Secure 5G Coordinating Spectrum Sharing System With Cooperation Transmitter and Receiver Pairs
Ayat M. Al-Rjoob
Electrical Engineering Department, German-Jordanian University, Amman, Jordan
Electrical Engineering Department, Jordan University of Science and Technology, Irbid, Jordan
Search for more papers by this authorCorresponding Author
Ahmad A. Ababnah
Electrical Engineering Department, Jordan University of Science and Technology, Irbid, Jordan
Correspondence: Ahmad A. Ababnah ([email protected])
Search for more papers by this authorMamoun F. Al-Mistarihi
Electrical Engineering Department, Jordan University of Science and Technology, Irbid, Jordan
Search for more papers by this authorAyat M. Al-Rjoob
Electrical Engineering Department, German-Jordanian University, Amman, Jordan
Electrical Engineering Department, Jordan University of Science and Technology, Irbid, Jordan
Search for more papers by this authorCorresponding Author
Ahmad A. Ababnah
Electrical Engineering Department, Jordan University of Science and Technology, Irbid, Jordan
Correspondence: Ahmad A. Ababnah ([email protected])
Search for more papers by this authorMamoun F. Al-Mistarihi
Electrical Engineering Department, Jordan University of Science and Technology, Irbid, Jordan
Search for more papers by this authorABSTRACT
In this paper, we propose a 6-node system consisting of two transmitter-receiver pairs sharing the same spectrum, an eavesdropper, and a relay, all operating in a half-duplex. The eavesdropper is mainly interested in communication between one of the transmitter-receiver pairs, which we call the primary. Communication along with the second pair called the secondary, is performed in two hops/time slots with the aid of the relay. The main idea of our study is to investigate the secrecy performance of the primary pair when jamming is performed by the secondary relay-assisted path. In particular, in the first time slot, the secondary destination acts as a jammer relative to the eavesdropper by injecting artificial noise known to the primary pair. During the second time slot, the secondary transmitter acts as a jammer while the relay forwards data to the secondary destination. In effect, this allows for cooperation among the nodes both in transmitting primary and secondary data while reducing the eavesdropper's ability to listen in on the primary link communication. For the proposed protocol, we derive closed-form expressions of the intercept probability. We also obtain a closed-form expression of the outage probability along with the secondary communication link. Moreover, we study the effect of transmit power allocation on intercept and outage probabilities along with the different links. Theoretical and simulation results are given to prove that the proposed protocol can provide better security for the primary link and acquire acceptable secondary outage probability.
Open Research
Data Availability Statement
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
References
- 1E. Steven Gringeri, B. Basch, and T. J. Xia, “Technical Considerations for Supporting Data Rates Beyond 100 Gb/s,” IEEE Communications Magazine 50, no. 2 (2012): s21–s30.
10.1109/MCOM.2012.6146482 Google Scholar
- 2S. Chen and J. Zhao, “The Requirements, Challenges, and Technologies for 5g of Terrestrial Mobile Telecommunication,” IEEE Communications Magazine 52, no. 5 (2014): 36–43.
- 3 Global Mobile Suppliers Association, The Road to 5G: Drivers, Applications, Requirements and Technical Development (Global Mobile Suppliers Association, 2015).
- 4M. F. Al-Mistarihi, R. Mohaisen, and K. A. Darabkh, “ Ber Analysis in Relay-Based Df Cooperative Diversity Systems Over Rayleigh Fading Channels With Non-Identical Interferers Near the Destination,” in 2019 International Conference on Advanced Communication Technologies and Networking (CommNet) (IEEE, 2019), 1–5.
10.1109/COMMNET.2019.8742388 Google Scholar
- 5S. Li, X. Li Da, and S. Zhao, “5g Internet of Things: A Survey,” Journal of Industrial Information Integration 10 (2018): 1–9.
- 6M. F. Al-Mistarihi, R. Mohaisen, and K. A. Darabkh, “Performance of Relay-Based Decode-and-Forward Cooperative Diversity Systems Over Rayleigh Fading Channels With Non-Identical Interferers,” IET Communications 13, no. 19 (2019): 3135–3144.
- 7M. F. Al-Mistarihi, R. Mohaisen, and K. A. Darabkh, “ Closed-Form Expression for Ber in Relay-Based Df Cooperative Diversity Systems Over Nakagami-m Fading Channels With Non-Identical Interferers,” in Internet of Things, Smart Spaces, and Next Generation Networks and Systems (Springer, 2019), 700–709.
10.1007/978-3-030-30859-9_61 Google Scholar
- 8M. M. Shurman, M. F. Al-Mistarihi, and M. M. Alhulayil, “Performance Analysis of Amplify-and-Forward Cognitive Relay Networks With Interference Power Constraints Over Nakagami-m Fading Channels,” IET Communications 10, no. 5 (2016): 594–605.
- 9M. F. Al-Mistarihi, M. M. Harb, K. A. Darabkh, and A. S. Aqel, “On the Performance Analysis of Dual Hop Relaying Systems Using Differential Amplify-and-Forward Along With Post-Detection Selection Combining Techniques Over Nakagami-m Fading Channels,” Transactions on Emerging Telecommunications Technologies 31, no. 11 (2020): e4065.
- 10F. Mamoun, A. S. Al-Mistarihi, R. Mohaisen, O. Abu-Alnadi, and H. Abu-Seba, “ Performance Analysis of Multiuser Diversity in Multiuser Two-Hop Amplify and Forward Cooperative Multi-Relay Wireless Networks,” in 2012 Proceedings of the 35th International Convention MIPRO (IEEE, 2012), 647–651.
- 11A. Vukovic and A. Alrjoob, “ Furthering Innovation in Hyper Communication Era,” in 2020 Global Congress on Electrical Engineering (GC-ElecEng) (IEEE, 2020), 1–5.
10.23919/GC-ElecEng48342.2020.9285987 Google Scholar
- 12A. Magableh, M. F. Al-Mistarihi, and R. Mohaisen, “ Closed-Form Expression for Bit Error Rate in Relay-Based Cooperative Diversity Systems Over Multipath Fading Channels With Interference,” in 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) (IEEE, 2013), 551–555.
10.1109/IWCMC.2013.6583617 Google Scholar
- 13A. M. Hayajneh, M. Khodeir, and M. F. Al-Mistarihi, “ Incremental-Relaying Cooperative-Networks Using Dual Transmit Diversity and Decode and Forward Relaying Scheme With Best Relay Selection,” in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (IEEE, 2014), 571–576.
10.1109/MIPRO.2014.6859633 Google Scholar
- 14M. S. Aloqlah, I. E. Atawi, and M. F. Al-Mistarihi, “ On the Performance of Fixed-Gain Amplify-and-Forward Dual-Hop Relay Systems With Beamforming Under k— Shadowed Fading,” in 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (IEEE, 2015), 814–818.
10.1109/PIMRC.2015.7343409 Google Scholar
- 15L. N. Ibrahem, M. F. Al-Mistarihi, M. A. Khodeir, M. Alhulayil, and K. A. Darabkh, “Best Relay Selection Strategy in Cooperative Spectrum Sharing Framework With Mobile-Based End User,” Applied Sciences 13, no. 14 (2023): 8127.
- 16M. F. Al-Mistarihi, R. Mohaisen, and K. A. Darabkh, “Performance Evaluation of Decode and Forward Cooperative Diversity Systems Over Nakagami-m Fading Channels With Non-Identical Interferers,” International Journal of Electrical and Computer Engineering 10, no. 5 (2020): 5316–5328.
10.11591/ijece.v10i5.pp5316-5328 Google Scholar
- 17Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends,” Proceedings of the IEEE 104, no. 9 (2016): 1727–1765.
- 18Q. Zhao and B. M. Sadler, “A Survey of Dynamic Spectrum Access,” IEEE Signal Processing Magazine 24, no. 3 (2007): 79–89.
- 19M. F. Al-Mistarihi, A. S. Aqel, and K. A. Darabkh, “ Ber Analysis in Dual Hop Differential Amplify-and-Forward Relaying Systems With Selection Combining Using m-Ary Phase-Shift Keying Over Nakagami-m Fading Channels,” in Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 19th International Conference (Springer, 2019), 688–699.
10.1007/978-3-030-30859-9_60 Google Scholar
- 20M. M. Harb and M. F. Al-Mistarihi, “ Dual Hop Differential Amplify-and-Forward Relaying With Selection Combining Cooperative Diversity Over Nakagami-m Fading Channels,” in 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN) (IEEE, 2016), 225–228.
10.1109/ICCSN.2016.7586654 Google Scholar
- 21S. Al-Zoubi, R. Mohaisen, M. F. Al-Mistarihi, S. M. Khatalin, and M. A. Khodeir, “ On the Outage Probability in Df Relay Selection Cooperative Wireless Networks Over Nakagami-m Fading Channels,” in 2016 7th International Conference on Information and Communication Systems (ICICS) (IEEE, 2016), 186–189.
10.1109/IACS.2016.7476108 Google Scholar
- 22M. Alhulayil, M. F. Al-Mistarihi, and M. M. Shurman, “Performance Analysis of Dual-Hop Af Cognitive Relay Networks With Best Selection and Interference Constraints,” Electronics 12, no. 1 (2022): 124.
10.3390/electronics12010124 Google Scholar
- 23M. Shakiba-Herfeh, A. Chorti, and H. Vincent Poor, “ Physical Layer Security: Authentication, Integrity, and Confidentiality,” in Physical Layer Security (Springer, 2021), 129–150.
10.1007/978-3-030-55366-1_6 Google Scholar
- 24Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, “ System-Level Performance Evaluation of Downlink Non-Orthogonal Multiple Access (Noma),” in 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (IEEE, 2013), 611–615.
10.1109/PIMRC.2013.6666209 Google Scholar
- 25L. Zhang, Y. Cunhua Pan, H. R. Wang, and K. Wang, “Robust Beamforming Design for Intelligent Reflecting Surface Aided Cognitive Radio Systems With Imperfect Cascaded Csi,” IEEE Transactions on Cognitive Communications and Networking 8, no. 1 (2021): 186–201.
- 26Y. Weiheng Jiang, J. Z. Zhang, Z. Xiong, and Z. Ding, “Joint Transmit Precoding and Reflect Beamforming Design for Irs-Assisted Mimo Cognitive Radio Systems,” IEEE Transactions on Wireless Communications 21, no. 6 (2022): 3617–3631.
10.1109/TWC.2021.3122959 Google Scholar
- 27W. Shuangshuang, W. Zhang, J. Yan, N. Noma, A. Young, and Z. Yan, “Worldwide Prevalence Estimates of Burning Mouth Syndrome: A Systematic Review and Meta-Analysis,” Oral Diseases 28, no. 6 (2022): 1431–1440.
- 28Z. Ding, Z. Yang, P. Fan, and H. Vincent Poor, “On the Performance of Non-Orthogonal Multiple Access in 5g Systems With Randomly Deployed Users,” IEEE Signal Processing Letters 21, no. 12 (2014): 1501–1505.
- 29X. Li, Y. Zheng, M. D. Alshehri, et al., “Cognitive Ambc-Noma Iov-Mts Networks With Iqi: Reliability and Security Analysis,” IEEE Transactions on Intelligent Transportation Systems 24, no. 2 (2023): 2596–2607.
- 30H. Xiao, X. Changqiao, Y. Ma, S. Yang, L. Zhong, and G.-M. Muntean, “Edge Intelligence: A Computational Task Offloading Scheme for Dependent Iot Application,” IEEE Transactions on Wireless Communications 21, no. 9 (2022): 7222–7237.
- 31H. Xiao, X. Changqiao, Z. Feng, et al., “A Transcoding-Enabled 360 Vr Video Caching and Delivery Framework for Edge-Enhanced Next-Generation Wireless Networks,” IEEE Journal on Selected Areas in Communications 40, no. 5 (2022): 1615–1631.
- 32H. Xiao, Y. Zhuang, X. Changqiao, et al., “Transcoding-Enabled Cloud-Edge-Terminal Collaborative Video Caching in Heterogeneous Iot Networks: A Online Learning Approach With Time-Varying Information,” IEEE Internet of Things Journal 11, no. 1 (2024): 296–310.
10.1109/JIOT.2023.3312916 Google Scholar
- 33H. Xiao, Z. Huang, X. Zuyun, et al., “Task-Driven Cooperative Internet of the Robotic Things Crowdsourcing: From the Perspective of Hierarchical Game-Theoretic,” IEEE Internet of Things Journal 11, no. 20 (2024): 32350–32362.
10.1109/JIOT.2024.3349538 Google Scholar
- 34D. H. Tashman and W. Hamouda, “Physical-Layer Security on Maximal Ratio Combining for Simo Cognitive Radio Networks Over Cascaded - Fading Channels,” IEEE Transactions on Cognitive Communications and Networking 7, no. 4 (2021): 1244–1252.
10.1109/TCCN.2021.3074178 Google Scholar
- 35D. H. Tashman and W. Hamouda, “ Towards Improving the Security of Cognitive Radio Networks-Based Energy Harvesting,” in ICC 2022-IEEE International Conference on Communications (IEEE, 2022), 3436–3441.
- 36N. D. Nguyen, A.-T. Le, and M. Munochiveyi, “ Secrecy Outage Probability of Reconfigurable Intelligent Surface-Aided Cooperative Underlay Cognitive Radio Network Communications,” in 2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS) (IEEE, 2021), 73–77.
10.23919/APNOMS52696.2021.9562609 Google Scholar
- 37A. M. Abidrabbu and M. F. Al-Mistarihi, “ Outage Probability and Network Throughput Analysis of Femtocells in 5g Heterogeneous Networks,” in 2022 13th International Conference on Information and Communication Systems (ICICS) (IEEE, 2022), 491–494.
10.1109/ICICS55353.2022.9811231 Google Scholar
- 38R. Mohaisen, M. F. Al-Mistarihi, and K. A. Darabkh, “ Outage Probability Evaluation for Relay-Based Df Cooperative Diversity Systems With Multipath Fading Channels and Non-Identical Interferers,” in 2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE) (IEEE, 2020), 1–5.
10.1109/ICRAIE51050.2020.9358336 Google Scholar
- 39P. X. Nguyen, V.-D. Nguyen, H. V. Nguyen, and O.-S. Shin, “Uav-Assisted Secure Communications in Terrestrial Cognitive Radio Networks: Joint Power Control and 3d Trajectory Optimization,” IEEE Transactions on Vehicular Technology 70, no. 4 (2021): 3298–3313.
- 40N. Nandan, S. Majhi, and W. Hsiao-Chun, “Beamforming and Power Optimization for Physical Layer Security of Mimo-Noma Based Crn Over Imperfect Csi,” IEEE Transactions on Vehicular Technology 70, no. 6 (2021): 5990–6001.
- 41Y. Zou, B. Champagne, W.-P. Zhu, and L. Hanzo, “Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems,” IEEE Transactions on Communications 63, no. 1 (2014): 215–228.
10.1109/TCOMM.2014.2377239 Google Scholar
- 42Y. Liu, L. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, “Relay Selection for Security Enhancement in Cognitive Relay Networks,” IEEE Wireless Communications Letters 4, no. 1 (2014): 46–49.
- 43M. F. Al-Mistarihi, A. Magableh, and R. Mohaisen, “ Closed-Form Expression for Outage Probability in Relay-Based Cooperative Diversity Systems Over Multipath Fading Channels With Interference,” in 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14) (IEEE, 2014), 1–5.
10.1109/SSD.2014.6808777 Google Scholar
- 44L. N. Ibrahem, M. A. Khodeir, and M. F. Al-Mistarihi, “ Outage Probability for End User Mobile in Cognitive Relay Networks Over Mixed Fading Channels,” in 2017 8th International Conference on Information and Communication Systems (ICICS) (IEEE, 2017), 292–295.
10.1109/IACS.2017.7921987 Google Scholar
- 45M. A. Khodeir, M. F. Al-Mistarihi, and L. N. Ibrahem, “Performance Evaluation of Cognitive Relay Networks for End User Mobile Over Mixed Realistic Channels,” IET Communications 17, no. 2 (2023): 228–245.
- 46L. Dong, H.-M. Wang, and H. Xiao, “Secure Cognitive Radio Communication via Intelligent Reflecting Surface,” IEEE Transactions on Communications 69, no. 7 (2021): 4678–4690.
- 47Y. Zou, “Physical-Layer Security for Spectrum Sharing Systems,” IEEE Transactions on Wireless Communications 16, no. 2 (2016): 1319–1329.
- 48Y. Zou, X. Wang, and W. Shen, “Physical-Layer Security With Multiuser Scheduling in Cognitive Radio Networks,” IEEE Transactions on Communications 61, no. 12 (2013): 5103–5113.
- 49R. Mohaisen, M. F. Al-Mistarihi, and K. A. Darabkh, “ Bit-Error Rate Analysis of Relay-Based Df Cooperative Diversity Systems Considering Multipath Fading Channels Along With Non-Identical Interferers,” in 2020 7th NAFOSTED Conference on Information and Computer Science (NICS) (IEEE, 2020), 393–398.
10.1109/NICS51282.2020.9335855 Google Scholar
- 50A. S. Aqel and M. F. Al-Mistarihi, “Performance Analysis of Dual-Hop Dual-Branch Amplify-and-Forward Relaying Cooperative Diversity System Using Best-Path Selection Technique Over Nakagami-m Fading Channels,” Transactions on Emerging Telecommunications Technologies 35, no. 1 (2024): e4877.
- 51H. Sakran, M. Shokair, S. Omar Nasr, S. El-Rabaie, and A. A. El-Azm, “Proposed Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks,” IET Communications 6, no. 16 (2012): 2676–2687.
- 52B. Soni, D. K. Patel, S. Kavaiya, M. O. Hasna, and M. Lopez-Benitez, “ On Physical Layer Security of Correlated Multiantenna Cognitive Radio Receivers,” in 2021 National Conference on Communications (NCC) (IEEE, 2021), 1–6.
10.1109/NCC52529.2021.9530195 Google Scholar
- 53W. Xuewen, J. Ma, Z. Xing, G. Chenwei, X. Xue, and X. Zeng, “Secure and Energy Efficient Transmission for Irs-Assisted Cognitive Radio Networks,” IEEE Transactions on Cognitive Communications and Networking 8, no. 1 (2021): 170–185.
- 54N. Nurelmadina, M. K. Hasan, I. Memon, et al., “A Systematic Review on Cognitive Radio in Low Power Wide Area Network for Industrial Iot Applications,” Sustainability 13, no. 1 (2021): 338.
- 55P. Xie, M. Zhang, G. Zhang, R. Zheng, L. Xing, and W. Qingtao, “On Physical-Layer Security for Primary System in Underlay Cognitive Radio Networks,” IET Networks 7, no. 2 (2017): 68–73.
10.1049/iet-net.2017.0138 Google Scholar
- 56J. Sun, Z. Bie, H. Bie, P. He, and M. Jin, “Secrecy Analysis of Cognitive Radio Networks Over Generalized Fading Channels,” Security and Communication Networks (2020). https://doi.org/10.1155/2020/8842012.
- 57M. H. Khoshafa, J. M. Moualeu, T. M. N. Ngatched, and M. H. Ahmed, “On the Performance of Secure Underlay Cognitive Radio Networks With Energy Harvesting and Dual-Antenna Selection,” IEEE Communications Letters 25, no. 6 (2021): 1815–1819.
- 58W. Xuewen, J. Ma, G. Chenwei, X. Xue, and X. Zeng, “Robust Secure Transmission Design for Irs-Assisted Mmwave Cognitive Radio Networks,” IEEE Transactions on Vehicular Technology 71, no. 8 (2022): 8441–8456.
10.1109/TVT.2022.3172293 Google Scholar
- 59Y. Li, R. Zhang, J. Zhang, and L. Yang, “Cooperative Jamming via Spectrum Sharing for Secure Uav Communications,” IEEE Wireless Communications Letters 9, no. 3 (2019): 326–330.
10.1109/LWC.2019.2953725 Google Scholar
- 60M. H. Khoshafa, T. M. N. Ngatched, and M. H. Ahmed, “On the Physical Layer Security of Underlay Relay-Aided Device-To-Device Communications,” IEEE Transactions on Vehicular Technology 69, no. 7 (2020): 7609–7621.
- 61C. Gong, X. Yue, Z. Zhang, X. Wang, and X. Dai, “Enhancing Physical Layer Security With Artificial Noise in Large-Scale Noma Networks,” IEEE Transactions on Vehicular Technology 70, no. 3 (2021): 2349–2361.
- 62H. R. Karimi, “ Geolocation Databases for White Space Devices in the Uhf Tv Bands: Specification of Maximum Permitted Emission Levels,” in 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN) (IEEE, 2011), 443–454.
10.1109/DYSPAN.2011.5936234 Google Scholar
- 63M. Nekovee, T. Irnich, and J. Karlsson, “Worldwide Trends in Regulation of Secondary Access to White Spaces Using Cognitive Radio,” IEEE Wireless Communications 19, no. 4 (2012): 32–40.
- 64W. Xiang, K. Zheng, and X. S. Shen, 5G Mobile Communications (Springer, 2016).
- 65X. Jiang, P. Li, B. Li, Y. Zou, and R. Wang, “Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications,” Security and Communication Networks 1–16 (2021): 2021.
- 66A. Jeffrey and D. Zwillinger, Table of Integrals, Series, and Products (Elsevier, 2007).
- 67S. Maričić, N. Milošević, D. Drajić, D. Milić, and J. Anastasov, “Physical Layer Intercept Probability in Wireless Sensor Networks Over Fisher Snedecor f Fading Channels,” Electronics 10, no. 12 (2021): 1368.
- 68Y. Zhou and T.-S. Ng, “Mimo-Ofcdm Systems With Joint Iterative Detection and Optimal Power Allocation,” IEEE Transactions on Wireless Communications 7, no. 12 (2008): 5504–5516.
- 69Y. Huogen, W. Tang, and S. Li, “Outage Probability and Ser of Amplify-and-Forward Cognitive Relay Networks,” IEEE Wireless Communications Letters 2, no. 2 (2013): 219–222.
10.1109/WCL.2013.012513.120834 Google Scholar