Next Article in Journal
Special Issue on Fatigue and Fracture of Non-Metallic Materials and Structures
Next Article in Special Issue
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles
Previous Article in Journal
Antibacterial Activity of Indolicidin-Coated Silver Nanoparticles in Oral Disease
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers

1
College of Communication Engineering, Army Engineering University of PLA, Nanjing 210007, China
2
College of Medical Information Engineering, Zunyi Medical University, Zunyi 563006, China
3
The Sixty-third Research Institute, National University of Defense Technology, Nanjing 210007, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(5), 1840; https://doi.org/10.3390/app10051840
Submission received: 24 January 2020 / Revised: 19 February 2020 / Accepted: 3 March 2020 / Published: 7 March 2020
(This article belongs to the Special Issue Security Protocols for Embedded Wireless Devices)

Abstract

:
This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while the malicious eavesdropper (Eve) is used to eavesdrop the confidential information from Alice and Relay. To improve security, we design two transmission schemes, namely maximal-ratio combining/maximal-ratio transmission-selection combining (MRC/MRT-SC) with half-duplex (HD) receiver and maximal-ratio combining-zero forcing beamforming/maximal-ratio transmission-selection combining-zero forcing beamforming (MRC-ZFB/MRT-SC-ZFB) with full-duplex (FD) receiver. To evaluate the secrecy performance obtained from the proposed schemes comprehensively, the new closed-form and simple asymptotic expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) of our considered networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes are derived, respectively. Thus, we explore the effect of various schemes on system secrecy performance in terms of SOP and ST. Analytical results and numerical simulations demonstrate that MRC-ZFB/MRT-SC-ZFB achieves better performance in the two proposed schemes. In particular, we show that the FD receiver plays a crucial role in designing the cognitive wiretap networks for protecting the legitimate link against attack from the malicious eavesdropping.

1. Introduction

The dramatic needs in wireless communications service have resulted in higher requirements for more spectrums. Cognitive radio networks (CRNs) aim to effectively address spectrum scarcity and have attracted much attention from the research communities [1,2,3,4]. In spectrum sharing CRNs, the unlicensed secondary users (SUs) can have access to the licensed primary users’ (PUs) spectrum in the condition that the interference power at the PU does not surpass a certain value [5]. Not only are CRNs expected to increase spectrum reuse, but they are also taken the low complexity of implementation into consideration. Thus, the underlay scheme has attracted growing attention, where the interference of SUs to the PUs should be guaranteed not to exceed a given threshold.

1.1. Background

Due to the open nature of CRNs, they are vulnerable to illegal attacking and malicious eavesdropping, which would result in many challenging issues, especially security. Traditional security policies are not applicable to meet the security requirements of CRNs. Motivated by the problem, physical layer security (PLS) has been conceived as a new paradigm to guarantee secure transmissions while overcoming the vulnerabilities of traditional higher layer cryptography. For enhancing the PLS of wireless transmissions, many works have been explored. The orthogonal frequency-division multiplexing of CRNs as the medium access technique is put forward to show the performance of PLS in [6]. In [7,8], the authors proposed multiuser scheduling-aided energy harvesting to improve PLS in CRNs. The maximizing secrecy capacity of CRNs through zero forcing beamforming (ZFB) was investigated in [9]. There is still a lot of previous work that has been done on PLS of CRNs. In [10], the security strategy deployment for switches on core network is proposed to enhance network’s performance in cognitive internet of vehicles. In [3,11,12], the authors proposed different protocols to enhance the secrecy performance of CRNs. The device-to-device (D2D), the non-orthogonal multiple access (NOMA), buffer-aided technology and millimeter-wave (mmWave) were also used to improve the communication quality of CRNs [13,14,15,16,17].
With the maturity of self-interference cancellation technology, full-duplex (FD) technology is becoming more widely used. It is worth highlighting that lots of scholars are focusing on the full-duplex (FD) and have extensively applied it in many areas. On the one hand, the FD technique is proposed for the sake of enhancing the performance of the traditional cooperative jamming scheme (TCJS). The core part of full-duplex jamming scheme (FDJS) is that the FD user is able to transmit jamming signal and receive the required signal at the same time, and has been widely used in 5G communication systems [18]. In [19,20] , authors have fully demonstrated the application of FD technology in CRNs. Different from TCJS, FDJS is much easier and more reliable to realize. In [12], the authors designed different antenna reception schemes of FD operations, where the secrecy performance of system is enhanced through transmitting jamming signals and receiving legal signal at the same time. In [21], the authors analyzed the different relay selection schemes for the FD heterogeneous networks with multiple cognitive radio eavesdroppers to improve the secrecy performance of system. In [22], the authors analyzed collaboration interference (CI) transmission scheme of the FD wireless wiretap networks for improving PLS in CRNs. In [23], the authors explored that receiving antenna can send jamming signals at the time of receiving information and energy to degrade the eavesdropper’s decoding capacity through FD operation, which was put forward to enhance the PLS. On the other hand, the beamforming with artificial noise (AN) of FD operation can effectively decrease the eavesdropping efficiency of eavesdropping users by sending interfering signals. However, beamforming with AN is different from beamforming in traditional networks because there are following aspects should be considered in CRNs. First, the interference power of PU should be taken into consideration in the process of designing beamforming scheme, that is, the quality of service (QoS) of PUs are ensured. Second, in [24,25,26], the SU transmitter can obtain SU receiver channel state information (CSI) through a pilot signal transmitted by SU receiver. Secure transmission in a multiple-input single-output multi-eavesdropper CRNs was investigated in [26] with the aim of maximizing the ergodic secrecy rate by beamforming and AN. In [27], AN was introduced in D2D to interfere with illegal eavesdropping of eavesdropping nodes, and the closed-form expression of SOP was further obtained to verify the impact on system performance. An artificial-noise-aided CJS was proposed to improve the PLS under the energy harvesting constraints and practical secrecy rate in [28].

1.2. Motivation and Contribution

Motivated by the discussion mentioned above,we investigate secure transmission in the dual-hop cognitive wiretap networks with FD receiver over Rayleigh fading channels under two different scenarios, in which the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the presence of a multi-antenna relay (Relay), while the eavesdropper (Eve) is to eavesdrop the confidential information from Alice and Relay. The randomize-and-forward (RaF) transmission protocol has been widely used in different phases of physical layer security in CRNs. Since there is the transmission heterogeneity of the two transmitters, the eavesdropper cannot merge the common information of the two phases [29,30]. Relay is considered the half-duplex (HD) operation and Bob is considered the FD beamforming with AN operation to prevent overheard by the eavesdropper. To be specific, for the HD operation, the Relay utilize maximal-ratio combining (MRC) to pay more attention to the signal detection from Alice and send data to Bob by using maximal-ratio transmit (MRT) scheme, and then Bob receives signals forwarded from the Relay through using the selection combining (SC) scheme. While for the FD operation, MRC-ZFB/MRT-SC-ZFB secure transmission schemes are proposed, Relay first adopts MRC scheme to receive the data forwarded from Alice and at the same time Bob uses the ZFB scheme to transmit AN signals to reduce the illegal wiretapping of users at the first phase. At the second phase, Relay utilizes MRT scheme to send security information to Bob, and then Bob selects the best antenna to receive information from Relay and simultaneously transmits the jamming signal by utilizing the remaining antennas with FD operation. Our principal contributions are highlighted as follows:
  • We first derive closed-form and simple asymptotic expressions for the secrecy outage probability (SOP) and the secrecy throughput (ST) of the FD receiver cognitive wiretap networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes, respectively [31]. Moreover, we also explore the impact of the various system parameters on the SOP and ST, i.e., the number of antennas and the interference threshold at Relay and Bob.
  • We further derive the asymptotic closed-form expressions for the SOP and the secrecy diversity order and secrecy coding gain are achieved under two different scenarios, namely Scenario I: γ ¯ B and fixed γ ¯ E , and Scenario II: γ ¯ B and γ ¯ E , which reveals that the influence of system performance under the high signal-to-noise ratio (SNR). Two distinct scenarios can achieve the same secrecy diversity ( min N R , N R N B ) under Scenario I and zero secrecy diversity under Scenario II, where γ ¯ B and γ ¯ E denote the average SNR of the main channel and the eavesdropping channel, respectively.
  • Through the derivation and analysis of the SOP and ST, it has been verified that the MRC-ZFB/MRT-SC-ZFB scheme of FD operation at Bob outperforms MRC/MRT-SC scheme of HD operation in terms of enhancing secrecy performance of CRNs. The attained asymptotic expressions shed lights on the impact of distinct system parameters, i.e., increasing interference threshold of the primary network within a certain range and the number of antennas at the Relay and Bob. The beamforming of AN design can effectively improve the secrecy performance of the considered networks and the secrecy performance of the considered scheme with FD operation is mainly affected by the secrecy coding gain.
The remainder of the paper is organized as follows. In Section 2, the proposed system model is described. The SOPs of the system for the secondary data transmission are analyzed in Section 3. In Section 4, we provide the SOPs of the system under the high SNR analysis and ST. In Section 5, the numerical results and discussions are presented. Finally, we concludes this paper in Section 6.

2. System Model

As shown in Figure 1, Let us consider a secure transmission in cognitive wiretap networks with FD receiver consisting of a secondary user (SU) transmitter (Alice), a legitimate SU receiver (Bob), a relay (Relay), a primary user receiver (PU) and a passive eavesdropper (Eve). A transmitter Alice, an eavesdropper Eve and a primary user receiver only have a single antenna, while a secondary Relay and Bob are equipped with multiple antennas, which are denoted by N R and N B , respectively. As in, it is assumed that in this paper the Alice, Relay, Bob and Eve nodes are located in the same cluster far away from the primary user transmitter, and hence there is no direct link from the Alice–Bob and the link security information can only be transmitted through the Relay node. In this paper, we assume that both main and wiretap channels experience quasi-static independent block Rayleigh fading. The malicious eavesdropper has strong eavesdropping ability. The channel coefficient between M and N nodes, termed as h M N , is an distributed random variable (RV) with zero mean and variance λ M N as denoted by C N 0 , λ M N . As in [20,32,33,34], legitimate channel state information (CSI) is assumed available at the Relay and Bob, namely the CSI of Alice-Relay and Relay–Bob. Recently, with advances on self-interference (SI) cancellation technology, we assume that the SI can be completely suppressed of the relay–relay link [11,20]. For investigating the advantages of FD Bob, we explore two distinct secure transmission schemes, namely MRC/MRT-SC scheme of HD operation and MRC-ZFB/MRT-SC-ZFB scheme of FD operation. For MRC-ZFB/MRT-SC-ZFB scheme, the CSI of the eavesdropping links is available for Bob, i.e., the CSI of Bob-Eve link. According to [12,33,35] and the mutual reciprocity of the channels, the Bob can obtain a reliable feedback CSI from the Eve in the condition of time-division duplex transmission.

2.1. MRC/MRT-SC with HD Scenario

The secure MRC/MRT-SC protocol employs two phases. For MRC phase, the Alice transfers information to the Relay, and Relay receives a radio signals through MRC scheme based on HD operation. Thus, the instantaneous SNR at Relay can be represented as
γ A R , 1 = P S σ R 2 h A R 2 ,
where σ R 2 denotes the noise variance at Relay, h A R is an N R × 1 channel link vector Alice-Bob, and the transmit power of Alice is denoted by P S , which should be varied as [36]
P S = min Q h A P 2 , P t ,
where Q and P t are the interference temperature constraint and the maximum transmit power constraint at PU and Alice, respectively. h A P is the channel coefficient for the Alice–PU link.
Similarly, define the SNR at node Eve as γ A E , 1 , and γ A E , 1 is given by
γ A E , 1 = P S h A E 2 σ E 2 ,
where σ E 2 denotes the noise variance at Eve, h A E is the channel coefficient for Alice–Eve link.
For MRT-SC phase, the Relay transfers information to the Relay by applying MRT-SC scheme based on HD operation which is similar to analysis of the MRC phase to transmit signal. Therefore, the instantaneous SNR for the Bob can be represented as
γ R B , 1 = P R max i N B h R B i 2 σ B 2 ,
where h R B i refers to the N R × 1 channel vector between Relay and the i-th receive antenna at Bob, σ B 2 refers to the noise variance at Bob, and the transmit power of Relay is denoted by P R , which must satisfy P R = min Q h R P 2 , P t . h R P is the Rayleigh channel and obeys the exponential distribution [37].
Similarly, define the SNR at node Eve as γ R E , 1 , and γ R E , 1 is given by
γ R E , 1 = P R h R E 2 σ E 2 ,
in which h RE is the channel coefficient for Relay-Eve link.

2.2. MRC-ZFB/MRT-SC-ZFB with FD Scenario

The secure MRC-ZFB/MRT-SC-ZFB protocol employs two phases and the beamforming vector w Z F , w Z F 1 are designed for each phase. For MRC-ZFB phase, we put forward an optimal beamforming scheme which maximizes the achievable secrecy rate of MRC-ZFB CRNs based on FD operation. Relay can adopt N R antennas gain for receiving the signal from the Alice by MRC operation, and Bob uses N B antennas for transmitting jamming signals to eavesdropper Eve simultaneously by using ZFB operation. ZFB is employed to get rid of malicious jamming signals for meeting the constraints at PU.
Now, defining the N B × 1 + N R channel matrix, i.e., H B Z = h B P , H B R , where h B P , H B R are N B × 1 , N R × N B channel link matrices Bob-PU and Bob-Relay, respectively, but the number of the antennas at Bob should be more than N R + 1 N B > N R + 1 . It is assumed that Relay employs a linear receiver w r with h A R = 1 for detecting signal. Additionally, MRC is employed at the Relay, denoted as w r = h A R / h A R [38]. The optimal expression of the weight vector w Z F is given by
max w Z F h B E 1 w Z F s . t . h B P w Z F = 0 , h A R H B R w Z F = 0 & w Z F F = 1 ,
where † and · F are the conjugate transpose operator and the Frobenius norm, respectively. h B E 1 denotes the N B × 1 channel vector between N B antennas of Bob and Eve. h A R H B R denotes the 1 × N B channel vector between Relay and Bob. By applying the projection matrix theory [39], weight vector w Z F is given by
w Z F = T h B E 1 T h B E 1 ,
where T = I H B Z H B Z H B Z 1 H B Z is the correlation matrix with rank N B N R + 1 . Consequently, the instantaneous SNR at the Relay and the instantaneous signal-to-interference-plus-noise ratio (SINR) at the Eve are written as
γ A R , 2 = P S σ R 2 h A R 2 ,
and
γ A E , 2 = P S h A E 2 P J h B E 1 w Z F 2 + σ E 2 ,
where the interference power of Bob–Eve is denoted by P J . For the FD mechanism, when researchers investigate the performance limitations of information theory (such as capacity), the assumption that SI is not taken into consideration is widely used [33].
Therefore, for solving the closed-form expressions of SOP of FD operation at Bob, a detailed introduction will be presented in Section 3.
For MRT-SC-ZFB with FD phase, the Relay uses the N R antennas to transmit information to Bob. Then Bob selects the best i-th antenna to receive information from Relay and the remaining N B 1 antennas transmit the jamming signal to Eve simultaneously. Therefore, Relay adopts MRT operation to decode and retransmit signal, and Bob adopts SC-ZFB operation to receive signals simultaneously to transmit jamming signals. The aim of SC-ZFB operation is to maximize the received SNR at Bob while avoiding the leakage of security information to the Eve and the interference to PU.
For the MRT-SC-ZFB phase, it requires N B 3 . Thus, the optimal expression of the optimal weight vector w Z F 1 is expressed as
max w Z F 1 h B E 2 w Z F 1 s . t . h B P w Z F 1 & w Z F 1 F = 1 ,
where h B E 2 denote the N B 1 × 1 channel vector between the remaining N B 1 antennas of Bob and Eve. h B P denote the N B 1 × 1 channel vector between the remaining N B 1 antennas of Bob and PU. By applying projection matrix theory, weight vector w Z F 1 is given by
w Z F 1 = Ξ h B E 2 Ξ h B E 2 ,
where Ξ = I h B P h B P h B P 1 h B P is the correlation matrix with rank N B 2 . Hence, the instantaneous SNR at the Bob and the instantaneous SINR at the Eve are written as
γ R B , 2 = P R max i N B h R B i 2 σ B 2 ,
and
γ R E , 2 = P R h R E 2 P J h B E 2 w Z F 1 2 + σ E 2 .
As mentioned before, the precoding matrix w Z F and w Z F 1 are designed for MRC-ZFB and MRT-SC-ZFB schemes so that the AN signal is wholly eliminated at the Bob–Relay and Bob–PU. It is clearly noted that in the MRC-ZFB/MRT-SC-ZFB with FD scenario, jamming signal is transmitted throughout the information transmission process to degrade the eavesdropping channel capacities of Alice–Eve and Relay–Eve links, and it does not interfere with the PU.
However, both γ A R , j , γ A E , j , γ R B , j and γ R E , j are affected by the common variable RV, j 1 , 2 represent scheme 1 and scheme 2, respectively. G = h A P 2 and G 1 = h R P 2 in P S and P R . To solve this problem, we should derive the Cumulative Distribution Function (CDF) of γ A R , j and γ R B , j , and Probability Density Function (PDF) of γ A E , j and γ R E , j conditioned on G and G 1 .
According to RaF protocol, the SOPs of the two different phases are independent. A fundamental secrecy performance criterion in the complete Alice–Bob process is instantaneous secrecy capacity, which is represented as
C S , k = max C B k C E k , 0 + ,
where C B k = log 2 1 + γ B k and C E k = log 2 1 + γ E k represent the capacities of the main channel and eavesdropping channel links, respectively, and k = 1 , 2 stands for the first phase and the second phase, respectively. For maximizing the secrecy capacity C S , k , the main channel need to maximize C B k and the eavesdropping channel need to minimize C E k through the number of N R and N B at the Relay and Bob in two different phases. Two different phases of each scenario have independent transmission processes. μ = Q P t , ε = λ R B λ A R , η = λ R E λ A E , γ ¯ J = P J σ 2 λ J E , γ ¯ B = P t σ R 2 λ A R = Q μ σ R 2 λ A R = P t ε σ B 2 λ R B = Q ε μ σ B 2 λ R B and γ ¯ E = P t σ E 2 λ A E = Q μ σ E 2 λ A E = P t η σ E 2 λ R E = Q η μ σ E 2 λ R E are defined in this paper for doing simple notational analysis.

