Impact of secondary user communication on security communication of primary user