Skip to main content
Erschienen in: Mobile Networks and Applications 4/2015

01.08.2015

Physical Layer Security in Cognitive Radio Based Self-Organization Network

verfasst von: Tianyu Kang, Li Guo

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper focuses on a cognitive radio network (CRN), where both the primary and the secondary users (PUs and SUs) communicate with confidential messages. The secondary network is a distributed wireless self-organization network transmitting messages with collaborative beamforming. A multi-antenna target unknown eavesdropper (TUE), whose wiretap target is not assumed, appears in the CRN. A specific application of spectrum leasing is designed to ensure the secrecy performance of the whole network, in which the SUs access the spectrum in reward of helping improve the secrecy performance of the entire CRN. The transmit signals of the secondary network are designed to ensure the secrecy rate performance of both the primary and the secondary networks. To make it solvable with a method based on parameterizing the power gain region, the secrecy rate balancing problem is relaxed. The relaxation is further proved to be tight and the relaxed problem is equivalent to the original problem. Finally, we use a two-dimensional search to achieve the optimal transmit beamformer. According to the simulation, the proposed beamforming strategy enjoys an obvious performance gain comparing to the traditional zero-forcing beamforming.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Fußnoten
1
Note that we omit the proofs of Lemma 1 and Theorem 1 here, for they could be obtained with the similar methods in [9].
 
Literatur
1.
Zurück zum Zitat Pei Y, Liang Y-C, Zhang L, Teh KC, Li KH (2010) Secure communication over MISO cognitive radio channels. IEEE Trans Wireless Commun 9(4):1494–1502CrossRef Pei Y, Liang Y-C, Zhang L, Teh KC, Li KH (2010) Secure communication over MISO cognitive radio channels. IEEE Trans Wireless Commun 9(4):1494–1502CrossRef
2.
Zurück zum Zitat Pei Y, Liang Y-C, Teh KC, Li KH (2011) Secure communication in multiantenna cognitive radio networks with imperfect channel state information. IEEE Trans Signal Process 59(4):1683–1693MathSciNetCrossRef Pei Y, Liang Y-C, Teh KC, Li KH (2011) Secure communication in multiantenna cognitive radio networks with imperfect channel state information. IEEE Trans Signal Process 59(4):1683–1693MathSciNetCrossRef
3.
Zurück zum Zitat Sarkar MZI, Ratnarajah T (2012) Aspect of security in the cognitive relay assisted interference channels. In: 2012 IEEE information theory workshop (ITW), pp 652–656 Sarkar MZI, Ratnarajah T (2012) Aspect of security in the cognitive relay assisted interference channels. In: 2012 IEEE information theory workshop (ITW), pp 652–656
4.
Zurück zum Zitat Zhang J, Gursoy MC (2011) Secure relay beamforming over cognitive radio channels. In: Information sciences and systems (CISS), pp 1–5 Zhang J, Gursoy MC (2011) Secure relay beamforming over cognitive radio channels. In: Information sciences and systems (CISS), pp 1–5
5.
Zurück zum Zitat Sakran H, Shokair M, Nasr O, El-Rabaie S, El-Azm AA (2012) Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Commun 6(16):2676–2687MathSciNetCrossRef Sakran H, Shokair M, Nasr O, El-Rabaie S, El-Azm AA (2012) Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Commun 6(16):2676–2687MathSciNetCrossRef
6.
Zurück zum Zitat Wu Y, Liu KJR (2011) An information secrecy game in cognitive radio networks. IEEE Trans Inf Forensics Secur 6(3):831–842CrossRef Wu Y, Liu KJR (2011) An information secrecy game in cognitive radio networks. IEEE Trans Inf Forensics Secur 6(3):831–842CrossRef
7.
Zurück zum Zitat Lee K, Chae C-B, Kang J (2013) Spectrum leasing via cooperation for enhanced physical-Layer secrecy. IEEE Trans Veh Technol 62(9):4672–4678CrossRef Lee K, Chae C-B, Kang J (2013) Spectrum leasing via cooperation for enhanced physical-Layer secrecy. IEEE Trans Veh Technol 62(9):4672–4678CrossRef
8.
Zurück zum Zitat Kwon T, Wong VWS, Schober R (2012) Secure MISO cognitive radio system with perfect and imperfect CSI. In: 2012 IEEE global communications conference (GLOBECOM), pp 1236–1241 Kwon T, Wong VWS, Schober R (2012) Secure MISO cognitive radio system with perfect and imperfect CSI. In: 2012 IEEE global communications conference (GLOBECOM), pp 1236–1241
9.
Zurück zum Zitat Mochaourab R, Jorswieck E (2011) Optimal beamforming in interference networks with perfect local channel information. IEEE Trans Signal Process 59(3):1128–1141MathSciNetCrossRef Mochaourab R, Jorswieck E (2011) Optimal beamforming in interference networks with perfect local channel information. IEEE Trans Signal Process 59(3):1128–1141MathSciNetCrossRef
10.
Zurück zum Zitat Ni J, Wong K-K, Fei Z, Xing C, Chen H, Tong K-F, Kuang J (2014) Secrecy-rate balancing for two-user MISO interference channels. IEEE Commun Lett 3(1):6–9CrossRef Ni J, Wong K-K, Fei Z, Xing C, Chen H, Tong K-F, Kuang J (2014) Secrecy-rate balancing for two-user MISO interference channels. IEEE Commun Lett 3(1):6–9CrossRef
11.
Zurück zum Zitat Li Q, Ma W-K (2011) Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming. IEEE Trans Signal Process 59(8):3799–3812MathSciNetCrossRef Li Q, Ma W-K (2011) Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming. IEEE Trans Signal Process 59(8):3799–3812MathSciNetCrossRef
12.
Zurück zum Zitat Park J (2012) Distributed MIMO Ad-hoc networks: link scheduling, power allocation, and cooperative beamforming. IEEE Trans Veh Technol 61(6):2586–2598CrossRef Park J (2012) Distributed MIMO Ad-hoc networks: link scheduling, power allocation, and cooperative beamforming. IEEE Trans Veh Technol 61(6):2586–2598CrossRef
13.
Zurück zum Zitat Dong L, Petropulu AP, Poor HV (2009) Weighted cross-layer cooperative beamforming for wireless networks. IEEE Trans Signal Process 57(8):3240–3252MathSciNetCrossRef Dong L, Petropulu AP, Poor HV (2009) Weighted cross-layer cooperative beamforming for wireless networks. IEEE Trans Signal Process 57(8):3240–3252MathSciNetCrossRef
Metadaten
Titel
Physical Layer Security in Cognitive Radio Based Self-Organization Network
verfasst von
Tianyu Kang
Li Guo
Publikationsdatum
01.08.2015
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2015
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-015-0633-0

Weitere Artikel der Ausgabe 4/2015

Mobile Networks and Applications 4/2015 Zur Ausgabe

Neuer Inhalt