Physical-layer information hiding technique for cognitive radio communications in cooperative relaying systems

被引:5
作者
Ghane, Amir Hossein [1 ]
Harsini, Jalil S. [1 ]
机构
[1] Univ Guilan, Dept Elect Engn, Rasht 4199613769, Iran
关键词
telecommunication security; cooperative communication; data encapsulation; cognitive radio; protocols; relay networks (telecommunication); diversity reception; signal detection; throughput performance; selection-combining rule; symbol detection; frame error rate; primary system performance degradation; cooperative relaying systems; physical-layer information hiding technique; secondary user; hiding cognitive capacity; primary receiver; incremental relaying protocols; fixed relaying protocols; secondary systems; primary systems; cognitive data hiding; primary information signal; standard relaying scheme; hiding algorithm; malicious users; symbol level; low-power noise; confidential cognitive information; cognitive radio network; confidential cognitive radio data; physical layer level; relaying systems; cognitive radio communications; PERFORMANCE; CHANNELS;
D O I
10.1049/iet-com.2018.5413
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This study presents a novel idea for information hiding at the physical layer level in order to securely transmit confidential cognitive radio data in cooperative relaying systems. Considering a cognitive radio network in which the secondary user cooperates with the primary system in relaying its data, in the proposed model, confidential cognitive information is hidden into the primary signal as a low-power noise at a symbol level such that it would be invisible by malicious users. The new hiding algorithm can be utilised along with any standard relaying scheme as long as the primary information signal is used as the cover data without significant degradation of the primary system performance. In the presence of cognitive data hiding, both the frame error rate and throughput performance of the primary and secondary systems are derived analytically for well-known relaying schemes such as fixed and incremental relaying protocols, when a selection-combining rule is utilised at the primary receiver for symbol detection. Using simulation results the correctness of the proposed theoretical analysis is verified. Moreover, using numerical results the existing tradeoff between the hiding cognitive capacity of the proposed model and the performance degradation of the primary system is highlighted.
引用
收藏
页码:124 / 134
页数:11
相关论文
共 22 条
  • [1] Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    Guha, Saikat
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) : 26 - +
  • [2] Detect-and-Forward in Two-Hop Relay Channels: A Metrics-Based Analysis
    Benjillali, Mustapha
    Szczecinski, Leszek
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2010, 58 (06) : 1729 - 1736
  • [3] El-Malek A.H.A., 2016, IEEE T VEH TECHNOL, V66, P5372
  • [4] Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme
    Fang, He
    Xu, Li
    Wang, Xianbin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) : 197 - 209
  • [5] On the Optimization of the Secondary Transmitter's Strategy in Cognitive Radio Channels with Secrecy
    Gabry, Frederic
    Li, Nan
    Schrammar, Nicolas
    Girnyk, Maksym
    Rasmussen, Lars K.
    Skoglund, Mikael
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (03) : 451 - 463
  • [6] A network steganographic approach to overlay cognitive radio systems utilizing systematic coding
    Ghane, Amir Hossein
    Harsini, Jalil Seifali
    [J]. PHYSICAL COMMUNICATION, 2018, 27 : 63 - 73
  • [7] Goldsmith A., 2005, WIRELESS COMMUN
  • [8] Analysis of Non-Cooperative and Cooperative Type II Hybrid ARQ Protocols with AMC over Correlated Fading Channels
    Harsini, Jalil Seifali
    Lahouti, Farshad
    Levorato, Marco
    Zorzi, Michele
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (03) : 877 - 889
  • [9] On Covert Communication With Noise Uncertainty
    He, Biao
    Yan, Shihao
    Zhou, Xiangyun
    Lau, Vincent K. N.
    [J]. IEEE COMMUNICATIONS LETTERS, 2017, 21 (04) : 941 - 944
  • [10] Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks
    Jeon, Hyoungsuk
    McLaughlin, Steven W.
    Kim, Il-Min
    Ha, Jeongseok
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (04) : 1790 - 1805