Next Article in Journal
CAM3D: Cross-Domain 3D Adversarial Attacks from a Single-View Image via Mamba-Enhanced Reconstruction
Previous Article in Journal
Comprehensive RTL-to-GDSII Workflow for Custom Embedded FPGA Architectures Using Open-Source Tools
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks

1
School of Computer Engineering and Applied Mathematics, Hankyong National University, Anseong 17579, Republic of Korea
2
Department of Software and Communications Engineering, Hongik University, Sejong 30016, Republic of Korea
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(19), 3867; https://doi.org/10.3390/electronics14193867
Submission received: 4 September 2025 / Revised: 23 September 2025 / Accepted: 27 September 2025 / Published: 29 September 2025
(This article belongs to the Section Networks)

Abstract

This paper investigates physical layer security (PHY-security) for multi-hop transmission in underlay cognitive radio networks under various eavesdropping attacks. To enhance secrecy performance, we propose two opportunistic scheduling schemes. The first scheme, called the minimal node selection (MNS) scheme, selects the node in each cluster that minimizes the eavesdropper’s channel capacity. The second scheme, named the optimal node selection (ONS) scheme, chooses the node that maximizes secrecy capacity by using both the main and eavesdropper channel information. To reveal the relationship between network parameters and secrecy performance, we derive closed-form expressions for the secrecy outage probability (SOP) under different scheduling schemes and eavesdropping scenarios. Numerical results show that the ONS scheme provides the most robust secrecy performance among the considered schemes. Furthermore, we analyze the impact of key network parameters on secrecy performance. In detail, although the proposed ONS scheme requires more channel information than the MNS scheme, under a 20 dB interference threshold, the secrecy performance of the ONS scheme is 15% more robust than that of the MNS scheme.

1. Introductions

As the Internet of Things (IoT) continues to expand, the number of connected devices has grown exponentially [1,2]. However, the radio frequency spectrum available for interconnecting these devices is limited and almost allocated. Therefore, spectrum re-utilization has recently emerged as one of the key issues for future mobile networks. To address this challenge, several approaches have been proposed. Cognitive radio is one of the available efficient solutions to enhance network spectrum re-utilization [3,4,5].
A cognitive radio network consists of primary users, who are allocated licensed spectrum resources, and secondary users, who opportunistically utilize the spectrum without a license in the same location. Since both types of users can access the licensed spectrum, system spectral efficiency can be improved [6]. More specifically, cognitive radio can be classified into underlay and overlay approaches. In the overlay approach, secondary users may access the spectrum only when the primary users are not utilizing their allocated bands. In contrast, in the underlay approach, primary users can allow simultaneous sharing of the licensed spectrum with secondary users, provided that they do not cause harmful interference. From the perspective of primary users, the secondary users’ transmission is treated as interference and must be strictly limited under the primary user transmission guarantee [7,8]. Due to transmit power limitation, secondary users in underlay cognitive radio networks often require multi-hop transmission to reliably deliver messages. In such scenarios, when a secondary user needs to send a message from a transmitter to a receiver, multiple relay nodes are typically required to support the legitimate user’s transmission. However, as more relay nodes participate in this transmission, malicious users can more easily intercept confidential messages due to the broadcast nature of the wireless medium [9]. As a result, security in underlay cognitive radio networks is even more critical than in other types of networks.
Encryption is a widely used solution for ensuring confidentiality by concealing the content of transmitted messages. Nevertheless, encryption and decryption processes bring additional overhead, leading to high latency, which is particularly critical in mobile networks. To overcome these limitations, physical layer security (PHY-security) [10], which leverages the inherent characteristics of wireless channels, has recently gained attention as a promising alternative security solution in wireless networks [9,11]. In order to enhance PHY-security, we can employ opportunistic scheduling schemes that use channel information to select users (or transmit antennas) based on the system’s purpose [12,13,14]. For example, when a system aims to improve secrecy performance, it can select users (or transmit antennas) to minimize the eavesdropper’s channel condition or maximize the secrecy capacity. As technology advances, eavesdroppers also try to improve their eavesdropping performance as well as the legitimate user performance [15,16,17]. More specifically, multiple eavesdroppers may collaborate to conduct eavesdropping, thereby enhancing their ability to intercept confidential transmissions. Consequently, various collaborative eavesdropping strategies have been investigated in the literature. A colluding attack occurs when multiple eavesdroppers cooperate to intercept the legitimate users’ transmissions. By sharing the information they overhear, they are able to collectively exploit all intercepted data. In contrast, a non-colluding attack occurs when several eavesdroppers independently attempt to intercept the legitimate users’ transmissions, and due to their independent operation, only the most effective eavesdropper is selected.
The authors in [18] proposed an anti-poisoning attack decentralized privacy-enhanced federated learning (APDPFL) scheme to protect flight operation data sharing. In [19], the authors proposed a method to solve the accurate recognition of named entities against spoken instructions for automatic speech recognition techniques in air traffic control. In these works [18,19], the authors address the advanced techniques for future mobile networks. However, they did not consider PHY-security. Different from the aforementioned works, in [20], although the considered network was not a cognitive radio network, the authors proposed a sub-optimal antenna selection scheme to enhance secrecy performance in multi-user single-input multi-output (MU-MISO) non-orthogonal multiple access (NOMA) networks under various eavesdropping scenarios. In [21], the authors proposed a novel network architecture to enhance the secrecy performance in vehicular networks with cooperative jamming helpers. The authors in [22] exploited secrecy performance in simultaneous wireless information and power transfer (SWIPT)-based cooperative vehicular relaying networks. The authors in [23] investigated the secrecy performance on intelligent reflecting surface (IRS) networks. This work had a research limitation in that it did not propose how to enhance the secrecy performance on the considered networks. These works [20,21,22,23] did not consider the secrecy performance in underlay cognitive radio network environments.
The authors in [24] exploited the impact of imperfect channel information on the secrecy performance in underlay cognitive radio multi-hop transmission. This work did not consider the impact of various eavesdropping attacks on the secrecy performance. The authors in [25] addressed the secure transmission in an underlay cognitive radio–NOMA system with a cooperative relay and an energy harvesting node. The authors in [26] considered secure transmission on cognitive radio networks with a full-duplex receiver. In [27], the authors studied reconfigurable intelligent surface (RIS)-assisted secure communication in cognitive radio systems. These works [24,25,26,27] considered secure transmission in underlay cognitive radio. However, they did not consider various eavesdropping attack scenarios.
From the aforementioned works [20,21,22,23,24,25,26,27], we conclude that enhancing secrecy performance in underlay cognitive radio networks is essential for future mobile networks. To this end, we raise two key research questions: (1) How can confidential messages be protected against various eavesdropping attacks? (2) How do different opportunistic scheduling schemes and/or eavesdropping strategies affect secrecy performance?
In this paper, we investigate the impact of various eavesdropping attacks on secrecy performance in multi-hop transmission architectures. To protect confidential messages in underlay cognitive radio networks, we propose two opportunistic scheduling schemes designed to enhance secrecy performance. In detail, the first scheduling scheme can select the relay at each cluster to minimize the eavesdropper channel condition. The second proposed scheme requires both the main channel and eavesdropper channel information to maximize the secrecy channel capacity. The main contributions of this paper are summarized as follows:
  • In this work, we investigate the impact of various eavesdropping attacks on multi-hop transmission in underlay cognitive radio networks. Specifically, we consider a scenario where multiple eavesdroppers are present. These eavesdroppers may either collaborate by sharing intercepted information (colluding attack) or act independently (non-colluding attack). To the best of our knowledge, this network architecture has not been reported in the existing literature.
  • We propose two types of opportunistic scheduling schemes to enhance secrecy performance. The first scheme, called the minimal node selection (MNS) scheme, selects a node in each cluster to minimize the eavesdropper’s channel condition. This node selection scheme only requires the eavesdropper’s channel information, which leads to lower computational complexity. The second scheme, called the optimal node selection (ONS) scheme, selects a node in each cluster to maximize secrecy performance. Since the ONS scheme requires both the main channel and eavesdropper channel information, it achieves more robust secrecy performance compared to the MNS scheme.
  • To capture the relationship between network parameters and secrecy performance, we derive closed-form expressions for the secrecy outage probability (SOP) under the proposed scheduling schemes and various eavesdropping attacks. In addition, we analyze the complexity order to provide further insights into the amount of channel information required for node selection.
  • To evaluate the impact of the proposed node selection schemes and various eavesdropping attacks on secrecy performance, we compare the proposed methods with a benchmark scheme that does not utilize channel state information for node selection within each cluster. Furthermore, we investigate the effects of key network parameters, including the interference threshold, target secrecy data rate, and the number of eavesdroppers, nodes per cluster, and hops, on secrecy performance. The results demonstrate that the proposed opportunistic scheduling schemes significantly enhance secrecy performance compared to the benchmark scheme, while colluding attacks are shown to be more detrimental to secrecy performance.
The rest of the paper is organized as follows: Section 2 explains the considered multi-hop transmission scenario and the proposed opportunistic scheduling scheme. Section 3 analyzes the closed-form expression for SOP with the proposed opportunistic scheduling scheme and various eavesdropping attacks. Section 4 presents the performance evaluation based on the obtained closed-form expression and simulation results. Finally, we conclude this paper in Section 5.

