Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks

被引:37
作者
Xu, Ding [1 ]
Li, Qun [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Wireless Commun Key Lab Jiangsu Prov, Nanjing 210003, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210046, Jiangsu, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2019年 / 13卷 / 03期
基金
中国国家自然科学基金;
关键词
Cognitive radio (CR); cooperation; eavesdropping; resource allocation; wireless powered communication; RADIO NETWORKS; SECRECY RATE; PRIMARY USER; INFORMATION; OPTIMIZATION; OUTAGE;
D O I
10.1109/JSYST.2018.2883491
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a cognitive wireless powered communication network sharing the spectrum with a primary network, which faces security threats from eavesdroppers (EAVs). We propose a new cooperative protocol for the wireless powered secondary users (SUs) to cooperate with the primary user (PU). In the protocol, the SUs first harvest energy from the power signals transmitted by the cognitive hybrid access point during the wireless power transfer phase, and then use the harvested energy to interfere with the EAVs and gain transmission opportunities at the same time during the wireless information transfer phase. Taking the maximization of the SU ergodic rate as the design objective, resource allocation algorithms based on the dual optimization method and the block coordinate descent method are proposed for the cases of perfect channel state information (CSI) and collusive/non-collusive EAVs under the PU secrecy constraint. More PU favorable greedy algorithms aimed at minimizing the PU secrecy outage probability are also proposed. We furthermore consider the unknown EAVs' CSI case and propose an efficient algorithm to improve the PU security performance. Extensive simulations show that our proposed protocol and corresponding resource allocation algorithms can not only let the SU gain transmission opportunities but also improve the PU security performance even with unknown EAVs' CSI.
引用
收藏
页码:2431 / 2442
页数:12
相关论文
共 50 条
[1]   Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game [J].
Al-Talabani, Ali ;
Deng, Yansha ;
Nallanathan, Arumugam ;
Nguyen, Huan X. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (11) :4764-4775
[2]  
Bertsekas D., 1999, NONLINEAR PROGRAMMIN
[3]  
Boyd S., 2004, Convex Optimization.
[4]  
Chen L, 2015, 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2015), P1
[5]   Secrecy Rate Optimization for Cooperative Cognitive Radio Networks Aided by a Wireless Energy Harvesting Jammer [J].
Chen, Xueyan ;
Guo, Li ;
Li, Xingwang ;
Dong, Chao ;
Lin, Jiaru ;
Mathiopoulos, P. Takis .
IEEE ACCESS, 2018, 6 :34127-34134
[6]   Dynamic Pricing Over Multiple Rounds of Spectrum Leasing in Cognitive Radio [J].
Fan, Rongfei ;
Zheng, Yu ;
An, Jianping ;
Jiang, Hai ;
Li, Xiangming .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (03) :1782-1789
[7]   Exploiting Opportunistic Scheduling in Uplink Wiretap Networks [J].
Ge, Xin ;
Jin, Hu ;
Zhu, Jun ;
Cheng, Julian ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (06) :4886-4897
[8]   Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective [J].
Goldsmith, Andrea ;
Jafar, Syed Ali ;
Maric, Ivana ;
Srinivasa, Sudhir .
PROCEEDINGS OF THE IEEE, 2009, 97 (05) :894-914
[9]  
Greene C., 2014, TECH REP
[10]   Cutting the Last Wires for Mobile Communications by Microwave Power Transfer [J].
Huang, Kaibin ;
Zhou, Xiangyun .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :86-93