Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers

This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while the malicious eavesdropper (Eve) is used to eavesdrop the confidential information from Alice and Relay. To improve security, we design two transmission schemes, namely maximal-ratio combining/maximal-ratio transmission-selection combining (MRC/MRT-SC) with half-duplex (HD) receiver and maximal-ratio combining-zero forcing beamforming/maximal-ratio transmission-selection combining-zero forcing beamforming (MRC-ZFB/MRT-SC-ZFB) with full-duplex (FD) receiver. To evaluate the secrecy performance obtained from the proposed schemes comprehensively, the new closed-form and simple asymptotic expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) of our considered networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes are derived, respectively. Thus, we explore the effect of various schemes on system secrecy performance in terms of SOP and ST. Analytical results and numerical simulations demonstrate that MRC-ZFB/MRT-SC-ZFB achieves better performance in the two proposed schemes. In particular, we show that the FD receiver plays a crucial role in designing the cognitive wiretap networks for protecting the legitimate link against attack from the malicious eavesdropping.


Introduction
The dramatic needs in wireless communications service have resulted in higher requirements for more spectrums. Cognitive radio networks (CRNs) aim to effectively address spectrum scarcity and have attracted much attention from the research communities [1][2][3][4]. In spectrum sharing CRNs, the unlicensed secondary users (SUs) can have access to the licensed primary users' (PUs) spectrum in the condition that the interference power at the PU does not surpass a certain value [5]. Not only are CRNs expected to increase spectrum reuse, but they are also taken the low complexity of implementation into consideration. Thus, the underlay scheme has attracted growing attention, where the interference of SUs to the PUs should be guaranteed not to exceed a given threshold.
(Eve) is to eavesdrop the confidential information from Alice and Relay. The randomize-and-forward (RaF) transmission protocol has been widely used in different phases of physical layer security in CRNs. Since there is the transmission heterogeneity of the two transmitters, the eavesdropper cannot merge the common information of the two phases [29,30]. Relay is considered the half-duplex (HD) operation and Bob is considered the FD beamforming with AN operation to prevent overheard by the eavesdropper. To be specific, for the HD operation, the Relay utilize maximal-ratio combining (MRC) to pay more attention to the signal detection from Alice and send data to Bob by using maximal-ratio transmit (MRT) scheme, and then Bob receives signals forwarded from the Relay through using the selection combining (SC) scheme. While for the FD operation, MRC-ZFB/MRT-SC-ZFB secure transmission schemes are proposed, Relay first adopts MRC scheme to receive the data forwarded from Alice and at the same time Bob uses the ZFB scheme to transmit AN signals to reduce the illegal wiretapping of users at the first phase. At the second phase, Relay utilizes MRT scheme to send security information to Bob, and then Bob selects the best antenna to receive information from Relay and simultaneously transmits the jamming signal by utilizing the remaining antennas with FD operation. Our principal contributions are highlighted as follows: • We first derive closed-form and simple asymptotic expressions for the secrecy outage probability (SOP) and the secrecy throughput (ST) of the FD receiver cognitive wiretap networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes, respectively [31]. Moreover, we also explore the impact of the various system parameters on the SOP and ST, i.e., the number of antennas and the interference threshold at Relay and Bob.

•
We further derive the asymptotic closed-form expressions for the SOP and the secrecy diversity order and secrecy coding gain are achieved under two different scenarios, namely Scenario I: γ B → ∞ and fixed γ E , and Scenario II: γ B → ∞ and γ E → ∞, which reveals that the influence of system performance under the high signal-to-noise ratio (SNR). Two distinct scenarios can achieve the same secrecy diversity (min (N R , N R N B )) under Scenario I and zero secrecy diversity under Scenario II, where γ B and γ E denote the average SNR of the main channel and the eavesdropping channel, respectively.

•
Through the derivation and analysis of the SOP and ST, it has been verified that the MRC-ZFB/MRT-SC-ZFB scheme of FD operation at Bob outperforms MRC/MRT-SC scheme of HD operation in terms of enhancing secrecy performance of CRNs. The attained asymptotic expressions shed lights on the impact of distinct system parameters, i.e., increasing interference threshold of the primary network within a certain range and the number of antennas at the Relay and Bob. The beamforming of AN design can effectively improve the secrecy performance of the considered networks and the secrecy performance of the considered scheme with FD operation is mainly affected by the secrecy coding gain.
The remainder of the paper is organized as follows. In Section 2, the proposed system model is described. The SOPs of the system for the secondary data transmission are analyzed in Section 3. In Section 4, we provide the SOPs of the system under the high SNR analysis and ST. In Section 5, the numerical results and discussions are presented. Finally, we concludes this paper in Section 6.

System Model
As shown in Figure 1, Let us consider a secure transmission in cognitive wiretap networks with FD receiver consisting of a secondary user (SU) transmitter (Alice), a legitimate SU receiver (Bob), a relay (Relay), a primary user receiver (PU) and a passive eavesdropper (Eve). A transmitter Alice, an eavesdropper Eve and a primary user receiver only have a single antenna, while a secondary Relay and Bob are equipped with multiple antennas, which are denoted by N R and N B , respectively. As in, it is assumed that in this paper the Alice, Relay, Bob and Eve nodes are located in the same cluster far away from the primary user transmitter, and hence there is no direct link from the Alice-Bob and the link security information can only be transmitted through the Relay node. In this paper, we assume that both main and wiretap channels experience quasi-static independent block Rayleigh fading. The malicious eavesdropper has strong eavesdropping ability. The channel coefficient between M and N nodes, termed as h MN , is an distributed random variable (RV) with zero mean and variance λ MN as denoted by CN (0, λ MN ). As in [20,[32][33][34], legitimate channel state information (CSI) is assumed available at the Relay and Bob, namely the CSI of Alice-Relay and Relay-Bob. Recently, with advances on self-interference (SI) cancellation technology, we assume that the SI can be completely suppressed of the relay-relay link [11,20]. For investigating the advantages of FD Bob, we explore two distinct secure transmission schemes, namely MRC/MRT-SC scheme of HD operation and MRC-ZFB/MRT-SC-ZFB scheme of FD operation. For MRC-ZFB/MRT-SC-ZFB scheme, the CSI of the eavesdropping links is available for Bob, i.e., the CSI of Bob-Eve link. According to [12,33,35] and the mutual reciprocity of the channels, the Bob can obtain a reliable feedback CSI from the Eve in the condition of time-division duplex transmission. ...

MRC/MRT-SC with HD Scenario
The secure MRC/MRT-SC protocol employs two phases. For MRC phase, the Alice transfers information to the Relay, and Relay receives a radio signals through MRC scheme based on HD operation. Thus, the instantaneous SNR at Relay can be represented as where σ 2 R denotes the noise variance at Relay, h AR is an N R × 1 channel link vector Alice-Bob, and the transmit power of Alice is denoted by P S , which should be varied as [36] where Q and P t are the interference temperature constraint and the maximum transmit power constraint at PU and Alice, respectively. h AP is the channel coefficient for the Alice-PU link.
Similarly, define the SNR at node Eve as γ AE,1 , and γ AE,1 is given by where σ 2 E denotes the noise variance at Eve, h AE is the channel coefficient for Alice-Eve link. For MRT-SC phase, the Relay transfers information to the Relay by applying MRT-SC scheme based on HD operation which is similar to analysis of the MRC phase to transmit signal. Therefore, the instantaneous SNR for the Bob can be represented as where h RBi refers to the N R × 1 channel vector between Relay and the i-th receive antenna at Bob, σ 2 B refers to the noise variance at Bob, and the transmit power of Relay is denoted by P R , which must satisfy P R = min Q |h RP | 2 , P t . h RP is the Rayleigh channel and obeys the exponential distribution [37]. Similarly, define the SNR at node Eve as γ RE,1 , and γ RE,1 is given by in which h RE is the channel coefficient for Relay-Eve link.

MRC-ZFB/MRT-SC-ZFB with FD Scenario
The secure MRC-ZFB/MRT-SC-ZFB protocol employs two phases and the beamforming vector w ZF , w ZF1 are designed for each phase. For MRC-ZFB phase, we put forward an optimal beamforming scheme which maximizes the achievable secrecy rate of MRC-ZFB CRNs based on FD operation. Relay can adopt N R antennas gain for receiving the signal from the Alice by MRC operation, and Bob uses N B antennas for transmitting jamming signals to eavesdropper Eve simultaneously by using ZFB operation. ZFB is employed to get rid of malicious jamming signals for meeting the constraints at PU. Now, defining the N B × (1 + N R ) channel matrix, i.e., H BZ = [h BP , H BR ], where h BP , H BR are N B × 1, N R × N B channel link matrices Bob-PU and Bob-Relay, respectively, but the number of the antennas at Bob should be more than N R + 1 (N B > N R + 1). It is assumed that Relay employs a linear receiver w r with h AR = 1 for detecting signal. Additionally, MRC is employed at the Relay, denoted as w r = h AR / h AR [38]. The optimal expression of the weight vector w ZF is given by where † and · F are the conjugate transpose operator and the Frobenius norm, respectively. h BE1 denotes the N B × 1 channel vector between N B antennas of Bob and Eve. h † AR H BR denotes the 1 × N B channel vector between Relay and Bob. By applying the projection matrix theory [39], weight vector w ZF is given by where . Consequently, the instantaneous SNR at the Relay and the instantaneous signal-to-interference-plus-noise ratio (SINR) at the Eve are written as and where the interference power of Bob-Eve is denoted by P J . For the FD mechanism, when researchers investigate the performance limitations of information theory (such as capacity), the assumption that SI is not taken into consideration is widely used [33]. Therefore, for solving the closed-form expressions of SOP of FD operation at Bob, a detailed introduction will be presented in Section 3.
For MRT-SC-ZFB with FD phase, the Relay uses the N R antennas to transmit information to Bob. Then Bob selects the best i-th antenna to receive information from Relay and the remaining N B − 1 antennas transmit the jamming signal to Eve simultaneously. Therefore, Relay adopts MRT operation to decode and retransmit signal, and Bob adopts SC-ZFB operation to receive signals simultaneously to transmit jamming signals. The aim of SC-ZFB operation is to maximize the received SNR at Bob while avoiding the leakage of security information to the Eve and the interference to PU.
For the MRT-SC-ZFB phase, it requires N B ≥ 3. Thus, the optimal expression of the optimal weight vector w ZF1 is expressed as where h BE2 denote the (N B − 1) × 1 channel vector between the remaining N B − 1 antennas of Bob and Eve. h BP denote the (N B − 1) × 1 channel vector between the remaining N B − 1 antennas of Bob and PU. By applying projection matrix theory, weight vector w ZF1 is given by where is the correlation matrix with rank N B − 2. Hence, the instantaneous SNR at the Bob and the instantaneous SINR at the Eve are written as and As mentioned before, the precoding matrix w ZF and w ZF1 are designed for MRC-ZFB and MRT-SC-ZFB schemes so that the AN signal is wholly eliminated at the Bob-Relay and Bob-PU. It is clearly noted that in the MRC-ZFB/MRT-SC-ZFB with FD scenario, jamming signal is transmitted throughout the information transmission process to degrade the eavesdropping channel capacities of Alice-Eve and Relay-Eve links, and it does not interfere with the PU.
However, both γ AR,j , γ AE,j , γ RB,j and γ RE,j are affected by the common variable RV, j ∈ (1, 2) represent scheme 1 and scheme 2, respectively. G = |h AP | 2 and G 1 = |h RP | 2 in P S and P R . To solve this problem, we should derive the Cumulative Distribution Function (CDF) of γ AR,j and γ RB,j , and Probability Density Function (PDF) of γ AE,j and γ RE,j conditioned on G and G 1 .
According to RaF protocol, the SOPs of the two different phases are independent. A fundamental secrecy performance criterion in the complete Alice-Bob process is instantaneous secrecy capacity, which is represented as where C Bk =log 2 (1 + γ Bk ) and C Ek =log 2 (1 + γ Ek ) represent the capacities of the main channel and eavesdropping channel links, respectively, and k = {1, 2} stands for the first phase and the second phase, respectively. For maximizing the secrecy capacity C S,k , the main channel need to maximize C Bk and the eavesdropping channel need to minimize C Ek through the number of N R and N B at the Relay and Bob in two different phases. Two different phases of each scenario have independent transmission processes.
λ RE are defined in this paper for doing simple notational analysis.

Secrecy Performance Analysis
In this part, we study the SOP of the secure transmission in the dual-hop cognitive wiretap networks with FD receiver under two different scenarios. The SOP, defined as the probability of the secrecy capacity, C S , is less than a given threshold, R S . According to RaF protocol [20,40], we only solve the SOP of each independent phase. Mathematically, given by where C S,k and R S represent instantaneous secrecy rate and a predetermined threshold, respectively. Furthermore, the outage probability of P out (R S ) is expressed as where C and The instantaneous SOP of C MRC−ZFB and In order to solve (16), P out (R S ) needs to use (17), (18), (19) and (20). We have and where Pr γ ζ 1 ≤ 2 R S and Pr γ ξ 2 ≤ 2 R S are the SOP of the first phase and second phase of each scenario, respectively. Furthermore, with and with (15), the expression of P out (R S ) will be presented in the following Lemma.
Next, we will solve the F γ ζ 1 (R S ) and F γ ξ 2 (R S ) of two different scenarios according to Lemma 1 .

MRC/MRT-SC with HD Scenario
For MRC phase, observing from (1), (3) and [11], the conditional CDF of γ AR,1 and the conditional PDF of γ AE,1 , are respectively written as and Then, substituting (28) and (29) into (15), the conditional F γ AR,1 (R S |G) is given by The random variable G = |h AP | 2 obeys the exponential distribution, and the PDF expression of G is given by Thus, by using (30) and (31), we can write the CDF of γ AR,1 for the MRC operation with the HD mechanism in the following theorem. Theorem 1. By using MRC scheme we can calculate the CDF of γ AR,1 , which can be derived as where Γ (·, ·) is the incomplete upper gamma function, as defined in (Equation (8.350.2), [41]).

Proof of Theorem 1. See Appendix A.
For MRT-SC phase, observing from (4), (5), [12,42], the conditional CDF of γ RB,1 and the conditional PDF of γ RE,1 , are respectively given by and Then, substituting (33) and (34) into (15), the conditional F γ RB,1 (R S |G 1 ) is written as The random variable G 1 = |h RP | 2 also obeys the exponential distribution, and the PDF expression of G 1 can be written as Thus, by using (35) and f G 1 (g), we can write the CDF of γ RB,1 for the MRT-SC scheme with the HD mechanism in the following theorem. Theorem 2. By using MRT-SC scheme we can calculate the CDF of γ RB,1 , which can be derived as In this phase, the proof process of F γ MRT−SC 2 (R S ) for the MRT-SC scheme is similar with Theorem 1, and will not be elaborated here.

MRC-ZFB/MRT-SC-ZFB with FD Scenario
For MRC-ZFB phase, observing from (8) and (9), and in the presence of [12], the conditional CDF of γ AR,2 can be written as Lemma 2. The conditional PDF of γ AE,2 is given by Proof of Lemma 2. See Appendix B.
Then, substituting (37) and (38) into (15), the conditional F γ AR,2 (R S |G) is derived as Then, we can operate several mathematical manipulations. By making use of (Equation (9.211.4), [41]), K1 and K2 can be rewritten as and where Ψ (·, ·; ·) being the confluent hypergeometric function of second kind. Thus, the conditional F AR,2 (R S |G) can be rewritten as Hence, the F Now, substituting (31) into (43), we can write the CDF of γ AR,2 for the MRC-ZFB scheme with the FD mechanism in the following theorem. Theorem 3. By using MRC-ZFB scheme we can calculate the CDF of γ AR,2 , which can be derived as In this phase, the proof process of F γ MRC−ZFB 1 (R S ) for the MRC-ZFB scheme is similar with Theorem 1, and will not be elaborated here.
Then, substituting F γ RB,2 (y|G 1 ) and f γ RE,2 (y|G 1 ) into (15), the conditional F RB,2 (R S |G 1 ) is written as Thus, by using (45) and f G 1 (g), we can write the CDF of γ RB,2 for the MRT-SC-ZFB scheme with the FD mechanism in the following theorem.
Theorem 4. By using MRT-SC-ZFB scheme we can calculate the CDF of γ RB,2 , which can be derived as In this phase, the proof process of the F γ MRT−SC−ZFB 2 (R S ) for the MRT-SC scheme is similar with Theorem 1, and will not be elaborated here.

