Physical Layer Security of a Buffer-Aided Relay Selection for Underlay Cognitive Radio Network

  • Jian Jia
  • Ting JiangEmail author
  • Wei Guo
  • Xiaoying Qiu
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 517)


This paper investigates the physical layer security in underlay cognitive radio networks with multiple buffer-aided decode-and-forward relays, where an eavesdropper can intercept the data transmission from the source and relay nodes. Different from existing works, we propose a new buffer-aided relay selection scheme in multi-relay scenario instead of a link selection scheme in one relay scenario. Moreover, finite data buffers are assumed to be available at every relay to avoid selecting the best source-to-relay and relay-to-destination links concurrently, and the secrecy outage probability is derived. The proposed scheme is evaluated using simulations and theoretical results, which show that proposed scheme has performance advantage over the conventional unbuffered relay selection scheme.


Physical layer security Buffer-aided relay network Cognitive radio network 



This work was supported by National Natural Science Foundation of China (NSFC) (No. 61671075) and Major Program of National Natural Science Foundation of China (No. 61631003).


  1. 1.
    Krikidis, I., Charalambous, T., Thompson, J.S.: Buffer-aided relay selection for cooperative diversity systems without delay constraints. IEEE Trans. Wirel. Commun. 11(5), 1957–1967 (2012)CrossRefGoogle Scholar
  2. 2.
    Chen, G., Tian, Z., Gong, Y., Chen, Z., Chambers, J.A.: Max-ratio relay selection in secure buffer-aided cooperative wireless networks. IEEE Trans. Inf. Forensics Secur. 9(4), 719–729 (2014)CrossRefGoogle Scholar
  3. 3.
    Yang, P., Luo, L., Qin, J.: Outage performance of cognitive relay networks with interference from primary user. IEEE Commun. Lett. 16(10), 1695–1698 (2012)CrossRefGoogle Scholar
  4. 4.
    Darabi, M., Jamali, V., Maham, B., Schober, R.: Adaptive link selection for cognitive buffer-aided relay networks, IEEE Commun. Lett. 19(4), 693–696 (2015)CrossRefGoogle Scholar
  5. 5.
    Chen, G., Tian, Z., Gong, Y., Chambers, J.: Decode-and-forward buffer-aided relay selection in cognitive relay networks. IEEE Trans. Veh. Technol. 63(9), 4723–4728 (2014)CrossRefGoogle Scholar
  6. 6.
    Sun, A., Liang, T., Zhang, Y.: Secure performance analysis of buffer-aided cognitive relay networks under delay unconstraint case. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2164–2168, March 2016Google Scholar
  7. 7.
    Huang, J., Swindlehurst, A.L.: Buffer-aided relaying for two-hop secure communication. IEEE Trans. Wirel. Commun. 14(1), 152–164 (2015)CrossRefGoogle Scholar
  8. 8.
    Ding, X., Song, T., Zou, Y., Chen, X.: Relay selection for secrecy improvement in cognitive amplify-and- forward relay networks against multiple eavesdroppers. IET Commun. 10(15), 2043–2053 (2016)CrossRefGoogle Scholar
  9. 9.
    Duong, T.Q., Hoang, T.M., Kundu, C., Elkashlan, M., Nallanathan, A.: Optimal power allocation for multiuser secure communication in cooperative relaying networks. IEEE Wirel. Commun. Lett. 5(5), 516–519 (2016)CrossRefGoogle Scholar
  10. 10.
    Duong, T.Q., Yeoh, P.L., Bao, V.N.Q., Elkashlan, M., Yang, N.: Cognitive relay networks with multiple primary transceivers under spectrum-sharing. IEEE Signal Process. Lett. 19(11), 741–744 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Key Laboratory of Universal Wireless Communication, Ministry of EducationBeijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations