z-logo
open-access-imgOpen Access
SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING
Author(s) -
Ngoc Pham Thi Dan,
Khuong Ho Van,
Hanh Dang Ngoc,
Thiem Do Dac,
P. Nguyen Huu,
Son Vo Que,
Son Pham Ngoc,
Lien Hong Pham
Publication year - 2020
Publication title -
journal of computer science and cybernetics (vietnam academy of science and technology)/journal of computer science and cybernetics
Language(s) - English
Resource type - Journals
eISSN - 2815-5939
pISSN - 1813-9663
DOI - 10.15625/1813-9663/36/3/14987
Subject(s) - cognitive radio , secrecy , jamming , communication source , computer science , computer network , transmitter , computer security , energy (signal processing) , telecommunications , wireless , channel (broadcasting) , statistics , physics , mathematics , thermodynamics
This paper investigates a cognitive radio network where a secondary sender assists a primarytransmitter in relaying primary information to a primary receiver and also transmits its own information toa secondary recipient. This sender is capable of jamming to protect secondary and/or primary informationagainst an eavesdropper and self-powering by harvesting radio frequency energy of primary signals.Security capability of both secondary and primary networks are analyzed in terms of secrecy outageprobability. Numerous results corroborate the proposed analysis which serves as a design guidelineto quickly assess and optimize security performance. More importantly, security capability trade-offbetween secondary and primary networks can be totally controlled with appropriate selection of systemparameters.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here