Proposed relay selection scheme for physical layer security in Cognitive Radio networks

Cognitive Radio (CR) technology is one of the strong candidate technologies to solve the spectrum scarcity problems. In this paper, we tackle the problem of secure data transmission between a secondary user transmitter and receiver through a relay in the presence of an eavesdropper in a cognitive radio network. The proposed scheme selects the best Decode-and-Forward relay among different relays to assist the transmitter, and to maximize the achievable secrecy rate without harming the primary user. Simulation results show that the secrecy capacity of the network using this scheme will almost be double the capacity when selecting the conventional scheme of relay selection.

[1]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[2]  Paul J. Kolodzy,et al.  Interference temperature: a metric for dynamic spectrum utilization , 2006, Int. J. Netw. Manag..

[3]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[4]  Scott L. Miller,et al.  Probability and Random Processes : With Applications to Signal Processing and Communications , 2012 .

[5]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[6]  Han-Chieh Chao,et al.  Transaction-Pattern-Based Anomaly Detection Algorithm for IP Multimedia Subsystem , 2011, IEEE Transactions on Information Forensics and Security.

[7]  J. D. T. Oliveira,et al.  The Asymptotic Theory of Extreme Order Statistics , 1979 .

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[10]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[11]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[12]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[13]  Hongke Zhang,et al.  Two LIC-Based Fast Forwarding Schemes for Explicit Routing with Scalability, Flexibility and Security , 2011 .

[14]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[15]  Yiyang Pei,et al.  Achieving cognitive and secure transmissions using multiple antennas , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[16]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.