Secure communication over MISO cognitive radio channels

In this paper, we address the physical-layer security issue of a secondary user (SU) in a spectrum-sharing cognitive radio network (CRN) from an information-theoretic perspective. Specially, we consider a secure multiple-input single-output (MISO) cognitive radio channel, where a multi-antenna SU transmitter (SU-Tx) sends confidential information to a legitimate SU receiver (SU-Rx) in the presence of an eavesdropper and on the licensed band of a primary user (PU). The secrecy capacity of the channel is characterized, which is a quasiconvex optimization problem of finding the capacity-achieving transmit covariance matrix under the joint transmit power and interference power constraints. Two numerical approaches are proposed to derive the optimal transmit covariance matrix. The first approach recasts the original quasiconvex problem into a single convex semidefinite program (SDP) by exploring its inherent convexity; while the second one explores the relationship between the secure CRN and the conventional CRN and transforms the original problem into a sequence of optimization problems associated with the conventional CRN, which helps to prove that beamforming is the optimal strategy for the secure MISO CR channel. In addition, to reduce the computational complexity, three suboptimal schemes are presented, namely, scaled secret beamforming (SSB), projected secret beamforming (PSB) and projected cognitive beamforming (PCB). Lastly, computer simulation results show that the three suboptimal schemes can approach the secrecy capacity well under certain conditions.

[1]  H. Vincent Poor,et al.  Cognitive multiple access channels: optimal power allocation for weighted sum rate maximization , 2009, IEEE Transactions on Communications.

[2]  Ying-Chang Liang,et al.  Optimal design of learning based MIMO cognitive radio systems , 2009, 2009 IEEE International Symposium on Information Theory.

[3]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[4]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[5]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[6]  Ying-Chang Liang,et al.  Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks , 2007, IEEE Journal of Selected Topics in Signal Processing.

[7]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[8]  Yiyang Pei,et al.  Robust Beamforming Design: From Cognitive Radio MISO Channels to Secrecy MISO Channels , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[9]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .

[10]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[11]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[12]  Yiyang Pei,et al.  Achieving cognitive and secure transmissions using multiple antennas , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[13]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Shlomo Shamai,et al.  The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.

[16]  Arkadi Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.

[17]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[18]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[19]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[20]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[21]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[22]  Ying-Chang Liang,et al.  Weighted sum rate optimization for cognitive radio MIMO broadcast channels , 2009, IEEE Transactions on Wireless Communications.

[23]  Ying-Chang Liang,et al.  Optimal power allocation for fading channels in cognitive radio networks: Ergodic capacity and outage capacity , 2008, IEEE Transactions on Wireless Communications.

[24]  H. Vincent Poor,et al.  Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.

[25]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[26]  Amir Ghasemi,et al.  Fundamental limits of spectrum-sharing in fading environments , 2007, IEEE Transactions on Wireless Communications.