Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels
Wireless communication systems are vulnerable to eavesdropping attack in which the attacker overhear the transmitted data in the network. Hence, the physical-layer security is of utmost importance to protect the wireless communications against the eavesdropping attack. In this paper, we study the ph...
Saved in:
Published in | 2018 International Conference on Advanced Communication Technologies and Networking (CommNet) pp. 1 - 5 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.04.2018
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/COMMNET.2018.8360281 |
Cover
Abstract | Wireless communication systems are vulnerable to eavesdropping attack in which the attacker overhear the transmitted data in the network. Hence, the physical-layer security is of utmost importance to protect the wireless communications against the eavesdropping attack. In this paper, we study the physical-layer security of a two-hops cognitive radio-based communication system where the secondary user sends some confidential information to a destination through a relay. This relay is assumed to be equipped with multiple antennas for reception, applies the maximum-ratio combining technique for the received signals, and uses only one antenna to forward the combined signal to the destination. The transmission is performed under the eavesdropper's attempt to listen to the communication channel. The secrecy outage probability and the intercept probability are both derived based on the statistical characteristics of the channels and under the constraint of avoiding the communication outage of the primary user. All results have been validated using Monte Carlo method. |
---|---|
AbstractList | Wireless communication systems are vulnerable to eavesdropping attack in which the attacker overhear the transmitted data in the network. Hence, the physical-layer security is of utmost importance to protect the wireless communications against the eavesdropping attack. In this paper, we study the physical-layer security of a two-hops cognitive radio-based communication system where the secondary user sends some confidential information to a destination through a relay. This relay is assumed to be equipped with multiple antennas for reception, applies the maximum-ratio combining technique for the received signals, and uses only one antenna to forward the combined signal to the destination. The transmission is performed under the eavesdropper's attempt to listen to the communication channel. The secrecy outage probability and the intercept probability are both derived based on the statistical characteristics of the channels and under the constraint of avoiding the communication outage of the primary user. All results have been validated using Monte Carlo method. |
Author | El Bouanani, Faissal Bouabdellah, Mounia Ben-azza, Hussain |
Author_xml | – sequence: 1 givenname: Mounia surname: Bouabdellah fullname: Bouabdellah, Mounia organization: ENSIAS, Mohammed V University in Rabat, Morocco – sequence: 2 givenname: Faissal surname: El Bouanani fullname: El Bouanani, Faissal organization: ENSIAS, Mohammed V University in Rabat, Morocco – sequence: 3 givenname: Hussain surname: Ben-azza fullname: Ben-azza, Hussain organization: ENSAM, Moulay Ismail University in Meknes, Morocco |
BookMark | eNotj71OwzAYAI0EA5Q-AQx-gYTPsePaI6rKj9RSCTKxVLbzOTUEu0pcUN4eJDrdcjrprsh5TBEJuWVQMgb6brndbF5WTVkBU6XiEirFzshcLxSruZJCgoZL8v6GbkA30XTMpkN6GJI1NvQhTzRE6lIXQw7fSAfThkQj5p80fI50PNoPdJnmRF_N1GPo9tT_KbGjbm9ixH68Jhfe9CPOT5yR5mHVLJ-K9fbxeXm_LoKGXCADpmUlFOMKrHPAvRKtsd5K6WvlhbCVk4x7dFyDbmEhtLCe85q3Br3nM3Lznw2IuDsM4csM0-40zH8BIPpR0Q |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/COMMNET.2018.8360281 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781538646090 1538646099 |
EndPage | 5 |
ExternalDocumentID | 8360281 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-e101962481380bcc03f84dabfb66f58f44b2c613fec3909d07494bf3353daeff3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:50:32 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-e101962481380bcc03f84dabfb66f58f44b2c613fec3909d07494bf3353daeff3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_8360281 |
PublicationCentury | 2000 |
PublicationDate | 2018-April |
PublicationDateYYYYMMDD | 2018-04-01 |
PublicationDate_xml | – month: 04 year: 2018 text: 2018-April |
PublicationDecade | 2010 |
PublicationTitle | 2018 International Conference on Advanced Communication Technologies and Networking (CommNet) |
PublicationTitleAbbrev | COMMNET |
PublicationYear | 2018 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.724195 |
Snippet | Wireless communication systems are vulnerable to eavesdropping attack in which the attacker overhear the transmitted data in the network. Hence, the... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Cognitive radio networks Communication systems Fading channels intercept probability maximum ratio combining physical layer security Power system reliability Probability Receivers Relays secrecy outage probability Transmitting antennas |
Title | Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels |
URI | https://ieeexplore.ieee.org/document/8360281 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PS8MwFMfD3MmTyib-JgePtkuXNEvPY2MInaIThpfRJC8whFa29jD_evPaOlE8eCul0JK0_ea9fD_vEXIbK6tgxExgJQcfoERJkNhIBF7J5Ig73NtBODmdy9mLuF_Gyw6527MwAFCbzyDEw3ov3xamwlTZAIGDIXLWB_41a1itloaLWDIYP6TpfLJAu5YK20t_9EypJWN6RNKvmzVOkbewKnVoPn7VYfzv0xyT_jecRx_3snNCOpD3yOszLv_MjhZV6f8QFPvENBW4d3Sd071JiG4yuy5o3pi_t3RbaUzE0LKgTz52xzwpdbWtniISnHvl7JPFdLIYz4K2bUKwTlgZQIQlb4ZCRVwxbQzjTgmbaaeldLFyQuih8SLuwPCEJdavIRKhHecxtxk4x09JNy9yOCNUgNUxi7TNhBWA1OpIGv-J-yDQScfgnPRwWFbvTWGMVTsiF3-fviSHODWN7eWKdMtNBdde0Ut9U0_lJ3JhpBY |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PS8MwFMfDmAc9qWzib3PwaLt0Sbv2PDamrlO0wvAymuQFhtDK1h7mX29eWyeKB2-lFFoS0m_ey_fzHiHXfqhDGDDl6ICDDVC8yIm0JxyrZMGAGzzbQTg5ngWTF3E39-ctcrNlYQCgMp-Bi5fVWb7OVYmpsh4CB33krHes7gu_prUaHs5jUW_4EMezUYKGrdBtHv7RNaUSjfE-ib9eV3tF3tyykK76-FWJ8b_fc0C633gefdwKzyFpQdYhr8-4AVQbmpeF_UdQ7BRT1-De0GVGtzYhukr1MqdZbf9e03UpMRVDi5w-2egdM6XUVMZ6ilBwZrWzS5LxKBlOnKZxgrOMWOGAh0Vv-iL0eMikUoybUOhUGhkExg-NELKvrIwbUDxikba7iEhIw7nPdQrG8CPSzvIMjgkVoKXPPKlToQUgtzoIlF3kNgw0gWFwQjo4LIv3ujTGohmR079vX5HdSRJPF9Pb2f0Z2cNpqk0w56RdrEq4sPpeyMtqWj8BNY6nYw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+International+Conference+on+Advanced+Communication+Technologies+and+Networking+%28CommNet%29&rft.atitle=Secrecy+outage+probability+in+cognitive+radio+networks+subject+to+Rayleigh+fading+channels&rft.au=Bouabdellah%2C+Mounia&rft.au=El+Bouanani%2C+Faissal&rft.au=Ben-azza%2C+Hussain&rft.date=2018-04-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FCOMMNET.2018.8360281&rft.externalDocID=8360281 |