Conference PaperPDF Available

Secured Cooperative Cognitive Radio Networks with Relay Selection

Authors:

Abstract and Figures

In this paper, we propose physical layer security for cooperative cognitive radio networks (CCRNs) with relay selection in the presence of multiple primary users and multiple eavesdroppers. To be specific, we propose three relay selection schemes, namely, opportunistic relay selection (ORS), suboptimal relay selection (SoRS), and partial relay selection (PRS) for secured CCRNs, which are based on the availability of channel state information (CSI) at the receivers. For each approach, we derive exact and asymptotic expressions for the secrecy outage probability. Results show that under the assumption of perfect CSI, ORS outperforms both SoRS and PRS.
Content may be subject to copyright.
1
Secured Cooperative Cognitive Radio Networks
with Relay Selection
Trung Q. Duong
, Tran Trung Duy
, Maged Elkashlan
, Nghi H. Tran
§
, and Octavia A. Dobre
Queen’s University Belfast, UK (e-mail: trung.q.duong@qub.ac.uk)
Posts and Telecommunications Institute of Technology, Vietnam (e-mail: trantrungduy@ptithcm.edu.vn)
Queen Mary University of London, London, UK (e-mail:maged.elkashlan@eecs.qmul.ac.uk)
§
University of Akron, U.S.A., (e-mail: nghi.tran@uakron.edu)
Memorial University, Canada, (e-mail: odobre@mun.ca)
Abstract—In this paper, we propose physical layer security
for cooperative cognitive radio networks (CCRNs) with relay
selection in the presence of multiple primary users and multiple
eavesdroppers. To be specific, we propose three relay selec-
tion schemes, namely, opportunistic relay selection (ORS), sub-
optimal relay selection (SoRS), and partial relay selection (PRS)
for secured CCRNs, which are based on the availability of chan-
nel state information (CSI) at the receivers. For each approach,
we derive exact and asymptotic expressions for the secrecy outage
probability. Results show that under the assumption of perfect
CSI, ORS outperforms both SoRS and PRS.
I. INTRODUCTION
Best relay selection (BRS) is widely considered as a promis-
ing technology to enhance the wireless coverage with low
complexity in implementation [1]–[3]. It has attracted great
attention in the research literature [4]–[7]. Particularly, the
performance of BRS has been investigated for single user
with decode-and-forward (DF) [5], amplify-and-forward (AF)
relaying [4], [6], or multiple users [7]. It has been shown that
under an aggregate power constraint, outage-optimal perfor-
mance can be achieved for both DF and AF with BRS, in
other words, the outage probability for BRS is globally optimal
among all possible transmission strategies [3], [4].
On the other hand, in recent years, radio frequency spectrum
has become scarce and expensive wireless resources due to
the ever increasing demand of multimedia services. Having
the capability to mitigate the scarcity of frequency spectrum,
cognitive radio networks, however, may not fulfill this ex-
pectation due to the strict interference power constraint at
primary user. With its potential, BRS has been introduced to
cognitive radio networks. As a matter of fact, it has been
extensively investigated for cognitive radio networks under
spectrum-sharing [8]–[13].
Additionally, physical layer security opens up new dimen-
sions for secured wireless networks [14], for example, a relay
can be used to enhance the security of the legitimate com-
munications [15]. Unlike most previous works, in this paper,
we consider physical layer security of relay networks from
the unlicensed network’s perspective as an efficient design
approach for combating the spectrum scarcity. In doing so, we
take into account the realistic scenario of multiple secondary
relays, multiple PUs, and multiple secondary eavesdroppers.
In addition, we consider both peak interference power con-
straint inflicted by PU and the maximal transmit power at SU
to guarantee the quality of service at the primary network.
Specifically, we introduce several relay selection schemes
based on the availability of channel state information (CSI) at
the receivers. The contributions of this paper are as follows.
Depending on the availability of CSI’s knowledge, we
propose and compare three relay selection approaches,
namely, opportunistic relay selection (ORS), sub-optimal
relay selection (SoRS), and partial relay selection (PRS).
We derive new exact and asymptotic expressions in
closed-form for the secrecy outage probability for each
relay selection approach in independently but not identi-
cally distributed (i.n.i.d.) Rayleigh fading channels.
II. SYSTEM AND CHANNEL MODELS
We consider a physical-layer security network where a
secondary source (S) transmits data to a secondary destina-
tion (D) with the help of M secondary relays R
m
, m =
1, 2, . . . , M. We assume that there is no direct link between the
source and destination due to severe path loss and shadowing.
In underlay cognitive network, the secondary source and relays
must adapt their transmit power to satisfy a peak interference
power constraint I
p
at all primary users PU
n
, n = 1, 2, . . . , N.
In addition, the transmit power at SUs must be below a
maximum allowable power P
t
so as not to cause any harmful
interference to the PUs. In the secondary network, there are
eavesdroppers, E
k
, k = 1, 2, . . . , K, attempting to overhear
and decode the source data.
We assume that the channels between any two terminals
are subject to block and flat Rayleigh fading. Each node
has a single half-duplex radio and a single antenna. Due to
half-duplex constraint, a time-division channel allocation is
employed to realize orthogonal channels. To avoid eavesdrop-
pers while combining the data received from the source and
relays, the randomize-and-forward scheme can be used [15].
Let us denote h
SR
m
, h
SP
n
, h
SE
k
, h
R
m
D
, h
R
m
P
n
, and h
R
m
E
k
as the channel power gains of the links S R
m
, S P
n
,
S E
k
, R
m
D, R
m
P
n
, and R
m
E
k
, respectively.
Here, we consider Rayleigh fading channels, which results in
h
XY
, where X {S, R
m
} and Y {R
m
, D, P
n
, E
k
}, being
exponential random variables (RVs) with parameters λ
XY
. In
addition, we assume that the primary nodes and eavesdroppers
are located in clusters, which then yields λ
XP
n
= λ
XP
for
all n, and λ
XE
k
= λ
XE
for all k. The operation of the
proposed protocol is split into two time slots. In the first time
slot, the source (S) broadcasts its data to the best relay R
b
,
b = 1, 2, . . . , M. Then, this relay decodes and forwards the
decoded data to the destination (D) in the second time slot.
