JOURNAL ARTICLE

Secrecy Outage Performance with EH and TAS for Realistic Underlay Cognitive Radio Networks Using MIMO Systems

Abstract

This work studies the physical layer security performance for Multiple Input Multiple Output (MIMO) secondary nodes. The proposed model is assumed to operate in underlay Cognitive Radio Network (CRN) that contains a primary node of a single antenna with the presence of an active eavesdropper. Furthermore, Transmit Antenna Selection (TAS) scheme is applied at the secondary transmitter side which also has a suitable battery to charge the energy collected from the Radio Frequency (RF) signals broadcasted from the primary transmitter to enhance collaboratively the power and spectral efficiencies. The security performance for the secondary system is achieved where the exact closed-form phrase is derived over Nakagami-m fading channels. The mathematical results show that the security performance can be improved by increasing the number of the antennas at the source and/or the destination or by decreasing the number of the antennas at the eavesdropper. The same target can be achieved by increasing the transmit power at the source, or improving the quality of the main channel. Greater harvested energy can be obtained at the secondary transmitter by selecting proper time slot that is dedicated for energy harvesting which further improved the security performance.

Keywords:
Cognitive radio Transmitter Underlay MIMO Computer science Nakagami distribution Secondary source Transmitter power output Computer network Antenna (radio) Electronic engineering Node (physics) Energy harvesting Physical layer 3G MIMO Fading Channel (broadcasting) Wireless Energy (signal processing) Telecommunications Signal-to-noise ratio (imaging) Engineering Mathematics

Metrics

3
Cited By
0.28
FWCI (Field Weighted Citation Impact)
23
Refs
0.56
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Energy Harvesting in Wireless Networks
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Full-Duplex Wireless Communications
Physical Sciences →  Engineering →  Electrical and Electronic Engineering

Related Documents

JOURNAL ARTICLE

Secrecy outage analysis on underlay cognitive radio using selection combining

Youyu TanGaofeng PanHui Zhao

Journal:   The Journal of China Universities of Posts and Telecommunications Year: 2016 Vol: 23 (3)Pages: 51-56
JOURNAL ARTICLE

Secrecy outage analysis for underlay cognitive radio networks over correlated channels

Jiliang ZhangHui ZhaoGaofeng Pan

Journal:   Science China Information Sciences Year: 2016 Vol: 60 (2)
JOURNAL ARTICLE

Secrecy Performance of Underlay Cognitive Radio Networks With Primary Interference

Shilpa ThakurAjay Singh

Journal:   IEEE Transactions on Network Science and Engineering Year: 2022 Vol: 9 (4)Pages: 2641-2657
© 2026 ScienceGate Book Chapters — All rights reserved.