Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Physical-layer information hiding technique for cognitive radio communications in cooperative relaying systems

This study presents a novel idea for information hiding at the physical layer level in order to securely transmit confidential cognitive radio data in cooperative relaying systems. Considering a cognitive radio network in which the secondary user cooperates with the primary system in relaying its data, in the proposed model, confidential cognitive information is hidden into the primary signal as a low-power noise at a symbol level such that it would be invisible by malicious users. The new hiding algorithm can be utilised along with any standard relaying scheme as long as the primary information signal is used as the cover data without significant degradation of the primary system performance. In the presence of cognitive data hiding, both the frame error rate and throughput performance of the primary and secondary systems are derived analytically for well-known relaying schemes such as fixed and incremental relaying protocols, when a selection-combining rule is utilised at the primary receiver for symbol detection. Using simulation results the correctness of the proposed theoretical analysis is verified. Moreover, using numerical results the existing tradeoff between the hiding cognitive capacity of the proposed model and the performance degradation of the primary system is highlighted.

References

    1. 1)
      • 3. Lee, S., Baxley, R.J., Weitnauer, M.A., et al: ‘Achieving undetectable communication’, IEEE J. Sel. Top. Signal Process., 2015, 9, (7), pp. 11951205.
    2. 2)
      • 6. Gong, Z.Y., Wang, K., Lu, W.D., et al: ‘Covert digital communication systems based on joint normal distribution’, IET Commun., 2017, 11, (8), pp. 12821290.
    3. 3)
      • 1. Ghane, A., Harsini, J.S.: ‘A network steganographic approach to overlay cognitive radio systems utilizing systematic coding’, Phys. Commun., 2018, 27, pp. 6373.
    4. 4)
      • 15. Benjillali, M., Szczecinski, L.: ‘Detect-and-forward in two-hop relay channels: a metrics-based analysis’, IEEE Trans. Commun., 2010, 58, (6), pp. 17291736.
    5. 5)
      • 5. Ning, B., Guan, L., Huang, H.: ‘A novel frequency-hopping sequence for covert communication’, IEEE. Access, 2017, 5, pp. 2015720163.
    6. 6)
      • 16. Laneman, J.N., Wornell, G.W., Tse, D.N.C.: ‘Cooperative diversity in wireless networks: efficient protocols and outage behavior’, IEEE Trans. Inf. Theory, 2004, 50, (12), pp. 30623080.
    7. 7)
      • 19. Mahmood, A., Jäntti, R.: ‘Packet error rate analysis of uncoded schemes in block-fading channels using extreme value theory’, IEEE Commun. Lett., 2017, 21, (1), pp. 208211.
    8. 8)
      • 21. Zheng, H., Viswanathan, H.: ‘Optimizing the ARQ performance in downlink packet data systems with scheduling’, IEEE Trans. Wirel. Commun., 2005, 4, (2), pp. 495506.
    9. 9)
      • 20. Wang, T., Cano, A., Giannakis, G.B., et al: ‘High-performance cooperative demodulation with decode-and-forward relays’, IEEE Trans. Commun., 2007, 55, pp. 14271438.
    10. 10)
      • 10. Jiang, L., Tian, H., Qin, C., et al: ‘Secure beamforming in wireless-powered cooperative cognitive radio networks’, IEEE Commun. Lett., 2016, 21, (1), pp. 522525.
    11. 11)
      • 7. Xu, L., Fang, H., Lin, Z.: ‘Evolutionarily stable opportunistic spectrum access in cognitive radio networks’, IET Commun., 2016, 10, (17), pp. 22902299.
    12. 12)
      • 11. Fang, H., Xu, L., Wang, X.: ‘Coordinated multiple-relays based physical-layer security improvement: a single-leader multiple-followers Stackelberg game scheme’, IEEE Trans. Inf. Forensics Secur., 2018, 13, (1), pp. 197209.
    13. 13)
      • 2. Bash, B.A., Goeckel, D., Towsley, D., et al: ‘Hiding information in noise: fundamental limits of covert wireless communication’, IEEE Commun. Mag., 2015, 53, pp. 2631.
    14. 14)
      • 17. Kay, S.M.: ‘Fundamentals of statistical signal processing: estimation theory’ (Prentice-Hall, New Jersey, USA, 1993).
    15. 15)
      • 14. Simeone, O., Stanojev, I., Savazzi, S., et al: ‘Spectrum leasing to cooperating secondary ad hoc networks’, IEEE J. Sel. Areas Commun., 2008, 26, (1), pp. 203213.
    16. 16)
      • 8. Gabry, F., Li, N., Schrammar, N., et al: ‘On the optimization of the secondary transmitter's strategy in cognitive radio channels with secrecy’, IEEE J. Sel. Areas Commun., 2014, 32, (3), pp. 451463.
    17. 17)
      • 22. Harsini, J.S., Lahouti, F., Levorato, M., et al: ‘Analysis of non-cooperative and cooperative type II hybrid ARQ protocols with AMC over correlated fading channels’, IEEE Trans. Wirel. Commun., 2011, 10, (3), pp. 877889.
    18. 18)
      • 18. Goldsmith, A.: ‘Wireless communications’ (Cambridge University Press, New York, USA, 2005).
    19. 19)
      • 13. Zheng, Y., Moini, A., Lou, W., et al: ‘Cognitive security: securing the burgeoning landscape of mobile networks’, IEEE Netw., 2016, 30, (4), pp. 6671.
    20. 20)
      • 4. He, B., Yan, S., Zhou, X., et al: ‘On covert communication with noise uncertainty’, IEEE Commun. Lett., 2017, 21, (4), pp. 941944.
    21. 21)
      • 12. El-Malek, A.H.A., Salhab, A.M., Zummo, S.A.: ‘New bandwidth efficient relaying schemes in cooperative cognitive two-way relay networks with physical layer security’, IEEE Trans. Veh. Technol., 2016, 66, (6), pp. 53725386.
    22. 22)
      • 9. Jeon, H., McLaughlin, S.W., Kim, I.M., et al: ‘Secure communications with untrusted secondary nodes in cognitive radio networks’, IEEE Trans. Wirel. Commun., 2014, 13, (4), pp. 17901805.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2018.5413
Loading

Related content

content/journals/10.1049/iet-com.2018.5413
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address