Browse > Article
http://dx.doi.org/10.3837/tiis.2015.01.015

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power  

Wang, Songqing (PLA University of Science and Technology)
Xu, Xiaoming (PLA University of Science and Technology)
Yang, Weiwei (PLA University of Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.1, 2015 , pp. 260-279 More about this Journal
Abstract
In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.
Keywords
Cooperative cognitive radio networks; fixed transmit power; physical layer security; relay selection; secrecy outage probability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb.2005.   DOI
2 Z. Xu, W. Qin, Q. Tang, and D. Jiang, "Energy-efficient cognitive access approach to convergence communications," SCIENCE CHINA Information Sciences, vol. 57, no. 4, pp. 1-12, April. 2014. 2014, 57(4): 1-12. http://www.cnki.com.cn/Article/CJFDTotal-JFXG201404006.htm
3 K. Tourki, Khalid. A. Qaraqe, and M. -S. Alouini, "Outage analysis for underlay cognitive networks using incremental regenerative relaying," IEEE Trans. Veh. Technol., vol. 62, no. 2, pp. 721-734, Feb. 2013.   DOI
4 Y. Zou, J. Zhu, B. Zheng and Y.-D. Yao, "An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks," IEEE Trans. Sig. Pross., vol. 58, no. 10, pp. 5438-5445, Oct. 2010.   DOI
5 T. Q. Duong, V. N. Q. Bao, H. Tran, G. C. Alexandropoulos., and H.-J. Zepernick, "Effect of primary network on performance of spectrum sharing AF relaying," Electron, Lett., vol. 48, no. 1, pp. 25-27, 2012.   DOI
6 W. Xu, J. Zhang, P. Zhang, and C. Tellambure, "Outage probability os denode-and-forword cognitive relay in presence of primary user's interference," IEEE Commun. Lett., vol. 16, no. 8, pp. 1252-1255, Aug. 2012.   DOI
7 S. I. Hussain, M.-S. Alouini, K. Qaraqe, and M. Hasna, "Reactive relay selection in underlay cognitive networks with fixed gain relays," in Proc. of IEEE ICC. 2012.
8 S. I. Hussain, M.-S. Alouini, K. Qaraqe, and M. Hasna, "Outage Analysis of Selective Cooperation in Underlay Cognitive Networks with Fixed Gain Relays and Primary Interference Modeling," in Proc. of IEEE PIMRC, 2012.
9 H. Hakim, H. Boujemmaa, and W. Ajib, "Performance comparison between adaptive and fixed transmit power in underlay cognitive radio networks," IEEE Trans. Commun. vol.61, no. 12, pp. 4836-4846, Dec. 2013.   DOI
10 Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Network, vol. 12, no. 5, pp. 28-33, 2013.   DOI
11 H. Delfs, and H. Knebl, Introduction to cryptography: principles and applications, 2nd edn. Springer, 2007.
12 Y. Pei, Y.-C. Liang, K. C. The, and K. H. Li, "Secure communication over MISO cognitive ratio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.   DOI
13 A Mukherjee, S. A. Fakoorian, J. Huang and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless network: a survey," IEEE Commun. Survey & Tutorials, vol. 16, no. 3, pp. 1550-1573, 2014.   DOI
14 B. Makki and T. Eriksson, "Secure spectrum sharing via rate adaptation," in Proc. of ICNC, 2013.
15 Y. Pei, Y.-C. Liang, K. C. The, and K. H. Li, "Achieving cognitive and secure transmissions using multiple antennas," in Proc. of IEEE PIMRC, 2009.
16 Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitve radio networks," IEEE Trans. Commun. vol.61, no. 12, pp. 5103-5113, Dec. 2013.   DOI
17 Y. Wu and K. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sept. 2011.   DOI
18 P. N. Son and H. Y. Kong, "The underlay cooperative cognitive network with secure transmission," Communications (QBSC), 27th Biennial Symposium on, pp. 164 - 167, June 2014.
19 N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, "Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users," IEEE Trans.Wireless Commun., vol. 13, no. 2, pp. 1058-1073, Feb. 2013.
20 C. Wang and H. -M. Wang, "On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1814-1827, Nov. 2014.   DOI
21 A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.   DOI
22 H. Sakran, M. Shokair, O. Nasr, S. El-Rabaie, and A. A. El-Azm, "Proposed relay selection scheme for physical layer security in cognitive ratio networks," IET Commun., vol. 6, iss. 16, pp. 2676-2687, Jun. 2012.   DOI
23 J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.   DOI
24 H. -M. Wang, M. Luo, X. -G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE signal process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.   DOI
25 F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.   DOI
26 Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099 - 2111, Oct. 2013.   DOI
27 I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th edition. Academic Press, San Diego, 2007. http://www.scirp.org/reference/ReferencesPapers.aspx? ReferenceID=697112
28 L. Zheng and D. Tse, "Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels," IEEE Trans. Inf. Theory, vol. 49, no.5, pp. 1073-1096, May 2003.   DOI
29 N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun. vol.61, no. 1, pp. 144-154, Jan. 2013.   DOI
30 S. I. Hussain, M. M. Abdallah, M.-S. Alouini, M. O. Hasna, K. Qaraqe, "Performance analysis of selective cooperation in underlay cognitive networks over Rayleigh channels," in Proc. of IEEE SPAWC, 2011.