Abstract

In recent years, the access of massive communication devices leads to the insufficient spectrum resources of wireless networks. One of the practical means to resolve the problem is to build cognitive radio networks (CRNs), which can realize the sharing of spectrum resources between primary and secondary users, thereby improving the utilization rate of wireless spectrum resources. To this end, the CRNs are utilized to establish the Wyner’s eavesdropping model over the Beaulieu-Xie fading channels. We mainly deduce the accurate expressions of secrecy outage probability and strictly positive secrecy capacity to explore the performance of physical layer security. Moreover, the better overlap between the statistical simulation and the theoretical results indicates the correctness of the theoretical analysis equation. The interesting results are that both increasing the and decreasing the can improve the security performance. This work is a good reference and guidance for modeling CRNs (Internet of Things, fifth generation, cell phone networks, etc.) and security performance evaluation.

1. Introduction

With the wide application of wireless transmission, the useful information will face the risk of disclosure in the process of transmission, so it is particularly important to find measures to avoid and reduce the eavesdropping of signals. Recently, the issue has become a research hotspot in academia. Different from traditional encryption and decryption methods, physical layer security (PLS) utilizes the characteristics of the transmission channels and noise to ensure the secure transmission of information. It was first proposed in [1] and applied to many practical communication scenarios, such as Beyond-5G low-latency communication networks [2], multihop amplify-and-forward (AF) relay systems [3], and cognitive radio networks (CRNs) [4]. Furthermore, the authors of [5] proposed a scheme combining deep learning with transmit antenna selection to enhance the PLS of cellular networks. In [6], the authors outlined some low complexity PLS schemes appropriate for the Internet of Things (IoTs). A cooperative beamforming scheme was designed in [7] to enhance the PLS in CRNs. For exploring the PLS properties of shadowed fading, Sun et al. in [8] deduced closed-form expressions for the lower bounds of strictly positive secrecy capacity (SPSC) and secure outage probability (SOP).

Radio waves are utilized to transmit information in wireless communication networks (WCNs), but the actual communication environment is complex and variable so that there is a difference between the received and the transmitted signal, which lead to the distorted transmission of information. To better evaluate the transmission performance of WCNs, it is necessary to build and analyze system models of different fading channels [916]. Zhu et al. in [9] studied the performance of a full-duplex decode-and-forward (DF) system over the Rician distribution by analyzing the exact analytical expression of the outage probability (OP). The authors in [10] proposed the fading model and derived precise expressions of level crossing rate (LCR) and average fading duration (AFD). Badarneh et al. in [11] obtained precise expressions for the average bit error rate (ABER) and average channel capacity (ACC) of dual distribution to explored the performance of selective combining receivers. In [12], the outage performance of relay-assisted vehicular communication under double-Rayleigh fading was investigated. The exact expressions of probability density function (PDF), LCR, and AFD of double Hoyt channel were derived in [13]. Ata in [14] analyzed the PLS of cascaded Rayleigh fading channels by solving the exact precise expressions of SOP. The authors of [15] studied the security performance of the DF relay system under the shadowed fading by deducing the exact accurate expressions of SOP and SPSC. In [16], the security performance of single-input multiple-output (SIMO) system under composite distribution was studied by deriving the closed expression of ACC.

The access of a large number of wireless devices will lead to a sharp shortage of spectrum resources, and the emergence of CRNs can effectively solve the problem. The CRNs improve the utilization of wireless spectrum resources mainly by using spectrum sensing technology [17] [18]. The combination of CRNs and other technologies has been extensively studied by scholars [1927]. Goldsmith et al. in [19] reviewed the basic capacity constraints of different wireless network design patterns based on cognitive radios. In [20], the performance of CRNs was discussed when there are multiple groups of cognitive radio relays. The authors of [21] proposed a new scheme for power allocation in CRNs with limited cross-layer interference. Zhang et al. in [22] investigated the effect of the relay selection scheme on the outage performance of CRNs by studying the exact expression of OP. Tashman and Hamouda in [23] analyzed the security performance of SIMO cognitive networks over distribution by deriving the closed expression of SOP. In [24], the transmission performance of SIMO underlay CRNs over generalized channels was studied. The authors in [25] explored the PLS of CRNs under cascaded Rayleigh channels. By analyzing the accurate expression of SOP, the authors of [26] studied the security performance when there are multiple master control units and eavesdroppers in the network. The optimal PLS scheme for users in underlay multiple-input multiple-output (MIMO) CRN was studied in [27].

