Security Improvement for Energy Harvesting Based Overlay Cognitive Networks with Jamming-Assisted Full-Duplex Destinations

Khuong Ho-Van*, Paschalis C. Sofotasios, Sami Muhaidat, Simon L. Cotton, Seong Ki Yoo, Yury A. Brychkov, Octavia A. Dobre, Mikko Valkama

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

27 Citations (Scopus)

Abstract

This work investigates the secrecy capability of energy harvesting based overlay cognitive networks (EHOCNs). To this end, we assume that a message by a licensed transmitter is relayed by an unlicensed sender. Critically, the unlicensed sender uses energy harvested from licensed signals, enhancing the overall energy efficiency and maintaining the integrity of licensed communications. To secure messages broadcast by the unlicensed sender against the wire-tapper, full-duplex destinations - unlicensed recipient and licensed receiver - jam the eavesdropper at the same time they receive signals from the unlicensed sender. To this effect, we derive closed-form formulas for the secrecy outage probability, which then quantify the security performance of both unlicensed and licensed communications for EHOCNs with jamming-assisted full-duplex destinations, namely EHOCNwFD. In addition, optimum operating parameters are established, which can serve as essential design guidelines of such systems.

Original languageEnglish
Pages (from-to)12232-12237
Number of pages6
JournalIEEE Transactions on Vehicular Technology
Volume70
Issue number11
Early online date06 Oct 2021
DOIs
Publication statusPublished - 01 Nov 2021

Bibliographical note

Publisher Copyright:
© 1967-2012 IEEE.

Keywords

  • Energy harvesting
  • full-duplex jamming
  • overlay cognitive radio
  • PHY layer security
  • secrecy probability

ASJC Scopus subject areas

  • Automotive Engineering
  • Aerospace Engineering
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Security Improvement for Energy Harvesting Based Overlay Cognitive Networks with Jamming-Assisted Full-Duplex Destinations'. Together they form a unique fingerprint.

Cite this