中国邮电高校学报(英文) ›› 2016, Vol. 23 ›› Issue (3): 51-56.doi:

• Wireless • 上一篇    下一篇

Secrecy Outage Analysis on Underlay Cognitive Radio Using Selective Combining

谭友钰,潘高峰,赵辉   

  1. 西南大学
  • 收稿日期:2015-11-05 修回日期:2016-01-14 出版日期:2016-06-28 发布日期:2016-07-05
  • 通讯作者: 潘高峰 E-mail:gfpan@swu.edu.cn
  • 基金资助:

    自然科学基金;教育部高等学校博士点新教师类基金项目;重庆市基础与前沿研究计划项目

Secrecy Outage Analysis on Underlay Cognitive Radio Using Selective Combining

  • Received:2015-11-05 Revised:2016-01-14 Online:2016-06-28 Published:2016-07-05

摘要:

Securing data transmission in future high-capacity high-coverage multi-tier hierarchical networks for which cognitive radio has emerged as an essential recipe, is of utmost importance. This paper investigates the secrecy outage performance of selection combining (SC) in cognitive radio networks (CRNs) over Rayleigh fading channels. We consider the cognitive wiretap system consisting of a single antenna transmitter (Alice) and a multiple antenna receiver (Bob) equipped with ( ) antennas in the presence of a passive eavesdropper (Eve) equipped with ( ) antennas. Compared to the work proposed by Maged Elkashlan et al. in [1], we present an alternative method to derive the closed-form expression for the secrecy outage probability (SOP) and develop a simplified SOP when the maximal transmit power at the secondary user is large enough. Our results reveal the impact of the primary network on the secondary network with a muti-antenna wiretap channel and simulations are conducted to validate the accuracy of our proposed analytical models.

关键词:

underlay

Abstract:

Securing data transmission in future high-capacity high-coverage multi-tier hierarchical networks for which cognitive radio has emerged as an essential recipe, is of utmost importance. This paper investigates the secrecy outage performance of selection combining (SC) in cognitive radio networks (CRNs) over Rayleigh fading channels. We consider the cognitive wiretap system consisting of a single antenna transmitter (Alice) and a multiple antenna receiver (Bob) equipped with ( ) antennas in the presence of a passive eavesdropper (Eve) equipped with ( ) antennas. Compared to the work proposed by Maged Elkashlan et al. in [1], we present an alternative method to derive the closed-form expression for the secrecy outage probability (SOP) and develop a simplified SOP when the maximal transmit power at the secondary user is large enough. Our results reveal the impact of the primary network on the secondary network with a muti-antenna wiretap channel and simulations are conducted to validate the accuracy of our proposed analytical models.

Key words:

underlay