Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks
Abstract
1. Introductions
- In this work, we investigate the impact of various eavesdropping attacks on multi-hop transmission in underlay cognitive radio networks. Specifically, we consider a scenario where multiple eavesdroppers are present. These eavesdroppers may either collaborate by sharing intercepted information (colluding attack) or act independently (non-colluding attack). To the best of our knowledge, this network architecture has not been reported in the existing literature.
- We propose two types of opportunistic scheduling schemes to enhance secrecy performance. The first scheme, called the minimal node selection (MNS) scheme, selects a node in each cluster to minimize the eavesdropper’s channel condition. This node selection scheme only requires the eavesdropper’s channel information, which leads to lower computational complexity. The second scheme, called the optimal node selection (ONS) scheme, selects a node in each cluster to maximize secrecy performance. Since the ONS scheme requires both the main channel and eavesdropper channel information, it achieves more robust secrecy performance compared to the MNS scheme.
- To capture the relationship between network parameters and secrecy performance, we derive closed-form expressions for the secrecy outage probability (SOP) under the proposed scheduling schemes and various eavesdropping attacks. In addition, we analyze the complexity order to provide further insights into the amount of channel information required for node selection.
- To evaluate the impact of the proposed node selection schemes and various eavesdropping attacks on secrecy performance, we compare the proposed methods with a benchmark scheme that does not utilize channel state information for node selection within each cluster. Furthermore, we investigate the effects of key network parameters, including the interference threshold, target secrecy data rate, and the number of eavesdroppers, nodes per cluster, and hops, on secrecy performance. The results demonstrate that the proposed opportunistic scheduling schemes significantly enhance secrecy performance compared to the benchmark scheme, while colluding attacks are shown to be more detrimental to secrecy performance.
2. System Model
2.1. Data Transmission Phase
2.1.1. Scenario 1: Colluding Attack
2.1.2. Scenario 2: Non-Colluding Attack
2.2. The Proposed Node Selection Schemes
2.2.1. The Minimal Node Selection (MNS) Scheme
2.2.2. The Optimal Node Selection (ONS) Scheme
3. Secrecy Outage Performance Analysis
3.1. MNS Scheme and Colluding Attack
3.2. MNS Scheme and Non-Colluding Attack
3.3. ONS Scheme and Colluding Attack
3.4. ONS Scheme and Non-Colluding Attack
4. Performance Evaluations
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Pinto, R.P.; Silva, B.M.; Inácio, P.R. Federated learning for anomaly detection on Internet of Medical Things: A survey. Internet Things 2025, 33, 101677. [Google Scholar] [CrossRef]
- Afrin, S.; Rafa, S.J.; Kabir, M.; Farah, T.; Alam, M.S.B.; Lameesa, A.; Ahmed, S.F.; Gandomi, A.H. Industrial Internet of Things: Implementations, challenges, and potential solutions across various industries. Comput. Ind. 2025, 170, 104317. [Google Scholar] [CrossRef]
- Giral-Ramírez, D.A.; Hernández-Suarez, C.A.; García-Ubaque, C.A. Spectral decision analysis and evaluation in an experimental environment for cognitive wireless networks. Results Eng. 2021, 12, 100309. [Google Scholar] [CrossRef]
- Le-Thanh, T.; Tran-Minh, C.; Ho-Van, K. Secrecy analysis of IRS-assisted NOMA cognitive radio networks with full-duplex energy scavenging jammer. Phys. Commun. 2025, 72, 102784. [Google Scholar] [CrossRef]
- Narmadha, G.; Jeyalakshmi, M.; Ponnrajakumari, M.; Duraichi, N.; Sakthivel, B. Enhancing spectrum prediction in cognitive radio networks using an optimized generative adversarial network. Results Eng. 2025, 26, 105270. [Google Scholar] [CrossRef]
- Goldsmith, A.; Jafar, S.A.; Maric, I.; Srinivasa, S. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective. Proc. IEEE 2009, 97, 894–914. [Google Scholar] [CrossRef]
- Tu, N.H.; Hoang, T.D.; Lee, K. Short-Packet URLLCs for MIMO Underlay Cognitive Multihop Relaying with Imperfect CSI. IEEE Access 2023, 11, 81672–81689. [Google Scholar] [CrossRef]
- Abilasha, V.; Karthikeyan, A. Metaheuristic-Based Cepstral Sensing Technique for Prolonging Network Lifetime and Mitigating Primary User Emulation Attacks in Cognitive Radio Sensor Network. IEEE Access 2025, 13, 100370–100391. [Google Scholar] [CrossRef]
- Poor, H.V.; Schaefer, R.F. Wireless physical layer security. Proc. Natl. Acad. Sci. USA 2017, 114, 19–26. [Google Scholar] [CrossRef]
- Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Chorti, A.; Barreto, A.N.; Köpsell, S.; Zoli, M.; Chafii, M.; Sehier, P.; Fettweis, G.; Poor, H.V. Context-Aware Security for 6G Wireless: The Role of Physical Layer Security. IEEE Commun. Stand. Mag. 2022, 6, 102–108. [Google Scholar] [CrossRef]
- Ajib, W.; Haccoun, D. An overview of scheduling algorithms in MIMO-based fourth-generation wireless systems. IEEE Netw. 2005, 19, 43–48. [Google Scholar] [CrossRef]
- Zhang, Q.; Chen, Q.; Yang, F.; Shen, X.; Niu, Z. Cooperative and opportunistic transmission for wireless ad hoc networks. IEEE Netw. 2007, 21, 14–20. [Google Scholar] [CrossRef]
- Asadi, A.; Mancuso, V. A Survey on Opportunistic Scheduling in Wireless Communications. IEEE Commun. Surv. Tutor. 2013, 15, 1671–1688. [Google Scholar] [CrossRef]
- Abedi, M.R.; Mokari, N.; Saeedi, H.; Yanikomeroglu, H. Robust Resource Allocation to Enhance Physical Layer Security in Systems with Full-Duplex Receivers: Active Adversary. IEEE Trans. Wirel. Commun. 2017, 16, 885–899. [Google Scholar] [CrossRef]
- Shim, K.; An, B. Exploiting Secure Multihop Transmission in Underlying Cognitive Radio Networks: Analysis and Deep Learning Approaches. In Proceedings of the 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Bali, Indonesia, 20–23 February 2023; pp. 281–285. [Google Scholar] [CrossRef]
- Shim, K.; An, B. Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission. In Proceedings of the 2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN), Paris, France, 4–7 July 2023; pp. 392–397. [Google Scholar] [CrossRef]
- Li, X.; Zhao, H.; Xu, J.; Zhu, G.; Deng, W. APDPFL: Anti-Poisoning Attack Decentralized Privacy Enhanced Federated Learning Scheme for Flight Operation Data Sharing. IEEE Trans. Wirel. Commun. 2024, 23, 19098–19109. [Google Scholar] [CrossRef]
- Guo, D.; Zhang, S.; Zhang, J.; Yang, B.; Lin, Y. Exploring Contextual Knowledge-Enhanced Speech Recognition in Air Traffic Control Communication: A Comparative Study. IEEE Trans. Neural Netw. Learn. Syst. 2025, 36, 16085–16099. [Google Scholar] [CrossRef]
- Shim, K.; Nguyen, T.V.; An, B. Exploiting Opportunistic Scheduling Schemes to Improve Physical-Layer Security in MU-MISO NOMA Systems. IEEE Access 2019, 7, 180867–180886. [Google Scholar] [CrossRef]
- Huang, S.; Huang, X.; Chen, W.; Zhao, S. Physical layer security of vehicular networks with cooperative jamming helpers. Phys. Commun. 2022, 53, 101762. [Google Scholar] [CrossRef]
- Odong, P.; Abd El-Malek, A.H.; Allam, A.; Abdel-Rahman, A.B. Physical layer security in SWIPT-based cooperative vehicular relaying networks. Veh. Commun. 2024, 49, 100835. [Google Scholar] [CrossRef]
- Namdar, M.; Basgumus, A.; Ata, S.O.; Aldirmaz-Colak, S. Physical layer security in RIS-aided communication systems: Secrecy performance analyses. Digit. Signal Process. 2025, 167, 105417. [Google Scholar] [CrossRef]
- Shim, K.; Do, N.T.; An, B.; Nam, S.Y. Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information. In Proceedings of the 2016 International Conference on Electronics, Information, and Communications (ICEIC), Danang, Vietnam, 27–30 January 2016; pp. 1–4. [Google Scholar] [CrossRef]
- Garcia, C.E.; Camana, M.R.; Koo, I. Secrecy Energy Efficiency Maximization in an Underlying Cognitive Radio–NOMA System with a Cooperative Relay and an Energy-Harvesting User. Appl. Sci. 2020, 10, 3630. [Google Scholar] [CrossRef]
- Shang, Z.; Zhang, T.; Cai, Y.; Yang, W.; Wu, H.; Zhang, Y.; Tao, L. Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers. Appl. Sci. 2020, 10, 1840. [Google Scholar] [CrossRef]
