A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach
Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS) provisioning for primary users (PUs) and protecting information security for secondary users (SUs) are two crucial and fundamental issues for CR...
Saved in:
Published in | IEEE transactions on wireless communications Vol. 18; no. 3; pp. 1548 - 1565 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.03.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS) provisioning for primary users (PUs) and protecting information security for secondary users (SUs) are two crucial and fundamental issues for CRNs. Consequently, in this paper, we establish a unified QoS and security provisioning framework for wiretap CRNs. Specifically, different from the widely used deterministic QoS provisioning method and information-theoretical security protection approach, our established framework, which is built on the theory of statistical queueing analysis, can quantitatively characterize the PU's QoS and the SU's security requirements. By adopting the theories of effective capacity and effective bandwidth , we further convert the QoS and security requirements to the equivalent PU's effective capacity and SU's effective bandwidth constraints. Following our developed framework, we formulate the nonconvex optimization problem, which aims at maximizing the average throughput of SU subject to PU's QoS requirement, SU's security constraint, as well as SU's average and peak transmit power limitations. Then, we adopt the techniques of convex hull and probabilistic transmission to convert the original nonconvex problem to the equivalent convex problem and obtain the optimal power allocation scheme through the Lagrangian method. Moreover, we also develop a fixed power allocation scheme which is suboptimal but has low complexity. The simulation results are also provided, which demonstrate the impact of the PU's QoS and the SU's security requirements on SU's throughput as well as the advantage of our proposed optimal power allocation scheme over the fixed power allocation scheme and the conventional security-based water-filling policy. |
---|---|
AbstractList | Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS) provisioning for primary users (PUs) and protecting information security for secondary users (SUs) are two crucial and fundamental issues for CRNs. Consequently, in this paper, we establish a unified QoS and security provisioning framework for wiretap CRNs. Specifically, different from the widely used deterministic QoS provisioning method and information-theoretical security protection approach, our established framework, which is built on the theory of statistical queueing analysis, can quantitatively characterize the PU's QoS and the SU's security requirements. By adopting the theories of effective capacity and effective bandwidth , we further convert the QoS and security requirements to the equivalent PU's effective capacity and SU's effective bandwidth constraints. Following our developed framework, we formulate the nonconvex optimization problem, which aims at maximizing the average throughput of SU subject to PU's QoS requirement, SU's security constraint, as well as SU's average and peak transmit power limitations. Then, we adopt the techniques of convex hull and probabilistic transmission to convert the original nonconvex problem to the equivalent convex problem and obtain the optimal power allocation scheme through the Lagrangian method. Moreover, we also develop a fixed power allocation scheme which is suboptimal but has low complexity. The simulation results are also provided, which demonstrate the impact of the PU's QoS and the SU's security requirements on SU's throughput as well as the advantage of our proposed optimal power allocation scheme over the fixed power allocation scheme and the conventional security-based water-filling policy. |
