Loading…
Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a s...
Saved in:
Published in: | Entropy (Basel, Switzerland) Switzerland), 2019-02, Vol.21 (2), p.217 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713 |
---|---|
cites | cdi_FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713 |
container_end_page | |
container_issue | 2 |
container_start_page | 217 |
container_title | Entropy (Basel, Switzerland) |
container_volume | 21 |
creator | Tran Tin, Phu The Hung, Dang Nguyen, Tan N Duy, Tran Trung Voznak, Miroslav |
description | In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol. |
doi_str_mv | 10.3390/e21020217 |
format | article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_44b14cffb2b84ee5865b0e352e9c08d1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_44b14cffb2b84ee5865b0e352e9c08d1</doaj_id><sourcerecordid>2466769305</sourcerecordid><originalsourceid>FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713</originalsourceid><addsrcrecordid>eNpdkktvEzEQx1cIREvhwBdAlrjAIeDHvnxBQlEgkQpU0J6t8e5s4rBrb-3dRvk-fFC8SYlaTjOa-ek_zyR5zegHIST9iJxRTjkrniTnjEo5SwWlTx_4Z8mLELaUcsFZ_jw5E4LnuRT8PPnzCyuP1Z5coW-c78BWSBZ2M9kO7UBikNzYGn0LezJ3a2sGc4fkJ9TGke847Jz_Hcii61u3N3YdEdejhwP0bWwHM1u6nlx7sKEzIRhnyc4MGwK2PjhuHMiVx4BTYdeQJfh6Bx7JquvB-KmH8DJ51kAb8NW9vUhuviyu58vZ5Y-vq_nny1mV5nKY1TVAVdRFCVlOKRRIqdbAkdOyZlKIQqdaFk1MScEkraUuMQMJKRaa04KJi2R11K0dbFXvTQd-rxwYdQg4v1bgB1O1qNJUs7RqGs11mSJmZZ5piiLjKKupXNT6dNTqR91hXcU5PLSPRB9nrNmotbtTRcbiNGUUeHcv4N3tiGFQcX8Vti1YdGNQPM3zIh6RZhF9-x-6daO3cVWKZ2kpSkmpjNT7I1V5F4LH5tQMo2r6I3X6o8i-edj9ifz3OOIvoMnGiw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2548389009</pqid></control><display><type>article</type><title>Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments</title><source>Open Access: PubMed Central</source><source>Publicly Available Content Database</source><source>Directory of Open Access Journals</source><creator>Tran Tin, Phu ; The Hung, Dang ; Nguyen, Tan N ; Duy, Tran Trung ; Voznak, Miroslav</creator><creatorcontrib>Tran Tin, Phu ; The Hung, Dang ; Nguyen, Tan N ; Duy, Tran Trung ; Voznak, Miroslav</creatorcontrib><description>In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.</description><identifier>ISSN: 1099-4300</identifier><identifier>EISSN: 1099-4300</identifier><identifier>DOI: 10.3390/e21020217</identifier><identifier>PMID: 33266932</identifier><language>eng</language><publisher>Switzerland: MDPI AG</publisher><subject>Cognitive radio ; cooperative multi-hop transmission ; Data transmission ; Hardware ; hardware impairments ; Impairment ; Interference ; physical-layer security ; Protocol ; Random variables ; Receivers & amplifiers ; Recursive methods ; secrecy outage probability ; Transmitters ; underlay cognitive radio ; Wireless communications ; Wireless networks</subject><ispartof>Entropy (Basel, Switzerland), 2019-02, Vol.21 (2), p.217</ispartof><rights>2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2019 by the authors. 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713</citedby><cites>FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713</cites><orcidid>0000-0002-2286-6652 ; 0000-0002-5793-4627 ; 0000-0001-5135-7980 ; 0000-0002-3947-2174</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2548389009/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2548389009?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,864,885,2102,25753,27924,27925,37012,37013,44590,53791,53793,75126</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/33266932$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Tran Tin, Phu</creatorcontrib><creatorcontrib>The Hung, Dang</creatorcontrib><creatorcontrib>Nguyen, Tan N</creatorcontrib><creatorcontrib>Duy, Tran Trung</creatorcontrib><creatorcontrib>Voznak, Miroslav</creatorcontrib><title>Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments</title><title>Entropy (Basel, Switzerland)</title><addtitle>Entropy (Basel)</addtitle><description>In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.