High SNR Analysis
Although the derivation of the closed-form expressions of the SOP has been finished above, the analysis of the asymptotic SOP in the high SNR will be conducted in this subsection to obtain more insights. Specifically, consider two different scenarios: (1) γ Bj → ∞ and fixed γ Ej , that a scenario in which the SNR of main link outperforms the SNR of the eavesdropper's link, also known as the eavesdropper's channel, suffers from heavy shadowing effect. (2) γ Bj → ∞ and γ Ej → ∞, that a scenario where both the receiver and the eavesdropper can be closer to the transmitter, namely both the wiretap channel and main channel are equipped with better SNR. ST is also one of the indicators to verify the secrecy performance of the considered system. Finally, the secrecy performance can be expressed by the high SNR slope, the secrecy diversity gain and coding gain. In the section, for γ Bj and γ Ej , j ∈ (1, 2) represent MRC/MRT-SC, MRC-ZFB/MRT-SC-ZFB, respectively.

Scenario I: γ Bj → ∞ and Fixed γ Ej
In this scenario, P out (R S ) is approximated as and ∆ ϑ is given by where ∆ 1 and ∆ 2 represent the first phase and second phase of the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes, respectively.
(1) MRC/MRT-SC scheme: Corollary 1. The asymptotic SOP of the different time-slots with MRC/MRT-SC scheme under γ B1 → ∞ and fixed γ E1 is given by and Proof of Corollary 1. See Appendix C.

Remark 1. The secrecy diversity gain of the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes is
min (N R , N R N B ) under Scenario I, which is only determined by the number of N R and N B of Relay and Bob, respectively. Additionally, the quality of the main channel and wiretap channel influence the secrecy performance of two scenarios through the coding gain, i.e., G = ∆ ϑ −1/ min(N R ,N R N B ) , in which ϑ ∈(MRC/MRT-SC, MRC-ZFB/MRT-SC-ZFB), respectively. We found that the more multiple antennas of Relay and Bob, the better system performance.

Scenario
Ii: γ Bj → ∞ and γ Ej → ∞ Now, the approximated SOP of the considered CRNs is analyzed in this section.

Remark 2.
In contrast to Scenario I, when γ B2 → ∞ and γ E2 → ∞, two scenarios appear to be the secrecy outage floor that unable to obtain secrecy diversity. Thus, the secrecy performance of the system can only be improved by the secrecy coding gain.

Secrecy Throughput
On the basis of SOP, the ST more comprehensively measures the reliability and security of the system in a whole way, which is the product of the complementary probability of P out (R S ) and the predetermined secrecy rate R S (Equation (24), [43]), [44]. Thus, the throughput expression of the two schemes can be written as where ϕ ∈ (MRC/MRT-SC, MRC-ZFB/MRT-SC-ZFB). (59), we numerically find that T ϕ out (R S ) exist an optimal value in a given range. When R S is small, T ϕ out (R S ) of the two scenarios is relatively small. However, when R S exceeds an optimal value, the T ϕ out (R S ) would decrease until zero. Therefore, determining the optimal value, R ov S , is practically significant to system designers, which can achieve the local optimal ST of system.

