Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming

Authors

  • Tran Trung Duy Posts and Telecommunications Institute of Technology
  • Le Chu Khan Posts and Telecommunications Institute of Technology
  • Nguyen Thanh Binh Posts and Telecommunications Institute of Technology
  • Nguyen Luong Nhat Posts and Telecommunications Institute of Technology

DOI:

https://doi.org/10.4108/eai.26-1-2021.168229

Keywords:

Fountain Codes, underlay cognitive radio networks, physical-layer security, cooperative jamming, intercept probability

Abstract

This paper evaluates intercept probability (IP) of a cooperative cognitive radio network. Using Fountain codes, a secondary source continuously generates encoded packets, and sends them to secondary destination and relay nodes that attempt to receive a sufficient number of the encoded packets for recovering the source data. If the relay can sufficiently collect the packets before the destination, it replaces the source to transmit the encoded packets to the destination. Also in the secondary network, a passive eavesdropper attempts to illegally receive the packets sent by the source and relay nodes, and if it can accumulate enough encoded packets, the source data is intercepted. To enhance secrecy performance, in terms of IP, a cooperative jammer is used to transmit noises on the eavesdropper. We also propose a simple transmit power allocation method for the secondary transmitters such as source, relay and jammer so that outage performance of a primary network is not harmful. We derive an exact closed-form expression of IP over Rayleigh fading channel, and verify it by performing Monte-Carlo simulations.

Downloads

Download data is not yet available.

Downloads

Published

26-01-2021

How to Cite

Trung Duy, T. ., Chu Khan, L. ., Thanh Binh, N. ., & Luong Nhat, N. . (2021). Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 8(26), e3. https://doi.org/10.4108/eai.26-1-2021.168229