Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users

In this paper, we introduce a new cooperative paradigm for secure communication in cognitive radio networks (CRNs) where secondary users (SUs) are allowed to access the spectrum of primary users (PUs) as long as they preserve the secure communication of PUs in the presence of malicious eavesdroppers...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 13; no. 2; pp. 1058 - 1073
Main Authors Mokari, Nader, Parsaeefard, Saeedeh, Saeedi, Hamid, Azmi, Paeiz
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.02.2014
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In this paper, we introduce a new cooperative paradigm for secure communication in cognitive radio networks (CRNs) where secondary users (SUs) are allowed to access the spectrum of primary users (PUs) as long as they preserve the secure communication of PUs in the presence of malicious eavesdroppers. To do so, the SU transmission is divided into two hops: at first hop, the SU transmitter sends the information to a relay set and the SU receiver acts as a friendly jammer to disturb the overhearing of eavesdroppers and at the second hop, one of the relays is selected to pass the information to the SU receiver and the SU transmitter acts as a friendly jammer for the PU. In this new setup, the time duration for each hop, the power transmissions of all nodes in CRN, and relay selection at the second hop are allocated in such a way that the secrecy rate of the SU is maximized subject to the minimum required PU's secrecy rate. From primary service perspective, this transforms the possibly disturbing secondary service activities into a beneficial network element. We investigate instantaneous and ergodic resource allocation problems for perfect and imperfect channel state information (CSI). Since these problems are non-convex, we propose a solution based on decomposition of main optimization problem into three subproblems related to the power allocation, time allocation, and relay selection. We show that the power allocation problem can be transformed into a generalized geometric programming (GGP) model via the so-called scaled algorithm and it can be solved very efficiently. Simulation results indicate that in terms of the secondary secrecy rate, the proposed setup outperforms the conventional setup in which the secrecy rate of the PU is not guaranteed.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
ISSN:1536-1276
1558-2248
DOI:10.1109/TWC.2013.010214.130929