Impact of secondary user communication on security communication of primary user

Cognitive radio network concept has been considered as a promising solution to improve the spectrum utilization. However, it may be vulnerable to security problems as the primary user PU and secondary user SU access the same resource. In this paper, we consider a system model where an eavesdropper EAV illegally listens to the PU communication in the presence of a SU transmitter SU-Tx communicating with a SU receiver SU-Rx. The SU-Tx transmit power is subject to the peak transmit power constraint of the SU and outage probability constraint of the PU. Given this context, the effect of the interference from the SU-Tx to the EAV on the primary system security is investigated. In particular, analytical expressions of the probability of existence of non-zero secrecy capacity and secrecy outage probability of the PU are derived. Moreover, the performance analysis of the secondary network is examined where closed-form expressions of the symbol error probability and achievable rate are presented. Numerical examples are provided to evaluate the impact of the primary system parameters and channel conditions among users on the system performance of secondary and primary networks. Interestingly, our results reveal a fact that the security of the primary network strongly depends on the channel condition of the SU-Tx to the EAV link and the transmit power policy of the SU-Tx. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[3]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[4]  Rui Zhang,et al.  On peak versus average interference power constraints for protecting primary users in cognitive radio networks , 2008, IEEE Transactions on Wireless Communications.

[5]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[6]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[7]  Geoffrey Ye Li,et al.  Cognitive radio networking and communications: an overview , 2011, IEEE Transactions on Vehicular Technology.

[8]  Yan Chen,et al.  Cooperative Spectrum Access for Cognitive Radio Network Employing Rateless Code , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.

[9]  Halim Yanikomeroglu,et al.  Access Strategies for Spectrum Sharing in Fading Environment: Overlay, Underlay, and Mixed , 2010, IEEE Transactions on Mobile Computing.

[10]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[11]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[12]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[13]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[14]  Matthew R. McKay,et al.  Performance Analysis of MIMO-MRC in Double-Correlated Rayleigh Environments , 2005, IEEE Transactions on Communications.

[15]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[16]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[17]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[18]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[19]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[20]  Hans-Jürgen Zepernick,et al.  On non-zero secrecy capacity and outage probability of cognitive radio networks , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[21]  Hyokang Chang,et al.  Line, Trunk, and Service Circuit Test System of ITT System 1240 , 1984, IEEE J. Sel. Areas Commun..

[22]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[23]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[24]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[25]  D. Tolmie,et al.  HIPPI: simplicity yields success , 1993, IEEE Network.

[26]  Mansoor Shafi,et al.  The Effects of Limited Channel Knowledge on Cognitive Radio System Capacity , 2013, IEEE Transactions on Vehicular Technology.

[27]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[28]  Holger Boche,et al.  Physical Layer Service Integration in Wireless Networks : Signal processing challenges , 2014, IEEE Signal Processing Magazine.

[29]  Ying-Chang Liang,et al.  Optimal Power Allocation Strategies for Fading Cognitive Radio Channels with Primary User Outage Constraint , 2011, IEEE Journal on Selected Areas in Communications.

[30]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[31]  Yu-Dong Yao,et al.  An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.