III. PERFORMANCE ANALYSIS
Under interference constraint at K PUs, the transmit power
of node X is given as
P
X
= min
P
t
,
I
p
γ
XP
= P
t
min
1,
µ
γ
XP
, (1)
where γ
XP
= max
n=1,2,...,N
(h
XP
n
) and µ = I
p
/P
t
is a positive
constant. The signal-to-noise ratio (SNR) of the X Y links,
with X {S, R
m
} and Y {R
m
, D, E
k
}, can be given as
Ψ
XY
=
P
t
min
1,
µ
γ
XP
h
XY
N
0
= Q
t
min
1,
µ
γ
XP
h
XY
, (2)
where N
0
is power of the additive noise at node Y, and Q
t
=
P
t
/N
0
is the average SNR. The secrecy rate of the X Y
links, where X {S, R
m
} and Y {R
m
, D}, is given as
I
XY
=
1
2
log
2
1 + Q
t
min
1,
µ
γ
XP
h
XY
1 + Q
t
min
1,
µ
γ
XP
γ
XE
+
, (3)
where γ
XE
= max
k=1,2,...,K
(h
XE
k
) and (x)
+
= max (x, 0).
A. Opportunistic Relay Selection (ORS) Method
Assuming that the CSI of the X E links are perfectly
known at the nodes X, X {S, R
m
}, we propose an oppor-
tunistic relay selection method (ORS) based on the max-min
strategy such that
R
b
= arg max
m=1,2,...,M
min (I
SR
m
, I
R
m
D
) . (4)
From (3) and (4), the secrecy outage probability of the OPR
protocol is formulated as
P
out
ORS
= Pr
max
m=1,2,...,M
min (W
1m
, W
2m
) < ρ
, (5)
where ρ = 2
R
th
, R
th
is a predetermined threshold, and
W
1m
=
1 + Q
t
min(1, µ/γ
SP
)h
SR
m
1 + Q
t
min(1, µ/γ
SP
)γ
SE
,
W
2m
=
1 + Q
t
min(1, µ/γ
R
m
P
)h
R
m
D
1 + Q
t
min(1, µ/γ
R
m
P
)γ
R
m
E
.
Lemma 1: The cumulative distribution function (CDF)
F
W
2m
(z) is given in an exact closed-form as
F
W
2m
(z) = 1
K
k=1
(1)
k+1
C
k
K
kλ
R
m
E
kλ
R
m
E
+ λ
R
m
D
z
×
exp (λ
R
m
D
(z 1)/Q) (1 exp (λ
R
m
P
µ))
N
+
N
n=1
(1)
n+1
C
n
N
R
m
P
R
m
P
+ λ
R
m
D
(z 1)
× exp(
R
m
P
µ λ
R
m
D
(z 1)/Q)
. (6)
See Appendix A.
Theorem 1: The outage probability of ORS is given in (7),
which is shown at the top of the next page. See Appendix B.
Lemma 2: An asymptotic expression for P
out
ORS
at high Q
t
value is given by
P
out
OPR
Q
t
+
1 +
M
m=1
(1)
m
M
u
1
,u
2
,...,u
m
=1
u
1
<u
2
<...<u
m
m
t=1
K
k=1
(1)
k
kC
k
K
λ
R
m
E
kλ
R
m
E
+ λ
R
m
D
ρ
K
k=1
(1)
k+1
kC
k
K
λ
SE
kλ
SE
+
m
t=1
λ
SR
u
t
ρ
. (8)
The proof is omitted here due to space limit.
B. Sub-optimal Relay Selection (SoRS) Protocol
When the CSI of the S E, R
m
E links is not available
at the source and relay R
m
but only the average channel
information, the sub-optimal SoRS method is proposed as
R
b
= arg max
m=1,2,...,M
min
h
SR
m
E {γ
SE
}
,
h
R
m
D
E {γ
R
m
E
}

, (9)
where E {γ
SE
} = 1
SE
and E {γ
R
m
E
} = 1
R
m
E
is the
average value of γ
SE
and γ
R
m
E
, respectively. Hence, the
secrecy outage probability of the SoRS protocol is given as
P
out
SoRS
= Pr (min (W
3b
, W
4b
) < ρ) , (10)
where
W
3b
=
1 + Q
t
min (1, µ/γ
SP
) h
SR
b
1 + Q
t
min (1, µ/γ
SP
) γ
SE
W
4b
=
1 + Q
t
min (1, µ/γ
R
b
P
) h
R
b
D
1 + Q
t
min (1, µ/γ
R
b
P
) γ
R
b
E
.
In addition, when Q
t
1, we obtain W
3b
h
SR
b
SE
and
W
4b
h
R
b
D
R
b
E
. Hence, an asymptotic expression for (10)
at high Q
t
is given as
1
P
out
SoRS
P
asym
SoRS
= Pr
min
h
SR
b
γ
SE
,
h
R
b
D
γ
R
b
E
< ρ
. (11)
Theorem 2: The closed-form expression for P
asym
SoRS
in (11)
is given in (12). See Appendix C.
C. Partial Relay Selection (PRS) Protocol
In this protocol, only the quality of the source-relay channel
is used to choose the best relay as follows:
R
b
= arg max
m=1,2,...,M
(h
SR
m
) (13)
Hence, the secrecy outage probability can be formulated as
P
out
PRS
= Pr (min (W
5b
, W
6b
) < ρ) , (14)
= 1 Pr (W
5b
ρ)

J
1
Pr (W
6b
ρ)

J
2
,
1
The exact expression of outage probability for SoRS can be obtained in
a similar manner as in ORS. However, it is mathematically intractable and
omitted here due to space limit.
P
out
ORS
= 1 +
M
m=1
(1)
m
M
u
1
,...,u
m
=1
u
1
<...<u
m
m
t=1
1 F
W
2u
t
(ρ)
K
k=1
(1)
k+1
kC
k
K
λ
SE
kλ
SE
+
m
t=1
λ
SR
u
t
ρ
exp
m
t=1
λ
SR
u
t
(ρ 1)
Q
t
× (1 exp (λ
SP
µ))
N
+
N
n=1
(1)
n+1
nC
n
N
λ
SP
Q
t
µ
SP
Q
t
µ +
m
t=1
λ
SR
u
t
(ρ 1)
exp
SP
µ
m
t=1
λ
SR
u
t
(ρ 1)
Q
t
. (7)
P
asym
SoRS
=
M
l=1
K
k
1
=0
K
k
2
=0
(1)
k
1
+k
2
C
k
1
K
C
k
2
K
1l
2l
ρ
2
(Ω
2l
ρ + k
2
) (Ω
1l
ρ +
2l
ρ + k
1
+ k
2
)
+
1l
2l
ρ
2
(Ω
1l
ρ + k
1
) (Ω
1l
ρ +
2l
ρ + k
1
+ k
2
)
+
M1
v=1
(1)
v
M
j
1
,...,j
v
=1,̸=l
j
1
<j
2
<...<j
v
1l
2l
ρ
2
(Ω
2l
ρ + k
2
)
1
1l
ρ
+
2l
ρ
+
k
1
+
k
2
+
m
t=1
j
t
ρ
1
+
M1
v=1
(1)
v
M
j
1
,...,j
v
=1,̸=l
j
1
<j
2
<...<j
v
1,l
2,l
ρ
2
(Ω
1l
ρ + k
1
)
1
1l
ρ +
2l
ρ + k
1
+ k
2
+
m
t=1
j
t
ρ
1
. (12)
where
W
5b
=
1 + Q
t
min (1, µ/γ
SP
) h
SR
b
1 + Q
t
min (1, µ/γ
SP
) γ
SE
W
6b
=
1 + Q
t
min (1, µ/γ
R
b
P
) h
R
b
D
1 + Q
t
min (1, µ/γ
R
b
P
) γ
R
b
E
.
Theorem 3: The exact closed-form of secrecy outage proba-
bility for PRS is readily obtained from (15) and (16) by taking
into account (14). See Appendix E.
Lemma 3: The asymptotic expression for secrecy outage
probability of the PRS scheme is given in (17). The proof is
neglected here due to space limit.
IV. SIMULATION RESULTS
In this section, we present various Monte Carlo simulations
to verify the theoretically derived results. In a two-dimensional
topology, we assume that the co-ordinates of the source (S),
the destination (D), the relay (R
m
), the primary users (P
n
)
and the eavesdropper (E
k
), are (0; 0), (1; 0), (x
m
; 0), (x
P
; y
P
)
and (x
E
; y
E
), respectively. To take the path-loss into account,
we assume λ
XY
= E
|h
XY
|
2
= d
β
X,Y
, where X {S, R
m
},
Y {R
m
, D, P
n
, E
k
}, and β is path-loss exponent. In the
simulations, we assume that the path-loss exponent is 3.
In Fig. 1, we present the secrecy outage probability as a
function of Q
t
in dB. In this scenario, we assume that there are
3 secondary relays, 1 primary user and 1 eavesdropper. The
nodes PU and E are placed at {−0.5; 1} and {0.9; 0.3},
respectively, while the position of the relays are {0.4; 0},
{0.5; 0} and {0.6; 0}. It is also assumed that R
th
= 0.4 and
µ = 1. As we can see, the performance of ORS is better than
that of ORS and SoRS, while SoRS outperforms ORS.
In Fig. 2, we investigate the effect of the number of the
primary users and eavesdroppers on the secrecy outage per-
formance of the ORS methods. In this figure, we consider the
i.i.d networks with 4 relays placed at the positions {0.4; 0}.
Fig. 1. Secrecy outage probability as a function of SNR (Q
t
) in dB.
The remaining parameters are set to {x
P
, y
P
} = {−0.5; 1},
{x
E
, y
E
} = {0.5; 0.5}, R
th
= 0.4, and µ = 1. As can
be observed, the outage performance of ORS significantly
improves when the number of eavesdroppers (K) decreases.
In addition, at high Q
t
, the outage probability is independent
of Q
t
as well as the position and the number of primary users.
V. CONCLUSIONS
We have proposed three relay selection schemes for securing
the fidelity of cooperative cognitive radio networks. We have
derived exact and asymptotic expressions for secrecy outage
probability, that readily enable us to compare the three ap-
proaches. Our results show that ORS outperforms SoRS and
PRS, provided that perfect CSI is known at the receivers.
J
1
=
K
k=1
(1)
k+1
C
k
K
kλ
SE
kλ
SE
+ λ
SR
m
ρ
exp
λ
SR
m
(ρ 1)
Q
t
(1 exp (λ
SP
ρ))
N
+
N
n=1
(1)
n+1
C
n
N
×
SP
Q
t
µ exp (
SP
µ λ
SR
m
(ρ 1) /Q
t
)
SP
Q
t
µ + λ
SR
m
(ρ 1)
+
M
m=1,m̸=b
(1)
m
M
j
1
,j
2
,...,j
m
=1,̸=b
j
1
<j
2
<...<j
m
λ
SR
m
λ
SR
m
+
m
t=1
λ
SR
j
t
×
K
k=1
(1)
k+1
C
k
K
kλ
SE
kλ
SE
+
λ
SR
m
+
i
t=1
λ
SR
j
t
ρ
exp
λ
SR
m
+
i
t=1
λ
SR
j
t
(ρ 1)
/Q
t
(1 exp (λ
SP
ρ))
N
+
N
n=1
(1)
n+1
C
n
N
SP
Q
t
µ exp
SP
µ
λ
SR
m
+
i
t=1
λ
SR
j
t
(ρ 1) /Q
t
×
SP
Q
t
µ +
λ
SR
m
+
i
t=1
λ
SR
j
t
(ρ 1)
1
. (15)
J
2
=
K
k=1
(1)
k+1
C
k
K
kλ
RE
kλ
RE
+ λ
R
m
D
ρ
exp [λ
R
m
D
(ρ 1) /Q
t
] [1 exp (λ
RP
µ)]
N
+
N
n=1
(1)
n+1
C
n
N
×
RP
Q
t
µ
RP
Q
t
µ + λ
R
m
D
(ρ 1)
exp [
RP
µ λ
R
m
D
(ρ 1) /Q
t
]
. (16)
P
out
PRS
Q
t
+
1
M
m=1
K
k=1
(1)
k+1
kC
k
K
λ
SE
kλ
SE
+ λ
SR
m
ρ
+
M
i=1,̸=m
(1)
i
M
j
1
,...,j
i
=1,̸=m
j
1
<...<j
i
λ
SR
m
λ
SR
m
+
i
t=1
λ
SR
j
t
×
K
k=1
(1)
k+1
kC
k
K
λ
SE
kλ
SE
+ (λ
SR
m
+
i
t=1
λ
SR
j
t
)ρ
1
K
k=1
(1)
k+1
C
k
K
kλ
RE
kλ
RE
+ λ
R
m
D
ρ
. (17)
Fig. 2. Secrecy outage probability of the ORS scheme.
APPENDIX A: PROOF OF LEMMA 1
Let x = γ
R
m
E
and y = γ
R
m
P
. The CDF F
W
2m
(z) (with
z > 1) conditioned on x and y is obtained as
F
W
2m
(z|x, y) = Pr
1 + Q
t
min (1, µ/y) h
R
m
D
1 + Q
t
min(1, µ/y)x
< z
,
= 1 exp
λ
R
m
D
(z 1)
Q
t
min(1, µ/y)
λ
R
m
D
zx
. (A.1)
Then, the CDF F
W
2m
(z) can be formulated as
F
W
2,m
(z) =
+
0
f
γ
R
m
P
(y)
+
0
f
γ
R
m
E
(x)F
W
2m
(z|x, y)dx

J
1
(y)
dy. (A.2)
In addition, the probability density function (PDF) of γ
XY
,
X {S, R
m
} and Y {P, E}, can be given as
f
γ
XY
(z) =
T
t=1
(1)
t+1
C
t
T
XY
exp (
XY
z) , (A.3)
where C
t
T
=
T !
t!(T t)!
, and T =
N if Y P
K if Y E
. From
(A.3), and (A.1), the integral J
1
is given by
J
1
(y) = 1
K
k=1
(1)
k
C
k
K
kλ
R
m
E
exp(
λ
R
m
D
(z1)
Q
t
min(1,µ/y)
)
kλ
R
m
E
+ λ
R
m
D
z
.
(A.4)
Then substituting (A.3) and (A.4) into (A.2), and after some
manipulation, we obtain (6), which completes the proof.
APPENDIX B: PROOF OF THEOREM 1
Let x = γ
SP
and y = γ
SE
, the CDF F
W
1m
(z) conditioned
on x and y can be given as
F
W
1m
(z|x, y) = 1 exp
λ
SR
m
(z 1)
Q
t
min(1, µ/x)
λ
SR
m
zy
.
(B.1)
Next, let us denote T
m
= min (W
1m
, W
2m
), the CDF F
T
m
(z)
conditioned on x and y is given by
F
T
m
(z|x, y) = 1 (1 F
W
2m
(z))
× exp
λ
SR
m
(
(z 1)
Q
t
min(1, µ/x)
+ zy)
. (B.2)
Combining (5) and (B.2), we obtain the probability condi-
tioned P
out
ORS
(x, y) on x and y as
P
out
ORS
(x, y) = 1 +
M
m=1
(1)
m
M
u
1
,u
2
,...,u
m
=1
u
1
<u
2
<...<u
m
m
t=1
(1 F
W
2u
t
(ρ))
× exp
m
t=1
λ
SR
u
t
(
ρ 1
Q
t
min(1, µ/x)
+ ρy)
. (B.3)
In addition, we have
P
out
ORS
(x, y)=
+
0
f
γ
SP
(x)
+
0
f
γ
SE
(y)P
out
OPR
(x, y)dydx. (B.4)
By substituting (A.3) and (B.3) into (B.4), after some manip-
ulations, we obtain (7), which concludes the proof.
APPENDIX C: PROOF OF THEOREM 2
From (11), we can rewrite P
asym
SoRS
as follows:
P
asym
SoRS
= 1 Pr
min(
E {γ
SE
}U
1
γ
SE
,
E {γ
R
b
E
}U
2
γ
R
b
E
) ρ
(C.1)
where U
1
= h
SR
b
/E {γ
SE
} and U
2
= h
R
b
D
/E {γ
R
b
E
}.
From (C.1), we obtain the outage probability conditioned on
U
1
and U
2
as
P
asym
SoRS
(u
1
, u
2
) =
= 1 Pr
γ
SE
E {γ
SE
} u
1
ρ
, γ
R
b
E
E {γ
R
b
E
} u
2
ρ
,
= 1
K
k
1
=0
K
k
2
=0
(1)
k
1
+k
2
C
k
1
K
C
k
2
K
× exp
k
1
u
1
ρ
exp
k
2
u
2
ρ
. (C.2)
In addition, the outage probability P
asym
SoRS
can be given as
P
asym
SoRS
=
f
U
1
,U
2
(u
1
, u
2
)P
asym
SoRS
(u
1
, u
2
)du
1
du
2
, (C.3)
where f
U
1
,U
2
(u
1
, u
2
) is common PDF of U
1
and U
2
. By using
Appendix D, we obtain f
U
1
,U
2
(u
1
, u
2
) as presented in (C.4)
at the top of next page, with
1m
= λ
SR
m
SE
,
2m
=
λ
R
m
D
R
m
E
and
m
=
1m
+
2m
.
Substituting (C.4) into (C.2), we can obtain P
asym
SoRS
as in (12),
which finalizes the proof.
APPENDIX D: DERIVATION OF f
U
1
,U
2
(u
1
, u
2
)
Let us denote Φ
1m
= h
SR
m
/E {γ
SE
}, Φ
2m
=
h
R
m
D
/E {γ
R
m
E
}, and Φ
m
= min
1m
, Φ
2m
), U
b
=
max
m=1,2,...,M
m
), and Z
b
= max
m=1,2,...,M, ̸=b
m
), we can
formulate the CDF F
U
b
(z) as
F
U
b
(z) =
z
0
b
exp (
b
t) F
Z
b
(z) dt, (D.1)
where the CDF F
Z
b
(z) is given as
F
Z
b
(z)=1+
M1
m=1
(1)
m
M
j
1
,...,j
m
=1,̸=b
j
1
<...<j
m
exp(
m
t=1
j
t
z). (D.2)
Substituting (D.2) into (D.1), we obtain (D.3) as
F
U
b
(z) = 1 exp (
b
z) +
M1
m=1
(1)
m
M
j
1
,...,j
m
=1,̸=b
j
1
<...<j
m
b
b
+
m
t=1
j
t
1 exp((Ω
b
+
m
t=1
j
t
)z)
. (D.3)
From (D.3), the corresponding PDF of U
b
is given by
f
U
b
(z) =
b
exp (
b
z) +
M1
m=1
(1)
m
M
j
1
,...,j
m
=1,̸=b
j
1
<...<j
m
b
exp((Ω
b
+
m
t=1
j
t
)z). (D.4)
The joint CDF F
U
1
,U
2
(u
1
, u
2
) can be given as
F
U
1
,U
2
(u
1
, u
2
) =
M
l=1
+
0
G (t)
t
f
U
l
(t)
f
Φ
l
(t)
dt, (D.5)
where G(t) can be obtained as
G (t) = Pr
1l
< u
1
, Φ
2l
< u
2
, min
1l
, Φ
2l
) < t) =
(exp(
1l
u
1
)exp(
1l
t))
× (exp(
2l
t)exp(
2l
u
2
)) ; if t<min (u
1
, u
2
)
(1exp(
1l
u
1
))
× (1exp(
2l
u
2
)) ; if min (u
1
, u
2
)t
. (D.6)
From (D.5) and (D.6), we can obtain
F
U
1
,U
2
(u
1
, u
2
)=
M
l=1
u
1
0
G(t)
t
f
U
b
(t)
f
Φ
l
(t)
dt; ifu
1
< u
2
M
l=1
u
2
0
G(t)
t
f
U
b
(t)
f
Φ
l
(t)
dt; ifu
1
u
2
. (D.7)
For the case u
1
< u
2
and u
1
u
2
, by substituting the PDF
f
Φ
m
(z), (D.4) into (D.7), we can obtain (D.8) as shown at
the top of next page, respectively. For the case, u
1
u
2
,
F
U
1
,U
2
(u
1
, u
2
) can be similarly obtain by interchangeably
replacing u
1
by u
2
and
1
by
2
in (D.8). Since the
joint PDF f
U
1
,U
2
(u
1
, u
2
) is given as f
Φ
1,b
,Φ
2,b
(u
1
, u
2
) =
2
F
Φ
1,b
,Φ
2,b
(u
1
,u
2
)
u
1
u
2
, from (D.8), we can obtain (C.4).
f
U
1
,U
2
(u
1
, u
2
)=
M
l=1
1l
2l
exp (
1l
u
1
) exp (
2l
u
2
) +
M1
v =1
(1)
m
M
j
1
,j
2
...,j
v
=1,̸=v
j
1
<j
2
<...<j
v
1l
2l
exp(
2l
u
2
) exp((Ω
1l
+
m
t=1
j
t
)u
1
)
; if u
1
< u
2
M
l=1
1l
2l
exp (
1l
u
1
) exp (
2l
u
2
) +
M1
v =1
(1)
m
M
j
1
,j
2
...,j
v
=1,̸=v
j
1
<j
2
<...<j
v
1l
2l
exp (
1l
u
1
) exp((Ω
2l
+
m
t=1
j
t
)u
2
)
; if u
1
u
2
. (C.4)
F
U
1
,U
2
(u
1
, u
2
) =
M
l=1
1 exp(
l
u
1
) exp(
2l
u
2
) (1 exp(
1l
u
1
)) exp(
1l
u
1
) (1 exp(
2l
u
1
))
+
M1
v =1
(1)
v
M
j
1
,...,i
v
=1,̸=l
j
1
<j
2
<...<j
l
l
l
+
m
t=1
j
t
1 exp((Ω
l
+
m
t=1
j
t
)u
1
)
1l
exp (
2l
u
2
)
1l
+
m
t=1
j
t
1 exp((Ω
1l
+
m
t=1
j
t
)u
1
)
2l
exp (
1l
u
1
)
2l
+
m
t=1
j
t
1 exp((Ω
2l
+
m
t=1
j
t
)u
1
)
. (D.8)
APPENDIX E: PROOF OF THEOREM 3
Similarly we set x = γ
SE
and y = γ
SP
and The term J
1
in
(14) conditioned on x and y can be obtained as
J
1
(x, y) = Pr
h
SR
b
ρ 1
Q min (1, µ/y)
+ ρx, h
SR
b
Z
,
=
+
ρ1
Q min(1,µ/y)
+ρx
λ
SR
b
exp (λ
SR
b
z)F
Z
(z) dz, (E.1)
where F
Z
(z) is the CDF of Z, which is given as
F
Z
(z) = 1+
M
m=1,̸=b
(1)
m
M
j
1
,...,j
m
=1,̸=b
j
1
<...<j
m
exp(
m
t=1
λ
SR
j
t
z).
(E.2)
Substituting (E.2) into (E.1) to obtain (E.3) as follows:
J
1
(x, y) = exp
λ
SR
b
(
ρ 1
Q
t
min (1, µ/y)
+ ρx)
+
M
m=1,
m̸=b
(1)
m
M
j
1
,...,j
m
=1,̸=b
j
1
<...<j
m
λ
SR
b
λ
SR
b
+
m
t=1
λ
SR
j
t
× exp
(λ
SR
m
+
m
t=1
λ
SR
j
t
)(
ρ 1
Q
t
min (1, µ/y)
+ ρx)
. (E.3)
Using the fact that J
1
=
+
0
f
γ
SP
(y)
+
0
J
1
(x, y)f
γ
SE
(x) dx
dy and (A.3),
we can obtain (15). Now, considering the probability J
2
in
(14). Similarly as in (A.1)-(A.4), we can get (16).
REFERENCES
[1] A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, A simple cooperative
diversity method based on network path selection, IEEE J. Sel. Areas
Commun., vol. 24, no. 3, pp. 659–672, Mar. 2006.
[2] A. Bletsas, H. Shin, M. Z. Win, and A. Lippman, “Cooperative diversity
with opportunistic relaying, in Proc. IEEE WCNC, Las Vegas, NV, Apr.
2006, pp. 1034–1039.
[3] A. Bletsas, H. Shin, and M. Z. Win, “Cooperative communications with
outage-optimal opportunistic relaying, IEEE Trans. Wireless Commun.,
vol. 6, no. 9, pp. 3450–3460, Sep. 2007.
[4] ——, “Outage optimality of opportunistic amplify-and-forward relay-
ing, IEEE Commun. Lett., vol. 11, no. 3, pp. 261–263, 2007.
[5] T. Q. Duong, V. N. Q. Bao, and H.-J. Zepernick, “On the performance of
selection decode-and-forward relay networks over Nakagami-m fading
channels, IEEE Commun. Lett., vol. 13, no. 3, pp. 172–174, Mar. 2009.
[6] Y. Zhao, R. Adve, and T. J. Lim, “Symbol error rate of selection amplify-
and-forward relay systems, IEEE Commun. Lett., vol. 10, no. 11, pp.
475–478, Nov. 2006.
[7] E. Beres and R. S. Adve, “Selection cooperation in multisource coop-
erative networks, IEEE Trans. Wireless Commun., vol. 7, no. 1, pp.
118–127, 2008.
[8] J. Lee, H. Wang, J. G. Andrews, and D. Hong, “Outage probability
of cognitive relay networks with interference constraints, IEEE Trans.
Wireless Commun., vol. 10, no. 2, pp. 390–395, Feb. 2011.
[9] M. Xia and S. A
¨
ıssa, “Cooperative AF relaying in spectrum-sharing
systems: Outage probability analysis under co-channel interferences and
relay selection, IEEE Trans. Commun., vol. 60, no. 11, pp. 3252–3262,
Dec. 2012.
[10] H. Tran, T. Q. Duong, and H.-J. Zepernick, “Performance analysis of
cognitive relay networks under power constraint of multiple primary
users, in Proc. IEEE GLOBECOM, Houston, TX, Dec. 2011, pp. 1–6.
[11] H. Ding et al., Asymptotic analysis of cooperative diversity systems
with relay selection in a spectrum sharing scenario, IEEE Trans. Veh.
Technol., vol. 60, no. 2, pp. 457–472, Feb. 2011.
[12] V. N. Q. Bao, T. Q. Duong, D. B. da Costa, G. C. Alexandropoulos,
and A. Nallanathan, “Cognitive amplify-and-forward relaying with best
relay selection in non-identical Rayleigh fading, IEEE Commun. Lett.,
vol. 60, no. 3, pp. 757–759, Mar. 2013.
[13] K. J. Kim, T. Q. Duong, and X.-N. Tran, “Performance analysis of
cognitive spectrum-sharing single-carrier systems with relay selection,
IEEE Trans. Signal Process., vol. 60, no. 12, pp. 6435–6449, Dec. 2012.
[14] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wire-
less information-theoretic security, IEEE Trans. Inf. Theory, vol. 54,
no. 6, pp. 2515–2534, Jun. 2008.
[15] J. Mo, M. Tao, and Y. Liu, “Relay placement for physical layer security:
A secure connection perspective, IEEE Commun. Lett., vol. 16, no. 6,
pp. 878–881, Jun. 2012.
... Additionally, relay networks have also been deployed alongside CR in order to enhance coverage of the systems, and tackle the performance limitations of CR caused by several power constraints and large-scale fading [12,13]. To further improve the capacity of cognitive relay networks (CRNs), a best source or relay is often chosen among the available sources and relays, which was analysed in the literature [14][15][16][17][18]. ...
... Applying (20) to (18) and performing integration on x, we have ...
... Since this CDF is also independent of y, by substituting (27) to (18) and performing integration, we can get the equation for approximate F W1k z as ...
Article
In this study, the secrecy performance of cooperative half-duplex cognitive relay networks (CRNs) comprised of multiple primary users (PUs) and multiple eavesdroppers under the effect of unreliable wireless backhauls is studied. The authors consider relay networks with single relay assisting multiple sources under power constraints at PUs and secondary transmitters, and based on the availability of channel-state information at the sources, they propose two best source selection schemes, namely: (i) optimal source selection (OSS) and (ii) sub-optimal source selection (SoSS). For both scenarios, they obtain exact closed-form and asymptotic expressions for the system's outage probability and carry out numerical simulations to justify their analyses. From the results, source selection is proven to be capable of counteracting the negative impact of unreliable backhaul on CRNs. The secrecy performance limitations are also verified to be influenced by the backhaul reliability. Furthermore, OSS is more desirable compared to SoSS in low signal-to-noise ratio (SNR) regime, while the secrecy performance for both schemes converge to an asymptotic limit in high-SNR ranges.
... Cooperative communication is known as a virtual multipleinput multiple-output (MIMO) system which can be used to expand the coverage range or improve the reliability of wireless communications. Recently, it has been studied for use also in physical layer security and considered as a promising solution to enhance both the security and the reliability of the communication in CRN [18], [33]- [40]. Specifically, in [39], [40], relay selection strategies have been investigated to enhance the secrecy performance for the CCRNs. ...
... Recently, it has been studied for use also in physical layer security and considered as a promising solution to enhance both the security and the reliability of the communication in CRN [18], [33]- [40]. Specifically, in [39], [40], relay selection strategies have been investigated to enhance the secrecy performance for the CCRNs. In [33], the trade-off between the security and the reliability of the secondary transmissions in CRNs with multi-relayers in the presence of an eavesdropper was studied. ...
Article
Full-text available
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and interference limitation with respect to the primary user (PU) as well as secrecy outage constraints due to the EAV. Secrecy outage is achieved when the EAV cannot decode the targeted signal, but communications in the secondary network is still possible (non-zero capacity exists). Approximation expressions of the secrecy outage probability and the probability of non-zero secrecy capacity are derived to evaluate the secrecy performance. Monte Carlo simulations are provided to examine the accuracy of the derived approximation expressions. Based on this, power allocation policies for the SUs are derived, satisfying all the constraints while maximizing the secrecy performance as well as the quality of service performance of the secondary network. It can be concluded that with knowledge of the channel state information (CSI) of the EAV it is possible to calculate the optimal value for the secrecy outage threshold of the secondary user (SU) which in turn allows maximizing the secrecy performance. Most interestingly, our numerical results illustrate that the secrecy performance of the system is much improved when the parameters obtained using the CSI of the EAV are calculated optimally. Thence, the system can adjust the power allocation so that no eavesdropping occurs even without reducing quality of service (QoS) performance compared to a network without any EAV.
... W ITH the rapid development of the fifth generation (5G) mobile communication system, cognitive radio technology has drawn more and more attentions from the research communities [1]- [4]. In spectrum sharing cognitive radio networks, the secondary user can share the spectrum resource with primary user under some certain conditions, which can effectively alleviate the spectrum shortage problem and improve the spectrum efficiency. ...
... Thus, both the primary transmitter and secondary transmitter adopt TAS to transmit information. 4 For the full-duplex spectrum sharing networks, we assume that the selfinterference can be significantly suppressed (e.g. [27], [28]), so that the self-interference channel for each received antenna can be regarded as an independent Rayleigh distributed variable (e.g. ...
Article
Full-text available
In this paper, we design a new collaboration interference (CI) transmission scheme for overlay cognitive full-duplex wireless wiretap networks, where a full-duplex secondary user utilizes the licensed spectrum to transmit the secondary information and uses the secondary signal as a special noise to help and protect the secure transmission of primary information in the presence of multiple passive eavesdroppers, simultaneously. Specifically, the full-duplex secondary user firstly uses the joint transmit antenna selection/maximal ratio combining (TAS/MRC) scheme to transmit the secondary information and receive the primary information at the same time. Then, the full-duplex secondary user utilizes a new interactive zero forcing beamforming (IZFB) algorithm to transmit the primary and secondary information without mutual interference simultaneously. For comprehensively analyzing the secure performance of primary transmission, two eavesdropping modes, i.e., non-colluding eavesdropping (NCE) and colluding eavesdropping (CE) are considered. Based on the two modes, we derived the exact and asymptotic closed-form expressions for secrecy outage probability (SOP) of primary transmission. Further, the effective throughput of secondary transmission is also derived. The results demonstrate that the proposed CI-based transmission scheme can simultaneously improve the secrecy performance of primary transmission and throughput of secondary transmission, and can further achieve better spectrum-and-energy efficiency than traditional overlay transmission.
... However, the security gain is typically lower than protocols which use multiple relays. Likewise, one could employ OR schemes for relay selection in cooperative communications networks [8], nonetheless, OR schemes may have higher complexity and switching rates due to continuous channel estimation [13]. In this context, the SSSC-MA can be a positive alternative to these issues, as the protocol introduces a more complex switching mechanism compared to other techniques, in order to address these aforementioned issues while improving the secrecy performance, since it applies spatial diversity to enhance the system performance. ...
Article
Smart farm management has complex challenges; therefore, there is a need to improve the overall adaptability, profitability, and environmental soundness of the farming systems. Agricultural production can be enhanced with the help of IoT-based cognitive tools. The rapid increase in IoT-based smart systems has raised critical concerns about efficiently utilizing the wireless spectrum. To drastically bring the improvement in the utilization of the wireless spectrum, cognitive radio (CR) has emerged as an effective solution. The inherent openness and broadcast nature of the wireless medium have given rise to many security issues in cooperative networks. Information-theoretic security or physical layer security (PLS) is evolved as an efficacious wireless prototype for reliable transmissions to avert the eavesdropper from expropriating transmittal data on the wireless connections. Security is the key factor in these networks as they are exposed and active in behavior, thus, are susceptible to fraudulent activities. We investigated the performance of the CR system in terms of secrecy and also examined the system in terms of diversity receipt and selection of relay. The secrecy outcome of channel state information at the sender was also studied. The detrimental effects of fading in cooperative networks were also extensively discussed. Cooperative diversity was examined by deploying MRC and SC strategies at receptors. It has been deduced that CSI knowledge at the sender also has an eloquent concussion on the secrecy of the cognitive system.
Article
As the most wide-spread in-vehicle data bus protocol, CAN (Controller Area Network) has attracted more and more attention due to its lack of security protection mechanism. A variety of attacks against CAN bus have emerged, posing serious threat to vehicle safety. Accordingly, some methods have been proposed to detect CAN bus attacks, however, they have certain shortcomings such as additional computing burden and obvious false detection rate. Therefore, using the physical characteristics of voltage signal on CAN bus, we propose an LOF (Local Outlier Factor)-based intrusion detection method, which can greatly reduce the false detection rate as well as improve the detection accuracy. The modification of CAN protocol and the additional computation burden can also be avoided. In addition, to the best of our knowledge, we are the first to implement bus-off intrusion detection on real vehicles.
Article
In a recent paper, network management rules were evolved to maximize sum throughput of two co-existing underlay secondary networks that reuse the spectrum of a licensed primary network. Such rules require secondary networks to either transmit concurrently by optimal apportioning of the interference temperature limit (ITL), or in isolation. In this paper, we analyze the secrecy outage performance of the primary downlink network for a scenario when receivers of the two co-existing secondary networks are untrusted and eavesdrop on the primary downlink transmissions. We analytically establish that it is only when secondary networks transmit concurrently, that the primary network is most secure. Further, we derive an optimum ITL apportioning mechanism that guarantees maximum secrecy for the primary network, and also present closed-form expressions in a special case. The optimum apportioning parameter shows that the network management rule that maximizes secrecy of the primary network is not the same as that which maximizes secondary sum throughput. Computer simulations are presented that demonstrate accuracy of the derived expressions.
Article
In this paper, we investigate the secrecy performance of cognitive multi-input multi-output multiuser (MIMO-MU) wiretap networks over space-and-time correlated fading channels. Specifically, we propose a joint transmit antenna selection (TAS) and multiuser scheduling scheme to improve the security of the considered system. To thoroughly analyze the impact of the joint TAS and multiuser scheduling scheme and the channel correlation on the physical layer security, the new exact and asymptotic closed-form expressions for the secrecy outage probability of cognitive MIMO-MU wiretap networks are derived in two distinct scenarios, i.e., space-and-time correlated fading channels and independent-and-perfect fading channels. From the theoretical and simulation results, several important remarks are concluded as follows. 1) The channel space correlation does not affect the achievable secrecy diversity order in a high main-to-eavesdropper ratio (MER) regime. While it produces different impacts on the secrecy performance with different values of the MER in a low MER regime. 2) The channel time correlation on the main channel can reduce the achievable secrecy diversity order from $N_{\rm A}N_{\rm B}$ to 1. 3) The joint TAS and multiuser scheduling scheme can achieve better performance than the traditional random scheduling scheme over space-and-time correlated fading channels.
Article
Full-text available
For cooperative amplify-and-forward (AF) relaying in spectrum-sharing wireless systems, secondary users share spectrum resources originally licensed to primary users to communicate with each other and, thus, the transmit power of secondary transmitters is strictly limited by the tolerable interference powers at primary receivers. Furthermore, the received signals at a relay and at a secondary receiver are inevitably interfered by the signals from primary transmitters. These co-channel interferences (CCIs) from concurrent primary transmission can significantly degrade the performance of secondary transmission. This paper studies the effect of CCIs on outage probability of the secondary link in a spectrum-sharing environment. In particular, in order to compensate the performance loss due to CCIs, the transmit powers of a secondary transmitter and its relaying node are respectively optimized with respect to both the tolerable interference powers at the primary receivers and the CCIs from the primary transmitters. Moreover, when multiple relays are available, the technique of opportunistic relay selection is exploited to further improve system performance with low implementation complexity. By analyzing lower and upper bounds on the outage probability of the secondary system, this study reveals that it is the tolerable interference powers at primary receivers that dominate the system performance, rather than the CCIs from primary transmitters. System designers will benefit from this result in planning and designing next-generation broadband spectrum-sharing systems.
Article
Full-text available
In this paper, we analyze the performance of cooperative spectrum sharing single-carrier (SC) relay systems. Taking into account the peak interference power at the primary user (PU) and the maximum transmit power at the secondary user (SU) network, two separate power allocation constraints are formed. For a two-hop decode-and-forward (DF) relaying protocol and two power allocation constraints, two relay selection schemes, namely, a full-channel state information (CSI)-based best relay selection (BRS) and a partial CSI-based best relay selection (PBRS), are proposed. The distributions of the end-to-end signal-to-noise ratios (e2e-SNRs) for the four cases are derived first, and then their outage probabilities and asymptotic outage probabilities are derived in closed-form. The derived asymptotic outage probabilities are utilized to see different diversity gains. Monte Carlo simulations have verified the derived diversity gains for the four different cases. We also present upper bounds on the ergodic capacities for two particular cases.
Article
Full-text available
In this paper, we analyze the performance of single relay selection cooperative wireless networks using decode-and-forward relaying. Under optimum relay selection, the expressions for asymptotic outage probability, average symbol error probability are derived over Nakagami-m fading channels. Then we improve the performance of the system through optimum power allocation based on asymptotic outage probability and asymptotic average symbol error probability. Our results are verified through comparison with Monte Carlo simulations.
Article
Full-text available
This paper evaluates the outage probability of cognitive relay networks with cooperation between secondary users based on the underlay approach, while adhering to the interference constraint on the primary user, i.e., the limited amount of interference which the primary user can tolerate. A relay selection criterion, suitable for cognitive relay networks, is provided, and using it, we derive the outage probability. It is shown that the outage probability of cognitive relay networks is higher than that of conventional relay networks due to the interference constraint, and we quantify the increase. In addition, the outage probability is affected by the distance ratio of the interference link (between the secondary transmitter and the primary receiver) to the relaying link (between the secondary transmitter and the secondary receiver). We also prove that cognitive relay networks achieve the same full selection diversity order as conventional relay networks, and that the decrease in outage probability achieved by increasing the selection diversity (the number of relays) is not less than that in conventional relay networks.
Article
Full-text available
This work studies the problem of secure connection in cooperative wireless communication with two relay strategies, decode-and-forward (DF) and randomize-and-forward (RF). The four-node scenario and cellular scenario are considered. For the typical four-node (source, destination, relay, and eavesdropper) scenario, we derive the optimal power allocation for the DF strategy and find that the RF strategy is always better than the DF to enhance secure connection. In cellular networks, we show that without relay, it is difficult to establish secure connections from the base station to the cell edge users. The effect of relay placement for the cell edge users is demonstrated by simulation. For both scenarios, we find that the benefit of relay transmission increases when path loss becomes severer.
Article
This paper investigates several important performance metrics of cognitive amplify-and-forward (AF) relay networks with a best relay selection strategy and subject to non-identical Rayleigh fading. In particular, assuming a spectrum sharing environment consists of one secondary user (SU) source, K SU relays, one SU destination, and one primary user (PU) receiver, closed-form expressions for the outage probability (OP), average symbol error probability (SEP), and ergodic capacity of the SU network are derived. The correctness of the proposed analysis is corroborated via Monte Carlo simulations and readily allows us to evaluate the impact of the key system parameters on the end-to-end performance. An asymptotic analysis is also carried out and reveals that the diversity gain is defined by the number of relays pertaining to the SU network (i.e., K), being therefore not affected by the interference power constraint of the PU network.
Conference Paper
In this paper, we present single-selection-opportunistic-relaying with decode-and-forward (DaF) and amplify-and-forward (AaF) protocols under an aggregate power constraint. We show that opportunistic DaF relaying is equivalent to the outage bound of the optimal DaF strategy using all potential relays. We further show that opportunistic AaF relaying is outage-optimal with single-relay selection and significantly outperforms an AaF strategy with multiple-relay (MR) transmissions, in the presence of limited channel knowledge. These findings reveal that cooperative diversity benefits (under an aggregate power constraint) are useful even when cooperative relays choose not to transmit but rather choose to cooperatively listen; they act as passive relays and give priority to the transmission of a single opportunistic relay
Article
Three low-complexity relay-selection strategies, namely, selective amplify and forward (S-AF), selective decode and forward (S-DF), and amplify and forward with partial relay selection (PRS-AF) in a spectrum-sharing scenario are studied. First, we consider a scenario where perfect channel state information (CSI) is available. For these scenarios, the respective asymptotic outage behaviors of the secondary systems are analyzed, from which the diversity and coding gains are derived and compared. Unlike the coding gain, which is shown to be very sensitive with the position of the primary receiver, the diversity gain of the secondary system is the same as the nonspectrum-sharing system. In addition, depending on the cooperative strategy employed, an increase in the number of relays may lead to severe loss of the coding gain. Afterwards, the impacts of imperfect CSI regarding the interference and transmit channels on the outage behavior of the secondary systems are analyzed. On one hand, the imperfect CSI concerning the interference channels only affects the outage performance of the primary system, whereas it has no effect on the diversity gain of the secondary system. On the other hand, the imperfect CSI concerning the transmit channels of the secondary systems may reduce the diversity gain of the three relay-selection strategies to unity, which is validated by both theoretical and numerical results.
Conference Paper
Cognitive relaying is a promising technique to improve spectrum utilization in mobile networks. In this paper, we consider a scenario in which a secondary transmitter communicates with a secondary receiver by the help of a secondary relay. The secondary user should adjust its transmission power in order to not cause any harmful interference to the multiple primary users operating in the licensed spectrum. In this context, we investigate the end-to-end performance of cognitive relay networks in terms of outage probability and ergodic capacity over Nakagami-m fading channels. A closed-form expression for outage probability and an approximation for ergodic capacity are derived. Furthermore, the presented numerical examples illustrate the impact of the number of primary users on the performance of cognitive relay networks.