Secure Beamforming for Untrusted MISO Cognitive Radio Networks

In this paper, we study the secure beamforming design for a cognitive radio network (CRN), where a primary transmitter–receiver pair coexists with an untrusted secondary transmitter–receiver pair. Each pair constitutes a multiple-input single-output link. We consider an underlay scheme and a cooperative scheme. For the underlay scheme, the secondary user (SU) is allowed to transmit simultaneously in the presence of the primary transmission. For the cooperative scheme, the secondary transmitter acts as a relay to forward the secrecy information of the primary transmission in exchange for its own transmission. For both schemes, the SU is untrusted and considered a potential eavesdropper. Our goal is to minimize the total power consumption while satisfying the primary user’s required secrecy rate and the SU’s required information rate. Using suitable optimization tools, we design the jointly optimal secure beamforming for the underlay scheme and an alternative optimizing algorithm for the cooperative scheme. To further reduce the complexity, we also design suboptimal zero-forcing beamformers for both schemes. The simulation results verify the proposed schemes.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[3]  Iain B. Collings,et al.  Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.

[4]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[5]  Meixia Tao,et al.  Optimal Linear Transceiver Designs for Cognitive Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Meng Zhang,et al.  Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.

[9]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[10]  Meng Zhang,et al.  Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[11]  Shuzhong Zhang,et al.  New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..

[12]  Xiangyun Zhou,et al.  Base Station Cooperation for Confidential Broadcasting in Multi-Cell Networks , 2015, IEEE Transactions on Wireless Communications.

[13]  Joonhyuk Kang,et al.  Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy , 2011, 2011 IEEE International Conference on Communications (ICC).

[14]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[15]  Ying-Chang Liang,et al.  Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks , 2007, IEEE Journal of Selected Topics in Signal Processing.

[16]  Branka Vucetic,et al.  Cooperative Spectrum Sharing in Cognitive Radio Networks With Multiple Antennas , 2011, IEEE Transactions on Signal Processing.

[17]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[18]  Meng Zhang,et al.  Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Yasutada Oohama,et al.  Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.

[20]  Aylin Yener,et al.  Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.

[21]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[22]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[23]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[24]  Mengyu Liu,et al.  Power Allocation for Secure SWIPT Systems With Wireless-Powered Cooperative Jamming , 2017, IEEE Communications Letters.

[25]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[26]  Shuzhong Zhang,et al.  Quadratic maximization and semidefinite relaxation , 2000, Math. Program..

[27]  Yingbo Hua,et al.  Optimal Design of Non-Regenerative MIMO Wireless Relays , 2007, IEEE Transactions on Wireless Communications.

[28]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[29]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[30]  Xiangyun Zhou,et al.  Regularized Channel Inversion for Simultaneous Confidential Broadcasting and Power Transfer: A Large System Analysis , 2016, IEEE Journal of Selected Topics in Signal Processing.

[31]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[32]  Ian F. Akyildiz,et al.  A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.

[33]  Qian Zhang,et al.  Stackelberg game for utility-based cooperative cognitiveradio networks , 2009, MobiHoc '09.