Skip to main content
Erschienen in: Mobile Networks and Applications 1/2020

12.12.2018

Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter

verfasst von: Khuong Ho-Van, Thiem Do-Dac

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Interference from primary transmitters in underlay cognitive networks is practically neither neglected nor integrated into noise terms although most literature inversely addressed. This paper firstly employs a helpful jammer to secure information transmission of a secondary transmitter. Then, its efficacy through secrecy outage probability under practical considerations consisting of exponentially distributed interference from primary transmitter, peak transmission power limitation, interference power limitation, and Rayleigh fading channels are analytically assessed. Finally, results are provided to illustrate significant security performance improvement thanks to exploiting the jammer while considerable security performance degradation due to interference from primary transmitter.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
This can be alternatively interpreted that jamming signal is transmitted in the null space to SD or shared with SD (e.g., use the seed of the jamming signal generator in a secure manner). Such interpretations are widely accepted in open literature (e.g., [1720, 22, 2729] and references therein).
 
Literatur
1.
Zurück zum Zitat Panwar N, Sharma S, Singh AK (2016) A survey on 5G: the next generation of mobile communication. Elsevier Physical Communication 18(2):64–84CrossRef Panwar N, Sharma S, Singh AK (2016) A survey on 5G: the next generation of mobile communication. Elsevier Physical Communication 18(2):64–84CrossRef
2.
Zurück zum Zitat Tavana M, Rahmati A, Shah-Mansouri V, Maham B (2017) Cooperative sensing with joint energy and correlation detection in cognitive radio networks. IEEE Commun Lett 21(1):132–135CrossRef Tavana M, Rahmati A, Shah-Mansouri V, Maham B (2017) Cooperative sensing with joint energy and correlation detection in cognitive radio networks. IEEE Commun Lett 21(1):132–135CrossRef
3.
Zurück zum Zitat Ho-Van K (2016) Exact outage probability analysis of proactive relay selection in cognitive radio networks with MRC receivers. IEEE/KICS Journal of Communications and Networks 18(3):288–298CrossRef Ho-Van K (2016) Exact outage probability analysis of proactive relay selection in cognitive radio networks with MRC receivers. IEEE/KICS Journal of Communications and Networks 18(3):288–298CrossRef
4.
Zurück zum Zitat Darsena D, Gelli G, Verde F (2017) An opportunistic spectrum access scheme for multicarrier cognitive sensor networks. IEEE Sensors J 17(8):2596–2606CrossRef Darsena D, Gelli G, Verde F (2017) An opportunistic spectrum access scheme for multicarrier cognitive sensor networks. IEEE Sensors J 17(8):2596–2606CrossRef
5.
Zurück zum Zitat Liu Y, Chen H, Wang L (2017) Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutorials 19(1):347–376. First QuarterCrossRef Liu Y, Chen H, Wang L (2017) Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutorials 19(1):347–376. First QuarterCrossRef
6.
Zurück zum Zitat Sharma R, Rawat D (2015) Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun Surv Tutorials 17(2):1023–1043CrossRef Sharma R, Rawat D (2015) Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun Surv Tutorials 17(2):1023–1043CrossRef
7.
Zurück zum Zitat Gan Z, Li-Chia C, Kai-Kit W (2011) Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans Sig Processing 59(3):1317–1322MathSciNetCrossRef Gan Z, Li-Chia C, Kai-Kit W (2011) Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans Sig Processing 59(3):1317–1322MathSciNetCrossRef
8.
Zurück zum Zitat Zhihui S, Yi Q, Song C (2013) On physical layer security for cognitive radio networks. IEEE Netw 27:28–33CrossRef Zhihui S, Yi Q, Song C (2013) On physical layer security for cognitive radio networks. IEEE Netw 27:28–33CrossRef
9.
Zurück zum Zitat Yulong Z, Jia Z, Liuqing Y, Ying-chang L, Yu-dong Y (2015) Securing physical-layer communications for cognitive radio networks. IEEE Commun Mag 53:48–54 Yulong Z, Jia Z, Liuqing Y, Ying-chang L, Yu-dong Y (2015) Securing physical-layer communications for cognitive radio networks. IEEE Commun Mag 53:48–54
10.
Zurück zum Zitat Li J, Feng Z, Feng Z, Zhang P (2015) A survey of security issues in cognitive radio networks. China Communications 12:132– 150CrossRef Li J, Feng Z, Feng Z, Zhang P (2015) A survey of security issues in cognitive radio networks. China Communications 12:132– 150CrossRef
11.
Zurück zum Zitat Zheng TX, Wang HM (2016) Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers. IEEE Trans Veh Tech 65(10):8812–8817CrossRef Zheng TX, Wang HM (2016) Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers. IEEE Trans Veh Tech 65(10):8812–8817CrossRef
12.
Zurück zum Zitat Hu J, Cai Y, Yang N, Zhou X, Yang W (2017) Artificial-noise-aided secure transmission scheme with limited training and feedback overhead. IEEE Trans Wire Commun 16(1):193–205CrossRef Hu J, Cai Y, Yang N, Zhou X, Yang W (2017) Artificial-noise-aided secure transmission scheme with limited training and feedback overhead. IEEE Trans Wire Commun 16(1):193–205CrossRef
13.
Zurück zum Zitat Wang C, Wang HM (2014) On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans Inf Forensics Secur 9(11):1814–1827CrossRef Wang C, Wang HM (2014) On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans Inf Forensics Secur 9(11):1814–1827CrossRef
14.
Zurück zum Zitat Ho-Van K (2015) Outage analysis in cooperative cognitive networks with opportunistic relay selection under imperfect channel information. Int J Electron Commun 69(11):1700–1708CrossRef Ho-Van K (2015) Outage analysis in cooperative cognitive networks with opportunistic relay selection under imperfect channel information. Int J Electron Commun 69(11):1700–1708CrossRef
15.
Zurück zum Zitat Wang D, Ren P, Du Q, Sun L, Wang Y (2016) Cooperative relaying and jamming for primary secure communication in cognitive two-way networks. In: Proceedings of IEEE VTC. Nanjing, China, pp 1–5 Wang D, Ren P, Du Q, Sun L, Wang Y (2016) Cooperative relaying and jamming for primary secure communication in cognitive two-way networks. In: Proceedings of IEEE VTC. Nanjing, China, pp 1–5
16.
Zurück zum Zitat Fang B, Qian Z, Zhong W, Shao W (2015) AN-Aided secrecy precoding for SWIPT in cognitive MIMO broadcast channels. IEEE Commun Lett 19(9):1632–1635CrossRef Fang B, Qian Z, Zhong W, Shao W (2015) AN-Aided secrecy precoding for SWIPT in cognitive MIMO broadcast channels. IEEE Commun Lett 19(9):1632–1635CrossRef
17.
Zurück zum Zitat Nguyen VD, Duong TQ, Dobre OA, Shin OS (2016) Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans Inf Forensics Secur 11(11):2609–2623CrossRef Nguyen VD, Duong TQ, Dobre OA, Shin OS (2016) Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans Inf Forensics Secur 11(11):2609–2623CrossRef
18.
Zurück zum Zitat Fang B, Qian Z, Shao W, Zhong W (2016) Precoding and artificial noise design for cognitive MIMOME wiretap channels. IEEE Trans Veh Tech 65(8):6753–6758CrossRef Fang B, Qian Z, Shao W, Zhong W (2016) Precoding and artificial noise design for cognitive MIMOME wiretap channels. IEEE Trans Veh Tech 65(8):6753–6758CrossRef
19.
Zurück zum Zitat Wu Y, Chen X, Chen X (2015) Secure beamforming for cognitive radio networks with artificial noise. In: Proceedings of IEEE WCSP. Nanjing, China, pp 1–5 Wu Y, Chen X, Chen X (2015) Secure beamforming for cognitive radio networks with artificial noise. In: Proceedings of IEEE WCSP. Nanjing, China, pp 1–5
20.
Zurück zum Zitat Hu X, Zhang X, Huang H, Li Y (2016) Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers. In: Proceedings of IEEE PIMRC. Valencia, Spain, pp 1–6 Hu X, Zhang X, Huang H, Li Y (2016) Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers. In: Proceedings of IEEE PIMRC. Valencia, Spain, pp 1–6
21.
Zurück zum Zitat Cai Y, Xu X, Yang W (2016) Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise. IET Commun. 10(15):1904–1913CrossRef Cai Y, Xu X, Yang W (2016) Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise. IET Commun. 10(15):1904–1913CrossRef
22.
Zurück zum Zitat Li Z, Jing T, Cheng X, Huo Y, Zhou W, Chen D (2015) Cooperative jamming for secure communications in MIMO cooperative cgnitive radio networks. In: Proceedings of IEEE ICC. London, UK, pp 7609–7614 Li Z, Jing T, Cheng X, Huo Y, Zhou W, Chen D (2015) Cooperative jamming for secure communications in MIMO cooperative cgnitive radio networks. In: Proceedings of IEEE ICC. London, UK, pp 7609–7614
23.
Zurück zum Zitat Liu W, Guo L, Kang T, Zhang J, Lin J (2015) Secure cognitive radio system with cooperative secondary networks. In: Proceedings IEEE ICT. Sydney, Australia, pp 6–10 Liu W, Guo L, Kang T, Zhang J, Lin J (2015) Secure cognitive radio system with cooperative secondary networks. In: Proceedings IEEE ICT. Sydney, Australia, pp 6–10
24.
