Secure 5G Coordinating Spectrum Sharing System With Cooperation Transmitter and Receiver Pairs

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Transactions on Emerging Telecommunications Technologies Pub Date : 2025-03-06 DOI:10.1002/ett.70080
Ayat M. Al-Rjoob, Ahmad A. Ababnah, Mamoun F. Al-Mistarihi
{"title":"Secure 5G Coordinating Spectrum Sharing System With Cooperation Transmitter and Receiver Pairs","authors":"Ayat M. Al-Rjoob,&nbsp;Ahmad A. Ababnah,&nbsp;Mamoun F. Al-Mistarihi","doi":"10.1002/ett.70080","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>In this paper, we propose a 6-node system consisting of two transmitter-receiver pairs sharing the same spectrum, an eavesdropper, and a relay, all operating in a half-duplex. The eavesdropper is mainly interested in communication between one of the transmitter-receiver pairs, which we call the primary. Communication along with the second pair called the secondary, is performed in two hops/time slots with the aid of the relay. The main idea of our study is to investigate the secrecy performance of the primary pair when jamming is performed by the secondary relay-assisted path. In particular, in the first time slot, the secondary destination acts as a jammer relative to the eavesdropper by injecting artificial noise known to the primary pair. During the second time slot, the secondary transmitter acts as a jammer while the relay forwards data to the secondary destination. In effect, this allows for cooperation among the nodes both in transmitting primary and secondary data while reducing the eavesdropper's ability to listen in on the primary link communication. For the proposed protocol, we derive closed-form expressions of the intercept probability. We also obtain a closed-form expression of the outage probability along with the secondary communication link. Moreover, we study the effect of transmit power allocation on intercept and outage probabilities along with the different links. Theoretical and simulation results are given to prove that the proposed protocol can provide better security for the primary link and acquire acceptable secondary outage probability.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70080","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

In this paper, we propose a 6-node system consisting of two transmitter-receiver pairs sharing the same spectrum, an eavesdropper, and a relay, all operating in a half-duplex. The eavesdropper is mainly interested in communication between one of the transmitter-receiver pairs, which we call the primary. Communication along with the second pair called the secondary, is performed in two hops/time slots with the aid of the relay. The main idea of our study is to investigate the secrecy performance of the primary pair when jamming is performed by the secondary relay-assisted path. In particular, in the first time slot, the secondary destination acts as a jammer relative to the eavesdropper by injecting artificial noise known to the primary pair. During the second time slot, the secondary transmitter acts as a jammer while the relay forwards data to the secondary destination. In effect, this allows for cooperation among the nodes both in transmitting primary and secondary data while reducing the eavesdropper's ability to listen in on the primary link communication. For the proposed protocol, we derive closed-form expressions of the intercept probability. We also obtain a closed-form expression of the outage probability along with the secondary communication link. Moreover, we study the effect of transmit power allocation on intercept and outage probabilities along with the different links. Theoretical and simulation results are given to prove that the proposed protocol can provide better security for the primary link and acquire acceptable secondary outage probability.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用收发机对合作,保障5G协调频谱共享系统
在本文中,我们提出了一个六节点系统,由两个共享同一频谱的发送-接收对,一个窃听器和一个中继器组成,所有系统都以半双工方式工作。窃听者主要对其中一个收发器之间的通信感兴趣,我们称之为主收发器。在中继的帮助下,与第二对称为辅助的通信在两个跳/时隙中进行。本研究的主要思想是研究当二次中继辅助路径干扰时,主对的保密性能。特别是,在第一个时隙中,次要目标通过注入主对已知的人工噪声而充当相对于窃听者的干扰器。在第二个时隙中,辅助发射机充当干扰机,而中继器将数据转发到辅助目的地。实际上,这允许节点之间在传输主数据和辅助数据时进行合作,同时减少窃听者侦听主链路通信的能力。对于所提出的协议,我们导出了拦截概率的封闭形式表达式。我们还得到了随二次通信链路的中断概率的封闭表达式。此外,我们还研究了传输功率分配对不同链路的拦截概率和中断概率的影响。理论和仿真结果表明,该协议可以为主链路提供更好的安全性,并获得可接受的二次中断概率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
期刊最新文献
Issue Information QoS-Driven Energy-Efficient Clustering and Routing in Wireless Sensor Networks Using Hybrid ASBO and Multi-Level Attention Dilated Residual Neural Network Approach Quantum Federated Learning for DoS Attack Detection and Privacy Preserving of VANET: A Novel Hybrid Machine Learning Approach A Novel Multi-Objective Task Scheduling Using Hybrid Drawer-Mother Optimization Algorithm in Cloud Computing A Blockchain-Based Smart Contract Framework for Autonomous Sports Training Management in Multi-Agent Environment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1