Skip to main content

Spectrum sharing with secure transmission

Abstract

In this paper, we propose a cooperative scheme between primary and secondary networks. In this scheme, a secondary user (SU) accepts a lease of a part of the licensed band according to a cooperative request of a primary user (PU). Hence, the SU helps the PU in transmitting primary signals and has an opportunity to access the frequency spectrum. On the other hand, the SU owns important data and may mistrust the intention of a primary transmitter. Physical layer security is applied to evaluate the cooperative efficiency in terms of the data transmission and data security. The numerical and simulative results show that the system performance of the primary network in the cooperative scheme is improved in terms of the outage probability and the symbol error rate and is compared with that in the direct transmission scheme. In addition, the secure performance of the secondary network, as expressed by the outage secrecy probability and the average secrecy capacity, is maintained under the eavesdropping of the primary transmitter.

1 Introduction

Cognitive radio (CR) is a concept that enhances the utilization efficiency of the licensed frequency spectrum in that wireless devices are continuously developed for modern applications, but the spectrum bands are limited [1]. In cognitive radio networks, unlicensed users, which are known as secondary users (SUs), only access the licensed bands without causing interference to licensed users, which are known as primary users (PUs). To do this, SUs always opportunistically sense the presence or absence of the licensed bands to make a transmission decision. When the quality of service (QoS) of the primary network is very high, the transmission of the secondary network depends on the cooperative request of the PU. In this scheme, the PU leases a part of the licensed band to the SU to increase the QoS of the primary network as well as the spectrum access capacity of the secondary network [25]. At this time, a SU has the right to use the licensed band, but the SU does not know the artifice of PUs which PUs want to eavesdrop on the information of the SU.

Due to the broadcast characteristic of the wireless environment, the secrecy of data transmissions is very important. Physical layer security is proposed to solve the security problem in which the secrecy principle is based on the exploitation of the physical characteristics of the wireless channel [624]. In [6], Wyner showed that the important data is secure if the quality of the main channel is larger than that of the wiretap channel. Physical layer security has been investigated in the Gaussian channel [7], the broadcast channel [8], and the wireless fading channels [9] and has been extended to the relay-eavesdropper channel [10], the parallel relay-eavesdropper channel [11], and the multi-access channel [12, 13, 15]. The achievable secrecy rate (ASR) is the metric used to measure the amount of secure data that is successfully received at the intended user [17]. In [17, 19], global channel state information (CSI) is available in which Dong et al. regarded a practical assumption that the eavesdropper nodes are active and their CSIs are monitored by the center network [17]. Kim et al. assumed that the source and relay nodes can detect the CSI based on frequent response messages of the eavesdropper nodes. These messages will be used to inform the source node that the eavesdropper nodes want to be served in the next phases [20]. Exploitation of relays has been proposed to overcome the fading environment as well as to enhance secrecy capacity [10, 11, 1724]. Optimal relay selection methods [18, 23] and weight optimization methods of the cooperative relays [17, 19] have been studied to maximize the ASR and satisfy a total transmit power constraint. In [2124], a utilization of jamming signals has been investigated in which friendly wireless nodes or relays operate as jammers to create artificial interference to reduce the quality of the eavesdropping channel. The authors assumed that the jamming signals are known at both the destination nodes and the relays; hence, the quality of the desired channel cannot be affected by the interference signals. A special case in which the cooperative relay does not behave as a trusted node is proposed [25].

In [4, 5], the SUs have opportunity to wiretap the primary data of the PUs, and then these SUs are mistrusted as eavesdropper nodes. In [1618, 20], the eavesdropper nodes are assumed as special wireless nodes, whereas the primary data are wiretapped by nodes as relays in [19, 25]. Motivated by the above issues, in this paper, we propose a cooperative scheme between the primary and secondary networks in which the PU leases a part of the licensed band to the SU to improve the performance of its system. In this proposed scheme, the SU uses the licensed band to perform two jobs as follows: First, the SU helps the PU by decoding and using the amount of power needed for forwarding the primary signals. Second, the SU uses the remaining power to transmit the important data against the eavesdropping of the primary transmitter. The cooperative efficiency of the primary network is obtained in terms of the outage probability and symbol error rate (SER) and is compared with the direct transmission scheme. For the secondary network, the outage secrecy probability and the average secrecy capacity are presented to evaluate the efficiency of the spectrum lease.

The rest of the paper is organized as follows: In Section 2, we present the cooperative system model and operation principle. The performance analysis of the primary and secondary networks is presented in Section 3. Section 4 discusses the numerical and simulative results using the Monte Carlo method and theoretical expressions. The conclusions are summarized in Section 5.

2 System model

Figure 1 presents a system model of cooperative communication between primary and secondary networks. The primary network includes the primary transmitter (PT) and primary receiver (PR) and has a licensed spectrum band. On the other hand, the primary network does not share this spectrum band, because its QoS is very high. The secondary network has two nodes, denoted as a secondary transmitter (ST) and a secondary receiver (SR), where the ST only transmits its data when receiving a spectrum lease contract from the PT. We assume that each node has a single antenna and the same transmit power P and that all nodes suffer the zero-mean additive white Gaussian noise (AWGN) with the same variance N0.

Figure 1
figure 1

System model of cooperative communication between primary and secondary networks.

In Figure 1, (h1, d1), (h2, d2), (h31, d3), (h32, d3), (h4, d4), and (h5, d5) denote the Rayleigh fading channel coefficients and the link distances of ST-SR, ST-PR, PT-ST, ST-PT, PT-SR, and PT-PR, respectively. Therefore, the channel gains g i =|h i |2 and g3j=|h3j|2 are exponential distribution random variables (RVs) with parameters λ i and λ3, respectively, which are given as λ i = d i β and λ 3 = d 3 β where β is the path loss exponent, i{1,2,4,5}, j{1,2}. We note that links PT-ST and ST-PT have the same distance but different direction.

Before transmitting a data packet, a connection establishment phase is performed using the media access control (MAC) layer protocol, which is similar to the CoopMAC in [26]. First, PT broadcasts a request-to-send (RTS) message to nodes ST, SR, and PR. Hence, ST can estimate the fading channel coefficient h31 when receiving the RTS message. Because of the transmission desire of the secondary network on the licensed band, ST will immediately reply to the RTS message by sending a helper-ready-to-send (HTS) to nodes PT, PR, and SR. Relying on the receipt of the RTS and HTS messages, nodes PR and SR can estimate the fading channel coefficient pairs (h5, h2) and (h4, h1), respectively, and then these nodes will broadcast clear-to-send (CTS) messages that include their estimated fading channel coefficients. If PT wants to cooperate with ST, it will send a RTS message which includes h32 estimated from the HTS message to notify a cooperative acceptance to ST. Based on the above steps of the setup phase, ST will know the fading channel coefficients (h31, h32) from the RTS messages, (h4, h1) from the CTS message of SR, and (h5, h2) from the CTS message of PR. Therefore, ST can select a power sharing parameter as well as evaluate the secrecy performance of the secondary network. Similarly, PT will know the fading channel coefficients h31, h2, and h5 for selecting the cooperative method and analyzing the system performance of the primary network.

The operation principle and related formulations of the system model are expressed in two time slots as follows: In the first time slot, PT broadcasts a signal x P to ST, SR, and PR by using a RTS message [26]. The received signals at ST, SR, and PR are given, respectively, as

y PT-ST = P h 31 x P + n ST
(1)
y PT-SR = P h 4 x P + n SR
(2)
y PT-PR = P h 5 x P + n PR
(3)

where nST, nSR, and nPR are the zero-mean AWGN at nodes ST, SR, and PR, respectively.

In this case, ST can successfully decode the signal x P . Then, if the PR cannot successfully decode the signal x P , it will send a CTS message. After that, PT receives the CTS message, and it will send a RTS message to ST to require cooperation. Because the secondary network cannot use the licensed spectrum band of the primary network, ST will accept the cooperation request of PT by leasing a part of the licensed spectrum band. This procedure is performed at ST by combining the signal x P with its signal x S based on the power allocation strategy, which is proposed in [4, 5] as

x C = αP x P + 1 α P x S
(4)

where α(0<α<1) is the fraction of the transmit power allocated to the signal x P and α P is like the money of the secondary network for payment of a leased spectrum band.

Then, ST broadcasts the combined signal x C to nodes SR, PR, and even PT. The received signals at SR, PR, and PT in the second time slot can be given, respectively, as

y ST-SR = αP x P + 1 α P x S h 1 + n SR
(5)
y ST-PR = αP x P + 1 α P x S h 2 + n PR
(6)
y ST-PT = αP x P + 1 α P x S h 32 + n PT
(7)

where nPT is the zero-mean AWGN at node PT.

At node PR, the well-known maximal ratio combining (MRC) technique is employed from two signals that are received from PT (the first time slot) and ST (the second time slot) to decode x P [4], Equation 23, so the received signal-to-noise ratio (SNR) at PR can be expressed as

γ MRC = P | h 5 | 2 N 0 + αP | h 2 | 2 1 α P | h 2 | 2 + N 0 = γ g 5 + αγ g 2 1 α γ g 2 + 1
(8)

where γ=P/N0 is the transmit SNR.

Because SR also receives the signal x P in the first time slot, there are two cases for decoding the signal x P from the received signal (2) as + SR successfully decodes x P , and then SR can cancel the interference component x P in (5). The received signal after canceling the interference at SR is given as

y ST-SR = 1 α P x S h 1 + n SR
(9)

and the corresponding received SNR γ1 at SR is given to decode x S as

γ 1 = 1 α P | h 1 | 2 N 0 = 1 α γ g 1
(10)

+ SR does not successfully decode x P , and then the received SNR γ1 at SR is expressed as

γ 1 = 1 α P | h 1 | 2 αP | h 1 | 2 + N 0 = 1 α γ g 1 αγ g 1 + 1
(11)

In addition, the secondary network has important data and suspects the help request of the primary network, so physical layer security is applied to the secondary network in evaluating the secure performance. In this system model, we assume that PT wants to eavesdrop the signal x S of ST while PR only receives the signal x P of PT in the second time slot. The received ASR at SR is given as [17]

ASR= R ST-SR R ST-PT +
(12)

where {x}+ is noted for max(0,x) function; RST-SR and RST-PT are the achievable data rates of links ST-SR and ST-PT, respectively, and are given as

R ST-SR = 1 2 log 2 1 + γ 1
(13)
R ST-PT = 1 2 log 2 1 + γ 32
(14)

where the factor (1/2) means that the signals are transmitted in two time slots, and γ32 is the received SNR at PT from ST to decode the signal x S .

From (7), x P is the transmitted signal of the eavesdropper PT. The x P can be considered as a side information that is available at the transmitter ST and the eavesdropper PT [27]. Hence, the eavesdropper PT can cancel the self-interference x P . As a result, the received SNR γ32 at PT is given as

γ 32 = 1 α P h 32 2 N 0 = 1 α γ g 32
(15)

3 Performance analysis

3.1 The primary network: outage probability and symbol error rate

3.1.1 Outage probability

In this paper, it is assumed that a receiver drops an outage event in the decoding operation if the achievable data rate is less than a target data rate. The achievable data rate between PT and ST is given in the first time slot from (1) as

R PT-ST = 1 2 log 2 1 + γ g 31
(16)

If the achievable data rate RPT-ST is less than the target data rate R P of the primary network, ST cannot successfully decode x P . The outage probability at ST in this case is given as

P PT-ST out = Pr R PT-ST < R P = Pr g 31 < θ / γ = 1 e λ 3 θ / γ
(17)

where θ=22R P −1.

We note that g31 in (16) and g32 in (15) have different meanings because these symbols are calculated in the different time slots and directions. Hence, we can assume that g31 and g32 are independent exponential RVs with the same parameter λ3. When ST successfully decodes the signal x P , ST accepts the help request of PT and combines x P with its signal x S as x C in (4). After applying the MRC technique, the achievable data rate at PR is given as

R PT-PR MRC = 1 2 log 2 1 + γ MRC
(18)

The outage probability at PR is expressed as

P PT-PR MRC =Pr R PT-PR MRC < R P =Pr γ MRC < θ = F γ MRC (θ)
(19)

where F γ MRC (x) is the cumulative distribution function (CDF) of the RV γMRC.

Theorem 1

The following single-integral form expression is valid for F γ MRC (x)

F γ MRC ( x ) = 1 e λ 5 x / γ λ 5 e α λ 5 + λ 2 / 1 α / γ 1 α γ e λ 5 x / γ 0 α e λ 5 u + α λ 2 / u 1 α γ du , x α 1 α 1 e λ 5 x / γ λ 5 e α λ 5 + λ 2 / 1 α / γ 1 α γ e λ 5 x / γ α x 1 α α e λ 5 u + α λ 2 / u 1 α γ du , x < α 1 α
(20)
Proof

The proof is performed in Appendix 5.

From Theorem 1, the outage probability at PR is obtained in the single-integral form as

P PT-PR MRC = 1 e λ 5 θ / γ λ 5 e λ 5 θ + α λ 5 + λ 2 1 α / γ 1 α γ 0 α e λ 5 u + α λ 2 / u 1 α γ du , θ α 1 α 1 e λ 5 θ / γ λ 5 e λ 5 θ + α λ 5 + λ 2 1 α / γ 1 α γ α θ 1 α α e λ 5 u + α λ 2 / u 1 α γ du , θ < α 1 α
(21)

We denote m(u) as a function of variable u and is defined as m(u)=λ5u+α λ2/u, u[0,). By performing a function survey method, m(u) is minimum at m(u), is a decreasing function in [0,u], and is an increasing function in [u,), where u = α λ 2 / λ 5 . Hence, Theorem 2 will obtain a lower bound of P PT-PR MRC as

Theorem 2

The following lower bound expression is valid for P PT PR MRC

P PT PR MRC _ lower = 1 e λ 5 θ / γ α λ 5 e λ 5 θ + α λ 5 + λ 2 Δ 1 α / γ 1 α γ , θ α 1 α 1 e λ 5 θ / γ θ 1 α λ 5 e λ 5 θ + α λ 5 + λ 2 Ω 1 α / γ 1 α γ , θ < α 1 α
(22)

where Δ= m α , η > α m u , η α , Ω= m α , η > α m u , α η > α θ 1 α 2 / 2 m α θ 1 α , η α θ 1 α 2 / 2 and η=λ2/λ5.

Proof.

Given in Appendix 5.

When node ST does not successfully decode x P , node PR only receives the direct signal from PT in the first time slot, so γMRC equals γ g5 in (8). The outage probability at PR in this case is given as

P PT-PR out =Pr γ g 5 < θ =1 e λ 5 θ / γ
(23)

Finally, based on the operation principle of cooperative communication between primary and secondary networks, the outage probability of the primary network is a combination of the outage probabilities, which are obtained in (17), (21), and (23) as

P cc out = 1 P PT-ST out P PT-PR MRC + P PT-ST out P PT-PR out
(24)

where P PT-ST out , P PT-PR MRC , and P PT-PR out are obtained in (17), (21) and (23), respectively.

In addition, from Theorem 2 and (24), the lower bound form of the outage probability of the primary network is expressed as

P cc out_lower = 1 P PT-ST out P PT-PR MRC_lower + P PT-ST out P PT-PR out
(25)

where P PT-PR MRC_lower is obtained in (22).

Next, we compare the proposed cooperative transmission protocol with the direct transmission protocol (DT protocol). In the DT protocol, PT directly transmits the signal x P to PR without the help of ST. In this case, ST does not have opportunities to transmit its signal x S . For a fair evaluation, PT will transmit the same signal x P during two time slots, and PR will use the MRC technique to combine these received signals to increase the decoding capacity. The received SNR at PR is given as

γ MRC DT =γ g 51 +γ g 52 =γ g 51 + g 52
(26)

where g51 and g52 are the channel gains of link PT-PR in the first and second time slots, respectively, and we assume that g51 and g52 are independent exponential RVs with the same parameter λ5.

Lemma 1

The CDF of RV γ MRC DT can be expressed in the exact closed form as

F γ MRC DT (x)=1 1 + λ 5 x / γ e λ 5 x / γ
(27)
Proof.

The CDF of γ MRC DT is expressed as

F γ MRC DT ( x ) = Pr γ MRC DT < x = Pr γ g 51 + g 52 < x = Pr g 52 < x γ g 51 = 0 x / γ f g 51 ( t ) × F g 52 ( x / γ t ) dt
(28)

where f g 51 (t)= λ 5 e λ 5 t and F g 52 (t)=1 e λ 5 t are the probability density function (PDF) and CDF of RVs g51 and g52, respectively.

Hence, F g 52 (x/γt) in (28) is calculated as F g 52 (x/γt)=1 e λ 5 x / γ t . Then, substituting f g 51 (t) and F g 52 (x/γt) into (28), Lemma 1 is proven.

From Lemma 1, the outage probability of the DT protocol is given as

P DT out = Pr 1 2 log 2 1 + γ MRC DT < R P = F γ MRC DT ( θ ) = 1 1 + λ 5 θ / γ e λ 5 θ / γ
(29)

3.1.2 Symbol error rate

The average SER of link PT-ST in the first time slot can be calculated [28], Eq. (27)] as

SER ¯ PT-ST = a b 2 π 0 e bx F γ g 31 ( x ) x dx
(30)

where a and b are constants that depend on the modulation type, e.g., a=b=1 for BPSK modulation, γ g31 is the received SNR at ST, and F γ g 31 (x) is the CDF of the RV γ g31 and is given as F γ g 31 (x)=1 e λ 3 x / γ .

Then, (30) is solved as

SER ¯ PT-ST = a 2 1 1 1 + λ 3 /
(31)

When ST successfully decodes x P , PR receives two signal paths such as the direct path from PT and the cooperative path from ST at the different time slots. To restore x P , PR performs the MRC decoding by storing the received signal yPT-PR (3) at the first time slot and then waiting to the second time slot to combine with the received signal yST-PR (6). Two received signals yPT-PR and yST-PR in the two-phase transmission can be seen as an equivalent single-input multi-output (SIMO) [5]. As described in [4, 5], the MRC decoding is easier to implement. With the help of the equation [28, Eq. (27)], the average SER at PR after applying the MRC technique is expressed as

SER ¯ PT-PR MRC = a b 2 π 0 e bx F γ MRC ( x ) x dx
(32)

Note that the regeneration of x P can be performed by the minimum mean square error decoding (MMSE decoding) [29, 30]. The analysis of SER in the MMSE decoding is complex because it relates resolution of posterior distributions. The MMSE decoding will be our future work.

To solve SER ¯ PT-PR MRC in the formula (32), Theorem 3 is obtained as follows:

Theorem 3

The following representation is valid for SER ¯ PT PR MRC

SER ¯ PT PR MRC = a 2 1 1 1 + λ 5 / a λ 5 e α λ 5 + λ 2 γ 1 α b 2 γ 1 α π × 0 α / 1 α e b + λ 5 / γ x x α 1 α x α e λ 5 u + α λ 2 / u 1 α γ dudx + π Erfc α b + λ 5 / γ / 1 α b + λ 5 / γ 0 α e λ 5 u + α λ 2 / u 1 α γ du
(33)

where Erfc[x] is the complementary error function [31, Eq. (8.250.4)].

Proof.

Substituting F γ MRC (x) in Theorem 1 into (32), we obtain as

SER ¯ PT-PR MRC = a b 2 π 0 e bx 1 e λ 5 x / γ x dx a λ 5 e α λ 5 + λ 2 / 1 α / γ b 2 γ 1 α π × 0 α / 1 α e b + λ 5 / γ x x α 1 α x α e λ 5 u + α λ 2 / u 1 α γ dudx + α / 1 α e b + λ 5 / γ x x dx 0 α e λ 5 u + α λ 2 / u 1 α γ du
(34)

After some manipulations of (34), the proof of Theorem 3 is completed.

From the result of Theorem 3, the integral component α 1 α x α e λ 5 u + α λ 2 / u 1 α γ du depends on variable x and the function m(u)=λ5u+α λ2/u has a complex form. Hence, the analysis of SER ¯ PT-PR MRC in the lower bound form as P PT-PR MRC in Theorem 2 is not feasible.

When node ST does not successfully decode x P , PR only directly receives the signal x P in the first time slot. The average SER at PR in this case is given as

SER ¯ PT-PR = a b 2 π 0 e bx F γ g 5 ( x ) x dx = a 2 1 1 1 + λ 5 /
(35)

where F γ g 5 (x) is the CDF of the exponential RV γ g5 and is expressed as F γ g 5 (x)=1 e λ 5 x / γ .

Using the law of total probability, the average SER of the cooperative communication between the primary and secondary networks is given as

SER ¯ cc = 1 SER ¯ PT-ST SER ¯ PT-PR MRC + SER ¯ PT-ST SER ¯ PT-PR
(36)

where SER ¯ PT-ST , SER ¯ PT-PR , and SER ¯ PT-PR MRC are obtained in (31), (35), and Theorem 3, respectively.

For the DT protocol with a fair evaluation, PT also transmits the same signal x P during two time slots, and PR uses the MRC technique. The average SER of the DT protocol is expressed as

SER ¯ DT = a b 2 π 0 e bx F γ MRC DT ( x ) x dx
(37)

Using F γ MRC DT (x) in the Lemma 1, (37) is obtained in the closed-form expression as

SER ¯ DT = a b 2 π 0 e bx 1 e λ 5 x / γ λ 5 x e λ 5 x / γ / γ x dx = a b 2 1 2 b + 3 λ 5 / γ 2 b + λ 5 / γ 3 / 2
(38)

3.2 The secondary network: outage secrecy probability and average secrecy capacity

3.2.1 Outage secrecy probability

When ST successfully decodes the signal x P , it will then transmit the combined signal x C as (4). However, the ST does not believe the help request of PT, because ST thinks that PT wants to get its information. Therefore, ST only considers the security of the important information. Physical layer security is applied at the secondary network in Figure 1, where ST wants to secure the important information against the eavesdropping of PT in the second time slot. The outage secrecy probability of link ST-SR is given as

P ASR out = Pr ASR < R S = Pr 1 2 log 2 1 + 1 α γ g 1 1 + 1 α γ g 32 + < R S , R PT-SR R P + Pr 1 2 log 2 1 + 1 α γ g 1 αγ g 1 + 1 1 + 1 α γ g 32 + < R S , R PT-SR < R P
(39)

where ASR is given in (12), R S is the target secrecy rate [18], and RPT-SR is the achievable data rate from PT to SR and is obtained from (2) as

R PT-SR = 1 2 log 2 1 + γ g 4
(40)

Substituting (40) into (39), we obtain

P ASR out = Pr g 4 θ γ × Pr 1 2 log 2 1 + 1 α γ g 1 1 + 1 α γ g 32 + < R S P ASR 1 + Pr g 4 < θ γ × Pr 1 2 log 2 1 + 1 α γ g 1 αγ g 1 + 1 1 + 1 α γ g 32 + < R S P ASR 2 = e λ 4 θ / γ P ASR 1 + 1 e λ 4 θ / γ P ASR 2
(41)
Theorem 4

The following closed-form expression is valid for P ASR 1

P ASR 1 =1 λ 3 e λ 1 ρ 1 / 1 α γ λ 3 + ρ λ 1
(42)
Proof.

By expanding the expression {x}+ in P ASR 1 (41), the probability P ASR 1 is given as

P ASR 1 = Pr g 1 g 32 + Pr g 32 < g 1 < ρ 1 1 α γ + ρ g 32 = 1 Pr g 1 > ρ 1 1 α γ + ρ g 32 = 0 f g 32 ( x ) × F g 1 ρ 1 1 α γ + ρx dx
(43)

where f g 32 (x), F g 1 x are the PDF and CDF of RVs g32 and g1, respectively, and are given as follows: f g 32 (x)= λ 3 e λ 3 x and F g 1 (x)=1 e λ 1 x ; ρ=22R S .

Hence, F g 1 ρ 1 / 1 α γ + ρx in (43) is obtained as F g 1 ρ 1 / 1 α γ + ρx =1 e λ 1 ρ 1 / 1 α γ + ρx . Then, substituting f g 32 (x) and F g 1 ρ 1 / 1 α γ + ρx into (43), the proof of Theorem 4 is provided.

Likewise, the probability P ASR 2 is solved in the next theorem.

Theorem 5

The following single-integral form representation is valid for P ASR 2

P ASR 2 = 1 , ρα 1 1 λ 3 e λ 3 1 ρα / 1 α ρ + λ 1 / αρ αγρ 0 1 ρα 1 α e λ 3 y / ρ λ 1 / y / αγ dy , ρα < 1
(44)
Proof.

The proof is provided in Appendix 3.

We set as n(y)=λ3y/ρλ1/y, y 0 , 1 ρα 1 α . By performing a function survey method, n(y) is an increasing function in [0,(1−ρ α)/(1−α)]. As a result of the increasing function n(y), we have an inequality as n(y)≤n((1−ρ α)/(1−α)). Hence, the lower bound of P ASR 2 is obtained as

P ASR 2 _lower = 1 , ρα 1 1 λ 3 e λ 3 1 ρα / 1 α ρ + λ 1 / αρ αγρ 0 1 ρα 1 α e n 1 ρα / 1 α / αγ dy , ρα < 1 = 1 , ρα 1 1 1 ρα λ 3 e λ 3 1 ρα / 1 α ρ + λ 1 / αρ + n 1 ρα / 1 α / αγ α 1 α γρ , ρα < 1
(45)

Substituting the result of Theorems 4 and 5 into (41), we have P ASR out in hand. Finally, the outage secrecy probability of the secondary network during two time slots is given as

P SN out = 1 P PT-ST out P ASR out + P PT-ST out
(46)

where P PT-ST out is given in (17).

In addition, from the lower bound of P ASR 2 in (45), the lower bound form of P SN out is expressed as

P SN out_lower = 1 P PT-ST out P ASR out_lower + P PT-ST out
(47)

where P ASR out_lower is obtained from (41) as

P ASR out_lower = e λ 4 θ / γ P ASR 1 + 1 e λ 4 θ / γ P ASR 2_lower
(48)

3.2.2 Average secrecy capacity

In the operation protocol of the secondary network, ST only transmits the secrecy signals when ST successfully decodes the primary signal x P of PT. The average secrecy capacity of the secondary network is defined by calculating the expected value over ASR [32], ([33] Eq. (8)), ([34] Eq. (3)). In addition, the ASR expression in (12) depends on the decoding of the primary signal x P at SR (10-11). Hence, the average secrecy capacity of the secondary network is formulated as

C avg SN = ( 1 P PT-ST out ) ST successfully decodes x P × ( 1 P PT-SR out ) SR successfully decodes x P × E 1 2 log 2 1 + 1 α γ g 1 1 + 1 α γ g 32 + C avg 1 + P PT-SR out SR cannot successfully decode x P × E 1 2 log 2 1 + 1 α γ g 1 αγ g 1 + 1 1 + 1 α γ g 32 + C avg 2
(49)

where E[X] is the expected operation of RV X; P PT-SR out is the outage probability when SR cannot successfully decode the signal x P in the first time slot and is obtained as

P PT-SR out =Pr R PT-SR < R P =Pr g 4 < θ / γ =1 e λ 4 θ / γ
(50)

At a high SNR γ value, C avg 1 and C avg 2 in (49) can be formulated, respectively, as

C avg 1 E 1 2 log 2 g 1 g 32 +
(51)
C avg 2 E 1 2 log 2 g 1 / αγ g 1 + 1 g 32 + = 1 2 E log 2 Z g 32 +
(52)

where Z=g1/(α γ g1+1) as defined in Appendix 3.

Theorem 6

The following asymptotic expressions are valid for C avg 1 and C avg 2 , respectively

C avg 1 ln 1 + λ 3 / λ 1 2 ln 2
(53)
C avg 2 e λ 1 / αγ 2 ln 2 1 λ 3 αγ × EulerGamma + Γ 0 , λ 3 αγ + ln λ 3 αγ
(54)

where Γ(n,x) is the ‘upper’ incomplete gamma function ([31] Eq. (8.350.2)) (Γ n , x = x t n 1 e t dt), and EulerGamma is Euler’s constant (E u l e r G a m m a≈0.577216) ([31] Eq. (8.367.1)).

Proof.

The proof is solved in Appendix 5.

Substituting (17), (50), and the results of Theorem 6 into (49), we obtain the asymptotic form of the average secrecy capacity of the secondary network as

C avg SN e λ 3 θ / γ 2 ln 2 e λ 4 θ / γ × ln 1 + λ 3 / λ 1 + 1 e λ 4 θ / γ e λ 1 / αγ ( 1 λ 3 αγ ) × EulerGamma + Γ 0 , λ 3 αγ + ln λ 3 αγ
(55)

4 Numerical and simulative results

In this section, the performance of the primary and secondary networks is analyzed by using the Monte Carlo simulation method and the theoretical expressions. The performance analyses include the outage probability and SER of the primary network and the outage secrecy probability and the average secrecy capacity of the secondary network. We note that the single-integral expression of (21) and (44) and the double-integral expression of (33) are not presented in the closed forms but are easily solved by the numerical method in Matlab. In a two-dimensional plane, the coordinates of the primary and secondary nodes are set to PT (0, 0), PR (1, 0), ST (0.5, y1), and SR (0.5, y2). Hence, the distance of the PT-PR link is 1 (d5=1) during the simulation intervals, and ST and SR move on the median line of the PT-PR line segment, which depend on the values of the variables y1 and y2 on the y-axis. We assume that the path loss exponent, the target data rate of the primary network, and the target secrecy rate of the secondary network are constants (β=3, R P =1 bit/s/Hz,R S =0.1 bit/s/Hz), and the SNR symbol in the x-axis is defined as SNR=P/N0.

Figure 2 presents the outage probability of the primary network at PR versus SNR (dB) when y1=0.1 and with different values of the power allocation at ST (α). In Figure 2, for the cooperative communication protocol (called the CC protocol), the outage probability of the primary network is the smallest when α is the largest (α=0.9), and the primary system performance is improved when the SNR increases. These results are explained that when the fraction of the transmit power α increases, ST uses more power for forwarding the signal of PT to PR in the second time slot. For comparison purposes, the CC protocol outperforms the DT protocol when ST shares the high power to help PT (α≥0.8). In addition, the theoretical expressions match very well with the simulation results, and the lower bound forms converge to the exact theories when the fractions of the transmit power α are small.

Figure 2
figure 2

Outage probability of the primary network at PR versus SNR (dB) when y 1 = 0 . 1. The markers denote simulated results, whereas solid and dash lines refer to theoretical results and lower bounds, respectively.

In addition to the outage probability, the SER is suitable for evaluating the QoS of the primary network. Figure 3 presents the SER of the primary network with the same ST location as in Figure 2. In this simulation result, we assume that the cooperative system uses the BPSK modulation (e.g., a=b=1) and coherent maximum likelihood detection [35]. The SER of the CC protocol is the smallest at α=0.9. For different values of α, the SER of the CC protocol is smaller than that of the DT protocol when SNR≤−1 dB for α=0.5, SNR<8 dB for α=0.7, and SNR<17 dB for α=0.8. These results are explained as follows. In the symmetric network model, when the fraction of the transmit power α is enough large (such as α=0.5, 0.7, 0.8), the demodulation of the primary data at PR depends on the total transmit power P of ST in the second time slot. For example, if ST uses the small total transmit power P, PR is difficult to demodulate the primary data when α is fixed. Therefore, the SER at PR will increase. In addition, in the DT protocol, by transmitting the same primary data during two time slots, PR will increase the demodulation capacity by the MRC technique.

Figure 3
figure 3

SER of the primary network at PR versus SNR (dB) when y 1 = 0 . 1.

From Figures 3 and 4, the performance of the CC protocol is better than that of the DT protocol at high values of α (e.g., α=0.9), because the located power for helping the primary user PT is higher by far than that for transmitting the own signal of the secondary user ST.

Figure 4
figure 4

The outage secrecy probability of the secondary network versus SNR (dB) when y 1 = 0 . 1 and y 2 = 0. The markers denote simulated results, whereas solid and dash lines refer to theoretical results and lower bounds, respectively.

Figure 4 presents the outage secrecy probability of the secondary network versus the SNR (dB) when y1=0.1 and y2=0. In Figure 4, the outage secrecy probability decreases when the SNR increases and α decreases (the secrecy performance is the best when α=0.1). These results are explained that when α decreases, ST uses more power for transmitting the own signal than forwarding the signal of PT to PR in the second time slot. In addition, with the high SNR (SNR≥10 dB), the outage secrecy probability is almost independent of the values of α. Hence, from Figures 2, 3 and 4, ST can provide the high power to help the primary network so that the performance of the cooperative primary network (the CC protocol) outperforms the DT protocol and the secure performance of the secondary network is maintained, especially in the high SNR region. For example, when SNR≈12 dB, the outage secrecy probability of the secondary network is maintained at 5 × 10−2, and ST can assign the parameter α=0.9 to improve the performance of the primary network. In addition, the theoretical expressions are valid for the simulation results, and the lower bound forms converge to the exact results when the fractions of the transmit power α are large.

Next, we discuss the average secrecy capacity of the secondary network when ST cooperates with the primary network. Figure 5 presents the average secrecy capacity versus the SNR (dB) when the locations of nodes ST and SR are the same as in Figure 4. In Figure 5, the average secrecy capacity increases when α decreases because the allocated power for transmitting the signal of ST increases. In addition, the average secrecy capacity also converges to the asymptotic value when the transmit SNR is high, but the convergence of the average secrecy capacity is faster when α is smaller.

Figure 5
figure 5

Average secrecy capacity of the secondary network versus SNR (dB) when y 1 = 0 . 1 and y 2 = 0.

Finally, we analyze and evaluate the effects of the locations of the secondary nodes ST and SR on the performance of both networks. Figure 6 presents the outage probability and the outage secrecy probability of the primary network and the secondary network, respectively, when the parameter α is set to α=0.9. In Figure 6, when SR is fixed at (0.5, 0) and the ST moves on the median line of the PT-PR line segment where y1 ranges from 0.1 to 1, the performance of both networks decreases. These results are explained as follows. Because of the movement of ST, the distances of links PT-ST, ST-PR, and ST-SR increase, so it is difficult for ST to decode the received signal from PT, and the data rate at SR decreases. Whereas, when ST is set at the central point (0.5, 0) and SR moves on the median line of the PT-PR line segment where y2 ranges from 0.1 to 1, the outage probability of the primary network does not change, while the outage secrecy probability of the secondary network increases. These results are explained by three factors as follows. First, the primary network does not depend on the action of SR. Second, because SR goes farther, SR hardly decodes the signal of PT to cancel the interference elements. Third, the distance of the ST-SR link increases. For these reasons, the performance of the secondary network is poor, while that of the primary network is stable. From Figure 6, the lower bound forms of the outage secrecy probabilities well converge to the exact results when α=0.9.

Figure 6
figure 6

The outage probability and the outage secrecy probability versus y 1 / y 2 with α = 0 . 9. The markers denote simulated results, whereas solid and dash lines refer to theoretical results and lower bounds, respectively.

5 Conclusions

In this paper, the artifice of the primary user in the spectrum lease is investigated. The basis of this problem is based on the transmission desire of the secondary user. The system performance of the primary network is evaluated by using the outage probability and the symbol error rate, while that of the secondary network is analyzed in terms of the outage secrecy probability and the asymptotic average secrecy capacity. The simulation results show that the primary network outperforms the direct transmission protocol when the spectrum share coefficient of the secondary user increases and that the secrecy performance of the secondary network is better in the high SNR region. These results are important for selecting the best power sharing fraction so that the performance of the primary network is improved and the secrecy performance of the secondary network is maintained in the cooperative communication. In addition, the location of the secondary nodes is discussed to evaluate the effects on both networks.

Appendices

Appendix 1

Proof of Theorem 1

We set U=α g2/((1−α)γ g2+1), so the CDF of U is given as

F U ( x ) = Pr α g 2 1 α γ g 2 + 1 < x = Pr g 2 α x 1 α γ < x = 1 , x α 1 α γ 1 e λ 2 x / α x 1 α γ , x < α 1 α γ
(56)

From (8), the CDF of γMRC is expressed as

F γ MRC ( x ) = Pr γ MRC < x = Pr γ g 5 + γU < x = Pr g 5 + U < x γ = 0 x / γ f g 5 ( t ) × F U ( x / γ t ) dt
(57)

where f g 5 (t)= λ 5 e λ 5 t is the PDF of the RV g5.

The term F U (x/γt) is calculated from (56) as

F U (x/γt)= 1 , t x γ α 1 α γ 1 e λ 2 t / α t 1 α γ , t > x γ α 1 α γ
(58)

Substituting (58) into (57), the CDF of γMRC is obtained as

F γ MRC ( x ) = 1 e λ 5 x / γ λ 5 x γ α 1 α γ x / γ e λ 5 t λ 2 θ / γ t α θ / γ t 1 α γ dt , x α 1 α 1 e λ 5 x / γ λ 5 0 x / γ e λ 5 t λ 2 θ / γ t α θ / γ t 1 α γ dt , x < α 1 α
(59)

Performing a variable transformation method as u=α−(θ/γt)(1−α)γ, F γ MRC (x) is solved in the single-integral form as (20). Hence, Theorem 1 is proven.

Appendix 2

Proof of Theorem 2

First, we consider the condition θα/(1−α) and the integral expression in the region u[0,α] in (21), there are two minimum values of the function m(u) as

min m u u 0 , α = m α when α < u m u when α u
(60)

Substituting u = α λ 2 / λ 5 into (60), we obtain as

min m u u 0 , α = m α when θ α / 1 α , η > α m u when θ α / 1 α , η α
(61)

where η=λ2/λ5.

When the condition θ<α/(1−α) and the integral expression in the region u[αθ(1−α),α], three minimum values of the function m(u) are given as

min m u u α θ 1 α , α = m α when α < u m u when α u > α θ 1 α m α θ 1 α when u α θ 1 α
(62)

After some manipulations of (62), we obtain as

min m u u α θ 1 α , α = m α when θ < α / 1 α , η > α m u when θ < α / 1 α , α η > α θ 1 α 2 / 2 m α θ 1 α when θ < α / 1 α , η α θ 1 α 2 / 2
(63)

Substituting (61) and (63) into (21), the lower bound form of P PT-PR MRC is given as

P PT-PR MRC_lower = 1 e λ 5 θ / γ λ 5 e λ 5 θ + α λ 5 + λ 2 1 α / γ 1 α γ 0 α e Δ 1 α γ du , θ α 1 α 1 e λ 5 θ / γ λ 5 e λ 5 θ + α λ 5 + λ 2 1 α / γ 1 α γ α θ 1 α α e Ω 1 α γ du , θ < α 1 α
(64)

where Δ= m α , η > α m u , η α and Ω= m α , η > α m u , α η > α θ 1 α 2 / 2 m α θ 1 α , η α θ 1 α 2 / 2 .

By solving the integrals in (64), the proof of Theorem 2 is completely provided.

Appendix 3

Proof of Theorem 5

By expanding the expression {x}+ in P ASR 2 (41), the probability P ASR 2 is given as

P ASR 2 = g 1 αγ g 1 + 1 g 32 + Pr g 32 < g 1 αγ g 1 + 1 < ρ 1 1 α γ + ρ g 32 = Pr g 1 αγ g 1 + 1 < ρ 1 1 α γ + ρ g 32
(65)

We set Z=g1/(α γ g1+1) and look at the CDF of the RV U in (56), the CDF of Z is given as

F Z ( x ) = Pr g 1 / αγ g 1 + 1 < x = 1 , x αγ 1 1 e λ 1 x / 1 αγx , x < αγ 1
(66)

From (66), P ASR 2 is obtained as

P ASR 2 = 0 f g 32 ( x ) × F Z ρ 1 1 α γ + ρx dx = 1 , ρα 1 1 λ 3 0 1 ρα 1 α αγρ e λ 3 x + ρ 1 / 1 α γ + ρx 1 ρ 1 / 1 α γ + ρx αγ dx , ρα < 1
(67)

After performing a variable transformation method as y=1−((ρ−1)/((1−α)γ)+ρ x)α γ, P ASR 2 is obtained in the single-integral form as (44). Hence, the proof of Theorem 5 is completed.

Appendix 4

Proof of Theorem 6

We set X=g1/g32, and the CDF and PDF of RV X are given as

F X ( x ) = Pr g 1 g 32 < x = Pr g 1 < x g 32 = 0 f g 32 ( y ) × F g 1 ( xy ) dy = 1 λ 3 λ 3 + x λ 1
(68)
f X ( x ) = F X ( x ) ∂x = λ 1 λ 3 λ 3 + x λ 1 2
(69)

From (69) and the expression of the expected operation [36, Eq. (5.55)], C avg 1 in (51) is formulated as

C avg 1 1 2 1 log 2 x × f X ( x ) dx = λ 3 2 λ 1 ln 2 1 ln x x + λ 3 / λ 1 2 dx
(70)

Solving the integral in (70), C avg 1 is obtained as (53).To solve C avg 2 , we set Y=Z/g32, where Z is a RV and is defined in Appendix 33, and the CDF of RV Y is given as

F Y (x)=Pr Z g 32 < x =Pr Z < x g 32 = 0 f g 32 (y)× F Z (xy)dy
(71)

In (71), the CDF of Z is solved in (66), and then F Y (x) is rewritten as

F Y ( x ) = 1 λ 3 0 αγx 1 e λ 3 y λ 1 xy / 1 αγxy dy = 1 λ 3 e λ 1 / αγ e λ 3 / αγx αγx 0 1 e λ 3 t αγx λ 1 αγt dt
(72)

Again, when γ is high (γ→+), the integral term in (72) goes to 1. Hence, F Y (x) is asymptotically obtained as

F Y (x)1 λ 3 e λ 1 / αγ e λ 3 / αγx αγx
(73)

From (73), the PDF of RV Y is solved as

f Y (x)= F Y ( x ) ∂x = λ 3 e λ 1 / αγ e λ 3 / αγx αγ x 2 1 λ 3 αγx
(74)

From (74) and the expression of the expected operation [36, Eq. (5.55)], C avg 2 in (52) is formulated in the asymptotic form as

C avg 2 1 2 1 log 2 x × f Y ( x ) dx = 1 2 1 log 2 x × λ 3 e λ 1 / αγ e λ 3 / αγx αγ x 2 1 λ 3 αγx dx = λ 3 e λ 1 / αγ 2 αγ ln 2 1 e λ 3 / αγx ln x x 2 1 λ 3 αγx dx
(75)

Solving the integral in (75), we obtain C avg 2 as (54).

Hence, the proof of Theorem 6 is proven.

References

  1. Mitola J, Maguire GQ: Cognitive radio: making software radios more personal. IEEE Pers. Commun 1999, 6(4):13-18. 10.1109/98.788210

    Article  Google Scholar 

  2. Weng M-D, Lee B-H, Chen J-M: Two novel price-based algorithms for spectrum sharing in cognitive radio networks. EURASIP J. Wireless Commun. Netw 2013, 2013: 1-16. 10.1186/1687-1499-2013-1

    Article  Google Scholar 

  3. Lu L, Zhou X, Onunkwo U, Li GY: Ten years of research in spectrum sensing and sharing in cognitive radio. EURASIP J. Wireless Commun. Netw 2012, 2012: 1-16. 10.1186/1687-1499-2012-1

    Article  Google Scholar 

  4. Duy TT, Kong H-Y: Performance analysis of two-way hybrid decode-and-amplify relaying scheme with relay selection for secondary spectrum access. Wireless Pers. Commun 2013, 69(2):857-878. 10.1007/s11277-012-0616-4

    Article  Google Scholar 

  5. Han Y, Pandharipande A, Ting SH: Cooperative decode-and-forward relaying for secondary spectrum access. IEEE Trans. Wireless Commun 2009, 8(10):4945-4950.

    Article  Google Scholar 

  6. AD Wyner: The wire-tap channel. Bell Syst. Tech. J 1975, 54(8):1355-1367. 10.1002/j.1538-7305.1975.tb02040.x

    Article  Google Scholar 

  7. Leung-Yan-Cheong S, Hellman ME: The Gaussian wire-tap channel. IEEE Trans. Inform. Theory 1978, 24(4):451-456. 10.1109/TIT.1978.1055917

    Article  MathSciNet  Google Scholar 

  8. Csiszar I, Korner J: Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892

    Article  MathSciNet  Google Scholar 

  9. Liang Y, Poor HV, Shamai S: Secure communication over fading channels. IEEE Trans. Inform. Theory 2008, 54(6):2470-2492.

    Article  MathSciNet  Google Scholar 

  10. Lai L, Gamal HE: The relay-eavesdropper channel: cooperation for secrecy. IEEE Trans. Inform. Theory 2008, 54(9):4005-4019.

    Article  MathSciNet  Google Scholar 

  11. Awan ZH, Zaidi A, Vandendorpe L: Secure communication over parallel relay channel. IEEE Trans. Inform. Forensics Secur 2012, 7(2):359-371.

    Article  Google Scholar 

  12. Awan ZH, Zaidi A, Vandendorpe L: On multiaccess channel with unidirectional cooperation and security constraints. In 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton). Monticello; 1–5 Oct 2012:982-987.

    Chapter  Google Scholar 

  13. Awan ZH, Zaidi A, Vandendorpe L: Multiaccess channel with partially cooperating encoders and security constraints. IEEE Trans. Inform. Forensics Secur 2013, 8(7):1243-1254.

    Article  Google Scholar 

  14. Tekin E, Yener A: The Gaussian multiple access wire-tap channel. IEEE Trans. Inform. Theory 2008, 54(12):5747-5755.

    Article  MathSciNet  Google Scholar 

  15. Tekin E, Yener A: The general Gaussian multiple access and two-way wire-tap channels achievable rates and cooperative jamming. IEEE Trans. Inform. Theory 2008, 54(6):2735-2751.

    Article  MathSciNet  Google Scholar 

  16. Han Z, Marina N, Debbah M, Hjørungnes A: Physical layer security game: interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wireless Commun. Netw 2010, 2010: 1-10.

    Google Scholar 

  17. Dong L, Han Z, Petropulu A, Poor H: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process 2010, 58(3):1875-1888.

    Article  MathSciNet  Google Scholar 

  18. Sakran H, Nasr O, Shokair M, El-Rabaie S, El-Azm AA: Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications 2012, 6(16):2676-2687. 10.1049/iet-com.2011.0638

    Article  MathSciNet  Google Scholar 

  19. Wang H-M, Yin Q, Xia X-G: Distributed beamforming for physical-layer security of two-way relay networks. IEEE Trans. Signal Process 2012, 60(7):3532-3545.

    Article  MathSciNet  Google Scholar 

  20. Kim J, Ikhlef A, Schober R: Combined relay selection and cooperative beamforming for physical layer security. J. Commun. Netw 2012, 14(4):364-373.

    Article  Google Scholar 

  21. Ding Z, Xu M, Lu J, Liu F: Improving wireless security for bidirectional communication scenarios. IEEE Trans. Vehicular Technol 2012, 61(6):2842-2848.

    Article  Google Scholar 

  22. Krikidis I, Thompson JS, McLaughlin S: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wireless Commun 2009, 8(10):5003-5011.

    Article  Google Scholar 

  23. Chen J, Song L, Han Z, Jiao B: Joint relay and jammer selection for secure decode-and-forward two-way relay communications. In Global Telecommunications Conference (GLOBECOM 2011). Houston; 5:1-5.

    Google Scholar 

  24. Stanojev I, Yener A: Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Trans. Wireless Commun 2013, 12(1):134-145.

    Article  Google Scholar 

  25. He X, Yener A: Cooperation with an untrusted relay: a secrecy perspective. IEEE Trans. Inform. Theory 2010, 56(8):3801-3827.

    MathSciNet  Google Scholar 

  26. Pei L, Zhifeng T, Zinan L, Erkip E, Panwar S: Cooperative wireless communications: a cross-layer approach. IEEE Wireless Commun 2006, 13(4):84-92. 10.1109/MWC.2006.1678169

    Article  Google Scholar 

  27. Treust ML, Zaidi A, Lasaulce S: An achievable rate region for the broadcast wiretap channel with asymmetric side information. In 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton). Monticello; 28:68-75.

    Google Scholar 

  28. Liang Y, Qaraqe K, Serpedin E, Alouini M: Performance analysis of amplify-and-forward two-way relaying with co-channel interference and channel estimation error. IEEE Trans. Commun 2013, 61(6):2221-2231.

    Article  Google Scholar 

  29. Li HL, Djurie PM: MMSE estimation of nonlinear parameters of multiple linear/quadratic chirps. IEEE Trans. Signal Process 1998, 46(3):796-800. 10.1109/78.661350

    Article  Google Scholar 

  30. Gonzalez JA, Peinado AM, Gomez AM, Carmona JL: Efficient MMSE estimation and uncertainty processing for multienvironment robust speech recognition. IEEE Trans. Audio Speech Lang. Process 2011, 19(5):1206-1220.

    Article  Google Scholar 

  31. Gradshteyn IS, Ryzhik IM, Jeffrey A, Zwillinger D: Table of Integral, Series and Products. Elsevier, Amsterdam; 2007.

    Google Scholar 

  32. Bloch M, Barros J, Rodrigues M, McLaughlin S: Wireless information-theoretic security. IEEE Trans. Inform. Theory 2008, 54(6):2515-2534.

    Article  MathSciNet  Google Scholar 

  33. Wang L, Yang N, Elkashlan M, Yeoh PL, Yuan J: Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels. IEEE Trans. Inform. Forensics Secur 2014, 9(2):247-258.

    Article  Google Scholar 

  34. Sun X, Wang J, Xu W, Zhao C: Performance of secure communications over correlated fading channels. IEEE Signal Process. Lett 2012, 19(8):479-482.

    Article  Google Scholar 

  35. Nasri A, Schober R, Uysal M: Enhanced MRC for decode-and-forward cooperative diversity systems. IEEE Trans. Wireless Commun 2012, 11(10):3418-3423.

    Article  Google Scholar 

  36. Papoulis A, Pillai SU: Probability, Random Variables and Stochastic Processes. McGraw-Hill, New York; 2002.

    Google Scholar 

Download references

Acknowledgements

This paper was supported by the 2014 Research Funds of Hyundai Heavy Industries for University of Ulsan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyung Yun Kong.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pham, N.S., Kong, H.Y. Spectrum sharing with secure transmission. J Wireless Com Network 2014, 134 (2014). https://doi.org/10.1186/1687-1499-2014-134

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2014-134

Keywords