JOURNAL ARTICLE

Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers

Zhihui ShangTao ZhangYueming CaiWeiwei YangHao WuYu ZhangLiwei Tao

Year: 2020 Journal:   Applied Sciences Vol: 10 (5)Pages: 1840-1840   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while the malicious eavesdropper (Eve) is used to eavesdrop the confidential information from Alice and Relay. To improve security, we design two transmission schemes, namely maximal-ratio combining/maximal-ratio transmission-selection combining (MRC/MRT-SC) with half-duplex (HD) receiver and maximal-ratio combining-zero forcing beamforming/maximal-ratio transmission-selection combining-zero forcing beamforming (MRC-ZFB/MRT-SC-ZFB) with full-duplex (FD) receiver. To evaluate the secrecy performance obtained from the proposed schemes comprehensively, the new closed-form and simple asymptotic expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) of our considered networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes are derived, respectively. Thus, we explore the effect of various schemes on system secrecy performance in terms of SOP and ST. Analytical results and numerical simulations demonstrate that MRC-ZFB/MRT-SC-ZFB achieves better performance in the two proposed schemes. In particular, we show that the FD receiver plays a crucial role in designing the cognitive wiretap networks for protecting the legitimate link against attack from the malicious eavesdropping.

Keywords:
Computer science Eavesdropping Beamforming Maximal-ratio combining Relay Secure transmission Transmitter Computer network Secrecy Transmission (telecommunications) Topology (electrical circuits) Telecommunications Computer security Electrical engineering Engineering Fading Physics Channel (broadcasting)

Metrics

5
Cited By
0.39
FWCI (Field Weighted Citation Impact)
46
Refs
0.60
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Cognitive Radio Networks and Spectrum Sensing
Physical Sciences →  Computer Science →  Computer Networks and Communications
Cooperative Communication and Network Coding
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Secure Transmission in Wireless Powered Communication Networks with Full-Duplex Receivers

Qun LiDing Xu

Journal:   IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences Year: 2019 Vol: E102.A (5)Pages: 750-754
JOURNAL ARTICLE

Secure Transmission in Cognitive Relaying Networks with Full-Duplex Technique

Zhihui ShangTao ZhangXiaohua WangWeiwei YangLiwei TaoRuiqian Ma

Journal:   2020 IEEE 3rd International Conference on Electronics Technology (ICET) Year: 2020 Pages: 688-694
© 2026 ScienceGate Book Chapters — All rights reserved.