Physical Layer Security for Primary System: A Symbiotic Approach in Cooperative Cognitive Radio Networks

Abstract-In this paper, we proposed a symbiotic approach for a secure primary network by allowing the secondary users to send the jamming noise to degrade the wiretap ability of the eavesdropper. In particular, assuming that the global channel state information is perfectly known at tranceivers, we consider the case of the primary transmitter equipped with only one antenna, which implies that the primary transmitter does not have beamforming capability. As the reward of having access to the frequency spectrum which is licensed by the the primary user, the secondary transmitter will assist the primary systems in terms of security by sending the jamming noise to the eavesdropper. We propose an algorithm to find the optimal transmit power for maximizing the secrecy capacity of the primary system. Numerical results are presented to validate our proposed scheme.

[1]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[2]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[3]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[4]  Dimitri P. Bertsekas,et al.  Nonlinear Programming , 1997 .

[5]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[6]  Jamie S. Evans,et al.  Secrecy rate maximization for cooperative overlay cognitive radio networks with artificial noise , 2014, 2014 IEEE International Conference on Communications (ICC).

[7]  Lars K. Rasmussen,et al.  Cooperation for secure broadcasting in cognitive radio networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[8]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[9]  Stephen J. Wright,et al.  Numerical Optimization , 2018, Fundamental Statistical Inference.

[10]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[13]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Tiep Minh Hoang,et al.  Secrecy Capacity of the Primary System in a Cognitive Radio Network , 2015, IEEE Transactions on Vehicular Technology.

[16]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.