Next Article in Journal
Remote Monitoring of Human Vital Signs Based on 77-GHz mm-Wave FMCW Radar
Next Article in Special Issue
A Joint Power, Delay and Rate Optimization Model for Secondary Users in Cognitive Radio Sensor Networks
Previous Article in Journal
A Survey of Marker-Less Tracking and Registration Techniques for Health & Environmental Applications to Augmented Reality and Ubiquitous Geospatial Information Systems
Previous Article in Special Issue
Enhanced Sensing and Sum-Rate Analysis in a Cognitive Radio-Based Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Residual Energy Analysis in Cognitive Radios with Energy Harvesting UAV under Reliability and Secrecy Constraints

1
Department of Electronics and Information Engineering, Korea University, Sejong 30019, Korea
2
Department of Information and Telecommunication Engineering, Incheon National University, Incheon 22012, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2020, 20(10), 2998; https://doi.org/10.3390/s20102998
Submission received: 22 April 2020 / Revised: 19 May 2020 / Accepted: 22 May 2020 / Published: 25 May 2020

Abstract

:
The integration of unmanned aerial vehicles (UAVs) with a cognitive radio (CR) technology can improve the spectrum utilization. However, UAV network services demand reliable and secure communications, along with energy efficiency to prolong battery life. We consider an energy harvesting UAV (e.g., surveillance drone) flying periodically in a circular track around a ground-mounted primary transmitter. The UAV, with limited-energy budget, harvests radio frequency energy and uses the primary spectrum band opportunistically. To obtain intuitive insight into the performance of energy-harvesting, and reliable and secure communications, the closed-form expressions of the residual energy, connection outage probability, and secrecy outage probability, respectively, are analytically derived. We construct the optimization problems of residual energy with reliable and secure communications, under scenarios without and with an eavesdropper, respectively, and the analytical solutions are obtained with the approximation of perfect sensing. The numerical simulations verify the analytical results and identify the requirements of length of sensing phase and transmit power for the maximum residual energy in both reliable and secure communication scenarios. Additionally, it is shown that the residual energy in secure communication is lower than that in reliable communication.

1. Introduction

Traditional wireless spectrum standards rely on the static spectrum allocation policies where a specific frequency band is assigned to the specific licensed users. Such a policy causes unbalanced spectrum utilization and degrades the spectral efficiency. Therefore, strict spectrum allocation is insufficient to meet the ever-growing demands of spectral resources for futuristic networks such as the internet of things (IoT), and 5G [1,2]. The flexible spectrum allocation and efficient spectrum utilization can be achieved with the cognitive radio (CR) technologies. A dynamic spectrum access (DSA) approach enables the time-division multiple access based spectrum sharing among CR users and mitigates the spectrum scarcity and under-utilization issues [3,4,5]. Thus, CR is the most promising paradigm for wireless communications, and is one of the potential technologies adopted for futuristic networks. The DSA-based approach is classified into underlay, overlay, and interweave/opportunistic spectrum access (OSA). In underlay approach, secondary users (SUs), i.e., CR users and primary users (PUs), transmit simultaneously. However, the SUs have to transmit with lower power to guarantee low interference to the PUs. The concurrent transmissions are possible in overlay approach also, with the SUs assisting the primary transmissions using any relaying techniques. However, the SUs can exploit only the spectral opportunities in interweave/OSA based approach, i.e., the SUs transmit only when the spectral holes are detected. Thus, the spectral efficiency of OSA-CR networks highly depends on the successful integration of the PUs and SUs, and requires the SUs to be capable of performing the reliable sensing or keeping precise track of the primary transmissions. Hence, the reliable spectrum sensing is one of the crucial components in OSA-CR networks. Spectrum sensing can be performed either individually or cooperatively. The perfect spectrum sensing is impossible to achieve in realistic wireless fading scenarios. Hence, the sensing errors due to imperfect sensing should be considered for the precise analyses of CR network performance. The sensing performance in imperfect sensing scenarios can be enhanced by choosing the optimal sensing operating point, i.e., a pair of false alarm and detection probabilities [6,7].
Moreover, signals in open and shared wireless medium are vulnerable to the eavesdropping, i.e., data interception by the illegitimate eavesdroppers. Traditionally, secure wireless data transmission requires cryptographic techniques at network layer. However, the information-security based on encryption and cryptographic techniques is not sufficient for the secure communications because advances in hardware design significantly increase the computational capabilities of the eavesdroppers. Different from the traditional cryptography algorithms, physical layer security (PLS) utilizes the transmission techniques and inherent properties of the wireless medium. The PLS is considered one of the potential solutions for the secure communication in wireless channels [8,9]. The PLS controls the physical signal, i.e., makes it decodable for only the legitimate user. In the PLS, the difference between the channel capacities of the main data link, i.e., between the source and destination, and the wiretap link, i.e., between the source and eavesdropper, is termed as the secrecy capacity, which is a performance measure for the PLS. Additionally, the probabilities of secrecy outage for a given secrecy rate is used to evaluate the secrecy performance [10,11].
On the other hand, unmanned aerial vehicles (UAVs) have been used for various applications, such as monitoring, surveying, data transmission/communication, aerial remote sensing, product delivery, traffic control, and agriculture mapping [12]. However, UAVs typically operate within the unlicensed spectrum bands (e.g., IEEE-S, IEEE-L, ISM), thus competing with a large number of other devices in the popular wireless networks, including WiFi, WiMAX, and Bluetooth. It is unavoidable for the UAVs to face the spectrum scarcity in the near future. The CR technology overcomes the spectrum overcrowd and scarcity issues for the UAVs. The use of UAVs in CR networks also improves the sensing performance because of the short distance line-of-sight (LoS) communication and the higher strength signal without ground fading and shadowing. However, unlike the other ground transceivers with external power supplies, the UAVs are limited by their on-board battery power. Consequently, most of the UAV applications are designed for the short communication periods where permanent access to a costly spectrum-band is not required. The UAV-infrastructures can provide only the temporary services to the areas of interest unless the issue of battery-life is addressed [13].
Furthermore, energy harvesting (EH) in wireless networks is the process of extracting energy from the surrounding environment, such as from solar, heat, wind, and radio frequency (RF) signals [14,15]. The EH techniques have come to the forefront to improve the battery’s limited capacity, i.e., supply energy to the energy-constrained nodes. The ambient RF-EH is a safe and convenient source of energy since it carries energy and information simultaneously. The simultaneous information and power transfer becomes possible through the power splitting devices, and the radio signals are converted into the usable DC power. The RF-EH is used in the wireless networks due to wide availability of radio sources, e.g., WiFi networks, radio broadcasting towers, base stations, and mobile phones. With the recent advances, the RF-EH is also utilized on the CR networks as a greenery solution. Thus, for the above mentioned situation, the transmission from one node (e.g., PU) can provide power to any other node (e.g., SU) which is receiving or listening to the transmission [16,17].

1.1. Contributions

The main contributions of this paper are summarized as follows:
  • We consider the energy management aspect of the energy harvesting CR-based UAV with limited-energy budget. The closed-form expressions of the total residual energy, connection outage probability, and secrecy outage probability are derived under a circular flight condition.
  • We aim to extend the on-board battery life-time for UAV by maximizing the energy obtained through the EH and minimizing the transmission energy consumption. Thus, the optimal lengths of sensing phase and the transmit powers are obtained by solving the formulated optimization problems of maximum residual energy under the constraints of connection and secrecy outage probabilities with perfect sensing approximation.
  • The analytical results are verified through the numerical simulations including imperfect sensing. Based on the results, we provide guidelines in designing an energy harvesting UAV-based CR system with the reliable and secure communications under scenarios without and with an eavesdropper, respectively.

1.2. Paper Organization

The rest of the paper is organized as follows. In Section 2, we briefly describe the system model. The sensing procedure and signal model are explained in Section 3. The residual energy, and the connection and secrecy outage probabilities are investigated in Section 4 and Section 5, respectively. Section 6 presents the optimization of total residual energy under scenarios without and with an eavesdropper. Section 7 provides numerical simulations and discussion. Finally, conclusions are presented in Section 8.

2. System Model

The system model consists of an energy-constrained UAV (e.g., surveillance drone) as a secondary (cognitive) transmitter, a corresponding secondary receiver (SR), a ground-mounted primary transmitter (PT) and receiver (PR) pair, and an eavesdropper (E), as shown in Figure 1. An energy harvesting UAV (EH-UAV) flies in a circular fight track with a constant velocity (speed) v with PT locating at the center. The altitude of EH-UAV relative to the PT is h, and the radius of circular track is given by r. The on-board power supply is responsible for the energy required for the flight operations, i.e., hovering and transition, with recharging possible only after the completion of each flight. The EH-UAV opportunistically exploits the primary-band, i.e., owned by PT and PR, in the absence or presence of E. The PT and PR communicate probabilistically during the flight of EH-UAV, which is divided into the sensing and transmission radians, i.e., sensing and transmission periods. In the sensing phase with a duration of t, the EH-UAV simultaneously harvests RF energy from the received signal and performs the spectrum sensing (SS) procedure for the opportunistic use of the primary band. The dynamic power splitting device splits the received primary signal into the two power fractions of ( 1 ρ ) and ρ for EH and SS purposes, respectively, where ρ denotes the power splitting factor [15]. In the transmission phase with a duration of T d , the EH-UAV performs the full-proportioned EH, i.e., ρ = 0 , if a signal from PT is detected. Otherwise, the EH-UAV sends its data to SR with the portion of powers gathered in the sensing phase through EH unit, and on-board supply. We consider the linear EH model, i.e., the harvested power is linearly proportional to the received RF power [16,17]. During the circular flight, the EH-UAV consumes energy in SS and EH procedures during the sensing phase, and in EH or information-transmission procedures during the transmission phase, respectively. In cellular systems, the sector antennas are generally used for the ground-stations, with projection of the radiation pattern determines the coverage area. Moreover, a down-tilt setting strategy is considered when the base station is located in higher altitude than the user equipment [18]. In proposed scenario, the ground-mounted PT is assumed to be equipped with the omnidirectional antenna. The reason is that only the received signal-to-noise ratio (SNR) at the UAV, irrespective of the signal characteristic, is considered. For example, a base station with three sectors transmits the three different signals via the three sector antennas. However, in terms of the signal energy (not the individual signal), it can be regarded as the omnidirectional pattern. The sector antennas for a PT, i.e., a base station, with a down-tilt setting strategy can also be considered. However, the received sensing SNR at the UAV will be lowered for such a scenario. Moreover, because the primary signal is considered only for the energy detection, the detail model for the primary signal is not required. The signal transmission from PT across the channel is modeled by the two-state Markov chain model, with random variables representing the duration of each state following the exponential distribution. Moreover, P o n and P o f f are the stationary probabilities for the O N and O F F states, respectively [19,20]. An O N state indicates that the channel is being used by the PT (unavailable for the EH-UAV), while the O F F state indicates that the channel is free and there is no activity of PT.

3. Sensing Procedure and Signal Modeling

The simplest non-coherent energy detection method is considered for the spectrum sensing at the EH-UAV because it has low computational complexity and does not involve any complicated signal processing. The target signal, i.e., the signal from PT, is detected by comparing the measured signal energy with a pre-determined sensing threshold. It does not need any prior knowledge of the target signal [21]. In the sensing phase, the nth samples of the signals received for the SS and EH, denoted by y s s ( n ) and y e h ( n ) , are expressed as
y s s ( n ) = ρ h p x ( n ) + ρ w ( n ) ,
y e h ( n ) = ( 1 ρ ) h p x ( n ) + ( 1 ρ ) w ( n ) .
The decision metric, ξ , representing the received signal power, for the sensing procedure is given as
ξ = 1 N n = 1 N | y s s ( n ) | 2
where x ( n ) is the transmit signal from the PT, which is assumed to be a complex-valued phase shift keying (PSK) with power P x = E | x ( n ) | 2 and N is the total number of samples in the sensing phase. Let h p be the channel fading coefficient of the link between the PT and EH-UAV. The instantaneous power gain of the channel, | h p | 2 , is an exponentially distributed random variable, i.e., E x p ( λ p ) , where λ p is the rate parameter [19,20,21]. The mean of | h p | 2 is given by ω p = 1 / λ p = d p κ , where d p denotes the distance between the respective nodes, and κ denotes the path loss exponent. The channel gains of all links are assumed to be quasi-static fading, i.e., the channel gains remain constant during the entire circular flight period, i.e., 2 π . Moreover, w ( n ) is the noise at the EH-UAV, which is modeled by a circularly symmetric complex Gaussian (CSCG) distribution, i.e., w ( n ) CN ( 0 , σ 2 ) .
By using the central limit theorem, for large N, the decision statistic ξ can be approximated with the Gaussian distribution with mean ρ σ 2 and variance ρ 2 σ 4 N , i.e., ξ N ρ σ 2 , ρ 2 σ 4 N , under null hypothesis H 0 . Similarly, under the alternative hypothesis H 1 , the decision statistic is given by N ( 1 + γ ) ρ σ 2 , ( 1 + 2 γ ) ρ 2 σ 4 N . Here, H 0 describes a situation in which a signal from PT does not exist, and H 1 expresses the case in which a signal from PT exists. We consider that the σ 2 is accurately known at the UAV; thus, a proper sensing threshold, ϵ , design is possible. Substituting the above statistical properties under each hypothesis, the probabilities of detection ( P d ) and false alarm ( P f a ) are expressed as [22]
P d = Q ϵ ρ σ 2 γ 1 r θ f s v ( 2 γ + 1 ) ,
P f a = Q ϵ ρ σ 2 1 r θ f s v .
where θ ( 0 , 2 π ) denotes the sensing radian and 2 π θ is referred to the transmission radian. Additionally, γ = | h p | 2 P x σ 2 is the signal-to-noise ratio (SNR) of the sensing signal at the EH-UAV, and f s is the sampling frequency. Q ( . ) is complement of the standard normal distribution function, often denoted as Q ( x ) = x 1 2 π e t 2 2 d t , and is simply referred to as the Q - f u n c t i o n . This represents the tail probability of the standard Gaussian distribution [21].
Based on Equations (4) and (5), the P f a with the target P d , i.e., P f a as a function of P d , is expressed as [22]
P f a = Q 2 γ + 1 Q ( P d ) + r θ f s v γ .