2. System Model

Let us consider a multi-hop secure transmission in underlay cognitive radio networks, as depicted in Figure 1. According to the principle of underlay cognitive radio, the transmit power level of the secondary users is limited by the interference threshold. Thus, direct transmission between the source node and the destination node is difficult. In order to assist the transmission between the source node and the destination node, an intermediate node is located in the ( K 1 )th cluster, with K > 1. According to the principle of the wireless medium, eavesdroppers can overhear the legitimate users’ transmissions. Furthermore, we assume that the legitimate users are equipped with a single antenna and operate in half-duplex mode. The main notations of this paper are summarized in Table 1.
In this paper, we consider the channel between X and Y , where X ∈ { S i , R k , i } and Y ∈ { R k , i , D , E l , P }, with X  ≠  Y . h ^ XY and G XY represent the small-scale fading and large-scale path-loss effect, respectively. Since we suppose that the link can be described as independent and identical distributed (i.i.d.) Rayleigh block flat fading, the corresponding gain ( | h XY | 2 ) follows an Exponential distribution. The large-scale path-loss effect can be defined as G XY = L ( d 0 / d XY ) ϵ , where d XY represents the Euclidean distance between X and Y , d 0 represents the reference distance, L represents the estimated power attenuation at d 0 (dB unit), and ϵ represents the path-loss exponent. In this paper, we consider both the small-scale fading and large-scale path-loss effect, i.e., h XY G XY h ^ XY . The cumulative distribution function (CDF) and probability density function (PDF) of | h XY | 2 can be modeled as
F | h XY | 2 ( h ) = 1 e 1 λ XY h ,
f | h XY | 2 ( h ) = 1 λ XY e 1 λ XY h ,
where λ XY indicates the average of | h XY | 2 .

2.1. Data Transmission Phase

According to the principle of underlay cognitive radio, the transmit power level of each secondary user is limited under the interference threshold [16,24]. Thus, the transmit power at R i ( P k , i ) is mathematically expressed as
P k , i = I th | h k , i , P | 2 .
The received signal at R k + 1 , j can be expressed as
y k , i , j = P k , i h k , i , j x k , i + n j ,
where h k , i , j stands for channel coefficient of link R k , i R k + 1 , j and n j is the channel noise, which follows the additive white Gaussian noise (AWGN) distribution with zero mean and σ j 2 . Thus, the instantaneous signal-to-noise ratio (SNR) of the main channel for k-hop transmission can be expressed as
γ k , i , j = P k , i | h k , i , j | 2 σ j 2 = I th | h k , i , j | 2 | h k , i , P | 2 σ j 2 .
As can be observed in Figure 1, when the legitimate users transmit the confidential information, the l-th eavesdropper tries to intercept the information. In this paper, we exploit the impact of the eavesdropping attacks on the secrecy performance. Thus, the first scenario is called a colluding attack, where the eavesdroppers share the overheard information to enhance the wiretapping ability. The other scenario is a non-colluding attack, where the eavesdroppers work independently.
According to the principle of the wireless medium, the overheard k-th hop signal at the l-th eavesdropper can be expressed as
y k , i , l = P k , i h k , i , l x k , i + n l ,
where h k , i , l indicates the channel coefficient at the l-th eavesdropper on the k-th hop signal and n l is the channel noise, which follows the AWGN distribution with zero mean and σ l 2 variance. In this paper, we can further assume that σ l 2 = σ E 2 .

2.1.1. Scenario 1: Colluding Attack

Since each eavesdropper can share the intercepted information, they can combine the intercepted information. Thus, the wiretapped SNR under the colluding attack can be expressed as
γ k , i , E co = P k , i l = 1 L | h k , i , l | 2 σ E 2 = I th l = 1 L | h k , i , l | 2 | h k , i , P | 2 σ E 2 ,
where the superscript “ co ” stands for the colluding attack.

2.1.2. Scenario 2: Non-Colluding Attack

Different from the colluding attack, the non-colluding attack does not share the intercepted information. Thus, we can further assume that the maximal intercepted information is the system intercepted information, in which the SNR can be mathematically expressed as
γ k , i , E nc = P k , i max 1 l L { | h k , i , l | 2 } σ E 2 = I th max 1 l L { | h k , i , l | 2 } | h k , i , P | 2 σ E 2 ,
where the superscript “ nc ” indicates the non-colluding attack.
In this study, the secrecy capacity is defined as the difference between the main channel capacity and the eavesdropper channel capacity. Thus, the end-to-end secrecy capacity can be mathematically expressed as [28]
C sec att = 1 K min k K log 2 1 + γ k , i , j 1 + γ k , i , E att ,
where att ∈ { co , nc }.

2.2. The Proposed Node Selection Schemes

In this subsection, we introduce several node selection schemes to enhance the end-to-end secrecy performance to protect the confidential message against various eavesdropper attacks.

2.2.1. The Minimal Node Selection (MNS) Scheme

This node selection scheme can select a node in each cluster to minimize the eavesdropper channel capacity, which can be mathematically expressed as
R k , i * = min i M { log 2 ( 1 + γ k , i , E att ) } = min i M { | h k , i , j * | 2 } .
Then, the instantaneous SNR of the main channel and eavesdropper channel can be, respectively, expressed as
γ k , i , j MNS = I th | h k , i * , j * | 2 | h k , i * , P | 2 σ j 2 ,
γ k , i , E MNS , co = I th l = 1 L min i M { | h k , i , l | 2 } | h k , i * , P | 2 σ E 2 ,
γ k , i , E MNS , nc = I th max 1 l L { min i M { | h k , i , l | 2 } } | h k , i , P | 2 σ E 2 .

2.2.2. The Optimal Node Selection (ONS) Scheme

The last node selection, named the optimal node selection (ONS) scheme, can select a node to maximize the secrecy capacity. The ONS scheme can be mathematically expressed as
R k , i * = max 1 i M log 2 1 + γ k , i , j * 1 + γ k , i , E att .
Similar to the other node selection schemes, the SNR of the main channel and eavesdropper channel under the ONS scheme can be, respectively, expressed as
γ k , i * , j * ONS = I th | h k , i * , j * | 2 | h k , i * , P | 2 σ j 2 ,
γ k , i * , E ONS , co = I th l = 1 L { | h k , i * , l | 2 } | h k , i * , P | 2 σ E 2 ,
γ k , i * , E ONS , nc = I th max 1 l L { | h k , i * , l | 2 } | h k , i * , P | 2 σ E 2 .

3. Secrecy Outage Performance Analysis

In this context, the secrecy outage probability (SOP) is used for secrecy performance in the viewpoint of information theory. It is defined as the probability that the difference between the main channel and eavesdropper channel capacities is smaller than the predefined threshold, called the secrecy target data rate ( R th ) (bps/Hz), and can be mathematically expressed as [29,30]
P out sch , att = Pr 1 K min k K log 2 1 + γ k , i , j sch 1 + γ k , i , E sch , att < R th ,
where sch ∈ { MNS , ONS }. For the sake of simplicity, the self-defined constants are presented in Table 2.

3.1. MNS Scheme and Colluding Attack

The following lemmas will help to calculate the closed-form expression for SOP with the MNS scheme and a colluding attack.
Lemma 1. 
Pr ( i * = i ) can be formulated as
Pr ( i * = i ) = 1 Γ ( L ) m = 0 M 0 b m M 1 Γ ( L + m ) M L + m ,
where the following notation is adopted
b m M 1 = 1 , if m = 0 M 1 , if m = 1 1 m j = 1 J 0 j M m Γ ( j + 1 ) b m j M 1 , if 1 < m < M 0 1 Γ ( L ) M 1 , if m = M 0
with J 0 = min { m , L 1 } and M 0 = ( M 1 ) ( L 1 ) .
Proof. 
See [20]. □
Lemma 2. 
The CDF and PDF of Y k , i * , E 1 can be expressed as
F Y k , i * , E 1 ( y ) = 1 m = 0 M ( L 1 ) b m M ( λ k , i , l ) m y m e M λ k , i , l y ,
f Y k , i * , E 1 ( y ) = M λ k , i , l Γ ( L ) m = 0 M 0 b m M 1 ( λ k , i , l ) L 1 + m y L 1 + m e M λ k , i , l y ,
where the following notation is adopted
b m M = 1 , if m = 0 M , if m = 1 1 m j = 1 J 0 j ( M + 1 ) m Γ ( j + 1 ) b m j M , if 1 < m < M 0 1 Γ ( L ) M , if m = M 0
with b m M 1 , J 0 , and M 0 defined as in (19).
Proof. 
See [20]. □
Theorem 1. 
The closed-form expression for SOP with the MNS scheme and a colluding attack can be derived as
P out MNS , co = 1 k = 1 K [ 1 M Γ ( L ) m = 0 M 0 b m M 1 Γ ( L + m ) M L + m × M Γ ( L ) m = 0 M 0 b m M 1 Γ ( L + m ) M L + m M Γ ( L ) m = 0 M 0 b m M 1 Γ ( L + m ) γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j λ k , i , j γ th λ k , i , l + M λ k , i , j L + m ] .
Proof. 
From (18), P out MNS , co can be further expressed as
P out MNS , co = 1 k = 1 K 1 Pr 1 + γ k , i * , j * MNS 1 + γ k , i * , E MNS , co < γ th Ω A .
As can be seen, since it includes the same components, the events of the probability in (23) are not mutually exclusive. By conditioning Y k , i * , E 1 = y and relying on the total probability [31], Ω A in (23) can be further written as
Ω A = Pr X k , i * , j * < γ th 1 γ ¯ Z k , i * , P + γ th Y k , i * , E = i = 1 M Pr [ i * = i ] 0 Pr X k , i * , j * < γ th 1 γ ¯ Z k , i * , P + γ th y Ω A 1 f Y k , i * , E 1 ( y ) d y .
In order to further express (24), Ω A 1 can be re-expressed as
Ω A 1 = 0 1 e 1 λ k , i , j γ th 1 γ ¯ z + γ th y 1 λ k , i , P e 1 λ k , i , P z d z = 0 1 λ k , i , P e 1 λ k , i , P z d z Ω A 2 0 1 λ k , i , P e γ th λ k , i , j y γ th 1 γ ¯ λ k , i , j + 1 λ k , i , P z d z Ω A 3 .
When we rely on the facts from [32] (eq. 3.310), Ω A 2 and Ω A 3 can be expressed as
Ω A 2 = 0 1 λ k , i , P e 1 λ k , i , P z d z = 1 ,
Ω A 3 = 0 1 λ k , i , P e γ th λ k , i , j y γ th 1 γ ¯ λ k , i , j + 1 λ k , i , P z d z = γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j e γ th λ k , i , j y .
By plugging (26) and (27) into (25), Ω A 1 can be re-written as
Ω A 1 = 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j e γ th λ k , i , j y .
Again, by substituting (19) and (28) into (24), Ω A 1 can be expressed as
Ω A 1 = m = 1 M 1 Γ ( L ) m = 0 M 0 b m M 1 Γ ( L + m ) M L + m 0 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , j + γ ¯ λ k , i , j e γ th λ k , i , j y M λ k , i , l Γ ( L ) m = 0 M 0 b m M 1 λ k , i , l L 1 + m y L 1 + m e M λ k , i , l y d y = m = 1 M 1 Γ ( L ) m = 0 M 0 b m M 1 Γ ( L + m ) M L + m [ 0 M λ k , i , l Γ ( L ) m = 0 M 0 b m M 1 λ k , i , l L 1 + m y L 1 + m e M λ k , i , l y d y Ω A 4 0 M γ ¯ λ k , i , j λ k , i , l Γ ( L ) ( ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j ) m = 0 M 0 b m M 1 λ k , i , l L 1 + m y L 1 + m e γ th λ k , i , j + M λ k , i , l d y ] Ω A 5 .
By using the fact from [32] (eq. 3.351.3), Ω A 4 and Ω A 5 in (29) can be, respectively, expressed as
Ω A 4 = m = 0 M 0 b m M 1 Γ ( L + m ) Γ ( L ) M L + m 1 ,
Ω A 5 = m = 0 M 0 b m M 1 M Γ ( L + m ) Γ ( L ) γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j λ k , i , j γ th λ k , i , l + M λ k , i , j L + m .
By plugging (30) and (31) into (29), Ω A can be expressed as
Ω A = M Γ ( L ) m = 0 M 0 b m M 1 Γ ( L + m ) M L + m × M Γ ( L ) m = 0 M 0 b m M 1 Γ ( L + m ) M L + m M Γ ( L ) m = 0 M 0 b m M 1 Γ ( L + m ) γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j λ k , i , j γ th λ k , i , l + M λ k , i , j L + m .
By plugging (32) into (23), the closed-form expression for SOP with the MNS scheme and a colluding attack can be obtained as (22). The proof of Theorem 1 is concluded. □

3.2. MNS Scheme and Non-Colluding Attack

The following lemmas will help to calculate the closed-form expression for SOP with the MNS scheme and a non-colluding attack.
Lemma 3. 
Pr ( i * = i ) is derived as
Pr ( i * = i ) = A 1 L l 1 + l 2 + 1 ,
where the following notation is adopted
A 1 = m = 0 M 1 l 1 = 0 m L l 2 = 0 L 1 M 1 m m L l 1 L 1 l 2 ( 1 ) m + l 1 + l 2 .
Proof. 
See [20]. □
Lemma 4. 
The CDF and PDF of Y k , i * , E 2 can be derived as
F Y k , i * , E 2 ( y ) = 1 A 2 e l λ k , i , l y ,
f Y k , i * , E 2 ( y ) = M L λ k , i , l A 1 e l 1 + l 2 + 1 λ k , i , l y ,
where A 1 is defined in (33) and the following notation is adopted as
A 2 = m = 0 M l = 0 m L M m m L l ( 1 ) m + l .
Proof. 
See [20]. □
Theorem 2. 
The closed-form expression for SOP with the MNS scheme and a non-colluding attack can be derived as
P out MNS , nc = 1 k = 1 K [ 1 A 1 M L l 1 + l 2 + 1 A 1 M L l 1 + l 2 + 1 A 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j M L λ k , i , j γ th λ k , i , l + ( l 1 + l 2 + 1 ) λ k , i , j
Proof. 
From (18), P out MNS , nc can be further expressed as
P out MNS , nc = 1 k = 1 K 1 Pr 1 + γ k , i * , j * MNS 1 + γ k , i * , E MNS , nc < γ th Ω B .
Ω B in (37) can be further expressed as
Ω B = Pr X k , i * , j * < γ th 1 γ ¯ Z k , i * , P + γ th Y k , i * , E 2
As can be observed, the events of the provability are not mutually exclusive. By conditioning Y k , i * , E 2 = y and relying on the total probability [31], Ω B can be re-written as
Ω B = i = 1 M Pr [ i * = i ] 0 Pr X k , i , j * < γ th 1 γ ¯ Z k , i , P + γ th y Ω B 1 f Y k , i * , E 2 ( y ) d y .
Ω B 1 in (39) can be re-written as
Ω B 1 = 0 F k , i , j * γ th 1 γ ¯ z + γ th y f Z k , i , P ( z ) d z = 0 1 e 1 λ k , i , j γ th 1 γ ¯ z + γ th y 1 λ k , i , P e 1 λ k , i , P z d z
When we utilize the fact in [32] (eq. 3.310), Ω B 1 can be calculated as
Ω B 1 = 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j e γ th λ k , i , j y .
Plugging (35) and (41) into (39), Ω B can be expressed as
Ω B = i = 1 M A 1 L l 1 + l 2 + 1 0 A 3 M L λ k , i , l e l 1 + l 2 + 1 λ k , i , l y d y Ω B 2 0 A 3 M L λ k , i , l γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j e γ th λ k , i , j + γ th λ k , i , j y d y Ω B 3
Again, relying on the fact in [32] (eq. 3.310), Ω B 2 and Ω B 3 in (42) can be, respectively, written as
Ω B 2 = A 3 M L l 1 + l 2 + 1 ,
Ω B 3 = A 3 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j M L λ k , i , j γ th λ k , i , l + ( l 1 + l 2 + 1 ) λ k , i , j .
By substituting (43) and (44) into (42) and after some mathematical steps, the closed-form expression for SOP with the MNS scheme and a non-colluding attack is obtained as (36). The proof of Theorem 2 is concluded. □

3.3. ONS Scheme and Colluding Attack

The following lemmas will help to analyze the closed-form expression for SOP with various eavesdropping attacks.
Lemma 5. 
The CDF and PDF of Y k , i , E 1 can be calculated as
F Y k , i , E 1 ( y ) = γ ( L , y / λ k , i , l ) Γ ( L ) = 1 l = 0 L 1 1 l ! ( λ k , i , l ) l t l e 1 λ k , i , l t ,
f Y k , i , E 1 ( y ) = 1 λ k , i , l Γ ( L ) y λ k , i , l L 1 e y λ k , i , l ,
where γ ( α , β ) denotes the lower incomplete Gamma function and Γ ( · ) stands for the Gamma distribution [32].
Proof. 
See [20]. □
Theorem 3. 
The closed-form expression for SOP with the ONS scheme and a colluding attack can be derived as
P out ONS , co = 1 k = 1 K 1 m = 0 M M m ( 1 ) m γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j m λ k , i , j γ th λ k , i , l + λ k , i , j m L .
Proof. 
From (18), P out ONS , co can be re-written as
P out ONS , co = 1 k = 1 K 1 Pr 1 + γ k , i * , j * 1 + γ k , i * , E 1 < γ th Φ A .
Relying on the principle of max probability [31], Φ A in (48) can be re-formulated as
Φ A = Pr max m M 1 + γ ¯ X k , i , j * Z k , i , P 1 + γ ¯ Y k , i , E 1 Z k , i , P < γ th = m = 1 M Pr X k , i , j * < γ th 1 γ ¯ Z k , i , P + γ th Y k , i , E 1 Φ A 1 .
Φ A 1 in (49) can be re-expressed as
Φ A 1 = 0 0 F X k , i , j * γ th 1 γ ¯ z + γ th y f Z k , i , P ( z ) d z Φ A 2 f Y k , i , E 1 ( y ) d y .
Since X k , i , j * and Z k , i , P follow an exponential distribution [33], Φ A 2 in (50) can be written as
Φ A 2 = 0 1 e 1 λ k , i , j γ th 1 γ ¯ z + γ th y 1 λ k , i , P e 1 λ k , i , P z d z = 1 λ k , i , P 0 e 1 λ k , i , P z d z Φ A 3 1 λ k , i , P e γ th λ k , i , j y 0 e γ th 1 γ ¯ λ k , i , j + 1 λ k , i , P z d z Φ A 4 .
Utilizing the fact from [32] (eq. 3.310), Φ A 3 and Φ A 4 can be calculated as
Φ A 3 = 1 λ k , i , P ,
Φ A 4 = γ ¯ λ k , i , j λ k , i , P ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j .
By plugging (52) and (53) into (51), Φ A 2 can be expressed as
Φ A 2 = 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j e γ th λ k , i , j y .
Again, by plugging (46) and (54) into (50), Φ A 1 can be re-expressed as
Φ A 1 = 0 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j e γ th λ k , i , j y 1 λ k , i , l L 1 Γ ( L ) y L 1 e 1 λ k , i , l y d y = 1 λ k , i , l L 1 Γ ( L ) 0 y L 1 e 1 λ k , i , l y d y Φ A 5 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j 1 λ k , i , l L 1 Γ ( L ) 0 y L 1 e γ th λ k , i , j + 1 λ k , i , l y d y Φ A 6 .
When we rely on the fact from [32] (eq. 3.351.3), Φ A 5 and Φ A 6 in (55) can be expressed as
Φ A 5 = Γ ( L ) ( λ k , i , l ) L
Φ A 6 = Γ ( L ) λ k , i , j λ k , i , l γ th λ k , i , l + λ k , i , j L
By plugging (56) and (57) into (55), Φ A 1 can be expressed as
Φ A 1 = 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j λ k , i , j γ th λ k , i , l + λ k , i , j L
Again, by substituting (58) into (49) and using the binomial theorem [34], Φ A in (49) can be expressed as
Φ A = 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j λ k , i , j γ th λ k , i , l + λ k , i , j L M = m = 0 M M m ( 1 ) m γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j m λ k , i , j γ th λ k , i , l + λ k , i , j m L .
By plugging (59) into (48) and some simple mathematical steps, the closed-form expression for SOP with the ONS scheme and a colluding attack can be obtained as (47). The proof of Theorem 3 is concluded. □

3.4. ONS Scheme and Non-Colluding Attack

Lemma 6. 
The CDF and PDF of Y k , i , E 2 can be expressed as
F Y k , i , E 2 ( y ) = l = 0 L L l ( 1 ) l e 1 λ k , i , l y ,
f Y k , i , E 2 ( y ) = L λ k , i , l l = 0 L 1 L 1 l ( 1 ) l e ( l + 1 ) λ k , i , l y .
Proof. 
See [20]. □
Theorem 4. 
The closed-form expression for SOP under the ONS scheme and a non-colluding attack can be derived as
P out ONS , nc = 1 k = 1 K [ 1 ( l = 0 L 1 L 1 l ( 1 ) l l + 1 l = 0 L 1 L 1 l ( 1 ) l γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j λ k , i , j γ th λ k , i , l + ( l + 1 ) λ k , i , j ) M ] .
Proof. 
From (18), P out ONS , nc can be further expressed as
P out ONS , nc = 1 k = 1 K 1 Pr max m M 1 + γ ¯ X k , i , j * Z k , i , P 1 + γ ¯ Y k , i , E 2 Z k , i , P < γ th Φ B .
Φ B in (63) can be re-written as
Φ B = m = 1 M Pr X k , i , j * < γ th 1 γ ¯ Z k , i , P + γ th Y k , i , E 2 Φ B 1 .
In order to further express Φ B , Φ B 1 in (64) can be re-expressed as
Φ B 1 = 0 0 Pr X k , i , j * < γ th 1 γ ¯ z + γ th y f Z k , i , P ( z ) d z Φ B 2 f Y k , i , E 2 ( y ) d y .
When we rely on the fact in ([32] (eq. 3.310), Φ B 2 can be further expressed as
Φ B 2 = 0 1 λ k , i , P e 1 λ k , i , P z d z 0 e 1 λ k , i , j γ th y + γ th 1 γ ¯ z + γ th λ k , i , P z d z = 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j e γ th λ k , i , j y .
By plugging (66) into (65), Φ B 1 can be expressed as
Φ B 1 = 0 1 γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j e γ th λ k , i , j y 1 λ k , i , l l = 0 L 1 L 1 l ( 1 ) l e ( l + 1 ) λ k , i , l y d y = 1 λ k , i , l l = 0 L 1 L 1 l ( 1 ) l 0 e ( l + 1 ) λ k , i , l y d y 1 λ k , i , l l = 0 L 1 L 1 l ( 1 ) l 0 e γ th λ k , i , j + ( l + 1 ) λ k , i , l y d y .
Again, when we use the fact from ([32] (eq. 3.310) and some mathematical steps, Φ B can be obtained as
Φ B = l = 0 L 1 L 1 l ( 1 ) l l + 1 l = 0 L 1 L 1 l ( 1 ) l γ ¯ λ k , i , j ( γ th 1 ) λ k , i , P + γ ¯ λ k , i , j λ k , i , j γ th λ k , i , l + ( l + 1 ) λ k , i , j M .
By substituting (68) into (63), the closed-form expression for SOP with the ONS scheme and a non-colluding attack can be obtained as (62). The proof of Theorem 4 is concluded. □

