Full-duplex wireless-powered jammer aided secure communication for cognitive radio networks

被引:1
作者
Chen, Xueyan [1 ]
Guo, Li [2 ]
Li, Xingwang [3 ]
Dong, Chao [2 ]
Lin, Jiaru [2 ]
Cavalcante, Charles C. [4 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Comp & Commun Engn, Zhengzhou, Henan, Peoples R China
[2] Beijing Univ Posts & Telecommun, Key Lab Universal Wireless Commun, Minist Educ, Beijing, Peoples R China
[3] Henan Polytech Univ, Sch Phys & Elect Informat Engn, Jiaozuo, Peoples R China
[4] Univ Fed Ceara, Wireless Telecommun Res Grp, Campus Pici, Fortaleza, Ceara, Brazil
关键词
Cooperative jammer; Cognitive radio; Energy harvesting; Full-duplex; Physical-layer security; INFORMATION; DESIGN; OPTIMIZATION;
D O I
10.1016/j.phycom.2018.10.003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A novel full-duplex (FD) wireless-powered cooperative jammer (CJ) aided transmit scheme is proposed to enhance the security for cognitive radio networks (CRNs). The CJ operates in an FD mode, so that it can harvest energy from the signals that transmitted from the secondary transmitter (ST), and send jamming noise (JN) to confuse the potential malicious eavesdroppers in the meantime. We aim to maximize the achievable secrecy rate of the secondary system by jointly designing the transmit covariance matrix at the ST and the JN covariance matrix at the CJ, while subject to the transmit power constraints at the ST and the CJ, and the interference constraint at the primary user (PU). Specifically, we formulate the secrecy rate maximization problem based on the perfect channel state information (CSI). As a solution, we propose a two-stage optimization algorithm to solve the non-convex problem. More particularly, we extend our proposed scheme to the imperfect CSI case. To tackle the robust secrecy rate maximization problem, we exploit the two-stage optimization algorithm with the extended S-procedure and rank-one relaxation. Simulation results have validated that our proposed scheme outperforms, in terms of secrecy rate, the isotropic JN scheme and the scheme without aided by CJ for the perfect CSI scenario. In addition, the robust scheme achieves higher secrecy rate gains as compared to the non-robust scheme for the imperfect CSI case. (C) 2018 Published by Elsevier B.V.
引用
收藏
页码:103 / 112
页数:10
相关论文
共 30 条
[1]   Wireless Powered Communication: Opportunities and Challenges [J].
Bi, Suzhi ;
Ho, Chin Keong ;
Zhang, Rui .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) :117-125
[2]   Accumulate and Jam: Towards Secure Communication via A Wireless-Powered Full-Duplex Jammer [J].
Bi, Ying ;
Chen, He .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1538-1550
[3]  
Boyd S, 2004, CONVEX OPTIMIZATION
[4]   Joint beamforming and power allocation for secure communication in cognitive radio networks [J].
Chen, Tao ;
Yuan, HuaQiang ;
Zhao, TieZhu ;
Zhang, ZuSheng ;
Ao, Xin .
IET COMMUNICATIONS, 2016, 10 (10) :1156-1162
[5]   SECRECY WIRELESS INFORMATION AND POWER TRANSFER: CHALLENGES AND OPPORTUNITIES [J].
Chen, Xiaoming ;
Ng, Derrick Wing Kwan ;
Chen, Hsiao-Hwa .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (02) :54-61
[6]   Simultaneous Wireless Information Power Transfer for MISO Secrecy Channel [J].
Chu, Zheng ;
Zhu, Zhengyu ;
Johnston, Martin ;
Le Goff, Stephane Y. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (09) :6913-6925
[7]   Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer [J].
Chu, Zheng ;
Cumanan, Kanapathippillai ;
Ding, Zhiguo ;
Johnston, Martin ;
Le Goff, Stephane Y. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (05) :1833-1847
[8]   Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective [J].
Goldsmith, Andrea ;
Jafar, Syed Ali ;
Maric, Ivana ;
Srinivasa, Sudhir .
PROCEEDINGS OF THE IEEE, 2009, 97 (05) :894-914
[9]  
Grant M., 2009, 711 U CAMBR
[10]   Simultaneous Information and Power Transfer for Broadband Wireless Systems [J].
Huang, Kaibin ;
Larsson, Erik .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (23) :5972-5986