Secrecy Outage Analysis of UAV Assisted Relay and Antenna Selection for Cognitive Network Under Nakagami- Channel

In view of the scarcity of spectrum resources in wireless communication, it is studied in this paper over the two-hop cognitive secrecy transmission scheme of decoding and forwarding (DF) unmanned aerial vehicles (UAVs) assisted relay with energy harvesting under Nakagami-<inline-formula> <...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on cognitive communications and networking Vol. 6; no. 3; pp. 904 - 914
Main Authors Ji, Baofeng, Li, Yuqi, Chen, Sudan, Han, Congzheng, Li, Chunguo, Wen, Hong
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.09.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In view of the scarcity of spectrum resources in wireless communication, it is studied in this paper over the two-hop cognitive secrecy transmission scheme of decoding and forwarding (DF) unmanned aerial vehicles (UAVs) assisted relay with energy harvesting under Nakagami-<inline-formula> <tex-math notation="LaTeX">{m} </tex-math></inline-formula> channel. It is worth noting that the terminal node is equipped with multiple antennas and the optimal antenna selection can be adopted for signal reception. Meanwhile, the UAV assisted relay uses time switching (TS) and power splitting (PS) energy harvesting techniques and adopts optimal secrecy capacity selection scheme. It is successfully derived for the exact closed form expressions of non-zero secrecy capacity probability and optimal secrecy outage probability while the eavesdropper has no channel state information (CSI). Moreover, the system asymptotic secrecy outage probability demonstrates the secrecy diversity order and secrecy diversity gains of the UAV assisted relay cognitive network under Nakagami-<inline-formula> <tex-math notation="LaTeX">{m} </tex-math></inline-formula> channel. Furthermore, joint optimization of power splitting factor and other parameters can effectively increase the system secrecy capacity and improve the system secrecy performance. Simulation results verify the correctness of the theoretical derivation and the effectiveness of the proposed scheme, which demonstrate that the proposed algorithm outperforms the other compared schemes.
ISSN:2332-7731
2332-7731
DOI:10.1109/TCCN.2020.2965945