Energy-Efficient Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks

Security is a critical issue in cognitive radio (CR) relay networks. Most previous work concentrates on maximizing secrecy capacity (SC) as a criterion to guarantee the security requirements in CR relay networks. However, under the requirement of “green” radio communication, the energy consumption is largely ignored. This paper proposes a relay selection scheme which jointly considers the best relay selection and dynamic power allocation in order to maximize SC and to minimize energy consumption. Moreover, we consider finite-state Markov channels and residual relay energy in the relay selection and power allocation process. Specifically, the formulation of the proposed relay selection and power allocation scheme is based on the restless bandit problem, which is solved by the primal-dual index heuristic algorithm. Additionally, the obtained optimal relay selection policy has an indexability property that dramatically reduces the computational complexity. Numerical results are presented to show that our proposed scheme has the maximum SC and minimum energy consumption compared to the existing ones.

[1]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[2]  Lutz H.-J. Lampe,et al.  Distributed transmit power allocation for multihop cognitive-radio systems , 2009, IEEE Transactions on Wireless Communications.

[3]  Qian Zhang,et al.  Cooperative Relay for Cognitive Radio Networks , 2009, IEEE INFOCOM 2009.

[4]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[5]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[6]  Victor C. M. Leung,et al.  Energy-Efficient Distributed Relay and Power Control in Cognitive Radio Cooperative Communications , 2013, IEEE Journal on Selected Areas in Communications.

[7]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[8]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[9]  Taesoo Kwon,et al.  Secure MISO cognitive radio system with perfect and imperfect CSI , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[10]  Quan Liu,et al.  The HMM-based Modeling for the Energy Level Prediction in Wireless Sensor Networks , 2007, 2007 2nd IEEE Conference on Industrial Electronics and Applications.

[11]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[12]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[13]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in cognitive radio networks , 2012, IET Commun..

[14]  Dimitris Bertsimas,et al.  Restless Bandits, Linear Programming Relaxations, and a Primal-Dual Index Heuristic , 2000, Oper. Res..

[15]  Tharmalingam Ratnarajah,et al.  Enhancing security in the cognitive relay assisted co-existing radio systems with interferences , 2013, 2013 IEEE International Conference on Communications (ICC).

[16]  Xiang Cheng,et al.  Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[17]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[18]  Shuguang Cui,et al.  On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[19]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[20]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[21]  Victor C. M. Leung,et al.  Distributed Best-Relay Selection for Improving TCP Performance Over Cognitive Radio Networks: A Cross-Layer Design Approach , 2012, IEEE Journal on Selected Areas in Communications.

[22]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[23]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[24]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[25]  Song Guo,et al.  Capacity maximization in cooperative CRNs: Joint relay assignment and channel allocation , 2012, 2012 IEEE International Conference on Communications (ICC).

[26]  Daesik Hong,et al.  Capacity of Reactive DF Scheme in Cognitive Relay Networks , 2011, IEEE Transactions on Wireless Communications.