Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers

: Cooperative communication and cognitive radio can effectively improve spectrum utilization, coverage range, and system throughput of vehicular networks, whereas they also incur several security issues and wiretapping attacks. Thus, security and threat detection are vitally important for such networks. This paper investigates the secrecy and throughput performance of an underlay cooperative cognitive vehicular network, where a pair of secondary vehicles communicate through a direct link and the assistance of a decode-and-forward (DF) secondary relay in the presence of Poisson-distributed colluding eavesdroppers and under an interference constraint set by the primary receiver. Considering mixed Rayleigh and double-Rayleigh fading channels, we design a realistic relaying transmission scheme and derive the closed-form expressions of secrecy and throughput performance, such as the secrecy outage probability (SOP), the connection outage probability (COP), the secrecy and connection outage probability (SCOP), and the overall secrecy throughput, for traditional and proposed schemes, respectively. An asymptotic analysis is further presented in the high signal-to-noise ratio (SNR) regime. Numerical results illustrate the impacts of network parameters on secrecy and throughput and reveal that the advantages of the proposed scheme are closely related to the channel gain of the relay link compared to the direct link.


Introduction 1.Background and Motivation
With the enormous number of cars and growing application of fifth-generation (5G) communication technologies, the Internet of Vehicles (IoV) has become one of the critical wireless networks and aims to establish and maintain a reliable and intelligent transportation system by connecting pedestrians and vehicles along with roadside units (RSUs).A vehicular ad hoc network (VANET), as a key component of the IoV, is envisaged and deployed to facilitate traffic management by enhancing passenger safety, providing entertainment information, etc.There are mainly three communication modes in the VANET, i.e., vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and hybrid vehicle communication (HVC), including both V2V and V2I.Due to the mobility of vehicles and limited coverage of RSU, V2V and V2I links are intermittently connected and disconnected, causing many problems such as unreliability, continual handoff, and low throughput.Cooperative communication, which provides diversity gain by introducing relays, has been proven to be an effective compensation technology and has been widely used and analyzed in the VANET [1][2][3].
On the other hand, with the ever-growing demands of vehicular wireless services, the problem of spectrum scarcity in vehicular networks has become more serious [4].In order to alleviate this problem and pursue green communication, cognitive radio (CR) has been introduced as a promising technology to address the conflict between spectrum scarcity and spectrum underutilization.In CR networks, unlicensed secondary users (SUs) are allowed to dynamically access the licensed spectrum with the requirement of not interfering with the primary users (PUs).In general, according to the different spectrum access strategies, there are mainly two paradigms of CR networks, i.e., overlay CR and underlay CR; the former allows SUs to transmit data by sensing the spectrum holes of PUs, and the latter enables SUs to utilize the licensed spectrum simultaneously with PUs while guaranteeing the interference at PUs does not exceed the acceptable threshold.Comprehensively, coupling CR with cooperative vehicular networks can be an effective and efficient solution for better spectrum utilization, connectivity, and reliability [5].
However, every coin has two sides.The introduction of CR is not without drawbacks.In the underlay CR, the coexistence of licensed and unlicensed users on the same network leads to several security issues and privacy attacks, such as eavesdropping over a wiretap channel shown in Figure 1.This not only makes the network structure more complex by introducing additional interference links between secondary transmitters (SU-Tx) and primary receivers (PU-Rx) and bringing the dependence in channel gains of the instantaneous end-to-end signal-to-noise ratio (SNR) at the destination and eavesdroppers (E), but also throws up various new information security challenges for such vehicular networks.Existing security solutions mainly include key-based cryptographic techniques and physical-layer security (PLS) techniques.PLS has gained wider research interest because it "smartly" utilizes the inherent characteristics of the physical channel to realize keyless secure transmissions, and it can be easily integrated into the prevailing security infrastructure through signal design and physical layer resource allocation [5].Furthermore, security issues are very prominent in cooperative vehicular networks because confidential information is broadcast twice, i.e., by the source and relays.Thus, it is much more important to study the PLS in cooperative cognitive vehicular networks [6].
Electronics 2024, 13, x FOR PEER REVIEW 2 of 21 has been proven to be an effective compensation technology and has been widely used and analyzed in the VANET [1][2][3].
On the other hand, with the ever-growing demands of vehicular wireless services, the problem of spectrum scarcity in vehicular networks has become more serious [4].In order to alleviate this problem and pursue green communication, cognitive radio (CR) has been introduced as a promising technology to address the conflict between spectrum scarcity and spectrum underutilization.In CR networks, unlicensed secondary users (SUs) are allowed to dynamically access the licensed spectrum with the requirement of not interfering with the primary users (PUs).In general, according to the different spectrum access strategies, there are mainly two paradigms of CR networks, i.e., overlay CR and underlay CR; the former allows SUs to transmit data by sensing the spectrum holes of PUs, and the latter enables SUs to utilize the licensed spectrum simultaneously with PUs while guaranteeing the interference at PUs does not exceed the acceptable threshold.Comprehensively, coupling CR with cooperative vehicular networks can be an effective and efficient solution for better spectrum utilization, connectivity, and reliability [5].
However, every coin has two sides.The introduction of CR is not without drawbacks.In the underlay CR, the coexistence of licensed and unlicensed users on the same network leads to several security issues and privacy attacks, such as eavesdropping over a wiretap channel shown in Figure 1.This not only makes the network structure more complex by introducing additional interference links between secondary transmitters (SU-Tx) and primary receivers (PU-Rx) and bringing the dependence in channel gains of the instantaneous end-to-end signal-to-noise ratio (SNR) at the destination and eavesdroppers (E), but also throws up various new information security challenges for such vehicular networks.Existing security solutions mainly include key-based cryptographic techniques and physical-layer security (PLS) techniques.PLS has gained wider research interest because it "smartly" utilizes the inherent characteristics of the physical channel to realize keyless secure transmissions, and it can be easily integrated into the prevailing security infrastructure through signal design and physical layer resource allocation [5].Furthermore, security issues are very prominent in cooperative vehicular networks because confidential information is broadcast twice, i.e., by the source and relays.Thus, it is much more important to study the PLS in cooperative cognitive vehicular networks [6].On the other hand, throughput, as a crucial performance index, directly affects and reflects the system's performance and quality of service (QoS).How to improve throughput to meet the quality of experience (QoE) is a long-standing research hotspot in wireless communication networks, especially in the era of 5G and beyond communication networks that promise high speed, low latency, reliable connectivity, and seamless integration of various complex heterogeneous networks to provide a truly digital world [7].Therefore, inspired by the above, exploiting PLS to analyze the secrecy and throughput performance of cooperative underlay CR vehicular networks is the main focus of this paper.

Related Work
Owing to the merits of PLS, the secrecy performance of wireless networks has been widely studied in previous works.As the originator, Wyner laid the theoretical foundation for the study of PLS by establishing a three-node wiretap channel model and proposing the information-theoretic notion of secrecy in [8].Based on Wyner's model, a great deal of work has been proposed.For instance, Ref. [9] studied the average secrecy capacity and secrecy outage probability (SOP) under three different conditions when the main and wiretap channels experience independent log-normal, correlated log-normal, and independent composite fading, respectively.Considering both single-antenna and multiple-antennaaided transmission scenarios, Ref. [10] investigated the PLS of non-orthogonal multiple access (NOMA) in large-scale networks by invoking stochastic geometry.
Furthermore, the PLS of cooperative networks [6,11,12] or CR networks [13][14][15] have been well analyzed.Specifically, Ref. [6] proposed a relay selection strategy to improve the secure connection probability in a decentralized wireless network with randomly distributed relays and eavesdroppers.Ref. [11] presented two PLS transmission schemes and examined their achievable secrecy performance for multi-user multi-relay networks intercepted by a passive eavesdropper.In terms of CR networks, considering two different interference power constraint scenarios, Ref. [13] derived the closed-form analytical expressions of SOP for an underlay CR sensor network with an external energy harvesting (EH)-based eavesdropper.By modeling a CR network with multiple eavesdroppers for the Internet of Things (IoT) over k-µ fading channels, Ref. [14] developed the minimum limit values of SOP and the probability of strictly positive secrecy capacity (SPSC).In order to achieve secure transmission in a CR network in the presence of randomly distributed eavesdroppers, Ref. [15] designed four transmission protocols and comprehensively analyzed multiple performance factors, including delay, security, reliability, and throughput, for each protocol.
Based on the aforementioned work, of particular interest is the PLS in cooperative cognitive relaying networks, which has been extensively studied in Refs.[16][17][18][19][20].Over Rayleigh fading channels, Ref. [16] evaluated and asymptotically analyzed the intercept and outage probability of a decode-and-forward (DF) relaying underlay CR network where an eavesdropper tapped the second hop.By deriving closed-form and asymptotic expressions for SOP over Nakagami-m fading channels, Ref. [17] investigated the PLS of a dual-hop underlay uplink CR network assisted by a multi-antenna relay and overheard by M multi-antenna eavesdroppers.Refs.[18][19][20] studied the PLS with outdated channel state information (CSI) for cooperative cognitive relaying networks.However, all the above work always confines itself to the assumption that nodes are stationary and channels between them are always modeled as Rayleigh, Nakagami-m, or Rician fading.
Recently, vehicular communication networks, which were formed because of the advancements in the development of automatically connected vehicles with embedded sensors, have promised a plethora of mobile world applications, e.g., intelligent transportation systems (ITS), environment monitoring, infotainment services, etc. [6].It makes mobility performance indispensable and must be considered.In the mobile communication scenarios, however, classical Rayleigh or Nakagami-m fading channels become inadequate, and the double-Rayleigh or double Nakagami-m channels have proven to be more appropriate in characterizing the V2V links according to both the field measurements and theoretical analyses [21,22].
Motivated by this, a quantity of work [5,7,17,[23][24][25][26][27][28][29][30] has been proposed.For example, Refs.[5,23] studied the secrecy performance of an underlay cooperative cognitive amplify-and-forward (AF) relaying vehicular network and drew the conclusion that the presence of eavesdroppers causes an irreducible error floor and hence reduces the secrecy diversity order by deriving tight lower bounds and asymptotic expressions of SOP.Further, assuming a situation where the eavesdropper takes advantage of both the relay and direct link, the secrecy performance was analyzed in [7,24].Ref. [25] investigated the secrecy performance of a cooperative vehicular relaying network in the presence of an interference source and proposed a power allocation model to reduce the SOP of the source and relay transmission powers.In addition, some new technologies have been introduced to improve secrecy performance, such as beamforming [27,28], cooperative jammers [17,29,30], and reconfigurable intelligent surfaces (RIS) [31][32][33][34], especially RIS, which is considered one of the critical 6G technologies for its outstanding advantages in energy efficiency, adaptability, interference management, signal control, and, notably, secrecy performance.
In summary, there are some drawbacks to the current research: 1.
For simplicity, some ideal assumptions have always been made.For instance, many studies, such as [5,24,35,36], assumed that the direct link between SU-Tx and its receiver (SU-Rx) is unavailable because of the severe shadowing or path loss, and the direct link between SU-Tx and E is also neglected since E is far away from SU-Tx and outside the transmission range of the first hop.It is unrealistic because vehicles are moving, and the direct links can be available when the receiver (SU-Rx or E) moves close to SU-Tx and does not experience severe fading or shadowing.Also, direct links can affect both legitimate and wiretap transmissions [7], so the impact of direct links should not be ignored for secure transmission in such networks; 2.
In terms of wiretap channels, many papers [5,7,25] have focused on the perfect CSI or single eavesdropper, while there is always a potentially large number of passive eavesdroppers who deliberately conceal their CSI or location information from legitimate users in practical scenarios.Therefore, it is necessary to model the location set of eavesdroppers as a stochastic process following some distributions [37,38].However, it has been rarely discussed for secrecy analysis in such networks.

3.
Most work has studied the PLS of cooperative cognitive vehicular networks in the AF relaying protocol, such as [5,7,23,24], but only a few studies have focused on the DF protocol, such as [39].It is understandable because AF can provide lower latency and complexity, which is crucial for real-time IoV networks.However, meanwhile, AF worsens the legitimate channels because of its non-regenerative principle, where the relay directly amplifies and forwards the received signals without decoding, causing the accumulation of noise and a decrease in system performance.This is not conducive to communication data with high reliability requirements, such as passenger privacy, security information, etc.By comparison, DF is more suitable for some communication environments with relaxed latency but strict reliability requirements because it can eliminate the impact of fading on the first hop by decoding and regenerating the received signal [25,40].Refs.[41][42][43] have also studied the gain between AF and DF; for instance, Ref. [41] concluded that from a diversity-multiplexing tradeoff (DMT) perspective, DF is strictly optimal over a certain range of the multiplexing gains, but the DMT of AF is offset by a constant term depending on the quality of CSI of the source-destination link only.Furthermore, Ref.
[43] has proven that a hybrid decode-amplify-forward (HDAF) relaying protocol can achieve greater secure rate gain with the help of interfering nodes.Therefore, it is also necessary to study the applicability of DF in such networks.
To the best of the authors' knowledge, there is no existing work that studied the PLS of cooperative underlay CR vehicular networks by simultaneously considering the above-mentioned 1, 2, and 3. Therefore, we mainly analyze the secrecy and throughput performance of such DF relaying networks with direct links and Poisson-distributed colluding eavesdroppers.Table 1 presents the comparison between our work and some existing works to clearly highlight the contributions of this paper.

Approach and Contributions
Motivated by the aforementioned work, we investigate the secrecy and throughput performance of cooperative underlay CR vehicular networks where a mobile SU-Tx communicates with a mobile SU-Rx assisted by a mobile DF-based secondary relay (SU-Relay) while under the constraint of a stationary PU-Rx.In addition, multiple colluding eavesdroppers whose location set is modeled as a homogeneous Poisson point process (HPPP) exist in the network to overhear the confidential information.In reality, the direct links, including SU-Tx between SU-Rx and SU-Tx between E, are also considered in this paper.Our major contributions are summarized as follows: 1.
Considering realistic traffic conditions, this paper establishes a more practical cognitive vehicular system model that not only considers secondary direct links and randomly distributed eavesdroppers but also adopts mixed Rayleigh and double-Rayleigh fading channels to characterize V2V and V2I links.Moreover, a DF relaying transmission scheme is proposed to provide theoretical supplements for existing AF works; 2.
According to the proposed system model, this paper derives the approximate expressions of the distribution functions of SNR for the traditional direct transmission scheme and the proposed relaying transmission scheme, respectively.We further deduce the closed-form expressions of the secrecy and throughput performance for each scheme and conduct an asymptotic analysis in the high SNR regime; 3.
Designing numerical simulations, this paper verifies our theoretical findings and discusses the performance comparison of the two schemes, the impact of network parameters on security and throughput performance, and the relationship between the maximum secrecy throughput and the optimal relay position in order to provide useful design insights for relay networks with security constraints.
The rest of this paper is organized as follows: Section 2 presents the system model and a complete description of the proposed relay transmission scheme.Section 3 basically obtains the distribution functions of one-hop SNR and performance analysis for the direct transmission scheme.In Section 4, we analyze the distribution functions of two-hop SNR and system performance for the proposed scheme and further present an asymptotic SOP and COP analysis in the high SNR regime.Numerical simulation results are provided in Section 5, and the conclusions are finally put forward in Section 6.

