{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T19:05:37Z","timestamp":1761419137924,"version":"build-2065373602"},"reference-count":38,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T00:00:00Z","timestamp":1493856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Nature Science Foundation of China","award":["61471392","61501507"],"award-info":[{"award-number":["61471392","61501507"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Security and privacy are crucial for cognitive sensor radio networks (CSRNs) due to the possible eavesdropping between secondary sensors and the secondary fusion center. Motivated by this observation, we investigate the physical layer security performance of CSRNs with an external energy harvesting (EH)-based eavesdropper. Considering the underlay working paradigm of CSRNs, the transmit power of the secondary sensor node must be adjusted to guarantee the quality-of-service (    Q o S    ) of the primary user. Hence, two different interference power constraint scenarios are studied in this paper. To give an intuitive insight into the secrecy performance of the considered wiretap scenarios, we have derived the closed-form analytical expressions of secrecy outage probability for both of the considered cases. Monte Carlo simulation results are also performed to verify the theoretical analysis derived, and show the effect of various parameters on the system performance.<\/jats:p>","DOI":"10.3390\/s17051026","type":"journal-article","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T11:44:18Z","timestamp":1493898258000},"page":"1026","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Secrecy Performance Analysis of Cognitive Sensor Radio Networks with an EH-Based Eavesdropper"],"prefix":"10.3390","volume":"17","author":[{"given":"Aiwei","family":"Sun","sequence":"first","affiliation":[{"name":"Institute of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Tao","family":"Liang","sequence":"additional","affiliation":[{"name":"Nanjing Telecommunication Technology Institute, No. 18 Houbiaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Bolun","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Hong, Z., Wang, G., and Huang, J. (2016, January 1\u20134). High-Order Hidden Bivariate Markov Model: A Novel Approach on Spectrum Prediction. Proceedings of the 25th International Conference on Computer Communications and Networks (2016 ICCCN), Waikoloa, HI, USA.","DOI":"10.1109\/ICCCN.2016.7568528"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Pradhan, J., Wang, G., and Huang, J. (2016, January 4\u20138). Experimental approach: Two-stage spectrum sensing using GNU radio and USRP to detect primary user\u2019s signal. Proceedings of the 31st Annual ACM Symposium on Applied Computing (SAC 2016), Pisa, Italy.","DOI":"10.1145\/2851613.2851824"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Anjum, M.N., Song, M., Xu, X., Wang, G., and Huang, J. (2015, January 6\u201310). Optimal Resource Allocation for Delay Constrained Users in Self-coexistence WRAN. Proceedings of the IEEE Globecom Workshops, San Diego, CA, USA.","DOI":"10.1109\/GLOCOM.2015.7417820"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MNET.2009.5191144","article-title":"Cognitive radio sensor networks","volume":"23","author":"Akan","year":"2009","journal-title":"IEEE Netw."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Goh, H.G., Kwong, K.H., Shen, C., Michie, C., and Andonovic, I. (2010, January 9\u201312). CogSeNet: A Concept of Cognitive Wireless Sensor Network. Proceedings of the 7th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2010.5421630"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3143","DOI":"10.1109\/TWC.2016.2517618","article-title":"Dynamic Channel Access to Improve Energy Efficiency in Cognitive Radio Sensor Networks","volume":"15","author":"Ren","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1049\/iet-com.2015.0675","article-title":"Utility-based opportunistic spectrum access for cognitive radio sensor networks: Joint spectrum sensing and random access control","volume":"10","author":"Zheng","year":"2016","journal-title":"IET Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.1109\/JSEN.2017.2647878","article-title":"Cognitive Radio Sensor Network With Green Power Beacon","volume":"17","author":"Nobar","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TVT.2016.2551721","article-title":"Energy-Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network","volume":"66","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Varshney, L.R. (2008, January 6\u201311). Transporting information and energy simultaneously. Proceeding of the IEEE International Symposium on Information Theory (ISIT), Toronto, ON, Canada.","DOI":"10.1109\/ISIT.2008.4595260"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Grover, P., and Sahai, A. (2010, January 13\u201318). Shannon meets Tesla: Wireless information and power transfer. Proceeding of the IEEE International Symposium on Information Theory (ISIT), Austin, TX, USA.","DOI":"10.1109\/ISIT.2010.5513714"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1109\/TWC.2013.031813.120224","article-title":"MIMO broadcasting for simultaneous wireless information and power transfer","volume":"12","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/LSP.2013.2247999","article-title":"MIMO beam-forming designs with partial CSI under energy harvesting constraints","volume":"20","author":"Xing","year":"2013","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/WCL.2012.053112.120212","article-title":"Robust beamforming for wireless information and power transmission","volume":"1","author":"Xiang","year":"2012","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4754","DOI":"10.1109\/TCOMM.2013.13.120855","article-title":"Wireless information and power transfer: Architecture design and rate-energy tradeoff","volume":"61","author":"Zhou","year":"2013","journal-title":"IEEE Trans. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"3269","DOI":"10.1109\/TWC.2014.041714.131688","article-title":"Joint transmit beam-forming and receive power splitting for MISO SWIPT systems","volume":"13","author":"Shi","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1109\/LSP.2014.2305737","article-title":"Relay beamforming for amplify-and-forward multi-antenna relay networks with energy harvesting constraint","volume":"21","author":"Huang","year":"2014","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4199","DOI":"10.1109\/TSP.2013.2265224","article-title":"Optimum performance boundaries of OSTBC-based AF-MIMO relay system with energy harvesting receiver","volume":"61","author":"Chalise","year":"2013","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"6249","DOI":"10.1109\/TSP.2014.2355781","article-title":"Wireless information and energy transfer in multi-antenna interference channel","volume":"62","author":"Shen","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"4210","DOI":"10.1109\/TWC.2013.071913.130084","article-title":"Joint wireless information and energy transfer in a two-user MIMO interference channel","volume":"12","author":"Park","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1109\/TIFS.2012.2194704","article-title":"Scalable PHY-layer security for distributed detection in wireless sensor networks","volume":"7","author":"Soosahabi","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","unstructured":"Bloch, M., and Barros, J. (2004). Physical-Layer Security, Cambridge University Press."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1726","DOI":"10.3390\/s16101726","article-title":"Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks","volume":"16","author":"Lee","year":"2016","journal-title":"Sensors"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TIFS.2016.2516917","article-title":"Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach","volume":"11","author":"Deng","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MSP.2013.2256953","article-title":"Enhancing physical-layer secrecy in multi-antenna wireless systems: An overview of signal processing approaches","volume":"30","author":"Hong","year":"2013","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2840","DOI":"10.1109\/TWC.2013.040413.120972","article-title":"Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers","volume":"12","author":"Yang","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1850","DOI":"10.1109\/TSP.2014.2303422","article-title":"Secrecy wireless information and power transfer with MISO beam-forming","volume":"62","author":"Liu","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/TVT.2015.2437848","article-title":"Transmission Strategy With Cooperative Sensors in Cognitive Radio Networks","volume":"65","author":"Hung","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"4247","DOI":"10.1109\/JSEN.2013.2264161","article-title":"Spectrum Sensing in Opportunity\u2013Heterogeneous Cognitive Sensor Networks: How to Cooperate?","volume":"13","author":"Ding","year":"2013","journal-title":"IEEE Sens. J."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Zheng, M., Chen, L., Liang, W., Yu, H., and Wu, J. (2016). Energy-efficiency Maximization for Cooperative Spectrum Sensing in Cognitive Sensor Networks. IEEE Trans. Green Commun. Netw.","DOI":"10.1109\/TGCN.2016.2646819"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Chiti, F., Fantacci, R., and Tani, A. (2016). Performance Evaluation of An Adaptive Channel Allocation Technique for Cognitive Wireless Sensor Networks. IEEE Trans. Veh. Technol.","DOI":"10.1109\/GLOCOMW.2015.7414076"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1049\/iet-spr.2015.0481","article-title":"Distributed fast channel allocation in cognitive wireless sensor networks","volume":"10","author":"Sun","year":"2016","journal-title":"IET Signal Process."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wang, D., Ren, P., Du, Q., Sun, L., and Wang, Y. (2016, January 14\u201316). Optimal Power Allocation for Cognitive Radio Sensor Networks under Primary Secrecy Outage Constraint. Proceedings of the IEEE International Conference on Communication Systems (ICCS), Shenzhen, China.","DOI":"10.1109\/ICCS.2016.7833586"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3423","DOI":"10.1109\/TCOMM.2015.2458317","article-title":"Secrecy Performance Analysis for SIMO Simultaneous Wireless Information and Power Transfer Systems","volume":"63","author":"Pan","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"3790","DOI":"10.1109\/TVT.2014.2358624","article-title":"On the security of cognitive radio networks","volume":"64","author":"Elkashlan","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2368","DOI":"10.1109\/TVT.2012.2192509","article-title":"Cognitive Amplify-and-Forward Relay Networks Over Nakagami-m Fading","volume":"61","author":"Duong","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_37","unstructured":"Grinstead, C.M., and Snell, J.L. (1991). Introduction to Probability, American Mathmatical Society. [2nd ed.]."},{"key":"ref_38","unstructured":"Gradshteyn, I.S., and Ryzhir, I.M. (2007). Tables of Integrals, Series and Products, Academic Press. [7th ed.]."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/5\/1026\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:34:35Z","timestamp":1760207675000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/5\/1026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,4]]},"references-count":38,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2017,5]]}},"alternative-id":["s17051026"],"URL":"https:\/\/doi.org\/10.3390\/s17051026","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,5,4]]}}}