The security-reliability tradeoff of multiuser scheduling-aided energy harvesting cognitive radio networks
The security-reliability tradeoff of multiuser scheduling-aided energy harvesting cognitive radio networks
We study the physical-layer security of a cognitive radio system in the face of multiple eavesdroppers (EDs), which is composed of a secondary base station (SBS), multiple secondary users (SUs) as well as a pair of primary transmitter (PT) and primary receiver (PR), where the SUs first harvest energy from their received radio frequency signals transmitted by the PT and then communicate with the SBS relying on opportunistic scheduling. We consider two specific user scheduling schemes, namely, the channel-aware user scheduling (CaUS) and the energy-aware user scheduling (EaUS). In the CaUS scheme, an SU having the best instantaneous SU-SBS link (spanning from SUs to SBS) will be activated to communicate with the SBS. By contrast, the EaUS scheme takes into account both the amount of energy harvested from the PT and the instantaneous quality of the SU-SBS link. We analyze the security-reliability tradeoff (SRT) of both the CaUS and EaUS schemes in terms of their intercept versus outage probability. We also provide the SRT analysis of traditional round-robin user scheduling (RrUS) used as a benchmarker of the CaUS and EaUS schemes. We demonstrate that the EaUS scheme achieves the best outage and secrecy performance in the high main-to-eavesdropper ratio (MER) region, but a worse secrecy performance than the CaUS method in the low-MER region. Moreover, from a security versus reliability perspective, the CaUS outperforms both the EaUS and the RrUS in the low-MER region. Surprisingly, this also implies that although the user scheduling criterion of EaUS exploits the knowledge of both the amount of harvested power and instantaneous channel state information (CSI), it exhibits a degraded physical-layer security in the low-MER region due to the fact that the increased harvested energy is beneficial not only for the legitimate SBS receiver but also for the EDs.
Cognitive radio networks, energy harvesting, intercept probability, outage probability, physical-layer security, user scheduling
3890-3904
Ding, Xiaojin
a863d8a9-f1b7-46b9-aa10-a4a2892b68c9
Zou, Yulong
0359c94b-b989-448a-8164-da4047c4823f
Zhang, Genxin
87041a1c-c7f8-404c-9a91-c73dcbb4912a
Chen, Xiaoshu
cf4525ee-7e09-4834-8018-4b86db23bbd2
Wang, Xiaojun
a206a118-306d-4934-a9e9-176cefaffd98
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
11 March 2019
Ding, Xiaojin
a863d8a9-f1b7-46b9-aa10-a4a2892b68c9
Zou, Yulong
0359c94b-b989-448a-8164-da4047c4823f
Zhang, Genxin
87041a1c-c7f8-404c-9a91-c73dcbb4912a
Chen, Xiaoshu
cf4525ee-7e09-4834-8018-4b86db23bbd2
Wang, Xiaojun
a206a118-306d-4934-a9e9-176cefaffd98
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Ding, Xiaojin, Zou, Yulong, Zhang, Genxin, Chen, Xiaoshu, Wang, Xiaojun and Hanzo, Lajos
(2019)
The security-reliability tradeoff of multiuser scheduling-aided energy harvesting cognitive radio networks.
IEEE Transactions on Communications, 67 (6), , [8664479].
(doi:10.1109/TCOMM.2019.2904258).
Abstract
We study the physical-layer security of a cognitive radio system in the face of multiple eavesdroppers (EDs), which is composed of a secondary base station (SBS), multiple secondary users (SUs) as well as a pair of primary transmitter (PT) and primary receiver (PR), where the SUs first harvest energy from their received radio frequency signals transmitted by the PT and then communicate with the SBS relying on opportunistic scheduling. We consider two specific user scheduling schemes, namely, the channel-aware user scheduling (CaUS) and the energy-aware user scheduling (EaUS). In the CaUS scheme, an SU having the best instantaneous SU-SBS link (spanning from SUs to SBS) will be activated to communicate with the SBS. By contrast, the EaUS scheme takes into account both the amount of energy harvested from the PT and the instantaneous quality of the SU-SBS link. We analyze the security-reliability tradeoff (SRT) of both the CaUS and EaUS schemes in terms of their intercept versus outage probability. We also provide the SRT analysis of traditional round-robin user scheduling (RrUS) used as a benchmarker of the CaUS and EaUS schemes. We demonstrate that the EaUS scheme achieves the best outage and secrecy performance in the high main-to-eavesdropper ratio (MER) region, but a worse secrecy performance than the CaUS method in the low-MER region. Moreover, from a security versus reliability perspective, the CaUS outperforms both the EaUS and the RrUS in the low-MER region. Surprisingly, this also implies that although the user scheduling criterion of EaUS exploits the knowledge of both the amount of harvested power and instantaneous channel state information (CSI), it exhibits a degraded physical-layer security in the low-MER region due to the fact that the increased harvested energy is beneficial not only for the legitimate SBS receiver but also for the EDs.
Text
TCOM_TPS_18_0631
- Accepted Manuscript
More information
Published date: 11 March 2019
Keywords:
Cognitive radio networks, energy harvesting, intercept probability, outage probability, physical-layer security, user scheduling
Identifiers
Local EPrints ID: 432303
URI: http://eprints.soton.ac.uk/id/eprint/432303
ISSN: 0090-6778
PURE UUID: 24b6684a-ffc1-44be-bbaa-dadb6e909fbb
Catalogue record
Date deposited: 09 Jul 2019 16:30
Last modified: 18 Mar 2024 02:36
Export record
Altmetrics
Contributors
Author:
Xiaojin Ding
Author:
Yulong Zou
Author:
Genxin Zhang
Author:
Xiaoshu Chen
Author:
Xiaojun Wang
Author:
Lajos Hanzo
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics