Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users

被引:0
|
作者
Zhang, Meng [1 ]
Liu, Yuan [1 ]
机构
[1] South China Univ Technol, Sch Elect & Informat Engn, Guangzhou, Guangdong, Peoples R China
来源
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2015年
关键词
D O I
10.1109/GLOCOM.2015.7417633
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we consider a cognitive radio network (CRN) consisting of a primary transmitter-receiver pair and an untrusted secondary transmitter-receiver pair, and each pair is a multiple-input single-output (MISO) link. We consider two transmission schemes, namely underlay scheme and cooperative scheme. For the underlay scheme, the secondary user (SU) is allowed to transmit simultaneously in the presence of primary transmission. For the cooperative scheme, the secondary transmitter acts as a relay node to increase the secrecy rate of primary transmission in exchange for its own transmission. For both schemes, the SU is untrusted and considered as a potential eavesdropper. Our goal is to minimize the total power consumption while satisfying the primary user (PU)'s required secrecy rate and the SU's required information rate. By suitable optimization tools, we design the joint secure beamforming for both schemes. The simulation results show that in the considered system model, the underlay scheme outperforms the cooperative scheme, especially with high rate requirements and a large number of antennas at secondary transmitter.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Secure Communications with Untrusted Secondary Users in Cognitive Radio Networks
    Jeon, Hyoungsuk
    McLaughlin, Steven W.
    Ha, Jeongseok
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1072 - 1078
  • [2] Secure Beamforming for Untrusted MISO Cognitive Radio Networks
    Zhang, Meng
    Liu, Yuan
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (07) : 4861 - 4872
  • [3] Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks
    Jeon, Hyoungsuk
    McLaughlin, Steven W.
    Kim, Il-Min
    Ha, Jeongseok
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (04) : 1790 - 1805
  • [4] Secrecy Energy Efficiency in Cognitive Radio Networks With Untrusted Secondary Users
    Wang, Wei-Bang
    Lu, Yang
    Chi, Chong-Yung
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2021, 5 (01): : 216 - 230
  • [5] Secure Resource Allocation for Polarization-Enabled Green Cooperative Cognitive Radio Networks with Untrusted Secondary Users
    Wang, Fei
    Zhang, Xi
    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,
  • [6] Joint beamforming and power allocation for secure communication in cognitive radio networks
    Chen, Tao
    Yuan, HuaQiang
    Zhao, TieZhu
    Zhang, ZuSheng
    Ao, Xin
    IET COMMUNICATIONS, 2016, 10 (10) : 1156 - 1162
  • [7] Joint Beamforming for Secure Communication in RIS-Assisted Cognitive Radio Networks
    Wu, Xuewen
    Ma, Jingxiao
    Xue, Xiaoping
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2022, 24 (05) : 518 - 529
  • [8] Secure communication in cognitive radio networks with untrusted AF relays
    Sharma, Shashibhushan
    Roy, Sanjay Dhar
    Kundu, Sumit
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (07)
  • [9] Joint beamforming and scheduling in cognitive radio networks
    Hamdi, Karama
    Zhang, Wei
    Ben Letaief, Khaled
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 2977 - 2981
  • [10] Secure Beamforming for Cognitive Radio Networks with Artificial Noise
    Wu, Yanan
    Chen, Xiaoming
    Chen, Xianfu
    2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,