Pham Minh Quang, Tran Trung Duy, Vo Nguyen Quoc Bao
{"title":"Performance evaluation of underlay cognitive radio networks over Nakagami-m fading channels with energy harvesting","authors":"Pham Minh Quang, Tran Trung Duy, Vo Nguyen Quoc Bao","doi":"10.1109/ATC.2016.7764755","DOIUrl":null,"url":null,"abstract":"In this paper, we study the reliability-security tradeoff for a secondary network in an underday cognitive radio (CR) environment. In the proposed protocol, a secondary transmitter (ST) transmits its data to a secondary receiver (SR) in presence of a secondary eavesdropper (SE) that tries to overhear the ST data. Moreover, a secondary jammer (SJ) that harvests energy from the radio frequency (RF) signals received from the ST is used to transmit jamming signals to the SE. For performance evaluation, we derive exact and asymptotic closed-form expressions of the outage probability (OP) at the SR and the intercept probability (IP) at the SE over Nakagami-m fading channels. Finally, we perform Monte Carlo simulations to verify the theoretical results.","PeriodicalId":225413,"journal":{"name":"2016 International Conference on Advanced Technologies for Communications (ATC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Advanced Technologies for Communications (ATC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATC.2016.7764755","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20
Abstract
In this paper, we study the reliability-security tradeoff for a secondary network in an underday cognitive radio (CR) environment. In the proposed protocol, a secondary transmitter (ST) transmits its data to a secondary receiver (SR) in presence of a secondary eavesdropper (SE) that tries to overhear the ST data. Moreover, a secondary jammer (SJ) that harvests energy from the radio frequency (RF) signals received from the ST is used to transmit jamming signals to the SE. For performance evaluation, we derive exact and asymptotic closed-form expressions of the outage probability (OP) at the SR and the intercept probability (IP) at the SE over Nakagami-m fading channels. Finally, we perform Monte Carlo simulations to verify the theoretical results.