liu.seSearch for publications in DiVA
Change search
ReferencesLink to record
Permanent link

Direct link
Secure Full-Duplex Small-Cell Networks in a Spectrum Sharing Environment
Queens University of Belfast, North Ireland, UK.
Queens University of Belfast, North Ireland, UK.
Linköping University, Faculty of Science & Engineering. Queens University of Belfast, North Ireland, UK.
Queens University of Belfast, North Ireland, UK.
Show others and affiliations
2016 (English)In: IEEE Access, E-ISSN 2169-3536, IEEE Access, ISSN 2169-3536, Vol. 4, 3087-3099 p.Article in journal (Refereed) PublishedText
Abstract [en]

In this paper, we propose three relay selection schemes for full-duplex heterogeneous networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the cognitive small-cell nodes (secondary network) can share the spectrum licensed to the macro-cell system (primary network) on the condition that the quality-of-service of the primary network is always satisfied subjected to its outage probability constraint. The messages are delivered from one small-cell base station to the destination with the help of full-duplex small-cell base stations, which act as relay nodes. Based on the availability of the networks channel state information at the secondary information source, three different selection criteria for full-duplex relays, namely: 1) partial relay selection; 2) optimal relay selection; and 3) minimal self-interference relay selection, are proposed. We derive the exact closed-form and asymptotic expressions of the secrecy outage probability for the three criteria under the attack of non-colluding/colluding eavesdroppers. We demonstrate that the optimal relay selection scheme outperforms the partial relay selection and minimal self-interference relay selection schemes at the expense of acquiring full channel state information knowledge. In addition, increasing the number of the full-duplex small-cell base stations can improve the security performance. At the illegitimate side, deploying colluding eavesdroppers and increasing the number of eavesdroppers put the confidential information at a greater risk. Besides, the transmit power and the desire outage probability of the primary network have great influences on the secrecy outage probability of the secondary network.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC , 2016. Vol. 4, 3087-3099 p.
Keyword [en]
Physical layer security; cognitive radio networks; full-duplex; decode-and-forward; relay selection; colluding eavesdroppers
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:liu:diva-130672DOI: 10.1109/ACCESS.2016.2582486ISI: 000380131000016OAI: oai:DiVA.org:liu-130672DiVA: diva2:954145
Note

Funding Agencies|Newton Institutional Link [172719890]; Newton Research Collaboration Program [NRCP1516/1/131]; Royal Society-SERB Newton International Fellowship [NF151345]; U.K. Royal Academy of Engineering Research Fellowship [RF1415/14/22]; Swedish Research Council; Excellence Center at Linkoping-Lund on Information Technology

Available from: 2016-08-20 Created: 2016-08-19 Last updated: 2016-08-24

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Quoc Ngo, Hien
By organisation
Faculty of Science & Engineering
In the same journal
IEEE Access
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 31 hits
ReferencesLink to record
Permanent link

Direct link