{"title":"The underlay cooperative cognitive network with secure transmission","authors":"Pham Ngoc Son, H. Kong","doi":"10.1109/QBSC.2014.6841206","DOIUrl":null,"url":null,"abstract":"In this paper, we propose and analyze an underlay cooperative cognitive network with Physical Layer Security where a best relay is selected based on maximizing end-to-end secrecy capacity. The cooperative system performance is evaluated by an outage secrecy probability and is compared with the direct transmission protocol. Our simulation results show that system performance is improved when dse > dsd and the cognitive network is far enough from the primary user, where dsd and dse are the distances from a source to a destination and a source to an eavesdropper, respectively. In addition, the theoretical expressions match well with the simulation results.","PeriodicalId":314871,"journal":{"name":"2014 27th Biennial Symposium on Communications (QBSC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 27th Biennial Symposium on Communications (QBSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/QBSC.2014.6841206","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In this paper, we propose and analyze an underlay cooperative cognitive network with Physical Layer Security where a best relay is selected based on maximizing end-to-end secrecy capacity. The cooperative system performance is evaluated by an outage secrecy probability and is compared with the direct transmission protocol. Our simulation results show that system performance is improved when dse > dsd and the cognitive network is far enough from the primary user, where dsd and dse are the distances from a source to a destination and a source to an eavesdropper, respectively. In addition, the theoretical expressions match well with the simulation results.