PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Probability of Secrecy Outage in Cognitive Radio Networks over Rician-Fading Channels

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system transmitting its confidential information to a legitimate destination in the presence of an eavesdropper, are considered in this paper. Under CRNs, the interference power reaching at primary user (PU) is limited by some pre-defined threshold. Secrecy outage not only occurs when the achievable secrecy capacity for source-destination link is smaller than a target rate, but also occurs in the case that the interference power at PU is greater than that threshold. Analytical expression for secrecy outage probability has been derived and verified with simulation results. In addition, we have also derived the analytical expression for probability of non-zero secrecy capacity.
Twórcy
autor
  • School of Electronic and Information Engineering, Southwest University, Chongqing, 400715, P. R. China
autor
  • School of Electronic and Information Engineering, Southwest University, Chongqing, 400715, P. R. China
autor
  • School of Electronic and Information Engineering, Southwest University, Chongqing, 400715, P. R. China
Bibliografia
  • [1] E. Hossain and V. Bhargava, Cognitive Wireless Communication Networks, Springer, 2007.
  • [2] N. S. Ferdinand, D. B. da Costa, A. F. de Almeida, and M. Latvaaho, “Physical layer secrecy performance of TAS wiretap channels with correlated main and eavesdropper channels,” IEEE Commun. Lett., vol. 3, no. 1, pp. 86-89, Feb. 2014.
  • [3] U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
  • [4] Q. Li, H. Song, and K. Huang, “Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels,” IEEE Commun. Lett., vol. 17, no. 5, pp. 892-895, May 2013.
  • [5] A. Wyner, “The wire-tap channel,” Bell Syst. Techn. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
  • [6] I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
  • [7] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wire-tap channel,” IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
  • [8] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
  • [9] P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
  • [10] M. Z. I. Sarkar, T. Ratnarajah, and M. Sellathurai, “Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers,” in Asilomar Conference on Signals, Systems, and Coputers, California, 2009; 829-833.
  • [11] O. Gungor, J. Tan, C. E. Koksal, H. El Gamal, “Secrecy outage capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5379-5397, Aug. 2013.
  • [12] W. Li, M. Ghogho, B. Chen, and C. Xiong, “Secure communications via sending artificial noise by the receiver: Outage secrecy capacity/Region analysis,” IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
  • [13] X. Liu, “Outage probability of secrecy capacity over correlated lognormal fading channels,” IEEE Commun. Lett., vol. 17, no. 2, pp. 289-292, Feb. 2013.
  • [14] X. Sun, J. Wang, W. Xu, and C. Zhao, “Performance of secure communications over correlated fading channels,” IEEE Sig. Process. Lett., vol. 19, no. 8, pp. 479-482, Aug. 2012.
  • [15] J. G. Proakis and M. Salehi, Digital Communications, 5th Ed., McGraw-Hill, 2007.
  • [16] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products., 7th Ed., Elsevier, 2007.
Uwagi
PL
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-fb06de0d-be5e-4e09-b77c-2feea39e3b8f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.