inis 19(18): e1

Research Article

Exact Outage Analysis of Cognitive Energy Harvesting Relaying Networks under Physical Layer Security

Download1099 downloads
  • @ARTICLE{10.4108/eai.28-3-2019.157119,
        author={Sang Quang Nguyen and Huy T. Nguyen and Dong Doan Van and Won-Joo Hwang},
        title={Exact Outage Analysis of Cognitive Energy Harvesting Relaying Networks under Physical Layer Security},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={6},
        number={18},
        publisher={EAI},
        journal_a={INIS},
        year={2019},
        month={3},
        keywords={Energy harvesting; Cognitive radio; Cooperative communication; Physical layer security; Relay selection; Power splitting; Decode-and-forward},
        doi={10.4108/eai.28-3-2019.157119}
    }
    
  • Sang Quang Nguyen
    Huy T. Nguyen
    Dong Doan Van
    Won-Joo Hwang
    Year: 2019
    Exact Outage Analysis of Cognitive Energy Harvesting Relaying Networks under Physical Layer Security
    INIS
    EAI
    DOI: 10.4108/eai.28-3-2019.157119
Sang Quang Nguyen1,*, Huy T. Nguyen2, Dong Doan Van3, Won-Joo Hwang2
  • 1: Institute of Fundamental and Applied Sciences, Duy Tan University, Ho Chi Minh City 700000, Vietnam
  • 2: Department of Information and Communication System, Inje University, 197, Gimhae, Gyeongnam, Korea
  • 3: Faculty Electrical and Electronic Engineering, Ho Chi Minh City University of Transport, Ho Chi Minh City 700000, Vietnam
*Contact email: nguyenquangsang3@dtu.edu.vn

Abstract

In this paper, we study the secure communication of cognitive energy harvesting relay networks when there exist multiple eaves droppers who can overhear the message of the second hop, and multiple primary users are present. The data transmission from the secondary source to the secondary destination is assisted by the best decode-and-forward relay, which is selected by means of three relay selection schemes. We study the system security performance by deriving the exact analytical secrecy outage probability. These analytical expressions are then verified by comparison to the results of Monte Carlo simulations. Herein we evaluate and discuss the outage performance of the three schemes under variations in important system parameters: the number and locations of relay nodes, primary user nodes, and eavesdroppers; the transmit power threshold; the energy harvesting efficiency coefficient; the power splitting ratio; and the target secure rate.