Primary Privacy Preserving With Joint Wireless Power and Information Transfer for Cognitive Radio Networks

被引:33
作者
Wang, Dawei [1 ,2 ]
Zhou, Fuhui [3 ]
Leung, Victor C. M. [4 ,5 ]
机构
[1] Northwestern Polytech Univ, Dept Commun Engn, Xian 710072, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210000, Peoples R China
[4] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[5] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
基金
中国国家自然科学基金;
关键词
Privacy; Jamming; Quality of service; Cognitive radio; Resource management; Information security; Communication system security; Information and power transfer; security; resource allocation; RESOURCE-ALLOCATION; RELAY SELECTION; SPECTRUM ACCESS; SECRECY RATE; SECURITY; TRANSMISSION; SYSTEMS;
D O I
10.1109/TCCN.2019.2952885
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In order to provide information privacy for the primary network and support the secondary quality-of-service (QoS) requirement, we design a cooperative primary preserving strategy which simultaneously transfers information and power in cognitive radio networks. In this strategy, the secondary network provides information security for the primary information transmission in three phases and obtains some licensed spectrum for the secondary information transmission. Specifically, in the first phase, a fraction of the primary transmitter's power is allocated for the primary privacy transmission, and the remaining power is utilized to beamform the energy signal for energy harvesting. After receiving the privacy signal, two secondary users cooperatively forward the privacy information under jamming protection. In the last phase, the secondary user occupies the licensed spectrum for the secondary information transmission. We first analyze the transmission reliability and secrecy performances of the primary network, and then the primary transmit power and the time slot are optimally allocated such that the secondary transmission rate is maximized under the requirements of the primary information reliability and security. Additionally, we also investigate the primary power and time slot allocation problem for the asymptotic scenario. Numerical results are presented to show the performance improvement of the proposed scheme about the secondary average rate under the primary performance requirements.
引用
收藏
页码:683 / 693
页数:11
相关论文
共 41 条
  • [1] Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary
    Abedi, Mohammad Reza
    Mokari, Nader
    Saeedi, Hamid
    Yanikomeroglu, Halim
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (02) : 885 - 899
  • [2] [Anonymous], FCC FREQ ALL CHART
  • [3] [Anonymous], IEEE INT C EL DEV SO
  • [4] IDENTITY-BASED KEY MANAGEMENT IN MOBILE AD HOC NETWORKS: TECHNIQUES AND APPLICATIONS
    Da Silva, Eduardo
    Dos Santos, Aldri L.
    Albini, Luiz Carlos P.
    Lima, Michele N.
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (05) : 46 - 52
  • [5] Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks
    Fan, Lisheng
    Lei, Xianfu
    Duong, Trung Q.
    Elkashlan, Maged
    Karagiannidis, George K.
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (09) : 3299 - 3310
  • [6] Throughput and Delay Scaling in Supportive Two-Tier Networks
    Gao, Long
    Zhang, Rui
    Yin, Changchuan
    Cui, Shuguang
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (02) : 415 - 424
  • [7] Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective
    Goldsmith, Andrea
    Jafar, Syed Ali
    Maric, Ivana
    Srinivasa, Sudhir
    [J]. PROCEEDINGS OF THE IEEE, 2009, 97 (05) : 894 - 914
  • [8] A Spectrum and Energy Cooperation Strategy in Hierarchical Cognitive Radio Cellular Networks
    Hsieh, Kun-Yueh
    Tseng, Fan-Shuo
    Ku, Meng-Lin
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (03) : 252 - 255
  • [9] Secure Relay and Jammer Selection for Physical Layer Security
    Hui, Hui
    Swindlehurst, A. Lee
    Li, Guobing
    Liang, Junli
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (08) : 1147 - 1151
  • [10] Khalil K, 2011, IEEE INFOCOM SER, P3002, DOI 10.1109/INFCOM.2011.5935142