Enhancing Secrecy by Full-Duplex Antenna Selection in Cognitive Networks

被引:0
作者
Chen, Gaojie [1 ]
Coon, Justin [1 ]
机构
[1] Univ Oxford, Dept Engn Sci, Oxford OX1 3PJ, England
来源
2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC) | 2017年
基金
英国工程与自然科学研究理事会;
关键词
Physical layer security; cognitive radio; antenna selection; full-duplex; RELAY SELECTION; FADING CHANNELS; RADIO NETWORKS; SECURITY; INTERFERENCE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider an underlay cognitive network with secondary users that support full-duplex communication. In this context, we propose the application of antenna selection at the secondary destination node to improve the secondary user secrecy performance. Antenna selection rules for cases where exact and average knowledge of the eavesdropping channels are investigated. The secrecy outage probabilities for the secondary eavesdropping network are analyzed, and it is shown that the secrecy performance improvement due to antenna selection is due to coding gain rather than diversity gain. This is very different from classical antenna selection for data transmission, which usually leads to a higher diversity gain. Numerical simulations are included to verify the performance of the proposed scheme.
引用
收藏
页码:540 / 545
页数:6
相关论文
共 17 条
  • [1] Anderson C. R., 2004, P IEEE SOUTHEASTCON
  • [2] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [3] Dual Antenna Selection in Secure Cognitive Radio Networks
    Chen, Gaojie
    Gong, Yu
    Xiao, Pei
    Chambers, Jonathon A.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (10) : 7993 - 8002
  • [4] Physical Layer Network Security in the Full-Duplex Relay System
    Chen, Gaojie
    Gong, Yu
    Xiao, Pei
    Chambers, Jonathon A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 574 - 583
  • [5] Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks
    Chen, Gaojie
    Tian, Zhao
    Gong, Yu
    Chen, Zhi
    Chambers, Jonathon A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) : 719 - 729
  • [6] Comment on "Relay Selection for Secure Cooperative Networks with Jamming"
    Chen, Gaojie
    Dwyer, Vincent
    Krikidis, Ioannis
    Thompson, John S.
    McLaughlin, Steve
    Chambers, Jonathon
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (06) : 2351 - 2351
  • [7] IDENTITY-BASED KEY MANAGEMENT IN MOBILE AD HOC NETWORKS: TECHNIQUES AND APPLICATIONS
    Da Silva, Eduardo
    Dos Santos, Aldri L.
    Albini, Luiz Carlos P.
    Lima, Michele N.
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (05) : 46 - 52
  • [8] Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective
    Goldsmith, Andrea
    Jafar, Syed Ali
    Maric, Ivana
    Srinivasa, Sudhir
    [J]. PROCEEDINGS OF THE IEEE, 2009, 97 (05) : 894 - 914
  • [9] On the secrecy capacity of fading channels
    Gopala, Praveen Kumar
    Lai, Lifeng
    El Gamal, Hesham
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) : 4687 - 4698
  • [10] Improving Efficiency of Resource Usage in Two-Hop Full Duplex Relay Systems based on Resource Sharing and Interference Cancellation
    Ju, Hyungsik
    Oh, Eunsung
    Hong, Daesik
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (08) : 3933 - 3938