Cargando…

Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints

Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum...

Descripción completa

Detalles Bibliográficos
Autores principales: Yadav, Suneel, Pandey, Anshul, Do, Dinh-Thuan, Lee, Byung Moo, Silva, Adão
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8587443/
https://www.ncbi.nlm.nih.gov/pubmed/34770467
http://dx.doi.org/10.3390/s21217160
_version_ 1784598143271174144
author Yadav, Suneel
Pandey, Anshul
Do, Dinh-Thuan
Lee, Byung Moo
Silva, Adão
author_facet Yadav, Suneel
Pandey, Anshul
Do, Dinh-Thuan
Lee, Byung Moo
Silva, Adão
author_sort Yadav, Suneel
collection PubMed
description Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio vehicular network, where all the nodes in the network are moving vehicles and the channels between them are modeled as double-Rayleigh fading. Furthermore, adopting an underlay approach, the communication between secondary nodes can be performed by employing two interference constraint strategies at the primary receiver; (1) Strategy I: the secondary transmitter power is constrained by the interference threshold of the primary receiver, and (2) Strategy II: the secondary transmitter power is constrained by both the interference threshold of the primary receiver and the maximum transmit power of the secondary network. Under the considered strategies, we derive the exact secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) expressions over double-Rayleigh fading. Moreover, by analyzing the asymptotic SOP behavior, we show that a full secrecy diversity of 1 can be achieved, when the average channel gain of the main link goes to infinity with a fixed average wiretap channel gain. From the ESC analysis, it is revealed that the ESC follows a scaling law of [Formula: see text] for large [Formula: see text] and [Formula: see text] , where [Formula: see text] and [Formula: see text] are the average channel gains of the main link and wiretap link. The numerical and simulation results verify our analytical findings.
format Online
Article
Text
id pubmed-8587443
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-85874432021-11-13 Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints Yadav, Suneel Pandey, Anshul Do, Dinh-Thuan Lee, Byung Moo Silva, Adão Sensors (Basel) Article Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio vehicular network, where all the nodes in the network are moving vehicles and the channels between them are modeled as double-Rayleigh fading. Furthermore, adopting an underlay approach, the communication between secondary nodes can be performed by employing two interference constraint strategies at the primary receiver; (1) Strategy I: the secondary transmitter power is constrained by the interference threshold of the primary receiver, and (2) Strategy II: the secondary transmitter power is constrained by both the interference threshold of the primary receiver and the maximum transmit power of the secondary network. Under the considered strategies, we derive the exact secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) expressions over double-Rayleigh fading. Moreover, by analyzing the asymptotic SOP behavior, we show that a full secrecy diversity of 1 can be achieved, when the average channel gain of the main link goes to infinity with a fixed average wiretap channel gain. From the ESC analysis, it is revealed that the ESC follows a scaling law of [Formula: see text] for large [Formula: see text] and [Formula: see text] , where [Formula: see text] and [Formula: see text] are the average channel gains of the main link and wiretap link. The numerical and simulation results verify our analytical findings. MDPI 2021-10-28 /pmc/articles/PMC8587443/ /pubmed/34770467 http://dx.doi.org/10.3390/s21217160 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Yadav, Suneel
Pandey, Anshul
Do, Dinh-Thuan
Lee, Byung Moo
Silva, Adão
Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_full Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_fullStr Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_full_unstemmed Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_short Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
title_sort secure cognitive radio-enabled vehicular communications under spectrum-sharing constraints
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8587443/
https://www.ncbi.nlm.nih.gov/pubmed/34770467
http://dx.doi.org/10.3390/s21217160
work_keys_str_mv AT yadavsuneel securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints
AT pandeyanshul securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints
AT dodinhthuan securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints
AT leebyungmoo securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints
AT silvaadao securecognitiveradioenabledvehicularcommunicationsunderspectrumsharingconstraints