Skip to main content

Bandwidth and Power Allocation for Wireless Cognitive Network with Eavesdropper

  • Conference paper
  • First Online:
  • 1173 Accesses

Abstract

In this paper, we consider secure communications for a five-node cognitive wireless network system including one primary user (PU) pair and one secondary user (SU) pair in presence of one eavesdropper. The secrecy transmission process departs into two equal time phases. To ensure transmission process safety, the primary source and receiver are allowed to deliver artificial noise to interfere the eavesdropper. To obtain higher spectrum efficiency, we propose an anti-interference spectrum access strategy with cooperative trusted DF relaying over flat fading channel, in which secondary user forward primary information and deliver its own information with different part of licensed spectrum. We study how to optimize the bandwidth and power allocation ratio to maximize the secondary user rate while guaranteeing the primary system to achieve its target secrecy rate. The expression of the optimal bandwidth allocation ratio is derived. Simulation results demonstrate that proposed strategy can achieve win-win result.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Goldsmith, A., Jafar, S., Maric, I., Srinivasa, S.: Breaking spectrumgridlock with cognitive radios: an information theoretic perspective. Proc. IEEE 97(5), 894–914 (2009)

    Article  Google Scholar 

  2. Wang, C., Wang, H.M.: On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans. Inf. Forensics Secur. 9(11), 1814–1827 (2014)

    Article  Google Scholar 

  3. Ikki, S.S., Ahmed, M.H.: Performance analysis of decode-and-forward incremental relaying cooperative-diversity networks over Rayleigh fading channels. In: 2009 IEEE 69th Vehicular Technology Conference, VTC Spring 2009, Barcelona, pp. 1−6 (2009)

    Google Scholar 

  4. Liu, R., Trappe, W. (eds.): Securing Wireless Communications at the Physical Layer. Springer, New York (2010)

    Google Scholar 

  5. Liang, Y., Poor, H.V., Shamai, S.: Information Theoretic Security. NowPublishers, Delft (2009)

    MATH  Google Scholar 

  6. Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), Nagercoil, pp. 840–844 (2013)

    Google Scholar 

  7. Wyner, A.D.: The wire-tap channel. Bell Sys. Tech. J. 54, 1355–1387 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  8. Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010)

    Article  MathSciNet  Google Scholar 

  9. Huang, J., Swindlehurst, A.L.: Cooperative jamming for secure communications in MIMO relay networks. IEEE Trans. Signal Process. 59(10), 4871–4884 (2011)

    Article  MathSciNet  Google Scholar 

  10. AbolfathBeigi, M., Mohammad Razavizadeh, S.: Cooperative beamforming in cognitive radio networks. In: 2009 2nd IFIP Wireless Days (WD), Paris, pp. 1–5 (2009)

    Google Scholar 

  11. Yi, T., Guo, L., Niu, K., Cai, H., Lin, J., Ai, W.: Cooperative beam-forming in cognitive radio network with hybrid relay. In: 2012 19th International Conference on Telecommunications (ICT), Jounieh, pp. 1–5 (2012)

    Google Scholar 

  12. Kabeya, J., Takyu, O., Ohtsuki, T., Sasamori, F., Handa, S.: Performance evaluation of the physical layer security using artificial noise and relay station. In: 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Hong Kong, pp. 834–839 (2015)

    Google Scholar 

  13. Zhou, X., McKay, M.R.: Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation. IEEE Trans. Veh. Technol. 59(8), 3831–3842 (2010)

    Article  Google Scholar 

  14. Deng, H., Wang, H.M., Wang, W., Yin, Q.: Secrecy transmission with a helper: to relay or not to relay. In: 2014 IEEE International Conference on Communications Workshops (ICC), Sydney, NSW, pp. 825–830 (2014)

    Google Scholar 

  15. Deng, H., Wang, H.-M., Guo, W., Wang, W.: Secrecy transmission with a helper: to relay or to jam. IEEE Trans. Inf. Forensics Secur. 10(2), 293–307 (2015)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by China National Science Foundation under Grand No. 61402416 and 61303235, Natural Science Foundation of Zhejiang Province under Grant No. LQ14F010003 and LQ14F020005, NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization under grant No. U1509219, Natural Science Foundation of Jiangsu Province under Grant No. BK20140828, the Fundamental Research Funds for the Central Universities under Grant No. DUT16RC(3)045 and the Scientific Foundation for the Returned Overseas Chinese Scholars of State Education Ministry.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kecai Gu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Gu, K., Lu, W., Zhou, G., Peng, H., Xu, Z., Liu, X. (2017). Bandwidth and Power Allocation for Wireless Cognitive Network with Eavesdropper. In: Xin-lin, H. (eds) Machine Learning and Intelligent Communications. MLICOM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 183. Springer, Cham. https://doi.org/10.1007/978-3-319-52730-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52730-7_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52729-1

  • Online ISBN: 978-3-319-52730-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics