 Research
 Open access
 Published:
On the security of cooperative cognitive radio networks with distributed beamforming
EURASIP Journal on Wireless Communications and Networking volumeÂ 2017, ArticleÂ number:Â 144 (2017)
Abstract
This paper investigates the secrecy performance of amplifyandforward (AF)relaying cooperative cognitive radio networks (CCRNs) over Rayleighfading channels. Specifically, we consider practical passive eavesdropping scenarios, where the channel state information of the eavesdropperâ€™s link is not available at the secondary transmitter. In order to avoid interfering with the primary receiver and enhance the secrecy performance, collaborative distributed beamforming is adopted at the secondary relays. Closedform and asymptotic expressions for the secrecy outage probability of CCRNs in the presence of single and multiple noncolluding eavesdroppers are derived. The asymptotic analysis reveals that the achievable secrecy diversity order of collaborative distributed beamforming with M AF relays is Mâˆ’1 regardless of the number of eavesdroppers. In addition, simulations are conducted to validate the accuracy of our analytical results.
1 Introduction
Cognitive radio has been regarded as a potential means to improve spectral efficiency by allowing secondary users (SUs) to share the spectrum originally allocated to the primary users (PUs), as long as the generated interference aggregated at the primary receivers is below acceptable levels [1]. In order to enhance system performance and extend the coverage of secondary transmission, cooperative relay techniques have been further introduced into cognitive radio networks (CRNs), and thus, a novel network model, cooperative cognitive radio networks (CCRNs), has attracted significant interests in the research community [2]. On the other hand, due to the broadcast nature of wireless medium and the openness of cognitive radio architecture, CRNs face a more serious challenge of security, and higher layer cryptographic authentication and identification have become expensive and vulnerable to attacks [3]. Recently, a promising approach towards achieving secure communications has been developed by Wyner in [4] termed as physical layer security, the key idea of which lies in exploiting the randomness of wireless channels to ensure the security of confidential information.
Due to the advantages of physical layer security, many researchers have devoted efforts to investigate the physical layer security issues in CRNs [5â€“10]. In [5], the secrecy performance of CRNs in terms of the secrecy outage probability and the probability of nonzero secrecy capacity was analyzed. In [6], the authors investigated the achievable secrecy rates of multipleinput singleoutput (MISO) CRNs with different beamforming schemes. Later, the secrecy outage performance of singleinput multipleoutput (SIMO) CRNs using selection combining (SC) and generalized selection combining (GSC) was investigated in [7] and [8], respectively. The authors in [9] investigated the secrecy outage and diversity performance for multiuser multieavesdropper CRNs. The exact and asymptotic expressions of the secrecy outage probability in multipleinput multipleoutput (MIMO) CRNs with transmit antenna selection (TAS)/maximal ratio combining (MRC) were derived in [10].
In addition to the multiantenna diversity, user cooperation can also be exploited to enhance the security of wireless transmission. The authors in [11] proposed an opportunistic decodeandforward (DF)relaying scheme for CCRNs against eavesdropping. In [12], we investigated the secrecy outage performance for DFrelaying CCRNs with outdated channel state information. Different joint relay and jammer selection policies were developed to enhance the secrecy outage performance for DFrelaying CCRNs in [13]. The securityreliability tradeoff performance of singlerelay and multirelay selection strategies for DFrelaying CCRNs was investigated in [14]. However, very few research has considered the secrecy performance of amplifyandforward (AF)relaying CCRNs except [15], in which the authors investigated the security and the reliability performance of CCRNs with single AF relay in terms of the intercept probability. It is worth noting that the intercept probability is a special case of secrecy outage probability when the target secrecy data rate is set to zero. To the best of the authorsâ€™ knowledge, no works have considered the secrecy outage probability of CCRNs with multiple AF relays. Besides, various advanced techniques have been employed to enhance the physical layer security of CRNs, such as multiple antenna diversity in [7â€“10], relay selection in [11â€“14], artificial noise in [13], and secrecy beamforming/precoding in [6]. However, collaborative distributed beamformingbased security enhancement in CCRNs has not been investigated yet.
