A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach

Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS) provisioning for primary users (PUs) and protecting information security for secondary users (SUs) are two crucial and fundamental issues for CR...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 18; no. 3; pp. 1548 - 1565
Main Authors Wang, Yichen, Tang, Xiao, Wang, Tao
Format Journal Article
LanguageEnglish
Published New York IEEE 01.03.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS) provisioning for primary users (PUs) and protecting information security for secondary users (SUs) are two crucial and fundamental issues for CRNs. Consequently, in this paper, we establish a unified QoS and security provisioning framework for wiretap CRNs. Specifically, different from the widely used deterministic QoS provisioning method and information-theoretical security protection approach, our established framework, which is built on the theory of statistical queueing analysis, can quantitatively characterize the PU's QoS and the SU's security requirements. By adopting the theories of effective capacity and effective bandwidth , we further convert the QoS and security requirements to the equivalent PU's effective capacity and SU's effective bandwidth constraints. Following our developed framework, we formulate the nonconvex optimization problem, which aims at maximizing the average throughput of SU subject to PU's QoS requirement, SU's security constraint, as well as SU's average and peak transmit power limitations. Then, we adopt the techniques of convex hull and probabilistic transmission to convert the original nonconvex problem to the equivalent convex problem and obtain the optimal power allocation scheme through the Lagrangian method. Moreover, we also develop a fixed power allocation scheme which is suboptimal but has low complexity. The simulation results are also provided, which demonstrate the impact of the PU's QoS and the SU's security requirements on SU's throughput as well as the advantage of our proposed optimal power allocation scheme over the fixed power allocation scheme and the conventional security-based water-filling policy.
AbstractList Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS) provisioning for primary users (PUs) and protecting information security for secondary users (SUs) are two crucial and fundamental issues for CRNs. Consequently, in this paper, we establish a unified QoS and security provisioning framework for wiretap CRNs. Specifically, different from the widely used deterministic QoS provisioning method and information-theoretical security protection approach, our established framework, which is built on the theory of statistical queueing analysis, can quantitatively characterize the PU's QoS and the SU's security requirements. By adopting the theories of effective capacity and effective bandwidth , we further convert the QoS and security requirements to the equivalent PU's effective capacity and SU's effective bandwidth constraints. Following our developed framework, we formulate the nonconvex optimization problem, which aims at maximizing the average throughput of SU subject to PU's QoS requirement, SU's security constraint, as well as SU's average and peak transmit power limitations. Then, we adopt the techniques of convex hull and probabilistic transmission to convert the original nonconvex problem to the equivalent convex problem and obtain the optimal power allocation scheme through the Lagrangian method. Moreover, we also develop a fixed power allocation scheme which is suboptimal but has low complexity. The simulation results are also provided, which demonstrate the impact of the PU's QoS and the SU's security requirements on SU's throughput as well as the advantage of our proposed optimal power allocation scheme over the fixed power allocation scheme and the conventional security-based water-filling policy.
