Transmit beamforming with imperfect CSIT in spectrum leasing for physical-layer security

In spectrum leasing, primary users (PUs) lease the part of their spectral resources to secondary users (SUs) in exchange for appropriate remuneration. In this paper, we consider spectrum leasing via cooperation for physical-layer security that the secondary cooperation exists for improving the primary secrecy rate while maintaining its quality of service (QoS). Unlike the previous researches with the perfect channel state information (CSI) at transmitter (CSIT) assumption, we study when no information regarding the eavesdropper is available at the transmitter. This imperfect CSIT makes the SU's transmission strategy limited. To find the optimal transmission technique for the SU, we formulate a problem appropriate for the imperfect CSIT case. By using the proposed problem, we design the optimal transmit beamforming for the SU. Also, we analyze the ergodic rate of the secondary link at high signal-to-noise ratio (SNR) when the secondary cooperation focuses only on maximizing the primary secrecy rate for the viable choice of the secondary QoS level. The numerical result shows that the primary secrecy rate by the proposed transmit beamforming is comparable to that based on the perfect CSIT.

[1]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[2]  Eduard A. Jorswieck Secrecy capacity of single- and multi-antenna channels with simple helpers , 2010, 2010 International ITG Conference on Source and Channel Coding (SCC).

[3]  Eduard A. Jorswieck,et al.  Optimal Beamforming in Interference Networks with Perfect Local Channel Information , 2010, IEEE Transactions on Signal Processing.

[4]  H. Vincent Poor,et al.  Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.

[5]  Erik G. Larsson,et al.  Complete Characterization of the Pareto Boundary for the MISO Interference Channel , 2008, IEEE Transactions on Signal Processing.

[6]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[7]  Joonhyuk Kang,et al.  Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy , 2011, 2011 IEEE International Conference on Communications (ICC).

[8]  Umberto Spagnolini,et al.  Spectrum Leasing to Cooperating Secondary Ad Hoc Networks , 2008, IEEE Journal on Selected Areas in Communications.

[9]  Erik G. Larsson,et al.  Competition Versus Cooperation on the MISO Interference Channel , 2008, IEEE Journal on Selected Areas in Communications.

[10]  Umberto Spagnolini,et al.  Cooperative ARQ via auction-based spectrum leasing , 2010, IEEE Transactions on Communications.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Ying-Chang Liang,et al.  Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks , 2007, IEEE Journal of Selected Topics in Signal Processing.

[13]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.