Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks

In this paper, we investigate a new cooperative paradigm to provide information security for the primary system in cognitive two-way networks where the two-way secondary system can access the licensed spectrum to support the secondary quality of service (QoS) requirement as long as the secondary system provisions secure cooperation for the primary system against the malicious eavesdropper. To do so, the secondary system adopts the physical-layer method of cooperative jamming and relaying to protect the primary confidential message in two stages and acquire some spectrum opportunities for the two-way transmission in both stages. In addition, we try to allocate the power for transmitting jamming signal, secondary messages, and relaying messages in such a way that the secrecy capacity of the primary system is maximized subject to the minimum secondary transmission rate requirements. Furthermore, a sequential parametric convex approximation (SPCA) based iterative algorithm is proposed to solve this non-convex problem. Our proposed cooperative transmission scheme is reciprocally- benefited for both systems as the secondary system can access the licensed spectrum in both two slots and the primary confidential message can be protected from eavesdropping. In addition, we analyze the secrecy capacities for asymptotic scenarios. Simulation results demonstrate the performance superiority of our proposed scheme over conventional cooperative secure communication scheme in terms of the primary secrecy capacity.

[1]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[2]  Saeedeh Parsaeefard,et al.  Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users , 2014, IEEE Transactions on Wireless Communications.

[3]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[4]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Amir Beck,et al.  A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..

[6]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[7]  Xuemin Shen,et al.  Risk-Aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks , 2014, IEEE Journal on Selected Areas in Communications.

[8]  Mikael Skoglund,et al.  On the Optimization of the Secondary Transmitter's Strategy in Cognitive Radio Channels with Secrecy , 2014, IEEE Journal on Selected Areas in Communications.

[9]  Yichen Wang,et al.  A Hybrid Underlay/Overlay Transmission Mode for Cognitive Radio Networks with Statistical Quality-of-Service Provisioning , 2014, IEEE Transactions on Wireless Communications.

[10]  S Jagadeesan,et al.  Resource Allocation with Flexible Channel Cooperation in Cognitive Radio Networks , 2016 .

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.