TY - GEN
T1 - Physical layer security for dual-hop SWIPT-enabled CR networks
AU - Bouabdellah, Mounia
AU - El Bouanani, Faissal
AU - Sofotasios, Paschalis C.
AU - Da Costa, Daniel Benevides
AU - Mezher, Kahtan
AU - Benazza, Hussain
AU - Muhaidat, Sami
AU - Karagiannidis, George K.
N1 - Funding Information:
This work was supported in part by Khalifa University under Grant No. KU/RC1-C2PS-T2/8474000137 and Grant No. KU/FSU-8474000122.
Publisher Copyright:
© 2019 IEEE.
PY - 2019/8
Y1 - 2019/8
N2 - We investigate the physical layer security of a relayassisted underlay cognitive radio network with simultaneous wireless information and power transfer (SWIPT). To this end, we consider a secondary network comprising a secondary source S, one secondary user (SU) relay R, one SU destination D, one primary user (PU) transmitter, and one PU receiver. In addition, we consider an eavesdropper E which can overhear both communications of the S→R and R→D links whereas power constraints are imposed on the secondary network in order to maintain a tolerable interference level at the primary network. Under these constraints, we derive a closed-form expression for the secrecy outage probability assuming uncorrelated Rayleigh fading channels. Numerical and simulation results are presented to corroborate the corresponding analysis. It is shown that the harvested energy, energy conversion efficiency, and maximum tolerable interference level imposed on the primary receiver impact considerably the overall system's security.
AB - We investigate the physical layer security of a relayassisted underlay cognitive radio network with simultaneous wireless information and power transfer (SWIPT). To this end, we consider a secondary network comprising a secondary source S, one secondary user (SU) relay R, one SU destination D, one primary user (PU) transmitter, and one PU receiver. In addition, we consider an eavesdropper E which can overhear both communications of the S→R and R→D links whereas power constraints are imposed on the secondary network in order to maintain a tolerable interference level at the primary network. Under these constraints, we derive a closed-form expression for the secrecy outage probability assuming uncorrelated Rayleigh fading channels. Numerical and simulation results are presented to corroborate the corresponding analysis. It is shown that the harvested energy, energy conversion efficiency, and maximum tolerable interference level imposed on the primary receiver impact considerably the overall system's security.
UR - http://www.scopus.com/inward/record.url?scp=85074649595&partnerID=8YFLogxK
U2 - 10.1109/ISWCS.2019.8877163
DO - 10.1109/ISWCS.2019.8877163
M3 - Conference contribution
AN - SCOPUS:85074649595
T3 - Proceedings of the International Symposium on Wireless Communication Systems
SP - 629
EP - 634
BT - ISWCS 2019 - 16th International Symposium on Wireless Communication Systems
T2 - 16th International Symposium on Wireless Communication Systems, ISWCS 2019
Y2 - 27 August 2019 through 30 August 2019
ER -