Secure Cognitive MIMO Wiretap Networks With Different Antenna Transmission Schemes

This paper investigates a secure transmission in the multiple-input multiple-output (MIMO) cognitive wiretap networks, where a secondary transmitter (Alice) sends data to a secondary receiver (Bob) in the presence of an eavesdropper (Eve). In order to solve the problems of inter channel interference and inter antenna synchronization encountered by traditional MIMO technologies, the antenna transmission scheme is adopted at the transmitter. As a comparison, we design two different antenna transmission schemes, namely transmit antenna selection maximal-ratio combining (TAS-MRC) scheme and differential spatial modulation maximal-ratio combining (DSM-MRC) scheme, respectively. Moreover, due to outdated channel state information (CSI) of the interference link from Alice to the primary user (PU), we propose power control mechanism to protect the quality of service (QoS) of PU. Furthermore, the closed-form for the secrecy outage probability and the secrecy throughput with TAS-MRC and DSM-MRC schemes are derived to evaluate the secrecy performance, respectively. What’s more, we explore the security diversity gain and coding gain based on the asymptotic secrecy outage probability. As the results, it demonstrates that DSM-MRC requires less CSI and is convenient for modulation and demodulation, but sacrifices some secrecy performance gains between two proposed schemes.

[1]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[2]  Zan Li,et al.  On the Performance of Spectrum Sharing Cognitive Relay Networks with Imperfect CSI , 2012, IEEE Communications Letters.

[3]  Nan Yang,et al.  Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks , 2016, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[4]  Ho Van Khuong Exact Outage Analysis of Underlay Cooperative Cognitive Networks with Reactive Relay Selection Under Imperfect Channel Information , 2015, Wirel. Pers. Commun..

[5]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[6]  Xiaodong Ji,et al.  Security-Reliability Tradeoff Analysis for Underlay Cognitive Two-Way Relay Networks , 2019, IEEE Transactions on Wireless Communications.

[7]  Ertugrul Basar,et al.  Index modulation techniques for 5G wireless networks , 2016, IEEE Communications Magazine.

[8]  Xing Zhang,et al.  Performance analysis of cognitive relay networks with imperfect channel knowledge over Nakagami-m fading channels , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[9]  Insoo Koo,et al.  A Novel Physical Layer Security Scheme in OFDM-Based Cognitive Radio Networks , 2018, IEEE Access.

[10]  Shuangqing Wei,et al.  Diversity–Multiplexing Tradeoff of Asynchronous Cooperative Diversity in Wireless Networks , 2007, IEEE Transactions on Information Theory.

[11]  Trung Quang Duong,et al.  Physical Layer Security With Threshold-Based Multiuser Scheduling in Multi-Antenna Wireless Networks , 2016, IEEE Transactions on Communications.

[12]  Tao Zhang,et al.  Secure Multiantenna Cognitive Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.

[13]  Caijun Zhong,et al.  Cognitive MIMO Relaying Networks With Primary User's Interference and Outdated Channel State Information , 2014, IEEE Transactions on Communications.

[14]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  Yueming Cai,et al.  A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Yahong Rosa Zheng,et al.  Multiantenna Secure Cognitive Radio Networks With Finite-Alphabet Inputs: A Global Optimization Approach for Precoder Design , 2016, IEEE Transactions on Wireless Communications.

[18]  Tao Zhang,et al.  Secure Transmission for Differential Quadrature Spatial Modulation With Artificial Noise , 2019, IEEE Access.

[19]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[20]  Moon Ho Lee,et al.  Enhancing Security of Primary User in Underlay Cognitive Radio Networks With Secondary User Selection , 2018, IEEE Access.

[21]  Tao Zhang,et al.  Secure Transmission in Cognitive MIMO Relaying Networks With Outdated Channel State Information , 2016, IEEE Access.

[22]  Yueming Cai,et al.  Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.

[23]  Walaa Hamouda,et al.  Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and Applications , 2017, IEEE Communications Surveys & Tutorials.

[24]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[25]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[26]  Mohamed-Slim Alouini,et al.  Secrecy performance analysis of SIMO underlay cognitive radio systems with outdated CSI , 2017, IET Commun..

[27]  Mohamed-Slim Alouini,et al.  On Secure Mixed RF-FSO Systems With TAS and Imperfect CSI , 2018, IEEE Transactions on Communications.

[28]  Il-Min Kim,et al.  Diversity order analysis of the decode-and-forward cooperative networks with relay selection , 2007, IEEE Transactions on Wireless Communications.

[29]  Hong Wen,et al.  A framework of the PHY-layer approach to defense against security threats in cognitive radio networks , 2013, IEEE Network.

[30]  Xiang Cheng,et al.  Differential Spatial Modulation , 2015, IEEE Transactions on Vehicular Technology.

[31]  Bo Wang,et al.  Artificial-Noise-Aided Beamforming Design in the MISOME Wiretap Channel Under the Secrecy Outage Probability Constraint , 2017, IEEE Transactions on Wireless Communications.

[32]  Imran Shafique Ansari,et al.  Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels , 2017, IEEE Transactions on Vehicular Technology.

[33]  Moe Z. Win,et al.  Performance of RAKE reception in dense multipath channels: implications of spreading bandwidth and selection diversity order , 2000, IEEE Journal on Selected Areas in Communications.

[34]  Xiuzhen Cheng,et al.  Dynamic spectrum access: from cognitive radio to network radio , 2012, IEEE Wireless Communications.

[35]  Fengchao Zhu,et al.  Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming , 2016, IEEE Transactions on Vehicular Technology.

[36]  Evelio Fernandez,et al.  Physical Layer Security in Cognitive Radio Networks Using Improper Gaussian Signaling , 2018, IEEE Communications Letters.

[37]  Harald Haas,et al.  Spatial Modulation , 2008, IEEE Transactions on Vehicular Technology.