Exact modeling based on wireless fading channels is important for simulating specific practical scenarios and analyzing their security performance. Different fading channels have their respective characteristics, so the channels can simulate different scenarios. For instance, the Nakagami- distribution can vary to control the number of clusters [28]. And the Rician distribution can simulate scenarios when line-of-sight (LOS) or deterministic components are present in the received signal [29]. Combining the advantages of the above two distributions, Beaulieu and Xie proposed a new Beaulieu-Xie (BX) fading channels [30], which can represent both specular and diffuse scattering components, that is, it can simulate both LOS and non-LOS (NLOS) scenarios [31]. Therefore, the BX fading is very suitable for modeling and researching femtocells [32] and high-speed trains [33]. The accurate formulas of the LCR and AFD for BX distribution were deduced in [34]. In [35], the closed expressions for the asymptotic upper and lower bounds of the OP and the error probability of the BX fading were deduced. The theoretical expression of the OP for two BX random variables was investigated in [36]. The authors of [37] explored precise and progressive expressions for the effective rate of MIMO networks over BX distribution. Singh and Joshi in [38] derived exact expressions for the ABER of SIMO and MIMO orthogonal frequency division multiplexing systems under BX fading.

As far as the author’s knowledge, there are no relevant literatures to study the security analysis based on CRNs under BX fading channels in the published database. Therefore, this work focuses on deriving the exact closed expressions of SOP and SPSC based on CRNs over the BX fading channels. On this basis, the PLS of CRN is analyzed emphatically. Moreover, the influences of the channel parameters and the maximum interference power on the security of the considering model are both studied. Finally, the correctness of the derivations in this paper is verified by simulation analysis.

The organization of this paper is as follows: In this section, we mainly introduced the research background, current situation and contributions. In Section 2, the system model based on the underlay CRN and the accurate expression of the PDF and cumulative distribution function (CDF) of the signal-to-noise ratio (SNR) of the BX distribution were described. Section 6 obtained the precise expression of SOP. The exact expression of SPSC was derived in Section 4. Section 5 analyzed the numerical simulation results. Section 6 summarized the paper.

2. System Model and Channel Characteristics

2.1. System Model

As shown in Figure 1. The underlay CRN model includes the primary network and the secondary network, which can share frequency band resources, but the premise is that the normal communication of the primary network is not disturbed. We assume that the primary network has one transmission source () and users. The secondary network consists of a signal transmitting source (), a target receiver (), and an eavesdropper (), and all nodes are equipped with an antenna. The channel coefficients of , , and are represented as , , and , respectively. can transmit information to , , and , and the transmitted signal at is ; then the information received at , , and can be written as where represents the transmit power of . , , and are the signals received at , , and , respectively. are represented as additive white Gaussian noise.

2.2. Statistical Properties of the BX Distribution

In this section, the expressions of the PDF and CDF for the BX distribution are given, and to make the calculation easier and more convenient, we have performed some mathematical operations on them. In [38] (eq. (3)), the PDF of the SNR for the BX channels is written as where and reflect the shape and extension, respectively, and is the average SNR. is the Bessel function [39] (eq. (8.401)).

According to the formula in [39] (eq. (8.445)) of

(4) can be rewritten as

Utilizing [39] (eq. (3.351.3)), the CDF of SNR is expressed as

3. SOP Analysis

We utilize SOP as a performance evaluation metric to explore the security. SOP is defined as the probability that the value of secrecy capacity is less than the specified threshold value [40], which can be expressed as where , , and denote the instantaneous channel capacity of link () and the link (), respectively, and represents the specified threshold. The primary and the secondary network in the underlay CRNs must satisfy the following conditions [41]: (i) The maximum transmission power () cannot be less than the transmission power of . (ii) The maximum interference power () allowed by the main network cannot be less than the power from to . Therefore, the SOP in underlay CRNs is written as where represents the instantaneous SNR of . In the next subsection, we will evaluate the closed-form expressions of and in (9).

3.1. Representation of

According to the above analysis, can be converted to where , , , and .

