Loading…

Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments

In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a s...

Full description

Saved in:
Bibliographic Details
Published in:Entropy (Basel, Switzerland) Switzerland), 2019-02, Vol.21 (2), p.217
Main Authors: Tran Tin, Phu, The Hung, Dang, Nguyen, Tan N, Duy, Tran Trung, Voznak, Miroslav
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713
cites cdi_FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713
container_end_page
container_issue 2
container_start_page 217
container_title Entropy (Basel, Switzerland)
container_volume 21
creator Tran Tin, Phu
The Hung, Dang
Nguyen, Tan N
Duy, Tran Trung
Voznak, Miroslav
description In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.
doi_str_mv 10.3390/e21020217
format article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_44b14cffb2b84ee5865b0e352e9c08d1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_44b14cffb2b84ee5865b0e352e9c08d1</doaj_id><sourcerecordid>2466769305</sourcerecordid><originalsourceid>FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713</originalsourceid><addsrcrecordid>eNpdkktvEzEQx1cIREvhwBdAlrjAIeDHvnxBQlEgkQpU0J6t8e5s4rBrb-3dRvk-fFC8SYlaTjOa-ek_zyR5zegHIST9iJxRTjkrniTnjEo5SwWlTx_4Z8mLELaUcsFZ_jw5E4LnuRT8PPnzCyuP1Z5coW-c78BWSBZ2M9kO7UBikNzYGn0LezJ3a2sGc4fkJ9TGke847Jz_Hcii61u3N3YdEdejhwP0bWwHM1u6nlx7sKEzIRhnyc4MGwK2PjhuHMiVx4BTYdeQJfh6Bx7JquvB-KmH8DJ51kAb8NW9vUhuviyu58vZ5Y-vq_nny1mV5nKY1TVAVdRFCVlOKRRIqdbAkdOyZlKIQqdaFk1MScEkraUuMQMJKRaa04KJi2R11K0dbFXvTQd-rxwYdQg4v1bgB1O1qNJUs7RqGs11mSJmZZ5piiLjKKupXNT6dNTqR91hXcU5PLSPRB9nrNmotbtTRcbiNGUUeHcv4N3tiGFQcX8Vti1YdGNQPM3zIh6RZhF9-x-6daO3cVWKZ2kpSkmpjNT7I1V5F4LH5tQMo2r6I3X6o8i-edj9ifz3OOIvoMnGiw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2548389009</pqid></control><display><type>article</type><title>Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments</title><source>Open Access: PubMed Central</source><source>Publicly Available Content Database</source><source>Directory of Open Access Journals</source><creator>Tran Tin, Phu ; The Hung, Dang ; Nguyen, Tan N ; Duy, Tran Trung ; Voznak, Miroslav</creator><creatorcontrib>Tran Tin, Phu ; The Hung, Dang ; Nguyen, Tan N ; Duy, Tran Trung ; Voznak, Miroslav</creatorcontrib><description>In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.</description><identifier>ISSN: 1099-4300</identifier><identifier>EISSN: 1099-4300</identifier><identifier>DOI: 10.3390/e21020217</identifier><identifier>PMID: 33266932</identifier><language>eng</language><publisher>Switzerland: MDPI AG</publisher><subject>Cognitive radio ; cooperative multi-hop transmission ; Data transmission ; Hardware ; hardware impairments ; Impairment ; Interference ; physical-layer security ; Protocol ; Random variables ; Receivers &amp; amplifiers ; Recursive methods ; secrecy outage probability ; Transmitters ; underlay cognitive radio ; Wireless communications ; Wireless networks</subject><ispartof>Entropy (Basel, Switzerland), 2019-02, Vol.21 (2), p.217</ispartof><rights>2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2019 by the authors. 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713</citedby><cites>FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713</cites><orcidid>0000-0002-2286-6652 ; 0000-0002-5793-4627 ; 0000-0001-5135-7980 ; 0000-0002-3947-2174</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2548389009/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2548389009?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,864,885,2102,25753,27924,27925,37012,37013,44590,53791,53793,75126</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/33266932$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Tran Tin, Phu</creatorcontrib><creatorcontrib>The Hung, Dang</creatorcontrib><creatorcontrib>Nguyen, Tan N</creatorcontrib><creatorcontrib>Duy, Tran Trung</creatorcontrib><creatorcontrib>Voznak, Miroslav</creatorcontrib><title>Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments</title><title>Entropy (Basel, Switzerland)</title><addtitle>Entropy (Basel)</addtitle><description>In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.