Proactive Spectrum Sharing Incentive for Physical Layer Security Enhancement

被引:4
作者
Tourki, Kamel [1 ]
Hasna, Mazen O. [2 ]
机构
[1] Huawei Technol Co Ltd, France Res Ctr, Math & Algorithm Sci Lab, Lannion, France
[2] Qatar Univ, Coll Engn, Doha, Qatar
来源
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2015年
关键词
PERFORMANCE ANALYSIS; POWER ALLOCATION; OUTAGE ANALYSIS; RELAY;
D O I
10.1109/GLOCOM.2015.7417865
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the spectrum sharing incentive to enhance the physical layer security. The concept behind is that a legitimate source-destination pair, communicating in the presence of a passive eavesdropper, stimulates the help of another source-destination nodes looking for transmission opportunities, referred to as secondary network (SN). We thus propose a cooperative scheme, whereby the secondary transmitter will act as a friendly jammer to confound the eavesdropper and be granted to share the spectrum of the legitimate pair, referred to as primary network (PN), as a reward. To evaluate the performance of our cooperative scheme, we derive the closed form expression of the secrecy outage probability (SOP). However, to assess its usefulness, we introduce the mutual outage probability (MOP) and we carry out analysis to derive its expression. We show that a satisfactory SOP is a necessary condition for triggering the cooperation, whereas a satisfactory MOP is a sufficient condition to guaranty that the PN-SN collaboration leads to a win-win situation.
引用
收藏
页数:6
相关论文
共 24 条
[1]   Performance of Transmit Antenna Selection Physical Layer Security Schemes [J].
Alves, Hirley ;
Souza, Richard Demo ;
Debbah, Merouane ;
Bennis, Mehdi .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (06) :372-375
[2]  
Elkashlan M., 2015, IEEE T VEHI IN PRESS
[3]   Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels [J].
Huang, Jing ;
Mukherjee, Amitav ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) :2536-2550
[4]   Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security [J].
Liu, Yupeng ;
Li, Jiangyuan ;
Petropulu, Athina P. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) :682-694
[5]   Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI [J].
Mukherjee, Amitav ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (01) :351-361
[6]   On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming [J].
Park, Ki-Hong ;
Wang, Tian ;
Alouini, Mohamed-Slim .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1741-1750
[7]   Performance analysis of maximal ratio combining and comparison with optimum combining for mobile radio communications with cochannel interference [J].
Shah, A ;
Haimovich, AM .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2000, 49 (04) :1454-1463
[8]  
Stanijev I., 2011, P 49 ANN ALL C ILL U
[9]   Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes [J].
Sun, Li ;
Ren, Pinyi ;
Du, Qinghe ;
Wang, Yichen ;
Gao, Zhenzhen .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (03) :463-466
[10]   Exact Performance Analysis of MIMO Cognitive Radio Systems Using Transmit Antenna Selection [J].
Tourki, Kamel ;
Khan, Fahd Ahmed ;
Qaraqe, Khalid A. ;
Yang, Hong-Chuan ;
Alouini, Mohamed-Slim .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (03) :425-438