Abstract

Cognitive radio networks (CRNs) allow coexistence of unlicensed users (UUs) and licensed users (LUs) and hence, mutual interference between UUs and LUs is neither ignored nor considered as Gaussian-distributed quantity. Additionally, exploiting jamming signals to purposely interfere with signal reception of eavesdroppers is a feasible solution to improve security performance of CRNs. This paper analyzes reliability-security trade-off, which accounts for maximum transmit power constraint, interference power constraint, jamming signal, and Rayleigh fading, and considers interference from LUs as non-Gaussian-distributed quantity. Toward this end, exact closed-form expressions of successful detection probability and successful eavesdropping probability, from which reliability-security trade-off is straightforwardly visible, are first suggested and then validated by Monte-Carlo simulations. Various results demonstrate that interference from LUs considerably decreases both probabilities while jamming signal enlarges the difference between them, emphasizing its effectiveness in improving security performance.

1. Introduction

High data rate and strong information security are two among obligatory requirements in designing next generation wireless communication networks (e.g., 5G) [1]. The former can be achieved by cognitive radio technique whose advantage is high spectrum utilization efficiency by permitting both UUs and LUs to operate in the same frequency band primarily allocated to LUs [2]. It is coexistence of both UUs and LUs that causes mutual interference between them [3] and hence, interference from LUs (shortly, licensed interference) is neither ignored nor considered as Gaussian-distributed quantity. On the other hand, physical layer security, which exploits space-time characteristics of wireless channels to secure information transmission, is a feasible solution to satisfy the latter [48]. Therefore, physical layer security for CRNs, which can meet simultaneously both above requirements, has recently received a great deal of attention from both academia and industry. Among physical layer security solutions, generating jamming signals, which purposely destroys signal reception of eavesdroppers without degrading quality of service (QoS) of legal receivers, is an effective solution to improve security performance [9, 10]. For a certain physical layer security solution, it is interesting to assess successful detection probability at legal receiver (i.e., probability for legal receiver to successfully restore legitimate signals) and successful eavesdropping probability at eavesdropper (i.e., probability for eavesdropper to successfully decode/steal legitimate signals). Obviously, successful detection probability represents communication reliability while successful eavesdropping probability represents security level. Therefore, reliability-security trade-off is represented by relation between successful detection probability and successful eavesdropping probability. Because the difference (or ratio) between successful detection probability and successful eavesdropping probability has an equivalent physical meanings as the difference (or ratio) between signal power and noise power in communication theory, this difference (or ratio) can represent security performance. This paper analyzes reliability-security trade-off to assess information securing capability of CRNs under both interferences from licensed transmitter and jammer.

1.1. Related Works

This subsection reviews only publications relevant to jamming signal generation to guarantee information transmission securely in underlay CRNs (physical layer security solutions are various. For example, [11] deploys a friendly jammer to interfere with the eavesdropper; [12] proposes a relay selection scheme; [13] implements the joint power control in wiretap interference channels. However, most solutions are proposed for noncognitive radio networks (e.g., [1113]). Because this paper focuses on jamming signal generation to guarantee information transmission securely in underlay CRNs, literature review on physical layer security solutions for noncognitive radio networks (e.g., [1113]) should not be further investigated). Such a review is based on typical characteristics such as interference from licensed transmitter, maximum transmit power constraint, interference power constraint, thermal noise, and reliability-security trade-off analysis, and through it, contributions of this paper can be summarized in next subsection.

In [14], an unlicensed source transmits a jamming signal to secure information transmission of LUs in exchange for utilizing licensed spectrum in presence of interference from licensed transmitters. However, [14] does not account for power constraints of unlicensed transmitters such as interference power constraint and maximum transmit power constraint [15, 16]. In [17], cooperative relaying combines jamming signal generation to guarantee information transmission of LUs securely in cognitive two-way networks where one of two UUs sends both jamming signal and legitimate signal while the other UU merely amplifies and forwards the received signal together with its own signal. Optimum power allocation to jamming signal and legitimate signal is proposed there without being subjected to interference power constraint even though both jamming signal and interference from LUs and maximum transmit power constraint are accounted. In [1821], beamforming vectors for jamming signal and legitimate signal are designed to optimize power allocation to jamming signal and legitimate signal at an unlicensed transmitter subject to maximum transmit power constraint and interference power constraint. Nevertheless, interference from licensed transmitter is not considered there. In [22], a UU transmits both jamming signal and legitimate signal under a simple context, which ignores maximum transmit power constraint and interference from licensed transmitter, to optimize the secrecy throughput of the wiretap channel for CRNs. The same optimization problem as [22] is revisited in [23]. However, [23] considers a different context where interference from licensed transmitter, the connection outage constraint (i.e., the probability for signal-to-interference-plus-noise ratio (SINR) at licensed receiver below a preset level is less than a certain value), and no thermal noise at corresponding receivers, and all randomly located users are investigated. It is noted that the connection outage constraint makes transmit power of UUs unchanged. Therefore, the connection outage constraint together with ignored thermal noise considerably simplifies information securing capability analysis in [23]. The authors in [24] design a beamforming vector at the multiantenna unlicensed source to maximize the minimum secrecy rate of the unlicensed network while guaranteeing the minimum secrecy rate of the licensed network and satisfying maximum transmit power constraint for cognitive multicast communications. Besides beamforming the legitimate signals, the source transmits the jamming signal together with them to further secure information transmission. However, [24] ignores interference power constraint. Table 1 summarizes typical characteristics considered in [14, 1724] with an emphasis that reliability-security trade-off analysis is not implemented there.

In contrast to [14, 1724] where jamming signal and legitimate signal are merged and concurrently broadcasted by an unlicensed transmitter, [2532] suggest new techniques to prevent eavesdroppers from stealing confidential information in CRNs where jamming signal and legitimate signal are transmitted by two different users. To be more specific, jamming signal and legitimate signal are separately transmitted by two different UUs to guarantee LUs’ communication securely while maintaining QoS of UUs [25]. Nevertheless, [25] neglects interference from licensed transmitter and interference power constraint. The authors in [26] complement the idea in [25] by further considering interference power constraint. Similar to [25, 26] where jamming signal and legitimate signal are transmitted by different UUs, [27] proposes design of a weight vector for jamming signals forwarded by different relays to achieve maximum signal-to-noise ratio (SNR) at legal receiver while restricting SNR at the eavesdropper below a certain level in a context where both interference power constraint and maximum transmit power constraint are accounted. However, [27] ignores interference from licensed transmitter. The authors in [28] complement the work in [27] by accounting for this interference to maximize the secrecy rate. Instead of designing a weight vector for jamming signals forwarded by different relays, each equipped with single antenna as in [27, 28], the authors in [29] implement design of a beamforming vector at a single multiantenna relay. Therefore, [2729] solve quite similar problems. Furthermore, interference from licensed transmitter is ignored in [29]. In [30], a UU is selected to transmit merely jamming signals not only to deteriorate QoS of the eavesdropper but also to assist secrete communication of another UU. However, power constraints and interference from licensed transmitter are neglected there, which are not reasonable for CRNs where UUs and LUs concurrently operate. For secure transmission of an unlicensed source, [31] adopts two unlicensed relays while [32] chooses an unlicensed relay and an unlicensed destination. However, [31, 32] neglect interference from LUs. Furthermore, [31] does not investigate maximum transmit power constraint. Table 2 summarizes typical characteristics considered in [2532] with an emphasis that reliability-security trade-off analysis is not implemented there.

1.2. Contributions

The above literature survey [14, 1732] shows that reliability-security trade-off analysis of CRNs, where legitimate signal and jamming signal are simultaneously transmitted by two different unlicensed transmitters, under interference from licensed transmitter, maximum transmit power constraint, interference power constraint, and thermal noise, has not been reported in any open literature. We aim to perform this analysis with threefold contributions:(i)Investigate a physical layer security solution for CRNs where an unlicensed jammer transmits a jamming signal at the same time that an unlicensed transmitter sends its confidential signal to purposely interfere with signal reception of the eavesdropper without degrading the performance of the legal receiver under maximum transmit power constraint, interference power constraint, interference from licensed transmitter, and thermal noise.(ii)Propose exact closed-form expressions of successful detection probability and successful eavesdropping probability, from which reliability-security trade-off is straightforwardly visible for promptly evaluating security performance without the need of time-consuming Monte-Carlo simulations.(iii)Illustrate various results to have useful insights into security performance of underlay cognitive networks such as interference from licensed transmitter adversely decreases successful detection probability and successful eavesdropping probability while jamming signal offers a large difference between them, exposing its effectiveness in securing confidential information.

1.3. Organization

The paper is organized as follows. System model under consideration is described in Section 2. The analysis of successful detection probability and successful eavesdropping probability is presented in Section 3. Numerous results for evaluation and validation of the proposed analysis are presented in Section 4. The paper is concluded in Section 5.

2. System Model

Figure 1 demonstrates a system model for cognitive radio networks under investigation where an unlicensed source transmits confidential information to an unlicensed destination (namely, legal receiver) and this transmission is illegally wire-tapped by an eavesdropper . Unlicensed users operate in the underlay paradigm [33] and hence, communication between and concurrently takes place with communication between a licensed transmitter and a licensed receiver , inducing mutual interference to each other. All terminals are assumed to be equipped with single antenna and operated in the half-duplex mode. In order to secure communication between and , an unlicensed jammer transmits a jamming signal at the same time that transmits a legitimate signal to purposely interfere with signal reception of where and are transmit powers of and , respectively; and are correspondingly a jamming signal and a legitimate signal which are assumed to be Gaussian-distributed and have unity power (i.e., and where stands for a circular symmetric complex Gaussian random variable (CSCGRV) with zero mean and variance ). Thus, received signals at and are correspondingly represented aswhere is power of the licensed transmitter ; is the signal transmitted by and is normalized to have unity power and Gaussian-distributed (i.e., ); and are additive white Gaussian noise at and , correspondingly, each modelled as ; stands for a channel coefficient between a transmitter and a receiver , which is assumed to be independent, frequency flat, and Rayleigh distributed and hence, is modelled as a CSCGRV with zero mean and variance , that is, , , and .

Since the transmit power of is , is the interference power caused by to . Similarly, is the interference power caused by to . Therefore, the total interference power induced by and to is . To guarantee reliable signal reception at LUs, this interference power must be controlled below maximum interference power that licensed receivers can tolerate, that is, . In addition, each licensed transmitter is designed with a certain maximum transmit power (i.e., for and for ) and hence, and are limited by and , that is, and . Briefly, the transmit powers of and are subjected to the following constraints:where (3) and (4) are maximum transmit power constraints while (5) is interference power constraint.

From (5), one can selectwhere is an interference power distribution factor for and . means no jammer. can be optimally selected not only to control interference to but also to increase interference to .

Combining maximum transmit power constraint in (3) and interference power constraint in (6), transmit power of   must satisfy . For maximum radio coverage, the equality should hold, that is,

Similarly, to meet both maximum transmit power constraint in (4) and interference power constraint in (7) as well as maximize radio coverage, transmit power of is established as

The jamming signal is intentionally generated by to only cause interference to without inducing performance degradation of . This can be achieved by allowing to share with (e.g., the seed of the jamming signal generator at is shared with in a secure manner through a cooperation agreement only between and before information transmission starts). Such a jamming signal generation is widely accepted in open literature (e.g., [5, 8, 1922, 25, 3032] and references therein). As such, the legal receiver can accurately predict the jamming signal and completely eliminate it out of ’s received signal, ultimately resulting in the jamming-free signal as . Based on the jamming-free signal, one can infer SINR at aswhere denotes the expectation operation over random variables .

Because the knowledge of the jamming signal is only shared between and for information securing purpose, the eavesdropper does not know it. Therefore, the SINR at is inferred from (2) as

It is worth mentioning that the licensed transmitter introduces interference powers at and as and , respectively, according to (10) and (11). These interference powers are neither ignored nor considered as Gaussian-distributed quantity but rather treated as exponentially distributed random variables. Additionally, deliberately generates jamming power to the eavesdropper. As such, increasing this jamming power is expected to secure information transmission of .

Channel capacities at and are, respectively, given by [34]which are helpful in analyzing successful detection probability of the legal receiver and successful eavesdropping probability of the eavesdropper in next section.

3. Performance Analysis

This section analyzes successful detection probability of the legal receiver , , and successful eavesdropping probability of the eavesdropper , . According to information theory, and are correspondingly defined as probabilities for channel capacities of and to be larger than a required level. In other words, successful detection probability of and successful eavesdropping probability of are probabilities for and to successfully decode ’s information, respectively. As such, they are important metrics for evaluating communication reliability and information securing capability. The larger , the more reliable the signal reception at . Meanwhile, the larger , the less secure the information transmission of . Therefore, the relation between and represents reliability-security trade-off. Furthermore, the difference (or ratio) between successful detection probability and successful eavesdropping probability has an equivalent physical meanings as the difference (or ratio) between signal power and noise power in communication theory and hence, this difference (or ratio) can represent security performance.

The successful detection probability of and the successful eavesdropping probability of are respectively expressed aswhere is the threshold for successfully decoding ’s information, , and is the probability of the event .

Theorem 1. The exact closed-form representation of the successful detection probability of the legal receiver is given bywhere is the exponential integral function [35].

Proof. Please see Appendix A.

Before deriving the exact closed-form expression of the successful eavesdropping probability of , we introduce two special results in the following lemmas.

Lemma 2. The integrandcan be represented in closed form aswhere

Proof. Please see Appendix B.

Lemma 3. The integrandcan be represented in closed form aswhereand is the Euler-Mascheroni constant and is the Whittaker function [35, eq. ].

Proof. Please see Appendix C.

Using the results in Lemmas 2 and 3, one can represent the successful eavesdropping probability of in closed form as follows.

Theorem 4. The successful eavesdropping probability of the eavesdropper has an exact closed form as

Proof. Please see Appendix D.

It is worth mentioning that although the exact closed-form expressions of the successful detection probability of and the successful eavesdropping probability of in (15) and (30), respectively, are relatively long, they are simply computed since they encompass simple built-in functions such as the Whittaker function and the exponential integral function. Therefore, (15) and (30) are helpful in quickly assessing the trade-off between the communication reliability and the information security in underlay CRNs under interference from licensed transmitter, jamming signal, maximum transmit power constraint, and interference power constraint, without exhaustive Monte-Carlo simulations.

4. Results and Discussion

This section provides numerous results to illustrate the trade-off between the communication reliability and the information security in CRNs under interference from licensed transmitter and jamming signal. Theoretical results are obtained from analytical expressions in (15) and (30) while simulation results are generated from Monte-Carlo simulations with channel realizations. The coordinates of , , , , and are arbitrarily chosen as , , , , and , correspondingly, for illustration purpose while is on the straight line connecting and ; that is, the coordinate of is where . Additionally, the fading power for the channel is modelled as according to [36] where is the path-loss exponent and is the distance between the transmitter and the receiver . To limit case-studies, , and equal maximum transmit powers of unlicensed users (i.e., ) are investigated throughout this paper.

Figure 2 illustrates the trade-off between the communication reliability and the information security in CRNs with respect to the maximum interference power-to-noise power ratio for the maximum transmit power-to-noise power ratio dB, the required channel capacity  bits/s/Hz, different interference levels from licensed transmitter (dB), the interference power distribution factor , and . It is observed that the analysis accurately matches the simulation, confirming the validity of (15) and (30). Additionally, both the successful detection probability and the successful eavesdropping probability are proportional to . This is due to the fact that upper-bounds the power of unlicensed transmitters according to and and hence, the increase in raises the transmit power, ultimately increasing and according to (10) and (11). In other words, the probabilities for and to be greater than a threshold increase proportionally to . The fact that both and are proportional to shows that the communication reliability (i.e., ) trades off the security capability (i.e., ). Moreover, interference from licensed transmitter decreases SINRs at both and and hence, the decrease in SINRs at and drastically reduces the successful detection probability and the successful eavesdropping probability. However, the successful detection probability is significantly larger than the successful eavesdropping probability. This signifies that the probability for the legal receiver to successfully recover the source information is larger than the probability for the illegal receiver to do so, creating high security performance.

In the same context as Figure 2 except dB, Figure 3 demonstrates the trade-off between the communication reliability and the information security in CRNs with respect to the change of . It is seen that the simulation and the analysis are in excellent agreement. This again validates the accuracy of (15) and (30). Additionally, same remarks as Figure 2 can be withdrawn such as the increase in the successful detection probability and the successful eavesdropping probability with respect to the increase in , the degradation of the successful detection probability and the successful eavesdropping probability with respect to the increase in interference level from licensed transmitter, and the superiority of the successful detection probability to the successful eavesdropping probability which indicates a high information securing capability.

Figure 4 shows the trade-off between the communication reliability and the information security in CRNs with respect to the required channel capacity for , dB, dB, , and different interference levels from licensed transmitter (dB). It is observed that the analysis coincides with the simulation, confirming the validity of (15) and (30). Moreover, interference from licensed transmitter (i.e., increases) dramatically reduces the successful detection probability and the successful eavesdropping probability. Furthermore, higher required channel capacity lowers these probabilities. This is reasonable because, given operation parameters, channel capacities at and are only achieved at a certain level and hence, more stringent channel capacity requirement reduces the successful detection probability and the successful eavesdropping probability. Nevertheless, the successful detection probability outperforms the successful eavesdropping probability, indicating high security performance.

Figure 5 illustrates the trade-off between the communication reliability and the information security in CRNs with respect to the jammer’s position (i.e., ) for dB,  bits/s/Hz, , and different interference levels from licensed transmitter (dB). It is observed that the simulation accurately matches the analysis, validating (15) and (30). Additionally, interference from licensed transmitter (i.e., increases) significantly decreases the successful detection probability and the successful eavesdropping probability. Moreover, the successful detection probability is independent of the jammer’s position. This is because the jamming signal is to purposely harm the signal reception of without degrading the performance of . However, the successful eavesdropping probability is severely dependent on the jammer’s position. More specifically, because the jammer is located at , when the jammer moves toward the eavesdropper (i.e., increases from to ), the successful eavesdropping probability drops abruptly due to the increase in the receive power of the jamming signal at . This enlarges the difference between the successful detection probability and the successful eavesdropping probability, securing information transmission of and emphasizing the role of the jammer in improving security performance. Furthermore, when the jammer moves away from the eavesdropper (i.e., increases from to ), the successful eavesdropping probability increases significantly owing to the decrease in the receive power of the jamming signal at , reducing security performance. For all the jammer’s position under consideration in Figure 5, the difference between the successful detection probability and the successful eavesdropping probability is very large, indicating high security performance.

Figure 6 demonstrates the trade-off between the communication reliability and the information security in CRNs with respect to the interference power distribution factor (i.e., ) for dB, dB, bits/s/Hz, , and different interference levels from licensed transmitter (dB). It is seen that the simulation and the analysis are in a perfect agreement, validating (15) and (30). Moreover, interference from licensed transmitter (i.e., increases) considerably reduces the successful detection probability and the successful eavesdropping probability. Furthermore, the successful detection probability (or the successful eavesdropping probability) slowly (or quickly) increases with the increase of , making the difference between them inversely proportional to . The large difference between them represents the dominance of the successful detection probability to the successful eavesdropping probability (equivalently, high security capability). Therefore, Figure 6 shows that small values of are good for information security.

