Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks

被引:161
作者
Zou, Yulong [1 ]
Wang, Xianbin [2 ]
Shen, Weiming [3 ,4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Telecommun & Informat Engn, Nanjing 210003, Jiangsu, Peoples R China
[2] Univ Western Ontario, Elect & Comp Engn Dept, London, ON N6A 5B9, Canada
[3] Tongji Univ, Coll Elect & Informat Engn, Shanghai 200092, Peoples R China
[4] CNR, Ottawa, ON, Canada
基金
中国国家自然科学基金;
关键词
Physical-layer security; multiuser scheduling; cognitive radio; achievable secrecy rate; intercept probability; diversity order; WIRE-TAP CHANNEL; ARTIFICIAL NOISE; POWER ALLOCATION; RELAY SELECTION; SYSTEMS; DIVERSITY; TRANSMISSIONS;
D O I
10.1109/TCOMM.2013.111213.130235
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's quality of service (QoS) constraint while the eavesdroppers attempt to intercept the cognitive transmissions from CUs to CBS. We investigate the physical-layer security against eavesdropping attacks in the cognitive radio network and propose the user scheduling scheme to achieve multiuser diversity for improving the security level of cognitive transmissions with a primary QoS constraint. Specifically, a cognitive user (CU) that satisfies the primary QoS requirement and maximizes the achievable secrecy rate of cognitive transmissions is scheduled to transmit its data packet. For the comparison purpose, we also examine the traditional multiuser scheduling and the artificial noise schemes. We analyze the achievable secrecy rate and intercept probability of the traditional and proposed multiuser scheduling schemes as well as the artificial noise scheme in Rayleigh fading environments. Numerical results show that given a primary QoS constraint, the proposed multiuser scheduling scheme generally outperforms the traditional multiuser scheduling and the artificial noise schemes in terms of the achievable secrecy rate and intercept probability. In addition, we derive the diversity order of the proposed multiuser scheduling scheme through an asymptotic intercept probability analysis and prove that the full diversity is obtained by using the proposed multiuser scheduling.
引用
收藏
页码:5103 / 5113
页数:11
相关论文
共 30 条
[1]  
[Anonymous], IEEE T INF THEORY
[2]  
[Anonymous], 2008, 80222 IEEE
[3]   Optimal and Suboptimal Power Allocation Schemes for OFDM-based Cognitive Radio Systems [J].
Bansal, Gaurav ;
Hossain, Jahangir ;
Bhargava, Vijay K. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (11) :4710-4718
[4]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[5]  
Brown T., P 2007 IEEE INT C CO
[6]  
Cabric D., P 2006 INT WORKSH TE
[7]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[8]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[9]  
Khisti A., P 2007 IEEE INT S IN
[10]  
Kushner HJ, 2004, IEEE T WIREL COMMUN, V3, P1250, DOI [10.1109/TWC.2004.830826, 10.1109/twc.2004.830826]