Numerical Results
In this section, analytical results demonstrate the secrecy performance of the MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes in terms of the achievable SOP. A detailed investigation on the effect of various system parameters, namely the number of antennas and thresholds, i.e., N R , N B and R S is conducted. Without loss of generality, R S = 2, σ 2 = σ R 2 = σ B 2 = σ E 2 = 1, ε = η = 1 and P J = 10 dB are set, and the transmitted SNR at Alice or Relay can be derived as P t /σ 2 . In addition, we take path loss attenuation g M,N as g M,N = d M,N −ω , where d M,N is the distance from M to N node and ω is normalized to 1, and all simulation results are obtained by averaging over 300,000 independent Monte Carlo trials. The Monte Carlo simulations in all figures thoroughly coincide with the theoretical simulation curves, which verifies that the closed-form expression is derived correctly in this paper. With the high SNR, the asymptotic curve approaches the exact curve. We also verified the secrecy diversity order in the asymptotic analysis expressions by the asymptotic curve.  (N R , N B ). Obviously, if the P t /σ 2 is higher, the outage performance of the system will be better. As shown, MRC-ZFB/MRT-SC-ZFB scheme achieves the best performance over the range of R S and the secrecy rate of the MRC-ZFB/MRT-SC-ZFB scheme gradually increases with P t /σ 2 before it saturates. And in this section, secrecy outage floor will appear in MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes when P t /σ 2 increases, this is because the Q is a crucial factor influencing the secrecy performance of system and is not limited by the P t of the secondary user transmitter. Additionally, when the number of (N R , N B ) and Q are fixed in two schemes, MRC-ZFB/MRT-SC-ZFB scheme with FD operation and beamforming with AN obviously attain better performance than MRC/MRT-SC scheme with HD operation from the perspective of enhancing the secrecy performance of wireless communications.    Figure 4 shows the effect of increasing N R and N B on the SOP and the asymptotic expressions curves of SOP attained from (47) under the γ Bj → ∞ and fixed γ Ej , respectively, where γ E = 10 dB and γ J = 10 dB. The parallel slope of the asymptote shows that the high SNR slope is independent of N R . It is worth noting that the curve converges quickly and hence the derived approximation is accurate. Furthermore, when N R and N B increase, the SOP will be significantly improved. Moreover, as expected, MRC/MRT-SC scheme has the lowest performance than the MRC-ZFB/MRT-SC-ZFB scheme. Thus, we see that the MRC-ZFB/MRT-SC-ZFB scheme with FD operation and beamforming with AN always outperforms than the MRC/MRT-SC scheme with HD operation, which means that transmitting jamming signals from a FD Bob through the MRC-ZFB/MRT-SC-ZFB scheme would enhance the secrecy array gain of the system compared with the MRC/MRT-SC scheme under Scenario I.  Figure 5 shows the SOP versus P t /σ 2 of the two schemes when γ J = 10 dB, γ Bj /γ Ej = 1, N R = 2, N B = 4 and N R = 3, N B = 5. The asymptotic expressions curves of SOP are achieved from (53) and (56) under the γ Bj → ∞ and γ Ej → ∞, respectively. The analytical results shows that the MRC-ZFB/MRT-SC-ZFB scheme has better performance than MRC/MRT-SC scheme under different N R and N B . It is noted that, for fixed γ Bj /γ Ej , increasing N R and N B lead to a slight decrease in the values of SOP. Additionally, the MRC-ZFB/MRT-SC-ZFB scheme achieves better performance than the MRC/MRT-SC scheme at the low P t /σ 2 , while the same holds at the high P t /σ 2 . Therefore, the MRC-ZFB/MRT-SC-ZFB scheme improves the transmission performance of wireless communication under Scenario II.  Figure 6 shows the SOP of two schemes for different number of N R and fixed N B varies with Q = 20 dB and γ J = 10 dB. As the Relay is equipped with more antennas, the SOP steadily decreases. It can be seen that the MRC-ZFB/MRT-SC-ZFB scheme always outperforms the MRC/MRT-SC scheme, and MRC/MRT-SC with HD operation scheme has a higher SOP under the same conditions. In particular, the MRC-ZFB/MRT-SC-ZFB scheme has a greater influence on the secrecy performance of the system than the MRC/MRT-SC scheme from the perspective of the value of N R . The reason is that the MRC-ZFB/MRT-SC-ZFB scheme enhances system secrecy performance based on FD operation at Bob. Thus, it also verifies the exact validity and the rationality of the closed-form expression of our proposed schemes. It is found that the more N R , the better the system performance, and the secrecy performance of the proposed MRC-ZFB/MRT-SC-ZFB scheme with FD operation is mainly affected by the secrecy coding gain.  Figure 7 shows the secrecy outage probability vs α 1 = λ AR /λ AE , and α 2 = λ RB /λ RE = (ε/η) α 1 . Q = 20 dB, γ J = 10 dB, N R = 2 and N B = 6 are set in two figures. In the first figure, when we set SNR = 20 dB, the simulation results demonstrate that when α 1 is relative low, the SOP of two different schemes decreases when α 1 increases. The MRC-ZFB/MRT-SC-ZFB of our proposed scheme outperforms MRC/MRT-SC scheme. The main reason is that the main channel is similar with the eavesdropper's channel. However, when α 1 is over 20, the eavesdropper's eavesdropping ability is relative weak and the noise power is almost zero, so there is no eavesdropping and interference object for MRC-ZFB/MRT-SC-ZFB scheme. Therefore, the two schemes have almost the same effect on system performance.The second figure shows that the SOP of two different schemes decreases when α 1 increases. When α 1 = 1 and 10, the SOP of MRC-ZFB/MRT-SC-ZFB scheme have obvious influence than the MRC/MRT-SC scheme in terms of enhancing the secrecy performance of system.  In this simulation, the analytical curves were obtained from (59), and it is clearly seen that the throughput of different schemes increases at the beginning and then decreases with the increasing of R S . It illustrated that there exists an optimal value R ov S of MRC/MRT-SC and MRC-ZFB/MRT-SC-ZFB schemes, making the secrecy transmission best. We also find that increasing N R and N B can improve ST significantly, which reflects the efficiency of equipping Relay and Bob with multiple antennas. Observe from

Conclusions
In this paper, we explored the secure transmission in cognitive wiretap networks with FD receiver. To investigate the benefits of FD operation at receiver of the considered CRNs, the MRC-ZFB/MRT-SC-ZFB with FD operation and MRC/MRT-SC of HD operation schemes were proposed, respectively. Also, the new closed-form and simple asymptotic expressions for the SOP and ST of our considered networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes were derived, respectively. Different transmission parameters, such as the SNR, Q and the number of N R and N B are designed to verify the impact on system secrecy performance. The closed-form expressions for the exact and asymptotic SOP concisely characterized the secrecy diversity gain and the secrecy coding gain. Additionally, analytical results and numerical simulations demonstrated that beamforming with AN is an important tool for ensuring secure transmission facing with a malicious eavesdropper in CRNs. Finally, it is also found that the MRC-ZFB/MRT-SC-ZFB scheme outperforms MRC/MRT-SC scheme, which verifies the advantages of the schemes conceived in this paper. Our results provided a unified model to analyse the SOP performance and the ST of the FD receiver cognitive wiretap networks over Rayleigh fading channels and could be easily extended to the scenarios with multiple PUs being faced with multiple eavesdroppers, which is also one of the parts in our further works.

Conflicts of Interest:
The authors declare no conflict of interest.

Appendix A
From (30) and (31), the CDF of γ AR,1 for the MRC scheme is given by (A1) Finally, substituting f G (g) in (A1) and with the help of (Equation (3.381.3), [41]), the desired F γ MRC 1 (R S ) yields in (32) by operating several mathematical manipulations.

Appendix B
We first denote . By using (Equation (12), [45]), the PDF of the index distribution R 1 can be expressed as Noticing that when N B ≥ 3, f R 1 (z) is the correct expression. Based on (9), we have Hence, F γ AE,2 (y|G) is represented as (A4) Finally, we obtain the conditional PDF of γ AE,2 after derivation.

Appendix C
Based on MRC scheme, when γ B1 → ∞, the conditional CDF of γ AB,1 is given by (A5) Also, the conditional PDF of γ AE,1 is written as By substituting (A5) and (A6) into (15), the asymptotic conditional F γ AR,1 (R S |G) is given by Now, On the basis of (31), the desired result F γ MRC 1 (R S ) can be derived as Based on MRT-SC phase, the MRT-SC scheme is similar with MRC scheme description process of the (A8), and when γ B1 → ∞, the conditional CDF of γ RB,1 can be approximated as (A9) f γ RE,1 (y|G 1 ) is the same as f γ AE,1 (y|G) of (A6). Similarly, the asymptotic conditional F γ RB,1 (R S |G 1 ) is given by Now, on the basis of f G 1 (g), the desired result F γ MRT−SC 2 (R S ) is written as By using (A8) and (A11), ∆ 1 and ∆ 2 are given by (49) and (50).