[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3628797.3628799acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

Packet Timeout Probability for Cognitive Cooperative Radio Network under Security Constraint

Published: 07 December 2023 Publication History

Abstract

In this paper, we investigate the physical layer security of a cognitive relay network while considering joint constraints involving multiple primary users (PUs) and secondary users (SUs). Specifically, we address the scenario in which eavesdroppers attempt to exploit the confidential information of multiple PUs by monitoring multiple frequency bands. To make use of the licensed spectrum belonging to the PUs, SUs must adopt reasonable power allocation policies and frequency band selection strategies. These strategies serve not only to enhance their own performance but also to safeguard the PUs against eavesdropping. We introduce the concept of packet timeout and derive adaptive transmit power allocation policies for both the secondary transmitter (SU-Tx) and the secondary relay (SR). Additionally, we provide expressions for both the upper and lower bounds of the end-to-end packet timeout probability, which are used to assess the performance of the system under consideration. Finally, we present numerical results that explore the impact of various factors, such as the selected licensed frequency band, transmit power of the PUs, and channel mean powers, on the end-to-end packet timeout probability.

Supplementary Material

PDF File (CopyRight_13502_2_1.pdf)
Hi, Pls find ACM License for paper "Packet Timeout Probability for Cognitive Cooperative Radio Network under Security Constraint" in The 12th International Symposium on Information and Communication Technology

