A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks

In this paper, we consider a centralized cooperative cognitive radio network (CCRN), where a primary base station sends a message to a primary user. Meanwhile, a secondary user transmitter (SU-Tx) acts as a friendly jammer that sends jamming signals (artificial noise) to protect the transmitted message from a potential eavesdropper (Eve). However, the SU-Tx may not be completely honest in sending jamming signals for selfish reasons, i.e., it may be untrusted. To select a trustworthy SU-Tx as a friendly jammer, we adopt the concept of trust degree as a selection criterion. We investigate the trust degree's influence on the secrecy performance of a CCRN in cases of perfect channel state information (CSI) and statistical CSI, respectively. In the case of perfect CSI, the accurate expected secrecy rate is derived to evaluate the secrecy performance. In the case of statistical CSI, we calculate the probabilities of the transmission and secrecy outage events, and the secrecy performance is evaluated in terms of effective secrecy throughput. In both cases, we obtain the target trust degree thresholds based on the target secrecy performance thresholds, respectively. Next, we investigate how to calculate the trust degree of each SU-Tx and establish a trust degree list of all SU-Txs. Finally, according to the trust degree list and the target trust degree thresholds, we can select a trustworthy SU-Tx as a friendly jammer in both two cases. A comprehensive simulation study is carried out to validate our secrecy performance analyses and the trust degree management.

[1]  Xiaofeng Tao,et al.  Physical Layer Security with Untrusted Relays in Wireless Cooperative Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[2]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[3]  Xiaoshuang Xing,et al.  Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks , 2017, IET Commun..

[4]  Qiang Li,et al.  Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.

[5]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Tony Q. S. Quek,et al.  Confidential Cooperative Communication With Trust Degree of Potential Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.

[7]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[8]  Anupam Joshi,et al.  Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network , 2017, IET Commun..

[9]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[10]  Zhen Li,et al.  Achieving secure communications in multi-antenna cooperative cognitive radio networks using cooperative jamming , 2016, Int. J. Sens. Networks.

[11]  Xi Zhang,et al.  Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).

[12]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[13]  Arumugam Nallanathan,et al.  Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game , 2016, IEEE Communications Letters.

[14]  Hao Zhou,et al.  Auction-Based Frameworks for Secure Communications in Static and Dynamic Cognitive Radio Networks , 2017, IEEE Transactions on Vehicular Technology.

[15]  Anant Sahai,et al.  SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.

[16]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[17]  H. Urkowitz Energy detection of unknown deterministic signals , 1967 .

[18]  Ilsun You,et al.  A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing , 2018, IEEE Access.

[19]  Ha H. Nguyen,et al.  Fast Global Optimal Power Allocation in Wireless Networks by Local D.C. Programming , 2012, IEEE Transactions on Wireless Communications.

[20]  Kim-Kwang Raymond Choo,et al.  Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices , 2018, IEEE Consumer Electronics Magazine.

[21]  Brandon F. Lo A survey of common control channel design in cognitive radio networks , 2011, Phys. Commun..

[22]  Ying-Chang Liang,et al.  Design of Learning-Based MIMO Cognitive Radio Systems , 2009, IEEE Transactions on Vehicular Technology.

[23]  P. Saxena,et al.  Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning , 2015, Comput. Secur..

[24]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[25]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[26]  H. Vincent Poor,et al.  Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.

[27]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[28]  Li Wang,et al.  Cooperative Jamming-Aided Secrecy Enhancement in P2P Communications With Social Interaction Constraints , 2017, IEEE Transactions on Vehicular Technology.

[29]  Zhihong Zhou,et al.  Understanding structure-based social network de-anonymization techniques via empirical analysis , 2018, EURASIP J. Wirel. Commun. Netw..

[30]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[31]  Xu Chen,et al.  Social-aware relay selection for cooperative networking: An optimal stopping approach , 2014, 2014 IEEE International Conference on Communications (ICC).

[32]  Zhenkai Liang,et al.  Detecting Malicious Behaviors in JavaScript Applications , 2018, IEEE Access.

[33]  Li Wang,et al.  Jamming partner selection for maximising the worst D2D secrecy rate based on social trust , 2017, Trans. Emerg. Telecommun. Technol..

[34]  Xiuzhen Cheng,et al.  Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.

[35]  Zhen Li,et al.  Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.

[36]  Shijie Li,et al.  Cost Efficiency in Coordinated Multiple-Point System Based on Multi-Source Power Supply , 2018, IEEE Access.

[37]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[38]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.