Author | Tang, Xiao Wang, Yichen Wang, Tao |
Author_xml | – sequence: 1 givenname: Yichen orcidid: 0000-0003-4593-2605 surname: Wang fullname: Wang, Yichen email: wangyichen0819@mail.xjtu.edu.cn organization: Department of Information and Communications Engineering, School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China – sequence: 2 givenname: Xiao orcidid: 0000-0001-8971-5413 surname: Tang fullname: Tang, Xiao email: tangxiao@nwpu.edu.cn organization: Department of Communication Engineering, Northwestern Polytechnical University, Xi'an, China – sequence: 3 givenname: Tao surname: Wang fullname: Wang, Tao email: wangtaot@stu.xjtu.edu.cn organization: Department of Information and Communications Engineering, School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China |
BookMark | eNp9kM1P3DAQxS1EpQLtvRIXSz1nydhxYnOLVkCREB9dEMfI64yp6WIvtkO1N_50Ei3i0AOnGY1-783M2ye7Pngk5AeUM4BSHd3ez2esBDVjUnEuYYfsgRCyYKySu1PP6wJYU38l-yk9liU0tRB75LWld95Zhz29CQuqfU8XaIbo8oZex_Dikgve-Qd6GvUT_gvxL7Uh0nsXMes1nYcH77J7Qfpb9y7QS8wTk45pSxdZZ5eyM3pFbwYccLJpvV5tkku0Xa9j0ObPN_LF6lXC7-_1gNydntzOfxUXV2fn8_aiMExBLpZNBVaIZY1WWSntEkxZi0r1dQNCSQ7S8F400HMD49iaqkeQPeO20ZVolvyA_Nz6jmufB0y5ewxDHK9JHQMFTKimEiNVbykTQ0oRbWfc9EbwOWq36qDsprS7Me1uSrt7T3sUlv8J19E96bj5THK4lThE_MBlzSohK_4GqQ-Ncg |
CODEN | ITWCAX |
CitedBy_id | crossref_primary_10_1109_ACCESS_2020_3033321 crossref_primary_10_1109_TCOMM_2020_2980843 crossref_primary_10_1007_s10723_025_09797_3 crossref_primary_10_1109_TCCN_2020_2971703 crossref_primary_10_1007_s11276_021_02663_6 crossref_primary_10_1007_s11276_021_02666_3 crossref_primary_10_1109_COMST_2022_3191697 crossref_primary_10_1109_JSYST_2021_3099072 crossref_primary_10_3390_electronics8090995 crossref_primary_10_1109_TWC_2021_3094615 crossref_primary_10_1109_TWC_2023_3265458 crossref_primary_10_1109_ACCESS_2019_2940699 crossref_primary_10_1016_j_comcom_2023_12_017 |
Cites_doi | 10.1109/TCOMM.2017.2754483 10.1109/TVT.2016.2520983 10.1109/MCOM.2016.7537191 10.1109/TIT.2011.2174613 10.1109/9.284868 10.1109/TWC.2013.032513.121510 10.1109/TWC.2017.2712158 10.1109/TVT.2017.2749599 10.1002/j.1538-7305.1949.tb00928.x 10.1002/j.1538-7305.1975.tb02040.x 10.1109/TVT.2018.2790363 10.1109/TIT.2008.928990 10.1109/JSAC.2018.2825560 10.1109/JSEN.2017.2674181 10.1109/TVT.2015.2436334 10.1109/JSAC.2011.110210 10.1109/TIFS.2018.2825944 10.1109/JSAC.2018.2825140 10.1109/TVT.2017.2770175 10.1109/LSP.2012.2227727 10.1109/SURV.2014.012314.00178 10.1109/TIFS.2013.2261060 10.1109/ACCESS.2016.2517321 10.1109/TCOMM.2017.2715176 10.1109/18.641562 10.1109/TCCN.2016.2584080 10.1109/COMST.2016.2633387 10.1049/iet-com.2016.0039 10.1109/TWC.2010.06.090912 10.1109/JSAC.2004.839380 10.1109/WCNC.2017.7925502 10.1109/LWC.2014.2365808 10.1109/TVT.2016.2524258 10.1109/TWC.2015.2462816 10.1109/TVT.2014.2354076 10.1109/TSP.2015.2494852 10.1109/TWC.2016.2582483 10.1109/TSP.2017.2759082 10.1017/CBO9780511804441 10.1109/TWC.2013.010214.130797 10.1109/TVT.2014.2345588 10.1109/TWC.2016.2647252 10.1109/LWC.2017.2728528 10.1109/TWC.2008.060848 10.1109/TIFS.2017.2750106 10.1109/JSAC.2018.2804018 10.1109/TWC.2007.051075 10.1109/TCOMM.2014.021714.130140 10.1109/TCOMM.2016.2607746 10.1109/TCCN.2017.2748132 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TWC.2019.2893381 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2248 |
EndPage | 1565 |
ExternalDocumentID | 10_1109_TWC_2019_2893381 8624584 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61871314 funderid: 10.13039/501100001809 – fundername: Chinese Academy of Sciences grantid: 2015003 funderid: 10.13039/501100002367 – fundername: National Science and Technology Major Project grantid: 2018ZX03001003-004 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c291t-b741f55b6ef9f88fb1c06549d671598318c3d571d3c1549fc4de18d23f7a457b3 |
IEDL.DBID | RIE |
ISSN | 1536-1276 |
IngestDate | Fri Jul 25 12:21:42 EDT 2025 Tue Jul 01 04:13:24 EDT 2025 Thu Apr 24 23:03:58 EDT 2025 Wed Aug 27 02:51:28 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c291t-b741f55b6ef9f88fb1c06549d671598318c3d571d3c1549fc4de18d23f7a457b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-4593-2605 0000-0001-8971-5413 |
PQID | 2191259745 |
PQPubID | 105736 |
PageCount | 18 |
ParticipantIDs | ieee_primary_8624584 crossref_citationtrail_10_1109_TWC_2019_2893381 proquest_journals_2191259745 crossref_primary_10_1109_TWC_2019_2893381 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-March 2019-3-00 20190301 |
PublicationDateYYYYMMDD | 2019-03-01 |
PublicationDate_xml | – month: 03 year: 2019 text: 2019-March |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on wireless communications |
PublicationTitleAbbrev | TWC |
PublicationYear | 2019 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref57 ref13 ref56 ref12 ref15 ref14 ref55 ref11 ref54 ref10 ref17 ref16 ref19 ref18 tang (ref34) 2015 ref50 ref46 ref45 ref48 ref47 ref42 ref41 (ref53) 2015 ref44 ref43 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref35 ref37 ref36 tang (ref33) 2017 ref31 ref30 ref32 ref2 ref1 ref39 ref38 wu (ref51) 2003; 2 ref24 ref23 wang (ref49) 2018 ref26 ref25 ref20 ref22 ref28 stallings (ref21) 2006 ref27 ref29 (ref52) 2018 |
References_xml | – ident: ref12 doi: 10.1109/TCOMM.2017.2754483 – ident: ref48 doi: 10.1109/TVT.2016.2520983 – ident: ref30 doi: 10.1109/MCOM.2016.7537191 – ident: ref31 doi: 10.1109/TIT.2011.2174613 – ident: ref50 doi: 10.1109/9.284868 – ident: ref10 doi: 10.1109/TWC.2013.032513.121510 – ident: ref35 doi: 10.1109/TWC.2017.2712158 – ident: ref17 doi: 10.1109/TVT.2017.2749599 – ident: ref22 doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: ref23 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref9 doi: 10.1109/TVT.2018.2790363 – ident: ref37 doi: 10.1109/TIT.2008.928990 – ident: ref26 doi: 10.1109/JSAC.2018.2825560 – ident: ref15 doi: 10.1109/JSEN.2017.2674181 – ident: ref40 doi: 10.1109/TVT.2015.2436334 – ident: ref18 doi: 10.1109/JSAC.2011.110210 – start-page: 1 year: 2017 ident: ref33 article-title: Achieving unconditional security for MIMO-BAN under short blocklength wiretap code publication-title: Proc IEEE Veh Technol Conf (VTC)-Fall – ident: ref28 doi: 10.1109/TIFS.2018.2825944 – ident: ref29 doi: 10.1109/JSAC.2018.2825140 – ident: ref14 doi: 10.1109/TVT.2017.2770175 – ident: ref5 doi: 10.1109/LSP.2012.2227727 – ident: ref25 doi: 10.1109/SURV.2014.012314.00178 – ident: ref36 doi: 10.1109/TIFS.2013.2261060 – ident: ref45 doi: 10.1109/ACCESS.2016.2517321 – ident: ref38 doi: 10.1109/TCOMM.2017.2715176 – ident: ref56 doi: 10.1109/18.641562 – year: 2018 ident: ref52 publication-title: NR Base Station (BS) Radio Transmission and Reception Release 15 – ident: ref6 doi: 10.1109/TCCN.2016.2584080 – ident: ref24 doi: 10.1109/COMST.2016.2633387 – ident: ref32 doi: 10.1049/iet-com.2016.0039 – ident: ref13 doi: 10.1109/TWC.2010.06.090912 – start-page: 1 year: 2018 ident: ref49 article-title: QoS and security aware power allocation scheme for wiretap cognitive radio networks publication-title: Proc IEEE Veh Technol Conf (VTC)-Fall – ident: ref1 doi: 10.1109/JSAC.2004.839380 – ident: ref2 doi: 10.1109/WCNC.2017.7925502 – ident: ref43 doi: 10.1109/LWC.2014.2365808 – start-page: 105 year: 2015 ident: ref34 article-title: Combining MIMO beamforming with security codes to achieve unconditional communication security publication-title: Proc IEEE/CIC Int Conf Commun China (CIC/ICCC) – volume: 2 start-page: 630 year: 2003 ident: ref51 article-title: Effective capacity: A wireless link model for support of quality of service publication-title: IEEE Trans Wireless Commun – ident: ref46 doi: 10.1109/TVT.2016.2524258 – ident: ref3 doi: 10.1109/TWC.2015.2462816 – ident: ref7 doi: 10.1109/TVT.2014.2354076 – ident: ref20 doi: 10.1109/TSP.2015.2494852 – ident: ref44 doi: 10.1109/TWC.2016.2582483 – year: 2015 ident: ref53 publication-title: Cellular System Support for Ultra Low Complexity and Low Throughput Internet of Things – ident: ref47 doi: 10.1109/TSP.2017.2759082 – ident: ref55 doi: 10.1017/CBO9780511804441 – ident: ref4 doi: 10.1109/TWC.2013.010214.130797 – ident: ref19 doi: 10.1109/TVT.2014.2345588 – ident: ref8 doi: 10.1109/TWC.2016.2647252 – ident: ref42 doi: 10.1109/LWC.2017.2728528 – ident: ref27 doi: 10.1109/TWC.2008.060848 – ident: ref39 doi: 10.1109/TIFS.2017.2750106 – year: 2006 ident: ref21 publication-title: Cryptography and Network Security Principles and Practices – ident: ref11 doi: 10.1109/JSAC.2018.2804018 – ident: ref57 doi: 10.1109/TWC.2007.051075 – ident: ref16 doi: 10.1109/TCOMM.2014.021714.130140 – ident: ref54 doi: 10.1109/TCOMM.2016.2607746 – ident: ref41 doi: 10.1109/TCCN.2017.2748132 |
SSID | ssj0017655 |
Score | 2.402013 |
Snippet | Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS)... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1548 |
SubjectTerms | Bandwidths Cognitive radio Communication channels Convexity Cybersecurity Delays effective bandwidth effective capacity Equivalence Hulls Information security information security protection Interference Optimization power allocation Power management Provisioning QoS provisioning Quality of service Quality of service architectures Queues Queuing theory Radio broadcasting Radio networks Resource management Statistical analysis statistical queueing analysis Wireless communication Wireless networks Wiretapping |
Title | A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach |
URI | https://ieeexplore.ieee.org/document/8624584 https://www.proquest.com/docview/2191259745 |
Volume | 18 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JS8QwFH6oJz24i-NGDl4EOzNpm7TxNgwOIiiu6K1kBVFmBqe9ePKnm9cNN8RbD2kIvCTvS_K97wM4DFFVzDITYK4M4kTHgTQuCkw_VEyqSKYJ1g5fXPKz-_j8kT3OwXFbC2OtLclntouf5Vu-megCr8p6WMzgE-Y8zPuDW1Wr1b4YJLx0OPULGH1lkvZJsi96dw9D5HCJboje8in9koJKT5UfG3GZXUYrcNGMqyKVPHeLXHX12zfJxv8OfBWWa5hJBtW8WIM5O16HpU_igxvwPiAecDoPQcn15JbIsSG3tZkducKLhll1VUtGDX-LeIBLkC6byykZNrwjciPN04RcVnzy2QkZEESwpQC0H8J1YQuL3TTyJ2RQy5hvwv3o9G54FtR-DIEOBc0D5dGHY0xx64RLU6eoxtJUYXjiA5363UFHhiXURBqF35yOjaWpCSOXyJglKtqChfFkbLeBcMOli4WkqbOxFUxKylWkueChSynVHeg1Icp0LVaOnhkvWXlo6YvMBzXDoGZ1UDtw1P4xrYQ6_mi7gTFq29Xh6cBeMwuyeiXPMr-jewzoT11s5_e_dmER-654aXuwkL8Wdt8DlVwdlDP0Az_z5Xs |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LTtwwFL2isKBdlFdRpwXqBRskMjNOYidmNxp1NBRmxGNQ2UV-SohqBnWSTVf99PrmpfIQYpeFk1i6tu-xfe45AIchqopZZgLMlUGc6DiQxkWB6YeKSRXJNMHa4cmUj2_iH7fsdgWO21oYa21JPrNdfCzv8s1CF3hU1sNiBp8w38Gaz_uMVtVa7Z1BwkuPUz-F0VkmaS8l-6I3-zlEFpfohugun9JHSah0VXm2FJf5ZbQBk6ZnFa3kvlvkqqv_PBFtfGvXN-FjDTTJoBoZW7Bi59vw4T_5wR34OyAecjoPQsnl4prIuSHXtZ0ducCjhmV1WEtGDYOLeIhLkDCbywcybJhH5EqauwWZVozy5QkZEMSwpQS078JlYQuLn2kEUMigFjL_BDej77PhOKgdGQIdCpoHyuMPx5ji1gmXpk5RjcWpwvDEhzr164OODEuoiTRKvzkdG0tTE0YukTFLVLQLq_PF3H4Gwg2XLhaSps7GVjApKVeR5oKHLqVUd6DXhCjTtVw5umb8ysptS19kPqgZBjWrg9qBo_aNh0qq45W2Oxijtl0dng7sNaMgq-fyMvNrukeBft_Fvrz81jdYH88m59n56fTsK7zH_1QstT1YzX8Xdt_DllwdlKP1H1256MQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Unified+QoS+and+Security+Provisioning+Framework+for+Wiretap+Cognitive+Radio+Networks%3A+A+Statistical+Queueing+Analysis+Approach&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Wang%2C+Yichen&rft.au=Tang%2C+Xiao&rft.au=Wang%2C+Tao&rft.date=2019-03-01&rft.issn=1536-1276&rft.eissn=1558-2248&rft.volume=18&rft.issue=3&rft.spage=1548&rft.epage=1565&rft_id=info:doi/10.1109%2FTWC.2019.2893381&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TWC_2019_2893381 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon |