http://iet.metastore.ingenta.com
1887

## Physical layer security for cognitive radio networks

• Author(s):
• DOI:

$16.00 (plus tax if applicable) ##### Buy Knowledge Pack 10 chapters for$120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:

Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

## Thank you

In this chapter, we have presented physical layer (PHY)-security of cognitive radio network (CRN). Specifically, we have described fundamental PHY-security in CRN and pointed out some recent enhanced protocols available in the literature. Typical applications of artificial noise for the primary system, secondary system, and cooperative CRN have been investigated. We have also presented a powerful technique such as beamforming design on resource allocation problems for such schemes. For the primary system, based on the derived capacity formula, the impact of the secondary system on the secrecy capacity is analysed. In particular, we point out that when the eavesdropper is very far from the primary system, the use of artificial noise is not effective to protect the primary system from eavesdropping. For the secondary system, the proposed approach offers a better performance and is quite robust when compared to the existing approaches. In addition, a cooperative CRN is also presented to improve PHY-security of the primary system. Simulation results are shown to verify the theoretical developments.

Chapter Contents:

• 11.1 Introduction
• 11.2 PHY-security of primary system
• 11.2.1 System model
• 11.2.1.2 Artificial noise
• 11.2.2 Ergodic secrecy capacity of the primary system
• 11.2.2.1 Case of weak eavesdropping channel (γpe<< 1)
• 11.2.2.1 Case of strong eavesdropping channel (γpe>> 1)
• 11.2.3 Numerical results
• 11.3 PHY-security of secondary system
• 11.3.1 System model and problem formulation
• 11.3.1.1 Signal model
• 11.3.1.2 Problem formulation
• 11.3.1.3 Channel state information
• 11.3.2 Optimization problem design
• 11.3.3 Optimization over Γtol
• 11.3.4 Numerical results
• 11.4 PHY-security of cooperative cognitive radio networks
• 11.4.1 System model
• 11.4.2 Optimization approach for beamforming of ST
• 11.4.3 Optimization with transmit power of PT
• 11.4.4 Numerical results
• 11.5 Conclusions
• References

Preview this chapter:

Physical layer security for cognitive radio networks, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch11-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch11-2.gif

### Related content

content/books/10.1049/pbte076e_ch11
pub_keyword,iet_inspecKeyword,pub_concept
6
6
This is a required field