Cooperative networking towards secure communications for CRNs

In this paper, we investigate cooperative networking in cognitive radio networks (CRNs), which targets to help the primary users (PUs) for secure communications and provide transmission opportunities to secondary users (SUs). Two cooperation schemes: relay-jammer (R-J) scheme and cluster-beamforming (C-B) scheme, are proposed. In R-J cooperation scheme, two individual SUs, a relay and a friendly jammer, are leveraged by the PU to improve communication secrecy via cooperation; In return, the PU allocates a fraction of access time for SUs' transmission. To achieve the maximum secrecy rate, joint time and power allocation is considered. In C-B cooperation scheme, the PU cooperates with a cluster of SUs, which enhance the secrecy of primary link via collaborative beamforming and gain spectrum access opportunities as a reward. With the objective of maximizing the secrecy rate, the optimal weights and time allocation are studied. Numerical results validate the proposed schemes and demonstrate that the PU can significantly enhances the secrecy through cooperation with the cooperating SUs by allocating time and transmission power optimally.

[1]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[2]  Umberto Spagnolini,et al.  Spectrum Leasing to Cooperating Secondary Ad Hoc Networks , 2008, IEEE Journal on Selected Areas in Communications.

[3]  Joonhyuk Kang,et al.  Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy , 2011, 2011 IEEE International Conference on Communications (ICC).

[4]  Qian Zhang,et al.  Stackelberg game for utility-based cooperative cognitiveradio networks , 2009, MobiHoc '09.

[5]  Jianhui Wu,et al.  Secure wireless communications via cooperative relaying and jamming , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[6]  Xuemin Shen,et al.  Energy-efficient and trust-aware cooperation in cognitive radio networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[7]  Xuemin Shen,et al.  QoS Provisioning for Heterogeneous Services in Cooperative Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[8]  H. Vincent Poor,et al.  Collaborative beamforming for distributed wireless ad hoc sensor networks , 2005, IEEE Transactions on Signal Processing.

[9]  Xiaohui Liang,et al.  GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.

[10]  Weihua Zhuang,et al.  Simple Channel Sensing Order in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[11]  Mustafa Cenk Gursoy Secure communication in the low-SNR regime: A Characterization of the energy-secrecy tradeoff , 2009, 2009 IEEE International Symposium on Information Theory.

[12]  H. Vincent Poor,et al.  Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.

[13]  Urbashi Mitra,et al.  Cooperative decode-and-forward relaying for secondary spectrum access , 2012, IEEE Transactions on Wireless Communications.

[14]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[15]  Yang Han,et al.  Jointly cooperative decode-and-forward relaying for secondary spectrum access , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[16]  Gyouhwan Kim Scheduling in wireless ad hoc networks: algorithms with performance guarantees , 2008 .