Secure Cognitive MIMO Wiretap Networks With Different Antenna Transmission Schemes

This paper investigates a secure transmission in the multiple-input multiple-output (MIMO) cognitive wiretap networks, where a secondary transmitter (Alice) sends data to a secondary receiver (Bob) in the presence of an eavesdropper (Eve). In order to solve the problems of inter channel interference...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 9; pp. 5779 - 5790
Main Authors Chen, Yong, Zhang, Tao, Qiao, Xiaoqiang, Wu, Hao, Zhang, Jiang
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper investigates a secure transmission in the multiple-input multiple-output (MIMO) cognitive wiretap networks, where a secondary transmitter (Alice) sends data to a secondary receiver (Bob) in the presence of an eavesdropper (Eve). In order to solve the problems of inter channel interference and inter antenna synchronization encountered by traditional MIMO technologies, the antenna transmission scheme is adopted at the transmitter. As a comparison, we design two different antenna transmission schemes, namely transmit antenna selection maximal-ratio combining (TAS-MRC) scheme and differential spatial modulation maximal-ratio combining (DSM-MRC) scheme, respectively. Moreover, due to outdated channel state information (CSI) of the interference link from Alice to the primary user (PU), we propose power control mechanism to protect the quality of service (QoS) of PU. Furthermore, the closed-form for the secrecy outage probability and the secrecy throughput with TAS-MRC and DSM-MRC schemes are derived to evaluate the secrecy performance, respectively. What's more, we explore the security diversity gain and coding gain based on the asymptotic secrecy outage probability. As the results, it demonstrates that DSM-MRC requires less CSI and is convenient for modulation and demodulation, but sacrifices some secrecy performance gains between two proposed schemes.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2020.3048158