Spectrum sharing with secure transmission
نویسندگان
چکیده
In this paper, we propose a cooperative scheme between primary and secondary networks. In this scheme, a secondary user (SU) accepts a lease of a part of the licensed band according to a cooperative request of a primary user (PU). Hence, the SU helps the PU in transmitting primary signals and has an opportunity to access the frequency spectrum. On the other hand, the SU owns important data and may mistrust the intention of a primary transmitter. Physical layer security is applied to evaluate the cooperative efficiency in terms of the data transmission and data security. The numerical and simulative results show that the system performance of the primary network in the cooperative scheme is improved in terms of the outage probability and the symbol error rate and is compared with that in the direct transmission scheme. In addition, the secure performance of the secondary network, as expressed by the outage secrecy probability and the average secrecy capacity, is maintained under the eavesdropping of the primary transmitter.
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملSimple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
Patra et al. [25] gave a necessary and sufficient condition for the possibility of almost perfectly secure message transmission protocols tolerating general, non-threshold Q adversary structure. However, their protocol requires at least three rounds and performs exponential (exponential in the size of the adversary structure) computation and communication. Moreover, they have left it as an open...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملSecure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem ha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Wireless Comm. and Networking
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014