Secrecy Diversity Analysis with Multi-user Scheduling for Overlay Cognitive Radio Systems

被引:0
作者
Yan, Peishun [1 ]
Zou, Yulong [1 ]
Zhu, Jia [1 ]
机构
[1] Nanjing Univ Posts & Telecomm, Sch Telecomm & Inform Engn, Nanjing, Jiangsu, Peoples R China
来源
2016 19TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC) | 2016年
基金
中国国家自然科学基金;
关键词
Multi-user scheduling; intercept probability; secrecy diversity order; cognitive radio network; physical layer security; NETWORKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider a cognitive radio (CR) network which is made up of multiple secondary users (SUs), a secondary destination (SD) and an eavesdropper (E) which may overhear the legitimate communication between SUs and SD. In order to ensure the secure communication from SUs to SD, we investigate round-robin scheduling and optimal user scheduling to prohibit eavesdropper attacking. In optimal user scheduling, the channel state information (CSI) of all links including SUs-D, SUs-E, primary user (PU)-D and PU-E are available. Because of intercept probability is an important metric of security for wireless communications, we discuss the intercept probability of both scheduling. To further present the impact of number of users on secrecy performance, we also analyze the secrecy diversity of round robin scheduling and optimal user scheduling. Final results indicate that round robin scheduling obtains only one diversity order, however optimal user scheduling achieves full diversity order. Additionally, optimal user scheduling performs better than round robin scheduling in terms of intercept probability and the secrecy performance will significantly improve as the number of users increases.
引用
收藏
页数:5
相关论文
共 9 条
[1]  
[Anonymous], 2008, IEEE P802 22 D1 0 DR
[2]   Cooperative spectrum sensing in cognitive radio, part I: Two user networks [J].
Ganesan, Ghurumuruhan ;
Li, Ye .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (06) :2204-2213
[3]   Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks [J].
Jo, Minho ;
Han, Longzhe ;
Kim, Dohoon ;
In, Hoh Peter .
IEEE NETWORK, 2013, 27 (03) :46-50
[4]   Opportunistic relay selection for cooperative networks with secrecy constraints [J].
Krikidis, I. .
IET COMMUNICATIONS, 2010, 4 (15) :1787-1791
[5]   WIRE-TAP CHANNEL [J].
WYNER, AD .
BELL SYSTEM TECHNICAL JOURNAL, 1975, 54 (08) :1355-1387
[6]   Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack [J].
Zou, Yulong ;
Wang, Gongpu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (02) :780-787
[7]   Securing Physical-Layer Communications for Cognitive Radio Networks [J].
Zou, Yulong ;
Zhu, Jia ;
Yang, Liuqing ;
Liang, Ying-Chang ;
Yao, Yu-Dong .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (09) :48-54
[8]   Secrecy Outage and Diversity Analysis of Cognitive Radio Systems [J].
Zou, Yulong ;
Li, Xuelong ;
Liang, Ying-Chang .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (11) :2222-2236
[9]   Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems [J].
Zou, Yulong ;
Champagne, Benoit ;
Zhu, Wei-Ping ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (01) :215-228