International Journal of Engineering Trends and Technology (IJETT) – Volume 29 Number 2 - November 2015 Secrecy Outage Analysis of Underlay Cognitive Radio Over Nakagami-Q (Hoyt) Fading Channels P Harish*, S Sri Gowri** *M.Tech student, ECE Department, SRK Institute of Technology, Enikepadu, Vijayawada, India **Prof& Head, ECE Department, SRK Institute of Technology, Enikepadu, Vijayawada, India Abstract: An underlay cognitive radio unit over the Nakagami - q fading channel which consists of a source S, a secondary user (SU) and an eavesdropper who wants to eavesdrop the information between S and SU, is studied. The broadcast power of S is simultaneously adjusted according to the channel state information of S-PU link and a given threshold interference of that primary user can permit. A closed form analytical expressions of Secrecy Outage Probability has been derived. The robustness of our analysis models are verified by simulation results. Index terms: Secrecy Outage Probability, Nakagami-q (Hoyt), Underlay Cognitive radio networks(CRNs) I. Introduction Spectrum scarcity and poor spectrum utilization are two contradictory statements that makes to focus public on cognitive radio network, which makes secondary users (SUs) enable to share the frequency band of primary users(PUs). The three different models of cognitive radio networks (CRNs) enable users to share their frequency bands are underlay, overlay, interweave etc. [10]. Among the models that we have discussed the underlay type of strategy is easy to realize, as SUs are needed to just adjust the power of them within the threshold level that PUs can tolerate without experiencing a complex calculation. studies about the Nakagami-m fading channels, which include special cases like one-sided Gaussian distribution (m=0.5), Rayleigh(m=1) but they didn't mention about the security problems in CRNs. [11] studies the secrecy outage probability (SOP) and the probability of non-zero secrecy capacity (PNSC) of underlay cognitive radio has been derived by using the closed form expressions of both SOP and PNSC. According to the best of my knowledge, SOP over Hoyt distribution has not been investigated. In this paper, we study the SOP of the underlay cognitive radio unit as shown in fig.1 over Nakagami-q fading channel (Hoyt distribution) and the closed form expression of the Secrecy Outage Probability (SOP) is derived. II. System Model We consider the system model same as the [1] but the fading that channel experience is Nakagami-q fading. PU_Tx and PU_Rx are primary user's transmitter and receiver of the underlay cognitive radio networks unit as shown in Fig 1. PU_Tx h2 h1 S SU The security of CRNs discussed by [2] to [11]. In [2] secrecy capacity for a multi-antenna SU transmitter in the presence of eavesdropper is studied. Reference [3] discusses the secure resource allocation in CRNs for guaranteeing a secrecy rate for PUs. A secure medium access control (MAC) is proposed in [4] for CRNs. Some secure broadcasting in non-CRNs over independent/correlated Rayleigh [5], [6] /log-normal [7], Gaussian fading channels [8]. Reference [9], [10] ISSN: 2231-5381 PU_RX http://www.ijettjournal.org h3 Eav Fig. 1 System model Page 58 International Journal of Engineering Trends and Technology (IJETT) – Volume 29 Number 2 - November 2015 In the secondary system, a Source (S) sends confidential information to destination SU, while eavesdroppers want to eavesdrop the confidential information. All the channels (hi, i∈ {1,2,3}) shown in Fig. 1 are assumed to experience independent Nakagami-q fading with parameters mi, Ωi ,i∈ {1,2,3}) and Additive White Gaussian Noise with power density, N0. The channel state information (hi, ,i∈{1,2,3}) is assumed to be available at S. Though h3 is unavailable when Eav keeps in silence and just listens, we assume h3 is available at S to set up analysis models to study the secrecy outage performance for every realization of h3. The peak interference power from S which PU Rx can tolerate is Pth. P denotes the maximum transmit power at S. In the underlay scheme, the interference power received at PU_Rx must be within Pth, such that P = Pth=|h2|2. In this work, we assume that SU is located far from PU_Tx. Then, the received signals at SU will not be influenced by PU system. Thus, the signal to noise ratio at SU and Eav can be written as SU = P|h1|2/N0 = Pth|h1|2/N0|h2|2), E = P|h3|2/ N0 = Pth|h3|2/N0|h2|2), respectively. III. Secrecy outage Probability Analysis The probability that secrecy capacity is smaller than that of threshold secrecy capacity Cth is defined as SOP. SOP can be expressed as [12] The pdf of the channel power gain over Nakagami-q or Hoyt fading channel can be given by [12] 1 qi 2 1 qi 2 exp( 2qi i f ( i) where i Let a1 | hi |2 , 4qi 2 i ) I0 ( ai 4qi 2 i ) (4) i 1, a3 0(i Pth / N 0 . It is 1, 2,3 ), such that a1 | h1 |2 . The pdf of X a2 | h 2 |2 a3 | h 3 |2 Z i E[ i ] Pth / N 0 , a2 obvious that 1 qi 4 ai | h i |2 can be computed as follows: 1 1 qi 2 (1 q 2 )2 x (1 q 4 ) x . .exp( ).I ( ) 0 | a i | 2qi i 4qi 2 i ai 4qi 2 i ai f x ( x) 1 qi 2 (1 qi 2 )2 x (1 qi 4 ) x .exp( ).I ( ) (5) 0 2qi i ai 4qi 2 i ai 4qi 2 i ai a2 | h 2 |2 a3 | h 3 |2 as We can write the pdf of Z1 z1 f Z1 (z1 ) f a |h |2 ( x). f a |h |2 (z1 x) dx 2 2 3 3 0 z1 k exp(ax).I o (bx).I0 (c(z1 x)) dx (6) 0 SOP(Cth ) P P(CSU 1 log 2 (1 2 Cth ) SU) 1 1 SU P{ log 2 2 1 E Substituting SOP(Cth ) SU and P{1 ( Where 1 log 2 (1 2 k Cth } Pth | h1 |2 N 0| Pth 1) | h 2 |2 | h 3 |2 N0 z} (2) aa 2 a (1 q32 )2 4q32 3a3 c 1 q34 4q32 3a3 (1) E into Eq. (1), we have (1 q 22 )2 ,b 4q22 2 a2 0 pdf z ( z )dz 1 pdf z ( z )dz. (3) k z1 eax ebx . 2 0 1 (1 q32 )2 z1 ), 4q32 3a3 (1 q 2 4 ) , 4q2 2 2 a2 By expanding Io terms f z1 ( z1 ) k exp(ax). 1 .exp( 3 2 3 z1 2 Where Thus, SOP can be computed as 0 4q2 q3 E ) Cth 2*Cth SOP(Cth ) 1 q2 2 1 q32 1 e bx cos 1 dx 0 1 bx.ebx . 6 e c (z1 x)cos 3 ec ( z1 x) . 1 c( z1 x).ec ( z1 6 Thus, as shown in Eq (3), to obtain the closed-form expression of SOP, we should characterize the pdf of the positive random variable, Z. ISSN: 2231-5381 http://www.ijettjournal.org dx dx 0 Page 59 x) . 3 dx International Journal of Engineering Trends and Technology (IJETT) – Volume 29 Number 2 - November 2015 z1 f z1 ( z1 ) k. eax bx c (z1 x) ( 2 0 For q1 1 bx c( z1 x) 1 bx(c(z1 x) 2 )dx (7) 2 6 6 36 After Integration we get e(a b)z1 ecz1 b e(a 6(a b c)2 2 (a b c) z1 1 e 6(a b c)2 bc 2 (e(a 36(a b c)3 e 2 f z1 ( Z1 ) K (a b)z1 ce e e(a f Z (Z ) K e cz1 (a b)z1 e 2 0 e(a 1 q12 .exp 2q1 1a1 b)z1 ecz1 SOP(Cth ) 1 x ) 1a1 a a a f z ( z) . a 1 K 2 b)z1 1 ecz1 2 SOP(Cth ) 1 cecz1 be(a b)z1 0 SOP(Cth ) 1 1 e . (a b)z1 1 q12 .exp 2q1 1a1 e cz1 2bc 2 36(a b c)3 (10a) ( . 1 .e 1a1 . z 2 1 ) ( 1a1 3 a3 a 1a1 dy (11) (12) z 2 ) 1a1 1 1 3 a3 ) ( 2 a2 1 1 yz 1 1 3 a3 ) ( 2 a2 1 1a1 ( 2 a2 1 e(a 3a3 e 1 . dy f z ( Z )dz 2 a2 . e 3 3 1 1a1 ( 2 a2 SOP(Cth ) 1 3a3 e y y 2 2 z1 2 a2 . e 3 3 y f z ( z) (9a) z1 1 2 2 (9) ( z x) x 1 ). exp( 1 )dx (10) 2 a2 3 a3 3 a3 1 .exp( 2 a2 f z1 ( z1 ) bc 2 z1 36(a b c)2 (1 q12 )2 z (1 q14 ) z . I 0 4q12 1a1 4q12 1a1 1 exp( 1a1 0 z1 1 6(a b c) 6(a b c) 2 b)z1 f x ( x) z1 2bc 2 36(a b c)3 1 ecz1 x ) I 0 (0) 1a1 f z1 (Z1 ) bc 2 z1 36(a b c) 2 1 Equation (5) becomes 1 exp( 1a1 ecz1 z1 1 6(a b c) 6(a b c) 2 (a b)z1 cz1 b)z1 2bc 2 36(a b c)3 2 cecz1 be(a 2 ecz1 ) Z1 (a b c) 2 e(a 1 cz1 be b)z1 b)z1 q3 f x ( x) cz1 1 (a b c) z1 ecz1 .c 2 f z1 ( Z1 ) K b)z1 q2 1 z 2 1 ) ( 1a1 3 a3 ( 1a1 )2 2 a2 )( 1a1 z 2 ) 1a1 dz (14) a) 3 3 IV. Results and Discussions z1 1 6(a b c) 6(a b c)2 dz bc 2 z1 36(a b c)2 (1 q12 ) 2 z (1 q14 ) z .I 0 dy 2 4q1 1a1 4q12 1a1 (8) Special Case: We know Io(0)=1, so we get q=1 as a Special case ISSN: 2231-5381 Fig. 2 SOP Vs Pth/No (for q=0.5) http://www.ijettjournal.org (13) Page 60 International Journal of Engineering Trends and Technology (IJETT) – Volume 29 Number 2 - November 2015 [8] X. Sun, J. Wang, W. Xu, and C. Zhao, “Performance of secure communications over correlated fading channels,” IEEE Sig. Process. Lett., vol. 19, no. 8, pp. 479-482, Aug. 2012. [9] N. Yang, P. L. Yeoh, M. Elkashlan, et al., “Transmit antenna selection for security enhancement in MIMO wiretap channels,” IEEE Trans. Commu., vol. 61, no. 1, pp. 144-154, Jan. 2013. [10] J. Lee, H. Wang, J. G. Andrews and D. Hong, “Outage probability of cognitive relay networks with interference constraints,” IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 390-395, Feb. 2011. [11] C. Tang, G. Pan, T. Li, "Secrecy outage analysis of underlay cognitive radio networks over nakagami-m fading channels," IEEE Wireless Commmun.., vol.3. no.6. December 2014 [12] M.-S. Alouni, M.K.Simon "A unified approach to the performance analysis of digital communication over generalized fading channels," proceedings of IEEE, vol. 86, no. 9, september 1998. Fig. 3 SOP Vs Pth/No (for q=1) Fig 2, Fig. 3 shows the SOP vs Signal to Noise Ratio, where the unit of Cth is bits/s/Hz. Generally Nakagamiq span rangers from q=0 to1. Where it exhibits one sided Gaussian noise at 0 and Rayleigh at 1. fig 2. exhibits the values for q1=q2=q3=0.5. According the definition and meaning of secrecy outage probability with the strengthening of the signal i.e., increasing signal to noise ratio (SNR) values the outage probability will be reduced. We S- SU link is better than that of S-Eav link. Similarly fig 3 exhibits the values for q1=q2=q3=1. By adjusting the Cth values from 0.794 to 1 to 1.254 we achieved good results. V. Conclusion In this paper, the analytical model for the SOP of a basic underlay cognitive radio networks unit over Nakagami-q channel is presented, verified by simulation. REFERENCES [1] K. Ho-Van, “Performance evaluation of underlay cognitive multihop networks over Nakagami-m fading channels,” Wireless Pers. Commun., vol. 70, no. 1, pp. 227-238, May, 2013. [2] Y. Pei, Y. Liang, L. Zhang, K. Teh, and K. Li, “Secure communication over MISO cognitive radio channels,” IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010. [3] N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, “Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users,” IEEE Trans. wireless Commun., vol. 13, no. 2, pp. 1058-1073, Feb. 2014. [4] W. Alhakami, A. Mansour, G. A. Safdar, and S. Albermany, “A secure MAC protocol for cognitive radio networks (SMCRN),” Science and Information Conference (SAI), London, 2013, pp. 796803. [5] X. Zhang, G. Pan, C. Tang, et al., “Performance analysis of physical layer security over independent/correlated log-normal fading channels,” to appear in Proc. ATNAC 2014. [6] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451456, Jul. 1978. [7] P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008. ISSN: 2231-5381 http://www.ijettjournal.org Page 61