5. Conclusions

The successful detection probability and the successful eavesdropping probability in underlay cognitive networks are analyzed in this paper under interferences from licensed transmitter and jammer, the maximum transmit power constraint, the interference power constraint, and Rayleigh fading to assess the communication reliability and the information security of CRNs without exhaustive simulations. Exact closed-form expressions of the successful detection probability and the successful eavesdropping probability are derived and verified by Monte-Carlo simulations. Numerous results illustrate that interference from licensed transmitter considerably reduces both probabilities while interference from the jammer makes the successful detection probability significantly larger than the successful eavesdropping probability, demonstrating the jammer’s efficacy in enhancing security performance.

Appendix

A. Proof of Theorem 1

Because , is a random variable. Hence, (13) can be computed indirectly through conditional probability aswhere can be computed by inserting the explicit form of in (10) into (A.1) and after some manipulations, one obtains

Because , is exponentially distributed with mean of ; that is, and the probability density function (PDF) of is , . Based on this result, (A.2) is further simplified as

Plugging into (A.3) and then averaging over , one can rewrite (A.1) as

By dividing into two cases, (A.4) is further simplified aswhere

Inserting (A.6) into (A.5), it is apparent that (A.5) exactly becomes (15), completing the proof.

B. Proof of Lemma 2

Performing the integral by part on (16), one obtains

By denotingit is straightforward to express the integrand in (B.2) in terms of the function as (18). Given the function in (B.2), one can express (B.1) as (17), completing the proof.

C. Proof of Lemma 3

Performing the variable change and then applying the series representation of in [35, eq. ] to (19) result in

By denotingit is apparent that (C.1) perfectly matches (20). Therefore, the proof is completed after representing integrands in (C.2), (C.3), and (C.4) as (21), (22), and (28), correspondingly.

Start with . Performing the variable change, one can rewrite as

Using (B.2), one can express (C.5) as (21).

Performing the variable change and then applying the series representation of in [35, eq. ], one can simplify as

Applying the binomial expansion in [35, eq. ] to of (C.6), one obtainswhere the notation is the binomial coefficient.

Again perform the variable change and then apply the binomial expansion to simplify (C.7) as

By denotingit is apparent that (C.8) perfectly matches (22). Hence, we must prove that the integrand in (C.9) can be represented as (23) to complete the proof of (22). Toward this end, we divide the problem into two cases: (Case ) and (Case ). For Case , is rewritten as , which becomes as shown in (23). For Case , we denote . Combining two cases shows that (C.9) coincides with (23). Therefore, the remaining work is to prove that is given by (24).

Applying the partial fraction decomposition, can be simplified aswhere and are defined in (25) and (26), respectively.

By denotingand noting that the first integrand of (C.10) can be represented in terms of the function in (B.2), it is obvious that (C.10) becomes (24). The function can be represented as (27) by firstly performing the variable change and then using [35, eq. ].

Finally, we process . By performing the variable change and applying the binomial expansion, (C.4) is simplified as

By denotingwhose exact closed form is given by (29) with the aid of [35, eq. ], it is apparent that the first integral in (C.12) is and the second integral in (C.12) is . As such, (C.12) exactly matches (28), completing the proof.

D. Proof of Theorem 4

Plugging (11) into (14) and after some simplification, one obtainswhere

Applying the definition of the expectation, one obtains the closed form of as

Following the derivation of , one can also infer

Inserting (D.3) and (D.4) into (D.1), one can simplify (D.1) aswhere

By plugging (9) into (D.6), one can decompose aswhere

By substituting (D.8) into (D.7) and then plugging the result together with (8) into (D.5), one can partition into two terms aswhere

Plugging into (D.10) and after some simplification, one obtains the exact closed-form representation of as

Substituting into (D.11) and performing the partial fraction decomposition, one can simplify (D.11) as

Representing the integrals in (D.13) in terms of in (17), in (18), and in (20), one obtains the exact closed-form expression of as

Inserting (D.12) and (D.14) into (D.9) results in (30), completing the proof.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2017.01.