Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Physical layer security for cognitive radio networks

Physical layer security for cognitive radio networks

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this chapter, we have presented physical layer (PHY)-security of cognitive radio network (CRN). Specifically, we have described fundamental PHY-security in CRN and pointed out some recent enhanced protocols available in the literature. Typical applications of artificial noise for the primary system, secondary system, and cooperative CRN have been investigated. We have also presented a powerful technique such as beamforming design on resource allocation problems for such schemes. For the primary system, based on the derived capacity formula, the impact of the secondary system on the secrecy capacity is analysed. In particular, we point out that when the eavesdropper is very far from the primary system, the use of artificial noise is not effective to protect the primary system from eavesdropping. For the secondary system, the proposed approach offers a better performance and is quite robust when compared to the existing approaches. In addition, a cooperative CRN is also presented to improve PHY-security of the primary system. Simulation results are shown to verify the theoretical developments.

Chapter Contents:

  • 11.1 Introduction
  • 11.2 PHY-security of primary system
  • 11.2.1 System model
  • 11.2.1.1 Cognitive radio network
  • 11.2.1.2 Artificial noise
  • 11.2.2 Ergodic secrecy capacity of the primary system
  • 11.2.2.1 Case of weak eavesdropping channel (γpe<< 1)
  • 11.2.2.1 Case of strong eavesdropping channel (γpe>> 1)
  • 11.2.3 Numerical results
  • 11.3 PHY-security of secondary system
  • 11.3.1 System model and problem formulation
  • 11.3.1.1 Signal model
  • 11.3.1.2 Problem formulation
  • 11.3.1.3 Channel state information
  • 11.3.2 Optimization problem design
  • 11.3.3 Optimization over Γtol
  • 11.3.4 Numerical results
  • 11.4 PHY-security of cooperative cognitive radio networks
  • 11.4.1 System model
  • 11.4.2 Optimization approach for beamforming of ST
  • 11.4.3 Optimization with transmit power of PT
  • 11.4.4 Numerical results
  • 11.5 Conclusions
  • References

Inspec keywords: resource allocation; cognitive radio; cooperative communication; array signal processing; telecommunication security

Other keywords: cognitive radio networks; physical layer security; artificial noise; beamforming design; eavesdropping; cooperative CRN; resource allocation problems; secondary system; secrecy capacity; primary system; PHY-security

Subjects: Signal processing and detection; Radio links and equipment

Preview this chapter:
Zoom in
Zoomout

Physical layer security for cognitive radio networks, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch11-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch11-2.gif

Related content

content/books/10.1049/pbte076e_ch11
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address