Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise

The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed according to Poisson point processes. Centring on this scenario, the authors propose a simple and decentralised secure transmission scheme by jointly incorporating the secrecy guard zone and artificial noise. In particular, this transmission scheme helps to enhance secrecy performance via differentiating between secondary transmitters in accordance with the eavesdropping environment. They then analyse the connection outage and secrecy outage performance of the secondary network, based on which they obtain the closed-form expression of the secrecy throughput. They further determine the optimal transmission power of the secondary transmitters and the optimal power allocation between the information-bearing signal and artificial noise to maximise the secrecy throughput of the secondary network under primary and secondary outage constraints. The authors’ analysis highlights that introducing secrecy guard zone provides better security performance, and artificial noise performs as additional interference to insert a control between the reliability and security. Numerical results show how the system parameters affect the achievable maximum secrecy throughput, the optimal transmission power and the optimal power allocation between the information-bearing signal and the artificial noise.

[1]  Kaibin Huang,et al.  Opportunistic Wireless Energy Harvesting in Cognitive Radio Networks , 2013, IEEE Transactions on Wireless Communications.

[2]  François Baccelli,et al.  An Aloha protocol for multihop mobile wireless networks , 2006, IEEE Transactions on Information Theory.

[3]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[4]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[5]  Mikael Skoglund,et al.  Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.

[6]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[7]  Moe Z. Win,et al.  Cognitive network secrecy with interference engineering , 2014, IEEE Network.

[8]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Hui Li,et al.  Toward a unified elastic computing platform for smartphones with cloud support , 2013, IEEE Network.

[10]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[11]  Athanasios V. Vasilakos,et al.  Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[12]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[13]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.

[14]  Donald F. Towsley,et al.  Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.

[15]  Wei Zhang,et al.  Opportunistic Spectrum Sharing With Limited Feedback in Poisson Cognitive Radio Networks , 2014, IEEE Transactions on Wireless Communications.

[16]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[17]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[18]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[19]  Jeffrey G. Andrews,et al.  The Guard Zone in Wireless Ad hoc Networks , 2007, IEEE Transactions on Wireless Communications.

[20]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[21]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[22]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.