Secure Communications with Secondary User Selection in Underlay Cognitive Radio Networks

被引:0
作者
Qin, Mian [1 ,2 ]
Yang, Shouyi [1 ]
Han, Zhuo [1 ]
Zhang, Ruizhe [1 ]
Deng, Hao [2 ]
机构
[1] Zhengzhou Univ, Sch Informat Engn, Zhengzhou 450001, Henan, Peoples R China
[2] Henan Univ, Sch Phys & Elect, Kaifeng 475000, Henan, Peoples R China
来源
2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS) | 2018年
基金
中国国家自然科学基金;
关键词
PHYSICAL-LAYER SECURITY; ALLOCATION; DIVERSITY; CAPACITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates the effect of multiuser gain provided by the secondary user selection on the secrecy performance of the primary users. We propose a simple secondary user selection scheme and derive a closed-form lower bound of the achievable ergodic secrecy rate of the primary users. In the high signal-to-noise ratio (SNR) regime, asymptotic result shows that the multiuser gain scales logarithmically with the number of the secondary users for a fixed interference temperature. When there is no interference temperature constraint, more multiuser gain can be achieved as the secondary user transmits with a higher power. Theoretical and simulation results show that the interference from the secondary users is helpful and the multiuser gain enhances the security of the primary users greatly.
引用
收藏
页数:6
相关论文
共 20 条
[1]  
Abramowitz M., 1970, HDB MATH FUNCTIONS
[2]   Multi-User Diversity in a Spectrum Sharing System [J].
Ban, Tae Won ;
Choi, Wan ;
Jung, Bang Chu ;
Sung, Dan Keun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (01) :102-106
[3]   Secrecy Transmission With a Helper: To Relay or to Jam [J].
Deng, Hao ;
Wang, Hui-Ming ;
Guo, Wei ;
Wang, Wenjie .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) :293-307
[4]   On the Security of Cognitive Radio Networks [J].
Elkashlan, Maged ;
Wang, Lifeng ;
Duong, Trung Q. ;
Karagiannidis, George K. ;
Nallanathan, Arumugam .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (08) :3790-3795
[5]   Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective [J].
Goldsmith, Andrea ;
Jafar, Syed Ali ;
Maric, Ivana ;
Srinivasa, Sudhir .
PROCEEDINGS OF THE IEEE, 2009, 97 (05) :894-914
[6]  
Gradshteyn I S., 2007, Tables of Integrals, Series and Products, V(eds)
[7]   On the Cooperative Diversity Gain in Underlay Cognitive Radio Systems [J].
Hong, Jun-pyo ;
Hong, Bi ;
Ban, Tae Won ;
Choi, Wan .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (01) :209-219
[8]   Optimal Power Allocation for Fading Channels in Cognitive Radio Networks: Ergodic Capacity and Outage Capacity [J].
Kang, Xin ;
Liang, Ying-Chang ;
Nallanathan, Arumugam ;
Garg, Hari Krishna ;
Zhang, Rui .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) :940-950
[9]   Information Theoretic Security [J].
Liang, Yingbin ;
Poor, H. Vincent ;
Shamai, Shlomo .
FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY, 2008, 5 (4-5) :355-580
[10]   Cooperative Non-Orthogonal Multiple Access in Cognitive Radio [J].
Lv, Lu ;
Chen, Jian ;
Ni, Qiang .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (10) :2059-2062