Relay Selection for Improved Security in Cognitive Relay Networks With Jamming

In this letter, we consider an underlay cognitive radio network in which a secondary transmitter (ST) communicates with a secondary destination (SD) with the aid of multiple cognitive relays, and multiple colluding eavesdroppers attempt to intercept the secondary transmission. Assuming that there is no ST-SD link, one of the cognitive relays is selected to convey the confidential information, while the others cooperate in jamming the eavesdroppers by transmitting artificial noise. Since the eavesdroppers’ channel information state is considered to be absent, two opportunistic relay selection schemes are proposed to enhance the security of the system. We derive novel closed-form expressions for the secrecy outage probability. Simulation results are presented to validate our analysis.

[1]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[2]  Derrick Wing Kwan Ng,et al.  Artificial Noise Assisted Secure Transmission for Distributed Antenna Systems , 2016, IEEE Transactions on Signal Processing.

[3]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[4]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[5]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[6]  Gaofeng Pan,et al.  Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.

[7]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[8]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[9]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[10]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[11]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[12]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[13]  Hien Quoc Ngo,et al.  Secure full-duplex small-cell networks in a spectrum sharing environment , 2016, IEEE Access.

[14]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.