Secure Communications with Secondary User Selection in Underlay Cognitive Radio Networks

被引:0
作者
Qin, Mian [1 ,2 ]
Yang, Shouyi [1 ]
Han, Zhuo [1 ]
Zhang, Ruizhe [1 ]
Deng, Hao [2 ]
机构
[1] Zhengzhou Univ, Sch Informat Engn, Zhengzhou 450001, Henan, Peoples R China
[2] Henan Univ, Sch Phys & Elect, Kaifeng 475000, Henan, Peoples R China
来源
2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS) | 2018年
基金
中国国家自然科学基金;
关键词
PHYSICAL-LAYER SECURITY; ALLOCATION; DIVERSITY; CAPACITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates the effect of multiuser gain provided by the secondary user selection on the secrecy performance of the primary users. We propose a simple secondary user selection scheme and derive a closed-form lower bound of the achievable ergodic secrecy rate of the primary users. In the high signal-to-noise ratio (SNR) regime, asymptotic result shows that the multiuser gain scales logarithmically with the number of the secondary users for a fixed interference temperature. When there is no interference temperature constraint, more multiuser gain can be achieved as the secondary user transmits with a higher power. Theoretical and simulation results show that the interference from the secondary users is helpful and the multiuser gain enhances the security of the primary users greatly.
引用
收藏
页数:6
相关论文
共 20 条
[11]   Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users [J].
Mokari, Nader ;
Parsaeefard, Saeedeh ;
Saeedi, Hamid ;
Azmi, Paeiz .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (02) :1058-1073
[12]   On Physical Layer Security for Cognitive Radio Networks [J].
Shu, Zhihui ;
Qian, Yi ;
Ci, Song .
IEEE NETWORK, 2013, 27 (03) :28-33
[13]   Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks [J].
Van-Dinh Nguyen ;
Duong, Trung Q. ;
Dobre, Octavia A. ;
Shin, Oh-Soon .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) :2609-2623
[14]   Secrecy Capacity of the Primary System in a Cognitive Radio Network [J].
Van-Dinh Nguyen ;
Hoang, Tiep M. ;
Shin, Oh-Soon .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (08) :3834-3843
[15]   On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels [J].
Wang, Chao ;
Wang, Hui-Ming .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) :1814-1827
[16]   Tight Bounds for Ergodic Capacity of Dual-Hop Fixed-Gain Relay Networks under Rayleigh Fading [J].
Waqar, Omer ;
Ghogho, Mounir ;
McLernon, Des .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (04) :413-415
[17]   Resource Allocation for Cognitive Radio With Primary User Secrecy Outage Constraint [J].
Xu, Ding ;
Li, Qun .
IEEE SYSTEMS JOURNAL, 2018, 12 (01) :893-904
[18]   Secure Communications in Underlay Cognitive Radio Networks: User Scheduling and Performance Analysis [J].
Yang, Long ;
Jiang, Hai ;
Vorobyov, Sergiy A. ;
Chen, Jian ;
Zhang, Hailin .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (06) :1191-1194
[19]   Cooperative Spectrum Access Towards Secure Information Transfer for CRNs [J].
Zhang, Ning ;
Lu, Ning ;
Cheng, Nan ;
Mark, Jon W. ;
Shen, Xuemin .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (11) :2453-2464
[20]   Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks [J].
Zou, Yulong ;
Wang, Xianbin ;
Shen, Weiming .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (12) :5103-5113