Next Article in Journal
Study of Intra-Chamber Processes in Solid Rocket Motors by Fiber Optic Sensors
Next Article in Special Issue
Federated Reinforcement Learning Based AANs with LEO Satellites and UAVs
Previous Article in Journal
Enhanced Network Intrusion Detection System
Previous Article in Special Issue
Continuous Productivity Improvement Using IoE Data for Fault Monitoring: An Automotive Parts Production Line Case Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Low-Complexity Transmit Power Control for Secure Communications in Wireless-Powered Cognitive Radio Networks

Department of Information and Communication Engineering, Dongguk University, Seoul 04620, Korea
Sensors 2021, 21(23), 7837; https://doi.org/10.3390/s21237837
Submission received: 2 November 2021 / Revised: 22 November 2021 / Accepted: 24 November 2021 / Published: 25 November 2021

Abstract

:
In this study, wireless-powered cognitive radio networks (WPCRNs) are considered, in which N sets of transmitters, receivers and energy-harvesting (EH) nodes in secondary networks share the same spectrum with primary users (PUs) and none of the EH nodes is allowed to decode information but can harvest energy from the signals. Given that the EH nodes are untrusted nodes from the point of view of information transfer, the eavesdropping of secret information can occur if they decide to eavesdrop on information instead of harvesting energy from the signals transmitted by secondary users (SUs). For secure communications in WPCRNs, we aim to find the optimal transmit powers of SUs that maximize the average secrecy rate of SUs while maintaining the interference to PUs below an allowable level, while guaranteeing the minimum EH requirement for each EH node. First, we derive an analytical expression for the transmit power via dual decomposition and propose a suboptimal transmit power control algorithm, which is implemented in an iterative manner with low complexity. The simulation results confirm that the proposed scheme outperforms the conventional distributed schemes by more than 10% in terms of the average secrecy rate and outage probability and can also considerably reduce the computation time compared with the optimal scheme.

1. Introduction

Cognitive radio networks (CRNs) have received considerable attention as a means to use the unused spectrum to enhance the spectral efficiency (SE) [1]. In CRNs, unlicensed secondary users (SUs) can opportunistically access the spectrum unoccupied by primary users (PUs) as long as they do not interfere with the operation of the PUs [2]. To realize effective spectrum sharing between two networks, several researchers have attempted to mitigate co-channel interference, for instance, through transmit power control (TPC) [3,4], subcarrier allocation [5] and transmit beamforming pattern [6].
In addition to spectrum sharing, there exist many opportunities to harvest energy from radio frequency (RF) signals in CRNs; thus, wireless-powered CRNs (WPCRNs) have actively been investigated [7,8,9,10,11]. The authors of [7,8] proposed a joint information and energy cooperation strategy between PUs and SUs, while cooperative spectrum sensing was optimized under the constraints of collision and energy causality [9]. Moreover, resource allocation strategies have been suggested to maximize the sum throughput of SUs capable of energy harvesting (EH) [10,11].
Notably, the coexistence of different networks is associated with a security issue owing to the increased risk of eavesdropping. Consequently, a number of studies on physical layer security have been performed to guarantee secure communications without relying on a secret key in CRNs [12,13,14,15]. In particular, the security-aware scheduling and power allocation of SUs were optimized to maximize the sum secrecy throughput [12] and resource allocation was proposed to maximize the sum rate of SUs while ensuring the secrecy outage constraint of PUs [13]. In [14], a security-aware proportional fairness resource allocation was developed to improve the sum secrecy throughput and user fairness of SUs. Furthermore, an optimal relay selection was proposed for WPCRNs and the secrecy performances were analyzed with respect to the secrecy outage probability and ergodic rate [15]. Nevertheless, research on WPCRNs remains limited and most of the existing security strategies for CRNs are based on a centralized approach, which involves a high computational complexity [12,13,14]. Distributed TPC strategies were studied in [16,17]; however, these schemes showed not only sub-optimal performances but also could not be directly applied to WPCRNs. Therefore, it is necessary to establish a security-aware TPC algorithm that can be implemented with a low complexity for practical WPCRNs.
Considering this aspect, this research study focuses on secure communications for WPCRNs. The contributions of our work can be summarized as follows:
  • We present a practical system model for WPCRNs, in which multiple SUs share the same spectrum with PUs and EH nodes are not allowed to interpret information but are licensed to collect energy from the transmitted signals.
  • To prevent eavesdropping of untrusted EH nodes and share the spectrum efficiently, an optimization problem is formulated to derive the optimal transmit powers of SU transmitters (Txs) to maximize the average secrecy rate of SUs while ensuring the requirements of allowable interference on PU receiver (Rx) and minimum amount of energy for each EH node. Given that the formulated problem is non-convex, dual decomposition is performed to identify the suboptimal value of the transmit power and develop a low complexity TPC strategy.
  • Performance evaluations based on intensive simulations show that the proposed scheme achieves near-optimal performances in terms of the average secrecy rate and outage probability and significantly reduces the computational complexity compared with the optimal scheme.
The remaining paper is organized as follows: Section 2 presents the system model of the WPCRNs, along with the problem statement. Section 3 describes the low-complexity TPC algorithm. Section 4 describes the performance evaluation of the proposed scheme based on extensive simulations. The concluding remarks are presented in Section 5.

2. System Model and Problem Statement

Figure 1 shows the system model of WPCRNs for secure communications, in which all nodes are equipped with a single antenna. In particular, N SU Tx–Rx pairs share the same frequency with PUs as long as the amount of interference on PUs is less than an allowable level. Moreover, N EH nodes associated with each SU Tx–Rx pair are not permitted to decode information and are only allowed to harvest energy from the transmitted signals. Consequently, these nodes are regarded as untrusted nodes [18]. The sets of SU Tx–Rx pairs and their associated EH nodes are denoted as N , i.e.,  | N | = N . The wireless channel between SU Tx i and SU Rx j is denoted as h i , j and that between SU Tx i and EH node j is denoted as g i , j . In addition, the index 0 corresponds to PUs, i.e.,  h i , 0 is the wireless channel between SU Tx i and PU Rx and  g 0 , i is the wireless channel between PU Tx and EH node i. It is assumed that all wireless channels follow a discrete time block-fading model and  h i , 0 is available at SU Tx i to maintain the amount of interference on PU Rx below an acceptable level [19].
The signal received at SU Rx i is expressed as
y i = p i h i , i x i + k N \ { i } p k h k , i x k + p 0 h 0 , i x 0 + z i ,
where x i and x 0 indicate the normalized data sent by SU Tx i and PU Tx with transmit power p i and p 0 , respectively; z i CN 0 , σ 2 represents additive white Gaussian noise.
Using (1), the achievable SE can be specified as
r i = log 2 1 + p i | h i , i | 2 k N \ { i } p k | h k , i | 2 + p 0 | h 0 , i | 2 + σ 2 .
The interference caused by SU Tx i on PU Rx is expressed as
I i = p i | h i , 0 | 2 .
Moreover, the signal received at EH node i is obtained as
y ^ i = p i g i , i x i + k N \ { i } p k g k , i x k + p 0 g 0 , i x 0 + z ^ i ,
where z ^ i CN 0 , σ 2 . Because each EH node can collect energy from the signals sent by all Txs, the total energy harvested at EH node i is represented by
e i = ζ i p 0 | g 0 , i | 2 + j N p j | g j , i | 2 ,
where ζ i is the energy conversion efficiency at EH node i. If EH node i stops harvesting energy and decides to eavesdrop on information from SU Tx i, its achievable SE is defined as
r i e = log 2 1 + p i | g i , i | 2 k N \ { i } p k | g k , i | 2 + p 0 | g 0 , i | 2 + σ 2 .
Using (2) and (6), the secrecy rate of set i can be defined as follows [20]:
r i s = [ r i r i e ] + ,
where [ · ] + = max ( 0 , · ) .
To ensure the information secrecy from untrusted EH nodes while supplying a sufficient amount of energy to each EH node, E min , and maintaining the interference to PU Rx below an allowable level, I max , the transmit powers of SU Txs must be optimized. Accordingly, the problem of average secrecy rate maximization can be formulated as follows:
max 0 p 1 N i N r i s s . t . i N I i I max e i E min , i N p i P max , i N ,
where p = { p 1 , p 2 , , p N } and P max denotes the maximum transmit power for SU Txs. The co-channel interference of the objective function renders the problem (8) non-convex; thus, it is difficult to derive the optimal value of p in an analytical form. The near-optimal solution can be numerically determined through an exhaustive search (ES), in which all possible combinations are examined by quantizing p into Q equally spaced values. However, this process requires the complete channel state information (CSI) and extremely high computational complexity of O Q N ; thus, the process has an exponential complexity with respect to N.

3. Low-Complexity Transmit Power Control Algorithm

In this section, dual decomposition is used to find a suboptimal TPC algorithm with low complexity.
First, the original problem (8) is decomposed into N subproblems and each subproblem is simultaneously solved. In each subproblem, the objective is changed to identify the transmit power of SU Tx that maximizes its own secrecy rate while ensuring the constraints of I max and E min , which is formulated as follows:
max 0 p i r i s s . t . I i I max N e i E min p i P max .
In (9), each SU Tx regulates the interference to PU Rx smaller than I max N to meet the constraint, i N I i I max .
To solve problem (9), we develop the Lagrangian function of (9) as follows [21]:
L ( p i , λ i , μ i , κ i ) = r i s + λ i I max N I i + μ i e i E min + κ i P max p i ,
where λ i 0 , μ i 0 and  κ i 0 are the Lagrange multipliers of each constraint in (9).
The dual problem of (9) can be formulated as follows [22]:
min 0 λ i , 0 μ i , 0 κ i F ( λ i , μ i , κ i ) ,
where F ( λ i , μ i , κ i ) = max p i 0 L ( p i , λ i , μ i , κ i ) . In this framework, the transmit power is updated to maximize L ( p i , λ i , μ i , κ i ) , whereas the Lagrange multipliers are updated to minimize F ( λ i , μ i , κ i ) in each SU Tx in an iterative manner.
To derive the suboptimal value of p i , the Karush–Kuhn–Tucker (KKT) conditions [21] are established with complementary slackness, as follows:
L ( p i , λ i , μ i , κ i ) p i = r i s p i λ i I i p i + μ i e i p i κ i = 0 ,
λ i I max N I i = 0 ,
μ i e i E min = 0 ,
κ i P max p i = 0 ,
0 p i , 0 λ i , 0 μ i , 0 κ i .
The transmit power that satisfies the KKT conditions in (12)–(16) can be derived as
p i = 1 ln 2 λ i | h i , 0 | 2 μ i ζ i | g i , i | 2 + κ i + t i [ s ] Ψ i | h i , i | 2 + ,
where Ψ i = j N \ { i } p j | h j , i | 2 + p 0 | h 0 , i | 2 + σ 2 and  t i [ s ] is defined as
t i [ s ] = | g i , i | 2 R i ,
where R i = l N p l | g l , i | 2 + p 0 | g 0 , i | 2 + σ 2 . In (17), Ψ i can be easily measured at SU Rx i by subtracting the signal power from SU Tx i from the total received power. Moreover, t i [ s ] can be calculated at EH node i because the denominator of (18) is the total received power. Therefore, the transmit power of SU Tx i can be determined as shown in (17) by sharing information within set i without other sets j N \ { i } , which allows the proposed algorithm to operate with low complexity.
Each Lagrange multiplier is updated using a gradient algorithm as follows [22]:
λ i λ i ν 1 I max N I i + , μ i μ i ν 2 e i E min + , κ i κ i ν 3 P max p i + ,
where ν 1 , ν 2 and  ν 3 are step sizes to update each Lagrange multiplier.
The proposed algorithm operates as described in Algorithm 1. Because  ϵ 2 iterations are required to ensure that the norm of the gradient is smaller than ϵ in the worst case [23], the computational complexity of the proposed algorithm is O N ϵ 2 , where N is the number of computations for the calculation of p . The proposed algorithm exhibits a linear complexity with respect to N, which corresponds to a significant reduction in the computational complexity compared to that of the ES. It is worth noting that the centralized approach hinders real-time operability as it requires a long computation time to determine the TPC strategy, but the low complexity of the proposed scheme improves its practical applicability for WPCRNs.
Algorithm 1 Low-complexity transmit power control algorithm
1: Randomly initialize p , λ , μ and  κ
2: repeat
3:   p old p
4:  for i = 1 to N
5:   Compute t i [ s ] according to (18)
6:   Compute p i according to (17)
7:   Update λ i , μ i and  κ i according to (19)
8:  end for
9:   p = { p 1 , p 2 , , p N }
10: until p p old < ϵ

4. Simulation Results and Discussion

To evaluate the performance of the proposed scheme, the following system parameters, shown in Table 1, were set as default: N = 3, P max = p 0 = 30 dBm, σ 2 = 100 dBm, E min = 15 dBm, I max = 50 dBm and ζ i = 0.5 for i N [19,24]. Considering device-to-device communications underlay cellular networks as the target system of WPCRNs [16], the SUs and EH nodes were generated randomly over an area of 50 m × 50 m, with the maximum distances of each signal link and EH link in the same node set defined as 15 m and 10 m, respectively. Moreover, the secondary network was located, on average 1 km, from PUs for reliable spectrum sharing. To generate the wireless channels, a simplified path loss model with a path loss exponent of 2.7 was considered for urban areas [18]. In addition, for multi-path fading, Rayleigh fading was used for the signal links to reflect the characteristics of non-line-of-sight (nLoS), while Rician fading with a K-factor of six was used for the EH links to reflect the characteristics of line-of-sight (LoS) [24]. The performance metrics are the average secrecy rate and outage probability, which can be mathematically expressed as E 1 i N I i I max · i N 1 e i E min · 1 N i N r i s and E 1 1 i N I i I max · i N 1 e i E min , respectively. The average secrecy rate was set as zero if the constraint of I max or E min was violated to impose a penalty. We also considered the following five schemes for performance evaluation:
  • Optimal scheme: With the complete CSI at SU Txs, the ES can attain near-optimal performance with Q = 100 .
  • Proposed TPC scheme: The transmit powers of SU Txs are determined using the proposed algorithm described in Algorithm 1.
  • Barrier scheme: The transmit powers of SU Txs are determined by a centralized barrier method [21,25], which is one of interior-point methods.
  • Binary TPC scheme: The transmit power of each SU Tx is determined as either P max or zero in the direction of maximizing the average secrecy rate [17].
  • Maximum power scheme: The transmit powers of SU Txs are always determined as their maximum transmit powers, P max .
  • Random power scheme: The transmit powers of SU Txs are randomly determined.
Figure 2 shows the average secrecy rate and outage probability against the allowable interference level ( I max ). As I max decreased, it became more difficult to satisfy the constraint of I max . Therefore, for conventional distributed schemes, e.g., binary TPC, maximum power and random power schemes, the outage probability increased and the average secrecy rate significantly degraded. Specifically, although the binary scheme took values of either P max or zero for the transmit power, it implemented adaptive TPC and exhibited the highest performance among the conventional distributed schemes. The maximum power scheme outperformed the random power scheme, but the performance trend reverses as I max decreased due to a critical violation of the constraint of I max . In contrast, the proposed scheme effectively regulated the amount of interference to PU Rx to the allowable level by the effective TPC even when I max = 60 dBm. Therefore, the performance is comparable to that of the optimal scheme and centralized barrier scheme and the proposed scheme outperformed the conventional distributed schemes for the entire range of I max .
Figure 3 shows the average secrecy rate and outage probability against the required harvested energy ( E min ). As in the case shown in Figure 2, it was hard to provide adequate energy to EH nodes to satisfy the EH requirements as E min increased. Consequently, the average secrecy rate decreased and the outage probability increased for all considered schemes when E min > 10 dBm. In particular, the performance of the binary and random schemes was inferior to that of the proposed scheme because these schemes could not adaptively perform TPC according to variations in the channel realization or constraints. The performance of the maximum power scheme was relatively constant against the change in E min because it always uses the maximum transmit power; however, the scheme achieved the worst performance due to excessive interference among node sets. In contrast, the proposed scheme exhibited near-optimal performance for the entire range of E min .
Figure 4 shows the average secrecy rate, outage probability and computation time against the number of node sets (N). As N increased, the node sets exhibited severe interference with one another. Therefore, the average secrecy rate decreased with N for all the considered schemes. The maximum and random power schemes corresponded to the least computation time because no computation was required to determine the transmit powers in these schemes and computation time for the binary scheme was less than that for the proposed scheme. Although the proposed scheme required a relatively high computation time to determine the transmit powers, it outperformed the conventional distributed schemes in terms of the average secrecy rate and outage probability owing to the implementation of proper TPC to reduce interference. Moreover, the performance of the proposed scheme is comparable to that of the optimal scheme with a significantly reduced computation time. The centralized barrier scheme performed slightly better than the proposed method, but required high computation time and knowledge of perfect CSI. This result demonstrates the effectiveness of the proposed scheme in achieving secure communications with a reasonable computational complexity.
Figure 5 shows the cumulative distribution function (CDF) versus the average secrecy rate. The CDF of the proposed scheme was the closest to that of the optimal scheme, which demonstrates the near-optimality of the proposed TPC strategy. Moreover, higher average secrecy rates were noted in the CDFs of the optimal and proposed schemes than in the existing distributed schemes, which indicates that the adaptive TPC is crucial to enhance the average secrecy rate.

