Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Impact of secondary user communication on security communication of primary user
Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
2015 (English)In: Security and Communication Networks, ISSN 1939-0114, E-ISSN 1939-0122, Vol. 8, no 18, 4177-4190 p.Article in journal (Refereed) Published
Resource type
Text
Abstract [en]

Cognitive radio network concept has been considered as a promising solution to improve the spectrum utilization. However, it may be vulnerable to security problems as the primary user (PU) and secondary user (SU) access the same resource. In this paper, we consider a system model where an eavesdropper (EAV) illegally listens to the PU communication in the presence of a SU transmitter (SU-Tx) communicating with a SU receiver (SU-Rx). The SU-Tx transmit power is subject to the peak transmit power constraint of the SU and outage probability constraint of the PU. Given this context, the effect of the interference from the SU-Tx to the EAV on the primary system security is investigated. In particular, analytical expressions of the probability of existence of non-zero secrecy capacity and secrecy outage probability of the PU are derived. Moreover, the performance analysis of the secondary network is examined where closed-form expressions of the symbol error probability and achievable rate are presented. Numerical examples are provided to evaluate the impact of the primary system parameters and channel conditions among users on the system performance of secondary and primary networks. Interestingly, our results reveal a fact that the security of the primary network strongly depends on the channel condition of the SU-Tx to the EAV link and the transmit power policy of the SU-Tx. Copyright (C) 2015 John Wiley & Sons, Ltd.

Place, publisher, year, edition, pages
Wiley-Blackwell, 2015. Vol. 8, no 18, 4177-4190 p.
Keyword [en]
cognitive radio network, symbol error probability, secrecy capacity, secrecy outage probability, achievable rate
National Category
Communication Systems Computer Systems
Identifiers
URN: urn:nbn:se:bth-11668DOI: 10.1002/sec.1333ISI: 000367922500069OAI: oai:DiVA.org:bth-11668DiVA: diva2:908293
Available from: 2016-03-02 Created: 2016-02-29 Last updated: 2017-05-22Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Sibomana, Louis
By organisation
Department of Communication Systems
In the same journal
Security and Communication Networks
Communication SystemsComputer Systems

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 142 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf