首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Cognitive radio network with secrecy and interference constraints
Institution:1. School of Innovation, Design and Engineering, Malardalen University, Sweden;2. University of Québec, ETS Engineering School, LACIME Laboratory, Montreal, Canada;3. School of Computing, Blekinge Institute of Technology, Karlskrona, Sweden;1. University of Tunis El Manar, National Engineering School of Tunis, Communications Systems Laboratory, 1002 Tunis, Tunisia;2. IMT Atlantique, IRISA, 2 Rue de la Chataigneraie, 35576 Cesson Sévigné, France;3. University of Rennes 1, IRISA, Campus de Beaulieu, 35042 Rennes, France;4. Sorbonne Universités, UPMC Univ Paris 06, UMR 7606, CNRS, LIP6, F-75005, Paris, France;1. Department of Electronics and Communications Engineering, Tampere University of Technology, Tampere, Finland;2. Centre for Wireless Communications, University of Oulu, Finland
Abstract:In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU communication from the interference of the SU and the risks of eavesdropping, the SU must have a reasonable adaptive transmission power which is set on the basis of channel state information, interference and security constraints of the PU. Accordingly, an upper bound and lower bound for the SU transmission power are derived. Furthermore, a power allocation policy, which is calculated on the convex combination of the upper and lower bound of the SU transmission power, is proposed. On this basis, we investigate the impact of the PU transmission power and channel mean gains on the security and system performance of the SU. Closed-form expressions for the outage probability, probability of non-zero secrecy capacity, and secrecy outage probability are obtained. Interestingly, our results show that the strong channel mean gain of the PU transmitter to the PU’s eavesdropper in the primary network can enhance the SU performance.
Keywords:Cognitive radio networks  Physical layer security  Power allocation  Security constraint
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号