Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks

被引:34
作者
Jeon, Hyoungsuk [1 ]
McLaughlin, Steven W. [2 ]
Kim, Il-Min [3 ]
Ha, Jeongseok [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Dept Elect Engn, Taejon 305701, South Korea
[2] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
基金
新加坡国家研究基金会;
关键词
Amplify-and-forward relay protocol; cognitive radio; eavesdropping; information-theoretic secrecy; untrusted secondary users; wiretap channel; WIRE-TAP CHANNEL; SECRECY CAPACITY; OUTAGE PROBABILITY; BROADCAST CHANNELS; ARTIFICIAL NOISE; FADING CHANNELS; POLAR CODES; INTERFERENCE; MESSAGES;
D O I
10.1109/TWC.2013.021214.130089
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We consider a cooperation scenario between primary users and untrusted secondary users in cognitive radio networks. The secondary users are willing to help the primary users to relay the primary users' messages in reward for being allowed to share the primary users' spectrum bands. However, the primary users might be reluctant to accept this help, since the secondary users are untrustworthy and may try unauthorized decoding of the primary users' messages. This paper will answer the question: when is this cooperation mutually beneficial for primary and secondary users? Taking an approach of information-theoretic secrecy, such as coding techniques for wiretap channels, the primary users can allow the secondary users to sense and relay the message, while ensuring that the secondary users are ignorant of the primary users' messages. We characterize an achievable secrecy rate of primary users with a rate of the secondary users' communication. From the derived rate pairs, an optimization problem is formulated such that the secondary transmitter distributes its transmit power to maximize its data rate while providing a higher secrecy rate to the primary users. We demonstrate that this cooperation can provide a positive secrecy rate, even when a non-cooperative scheme achieves a zero secrecy rate.
引用
收藏
页码:1790 / 1805
页数:16
相关论文
共 46 条
[1]   A survey on spectrum management in cognitive radio networks [J].
Akyildiz, Ian F. ;
Lee, Won-Yeol ;
Vuran, Mehmet C. ;
Mohanty, Shantidev .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) :40-48
[2]   Nested Polar Codes for Wiretap and Relay Channels [J].
Andersson, Mattias ;
Rathi, Vishwambhar ;
Thobaben, Ragnar ;
Kliewer, Jorg ;
Skoglund, Mikael .
IEEE COMMUNICATIONS LETTERS, 2010, 14 (08) :752-754
[3]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[4]  
Barros J., 2008, P INT C INF THEOR SE, P40
[5]  
Cover TM, 1991, Math Finance, V1, P1, DOI DOI 10.1111/J.1467-9965.1991.TB00002.X
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[8]   Capacity limits of MIMO channels [J].
Goldsmith, A ;
Jafar, SA ;
Jindal, N ;
Vishwanath, S .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (05) :684-702
[9]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[10]  
He X., 2009, ABS09075388 CORR, Vabs/0907.5388