4. Residual Energy Analysis

The sensing and transmission durations, i.e., t and T d , respectively, are given by
t = r θ v ,
T d = r ( 2 π θ ) v .
Moreover, the spectrum sensing distance d s is given by,
d s = r 2 + h 2
Given Equations (7) and (8), we can investigate the residual energy for both durations.

4.1. Sensing Phase

In the sensing phase, the harvested energy by the EH-UAV is given as
E H , s = r v θ ( 1 ρ ) η P p ,
where η is the energy conversion efficiency of the EH circuit. P p denotes the average power of the received signal, which is defined as P p = P o n ( | h p | 2 P x + σ 2 ) + P o f f σ 2 . In general, the EH unit cannot harvest energy when the channel is idle, i.e., when only the noise is received. However, interference from other transmitters, e.g., from another cell, can be regarded as noise. In such a case, the EH unit can harvest energy even though the amount of harvested energy is negligible. Therefore, we consider both the cases where the primary signal is in O N and O F F states. The EH-UAV requires energy to operate the EH circuit, and it is independent of the instantaneous received signal power. The energy consumed for operating the EH unit is given as
E C 1 , s = r v θ ( 1 ρ ) P w ,
where P w is the fixed power consumption to run the EH unit. For spectrum sensing, the EH-UAV also consumes a fixed power P δ [23]. Hence, the energy consumption in spectrum sensing is given as
E C 2 , s = r v θ P δ ,
From Equations (10)–(12), the residual energy, i.e., difference between the harvested and consumed energies, is given as
E R , s = E H , s E C 1 , s E C 2 , s r v θ 1 ρ η P p P w P δ .

4.2. Transmission Phase

In the transmission phase, the harvested energy can be obtained as
E H , t = r v ( 2 π θ ) η P t ,
where P t is the average power of the received signal, which is defined as P t = P o n P d ( | h p | 2 P x + σ 2 ) + P o f f P f a σ 2 . The energy consumed during the IT procedure is expressed as
E C 1 , t = r v ( 2 π θ ) P i t ,
where P i t is the average power consumption for the secondary data transmission, which is defined as P i t = P o n ( 1 P d ) P t x + P o f f ( 1 P f a ) P t x . Here, P t x is the power of the transmit signal. Moreover, the energy consumed for operating the EH unit is given as
E C 2 , t = r v ( 2 π θ ) P w P b c ,
where P w is the fixed power consumption for EH operation and P b c = P d P o n + P f a P o f f is the probability that the EH operation is working when the EH-UAV senses the channel to be busy, i.e., detection and false alarm events.
From Equations (14)–(16), the residual energy in the transmission phase is given as,
E R , t = E H , t E C 1 , t E C 2 , t = r v ( 2 π θ ) η P t P i t P w P b c .

4.3. Total Residual Energy

With Equations (13) and (17), the total residual energy after a single flight period ( 2 π ) of the EH-UAV can be written as
E R , T o t = E R , s + E R , t = r v θ 1 ρ η P p P w P δ + r v ( 2 π θ ) η P t P i t P w P b c = r v θ 1 ρ η P o n ( | h p | 2 P x + σ 2 ) + P o f f σ 2 P w P δ + r v ( 2 π θ ) η P o n P d ( | h p | 2 P x + σ 2 ) + P o f f P f a σ 2 P o n ( 1 P d ) P t x + P o f f ( 1 P f a ) P t x P w P d P o n + P f a P o f f

5. Connection and Secrecy Outage Probabilities

The main objective of the EH-UAV integrated CR system is to use the primary spectrum for its opportunistic transmissions [24,25,26]. Under such an objective, we consider the connection, and secrecy outage probabilities as the performance metrics for reliable and secure communications, respectively. The connection outage probability measures the reliability of the communication link between EH-UAV and SR without E. Similarly, the secrecy outage probability is considered as a performance measure of secure communication between EH-UAV and SR in the presence of E.

5.1. Connection Outage Probability

The connection outage probability is defined as the probability that the spectral efficiency (channel capacity) of the UAV-SR link ( C C R ) falls below the target transmission rate ( R S 1 ) [27]. Thus, the connection outage probability is expressed as
P S . O u t = P r ( C C R < R S 1 ) .
Here, C C R is expressed as
C C R = ( 2 π θ ) 2 π P o f f ( 1 P f a ) log 2 ( 1 + γ C R ) ,
where γ C R is the SNR at the SR, and is defined as γ C R = | h l | 2 σ s r 2 P t x . Here, h l denotes the channel coefficient of the secondary link between the UAV and SR, and σ s r 2 is the noise variances at the SR. Similar to | h p | 2 , the channel power gain | h l | 2 follows an exponential distribution with a mean of ω l , i.e., | h l | 2 E x p ( 1 ω l ) . Equivalently, the connection outage probability in term of γ C R is rewritten as
P S . O u t = P r γ C R < 2 R S 1 2 π P o f f ( 1 P f a ) ( 2 π θ ) 1 .
For the evaluation of connection outage probability, the distribution of γ C R is needed. Considering the exponential distribution, | h l | 2 E x p 1 ω l , the connection outage probability is simplified as
P S . O u t = 1 e x p σ s r 2 2 R S 1 2 π P o f f ( 1 P f a ) ( 2 π θ ) 1 P t x ω l .

5.2. Secrecy Outage Probability

As a performance measure of PLS, the secrecy capacity ( C s ) defined as the difference between the capacity of UAV-SR link ( C C R ) and that of the UAV-E link ( C e ) is given as [28],
C s = C C R C e + ,
where [ x ] + = max ( x , 0 ) denotes the larger value between x and 0. Moreover, C C R is given in Equation (20) and C e is defined as
C e = ( 2 π θ ) 2 π P o f f ( 1 P f a ) log 2 1 + | h e | 2 σ e 2 P t x ,
where h e denotes the channel coefficient of the eavesdropping link between the UAV and E, and σ e 2 is the noise variances at E. The channel power gain | h e | 2 follows an exponential distribution with mean ω e .
The secrecy outage probability is defined as the probability that the C s falls below a target secrecy rate ( R S 2 ), and is expressed as
P S e c . O u t = P r C s < R S 2 = P r 1 + | h l | 2 σ s r 2 P t x 1 + | h e | 2 σ e 2 P t x < 2 R S 2 2 π P o f f ( 1 P f a ) ( 2 π θ ) .
Equation (25) can be rewritten as
P S e c . O u t = P r | h l | 2 < σ s r 2 2 R S 2 2 π P o f f ( 1 P f a ) ( 2 π θ ) 1 P t x + | h e | 2 σ s r 2 2 R S 2 2 π P o f f ( 1 P f a ) ( 2 π θ ) σ e 2 .
To evaluate the secrecy outage probability, the distribution of SNRs for the UAV-SR and UAV-E links are required. Considering the distributions | h l | 2 E x p 1 ω l and | h e | 2 E x p 1 ω e , the connection outage probability is obtained as
P S e c . O u t = 0 1 e x p σ s r 2 2 R S 2 2 π P o f f ( 1 P f a ) ( 2 π θ ) 1 ω l P t x σ s r 2 2 R S 2 2 π P o f f ( 1 P f a ) ( 2 π θ ) ω l σ e 2 z × 1 ω e e x p z ω e d z .
By simplifying Equation (27), the secrecy outage probability is expressed as
P S e c . O u t = 1 σ e 2 ω l σ e 2 ω l + 2 R S 2 2 π P o f f ( 1 P f a ) ( 2 π θ ) σ s r 2 ω e e x p σ s r 2 2 R S 2 2 π P o f f ( 1 P f a ) ( 2 π θ ) 1 ω l P t x .

6. Maximization of Total Residual Energy

The total residual energy and two outage probabilities, including imperfect sensing, i.e., false alarm and detection probabilities, are too complicated to formulate and solve as an optimization problem, i.e., to maximize the total residual energy under outage constraints. For making the optimization problem tractable, the perfect spectrum sensing is assumed, i.e., P d = 1 and P f a = 0 . Under this assumption, the approximated total residual energy ( E ˜ R , T o t ), the approximated connection and secrecy outage probabilities ( P ˜ S . O u t ), ( P ˜ S e c . O u t ), respectively, are simplified. With these approximated expressions, we consider the relaxed (approximated) optimization problems. To make the approximation reasonable, a high primary signal power is assumed, i.e., | h p | 2 P x σ 2 .
Two maximization problems of E ˜ R , T o t are considered under two separate constraints: the connection outage probability constraint ( P ˜ S . O u t φ 1 ) , and secrecy outage probability constraint ( P ˜ S e c . O u t φ 2 ) . φ 1 and φ 2 denote the connection and secrecy outage constraint thresholds, respectively.

6.1. Residual Energy Maximization under Connection Outage Constraint

In this subsection, a connection outage constraint is considered for a scenario without E. The optimization problem to maximize the residual energy with a connection outage constraint is formulated as
max θ , P t x E ˜ R , T o t ( θ , P t x ) s . t . P ˜ S . O u t θ , P t x φ 1 .
The optimization problem includes two variables: the length of the sensing phase ( θ ) and the transmit power ( P t x ). To find the optimal pair, θ o and P t x o , i.e., the solution to Equation (29), we consider two subproblems with each variable while fixing the other variable.
First, the optimization problem with respect to θ with a fixed P t x is considered as follows:
max θ r v θ 1 ρ η P o n | h p | 2 P x P w P δ + r v 2 π θ η P o n | h p | 2 P x P o n P w P o f f P t x s . t . 1 e x p σ s r 2 2 R S 1 2 π P o f f ( 2 π θ ) 1 P t x ω l φ 1 .
For finding the solution, the characteristics of the objective and constraint functions, i.e., the approximated residual energy and connection outage probability, with respect to θ are investigated.
Lemma 1.
For a fixed P t x , E ˜ R , T o t θ , and P ˜ S . O u t θ are monotonically increasing functions of θ.
Proof. 
Under a general system configuration, the power harvested in the sensing phase 1 ρ η P o n | h p | 2 P x P w P δ is larger than the energy harvested in the transmission phase η P o n | h p | 2 P x P o n P w P o f f P t x . Otherwise, the optimal approach to maximize the residual energy is θ = 0 , which becomes a trivial solution. Therefore, E ˜ R , T o t ( θ ) is a linearly increasing function of θ . The capacity of the secondary link C C R linearly decreases with θ under the perfect sensing assumption because the transmission duration linearly decreases with θ . Hence, the connection outage probability is also a monotonically increasing function of θ . □
Based on Lemma 1, we can find the solution to Equation (30) as follows:
Lemma 2.
For a fixed P t x , the θ maximizing the total residual energy under a connection outage constraint, i.e., the solution to Equation (30), is given as
θ o = 2 π R S 1 2 π P o f f log 2 1 P t x ω l ln ( φ ¯ 1 ) σ s r 2 1
where φ ¯ 1 = 1 φ 1 .
Proof. 
The objective function E ˜ R , T o t monotonically increases with θ , therefore the optimal policy is to increase θ while satisfying the constraint. Additionally, the connection outage probability is also an increasing function of θ . Therefore, the θ at which the connection outage probability approaches its upper bound is considered. Hence, the solution to Equation (30) is θ o such that P ˜ S . O u t θ o = φ 1 . □
Next, the optimization problem with respect to P t x with a fixed θ is formulated as
max P t x r v θ 1 ρ η P o n | h p | 2 P x P w P δ + r v 2 π θ η P o n | h p | 2 P x P o n P w P o f f P t x s . t . 1 e x p σ s r 2 2 R S 1 2 π P o f f ( 2 π θ ) 1 P t x ω l φ 1 .
By investigating the objective and constraint functions with respect to P t x , we can find the following property and the solution to Equation (32).
Lemma 3.
For a given θ, E ˜ R , T o t P t x and P ˜ S . O u t P t x are monotonically decreasing functions of P t x
Proof. 
The secondary transmission power P t x is the consumed power in the transmission phase. Therefore, it can be shown that E ˜ R , T o t P t x monotonically decreases with P t x . Form the formula for connection outage probability, it is also shown that P ˜ S . O u t P t x is a monotonically decreasing function of P t x . □
Based on Lemma 3, we can find the solution to Equation (32) as follows:
Lemma 4.
For a fixed θ, the P t x maximizing the total residual energy with a constraint of the connection outage probability is given by
P t x o = σ s r 2 ω l ln ( φ ¯ 1 ) 1 2 R S 1 2 π P o f f ( 2 π θ )
Proof. 
With the same approach in the proof of Lemma 2, it can easily be shown that the solution to Equation (32) is P t x o such that P ˜ S . O u t P t x o = φ 1 . □
In the procedure to find the solutions to both subproblems, it is shown that both solutions are obtained when the inequality constraint is satisfied with equality. Thus, we can conclude that the joint optimal solution satisfies the outage constraint at the boundary, i.e., P ˜ S . O u t = φ 1 . Based on this observation, the original joint optimization problem with two variables is converted into two optimization problems with a single variable with respect to θ and P t x . The first problem is given as
max P t x E ˜ R , T o t ( θ o , P t x )
where E ˜ R , T o t ( θ o , P t x ) is defined by substituting E ˜ R , T o t ( θ , P t x ) with θ o in Lemma 2. The other problem is expressed as
max θ E ˜ R , T o t ( θ , P t x o )
where E ˜ R , T o t ( θ , P t x o ) is defined by substituting E ˜ R , T o t ( θ , P t x ) with P t x o in Lemma 4. The objective functions of both Equations (34) and (35), E ˜ R , T o t ( θ o , P t x ) and E ˜ R , T o t ( θ , P t x o ) , are the concave functions of P t x and θ , respectively. The concavity of both functions is shown in a numerical way. Based on the concavity of the objective functions, we can solve one of the problems of Equations (34) and (35) using the first-order optimality conditions d E ˜ R , T o t ( θ o , P t x ) d P t x = 0 and d E ˜ R , T o t ( θ , P t x o ) d θ = 0 , respectively. However, the closed-form expression is hard to obtain. As an alternative, we can solve the standard convex optimization problem using a numerical method, e.g., gradient descent and steepest descent algorithms. After finding P t x o (or θ o ) with a numerical method, the remaining solution θ o (or P t x o ) can be obtained using the equality constraint, i.e., P ˜ S , O u t ( θ o , P t x o ) = φ 1 .

6.2. Residual Energy Maximization under Secrecy Outage Constraint

We now consider a scenario with E. To avoid eavesdropping, a secrecy outage probability with a given threshold φ 2 is considered as a constraint. The optimization problem to maximize the residual energy with a secrecy outage constraint is formulated as
max θ , P t x E ˜ R , T o t ( θ , P t x ) s . t . P ˜ S e c . O u t θ , P t x φ 2 .
To find a jointly optimal solution to Equation (36), i.e., θ * and P t x * , we consider two subproblems as in the previous subsection. The first subproblem, i.e., the optimization problem with respect to θ with a fixed P t x , is as follows:
max θ r v θ 1 ρ η P o n | h p | 2 P x P w P δ + r v 2 π θ η P o n | h p | 2 P x P o n P w P o f f P t x s . t . 1 σ e 2 ω l σ e 2 ω l + 2 R S 2 2 π P o f f ( 2 π θ ) σ s r 2 ω e e x p σ s r 2 2 R S 2 2 π P o f f ( 2 π θ ) 1 ω l P t x φ 2 .
In addition to Lemma 1, it can be readily shown that the approximated secrecy outage probability P ˜ S e c , O u t ( θ ) with a fixed P t x is a monotone increasing function of θ . Similar to Lemma 2, the solution to Equation (37) can be obtained
Lemma 5.
For a fixed P t x , the optimal solution to Equation (37) is given by θ * such that P ˜ S e c , O u t ( θ * ) = φ 2 . Especially, when SNR of the legitimate link is much higher than that of the eavesdropping link, i.e., ω l σ s r 2 ω e σ e 2 , the optimal θ * can be approximated given by
θ * 2 π R S 2 2 π P o f f log 2 ω l ln ( φ ¯ 2 ) + σ s r 2 P t x σ s r 2 P t x + σ s r 2 ω e σ e 2 1
where φ ¯ 2 = 1 φ 2 .
Proof. 
Same as in the proof of Lemma 2, it can be easily shown that the solution to Equation (37) is θ * such that P ˜ S e c . O u t θ * = φ 2 . Additionally, we have
P ˜ S e c . O u t θ * = φ 2 φ ¯ 2 = 1 + 2 R S 2 2 π P o f f ( 2 π θ * ) σ s r 2 ω e σ e 2 ω l 1 e x p σ s r 2 2 R S 2 2 π P o f f ( 2 π θ * ) 1 ω l P t x ln φ ¯ 2 = ln 1 + 2 R S 2 2 π P o f f ( 2 π θ * ) σ s r 2 ω e σ e 2 ω l σ s r 2 2 R S 2 2 π P o f f ( 2 π θ * ) 1 ω l P t x ln φ ¯ 2 2 R S 2 2 π P o f f ( 2 π θ * ) σ s r 2 ω e σ e 2 ω l σ s r 2 2 R S 2 2 π P o f f ( 2 π θ * ) 1 ω l P t x .
In Equation (39), we use that ln ( 1 + x ) x when x 1 . By rearranging the last equation with respect to θ * , we can complete the proof. □
The second subproblem, i.e., the optimization problem with respect to P t x with a fixed θ is formulated as
max P t x r v θ 1 ρ η P o n | h p | 2 P x P w P δ + r v 2 π θ η P o n | h p | 2 P x P o n P w P o f f P t x s . t . 1 σ e 2 ω l σ e 2 ω l + 2 R S 2 2 π P o f f ( 2 π θ ) σ s r 2 ω e e x p σ s r 2 2 R S 2 2 π P o f f ( 2 π θ ) 1 ω l P t x φ 2 .
The objective and constraint functions in Equation (40) are both monotonically decreasing functions of P t x . Thus, the solution to Equation (40) can be obtained as follows:
Lemma 6.
For a fixed θ, the solution to Equation (40) is given by
P t x * = σ s r 2 ω l 2 R S 2 2 π P o f f ( 2 π θ ) 1 ln σ e 2 ω l 2 R S 2 2 π P o f f ( 2 π θ ) φ ¯ 2 σ s r 2 ω e + φ ¯ 2 σ e 2 ω l 1
Proof. 
With the same approach to the proof of Lemma 4, it can be easily shown that the solution to Equation (40) is P t x * such that P ˜ S e c . O u t P t x * = φ 2 . Therefore, we can rewrite as follow:
P ˜ S e c . O u t P t x * = φ 2 1 φ 2 = σ e 2 ω l 2 R S 2 2 π P o f f ( 2 π θ ) σ s r 2 ω e + σ e 2 ω l e x p σ s r 2 2 R S 2 2 π P o f f ( 2 π θ ) 1 ω l P t x * ln φ ¯ 2 = ln σ e 2 ω l 2 R S 2 2 π P o f f ( 2 π θ ) σ s r 2 ω e + σ e 2 ω l σ s r 2 2 R S 2 2 π P o f f ( 2 π θ ) 1 ω l P t x *
Rearranging Equation (42), we can have Equation (41) □
From Lemmas 5 and 6, it can be seen that the joint optimal solution holds P ˜ S e c . O u t = φ 2 . Thus, the original joint optimization problem with two variables is converted into two optimization problems as follows:
max P t x E ˜ R , T o t ( θ * , P t x )
where E ˜ R , T o t ( θ * , P t x ) denotes E ˜ R , T o t ( θ , P t x ) with θ = θ * in Lemma 5, and
max θ E ˜ R , T o t ( θ , P t x * )
where E ˜ R , T o t ( θ , P t x * ) is defined by substituting E ˜ R , T o t ( θ , P t x ) with P t x * in Lemma 6.
Here, we can numerically verify that E ˜ R , T o t ( θ * , P t x ) and E ˜ R , T o t ( θ , P t x * ) are the concave functions of P t x and θ , respectively. Therefore, we can numerically find the final solution with a same way in the previous subsection.

7. Numerical Results and Discussion

In this section, we perform the numerical simulations to verify the analytical results and provide a discussion of the results. We summarize the default system configuration (unless otherwise stated) in Table 1. The values of parameters are set to validate the behavior of system. The exact functions with lower values of sensing error, i.e., P d = 0.85 , are considered to compute the performance evaluation in term of the residual energy.
Figure 2a validates that E ˜ R , T o t , P ˜ S . O u t , and P ˜ S e c . O u t are the monotonically increasing functions with respect to θ for a fixed P t x . The maximum of E ˜ R , T o t is achieved at the upper bound of θ , whereas the lower-bound provides the maximum of P ˜ S . O u t and P ˜ S e c . O u t . Thus, the optimal policy to maximize the total residual energy is to increase θ and decrease P t x . In contrast, Figure 2b verifies that E ˜ R , T o t , P ˜ S . O u t , and P ˜ S e c . O u t are the monotonically decreasing functions with respect to P t x for a given θ . The maximum E ˜ R , T o t is obtained with the lower-bound of P t x , whereas the upper-bound provides the maximum of P ˜ S . O u t and P ˜ S e c . O u t . Here, decreasing θ and increasing P t x is optimal from the perspective of connection and secrecy outage performances without the consideration of residual energy. These results exhibit the inherent trade-off between the residual energy and transmission performances for an EH-UAV.
Figure 3 shows the variations of E ˜ R , T o t for the EH splitting ratio ( ρ ) depending on θ = { π / 2 , π } and P t x = { 50 , 90 } mW. It is seen that E ˜ R , T o t is a decreasing function with respect to ρ . A higher E ˜ R , T o t is achieved with the lower values of ρ because ( 1 ρ )-fraction of the received power is used for the EH process. Figure 4a shows the connection and secrecy outage probabilities, P ˜ S . O u t and P ˜ S e c . O u t , respectively, as the functions of the expected channel gain, ω l . The secondary channel and secrecy capacities, C C R , and C s , respectively, increase with ω l . Thus, both P ˜ S . O u t , and P ˜ S e c . O u t decrease with the increase in ω l . Figure 4b shows that both the connection and secrecy outage probabilities increase with the target transmission rate ( R S 1 ) and target secrecy rate ( R S 2 ), respectively.
In addition, from Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6, it can be seen that the approximated E ˜ R , T o t , P ˜ S . O u t , and P ˜ S e c . O u t with the perfect channel sensing are sufficiently accurate to be used in the proposed optimization problems instead of the exact values.
Figure 5a,b depict the total residual energies and their approximations under P ˜ S . O u t φ 1 and P ˜ S e c . O u t φ 2 , respectively, over θ . Similarly, Figure 6a,b show the exact and approximated residual energies with the constraints of connection and secrecy outage probabilities, respectively, over P t x . For Figure 5 and Figure 6, R S 1 and R S 2 are set at 0.25 bps/Hz, and 0.55 bps/Hz, respectively. Moreover, φ 1 and φ 2 are set at 0.28. In Figure 5a,b, P t x associated with θ is determined optimally using Lemmas 2 and 5, respectively. Under the considered scenarios, a higher θ results in the higher P t x because a large θ during the flight leads to a decrease in the length of transmission phase ( 2 π θ ), which results in higher P t x requirements to meet the target rates, R S 1 and R S 2 . Thus, it can be inferred that initially, with a large θ , E ˜ R , T o t increases since the EH-UAV gets more opportunities to harvest the energy during its flight. After reaching the maximum point, E ˜ R , T o t goes on decreasing with P t x to meet the target rate. A similar phenomenon is observed in Figure 6a,b, with the higher P t x resulting in higher E ˜ R , T o t initially. The reason is that the increment in P t x also increases θ , which is proportional to the opportunities available for EH-UAV to harvest the energy. After achieving the maximum point, E ˜ R , T o t decreases with the P t x , since any further increase leads to only a small increment in θ . From the Figure 5,b, it is observed that the maximum value of θ , i.e., 7 π / 6 rad. and 5 π / 4 rad., in the absence and presence of E, respectively, which validate the numerically obtained solutions to Equations (35) and (44), respectively. In Figure 6a,b, the maximum value of P t x is 8 mW, and 0.03 W, in the absence and presence of E, respectively, and validate the numerically obtained solutions to Equations (34) and (43), respectively. One of the important observations in Figure 5 and Figure 6 is that the four different residual energy functions are the concave functions with respect to θ or P t x when the other variable is optimally determined by the equality constraints.
Finally, Figure 7a,b show the numerically obtained joint optimal solution pairs to the optimization problems in Equations (29) and (36), i.e., ( θ o , P t x o ) and ( θ * , P t x * ), respectively. It can be observed that the P t x * > P t x o and θ * > θ o , which validates the fact that the EH-UAV must increase its P t x to meet R S 2 in the presence of E. This, in turn, reduces the required length of transmit phase ( 2 π θ ) for EH-UAV, and consequently the value of θ also increases. Thus, the requirements for the optimal P t x and θ also increase. Our results identify the requirements of P t x and θ for the maximization of residual energy while maintaining reliable and secure communications (in the presence and absence of E, respectively), and provide the guidelines in designing an energy-harvesting UAV-based CR system.