4. Performance Evaluations

In this section, by comparing the simulation and analytical results, we investigate the impact of various network parameters on system secrecy performance. Unless otherwise specified, the simulation parameters are given in Table 3 [28,33]. To evaluate the impact of the proposed scheduling schemes and eavesdropping attacks on secrecy performance, we compare several cases, including a random node selection scheme as the benchmark, which are summarized in Table 4. As can be seen, the random node selection (RNS) scheme, which does not consider channel information to select nodes at each cluster, is utilized as the benchmark scheme.
Firstly, Figure 2 illustrates the impact of the interference threshold on the secrecy outage probability (SOP). A higher interference threshold allows the secondary user to allocate more transmit power for message transmission. As can be seen in Figure 2, when the interference threshold increases, the secrecy performance decreases. However, at high interference threshold values, SOP converges to a performance floor, indicating that further increases in the interference threshold have little effect on the system performance.
Figure 3 shows the impact of the target secrecy data rate on the SOP. The target secrecy data rate represents the required security level of the system. When the system demands a higher security level, it requires more robust protection against eavesdropping attacks. Therefore, as can be seen in Figure 3, since the system requires a higher security level, it becomes more frequently vulnerable to eavesdropping attacks. The results in Figure 2 and Figure 3 show that the statistical approach (simulation results) is in good agreement with the model-based approach (analytical results), thereby validating the correctness of our derivations.
Next, we turn our attention to the impact of the number of hops, eavesdroppers, and nodes in each cluster on secrecy performance. Figure 4 illustrates the effect of the number of hops on secrecy performance. As can be observed in Figure 4, when the number of hops increases, the secrecy performance improves. This phenomenon can be explained by the fact that increasing the number of hops reduces the distance between adjacent nodes, which enhances channel quality and thereby strengthens secrecy performance.
Figure 5 illustrates the impact of the number of eavesdroppers on secrecy performance. As can be seen in Figure 5, when the number of eavesdroppers increases, the adversaries have more opportunities to intercept the legitimate users’ transmissions, which leads to degraded secrecy performance.
The impact of the number of nodes in each cluster on secrecy performance is shown in Figure 6. As can be seen in Figure 6, when the number of nodes in each cluster increases, the secrecy performance improves. One possible reason is that a larger number of nodes provides more opportunities for each cluster to select better relay nodes, thereby enhancing secrecy performance.
From Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6, we investigate the impact of network parameters on secrecy performance. In addition, the ONS scheme demonstrates superior secrecy performance compared to the other selection schemes. This can be explained by the fact that the ONS scheme exploits both the main channel and the eavesdropper channel information to select the node in each cluster, thereby achieving the most robust secrecy performance. Although the MNS scheme is less robust than the ONS scheme, it still enhances secrecy performance since it utilizes the eavesdropper channel information for node selection. Furthermore, since colluding attacks allow multiple eavesdroppers to collaborate and share their intercepted information, they are able to collect more comprehensive information. Therefore, colluding attacks result in more severe degradation of secrecy performance compared to non-colluding attacks.
Now, we analyze the complexity order of each case. In this context, the complexity order is defined as the number of channel information elements required to select a node and transmit a message [35,36]. As shown in Table 5, the ONS scheme requires the largest amount of channel information among the considered scheduling schemes since it exploits both the main channel and the eavesdropper channel information to maximize secrecy capacity. In contrast, the MNS scheme requires only the eavesdropper channel information to select the node in each cluster as it aims to minimize the eavesdropper’s channel condition. From these results, we can conclude that opportunistic scheduling schemes requiring more channel information can achieve better secrecy performance. However, as the amount of required channel information increases, the scheduling scheme becomes more complex. Therefore, there exists a trade-off between complexity order and secrecy performance.
In this paper, we evaluate secrecy performance from various perspectives. Based on this analysis, we investigate the impact of network parameters on secrecy performance and demonstrate that opportunistic scheduling can significantly enhance secrecy performance, albeit at the cost of increased computational complexity.

5. Conclusions

In this paper, to protect confidential messages against various eavesdropping attacks, we proposed opportunistic scheduling schemes to enhance secrecy performance for multi-hop transmission in underlay cognitive radio networks. The proposed MNS scheme does not need the eavesdropper’s channel information to minimize the eavesdropper’s channel gain, while providing a low complexity order. Different from the MNS scheme, the proposed ONS scheme not only requires both the main channel and the eavesdropper’s channel to optimize the secrecy capacity but also shows a high complexity order. To capture the impact of network parameters, we derived closed-form expressions for the secrecy outage probability (SOP) under the proposed scheduling schemes and eavesdropping scenarios. Performance evaluations showed that the ONS scheme provides the most robust secrecy performance by leveraging both main and eavesdropper channel information, while the MNS scheme also improves secrecy performance with lower computational complexity. Moreover, the results revealed that colluding attacks cause more severe degradation of secrecy performance than non-colluding attacks. Overall, our analysis emphasizes the fundamental trade-off between secrecy performance and computational complexity, offering valuable insights for the design of secure and efficient multi-hop cognitive radio networks. In addition, the proposed ONS scheme improves secrecy performance by 15% under a 20 dB interference threshold compared to the MNS scheme. We leave the investigation of the interaction between the PHY layer and the MAC layer on the system performance and node mobility on the system performance as a future research topic.

