I. Introduction
Energy harvesting is capable of extracting energy from the surrounding environment, which is emerging as an efficient technique of supplying energy and has been beneficially integrated into cognitive radio (CR) systems [1], [2] for extending the life-time of energy-constrained networks, whilst reducing their deployment cost. There are two widely adopted energy harvesting architectures, namely power splitting (PS) and time switching (TS) [3], [4]. In a PS architecture, the received signal power can be split into two parts, where a certain fraction is used for harvesting energy, while the rest is used for processing the received signal. By contrast, in a TS architecture, the transmission slot is divided into two phases. In the first phase, the system harvests energy from the surrounding environment and the harvested energy is used for transmitting the signal in the second phase. In CR networks, the SUs are vulnerable to both internal as well as to external attacks [5]. Furthermore, due to the broadcast nature of radio propagation, the confidential messages transmitted in the CR networks may become overheard by malicious EDs. Hence, apart from maintaining the reliability of transmission, we have to protect the CR networks against malicious eavesdropping.