Data Capture of Cognitive Radio-Based Red Network by a Blue Network in Tactical Wireless Networks

In this paper, we consider data capture of a cognitive radio-based red network in tactical wireless networks. In the blue (friendly) network, an eavesdropping sensor node is deployed to capture data of the red (adversary) network, where the red network adopts cognitive radio for opportunistic data transmission. Since most wireless networks suffer energy constraints, we investigate the data capture (eavesdropping) performance of the blue network in two scenarios of energy management: no energy harvesting and energy harvesting. In both of the energy scenarios, we formulate the problem of maximizing data-capturing performance of blue network in the framework of a partially observable Markov decision process (POMDP) by considering feedback observations of actions. Furthermore, a recursive method is adopted to solve the problem by which the optimal action policy for the eavesdropping sensor nodes of blue network is obtained. Finally, we compare the performances of the proposed scheme with those of different reference methods under the two mentioned energy scenarios. Numerical results show that the proposed POMDP-based scheme can improve the data-capturing performance of the eavesdropping sensor node.

[1]  Audrey F. Callanan,et al.  Achieving sink node anonymity under energy constraints in tactical wireless sensor networks , 2015, 2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision.

[2]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..

[3]  Insoo Koo,et al.  Energy-Efficient Infrastructure Sensor Network for Ad Hoc Cognitive Radio Network , 2015, IEEE Sensors Journal.

[4]  Tiep Minh Hoang,et al.  Secrecy Capacity of the Primary System in a Cognitive Radio Network , 2015, IEEE Transactions on Vehicular Technology.

[5]  Pierre Bertrand,et al.  Discrete-time estimation of a Markov chain with marked point process observations. Application to Markovian jump filtering , 2001, IEEE Trans. Autom. Control..

[6]  Rose Qingyang Hu,et al.  Impact of Interference on Secrecy Capacity in a Cognitive Radio Network , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[7]  George F. Elmasry A comparative review of commercial vs. tactical wireless networks , 2010, IEEE Communications Magazine.

[8]  Walid Saad,et al.  Evading eavesdroppers in adversarial cognitive radio networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[9]  Symeon Chatzinotas,et al.  Power allocation for energy-constrained cognitive radios in the presence of an eavesdropper , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[10]  Kai-Kit Wong,et al.  Robust Masked Beamforming for MISO Cognitive Radio Networks With Unknown Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.

[11]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[12]  Shuguang Cui,et al.  On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[13]  Jiming Chen,et al.  Energy-efficient cooperative spectrum sensing in sensor-aided cognitive radio networks , 2012, IEEE Wireless Communications.

[14]  Ahmed Sultan Sensing and Transmit Energy Optimization for an Energy Harvesting Cognitive Radio , 2012, IEEE Wireless Communications Letters.

[15]  Prasant Mohapatra,et al.  Efficient data capturing for network forensics in cognitive radio networks , 2011, ICNP 2011.

[16]  Lei Chen,et al.  An Adaptive Cooperative Spectrum Sensing Scheme Based on the Optimal Data Fusion Rule , 2007, 2007 4th International Symposium on Wireless Communication Systems.

[17]  Komwut Wipusitwarakun,et al.  Tactical wireless networks: A survey for issues and challenges , 2015, 2015 Asian Conference on Defence Technology (ACDT).

[18]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[19]  Pramod K. Varshney,et al.  Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.