Author Contributions

Conceptualization, K.S. and B.A.; Validation, K.S. and B.A.; Formal analysis, K.S.; Writing—original draft, K.S.; Writing—review & editing, K.S. and B.A.; Supervision, B.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by a research grant from Hankyong National University in the year of 2023.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Pinto, R.P.; Silva, B.M.; Inácio, P.R. Federated learning for anomaly detection on Internet of Medical Things: A survey. Internet Things 2025, 33, 101677. [Google Scholar] [CrossRef]
  2. Afrin, S.; Rafa, S.J.; Kabir, M.; Farah, T.; Alam, M.S.B.; Lameesa, A.; Ahmed, S.F.; Gandomi, A.H. Industrial Internet of Things: Implementations, challenges, and potential solutions across various industries. Comput. Ind. 2025, 170, 104317. [Google Scholar] [CrossRef]
  3. Giral-Ramírez, D.A.; Hernández-Suarez, C.A.; García-Ubaque, C.A. Spectral decision analysis and evaluation in an experimental environment for cognitive wireless networks. Results Eng. 2021, 12, 100309. [Google Scholar] [CrossRef]
  4. Le-Thanh, T.; Tran-Minh, C.; Ho-Van, K. Secrecy analysis of IRS-assisted NOMA cognitive radio networks with full-duplex energy scavenging jammer. Phys. Commun. 2025, 72, 102784. [Google Scholar] [CrossRef]
  5. Narmadha, G.; Jeyalakshmi, M.; Ponnrajakumari, M.; Duraichi, N.; Sakthivel, B. Enhancing spectrum prediction in cognitive radio networks using an optimized generative adversarial network. Results Eng. 2025, 26, 105270. [Google Scholar] [CrossRef]
  6. Goldsmith, A.; Jafar, S.A.; Maric, I.; Srinivasa, S. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective. Proc. IEEE 2009, 97, 894–914. [Google Scholar] [CrossRef]
  7. Tu, N.H.; Hoang, T.D.; Lee, K. Short-Packet URLLCs for MIMO Underlay Cognitive Multihop Relaying with Imperfect CSI. IEEE Access 2023, 11, 81672–81689. [Google Scholar] [CrossRef]
  8. Abilasha, V.; Karthikeyan, A. Metaheuristic-Based Cepstral Sensing Technique for Prolonging Network Lifetime and Mitigating Primary User Emulation Attacks in Cognitive Radio Sensor Network. IEEE Access 2025, 13, 100370–100391. [Google Scholar] [CrossRef]
  9. Poor, H.V.; Schaefer, R.F. Wireless physical layer security. Proc. Natl. Acad. Sci. USA 2017, 114, 19–26. [Google Scholar] [CrossRef]
  10. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  11. Chorti, A.; Barreto, A.N.; Köpsell, S.; Zoli, M.; Chafii, M.; Sehier, P.; Fettweis, G.; Poor, H.V. Context-Aware Security for 6G Wireless: The Role of Physical Layer Security. IEEE Commun. Stand. Mag. 2022, 6, 102–108. [Google Scholar] [CrossRef]
  12. Ajib, W.; Haccoun, D. An overview of scheduling algorithms in MIMO-based fourth-generation wireless systems. IEEE Netw. 2005, 19, 43–48. [Google Scholar] [CrossRef]
  13. Zhang, Q.; Chen, Q.; Yang, F.; Shen, X.; Niu, Z. Cooperative and opportunistic transmission for wireless ad hoc networks. IEEE Netw. 2007, 21, 14–20. [Google Scholar] [CrossRef]
  14. Asadi, A.; Mancuso, V. A Survey on Opportunistic Scheduling in Wireless Communications. IEEE Commun. Surv. Tutor. 2013, 15, 1671–1688. [Google Scholar] [CrossRef]
  15. Abedi, M.R.; Mokari, N.; Saeedi, H.; Yanikomeroglu, H. Robust Resource Allocation to Enhance Physical Layer Security in Systems with Full-Duplex Receivers: Active Adversary. IEEE Trans. Wirel. Commun. 2017, 16, 885–899. [Google Scholar] [CrossRef]
  16. Shim, K.; An, B. Exploiting Secure Multihop Transmission in Underlying Cognitive Radio Networks: Analysis and Deep Learning Approaches. In Proceedings of the 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Bali, Indonesia, 20–23 February 2023; pp. 281–285. [Google Scholar] [CrossRef]
  17. Shim, K.; An, B. Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission. In Proceedings of the 2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN), Paris, France, 4–7 July 2023; pp. 392–397. [Google Scholar] [CrossRef]
  18. Li, X.; Zhao, H.; Xu, J.; Zhu, G.; Deng, W. APDPFL: Anti-Poisoning Attack Decentralized Privacy Enhanced Federated Learning Scheme for Flight Operation Data Sharing. IEEE Trans. Wirel. Commun. 2024, 23, 19098–19109. [Google Scholar] [CrossRef]
  19. Guo, D.; Zhang, S.; Zhang, J.; Yang, B.; Lin, Y. Exploring Contextual Knowledge-Enhanced Speech Recognition in Air Traffic Control Communication: A Comparative Study. IEEE Trans. Neural Netw. Learn. Syst. 2025, 36, 16085–16099. [Google Scholar] [CrossRef]
  20. Shim, K.; Nguyen, T.V.; An, B. Exploiting Opportunistic Scheduling Schemes to Improve Physical-Layer Security in MU-MISO NOMA Systems. IEEE Access 2019, 7, 180867–180886. [Google Scholar] [CrossRef]
  21. Huang, S.; Huang, X.; Chen, W.; Zhao, S. Physical layer security of vehicular networks with cooperative jamming helpers. Phys. Commun. 2022, 53, 101762. [Google Scholar] [CrossRef]
  22. Odong, P.; Abd El-Malek, A.H.; Allam, A.; Abdel-Rahman, A.B. Physical layer security in SWIPT-based cooperative vehicular relaying networks. Veh. Commun. 2024, 49, 100835. [Google Scholar] [CrossRef]
  23. Namdar, M.; Basgumus, A.; Ata, S.O.; Aldirmaz-Colak, S. Physical layer security in RIS-aided communication systems: Secrecy performance analyses. Digit. Signal Process. 2025, 167, 105417. [Google Scholar] [CrossRef]
  24. Shim, K.; Do, N.T.; An, B.; Nam, S.Y. Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information. In Proceedings of the 2016 International Conference on Electronics, Information, and Communications (ICEIC), Danang, Vietnam, 27–30 January 2016; pp. 1–4. [Google Scholar] [CrossRef]
  25. Garcia, C.E.; Camana, M.R.; Koo, I. Secrecy Energy Efficiency Maximization in an Underlying Cognitive Radio–NOMA System with a Cooperative Relay and an Energy-Harvesting User. Appl. Sci. 2020, 10, 3630. [Google Scholar] [CrossRef]
