Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users

被引:0
作者
Zhang, Meng [1 ]
Liu, Yuan [1 ]
机构
[1] South China Univ Technol, Sch Elect & Informat Engn, Guangzhou, Guangdong, Peoples R China
来源
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2015年
关键词
D O I
10.1109/GLOCOM.2015.7417633
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we consider a cognitive radio network (CRN) consisting of a primary transmitter-receiver pair and an untrusted secondary transmitter-receiver pair, and each pair is a multiple-input single-output (MISO) link. We consider two transmission schemes, namely underlay scheme and cooperative scheme. For the underlay scheme, the secondary user (SU) is allowed to transmit simultaneously in the presence of primary transmission. For the cooperative scheme, the secondary transmitter acts as a relay node to increase the secrecy rate of primary transmission in exchange for its own transmission. For both schemes, the SU is untrusted and considered as a potential eavesdropper. Our goal is to minimize the total power consumption while satisfying the primary user (PU)'s required secrecy rate and the SU's required information rate. By suitable optimization tools, we design the joint secure beamforming for both schemes. The simulation results show that in the considered system model, the underlay scheme outperforms the cooperative scheme, especially with high rate requirements and a large number of antennas at secondary transmitter.
引用
收藏
页数:6
相关论文
共 50 条
[21]   Joint Beamforming for Secure Communication in Cognitive Satellite Terrestrial Networks [J].
Lin, Min ;
Lin, Zhi ;
Zhu, Wei-Ping ;
Wang, Jun-Bo .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (05) :1017-1029
[22]   Performance Evaluation of Joint Admission and Eviction Controls of Secondary Users in Cognitive Radio Networks [J].
Hasan Ahmed ;
Salman A. AlQahtani .
Arabian Journal for Science and Engineering, 2015, 40 :3469-3481
[23]   A joint random sensing policy using inactive secondary users in cognitive radio networks [J].
Li, Jian-Dong ;
Liu, Xin-Yi ;
Jiang, Jian .
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (04) :775-779
[24]   Performance Evaluation of Joint Admission and Eviction Controls of Secondary Users in Cognitive Radio Networks [J].
Ahmed, Hasan ;
AlQahtani, Salman A. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (12) :3469-3481
[25]   Random Aerial Beamforming for Underlay Cognitive Radio With Exposed Secondary Users [J].
Alaa, Ahmed M. ;
Ismail, Mahmoud H. ;
Tawfik, Hazim .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (07) :5364-5383
[26]   Beamforming for MIMO Cognitive Radio with Single Primary and Multiple Secondary Users [J].
Toutounchian, Milad Amir ;
Vaughan, Rodney .
2016 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2016,
[27]   Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks [J].
Zhao, Mingxiong ;
Feng, Suili ;
Wang, Xiangfeng ;
Zhang, Meng ;
Liu, Yuan ;
Fu, Hao .
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
[28]   Joint Power Allocation and Beamforming with Users Selection for Cognitive Radio Networks Via Discrete Stochastic Optimization [J].
Xie, Renchao ;
Yu, F. Richard ;
Ji, Hong .
2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
[29]   Joint power allocation and beamforming with users selection for cognitive radio networks via discrete stochastic optimization [J].
Xie, Renchao ;
Yu, F. Richard ;
Ji, Hong .
WIRELESS NETWORKS, 2012, 18 (05) :481-493
[30]   Joint power allocation and beamforming with users selection for cognitive radio networks via discrete stochastic optimization [J].
Renchao Xie ;
F. Richard Yu ;
Hong Ji .
Wireless Networks, 2012, 18 :481-493