Secrecy Capacity of the Primary System in a Cognitive Radio Network

With fast growth of wireless services, secrecy has become an increasingly important issue for wireless networks. In this paper, we investigate the secrecy capacity of the primary system in a cognitive radio system based on artificial noise, which has been proposed for dealing with the eavesdropper. We first consider a special case of one eavesdropper and two regimes of the eavesdropping channel condition. Specifically, we analyze the impact of interference generated by a secondary system toward the primary system in a cognitive radio system. The channel state information (CSI) of the primary channel is assumed to be perfectly known at both the primary transmitter and receiver, whereas that of the eavesdropper is partially known. Under these assumptions, we derive analytical expressions for the ergodic secrecy capacity in the cases of strong eavesdropping channel and weak eavesdropping channel and analyze the impact of the secondary system on the primary ergodic secrecy capacity. Moreover, we extend the analysis to the general case of arbitrary eavesdropping channel condition and arbitrary number of eavesdroppers. Some numerical results will be also presented to verify the analysis.

[1]  Shlomo Shamai,et al.  Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[2]  Mérouane Debbah,et al.  Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[3]  Chia-Chun Hung,et al.  Performance of multiuser diversity in MIMO systems on arbitrary Nakagami-m fading channels , 2012, Wirel. Commun. Mob. Comput..

[4]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[5]  Yan Liu,et al.  Unified Analysis of Multiuser Scheduling for Downlink MIMO Systems with Imperfect CSI , 2014, IEEE Transactions on Wireless Communications.

[6]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[7]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[8]  Shuguang Cui,et al.  On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[9]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[10]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[11]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[12]  E. Kreyszig,et al.  Advanced Engineering Mathematics. , 1974 .

[13]  E. Biglieri,et al.  Space-time decoding with imperfect channel estimation , 2003, IEEE Transactions on Wireless Communications.

[14]  J. Crank Tables of Integrals , 1962 .

[15]  Ranjan K. Mallik,et al.  Performance analysis of space-time coding with imperfect channel estimation , 2005, IEEE Transactions on Wireless Communications.

[16]  Yu. A. Brychkov,et al.  Integrals and series , 1992 .

[17]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[18]  Roy D. Yates,et al.  Probability and stochastic processes : a friendly introduction for electrical and computer engineers , 1999 .

[19]  Steven D. Blostein,et al.  Performance Analysis of OSTBC Transmission in Multiuser Multiantenna Relay Networks , 2013, IEEE Transactions on Vehicular Technology.

[20]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[21]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[22]  Robert W. Heath,et al.  Shannon Capacity and Symbol Error Rate of Space-Time Block Codes in MIMO Rayleigh Channels With Channel estimation Error , 2008, IEEE Transactions on Wireless Communications.

[23]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[24]  Kiseon Kim,et al.  Error Probability Analysis of Combining Space-Time Block Coding and Scheduling in MIMO Systems , 2009, IEEE Signal Processing Letters.

[25]  Georgios B. Giannakis,et al.  A simple and general parameterization quantifying performance in fading channels , 2003, IEEE Trans. Commun..

[26]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[27]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[28]  A. Robert Calderbank,et al.  Space-Time block codes from orthogonal designs , 1999, IEEE Trans. Inf. Theory.

[29]  Donghun Lee,et al.  Performance Analysis of Combining Space-Time Block Coding and Scheduling over Arbitrary Nakagami Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[30]  Rose Qingyang Hu,et al.  Impact of Interference on Secrecy Capacity in a Cognitive Radio Network , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[31]  H. B. Dwight,et al.  Tables of Integrals and Other Mathematical Data , 1934 .

[32]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[33]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[34]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[35]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..