Cooperative jamming with untrusted SUs for secure communication of two-hop primary system

This paper investigates the problem of secure communications of the two-hop primary system with the cooperative jamming of the untrusted secondary system. The secondary system is untrusted for the primary system and willing to eavesdrop on the primary signal. In addition, the secondary system is also willing to provide friendly jamming to increase the secure rate of the primary system in reward for being allowed to share the licensed spectrum. Specifically, the cooperative communication is implemented into two slots which correspond to the transmission of the first and second hops of the primary system, respectively. In each slot, part of the slot is allocated for the primary information transmission. Simultaneously, a secondary user (SU) is selected to broadcast jamming signal to protect the secure communication of the primary users (PU) against the other untrusted SUs. Then, the remaining time of the slot is allocated for the secondary transmission. To maximize the transmission rate of the secondary system under the constraint of the target secure rate requirement of the primary system, we optimally select two jamming SUs and determine the time parameters in each slot. SUs' average transmit rate and the lower bound on PUs' secure outage probability are derived. Simulation results demonstrate the performance superiority of our developed strategy over conventional secure communication schemes in terms of PUs' secure outage probability and SUs' average transmission rate.

[1]  Jun Zhao,et al.  Resource Management Based on Security Satisfaction Ratio with Fairness-Aware in Two-Way Relay Networks , 2015, Int. J. Distributed Sens. Networks.

[2]  Xiaoli Chu,et al.  Secure resource allocation for OFDMA two-way relay networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[3]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[4]  Saeedeh Parsaeefard,et al.  Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users , 2014, IEEE Transactions on Wireless Communications.

[5]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[6]  Hai Jiang,et al.  Relay Selection and Performance Analysis in Multiple-User Networks , 2011, IEEE Journal on Selected Areas in Communications.

[7]  Xuemin Shen,et al.  Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.

[8]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[10]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[11]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[12]  Mikael Skoglund,et al.  On the Optimization of the Secondary Transmitter's Strategy in Cognitive Radio Channels with Secrecy , 2014, IEEE Journal on Selected Areas in Communications.