Change search
ReferencesLink to record
Permanent link

Direct link
Impact of Secondary Network on the Security of Primary Network
Blekinge Institute of Technology, School of Computing.
Blekinge Institute of Technology, School of Computing.
2012 (English)Conference paper, Presentation (Other academic)
Abstract [en]

In this study, we investigate the impact of a secondary user on the security of the primary user in a cognitive radio network. In particular, we consider a spectrum underlay network consisting of a pair of primary users, a pair of secondary users, and an eavesdropper, operating in the same spectrum. The secondary user is allowed to simultaneously access the licensed frequency bands of the primary user as long as the outage probability of the primary user is kept below a predefined threshold, while the eavesdropper illegally listens to the communication of the primary network. Given these settings, an adaptive transmit power allocation policy, a closed-form expression for the outage probability, and an analytical expression for the probability of existence of non-zero secrecy capacity are formulated. Simulations show that the existence of a secondary network can enhance the probability of non-zero secrecy capacity of the primary network by causing interference to the eavesdropper.

Place, publisher, year, edition, pages
Lund, Sweden: IEEE , 2012.
Keyword [en]
Spectrum Underlay Network, Eavesdropper, Non-zero secrecy capacity
National Category
URN: urn:nbn:se:bth-7098Local ID: diva2:834679
Swedish Communications Technologies Workshop
Available from: 2012-12-10 Created: 2012-12-08 Last updated: 2016-09-08Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Tran, HungZepernick, Hans-Jürgen
By organisation
School of Computing

Search outside of DiVA

GoogleGoogle Scholar

Total: 16 hits
ReferencesLink to record
Permanent link

Direct link