Joint Influences of Erroneous Channel Information, Fading Severity, Jamming Suppression Error, Energy Harvesting Non-Linearity on Underlay Relaying Networks

This paper considers an underlay relaying network where a cognitive relay performs decode-and-forward operation to aid communication between a cognitive source-destination pair. Transmit powers of cognitive users are subject to both interference and peak transmit power constraints. To stimulate supp...

Full description

Saved in:
Bibliographic Details
Published inArabian journal for science and engineering (2011) Vol. 47; no. 11; pp. 14471 - 14489
Main Authors Le-Thanh, Toi, Ho-Van, Khuong
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2022
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper considers an underlay relaying network where a cognitive relay performs decode-and-forward operation to aid communication between a cognitive source-destination pair. Transmit powers of cognitive users are subject to both interference and peak transmit power constraints. To stimulate support, the relay merely spends power scavenged from source signals with realistic non-linear energy harvester for its operation. Additionally, to secure secret transmission of both the source and the relay, this paper proposes to merge jamming signals with secret ones before their transmission. Relied on practical observations that jamming signals and channel state information at legitimate receivers may not be suppressed and estimated perfectly, respectively, this paper analyzes system performance under inaccuracies of jamming suppression and channel estimation. Purposively, this paper analyzes security-reliability trade-off of underlay relaying networks under joint practical influences of erroneous channel information, Nakagami- m fading severity, jamming suppression error, energy harvesting non-linearity, and power constraints of cognitive users. Towards this end, explicit expressions of intercept and outage probabilities are first derived. Then, they are used to quickly generate numerous results so as to withdraw interesting findings. More specifically, the proposed jamming strategy experienced the trade-off between security and reliability as well as reliability/security saturation at high peak transmit power. Additionally, channel estimation error, fading severity, jamming suppression error, and energy harvesting non-linearity significantly impact system performance. Nonetheless, system parameters can be set properly to achieve different security levels and prevent absolute outage.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2193-567X
1319-8025
2191-4281
DOI:10.1007/s13369-022-06789-3