Ngoc Pham-Thi-Dan, Nguyen Bui-Trung, Huynh Nguyen, Quan Lam-Minh, Khuong Ho‐Van, Pham Ngoc Son, Son Vo Que, Thiem Do-Dac
{"title":"Security Analysis of Relay Selection in Energy Scavenging-based Cognitive Networks","authors":"Ngoc Pham-Thi-Dan, Nguyen Bui-Trung, Huynh Nguyen, Quan Lam-Minh, Khuong Ho‐Van, Pham Ngoc Son, Son Vo Que, Thiem Do-Dac","doi":"10.1109/atc52653.2021.9598211","DOIUrl":null,"url":null,"abstract":"We introduce a relay selection strategy to secure energy scavenging-based cognitive networks. The introduced strategy selects a relay which satisfies two conditions: i) decode correctly data of secondary source and ii) obtain the highest secrecy capacity to the secondary destination. To assess promptly the efficacy of the introduced strategy, the secrecy outage probability (SOP) is firstly derived in exact closed form. The recommended SOP expression is then verified by Monte-Carlo simulations. Finally, useful comments on security performance of the recommended relay selection strategy are withdrawn from various results relying on the recommended SOP expression.","PeriodicalId":196900,"journal":{"name":"2021 International Conference on Advanced Technologies for Communications (ATC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advanced Technologies for Communications (ATC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/atc52653.2021.9598211","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
We introduce a relay selection strategy to secure energy scavenging-based cognitive networks. The introduced strategy selects a relay which satisfies two conditions: i) decode correctly data of secondary source and ii) obtain the highest secrecy capacity to the secondary destination. To assess promptly the efficacy of the introduced strategy, the secrecy outage probability (SOP) is firstly derived in exact closed form. The recommended SOP expression is then verified by Monte-Carlo simulations. Finally, useful comments on security performance of the recommended relay selection strategy are withdrawn from various results relying on the recommended SOP expression.