P. Ngoc, Tran Trung Duy, Vo Nguyen Quoc Bao, Nguyen Luong Nhat
{"title":"硬件噪声影响下具有中继选择方法的底层认知无线网络安全可靠性分析","authors":"P. Ngoc, Tran Trung Duy, Vo Nguyen Quoc Bao, Nguyen Luong Nhat","doi":"10.1109/ATC.2016.7764769","DOIUrl":null,"url":null,"abstract":"In this paper, we study physical-layer security (PLS) issue in underlay cognitive radio (UCR) networks in presence of multiple primary users (PUs). In particular, we propose three relay selection methods that take the interference constraint into account to improve the reliability of the data transmission as well as to reduce the data rate received at eavesdroppers. The main contribution of this work is to derive exact closed-form expressions of the intercept probability (IP) for the eavesdropping link and the outage probability (OP) on the data link under the impact of hardware impairments. The derived expressions are verified by Monte Carlo simulations.","PeriodicalId":225413,"journal":{"name":"2016 International Conference on Advanced Technologies for Communications (ATC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Security-reliability analysis for underlay cognitive radio networks with relay selection methods under impact of hardware noises\",\"authors\":\"P. Ngoc, Tran Trung Duy, Vo Nguyen Quoc Bao, Nguyen Luong Nhat\",\"doi\":\"10.1109/ATC.2016.7764769\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we study physical-layer security (PLS) issue in underlay cognitive radio (UCR) networks in presence of multiple primary users (PUs). In particular, we propose three relay selection methods that take the interference constraint into account to improve the reliability of the data transmission as well as to reduce the data rate received at eavesdroppers. The main contribution of this work is to derive exact closed-form expressions of the intercept probability (IP) for the eavesdropping link and the outage probability (OP) on the data link under the impact of hardware impairments. The derived expressions are verified by Monte Carlo simulations.\",\"PeriodicalId\":225413,\"journal\":{\"name\":\"2016 International Conference on Advanced Technologies for Communications (ATC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Advanced Technologies for Communications (ATC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ATC.2016.7764769\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Advanced Technologies for Communications (ATC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATC.2016.7764769","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security-reliability analysis for underlay cognitive radio networks with relay selection methods under impact of hardware noises
In this paper, we study physical-layer security (PLS) issue in underlay cognitive radio (UCR) networks in presence of multiple primary users (PUs). In particular, we propose three relay selection methods that take the interference constraint into account to improve the reliability of the data transmission as well as to reduce the data rate received at eavesdroppers. The main contribution of this work is to derive exact closed-form expressions of the intercept probability (IP) for the eavesdropping link and the outage probability (OP) on the data link under the impact of hardware impairments. The derived expressions are verified by Monte Carlo simulations.