Optimal power allocation for cognitive radio networks with primary user secrecy rate loss constraint

This paper considers a cognitive radio (CR) network in the presence of a malicious eavesdropper who attempts to receive confidential messages from a pair of primary users (PUs). Under the PU secrecy rate loss constraint and the SU maximum transmit power constraint, a pair of secondary users (SUs) is proposed to interfere with the eavesdropper to improve the PU secrecy level and thus gain its own transmission opportunities. Then, the closed-form optimal power allocation strategy for the SU to maximize its transmission rate subject to the aforementioned constraints is derived. Extensions of the results to the scenarios with multiple eavesdroppers and multiple SUs are also presented, respectively. Numerous simulation results are illustrated to investigate the impacts of various system parameters on the SU transmission rate and the PU secrecy rate. Our results indicate that the PU secrecy rate improves significantly with the help of the SU transmission.

[1]  Ying-Chang Liang,et al.  Optimal power allocation for fading channels in cognitive radio networks: Ergodic capacity and outage capacity , 2008, IEEE Transactions on Wireless Communications.

[2]  Errong Pei,et al.  Capacity and Optimal Power Allocation for Spectrum-Sharing with Primary Transmission Consideration in Fading Channels , 2011, IEEE Communications Letters.

[3]  Santhanakrishnan Anand,et al.  On the Secrecy Capacity of Fading Cognitive Wireless Networks , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[4]  Mansoor Shafi,et al.  Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge , 2010, IEEE Transactions on Vehicular Technology.

[5]  Eylem Ekici,et al.  Secrecy in cognitive radio networks: Turning foes to allies , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[6]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[7]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[10]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[11]  Ying-Chang Liang,et al.  Power Allocation for Interference-Limited Cognitive Multiple Access Channels , 2013, IEEE Wireless Communications Letters.

[12]  Rose Qingyang Hu,et al.  Impact of Interference on Secrecy Capacity in a Cognitive Radio Network , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[13]  Hans-Jürgen Zepernick,et al.  On non-zero secrecy capacity and outage probability of cognitive radio networks , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[14]  Ying-Chang Liang,et al.  Optimal Power Allocation Strategies for Fading Cognitive Radio Channels with Primary User Outage Constraint , 2011, IEEE Journal on Selected Areas in Communications.