Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks

In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's quality of service (QoS) constraint while the eavesdroppers attempt to intercept the cognitive transmissions from CUs to CBS. We investigate the physical-layer security against eavesdropping attacks in the cognitive radio network and propose the user scheduling scheme to achieve multiuser diversity for improving the security level of cognitive transmissions with a primary QoS constraint. Specifically, a cognitive user (CU) that satisfies the primary QoS requirement and maximizes the achievable secrecy rate of cognitive transmissions is scheduled to transmit its data packet. For the comparison purpose, we also examine the traditional multiuser scheduling and the artificial noise schemes. We analyze the achievable secrecy rate and intercept probability of the traditional and proposed multiuser scheduling schemes as well as the artificial noise scheme in Rayleigh fading environments. Numerical results show that given a primary QoS constraint, the proposed multiuser scheduling scheme generally outperforms the traditional multiuser scheduling and the artificial noise schemes in terms of the achievable secrecy rate and intercept probability. In addition, we derive the diversity order of the proposed multiuser scheduling scheme through an asymptotic intercept probability analysis and prove that the full diversity is obtained by using the proposed multiuser scheduling.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  Philip A. Whiting,et al.  Convergence of proportional-fair sharing algorithms under general conditions , 2004, IEEE Transactions on Wireless Communications.

[3]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[4]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[5]  Danijela Cabric,et al.  Experimental study of spectrum sensing based on energy detection and network cooperation , 2006, TAPAS '06.

[6]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[7]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[8]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[9]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[10]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[11]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[12]  Yu-Dong Yao,et al.  Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions , 2012, IEEE Communications Magazine.

[13]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[14]  Geoffrey Ye Li,et al.  Ten years of research in spectrum sensing and sharing in cognitive radio , 2012, EURASIP J. Wirel. Commun. Netw..

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  Ying-Chang Liang,et al.  Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks , 2007, IEEE Journal of Selected Topics in Signal Processing.

[17]  Lizhong Zheng,et al.  Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.

[18]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[19]  Yu-Dong Yao,et al.  An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[20]  Ami Wiesel,et al.  On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[21]  Xianbin Wang,et al.  Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack , 2013, 2013 IEEE International Conference on Communications (ICC).

[22]  Erik G. Larsson On the combination of spatial diversity and multiuser diversity , 2004, IEEE Communications Letters.

[23]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[24]  Martin Haardt,et al.  An introduction to the multi-user MIMO downlink , 2004, IEEE Communications Magazine.

[25]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[26]  Vijay K. Bhargava,et al.  Optimal and Suboptimal Power Allocation Schemes for OFDM-based Cognitive Radio Systems , 2008, IEEE Transactions on Wireless Communications.

[27]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[28]  Husheng Li Cooperative Spectrum Sensing via Belief Propagation in Spectrum-Heterogeneous Cognitive Radio Systems , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[29]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[30]  Jing Wang,et al.  Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).