Secrecy analysis of multiple‐input multiple‐output underlay cognitive radio networks with energy harvesting

Anshu Thakur,Ashok Kumar,Nitin Gupta
DOI: https://doi.org/10.1002/ett.4116
IF: 3.6
2020-09-10
Transactions on Emerging Telecommunications Technologies
Abstract:<p>The cognitive radio (CR) technique is an encouraging approach to deal with spectrum scarcity in wireless networks. However, this technique raises the issues of secrecy and privacy in the CR network. In this work, a multiple‐input multiple‐output underlay CR network is considered, which consists of a primary network, a secondary network, and an eavesdropper. All the primary, secondary as well aseavesdropper's nodes are assumed to have multiple antennas with radio frequency energy harvesters to enhance their spectral and energy efficiency properties. The eavesdropper node manipulates it's simultaneous wireless information and power transfer architecture in a pursuit to intercept the secure communication between the cognitive transmitter and the cognitive receiver. This technique and considered network are combined with the traditional selection combining (SC) and maximal ratio combining (MRC) scheme and the results are compared. The Monte Carlo simulation is done for the validation of results. The main aim is to drive the closed‐form analytical expression for exact and asymptotic secrecy outage probability. The present results show that the SC scheme at eavesdropper provides better secrecy in comparison to the MRC technique and also the number of antennas affects the secrecy of the system. Moreover, the impact of power splitter is considered and also the optimal value of power splitter is derived to maximize information decoding.</p>
telecommunications
What problem does this paper attempt to address?