Secure Cognitive MIMO Wiretap Networks With Different Antenna Transmission Schemes

被引:4
作者
Chen, Yong [1 ]
Zhang, Tao [2 ]
Qiao, Xiaoqiang [2 ]
Wu, Hao [2 ]
Zhang, Jiang [2 ]
机构
[1] Army Engn Univ PLA, Coll Commun Engn, Nanjing 210007, Peoples R China
[2] Natl Univ Def Technol, Res Inst 63, Nanjing 210007, Peoples R China
关键词
Physical layer security; cognitive radio; differential spatial modulation; secrecy outage probability; secrecy throughput;
D O I
10.1109/ACCESS.2020.3048158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates a secure transmission in the multiple-input multiple-output (MIMO) cognitive wiretap networks, where a secondary transmitter (Alice) sends data to a secondary receiver (Bob) in the presence of an eavesdropper (Eve). In order to solve the problems of inter channel interference and inter antenna synchronization encountered by traditional MIMO technologies, the antenna transmission scheme is adopted at the transmitter. As a comparison, we design two different antenna transmission schemes, namely transmit antenna selection maximal-ratio combining (TAS-MRC) scheme and differential spatial modulation maximal-ratio combining (DSM-MRC) scheme, respectively. Moreover, due to outdated channel state information (CSI) of the interference link from Alice to the primary user (PU), we propose power control mechanism to protect the quality of service (QoS) of PU. Furthermore, the closed-form for the secrecy outage probability and the secrecy throughput with TAS-MRC and DSM-MRC schemes are derived to evaluate the secrecy performance, respectively. What's more, we explore the security diversity gain and coding gain based on the asymptotic secrecy outage probability. As the results, it demonstrates that DSM-MRC requires less CSI and is convenient for modulation and demodulation, but sacrifices some secrecy performance gains between two proposed schemes.
引用
收藏
页码:5779 / 5790
页数:12
相关论文
共 39 条
[1]   Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and Applications [J].
Ali, Abdelmohsen ;
Hamouda, Walaa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1277-1304
[2]   Performance of Transmit Antenna Selection Physical Layer Security Schemes [J].
Alves, Hirley ;
Souza, Richard Demo ;
Debbah, Merouane ;
Bennis, Mehdi .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (06) :372-375
[3]   Index Modulation Techniques for 5G Wireless Networks [J].
Basar, Ertugrul .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (07) :168-175
[4]   Differential Spatial Modulation [J].
Bian, Yuyang ;
Cheng, Xiang ;
Wen, Miaowen ;
Yang, Liuqing ;
Poor, H. Vincent ;
Jiao, Bingli .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (07) :3262-3268
[5]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[6]   Security-Reliability Tradeoff Analysis for Underlay Cognitive Two-Way Relay Networks [J].
Cao, Zhanghua ;
Ji, Xiaodong ;
Wang, Jue ;
Zhang, Shibing ;
Ji, Yancheng ;
Wang, Jiangzhou .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (12) :6030-6042
[7]   On the Performance of Spectrum Sharing Cognitive Relay Networks with Imperfect CSI [J].
Chen, Junjie ;
Si, Jiangbo ;
Li, Zan ;
Huang, Haiyan .
IEEE COMMUNICATIONS LETTERS, 2012, 16 (07) :1002-1005
[8]  
Gradshtein I.S., 2007, Table of integrals, series, and Products, V7th
[9]   Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey [J].
Hamamreh, Jehad M. ;
Furqan, Haji M. ;
Arslan, Huseyin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1773-1828
[10]   Cognitive radio: Brain-empowered wireless communications [J].
Haykin, S .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (02) :201-220