System Model and Scheme Description 2.1. System and Channel Models
As shown in Figure 2, we consider a cooperative cognitive mobile network that consists of a primary transmitter-receiver pair (PU-Tx and PU-Rx) and a secondary cooperative network comprising a SU-Tx (S), a SU-Relay (R), a SU-Rx (D), and multiple movable eavesdroppers E j (j = 1, 2, . ..).The network works in the underlay mode, which allows the licensed spectrum of the primary network to be shared by secondary users to communicate confidential information but requires that the instantaneous interference power at PU-Rx from secondary senders (both S and R) be limited below the maximum tolerable interference threshold I 0 .It is worth mentioning that such a system model has theoretical correlations in many popular communication systems, such as cognitive radio sensor networks, cognitive IoT networks, spectrum-sharing heterogeneous cooperative vehicular networks, etc.
and system performance for the proposed scheme and further present an asymptotic SOP and COP analysis in the high SNR regime.Numerical simulation results are provided in Section 5, and the conclusions are finally put forward in Section 6.

System and Channel Models
As shown in Figure 2, we consider a cooperative cognitive mobile network that consists of a primary transmitter-receiver pair (PU-Tx and PU-Rx) and a secondary cooperative network comprising a SU-Tx (S), a SU-Relay (R), a SU-Rx (D), and multiple movable eavesdroppers Ej (j = 1, 2, …).The network works in the underlay mode, which allows the licensed spectrum of the primary network to be shared by secondary users to communicate confidential information but requires that the instantaneous interference power at PU-Rx from secondary senders (both S and R) be limited below the maximum tolerable interference threshold 0 I .It is worth mentioning that such a system model has theoretical correlations in many popular communication systems, such as cognitive radio sensor networks, cognitive IoT networks, spectrum-sharing heterogeneous cooperative vehicular networks, etc.In reality, we assume that eavesdroppers are randomly distributed in the secondary network, and the HPPP model with density E λ is adopted to characterize this stochastic process.Compared to deterministic models, the spatial HPPP model has the advantage of introducing total randomness for the node deployment and being tractable in performance analysis only by requiring the node density.Some important results about wireless networks with PPP-based randomly distributed nodes have been obtained in [37].
In this model, each node has a single antenna and operates in a half-duplex manner.We further assume that the receiver (including PU-Rx, R, D, and E) has the perfect CSI, but the availability of CSI at the transmitter (including PU-Tx, S, and R) is different due to the different capabilities of the receiving terminals.Specifically, we consider a scenario where the PU-Rx is a cellular base station (BS) that is capable of instantaneous CSI to all transmitters, while D, which is always a mobile vehicle, is not capable of full CSI feedback.This assumption meets the fact that the PU-Rx feeds back to both S and R with the instantaneous channel gain to enable them to adjust transmit power to satisfy the interference constraint.Realistically, eavesdroppers are assumed to be totally passive, such that their CSI is not revealed to S and R.
In terms of channel models, we assume all channels are quasi-static and subject to independent and non-identically distributed (i.ni.d.) fading.Moreover, because of the mobile nature of S, R, and D, and the stationary nature of PU-Rx, the V2V channels, i.e., S → In reality, we assume that eavesdroppers are randomly distributed in the secondary network, and the HPPP model with density λ E is adopted to characterize this stochastic process.Compared to deterministic models, the spatial HPPP model has the advantage of introducing total randomness for the node deployment and being tractable in performance analysis only by requiring the node density.Some important results about wireless networks with PPP-based randomly distributed nodes have been obtained in [37].
In this model, each node has a single antenna and operates in a half-duplex manner.We further assume that the receiver (including PU-Rx, R, D, and E) has the perfect CSI, but the availability of CSI at the transmitter (including PU-Tx, S, and R) is different due to the different capabilities of the receiving terminals.Specifically, we consider a scenario where the PU-Rx is a cellular base station (BS) that is capable of instantaneous CSI to all transmitters, while D, which is always a mobile vehicle, is not capable of full CSI feedback.This assumption meets the fact that the PU-Rx feeds back to both S and R with the instantaneous channel gain to enable them to adjust transmit power to satisfy the interference constraint.Realistically, eavesdroppers are assumed to be totally passive, such that their CSI is not revealed to S and R.
In terms of channel models, we assume all channels are quasi-static and subject to independent and non-identically distributed (i.ni.d.) fading.Moreover, because of the mobile nature of S, R, and D, and the stationary nature of PU-Rx, the V2V channels, i.e., S → D, S → R, and R → D, are assumed to experience the double-Rayleigh fading [44,45], while the V2I links, such as S → PU and R → PU, are modeled as Rayleigh fading [46,47].It is worth noting that multiple movable eavesdroppers can be regarded as a single eavesdropper, denoted as E, with multiple distributed antennas for the reason that colluding eavesdroppers can exchange information with each other [6], so the channels related to eavesdroppers, i.e., S → E and R → E, can also be modeled as the Rayleigh channel [15].In particular, the channel coefficients h ij for {ij} ∈ {SP, RP, SE, RE} are independent complex Gaussian random variables having zero mean and variance Ω ij , i.e., , where d ij is the distance between i and j, ε is the path loss factor, and thus the channel gain h ij 2 is an exponential random variable, and its probability density function (PDF) and cumulative distribution function (CDF) are given as: On the other hand, the channel coefficients h k for {k} ∈ {SD, SR, RD} can be modeled as the product of h k,1 and h k,2 , where h k,i ∼ CN(0, Ω k,i ) and assuming The PDF and CDF of the channel gain |h k | 2 are, respectively, given as: where K v (•) denotes the v-th order modified Bessel function of the second kind [5].The additive white Gaussian noise (AWGN) for each link is modeled as CN(0, N 0 ).The above PDFs and CDFs will be used for the subsequent performance analysis.