</description><subject>Cognitive radio</subject><subject>cooperative multi-hop transmission</subject><subject>Data transmission</subject><subject>Hardware</subject><subject>hardware impairments</subject><subject>Impairment</subject><subject>Interference</subject><subject>physical-layer security</subject><subject>Protocol</subject><subject>Random variables</subject><subject>Receivers & amplifiers</subject><subject>Recursive methods</subject><subject>secrecy outage probability</subject><subject>Transmitters</subject><subject>underlay cognitive radio</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>1099-4300</issn><issn>1099-4300</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpdkktvEzEQx1cIREvhwBdAlrjAIeDHvnxBQlEgkQpU0J6t8e5s4rBrb-3dRvk-fFC8SYlaTjOa-ek_zyR5zegHIST9iJxRTjkrniTnjEo5SwWlTx_4Z8mLELaUcsFZ_jw5E4LnuRT8PPnzCyuP1Z5coW-c78BWSBZ2M9kO7UBikNzYGn0LezJ3a2sGc4fkJ9TGke847Jz_Hcii61u3N3YdEdejhwP0bWwHM1u6nlx7sKEzIRhnyc4MGwK2PjhuHMiVx4BTYdeQJfh6Bx7JquvB-KmH8DJ51kAb8NW9vUhuviyu58vZ5Y-vq_nny1mV5nKY1TVAVdRFCVlOKRRIqdbAkdOyZlKIQqdaFk1MScEkraUuMQMJKRaa04KJi2R11K0dbFXvTQd-rxwYdQg4v1bgB1O1qNJUs7RqGs11mSJmZZ5piiLjKKupXNT6dNTqR91hXcU5PLSPRB9nrNmotbtTRcbiNGUUeHcv4N3tiGFQcX8Vti1YdGNQPM3zIh6RZhF9-x-6daO3cVWKZ2kpSkmpjNT7I1V5F4LH5tQMo2r6I3X6o8i-edj9ifz3OOIvoMnGiw</recordid><startdate>20190224</startdate><enddate>20190224</enddate><creator>Tran Tin, Phu</creator><creator>The Hung, Dang</creator><creator>Nguyen, Tan N</creator><creator>Duy, Tran Trung</creator><creator>Voznak, Miroslav</creator><general>MDPI AG</general><general>MDPI</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-2286-6652</orcidid><orcidid>https://orcid.org/0000-0002-5793-4627</orcidid><orcidid>https://orcid.org/0000-0001-5135-7980</orcidid><orcidid>https://orcid.org/0000-0002-3947-2174</orcidid></search><sort><creationdate>20190224</creationdate><title>Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments</title><author>Tran Tin, Phu ; The Hung, Dang ; Nguyen, Tan N ; Duy, Tran Trung ; Voznak, Miroslav</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Cognitive radio</topic><topic>cooperative multi-hop transmission</topic><topic>Data transmission</topic><topic>Hardware</topic><topic>hardware impairments</topic><topic>Impairment</topic><topic>Interference</topic><topic>physical-layer security</topic><topic>Protocol</topic><topic>Random variables</topic><topic>Receivers & amplifiers</topic><topic>Recursive methods</topic><topic>secrecy outage probability</topic><topic>Transmitters</topic><topic>underlay cognitive radio</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tran Tin, Phu</creatorcontrib><creatorcontrib>The Hung, Dang</creatorcontrib><creatorcontrib>Nguyen, Tan N</creatorcontrib><creatorcontrib>Duy, Tran Trung</creatorcontrib><creatorcontrib>Voznak, Miroslav</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>Directory of Open Access Journals</collection><jtitle>Entropy (Basel, Switzerland)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tran Tin, Phu</au><au>The Hung, Dang</au><au>Nguyen, Tan N</au><au>Duy, Tran Trung</au><au>Voznak, Miroslav</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments</atitle><jtitle>Entropy (Basel, Switzerland)</jtitle><addtitle>Entropy (Basel)</addtitle><date>2019-02-24</date><risdate>2019</risdate><volume>21</volume><issue>2</issue><spage>217</spage><pages>217-</pages><issn>1099-4300</issn><eissn>1099-4300</eissn><abstract>In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.</abstract><cop>Switzerland</cop><pub>MDPI AG</pub><pmid>33266932</pmid><doi>10.3390/e21020217</doi><orcidid>https://orcid.org/0000-0002-2286-6652</orcidid><orcidid>https://orcid.org/0000-0002-5793-4627</orcidid><orcidid>https://orcid.org/0000-0001-5135-7980</orcidid><orcidid>https://orcid.org/0000-0002-3947-2174</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1099-4300 |
ispartof | Entropy (Basel, Switzerland), 2019-02, Vol.21 (2), p.217 |
issn | 1099-4300 1099-4300 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_44b14cffb2b84ee5865b0e352e9c08d1 |
source | Open Access: PubMed Central; Publicly Available Content Database; Directory of Open Access Journals |
subjects | Cognitive radio cooperative multi-hop transmission Data transmission Hardware hardware impairments Impairment Interference physical-layer security Protocol Random variables Receivers & amplifiers Recursive methods secrecy outage probability Transmitters underlay cognitive radio Wireless communications Wireless networks |
title | Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T07%3A30%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Performance%20Enhancement%20for%20Underlay%20Cognitive%20Radio%20Networks%20Employing%20Cooperative%20Multi-Hop%20Transmission%20with%20and%20without%20Presence%20of%20Hardware%20Impairments&rft.jtitle=Entropy%20(Basel,%20Switzerland)&rft.au=Tran%20Tin,%20Phu&rft.date=2019-02-24&rft.volume=21&rft.issue=2&rft.spage=217&rft.pages=217-&rft.issn=1099-4300&rft.eissn=1099-4300&rft_id=info:doi/10.3390/e21020217&rft_dat=%3Cproquest_doaj_%3E2466769305%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c469t-ddaac7d78a5600a7e00bba2e208d19337b4b97f00a93190d9b8e5a9a4e7b20713%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2548389009&rft_id=info:pmid/33266932&rfr_iscdi=true |