Abstract
In this paper, we consider secure communications for a five-node cognitive wireless network system including one primary user (PU) pair and one secondary user (SU) pair in presence of one eavesdropper. The secrecy transmission process departs into two equal time phases. To ensure transmission process safety, the primary source and receiver are allowed to deliver artificial noise to interfere the eavesdropper. To obtain higher spectrum efficiency, we propose an anti-interference spectrum access strategy with cooperative trusted DF relaying over flat fading channel, in which secondary user forward primary information and deliver its own information with different part of licensed spectrum. We study how to optimize the bandwidth and power allocation ratio to maximize the secondary user rate while guaranteeing the primary system to achieve its target secrecy rate. The expression of the optimal bandwidth allocation ratio is derived. Simulation results demonstrate that proposed strategy can achieve win-win result.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Goldsmith, A., Jafar, S., Maric, I., Srinivasa, S.: Breaking spectrumgridlock with cognitive radios: an information theoretic perspective. Proc. IEEE 97(5), 894–914 (2009)
Wang, C., Wang, H.M.: On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans. Inf. Forensics Secur. 9(11), 1814–1827 (2014)
Ikki, S.S., Ahmed, M.H.: Performance analysis of decode-and-forward incremental relaying cooperative-diversity networks over Rayleigh fading channels. In: 2009 IEEE 69th Vehicular Technology Conference, VTC Spring 2009, Barcelona, pp. 1−6 (2009)
Liu, R., Trappe, W. (eds.): Securing Wireless Communications at the Physical Layer. Springer, New York (2010)
Liang, Y., Poor, H.V., Shamai, S.: Information Theoretic Security. NowPublishers, Delft (2009)
Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), Nagercoil, pp. 840–844 (2013)
Wyner, A.D.: The wire-tap channel. Bell Sys. Tech. J. 54, 1355–1387 (1975)
Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010)
Huang, J., Swindlehurst, A.L.: Cooperative jamming for secure communications in MIMO relay networks. IEEE Trans. Signal Process. 59(10), 4871–4884 (2011)
AbolfathBeigi, M., Mohammad Razavizadeh, S.: Cooperative beamforming in cognitive radio networks. In: 2009 2nd IFIP Wireless Days (WD), Paris, pp. 1–5 (2009)
Yi, T., Guo, L., Niu, K., Cai, H., Lin, J., Ai, W.: Cooperative beam-forming in cognitive radio network with hybrid relay. In: 2012 19th International Conference on Telecommunications (ICT), Jounieh, pp. 1–5 (2012)
Kabeya, J., Takyu, O., Ohtsuki, T., Sasamori, F., Handa, S.: Performance evaluation of the physical layer security using artificial noise and relay station. In: 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Hong Kong, pp. 834–839 (2015)
Zhou, X., McKay, M.R.: Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation. IEEE Trans. Veh. Technol. 59(8), 3831–3842 (2010)
Deng, H., Wang, H.M., Wang, W., Yin, Q.: Secrecy transmission with a helper: to relay or not to relay. In: 2014 IEEE International Conference on Communications Workshops (ICC), Sydney, NSW, pp. 825–830 (2014)
Deng, H., Wang, H.-M., Guo, W., Wang, W.: Secrecy transmission with a helper: to relay or to jam. IEEE Trans. Inf. Forensics Secur. 10(2), 293–307 (2015)
Acknowledgments
This work was supported by China National Science Foundation under Grand No. 61402416 and 61303235, Natural Science Foundation of Zhejiang Province under Grant No. LQ14F010003 and LQ14F020005, NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization under grant No. U1509219, Natural Science Foundation of Jiangsu Province under Grant No. BK20140828, the Fundamental Research Funds for the Central Universities under Grant No. DUT16RC(3)045 and the Scientific Foundation for the Returned Overseas Chinese Scholars of State Education Ministry.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Gu, K., Lu, W., Zhou, G., Peng, H., Xu, Z., Liu, X. (2017). Bandwidth and Power Allocation for Wireless Cognitive Network with Eavesdropper. In: Xin-lin, H. (eds) Machine Learning and Intelligent Communications. MLICOM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 183. Springer, Cham. https://doi.org/10.1007/978-3-319-52730-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-52730-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52729-1
Online ISBN: 978-3-319-52730-7
eBook Packages: Computer ScienceComputer Science (R0)