IEEE Access (Jan 2021)

Secrecy Performance of SIMO Underlay Cognitive Radio Networks Over α – μ Fading Channels

  • Suneel Yadav,
  • Devendra Singh Gurjar

DOI
https://doi.org/10.1109/ACCESS.2021.3074507
Journal volume & issue
Vol. 9
pp. 62616 – 62629

Abstract

Read online

This paper investigates the secrecy performance of a single-input multiple-output (SIMO) based underlay cognitive radio networks. In particular, a single-antenna secondary transmitter transmits its secret message to a multi-antenna equipped secondary node in the presence of a multi-antenna equipped passive eavesdropper under a peak interference constraint at the single-antenna primary receiver. We proficiently derive the expressions for secrecy outage probability (SOP), intercept probability, and ergodic secrecy capacity (ESC) for the considered system over $\alpha -\mu $ fading channels. Further, we carry out the asymptotic analysis of SOP and intercept probability under two cases of interest; 1) when the average signal-to-noise ratio (SNR) of the main link, i.e., between the secondary source and secondary destination, goes to infinity with a fixed average SNR of wiretap link between the secondary source and secondary eavesdropper, and 2) when the SNRs of both the main and wiretap links tend to infinity. We can infer that a secrecy diversity order of $\frac {\alpha _{D}N_{D}\mu _{D}}{2}$ can be achieved under case 1, where $\alpha _{D}$ and $\mu _{D}$ are the main link fading parameters, and $N_{D}$ denotes the number of antennas at the destination. Whereas, under case 2, the system’s secrecy diversity order becomes zero. Moreover, we also present some interesting findings for the ESC when the interference constrained secondary transmitter power is considerably high. Further, we validate our analytical framework through extensive simulation and numerical results, and demonstrate the effects of system/channel parameters on the secrecy performance of the considered system. Our results reveal that the higher number of eavesdropper antennas can have a more deleterious impact on the system’s secrecy performance.

Keywords