Different from the aforementioned works, in this paper, we investigate the secrecy outage performance of multiple AF relayassisted CCRNs with distributed beamforming against passive eavesdropping attacks. The main contributions of our work are summarized as follows:

1)
Compared with [11â€“14] that only considered the relay selection for DFrelaying CCRNs and [15] that only considered the intercept probability for single AFrelaying CCRNs, we investigate the physical layer security in terms of the probability of nonzero secrecy capacity, the secrecy outage probability, the secrecy array gain, and the secrecy diversity order for multiple AFrelaying CCRNs with collaborative distributed beamforming in the presence of single and multiple noncolluding eavesdroppers, respectively, where distributed zeroforcing beamforming (DZFB) is employed at the relays without interfering with the primary users.

2)
We derive the closedform expressions of the probability of nonzero secrecy capacity and the secrecy outage probability as well as the asymptotic expression at high SNR regimes. Our asymptotic results accurately predict the secrecy diversity order of M AF relay CCRNs with collaborative distributed beamforming, i.e., Mâˆ’1, which is different from the results obtained in [11] and [13]. This is due to the fact that the proposed collaborative distributed beamforming scheme is designed at relays to avoid the interference at PUs at the expense of one spatial degree. In addition, numerical and simulation results are provided to verify the correctness of the proposed scheme.
2 System model
Let us consider a spectrumsharing cognitive relay network [16], which consists of one secondary source (S), M AF relays (R _{1},â‹¯,R _{ M }), one secondary destination (D), one primary receiver (P), and one passive eavesdropper (E), as shown in Fig. 1. All the nodes are equipped with a single antenna and operate in halfduplex mode. We assume that the direct links from S to D and from S to E do not exist due to severe shadowing environment. The data transmission from S to D can only be done with the help of relays, with the possible wiretap from the eavesdropper. We assume that all channels experience slow block fading and additive white Gaussian noise (AWGN) with variance of \(\sigma _{0}^{2} \), where the fading coefficients are invariant during one fading block and the corresponding channel gains follow independent Rayleigh distribution. Let h _{ ab } denote the channel coefficient between a and b. The channel power gains \(\left  {h_{SR_{i} } } \right ^{2} \), \(\left  {h_{R_{i} D} } \right ^{2} \), \(\left  {h_{R_{i} E} } \right ^{2} \), \(\left  {h_{R_{i} P} } \right ^{2} \), and h _{ SP }^{2} are independent and exponentially distributed with parameters \(\lambda _{SR_{i}} \), \(\lambda _{R_{i} D} \), \(\lambda _{R_{i}E} \), \(\lambda _{R_{i} P} \), and Î» _{ SP }, respectively. Without loss of generation, all the secondary relays are close to each other and forming a cluster, i.e., \(\lambda _{SR_{i}} = \lambda _{SR}\), \(\lambda _{R_{i} D}= \lambda _{R D} \), \(\lambda _{R_{i}E}= \lambda _{RE} \), and \(\lambda _{R_{i} P} =\lambda _{RP} \) for all i. \({\mathbf {h}}_{SR} = \left [ {h_{SR_{1} }, \cdots,h_{SR_{M} } } \right ]^{T} \), \({\mathbf {h}}_{RD} = \left [ {h_{R_{1} D}, \cdots,h_{R_{M} D} } \right ]^{T} \), \({\mathbf {h}}_{RE} = \left [ {h_{R_{1} E}, \cdots,h_{R_{M} E} } \right ]^{T} \), and \({\mathbf {h}}_{RP} = \left [ {h_{R_{1} P}, \cdots,h_{R_{M} P} } \right ]^{T} \) represent the channel vectors between the secondary source and the relays, between the relays and the secondary destination, between the relays and the eavesdropper, and between the relays and the primary receiver, respectively. It is worth mentioning that we focus on a passive eavesdropper scenario, where the instantaneous channel state information (CSI) of the eavesdropperâ€™s link h _{ RE } is not known at the secondary source. In addition, the CSI of interference links, e.g., \(\left  {h_{R_{i} P} } \right ^{2} \) and h _{ SP }^{2}, can be acquired through a spectrumband manager that mediates between the primary and secondary networks. However, for those cases where the secondary network has no knowledge of the interference channel, our results serve as performance bounds for the considered CCRNs and represent efficient system design tools [17].