Using (6) and (7), can be obtained as

Utilizing an equation in [39] (eq. (1.111)), the exact analytical solution for can be represented as

Using the similar method as solving , is obtained as

3.2. Representation of

According to (9) and [42] (eq. (13)), the expressions for can be rewritten as where , .

Using (6) and (7) and an equation in [39] (eq. (3.381.4)), the exact is expressed as

where

Substituting (15) into (14) and using [39] (eq. (3.351.2)), can be represented as

where

4. SPSC Analysis

For the communication network security, SPSC is also one of the important evaluation indicators. SPSC is described as the probability that the secrecy capacity is greater than zero, which can be expressed as [40]

Substituting (6) and (7) into Equation (22), we can get the expression of as

Combined with (22) and (23), the exact accurate analytical formula of SPSC can be obtained. In (23), with the increase of , and will increase and lead to the improvement of SPSC; however, will increase and lead to the decline of SPSC.

5. Numerical Analysis

In this section, the simulation results of the inferences are given, and their correctness will be verified by statistical simulations. Furthermore, we analyze the performance through the simulation curves. We implement the random number generator of BX distribution by using the acceptance rejection method. It is worth noting that the SOP and SPSC contain infinite series; however, when the number of loops reaches more than 40 times, the derived formulas for SOP and SPSC will converge to a fixed value.

Figure 2 presents the variation of SOP under the conditions of different . In all simulations, we set , , , and . The theoretical curves overlap well with the Monte Carlo simulations. is the average SNR of the main channel, the larger means that the better transmission quality of the signal. In this situation, the SOP should be smaller. In addition, the value of SOP decreases as rises, which shows that increasing the value of can enhance the confidentiality. And by increasing the , the SOP decreases and the security is improved.

Figure 3 illustrates the change of SOP with the average SNR under different . The parameter settings are as follows: , , , , and . Figure 3 shows that as rises, SOP gradually decreases, indicating that increasing the average SNR of the main channel when the SNR of the eavesdropping channel is constant can enhance security. And with the rise of the set threshold , the security will be weakened.

Figure 4 describes the variation of SOP with the average SNR and . Its parameters are set to , , , , and . This figure depicts the effect of the parameter of the BX fading on the security, Figure 4 is based on the Equations (9), (10), (12), (13), and (20). We can see that the value of has a large transformation on the system performance at . In other words, the rise of will greatly enhance the security under the condition of high SNR.

Figure 5 plots the change of SPSC with and . The parameters are , , , , and . It can be seen that the change of has different effects on security under high and low SNR. When , the value of SPSC reduces as increases. That is, at low SNR, the increase of weakens the security. Analysis of Figures 4 and 5 shows that under high SNR, with the rise of , the value of SOP decreases rapidly, and the value of SPSC gradually increases. These conclusions collectively demonstrate that the increase of will enhance confidentiality.

Figure 6 depicts the variation of SOP with and . The remaining parameters are set as follows: , , , , and . From Figure 6, the value of SOP reduces rapidly as the rises for , which indicates that increasing can greatly enhance the security, and when , the change of has little effect on the confidentiality.

Figure 7 shows the variation of SPSC under different with the average SNR. In Figure 7 we set , , , , and . The simulation curves are drawn based on (22) and (23). Furthermore, it can be observed that at low SNR, as increases, the value of SPSC reduces, which proved that the confidentiality is weakened. When , as adds, the security of the system is improved. This is consistent with the results obtained in Figure 6.

6. Conclusion

In this paper, we investigate the PLS of the CRNs over BX fading channels. The accurate expressions of SOP and SPSC are obtained. Then the impact of the parameters for the BX fading channels which inherits the advantages of both Nakagami- and Rician fading channels on the security of the CRN is analyzed. Finally, we compared the theoretical derivation with Monte Carlo simulation; the coincidence of simulation curves proves the correctness of the theoretical formulas. And interestingly, rising , increasing , decreasing , and increasing the values of and under high SNR all promote the confidentiality.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there is no conflict of interest about the publication of this paper.

Acknowledgments

This work was supported in part by the Key Scientific Research Projects of Higher Education Institutions in Henan Province under grant 20A510007 and in part by the Doctoral Fund of Henan Polytechnic University under grant B2022-13.