Physical Layer Security of a Multiantenna-Based CR Network With Single and Multiple Primary Users

In this paper, we present a method of utilizing channel diversity to improve the secrecy outage probability and the intercept probability in a cognitive radio (CR) network. With the presence of channel diversity, an intended receiver can achieve a relatively better secrecy outage probability and intercept probability. We consider a CR network in which a single antenna, which maximizes the secrecy capacity, is selected at the CR transmitter. To demonstrate the advantages of our proposed framework, we derive new exact closed-form expressions for the secrecy outage probability and the intercept probability of the secondary network in Rayleigh fading. The positive impact of the number of receive antennas and the negative impact of the number of primary users on the secondary network are shown. The derived secrecy outage probability is found to be in precise agreement with simulation results. The numerical results strongly support our conclusion that maximal-ratio combining of channel diversity can enhance the physical layer security of a multiantenna based CR network. Furthermore, the numerical results reveal the impact of the primary network on the secondary network in the presence of a multiantenna wiretap channel.

[1]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[2]  Aria Nosratinia,et al.  Asymptotic capacity analysis of transmit antenna selection , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[3]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[4]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[5]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[7]  H. Vincent Poor,et al.  Cooperative Energy Harvesting Networks With Spatially Random Users , 2013, IEEE Signal Processing Letters.

[8]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[9]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[10]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[13]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[14]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[15]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[16]  Aylin Yener,et al.  Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.

[17]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[18]  Aarnout Brombacher,et al.  Probability... , 2009, Qual. Reliab. Eng. Int..

[19]  Jeffrey G. Andrews,et al.  Outage Probability of Cognitive Relay Networks with Interference Constraints , 2011, IEEE Transactions on Wireless Communications.

[20]  Hesham El Gamal,et al.  Cooperative Secrecy: The Relay-Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[21]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in cognitive radio networks , 2012, IET Commun..

[22]  Aria Nosratinia,et al.  Antenna selection in MIMO systems , 2004, IEEE Communications Magazine.

[23]  Il-Min Kim,et al.  Secure communications with untrusted secondary users in cognitive radio networks , 2014, 2012 IEEE Global Communications Conference (GLOBECOM).

[24]  Gregory W. Wornell,et al.  The MIMOME Channel , 2007, ArXiv.

[25]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[26]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[27]  Hong Man,et al.  Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.

[28]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[29]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[30]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[31]  Shamik Sengupta,et al.  Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2011, IEEE Journal on Selected Areas in Communications.

[32]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[33]  Mustafa Cenk Gursoy,et al.  Secure relay beamforming over cognitive radio channels , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[34]  Guanding Yu,et al.  On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.

[35]  Kyung Seung Ahn,et al.  Secrecy Performance of Maximum Ratio Diversity With Channel Estimation Error , 2015, IEEE Signal Processing Letters.

[36]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[37]  Mohamed-Slim Alouini,et al.  Digital Communication over Fading Channels: Simon/Digital Communications 2e , 2004 .

[38]  Miguel R. D. Rodrigues,et al.  On Wireless Channels With ${M}$-Antenna Eavesdroppers: Characterization of the Outage Probability and $\varepsilon $-Outage Secrecy Capacity , 2011, IEEE Transactions on Information Forensics and Security.

[39]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[40]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[41]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[42]  Ranjan K. Mallik,et al.  Cognitive MIMO Relay Networks With Generalized Selection Combining , 2014, IEEE Transactions on Wireless Communications.

[43]  M. Yuksel,et al.  Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.