Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users

被引:64
作者
Mokari, Nader [1 ]
Parsaeefard, Saeedeh [1 ]
Saeedi, Hamid [1 ]
Azmi, Paeiz [1 ]
机构
[1] Tarbiat Modares Univ, Dept Elect & Comp Engn, Tehran, Iran
关键词
Cognitive radio networks; ergodic and instantaneous resource allocation; generalized geometric programming (GPP); secure communication; PHYSICAL LAYER SECURITY; DOWNLINK; CHANNEL; COMPLEXITY;
D O I
10.1109/TWC.2013.010214.130929
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we introduce a new cooperative paradigm for secure communication in cognitive radio networks (CRNs) where secondary users (SUs) are allowed to access the spectrum of primary users (PUs) as long as they preserve the secure communication of PUs in the presence of malicious eavesdroppers. To do so, the SU transmission is divided into two hops: at first hop, the SU transmitter sends the information to a relay set and the SU receiver acts as a friendly jammer to disturb the overhearing of eavesdroppers and at the second hop, one of the relays is selected to pass the information to the SU receiver and the SU transmitter acts as a friendly jammer for the PU. In this new setup, the time duration for each hop, the power transmissions of all nodes in CRN, and relay selection at the second hop are allocated in such a way that the secrecy rate of the SU is maximized subject to the minimum required PU's secrecy rate. From primary service perspective, this transforms the possibly disturbing secondary service activities into a beneficial network element. We investigate instantaneous and ergodic resource allocation problems for perfect and imperfect channel state information (CSI). Since these problems are non-convex, we propose a solution based on decomposition of main optimization problem into three subproblems related to the power allocation, time allocation, and relay selection. We show that the power allocation problem can be transformed into a generalized geometric programming (GGP) model via the so-called scaled algorithm and it can be solved very efficiently. Simulation results indicate that in terms of the secondary secrecy rate, the proposed setup outperforms the conventional setup in which the secrecy rate of the PU is not guaranteed.
引用
收藏
页码:1058 / 1073
页数:16
相关论文
共 29 条
[1]   Selected topics in robust convex optimization [J].
Ben-Tal, Aharon ;
Nemirovski, Arkadi .
MATHEMATICAL PROGRAMMING, 2008, 112 (01) :125-158
[2]   The price of robustness [J].
Bertsimas, D ;
Sim, M .
OPERATIONS RESEARCH, 2004, 52 (01) :35-53
[3]  
Boyd S., 2004, CONVEX OPTIMIZATION, VFirst, DOI DOI 10.1017/CBO9780511804441
[4]   A tutorial on geometric programming [J].
Boyd, Stephen ;
Kim, Seung-Jean ;
Vandenberghe, Lieven ;
Hassibi, Arash .
OPTIMIZATION AND ENGINEERING, 2007, 8 (01) :67-127
[5]   Joint Relay and Jammer Selection for Secure Two-Way Relay Networks [J].
Chen, Jingchao ;
Zhang, Rongqing ;
Song, Lingyang ;
Han, Zhu ;
Jiao, Bingli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :310-320
[6]   Power Control in Wireless Cellular Networks [J].
Chiang, Mung ;
Hande, Prashanth ;
Lan, Tian ;
Tan, Chee Wei .
FOUNDATIONS AND TRENDS IN NETWORKING, 2007, 2 (04) :381-533
[7]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[8]  
Gershman AB, 2005, SPACE-TIME PROCESSING FOR MIMO COMMUNICATIONS, P1, DOI 10.1002/0470010045
[9]   Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective [J].
Goldsmith, Andrea ;
Jafar, Syed Ali ;
Maric, Ivana ;
Srinivasa, Sudhir .
PROCEEDINGS OF THE IEEE, 2009, 97 (05) :894-914
[10]   The relay-eavesdropper channel: Cooperation for secrecy [J].
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) :4005-4019