5. Conclusions

A low-complexity TPC algorithm to realize secure communications in WPCRNs was developed, in which the transmit powers of SU Txs are optimized to maximize the average secrecy rate while ensuring the requirements of allowable interference on PUs and the minimum amount of energy for each EH node. In particular, the closed-form equation for the transmit power of each SU Tx was mathematically derived via dual decomposition and a low-complexity TPC algorithm implemented in an iterative manner was established. Simulations performed under various scenarios highlight that the proposed scheme could enhance the average secrecy rate and outage probability, e.g., at least 10% or more compared to the existing schemes at default settings, owing to the use of the adaptive TPC strategy. Moreover, the proposed scheme reduced the computation time compared to the optimal scheme, such that its computation time was less than tens of milliseconds even when the number of nodes was large.

Funding

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2021R1A2C4002024).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, X.; Chen, H.; Meng, W. Cooperative communications for cognitive radio networks - From theory to applications. IEEE Commun. Surv. Tutor. 2014, 16, 1180–1192. [Google Scholar] [CrossRef]
  2. Salam, A.O.A.; Sheriff, R.E.; Al-Araji, S.R.; Mezher, K.; Nasir, Q. Adaptive threshold and optimal frame duration for multi-taper spectrum sensing in cognitive radio. ICT Exp. 2019, 5, 31–36. [Google Scholar] [CrossRef]
  3. Chen, Y.; Yu, G.; Zhang, Z.; Chen, H.; Qiu, P. On cognitive radio networks with opportunistic power control strategies in fading channels. IEEE Trans. Wirel. Commun. 2008, 7, 2752–2761. [Google Scholar] [CrossRef]
  4. Ren, W.; Zhao, Q.; Swami, A. Power control in cognitive radio networks: How to cross a multi-lane highway. IEEE J. Sel. Areas Commun. 2009, 27, 1283–1296. [Google Scholar] [CrossRef] [Green Version]
  5. Almalfouh, S.M.; Stuber, G.L. Interference-aware radio resource allocation in OFDMA-based cognitive radio networks. IEEE Trans. Veh. Technol. 2011, 60, 1699–1713. [Google Scholar] [CrossRef]
  6. Zhang, Y.; So, A.M. Optimal spectrum sharing in MIMO cognitive radio networks via semidefinite programming. IEEE J. Sel. Areas Commun. 2011, 29, 362–373. [Google Scholar] [CrossRef] [Green Version]
  7. Zheng, G.; Ho, Z.; Jorswieck, E.A.; Ottersten, B. Information and energy cooperation in cognitive radio networks. IEEE Trans. Signal Process. 2014, 62, 2290–2303. [Google Scholar] [CrossRef] [Green Version]
  8. Yin, S.; Zhang, E.; Qu, Z.; Yin, L.; Li, S. Optimal cooperation strategy in cognitive radio systems with energy harvesting. IEEE Trans. Wirel. Commun. 2014, 13, 4693–4707. [Google Scholar] [CrossRef]
  9. Liu, X.; Zheng, K.; Chi, K.; Zhu, Y.H. Cooperative spectrum sensing optimization in energy-harvesting cognitive radio networks. IEEE Trans. Wirel. Commun. 2020, 19, 7663–7676. [Google Scholar] [CrossRef]
  10. Liu, X.; Li, F.; Na, Z. Optimal resource allocation in simultaneous cooperative spectrum sensing and energy harvesting for multichannel cognitive radio. IEEE Access 2017, 5, 3801–3812. [Google Scholar] [CrossRef]
  11. Wang, Y.; Wang, Y.; Zhou, F.; Wu, Y.; Zhou, H. Resource allocation in wireless powered cognitive radio networks based on a practical non-linear energy harvesting model. IEEE Access 2017, 5, 17618–17626. [Google Scholar] [CrossRef]
  12. Xu, L.; Nallanathan, A.; Pan, X.; Yang, J.; Liao, W. Security-aware resource allocation with delay constraint for NOMA-based cognitive radio network. IEEE Trans. Inf. Forensics Secur. 2018, 13, 366–376. [Google Scholar] [CrossRef]
  13. Xu, D.; Li, Q. Resource allocation for cognitive radio with primary user secrecy outage constraint. IEEE Syst. J. 2018, 12, 893–904. [Google Scholar] [CrossRef]
  14. Xu, L.; Cai, L.; Gao, Y.; Xia, J.; Yang, Y.; Chai, T. Security-aware proportional fairness resource allocation for cognitive heterogeneous networks. IEEE Trans. Veh. Technol. 2018, 67, 11694–11704. [Google Scholar] [CrossRef]
  15. Li, M.; Yin, H.; Huang, Y.; Wang, Y.; Yu, R. Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Trans. Veh. Technol. 2018, 67, 11274–11279. [Google Scholar] [CrossRef]
  16. Lee, W.; Ban, T.; Jung, B.C. Distributed transmit power optimization for device-to-device communications underlying cellular networks. IEEE Access 2019, 7, 87617–87633. [Google Scholar] [CrossRef]
  17. Gjendemsjø, A.; Gesbert, D.; Øien, G.E.; Kiani, S.G. Binary power control for sum rate maximization over multiple interfering links. IEEE Trans. Wirel. Commun. 2008, 7, 3164–3173. [Google Scholar] [CrossRef] [Green Version]
  18. Kalamkar, S.S.; Banerjee, A. Secure communication via a wireless energy harvesting untrusted relay. IEEE Trans. Veh. Technol. 2017, 66, 2199–2213. [Google Scholar] [CrossRef] [Green Version]
  19. Lee, W.; Lee, K. Resource allocation scheme for guarantee of QoS in D2D communications using deep neural network. IEEE Commun. Lett. 2021, 25, 887–891. [Google Scholar] [CrossRef]
  20. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  21. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  22. Yu, W.; Lui, R. Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun. 2006, 54, 1310–1321. [Google Scholar] [CrossRef] [Green Version]
  23. Fliege, J.; Vaz, A.I.F.; Vicente, L.N. Complexity of gradient descent for multiobjective optimization. Optim. Methods Softw. 2018, 34, 949–959. [Google Scholar] [CrossRef] [Green Version]
  24. Lu, X.; Wang, P.; Niyato, D.; Kim, D.I.; Han, Z. Wireless networks with RF energy harvesting: A contemporary survey. IEEE Commun. Surv. Tutor. 2015, 17, 757–789. [Google Scholar] [CrossRef] [Green Version]
  25. Sengly, M.; Lee, K.; Lee, J.-R. Joint optimization of spectral efficiency and energy harvesting in D2D networks using deep neural network. IEEE Trans. Veh. Technol. 2021, 70, 8361–8366. [Google Scholar] [CrossRef]
Figure 1. Example of WPCRNs for secure communications with N = 2 .
Figure 1. Example of WPCRNs for secure communications with N = 2 .
Sensors 21 07837 g001
Figure 2. Performance comparison against allowable interference level ( I max ). (a) Average secrecy rate vs. I max . (b) Outage probability vs. I max .
Figure 2. Performance comparison against allowable interference level ( I max ). (a) Average secrecy rate vs. I max . (b) Outage probability vs. I max .
Sensors 21 07837 g002
Figure 3. Performance comparison against required harvested energy ( E min ). (a) Average secrecy rate vs. E min . (b) Outage probability vs. E min .
Figure 3. Performance comparison against required harvested energy ( E min ). (a) Average secrecy rate vs. E min . (b) Outage probability vs. E min .
Sensors 21 07837 g003
Figure 4. Performance comparison against number of node sets (N). (a) Average secrecy rate vs. N. (b) Outage probability vs. N. (c) Computation time vs. N.
Figure 4. Performance comparison against number of node sets (N). (a) Average secrecy rate vs. N. (b) Outage probability vs. N. (c) Computation time vs. N.
Sensors 21 07837 g004
Figure 5. CDF vs. average secrecy rate.
Figure 5. CDF vs. average secrecy rate.
Sensors 21 07837 g005
Table 1. Parameter Setup.
Table 1. Parameter Setup.
ParameterValue
Number of node setsN = 3
Maximum transmit power for SU Txs P max = 30 dBm
Transmit power for PU Tx p 0 = 30 dBm
Noise power σ 2 = 100 dBm
Required harvested energy E min = 15 dBm
Allowable interference level I max = 50 dBm
Energy conversion efficiency for EH nodes ζ i = 0.5 for i N
Size of area for distributing nodes50 m × 50 m
Path loss exponent2.7
K-factor of Rician fading6
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lee, K. Low-Complexity Transmit Power Control for Secure Communications in Wireless-Powered Cognitive Radio Networks. Sensors 2021, 21, 7837. https://doi.org/10.3390/s21237837

AMA Style

Lee K. Low-Complexity Transmit Power Control for Secure Communications in Wireless-Powered Cognitive Radio Networks. Sensors. 2021; 21(23):7837. https://doi.org/10.3390/s21237837

Chicago/Turabian Style

Lee, Kisong. 2021. "Low-Complexity Transmit Power Control for Secure Communications in Wireless-Powered Cognitive Radio Networks" Sensors 21, no. 23: 7837. https://doi.org/10.3390/s21237837

APA Style

Lee, K. (2021). Low-Complexity Transmit Power Control for Secure Communications in Wireless-Powered Cognitive Radio Networks. Sensors, 21(23), 7837. https://doi.org/10.3390/s21237837

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop