LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Secrecy Outage Analysis on Underlay Cognitive Radio System With Full-Duplex Secondary User

Photo by averey from unsplash

In this paper, an underlay cognitive radio system, which consists of a primary-user (PU) transmitter (TX), a PU receiver (RX), a secondary-user (SU) TX, and a SU_RX, is considered. Benefitting… Click to show full abstract

In this paper, an underlay cognitive radio system, which consists of a primary-user (PU) transmitter (TX), a PU receiver (RX), a secondary-user (SU) TX, and a SU_RX, is considered. Benefitting from the underlay mode, SU_TX can deliver its information to SU_RX by sharing the spectrum resource authorized to PU. It is assumed that SUs are equipped with a single transmitting antenna and a single receiving antenna, which are isolated, and work in full-duplex (FD) mode. By considering that the information signal transmitted from PU_TX to PU_RX may be eavesdropped by SU_TX if SU_TX is malicious, we investigate the secrecy outage performance of the PU system. The approximated closed-form expression for secrecy outage probability (SOP) and the lower boundary of the asymptotic SOP have been derived and verified by simulation results. Our results reveal the impact of the eavesdropping of the SU and the FD mode adopted at the SU transmitter on the secrecy performance of the PU system in underlay spectrum sharing mode.

Keywords: system; secrecy; secrecy outage; cognitive radio; underlay cognitive

Journal Title: IEEE Access
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.