- Research
- Open Access

# Spectrum sharing with secure transmission

- Ngoc Son Pham
^{1}and - Hyung Yun Kong
^{1}Email author

**2014**:134

https://doi.org/10.1186/1687-1499-2014-134

© Pham and Kong; licensee Springer. 2014

**Received:**16 December 2013**Accepted:**5 August 2014**Published:**18 August 2014

## Abstract

In this paper, we propose a cooperative scheme between primary and secondary networks. In this scheme, a secondary user (SU) accepts a lease of a part of the licensed band according to a cooperative request of a primary user (PU). Hence, the SU helps the PU in transmitting primary signals and has an opportunity to access the frequency spectrum. On the other hand, the SU owns important data and may mistrust the intention of a primary transmitter. Physical layer security is applied to evaluate the cooperative efficiency in terms of the data transmission and data security. The numerical and simulative results show that the system performance of the primary network in the cooperative scheme is improved in terms of the outage probability and the symbol error rate and is compared with that in the direct transmission scheme. In addition, the secure performance of the secondary network, as expressed by the outage secrecy probability and the average secrecy capacity, is maintained under the eavesdropping of the primary transmitter.

## Keywords

- Spectrum sharing
- Cooperative communication
- Physical layer security
- Decode-and-forward
- Outage probability
- Symbol error rate
- Outage secrecy probability
- Average secrecy capacity

## 1 Introduction

Cognitive radio (CR) is a concept that enhances the utilization efficiency of the licensed frequency spectrum in that wireless devices are continuously developed for modern applications, but the spectrum bands are limited [1]. In cognitive radio networks, unlicensed users, which are known as secondary users (SUs), only access the licensed bands without causing interference to licensed users, which are known as primary users (PUs). To do this, SUs always opportunistically sense the presence or absence of the licensed bands to make a transmission decision. When the quality of service (QoS) of the primary network is very high, the transmission of the secondary network depends on the cooperative request of the PU. In this scheme, the PU leases a part of the licensed band to the SU to increase the QoS of the primary network as well as the spectrum access capacity of the secondary network [2–5]. At this time, a SU has the right to use the licensed band, but the SU does not know the artifice of PUs which PUs want to eavesdrop on the information of the SU.

Due to the broadcast characteristic of the wireless environment, the secrecy of data transmissions is very important. Physical layer security is proposed to solve the security problem in which the secrecy principle is based on the exploitation of the physical characteristics of the wireless channel [6–24]. In [6], Wyner showed that the important data is secure if the quality of the main channel is larger than that of the wiretap channel. Physical layer security has been investigated in the Gaussian channel [7], the broadcast channel [8], and the wireless fading channels [9] and has been extended to the relay-eavesdropper channel [10], the parallel relay-eavesdropper channel [11], and the multi-access channel [12, 13, 15]. The achievable secrecy rate (ASR) is the metric used to measure the amount of secure data that is successfully received at the intended user [17]. In [17, 19], global channel state information (CSI) is available in which Dong et al. regarded a practical assumption that the eavesdropper nodes are active and their CSIs are monitored by the center network [17]. Kim et al. assumed that the source and relay nodes can detect the CSI based on frequent response messages of the eavesdropper nodes. These messages will be used to inform the source node that the eavesdropper nodes want to be served in the next phases [20]. Exploitation of relays has been proposed to overcome the fading environment as well as to enhance secrecy capacity [10, 11, 17–24]. Optimal relay selection methods [18, 23] and weight optimization methods of the cooperative relays [17, 19] have been studied to maximize the ASR and satisfy a total transmit power constraint. In [21–24], a utilization of jamming signals has been investigated in which friendly wireless nodes or relays operate as jammers to create artificial interference to reduce the quality of the eavesdropping channel. The authors assumed that the jamming signals are known at both the destination nodes and the relays; hence, the quality of the desired channel cannot be affected by the interference signals. A special case in which the cooperative relay does not behave as a trusted node is proposed [25].

In [4, 5], the SUs have opportunity to wiretap the primary data of the PUs, and then these SUs are mistrusted as eavesdropper nodes. In [16–18, 20], the eavesdropper nodes are assumed as special wireless nodes, whereas the primary data are wiretapped by nodes as relays in [19, 25]. Motivated by the above issues, in this paper, we propose a cooperative scheme between the primary and secondary networks in which the PU leases a part of the licensed band to the SU to improve the performance of its system. In this proposed scheme, the SU uses the licensed band to perform two jobs as follows: First, the SU helps the PU by decoding and using the amount of power needed for forwarding the primary signals. Second, the SU uses the remaining power to transmit the important data against the eavesdropping of the primary transmitter. The cooperative efficiency of the primary network is obtained in terms of the outage probability and symbol error rate (SER) and is compared with the direct transmission scheme. For the secondary network, the outage secrecy probability and the average secrecy capacity are presented to evaluate the efficiency of the spectrum lease.

The rest of the paper is organized as follows: In Section 2, we present the cooperative system model and operation principle. The performance analysis of the primary and secondary networks is presented in Section 3. Section 4 discusses the numerical and simulative results using the Monte Carlo method and theoretical expressions. The conclusions are summarized in Section 5.

## 2 System model

*P*and that all nodes suffer the zero-mean additive white Gaussian noise (AWGN) with the same variance

*N*

_{0}.

In Figure 1, (*h*_{1}, *d*_{1}), (*h*_{2}, *d*_{2}), (*h*_{31}, *d*_{3}), (*h*_{32}, *d*_{3}), (*h*_{4}, *d*_{4}), and (*h*_{5}, *d*_{5}) denote the Rayleigh fading channel coefficients and the link distances of ST-SR, ST-PR, PT-ST, ST-PT, PT-SR, and PT-PR, respectively. Therefore, the channel gains *g*_{
i
}=|*h*_{
i
}|^{2} and *g*_{3j}=|*h*_{3j}|^{2} are exponential distribution random variables (RVs) with parameters *λ*_{
i
} and *λ*_{3}, respectively, which are given as ${\lambda}_{i}={d}_{i}^{\beta}$ and ${\lambda}_{3}={d}_{3}^{\beta}$ where *β* is the path loss exponent, *i*∈{1,2,4,5}, *j*∈{1,2}. We note that links PT-ST and ST-PT have the same distance but different direction.

Before transmitting a data packet, a connection establishment phase is performed using the media access control (MAC) layer protocol, which is similar to the CoopMAC in [26]. First, PT broadcasts a request-to-send (RTS) message to nodes ST, SR, and PR. Hence, ST can estimate the fading channel coefficient *h*_{31} when receiving the RTS message. Because of the transmission desire of the secondary network on the licensed band, ST will immediately reply to the RTS message by sending a helper-ready-to-send (HTS) to nodes PT, PR, and SR. Relying on the receipt of the RTS and HTS messages, nodes PR and SR can estimate the fading channel coefficient pairs (*h*_{5}, *h*_{2}) and (*h*_{4}, *h*_{1}), respectively, and then these nodes will broadcast clear-to-send (CTS) messages that include their estimated fading channel coefficients. If PT wants to cooperate with ST, it will send a RTS message which includes *h*_{32} estimated from the HTS message to notify a cooperative acceptance to ST. Based on the above steps of the setup phase, ST will know the fading channel coefficients (*h*_{31}, *h*_{32}) from the RTS messages, (*h*_{4}, *h*_{1}) from the CTS message of SR, and (*h*_{5}, *h*_{2}) from the CTS message of PR. Therefore, ST can select a power sharing parameter as well as evaluate the secrecy performance of the secondary network. Similarly, PT will know the fading channel coefficients *h*_{31}, *h*_{2}, and *h*_{5} for selecting the cooperative method and analyzing the system performance of the primary network.

*x*

_{ P }to ST, SR, and PR by using a RTS message [26]. The received signals at ST, SR, and PR are given, respectively, as

where *n*_{ST}, *n*_{SR}, and *n*_{PR} are the zero-mean AWGN at nodes ST, SR, and PR, respectively.

*x*

_{ P }. Then, if the PR cannot successfully decode the signal

*x*

_{ P }, it will send a CTS message. After that, PT receives the CTS message, and it will send a RTS message to ST to require cooperation. Because the secondary network cannot use the licensed spectrum band of the primary network, ST will accept the cooperation request of PT by leasing a part of the licensed spectrum band. This procedure is performed at ST by combining the signal

*x*

_{ P }with its signal

*x*

_{ S }based on the power allocation strategy, which is proposed in [4, 5] as

where *α*(0<*α*<1) is the fraction of the transmit power allocated to the signal *x*_{
P
} and *α* *P* is like the money of the secondary network for payment of a leased spectrum band.

*x*

_{ C }to nodes SR, PR, and even PT. The received signals at SR, PR, and PT in the second time slot can be given, respectively, as

where *n*_{PT} is the zero-mean AWGN at node PT.

*x*

_{ P }[4], Equation 23, so the received signal-to-noise ratio (SNR) at PR can be expressed as

where *γ*=*P*/*N*_{0} is the transmit SNR.

*x*

_{ P }in the first time slot, there are two cases for decoding the signal

*x*

_{ P }from the received signal (2) as + SR successfully decodes

*x*

_{ P }, and then SR can cancel the interference component

*x*

_{ P }in (5). The received signal after canceling the interference at SR is given as

*γ*

_{1}at SR is given to decode

*x*

_{ S }as

*x*

_{ P }, and then the received SNR

*γ*

_{1}at SR is expressed as

*x*

_{ S }of ST while PR only receives the signal

*x*

_{ P }of PT in the second time slot. The received ASR at SR is given as [17]

*x*}

^{+}is noted for max(0,

*x*) function;

*R*

_{ST-SR}and

*R*

_{ST-PT}are the achievable data rates of links ST-SR and ST-PT, respectively, and are given as

where the factor (1/2) means that the signals are transmitted in two time slots, and *γ*_{32} is the received SNR at PT from ST to decode the signal *x*_{
S
}.

*x*

_{ P }is the transmitted signal of the eavesdropper PT. The

*x*

_{ P }can be considered as a side information that is available at the transmitter ST and the eavesdropper PT [27]. Hence, the eavesdropper PT can cancel the self-interference

*x*

_{ P }. As a result, the received SNR

*γ*

_{32}at PT is given as

## 3 Performance analysis

### 3.1 The primary network: outage probability and symbol error rate

#### 3.1.1 Outage probability

*R*

_{PT-ST}is less than the target data rate

*R*

_{ P }of the primary network, ST cannot successfully decode

*x*

_{ P }. The outage probability at ST in this case is given as

where *θ*=2^{2}^{
R
}_{
P
}−1.

*g*

_{31}in (16) and

*g*

_{32}in (15) have different meanings because these symbols are calculated in the different time slots and directions. Hence, we can assume that

*g*

_{31}and

*g*

_{32}are independent exponential RVs with the same parameter

*λ*

_{3}. When ST successfully decodes the signal

*x*

_{ P }, ST accepts the help request of PT and combines

*x*

_{ P }with its signal

*x*

_{ S }as

*x*

_{ C }in (4). After applying the MRC technique, the achievable data rate at PR is given as

where ${F}_{{\gamma}_{\text{MRC}}}\left(x\right)$ is the cumulative distribution function (CDF) of the RV *γ*_{MRC}.

##### Theorem 1

##### Proof

The proof is performed in Appendix 5.

We denote *m*(*u*) as a function of variable *u* and is defined as *m*(*u*)=*λ*_{5}*u*+*α* *λ*_{2}/*u*, *u*∈[0,*∞*). By performing a function survey method, *m*(*u*) is minimum at *m*(*u*^{∗}), is a decreasing function in [0,*u*^{∗}], and is an increasing function in [*u*^{∗},*∞*), where ${u}^{\int}=\sqrt{\alpha {\lambda}_{2}/{\lambda}_{5}}$. Hence, Theorem 2 will obtain a lower bound of ${P}_{\text{PT-PR}}^{\text{MRC}}$ as

##### Theorem 2

where $\Delta =\phantom{\rule{0.3em}{0ex}}\left\{\begin{array}{l}m\left(\alpha \right)\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}},\eta >\alpha \\ m\left({u}^{\int}\right)\phantom{\rule{0.3em}{0ex}},\eta \le \alpha \end{array}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\right.$, $\Omega =\phantom{\rule{0.3em}{0ex}}\left\{\begin{array}{l}m\left(\alpha \right)\phantom{\rule{2em}{0ex}}\phantom{\rule{2em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{1em}{0ex}},\eta >\alpha \\ m\left({u}^{\int}\right)\phantom{\rule{2em}{0ex}}\phantom{\rule{2em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{1em}{0ex}},\alpha \ge \eta >{\left(\alpha -\theta \left(1-\alpha \right)\right)}^{2}/2\\ m\left(\alpha -\theta \left(1-\alpha \right)\right)\phantom{\rule{0.3em}{0ex}},\eta \le {\left(\alpha -\theta \left(1-\alpha \right)\right)}^{2}/2\end{array}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\right.$and *η*=*λ*_{2}/*λ*_{5}.

*Proof*.

Given in Appendix 5.

*x*

_{ P }, node PR only receives the direct signal from PT in the first time slot, so

*γ*

_{MRC}equals

*γ*

*g*

_{5}in (8). The outage probability at PR in this case is given as

where ${P}_{\text{PT-ST}}^{\text{out}}$, ${P}_{\text{PT-PR}}^{\text{MRC}}$, and ${P}_{\text{PT-PR}}^{\text{out}}$ are obtained in (17), (21) and (23), respectively.

where ${P}_{\text{PT-PR}}^{\text{MRC\_lower}}$ is obtained in (22).

*x*

_{ P }to PR without the help of ST. In this case, ST does not have opportunities to transmit its signal

*x*

_{ S }. For a fair evaluation, PT will transmit the same signal

*x*

_{ P }during two time slots, and PR will use the MRC technique to combine these received signals to increase the decoding capacity. The received SNR at PR is given as

where *g*_{51} and *g*_{52} are the channel gains of link PT-PR in the first and second time slots, respectively, and we assume that *g*_{51} and *g*_{52} are independent exponential RVs with the same parameter *λ*_{5}.

##### Lemma 1

*Proof*.

where ${f}_{{g}_{51}}\left(t\right)={\lambda}_{5}{e}^{-{\lambda}_{5}t}$ and ${F}_{{g}_{52}}\left(t\right)=1-{e}^{-{\lambda}_{5}t}$ are the probability density function (PDF) and CDF of RVs *g*_{51} and *g*_{52}, respectively.

Hence, ${F}_{{g}_{52}}(x/\gamma -t)$ in (28) is calculated as ${F}_{{g}_{52}}(x/\gamma -t)=1-{e}^{-{\lambda}_{5}\left(x/\gamma -t\right)}$. Then, substituting ${f}_{{g}_{51}}\left(t\right)$ and ${F}_{{g}_{52}}(x/\gamma -t)$ into (28), Lemma 1 is proven.

#### 3.1.2 Symbol error rate

where *a* and *b* are constants that depend on the modulation type, e.g., *a*=*b*=1 for BPSK modulation, *γ* *g*_{31} is the received SNR at ST, and ${F}_{\gamma {g}_{31}}\left(x\right)$ is the CDF of the RV *γ* *g*_{31} and is given as ${F}_{\gamma {g}_{31}}\left(x\right)=1-{e}^{-{\lambda}_{3}x/\gamma}$.

*x*

_{ P }, PR receives two signal paths such as the direct path from PT and the cooperative path from ST at the different time slots. To restore

*x*

_{ P }, PR performs the MRC decoding by storing the received signal

*y*

_{PT-PR}(3) at the first time slot and then waiting to the second time slot to combine with the received signal

*y*

_{ST-PR}(6). Two received signals

*y*

_{PT-PR}and

*y*

_{ST-PR}in the two-phase transmission can be seen as an equivalent single-input multi-output (SIMO) [5]. As described in [4, 5], the MRC decoding is easier to implement. With the help of the equation [28, Eq. (27)], the average SER at PR after applying the MRC technique is expressed as

Note that the regeneration of *x*_{
P
} can be performed by the minimum mean square error decoding (MMSE decoding) [29, 30]. The analysis of SER in the MMSE decoding is complex because it relates resolution of posterior distributions. The MMSE decoding will be our future work.

To solve ${\overline{\text{SER}}}_{\text{PT-PR}}^{\text{MRC}}$ in the formula (32), Theorem 3 is obtained as follows:

##### Theorem 3

where *Erfc[x]* is the complementary error function [31, Eq. (8.250.4)].

*Proof*.

After some manipulations of (34), the proof of Theorem 3 is completed.

From the result of Theorem 3, the integral component $\underset{\alpha -\left(1-\alpha \right)x}{\overset{\alpha}{\int}}{e}^{-\frac{{\lambda}_{5}u+\alpha {\lambda}_{2}/u}{\left(1-\alpha \right)\gamma}}\mathit{\text{du}}$ depends on variable *x* and the function *m*(*u*)=*λ*_{5}*u*+*α* *λ*_{2}/*u* has a complex form. Hence, the analysis of ${\overline{\text{SER}}}_{\text{PT-PR}}^{\text{MRC}}$ in the lower bound form as ${P}_{\text{PT-PR}}^{\text{MRC}}$ in Theorem 2 is not feasible.

*x*

_{ P }, PR only directly receives the signal

*x*

_{ P }in the first time slot. The average SER at PR in this case is given as

where ${F}_{\gamma {g}_{5}}\left(x\right)$ is the CDF of the exponential RV *γ* *g*_{5} and is expressed as ${F}_{\gamma {g}_{5}}\left(x\right)=1-{e}^{-{\lambda}_{5}x/\gamma}$.

where ${\overline{\text{SER}}}_{\text{PT-ST}}$, ${\overline{\text{SER}}}_{\text{PT-PR}}$, and ${\overline{\text{SER}}}_{\text{PT-PR}}^{\text{MRC}}$ are obtained in (31), (35), and Theorem 3, respectively.

*x*

_{ P }during two time slots, and PR uses the MRC technique. The average SER of the DT protocol is expressed as

### 3.2 The secondary network: outage secrecy probability and average secrecy capacity

#### 3.2.1 Outage secrecy probability

*x*

_{ P }, it will then transmit the combined signal

*x*

_{ C }as (4). However, the ST does not believe the help request of PT, because ST thinks that PT wants to get its information. Therefore, ST only considers the security of the important information. Physical layer security is applied at the secondary network in Figure 1, where ST wants to secure the important information against the eavesdropping of PT in the second time slot. The outage secrecy probability of link ST-SR is given as

*R*

_{ S }is the target secrecy rate [18], and

*R*

_{PT-SR}is the achievable data rate from PT to SR and is obtained from (2) as

##### Theorem 4

*Proof*.

*x*}

^{+}in ${P}_{\text{ASR}}^{1}$ (41), the probability ${P}_{\text{ASR}}^{1}$ is given as

where ${f}_{{g}_{32}}\left(x\right),\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}{F}_{{g}_{1}}\left(x\right)$ are the PDF and CDF of RVs *g*_{32} and *g*_{1}, respectively, and are given as follows: ${f}_{{g}_{32}}\left(x\right)={\lambda}_{3}{e}^{-{\lambda}_{3}x}$ and ${F}_{{g}_{1}}\left(x\right)=1-{e}^{-{\lambda}_{1}x}$; *ρ*=2^{2}^{
R
}_{
S
}.

Hence, ${F}_{{g}_{1}}\left(\left(\rho -1\right)/\left(\left(1-\alpha \right)\gamma \right)+\mathrm{\rho x}\right)$ in (43) is obtained as ${F}_{{g}_{1}}\left(\left(\rho -1\right)/\left(\left(1-\alpha \right)\gamma \right)+\mathrm{\rho x}\right)=1-{e}^{-{\lambda}_{1}\left(\left(\rho -1\right)/\left(\left(1-\alpha \right)\gamma \right)+\mathrm{\rho x}\right)}$. Then, substituting ${f}_{{g}_{32}}\left(x\right)$ and ${F}_{{g}_{1}}\left(\left(\rho -1\right)/\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\left(\left(1-\alpha \right)\gamma \right)+\mathrm{\rho x}\right)$ into (43), the proof of Theorem 4 is provided.

Likewise, the probability ${P}_{\text{ASR}}^{2}$ is solved in the next theorem.

##### Theorem 5

*Proof*.

The proof is provided in Appendix 3.

*n*(

*y*)=

*λ*

_{3}

*y*/

*ρ*−

*λ*

_{1}/

*y*, $y\in \left[0,\left(1-\mathrm{\rho \alpha}\right)/\left(1-\alpha \right)\right]$. By performing a function survey method,

*n*(

*y*) is an increasing function in [0,(1−

*ρ*

*α*)/(1−

*α*)]. As a result of the increasing function

*n*(

*y*), we have an inequality as

*n*(

*y*)≤

*n*((1−

*ρ*

*α*)/(1−

*α*)). Hence, the lower bound of ${P}_{\text{ASR}}^{2}$ is obtained as

where ${P}_{\text{PT-ST}}^{\text{out}}$ is given in (17).

#### 3.2.2 Average secrecy capacity

*x*

_{ P }of PT. The average secrecy capacity of the secondary network is defined by calculating the expected value over ASR [32], ([33] Eq. (8)), ([34] Eq. (3)). In addition, the ASR expression in (12) depends on the decoding of the primary signal

*x*

_{ P }at SR (10-11). Hence, the average secrecy capacity of the secondary network is formulated as

*E*[

*X*] is the expected operation of RV

*X*; ${P}_{\text{PT-SR}}^{\text{out}}$ is the outage probability when SR cannot successfully decode the signal

*x*

_{ P }in the first time slot and is obtained as

*γ*value, ${C}_{\text{avg}}^{1}$ and ${C}_{\text{avg}}^{2}$ in (49) can be formulated, respectively, as

where *Z*=*g*_{1}/(*α* *γ* *g*_{1}+1) as defined in Appendix 3.

##### Theorem 6

where *Γ*(*n*,*x*) is the ‘upper’ incomplete gamma function ([31] Eq. (8.350.2)) ($\Gamma \left(n,x\right)=\underset{x}{\overset{\infty}{\int}}{t}^{n-1}{e}^{-t}\mathit{\text{dt}}$), and EulerGamma is Euler’s constant (*E* *u* *l* *e* *r* *G* *a* *m* *m* *a*≈0.577216) ([31] Eq. (8.367.1)).

*Proof*.

The proof is solved in Appendix 5.

## 4 Numerical and simulative results

In this section, the performance of the primary and secondary networks is analyzed by using the Monte Carlo simulation method and the theoretical expressions. The performance analyses include the outage probability and SER of the primary network and the outage secrecy probability and the average secrecy capacity of the secondary network. We note that the single-integral expression of (21) and (44) and the double-integral expression of (33) are not presented in the closed forms but are easily solved by the numerical method in Matlab. In a two-dimensional plane, the coordinates of the primary and secondary nodes are set to PT (0, 0), PR (1, 0), ST (0.5, *y*_{1}), and SR (0.5, *y*_{2}). Hence, the distance of the PT-PR link is 1 (*d*_{5}=1) during the simulation intervals, and ST and SR move on the median line of the PT-PR line segment, which depend on the values of the variables *y*_{1} and *y*_{2} on the *y*-axis. We assume that the path loss exponent, the target data rate of the primary network, and the target secrecy rate of the secondary network are constants (*β*=3, *R*_{
P
}=1 bit/s/Hz,*R*_{
S
}=0.1 bit/s/Hz), and the SNR symbol in the *x*-axis is defined as SNR=*P*/*N*_{0}.

*y*

_{1}=0.1 and with different values of the power allocation at ST (

*α*). In Figure 2, for the cooperative communication protocol (called the CC protocol), the outage probability of the primary network is the smallest when

*α*is the largest (

*α*=0.9), and the primary system performance is improved when the SNR increases. These results are explained that when the fraction of the transmit power

*α*increases, ST uses more power for forwarding the signal of PT to PR in the second time slot. For comparison purposes, the CC protocol outperforms the DT protocol when ST shares the high power to help PT (

*α*≥0.8). In addition, the theoretical expressions match very well with the simulation results, and the lower bound forms converge to the exact theories when the fractions of the transmit power

*α*are small.

*a*=

*b*=1) and coherent maximum likelihood detection [35]. The SER of the CC protocol is the smallest at

*α*=0.9. For different values of

*α*, the SER of the CC protocol is smaller than that of the DT protocol when SNR≤−1 dB for

*α*=0.5, SNR<8 dB for

*α*=0.7, and SNR<17 dB for

*α*=0.8. These results are explained as follows. In the symmetric network model, when the fraction of the transmit power

*α*is enough large (such as

*α*=0.5, 0.7, 0.8), the demodulation of the primary data at PR depends on the total transmit power

*P*of ST in the second time slot. For example, if ST uses the small total transmit power

*P*, PR is difficult to demodulate the primary data when

*α*is fixed. Therefore, the SER at PR will increase. In addition, in the DT protocol, by transmitting the same primary data during two time slots, PR will increase the demodulation capacity by the MRC technique.

*α*(e.g.,

*α*=0.9), because the located power for helping the primary user PT is higher by far than that for transmitting the own signal of the secondary user ST.

Figure 4 presents the outage secrecy probability of the secondary network versus the SNR (dB) when *y*_{1}=0.1 and *y*_{2}=0. In Figure 4, the outage secrecy probability decreases when the SNR increases and *α* decreases (the secrecy performance is the best when *α*=0.1). These results are explained that when *α* decreases, ST uses more power for transmitting the own signal than forwarding the signal of PT to PR in the second time slot. In addition, with the high SNR (SNR≥10 dB), the outage secrecy probability is almost independent of the values of *α*. Hence, from Figures 2, 3 and 4, ST can provide the high power to help the primary network so that the performance of the cooperative primary network (the CC protocol) outperforms the DT protocol and the secure performance of the secondary network is maintained, especially in the high SNR region. For example, when SNR≈12 dB, the outage secrecy probability of the secondary network is maintained at 5 × 10^{−2}, and ST can assign the parameter *α*=0.9 to improve the performance of the primary network. In addition, the theoretical expressions are valid for the simulation results, and the lower bound forms converge to the exact results when the fractions of the transmit power *α* are large.

*α*decreases because the allocated power for transmitting the signal of ST increases. In addition, the average secrecy capacity also converges to the asymptotic value when the transmit SNR is high, but the convergence of the average secrecy capacity is faster when

*α*is smaller.

*α*is set to

*α*=0.9. In Figure 6, when SR is fixed at (0.5, 0) and the ST moves on the median line of the PT-PR line segment where

*y*

_{1}ranges from 0.1 to 1, the performance of both networks decreases. These results are explained as follows. Because of the movement of ST, the distances of links PT-ST, ST-PR, and ST-SR increase, so it is difficult for ST to decode the received signal from PT, and the data rate at SR decreases. Whereas, when ST is set at the central point (0.5, 0) and SR moves on the median line of the PT-PR line segment where

*y*

_{2}ranges from 0.1 to 1, the outage probability of the primary network does not change, while the outage secrecy probability of the secondary network increases. These results are explained by three factors as follows. First, the primary network does not depend on the action of SR. Second, because SR goes farther, SR hardly decodes the signal of PT to cancel the interference elements. Third, the distance of the ST-SR link increases. For these reasons, the performance of the secondary network is poor, while that of the primary network is stable. From Figure 6, the lower bound forms of the outage secrecy probabilities well converge to the exact results when

*α*=0.9.

## 5 Conclusions

In this paper, the artifice of the primary user in the spectrum lease is investigated. The basis of this problem is based on the transmission desire of the secondary user. The system performance of the primary network is evaluated by using the outage probability and the symbol error rate, while that of the secondary network is analyzed in terms of the outage secrecy probability and the asymptotic average secrecy capacity. The simulation results show that the primary network outperforms the direct transmission protocol when the spectrum share coefficient of the secondary user increases and that the secrecy performance of the secondary network is better in the high SNR region. These results are important for selecting the best power sharing fraction so that the performance of the primary network is improved and the secrecy performance of the secondary network is maintained in the cooperative communication. In addition, the location of the secondary nodes is discussed to evaluate the effects on both networks.

## Appendices

### Appendix 1

#### Proof of Theorem 1

*U*=

*α*

*g*

_{2}/((1−

*α*)

*γ*

*g*

_{2}+1), so the CDF of

*U*is given as

*γ*

_{MRC}is expressed as

where ${f}_{{g}_{5}}\left(t\right)={\lambda}_{5}{e}^{-{\lambda}_{5}t}$ is the PDF of the RV *g*_{5}.

*F*

_{ U }(

*x*/

*γ*−

*t*) is calculated from (56) as

*γ*

_{MRC}is obtained as

Performing a variable transformation method as *u*=*α*−(*θ*/*γ*−*t*)(1−*α*)*γ*, ${F}_{{\gamma}_{\text{MRC}}}\left(x\right)$ is solved in the single-integral form as (20). Hence, Theorem 1 is proven.

### Appendix 2

#### Proof of Theorem 2

*θ*≥

*α*/(1−

*α*) and the integral expression in the region

*u*∈[0,

*α*] in (21), there are two minimum values of the function

*m*(

*u*) as

where *η*=*λ*_{2}/*λ*_{5}.

*θ*<

*α*/(1−

*α*) and the integral expression in the region

*u*∈[

*α*−

*θ*(1−

*α*),

*α*], three minimum values of the function

*m*(

*u*) are given as

where $\Delta =\phantom{\rule{0.3em}{0ex}}\left\{\begin{array}{l}m\left(\alpha \right)\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}},\eta >\alpha \\ m\left({u}^{\int}\right)\phantom{\rule{0.3em}{0ex}},\eta \le \alpha \end{array}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\right.$ and $\Omega =\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\left\{\begin{array}{ll}m\left(\alpha \right)& ,\eta >\alpha \\ m\left({u}^{\int}\right)& ,\alpha \ge \eta \phantom{\rule{0.3em}{0ex}}>\phantom{\rule{0.3em}{0ex}}{\left(\alpha \phantom{\rule{0.3em}{0ex}}-\phantom{\rule{0.3em}{0ex}}\theta \left(1\phantom{\rule{0.3em}{0ex}}-\phantom{\rule{0.3em}{0ex}}\alpha \right)\right)}^{2}/2\\ m\left(\alpha -\theta \left(1-\alpha \right)\right)& ,\eta \le {\left(\alpha -\theta \left(1-\alpha \right)\right)}^{2}/2\end{array}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\right.$.

By solving the integrals in (64), the proof of Theorem 2 is completely provided.

### Appendix 3

#### Proof of Theorem 5

*x*}

^{+}in ${P}_{\text{ASR}}^{2}$ (41), the probability ${P}_{\text{ASR}}^{2}$ is given as

*Z*=

*g*

_{1}/(

*α*

*γ*

*g*

_{1}+1) and look at the CDF of the RV

*U*in (56), the CDF of

*Z*is given as

After performing a variable transformation method as *y*=1−((*ρ*−1)/((1−*α*)*γ*)+*ρ* *x*)*α* *γ*, ${P}_{\text{ASR}}^{2}$ is obtained in the single-integral form as (44). Hence, the proof of Theorem 5 is completed.

### Appendix 4

#### Proof of Theorem 6

*X*=

*g*

_{1}/

*g*

_{32}, and the CDF and PDF of RV

*X*are given as

*Y*=

*Z*/

*g*

_{32}, where

*Z*is a RV and is defined in Appendix 33, and the CDF of RV

*Y*is given as

*Z*is solved in (66), and then

*F*

_{ Y }(

*x*) is rewritten as

*γ*is high (

*γ*→+

*∞*), the integral term in (72) goes to 1. Hence,

*F*

_{ Y }(

*x*) is asymptotically obtained as

*Y*is solved as

Solving the integral in (75), we obtain ${C}_{\text{avg}}^{2}$ as (54).

Hence, the proof of Theorem 6 is proven.

## Declarations

### Acknowledgements

This paper was supported by the 2014 Research Funds of Hyundai Heavy Industries for University of Ulsan.

## Authors’ Affiliations

## References

- Mitola J, Maguire GQ: Cognitive radio: making software radios more personal.
*IEEE Pers. Commun*1999, 6(4):13-18. 10.1109/98.788210View ArticleGoogle Scholar - Weng M-D, Lee B-H, Chen J-M: Two novel price-based algorithms for spectrum sharing in cognitive radio networks.
*EURASIP J. Wireless Commun. Netw*2013, 2013: 1-16. 10.1186/1687-1499-2013-1View ArticleGoogle Scholar - Lu L, Zhou X, Onunkwo U, Li GY: Ten years of research in spectrum sensing and sharing in cognitive radio.
*EURASIP J. Wireless Commun. Netw*2012, 2012: 1-16. 10.1186/1687-1499-2012-1View ArticleGoogle Scholar - Duy TT, Kong H-Y: Performance analysis of two-way hybrid decode-and-amplify relaying scheme with relay selection for secondary spectrum access.
*Wireless Pers. Commun*2013, 69(2):857-878. 10.1007/s11277-012-0616-4View ArticleGoogle Scholar - Han Y, Pandharipande A, Ting SH: Cooperative decode-and-forward relaying for secondary spectrum access.
*IEEE Trans. Wireless Commun*2009, 8(10):4945-4950.View ArticleGoogle Scholar - AD Wyner: The wire-tap channel.
*Bell Syst. Tech. J*1975, 54(8):1355-1367. 10.1002/j.1538-7305.1975.tb02040.xView ArticleGoogle Scholar - Leung-Yan-Cheong S, Hellman ME: The Gaussian wire-tap channel.
*IEEE Trans. Inform. Theory*1978, 24(4):451-456. 10.1109/TIT.1978.1055917MathSciNetView ArticleGoogle Scholar - Csiszar I, Korner J: Broadcast channels with confidential messages.
*IEEE Trans. Inform. Theory*1978, 24(3):339-348. 10.1109/TIT.1978.1055892MathSciNetView ArticleGoogle Scholar - Liang Y, Poor HV, Shamai S: Secure communication over fading channels.
*IEEE Trans. Inform. Theory*2008, 54(6):2470-2492.MathSciNetView ArticleGoogle Scholar - Lai L, Gamal HE: The relay-eavesdropper channel: cooperation for secrecy.
*IEEE Trans. Inform. Theory*2008, 54(9):4005-4019.MathSciNetView ArticleGoogle Scholar - Awan ZH, Zaidi A, Vandendorpe L: Secure communication over parallel relay channel.
*IEEE Trans. Inform. Forensics Secur*2012, 7(2):359-371.View ArticleGoogle Scholar - Awan ZH, Zaidi A, Vandendorpe L: On multiaccess channel with unidirectional cooperation and security constraints. In
*50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)*. Monticello; 1–5 Oct 2012:982-987.View ArticleGoogle Scholar - Awan ZH, Zaidi A, Vandendorpe L: Multiaccess channel with partially cooperating encoders and security constraints.
*IEEE Trans. Inform. Forensics Secur*2013, 8(7):1243-1254.View ArticleGoogle Scholar - Tekin E, Yener A: The Gaussian multiple access wire-tap channel.
*IEEE Trans. Inform. Theory*2008, 54(12):5747-5755.MathSciNetView ArticleGoogle Scholar - Tekin E, Yener A: The general Gaussian multiple access and two-way wire-tap channels achievable rates and cooperative jamming.
*IEEE Trans. Inform. Theory*2008, 54(6):2735-2751.MathSciNetView ArticleGoogle Scholar - Han Z, Marina N, Debbah M, Hjørungnes A: Physical layer security game: interaction between source, eavesdropper, and friendly jammer.
*EURASIP J. Wireless Commun. Netw*2010, 2010: 1-10.Google Scholar - Dong L, Han Z, Petropulu A, Poor H: Improving wireless physical layer security via cooperating relays.
*IEEE Trans. Signal Process*2010, 58(3):1875-1888.MathSciNetView ArticleGoogle Scholar - Sakran H, Nasr O, Shokair M, El-Rabaie S, El-Azm AA: Proposed relay selection scheme for physical layer security in cognitive radio networks.
*IET Communications*2012, 6(16):2676-2687. 10.1049/iet-com.2011.0638MathSciNetView ArticleGoogle Scholar - Wang H-M, Yin Q, Xia X-G: Distributed beamforming for physical-layer security of two-way relay networks.
*IEEE Trans. Signal Process*2012, 60(7):3532-3545.MathSciNetView ArticleGoogle Scholar - Kim J, Ikhlef A, Schober R: Combined relay selection and cooperative beamforming for physical layer security.
*J. Commun. Netw*2012, 14(4):364-373.View ArticleGoogle Scholar - Ding Z, Xu M, Lu J, Liu F: Improving wireless security for bidirectional communication scenarios.
*IEEE Trans. Vehicular Technol*2012, 61(6):2842-2848.View ArticleGoogle Scholar - Krikidis I, Thompson JS, McLaughlin S: Relay selection for secure cooperative networks with jamming.
*IEEE Trans. Wireless Commun*2009, 8(10):5003-5011.View ArticleGoogle Scholar - Chen J, Song L, Han Z, Jiao B: Joint relay and jammer selection for secure decode-and-forward two-way relay communications. In
*Global Telecommunications Conference (GLOBECOM 2011)*. Houston; 5:1-5.Google Scholar - Stanojev I, Yener A: Improving secrecy rate via spectrum leasing for friendly jamming.
*IEEE Trans. Wireless Commun*2013, 12(1):134-145.View ArticleGoogle Scholar - He X, Yener A: Cooperation with an untrusted relay: a secrecy perspective.
*IEEE Trans. Inform. Theory*2010, 56(8):3801-3827.MathSciNetGoogle Scholar - Pei L, Zhifeng T, Zinan L, Erkip E, Panwar S: Cooperative wireless communications: a cross-layer approach.
*IEEE Wireless Commun*2006, 13(4):84-92. 10.1109/MWC.2006.1678169View ArticleGoogle Scholar - Treust ML, Zaidi A, Lasaulce S: An achievable rate region for the broadcast wiretap channel with asymmetric side information. In
*49th Annual Allerton Conference on Communication, Control, and Computing (Allerton)*. Monticello; 28:68-75.Google Scholar - Liang Y, Qaraqe K, Serpedin E, Alouini M: Performance analysis of amplify-and-forward two-way relaying with co-channel interference and channel estimation error.
*IEEE Trans. Commun*2013, 61(6):2221-2231.View ArticleGoogle Scholar - Li HL, Djurie PM: MMSE estimation of nonlinear parameters of multiple linear/quadratic chirps.
*IEEE Trans. Signal Process*1998, 46(3):796-800. 10.1109/78.661350View ArticleGoogle Scholar - Gonzalez JA, Peinado AM, Gomez AM, Carmona JL: Efficient MMSE estimation and uncertainty processing for multienvironment robust speech recognition.
*IEEE Trans. Audio Speech Lang. Process*2011, 19(5):1206-1220.View ArticleGoogle Scholar - Gradshteyn IS, Ryzhik IM, Jeffrey A, Zwillinger D:
*Table of Integral, Series and Products*. Elsevier, Amsterdam; 2007.Google Scholar - Bloch M, Barros J, Rodrigues M, McLaughlin S: Wireless information-theoretic security.
*IEEE Trans. Inform. Theory*2008, 54(6):2515-2534.MathSciNetView ArticleGoogle Scholar - Wang L, Yang N, Elkashlan M, Yeoh PL, Yuan J: Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels.
*IEEE Trans. Inform. Forensics Secur*2014, 9(2):247-258.View ArticleGoogle Scholar - Sun X, Wang J, Xu W, Zhao C: Performance of secure communications over correlated fading channels.
*IEEE Signal Process. Lett*2012, 19(8):479-482.View ArticleGoogle Scholar - Nasri A, Schober R, Uysal M: Enhanced MRC for decode-and-forward cooperative diversity systems.
*IEEE Trans. Wireless Commun*2012, 11(10):3418-3423.View ArticleGoogle Scholar - Papoulis A, Pillai SU:
*Probability, Random Variables and Stochastic Processes*. McGraw-Hill, New York; 2002.Google Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.