期刊论文详细信息
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming
Nguyen Nhat1  Nguyen Binh1  Le Khan1  Tran Duy1 
[1] Posts and Telecommunications Institute of Technology, HoChiMinh City, Vietnam;
关键词: fountain codes;    underlay cognitive radio networks;    physical-layer security;    cooperative jamming;    intercept probability;   
DOI  :  10.4108/eai.26-1-2021.168229
来源: DOAJ
【 摘 要 】

This paper evaluates intercept probability (IP) of a cooperative cognitive radio network. Using Fountain codes, a secondary source continuously generates encoded packets, and sends them to secondary destination and relaynodesthatattempttoreceiveasufficientnumberoftheencodedpacketsforrecoveringthesource data. If the relay can sufficiently collect the packets before the destination, it replaces the source to transmit the encoded packets to the destination. Also in the secondary network, a passive eavesdropper attempts to illegally receive the packets sent by the source and relay nodes, and if it can accumulate enough encoded packets, the source data is intercepted. To enhance secrecy performance, in terms of IP, a cooperative jammer is used to transmit noises on the eavesdropper. We also propose a simple transmit power allocation method for the secondary transmitters such as source, relay and jammer so that outage performance of a primary network is not harmful. We derive an exact closed-form expression of IP over Rayleigh fading channel, and verify it by performing Monte-Carlo simulations.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次