© The Institution of Engineering and Technology
In this study, the authors investigate the physical-layer security in a cognitive amplify-and-forward relay network consisting of a secondary transmitter (ST) and a secondary destination (SD) with the aid of multiple secondary relays (SRs) in the face of multiple eavesdroppers. In cognitive radio networks, increasing transmit power may not always be beneficial in terms of improving the channel capacity of cognitive transmissions, which would not only cause an extra interference to primary user, but also enhance the possibility of successfully intercepting the cognitive transmissions at an eavesdropper because an improved signal strength is received in this case. The authors propose two relay selection schemes to improve the physical-layer security of cognitive transmissions against eavesdropping attacks, which are referred to as the global and partial channel state information based relay selection, denoted by GCSIbRS and PCSIbRS, respectively. The authors analyse the intercept probability of the proposed GCSIbRS and PCSIbRS, as well as the traditional round-robin and all-relay transmission schemes. It is shown that the proposed GCSIbRS and PCSIbRS schemes both outperform the conventional round-robin and all-relay schemes in terms of their intercept probability performance.
References
-
-
1)
-
23. Zou, Y., Wang, X., Shen, W.: ‘Optimal relay selection for physical-layer security in cooperative wireless networks’, IEEE J. Sel. Areas Commun., 2013, 31, (10), pp. 2099–2111 (doi: 10.1109/JSAC.2013.131011).
-
2)
-
4. Zou, J.N., Xiong, H.K., Wang, D.W., et al: ‘Optimal power allocation for hybrid overlay/underlay spectrum sharing in multiband cognitive radio networks’, IEEE Trans. Veh. Technol., 2013, 62, (4), pp. 1827–1837 (doi: 10.1109/TVT.2012.2235152).
-
3)
-
22. Jeffrey, A., Zwillinger, D.: ‘Tables of intergrals, series, and products’ (Elsevier, 2000, 6th edn.).
-
4)
-
7. Fragkiadakis, A.G., Tragos, E.Z., Askoxylakis, I.G.: ‘A survey on security threats and detection techniques in cognitive radio networks’, IEEE Commun. Surv. Tutor., 2013, 15, (1), pp. 428–445 (doi: 10.1109/SURV.2011.122211.00162).
-
5)
-
2. Mitola, J., Maguire, G.Q.: ‘Cognitive radio: making software radios more personal’, IEEE Pers. Commun., 1999, 6, (4), pp. 13–18 (doi: 10.1109/98.788210).
-
6)
-
11. Yuksel, M., Erkip, E.: ‘Secure communication with a relay helping the wiretapper’. Proc. of IEEE Information Theory Workshop, Lake Tahoe, CA, September 2007.
-
7)
-
29. Lai, L., El Gamal, H.: ‘The relay-eavesdropper channel: cooperation for secrecy’, IEEE Trans. Inf. Theory, 2008, 54, (9), pp. 4005–4019 (doi: 10.1109/TIT.2008.928272).
-
8)
-
1. Wyner, A.D.: ‘The wire-tap channel’, Bell Syst. Tech. J., 1975, 54, (8), pp. 1355–1387 (doi: 10.1002/j.1538-7305.1975.tb02040.x).
-
9)
-
3. Baldini, G., Sturman, T., Biswas, A.R., et al: ‘Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead’, IEEE Commun. Surv. Tutor., 2012, 14, (2), pp. 355–379 (doi: 10.1109/SURV.2011.032511.00097).
-
10)
-
28. Bloch, M., Barros, J., Rodrigues, M.R.D., McLaughlin, S.W.: ‘Wireless information-theoretic security’, IEEE Trans. Inf. Theory, 2008, 54, (6), pp. 2515–2534 (doi: 10.1109/TIT.2008.921908).
-
11)
-
18. Sibomana, L., Zepernick, H.-J., Tran, H.: ‘On physical layer security for reactive DF cognitive relay networks’. Proc. IEEE Globecom2014, 2014.
-
12)
-
5. Bao, X., Martins, P., Song, T., et al: ‘Stable throughput and delay performance in cognitive cooperative systems’, IET Commun., 2011, 5, (2), pp. 190–198 (doi: 10.1049/iet-com.2010.0231).
-
13)
-
14)
-
16. Wang, S., Xu, X., Yang, W.: ‘Physical layer security in underlay CCRNs with fixed transmit power’, KSII Trans. Internet Inf. Syst., 2015, 9, (1), pp. 260–279.
-
15)
-
21. Nguyen, B.V., Kim, K.: ‘Secrecy outage probability of optimal relay selection for secure AnF cooperative networks’, IEEE Commun. Lett., 2015, 19, (12), pp. 2086–2089 (doi: 10.1109/LCOMM.2015.2486768).
-
16)
-
6. Bao, X., Martins, P., Song, T., et al: ‘Capacity of hybrid cognitive network with outage constraints’, IET Commun., 2011, 5, (18), pp. 2712–2720 (doi: 10.1049/iet-com.2011.0236).
-
17)
-
15. Zou, Y., Li, X., Liang, Y.: ‘Secrecy outage and diversity analysis of cognitive radio systems’, IEEE J. Sel. Areas Commun., 2014, 32, (11), pp. 2222–2236 (doi: 10.1109/JSAC.2014.141121).
-
18)
-
3. Elkashlan, M., Wang, L., Duong, T.Q., et al: ‘On the security of cognitive radio networks’, IEEE Trans. Veh. Technol., 2015, 64, (8), pp. 3790–3795 (doi: 10.1109/TVT.2014.2358624).
-
19)
-
2. Leung-Yan-Cheong, S.K., Hellman, M.E.: ‘The Gaussian wire-tap channel’, IEEE Trans. Inf. Theory, 1978, 24, (4), pp. 451–456 (doi: 10.1109/TIT.1978.1055917).
-
20)
-
14. Sibomana, L., Tran, H., Tran, Q.A.: ‘Impact of secondary user communication on security communication of primary user’, Secur. Commun. Netw., 2015, 8, (18), pp. 4177–4190 (doi: 10.1002/sec.1333).
-
21)
-
20. Zou, Y., Champagne, B., Zhu, W., et al: ‘Relay-selection improves the secruity-reliabiltiy trade-off in cognitive radio systems’, IEEE Trans. Commun., 2015, 63, (1), pp. 215–228.
-
22)
-
17. Son, P.N., Kong, H.Y.: ‘The underlay cooperative cognitive network with secure transmission’. Proc. 27th Biennial Symp. on Communications (QBSC2014), 2014, pp. 164–167.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2016.0490
Related content
content/journals/10.1049/iet-com.2016.0490
pub_keyword,iet_inspecKeyword,pub_concept
6
6