Transmission Scheme
In this section, we provide a complete description of the proposed relaying transmission (RT) scheme.It is worth noting that, unlike transmission schemes in [5,6,15,25], where the communication from S to D must be accomplished via R in two hops, the fastest transmission from S to D in our RT scheme can be completed in one hop by considering the availability of the direct S-D link.Specifically, in the first time slot, S broadcasts a unit confidential message x s to R and D; the transmission is completed if D decodes x s correctly.Otherwise, D requests retransmission in the second time slot.Due to the working principle of the DF relaying protocol, R regenerates and retransmits x s to D if it has correctly decoded x s in the first time slot.Otherwise, retransmission can only be executed by S. Note that x s from both S and R will impose interference on PU and be overheard by E during the whole process.The proposed scheme is presented in Table 2.
In terms of secure encoding, secondary senders (S and R) use the widely adopted wiretap code [8] to encode x s .We denote C(R B , R S ) as the set of all possible Wyner codes, where R B is the codeword transmission rate, R S is the confidential information rate and R B > R S .We assume R B and R S are constants, as the design of the rate parameter is beyond the scope of this paper.It is obvious that the rate difference R B − R S reflects the cost of securing the message against eavesdropping.

Performance Analysis of the Direct Transmission Scheme
In this section, we first analyze the distribution functions of the instantaneous equivalent SNR for each receiver under the direct transmission (DT) scheme and then further study the secrecy and throughput performance of this scheme.

The PDFs and CDFs of SNR
The so-called DT scheme refers to the transmission without relaying, i.e., whether D decodes the message correctly or not, the data transmission must be completed in one hop.The instantaneous equivalent end-to-end SNR of receivers (both D and E j ) can be represented as: where P S is the transmit power of S, and it must be adjusted to P S = I 0 |h SP | 2 in order to satisfy the instantaneous interference constraint I 0 at PU-Rx.Denoting Φ E as the location set of eavesdroppers, (5) can be rewritten as: where ρ ≜ I 0 N 0 and . The CDFs of γ SD and γ SE can be calculated as: substituting ( 1) and ( 4), applying the substitution √ y = t and the fact that ∞ 0 f |h SP | 2 (y)dy = 1, we can rewrite (8) as: Equation (6.631.3)),where Γ(x) = ∞ 0 e −t t x−1 dt is the Gamma function [49].We can obtain the final expression as follows: where k ≜ Ω SP ρΩ 2

Secrecy and Throughput Performance Analysis
Based on Section 3.1, we further evaluate the secrecy and throughput performance by adopting outage-based metrics related to security and reliability instead of using the widely used outage probability of secrecy capacity [51], i.e., p out = Pr{max[C D − C E , 0] < R S }, which cannot differentiate outages caused by either information leakage to eavesdroppers (security) or unreliable reception at the receiver (reliability).Specifically, we denote the secrecy outage probability (SOP) and the connection outage probability (COP) to represent two kinds of outage events under the fixed-rate wiretap code.Furthermore, in order to comprehensively reflect the system performance of having a secure and reliable transmission, the secrecy and connection outage probability (SCOP) is defined.Finally, the overall secrecy throughput is measured based on the SCOP.

