“…Cognitive users (CUs), which usually operate in underlay, overlay, and interweave mechanisms, can utilize the licensed frequency band (LFB) of primary users (PUs) without harming signal reception of PUs, hence drastically enhancing spectral efficiency and reducing spectrum scarcity problem [5]. In the underlay mechanism, CUs have access permission to the LFB solely if CUs limit interference power induced at PUs under a tolerable degree.…”
Section: Introductionmentioning
confidence: 99%
“…Whilst most publications have investigated the PHY security for energy harvesting (interweave/underlay) networks, a handful works have paid attention to the overlay mechanism [5,[21][22][23][24][25][26][27][28]. More specifically, [21] investigated the almost similar system model to ours but EHONs are secured by asking a devoted jammer to jam the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, [25] analyzed the SOP/ergodic rate of primary/cognitive communications. Recently, a bulk of dedicated jammers were recommended to secure EHONs, and the SOP of cognitive and primary communications was suggested in closed form [5]. Nevertheless, distinguishing from [21][22][23][24], the cognitive user relays the primary signal and sends its privacy signal independently in [5,25].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, a bulk of dedicated jammers were recommended to secure EHONs, and the SOP of cognitive and primary communications was suggested in closed form [5]. Nevertheless, distinguishing from [21][22][23][24], the cognitive user relays the primary signal and sends its privacy signal independently in [5,25]. This demands at least three phases (phase 1: energy scavenging and PU's communications, phase 2: CU's communications to PU, and phase 3: CU's communications to CU) to complete message communications of both PU and CU, reducing drastically spectral efficiency and analysis complexity.…”
Section: Introductionmentioning
confidence: 99%
“…This demands at least three phases (phase 1: energy scavenging and PU's communications, phase 2: CU's communications to PU, and phase 3: CU's communications to CU) to complete message communications of both PU and CU, reducing drastically spectral efficiency and analysis complexity. As such, the closed-form analysis on the ergodic rate of cognitive communications and the SOP of cognitive and primary communications in [5,25] are tractable.…”
Artificial noise, energy harvesting, and overlay communications can assure design metrics of modern wireless networks such as data security, energy efficiency, and spectrum utilization efficiency. This paper studies impact of artificial noise on security capability of energy harvesting overlay networks in which the cognitive transmitter capable of self-powering its operation by harvesting radio frequency energy and self-securing its communications against eavesdroppers by generating artificial noise amplifies and forwards the signal of the primary transmitter as well as transmits its individual signal concurrently. To quantify this impact, the current paper firstly suggests accurate expressions of crucial security performance indicators. Then, computer simulations are supplied to corroborate these expressions. Finally, numerous results are demonstrated to expose insights into this impact from which optimum specifications are determined. Notably, primary/cognitive communications can be secured at distinct degrees by flexibly controlling multiple specifications of the suggested system model.
“…Cognitive users (CUs), which usually operate in underlay, overlay, and interweave mechanisms, can utilize the licensed frequency band (LFB) of primary users (PUs) without harming signal reception of PUs, hence drastically enhancing spectral efficiency and reducing spectrum scarcity problem [5]. In the underlay mechanism, CUs have access permission to the LFB solely if CUs limit interference power induced at PUs under a tolerable degree.…”
Section: Introductionmentioning
confidence: 99%
“…Whilst most publications have investigated the PHY security for energy harvesting (interweave/underlay) networks, a handful works have paid attention to the overlay mechanism [5,[21][22][23][24][25][26][27][28]. More specifically, [21] investigated the almost similar system model to ours but EHONs are secured by asking a devoted jammer to jam the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, [25] analyzed the SOP/ergodic rate of primary/cognitive communications. Recently, a bulk of dedicated jammers were recommended to secure EHONs, and the SOP of cognitive and primary communications was suggested in closed form [5]. Nevertheless, distinguishing from [21][22][23][24], the cognitive user relays the primary signal and sends its privacy signal independently in [5,25].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, a bulk of dedicated jammers were recommended to secure EHONs, and the SOP of cognitive and primary communications was suggested in closed form [5]. Nevertheless, distinguishing from [21][22][23][24], the cognitive user relays the primary signal and sends its privacy signal independently in [5,25]. This demands at least three phases (phase 1: energy scavenging and PU's communications, phase 2: CU's communications to PU, and phase 3: CU's communications to CU) to complete message communications of both PU and CU, reducing drastically spectral efficiency and analysis complexity.…”
Section: Introductionmentioning
confidence: 99%
“…This demands at least three phases (phase 1: energy scavenging and PU's communications, phase 2: CU's communications to PU, and phase 3: CU's communications to CU) to complete message communications of both PU and CU, reducing drastically spectral efficiency and analysis complexity. As such, the closed-form analysis on the ergodic rate of cognitive communications and the SOP of cognitive and primary communications in [5,25] are tractable.…”
Artificial noise, energy harvesting, and overlay communications can assure design metrics of modern wireless networks such as data security, energy efficiency, and spectrum utilization efficiency. This paper studies impact of artificial noise on security capability of energy harvesting overlay networks in which the cognitive transmitter capable of self-powering its operation by harvesting radio frequency energy and self-securing its communications against eavesdroppers by generating artificial noise amplifies and forwards the signal of the primary transmitter as well as transmits its individual signal concurrently. To quantify this impact, the current paper firstly suggests accurate expressions of crucial security performance indicators. Then, computer simulations are supplied to corroborate these expressions. Finally, numerous results are demonstrated to expose insights into this impact from which optimum specifications are determined. Notably, primary/cognitive communications can be secured at distinct degrees by flexibly controlling multiple specifications of the suggested system model.
This paper investigates a nonlinear energy scavenging overlay network (NLESON) wherein a primary source (PS) communicates with a primary destination (PD) probably under aid of a secondary source (SS) who communicates with a secondary destination (SD). SS is a power-constrained device, and thence, its operation relies on energy harvested by a practical nonlinear energy scavenger. To support PS and exploit the harvested energy at most, SS adaptively switches between single and superposition modes where the single mode allows SS to transmit solely its signal with the entire harvested energy and the superposition mode asks SS to transmit both-its signal and amplified primary signal-with different power fractions. Moreover, for increasing the probability of successfully decoding primary signal at PD and SD, which then reduces considerably primary interference on secondary signal in the superposition mode, we leverage both direct channels (PS-PD and PS-SD) and apply both signal combining paradigms (maximum ratio combining and selection combining).The outage/throughput performance of the NLESON is assessed quickly through the proposed closed-form expressions over κ À μ shadowed fading channels. Various results exposed the effectiveness of the aforementioned solutions for the NLESON and their flexibility in controlling system performance.
K E Y W O R D Samplify-and-forward, direct channel, feedback, nonlinear energy scavenging, overlay networks, shadowed fading
and motivationsAdvanced communication networks (viz., and Fifth-Generation [5G]) serve a vast quantity of users and hence pressuring significantly communication infrastructure in supplying adequately bandwidth and power. [1][2][3][4] Such a circumstance stimulates researches on initiatives to utilize energy and spectrum efficiently.On one hand, the spectrum can be exploited efficiently with the cognitive radio technology, which enables secondary users (SUs) to opportunistically transmit on the spectrum of primary users (PUs). Toward this end, SUs can operate with underlay, overlay, and interweave paradigms. 5 In both the overlay and underlay paradigms, PUs and SUs operate simultaneously while in the interweave one, SUs operate only when PUs are idle. Nevertheless, the underlay and overlay paradigms are different in that the former controls the transmit power of SUs such that the interference they induce
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.