3. Secrecy Performance Analysis

In this part, we study the SOP of the secure transmission in the dual-hop cognitive wiretap networks with FD receiver under two different scenarios. The SOP, defined as the probability of the secrecy capacity, C S , is less than a given threshold, R S . According to RaF protocol [20,40], we only solve the SOP of each independent phase. Mathematically, given by
P o u t R S = Pr C S , k < R S = 0 F γ B k 2 R s 1 + y 1 f γ E k y d y .
where C S , k and R S represent instantaneous secrecy rate and a predetermined threshold, respectively. Furthermore, the outage probability of P o u t R S is expressed as
P o u t R S = 1 Pr C S , 1 ζ > R S Pr C S , 2 ξ > R S ,
where C S , 1 ζ and C S , 2 ξ refer to the instantaneous secrecy rate of the first phase and the second phase, respectively, ζ (MRC, MRC-ZFB) in the first phase, ξ (MRT-SC,MRT-SC-ZFB) in the second phase. The instantaneous SOP of C S , 1 M R C and C S , 2 M R T S C in MRC/MRT-SC scheme are written as
C S , 1 M R C = log 2 1 + γ A R , 1 1 + γ A E , 1 = log 2 1 + min Q h A P 2 , P t h A R 2 σ R 2 1 + min Q h A P 2 , P t h A E 2 σ E 2 ,
and
C S , 2 M R T S C = log 2 1 + γ R B , 1 1 + γ R E , 1 = log 2 1 + min Q h R P 2 , P t max i N B h R B i 2 σ B 2 1 + min Q h R P 2 , P t h R E 2 σ E 2 .
The instantaneous SOP of C S , 1 M R C Z F B and C S , 2 M R T S C Z F B in MRC-ZFB/MRT-SC-ZFB scheme are formulated as
C S , 1 M R C Z F B = log 2 1 + γ A R , 2 1 + γ A E , 2 = log 2 1 + min Q h A P 2 , P t h A R 2 σ R 2 1 + min Q h A P 2 , P t h A E 2 P J h B E 1 w Z F 2 + σ E 2 ,
and
C S , 2 M R T S C Z F B = log 2 1 + γ R B , 2 1 + γ R E , 2 = log 2 1 + min Q h R P 2 , P t max i N B h R B i 2 σ B 2 1 + min Q h R P 2 , P t h R E 2 P J h B E 2 w Z F 1 2 + σ E 2 .
In order to solve (16), P o u t R S needs to use (17), (18), (19) and (20). We have
Pr C S , 1 ζ > R S = 1 Pr γ 1 ζ 2 R S = 1 F γ 1 ζ R S ,
and
Pr C S , 2 ξ > R S = 1 Pr γ 2 ξ 2 R S = 1 F γ 2 ξ R S ,
where Pr γ 1 ζ 2 R S and Pr γ 2 ξ 2 R S are the SOP of the first phase and second phase of each scenario, respectively. Furthermore,
γ 1 M R C = 1 + min Q h A P 2 , P t h A R 2 σ R 2 1 + min Q h A P 2 , P t h A E 2 σ E 2 ,
with
γ 2 M R T S C = 1 + min Q h R P 2 , P t max i N B h R B i 2 σ B 2 1 + min Q h R P 2 , P t h R E 2 σ E 2 ,
and
γ 1 M R C Z F B = 1 + min Q h A P 2 , P t h A R 2 σ R 2 1 + min Q h A P 2 , P t h A E 2 P J h B E 1 w Z F 2 + σ E 2 ,
with
γ 2 M R T S C Z F B = 1 + min Q h R P 2 , P t max i N B h R B i 2 σ B 2 1 + min Q h R P 2 , P t h R E 2 P J h B E 2 w Z F 1 2 + σ E 2 .
F γ 1 ζ R S and F γ 2 ξ R S are CDF of γ 1 ζ and γ 2 ξ , respectively. Armed with (15), the expression of P o u t R S will be presented in the following Lemma.
Lemma 1.
The P o u t R S of Alice-Bob link channel is expressed as
P o u t R S = F γ 1 ζ R S + F γ 2 ξ R S F γ 1 ζ R S F γ 2 ξ R S .
Next, we will solve the F γ 1 ζ R S and F γ 2 ξ R S of two different scenarios according to Lemma 1.

3.1. MRC/MRT-SC with HD Scenario

For MRC phase, observing from (1), (3) and [11], the conditional CDF of γ A R , 1 and the conditional PDF of γ A E , 1 , are respectively written as
F γ A R , 1 x | G = 1 exp σ R 2 P S λ A R x k = 0 N R 1 1 k ! σ R 2 x P S λ A R k ,
and
f γ A E , 1 y | G = σ E 2 P S λ A E exp σ E 2 P S λ A E y .
Then, substituting (28) and (29) into (15), the conditional F γ A R , 1 R S | G is given by
F γ A R , 1 R S | G = 0 F γ A R , 1 2 R S 1 + y 1 | G f γ A E , 1 y | G d y = 1 exp σ R 2 2 R S 1 P S λ A R k = 0 N R 1 1 k ! σ R 2 P S λ A R k σ E 2 P S λ A E × i = 0 k k i 2 R S i 2 R S 1 k i i ! P S λ A R P S λ A E σ R 2 2 R S P S λ A E + P S λ A R i + 1 .
The random variable G = h A P 2 obeys the exponential distribution, and the PDF expression of G is given by
f G g = 1 λ A P exp 1 λ A P g .
Thus, by using (30) and (31), we can write the CDF of γ A R , 1 for the MRC operation with the HD mechanism in the following theorem.
Theorem 1.
By using MRC scheme we can calculate the CDF of γ A R , 1 , which can be derived as
F γ 1 M R C R S = 1 k = 0 N R 1 1 k ! 1 γ ¯ B k γ ¯ E i = 0 k k i 2 R S 1 k i 2 R s i i ! γ ¯ B γ ¯ E 2 R S γ ¯ E + γ ¯ B i + 1 × 1 exp μ λ A P exp 2 R S 1 γ ¯ B + μ λ A P γ ¯ B λ A P 2 R S 1 λ A P + γ ¯ B μ k i + 1 × Γ k i + 1 , 2 R S 1 λ A P + μ γ ¯ B γ ¯ B λ A P ,
where Γ · , · is the incomplete upper gamma function, as defined in (Equation (8.350.2), [41]).
Proof of Theorem 1.
See Appendix A. □
For MRT-SC phase, observing from (4), (5), [12,42], the conditional CDF of γ R B , 1 and the conditional PDF of γ R E , 1 , are respectively given by
F γ R B , 1 y | G 1 = i = 0 N B N B i 1 i exp i σ B 2 y P R λ R B Θ N R , i σ B 2 y P R λ R B ϕ ,
and
f γ R E , 1 y | G 1 = σ E 2 P R λ R E exp σ E 2 P R λ R E y ,
where Θ N R , i = n 1 = 0 q n 2 = 0 n 1 · · · n N R 1 = 0 n N R 2 q ! n N R 1 ! i = 1 N R 1 i ! n i + 1 n i n i 1 n i ! , with n 0 = q , n N R = 0 , and ϕ = q 0 = 1 N R 1 n q 0 . Then, substituting (33) and (34) into (15), the conditional F γ R B , 1 R S | G 1 is written as
F γ R B , 1 R S | G 1 = 0 F γ R B , 1 2 R S 1 + y 1 f γ R E , 1 y d y = i = 0 N B N B i 1 i exp i 2 R S 1 σ B 2 P R λ R B Θ N R , i σ E 2 P R λ R E σ B 2 P R λ R B ϕ × j = 0 ϕ ϕ j 2 R S 1 ϕ j 2 j R S j ! P R λ R B P R λ R E σ B 2 i 2 R S P R λ R E + P R λ R B j + 1 .
The random variable G 1 = h R P 2 also obeys the exponential distribution, and the PDF expression of G 1 can be written as f G 1 g = 1 λ R P exp 1 λ R P g .
Thus, by using (35) and f G 1 g , we can write the CDF of γ R B , 1 for the MRT-SC scheme with the HD mechanism in the following theorem.
Theorem 2.
By using MRT-SC scheme we can calculate the CDF of γ R B , 1 , which can be derived as
F γ 2 M R T S C R S = i = 0 N B N B i 1 i Θ N R , i j = 0 ϕ ϕ j 2 R S 1 ϕ j 1 ε γ ¯ B ϕ 2 j R S j ! × ε γ ¯ B η γ ¯ E i 2 R S η γ ¯ E + ε γ ¯ B j + 1 1 η γ ¯ E exp i 2 R S 1 ε γ ¯ B 1 exp μ λ R P + μ λ R P × i 2 R S 1 λ R P + μ ε γ ¯ B ε γ ¯ B λ R P ϕ j + 1 Γ ϕ j + 1 , i 2 R S 1 λ R P + μ ε γ ¯ B ε γ ¯ B λ R P .
In this phase, the proof process of F γ 2 M R T S C R S for the MRT-SC scheme is similar with Theorem 1, and will not be elaborated here.
Substituting (32) and (36) into (27), the closed-form expression of SOP of MRC/MRT-SC for P o u t M R C / M R T S C R S is attained after some simple mathematical manipulations. In (27), replacing ζ , ξ with MRC and MRT-SC, respectively.

3.2. MRC-ZFB/MRT-SC-ZFB with FD Scenario

For MRC-ZFB phase, observing from (8) and (9), and in the presence of [12], the conditional CDF of γ A R , 2 can be written as
F γ A R , 2 x | G = 1 exp σ R 2 P S λ A R x k = 0 N R 1 1 k ! σ R 2 x P S λ A R k .
Lemma 2.
The conditional PDF of γ A E , 2 is given by
f γ A E , 2 ( y | G ) = σ E 2 P S λ A E P S λ A E P J λ J E y + P S λ A E N B 2 exp y σ E 2 P S λ A E + exp σ E 2 y P S λ A E × N B 2 P J λ J E P S λ A E N B 2 P J λ J E y + P S λ A E N B 1 .
Proof of Lemma 2.
See Appendix B. □
Then, substituting (37) and (38) into (15), the conditional F γ A R , 2 R S | G is derived as
F γ A R , 2 R S | G = 0 F γ A R , 2 2 R S 1 + y 1 f γ A E , 2 y d y = 1 0 exp σ R 2 2 R S 1 + y 1 P S λ A R k = 0 N R 1 1 k ! σ R 2 2 R S 1 + y 1 P S λ A R k σ E 2 P S λ A E exp y σ E 2 P S λ A E P S λ A E P J λ J E y + P S λ A E N B 2 d y K 1 0 exp σ R 2 2 R S 1 + y 1 P S λ A R k = 0 N R 1 1 k ! σ R 2 2 R S 1 + y 1 P S λ A R k exp y σ E 2 P S λ A E N B 2 P J λ J E P S λ A E N B 2 P J λ J E y + P S λ A E N B 1 d y K 2 .
Then, we can operate several mathematical manipulations. By making use of (Equation (9.211.4), [41]), K 1 and K 2 can be rewritten as
K 1 = exp σ R 2 2 R S 1 P S λ A R k = 0 N R 1 1 k ! σ R 2 P S λ A R k i = 0 k k i 2 R S 1 k i 2 i R S σ E 2 P S λ A E × P S λ A E P J λ J E i + 1 Ψ i + 1 , 4 + i N B , 2 R S P S λ A E + P S λ A R P S λ A R P J λ J E Γ i + 1 ,
and
K 2 = exp σ R 2 2 R S 1 P S λ A R k = 0 N R 1 1 k ! σ R 2 P S λ A R k i = 0 k k i 2 R S 1 k i N B 2 × P S λ A E P J λ J E i Ψ i + 1 , 3 + i N B , 2 R S P S λ A E + P S λ A R P S λ A R P J λ J E 2 i R S Γ i + 1 ,
where Ψ · , · ; · being the confluent hypergeometric function of second kind.
Thus, the conditional F A R , 2 R S | G can be rewritten as
F A R , 2 R S | G = 1 K 1 K 2 .
Hence, the F γ 1 M R C Z F B R S can be derived as
F γ 1 M R C Z F B R S = 0 1 K 1 K 2 f G g d g .
Now, substituting (31) into (43), we can write the CDF of γ A R , 2 for the MRC-ZFB scheme with the FD mechanism in the following theorem.
Theorem 3.
By using MRC-ZFB scheme we can calculate the CDF of γ A R , 2 , which can be derived as
F γ 1 M R C Z F B R S = 1 k = 0 N R 1 1 k ! 1 γ ¯ B k i = 0 k k i 2 R S 1 k i 2 i R S γ ¯ E γ ¯ J i Γ i + 1 × 1 γ ¯ J Ψ i + 1 , 4 + i N B , 2 R S γ ¯ E + γ ¯ B γ ¯ B γ ¯ J + N B 2 × Ψ i + 1 , 3 + i N B , 2 R S γ ¯ E + γ ¯ B γ ¯ B γ ¯ J exp 2 R S 1 γ ¯ B + μ λ A P 2 R S 1 λ A P + μ γ ¯ B γ ¯ B λ A P k i + 1 1 exp μ λ A P × Γ k i + 1 , 2 R S 1 λ A P + μ γ ¯ B γ ¯ B λ A P .
In this phase, the proof process of F γ 1 M R C Z F B R S for the MRC-ZFB scheme is similar with Theorem 1, and will not be elaborated here.
For MRT-SC-ZFB phase, observing from (12) and (13), and by making use of [12], conditional CDF of γ R B , 2 and conditional PDF of γ R E , 2 are respectively presented as F γ R B , 2 y | G 1 and f γ R E , 2 ( y | G 1 ) . These processes are similar to (33) and (38). By replacing γ R B , 1 with γ R B , 2 , which also satisfies the condition of Θ N R , i , n 0 , n N R and ϕ in (33). In (38), G G 1 , P S P R and λ A E λ R E .
Then, substituting F γ R B , 2 y | G 1 and f γ R E , 2 ( y | G 1 ) into (15), the conditional F R B , 2 R S | G 1 is written as
F R B , 2 R S | G 1 = 0 F γ R B , 2 2 R S 1 + y 1 f γ R E , 2 y d y = i = 0 N B N B i 1 i exp i 2 R S 1 σ B 2 P S λ R B Θ N R , i σ B 2 P S λ R B ϕ j = 0 ϕ ϕ j × 2 R S 1 ϕ j P S λ R E P J λ J E j Γ j + 1 2 j R S Ψ j + 1 , j + 4 N B , i 2 R S P S λ R E + P S λ R B P S λ R B P J λ J E × σ 2 P J λ J E + N B 2 Ψ j + 1 , j + 3 N B , i 2 R S P S λ R E + P S λ R B P S λ R B P J λ J E .
Thus, by using (45) and f G 1 g , we can write the CDF of γ R B , 2 for the MRT-SC-ZFB scheme with the FD mechanism in the following theorem.
Theorem 4.
By using MRT-SC-ZFB scheme we can calculate the CDF of γ R B , 2 , which can be derived as
F γ 2 M R T S C Z F B R S = i = 0 N B N B i 1 i Θ N R , i j = 0 ϕ ϕ j 1 ε γ ¯ B ϕ 2 R S 1 ϕ j 2 j R S × Ψ j + 1 , j + 4 N B , i 2 R S η γ ¯ E + ε γ ¯ B ε γ ¯ B γ ¯ J 1 γ ¯ J + N B 2 × Ψ j + 1 , j + 3 N B , i 2 R S η γ ¯ E + ε γ ¯ B ε γ ¯ B γ ¯ J η γ ¯ E γ ¯ J j Γ j + 1 × exp i 2 R S 1 ε γ ¯ B 1 exp μ λ R P + μ λ R P × i 2 R S 1 λ R P + μ ε γ ¯ B ε γ ¯ B λ R P ϕ j + 1 Γ ϕ j + 1 , i 2 R S 1 λ R P + μ ε γ ¯ B ε γ ¯ B λ R P .
In this phase, the proof process of the F γ 2 M R T S C Z F B R S for the MRT-SC scheme is similar with Theorem 1, and will not be elaborated here.
Substituting (44) and (46) into (27), the closed-form expression of SOP of MRC-ZFB/MRT-SC-ZFB for P o u t M R C Z F B / M R T S C Z F B R S is attained after simple mathematical manipulations. In (27), replacing ζ , ξ with MRC-ZFB and MRT-SC-ZFB, respectively.

4. High SNR Analysis and Secrecy Throughput

4.1. High SNR Analysis

Although the derivation of the closed-form expressions of the SOP has been finished above, the analysis of the asymptotic SOP in the high SNR will be conducted in this subsection to obtain more insights. Specifically, consider two different scenarios: (1) γ ¯ B j and fixed γ ¯ E j , that a scenario in which the SNR of main link outperforms the SNR of the eavesdropper’s link, also known as the eavesdropper’s channel, suffers from heavy shadowing effect. (2) γ ¯ B j and γ ¯ E j , that a scenario where both the receiver and the eavesdropper can be closer to the transmitter, namely both the wiretap channel and main channel are equipped with better SNR. ST is also one of the indicators to verify the secrecy performance of the considered system. Finally, the secrecy performance can be expressed by the high SNR slope, the secrecy diversity gain and coding gain. In the section, for γ ¯ B j and γ ¯ E j , j 1 , 2 represent MRC/MRT-SC, MRC-ZFB/MRT-SC-ZFB, respectively.

4.1.1. Scenario I: γ ¯ B j and Fixed γ ¯ E j

In this scenario, P o u t R S is approximated as
P o u t R S Δ ϑ γ B min N R , N R N B ,
and Δ ϑ is given by
Δ ϑ = Δ 1 , Δ 1 + Δ 2 , N B 1 N B = 1 ,
where Δ 1 and Δ 2 represent the first phase and second phase of the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes, respectively.
(1) MRC/MRT-SC scheme:
Corollary 1.
The asymptotic SOP of the different time-slots with MRC/MRT-SC scheme under γ ¯ B 1 andfixed γ ¯ E 1 is given by
Δ 1 = q = 0 N R N R q 2 R S 1 N R q 2 R S q q ! 1 N R ! γ ¯ E 1 q × 1 exp μ λ A P + λ A P μ N R Γ N R + 1 , μ λ A P ,
and
Δ 2 = j = 0 N R N B N R N B j 2 R S 1 N R N B j 2 R S j 1 γ ¯ E 1 j 1 N R ! N B j ! 1 exp μ λ R P + 1 μ N R N B Γ N R N B + 1 , μ λ R P 1 ε N R N B .
Proof of Corollary 1.
See Appendix C. □
(2) MRC-ZFB/MRT-SC-ZFB scheme:
Corollary 2.
The asymptotic SOP of the different phases with MRC-ZFB/MRT-SC-ZFB scheme under γ ¯ B 2 andfixed γ ¯ E 2 is given by
Δ 1 = 1 N R ! Ξ 1 + Ξ 2 1 exp μ λ A P + 1 μ N R 1 λ A P N R Γ N R + 1 , μ λ A P .
Then Δ 2 is given by
Δ 2 = j = 0 N R N B N R N B j 2 R S 1 N R N B j 2 R S j γ ¯ E 2 γ ¯ J j Γ j + 1 1 N R ! N B × 1 γ ¯ J Ψ j + 1 , j + 4 N B , 1 γ ¯ J + N B 2 Ψ j + 1 , j + 3 N B , 1 γ ¯ J × 1 exp μ λ R P + λ R P μ N R N B Γ N R N B + 1 , μ λ R P 1 ε N R N B .
Proof of Corollary 2.
See Appendix D. □
Remark 1.
The secrecy diversity gain of the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes is min N R , N R N B under Scenario I, which is only determined by the number of N R and N B of Relay and Bob, respectively. Additionally, the quality of the main channel and wiretap channel influence the secrecy performance of two scenarios through the coding gain, i.e., G = Δ ϑ 1 / min N R , N R N B , in which ϑ (MRC/MRT-SC, MRC-ZFB/MRT-SC-ZFB), respectively. We found that the more multiple antennas of Relay and Bob, the better system performance.

4.1.2. Scenario Ii: γ ¯ B j and γ ¯ E j

Now, the approximated SOP of the considered CRNs is analyzed in this section.
(1) MRC/MRT-SC scenario:
Corollary 3.
The asymptotic SOP of the MRC/MRT-SC scenario under γ ¯ B 1 and γ ¯ E 1 can be expressed as
P o u t M R C / M R T S C R S 1 1 F γ 1 M R C R S 1 F γ 1 M R T S C R S ,
where F γ 1 M R C R S and F γ 2 M R T S C R S being expressed as
F γ 1 M R C R S 1 k = 0 N R 1 2 R S k γ ¯ B 1 k γ ¯ E 1 γ ¯ B 1 γ ¯ E 1 2 R S γ ¯ E 1 + γ ¯ B 1 k + 1 1 exp μ λ A P + Γ 1 , μ λ A P ,
and
F γ 2 M R T S C R S i = 0 N B N B i 1 i Θ N R , i 2 R S ϕ ϕ ! 1 ε γ ¯ B 1 ϕ i 2 R S η γ ¯ E 1 + ε γ ¯ B 1 ε γ ¯ B 1 η γ ¯ E 1 ϕ + 1 1 η γ ¯ E 1 × 1 exp μ λ R P + μ λ R P Γ 1 , μ λ R P i 2 R S 1 λ R P + μ ε γ ¯ B 1 ε γ ¯ B 1 λ R P 1 .
Proof. 
By using (32) and (36), when γ ¯ B 1 and γ ¯ E 1 , F γ 1 M R C R S and F γ 2 M R T S C R S can be easily derived, respectively. Thus, substituting (54) and (55) into (53), the final result of MRC/MRT-SC scenario can be easily derived. □
(2) MRC-ZFB/MRT-SC-ZFB scheme:
Corollary 4.
The asymptotic SOP of the MRC-ZFB/MRT-SC-ZFB scenario under γ ¯ B 2 and γ ¯ E 2 is given by
P o u t M R C Z F B / M R T S C Z F B R S 1 1 F γ 1 M R C Z F B R S 1 F γ 2 M R T S C Z F B R S ,
where F γ 1 M R C Z F B R S and F γ 2 M R T S C Z F B R S are respectively expressed as
F γ 1 M R C Z F B R S 1 k = 0 N R 1 2 k R S Γ k + 1 k ! γ ¯ E 2 γ ¯ B 2 γ ¯ J k 1 exp μ λ A P + Γ 1 , μ λ A P × N B 2 Ψ k + 1 , 3 + k N B , 2 R S γ ¯ E 2 + γ ¯ B 2 γ ¯ B 2 γ ¯ J + 1 γ ¯ J × Ψ k + 1 , 4 + k N B , 2 R S γ ¯ E 2 + γ ¯ B 2 γ ¯ B 2 γ ¯ J ,
and
F γ 2 M R T S C Z F B R S i = 0 N B N B i 1 i Θ N R , i 2 R S η γ ¯ E 2 η γ ¯ B 2 γ ¯ J ϕ Γ ϕ + 1 × N B 2 Ψ ϕ + 1 , ϕ + 3 N B , i 2 R S η γ ¯ E 2 + ε γ ¯ B 2 ε γ ¯ B 2 γ ¯ J + 1 γ ¯ J Ψ ϕ + 1 , ϕ + 4 N B , i 2 R S η γ ¯ E 2 + ε γ ¯ B 2 ε γ ¯ B 2 γ ¯ J .
Proof. 
By using (44) and (46), when γ ¯ B 2 and γ ¯ E 2 , F γ 1 M R C Z F B R S and F γ 2 M R T S C Z F B R S can be easily derived, respectively. Thus, substituting (57) and (58) into (56), the final result of MRC-ZFB/MRT-SC-ZFB scenario is given. □
Remark 2.
In contrast to Scenario I, when γ ¯ B 2 and γ ¯ E 2 , two scenarios appear to be the secrecy outage floor that unable to obtain secrecy diversity. Thus, the secrecy performance of the system can only be improved by the secrecy coding gain.

4.2. Secrecy Throughput

On the basis of SOP, the ST more comprehensively measures the reliability and security of the system in a whole way, which is the product of the complementary probability of P o u t R S and the predetermined secrecy rate R S (Equation (24), [43]), [44]. Thus, the throughput expression of the two schemes can be written as
T o u t φ R S = 1 P o u t φ R S R S ,
where φ (MRC/MRT-SC, MRC-ZFB/MRT-SC-ZFB).
Remark 3.
Given the Equation (59), we numerically find that T o u t φ R S exist an optimal value in a given range. When R S is small, T o u t φ R S of the two scenarios is relatively small. However, when R S exceeds an optimal value, the T o u t φ R S would decrease until zero. Therefore, determining the optimal value, R S o v , is practically significant to system designers, which can achieve the local optimal ST of system.

5. Numerical Results

In this section, analytical results demonstrate the secrecy performance of the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes in terms of the achievable SOP. A detailed investigation on the effect of various system parameters, namely the number of antennas and thresholds, i.e., N R , N B and R S is conducted. Without loss of generality, R S = 2 , σ 2 = σ R 2 = σ B 2 = σ E 2 = 1 , ε = η = 1 and P J = 10 dB are set, and the transmitted SNR at Alice or Relay can be derived as P t / σ 2 . In addition, we take path loss attenuation g M , N as g M , N = d M , N ω , where d M , N is the distance from M to N node and ω is normalized to 1, and all simulation results are obtained by averaging over 300,000 independent Monte Carlo trials. The Monte Carlo simulations in all figures thoroughly coincide with the theoretical simulation curves, which verifies that the closed-form expression is derived correctly in this paper. With the high SNR, the asymptotic curve approaches the exact curve. We also verified the secrecy diversity order in the asymptotic analysis expressions by the asymptotic curve.
Figure 2 and Figure 3 illustrate the impact for different numbers of N R , N B , N R , N B and Q on the SOPs of the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes, respectively. N R = 1 , 2 , 3 , 4 at different N B = 3 , 4 , 5 , 7 . The exact curves are obtained from P o u t M R C / M R T S C R S and P o u t M R C Z F B / M R T S C Z F B R S . Due to the strong eavesdropping ability of the eavesdropper, the MRC/MRT-SC scheme does not significantly change the system performance. It is clearly seen that the outage performance of wireless communications is proportional to the number of N R , N B and N R , N B . Obviously, if the P t / σ 2 is higher, the outage performance of the system will be better. As shown, MRC-ZFB/MRT-SC-ZFB scheme achieves the best performance over the range of R S and the secrecy rate of the MRC-ZFB/MRT-SC-ZFB scheme gradually increases with P t / σ 2 before it saturates. And in this section, secrecy outage floor will appear in MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes when P t / σ 2 increases, this is because the Q is a crucial factor influencing the secrecy performance of system and is not limited by the P t of the secondary user transmitter. Additionally, when the number of N R , N B and Q are fixed in two schemes, MRC-ZFB/MRT-SC-ZFB scheme with FD operation and beamforming with AN obviously attain better performance than MRC/MRT-SC scheme with HD operation from the perspective of enhancing the secrecy performance of wireless communications.
Figure 4 shows the effect of increasing N R and N B on the SOP and the asymptotic expressions curves of SOP attained from (47) under the γ ¯ B j and fixed γ ¯ E j , respectively, where γ ¯ E = 10 dB and γ ¯ J = 10 dB. The parallel slope of the asymptote shows that the high SNR slope is independent of N R . It is worth noting that the curve converges quickly and hence the derived approximation is accurate. Furthermore, when N R and N B increase, the SOP will be significantly improved. Moreover, as expected, MRC/MRT-SC scheme has the lowest performance than the MRC-ZFB/MRT-SC-ZFB scheme. Thus, we see that the MRC-ZFB/MRT-SC-ZFB scheme with FD operation and beamforming with AN always outperforms than the MRC/MRT-SC scheme with HD operation, which means that transmitting jamming signals from a FD Bob through the MRC-ZFB/MRT-SC-ZFB scheme would enhance the secrecy array gain of the system compared with the MRC/MRT-SC scheme under Scenario I.
Figure 5 shows the SOP versus P t / σ 2 of the two schemes when γ ¯ J = 10 dB, γ ¯ B j / γ ¯ E j = 1 , N R = 2 , N B = 4 and N R = 3 , N B = 5 . The asymptotic expressions curves of SOP are achieved from (53) and (56) under the γ ¯ B j and γ ¯ E j , respectively. The analytical results shows that the MRC-ZFB/MRT-SC-ZFB scheme has better performance than MRC/MRT-SC scheme under different N R and N B . It is noted that, for fixed γ ¯ B j / γ ¯ E j , increasing N R and N B lead to a slight decrease in the values of SOP. Additionally, the MRC-ZFB/MRT-SC-ZFB scheme achieves better performance than the MRC/MRT-SC scheme at the low P t / σ 2 , while the same holds at the high P t / σ 2 . Therefore, the MRC-ZFB/MRT-SC-ZFB scheme improves the transmission performance of wireless communication under Scenario II.
Figure 6 shows the SOP of two schemes for different number of N R and fixed N B varies with Q = 20 dB and γ ¯ J = 10 dB. As the Relay is equipped with more antennas, the SOP steadily decreases. It can be seen that the MRC-ZFB/MRT-SC-ZFB scheme always outperforms the MRC/MRT-SC scheme, and MRC/MRT-SC with HD operation scheme has a higher SOP under the same conditions. In particular, the MRC-ZFB/MRT-SC-ZFB scheme has a greater influence on the secrecy performance of the system than the MRC/MRT-SC scheme from the perspective of the value of N R . The reason is that the MRC-ZFB/MRT-SC-ZFB scheme enhances system secrecy performance based on FD operation at Bob. Thus, it also verifies the exact validity and the rationality of the closed-form expression of our proposed schemes. It is found that the more N R , the better the system performance, and the secrecy performance of the proposed MRC-ZFB/MRT-SC-ZFB scheme with FD operation is mainly affected by the secrecy coding gain.
Figure 7 shows the secrecy outage probability vs α 1 = λ A R / λ A E , and α 2 = λ R B / λ R E = ε / η α 1 . Q = 20 dB, γ ¯ J = 10 dB, N R = 2 and N B = 6 are set in two figures. In the first figure, when we set SNR = 20 dB, the simulation results demonstrate that when α 1 is relative low, the SOP of two different schemes decreases when α 1 increases. The MRC-ZFB/MRT-SC-ZFB of our proposed scheme outperforms MRC/MRT-SC scheme. The main reason is that the main channel is similar with the eavesdropper’s channel. However, when α 1 is over 20, the eavesdropper’s eavesdropping ability is relative weak and the noise power is almost zero, so there is no eavesdropping and interference object for MRC-ZFB/MRT-SC-ZFB scheme. Therefore, the two schemes have almost the same effect on system performance.The second figure shows that the SOP of two different schemes decreases when α 1 increases. When α 1 = 1 and 10, the SOP of MRC-ZFB/MRT-SC-ZFB scheme have obvious influence than the MRC/MRT-SC scheme in terms of enhancing the secrecy performance of system.
Figure 8 plots the ST versus R S with different values of N R and N B . In this simulation, the analytical curves were obtained from (59), and it is clearly seen that the throughput of different schemes increases at the beginning and then decreases with the increasing of R S . It illustrated that there exists an optimal value R S o v of MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes, making the secrecy transmission best. We also find that increasing N R and N B can improve ST significantly, which reflects the efficiency of equipping Relay and Bob with multiple antennas. Observe from Figure 8 that the ST T o u t φ R S of the MRC/MRT-SC scheme does not change significantly as N B varies from N B = 4 to 6. This is because the ST is mainly affected by the antenna gain N R in MRC/MRT-SC scheme. Finally, we observe that MRC-ZFB/MRT-SC-ZFB also outperforms the MRC/MRT-SC scheme over different values of R S o v , N R and N B .

6. Conclusions

In this paper, we explored the secure transmission in cognitive wiretap networks with FD receiver. To investigate the benefits of FD operation at receiver of the considered CRNs, the MRC-ZFB/MRT-SC-ZFB with FD operation and MRC/MRT-SC of HD operation schemes were proposed, respectively. Also, the new closed-form and simple asymptotic expressions for the SOP and ST of our considered networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes were derived, respectively. Different transmission parameters, such as the SNR, Q and the number of N R and N B are designed to verify the impact on system secrecy performance. The closed-form expressions for the exact and asymptotic SOP concisely characterized the secrecy diversity gain and the secrecy coding gain. Additionally, analytical results and numerical simulations demonstrated that beamforming with AN is an important tool for ensuring secure transmission facing with a malicious eavesdropper in CRNs. Finally, it is also found that the MRC-ZFB/MRT-SC-ZFB scheme outperforms MRC/MRT-SC scheme, which verifies the advantages of the schemes conceived in this paper. Our results provided a unified model to analyse the SOP performance and the ST of the FD receiver cognitive wiretap networks over Rayleigh fading channels and could be easily extended to the scenarios with multiple PUs being faced with multiple eavesdroppers, which is also one of the parts in our further works.

Author Contributions

Z.S. and T.Z. conceived the model; Z.S. performed the simulation results and wrote the paper; and T.Z., Y.C., W.Y., H.W., Y.Z., L.T. provided some suggestions and revised the paper. All authors have read and agree to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant (No. 61801496, No. 61771487 and No. 61801497), the National Postdoctoral Program for Innovative Talents of China (No. BX20180374), the National University of Defense Technology Research Project (No. ZK17-03-25), the Defense Science Foundations of China (No. 2019-JCJQ-JJ-221), and the Joint Foundation Project of Zunyi Science and Technology Bureau and Zunyi Medical University of Guizhou Provincial (No. E-282).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

From (30) and (31), the CDF of γ A R , 1 for the MRC scheme is given by
F γ 1 M R C R S = 0 F γ A R , 1 y | G f G g d g = 0 Q / P t 1 exp 2 R S 1 γ ¯ B k = 0 N R 1 1 k ! 1 γ ¯ B k 1 γ ¯ E i = 0 k k i 2 R S i × 2 R S 1 k i i ! γ ¯ B γ ¯ E 2 R S γ ¯ E + γ ¯ B i + 1 f G g d g + Q / P t 1 exp 2 R S 1 γ ¯ B μ g × k = 0 N R 1 1 k ! 1 γ ¯ B μ g k g γ ¯ E μ i = 0 k k i 2 R S i 2 R S 1 k i i ! × γ ¯ B μ γ ¯ E g 1 2 R S γ ¯ E + γ ¯ B i + 1 f G g d g .
Finally, substituting f G g in (A1) and with the help of (Equation (3.381.3), [41]), the desired F γ 1 M R C R S yields in (32) by operating several mathematical manipulations.

Appendix B

We first denote R 1 = P J h B E 1 w Z F 2 σ 2 . By using (Equation (12), [45]), the PDF of the index distribution R 1 can be expressed as
f R 1 z = z N B 3 exp σ 2 z P J λ J E N B 3 ! P J λ J E / σ 2 N B 2 .
Noticing that when N B 3 , f R 1 z is the correct expression. Based on (9), we have
γ A E , 2 = P S h A E 2 P J h B E 1 w Z F 2 + σ E 2 = X E z + 1 .
Hence, F γ A E , 2 ( y | G ) is represented as
F γ A E , 2 ( y | G ) = 1 exp σ E 2 y P S λ A E P S λ A E y P J λ J E + P S λ A E N B 2 .
Finally, we obtain the conditional PDF of γ A E , 2 after derivation.

Appendix C

Based on MRC scheme, when γ ¯ B 1 , the conditional CDF of γ A B , 1 is given by
F γ A R , 1 x | G 1 N R ! σ R 2 x P S λ A R N R .
Also, the conditional PDF of γ A E , 1 is written as
f γ A E , 1 y | G = 1 γ ¯ E 1 exp 1 γ ¯ E 1 y .
By substituting (A5) and (A6) into (15), the asymptotic conditional F γ A R , 1 R S | G is given by
F γ A R , 1 R S | G = 1 N R ! σ R 2 P S λ A R N R q = 0 N R N R q 2 R S q 2 R S 1 N R q q ! γ ¯ E 1 q .
Now, On the basis of (31), the desired result F γ 1 M R C R S can be derived as
F γ 1 M R C R S = 1 γ ¯ B 1 N R q = 0 N R N R q 2 R S 1 N R q q ! 2 R S q γ ¯ E 1 q 1 N R ! × 1 exp μ λ A P + λ A P μ N R Γ N R + 1 , μ λ A P .
Based on MRT-SC phase, the MRT-SC scheme is similar with MRC scheme description process of the (A8), and when γ ¯ B 1 , the conditional CDF of γ R B , 1 can be approximated as
F γ R B , 1 y | G 1 1 N R ! N B σ B 2 x P R λ R B N R N B .
f γ R E , 1 y | G 1 is the same as f γ A E , 1 y | G of (A6).
Similarly, the asymptotic conditional F γ R B , 1 R S | G 1 is given by
F γ R B , 1 R S | G 1 = 1 N R ! N B σ B 2 P R λ R B N R N B j = 0 N R N B N R N B j 2 R S 1 N R N B j 2 R S j j ! 1 γ ¯ E 1 j .
Now, on the basis of f G 1 g , the desired result F γ 2 M R T S C R S is written as
F γ 2 M R T S C R S = 1 γ ¯ B 1 N R N B j = 0 N R N B N R N B j 2 R S j 2 R S 1 N R N B j j ! 1 γ ¯ E 1 j 1 N R ! N B × 1 exp μ λ R P + λ R P μ ε N R N B Γ N R N B + 1 , μ λ R P .
By using (A8) and (A11), Δ 1 and Δ 2 are given by (49) and (50).

Appendix D

On the basis of MRC-ZFB scheme, when γ ¯ B 2 , the conditional CDF of γ A R , 2 is the same as (A5), only with the change of parameter γ A R , 1 γ A R , 2 . Also, fixed γ ¯ E 2 , we can obtain f γ A E , 2 ( y | G ) from (38). The conditional PDF of γ A E , 2 is represented as
f γ A E , 2 ( y | G ) = 1 γ ¯ E 2 exp y γ ¯ E 2 γ ¯ E 2 γ ¯ J y + γ ¯ E 2 N B 2 + N B 2 γ ¯ J γ ¯ E 2 N B 2 γ ¯ J y + γ ¯ E 2 N B 1 exp y γ ¯ E 2 .
By substituting F γ A R , 2 x | G and (A12) into (15), the asymptotic conditional F γ A R , 2 R S | G is given by
F γ A R , 2 R S | G = 1 N R ! σ R 2 P S λ A R N R j = 0 N R N R j 2 R S 1 N R j 2 R S j 1 γ ¯ J γ ¯ E 2 γ ¯ J j Γ j + 1 Ψ j + 1 , 4 + i N B , 1 γ ¯ J Ξ 1 + 1 N R ! σ R 2 P S λ A R N R j = 0 N R N R j 2 R S 1 N R j 2 R S j N B 2 γ ¯ E 2 γ ¯ J j Γ j + 1 Ψ j + 1 , 3 + i N B , 1 γ ¯ J Ξ 2 .
Now, according to (31), the desired result F γ 1 M R C Z F B R S is written as
F γ 1 M R C Z F B R S = 1 exp μ λ A P + 1 μ N R 1 λ A P N R Γ N R + 1 , μ λ A P × 1 N R ! Ξ 1 + Ξ 2 1 γ ¯ B 2 N R ,
Since the MRT-SC-ZFB phase is similar with description process of the (A14) at MRC-ZFB phase, so it is simply derived here. When γ ¯ B 2 , the approximation of F γ R B , 2 y | G 1 can be obtain by (A9), only with the change of parameters γ R B , 1 γ R B , 2 . Similarly, fixed γ ¯ E 2 , we can obtain f γ R E , 2 ( y | G 1 ) from (38). The conditional PDF of γ R E , 2 is written as
f γ R E , 2 ( y | G 1 ) = exp y γ ¯ E 2 γ ¯ E 2 N B 3 γ ¯ J y + γ ¯ E 2 N B 2 + exp y γ ¯ E 2 N B 2 γ ¯ E 2 N B 2 γ ¯ J γ ¯ J y + γ ¯ E 2 N B 1 .
Similarly, by substituting F γ R B , 2 x | G 1 and (A15) into (15), the asymptotic conditional F γ R B , 2 R S | G 1 is given by
F γ R B , 2 R S | G 1 = j = 0 N R N B N R N B j 2 R S 1 N R N B j 2 R S j γ ¯ E 2 γ ¯ J j Γ j + 1 1 N R ! N B × σ 2 P S λ R B N R N B 1 γ ¯ J Ψ j + 1 , j + 4 N B , 1 γ ¯ J + N B 2 × Ψ j + 1 , j + 3 N B , 1 γ ¯ J .
Based on f G 1 g , the desired result F γ 2 M R T S C Z F B R S is presented as
F γ 2 M R T S C Z F B R S = 1 ε γ ¯ B 2 N R N B j = 0 N R N B N R N B j 2 R S 1 N R N B j 2 R S j γ ¯ E 2 γ ¯ J j Γ j + 1 × 1 N R ! N B 1 γ ¯ J Ψ j + 1 , j + 4 N B , 1 γ ¯ J + N B 2 × Ψ j + 1 , j + 3 N B , 1 γ ¯ J 1 exp μ λ R P + λ R P μ N R N B Γ N R N B + 1 , μ λ R P .
By using (A14) and (A17), Δ 1 and Δ 2 are given by (51) and (52).

References

  1. Mitola, J. Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio. Ph.D. Thesis, KTH Royal Institute of Technology, Stockholm, Sweden, 2000. [Google Scholar]
  2. Zhang, T.; Cai, Y.; Huang, Y.; Duong, T.Q.; Yang, W. Secure full-duplex spectrum-sharing wiretap networks with different antenna reception schemes. IEEE Trans. Commun. 2017, 65, 335–346. [Google Scholar] [CrossRef] [Green Version]
  3. Huang, Y.; Al-Qahtani, F.; Wu, Q.; Zhong, C.; Wang, J.; Alnuweiri, H. Outage analysis of spectrum sharing relay systems with multiple secondary destinations under primary user’s interference. IEEE Trans. Veh. Technol. 2014, 63, 3456–3464. [Google Scholar] [CrossRef]
  4. Oliveira, G.; Fernandez, E.; Mafra, S.; Montejo-Sánchez, S. Physical layer security in cognitive radio networks using improper gaussian signaling. IEEE Commun. Lett. 2018, 22, 1886–1889. [Google Scholar] [CrossRef]
  5. Biliary, E.; Goldsmith, A.; Greenstein, L.; Mandayam, N.; Poor, H.V. Principles of Cognitive Radio; Cambridge University Press: Cambridge, UK, 2013. [Google Scholar]
  6. Shah, H.A.; Koo, I. A novel physical layer security scheme in OFDM-based cognitive radio networks. IEEE Access 2018, 6, 29486–29498. [Google Scholar] [CrossRef]
  7. Ding, X.; Zou, Y.; Zhang, G.; Chen, X.; Wang, X.; Hanzo, L. The security-reliability tradeoff of multiuser scheduling-aided energy harvesting cognitive radio networks. IEEE Trans. Commun. 2019, 67, 3890–3904. [Google Scholar] [CrossRef] [Green Version]
  8. Yan, P.; Zou, Y.; Zhu, J. Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems. IEEE Trans. Veh. Technol. 2018, 67, 2084–2096. [Google Scholar] [CrossRef]
  9. Nandan, N.; Majhi, S.; Wu, H. Maximizing secrecy capacity of underlay MIMO-CRN through bi-directional zero-forcing beamforming. IEEE Trans. Wirel. Commun. 2018, 17, 5327–5337. [Google Scholar] [CrossRef]
  10. Qian, Y.; Chen, M.; Chen, J.; Hossain, M.S.; Alamri, A. Secure enforcement in cognitive internet of vehicles. IEEE Internet Things J. 2018, 5, 1242–1250. [Google Scholar] [CrossRef]
  11. Zhang, T.; Huang, Y.; Cai, Y.; Yang, W. Secure transmission in spectrum sharing relaying networks with multiple antennas. IEEE Commum. Lett. 2016, 20, 824–827. [Google Scholar] [CrossRef]
  12. Zhang, T.; Huang, Y.; Cai, Y.; Zhong, C.; Yang, W.; Karagiannidis, G.K. Secure multiantenna cognitive wiretap networks. IEEE Trans. Veh. Technol. 2017, 66, 4059–4072. [Google Scholar]
  13. Sultana, A.; Zhao, L.; Fernando, X. Efficient resource allocation in device-to-device communication using cognitive radio technology. IEEE Trans. Veh. Technol. 2017, 66, 10024–10034. [Google Scholar] [CrossRef]
  14. Li, M.; Liao, W.; Chen, X.; Sun, J.; Huang, X.; Li, P. Economic-robust transmission opportunity auction for D2D communications in cognitive mesh assisted cellular networks. IEEE Trans. Mob. Comp. 2018, 17, 1806–1819. [Google Scholar] [CrossRef]
  15. Song, Y.; Yang, W.; Xiang, Z.; Wang, B.; Cai, Y. Secure transmission in mmWave NOMA networks with cognitive power allocation. IEEE Access 2019, 7, 76104–76119. [Google Scholar] [CrossRef]
  16. Wei, C.; Yang, W.; Cai, Y.; Tang, X.; Yin, T. Secrecy outage performance of buffer-aided underlay cognitive relay networks with outdated CSI. In Proceedings of the 2018 IEEE 7th CIC International Conference on Communications in China (CIC ICCC), Beijing, China, 16–18 August 2018; pp. 168–173. [Google Scholar]
  17. Xiang, Z.; Yang, W.; Pan, G.; Cai, Y.; Song, Y. Physical layer security in cognitive radio inspired NOMA network. IEEE J. Sel. Top. Signal Process 2019, 13, 700–714. [Google Scholar] [CrossRef]
  18. Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tuts. 2019, 21, 2734–2771. [Google Scholar] [CrossRef] [Green Version]
  19. Amjad, M.; Akhtar, F.; Rehmani, M.H.; Reisslein, M.; Umer, T. Full-duplex communication in cognitive radio networks: A survey. IEEE Commun. Surv. Tuts. 2017, 19, 2158–2191. [Google Scholar] [CrossRef]
  20. Shang, Z.; Zhang, T.; Cai, Y.; Liu, Y.; Yang, W. Secure Spectrum-Sharing Wiretap Networks With Full-Duplex Relaying. IEEE Access 2019, 7, 181610–181625. [Google Scholar] [CrossRef]
  21. Nguyen, N.; Kundu, C.; Ngo, H.Q.; Duong, T.Q.; Canberk, B. Secure full-duplex small-cell networks in a spectrum sharing environment. IEEE Access 2016, 4, 3087–3099. [Google Scholar] [CrossRef]
  22. Li, M.; Huang, Y.; Yin, H.; Wang, Y.; Cai, C. Improving the security and spectrum efficiency in overlay cognitive full-duplex wireless networks. IEEE Access 2019, 7, 68359–68372. [Google Scholar] [CrossRef]
  23. Zhang, J.; Pan, G.; Wang, H. On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system. IEEE Access 2016, 4, 3887–3893. [Google Scholar] [CrossRef]
  24. Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  25. Yang, N.; Elkashlan, M.; Duong, T.Q.; Yuan, J.; Malaney, R. Optimal transmission with artificial noise in MISOME wiretap channels. IEEE Trans. Veh. Technol. 2016, 65, 2170–2181. [Google Scholar] [CrossRef]
  26. Al-Nahari, A.; Geraci, G.; Al-Jamali, M.; Ahmed, M.H.; Yang, N. Beamforming with artificial noise for secure MISOME cognitive radio transmissions. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1875–1889. [Google Scholar] [CrossRef]
  27. Tolossa, Y.J.; Vuppala, S.; Kaddoum, G.; Abreu, G. On the uplink secrecy capacity analysis in D2D-enabled cellular network. IEEE Syst. J. 2018, 12, 2297–2307. [Google Scholar] [CrossRef]
  28. Zhou, F.; Chu, Z.; Sun, H.; Hu, R.Q.; Hanzo, L. Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT IEEE J. Sel. Areas Commun. 2018, 36, 918–931. [Google Scholar] [CrossRef]
  29. Koyluoglu, O.O.; Koksal, C.E.; el Gamal, H. On secrecy capacity scaling in wireless networks. IEEE Trans. Inf. Theory 2012, 58, 3000–3015. [Google Scholar] [CrossRef] [Green Version]
  30. Cai, C.; Cai, Y.; Zhou, X.; Yang, W.; Yang, W. When does relay transmission give a more secure connection in wireless ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 624–632. [Google Scholar] [CrossRef]
  31. Kong, L.; Vuppala, S.; Kaddoum, G. Secrecy analysis of random MIMO wireless networks 0ver α-μ fading channels. IEEE Trans. Veh. Technol. 2018, 67, 11654–11666. [Google Scholar] [CrossRef]
  32. Zou, Y.; Wang, X.; Shen, W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013, 31, 2099–2111. [Google Scholar] [CrossRef] [Green Version]
  33. Li, L.; Chen, Z.; Zhang, D.; Fang, J. A full-duplex Bob in the MIMO gaussian wiretap channel: Scheme and performance. IEEE Signal Process. Lett. 2016, 23, 107–111. [Google Scholar] [CrossRef]
  34. Hoang, T.M.; Duong, T.Q.; Suraweera, H.A.; Tellambura, C.; Poor, H.V. Cooperative beamforming and user selection for improving the security of relay-aided systems. IEEE Trans. Commun. 2015, 63, 5039–5051. [Google Scholar] [CrossRef] [Green Version]
  35. Chen, G.; Coon, J.P.; di Renzo, M. Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1195–1206. [Google Scholar] [CrossRef] [Green Version]
  36. Elkashlan, M.; Wang, L.; Duong, T.Q.; Karagiannidis, G.K.; Nallanathan, A. On the security of cognitive radio networks. IEEE Trans. Veh. Technol. 2015, 64, 3790–3795. [Google Scholar] [CrossRef]
  37. Tang, X.; Cai, Y.; Yang, W.; Huang, Y.; Duong, T.Q.; Yang, W. Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper’s CSI. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  38. Zhong, C.; Jiang, X.; Qu, F.; Zhang, Z. Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis. IEEE Trans. Wirel. Commun. 2017, 16, 4585–4599. [Google Scholar] [CrossRef] [Green Version]
  39. Basilevsky, A. Applied Matrix Algebra in the Statistical Sciences; Courier Corporation: North Chelmsford, MA, USA, 2013. [Google Scholar]
  40. Shang, Z.; Zhang, T.; Liu, Y.; Cai, Y.; Yang, W. Secrecy Performance Analysis of Cognitive Radio Networks with Full-duplex Relaying. In Proceedings of the 2019 IEEE 8th CIC International Conference on Communications in China (ICCC), Changchun, China, 11–13 August 2019; pp. 700–705. [Google Scholar]
  41. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 7th ed.; Academic: San Diego, CA, USA, 2007. [Google Scholar]
  42. Yang, M.; Zhang, B.; Huang, Y.; Yang, N.; Costa, D.B.d.; Guo, D. Secrecy enhancement of multiuser MISO networks using OSTBC and artificial noise. IEEE Trans. Veh. Technol. 2017, 66, 11394–11398. [Google Scholar] [CrossRef]
  43. Wang, Y.; Zhang, T.; Yang, W.; Guo, J.; Liu, Y.; Shang, X. Secure transmission for differential quadrature spatial modulation with artificial noise. IEEE Access 2019, 7, 7641–7650. [Google Scholar] [CrossRef]
  44. Hu, J.; Cai, Y.; Yang, N.; Yang, W. A new secure transmission scheme with outdated antenna selection. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2435–2446. [Google Scholar] [CrossRef]
  45. Afana, A.; Asghari, V.; Ghrayeb, A.; Affes, S. Cooperative relaying in spectrum-sharing systems with beamforming and interference constraints. In Proceedings of the 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cesme, Turkey, 17–20 June 2012; pp. 429–433. [Google Scholar]
Figure 1. System Model.
Figure 1. System Model.
Applsci 10 01840 g001
Figure 2. Secrecy outage probability of MRC/MRT-SC scheme for different number N R , N B and Q.
Figure 2. Secrecy outage probability of MRC/MRT-SC scheme for different number N R , N B and Q.
Applsci 10 01840 g002
Figure 3. Secrecy outage probability for the MRC-ZFB/MRT-SC-ZFB scheme when γ ¯ J = 10 dB and different number N R , N B and Q.
Figure 3. Secrecy outage probability for the MRC-ZFB/MRT-SC-ZFB scheme when γ ¯ J = 10 dB and different number N R , N B and Q.
Applsci 10 01840 g003
Figure 4. Exact and asymptotic secrecy outage probability for the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes under Scenario I when γ ¯ E = 10 dB, γ ¯ J = 10 dB and different values N R and N B .
Figure 4. Exact and asymptotic secrecy outage probability for the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes under Scenario I when γ ¯ E = 10 dB, γ ¯ J = 10 dB and different values N R and N B .
Applsci 10 01840 g004
Figure 5. Exact and asymptotic secrecy outage probabilities for the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes under Scenario II when γ ¯ J = 10 dB and different values N R and N B .
Figure 5. Exact and asymptotic secrecy outage probabilities for the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes under Scenario II when γ ¯ J = 10 dB and different values N R and N B .
Applsci 10 01840 g005
Figure 6. Secrecy outage probability of two schemes for different number N R and fixed N B .
Figure 6. Secrecy outage probability of two schemes for different number N R and fixed N B .
Applsci 10 01840 g006
Figure 7. Secrecy outage probability of two schemes for different α 1 .
Figure 7. Secrecy outage probability of two schemes for different α 1 .
Applsci 10 01840 g007
Figure 8. Throughput of the two schemes vs different with SNR = 20 dB, Q = 20 dB, and different values N R and N B .
Figure 8. Throughput of the two schemes vs different with SNR = 20 dB, Q = 20 dB, and different values N R and N B .
Applsci 10 01840 g008

Share and Cite

MDPI and ACS Style

Shang, Z.; Zhang, T.; Cai, Y.; Yang, W.; Wu, H.; Zhang, Y.; Tao, L. Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers. Appl. Sci. 2020, 10, 1840. https://doi.org/10.3390/app10051840

AMA Style

Shang Z, Zhang T, Cai Y, Yang W, Wu H, Zhang Y, Tao L. Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers. Applied Sciences. 2020; 10(5):1840. https://doi.org/10.3390/app10051840

Chicago/Turabian Style

Shang, Zhihui, Tao Zhang, Yueming Cai, Weiwei Yang, Hao Wu, Yu Zhang, and Liwei Tao. 2020. "Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers" Applied Sciences 10, no. 5: 1840. https://doi.org/10.3390/app10051840

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop