Volume 36, Issue 3 e70080
RESEARCH ARTICLE

Secure 5G Coordinating Spectrum Sharing System With Cooperation Transmitter and Receiver Pairs

Ayat M. Al-Rjoob

Ayat M. Al-Rjoob

Electrical Engineering Department, German-Jordanian University, Amman, Jordan

Electrical Engineering Department, Jordan University of Science and Technology, Irbid, Jordan

Search for more papers by this author
Ahmad A. Ababnah

Corresponding Author

Ahmad A. Ababnah

Electrical Engineering Department, Jordan University of Science and Technology, Irbid, Jordan

Correspondence: Ahmad A. Ababnah ([email protected])

Search for more papers by this author
Mamoun F. Al-Mistarihi

Mamoun F. Al-Mistarihi

Electrical Engineering Department, Jordan University of Science and Technology, Irbid, Jordan

Search for more papers by this author
First published: 06 March 2025
Funding: The authors received no specific funding for this work.

ABSTRACT

In this paper, we propose a 6-node system consisting of two transmitter-receiver pairs sharing the same spectrum, an eavesdropper, and a relay, all operating in a half-duplex. The eavesdropper is mainly interested in communication between one of the transmitter-receiver pairs, which we call the primary. Communication along with the second pair called the secondary, is performed in two hops/time slots with the aid of the relay. The main idea of our study is to investigate the secrecy performance of the primary pair when jamming is performed by the secondary relay-assisted path. In particular, in the first time slot, the secondary destination acts as a jammer relative to the eavesdropper by injecting artificial noise known to the primary pair. During the second time slot, the secondary transmitter acts as a jammer while the relay forwards data to the secondary destination. In effect, this allows for cooperation among the nodes both in transmitting primary and secondary data while reducing the eavesdropper's ability to listen in on the primary link communication. For the proposed protocol, we derive closed-form expressions of the intercept probability. We also obtain a closed-form expression of the outage probability along with the secondary communication link. Moreover, we study the effect of transmit power allocation on intercept and outage probabilities along with the different links. Theoretical and simulation results are given to prove that the proposed protocol can provide better security for the primary link and acquire acceptable secondary outage probability.

Data Availability Statement

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.