Opportunistic relay selection improves reliability-reliability tradeoff and security-reliability tradeoff in random cognitive radio networks

This study investigates the physical-layer security in random cognitive radio network (CRN) consisting of randomly distributed primary nodes, secondary nodes, relay nodes and eavesdroppers, where the secondary nodes share the spectrum of the primary nodes and the eavesdroppers attempt to intercept the secondary transmissions. The authors develop a framework to analysis the reliability-reliability tradeoff (RRT) and security-reliability tradeoff (SRT) in the random CRNs, where the security and reliability are quantified in terms of secrecy outage probability and connection outage probability. The RRT evaluates performance tradeoff between the primary and the secondary networks and the SRT evaluates the performance tradeoff inside the secondary network. Furthermore, they propose an opportunistic relay selection (ORS) scheme to enhance the secondary confidential transmission. It is demonstrated that the ORS scheme significantly improves the RRT and SRT as the density of relays increases, and outperforms the conventional direct transmission when the density of relays is larger than a certain value. This actually promotes the understandings of the performance tradeoffs and provides direct insights on system design for the practical CRNs.

[1]  Hyundong Shin,et al.  Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.

[2]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[3]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.

[4]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[5]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[6]  Lingyang Song,et al.  Relay Selection for Bidirectional AF Relay Network With Outdated CSI , 2013, IEEE Transactions on Vehicular Technology.

[7]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[8]  Xiangyun Zhou,et al.  When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.

[9]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[10]  Moe Z. Win,et al.  Cognitive network secrecy with interference engineering , 2014, IEEE Network.

[11]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[12]  Daesik Hong,et al.  An Efficient Relay Selection Strategy for Random Cognitive Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[13]  Yang Xiao,et al.  Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs , 2010, IEEE Transactions on Wireless Communications.

[14]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[15]  Jinhong Yuan,et al.  Secure Transmission for Relay Wiretap Channels in the Presence of Spatially Random Eavesdroppers , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[16]  Jinhong Yuan,et al.  Artificial-Noise-Aided Transmission in Multi-Antenna Relay Wiretap Channels With Spatially Random Eavesdroppers , 2015, IEEE Transactions on Wireless Communications.

[17]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[18]  Shuguang Cui,et al.  On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[19]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[20]  François Baccelli,et al.  Stochastic geometry and wireless networks , 2009 .

[21]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[22]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[23]  Yu-Dong Yao,et al.  An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[24]  Gregory W. Wornell,et al.  Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks , 2003, IEEE Trans. Inf. Theory.

[25]  Martin Haenggi,et al.  Single-Hop Connectivity in Interference-Limited Hybrid Wireless Networks , 2007, 2007 IEEE International Symposium on Information Theory.

[26]  Wei Zhang,et al.  Opportunistic Spectrum Sharing With Limited Feedback in Poisson Cognitive Radio Networks , 2014, IEEE Transactions on Wireless Communications.