P. Ngoc, Tran Trung Duy, Vo Nguyen Quoc Bao, Nguyen Luong Nhat
{"title":"Security-reliability analysis for underlay cognitive radio networks with relay selection methods under impact of hardware noises","authors":"P. Ngoc, Tran Trung Duy, Vo Nguyen Quoc Bao, Nguyen Luong Nhat","doi":"10.1109/ATC.2016.7764769","DOIUrl":null,"url":null,"abstract":"In this paper, we study physical-layer security (PLS) issue in underlay cognitive radio (UCR) networks in presence of multiple primary users (PUs). In particular, we propose three relay selection methods that take the interference constraint into account to improve the reliability of the data transmission as well as to reduce the data rate received at eavesdroppers. The main contribution of this work is to derive exact closed-form expressions of the intercept probability (IP) for the eavesdropping link and the outage probability (OP) on the data link under the impact of hardware impairments. The derived expressions are verified by Monte Carlo simulations.","PeriodicalId":225413,"journal":{"name":"2016 International Conference on Advanced Technologies for Communications (ATC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Advanced Technologies for Communications (ATC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATC.2016.7764769","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In this paper, we study physical-layer security (PLS) issue in underlay cognitive radio (UCR) networks in presence of multiple primary users (PUs). In particular, we propose three relay selection methods that take the interference constraint into account to improve the reliability of the data transmission as well as to reduce the data rate received at eavesdroppers. The main contribution of this work is to derive exact closed-form expressions of the intercept probability (IP) for the eavesdropping link and the outage probability (OP) on the data link under the impact of hardware impairments. The derived expressions are verified by Monte Carlo simulations.