Author Tang, Xiao
Wang, Yichen
Wang, Tao
Author_xml – sequence: 1
  givenname: Yichen
  orcidid: 0000-0003-4593-2605
  surname: Wang
  fullname: Wang, Yichen
  email: wangyichen0819@mail.xjtu.edu.cn
  organization: Department of Information and Communications Engineering, School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China
– sequence: 2
  givenname: Xiao
  orcidid: 0000-0001-8971-5413
  surname: Tang
  fullname: Tang, Xiao
  email: tangxiao@nwpu.edu.cn
  organization: Department of Communication Engineering, Northwestern Polytechnical University, Xi'an, China
– sequence: 3
  givenname: Tao
  surname: Wang
  fullname: Wang, Tao
  email: wangtaot@stu.xjtu.edu.cn
  organization: Department of Information and Communications Engineering, School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China
BookMark eNp9kM1P3DAQxS1EpQLtvRIXSz1nydhxYnOLVkCREB9dEMfI64yp6WIvtkO1N_50Ei3i0AOnGY1-783M2ye7Pngk5AeUM4BSHd3ez2esBDVjUnEuYYfsgRCyYKySu1PP6wJYU38l-yk9liU0tRB75LWld95Zhz29CQuqfU8XaIbo8oZex_Dikgve-Qd6GvUT_gvxL7Uh0nsXMes1nYcH77J7Qfpb9y7QS8wTk45pSxdZZ5eyM3pFbwYccLJpvV5tkku0Xa9j0ObPN_LF6lXC7-_1gNydntzOfxUXV2fn8_aiMExBLpZNBVaIZY1WWSntEkxZi0r1dQNCSQ7S8F400HMD49iaqkeQPeO20ZVolvyA_Nz6jmufB0y5ewxDHK9JHQMFTKimEiNVbykTQ0oRbWfc9EbwOWq36qDsprS7Me1uSrt7T3sUlv8J19E96bj5THK4lThE_MBlzSohK_4GqQ-Ncg
CODEN ITWCAX
CitedBy_id crossref_primary_10_1109_ACCESS_2020_3033321
crossref_primary_10_1109_TCOMM_2020_2980843
crossref_primary_10_1007_s10723_025_09797_3
crossref_primary_10_1109_TCCN_2020_2971703
crossref_primary_10_1007_s11276_021_02663_6
crossref_primary_10_1007_s11276_021_02666_3
crossref_primary_10_1109_COMST_2022_3191697
crossref_primary_10_1109_JSYST_2021_3099072
crossref_primary_10_3390_electronics8090995
crossref_primary_10_1109_TWC_2021_3094615
crossref_primary_10_1109_TWC_2023_3265458
crossref_primary_10_1109_ACCESS_2019_2940699
crossref_primary_10_1016_j_comcom_2023_12_017
Cites_doi 10.1109/TCOMM.2017.2754483
10.1109/TVT.2016.2520983
10.1109/MCOM.2016.7537191
10.1109/TIT.2011.2174613
10.1109/9.284868
10.1109/TWC.2013.032513.121510
10.1109/TWC.2017.2712158
10.1109/TVT.2017.2749599
10.1002/j.1538-7305.1949.tb00928.x
10.1002/j.1538-7305.1975.tb02040.x
10.1109/TVT.2018.2790363
10.1109/TIT.2008.928990
10.1109/JSAC.2018.2825560
10.1109/JSEN.2017.2674181
10.1109/TVT.2015.2436334
10.1109/JSAC.2011.110210
10.1109/TIFS.2018.2825944
10.1109/JSAC.2018.2825140
10.1109/TVT.2017.2770175
10.1109/LSP.2012.2227727
10.1109/SURV.2014.012314.00178
10.1109/TIFS.2013.2261060
10.1109/ACCESS.2016.2517321
10.1109/TCOMM.2017.2715176
10.1109/18.641562
10.1109/TCCN.2016.2584080
10.1109/COMST.2016.2633387
10.1049/iet-com.2016.0039
10.1109/TWC.2010.06.090912
10.1109/JSAC.2004.839380
10.1109/WCNC.2017.7925502
10.1109/LWC.2014.2365808
10.1109/TVT.2016.2524258
10.1109/TWC.2015.2462816
10.1109/TVT.2014.2354076
10.1109/TSP.2015.2494852
10.1109/TWC.2016.2582483
10.1109/TSP.2017.2759082
10.1017/CBO9780511804441
10.1109/TWC.2013.010214.130797
10.1109/TVT.2014.2345588
10.1109/TWC.2016.2647252
10.1109/LWC.2017.2728528
10.1109/TWC.2008.060848
10.1109/TIFS.2017.2750106
10.1109/JSAC.2018.2804018
10.1109/TWC.2007.051075
10.1109/TCOMM.2014.021714.130140
10.1109/TCOMM.2016.2607746
10.1109/TCCN.2017.2748132
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TWC.2019.2893381
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2248
EndPage 1565
ExternalDocumentID 10_1109_TWC_2019_2893381
8624584
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61871314
  funderid: 10.13039/501100001809
– fundername: Chinese Academy of Sciences
  grantid: 2015003
  funderid: 10.13039/501100002367
– fundername: National Science and Technology Major Project
  grantid: 2018ZX03001003-004
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c291t-b741f55b6ef9f88fb1c06549d671598318c3d571d3c1549fc4de18d23f7a457b3
