Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2021 Oct 28;21(21):7160. doi: 10.3390/s21217160

Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints

Suneel Yadav 1,*, Anshul Pandey 2, Dinh-Thuan Do 3, Byung Moo Lee 4, Adão Silva 5
Editor: Omprakash Kaiwartya
PMCID: PMC8587443  PMID: 34770467

Abstract

Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio vehicular network, where all the nodes in the network are moving vehicles and the channels between them are modeled as double-Rayleigh fading. Furthermore, adopting an underlay approach, the communication between secondary nodes can be performed by employing two interference constraint strategies at the primary receiver; (1) Strategy I: the secondary transmitter power is constrained by the interference threshold of the primary receiver, and (2) Strategy II: the secondary transmitter power is constrained by both the interference threshold of the primary receiver and the maximum transmit power of the secondary network. Under the considered strategies, we derive the exact secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) expressions over double-Rayleigh fading. Moreover, by analyzing the asymptotic SOP behavior, we show that a full secrecy diversity of 1 can be achieved, when the average channel gain of the main link goes to infinity with a fixed average wiretap channel gain. From the ESC analysis, it is revealed that the ESC follows a scaling law of ΘlnΩm2Ωe2 for large Ωm and Ωe, where Ωm and Ωe are the average channel gains of the main link and wiretap link. The numerical and simulation results verify our analytical findings.

Keywords: physical-layer security, cognitive radio vehicular networks (CRVNs), secrecy outage probability (SOP), ergodic secrecy capacity (ESC), double-Rayleigh fading channels

1. Introduction

With the advancement in wireless communication capabilities and increasing number of sensors, an ecosystem of automated connected vehicles has evolved into a network paradigm called the Internet of Vehicles (IoV) [1,2]. Such vehicular communication networks form an integral part of 5G and beyond wireless communication technologies. Moreover, vehicular communications can help us to realize an abundance of on the move intelligent transportation system (ITS) applications, such as safer and better travel experience to the users, infotainment services, efficient traffic management, vehicle platooning etc. [3]. In addition, vehicular communications aim at realizing ubiquitous connectivity among the vehicles in a wireless manner [4]. Therefore, to support such massive connectivity with real-time network access, a substantial amount of energy and radio resources are needed. To this end, cognitive radio technology can be exploited in the vehicular communication networks to support the shared spectrum access [5,6]. The cognitive radio-enabled vehicular communications, named cognitive radio vehicular networks (CRVNs), can exploit the additional spectrum opportunities outside the IEEE 802.11p specified standard 5.9-GHz band [7]. However, such networks are susceptible to various serious security attacks as the bulk of communication occur over the open and vulnerable wireless medium [8]. The issues of mobility, cooperative infrastructure, dynamic nature of cognitive radios, and heterogeneity can further aggravate the security concerns, as these characteristics limit the implementation of the existing key-based cryptography security infrastructure [8,9]. As of late, physical-layer security (PHY-security) has arisen as an appealing way to guarantee secure wireless transmissions and to complement the existing security infrastructure further. In contrast to the key-based upper layer security mechanisms, PHY-security techniques provide secure transmissions at the physical layer by exploiting the inherent random nature of the wireless channels such as fading, interference, etc., through various coding, signal design, and signal processing approaches [10]. Therefore, this paper aims to provide a comprehensive performance analysis of PHY-security in CRVNs under spectrum-sharing constraints.

1.1. Related Works

PHY-security aspects have been thoroughly investigated in the literature for various network scenarios under different fading channels without considering the cognitive framework [11,12,13,14,15,16,17,18,19,20]. Furthermore, the authors in [21] have proposed a machine-learning-based method to locate the vehicles generating jamming signals by monitoring the physical channel parameters of the vehicles in the vehicular networks. Moreover, PHY-security performance in the cognitive radio networks has been explored broadly in the literature [22,23,24,25,26,27,28,29,30,31] with or without relaying scenarios. In addition, to guarantee the quality of service (QoS) at the primary receiver, these works have employed either the single-power constraint of the maximum interference tolerable limit for the primary network or the combined power constraint of the maximum interference tolerable limit for the primary network and the maximum allowable transmission power at the secondary network. For the relay-assisted cognitive radio networks, the secrecy performance of cooperative cognitive relay networks has been analyzed in [22,23,24,25,26,27] and the references therein. Specifically, the authors in [22] investigated the secrecy performance of the cooperative cognitive relay networks in the presence of direct links. The authors in [23,24] have proposed some relay selection strategies to enhance the secrecy performance of the secondary network in the cognitive relaying systems. Moreover, the authors in [25] employed external jamming techniques for improving the security of an underlay cognitive relaying systems. The authors in [26] studied the problem of residual energy maximization for the multiple eavesdropper scenario in cognitive relaying networks. Furthermore, the authors in [27] analyzed the PHY-security performance of multiple-input–multiple-output cognitive relaying networks under the impact of outdated channel estimates.

Of particular interest are the secure underlay cognitive radio networks, where the secondary transmitter communicates with the secondary receiver under the interference constraint imposed on primary receiver in the presence of active/passive eavesdropper. Specifically, the authors in [28,29,30,31,32] evaluated the secrecy performance for cognitive radio networks. For instance, the authors in [28] investigated the secrecy performance of an underlay cognitive wiretap secondary system with multiple secondary receivers and eavesdroppers by considering the joint power constraint under Rayleigh fading channels. In [29], the authors investigated the secrecy performance of multiinput, single-output, and single-eavesdropper cognitive radio networks over correlated fading channels. The authors in [30] analyzed the secrecy performance of a cognitive wiretap system with multiantenna secondary terminals under Rayleigh fading channels. Further, the authors in [31] evaluated the secrecy performance of an underlay cognitive radio system in the presence of an active eavesdropper. Furthermore, for a single-input–multiple-output system, the authors in [32] investigated the impact of outdated channel estimates on PHY-security performance for cognitive radio networks.

However, all the aforesaid studies in [28,29,30,31,32] were limited to the scenarios where the nodes in the network are stationary (i.e., fixed infrastructures); therefore, the channel between the nodes is modeled as Rayleigh fading or Nakagami-m fading. In fact, the nodes in the wireless communication networks can be moving while exchanging the information, e.g., mobile of people driving on road, yielding the channel between the moving nodes as cascaded Rayleigh (double-Rayleigh) fading [33,34,35]. ( It is to be emphasized that the vehicle-to-vehicle (V2V) links undergo multiple scattering phenomena and are moving in a relatively dense scattering environment; thus, from the theoretical and empirical studies, cascaded Rayleigh channel modeling is shown to be more appropriate in resembling the dynamic V2V communication links [33,34,35]). Therefore, such V2V communications-enabled cognitive radio networks are one of the most fascinating use-cases in the upcoming 5G networks, and it is very interesting to comprehensively investigate the PHY-security in CRVNs under double-Rayleigh fading channels. In this context, the secrecy performance over cascaded fading channels has been widely studied in [35,36,37,38,39,40]. Recently, the authors in [41] studied the secrecy capacity performance for vehicular communication networks. However, these works [35,36,37,38,39,40,41] were limited to the noncognitive networking setup. Moreover, the authors in [42,43] evaluated the performance of multihop cognitive radio networks over double-Rayleigh fading channels but without taking PHY-security aspects into account. Further, the authors in [44] investigated secrecy performance of CRVNs over N*Nakagami-m fading channels.

1.2. Motivation

From the aforementioned discussion, we can infer that the bulk of the works reported towards the investigation of PHY-security aspects in cognitive communication networks were limited to the scenario where the nodes are stationary. With the emerging varied form of ITS applications and user needs on the move, CRVNs have attracted great research interest. The authors in [35,36,37,38,39,40] evaluated PHY-security performance of cooperative vehicular relaying networks but without taking the spectrum-sharing cognitive framework into consideration. Moreover, the authors in [42,43] considered double-Rayleigh fading channels and evaluated the performance of cognitive radio-enabled V2V networks, but they did not emphasize the PHY-security aspects of the considered system. Therefore, exploitation of PHY-security benefits in underlay CRVNs over cascaded fading channels is still an open issue. To this end, a little effort has been directed to analyze the secrecy performance of CRVNs over N*Nakagami-m fading channels in [44]. Very recently, the authors in [45] analyzed the secrecy performance of cognitive radio networks over cascaded Rayleigh fading. However, there are several differences between this work and [44,45].

  • In [44], the authors considered the following assumptions while analyzing the secrecy performance of CRVNs; (i) single-power constraint of the interference on the primary receiver, and (ii) N*Nakagami-m fading. In addition, the system’s performance was evaluated in terms of secrecy outage probability (SOP).

  • In [45], the authors considered the following assumptions while investigating the PHY-security performance of CRVNs; (i) single-power constraint of the interference on the primary receiver, (ii) cascaded Rayleigh fading for the main channel (between secondary source and secondary receiver), and Rayleigh fading for both the wiretap channel (between secondary source and secondary eavesdropper) and interference channel (between secondary source and primary receiver). However, for evaluating the system’s performance, the cascaded Rayleigh fading was transformed into a Nakagami-m fading approximation, and assumed statistical independence among the channel gains. In addition, the performance was evaluated in terms of SOP, intercept probability, and probability of non-zero secrecy capacity.

  • Different from [44,45], in this paper, we adopt the following: (i) two power control strategies at the secondary transmitter, i.e., Strategy I: single-power constraint of the interference on the primary receiver, and Strategy II: combined power constraint of the interference on the primary receiver and the maximum transmission power at the secondary transmitter, (ii) double-Rayleigh fading for all the links, and (iii) statistical dependency among the channel gains. In addition, we evaluate the secrecy performance in terms of exact SOP, asymptotic SOP, and ergodic secrecy capacity (ESC), under Strategies I and II.

In addition, the proposed work and the works presented in [46,47] explored the cognitive radio networks under vehicular communications. However, there are several key differences between this work and [46,47], whose brief detail is as follows.

  • This paper and the work presented in [46] consider all the nodes are equipped with single antenna, whereas the authors in [47] considered the secondary transmitter and primary receiver are equipped with single antenna and secondary receiver and eavesdropper are enabled with multiple antennas.

  • In this work, we consider the channel between the moving vehicles to be quasistationary for a short duration (i.e., one fading block time), where the distance between the nodes is much greater than the scattering radii. Consequently, assuming the radio propagation between two moving vehicles undergoes independent double scattering events, the channel can be modeled as double-Rayleigh fading. By contrast, the works presented in [46,47] considered the scenario where the symbol period of the detected signal is larger than the coherence time of the channel, and hence, the system fading links can be characterized as time-selective. Particularly, the works [46,47] considered Rayleigh fading channels and Nakagami-m fading channels, respectively.

  • In [46], the authors considered a single-power constraint of the interference on the primary receiver, whereas in [47], the authors adopted a combined power constraint of the interference on the primary receiver and the maximum transmission power at the secondary transmitter. Different from [46,47], this paper adopts both single-power- and combined-power-based control strategies for managing interference at the primary receiver.

  • In [46], the authors evaluated the SOP and intercept probability expressions over Rayleigh fading channels, while in [47], the authors derived the expressions for the SOP and ESC over Nakagami-m fading channels. In this paper, we derived the SOP and ESC expressions over double-Rayleigh fading channels.

Therefore, the above differences make the contributions and results of this work fundamentally very different from [44,45,46,47]. Hence, this motivates us to develop a thorough and comprehensive investigation on the secrecy performance of CRVNs under both single and combined interference power constraints in the presence of double-Rayleigh fading channels.

1.3. Contributions

From the aforesaid discussion, it is obvious that there is a lack of PHY-security performance evaluation in CRVNs over double-Rayleigh fading channels by employing two power control strategies at the secondary transmitter vehicle, i.e., (1) Strategy I: where the transmit power of the secondary transmitter vehicle is only constrained by the interference threshold of the primary receiver vehicle, and (2) Strategy II: where the transmit power of the secondary transmitter vehicle is constrained by both the maximum transmit power and the interference threshold of the primary receiver vehicle. The analytical outcomes reported in this paper thus (1) face several mathematical challenges and complications under the considered strategies and double-Rayleigh fading, (2) are unique as efforts to investigate PHY-security in CRVNs under the consideration of two spectrum sharing constraints and double-Rayleigh fading channels is made first time in the literature, and (3) lay the foundation for examining PHY-security in CRVNs over more generalized cascaded fading models, such as N*Rayleigh and N*Nakagami-m. Specifically, in this work, under the two considered power control strategies and by taking double-Rayleigh fading channels into account, we investigate SOP, asymptotic SOP behavior, and ESC, for the considered underlay CRVNs. The key contributions of the paper are summarized as follows.

  1. We deduce the exact SOP expressions over double-Rayleigh fading channels in order to investigate the secrecy performance under two considered power control strategies. These SOP expressions enable us to effectively determine the impact of key system/channel parameters on the system’s secrecy performance.

  2. We further present the asymptotic SOP expressions for Strategy I and Strategy II over double-Rayleigh fading channels. These asymptotic expressions provide us some important insights related to the system’s achievable secrecy diversity order. Based on these asymptotic results, it is observed that the system can achieve a secrecy diversity order of 1, when the average channel gain of the main link goes to infinity and the average channel gain of the wiretap link is fixed. However, the convergence of achieving the asymptotical secrecy diversity order of 1 is very slow, due the involvement of double-Rayleigh fading channels. In addition, the secrecy diversity order reduces to zero when the average channel gains of the main and wiretap links go to infinity.

  3. Using the derived exact SOP expression under Strategy II, we demonstrate the impact of maximum tolerable interference level and maximum secondary transmitter power on the secrecy performance. Specifically, we analyze two cases, viz., (1) when maximum tolerable interference level is proportional to maximum secondary transmitter power, and (2) when maximum tolerable interference level is not related to maximum secondary transmitter power. It is revealed from these two cases that the SOP performance saturates when maximum secondary transmitter power is large enough, which results into a zero system’ secrecy diversity gain.

  4. Further, we deduce novel ESC expressions for Strategy I and Strategy II under double-Rayleigh fading, in order to analyze the impact of interference threshold, maximum transmit power, and average channel gains on the secrecy performance. We also present two key observations irrespective of two power control strategies, when the average channel gains of main and wiretap links are very large, i.e., (1) there exists a ceiling of ESC, and (2) the ESC follows a scaling law of ΘlnΩm2Ωe2, where Ωm and Ωe are the average channel gains of main and wiretap links, respectively.

  5. We finally verify our analytical and theoretical findings via simulation studies. Our results show the impact of involved network parameters on the system’s SOP and ESC performances under Strategy I and Strategy II.

1.4. Organization

The paper is structured as follows: Section 2 describes the considered system model for CRVNs. In Section 3, we analyze and present the exact and asymptotic SOP expressions under Strategy I and Strategy II for CRVNs. Section 4 presents the ESC expressions under Strategies I and II. Numerical results are provided in Section 5 to offer valuable insights onto the secrecy performance. Finally, Section 6 concludes the work.

Notations:Kv(·) is the v-th order modified Bessel function of second kind (eq. (8.432)) of [48], 2F˜1(m,n,p;z) is the Hypergeometric regularized function (eq. (9.10)) of [48], Ψ(·,·,·) being the Kummer hypergeometric function (eq. (9.238)) of [48], Gp,qm,ny|b1,,bqa1,,ap is the Meijer-G function (eq. (9.301)) of [48], and Gp1,q1:p2,q2:p3,q3m1,n1:n2,m2:n3,m3y,z|b1,,bq1a1,,ap1|d1,,dq2c1,,cp2|f1,,fq3e1,,ep3 is the extended generalized bivariate Meijer-G function (eq. (07.34.21.0081.01)) of [49].

2. System and Channel Models

In the following subsections, we detail the adopted cascaded fading channel model for the V2V channels and the system model for our considered cognitive vehicular networks. Further, we consider two power control strategies to minimize the interference at the primary receiver and present the end-to-end instantaneous signal-to-noise ratios for both the strategies.

2.1. Statistical Background: The Double-Rayleigh Distribution

As proposed in [33], for mobile-to-mobile links, the multiple Rayleigh propagation considers two or more independent Rayleigh fading processes generated by independent groups of scatterers around the two moving vehicles. The resulting transfer function, H(t), can be expressed as a linear combination of components with Rayleigh, double-Rayleigh, triple-Rayleigh, etc., distributed amplitudes. For the case of only double-Rayleigh process, the narrow-band, base-band channel transfer function can be written as [37]

H¯(t)=2NTNRn=1NTm=1NRej2π(fTcos(ϕn)t+fRcos(ϕm)t+θnm), (1)

where NT and NR are the respective numbers of scatterers generated around moving transmitter and receiver, fT and fR denote the respective maximum Doppler shift due to the motion (speed of mobility) of transmitter and receiver, ϕn and ϕm are the random angle of departure and the angle of arrival with respect to the velocity vectors, respectively, and θnm is the joint phase shift. It is important to note that the motions (speed of mobility) of transmitter and receiver are involved in the form of Doppler shifts to determine how fast the fading channel will be. For mathematical tractability, the channel between moving vehicles is assumed to be quasi-stationary for a short duration (i.e., one fading block time), and the distance between the nodes is much greater than the scattering radii, the channel between those moving vehicles can be distributed as double-Rayleigh fading (It is a more realistic channel model in a V2V scenario, especially when (i) the vehicles are moving in high scattering environment, e.g., high traffic scenarios and (ii) all the vehicles are equipped with low elevation antennas. Such a fading assumption which can find its applicability for vehicular communication scenarios in rush-hour traffic is widely investigated for vehicular networks in the literature [35,36,37,38,39,40,42,43]) [33,34,35,36,37,38,39,40,42,43,44,45,50,51,52].

Under double-Rayleigh fading, the resulting envelope R can be expressed as the product of R1 and R2, i.e., R=R1R2, where R1 and R2 are independent Rayleigh fading processes with mean powers Ω1 and Ω2, respectively. Thus, the probability density function (PDF) and the cumulative distribution function (CDF) of R can be expressed as [37]

fR(r)=rΩ1Ω2K0rΩ1Ω2, (2)
FR(r)=1rΩ1Ω2K1rΩ1Ω2, (3)

respectively. Moreover, the PDF and CDF of the square to the envelope, i.e., |R|2, can be represented, respectively, as

f|R|2(r)=2Ω1Ω2K02rΩ1Ω2, (4)
F|R|2(r)=12rΩ1Ω2K12rΩ1Ω2. (5)

2.2. Cognitive Radio Vehicular System

We consider a secure CRVN, where primary user vehicle and secondary user vehicles share the same licensed spectrum band in a given propagation environment. In the secondary network, the secondary transmitter sends its message to secondary receiver in the presence of a primary receiver present in the primary network. Meanwhile, in the secondary network, a passive eavesdropper vehicle is able to intercept the information transmitted by the secondary transmitter. Under the passive eavesdropping scenario, the instantaneous CSI between secondary transmitter and eavesdropper is not available at the secondary transmitter. During the whole process, the secondary transmitter imposes an interference to the primary receiver. Note that we highlight a practical consideration of the passive eavesdropping scenario since, in practice, the passive eavesdropper is noncooperative and does not feedback its instantaneous CSI to the trusted nodes. The assumption of known statistical CSI of eavesdropper’s channel can be applied to the scenario where the eavesdropper is part of a system which in alternate time slots becomes an active trusted user in the system. As such, the instantaneous CSI of the eavesdropper can be available at the transmitter via a feedback channel for the time slot where it is being served. Therefore, from this information and assuming eavesdropper CSI does not change under the assumption of quasi-stationary channel for a short duration, statistical CSI of the passive eavesdropper can be available at the trusted node, for the time slots where it is not being served [17,18,19,20,21,22,23,24,25,26,27,28,29,30]. The detail of the interference constraints is discussed later in this section.

Figure 1 depicts the system model of the considered secure CRVN, which consists of a secondary transmitter vehicle ST, a secondary receiver vehicle SR, a primary receiver vehicle PR, and a passive eavesdropper vehicle E. All the terminals are equipped with a single antenna and operate in the half-duplex manner (note that the consideration of single-antenna at the terminals can reduce the system complexity and requirement of power-intensive signal processing modules and hence make them for practical use in various battery operated devices, such as wireless sensor applications. In addition, the assumption of half-duplex terminals can be practically applicable, as the half-duplex operation is much easier and does not require additional signal-processing operations compared to the full-duplex operation, because in the full-duplex operation, a significant amount of self-interference is observed at the receiving antenna as a result of the signal from the transmitting antenna of the same node). Since, all the nodes are moving vehicles; therefore, the channels for STSR (i.e., main link), STPR (i.e., interference link), and STE (i.e., wiretap link) links can be modeled as double-Rayleigh fading. We represent hm, hp, and he as the channel coefficients of STSR, STPR, and STE links, respectively. In addition, we consider the perfect CSI knowledge of the channels. In this paper, we consider the perfect channel estimation process. However, imperfect channel estimates may be available for transmission in such systems, which are generally inaccurate and outdated with respect to actual channel. Consequently, the imperfect/outdated CSI for the actual channel can be expressed as hıimperfect=ϱıhı+1ϱı2wı, for ı{m,e,p}, where ρı denotes the normalized correlation coefficient between hıimperfect and hı, and wı is a Gaussian random variable having the same variance as that of hı. Therefore, the performance evaluation of considered CRVNs under such imperfect/outdated CSI requires a fresh approach, which is studied thoroughly and comprehensively in the future work. Under double-Rayleigh fading, the channel coefficients hı, for ı{m,e,p}, can be expressed as the product of hı,1 and hı,2, where hı,1 and hı,2 are independent complex Gaussian random variables having zero mean and variance (without loss of generality, we assume Ωı,1=Ωı,2=Ωı, for ı{m,e,p}; however, the analysis can readily be extended for Ωı,1Ωı,2). Ωı,1 and Ωı,2, respectively. Ps denotes the transmit power at ST. We also assume the additive white Gaussian noise (AWGN) with zero mean and N0 variance for each link.

