Secrecy Energy Efficiency Optimization for Artificial Noise Aided Physical-Layer Security in OFDM-Based Cognitive Radio Networks

In this paper, we investigate the power allocation of primary base station (PBS) and cognitive base station (CBS) across different orthogonal frequency division multiplexing (OFDM) subcarriers for energy-efficient secure downlink communication in OFDM-based cognitive radio networks (CRNs) with the existence of an eavesdropper having multiple antennas. For the sake of defending against eavesdropping, artificial noise is used to confuse the eavesdropper at the cost of extra power consumption. For the purpose of improving the energy efficiency (EE) of secure communications, we propose a secrecy energy efficiency maximization (SEEM) scheme by exploiting the instantaneous channel state information (ICSI) of the eavesdropper, called ICSI-based SEEM (ICSI-SEEM) scheme with a given total transmit power budget for different OFDM subcarriers of both PBS and CBS while guaranteeing a certain secrecy rate (SR) for a cognitive user, where a primary user's SR is also taken into consideration for limiting the interference in CRNs at each subcarrier. As for the case when the eavesdropper's ICSI is unknown, we also propose an SEEM scheme by using the statistical CSI (SCSI) of the eavesdropper, namely SCSI-based SEEM (SCSI-SEEM) scheme. Since the ICSI-SEEM and SCSI-SEEM problems are fractional and non-convex, we first transform them into equivalent subtractive problems, and then achieve approximate convex problems by employing the difference of two-convex functions approximation method. Finally, new two-tier power allocation algorithms are proposed to achieve $\varepsilon$-optimal solutions of our formulated ICSI-SEEM and SCSI-SEEM problems. Simulation results illustrate that the ICSI-SEEM has a better secrecy energy efficiency (SEE) performance than SCSI-SEEM, and moreover, the proposed ICSI-SEEM and SCSI-SEEM schemes outperform conventional SR maximization and EE maximization approaches in terms of their SEE performance.

[1]  Mansoor Shafi,et al.  Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge , 2010, IEEE Transactions on Vehicular Technology.

[2]  Costas N. Georghiades,et al.  Secrecy Capacity per Unit Cost , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Jia Zhu,et al.  Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks , 2017, IEEE Transactions on Communications.

[4]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.

[5]  Wei-Ping Zhu,et al.  Secrecy Energy Efficiency Maximization in Cognitive Radio Networks , 2017, IEEE Access.

[6]  Zhu Han,et al.  D2D Communications Underlaying Wireless Powered Communication Networks , 2018, IEEE Transactions on Vehicular Technology.

[7]  Arumugam Nallanathan,et al.  Energy-Efficient Chance-Constrained Resource Allocation for Multicast Cognitive OFDM Network , 2016, IEEE Journal on Selected Areas in Communications.

[8]  Ana García Armada,et al.  Phase Noise Degradation in Massive MIMO Downlink With Zero-Forcing and Maximum Ratio Transmission Precoding , 2016, IEEE Transactions on Vehicular Technology.

[9]  Didier Le Ruyet,et al.  Energy-Efficiency-Based Resource Allocation Framework for Cognitive Radio Networks With FBMC/OFDM , 2017, IEEE Transactions on Vehicular Technology.

[10]  Jia Zhu,et al.  Cognitive Network Cooperation for Green Cellular Networks , 2016, IEEE Access.

[11]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[12]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[13]  Trung Q. Duong,et al.  Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.

[14]  Jinhong Yuan,et al.  Three Artificial-Noise-Aided Secure Transmission Schemes in Wiretap Channels , 2018, IEEE Transactions on Vehicular Technology.

[15]  Danda B. Rawat Evaluating Performance of Cognitive Radio Users in MIMO-OFDM-Based Wireless Networks , 2016, IEEE Wireless Communications Letters.

[16]  Mikael Skoglund,et al.  Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.

[17]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[18]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[19]  Carlo Fischione,et al.  Green sensing and access: energy-throughput trade-offs in cognitive networking , 2015, IEEE Communications Magazine.

[20]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.

[21]  Yuzhen Huang,et al.  Robust Energy Efficiency Optimization for Secure MIMO SWIPT Systems With Non-Linear EH Model , 2017, IEEE Communications Letters.

[22]  Tian Zhang,et al.  Balancing Delay and Energy Efficiency in Energy Harvesting Cognitive Radio Networks: A Stochastic Stackelberg Game Approach , 2017, IEEE Transactions on Cognitive Communications and Networking.

[23]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[24]  Wei-Ping Zhu,et al.  Joint Beamforming and Power Control for Device-to-Device Communications Underlaying Cellular Networks , 2016, IEEE Journal on Selected Areas in Communications.

[25]  Min Lin,et al.  Distributed-Relay Beamforming for Secrecy Energy Efficiency With Coordinated Eavesdroppers , 2018, IEEE Communications Letters.

[26]  Tiejun Lv,et al.  Energy Efficiency and Spectrum Efficiency Tradeoff in the D2D-Enabled HetNet , 2017, IEEE Transactions on Vehicular Technology.

[27]  Wei-Ping Zhu,et al.  Secure Transmission in Cognitive Satellite Terrestrial Networks , 2016, IEEE Journal on Selected Areas in Communications.

[28]  Zhen Yang,et al.  Secure transmission over the wiretap channel using polar codes and artificial noise , 2017, IET Commun..

[29]  Jin Xu,et al.  Secure Transmission in MISOME Wiretap Channel With Multiple Assisting Jammers: Maximum Secrecy Rate and Optimal Power Allocation , 2017, IEEE Transactions on Communications.

[30]  Ha H. Nguyen,et al.  Fast Global Optimal Power Allocation in Wireless Networks by Local D.C. Programming , 2012, IEEE Transactions on Wireless Communications.

[31]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[32]  Arumugam Nallanathan,et al.  Two-dimensional distributed spectrum reusing in cognitive radio network: Based on game theory , 2017, 2017 IEEE International Conference on Communications (ICC).

[33]  I. Stancu-Minasian Nonlinear Fractional Programming , 1997 .

[34]  Leila Musavian,et al.  How to Increase Energy Efficiency in Cognitive Radio Networks , 2016, IEEE Transactions on Communications.

[35]  Tao Jiang,et al.  Energy-Efficient Device-to-Device Communications for Green Smart Cities , 2018, IEEE Transactions on Industrial Informatics.

[36]  Jun Liu,et al.  Robust Beamforming Design for Secure Multiuser MISO Interference Channel , 2017, IEEE Communications Letters.

[37]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[38]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[39]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[40]  Naofal Al-Dhahir,et al.  Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks , 2016, IEEE Wireless Communications Letters.

[41]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.