IEDL.DBID RIE
ISSN 1536-1276
IngestDate Fri Jul 25 12:21:42 EDT 2025
Tue Jul 01 04:13:24 EDT 2025
Thu Apr 24 23:03:58 EDT 2025
Wed Aug 27 02:51:28 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-b741f55b6ef9f88fb1c06549d671598318c3d571d3c1549fc4de18d23f7a457b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4593-2605
0000-0001-8971-5413
PQID 2191259745
PQPubID 105736
PageCount 18
ParticipantIDs ieee_primary_8624584
crossref_citationtrail_10_1109_TWC_2019_2893381
proquest_journals_2191259745
crossref_primary_10_1109_TWC_2019_2893381
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-March
2019-3-00
20190301
PublicationDateYYYYMMDD 2019-03-01
PublicationDate_xml – month: 03
  year: 2019
  text: 2019-March
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on wireless communications
PublicationTitleAbbrev TWC
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref13
ref56
ref12
ref15
ref14
ref55
ref11
ref54
ref10
ref17
ref16
ref19
ref18
tang (ref34) 2015
ref50
ref46
ref45
ref48
ref47
ref42
ref41
(ref53) 2015
ref44
ref43
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
ref35
ref37
ref36
tang (ref33) 2017
ref31
ref30
ref32
ref2
ref1
ref39
ref38
wu (ref51) 2003; 2
ref24
ref23
wang (ref49) 2018
ref26
ref25
ref20
ref22
ref28
stallings (ref21) 2006
ref27
ref29
(ref52) 2018
References_xml – ident: ref12
  doi: 10.1109/TCOMM.2017.2754483
– ident: ref48
  doi: 10.1109/TVT.2016.2520983
– ident: ref30
  doi: 10.1109/MCOM.2016.7537191
– ident: ref31
  doi: 10.1109/TIT.2011.2174613
– ident: ref50
  doi: 10.1109/9.284868
– ident: ref10
  doi: 10.1109/TWC.2013.032513.121510
– ident: ref35
  doi: 10.1109/TWC.2017.2712158
– ident: ref17
  doi: 10.1109/TVT.2017.2749599
– ident: ref22
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: ref23
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref9
  doi: 10.1109/TVT.2018.2790363
– ident: ref37
  doi: 10.1109/TIT.2008.928990
– ident: ref26
  doi: 10.1109/JSAC.2018.2825560
– ident: ref15
  doi: 10.1109/JSEN.2017.2674181
– ident: ref40
  doi: 10.1109/TVT.2015.2436334
– ident: ref18
  doi: 10.1109/JSAC.2011.110210
– start-page: 1
  year: 2017
  ident: ref33
  article-title: Achieving unconditional security for MIMO-BAN under short blocklength wiretap code
  publication-title: Proc IEEE Veh Technol Conf (VTC)-Fall
– ident: ref28
  doi: 10.1109/TIFS.2018.2825944
– ident: ref29
  doi: 10.1109/JSAC.2018.2825140
– ident: ref14
  doi: 10.1109/TVT.2017.2770175
– ident: ref5
  doi: 10.1109/LSP.2012.2227727
– ident: ref25
  doi: 10.1109/SURV.2014.012314.00178
– ident: ref36
  doi: 10.1109/TIFS.2013.2261060
– ident: ref45
  doi: 10.1109/ACCESS.2016.2517321
– ident: ref38
  doi: 10.1109/TCOMM.2017.2715176
– ident: ref56
  doi: 10.1109/18.641562
– year: 2018
  ident: ref52
  publication-title: NR Base Station (BS) Radio Transmission and Reception Release 15
– ident: ref6
  doi: 10.1109/TCCN.2016.2584080
– ident: ref24
  doi: 10.1109/COMST.2016.2633387
– ident: ref32
  doi: 10.1049/iet-com.2016.0039
– ident: ref13
  doi: 10.1109/TWC.2010.06.090912
– start-page: 1
  year: 2018
  ident: ref49
  article-title: QoS and security aware power allocation scheme for wiretap cognitive radio networks
  publication-title: Proc IEEE Veh Technol Conf (VTC)-Fall
– ident: ref1
  doi: 10.1109/JSAC.2004.839380
– ident: ref2
  doi: 10.1109/WCNC.2017.7925502
– ident: ref43
  doi: 10.1109/LWC.2014.2365808
– start-page: 105
  year: 2015
  ident: ref34
  article-title: Combining MIMO beamforming with security codes to achieve unconditional communication security
  publication-title: Proc IEEE/CIC Int Conf Commun China (CIC/ICCC)
– volume: 2
  start-page: 630
  year: 2003
  ident: ref51
  article-title: Effective capacity: A wireless link model for support of quality of service
  publication-title: IEEE Trans Wireless Commun
– ident: ref46
  doi: 10.1109/TVT.2016.2524258
– ident: ref3
  doi: 10.1109/TWC.2015.2462816
– ident: ref7
  doi: 10.1109/TVT.2014.2354076
– ident: ref20
  doi: 10.1109/TSP.2015.2494852
– ident: ref44
  doi: 10.1109/TWC.2016.2582483
– year: 2015
  ident: ref53
  publication-title: Cellular System Support for Ultra Low Complexity and Low Throughput Internet of Things
– ident: ref47
  doi: 10.1109/TSP.2017.2759082
– ident: ref55
  doi: 10.1017/CBO9780511804441
– ident: ref4
  doi: 10.1109/TWC.2013.010214.130797
– ident: ref19
  doi: 10.1109/TVT.2014.2345588
– ident: ref8
  doi: 10.1109/TWC.2016.2647252
– ident: ref42
  doi: 10.1109/LWC.2017.2728528
– ident: ref27
  doi: 10.1109/TWC.2008.060848
– ident: ref39
  doi: 10.1109/TIFS.2017.2750106
– year: 2006
  ident: ref21
  publication-title: Cryptography and Network Security Principles and Practices
– ident: ref11
  doi: 10.1109/JSAC.2018.2804018
– ident: ref57
  doi: 10.1109/TWC.2007.051075
– ident: ref16
  doi: 10.1109/TCOMM.2014.021714.130140
– ident: ref54
  doi: 10.1109/TCOMM.2016.2607746
– ident: ref41
  doi: 10.1109/TCCN.2017.2748132
SSID ssj0017655
Score 2.402013
Snippet Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS)...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1548
SubjectTerms Bandwidths
Cognitive radio
Communication channels
Convexity
Cybersecurity
Delays
effective bandwidth
effective capacity
Equivalence
Hulls
Information security
information security protection
Interference
Optimization
power allocation
Power management
Provisioning
QoS provisioning
Quality of service
Quality of service architectures
Queues
Queuing theory
Radio broadcasting
Radio networks
Resource management
Statistical analysis
statistical queueing analysis
Wireless communication
Wireless networks
Wiretapping
Title A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach
URI https://ieeexplore.ieee.org/document/8624584
https://www.proquest.com/docview/2191259745
Volume 18
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JS8QwFH6oJz24i-NGDl4EOzNpm7TxNgwOIiiu6K1kBVFmBqe9ePKnm9cNN8RbD2kIvCTvS_K97wM4DFFVzDITYK4M4kTHgTQuCkw_VEyqSKYJ1g5fXPKz-_j8kT3OwXFbC2OtLclntouf5Vu-megCr8p6WMzgE-Y8zPuDW1Wr1b4YJLx0OPULGH1lkvZJsi96dw9D5HCJboje8in9koJKT5UfG3GZXUYrcNGMqyKVPHeLXHX12zfJxv8OfBWWa5hJBtW8WIM5O16HpU_igxvwPiAecDoPQcn15JbIsSG3tZkducKLhll1VUtGDX-LeIBLkC6byykZNrwjciPN04RcVnzy2QkZEESwpQC0H8J1YQuL3TTyJ2RQy5hvwv3o9G54FtR-DIEOBc0D5dGHY0xx64RLU6eoxtJUYXjiA5363UFHhiXURBqF35yOjaWpCSOXyJglKtqChfFkbLeBcMOli4WkqbOxFUxKylWkueChSynVHeg1Icp0LVaOnhkvWXlo6YvMBzXDoGZ1UDtw1P4xrYQ6_mi7gTFq29Xh6cBeMwuyeiXPMr-jewzoT11s5_e_dmER-654aXuwkL8Wdt8DlVwdlDP0Az_z5Xs
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LTtwwFL2isKBdlFdRpwXqBRskMjNOYidmNxp1NBRmxGNQ2UV-SohqBnWSTVf99PrmpfIQYpeFk1i6tu-xfe45AIchqopZZgLMlUGc6DiQxkWB6YeKSRXJNMHa4cmUj2_iH7fsdgWO21oYa21JPrNdfCzv8s1CF3hU1sNiBp8w38Gaz_uMVtVa7Z1BwkuPUz-F0VkmaS8l-6I3-zlEFpfohugun9JHSah0VXm2FJf5ZbQBk6ZnFa3kvlvkqqv_PBFtfGvXN-FjDTTJoBoZW7Bi59vw4T_5wR34OyAecjoPQsnl4prIuSHXtZ0ducCjhmV1WEtGDYOLeIhLkDCbywcybJhH5EqauwWZVozy5QkZEMSwpQS078JlYQuLn2kEUMigFjL_BDej77PhOKgdGQIdCpoHyuMPx5ji1gmXpk5RjcWpwvDEhzr164OODEuoiTRKvzkdG0tTE0YukTFLVLQLq_PF3H4Gwg2XLhaSps7GVjApKVeR5oKHLqVUd6DXhCjTtVw5umb8ysptS19kPqgZBjWrg9qBo_aNh0qq45W2Oxijtl0dng7sNaMgq-fyMvNrukeBft_Fvrz81jdYH88m59n56fTsK7zH_1QstT1YzX8Xdt_DllwdlKP1H1256MQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Unified+QoS+and+Security+Provisioning+Framework+for+Wiretap+Cognitive+Radio+Networks%3A+A+Statistical+Queueing+Analysis+Approach&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Wang%2C+Yichen&rft.au=Tang%2C+Xiao&rft.au=Wang%2C+Tao&rft.date=2019-03-01&rft.issn=1536-1276&rft.eissn=1558-2248&rft.volume=18&rft.issue=3&rft.spage=1548&rft.epage=1565&rft_id=info:doi/10.1109%2FTWC.2019.2893381&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TWC_2019_2893381
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon