Robust Masked Beamforming for MISO Cognitive Radio Networks With Unknown Eavesdroppers

This paper studies a cognitive radio network (CRN), in which a multiple-input single-output (MISO) secondary transmitter (SU-Tx) aims to send confidential messages to its receiver (SU-Rx) in the presence of unknown eavesdroppers, while having to control its generated interference to the primary users (PUs) under a given threshold. Because the eavesdroppers are unknown, this paper considers the artificial noise (AN) approach or masked beamforming to provide the information secrecy. The objective of this paper is to maximize the power of AN in order to degrade the eavesdroppers, subject to the signal-to-interference-plus-noise ratio (SINR) constraint at the SU-Rx, as well as the interference temperature limits (ITLs) for the PUs. In the case of perfect channel state information (CSI), we reveal that the optimal strategy for the information-bearing signal is beamforming. Imperfect CSI cases of bounded and stochastic uncertainties are investigated. In the case of ellipsoid-bounded errors, we derive the equivalent forms for the SINR and ITL constraints and then transform the optimization problem into a form of semidefinite programming (SDP). For the case of probabilistic CSI uncertainties, we propose an outage-constrained robust formulation where the CSI errors are Gaussian distributed. With the aid of two kinds of Bernstein-type inequalities, we reexpress the probabilistic constraints into deterministic forms, which results in a safe approximate solution.

[1]  Dongtang Ma,et al.  Robust Artificial Noise Aided Transmit Design for MISO Wiretap Channels with Channel Uncertainty , 2013, IEEE Communications Letters.

[2]  I. Bechar,et al.  A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables , 2009, 0909.3595.

[3]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[4]  Kin K. Leung,et al.  Impact of Imperfect Channel State Information on Bi-Directional Communications With Relay Selection , 2011, IEEE Transactions on Signal Processing.

[5]  Ying-Chang Liang,et al.  Joint power control and beamforming for cognitive radio networks , 2008, IEEE Transactions on Wireless Communications.

[6]  Björn E. Ottersten,et al.  Statistically Robust Design of Linear MIMO Transceivers , 2008, IEEE Transactions on Signal Processing.

[7]  Tung-Sang Ng,et al.  Robust Beamforming in Cognitive Radio , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[8]  L. C. Godara,et al.  Handbook of Antennas in Wireless Communications , 2001 .

[9]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[10]  Yonina C. Eldar,et al.  Robust Downlink Beamforming for Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[11]  Shahram Shahbazpanahi,et al.  Robust Downlink Beamforming Based on Outage Probability Specifications , 2007, IEEE Transactions on Wireless Communications.

[12]  Kai-Kit Wong,et al.  A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked Beamforming , 2012, IEEE Communications Letters.

[13]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[14]  Ying-Chang Liang,et al.  Robust Downlink Beamforming in Multiuser MISO Cognitive Radio Networks With Imperfect Channel-State Information , 2010, IEEE Transactions on Vehicular Technology.

[15]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[16]  Shuguang Cui,et al.  On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[17]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[18]  Björn E. Ottersten,et al.  Robust Cognitive Beamforming With Bounded Channel Uncertainties , 2009, IEEE Transactions on Signal Processing.

[19]  Yonina C. Eldar,et al.  Strong Duality in Nonconvex Quadratic Optimization with Two Quadratic Constraints , 2006, SIAM J. Optim..

[20]  Ying-Chang Liang,et al.  Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks , 2007, IEEE Journal of Selected Topics in Signal Processing.

[21]  Qiang Li,et al.  A robust artificial noise aided transmit design for MISO secrecy , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[22]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[23]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[24]  K. Cumanan,et al.  Robust interference control techniques for multiuser cognitive radios using worst-case performance optimization , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[25]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[26]  Qiang Li,et al.  A Safe Approximation Approach to Secrecy Outage Design for MIMO Wiretap Channels , 2014, IEEE Signal Processing Letters.

[27]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[28]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[29]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[30]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.

[31]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[32]  Pei-Jung Chung,et al.  A Probabilistic Constraint Approach for Robust Transmit Beamforming With Imperfect Channel Information , 2009, IEEE Transactions on Signal Processing.

[33]  Athina P. Petropulu,et al.  Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.