References

[1]
V. Asghari and S. Aissa. 2010. Cooperative Relay Communication Performance under Spectrum-Sharing Resource Requirements. In Proc. IEEE International Conference on Communications. Cape Town, South Africa, 1–6.
[2]
Xu Bao, P. Martins, Tiecheng Song, and Lianfeng Shen. 2010. Stable Throughput Analysis of Multi-User Cognitive Cooperative Systems. In IEEE Global Telecommunications Conference. Miami, U.S.A., 1–5.
[3]
Yan Chen, V.K.N. Lau, Shunqing Zhang, and Peiliang Qiu. 2010. Protocol design and delay analysis of half-duplex buffered cognitive relay systems. 9, 3 (Mar. 2010), 898–902.
[4]
S. Chetry and A. Singh. 2018. “Physical Layer Security of Outdated CSI Based CRN". In 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). Bangalore, India, 1–5.
[5]
Haiyang Ding, Jianhua Ge, D. Benevides da Costa, and Zhuoqin Jiang. 2011. Asymptotic Analysis of Cooperative Diversity Systems With Relay Selection in a Spectrum-Sharing Scenario. 60, 2 (Feb. 2011), 457–472.
[6]
M. Elkashlan, L. Wang, T. Q. Duong, G. K. Karagiannidis, and A. Nallanathan. 2015. On the Security of Cognitive Radio Networks,” IEEE Transactions on Vehicular Technology. IEEE Transactions on Vehicular Technology 8, 8 (Aug 2015), 3790–3795.
[7]
J. Gambini, O. Simeone, and U. Spagnolini. 2008. Cognitive relaying and opportunistic spectrum sensing in unlicensed multiple access channels. In IEEE International Symposium on Spread Spectrum Techniques and Applications. Bologna, Italy, 371–375.
[8]
J. Gambini, O. Simeone, U. Spagnolini, Y. Bar-Ness, and Yungsoo Kim. 2008. Cognitive Radio with Secondary Packet-By-Packet Vertical Handover. In IEEE International Conference on Communications. Beijing, China, 1050–1054.
[9]
A. Goldsmith, S.A. Jafar, I. Maric, and S. Srinivasa. 2009. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective. 97, 5 (May 2009), 894–914.
[10]
Y. Han, S. Ting, and A. Pandharipande. 2011. Cooperative Spectrum Sharing Protocol with Selective Relaying System. 60, 1 (Jan. 2011), 62–67.
[11]
Yang Han, See Ho Ting, and A. Pandharipande. 2010. Cooperative Spectrum Sharing Protocol with Secondary User Selection. 9, 9 (Sep. 2010), 2914–2923.
[12]
Tran Hung, Zepernick Hans-Jürgen, Phan Hoc, and Sibomana Louis. 2015. Performance Analysis of a Cognitive Radio Network With a Buffered Relay. IEEE Transactions on Vehicular Technology 64, 2 (2015), 566–579. https://doi.org/10.1109/TVT.2014.2323338
[13]
M. Khabazian and S. Aissa. 2011. Modeling and performance analysis of cooperative communications in cognitive radio networks. In IEEE International Symposium on Personal Indoor and Mobile Radio Communications. Toronto, Canada, 598–603.
[14]
I. Krikidis, J.N. Laneman, J.S. Thompson, and S. McLaughlin. 2009. Protocol design and throughput analysis for multi-user cognitive cooperative systems. 8, 9 (Sep. 2009), 4740–4751.
[15]
Jemin Lee, Hano Wang, J.G. Andrews, and Daesik Hong. 2011. Outage Probability of Cognitive Relay Networks with Interference Constraints. 10, 2 (Feb. 2011), 390–395.
[16]
H. Lei, C. Gao, I. S. Ansari, Y. Guo, Y. Zou, G. Pan, and K. A. Qaraqe. 2017. Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami-m Channels". IEEE Transactions on Vehicular Technology 66, 3 (March 2017), 2237–2250.
[17]
J. Mitola and G. Q. Maguire. 1999. Cognitive radio: Making software radios more personal. IEEE Pers. Comm. 6, 4 (Aug. 1999), 13–18.
[18]
A.K. Sadek, K.J.R. Liu, and A. Ephremides. 2007. Cognitive multiple access via cooperation: Protocol design and performance analysis. 53, 10 (Oct. 2007), 3677–3696.
[19]
S. Sagong, J. Lee, and D. Hong. 2011. Capacity of Reactive DF Scheme in Cognitive Relay Networks. 10, 10 (Oct. 2011), 3133–3138.
[20]
O. Simeone, Y. Bar-Ness, and U. Spagnolini. 2007. Stable Throughput of Cognitive Radios With and Without Relaying Capability. 55, 12 (Dec. 2007), 2351–2360.
[21]
A. Singh, M. R. Bhatnagar, and R. K. Mallik. 2017. “Physical Layer Security of a Multiantenna-Based CR Network With Single and Multiple Primary Users". IEEE Transactions on Vehicular Technology 66, 12 (Dec 2017), 11011–11022.
[22]
H.A. Suraweera, P.J. Smith, and N.A. Surobhi. 2008. Exact outage probability of cooperative diversity with opportunistic spectrum access. In Proc. IEEE International Conference on Communications. Beijing, China, 79–84.
[23]
Hung Tran, Trung Q. Duong, and Hans-Jürgen Zepernick. 2011. Performance Analysis of Cognitive Relay Networks Under Power Constraints of Multiple Primary Users. In Proc. IEEE Global Telecommunications Conference. Houston, U.S.A., 1–6.
[24]
H. Zhao, H. Liu, Y. Liu, C. Tang, and G. Pan. 2015. Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels. In Proc. IEEE International Conference on Communication Software and Networks (ICCSN). Chengdu, China, 201–205.
[25]
H. Zhao, Y. Tan, G. Pan, Y. Chen, and N. Yang. 2016. "Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks". IEEE Transactions on Vehicular Technology 65, 12 (Dec 2016), 10236–10242.
[26]
Caijun Zhong, T. Ratnarajah, and Kai-Kit Wong. 2011. Outage Analysis of Decode-and-Forward Cognitive Dual-Hop Systems With the Interference Constraint in Nakagami-m Fading Channels. 60, 6 (Jul. 2011), 2875–2879.

Index Terms

  1. Packet Timeout Probability for Cognitive Cooperative Radio Network under Security Constraint
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image ACM Other conferences
            SOICT '23: Proceedings of the 12th International Symposium on Information and Communication Technology
            December 2023
            1058 pages
            ISBN:9798400708916
            DOI:10.1145/3628797
            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 07 December 2023

            Permissions

            Request permissions for this article.

            Check for updates

            Author Tags

            1. Cognitive Cooperative Radio Networks
            2. Multiple Primary Users
            3. Packet Timeout Probability
            4. Security Constraint
            5. Spectrum Sharing

            Qualifiers

            • Research-article
            • Research
            • Refereed limited

            Conference

            SOICT 2023

            Acceptance Rates

            Overall Acceptance Rate 147 of 318 submissions, 46%

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 0
              Total Citations
            • 16
              Total Downloads
            • Downloads (Last 12 months)16
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 13 Dec 2024

            Other Metrics

            Citations

            View Options

            Login options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format.

            HTML Format

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media