TY - GEN
T1 - Intercept Probability of Underlay Uplink CRNs with Multi-Eavesdroppers
AU - Bouabdellah, Mounia
AU - Bouanani, Faissal El
AU - Sofotasios, Paschalis C.
AU - Da Costa, Daniel Benevides
AU - Ben-Azza, Hussain
AU - Mezher, Kahtan
AU - Muhaidat, Sami
N1 - Funding Information:
ACKNOWLEDGMENT This work was supported in part by Khalifa University under Grant No. KU/RC1-C2PS-T2/8474000137 and Grant No. KU/FSU-8474000122.
Publisher Copyright:
© 2019 IEEE.
PY - 2019/9
Y1 - 2019/9
N2 - The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and that a jammer is randomly chosen from the remaining source nodes to send a jamming signal to the eavesdroppers. However, in an uplink underlay CRN, a friendly jammer is not always allowed to use its maximal transmit power as the secondary users are required to continuously adapt their power in order to avoid causing interference to the primary users. As a consequence, enhancing the system security using a jammer with low transmit power in the presence of numerous eavesdroppers turns out to be questionable. In this regard, we derive novel analytic expressions that assist in quantifying the achievable security levels and the corresponding limitations. This leads to the development of useful insights on the impact of network parameters on the performance of the system's security. The offered analytic results are corroborated through Monte Carlo simulation. It is shown, that for a low transmit power of the friendly jammer, the system's security can only be enhanced for a small number of eavesdroppers.
AB - The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and that a jammer is randomly chosen from the remaining source nodes to send a jamming signal to the eavesdroppers. However, in an uplink underlay CRN, a friendly jammer is not always allowed to use its maximal transmit power as the secondary users are required to continuously adapt their power in order to avoid causing interference to the primary users. As a consequence, enhancing the system security using a jammer with low transmit power in the presence of numerous eavesdroppers turns out to be questionable. In this regard, we derive novel analytic expressions that assist in quantifying the achievable security levels and the corresponding limitations. This leads to the development of useful insights on the impact of network parameters on the performance of the system's security. The offered analytic results are corroborated through Monte Carlo simulation. It is shown, that for a low transmit power of the friendly jammer, the system's security can only be enhanced for a small number of eavesdroppers.
UR - https://www.scopus.com/pages/publications/85075874489
U2 - 10.1109/PIMRC.2019.8904352
DO - 10.1109/PIMRC.2019.8904352
M3 - Conference contribution
AN - SCOPUS:85075874489
T3 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
BT - 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 30th IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2019
Y2 - 8 September 2019 through 11 September 2019
ER -