- Wang, X.; Wang, X.; Ge, J.; Liu, Z.; Ma, Y.; Li, X. Reconfigurable Intelligent Surface-Assisted Secure Communication in Cognitive Radio Systems. Energies 2024, 17, 515. [Google Scholar] [CrossRef]
- Shim, K.; Nguyen, T.V.; An, B. Exploiting Opportunistic Scheduling Schemes and WPT-Based Multi-Hop Transmissions to Improve Physical Layer Security in Wireless Sensor Networks. Sensors 2019, 19, 5456. [Google Scholar] [CrossRef]
- Pramitarini, Y.; Perdana, R.H.Y.; Shim, K.; An, B. Opportunistic Scheduling Scheme to Improve Physical-Layer Security in Cooperative NOMA System: Performance Analysis and Deep Learning Design. IEEE Access 2024, 12, 58454–58472. [Google Scholar] [CrossRef]
- Shim, K.; Park, S.H.; Kim, B.S.; An, B. Exploiting Opportunistic Scheduling Schemes on Cooperative NOMA Networks Under Active Eavesdropper. IEEE Access 2025, 13, 111484–111507. [Google Scholar] [CrossRef]
- Alberto, L.G. Probability, Statistics, and Random Processes for Electrical Engineering, 3rd ed.; Pearson Prentice Hall: Upper Saddle River, NJ, USA, 2008; Volume 55. [Google Scholar]
- Gradshteyn, I.; Ryzhik, I. Table of Integrals, Series, and Products, 7th ed.; Academic Press: Cambridge, MA, USA, 2007. [Google Scholar]
- Triwidyastuti, Y.; Perdana, R.H.Y.; Shim, K.; An, B. Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks. Sensors 2023, 23, 7653. [Google Scholar] [CrossRef]
- Aigner, M. Combinatorial Theory; Springer: New York, NY, USA, 1979. [Google Scholar]
- Shim, K.; Do, N.T.; An, B. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks. Sensors 2017, 17, 377. [Google Scholar] [CrossRef]
- Shim, K.; Do, T.N.; Nguyen, T.V.; Costa, D.B.d.; An, B. Enhancing PHY-Security of FD-Enabled NOMA Systems Using Jamming and User Selection: Performance Analysis and DNN Evaluation. IEEE Internet Things J. 2021, 8, 17476–17494. [Google Scholar] [CrossRef]
Notation | Definition |
---|---|
The source node in the first cluster, where i ∈ {1, 2, }. | |
The i-th node in the k-th cluster; ≡ and ≡ , with k ∈ {0, 1, …, K}. | |
The destination node. | |
The primary node. | |
The l-th eavesdropper, where l ∈ {1, 2, …, L }. | |
The channel gain of link → . | |
The channel gain of link → . | |
The channel gain of link → . | |
, , and | The means of , , and , respectively. |
The transmit power level at the i-th node in the k-th cluster. | |
The interference threshold. |
= | = |
= | = |
= | = ⋯ = = |
= | = |
Parameters | Value |
---|---|
The distance between and , | 10 m |
The reference distance, | 1 m |
The position of | (0, 0) |
The position of | (/K, 0) |
The position of | (10, 0) |
The position of | (−5, −5) |
The position of | (5, −5) |
The number of hops, K | 5 |
The number of eavesdroppers, L | 4 |
The number of relay nodes in each cluster, M | 5 |
The path-loss exponent, | 2.7 |
The path loss at the reference distance, at = 1 | −30 dB |
The interference threshold, | [−30:5:30] dB |
The target secrecy data rate, | 0.1 bps/Hz |
Cases | Scheme + Eavesdropping Attack |
---|---|
Case I | RNS + colluding attack |
Case II | RNS + non-colluding attack |
Case III | MNS + colluding attack |
Case IV | MNS + non-colluding attack |
Case V | ONS + colluding attack |
Case VI | ONS + non-colluding attack |
Complexity Order | |
---|---|
Case I (RNS + colluding) | |
Case II (RNS + non-colluding) | |
Case III (MNS + colluding) | |
Case IV (MNS + non-colluding) | |
Case V (ONS + colluding) | |
Case VI (ONS + non-colluding) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shim, K.; An, B. Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks. Electronics 2025, 14, 3867. https://doi.org/10.3390/electronics14193867
Shim K, An B. Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks. Electronics. 2025; 14(19):3867. https://doi.org/10.3390/electronics14193867
Chicago/Turabian StyleShim, Kyusung, and Beongku An. 2025. "Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks" Electronics 14, no. 19: 3867. https://doi.org/10.3390/electronics14193867
APA StyleShim, K., & An, B. (2025). Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks. Electronics, 14(19), 3867. https://doi.org/10.3390/electronics14193867