A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay
In this paper, a framework for capitalizing on the potential benefits of physical layer security in an amplify-and-forward cooperative spectrum sensing (AF-CSS) in a cognitive radio network (CRN) using a stochastic geometry is proposed. In the CRN network the sensing data from secondary users (SUs) are collected by a fusion center (FC) with the help of access points (AP) as relays, and when malicious eavesdropping secondary users (SUs) are listening. We focus on the secure transmission of active SUs transmitting their sensing data to the AP. Closed expressions for the average secrecy rate are presented. Numerical results corroborate our analysis and show that multiple antennas at the APs can enhance the security of the AF-CSS-CRN. The obtained numerical results show that average secrecy rate between the AP and its correlated FC decreases when the number of AP is increased. Nevertheless, we find that an increase in the number of AP initially increases the overall average secrecy rate, with a perilous value at which the overall average secrecy rate then decreases. While increasing the number of active SUs, there is a decrease in the secrecy rate between the sensor and its correlated AP.
Published in2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019
MetadataShow full item record
Showing items related by title, author, creator and subject.
Renewal through participation in Global Food Security Governance : implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security Duncan, J.; Barling, David (2012)The food commodity price rises from 2006 to 2008 engendered a period of political renewal and reform in the governance of global food security. The Committee on World Food Security (CFS) was designated as the main international ...
Christianson, B.; Hu, P. (University of Hertfordshire, 1995)In an open distributed system, resources must be shared among various users. Security is one of the major issues in designing such a system. When a computer system is connected to a network, it is very important to ensure ...
Ramalingam, Soodamani; Gan, Hock; Epiphaniou, Gregory; Mistretta, Emilio (2020-09-14)IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked. IoT systems inherently present different fail-safe ...