•
SOP represents the probability that a secrecy outage event happens when the secure transmission cannot be guaranteed, which is given by [52] as follows: where C SE = log 2 (1 + γ SE ) denotes the wiretap channel capacity. ( 15 can be rewritten as follows: substituting ( 13) into ( 16), SOP can be obtained as follows: • COP represents the probability that a connection outage event happens when the message cannot be decoded at the intended receiver correctly, which can be expressed as follows: where C SD = log 2 (1 + γ SD ) denotes the wiretap channel capacity. ( 18 can be rewritten as follows: substituting ( 10) into (19), COP can be derived as follows: Equation (07.45.26.0005.01)),where G m,n p,q z| [49], (20) can be further expressed as follows: • SCOP represents the probability that either the secrecy outage or the connection outage happens, which can comprehensively reflect the joint performance of security and reliability.SCOP can be given as: It is worth noting that the calculation of ( 22) is tedious and intractable due to the mutual correlation between security (γ SE ) and reliability (γ SD ).We assume that the SOP and COP are independent, which is reasonable in CR networks with fixed transmit power [15], so ( 22) can be simplified as: substituting ( 17) and ( 20), SCOP can be derived as: • Secrecy throughput quantifies the achievable average secrecy rate at which the message can be transmitted securely and reliably to D, which is given as: substituting (24), secrecy throughput can be finally obtained as: Remark 1. From ( 17) and ( 21), it is worth noting that the SOP is an increasing function of λ E and ρ, while is a decreasing function of Ω SP and (R B − R S ).Conversely, the COP, which is independent of λ E , is an increasing function of Ω SP and R B , while is a decreasing function of ρ.This implies that a large λ E is harmful to reducing the SOP and SCOP but has no effect on the COP in the secondary network.On the other hand, it can be inferred from ( 24) and ( 26) that the SCOP and secrecy throughput of the DT scheme are closely related to the network parameters, including ρ, Ω SP , Ω SD , and (R B − R S ).

Performance Analysis of the Relaying Transmission Scheme
This section first analyzes the CDFs of the instantaneous equivalent SNR at D and E after two-hop transmission under the proposed relaying transmission (RT) scheme, and the secrecy and throughput performance are then studied based on them.Finally, an asymptotic SOP and COP analysis is presented in the high SNR regime.

The CDFs of SNR
Unlike the DT scheme with only one hop, the proposed RT scheme involves two-hop transmission, and the SNR analysis of each receiver (D and E) needs to be discussed based on the decoding situation of R. For simplicity, we consider that S and R have the same codebook and code rate.D utilizes the maximal ratio combining (MRC) technique, and E only decodes the signal with a higher SNR in two hops, i.e., E uses the selection combining (SC) technique.
According to Section 2.2, if D decodes x s with error but R successfully, the retransmission is executed by R in the next hop.Based on the DF forwarding strategy, the instantaneous equivalent SNR at D and E is:

SE , γ
(2) RE (28) where γ (n) ij represents the SNR of the link i-j at the n-th hop.They can be further expressed as: where [53]   and the fact that γ (1)

SR and γ
(2) RD follow the same distribution as γ SD in (10), the CDF of γ SRD can be calculated as follows: where

RD
. We can further express the CDF of γ D as: with the aid of the F γ SRD (x) in ( 31), the f γ SD (x) in ( 11), ( 32) can be rewritten as follows: similar to the substitution from ( 20) to (21), it can be rewritten as: according to ( [49], Equation (07.34.21.0081.01)),( 34) can be further evaluated as follows: On the other hand, according to 13), the CDF of γ E can be obtained as: In particular, if both D and R decode x s incorrectly, the retransmission can only be executed by S in the second hop.In this situation, the SNRs of D and E become as follows: and their CDFs are simplified as:

Secrecy and Throughput Performance Analysis
Based on the CDFs obtained in Section 4.1, we further evaluate the secrecy and throughput performance of the proposed RT scheme.

•
SOP: referring to (15), SOP can be expressed as: according to the different decoding situations of R and substituting (36) and ( 39), (40) expands as: where p ′ co is the probability that R cannot decode the message correctly, i.e., the COP of R, which can be calculated by referring to (18): referring to the CDF of γ SD in (10), p ′ co can be expressed as: Thus, the average SOP p RT so can be obtained by using the expectation formula

•
COP: referring to (18), COP can be expressed as: similarly, substituting ( 35) and ( 38), (44) expands as (45), and the average COP p RT co can be obtained by calculating its expectation. where • SCOP: referring to ( 23), the average SCOP can be expressed as: • Secrecy throughput: referring to (25) and the principle of the RT scheme, the average secrecy throughput is expressed according to the total probability theorem: Remark 2. From ( 41) and ( 45), it can be found that the SOP and COP of the proposed RT scheme become more complex due to the cooperation of secondary relays.Specifically, except for the network parameters involved in the DT scheme, the SOP of the proposed RT scheme deeply depends on the values of Ω SP and Ω RP , in other words, Ω RP Ω SP .Furthermore, the COP is not only related to Ω RP Ω SP , but also highly to

SR
and

RD
. It means that the advantages of the proposed RT scheme are totally decided by the channel gain of the relay link compared to the direct link, which further reflects the importance of optimal relay selection.

Asymptotic Analysis
We present asymptotic SOP and COP performance analysis in the high SNR regime ( ρ → ∞ ).It is worth noting that when ρ → ∞ , p ′ co ≃ 0, which means the secondary relay must be able to successfully decode the received message and retransmit it in the second time slot.Substituting p ′ co ≃ 0 into (41), it can be easily found that: which implies that when ρ → ∞ , there exists an upper bound for SOP.Specially, an infinite maximum tolerable interference threshold I 0 means there is no limit to the transmission power of the secondary transmitters; a secrecy outage event must happen so that secure transmission cannot be guaranteed since the SNR of both legitimate links and wiretap links is improved simultaneously.
Unlike SOP, it can be discovered by substituting p ′ co ≃ 0 into (45) that: From (49), it can be found that there exists a lower bound for the asymptotic COP in the high ρ region, and this lower bound is closely related to the ratio of channel gain between the direct link and relay link.