Figure 1.

Figure 1

System model for the considered secure underlay CRVNs.

2.3. Instantaneous End-to-End Signal-to-Noise Ratio

Suppose that ST sends its confidential information to the legitimate SR over the main channel, and at the same time an E tries to decode this information through the wiretap channel; then, the signal received at SR and E can be given by ySR=Pshmxs+nm and yE=Pshexs+ne, respectively, where nm and ne are AWGNs at SR and E, respectively. The instantaneous end-to-end signal-to-noise ratios (SNRs) Λm and Λe at SR and E can be expressed as

Λm=Ps|hm|2N0 and Λe=Ps|he|2N0. (6)

Furthermore, we assume that PR feedbacks its instantaneous CSI to secondary transmitter ST, and ST accordingly adjusts its transmit power to satisfy the interference constraint [52]. Practically, a spectrum band manager can help to realize this task by mediating between the primary and the secondary users. Therefore, in order to protect the QoS of PR, we employ two power control strategies at ST, i.e., (1) Strategy I: single-power constraint of the interference on the PR, IP [22,28,53] and (2) Strategy II: combined power constraint of the interference on the PR and the maximum transmit power at ST, Q [29,30,53].

Strategy I: Under Strategy I, the transmit power Ps at ST is constrained so that the interference impinged on PR remains below the maximum tolerable interference level IP. Therefore, Ps at ST can be mathematically expressed as Ps=IP|hp|2. Therefore, with Strategy I, the instantaneous end-to-end SNRs at SR and E can be given as

ΛmI=ρ|hm|2|hp|2 and ΛeI=ρ|he|2|hp|2, (7)

respectively, where ρIPN0.

Strategy II: In Strategy II, if ST is power limited terminal, then ST may transmit up to the maximum transmit power constraint of Q, and therefore Ps at ST can be expressed as Ps=minIP|hp|2,Q. Taking such strategy into account, the instantaneous end-to-end SNRs at SR and E can be given by

ΛmII=minρ|hp|2,ρ1|hm|2, (8)
ΛeII=minρ|hp|2,ρ1|he|2, (9)

respectively, where ρ1QN0.

Under the two adopted strategies, the capacities corresponding to main link (i.e., STSR) and wiretap link (i.e., STE) can be given by Cmȷ=log2(1+Λmȷ) and Ceȷ=log2(1+Λeȷ), where ȷ=I for Strategy I and ȷ=II for Strategy II. Moreover, the secrecy capacity of the wireless transmission can be given as Csecȷ=max{CmȷCeȷ,0}, for ȷ{I,II}.

In addition, Figure 2 shows the overall representation of the proposed CRVN framework. Here, the secondary vehicular network operates in the underlay spectrum sharing context along with the presence of a primary vehicular network. The transmission in the secondary network can only be established as long as the resulting interference on the PR is maintained underneath a given threshold. Firstly, if the PR generates an instantaneous QoS requirements, then the transmit power at ST should be constrained so that the interference imposed on PR remains below the maximum tolerable interference level, and consequently the transmit power, Ps, at ST can be given as Ps=IP|hp|2. Thereafter, the secondary users are allowed to use the licensed band and perform their operations accordingly. On the other hand, if the PR generates a stringent requirement of protecting QoS of PR and maintaining secondary user throughput simultaneously, then the transmit power, Ps, at ST can be expressed as Ps=minIP|hp|2,Q. Accordingly, the secondary users are allowed to start their transmissions. Finally, the performance of secure secondary network under the above two constraints can be evaluated in terms of SOP, asymptotic SOP, and ESC, as presented in subsequent Section 3 and Section 4.

Figure 2.

Figure 2

Overall representation of the considered CRVN framework.

2.4. Practical Applicability

The proposed analysis of the considered system by taking two power control strategies and double-Rayleigh fading channels into account can be applicable for various practical scenarios, as stated below.

  • The proposed analysis under Strategy I can be more appropriate under the practical scenario when the service provided by the primary user has an instantaneous QoS requirement.

  • The proposed analysis under Strategy II is suitable under the practical scenario when there is a stringent requirement of protecting QoS of primary user and maximizing secondary user throughput simultaneously.

  • The proposed analysis under double-Rayleigh fading assumption is practically applicable for vehicular communication scenarios in rush-hour urban traffic.

  • The proposed analysis is also applicable for the scenario when one mobile terminal is located indoors in low-ascent building, and the another mobile terminal is placed outdoors, as the cascaded fading envelope distribution is found suitable under such scenario.

  • The proposed analysis can be applied to the scenario when the mobile nodes are located in a relatively dense scattering (e.g., vegetation) environment, as the channel between them will be a good fit for cascaded fading distribution.

It is to be noted that compared to the existing similar works presented in [44,45,47], the complexity of this work can be discussed as follows; (i) the paper [44] adopted N*Nakagami-m fading channels and [45] adopted cascaded fading channels, which implies that the cascading degree of order N imposes more computational resources in examining the performance of the considered system. Whereas this paper considers the double-Rayleigh fading channels, which allows one to operate with less computational resources (because of having cascading degree of order (2) while evaluating the system performance, without the loss of information, and (ii) the work presented in [47] considered the multiple-antennas at the legitimate destination and eavesdropper, which require several parallel radio frequency chains in the front-end architecture of the receiver. This increases the power consumption, complexity, cost, and size of the system, due to which the direct implementation of such systems is hindered in battery-operated sources, such as in wireless sensor applications. That said, this paper considers the single-antenna terminals which drastically reduce the system’s complexity and can be efficiently applicable for the resource constraint devices.

Furthermore, we evaluate the SOP and ESC for Strategy I and Strategy II under double-Rayleigh fading channels, in what follows. Note that SOP is an appropriate metric for the block fading channels (such as, double-Rayleigh fading channels under multiple scattering phenomenon for vehicular scenario), where the maximum rate of reliable communication is supported only by the one channel realization. On the other hand, ESC is the maximum mutual information averaged over many independent fades of the channel. With the block fading, the time average should converge to the same limit for almost all channel realizations of the fading process (known as ergodicity); thus, ESC is only the long-term time average rate achieved, and not on how fast that rate fluctuates over the time. Therefore, we can evaluate the SOP and ESC in the one system assumption.

3. Exact and Asymptotic SOP Analyses under Strategies I and II

In the consequent subsections, we derive an analytical expression for a key secrecy metric and SOP to quantify the considered network secrecy performance under both Strategies I and II. Further, to provide meaningful insights, we also provide asymptotic SOP analysis under both the scenarios for the considered system.

3.1. Strategy I: Single-Power Constraint of the Interference on the PR

3.1.1. Exact Analysis for SOP

The SOP can be defined as the probability that the achievable secrecy capacity is less than a predefined secrecy transmission rate Rs (in bps/Hz). We can mathematically express the SOP under Strategy I as

Poutsec,I=Pr[max{CmICeI,0}<Rs]. (10)

Note that when CmICeI, the secrecy is compromised, i.e., Poutsec,I=1. Therefore, we analyze the SOP when CmI>CeI as

Poutsec,I=Pr[CmICeI<Rs]=Pr1+ρ|hm|2|hp|21+ρ|he|2|hp|2<η=1Pr|he|2<|hm|2η(η1)|hp|2ηρ. (11)

Since |hm|2 and |he|2 consist of a common channel gain |hp|2; therefore, the SOP under this strategy can be expressed as

Poutsec,I=10(η1)wρF|he|2yη(η1)wηρf|hm|2(y)dyI1f|hp|2(w)dw, (12)

where η=2Rs is the secrecy target threshold. To evaluate the SOP under Strategy I in (12), we first need to simplify the inner integral I1, which is given as per the following theorem.

Theorem 1.

The inner integral I1 of (12) can be expressed as

I1=I1aI1b, (13)

where

I1a=2(η1)wρλmK12(η1)wρλm, (14)
I1b=λmηλek=0(1)kk!η1ρλmkwkG3,32,3λmηλe|12,12,k1212,k12,k12, (15)

where λm=Ωm2 and λe=Ωe2.

Proof. 

The proof is given in Appendix A. □

Furthermore, invoking (14) and (15) along with the PDF of |hp|2 into (12), we can represent the SOP as

Poutsec,I(η)=14λp(η1)ρλm0w12K02wλpK12(η1)wρλmdw+2λmλpηλek=0(1)kk!η1ρλmkG3,32,3λmηλe|12,12,k1212,k12,k120wkK02wλpdw, (16)

where λp=Ωp2. Then, the first integral in (16) can be simplified using (eq. (03.04.26.0009.01)) of [49] and (eq. (07.34.21.0011.01)) of [49], and the second integral in (16) can be evaluated by first using the transformation of variables wλp=t24 and then applying (eq. (6.561.16)) of [48]. Consequently, the SOP under Strategy I, Poutsec,I(η), can be expressed as

Poutsec,I(η)=1(η1)λpρλmG2,22,2(η1)λpρλm|12,1212,12+λmηλek=0(1)kk!η1ρλmkλpk(Γ(k+1))2G3,32,3λmηλe|12,12,k1212,k12,k12. (17)
Remark 1.

The SOP in (17) mainly consists of powers, complete Gamma function, and Meijer-G functions, containing maximum interference threshold limit (Ip), secrecy target threshold (η), and average channel gains (Ωm, Ωe, and Ωp), which can effectively be evaluated using Mathematica software. The SOP behavior for various values of channel/system parameters is shown numerically in Section 5.

Remark 2.

We infer that the SOP expression in (17) depends on the average channel gain of the interference link (ST → PR), i.e., λp=Ωp2, which implies that the SOP performance degrades as λp increases and vice versa. This is due to the fact that the power at ST reduces with the increased λp, as also validated numerically in Section 5.

3.1.2. Asymptotic Analysis for SOP

To gain more insights into the achievable secrecy diversity order of the considered system, we focus on the asymptotic analysis in the high average channel fading gains regime. Here, we specifically investigated two separate scenarios: (1) when λm and λe is fixed. In this scenario, the quality of the legitimated channel is better than the quality of wiretap channel (i.e., E is located far away from ST), and (2) when λm and λe, where both the legitimated and wiretap channels experience similar fading conditions. Note that there may be another scenario where λm is fixed and λe. However, this case significantly strengthens the quality of wiretap link and increases the probability of successful eavesdropping, as E, which implies that the secrecy diversity order becomes zero.

When λm and fixed λe

Under this scenario, we simplify (17) by ignoring the higher order infinitesimal terms to obtain the asymptotic SOP as

Pout,asysec,I(η)λm1(η1)λpρλmG2,22,2(η1)λpρλm|12,1212,12+λmηλeG3,32,3λmηλe|12,12,1212,12,12. (18)
Remark 3.

Secrecy diversity order analysis: When λm and λe are fixed, the secrecy diversity order can be defined as the ratio of asymptotic SOP to average channel gain of the main link λm, yielding

GD=limλmlogPout,asysec,I(η)logλm. (19)

From (18), we can observe that the term G3,32,3λmηλe|12,12,1212,12,12 converges to zero very quickly as λm for fixed η and λe, and hence, it can be ignored from (18) while evaluating the secrecy diversity order. Consequently, we can re-express the resultant asymptotic SOP via (eq. (07.34.03.0871.01)) of [49], and after some simplifications, as

Pout,asysec,I(η)1A(η)λm2F˜12,2,3;1A(η)λm, (20)

where A(η)=(η1)λpρ. Now, invoking (20) into (19), and by simplifying 2F˜1(a,b,c;z) using (eq. (07.24.26.0003.01)) of [49] and (eq. (07.23.03.3573.01)) of [49], and after some involved simplifications, we can express the secrecy diversity order as

GD=limλmlog1λmA(η)+λm+A(η)logA(η)λm(A(η)λm)2logλm, (21)

which can be further simplified with the assistance of L’Hospital’s rule to obtain the secrecy diversity order as

GD=1. (22)

Therefore, we can infer that the system can achieve a secrecy diversity order of 1 and does not depend on the parameters related to the wiretap link (i.e., ST → E) and interference link (i.e., ST → PR).

Remark 4.

The convergence behavior of secrecy diversity order is shown in Figure 3, from which it can be observed that the secrecy diversity order converges to its asymptotical value of 1 over double-Rayleigh fading channels, irrespective of the wiretap link strength λe, ρ, and λp. However, the convergence gets slower because of the involved double-Rayleigh fading channels. We can also infer that the convergence further slows down as λe and/or λp increases and vice versa.

Figure 3.

Figure 3

Secrecy diversity order behavior of the considered system under Strategy I for λm and fixed λe.

When λm and λe

The asymptotic SOP for this case can be evaluated as per the following theorem.

Theorem 2.

The asymptotic SOP for the case when λm and λe (as the average channel gains of both the legitimated link and wiretap link are improved simultaneously) under double-Rayleigh fading channels can be expressed as

Pout,asysec,I(η)λm,λe1ηλeλmG2,22,2ηλeλm|12,1212,12. (23)
Proof. 

Under λm and λe, we can approximate the SOP as Poutsec,I(η)=Pr1+ρ|hm|2|hp|21+ρ|he|2|hp|2<ηPr|hm|2|he|2<η, which can be further expressed in the integral form as Pout,asysec,I(η)0F|hm|2(ηy)f|he|2(y)dy. Now, invoking the CDF of |hm|2 and the PDF of |he|2 and simplifying with the aid of (eq. (07.34.21.0011.01)) of [49], we can obtain the asymptotic SOP expression, as given in (23). □

Remark 5.

From (23), we can infer that the secrecy outage floor occurs for fixed ratio λeλm (as λm and λe), and hence, the secrecy diversity order cannot be attained. In addition, it is also worthwhile to note that the system’s secrecy diversity order can also be realized by analyzing the asymptotic SOP behavior for the case when ρ=IpN0. Under this case, we can have the same asymptotic SOP expression as evaluated in (23), since ρ at both D and E are increased simultaneously. We can further reveal that the SOP expression under this case achieves an error floor and results in a zero secrecy diversity order.

3.2. Strategy II: Combined Power Constraint of the Interference at the PR and Maximum Transmit Power at the ST

3.2.1. Exact Analysis for SOP

Considering CmII>CeII and using (8) and (9), the SOP can be expressed as

Poutsec,II(η)=Pr1+minρ|hp|2,ρ1|hm|21+minρ|hp|2,ρ1|he|2<η=Pr1+ρ1|hm|21+ρ1|he|2<ηPrρρ1|hp|2Θ1(η)+Pr1+ρ|hm|2|hp|21+ρ|he|2|hp|2<η,ρρ1<|hp|2Θ2(η). (24)

Further, the SOP in (24) can be simplified as per Theorem 3.

Theorem 3.

The exact expression for the SOP under Strategy II using (24) can be expressed as

Poutsec,II(η)=Θ1(η)+Θ2(η), (25)

where

Θ1(η)=[12η1ρ1λmK12η1ρ1λm+λmηλek=0(1)kk!η1ρ1λmk×G3,32,3λmηλe|12,12,k1212,k12,k12]12ρρ1λpK12ρρ1λp, (26)
Θ2(η)=2ρρ1λpK12ρρ1λp4λpη1ρλm[λp324G2,22,2(η1)λpρλm|12,1212,12ρ322ρ132i=1Ngiti2G0,22,0(η1)ti2ρ1λm|12,12G0,22,0ρti2ρ1λp|0,0]+λmηλeλpk=0(1)kk!×ρρ1k+1η1ρλmkG1,33,0ρρ1λp|k1,0,0kG3,32,3λmηλe|12,12,k1212,k12,k12, (27)

where gi=j=0N1[qj(ti)]21 and ti, (i=1,,N) are the weights and zeros of Norder Gauss–Lobatto’s polynomial (eq. (25.4.33)) of [54], respectively, and qN(t)=2N+3PN(2,0)(12t) with PN(2,0) as the Jacobi polynomial.

Proof. 

The detailed analysis is given in Appendix B. □

Remark 6.

We highlight that (25) mainly involves powers, Meijer-G functions, and modified Bessel function of the second kind, consisting of network parameters Ip, Q, η, Ωm, Ωe, and Ωp, which can readily be evaluated by the help of Mathematica software, as shown via numerical results in Section 5.

Remark 7.

The SOP expression in (25) consists of Gauss–Lobatto’s series expansion of order N, which converges to an arbitrarily accurate approximation by selecting the appropriate value of N. For instance, consider the term of (27), i.e., Z=G0,22,0(η1)ti2ρ1λm|12,12G0,22,0ρti2ρ1λp|0,0. Note that the Meijer-G function can be expressed in terms of v-th order modified Bessel function of second kind using the transformation Kv(x)=12G0,22,0(x24|v2,v2) (eq. (03.04.26.0009.01)) of [49], and Kv(x) can further be expressed as πex(2x)vΨ(v+0.5,1+2v;2x) (eq. (9.328)) of [48]. Realizing such representations in Z, we can get Z=16π(η1)ti2ρ1λme2(η1)ti2ρ1λme2ρti2ρ1λpΨ12,1;4ρti2ρ1λp ×Ψ32,3;4(η1)ti2ρ1λm. From which, it can be clearly seen that the exponential terms in Z implies that (27) decreases rapidly as N increases, and only a few values of N are sufficient to obtain satisfactory accuracy, as also shown numerically in Section 5.

3.2.2. Asymptotic Analysis for SOP

We analyze the asymptotic SOP performance of the considered system under Strategy II for two separate scenarios, i.e., (1) when λm and λe is fixed and (2) when λm and λe, in what follows.

When λm and fixed λe

For λm and fixed λe, by neglecting the higher order infinitesimal terms in (26) and (27), and then invoking the resultant expressions on (25), the asymptotic SOP expression can be given as

Pout,asysec,II(η)12η1ρ1λmK12η1ρ1λm+λmηλeG3,32,3λmηλe|12,12,1212,12,12×12ρρ1λpK12ρρ1λp+2ρρ1λpK12ρρ1λp(η1)λpρλm×G2,22,2(η1)λpρλm|12,1212,122ρρ132λp(η1)λmi=1Ngiti2G0,22,0(η1)ti2ρ1λm|12,12×G0,22,0ρti2ρ1λp|0,0+λmηλeλpG1,33,0ρρ1λp|k1,0,0kG3,32,3λmηλe|12,12,1212,12,12. (28)
Remark 8.

By following a similar approach used to evaluate (22), we can infer from (28) that the secrecy diversity order of 1 can also be achieved under Strategy II. Furthermore, Figure 4 shows that the secrecy diversity order convergence slows down because of the involvement of double-Rayleigh fading channels, for various values of λe and ρ1.

Figure 4.

Figure 4

System’s secrecy diversity order behavior under Strategy II for λm and fixed λe.

When λm and λe

Using (24), the asymptotic SOP can be expressed as

Pout,asysec,II(η)λm,λePr|hm|2|he|2<ηPr|hp|2ρρ1+Pr|hp|2>ρρ1=0F|hm|2(ηy)f|he|2(y)dy. (29)

Now, invoking the CDF of |hm|2 and the PDF of |he|2 into (29), and simplifying it via (eq. (07.34.21.0011.01)) of [49], we can obtain the asymptotic SOP expression under the scenario when λm and λe as

Pout,asysec,II(η)λm,λe1ηλeλmG2,22,2ηλeλm|12,1212,12. (30)
Remark 9.

According to (30), the asymptotic SOP in this scenario depends on the wiretap channel gain to the legitimated channel gain ratio, i.e., λeλm. Therefore, we can infer that the secrecy outage floor occurs, which yields into a zero secrecy diversity order.

3.2.3. Impact of Maximum Tolerable Interference Level IP and Maximum Secondary Transmitter Power Q

It can be observed in (25) that the SOP expression under Strategy II also depends on the maximum tolerable interference level IP and maximum secondary transmitter power Q. Therefore, in order to study the impact of IP and Q on the system’s secrecy diversity gain, two cases, i.e., Case 1: when ρ=μρ1 and Case 2: when ρμρ1, where ρIPN0 and ρ1QN0 are investigated in the following.

Case 1 (ρ=μρ1)

When ρ is proportional to ρ1, i.e., ρ=μρ1, where μ is a positive constant. In the high SNR regime, i.e., ρ1, the SOP in (25) can be approximated by applying the fact K1(x)x01x (eq. (9.6.9)) of [54] and ignoring the higher order infinitesimal terms at high SNR, as

Poutsec,II(η)ρ=μρ1,ρ1λmηλeG3,32,3λmηλe|12,12,1212,12,1212ρλpρ1K12ρλpρ1+2ρλpρ1×K12ρλpρ1fracλmρηλeλpρ1G1,33,0ρρ1λp|1,0,00G3,32,3λmηλe|12,12,1212,12,12. (31)
Remark 10.

We can see from (31) that the SOP is independent of SNR ρ1 with fixed ratio ρρ1, which implies that the secrecy diversity gain cannot be achieved in this case.

Case 2 (ρμρ1)

When ρμρ1 and ρ is a constant. At high SNR range, i.e., ρ1, we can approximate the SOP expression in (25) by using the fact K1(x)x01x (eq. (9.6.9)) of [54] and eliminating the higher order terms under high SNR (ρ1) regime, as

Poutsec,II(η)ρμρ1,ρ11(η1)λpρλmG2,22,2(η1)λpρλm|12,1212,12. (32)
Remark 11.

From (32), it is noted that the SOP only depends on a constant ρ, although ρ1. This implies that the secrecy diversity gain reduces to zero in this case as well.

4. ESC Analysis under Strategies I and II

4.1. Strategy I: Single-Power Constraint of the Interference on the PR

The instantaneous secrecy capacity for the considered secure CRVN under Strategy I can be given as

CsecI=CmICeI=log2(1+ΛmI)log2(1+ΛeI). (33)

By averaging the instantaneous secrecy capacity expression over the distributions of the end-to-end SNRs ΛmI and ΛeI under Strategy I, the ESC can be expressed as

C¯secI=E[log2(1+ΛmI)log2(1+ΛeI)],=1ln(2)Elog1+ρ|hm|2|hp|2log1+ρ|he|2|hp|2, (34)

which can be evaluated as per the following theorem.

Theorem 4.

The exact ESC expression for the considered system under Strategy I over double-Rayleigh fading channels can be represented as

C¯secI=1ln(2)i=1Uwieti[tiρλmG2,44,1tiρλm|0,0,1,11,0ti32λm+λeρ32λmλeStiρ]1λpG0,22,0tiλp|0,0, (35)

where S(a)=G2,2:0,2:0,22,1:2,0:2,032,3232,12|0,0|12,12|aλm,aλe. wi=ti((U+1)LU+1(ti))2 and ti, (i=1,,U) are the weights and zeros of Uorder Gauss–Laguerre polynomial (i.e., LU(t)) (eq. (25.5.45)) of [54].

Proof. 

See Appendix C for the proof. □

Remark 12.

It can be seen from (35) that the ESC expression consists of exponential, powers, and Meijer-G function, involving system parameters Ip, η, Ωm, Ωe, and Ωp, and as such, it can be readily evaluated. In addition, the ESC expression in (35) consists of extended generalized bivariate Meijer-G function, which is not easily available in the Mathematica software computational package, but the work in [55] has proposed an efficient and accurate implementation in Mathematica. Moreover, from (35), we can see that the ESC expression consists of Gauss–Laguerre series expansion, which is convergent. We can achieve the accurate results by appropriately selecting the value of U (can be analytically proved as in Gauss–Lobatto’s polynomial in Remark 7), as also shown numerically in Section 5.

Remark 13.

Using (34) for |hm|2|he|2, the ESC under strategy I can be expressed as

C¯secI=1ln(2)0f|he|2(|he|2)|he|2ln1+ρ|hm|2|hp|21+ρ|he|2|hp|2×f|hm|2(|hm|2)d|hm|2d|he|2. (36)

Substituting |hm|2=λmx and |he|2=λey into (36), and applying the scenario when the average power gains of both the main and wiretap channels go to infinity (i.e., λm and λe), and after some involved mathematical simplifications, we can express (36) as

C¯secI4ln(2)0λeλmylnλmxλeyK0(2x)K0(2y)dxdy. (37)

Now, by using (eq. (6.561.8)) of [48] and the transformations zaπ(z+1)ln(z)=G3,32,2z|a,a,a+0.5a,a,a+0.5 (eq. (07.34.03.0919.01)) of [49] and Kν(z)=12G0,22,0(z4|ν2,ν2), (eq. (03.04.26.0009.01)) of [49], into (37), and then simplifying it via (eq. (07.34.21.0011.01)) of [49] and (eq. (07.34.21.0081.01)) of [49], and after some algebraic simplifications, the ESC expression can be obtained, as shown in in (37), when λm and λe. We skipped the detailed analysis here for brevity. Moreover, it can be seen from (37) that the ESC improves with λm and λe; however, an error floor can be seen in the ESC performance in the high λm and λe regime. This is because of the reason that the channel strengths of both main link and wiretap link are improved simultaneously. This behavior is also shown numerically in Section 5.

Remark 14.

We can further express (37) as

C¯secI4ln(2)[0λeλmylnxyK0(2x)K0(2y)dxdy+lnλmλe0λeλmyK0(2x)K0(2y)dxdy]. (38)

It can be seen from (38) that both the integrals are consistent and can easily be evaluated. Therefore, we can conclude that the asymptotic ESC follows the scaling law of Θlnλmλe as λmλe increases and thus depends on the relative channel strengths of STSR and STE links, which is also demonstrated via numerical results in Section 5.

4.2. Strategy II: Combined Power Constraint of the Interference at the PR and Maximum Transmit Power at the ST

The ESC under Strategy II can be formulated as

C¯secII=Elog21+minρ|hp|2,ρ1|hm|2log21+minρ|hp|2,ρ1|he|2=Elog21+ρ|hm|2|hp|2log21+ρ|he|2|hp|2||hp|2>ρρ1C¯sec,1II+Elog21+ρ1|hm|2log21+ρ1|he|2||hp|2ρρ1C¯sec,2II, (39)

which can be simplified as per the following theorem.

Theorem 5.

The exact expression of ESC under Strategy II over double-Rayleigh fading channels using (39) is given by

C¯secII=C¯sec,1II+C¯sec,2II, (40)

where

C¯sec,1II=1ln(2)i=1UwietiλptiρλmG2,44,1tiρλm|0,0,1,11,0ti32λm+λeρ32λmλeStiρ×G0,22,0tiλp|0,02ln(2)[k=1Ngkρρ12λmλpG0,22,0ρrk2ρ1λp|0,0G2,44,1rk2ρ1λm|0,0,1,11,0
λm+λeλmλeρρ152k1=1Mgk1λpG0,22,0ρrk12ρ1λp|0,0Srk12ρ1],C¯sec,2II=1ln(2)1ρ1λmG2,44,11ρ1λm|0,0,1,11,0λm+λeρ132λmλeS1ρ (41)
×12ρρ1λpK12ρρ1λp, (42)

where wi=ti((U+1)LU+1(ti))2 and ti, (i=1,,U) are the weights and zeros of Uorder Gauss–Laguerre polynomial (i.e., LU(t)) [54], gk=j=0N1[qj(rk)]21 and rk, (k=1,,N) are the weights and zeros of Norder Gauss–Lobatto’s polynomial [54], respectively, qN(r)=2N+4PN(3,0)(12r) with PN(3,0) as Jacobi polynomial, and gk1=j1=0M1[qj1(rk1)]21 and rk1, (k1=1,,M) are the weights and zeros of Morder Gauss–Lobatto’s polynomial, respectively, qM(r)=2M+5PM(4,0)(12r) with PM(4,0) as Jacobi polynomial.

Proof. 

See Appendix D for the detailed proof. □

Remark 15.

It should be noted that (40) involves powers, exponential, Meijer-G functions, modified Bessel function of second kind, and extended generalized bivariate Meijer-G functions, consisting of network parameters Ip, Q, η, Ωm, Ωe, and Ωp, which can be efficiently calculated via Mathematica software. We can achieve an arbitrary accurate approximation by appropriately selecting the values of U, N, and M.

Remark 16.

Using (39) for |hm|2|he|2, the ESC under strategy II can be expressed as

C¯secII=1ln(2)ρρ1[0f|he|2(|he|2)|he|2ln1+ρ|hm|2|hp|21+ρ|he|2|hp|2×f|hm|2(|hm|2)d|hm|2d|he|2]f|hp|2(|hp|2)d|hp|2+1ln(2)ρρ1[0f|he|2(|he|2)|he|2ln1+ρ1|hm|21+ρ1|he|2×f|hm|2(|hm|2)d|hm|2d|he|2]f|hp|2(|hp|2)d|hp|2. (43)

Substituting |hm|2=λmx and |he|2=λey into (43), and under the scenario when λm and λe, and after some mathematical simplifications, we can express (43) as

C¯secII4ln(2)0λeλmylnλmxλeyK0(2x)K0(2y)dxdy×ρρ1f|hp|2(|hp|2)d|hp|2+0ρρ1f|hp|2(|hp|2)d|hp|24ln(2)0λeλmylnλmxλeyK0(2x)K0(2y)dxdy. (44)

Further, we can simplify (44) by using (eq. (6.561.8)) of [48], (eq. (07.34.03.0919.01)) of (eq. (03.04.26.0009.01)) of [49], (eq. (07.34.21.0011.01)) of [49], and (eq. (07.34.21.0081.01)) of [49], whose detailed analysis is skipped here for brevity. From (44), one can observe that the ESC performance increases with the increased in λm and λe but saturates in the high λm and λe regime because of the simultaneous improvement in the channel strengths of both the main link and the wiretap link, as shown numerically in Section 5.

Remark 17.

We can further express (44) as

C¯secII4ln(2)[0λeλmylnxyK0(2x)K0(2y)dxdy+lnλmλe0λeλmyK0(2x)K0(2y)dxdy]. (45)

The integrals in (45) are consistent and can readily be simplified. Moreover, we can see from (45) that the asymptotic ESC follows the scaling law of Θlnλmλe as λmλe increases, as shown numerically in Section 5.

5. Numerical Results and Discussion

In this section, we provide the numerical and simulation results to validate the effectiveness of our derived analytical findings under the consideration of Strategy I and Strategy II. To demonstrate, we plot various curves by varying the channel strengths (Ωm, Ωe, and Ωp) of STSR, STE, and STPR links. Note that a path-loss channel modeling can also be adopted, where the average channel power gains of all channels can be denoted as Ωı=dıν, for ı={m,e,p}, where ν denotes the path-loss exponent, and dı is the euclidean distance between the two nodes having the coordinates (xı,yı) and (xȷ,yȷ), for ı={m,e,p}, ȷ={m,e,p}, and ıȷ. Such modeling indicates that, Ωı correspond to dı0, which implies that the nodes are located close to each other, whereas Ωı0 correspond to dı, which indicates that two nodes are located far away from each other. Furthermore, we consider the Gauss–Laguerre polynomial order U=30 and Gauss–Lobatto’s polynomial order N=M=50, to obtain precise results.

5.1. SOP Performance under Strategies I and II

In Figure 5, we plot the SOP performance versus λm and λe for Strategy I. In Figure 5a, we show the SOP performance versus λm for different values of λe and Rs, when ρ=10 dB and λp=0 dB. We can observed from Figure 5a that the derived analytical results are in good agreement with the simulation results over the entire range of λm. Further, we can see that the SOP performance improves as λm increases, and an effective secrecy diversity order of 1 can be verified irrespective of λe and Rs, as also analytically demonstrated in Section 3-A. As expected, the SOP performance deteriorates with the improvement in wiretap channel strength λe, regardless of λm and Rs. In Figure 5b, we demonstrate the SOP performance with average channel gains of both the main and wiretap links simultaneously varying (i.e., λm=λe dB) for various values of Rs, when ρ=10 dB and λp=0 dB. From which, it is observed that the SOP decreases as average channel gains (λm=λe dB) increase, but saturates in the medium-to-high average channel gains regime, regardless of Rs. This observation is also aligned with the derived asymptotic SOP results presented in (23), which depends on the fixed ratio λeλm. In addition, we can see that the SOP performance decreases with the improvement in Rs, since more power is needed to achieve the higher value of Rs.

Figure 5.

Figure 5

SOP performance for the considered system under Strategy I.

Figure 6 illustrates the impact of PR on the SOP performance for various values of ρ, λm, and λe, when Rs=0.1 bps/Hz. We can see from this figure that the SOP performance deteriorates as λp increases, irrespective of ρ, λm, and λe. This is because of the reason that the transmit power at ST decreases as λp increases. Moreover, for fixed value of ρ, the SOP performance improves when the legitimate channel quality is better than the wiretap channel quality, i.e., λm>λe, and vice versa. In addition, the SOP performance improves as ρ increases, i.e., the performance is better for ρ=20 compared to ρ=10 dB. This is due to the fact that an increase in ρ allows ST to transmit at a higher power level without interfering with the PR.

Figure 6.

Figure 6

Impact of PR on the SOP performance under Strategy I.

In Figure 7, we demonstrate the impact of λm, λe, and λp on the SOP performance under Strategy II. It can be observed from Figure 7 that the analytical results match perfectly with the simulation results, which corroborate the correctness of our derived theoretical findings. Figure 7a illustrates the SOP performance versus λm for various values of λe and Rs, when ρ=ρ1=15 dB and λp=0 dB. We can observe that the SOP performance enhances as λm increases; however, it decreases with the improvement in λe. Moreover, the effective secrecy diversity order of 1 can also be achieved for different set of involved parameters. As expected, the higher Rs results into the SOP performance degradation. In Figure 7b, we show the impact of PR on the SOP performance under Strategy II for various values of λm and λe, when Rs=0.1 bps/Hz and ρ=ρ1=20 dB. It can be seen that the SOP performance degrades as λp increases, since power at ST reduces as λp improves. In addition, the SOP performance significantly improves if λm>λe, for all values of λp.

Figure 7.

Figure 7

SOP performance for the considered system under Strategy II, (a) SOP versus λm, and (b) SOP versus λp.

In Figure 8, we illustrate the impact of maximum tolerable interference level IP and maximum transmit power constraint Q on the SOP performance behavior under Strategy II. It can be observed from Figure 8a,b that the SOP performance deteriorates when λe>λm in the low ρ and ρ1 regimes; however, it saturates as ρ and ρ1 increase (i.e., in the medium-to-high ρ and ρ1 regimes). The secrecy floor in Figure 8a occurs because the SOP is independent of maximum secondary transmitter power, ρ1QN0, in the high ρ1, and only depends on fixed ρ, as also theoretically verified in (32). Furthermore, the secrecy floor is observed in Figure 8b due to the limited impact of ρ on the SOP in the high ρ regime, since the SOP depends on the fixed ratio ρρ1, as also analytically validated in (31). In other words, the secrecy floor occurs in the high ρ region since the SNR both the legitimated link and wiretap link is improved simultaneously. In addition, Figure 8a,b implies that the secrecy diversity order reduces to zero, which is perfectly aligned with the theoretical findings obtained in Section 3-B.

Figure 8.

Figure 8

Impact of maximum tolerable interference level (ρ=IP/N0) and maximum transmit power constraint (ρ1=Q/N0) on the SOP performance under Strategy II.

5.2. ESC Performance under Strategies I and II

Figure 9 illustrates the ESC curves for various values of λm and λe under Strategy I and Strategy II. We can observe that the analytical ESC results under Strategies I and II are in good agreement with the simulation results over the entire regime of λm and λe. We can observe from Figure 9a that the ESC performance increases as λm increases under both the considered strategies. In addition, the ESC performance decreases significantly as the quality of wiretap link improves. Further, in Figure 9b, the ESC performance increases as λm=λe dB increases; however, the performance saturates in the high λm=λe dB regime, which is aligned with the theoretical findings obtained in Section 4. The reason behind this behavior is that the quality of wiretap channel increases in the same proportion as of legitimate channel, hence restricting further improvement in the ESC performance.

Figure 9.

Figure 9

ESC performance for the considered system under Strategy I and Strategy II.

In Figure 10, we demonstrate the impact of primary user (λp), maximum tolerable interference level IP, and maximum transmit power constraint Q on the ESC performance of the considered system. Figure 10a shows the ESC performance versus ρ under Strategy I for various values of λp, when λm=10 dB and λp=5 dB. The ESC performance increases as ρ increases; however, a secrecy floor is observed in the medium-to-high regime of ρ. This is because of the fact that an increase in ρ benefits both the legitimate destination and the eavesdropper. Moreover, the performance significantly deteriorates as λp increases for all values of ρ. This degradation in ESC performance is because of the fact that the power at ST reduces as λp increases. Moreover, in Figure 10b, we plot the curves for ESC versus ρ1 under Strategy II for various values of ρ and λp. We can observe from this figure that the ESC performance improves with ρ1 when ρρ1 and saturates when ρ<ρ1. In other words, the ESC is affected by the interaction of ρ and ρ1. When ρ is smaller than ρ1, the SOP is mainly affected by ρ, whereas when ρ1 is smaller than ρ, then ρ1 becomes the dominant factor. In addition, the secrecy floor behavior is also due to the fact that both the eavesdropper and the legitimate destination simultaneously extract the same benefits of increased transmit powers. Further, Figure 10b under Strategy II reveals that the ESC performance is better for lower values of λp than that of the one with higher values of λp.

Figure 10.

Figure 10

Impact of maximum tolerable interference level (ρ=IP/N0) and maximum transmit power constraint (ρ1=Q/N0) on the ESC performance.

Figure 11 illustrates the ESC versus λmλe for various ρ under Strategy I and for various ρ and ρ1 under Strategy II, when λp=0 dB. It can be observed from Figure 11 that the ESC improves with increasing λmλe. This is owing to a higher λm than λe implying a superior channel quality of the legitimate channel when compared to the channel quality of the eavesdropper. This behavior is also depicted theoretically in (38) for Strategy I and in (45) for Strategy II. I addition, it is seen that there is a linear relationship between the ESC growth rate and λmλe at high λmλe.

Figure 11.

Figure 11

ESC performance versus λmλe under Strategy I and Strategy II.

6. Conclusions

This paper analyzed PHY-security in underlay CRVNs under spectrum-sharing constraints. Since all the nodes are in motion, the channels between the nodes are assumed to be modeled as double-Rayleigh fading. We assumed two different strategies to determine the transmit power of the secondary network. In Strategy I, the transmit power of the secondary transmitter is governed by the single-power constraint of the interference on the primary network, whereas in Strategy II, the transmit power of the secondary transmitter is governed by the combined power constraint of the interference on the primary network and the maximum transmission power at the secondary network. Under these two considered strategies, we deduced the exact SOP and ESC expressions for the considered system over double-Rayleigh fading channels. We also presented the asymptotic SOP analysis for the two considered strategies to reveal key insights into the system’s secrecy diversity order. It was demonstrated that the system can achieve a full secrecy diversity order of 1, when the average channel gain of main link goes to infinity with fixed average wiretap channel gain. Furthermore, from the ESC analysis, it is reveled that the ESC follows a scaling law of ΘlnΩm2Ωe2, when Ωm and Ωe go to infinity. We also verified our analytical findings via simulation studies.

Appendix A

Proof of Theorem 1

By invoking the CDF of |he|2 and the PDF of |hm|2 into (12), we can express the integral I1 as

I1=I1aI1b, (A1)
whereI1a=(η1)wρ2λmK02yλmdy, (A2)
I1b=4λmλe(η1)wρyη(η1)wηρK02yλmK12λeyη(η1)wηρdy. (A3)

We can simplify I1a in (A2) by first applying the relation αg(x)dx=0g(x)dx0αg(x)dx and then making use of the facts (eq. (6.561.16)) of [48] and (eq. (6.561.8)) of [48], as presented in (14). Moreover, I1b in (A3) can be evaluated by first applying the change of variables yη(η1)wηρ=t and ηtλm=r and the transformation Kν(z)=12G0,22,0(z4|ν2,ν2) (eq. (03.04.26.0009.01)) of [49] and then simplifying via (eq. (07.34.21.0082.01)) of [49], as shown in (15). Consequently, invoking (A2) and (A3) into (A1), we can obtain the inner integral I1 as presented in (13).

Appendix B

Proof of Theorem 3

We can simplify Θ1(η) in (24) as

Θ1=1η1ρ1F|he|2yηη1ηρ1f|hm|2(y)dyF|hp|2ρρ1=[1η1ρ12λmK02yλmdy+4λmλeη1ρ1yηη1ηρ1K12λeyηη1ηρ1×K02yλmdy]12ρρ1λpK12ρρ1λp. (A4)

The first integral in (A4) can easily be simplified with the facts that αg(x)dx=0g(x)dx0αg(x)dx (eq. (6.561.16)) of [48] and (eq. (6.561.8)) of [48], whereas we can simplify the second integral in (A4) by first applying the transformations of variables yηη1ηρ1=t and ηtλm=r and then using (eq. (03.04.26.0009.01)) of [49] and (eq. (07.34.21.0082.01)) of [49]. Consequently, Θ1(η) can be given in (26).

Moreover, we can express Θ2(η) in (24) as

Θ2(η)=ρρ1f|hp|2(y)dyρρ1{y(η1)ρF|he|2xηy(η1)ηρ×f|hm|2(x)dx}f|hp|2(y)dy, (A5)

which can be further expressed after some simplifications as

Θ2(η)=2ρρ1λpK12ρρ1λpρρ1{y(η1)ρf|hm|2(x)×F|he|2xηy(η1)ηρdx}f|hp|2(y)dy. (A6)

The inner integral in (A6) can be evaluated by invoking the CDF of |he|2 and the PDF of |hm|2 and following the same steps as used to simplify the integrals in (A4). Then, invoking the result along with the PDF of |hp|2 into (A6), and after some simplifications, Θ2(η) can be expressed as

Θ2(η)=2ρρ1λpK12ρρ1λp4λpη1ρλmρρ1yK02yλpK12(η1)yρλmdy+2λmλpηλek=0(1)kk!η1ρλmkG3,32,3λmηλe|12,12,k1212,k12,k12ρρ1ykK02yλpdy. (A7)

The first integral (say χ1) in (A7) can be expressed by using the facts that αg(x)dx=0g(x)dx0αg(x)dx and (eq. (03.04.26.0009.01)) of [49] as

χ1=140yG0,22,0(η1)yρλm|12,12G0,22,0yλp|0,0dy140ρρ1yG0,22,0(η1)yρλm|12,12G0,22,0yλp|0,0dy, (A8)

where the first integral in (A8) can readily be simplified using (eq. (07.34.21.0011.01)) of [49], and the second integral in (A8) can be evaluated by first applying the transformation of variables ρ1yρ=t2 and then applying Guass–Lobatto’s quadrature integration [54]. Consequently, χ1 can be given by

χ1=λp324G2,22,2(η1)λpρλm|12,1212,12ρ322ρ132i=1Ngiti2×G0,22,0(η1)ti2ρ1λm|12,12G0,22,0ρti2ρ1λp|0,0. (A9)

Furthermore, we can simplify the second integral (say χ2) of (A7) with the help of (eq. (03.04.26.0009.01)) of [49] and (eq. (07.34.21.0085.01)) of [49] as

χ2=ρρ1k+1G1,33,0ρρ1λp|k1,0,0k. (A10)

Now, invoking (A9) and (A10) into (A7), and after some simplifications, we can express Θ2(η) as presented in (27).

Appendix C

Proof of Theorem 4

With the aid of [56], we can express the ESC in (34) as

C¯secI=1ln(2)0[0yρln(1+x)f|hm|2xyρF|he|2xyρdxT1+0yρln(1+x)f|he|2xyρF|hm|2xyρdxT20yρln(1+x)f|he|2xyρdxT3]f|hp|2(y)dy. (A11)

By invoking the PDF of |hm|2 and the CDF of |he|2 into T1 of (A11), and applying the transformations ln(1+z)=G2,21,2z|1,01,1 (eq. (01.04.26.0003.01)) of [49] and Kν(z)=12G0,22,0(z4|ν2,ν2) (eq. (03.04.26.0009.01)) of [49], and then using (eq. (07.34.21.0011.01)) of [49] and (eq. (07.34.21.0081.01)) of [49], we can obtain T1 as

T1=yρλmG2,44,1yρλm|0,0,1,11,0y32ρ32λmλeG2,2:0,2:0,22,1:2,0:2,032,3232,12|0,0|12,12|yρλm,yρλe. (A12)

On the same line, we can evaluate the integrals T2 and T3 in (A11), respectively, as

T2=yρλeG2,44,1yρλe|0,0,1,11,0y32ρ32λeλmG2,2:0,2:0,22,1:2,0:2,032,3232,12|0,0|12,12|yρλm,yρλe, (A13)
T3=yρλeG2,44,1yρλe|0,0,1,11,0. (A14)

Now, invoking (A12), (A13), and (A14) alongwith the PDF of |hp|2 into (A11), and applying the transformation Kν(z)=12G0,22,0(z4|ν2,ν2) (eq. (03.04.26.0009.01)) of [49], it is observed that the solution of the resultant integral is tedious and intractable. To make the analysis tractable, we first multiply and divide the resultant integral by ey, then simplifying it via Gauss–Laguerre numerical method [54]. Consequently, the ESC expression can be obtained, as shown in (35).

Appendix D

Proof of Theorem 5

The C¯sec,1II of (39) can be expressed in the integral form as

C¯sec,1II=1ln(2)ρρ1[0yρln(1+x)f|hm|2xyρF|he|2xyρdxM1+0yρln(1+x)f|he|2xyρF|hm|2xyρdxM20yρln(1+x)f|he|2xyρdxM3]f|hp|2(y)dy. (A15)

The integrals M1, M2, and M3 of (A15) can be evaluated by following the similar process as used to simplify T1 in (A12), T2 in (A13), and T3 in (A14), respectively. Then, invoking the results along with the PDF of |hp|2 into (A15), and further using the facts that αg(x)dx=0g(x)dx0αg(x)dx and (eq. (03.04.26.0009.01)) of [49], and after some mathematical simplifications, we can express C¯sec,1II as

C¯sec,1II=1ln(2)0yρλmG2,44,1yρλm|0,0,1,11,0y32λm+λeρ32λmλeSyρ×1λpG0,22,0yλp|0,0dy1ln(2)0ρρ11λpG0,22,0yλp|0,0[yρλmG2,44,1yρλm|0,0,1,11,0y32λm+λeρ32λmλeSyρ]dy. (A16)

The first integral in (A16) can be simplified by first multiplying and dividing it by ey, and then applying the Guass–Laguarre quadrature method [54], whereas the second integral in (A16) can be evaluated by first using the transformation of variables ρ1yρ=r2 and then applying Guass–Lobatto’s integration method [54]. Consequently, the resultant expression of C¯sec,1II can be obtained, as presented in (41).

Furthermore, we can express C¯sec,2II of (39) as

C¯sec,2II=1ln(2)[01ρ1ln(1+x)f|hm|2xρ1F|he|2xρ1dx+01ρ1ln(1+x)f|he|2xρ1F|hm|2xρ1dx01ρ1ln(1+x)f|he|2xρ1dx]F|hp|2ρρ1. (A17)

By invoking the PDFs and CDFs of |hm|2 and |he|2 and applying the transformations ln(1+z)=G2,21,2z|1,01,1 (eq. (01.04.26.0003.01)) of [49] and Kν(z)=12G0,22,0(z4|ν2,ν2) (eq. (03.04.26.0009.01)) of [49], and then simplifying the integrals with the help of (eq. (07.34.21.0011.01)) of [49] and (eq. (07.34.21.0081.01)) of [49], we can obtain C¯sec,2II, as given in (42).

Author Contributions

Conceptualization, S.Y. and A.P.; methodology, S.Y., A.P., D.-T.D. and A.S.; software, S.Y. and A.P.; validation, S.Y. and A.P., D.-T.D., B.M.L. and A.S.; formal analysis, S.Y. and A.P.; investigation, S.Y., A.P. and A.S.; resources, A.S.; writing—original draft preparation, S.Y., A.P., D.-T.D., B.M.L. and A.S.; visualization, S.Y., A.P., D.-T.D., B.M.L. and A.S.; funding acquisition, A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work is funded by FCT/MCTES through national funds and when applicable co-funded EU funds under the project UIDB/50008/2020-UIDP/50008/2020.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

This study did not report any data.

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Zhou H., Xu W., Chen J., Weng W. Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities. Proc. IEEE. 2020;108:308–320. doi: 10.1109/JPROC.2019.2961937. [DOI] [Google Scholar]
  • 2.Fallgren M. 5GCAR: Executive Summary. 2019. [(accessed on 18 October 2021)]. Available online: https://5gcar.eu/wp-content/uploads/2019/12/5GCAR-Executive-Summary-White-Paper.pdf.
  • 3.Wong V.W., Schober R., Ng D.W.K., Wang L.C. Key Technologies for 5G Wireless Systems. Cambridge University Press; Cambridge, UK: 2017. [Google Scholar]
  • 4.Kaiwartya O., Kumar S. Intelligent Computing, Networking, and Informatics. Volume 243. Advances in Intelligent Systems and Computing; Springer; New Delhi, India: 2014. Enhanced caching for geocast routing in vehicular Ad Hoc network; pp. 213–220. [Google Scholar]
  • 5.Mumtaz S., Huq K.M.S., Ashraf M.I., Rodriguez J., Monteiro V., Politis C. Cognitive vehicular communication for 5G. IEEE Commun. Mag. 2015;53:109–117. doi: 10.1109/MCOM.2015.7158273. [DOI] [Google Scholar]
  • 6.Eze J., Zhang S., Liu E., Eze E. Cognitive radio-enabled Internet of Vehicles: A cooperative spectrum sensing and allocation for vehicular communication. IET Netw. 2018;7:190–199. doi: 10.1049/iet-net.2017.0225. [DOI] [Google Scholar]
  • 7.Di Felice M., Doost-Mohammady R., Chowdhury K.R., Bononi L. Smart Radios for Smart Vehicles: Cognitive Vehicular Networks. IEEE Veh. Technol. Mag. 2012;7:26–33. doi: 10.1109/MVT.2012.2190177. [DOI] [Google Scholar]
  • 8.Zou Y., Zhu J., Yang L., Liang Y.C., Yao Y.D. Securing physical-layer communications for cognitive radio networks. IEEE Commun. Mag. 2015;53:48–54. doi: 10.1109/MCOM.2015.7263345. [DOI] [Google Scholar]
  • 9.Shu Z., Qian Y., Ci S. On physical layer security for cognitive radio networks. IEEE Netw. 2013;27:28–33. [Google Scholar]
  • 10.Zou Y., Zhu J., Wang X., Hanzo L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE. 2016;104:1727–1765. doi: 10.1109/JPROC.2016.2558521. [DOI] [Google Scholar]
  • 11.Li S., Yang L., Hasna M.O., Alouini M.S., Zhang J. Amount of secrecy loss: A novel metric for physical layer security analysis. IEEE Commun. Lett. 2020;24:1626–1630. doi: 10.1109/LCOMM.2020.2995731. [DOI] [Google Scholar]
  • 12.Chen X., Ng D.W.K., Gerstacker W.H., Chen H.H. A survey on multiple-antenna techniques for physical layer security. IEEE Commun. Surv. Tut. 2017;19:1027–1053. doi: 10.1109/COMST.2016.2633387. [DOI] [Google Scholar]
  • 13.Moualeu J.M., da Costa D.B., Lopez-Martinez F.J., Hamouda W., Nkouatchah T.M., Dias U.S. Transmit antenna selection in secure MIMO systems over α-μ fading channels. IEEE Trans. Commun. 2019;67:6483–6498. doi: 10.1109/TCOMM.2019.2921966. [DOI] [Google Scholar]
  • 14.Park J., Yun S., Kim I., Ha J. Secure communications with a full-duplex relay network under residual self-interference. IEEE Commun. Lett. 2020;24:496–500. doi: 10.1109/LCOMM.2019.2958809. [DOI] [Google Scholar]
  • 15.Le K.N., Bao V.N.Q. Secrecy under Rayleigh-dual correlated Rician fading employing opportunistic relays and an adaptive encoder. IEEE Trans. Veh. Technol. 2020;69:5179–5192. doi: 10.1109/TVT.2020.2979988. [DOI] [Google Scholar]
  • 16.Yang L., Chen J., Jiang H., Vorobyov S.A., Zhang H. Optimal relay selection for secure cooperative communications with an adaptive eavesdropper. IEEE Trans. Wirel. Commun. 2017;16:6–42. doi: 10.1109/TWC.2016.2617328. [DOI] [Google Scholar]
  • 17.Fan L., Lei X., Yang N., Duong T.Q., Karagiannidis G.K. Secrecy cooperative networks with outdated relay selection over correlated fading channels. IEEE Trans. Veh. Technol. 2017;66:7599–7603. doi: 10.1109/TVT.2017.2669240. [DOI] [Google Scholar]
  • 18.Zhao H., Liu Z., Yang L., Alouini M.S. Secrecy analysis in DF relay over Generalized-K fading channels. IEEE Trans. Commun. 2019;67:7168–7182. doi: 10.1109/TCOMM.2019.2926719. [DOI] [Google Scholar]
  • 19.Madeira J., Guerreiro J., Dinis R., Carvalho P., Campos L. On the physical layer security characteristics for MIMO-SVD techniques for SC-FDE schemes. Sensors. 2019;19:4757. doi: 10.3390/s19214757. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 20.Madeira J., Guerreiro J., Serra H., Dinis R., Carvalho P., Campos L. A physical layer security technique for NOMA systems with MIMO SC-FDE schemes. Electronics. 2020;9:240. doi: 10.3390/electronics9020240. [DOI] [Google Scholar]
  • 21.Kumar S., Singh K., Kumar S., Kaiwartya O., Cao Y., Zhou H. Delimitated anti jammer scheme for Internet of Vehicle: Machine learning based security approach. IEEE Access. 2019;7:113311–113323. doi: 10.1109/ACCESS.2019.2934632. [DOI] [Google Scholar]
  • 22.Chakraborty P., Prakriya S. Secrecy outage performance of a cooperative cognitive relay network. IEEE Commun. Lett. 2017;21:326–329. doi: 10.1109/LCOMM.2016.2564380. [DOI] [Google Scholar]
  • 23.Nguyen M.N., Nguyen N.P., Da Costa D.B., Nguyen H.K., De Sousa R.T. Secure cooperative half-duplex cognitive radio networks with K-th best relay selection. IEEE Access. 2017;5:6678–6687. doi: 10.1109/ACCESS.2017.2686984. [DOI] [Google Scholar]
  • 24.Chopra K., Bose R., Joshi A. Secrecy performance of threshold-based cognitive relay network with diversity combining. J. Commun. Netw. 2018;20:383–395. doi: 10.1109/JCN.2018.000054. [DOI] [Google Scholar]
  • 25.Bouabdellah M., Bouanani F.E., Alouini M.S. A PHY layer security analysis of uplink cooperative jamming-based underlay CRNs with multi-eavesdroppers. IEEE Trans. Cog. Commun. Netw. 2020;6:704–717. doi: 10.1109/TCCN.2019.2957081. [DOI] [Google Scholar]
  • 26.Banerjee A., Maity S.P. On residual energy maximization in cognitive relay networks with eavesdropping. IEEE Syst. J. 2019;13:3836–3846. doi: 10.1109/JSYST.2018.2873891. [DOI] [Google Scholar]
  • 27.Zhang T., Cai Y., Huang Y., Duong T.Q., Yang W. Secure transmission in cognitive MIMO relaying networks with outdated channel state information. IEEE Access. 2016;4:8212–8224. doi: 10.1109/ACCESS.2016.2608966. [DOI] [Google Scholar]
  • 28.Zou Y., Li X., Liang Y. Secrecy outage and diversity analysis of cognitive radio systems. IEEE J. Sel. Areas Commun. 2014;32:2222–2236. doi: 10.1109/JSAC.2014.141121. [DOI] [Google Scholar]
  • 29.Li M., Yin H., Huang Y., Fu T., Wang Y., Yu R. Secrecy performance analysis in MISOSE cognitive radio networks over correlated fading; Proceedings of the 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC 2018); Xi’an, China. 25–27 May 2018; pp. 875–879. [Google Scholar]
  • 30.Singh A., Bhatnagar M.R., Mallik R.K. Physical layer security of a multiantenna-based CR network with single and multiple primary users. IEEE Trans. Veh. Technol. 2017;66:11011–11022. doi: 10.1109/TVT.2017.2722014. [DOI] [Google Scholar]
  • 31.Timilsina S., Baduge G.A.A., Schaefer R.F. Secure communication in spectrum-sharing massive MIMO systems with active eavesdropping. IEEE Trans. Cog. Commun. Netw. 2018;4:390–405. doi: 10.1109/TCCN.2018.2833848. [DOI] [Google Scholar]
  • 32.Lei H., Zhang J., Park K.H., Ansari I.S., Pan G., Alouini M.S. Secrecy performance analysis of SIMO underlay cognitive radio systems with outdated CSI. IET Commun. 2017;11:1961–1969. doi: 10.1049/iet-com.2017.0131. [DOI] [Google Scholar]
  • 33.Andersen J.B. Statistical distributions in mobile communications using multiple scattering; Proceedings of the 27th URSI General Assembly; Maastricht, The Netherlands. 17–24 August 2002. [Google Scholar]
  • 34.Salo J., El-Sallabi H.M., Vainikainen P. Statistical analysis of the multiple scattering radio channel. IEEE Trans. Antennas Propag. 2006;54:3114–3124. doi: 10.1109/TAP.2006.883964. [DOI] [Google Scholar]
  • 35.Pandey A., Yadav S. Physical layer security in cooperative AF relaying networks with direct links over mixed Rayleigh and double-Rayleigh fading channels. IEEE Trans. Veh. Technol. 2018;67:10615–10630. doi: 10.1109/TVT.2018.2866590. [DOI] [Google Scholar]
  • 36.Kovács I.Z., Eggers P.C., Olesen K., Petersen L.G. Radio channel description and quality of service for TETRA direct mode operation in forest environments; Proceedings of the IEEE 54th Vehicular Technology Conference, VTC Fall; Atlantic City, NJ, USA. 7–11 October 2001; pp. 1970–1974. [Google Scholar]
  • 37.Kovács I.Z., Eggers P.C., Olesen K., Petersen L.G. Investigations of outdoor-to-indoor mobile-to-mobile radio communication channels; Proceedings of the IEEE 56th Vehicular Technology Conference; Vancouver, BC, Canada. 24–28 September 2002; pp. 430–434. [Google Scholar]
  • 38.Zhang J., Pan G. Secrecy outage analysis with Kth best relay selection in dual-hop inter-vehicle communication systems. AEU—Int. J. Electron. Commun. 2017;71:139–144. doi: 10.1016/j.aeue.2016.10.014. [DOI] [Google Scholar]
  • 39.Pandey A., Yadav S. Secrecy analysis of cooperative vehicular relaying networks over double-Rayleigh fading Channels. Wirel. Pers. Commun. 2020;114:2733–2753. doi: 10.1007/s11277-020-07500-1. [DOI] [Google Scholar]
  • 40.Pandey A., Yadav S. Physical layer security in cooperative amplify-and-forward relay networks over mixed Nakagami-M Double Nakagami-m Fading Channels: Perform. Eval. Optimisation. IET Commun. 2020;14:95–104. doi: 10.1049/iet-com.2019.0584. [DOI] [Google Scholar]
  • 41.Ahn N., Lee D., Oh S. Vehicle Communication Using Secrecy Capacity. In: Arai K., Bhatia R., Kapoor S., editors. Proceeding FTC. Springer International Publishing; Cham, Switzerland: 2019. pp. 158–172. [Google Scholar]
  • 42.Duy T.T., Alexandropoulos G.C., Tung V.T., Son V.N., Duong T.Q. Outage performance of cognitive cooperative networks with relay selection over double-Rayleigh fading channels. IET Commun. 2016;10:57–64. doi: 10.1049/iet-com.2015.0236. [DOI] [Google Scholar]
  • 43.Lee J., Lee J.H., Bahk S. Performance analysis for multi-hop cognitive radio networks over cascaded Rayleigh fading channels with imperfect channel state information. IEEE Trans. Veh. Technol. 2019;68:10335–10339. doi: 10.1109/TVT.2019.2938308. [DOI] [Google Scholar]
  • 44.Ata S.O., Erdogan E. Secrecy outage probability of inter-vehicular cognitive radio networks. Int. J. Commun. Sys. 2019;33:e4244. doi: 10.1002/dac.4244. [DOI] [Google Scholar]
  • 45.Tashman D.H., Hamouda W. Physical-layer security for cognitive radio networks over cascaded Rayleigh fading channels; Proceedings of the IEEE Global Communications Conference (GLOBECOM 2020); Taipei, Taiwan. 7–11 December 2020; pp. 1–6. [Google Scholar]
  • 46.Yadav S., Pandey A. Secrecy performance of cognitive vehicular radio networks: Joint impact of nodes mobility and imperfect channel estimates; Proceedings of the IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom); Odessa, Ukraine. 26–29 May 2020; pp. 1–7. [Google Scholar]
  • 47.Pandey A., Yadav S. Joint impact of nodes mobility and imperfect channel estimates on the secrecy performance of cognitive radio vehicular networks over Nakagami-M Fading Channels. IEEE Open J. Veh. Technol. 2021;2:289–309. doi: 10.1109/OJVT.2021.3087637. [DOI] [Google Scholar]
  • 48.Gradshteyn I.S., Ryzhik I.M. Tables of Integrals, Series, and Products. 6th ed. Academic Press; New York, NY, USA: 2000. [Google Scholar]
  • 49.The Wolfram Functions Site [Online] [(accessed on 18 October 2021)]. Available online: Http://functions.wolfram.com.
  • 50.Patel C.S., Stuber G.L., Pratt T.G. Simulation of Rayleigh-faded mobile-to-mobile communication channels. IEEE Trans. Commun. 2005;53:1876–1884. doi: 10.1109/TCOMM.2005.858678. [DOI] [Google Scholar]
  • 51.Patzold M., Hogstad B.O., Youssef N. Modeling, analysis, and simulation of MIMO mobile-to-mobile fading channels. IEEE Trans. Wirel. Commun. 2008;7:510–520. doi: 10.1109/TWC.2008.05913. [DOI] [Google Scholar]
  • 52.Ghasemi A., Sousa E.S. Fundamental limits of spectrum-sharing in fading environments. IEEE Trans. Wirel. Commun. 2007;6:649–658. doi: 10.1109/TWC.2007.05447. [DOI] [Google Scholar]
  • 53.Duong T.Q., da Costa D.B., Elkashlan M., Bao V.N.Q. Cognitive amplify-and-forward relay networks over Nakagami-m fading. IEEE Trans. Veh. Technol. 2012;61:2368–2374. doi: 10.1109/TVT.2012.2192509. [DOI] [Google Scholar]
  • 54.Abramowitz M., Stegun I.A. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. National Bureau of Standards; Washington, DC, USA: 1972. [Google Scholar]
  • 55.Ansari I.S., Al-Ahmadi S., Yilmaz F., Alouini M.S., Yanikomeroglu H. A new formula for the BER of binary modulations with dual-branch selection over generalized-K composite fading channels. IEEE Trans. Commun. 2011;59:2654–2658. doi: 10.1109/TCOMM.2011.063011.100303A. [DOI] [Google Scholar]
  • 56.Lei H., Zhang H., Ansari I.S., Gao C., Guo Y., Pan G., Qaraqe K.A. Performance analysis of physical layer security over generalized-K fading channels using a mixture Gamma distribution. IEEE Commun. Lett. 2016;20:408–411. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

This study did not report any data.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES