Secure Cognitive Radio System with Cooperative Secondary Networks

被引:0
|
作者
Liu, Wenli [1 ]
Guo, Li [1 ]
Kang, Tianyu [1 ]
Zhang, Jianwei [1 ]
Lin, Jiaru [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Universal Wireless Commun, Beijing 100876, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In cognitive radio (CR) systems, we often use jamming schemes to improve the physical-layer security in the presence of passive eavesdroppers. However, it also needs additional signal sources to transmit artificial noise. In this paper, we investigate the multiple-input single-output (MISO) cognitive radio system where two secondary links secure each other's communication. Each secondary transmitter (ST) sends intended messages to its own receiver while acts as a friendly jammer to the other CRN. Our target is to maximize the worst-user's secrecy rate while limiting the interference in the direction of the primary receiver. We solve the problem through a sequence of convex semidefinite programs (SDPs) under individual power constraints. We also introduce two sub-optimal zero-forcing (ZF) beamforming methods, one of which solves the problem based on SDP and the other adopts the approach of Pareto-optimal parameterization in a more computationally efficient way.
引用
收藏
页码:6 / 10
页数:5
相关论文
共 50 条
  • [1] SECURE COOPERATIVE SPECTRUM SENSING FOR COGNITIVE RADIO NETWORKS
    Hu, Fuping
    Wang, Shu
    Cheng, Zhuo
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2473 - 2479
  • [2] Towards Secure Communications in Cooperative Cognitive Radio Networks
    Zhang, Ning
    Lu, Ning
    Cheng, Nan
    Mark, Jon W.
    Shen, Xuemin
    2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 722 - 726
  • [3] The sensing of the secure cooperative spectrum in cognitive radio networks
    Yan, Qi
    Yang, Jia-Wei
    Zhang, Wen
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2011, 34 (02): : 71 - 75
  • [4] Cooperative Jamming for Secure Communications in MIMO Cooperative Cognitive Radio Networks
    Li, Zhen
    Jing, Tao
    Cheng, Xiuzhen
    Huo, Yan
    Zhou, Wei
    Chen, Dechang
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7609 - 7614
  • [5] Secondary Encrypted Secure Transmission in Cognitive Radio Networks
    Wang, Dawei
    Ren, Pinyi
    Xu, Qian
    Du, Qinghe
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [6] Utilizing Cooperative Jamming to Secure Cognitive Radio NOMA Networks
    Zhang, Zheng
    Chen, Jian
    Lv, Lu
    Ye, Qiang
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [7] Exploiting Secondary Caching for Cooperative Cognitive Radio Networks
    Yang, Jiachen
    Xu, Huifang
    Zhang, Juping
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (01) : 124 - 127
  • [8] Optimization of cooperative secondary users in cognitive radio networks
    Chilakala, Sudhamani
    Ram, M. Satya Sai
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2018, 21 (05): : 815 - 821
  • [9] Secure Communications with Untrusted Secondary Users in Cognitive Radio Networks
    Jeon, Hyoungsuk
    McLaughlin, Steven W.
    Ha, Jeongseok
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1072 - 1078
  • [10] Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks
    Jeon, Hyoungsuk
    McLaughlin, Steven W.
    Kim, Il-Min
    Ha, Jeongseok
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (04) : 1790 - 1805