Logo PTI Logo rice

Proceedings of the 2022 Seventh International Conference on Research in Intelligent and Computing in Engineering

Annals of Computer Science and Information Systems, Volume 33

Outage Probability and Intercept Probability Of Cognitive IoTs Networks With Relay Selection, Passive Eavesdropper and Hardware Noises

, , , , ,

DOI: http://dx.doi.org/10.15439/2022R21

Citation: Proceedings of the 2022 Seventh International Conference on Research in Intelligent and Computing in Engineering, Vu Dinh Khoa, Shivani Agarwal, Gloria Jeanette Rincon Aponte, Nguyen Thi Hong Nga, Vijender Kumar Solanki, Ewa Ziemba (eds). ACSIS, Vol. 33, pages 165170 ()

Full text

Abstract. In this paper, we measure outage probability (OP) and intercept probability (IP) of a secondary secure network in an underlay spectrum-sharing cognitive radio (USS-CR). In the considered scheme, one of secondary relays is selected at a cooperative phase to provide the highest signal-to-noise ratio (SNR) at a secondary destination. We consider a practical scenario, where channel state information (CSI) of the secondary eavesdropping links is not available. OP and IP of the considered scheme are evaluated via mathematical analysis and computer simulations, under impact of hardware noises, over Rayleigh fading channels.

References

  1. N. Nguyen, et al, "Secure Massive MIMO With the Artificial Noise-Aided Downlink Training," IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 802–816, Apr. 2018.
  2. B. M. ElHalawany, A. A. A. El-Banna and K. Wu, "Physical-Layer Security and Privacy for Vehicle-to-Everything," IEEE Communications Magazine, vol. 57, no. 10, pp. 84-90, Oct. 2019.
  3. K. N. Le and V. W. Y. Tam, "Wireless Secrecy Under Multivariate Correlated Nakagami-m Fading," IEEE Access, vol. 8, pp. 33223-33236, Jan. 2020.
  4. Z. Wei, et al, "Energy- and Cost-Efficient Physical Layer Security in the Era of IoT: The Role of Interference," IEEE Communications Magazine, vol. 58, no. 4, pp. 81-87, April 2020.
  5. N. Yang, et al, "Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels," IEEE Transactions on Communications, vol. 61, no. 1, pp. 144-154, Jan. 2013.
  6. N. Yang, H. A. Suraweera, I. B. Collings and C. Yuen, "Physical Layer Security of TAS/MRC With Antenna Correlation," IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 254-259, Jan. 2013.
  7. L. Yang, M. O. Hasna and I. S. Ansari, "Physical Layer Security for TAS/MRC Systems With and Without Co-Channel Interference Over η – μ Fading Channels," EEE Transactions on Vehicular Technology, vol. 67, no. 12, pp. 12421-12426, Dec. 2018.
  8. D. T. Hung, et al, "Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access," Entropy, vol. 21, no. 10, pp. 1-23, Oct. 2019.
  9. T. M. Hoang, T. Q. Duong, N. -S. Vo and C. Kundu, "Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer," IEEE Wireless Communications Letters, vol. 6, no. 2, pp. 174-177, April 2017.
  10. H. D. Hung, T. T. Duy and M. Voznak, "Secrecy Outage Performance of Multi-hop LEACH Networks using Power Beacon Aided Cooperative Jamming with Jammer Selection Methods," AEU- International Journal of Electronics and Communications, vol. 124, ID 153357, pp. 1-25, Sept. 2020.
  11. P. M. Nam, H. D. Hung, T. T. Duy and L. T. Thuong, "Security-Reliability Tradeoff of MIMO TAS/SC Networks using Harvest-to-Jam Cooperative Jamming Methods With Random Jammer Location," ICT Express, 2022. http://dx.doi.org/10.1016/j.icte.2021.11.003
  12. P. N. Son and H. Y. Kong, “Exact Outage Probability of Two-Way Decode-and-Forward Scheme with Opportunistic Relay Selection Under Physical Layer Security,” Wireless Personal Communications, vol. 77, no. 4, pp. 2889-2917, Aug. 2014.
  13. P. T. Tin and T. T. Duy, “Power Allocation Strategies For Dual-Hop Relay Protocols With Best Relay Selection Under Constraint Of Intercept Probability,” ICT Express, vol. 5, no. 1, pp. 52-55, Mar. 2019.
  14. H. Li, et al, "Secrecy Outage Probability of Relay Selection Based Cooperative NOMA for IoT Networks," IEEE Access, vol. 9, pp. 1655-1665, Dec. 2020.
  15. D. -H. Ha, et al, "Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection," IEEE Access, vol. 9, pp. 131087-131108, Sept. 2021.
  16. X. Ding, et al, "Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection," IEEE Transactions on Vehicular Technology, vol. 66, no. 5, pp. 3930-3941, May 2017.
  17. W. Khalid, et al, "RIS-Aided Physical Layer Security With Full-Duplex Jamming in Underlay D2D Networks," IEEE Access, vol. 9, pp. 99667-99679, Jul. 2021.
  18. L. -T. Tu and A. Bradai, "On the Performance of Physical Layer Security of RIS-aided Communications," in Proc. of 2021 IEEE Conference on Antenna Measurements & Applications (CAMA), 2021, pp. 570-574.
  19. T. D. Hieu, T. T. Duy and S. G. Choi, "Performance Enhancement for Harvest-to-Transmit Cognitive Multi-hop Networks With Best Path Selection Method Under Presence Of Eavesdropper," in Proc. of ICACT 2018, Feb. 2018, pp. 323-328
  20. P. T, Tin, et al, "Outage Analysis of the Power Splitting Based Underlay Cooperative Cognitive Radio Networks," Sensors, vol. 21, no. 22, 7653, Nov. 2021.
  21. T. L. Thanh, et al, "Broadcasting in Cognitive Radio Networks: A Fountain Codes Approach," IEEE Transactions on Vehicular Technology, 2022. http://dx.doi.org/10.1109/TVT.2022.3188969
  22. W. Khalid, et al, "RIS-Aided Physical Layer Security With Full-Duplex Jamming in Underlay D2D Networks," IEEE Access, vol. 9, pp. 99667-99679, Jul. 2021.
  23. P. Yan, Y. Zou, X. Ding and J. Zhu, "Energy-Aware Relay Selection Improves Security-Reliability Tradeoff in Energy Harvesting Cooperative Cognitive Radio Systems," IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 5115-5128, May 2020.
  24. P. Chakraborty and S. Prakriya, "Secrecy Outage Performance of a Cooperative Cognitive Relay Network," IEEE Communications Letters, vol. 21, no. 2, pp. 326-329, Feb. 2017.
  25. Z. Xiang, et al, "NOMA-Assisted Secure Short-Packet Communications in IoT," IEEE Wireless Communications, vol. 27, no. 4, pp. 8-15, Aug. 2020.
  26. X. Zheng, J. Zhang and G. Pan, "On Secrecy Analysis of Underlay Cognitive UAV-Aided NOMA Systems with TAS/MRC," IEEE Internet of Things Journal, (2022). http://dx.doi.org/10.1109/JIOT.2022.3181826.
  27. P. T. Tin, D. T. Hung, T. T. Duy and M. Voznak, "Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels," RadioEngineering, vol. 25, no. 4, pp. 774-782, Dec. 2016.
  28. M. Li, et al., "Effects of Residual Hardware Impairments on Secure NOMA-Based Cooperative Systems," IEEE Access, vol. 8, pp. 2524-2536, Nov. 2020.
  29. X. Li, et al, "Secrecy Analysis of Ambient Backscatter NOMA Systems Under I/Q Imbalance," IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 12286-12290, Oct. 2020.
  30. B. Li, Y. Zou, J. Zhu and W. Cao, "Impact of Hardware Impairment and Co-Channel Interference on Security-Reliability Trade-Off for Wireless Sensor Networks," IEEE Transactions on Wireless Communications, vol. 20, no. 11, pp. 7011-7025, Nov. 2021.
  31. K. Guo, et al, "On the Secrecy Performance of NOMA-Based Integrated Satellite Multiple-Terrestrial Relay Networks With Hardware Impairments," IEEE Transactions on Vehicular Technology, vol. 70, no. 4, pp. 3661-3676, April 2021.
  32. K. Guo, C. Dong and K. An, "NOMA-Based Cognitive Satellite Terrestrial Relay Network: Secrecy Performance Under Channel Estimation Errors and Hardware Impairments," IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17334-17347, Sept. 2022.
  33. Y. Liu, et al, "Relay Selection for Security Enhancement in Cognitive Relay Networks," IEEE Wireless Communications Letters, vol. 4, no. 1, pp. 46-49, Feb. 2015.
  34. Y. Zou, B. Champagne, W. -P. Zhu and L. Hanzo, "Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems," IEEE Transactions on Communications, vol. 63, no. 1, pp. 215-228, Jan. 2015.
  35. P. T. Tin, et al, "Secrecy Performance of TAS/SC-based Multi-hop Harvest-to-Transmit Cognitive WSNs under Joint Constraint of Interference and Hardware Imperfection," Sensors MDPI, vol. 19, no. 5, (1160), March 2019.
  36. P. T. D. Ngoc, T. T. Duy and H. V. Khuong, "Outage Performance of Cooperative Cognitive Radio Networks under Joint Constraints of Co-Channel Interference, Intercept Probability and Hardware Imperfection," EAI Transactions on Industrial Networks and Intelligent Systems, vol. 6, no. 19, pp. 1-8, Jun. 2019.
  37. T. T. Duy, L. C. Khan, N. T. Binh and N. L. Nhat, "Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming," EAI Transactions on Industrial Networks and Intelligent Systems, vol. 8, no. 26, pp. 1-9, Apr. 2021.
  38. K. Tourki, H. -C. Yang and M. -S. Alouini, "Accurate Outage Analysis of Incremental Decode-and-Forward Opportunistic Relaying," IEEE Transactions on Wireless Communications, vol. 10, no. 4, pp. 1021-1025, Apr. 2011.
  39. K. Tourki, K. A. Qaraqe and M. -S. Alouini, "Outage Analysis for Underlay Cognitive Networks Using Incremental Regenerative Relaying," IEEE Transactions on Vehicular Technology, vol. 62, no. 2, pp. 721-734, Feb. 2013.
  40. K. Tourki, F. A. Khan, K. A. Qaraqe, H. -C. Yang and M. -S. Alouini, "Exact Performance Analysis of MIMO Cognitive Radio Systems Using Transmit Antenna Selection," IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 425-438, Mar. 2014.
  41. I. S. Gradshteyn and I. M. Ryzhik. Table of Integrals, Series, and Products. Academic Press, 2014.