This is an open access article published by the IET under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0/)
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed according to Poisson point processes. Centring on this scenario, the authors propose a simple and decentralised secure transmission scheme by jointly incorporating the secrecy guard zone and artificial noise. In particular, this transmission scheme helps to enhance secrecy performance via differentiating between secondary transmitters in accordance with the eavesdropping environment. They then analyse the connection outage and secrecy outage performance of the secondary network, based on which they obtain the closed-form expression of the secrecy throughput. They further determine the optimal transmission power of the secondary transmitters and the optimal power allocation between the information-bearing signal and artificial noise to maximise the secrecy throughput of the secondary network under primary and secondary outage constraints. The authors’ analysis highlights that introducing secrecy guard zone provides better security performance, and artificial noise performs as additional interference to insert a control between the reliability and security. Numerical results show how the system parameters affect the achievable maximum secrecy throughput, the optimal transmission power and the optimal power allocation between the information-bearing signal and the artificial noise.
References
-
-
1)
-
27. Baccelli, B.B.l.F., Muhlethaler, P.: ‘An aloha protocol for multihop mobile wireless networks’, IEEE Trans. Inf. Theory, 2006, 52, (2), pp. 421–436 (doi: 10.1109/TIT.2005.862098).
-
2)
-
1. Wen, H., Zhu, X., Zhou, L.: ‘A framework of the PHY-layer approach to defense against security threats in cognitive radio networks’, IEEE Netw., 2013, 27, (3), pp. 34–39 (doi: 10.1109/MNET.2013.6616113).
-
3)
-
25. Zhou, X., McKay, M.R., Maham, B., et al: ‘Rethinking the secrecy outage formulation: a secure transmission design perspective’, IEEE Commun. Lett., 2011, 15, (3), pp. 302–304 (doi: 10.1109/LCOMM.2011.011811.102433).
-
4)
-
19. Hasan, A., Andrews, J.G.: ‘The guard zone in wireless ad hoc networks’, IEEE Trans. Wirel. Commun., 2007, 6, (3), pp. 897–906 (doi: 10.1109/TWC.2007.04793).
-
5)
-
3. Zhou, X., Song, L., Zhang, Y.: ‘Physical layer security in wireless communications’ (CRC Press, 2013).
-
6)
-
17. Haenggi, M., Ganti, R.K.: ‘Interference in large wireless networks’ (Now Publishers Inc., Hanover, MA, 2009, 1st edn.).
-
7)
-
16. Win, M.Z., Rabbachin, A., Lee, J., et al: ‘Cognitive network secrecy with interference engineering’, IEEE Network, 2014, 28, (5), pp. 86–90 (doi: 10.1109/MNET.2014.6915445).
-
8)
-
15. Shu, Z., Qian, Y., Ci, S.: ‘On physical layer security for cognitive radio networks’, IEEE Netw., 2013, 27, (3), pp. 28–33 (doi: 10.1109/MNET.2013.6523805).
-
9)
-
22. Lee, J., Andrews, J.G., Hong, D.: ‘Spectrum-sharing transmission capacity’, IEEE Trans. Commun., 2011, 10, (9), pp. 3053–3763.
-
10)
-
23. Xu, X., He, B., Yang, W., et al: ‘Secure transmission design for cognitive radio networks with Poisson distributed eavesdroppers’, IEEE Trans. Inf. Forensics Sec., 2016, 11, (2), pp. 373–387 (doi: 10.1109/TIFS.2015.2500178).
-
11)
-
1. Wyner, A.D.: ‘The wire-tap channel’, Bell Syst. Tech. J., 1975, 54, (8), pp. 1355–1387 (doi: 10.1002/j.1538-7305.1975.tb02040.x).
-
12)
-
15. Zou, Y., Li, X., Liang, Y.: ‘Secrecy outage and diversity analysis of cognitive radio systems’, IEEE J. Sel. Areas Commun., 2014, 32, (11), pp. 2222–2236 (doi: 10.1109/JSAC.2014.141121).
-
13)
-
9. Zou, Y., Wang, X., Shen, W.: ‘Physical-layer security with multiuser scheduling in cognitive radio networks’, IEEE Trans. Commun., 2013, 61, (12), pp. 5103–5113 (doi: 10.1109/TCOMM.2013.111213.130235).
-
14)
-
10. Lee, S., Zhang, R., Huang, K.: ‘Opportunistic wireless energy harvesting in cognitive radio networks’, IEEE Trans. Wirel. Commun., 2013, 12, (9), pp. 4788–4799 (doi: 10.1109/TWC.2013.072613.130323).
-
15)
-
29. Ganti, R.K., Haenggi, M.: ‘Single-hop connectivity in interference limited hybrid wireless networks’. Proc. IEEE Int. Symp. on Information Theory, 2007, pp. 366–370.
-
16)
-
14. Zheng, T.-X., Wang, H.-M., Yuan, J., et al: ‘Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers’, IEEE Trans. Commun., 2015, 63, (11), pp. 4347–4362 (doi: 10.1109/TCOMM.2015.2474390).
-
17)
-
7. Youssef, M., Ibrahim, M.L.C.V.A.V., Abdelatif, M.: ‘Routing metrics of cognitive radio networks: a survey’, IEEE Commun. Surv. Tutor., 2014, 16, (1), pp. 92–109 (doi: 10.1109/SURV.2013.082713.00184).
-
18)
-
2. Massey, J.L.: ‘An introduction to contemporary cryptology’, Proc. IEEE, 1988, 76, (5), pp. 533–549 (doi: 10.1109/5.4440).
-
19)
-
2. Pei, Y., Liang, Y.-C., Zhang, L., et al: ‘Secure communication over MISO cognitive radio channels’, IEEE Trans. Wirel. Commun., 2010, 9, (4), pp. 1494–1502 (doi: 10.1109/TWC.2010.04.090746).
-
20)
-
21. Pinto, P.C., Barros, J., Win, M.Z.: ‘Secure communication in stochastic wireless networks – part II: maximum rate and collusion’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (1), pp. 139–147 (doi: 10.1109/TIFS.2011.2165947).
-
21)
-
13. Zhou, X., Ganti, R.K., Andrews, J.G., et al: ‘On the throughput cost of physical layer security in decentralized wireless networks’, IEEE Trans. Wirel. Commun., 2011, 10, (8), pp. 2764–2775 (doi: 10.1109/TWC.2011.061511.102257).
-
22)
-
8. Gabry, F., Zappone, A., Thobaben, R., et al: ‘Energy efficiency analysis of cooperative jamming in cognitive radio networks with secrecy constraints’, IEEE Wirel. Commun. Lett., 2015, 4, (4), pp. 437–440 (doi: 10.1109/LWC.2015.2432802).
-
23)
-
20. Chae, S.H., Choi, W., Lee, J.H., et al: ‘Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone’, IEEE Trans. Inf. Forensics Sec., 2015, 13, (12), pp. 7098–7109.
-
24)
-
18. Mukherjee, A., Swindlehurst, A.L.: ‘Detecting passive eavesdroppers in the MIMO wiretap channel’. Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, March 2012, pp. 2809–2812.
-
25)
-
28. Stoyan, D., Kendall, W., Mecke, J.: ‘Stochastic geometry and its applications’ (John Wiley and Sons, 1996, 2nd edn.).
-
26)
-
12. Chae, S.H., Choi, W., Lee, T.H., et al: ‘Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone’, IEEE Trans. Inf. Forensics Sec., 2014, 9, (10), pp. 1617–1628 (doi: 10.1109/TIFS.2014.2341453).
-
27)
-
24. Yang, N., Yan, S., Yuan, J., et al: ‘Artificial noise: transmission optimization in multi-input single-output wiretap channels’, IEEE Trans. Commun., 2015, 63, (5), pp. 1771–1783 (doi: 10.1109/TCOMM.2015.2419634).
-
28)
-
11. Wang, Z., Zhang, W.: ‘Opportunistic spectrum sharing with limited feedback in Poisson cognitive radio networks’, IEEE Trans. Wirel. Commun., 2014, 13, (12), pp. 7098–7109 (doi: 10.1109/TWC.2014.2363676).
-
29)
-
5. He, B., Zhou, X.: ‘Secrecy on–off transmission design with channel estimation errors’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (12), pp. 1923–1936 (doi: 10.1109/TIFS.2013.2284754).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2016.0117
Related content
content/journals/10.1049/iet-com.2016.0117
pub_keyword,iet_inspecKeyword,pub_concept
6
6