuemingcai physicallayersecurityincognitiveuntrustedrelaynetworks
_version_ 1724194510076903424