</description><subject>Cognitive radio</subject><subject>cooperative multi-hop transmission</subject><subject>Data transmission</subject><subject>Hardware</subject><subject>hardware impairments</subject><subject>Impairment</subject><subject>Interference</subject><subject>physical-layer security</subject><subject>Protocol</subject><subject>Random variables</subject><subject>Receivers &amp; amplifiers</subject><subject>Recursive methods</subject><subject>secrecy outage probability</subject><subject>Transmitters</subject><subject>underlay cognitive radio</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>1099-4300</issn><issn>1099-4300</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpdkktvEzEQx1cIREvhwBdAlrjAIeDHvnxBQlEgkQpU0J6t8e5s4rBrb-3dRvk-fFC8SYlaTjOa-ek_zyR5zegHIST9iJxRTjkrniTnjEo5SwWlTx_4Z8mLELaUcsFZ_jw5E4LnuRT8PPnzCyuP1Z5coW-c78BWSBZ2M9kO7UBikNzYGn0LezJ3a2sGc4fkJ9TGke847Jz_Hcii61u3N3YdEdejhwP0bWwHM1u6nlx7sKEzIRhnyc4MGwK2PjhuHMiVx4BTYdeQJfh6Bx7JquvB-KmH8DJ51kAb8NW9vUhuviyu58vZ5Y-vq_nny1mV5nKY1TVAVdRFCVlOKRRIqdbAkdOyZlKIQqdaFk1MScEkraUuMQMJKRaa04KJi2R11K0dbFXvTQd-rxwYdQg4v1bgB1O1qNJUs7RqGs11mSJmZZ5piiLjKKupXNT6dNTqR91hXcU5PLSPRB9nrNmotbtTRcbiNGUUeHcv4N3tiGFQcX8Vti1YdGNQPM3zIh6RZhF9-x-6daO3cVWKZ2kpSkmpjNT7I1V5F4LH5tQMo2r6I3X6o8i-edj9ifz3OOIvoMnGiw</recordid><startdate>20190224</startdate><enddate>20190224</enddate><creator>Tran Tin, Phu</creator><creator>The Hung, Dang</creator><creator>Nguyen, Tan N</creator><creator>Duy, Tran Trung</creator><creator>Voznak, Miroslav</creator><general>MDPI AG</general><general>MDPI</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-2286-6652</orcidid><orcidid>https://orcid.org/0000-0002-5793-4627</orcidid><orcidid>https://orcid.org/0000-0001-5135-7980</orcidid><orcidid>https://orcid.org/0000-0002-3947-2174</orcidid></search><sort><creationdate>20190224</creationdate><title>Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments</title><author>Tran Tin, Phu ; The Hung, Dang ; Nguyen, Tan N ; Duy, Tran Trung ; Voznak, Miroslav</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Cognitive radio</topic><topic>cooperative multi-hop transmission</topic><topic>Data transmission</topic><topic>Hardware</topic><topic>hardware impairments</topic><topic>Impairment</topic><topic>Interference</topic><topic>physical-layer security</topic><topic>Protocol</topic><topic>Random variables</topic><topic>Receivers &amp; amplifiers</topic><topic>Recursive methods</topic><topic>secrecy outage probability</topic><topic>Transmitters</topic><topic>underlay cognitive radio</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tran Tin, Phu</creatorcontrib><creatorcontrib>The Hung, Dang</creatorcontrib><creatorcontrib>Nguyen, Tan N</creatorcontrib><creatorcontrib>Duy, Tran Trung</creatorcontrib><creatorcontrib>Voznak, Miroslav</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>Directory of Open Access Journals</collection><jtitle>Entropy (Basel, Switzerland)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tran Tin, Phu</au><au>The Hung, Dang</au><au>Nguyen, Tan N</au><au>Duy, Tran Trung</au><au>Voznak, Miroslav</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments</atitle><jtitle>Entropy (Basel, Switzerland)</jtitle><addtitle>Entropy (Basel)</addtitle><date>2019-02-24</date><risdate>2019</risdate><volume>21</volume><issue>2</issue><spage>217</spage><pages>217-</pages><issn>1099-4300</issn><eissn>1099-4300</eissn><abstract>In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.</abstract><cop>Switzerland</cop><pub>MDPI AG</pub><pmid>33266932</pmid><doi>10.3390/e21020217</doi><orcidid>https://orcid.org/0000-0002-2286-6652</orcidid><orcidid>https://orcid.org/0000-0002-5793-4627</orcidid><orcidid>https://orcid.org/0000-0001-5135-7980</orcidid><orcidid>https://orcid.org/0000-0002-3947-2174</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1099-4300
ispartof Entropy (Basel, Switzerland), 2019-02, Vol.21 (2), p.217
issn 1099-4300
1099-4300
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_44b14cffb2b84ee5865b0e352e9c08d1
source Open Access: PubMed Central; Publicly Available Content Database; Directory of Open Access Journals
subjects Cognitive radio
cooperative multi-hop transmission
Data transmission
Hardware
hardware impairments
Impairment
Interference
physical-layer security
Protocol
Random variables
Receivers & amplifiers
Recursive methods
secrecy outage probability
Transmitters
underlay cognitive radio
Wireless communications
Wireless networks
title Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T07%3A30%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Performance%20Enhancement%20for%20Underlay%20Cognitive%20Radio%20Networks%20Employing%20Cooperative%20Multi-Hop%20Transmission%20with%20and%20without%20Presence%20of%20Hardware%20Impairments&rft.jtitle=Entropy%20(Basel,%20Switzerland)&rft.au=Tran%20Tin,%20Phu&rft.date=2019-02-24&rft.volume=21&rft.issue=2&rft.spage=217&rft.pages=217-&rft.issn=1099-4300&rft.eissn=1099-4300&rft_id=info:doi/10.3390/e21020217&rft_dat=%3Cproquest_doaj_%3E2466769305%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2548389009&rft_id=info:pmid/33266932&rfr_iscdi=true