Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks

被引:14
作者
Truong Xuan Quach [1 ,2 ]
Hung Tran [3 ]
Uhlemann, Elisabeth [3 ]
Kaddoum, George [4 ]
Quang Anh Tran [5 ]
机构
[1] TNU Univ Informat & Commun Technol, Thai Nguyen, Vietnam
[2] VNU Univ Engn & Technol, Hanoi, Vietnam
[3] Malardalen Univ, Sch Innovat Design & Engn, Vasteras, Sweden
[4] Univ Quebec, LACIME Lab, ETS Engn Sch, Montreal, PQ, Canada
[5] Posts & Telecommun Inst Technol, Hanoi, Vietnam
关键词
Secure and reliable communication; Physical layer security; Power allocation; Cognitive radio networks; Spectrum underlay networks; Performance analysis; PHYSICAL-LAYER SECURITY; RELAY SELECTION; THREATS;
D O I
10.1007/s11276-017-1605-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the normal interference constraint imposed by the primary user (PU). Thus, the SU must have a suitable power allocation policy which does not only satisfy the constraints of the PU but also the security constraints such that it obtains a reasonable performance for the SU, without exposing information to the eavesdropper. We derive four power allocation policies for different scenarios corresponding to whether or not the channel state information of the PU and the eavesdropper are available at the SU. Further, we introduce the concept secure and reliable communication probability (SRCP) as a performance metric to evaluate the considered system, as well as the efficiency of the four power allocation policies. Finally, we present numerical examples to illustrate the power allocation polices, and the impact of these policies on the SRCP of the SU.
引用
收藏
页码:1477 / 1489
页数:13
相关论文
共 47 条
[1]   A Multitier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions [J].
Abdelhadi, Ahmed ;
Shajaiah, Haya ;
Clancy, Charles .
IEEE Transactions on Cognitive Communications and Networking, 2015, 1 (02) :217-229
[2]   White space: Definitional perspectives and their role in exploiting spectrum opportunities [J].
Akhtar, Fayaz ;
Rehmani, Mubashir Husain ;
Reisslein, Martin .
TELECOMMUNICATIONS POLICY, 2016, 40 (04) :319-331
[3]  
Alahmadi A, 2013, IEEE GLOB COMM CONF, P3229, DOI 10.1109/GLOCOM.2013.6831569
[4]  
[Anonymous], 2013, THESIS
[5]  
Attar A, 2012, P IEEE, V100, P3172, DOI 10.1109/JPROC.2012.2208211
[6]  
Bahrak B, 2014, IEEE INT SYMP DYNAM, P236, DOI 10.1109/DySPAN.2014.6817800
[7]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[8]   Secure Cognitive Reactive Decode-and-Forward Relay Networks: With and Without Eavesdropper [J].
Dac-Binh Ha ;
Tung Thanh Vu ;
Tran Trung Duy ;
Vo Nguyen Quoc Bao .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) :2619-2641
[9]   A Spectrum Surveying Framework for Dynamic Spectrum Access Networks [J].
Datla, Dinesh ;
Wyglinski, Alexander M. ;
Minden, Gary J. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (08) :4158-4168
[10]   A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks [J].
Fragkiadakis, Alexandros G. ;
Tragos, Elias Z. ;
Askoxylakis, Ioannis G. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :428-445