Secure Communications in Underlay Cognitive Radio Networks: User Scheduling and Performance Analysis

Long Yang, Hai Jiang, Sergiy A. Vorobyov, Jian Chen, Hailin Zhang

Research output: Contribution to journalArticleScientificpeer-review

16 Citations (Scopus)

Abstract

This letter investigates secure communications against eavesdropping in an underlay cognitive radio network. The secondary users do not know the interference level that they receive from the primary transmitter, and thus, secondary transmissions may experience outages. We consider an outage probability threshold for secondary transmissions, and propose secondary user scheduling schemes for downlink and uplink, targeting at maximizing the achievable secrecy rate. We derive closed-form secrecy outage probability and show that the proposed user scheduling schemes can achieve full secrecy diversity.

Original languageEnglish
Article number7445200
Pages (from-to)1191-1194
Number of pages4
JournalIEEE Communications Letters
Volume20
Issue number6
DOIs
Publication statusPublished - 1 Jun 2016
MoE publication typeA1 Journal article-refereed

Keywords

  • cognitive radio
  • outage
  • physical-layer security

Fingerprint Dive into the research topics of 'Secure Communications in Underlay Cognitive Radio Networks: User Scheduling and Performance Analysis'. Together they form a unique fingerprint.

  • Cite this