Simulations
In this section, we first show the numerical comparison and asymptotic analysis for the aforementioned transmission schemes, i.e., the DT and RT schemes.Then, the interaction and effect of different network parameters on security and reliability performance are present.Finally, we reveal the relationship between the maximum secrecy throughput and the optimal relay location.The channel parameter is assumed to be ε = 4.It is worth noting that we use Ω ij to reflect the distance d ij , the larger Ω ij , the better average h ij 2 , and hence the closer d ij .Similarly, ρ is adopted to comprehensively reflect the ratio of interference threshold I 0 and noise power N 0 .Figure 3 depicts the impact of the eavesdropper density λ E on SOP (p so ) and COP (p co ) for fixed values of ρ = 10 dB, Ω SP = 10 dB, Ω SD = Ω SR = 5 dB, R B = 3 bps/Hz, R S = 1 bps/Hz.It can be first seen from Figure 3 that no matter the DT or RT scheme, SOP increases while COP remains constant with λ E increases; this is consistent with Remark 1.It is reasonable because the larger λ E , the better wiretap channel quality enhances the ability to eavesdrop on confidential information, p so therefore increases as increasing λ E .However, COP, which represents the outage probability that D cannot decode the confidential information correctly, i.e., the reliability performance, is independent of the eavesdropper density λ E , and hence p co keeps unchanged as λ E increases.Further, we can observe from Figure 3 that the SOP of the DT scheme outperforms that of the RT scheme, especially in a smaller RP Ω .However, in terms of COP, the RT scheme surpasses the DT, especially in a larger RD Ω .The former is because the presence of relays strengthens the wiretap link capacity, and smaller RP Ω results in a better chan- nel quality of R-E link, and hence, a worse security performance will be induced.At the same time, the latter is because the introduction of relays brings diversity to D for successful decoding.Furthermore, an increasing RD Ω can improve the quality of the R-D channel and enhance the ability of D to decode information, resulting in better reliability performance.It can be concluded from Figure 3 that the introduction of relays is a doubleedged sword, which not only improves reliability performance but also deteriorates security performance.As the comment made in [7] identifies, in this case, even E is able to Further, we can observe from Figure 3 that the SOP of the DT scheme outperforms that of the RT scheme, especially in a smaller Ω RP .However, in terms of COP, the RT scheme surpasses the DT, especially in a larger Ω RD .The former is because the presence of relays strengthens the wiretap link capacity, and smaller Ω RP results in a better channel quality of R-E link, and hence, a worse security performance will be induced.At the same time, the latter is because the introduction of relays brings diversity to D for successful decoding.
Furthermore, an increasing Ω RD can improve the quality of the R-D channel and enhance the ability of D to decode information, resulting in better reliability performance.It can be concluded from Figure 3 that the introduction of relays is a double-edged sword, which not only improves reliability performance but also deteriorates security performance.As the comment made in [7] identifies, in this case, even E is able to extract the benefits of increased transmit SNR along with D.
Figure 4 further depicts the impact of ρ on SOP and COP for fixed values of λ E = 0.3, Ω SP = 10 dB, Ω SD = 5 dB, R B = 3 bps/Hz, R S = 1 bps/Hz.It can be observed from Figure 4 that the asymptotic results (the dotted lines) are in good agreement with the exact results in a high SNR regime.Moreover, Figure 4a reflects the same conclusion as in Figure 3a because SOP is the increasing function of both λ E and ρ. Figure 4b illustrates the fact that the better the channel gain of the secondary relay (Ω SR and Ω RD ), the lower the COP, i.e., the better the reliability performance can be achieved by the proposed RT scheme, especially when the channel gain is better than that of the direct link.It is also consistent with the insight given in Remark 2. We then show the effect of different network parameters on the security and reliability performance.Figure 5  From Figure 5, we can see that sco p decreases with the increase of ρ .It is because the larger the ρ , the more relaxed the interference constraint on the secondary transmitters, the higher the secondary transmit power can be achieved, and hence, the secure and reliable transmission performance is improved.Moreover, it can be observed from Figure 5 that the SCOP increases with the increase of B S R R − , which is because a higher power will be required to compensate for the greater cost of secure transmission. ,which is owing to the reason that a larger value of SP Ω ( RP Ω ) im- poses a stronger power constraint from the PU receiver to the secondary transmitters (both S and R), causing a lower secondary transmit power ( S P and R P ), thereby degrading the SCOP performance.Moreover, we can find that the SCOP curves exhibit a secrecy floor phenomenon, irrespective of ρ , as reported in [7].We then show the effect of different network parameters on the security and reliability performance.Figure 5 plots the SCOP, i.e., p sco versus ρ, for various values of R B and R S , when λ E = 0.3, Ω SP = Ω RP = 10 dB, Ω SR = Ω RD = 5 dB, Ω SD = 2 dB.From Figure 5, we can see that p sco decreases with the increase of ρ.It is because the larger the ρ, the more relaxed the interference constraint on the secondary transmitters, the higher the secondary transmit power can be achieved, and hence, the secure and reliable transmission performance is improved.Moreover, it can be observed from Figure 5 that the SCOP increases with the increase of R B − R S , which is because a higher power will be required to compensate for the greater cost of secure transmission.
Figure 6 illustrates the impact of the primary receiver (assuming Ω SP = Ω RP ) on SCOP for various values of ρ, when λ E = 0.3, Ω SR = Ω RD = 10 dB, Ω SD = 5 dB, R B = 3 bps/Hz, R S = 1 bps/Hz.It is seen from Figure 6 that p sco increases with the increase of Ω SP (Ω RP ), which is owing to the reason that a larger value of Ω SP (Ω RP ) imposes a stronger power constraint from the PU receiver to the secondary transmitters (both S and R), causing a lower secondary transmit power (P S and P R ), thereby degrading the SCOP performance.Moreover, we can find that the SCOP curves exhibit a secrecy floor phenomenon, irrespective of ρ, as reported in [7].
crease of SP Ω ( RP Ω ), which is owing to the reason that a larger value of SP Ω ( RP Ω ) im- poses a stronger power constraint from the PU receiver to the secondary transmitters (both S and R), causing a lower secondary transmit power ( S P and R P ), thereby degrading the SCOP performance.Moreover, we can find that the SCOP curves exhibit a secrecy floor phenomenon, irrespective of ρ , as reported in [7].In Figure 7, we demonstrate the effect of the average channel gain of the direct link, i.e., SD Ω , on the SCOP performance for 0.3 , a better SCOP performance can be achieved.This is because the diversity gain depends on the strength of channels pertaining to relays.Therefore, it can be concluded that a secure and reliable transmission will be guaranteed as the channel quality of either/both S-D and R-D (S-R) links increases.In Figure 7, we demonstrate the effect of the average channel gain of the direct link, i.e., Ω SD , on the SCOP performance for λ E = 0.3, ρ = 10 dB, Ω SP = Ω RP = 10 dB, R B = 3 bps/Hz, R S = 1 bps/Hz.We can observe from Figure 7 that SCOP improves with the increase of Ω SD , which is due to the truth that a larger Ω SD brings a better channel capacity of the legitimate direct S-D link.Furthermore, it can be seen that SCOP decreases as Ω RD increases, especially when both Ω RD and Ω SR improve, such as the curve at Ω SR = Ω RD = 30 dB, a better SCOP performance can be achieved.This is because the diversity gain depends on the strength of channels pertaining to relays.Therefore, it can be concluded that a secure and reliable transmission will be guaranteed as the channel quality of either/both S-D and R-D (S-R) links increases.
Figure 8 presents the plot of the secrecy throughput, i.e., η, as a function of q R for different values of λ E when ρ = 10 dB, Ω SP = Ω RP = 10 dB, Ω SD = 5 dB, R B = 3 bps/Hz, R S = 1 bps/Hz.In this case, we assume a normalized two-dimensional network topology for numerical discussion, and the coordinates of S, R, D, and PU-Rx are (0, 0), (q R , 0), (1, 0) and (0, 1), respectively.It can be first seen from Figure 8 that both schemes achieve a higher secrecy throughput at a smaller λ E , which is in coherence with the conclusion drawn in Figure 3.Then, we can clearly observe that the closer the relay position is to the midpoint of the distance between S and D, i.e., q R = 0.5, in the RT scheme, the higher secrecy throughput can be obtained.That is, we can graphically evaluate the optimal relay location for maximum secrecy throughput at the midpoint of the communication distance, which provides theoretical guidance and is aligned with the findings reported in [2,4,22].However, the secrecy throughput of the DT scheme remains constant because it is independent of q R .

