Tampere University of Technology

TUTCRIS Research Portal

Physical layer security for dual-hop SWIPT-enabled CR networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Details

Original languageEnglish
Title of host publicationISWCS 2019 - 16th International Symposium on Wireless Communication Systems
PublisherVDE Verlag GmbH
Pages629-634
Number of pages6
ISBN (Electronic)9781728125275
DOIs
Publication statusPublished - Aug 2019
Publication typeA4 Article in a conference publication
EventInternational Symposium on Wireless Communication Systems - University of Oulu, Oulu, Finland
Duration: 27 Aug 201930 Aug 2019
Conference number: 16
http://iswcs2019.org

Publication series

NameProceedings of the International Symposium on Wireless Communication Systems
Volume2019-August
ISSN (Print)2154-0217
ISSN (Electronic)2154-0225

Conference

ConferenceInternational Symposium on Wireless Communication Systems
Abbreviated titleISWCS
CountryFinland
CityOulu
Period27/08/1930/08/19
Internet address

Abstract

We investigate the physical layer security of a relayassisted underlay cognitive radio network with simultaneous wireless information and power transfer (SWIPT). To this end, we consider a secondary network comprising a secondary source S, one secondary user (SU) relay R, one SU destination D, one primary user (PU) transmitter, and one PU receiver. In addition, we consider an eavesdropper E which can overhear both communications of the S→R and R→D links whereas power constraints are imposed on the secondary network in order to maintain a tolerable interference level at the primary network. Under these constraints, we derive a closed-form expression for the secrecy outage probability assuming uncorrelated Rayleigh fading channels. Numerical and simulation results are presented to corroborate the corresponding analysis. It is shown that the harvested energy, energy conversion efficiency, and maximum tolerable interference level imposed on the primary receiver impact considerably the overall system's security.