8. Conclusions

Cognitive radio (CR) is a promising enabler communication technology to mitigate the spectrum scarcity and under-utilization issues in futuristic networks such as the IoT and 5G. The integration of UAVs in CR systems enhances the sensing performance. The wireless energy harvesting technique effectively alleviates the energy scarcity in the UAV-enabled wireless networks. Furthermore, most of the UAV based scenarios demand reliable and secure communications. In this paper, we considered that the UAV, with the limited energy-budget and a circular flight track (around a ground-mounted primary transmitter), harvests RF energy from the primary transmissions and uses the primary spectrum opportunistically. The closed-form analytical expressions for the residual energy, connection, and secrecy outage probabilities were derived to investigate the performances of energy-harvesting, reliable, and secure communications, in the absence and presence of an eavesdropper, respectively. The optimization problems were constructed by exploiting the trade-off between monotonic approximated functions, and the analytical solutions, i.e., the optimal lengths of sensing phase and transmit powers, are identified under two different scenarios for the UAV. The numerical simulations verified the proposed theoretical analysis, and demonstrated the impact of system parameters on the residual energy performance while ensuring the reliable and secure communication for UAV.

Author Contributions

Conceptualization, W.K.; methodology, W.K. and H.Y.; validation: W.K. and H.Y.; formal analysis: W.K. and H.Y.; writing—original draft preparation, W.K.; writing—review and editing, H.Y. and S.N.; supervision: H.Y. and S.N. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Research Foundation of Korea grant funded by the Korean government (Ministry of Science and ICT; 2019R1A2C1083988), and by the Ministry of Science and ICT, Korea, under the Information Technology Research Center support program (IITP-2020-2016-0-00313) and supervised by the Institute for Information & Communications Technology Planning & Evaluation.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wang, D.; Chen, D.; Song, B.; Guizani, N.; Yu, X.; Du, X. From IoT to 5G I-IoT: The next generation IoT-based intelligent algorithms and 5G technologies. IEEE Commun. Mag. 2018, 56, 114–120. [Google Scholar] [CrossRef]
  2. Yu, H.; Lee, H.; Jeon, H. What is 5G? Emerging 5G mobile services and network requirements. Sustainability 2017, 9, 1848. [Google Scholar] [CrossRef] [Green Version]
  3. Yu, H. Optimal primary pilot power allocation and secondary channel sensing in cognitive radios. IET Communications 2016, 10, 487–494. [Google Scholar] [CrossRef]
  4. Salameh, H.A.B.; Almajali, S.; Ayyash, M.; Elgala, H. Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet Things J. 2018, 5, 1904–1913. [Google Scholar] [CrossRef]
  5. Khalid, W.; Yu, H. Sensing and utilization of spectrum with cooperation interference for full-duplex cognitive radio networks. In Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Zagreb, Croatia, 2–5 July 2019; pp. 598–600. [Google Scholar]
  6. Han, R.; Gao, Y.; Wu, C.; Lu, D. An Effective multi-objective optimization algorithm for spectrum allocations in the cognitive-radio-based internet of things. IEEE Access 2018, 6, 12858–12867. [Google Scholar] [CrossRef]
  7. Hu, F.; Chen, B.; Zhu, K. Full spectrum sharing in cognitive radio networks toward 5G: A survey. IEEE Access 2018, 6, 15754–15776. [Google Scholar] [CrossRef]
  8. Zhang, J.; Pan, G.; Wang, H.M. On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system. IEEE Access 2016, 4, 3887–3893. [Google Scholar] [CrossRef]
  9. Yu, H.; Lee, I.G. Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay. Future Gener. Comput. Syst. 2020, 102, 611–618. [Google Scholar] [CrossRef]
  10. Tin, P.T.; Hung, D.; Nguyen, T.N.; Duy, T.T.; Voznak, M. Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments. Entropy 2019, 21, 217. [Google Scholar] [CrossRef] [Green Version]
  11. Rahman, M.A.; Lee, Y.D.; Koo, I. Joint relay selection and power allocation through a genetic algorithm for secure cooperative cognitive radio networks. Sensors 2018, 18, 3934. [Google Scholar] [CrossRef] [Green Version]
  12. Xiong, R.; Shan, F. DroneTank: Planning UAVs’ flights and sensors’ data transmission under energy constraints. Sensors 2018, 18, 2913. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. Liu, X.; Guan, M.; Zhang, X.; Ding, H. Spectrum sensing optimization in an UAV-based cognitive radio. IEEE Access 2018, 6, 44002–44009. [Google Scholar] [CrossRef]
  14. Khalid, W.; Yu, H. Residual energy analysis with physical-layer security for energy-constrained UAV cognitive Radio Systems. In Proceedings of the 2020 International Conference on Electronics Information, and Communication (ICEIC), Barcelona, Spain, 19–22 January 2020; pp. 1–3. [Google Scholar]
  15. Zhang, F.; Jing, T.; Huo, Y.; Jiang, K. Outage probability minimization for energy harvesting cognitive radio sensor networks. Sensors 2017, 17, 224. [Google Scholar] [CrossRef] [PubMed]
  16. Banerjee, A.; Maity, S.; Roy, S. On residual energy maximization in energy harvesting cognitive radio network. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar]
  17. Gao, Y.; He, H.; Deng, Z.; Zhang, X. Cognitive radio network with energy-harvesting based on primary and secondary user signals. IEEE Access 2018, 6, 9081–9090. [Google Scholar] [CrossRef]
  18. Werner, J.; Wang, J.; Hakkarainen, A.; Valkama, M.; Cabric, D. Primary user localization in cognitive radio networks using sectorized antennas. In Proceedings of the 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Banff, AB, Canada, 18–20 March 2013; pp. 155–161. [Google Scholar]
  19. Khalid, W.; Yu, H. Sum utilization of spectrum with spectrum handoff and imperfect sensing in interweave multi-channel cognitive radio networks. Sustainability 2018, 10, 1764. [Google Scholar] [CrossRef] [Green Version]
  20. Ozger, M.; Akan, O.B. On the utilization of spectrum opportunity in cognitive radio networks. IEEE Commun. Lett. 2016, 20, 157–160. [Google Scholar] [CrossRef]
  21. Khalid, W.; Yu, H. Spatial–temporal sensing and utilization in full duplex spectrum-heterogeneous cognitive radio networks for the internet of things. Sensors 2019, 19, 1441. [Google Scholar] [CrossRef] [Green Version]
  22. Khalid, W.; Yu, H. Optimal sensing performance for cooperative and non-cooperative cognitive radio networks. Int. J. Distrib. Sens. Networks 2017, 13, 1–9. [Google Scholar] [CrossRef]
  23. Ren, J.; Zhang, Y.; Zhang, N.; Zhang, D.; Shen, X. Dynamic channel access to improve energy efficiency in cognitive radio sensor networks. IEEE Trans. Wirel. Commun. 2016, 15, 3143–3156. [Google Scholar] [CrossRef]
  24. Xiang, Z.; Yang, W.; Cai, Y.; Ding, Z.; Song, Y. Secure transmission design in HARQ assisted cognitive NOMA networks. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2528–2541. [Google Scholar] [CrossRef]
  25. Zhang, J.; Kundu, C.; Dobre, O.A.; Garcia-Palacios, E.; Vo, N. Secrecy performance of small-cell networks with transmitter selection and unreliable backhaul under spectrum sharing environment. IEEE Trans. Veh. Technol. 2019, 68, 10895–10908. [Google Scholar] [CrossRef]
  26. Xiang, Z.; Yang, W.; Pan, G.; Cai, Y.; Song, Y. Physical layer security in cognitive radio inspired NOMA network. IEEE J. Sel. Top. Signal Process. 2019, 13, 700–714. [Google Scholar] [CrossRef]
  27. Huynh, T.P.; Son, P.N.; Voznak, M. Secrecy performance of underlay cooperative cognitive network using non-orthogonal multiple access with opportunistic relay selection. Symmetry 2019, 11, 385. [Google Scholar] [CrossRef] [Green Version]
  28. Qin, M.; Yang, S.; Deng, H.; Lee, M.H. Enhancing security of primary user in underlay cognitive radio networks with secondary user selection. IEEE Access 2018, 6, 32624–32636. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Sensors 20 02998 g001
Figure 2. Total residual energy, connection and secrecy outage probabilities, and their approximation under perfect sensing with respect to (a) length of sensing phase (duration) with a fixed transmit power, (b) transmit power for a fixed length of sensing phase.
Figure 2. Total residual energy, connection and secrecy outage probabilities, and their approximation under perfect sensing with respect to (a) length of sensing phase (duration) with a fixed transmit power, (b) transmit power for a fixed length of sensing phase.
Sensors 20 02998 g002
Figure 3. Total residual energy and its approximation with respect to energy harvesting (EH) power splitting ratio for θ = { π / 2 , π } and P t x = { 50 , 90 } mW.
Figure 3. Total residual energy and its approximation with respect to energy harvesting (EH) power splitting ratio for θ = { π / 2 , π } and P t x = { 50 , 90 } mW.
Sensors 20 02998 g003
Figure 4. Monotonic functions of connection outage probability, secrecy outage probability vs. (a) mean (expectation) of | h l | 2 and (b) target rates.
Figure 4. Monotonic functions of connection outage probability, secrecy outage probability vs. (a) mean (expectation) of | h l | 2 and (b) target rates.
Sensors 20 02998 g004
Figure 5. Exact and approximated total residual energy as a function of θ for EH-unmanned aerial vehicle (UAV) under (a) connection outage constraint, (b) secrecy outage constraint.
Figure 5. Exact and approximated total residual energy as a function of θ for EH-unmanned aerial vehicle (UAV) under (a) connection outage constraint, (b) secrecy outage constraint.
Sensors 20 02998 g005
Figure 6. Exact and approximated total residual energy as a function of P t x for EH-UAV under (a) connection outage constraint, (b) secrecy outage constraint.
Figure 6. Exact and approximated total residual energy as a function of P t x for EH-UAV under (a) connection outage constraint, (b) secrecy outage constraint.
Sensors 20 02998 g006
Figure 7. Optimal lengths of sensing phase (duration) and optimal transmit powers for EH-UAV over (a) connection outage threshold ( φ 1 ), (b) secrecy outage threshold ( φ 2 ).
Figure 7. Optimal lengths of sensing phase (duration) and optimal transmit powers for EH-UAV over (a) connection outage threshold ( φ 1 ), (b) secrecy outage threshold ( φ 2 ).
Sensors 20 02998 g007
Table 1. System configuration for numerical simulations.
Table 1. System configuration for numerical simulations.
SymbolDescription
P o f f , P o n 0.50 ( fair model of channel occupancy)
P x 1.05 W
P d 0.85 (interference probability to PT is 15% or less for the imperfect sensing)
ω p 0.95
ω e 0.82
ω l 0.55
η 0.80
ρ 0.10
h100m
σ 2 0.10 W
σ s r 2 0.78 W
σ e 2 0.22 W
P w , P δ 0.50 mW
f s 50 kHz
R S 1 0.30 bps/Hz
R S 2 0.60 bps/Hz

Share and Cite

MDPI and ACS Style

Khalid, W.; Yu, H.; Noh, S. Residual Energy Analysis in Cognitive Radios with Energy Harvesting UAV under Reliability and Secrecy Constraints. Sensors 2020, 20, 2998. https://doi.org/10.3390/s20102998

AMA Style

Khalid W, Yu H, Noh S. Residual Energy Analysis in Cognitive Radios with Energy Harvesting UAV under Reliability and Secrecy Constraints. Sensors. 2020; 20(10):2998. https://doi.org/10.3390/s20102998

Chicago/Turabian Style

Khalid, Waqas, Heejung Yu, and Song Noh. 2020. "Residual Energy Analysis in Cognitive Radios with Energy Harvesting UAV under Reliability and Secrecy Constraints" Sensors 20, no. 10: 2998. https://doi.org/10.3390/s20102998

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop