Secrecy Capacity of the Primary System in a Cognitive Radio Network

被引:26
作者
Van-Dinh Nguyen [1 ]
Hoang, Tiep M. [2 ]
Shin, Oh-Soon [1 ]
机构
[1] Soongsil Univ, Sch Elect Engn, Seoul 156743, South Korea
[2] Duy Tan Univ, Inst Res & Dev, Hanoi, Vietnam
基金
新加坡国家研究基金会;
关键词
Artificial noise; channel state information (CSI); cognitive radio; interference; secrecy capacity; PHYSICAL-LAYER SECURITY; ARTIFICIAL-NOISE;
D O I
10.1109/TVT.2014.2359246
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With fast growth of wireless services, secrecy has become an increasingly important issue for wireless networks. In this paper, we investigate the secrecy capacity of the primary system in a cognitive radio system based on artificial noise, which has been proposed for dealing with the eavesdropper. We first consider a special case of one eavesdropper and two regimes of the eavesdropping channel condition. Specifically, we analyze the impact of interference generated by a secondary system toward the primary system in a cognitive radio system. The channel state information (CSI) of the primary channel is assumed to be perfectly known at both the primary transmitter and receiver, whereas that of the eavesdropper is partially known. Under these assumptions, we derive analytical expressions for the ergodic secrecy capacity in the cases of strong eavesdropping channel and weak eavesdropping channel and analyze the impact of the secondary system on the primary ergodic secrecy capacity. Moreover, we extend the analysis to the general case of arbitrary eavesdropping channel condition and arbitrary number of eavesdroppers. Some numerical results will be also presented to verify the analysis.
引用
收藏
页码:3834 / 3843
页数:11
相关论文
共 25 条
[1]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[2]  
[Anonymous], 2011, P IEEE GLOB COMM C G
[3]  
[Anonymous], 2000, Tables of Integrals
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[6]  
Dwight H. B., 1957, Tables of integrals and other mathematical data, V3rd
[7]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[8]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[9]   Cognitive radio: Brain-empowered wireless communications [J].
Haykin, S .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (02) :201-220
[10]  
Kreyszig E., 1999, Advanced Engineering Mathematics, V8th