CREEP: Cognitive Relaying Enabled Efficiency and Physical-layer Security Preserving Framework

被引:0
作者
Chen, Zhicheng [1 ]
Cao, Bin [1 ]
Zhang, Yalin [1 ]
Zhang, Qinyu [1 ]
Sun, Limin [2 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Guangdong, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
来源
2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS) | 2014年
关键词
Cognitive radio network; spectrum efficiency; physical-layer security; polarized antenna; secrecy capacity; FADING CHANNELS; COMMUNICATION;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The object of this work is to improve secrecy capacity of primary user (PU) as well as spectrum utilization. To this end, we present a cognitive relaying enabled efficiency and physical-layer security preserving (CREEP) framework, in which secondary users (SUs) are allowed to perform secondary transmissions. By enabling dual-polarized antenna and leveraging polarization processing at SUs, signals from legitimate users can be separated at the corresponding receivers, while the eavesdropper (EVE) cannot obtain information from PU. We formulate the system model, signaling plan, and key enabling techniques to enhance the spectrum efficiency via allowing SUs' communications, and to preserve PU's physical-layer security via SUs' jamming at EVE. To examine the performance of CREEP, we provide theoretic analysis of a sum capacity maximization under certain rate and power constraints. Numerical results show CREEP not only improves PU's secrecy capacity but also enhances spectrum utilization.
引用
收藏
页码:258 / 262
页数:5
相关论文
共 15 条
  • [1] Cao B., 2012, P GLOBECOM AN CA DEC
  • [2] Exploiting Orthogonally Dual-Polarized Antennas in Cooperative Cognitive Radio Networking
    Cao, Bin
    Liang, Hao
    Mark, Jon W.
    Zhang, Qinyu
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (11) : 2362 - 2373
  • [3] Toward Efficient Radio Spectrum Utilization: User Cooperation in Cognitive Radio Networking
    Cao, Bin
    Zhang, Qinyu
    Mark, Jon W.
    Cai, Lin X.
    Poor, H. Vincent
    [J]. IEEE NETWORK, 2012, 26 (04): : 46 - 52
  • [4] Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
    Chen, Jingchao
    Zhang, Rongqing
    Song, Lingyang
    Han, Zhu
    Jiao, Bingli
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 310 - 320
  • [5] Cheong L. Y., 1978, IEEE T INFORM THEORY, V24, p451
  • [6] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [7] Improving Wireless Physical Layer Security via Cooperating Relays
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1875 - 1888
  • [8] Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels
    Huang, Jing
    Mukherjee, Amitav
    Swindlehurst, A. Lee
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) : 2536 - 2550
  • [9] On Cooperative Relaying Schemes for Wireless Physical Layer Security
    Li, Jiangyuan
    Petropulu, Athina P.
    Weber, Steven
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) : 4985 - 4997
  • [10] Secure communication over fading channels
    Liang, Yingbin
    Poor, H. Vincent
    Sharnai , Shlorno
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2470 - 2492