Joint resource optimization for secure transmission in cooperative CR networks

Weidang Lu1, Kecai Gu1, Min Jia2, Zhanghui Lu3, Hong Peng1
1College of Information Engineering, Zhejiang University of Technology, Zhejiang, China
2School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
3Haitian Plastics Machinery Group Co., Ltd, Zhejiang, China

Tóm tắt

In this paper, we investigate the joint resource allocation to provide secure information transmission in a five-node cooperative cognitive radio network, which contains a primary transmitter (PT), a primary receiver (PR), a secondary transmitter (ST), a secondary receiver (SR), and an eavesdropper (E). To ensure the information is securely transmitted, PT and PR use a part of the power to transmit artificial noise (i.e., jamming signal) to confuse the eavesdropper. Specifically, in the first phase, PT transmits its signal, which contains secrecy information and artificial noise, by using all of its power and bandwidth. In the second phase, ST accesses to the PT’s licensed bandwidth as a trusted relay by allocating a fraction of the bandwidth and power to forward PT’s information with decode-and-forward (DF) relaying protocol. As a reward, ST can utilize the remaining bandwidth and power to transmit its own information simultaneously. We study the joint optimization of the time, bandwidth, and power allocation to maximize ST’s transmission rate while satisfying PT’s secrecy transmission rate requirements. Numerical results demonstrate that our strategy can achieve a win-win result.

Tài liệu tham khảo

Y Zou, J Zhu, L Yang, CL Ying, YD Yao, Securing physical-layer communications for cognitive radio networks. IEEE Commun. Mag. 53, 48–54 (2015) AD Wyner, The wire-tap channel. Bell Labs Tech. J. 54, 1355–1387 (1975) I Csiszar, J Korner, Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24, 339–348 (1978) H Deng, HM Wang, W Guo, W Wang, Secrecy transmission with a helper: to relay or to jam. IEEE Trans. Inf. Forensics Secur. 10, 293–307 (2015) H Deng, HM Wang, W Wang, Q J Yin, in IEEE International Conference on Communications Workshops (ICC). Secrecy transmission with a helper: to relay or not to relay (IEEE Press, Sydney, 2014), pp. 825–830 HM Wang, XG Xia, Enhancing wireless secrecy via cooperation: signal design and optimization. IEEE Commun. Mag. 53, 47–53 (2015) L Dong, Z Han, AP Petropulu, HV Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58, 1875–1888 (2010) NQ Bao, N Linh-Trung, M Debbah, Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 12, 6076–6085 (2013) W Lu, J Wang, W Ge, F Li, J Hua, L Meng, An anti-interference cooperative bandwidth sharing strategy with joint optimization of time and bandwidth. J. Commun. Networks 16, 141–145 (2014) S Hu, Z Liu, YL Guan, W Xiong, G Bi, S Li, Sequence design for cognitive CDMA communications under arbitrary spectrum hole constraint. IEEE J. Sel. Areas Commun. 32(11), 1974–1986 (2014) S Hu, G Bi, YL Guan, S Li, TDCS-based cognitive radio networks with multiuser interference avoidance. IEEE Trans. Commun. 61(12), 4828–4835 (2013) S Goel, R Negi, Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7, 2180–2189 (2008) HM Wang, CD Wang, WK Ng, Artificial noise assisted secure transmission under training and feedback. IEEE Trans. Signal Process. 63, 6285–6298 (2015) L Zhang, H Zhang, D Wu, D Yuan, Improving physical layer security for MISO systems via using artificial noise. IEEE Global Communications Conference (2015), pp. 1–6 XY Zhou, MR McKay, Physical layer security with artificial noise: Secrecy capacity and optimal power allocation, 3rd International Conference on Signal Processing and Communication Systems (2009), pp. 1–5 N Zhang, N Lu, N Cheng, JW Mark, XS Shen, Cooperative spectrum access towards secure information transfer for CRNs. IEEE J. Sel. Areas Commun. 31(11), 2453–2464 (2013)