Figure 2 .
Figure 2. The proposed system model.

Figure 2 .
Figure 2. The proposed system model.

21 Figure 3 .
Figure 3 depicts the impact of the eavesdropper density E λ on SOP ( so p ) and COP

Figure 3 .
Figure 3. Impacts of eavesdropper density E λ on SOP and COP.

Figure 3 .
Figure 3. Impacts of eavesdropper density λ E on SOP and COP.
plots the SCOP, i.e., sco p versus ρ , for various values of B R

Figure 6 .
illustrates the impact of the primary receiver (assuming SP RP Ω = Ω ) on SCOP for various values of ρ , when It is seen from Figure 6 that sco p increases with the in- crease of SP Ω ( RP Ω )

Figure 4 .
Figure 4. Impacts of ρ on SOP and COP.

.
We can observe from Figure7that SCOP improves with the increase of SD Ω , which is due to the truth that a larger SD Ω brings a better channel capacity of the legitimate direct S-D link.Furthermore, it can be seen that SCOP decreases as RD Ω increases, especially when both RD Ω and SR Ω improve, such as the curve at 30dB Ω = Ω = SR RD

Figure 7 .
Figure 7. Impact of SD Ω on the SCOP.

Figure 6 .
Figure 6.Impact of PU receiver on SCOP.

Table 1 .
Comparison of proposed work with related research.

Table 2 .
The proposed relaying transmission scheme.