Skip to main content
Log in

Physical Layer Security in Cognitive Radio Based Self-Organization Network

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

This paper focuses on a cognitive radio network (CRN), where both the primary and the secondary users (PUs and SUs) communicate with confidential messages. The secondary network is a distributed wireless self-organization network transmitting messages with collaborative beamforming. A multi-antenna target unknown eavesdropper (TUE), whose wiretap target is not assumed, appears in the CRN. A specific application of spectrum leasing is designed to ensure the secrecy performance of the whole network, in which the SUs access the spectrum in reward of helping improve the secrecy performance of the entire CRN. The transmit signals of the secondary network are designed to ensure the secrecy rate performance of both the primary and the secondary networks. To make it solvable with a method based on parameterizing the power gain region, the secrecy rate balancing problem is relaxed. The relaxation is further proved to be tight and the relaxed problem is equivalent to the original problem. Finally, we use a two-dimensional search to achieve the optimal transmit beamformer. According to the simulation, the proposed beamforming strategy enjoys an obvious performance gain comparing to the traditional zero-forcing beamforming.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. Note that we omit the proofs of Lemma 1 and Theorem 1 here, for they could be obtained with the similar methods in [9].

References

  1. Pei Y, Liang Y-C, Zhang L, Teh KC, Li KH (2010) Secure communication over MISO cognitive radio channels. IEEE Trans Wireless Commun 9(4):1494–1502

    Article  Google Scholar 

  2. Pei Y, Liang Y-C, Teh KC, Li KH (2011) Secure communication in multiantenna cognitive radio networks with imperfect channel state information. IEEE Trans Signal Process 59(4):1683–1693

    Article  MathSciNet  Google Scholar 

  3. Sarkar MZI, Ratnarajah T (2012) Aspect of security in the cognitive relay assisted interference channels. In: 2012 IEEE information theory workshop (ITW), pp 652–656

  4. Zhang J, Gursoy MC (2011) Secure relay beamforming over cognitive radio channels. In: Information sciences and systems (CISS), pp 1–5

  5. Sakran H, Shokair M, Nasr O, El-Rabaie S, El-Azm AA (2012) Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Commun 6(16):2676–2687

    Article  MathSciNet  Google Scholar 

  6. Wu Y, Liu KJR (2011) An information secrecy game in cognitive radio networks. IEEE Trans Inf Forensics Secur 6(3):831–842

    Article  Google Scholar 

  7. Lee K, Chae C-B, Kang J (2013) Spectrum leasing via cooperation for enhanced physical-Layer secrecy. IEEE Trans Veh Technol 62(9):4672–4678

    Article  Google Scholar 

  8. Kwon T, Wong VWS, Schober R (2012) Secure MISO cognitive radio system with perfect and imperfect CSI. In: 2012 IEEE global communications conference (GLOBECOM), pp 1236–1241

  9. Mochaourab R, Jorswieck E (2011) Optimal beamforming in interference networks with perfect local channel information. IEEE Trans Signal Process 59(3):1128–1141

    Article  MathSciNet  Google Scholar 

  10. Ni J, Wong K-K, Fei Z, Xing C, Chen H, Tong K-F, Kuang J (2014) Secrecy-rate balancing for two-user MISO interference channels. IEEE Commun Lett 3(1):6–9

    Article  Google Scholar 

  11. Li Q, Ma W-K (2011) Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming. IEEE Trans Signal Process 59(8):3799–3812

    Article  MathSciNet  Google Scholar 

  12. Park J (2012) Distributed MIMO Ad-hoc networks: link scheduling, power allocation, and cooperative beamforming. IEEE Trans Veh Technol 61(6):2586–2598

    Article  Google Scholar 

  13. Dong L, Petropulu AP, Poor HV (2009) Weighted cross-layer cooperative beamforming for wireless networks. IEEE Trans Signal Process 57(8):3240–3252

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China (No. 61271178 and No. 61171100), National Key Scientific and Technological Project of China (No. 2012ZX03004005002, No. 2012ZX03003007 and No. 2013ZX03003004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tianyu Kang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kang, T., Guo, L. Physical Layer Security in Cognitive Radio Based Self-Organization Network. Mobile Netw Appl 20, 459–465 (2015). https://doi.org/10.1007/s11036-015-0633-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-015-0633-0

Keywords

Navigation