Secure Transmission of Underlay Cognitive Radio with Passive Eavesdropping
نویسندگان
چکیده
The security in cognitive radio networks (CRNs) has attracted recently a significant attention due to the open environment of the spectrum sharing networks, which make them more vulnerable to wireless attacks. In this paper, we consider the problem of physical layer security in CRNs. Our objective is to enhance the secrecy performance of the secondary user (SU) in the presence of passive eavesdropper, whose channel state information (CSI) is unknown at the transmitter side. Two beamforming techniques are proposed; transmit beamforming (BF) and beamforming with jamming (BFJ). We investigate the impact of using artificial jamming (AJ) signal in improving the secrecy performance of the SU in underlay CRNs, where the AJ noise signal is used to confuse the eavesdropper’s channel. Two power constraints are considered in the system; transmit power constraint and the interference power threshold at the primary user (PU). The performance of the proposed techniques is analyzed in terms of the achievable secrecy rate and the secrecy outage probability.
منابع مشابه
Secure Switch-and-Stay Combining with Multiple Antennas in Cognitive Radio Relay Networks
Eavesdropping is a major concern in Cognitive Radio relay systems, due to the broadcast nature of these systems. Physical Layer Security (PLS) has been seen as a good alternative to enhance the secrecy performance of these networks. Based on the concept of perfect secrecy, PLS uses an information-theoretic approach to prevent secondary transmissions from malicious attacks. In this paper, the Se...
متن کاملArtificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination
In this paper, a secure communication model for cognitive multi-user massive multiple-input multiple-output (MIMO) systems with underlay spectrum sharing is investigated. A secondary (cognitive) multi-user massive MIMO system is operated by using underlay spectrum sharing within a primary (licensed) multi-user massive MIMO system. A passive multi-antenna eavesdropper is assumed to be eavesdropp...
متن کاملTurning foes to allies in cognitive radio networks
We study a class of problems in Cognitive Radio Networks where multiple half-duplex unlicensed (secondary) users can eavesdrop and jam the communications of licensed (primary) users unless granted access to communicate over the same spectrum band. The problem is to characterize the optimal rule for the primary system that grants spectrum access to selected secondary users and the optimal resour...
متن کاملFast and Distributed Power Control Algorithm in Underlay Cognitive Radio Networks
—The power allocation in an underlay cognitive radio network rises up several challenges due to rapid utilization of the available spectrum hole. In this paper, we propose a noncooperative power-game algorithm to solve the power allocation problem in an underlay cognitive radio network with two main objectives: (i) to provide good quality of service to cognitive radio nodes, and (ii) to protec...
متن کاملMulti-antenna transmission for underlay and overlay cognitive radio with explicit message-learning phase
We consider the coexistence of a multiple-input multiple-output secondary system with a multiple-input single-output primary link with different degrees of coordination between the systems. First, for the uncoordinated underlay cognitive radio scenario, we fully characterize the optimal parameters that maximize the secondary rate subject to a primary rate constraint for a transmission strategy ...
متن کامل