The transmission is divided into two slots. In the first phase, the secondary source broadcasts the encoded confidential data. According to the underlaying spectrumsharing approach, the secondary source adjusts its transmit power P _{ S } under a predefined threshold I to guarantee the quality of service of the primary user. Hence, the transmit power at the secondary source is constrained as P _{ S }=I /h _{ sp }^{2} [7]. In the second phase, the relays amplify and forward the received signals to the destination with the transmit power P _{ R }. In order to avoid interfering with the primary transmission and maximize the mutual information of the secondary system, the DZFB scheme is applied to null the interference to the primary receiver, and the MÃ—1 DZFB weight vector is the solution of the following problem, mathematically, \(\begin {array}{l}\mathop {\max }\limits _{{{\mathbf {w}}_{ZF}}} \left  {{\mathbf {h}}_{RD}^{H}{{\mathbf {w}}_{ZF}}} \right \\ s.t.\left  {{\mathbf {h}}_{RP}^{H}{{\mathbf {w}}_{ZF}}} \right  = 0\\ ~~~~~{\left \ {{{\mathbf {w}}_{ZF}}} \right \^{2}} = 1 \end {array}\)
By applying a standard Lagrangian multiplier method, the optimal weight vector is given as w _{ ZF }=T ^{âŠ¥} h _{ RD } /âˆ¥T ^{âŠ¥} h _{ RD }âˆ¥, where \({{\mathbf {T}}^ \bot } = {\mathbf {I}}  {{\mathbf {h}}_{RP}}\left ({{\mathbf {h}}_{RP}^{H}{{\mathbf {h}}_{RP}}} \right){\mathbf {h}}_{RP}^{H}\) is the projection idempotent matrix with rank (Mâˆ’1).
Thus, the equivalent received signaltonoise ratio (SNR) at D and E is given as
where \(\gamma _{1} = {{\left ({{I \mathord {\left / {\vphantom {I {\sigma _{0}^{2} }}} \right. \kern \nulldelimiterspace } {\sigma _{0}^{2} }}} \right)\left \ {{\mathbf {h}}_{SR} } \right \^{2} } \mathord {\left / {\vphantom {{\left ({{I \mathord {\left / {\vphantom {I {\sigma _{0}^{2} }}} \right. \kern \nulldelimiterspace } {\sigma _{0}^{2} }}} \right)\left \ {{\mathbf {h}}_{SR} } \right \^{2} } {\left  {h_{SP} } \right ^{2} }}} \right. \kern \nulldelimiterspace } {\left  {h_{SP} } \right ^{2} }}\), \(\gamma _{2} \! =\!\! \left ({{{P_{R} } \mathord {\left / {\vphantom {{P_{R} } {\sigma _{0}^{2} }}} \right. \kern \nulldelimiterspace } {\sigma _{0}^{2} }}} \right)\left  {{\mathbf {T}}^ \bot {\mathbf {h}}_{RD} } \right ^{2}\! \), and \(\gamma _{E} = \left ({{{P_{R} } \mathord {\left / {\vphantom {{P_{R} } {\sigma _{0}^{2} }}} \right. \kern \nulldelimiterspace } {\sigma _{0}^{2} }}} \right)\left  {{\mathbf {h}}_{RE}^{H} {\mathbf {w}}_{ZF} } \right ^{2} \) denote the equivalent instantaneous SNRs at the SR, RD, and RE links, respectively.
Considering that âˆ¥h _{ SR }âˆ¥^{2} is a chisquare random variable with 2M degrees of freedom with parameter Î» _{ SR } due to \({{h}}_{SR_{i}},i = 1, \cdots,M\) being i.i.d exponential distribution variables with parameter Î» _{ SR }, and h _{ SP }^{2} is an exponential random variable with parameter Î» _{ SP }, then the cumulative distribution function (CDF) of Î³ _{1} is given by
where \(\bar \gamma _{1} = {{\left ({I\lambda _{SR} } \right)} \mathord {\left / {\vphantom {{\left ({I\lambda _{SR} } \right)} {\left ({\lambda _{SP} \sigma _{0}^{2} } \right)}}} \right. \kern \nulldelimiterspace } {\left ({\lambda _{SP} \sigma _{0}^{2} } \right)}}\).
Let \({{\mathbf {\rlap {} h}}_{RD}} = {{{{\mathbf {h}}_{RD}}} \mathord {\left / {\vphantom {{{{\mathbf {h}}_{RD}}} {\sqrt {{\lambda _{RD}}} }}} \right. \kern \nulldelimiterspace } {\sqrt {{\lambda _{RD}}} }}\), then each entry of \({{\mathbf {\rlap {} h}}_{RD}} = {{{{\mathbf {h}}_{RD}}} \mathord {\left / {\vphantom {{{{\mathbf {h}}_{RD}}} {\sqrt {{\lambda _{RD}}} }}} \right. \kern \nulldelimiterspace } {\sqrt {{\lambda _{RD}}} }}\) is i.i.d. (0,1). Considering \({{\mathbf {T}}^ \bot } = {\mathbf {I}}  {{\mathbf {h}}_{RP}}\left ({{\mathbf {h}}_{RP}^{H}{{\mathbf {h}}_{RP}}} \right){\mathbf {h}}_{RP}^{H}\) is the projection idempotent matrix with rank (Mâˆ’1), (T ^{âŠ¥})^{H} T ^{âŠ¥} is a Hermitian matrix with rank (Mâˆ’1). Based on [18, Theorem 2], \({\mathbf {\rlap {} h}}_{RD}^{H}{\left ({{{\mathbf {T}}^ \bot }} \right)^{H}}{{\mathbf {T}}^ \bot }{{\mathbf {\rlap {} h}}_{RD}}\) is a chisquare random variable with 2(Mâˆ’1) degrees of freedom. Then, the CDF of \({\gamma _{2}} = \left ({{{{P_{R}}} \mathord {\left / {\vphantom {{{P_{R}}} {\sigma _{D}^{2}}}} \right. \kern \nulldelimiterspace } {\sigma _{D}^{2}}}} \right){\left  {{{\mathbf {T}}^ \bot }{{\mathbf {h}}_{RD}}} \right ^{2}} = \left ({{{{P_{R}}{\lambda _{RD}}} \mathord {\left / {\vphantom {{{P_{R}}{\lambda _{RD}}} {\sigma _{D}^{2}}}} \right. \kern \nulldelimiterspace } {\sigma _{D}^{2}}}} \right){\mathbf {\rlap {} h}}_{RD}^{H}{\left ({{{\mathbf {T}}^ \bot }} \right)^{H}}{{\mathbf {T}}^ \bot }{{\mathbf {\rlap {} h}}_{RD}}\) is given by
where \(\bar {\gamma }_{2} = {{P_{R} \lambda _{RD} } \mathord {\left / {\vphantom {{P_{R} \lambda _{SD} } {\sigma _{0}^{2} }}} \right. \kern \nulldelimiterspace } {\sigma _{0}^{2} }}\), Î“(Â·) is the gamma function [19, (8.310.1)], and Î“(Â·,Â·) is the incomplete gamma function [19, (8.350.2)].
3 Secrecy performance analysis with single eavesdropper
In this section, we characterize secrecy performance of the multiple AFrelaying cooperative cognitive radio network with collaborative distributed beamforming in terms of the probability of nonzero secrecy capacity, the secrecy outage probability, the secrecy array gain, and the secrecy diversity order.
Based on (1) and (2), the instantaneous secrecy capacity of the considered network is given by [8]
Throughout this work, we focus on the passive eavesdropping scenario, where the secondary source does not have the channel information of the equivalent SRE link and has no choice but to encode the confidential data with a constant codeword rate R _{ S }>0, which is the target secrecy data rate for the considered system. If R _{ S } is less than secrecy capacity, perfect secrecy can be guaranteed. Otherwise, E can eavesdrop on the confidential data; therefore, perfect secrecy is compromised.
3.1 The probability of nonzero secrecy capacity
In this subsection, we examine the condition for the existence of nonzero secrecy capacity. According to (5), the probability of nonzero secrecy capacity is formulated as
where the probability density function (PDF) of Î³ _{ E } is \(f_{\gamma _{E} } \left (\gamma \right) = {{\exp \left ({  {\gamma \mathord {\left / {\vphantom {\gamma {\bar \gamma _{E} }}} \right. \kern \nulldelimiterspace } {\bar \gamma _{E} }}} \right)} \mathord {\left / {\vphantom {{\exp \left ({  {\gamma \mathord {\left / {\vphantom {\gamma {\bar \gamma _{E} }}} \right. \kern \nulldelimiterspace } {\bar \gamma _{E} }}} \right)} {\bar \gamma _{E} }}} \right. \kern \nulldelimiterspace } {\bar \gamma _{E} }}\) and \(\bar \gamma _{E} = {{P_{R} \lambda _{RE} } \mathord {\left / {\vphantom {{P_{R} \lambda _{RE} } {\sigma _{E}^{2} }}} \right. \kern \nulldelimiterspace } {\sigma _{0}^{2} }}\).
Substituting (4) into (6) and using \(\Gamma \!\left (\! {n\! + \!1,x} \!\right)\! \,=\, \Gamma \!\left (\!{n \!+ \!1} \!\right)\!\exp \left ({ \! \!x} \right)\sum \limits _{m = 0}^{n} {\frac {{x^{m} }}{{\Gamma \left ({m + 1} \right)}}} \), we can derive the closedform expression of the probability of nonzero secrecy capacity with the aid of [19, 3.351.3] as
It is obvious that the probability of nonzero secrecy capacity is independent of the tolerable interference level I in the primary network, which is due to the fact that DZFB is employed to null the interference to PUs in the second phase.
3.2 Secrecy outage probability
The secrecy outage probability is defined as the probability of C _{ S }<R _{ S } and can be expressed as
Substituting (1) and (2) into (8), the secrecy outage probability is rewritten as
where \(\gamma _{th} = 2^{2R_{S} } \phantom {\dot {i}\!}\) denotes the secrecy SNR threshold.
Furthermore, in order to be mathematically tractable, we apply some approximations into (10) as follows
where we employ the approximations of (1+x)/(1+y)â‰ˆx / y in (a), x y /(1+x+y)â‰ˆx y /(x+y) in (b), and \(\frac {{xy}}{{x + y}} \approx \min \left ({x,y} \right)\) in (c). These approximations have been used in [20, 21], and the effect of the approximation error can be neglected in the medium and high SNR regimes.
Let \(Z = \min \left ({\frac {{\gamma _{1} }}{{\left ({\gamma _{th}  1} \right)}},\frac {{\gamma _{2} }}{{\gamma _{th} }}} \right)\), and the secrecy outage probability is further expressed as
To solve the above integral, we first give the CDF of Z as follows:
Now, substituting (12) into (11), and using \(\left ({\frac {x}{{\alpha + x}}} \right)^{M} = \sum \limits _{k = 0}^{M} \!{M \choose k}\!\! \left ({ \,\, 1} \right)^{k} \left ({1 \,+\, \frac {x}{\alpha }} \right)^{ k} \), the secrecy outage probability is given by
Then, with the help of [19, (9.222.1)], the approximated expressions of the secrecy outage probability can be derived as
where \(\alpha = {{\bar \gamma _{1} } \mathord {\left / {\vphantom {{\bar \gamma _{1} } {\left ({\gamma _{th}  1} \right)}}} \right. \kern \nulldelimiterspace } {\left ({\gamma _{th}  1} \right)}}\), \(\beta = {{\gamma _{th} } \mathord {\left / {\vphantom {{\gamma _{th} } {\bar \gamma _{2} }}} \right. \kern \nulldelimiterspace } {\bar \gamma _{2} }} + {1 \mathord {\left / {\vphantom {1 {\bar \gamma _{E} }}} \right. \kern \nulldelimiterspace } {\bar \gamma _{E} }}\) and W _{ m,n }(x) is the Whittaker function [19, (9.222.1)]. It is noted from (14) that the secrecy outage probability expression is derived in closed form and can be easily applied to evaluate the secrecy performance with arbitrary numbers of relays, arbitrary average SNRs, and arbitrary interference constraint level.
3.3 Asymptotic secrecy outage probability
In this subsection, in order to exploit a novel insight of design, the asymptotic analysis for the secrecy outage probability was provided to characterize the behavior under the high SNR of legitimate links. The asymptotic result enables us to explicitly examine the impact of collaborative distributed beamforming on the secrecy performance in terms of the secrecy diversity order. Without loss of generation, let Î» _{ SR }=Î» _{ RD }=Î»â†’âˆž, namely \(\bar \gamma _{2} = \kappa \bar \gamma _{1} = \bar \gamma \to \infty \), where Îº=P _{ R } Î» _{ SP } / I. Here, \(\bar \gamma \to \infty \) corresponds to the scenario where the relays have high received SNRs at the first phase and the secondary destination are located much closer to the relays than the eavesdropper, which is a practical scenario of interest. It is obvious that \({{\bar \gamma } \mathord {\left / {\vphantom {{\bar \gamma } {\bar \gamma _{E} }}} \right. \kern \nulldelimiterspace } {\bar \gamma _{E} }} = {\lambda \mathord {\left / {\vphantom {\lambda {\lambda _{RE} }}} \right. \kern \nulldelimiterspace } {\lambda _{RE} }} \to \infty \) for a given \(\bar \gamma _{E}\) when \(\bar \gamma \to \infty \). Similar to [7], we denote M E R=Î» _{ SD } / Î» _{ RE } as the ratio of average channel gain from the relays to the secondary destination to that from the relays to the eavesdropper.
