On physical-layer security for primary system in underlay cognitive radio networks

In this study, the authors consider the physical-layer security for transmission in underlay cognitive radio networks, where consisting of a primary source-destination pair, a secondary transmitter-receiver pair and a common eavesdropper (E). To transmit data in a secure and reliable manner, they propose a transmission protocol for an underlay cognitive radio network. In particular, the secondary user is allowed to operate on the primary spectrum bandwidth when the interference threshold is satisfied. To protect the transmission confidentiality of primary system, PS node transmits a signal, which is linearly combined with the jamming signal (as artificial noise) and expectation signal, to interfere E. Furthermore, they propose a superimposed coding to combine with the artificial noise and expectation signal at PS node. We also analyse the performance of the proposed transmission protocol. We obtain the outage probability of secondary and primary systems. Simultaneously, they derive the closed-form expression of intercept probability for primary system. In addition, they verify the performance of their proposed transmission protocol by numerical experiment. The numerical results show that their proposed transmission protocol not only has the better outage performance for secondary system but also has the better intercept performance for primary system.

[1]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Jia Zhu,et al.  Energy-Aware Multiuser Scheduling for Physical-Layer Security in Energy-Harvesting Underlay Cognitive Radio Systems , 2018, IEEE Transactions on Vehicular Technology.

[3]  Lihua Li,et al.  A Cooperation and Access Spectrum Sharing Protocol with Cooperative Interference Management , 2015, Wirel. Pers. Commun..

[4]  Hui-Ming Wang,et al.  On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system , 2016, IEEE Access.

[5]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[6]  Anas M. Salhab,et al.  New Bandwidth Efficient Relaying Schemes in Cooperative Cognitive Two-Way Relay Networks With Physical Layer Security , 2017, IEEE Transactions on Vehicular Technology.

[7]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[8]  H. Vincent Poor,et al.  Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems , 2015, IEEE Transactions on Communications.

[9]  Athina P. Petropulu,et al.  Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[11]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[12]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[13]  Gaofeng Pan,et al.  Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.

[14]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[15]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[16]  Pingzhi Fan,et al.  Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise , 2014, IEEE Transactions on Wireless Communications.

[17]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[18]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.