Resource Allocation for Cognitive Radio With Primary User Secrecy Outage Constraint

被引:36
作者
Xu, Ding [1 ]
Li, Qun [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Wireless Commun Key Lab Jiangsu Prov, Nanjing 210003, Jiangsu, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2018年 / 12卷 / 01期
关键词
Cognitive radio (CR); eavesdropping; outage probability; resource allocation; secrecy; POWER ALLOCATION; OPTIMIZATION; MAXIMIZATION; NETWORKS; CAPACITY;
D O I
10.1109/JSYST.2016.2585654
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a cognitive radio network where multiple secondary users (SUs) coexist with a primary user (PU). There exist multiple eavesdroppers (EAVs) who attempt to overhear the PU confidential messages. We propose to let the SUs interfere with the EAVs to protect the PU and gain transmission opportunities at the same time. A new type of PU protection criterion, namely PU secrecy outage constraint, is proposed to guarantee that the PU secrecy outage probability does not increase due to the SU transmission. Our aim is to maximize the SU ergodic transmission rate subject to the PU secrecy outage constraint and the SU transmit power constraint. For the special single EAV and single SU with perfect channel state information (CSI) scenario, we drive the optimal power allocation strategy as well as a low-complexity closed-form suboptimal strategy. Then, using the insights gained from the special scenario, we propose heuristic joint SU scheduling and power allocation strategies for the complex scenario of multiple EAVs and SUs with perfect or imperfect CSI. Extensive simulations are conducted to verify our proposed strategies. It is shown that the proposed strategies can well protect the PU in terms of secrecy outage probability even with imperfect CSI and simultaneously provide transmission opportunities for the SUs.
引用
收藏
页码:893 / 904
页数:12
相关论文
共 32 条
[1]  
Anand S., 2008, PROC INT C COGN RADI, P1
[2]  
[Anonymous], P INT S WIR PERS MUL
[3]  
[Anonymous], 2011, P IEEE GLOB COMM C G
[4]   A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions [J].
Attar, Alireza ;
Tang, Helen ;
Vasilakos, Athanasios V. ;
Yu, F. Richard ;
Leung, Victor C. M. .
PROCEEDINGS OF THE IEEE, 2012, 100 (12) :3172-3186
[5]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[6]  
Boyd L., 2004, CONVEX OPTIMIZATION
[7]   Fundamental limits of spectrum-sharing in fading environments [J].
Ghasemi, Amir ;
Sousa, Elvino S. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (02) :649-658
[8]  
He YY, 2014, IEEE ICC, P1663, DOI 10.1109/ICC.2014.6883561
[9]   Energy-Efficient Frequency and Power Allocation for Cognitive Radios in Television Systems [J].
Illanko, Kandasamy ;
Naeem, Muhammad ;
Anpalagan, Alagan ;
Androutsos, Dimitrios .
IEEE SYSTEMS JOURNAL, 2016, 10 (01) :313-324
[10]   An Optimal Cross-Layer Framework for Cognitive Radio Network Under Interference Temperature Model [J].
Jalaeian, Borhan ;
Zhu, Rongbo ;
Samani, Hooman ;
Motani, Mehul .
IEEE SYSTEMS JOURNAL, 2016, 10 (01) :293-301