With the aid of the Maclaurin series expansion [19, (1.211.1)], we can rewrite (12) as
where o(Â·) denotes higher order terms.
Substituting (15) and the PDF of \(\gamma _{E} f_{\gamma _{E} }\phantom {\dot {i}\!}\) into (11), and using [19, (3.351.3)], the asymptotic secrecy outage probability is calculated as
Obviously, one can observe from (16) that the secrecy outage probability behaves as M E R ^{âˆ’(Mâˆ’1)} for M E Râ†’âˆž. Thus, the achievable secrecy diversity order of the proposed collaborative distributed beamforming yields to
and the achievable secrecy array gain is given by
which implies that as the number of relays increases, the slope of the secrecy outage probability curve becomes steeper when M E Râ†’âˆž in the geometric sense. Therefore, collaborative distributed beamforming can effectively improve the physical layer security of cognitive transmission to defend against eavesdropping attacks. However, comparing with the relay selection scheme in [11] and [13], the proposed collaborative distributed beamforming scheme cannot achieve the full diversity order, i.e., d=M. This is because the proposed collaborative distributed beamforming scheme allocates the power into the projected channels to enforce zero interference to the PUs, which reduces the achievable secrecy diversity order to Mâˆ’1.
4 Secrecy performance with multiple eavesdroppers
In this section, we extend our cooperative cognitive system model to K noncolluding eavesdroppers, as shown in Fig. 2. We assume that all the eavesdroppers are located close to each other, which implies the same average received SNR at eavesdroppers. We denote \({\mathbf {h}}_{RE_{k} } = \left [ {h_{R_{1} E_{k} }, \cdots,h_{R_{M} E_{k} } } \right ]^{T} \) as the channel vector between the relays and the kth eavesdropper. Then, the equivalent instantaneous SNR between the relays and the kth eavesdropper can be denoted by \(\gamma _{E_{k} } = \left ({{{P_{R} } \mathord {\left / {\vphantom {{P_{R} } {\sigma _{0}^{2} }}} \right. \kern \nulldelimiterspace } {\sigma _{0}^{2} }}} \right)\left  {{\mathbf {h}}_{RE_{k} }^{H} {\mathbf {w}}_{ZF} } \right ^{2} \), which is exponentially distributed with the same parameter \(\bar \gamma _{E} \).
Under this scenario, the instantaneous secrecy capacity should be rewritten as
Similar to (6), the probability of nonzero secrecy capacity with K noncolluding eavesdroppers can be formulated as
where \(f_{\gamma _{E}^{K} } \left (\gamma \right)\) denotes the PDF of \(\gamma _{E}^{K} = \mathop {\max }\limits _{k = 1, \cdots,K} \gamma _{E_{k}}\).
Considering that \(\gamma _{E_{k} },k = 1, \cdots,K\) are i.i.d exponential distribution variables, the CDF and PDF of \(\gamma _{E}^{K}\) can be expressed as
and
Substituting (4) and (22) into (20), the probability of nonzero secrecy capacity with K noncolluding eavesdroppers can be derived as
Similarly, the secrecy outage probability with K noncolluding eavesdroppers is further expressed as
where \(\eta = {{\gamma _{th} } \mathord {\left / {\vphantom {{\gamma _{th} } {\bar {\gamma }_{2} }}} \right. \kern \nulldelimiterspace } {\bar {\gamma }_{2} }} + {{\left ({k + 1} \right)} \mathord {\left / {\vphantom {{\left ({k + 1} \right)} {\bar {\gamma }_{E} }}} \right. \kern \nulldelimiterspace } {\bar {\gamma }_{E} }}\).
The asymptotic secrecy outage probability with K noncolluding eavesdroppers can be derived as
It is clear that the achievable secrecy diversity order in the presence of K noncolluding eavesdroppers is still Mâˆ’1, which means that the secrecy diversity performance is independent of the number of eavesdroppers. However, the achievable secrecy array gain is different due to the presence of multiple noncolluding eavesdroppers, which can be yielded as
It is indicated from (18) and (26) that the achievable secrecy array gain decreases with increasing K, which results in a decrease in the secrecy outage performance.
5 Numerical and simulation results
In this section, Monte Carlo simulations are provided to validate our analytical expressions over Rayleighfading channels. We assume that R _{ s }=0.1 bit/s/Hz, P _{ R }=20 dB, \(\sigma _{0}^{2} = 1\), Î» _{ SR }=Î» _{ RD }=1, and Î» _{ SP }=Î» _{ RP }=0.3. It is worth noting that the primary and secondary users are spatially separated in two different wireless networks. As such, an average channel gain (Î» _{ SP } and Î» _{ RP }) between two heterogeneous users from the different networks is set to be smaller than that (Î» _{ SR } and Î» _{ RD }) between two heterogeneous users from the same networks.
Figure 3 plots the secrecy outage probability versus I for various M over Rayleighfading channels. The analytical results based on (14) are in precise agreement with the Monte Carlo simulations. It is shown that for a fixed M, the secrecy outage probability decreases with increasing I, which increases the transmitting power at the secondary source and improves the transmission reliability of SR links. We can also see that there exists a secrecy outage performance floor in the high I region. It is because the secrecy outage performance is determined by second hop links when Iâ†’âˆž. On the other hand, the secrecy outage performance is improved with larger M, as more relays do not only help improve the communication quality of SR links but also enhance security of RD links. As shown in Fig. 3, as the number of relays increases from M= 3 to 5, the secrecy outage performance floor is significantly reduced.
Figures 4 and 5 plot the secrecy outage probability and the probability of nonzero secrecy capacity versus M E R for various M in the presence of a single eavesdropper. The exact curves precisely agree with the Monte Carlo simulation results, which validates the correctness of our analysis. As shown in the figures, as the number of relays increases from M= 2 to 5, the secrecy outage probability and the probability of nonzero secrecy capacity are significantly improved. The reason is that more relays do not only help improve the communication quality of SR links but also enhance the security of the RD links. In order to predict the secrecy diversity order and the secrecy array gain, the asymptotic secrecy outage probability curves based on (16) are also drawn in Fig. 5. We can see that the asymptotic curves well approximate the analytical curves in the high M E R region, which verifies the derived asymptotic expressions. As M E Râ†’âˆž, the secrecy outage probability decreases at a faster speed with an increasing number of relays M. This is because the achievable secrecy diversity order is Mâˆ’1.
Figures 6 and 7 plot the secrecy outage probability and the probability of nonzero secrecy capacity versus M E R in the presence of K noncolluding eavesdroppers (M=3 and I=10 dB). As observed from the figure, we can find that for different values of M E R and K, the analytical results match well the simulation. In addition, the asymptotic secrecy outage probability curves based on (25) converge exactly in the high M E R region in Fig. 6. Moreover, the slopes of the curves of the secrecy outage probability are in parallel, which verifies the secrecy diversity order of Mâˆ’1 regardless of the number of eavesdroppers K. From Fig. 7, it is evident that the probability of nonzero secrecy capacity improves with increasing M E R. In addition, the probability of nonzero secrecy capacity improves at a faster speed with smaller K.
6 Conclusions
In this paper, we have investigated the security performance of multiple AFrelaying CCRNs with collaborative distributed beamforming scheme against passive eavesdropping attacks. To show the advantages of the collaborative distributed beamforming scheme, we have derived closedform expressions of the probability of nonzero secrecy capacity and secrecy outage probability as well as the asymptotic expression over Rayleighfading channels, which provide an efficient means to evaluate the impact of key parameters on the security performance. Moreover, our asymptotic results demonstrated that the achievable secrecy diversity order of collaborative distributed beamforming with M AF relays is Mâˆ’1 regardless of the number of eavesdroppers.
References
D Wyner, The wiretap channel. Bell Syst. Tech. J. 54(8), 1355â€“1367 (1975).
A Jovicic, P Viswanath, Cognitive radio: an informationtheoretic perspective. IEEE Trans. Inf. Theory. 55(9), 3945â€“3958 (2009).
X Chen, HH Chen, W Meng, Cooperative communication for cognitive radio networksâ€”from theory to application. IEEE Commun. Surv. Tutor. 16(3), 1180â€“1192 (2014).
Z Shu, Y Qian, S Ci, On physical layer security for cognitive radio networks. IEEE Netw. 27(3), 28â€“33 (2013).
C Tang, G Pan, T Li, Secrecy outage analysis of underlay cognitive radio unit over Nakagamim fading channels. IEEE Wirel. Commun. Lett. 3(6), 609â€“612 (2014).
Y Pei, YC Liang, L Zhang, KC Teh, KH Li, Secure communication over MISO cognitive radio channels. IEEE Trans. Wirel. Commun. 9(4), 1494â€“1502 (2010).
Y Zou, X Li, YC Liang, Secrecy outage and diversity analysis of cognitive radio systems. IEEE J. Sel. Areas Commun. 32(11), 2222â€“2236 (2014).
M Elkashlan, L Wang, TQ Duong, GK Karagiannidis, A Nallanathan, On the security of cognitive radio networks. IEEE Trans. Veh. Techol. 64(8), 3790â€“3795 (2015).
H Lei, H Zhang, IS Ansari, C Gao, Y Guo, G Pan, KA Qaraqe, Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagamim channels. IEEE Trans. Veh. Techol. 65(12), 10126â€“10132 (2016).
H Zhao, Y Tan, G Pan, Y Chen, N Yang, Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks. IEEE Trans. Veh. Techol. 65(12), 10236â€“10242 (2016).
Y Zou, J Zhu, L Yang, YC Liang, YD Yao, Securing physical layer communications for cognitive radio networks. IEEE Commun. Mag. 53(9), 48â€“54 (2015).
W Yang, X Xu, Y Cai, in IEEE WCNC 2014. Secrecy outage analysis for DF underlay CRNs with outdate CSI (Wireless Communications and Networking Conference (WCNC), 2014 IEEEIstanbul, 2014).
Y Liu, L Wang, TT Duy, M Elkashlan, TQ Duong, Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 4(1), 46â€“49 (2015).
Y Zou, B Champagne, WP Zhu, L Hanzo, Relayselection improves the securityreliability tradeoff in cognitive radio systems. IEEE Trans. Commun.63(1), 215â€“228 (2015).
Q Gu, G Wang, L Gao, M Peng, Securityreliability performance of cognitive AF relaybased wireless communication system with channel estimation error. EURASIP J. Adv. Signal Process. 2014:, 1â€“11 (2015).
W Yang, K Wang, X Xu, J Zhou, in WOCC 2016. Secure transmission for AF relaying spectrumsharing systems with collaborative distributed beamforming (Wireless and Optical Communication Conference (WOCC), 2016 25thChengdu, 2016).
A Afana, V Asghari, A Ghrayeb, S Affes, On the performance of cooperative relaying spectrumsharing system with collaborative distributed beamforming. IEEE Trans. Commun. 62(3), 857â€“871 (2014).
RJ Pavur, Quadratic forms involving the complex Gaussian. M.Sc. dissertation, Math. Dept., Texas Tech Univ.Lubbock, TX, (1980).
IS Gradshteyn, IM Ryzhik, Table of integrals, series, and products, sixth ed (Academic Press, London, 2000).
I Krikidis, Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun. 4(15), 1787â€“1791 (2010).
A Behnad, X Wang, Accuracy of harmonic mean approximation in performance analysis of multihop amplifyandforward relaying. IEEE Wirel. Commun. Lett. 3(2), 125â€“128 (2014).
Acknowledgements
This work is supported by the National Natural Science Foundation of China (No. 61471393 and 61501507) and the Jiangsu Provincial Natural Science Foundation of China (No. BK20150719) and the China Postdoctoral Science Foundation under a Special Financial (No. 2013T60912).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Publisherâ€™s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Mou, W., Yang, W., Huang, Y. et al. On the security of cooperative cognitive radio networks with distributed beamforming. J Wireless Com Network 2017, 144 (2017). https://doi.org/10.1186/s1363801709232
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801709232