Ngoc Pham Thi Dan, Khuong Ho Van, Hanh Dang Ngoc, Thiem Do Dac, Phong Nguyen Huu, Son Vo Que, Son Pham Ngoc, Lien Hong Pham
{"title":"SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING","authors":"Ngoc Pham Thi Dan, Khuong Ho Van, Hanh Dang Ngoc, Thiem Do Dac, Phong Nguyen Huu, Son Vo Que, Son Pham Ngoc, Lien Hong Pham","doi":"10.15625/1813-9663/36/3/14987","DOIUrl":null,"url":null,"abstract":"This paper investigates a cognitive radio network where a secondary sender assists a primary transmitter in relaying primary information to a primary receiver and also transmits its own information to a secondary recipient. This sender is capable of jamming to protect secondary and/or primary information against an eavesdropper and self-powering by harvesting radio frequency energy of primary signals. Security capability of both secondary and primary networks are analyzed in terms of secrecy outage probability. Numerous results corroborate the proposed analysis which serves as a design guideline to quickly assess and optimize security performance. More importantly, security capability trade-off between secondary and primary networks can be totally controlled with appropriate selection of system parameters.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"194 1","pages":"205-231"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science and Cybernetics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15625/1813-9663/36/3/14987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper investigates a cognitive radio network where a secondary sender assists a primary transmitter in relaying primary information to a primary receiver and also transmits its own information to a secondary recipient. This sender is capable of jamming to protect secondary and/or primary information against an eavesdropper and self-powering by harvesting radio frequency energy of primary signals. Security capability of both secondary and primary networks are analyzed in terms of secrecy outage probability. Numerous results corroborate the proposed analysis which serves as a design guideline to quickly assess and optimize security performance. More importantly, security capability trade-off between secondary and primary networks can be totally controlled with appropriate selection of system parameters.