Advertisement

Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks

  • Kun TangEmail author
  • Shaowei Liao
  • Md. Zakirul Alam Bhuiyan
  • Wei Shi
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1123)

Abstract

In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harvesting secondary system can share the spectrum of the primary system by assisting its transmission. In particular, we focus on the secure information transmission for the secondary system when an eavesdropper is existed to intercept the secondary user’s confidential information. Closed-form analytical expressions of primary outage probability, secondary secrecy outage probability (SOP) and the probability of non-zero secrecy capacity (PNSC) are derived. We also aim to joint design optimal time-switching ratio and power-splitting coefficient for maximizing the secondary secrecy outage probability under primary requirement constraint. To solve this non-convex problem, we prove the biconvexity of optimization problem and then develop a corresponding algorithm to solve that optimization problem. Numerical results show that our proposed transmission scheme can provide greater secure information transmission for secondary system and guarantee the outage performance for primary system.

Keywords

Cognitive radio network Energy harvesting Secrecy outage probability Probability of non-zero secrecy capacity Biconcave 

References

  1. 1.
    Ullah, H., Nair, N.G., Moore, A., et al.: 5G communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access 7, 37251–37268 (2019)CrossRefGoogle Scholar
  2. 2.
    Ji, P., Jia, J., Chen, J.: Joint optimization on both routing and resource allocation for millimeter wave cellular networks. IEEE Access 7, 93631–93642 (2019)CrossRefGoogle Scholar
  3. 3.
    Sharma, M., Sahoo, A.: Stochastic model based opportunistic channel access in dynamic spectrum access networks. IEEE Trans. Mob. Comput. 13(7), 1625–1639 (2014)CrossRefGoogle Scholar
  4. 4.
    Wang, C., Li, Y., Yang, Y., et al.: Combing solar energy harvesting with wireless charging for hybrid wireless sensor networks. IEEE Trans. Mob. Comput. 17(3), 560–576 (2018)CrossRefGoogle Scholar
  5. 5.
    Chen, H., Zhai, C., Li, Y., et al.: Cooperative strategies for wireless-powered communications: an overview. IEEE Wirel. Commun. 25(4), 112–119 (2018)CrossRefGoogle Scholar
  6. 6.
    Tang, K., Shi, R., Dong, J.: Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting. Future Gener. Comput. Syst. 86, 1218–1227 (2018)CrossRefGoogle Scholar
  7. 7.
    Jiang, L., Tian, H., Qin, C., et al.: Secure beamforming in wirless-powered cooperative cognitive radio networks. IEEE Commun. Lett. 20(3), 522–525 (2016)CrossRefGoogle Scholar
  8. 8.
    Zhang, J.-L., Pan, G.-F., Wang, H.-M.: On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system. IEEE Access 4, 3887–3893 (2016)CrossRefGoogle Scholar
  9. 9.
    Gradshteyn, I.-S., Ryzhik, I.-M.: Table of Integrals, Series, and Products, 7th edn. Academic Press, New York (2007)zbMATHGoogle Scholar
  10. 10.
    Gorski, J., Pfeuffer, F., Klamroth, K.: Biconvex sets and optimization with biconvex functions: a survey and extensions. Math. Methods Oper. Res. 66(3), 373–407 (2007)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Kun Tang
    • 1
    Email author
  • Shaowei Liao
    • 1
  • Md. Zakirul Alam Bhuiyan
    • 2
  • Wei Shi
    • 3
  1. 1.School of Electronic and Information EngineeringSouth China University of TechnologyGuangzhouChina
  2. 2.Department of Computer and Information SciencesFordham UniversityNew YorkUSA
  3. 3.School of Information TechnologyCarleton UniversityOttawaCanada

Personalised recommendations