Zurück zum Zitat He T, Chen H, Liu Q (2013) Qos-based beamforming with cooperative jamming in cognitive radio networks. In: Proceedings of ICCCAS. Chengdu, China, pp 42–45 He T, Chen H, Liu Q (2013) Qos-based beamforming with cooperative jamming in cognitive radio networks. In: Proceedings of ICCCAS. Chengdu, China, pp 42–45
25.
Zurück zum Zitat Liu W, Sarkar MZI, Ratnarajah T (2014) On the security of cognitive radio networks: cooperative jamming with relay selection. In: Proceedings of EUCNC. Bologna, Italy, pp 1–5 Liu W, Sarkar MZI, Ratnarajah T (2014) On the security of cognitive radio networks: cooperative jamming with relay selection. In: Proceedings of EUCNC. Bologna, Italy, pp 1–5
26.
Zurück zum Zitat Liu W, Sarkar MZI, Ratnarajah T, Du H (2017) Securing cognitive radio with a combined approach of beamforming and cooperative jamming. IET Commun 11(1):1–9CrossRef Liu W, Sarkar MZI, Ratnarajah T, Du H (2017) Securing cognitive radio with a combined approach of beamforming and cooperative jamming. IET Commun 11(1):1–9CrossRef
27.
Zurück zum Zitat Zou Y (2017) Physical-layer security for spectrum sharing systems. IEEE Trans Wire Commun 16(2):1319–1329CrossRef Zou Y (2017) Physical-layer security for spectrum sharing systems. IEEE Trans Wire Commun 16(2):1319–1329CrossRef
28.
Zurück zum Zitat Liu Y, Wang L, Duy TT, Elkashlan M, Duong TQ (2015) Relay selection for security enhancement in cognitive relay networks. IEEE Wire Commun Lett 4(1):46–49CrossRef Liu Y, Wang L, Duy TT, Elkashlan M, Duong TQ (2015) Relay selection for security enhancement in cognitive relay networks. IEEE Wire Commun Lett 4(1):46–49CrossRef
29.
Zurück zum Zitat Chakraborty P, Prakriya S (2017) Secrecy performance of an idle receiver assisted underlay secondary network. IEEE Trans Veh Tech 66(10):9555–9560CrossRef Chakraborty P, Prakriya S (2017) Secrecy performance of an idle receiver assisted underlay secondary network. IEEE Trans Veh Tech 66(10):9555–9560CrossRef
30.
Zurück zum Zitat Ho-Van K, Sofotasios PC, Freear S (2014) Underlay cooperative cognitive networks with imperfect Nakagami-m fading channel information and strict transmit power constraint: interference statistics and outage probability analysis. IEEE/KICS Journal of Communications and Networks 16(1):10–17CrossRef Ho-Van K, Sofotasios PC, Freear S (2014) Underlay cooperative cognitive networks with imperfect Nakagami-m fading channel information and strict transmit power constraint: interference statistics and outage probability analysis. IEEE/KICS Journal of Communications and Networks 16(1):10–17CrossRef
31.
Zurück zum Zitat Biglieri E, Proakis J, Shamai S (1998) Fading channels: information-theoretic and communications aspects. IEEE Trans Inf Theory 44(6):2619–2692MathSciNetCrossRef Biglieri E, Proakis J, Shamai S (1998) Fading channels: information-theoretic and communications aspects. IEEE Trans Inf Theory 44(6):2619–2692MathSciNetCrossRef
33.
Zurück zum Zitat Gradshteyn IS, Ryzhik IM (2000) Table of integrals, series and products, 6th edn. Academic, San DiegoMATH Gradshteyn IS, Ryzhik IM (2000) Table of integrals, series and products, 6th edn. Academic, San DiegoMATH
34.
Zurück zum Zitat Zou Y, Wang X, Shen W (2013) Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans Commun 61(12):5103–5113CrossRef Zou Y, Wang X, Shen W (2013) Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans Commun 61(12):5103–5113CrossRef
35.
Zurück zum Zitat Ahmed N, Khojastepour M, Aazhang B (2004) Outage minimization and optimal power control for the fading relay channel. In: Proceedings of IEEE information theory workshop. San Antonio, pp 458–462 Ahmed N, Khojastepour M, Aazhang B (2004) Outage minimization and optimal power control for the fading relay channel. In: Proceedings of IEEE information theory workshop. San Antonio, pp 458–462
36.
Zurück zum Zitat Press WH, Teukolsky SA, Vetterling WT, Flannery BP (1992) Numerical recipes in C: the art of scientific computing, 2nd edn. Cambridge University Press, CambridgeMATH Press WH, Teukolsky SA, Vetterling WT, Flannery BP (1992) Numerical recipes in C: the art of scientific computing, 2nd edn. Cambridge University Press, CambridgeMATH
Metadaten
Titel
Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter
verfasst von
Khuong Ho-Van
Thiem Do-Dac
Publikationsdatum
12.12.2018
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2020
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1185-x

Weitere Artikel der Ausgabe 1/2020

Mobile Networks and Applications 1/2020 Zur Ausgabe

Neuer Inhalt