Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks

作者: Truong Xuan Quach , Hung Tran , Elisabeth Uhlemann , George Kaddoum , Quang Anh Tran

DOI: 10.1007/S11276-017-1605-Z

关键词:

摘要: This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output model where secondary user (SU) faces an eavesdropping attack while being subject to normal interference constraint imposed by primary (PU). Thus, SU must have suitable power allocation policy which does not only satisfy constraints PU but also security such that it obtains reasonable performance SU, without exposing information eavesdropper. We derive four policies different scenarios corresponding whether or channel state eavesdropper are available at SU. Further, introduce concept communication probability (SRCP) as metric evaluate considered system, well efficiency policies. Finally, present numerical examples illustrate polices, impact these on SRCP

参考文章(48)
Tran Trung Duy, Tu Lam Thanh, Vo Nguyen Quoc Bao, Trung Q. Duong, Secrecy performance analysis with relay selection methods under impact of co-channel interference IET Communications. ,vol. 9, pp. 1427- 1435 ,(2015) , 10.1049/IET-COM.2014.1128
Hung Tran, Performance Analysis of Cognitive Radio Networks with Interference Constraints Blekinge Institute of Technology. ,(2013)
Dac-Binh Ha, Tung Thanh Vu, Tran Trung Duy, Vo Nguyen Quoc Bao, Secure Cognitive Reactive Decode-and-Forward Relay Networks: With and Without Eavesdropper Wireless Personal Communications. ,vol. 85, pp. 2619- 2641 ,(2015) , 10.1007/S11277-015-2924-Y
Stefania Sesia, Issam Toufik, Matthew Baker, None, LTE - The UMTS Long Term Evolution: From Theory to Practice ,(2011)
Frederic Gabry, Alessio Zappone, Ragnar Thobaben, Eduard A. Jorswieck, Mikael Skoglund, Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints IEEE Wireless Communications Letters. ,vol. 4, pp. 437- 440 ,(2015) , 10.1109/LWC.2015.2432802
Ahmed Abdelhadi, Haya Shajaiah, Charles Clancy, A Multitier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions IEEE Transactions on Cognitive Communications and Networking. ,vol. 1, pp. 217- 229 ,(2015) , 10.1109/TCCN.2015.2488618
Hung Tran, Maarig Aregawi Hagos, Marshed Mohamed, Hans-Jurgen Zepernick, Impact of primary networks on the performance of secondary networks international conference on computing management and telecommunications. pp. 43- 48 ,(2013) , 10.1109/COMMANTEL.2013.6482363
Yasir Saleem, Mubashir Husain Rehmani, None, Primary radio user activity models for cognitive radio networks: A survey Journal of Network and Computer Applications. ,vol. 43, pp. 1- 16 ,(2014) , 10.1016/J.JNCA.2014.04.001
Behnam Bahrak, Sudeep Bhattarai, Abid Ullah, Jung-Min Jerry Park, Jeffery Reed, David Gurney, Protecting the primary users' operational privacy in spectrum sharing ieee international symposium on dynamic spectrum access networks. pp. 236- 247 ,(2014) , 10.1109/DYSPAN.2014.6817800
Louis Sibomana, Hans-Jurgen Zepernick, Hung Tran, On physical layer security for reactive DF cognitive relay networks 2014 IEEE Globecom Workshops (GC Wkshps). pp. 1290- 1295 ,(2014) , 10.1109/GLOCOMW.2014.7063611