Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks

AbstractThis paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the normal interference constraint imposed by the primary user (PU). Thus, the SU must have a suitable power allocation policy which does not only satisfy the constraints of the PU but also the security constraints such that it obtains a reasonable performance for the SU, without exposing information to the eavesdropper. We derive four power allocation policies for different scenarios corresponding to whether or not the channel state information of the PU and the eavesdropper are available at the SU. Further, we introduce the concept secure and reliable communication probability (SRCP) as a performance metric to evaluate the considered system, as well as the efficiency of the four power allocation policies. Finally, we present numerical examples to illustrate the power allocation polices, and the impact of these policies on the SRCP of the SU.

[1]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[2]  Michael Gastpar,et al.  On Capacity Under Receive and Spatial Spectrum-Sharing Constraints , 2007, IEEE Transactions on Information Theory.

[3]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[4]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[5]  Xiaodong Wang,et al.  A robust MDP approach to secure power control in cognitive radio networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Mikael Skoglund,et al.  Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.

[8]  Joseph Mitola Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..

[9]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[10]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[11]  Tran Trung Duy,et al.  Secure Cognitive Reactive Decode-and-Forward Relay Networks: With and Without Eavesdropper , 2015, Wirel. Pers. Commun..

[12]  Leila Musavian,et al.  Fundamental capacity limits of cognitive radio in fading environments with imperfect channel information , 2009, IEEE Transactions on Communications.

[13]  Aylin Yener,et al.  Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.

[14]  Hung Tran Performance Analysis of Cognitive Radio Networks with Interference Constraints , 2013 .

[15]  M. H. Rehmani,et al.  White space : De fi nitional perspectives and their role in exploiting spectrum opportunities , 2016 .

[16]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[17]  Georges Kaddoum,et al.  Survey on Threats and Attacks on Mobile Networks , 2016, IEEE Access.

[18]  Tongtong Li,et al.  Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[19]  Yueming Cai,et al.  Increasing secrecy capacity via joint design of cooperative beamforming and jamming , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[20]  Gongpu Wang,et al.  Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.

[21]  Behnam Bahrak,et al.  Protecting the primary users' operational privacy in spectrum sharing , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).

[22]  Yiyang Pei,et al.  Achieving cognitive and secure transmissions using multiple antennas , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[23]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[24]  Ahmed Abdel-Hadi,et al.  A Multitier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions , 2015, IEEE Transactions on Cognitive Communications and Networking.

[25]  Tran Trung Duy,et al.  Secrecy performance analysis with relay selection methods under impact of co-channel interference , 2015, IET Commun..

[26]  Jia Zhu,et al.  Physical-Layer Security for Cooperative Relay Networks , 2016, Wireless Networks.

[27]  Mauro Barni,et al.  An Information Theoretic Perspective , 2004 .

[28]  Yu-Dong Yao,et al.  An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[29]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[31]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[32]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[33]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[34]  Hans-Jürgen Zepernick,et al.  On physical layer security for reactive DF cognitive relay networks , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[35]  Chittabrata Ghosh,et al.  Secure Communication in Cognitive Radio Networks , 2022 .

[36]  Martin Reisslein,et al.  White space , 2016 .

[37]  Yasir Saleem,et al.  Primary radio user activity models for cognitive radio networks: A survey , 2014, J. Netw. Comput. Appl..

[38]  Martin Reisslein,et al.  Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols , 2016, IEEE Communications Surveys & Tutorials.

[39]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[40]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[41]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[42]  Alexander M. Wyglinski,et al.  A Spectrum Surveying Framework for Dynamic Spectrum Access Networks , 2009, IEEE Transactions on Vehicular Technology.

[43]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[44]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[45]  Hung Tran,et al.  Impact of secondary user communication on security communication of primary user , 2014, Secur. Commun. Networks.

[46]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[47]  Hung Tran,et al.  Impact of primary networks on the performance of secondary networks , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).