Ngoc Pham Thi Dan, Khuong Ho Van, Hanh Dang Ngoc, Thiem Do Dac, Phong Nguyen Huu, Son Vo Que, Son Pham Ngoc, Lien Hong Pham
{"title":"具有辅助用户干扰和自供电能力的认知无线网络安全性能分析","authors":"Ngoc Pham Thi Dan, Khuong Ho Van, Hanh Dang Ngoc, Thiem Do Dac, Phong Nguyen Huu, Son Vo Que, Son Pham Ngoc, Lien Hong Pham","doi":"10.15625/1813-9663/36/3/14987","DOIUrl":null,"url":null,"abstract":"This paper investigates a cognitive radio network where a secondary sender assists a primary transmitter in relaying primary information to a primary receiver and also transmits its own information to a secondary recipient. This sender is capable of jamming to protect secondary and/or primary information against an eavesdropper and self-powering by harvesting radio frequency energy of primary signals. Security capability of both secondary and primary networks are analyzed in terms of secrecy outage probability. Numerous results corroborate the proposed analysis which serves as a design guideline to quickly assess and optimize security performance. More importantly, security capability trade-off between secondary and primary networks can be totally controlled with appropriate selection of system parameters.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"194 1","pages":"205-231"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING\",\"authors\":\"Ngoc Pham Thi Dan, Khuong Ho Van, Hanh Dang Ngoc, Thiem Do Dac, Phong Nguyen Huu, Son Vo Que, Son Pham Ngoc, Lien Hong Pham\",\"doi\":\"10.15625/1813-9663/36/3/14987\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper investigates a cognitive radio network where a secondary sender assists a primary transmitter in relaying primary information to a primary receiver and also transmits its own information to a secondary recipient. This sender is capable of jamming to protect secondary and/or primary information against an eavesdropper and self-powering by harvesting radio frequency energy of primary signals. Security capability of both secondary and primary networks are analyzed in terms of secrecy outage probability. Numerous results corroborate the proposed analysis which serves as a design guideline to quickly assess and optimize security performance. More importantly, security capability trade-off between secondary and primary networks can be totally controlled with appropriate selection of system parameters.\",\"PeriodicalId\":15444,\"journal\":{\"name\":\"Journal of Computer Science and Cybernetics\",\"volume\":\"194 1\",\"pages\":\"205-231\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Science and Cybernetics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.15625/1813-9663/36/3/14987\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science and Cybernetics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15625/1813-9663/36/3/14987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING
This paper investigates a cognitive radio network where a secondary sender assists a primary transmitter in relaying primary information to a primary receiver and also transmits its own information to a secondary recipient. This sender is capable of jamming to protect secondary and/or primary information against an eavesdropper and self-powering by harvesting radio frequency energy of primary signals. Security capability of both secondary and primary networks are analyzed in terms of secrecy outage probability. Numerous results corroborate the proposed analysis which serves as a design guideline to quickly assess and optimize security performance. More importantly, security capability trade-off between secondary and primary networks can be totally controlled with appropriate selection of system parameters.