Secure Full-Duplex Cognitive Relay Networks with Optimal Relay Selection Scheme

In this paper, we investigate the secure communication of cognitive full-duplex relay networks in the presence of multiple eavesdroppers and multiple primary receivers. In the considered network, multiple full-duplex relays are deployed to transfer information in the secondary network, under the malicious attempts of non- colluding/colluding eavesdroppers. Meanwhile, the transmit powers of secondary transmitters are constrained by the quality-of-service of the primary network. The optimal relay selection scheme is proposed to enhance the secrecy performance of the considered system. We study the secrecy performance by providing the exact closed- form and asymptotic expressions of the proposed system secrecy outage probability. We have demonstrated that increasing the number of full- duplex relays can improve the security performance. At the illegitimate side, using colluding eavesdroppers and increasing the number of eavesdroppers put information confidentiality at a greater risk. Besides, the transmit power and the desired outage probability of the primary network have great influences on the secrecy outage probability of the secondary network.

[1]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[2]  Tho Le-Ngoc,et al.  Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[4]  Daesik Hong,et al.  Optimal Power Allocation and Outage Analysis for Cognitive Full Duplex Relay Systems , 2012, IEEE Transactions on Wireless Communications.

[5]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[6]  H. Vincent Poor,et al.  Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.

[7]  Adrish Banerjee,et al.  Outage Analysis of Spectrum Sharing Energy Harvesting Cognitive Relays in Nakagami-m Channels , 2014, GLOBECOM 2014.

[8]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[9]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[10]  Haiyan Cao,et al.  Performance Analysis for Opportunistic Full-Duplex Relay Selection in Underlay Cognitive Networks , 2015, IEEE Transactions on Vehicular Technology.

[11]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[12]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[13]  Yu-Dong Yao,et al.  Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions , 2012, IEEE Communications Magazine.

[14]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[15]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[16]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[17]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[18]  Derrick Wing Kwan Ng,et al.  Dynamic Resource Allocation in MIMO-OFDMA Systems with Full-Duplex and Hybrid Relaying , 2012, IEEE Transactions on Communications.

[19]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[20]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.