  26. Shang, Z.; Zhang, T.; Cai, Y.; Yang, W.; Wu, H.; Zhang, Y.; Tao, L. Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers. Appl. Sci. 2020, 10, 1840. [Google Scholar] [CrossRef]
  27. Wang, X.; Wang, X.; Ge, J.; Liu, Z.; Ma, Y.; Li, X. Reconfigurable Intelligent Surface-Assisted Secure Communication in Cognitive Radio Systems. Energies 2024, 17, 515. [Google Scholar] [CrossRef]
  28. Shim, K.; Nguyen, T.V.; An, B. Exploiting Opportunistic Scheduling Schemes and WPT-Based Multi-Hop Transmissions to Improve Physical Layer Security in Wireless Sensor Networks. Sensors 2019, 19, 5456. [Google Scholar] [CrossRef]
  29. Pramitarini, Y.; Perdana, R.H.Y.; Shim, K.; An, B. Opportunistic Scheduling Scheme to Improve Physical-Layer Security in Cooperative NOMA System: Performance Analysis and Deep Learning Design. IEEE Access 2024, 12, 58454–58472. [Google Scholar] [CrossRef]
  30. Shim, K.; Park, S.H.; Kim, B.S.; An, B. Exploiting Opportunistic Scheduling Schemes on Cooperative NOMA Networks Under Active Eavesdropper. IEEE Access 2025, 13, 111484–111507. [Google Scholar] [CrossRef]
  31. Alberto, L.G. Probability, Statistics, and Random Processes for Electrical Engineering, 3rd ed.; Pearson Prentice Hall: Upper Saddle River, NJ, USA, 2008; Volume 55. [Google Scholar]
  32. Gradshteyn, I.; Ryzhik, I. Table of Integrals, Series, and Products, 7th ed.; Academic Press: Cambridge, MA, USA, 2007. [Google Scholar]
  33. Triwidyastuti, Y.; Perdana, R.H.Y.; Shim, K.; An, B. Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks. Sensors 2023, 23, 7653. [Google Scholar] [CrossRef]
  34. Aigner, M. Combinatorial Theory; Springer: New York, NY, USA, 1979. [Google Scholar]
  35. Shim, K.; Do, N.T.; An, B. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks. Sensors 2017, 17, 377. [Google Scholar] [CrossRef]
  36. Shim, K.; Do, T.N.; Nguyen, T.V.; Costa, D.B.d.; An, B. Enhancing PHY-Security of FD-Enabled NOMA Systems Using Jamming and User Selection: Performance Analysis and DNN Evaluation. IEEE Internet Things J. 2021, 8, 17476–17494. [Google Scholar] [CrossRef]
Figure 1. The illustration of the secure multi-hop transmission in the underlay cognitive radio network with multiple eavesdroppers.
Figure 1. The illustration of the secure multi-hop transmission in the underlay cognitive radio network with multiple eavesdroppers.
Electronics 14 03867 g001
Figure 2. The SOP versus I th .
Figure 2. The SOP versus I th .
Electronics 14 03867 g002
Figure 3. The SOP versus R th .
Figure 3. The SOP versus R th .
Electronics 14 03867 g003
Figure 4. The SOP versus K.
Figure 4. The SOP versus K.
Electronics 14 03867 g004
Figure 5. The SOP versus L.
Figure 5. The SOP versus L.
Electronics 14 03867 g005
Figure 6. The SOP versus M.
Figure 6. The SOP versus M.
Electronics 14 03867 g006
Table 1. Notation summary.
Table 1. Notation summary.
NotationDefinition
S i The source node in the first cluster, where i ∈ {1, 2, N 0 }.
R k , i The i-th node in the k-th cluster; R 0 , 1 S i and R K , 1 D , with k ∈ {0, 1, …, K}.
D The destination node.
P The primary node.
E l The l-th eavesdropper, where l ∈ {1, 2, …, L }.
| h k , i , j | 2 The channel gain of link R k 1 , i R k , j .
| h k , i , P | 2 The channel gain of link R k 1 , i PU .
| h k , i , l | 2 The channel gain of link R k 1 , i E l .
λ k , i , j , λ k , i , P , and λ k , i , l The means of | h k , i , j | 2 , | h k , i , P | 2 , and | h k , i , l | 2 , respectively.
P k , i The transmit power level at the i-th node in the k-th cluster.
I th The interference threshold.
Table 2. Self-defined constants.
Table 2. Self-defined constants.
X k , i , j = | h k , i , j | 2 γ th = 2 K R th
Y k , i , E 1 = l = 1 L | h k , i , l | 2 γ ¯ = I th
Y k , i , E e = max 1 l L { | h k , i , l | 2 } σ 1 2 = ⋯ = σ j 2 = σ 2
Z k , i P = | h k , i , P | 2 σ E 2 = σ 2
Table 3. Simulation parameters.
Table 3. Simulation parameters.
ParametersValue
The distance between S and D , d SD 10 m
The reference distance, d 0 1 m
The position of S (0, 0)
The position of R k ( d SD k /K, 0)
The position of D (10, 0)
The position of P (−5, −5)
The position of E (5, −5)
The number of hops, K5
The number of eavesdroppers, L4
The number of relay nodes in each cluster, M5
The path-loss exponent, β 2.7
The path loss at the reference distance, L at d 0 = 1−30 dB
The interference threshold, I th [−30:5:30] dB
The target secrecy data rate, R out 0.1 bps/Hz
Table 4. Schemes for performance comparison.
Table 4. Schemes for performance comparison.
CasesScheme + Eavesdropping Attack
Case IRNS + colluding attack
Case IIRNS + non-colluding attack
Case IIIMNS + colluding attack
Case IVMNS + non-colluding attack
Case VONS + colluding attack
Case VIONS + non-colluding attack
Table 5. Complexity order analysis.
Table 5. Complexity order analysis.
Complexity Order
Case I
(RNS + colluding)
3 K
Case II
(RNS + non-colluding)
3 K
Case III
(MNS + colluding)
K ( M L + L + 2 )
Case IV
(MNS + non-colluding)
K ( M L + L + 2 )
Case V
(ONS + colluding)
K ( M L + 2 M + L + 2 )
Case VI
(ONS + non-colluding)
K ( M L + 2 M + L + 2 )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shim, K.; An, B. Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks. Electronics 2025, 14, 3867. https://doi.org/10.3390/electronics14193867

AMA Style

Shim K, An B. Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks. Electronics. 2025; 14(19):3867. https://doi.org/10.3390/electronics14193867

Chicago/Turabian Style

Shim, Kyusung, and Beongku An. 2025. "Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks" Electronics 14, no. 19: 3867. https://doi.org/10.3390/electronics14193867

APA Style

Shim, K., & An, B. (2025). Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks. Electronics, 14(19), 3867. https://doi.org/10.3390/electronics14193867

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop