Impact of Secondary Network on the Security of Primary Network

Document type: Conference Presentations
Peer reviewed: No
Author(s): Hung Tran, Hans-Jürgen Zepernick
Title: Impact of Secondary Network on the Security of Primary Network
Conference name: Swedish Communications Technologies Workshop
Year: 2012
Publisher: IEEE
City: Lund, Sweden
Organization: Blekinge Institute of Technology
Department: School of Computing (Sektionen för datavetenskap och kommunikation)
School of Computing S-371 79 Karlskrona
+46 455 38 50 00
http://www.bth.se/com
Authors e-mail: hung.tran@bth.se, hans-jurgen.zepernick@bth.se
Language: English
Abstract: In this study, we investigate the impact of a secondary user on the security of the primary user in a cognitive radio network. In particular, we consider a spectrum underlay network consisting of a pair of primary users, a pair of secondary users, and an eavesdropper, operating in the same spectrum. The secondary user is allowed to simultaneously access the licensed frequency bands of the primary user as long as the outage probability of the primary user is kept below a predefined threshold, while the eavesdropper illegally listens to the communication of the primary network. Given these settings, an adaptive transmit power allocation policy, a closed-form expression for the outage probability, and an analytical expression for the probability of existence of non-zero secrecy capacity are formulated. Simulations show that the existence of a secondary network can enhance the probability of non-zero
secrecy capacity of the primary network by causing interference to the eavesdropper.
Subject: Telecommunications\Network Security
Keywords: Spectrum Underlay Network, Eavesdropper, Non-zero secrecy capacity
Edit