Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks
In wireless-powered cognitive radio networks, secure information transmission is of paramount importance for the primary system. This letter considers cooperation between a primary system and a wireless-powered secondary system. In particular, we focus on secure information transmission for the prim...
Gespeichert in:
Veröffentlicht in: | IEEE communications letters 2016-03, Vol.20 (3), p.522-525 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 525 |
---|---|
container_issue | 3 |
container_start_page | 522 |
container_title | IEEE communications letters |
container_volume | 20 |
creator | Li Jiang Hui Tian Cheng Qin Gjessing, Stein Yan Zhang |
description | In wireless-powered cognitive radio networks, secure information transmission is of paramount importance for the primary system. This letter considers cooperation between a primary system and a wireless-powered secondary system. In particular, we focus on secure information transmission for the primary system when the secondary users (SUs) are the potential eavesdroppers. We aim to jointly design power splitting and secure beamforming to maximize the secondary system data rate subject to the secrecy QoS requirement of the primary system and the secondary transmitter (ST) power constraint. To solve this nonconvex problem, we propose a two-stage optimization approach. Simulation results demonstrate that our proposed scheme achieves a significant transmission rate of the secondary system while provides a high secrecy rate for the primary system compared to the scheme without energy harvesting. |
doi_str_mv | 10.1109/LCOMM.2016.2514353 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_LCOMM_2016_2514353</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7370884</ieee_id><sourcerecordid>4045666521</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-5926fc3621af70f2079487f6fac7d3a2e249e87044bcca867482e8dc77889de63</originalsourceid><addsrcrecordid>eNo9kMtOwzAQRS0EEqXwA7CJxDrFdhw_lhBRQLQU8RBLyyTjyqWNi51S8fe4D7GZOYt7Z6SD0DnBA0KwuhpVk_F4QDHhA1oSVpTFAeqRspQ5TeMwMZYqF0LJY3QS4wxjLFOwhx5foV4FyG7ALKwPC9dOM9dmHy7AHGLMn_0aAjRZ5f0SguncDySetm5LL6ZxPnuCbu3DVzxFR9bMI5ztdx-9D2_fqvt8NLl7qK5HeV1w0uWlotwmpMRYgS3FQjEpLLemFk1hKFCmQArM2GddG8kFkxRkUwshpWqAF310ubu7DP57BbHTM78KbXqpiZBcMUK4TCm6S9XBxxjA6mVwCxN-NcF6I01vpemNNL2XlkoXu5IDgP-CKASWkhV_raxoRg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1786941168</pqid></control><display><type>article</type><title>Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks</title><source>IEEE Electronic Library Online</source><creator>Li Jiang ; Hui Tian ; Cheng Qin ; Gjessing, Stein ; Yan Zhang</creator><creatorcontrib>Li Jiang ; Hui Tian ; Cheng Qin ; Gjessing, Stein ; Yan Zhang</creatorcontrib><description>In wireless-powered cognitive radio networks, secure information transmission is of paramount importance for the primary system. This letter considers cooperation between a primary system and a wireless-powered secondary system. In particular, we focus on secure information transmission for the primary system when the secondary users (SUs) are the potential eavesdroppers. We aim to jointly design power splitting and secure beamforming to maximize the secondary system data rate subject to the secrecy QoS requirement of the primary system and the secondary transmitter (ST) power constraint. To solve this nonconvex problem, we propose a two-stage optimization approach. Simulation results demonstrate that our proposed scheme achieves a significant transmission rate of the secondary system while provides a high secrecy rate for the primary system compared to the scheme without energy harvesting.</description><identifier>ISSN: 1089-7798</identifier><identifier>EISSN: 1558-2558</identifier><identifier>DOI: 10.1109/LCOMM.2016.2514353</identifier><identifier>CODEN: ICLEF6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Array signal processing ; Cognitive radio ; Cognitive radio networks ; Energy harvesting ; Optimization ; physical layer security ; power splitting ; Receivers ; Relays ; secure beamforming ; Security</subject><ispartof>IEEE communications letters, 2016-03, Vol.20 (3), p.522-525</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-5926fc3621af70f2079487f6fac7d3a2e249e87044bcca867482e8dc77889de63</citedby><cites>FETCH-LOGICAL-c361t-5926fc3621af70f2079487f6fac7d3a2e249e87044bcca867482e8dc77889de63</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7370884$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7370884$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Li Jiang</creatorcontrib><creatorcontrib>Hui Tian</creatorcontrib><creatorcontrib>Cheng Qin</creatorcontrib><creatorcontrib>Gjessing, Stein</creatorcontrib><creatorcontrib>Yan Zhang</creatorcontrib><title>Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks</title><title>IEEE communications letters</title><addtitle>COML</addtitle><description>In wireless-powered cognitive radio networks, secure information transmission is of paramount importance for the primary system. This letter considers cooperation between a primary system and a wireless-powered secondary system. In particular, we focus on secure information transmission for the primary system when the secondary users (SUs) are the potential eavesdroppers. We aim to jointly design power splitting and secure beamforming to maximize the secondary system data rate subject to the secrecy QoS requirement of the primary system and the secondary transmitter (ST) power constraint. To solve this nonconvex problem, we propose a two-stage optimization approach. Simulation results demonstrate that our proposed scheme achieves a significant transmission rate of the secondary system while provides a high secrecy rate for the primary system compared to the scheme without energy harvesting.</description><subject>Array signal processing</subject><subject>Cognitive radio</subject><subject>Cognitive radio networks</subject><subject>Energy harvesting</subject><subject>Optimization</subject><subject>physical layer security</subject><subject>power splitting</subject><subject>Receivers</subject><subject>Relays</subject><subject>secure beamforming</subject><subject>Security</subject><issn>1089-7798</issn><issn>1558-2558</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMtOwzAQRS0EEqXwA7CJxDrFdhw_lhBRQLQU8RBLyyTjyqWNi51S8fe4D7GZOYt7Z6SD0DnBA0KwuhpVk_F4QDHhA1oSVpTFAeqRspQ5TeMwMZYqF0LJY3QS4wxjLFOwhx5foV4FyG7ALKwPC9dOM9dmHy7AHGLMn_0aAjRZ5f0SguncDySetm5LL6ZxPnuCbu3DVzxFR9bMI5ztdx-9D2_fqvt8NLl7qK5HeV1w0uWlotwmpMRYgS3FQjEpLLemFk1hKFCmQArM2GddG8kFkxRkUwshpWqAF310ubu7DP57BbHTM78KbXqpiZBcMUK4TCm6S9XBxxjA6mVwCxN-NcF6I01vpemNNL2XlkoXu5IDgP-CKASWkhV_raxoRg</recordid><startdate>201603</startdate><enddate>201603</enddate><creator>Li Jiang</creator><creator>Hui Tian</creator><creator>Cheng Qin</creator><creator>Gjessing, Stein</creator><creator>Yan Zhang</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope></search><sort><creationdate>201603</creationdate><title>Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks</title><author>Li Jiang ; Hui Tian ; Cheng Qin ; Gjessing, Stein ; Yan Zhang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-5926fc3621af70f2079487f6fac7d3a2e249e87044bcca867482e8dc77889de63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Array signal processing</topic><topic>Cognitive radio</topic><topic>Cognitive radio networks</topic><topic>Energy harvesting</topic><topic>Optimization</topic><topic>physical layer security</topic><topic>power splitting</topic><topic>Receivers</topic><topic>Relays</topic><topic>secure beamforming</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li Jiang</creatorcontrib><creatorcontrib>Hui Tian</creatorcontrib><creatorcontrib>Cheng Qin</creatorcontrib><creatorcontrib>Gjessing, Stein</creatorcontrib><creatorcontrib>Yan Zhang</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library Online</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE communications letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Li Jiang</au><au>Hui Tian</au><au>Cheng Qin</au><au>Gjessing, Stein</au><au>Yan Zhang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks</atitle><jtitle>IEEE communications letters</jtitle><stitle>COML</stitle><date>2016-03</date><risdate>2016</risdate><volume>20</volume><issue>3</issue><spage>522</spage><epage>525</epage><pages>522-525</pages><issn>1089-7798</issn><eissn>1558-2558</eissn><coden>ICLEF6</coden><abstract>In wireless-powered cognitive radio networks, secure information transmission is of paramount importance for the primary system. This letter considers cooperation between a primary system and a wireless-powered secondary system. In particular, we focus on secure information transmission for the primary system when the secondary users (SUs) are the potential eavesdroppers. We aim to jointly design power splitting and secure beamforming to maximize the secondary system data rate subject to the secrecy QoS requirement of the primary system and the secondary transmitter (ST) power constraint. To solve this nonconvex problem, we propose a two-stage optimization approach. Simulation results demonstrate that our proposed scheme achieves a significant transmission rate of the secondary system while provides a high secrecy rate for the primary system compared to the scheme without energy harvesting.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/LCOMM.2016.2514353</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1089-7798 |
ispartof | IEEE communications letters, 2016-03, Vol.20 (3), p.522-525 |
issn | 1089-7798 1558-2558 |
language | eng |
recordid | cdi_crossref_primary_10_1109_LCOMM_2016_2514353 |
source | IEEE Electronic Library Online |
subjects | Array signal processing Cognitive radio Cognitive radio networks Energy harvesting Optimization physical layer security power splitting Receivers Relays secure beamforming Security |
title | Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T01%3A05%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Beamforming%20in%20Wireless-Powered%20Cooperative%20Cognitive%20Radio%20Networks&rft.jtitle=IEEE%20communications%20letters&rft.au=Li%20Jiang&rft.date=2016-03&rft.volume=20&rft.issue=3&rft.spage=522&rft.epage=525&rft.pages=522-525&rft.issn=1089-7798&rft.eissn=1558-2558&rft.coden=ICLEF6&rft_id=info:doi/10.1109/LCOMM.2016.2514353&rft_dat=%3Cproquest_RIE%3E4045666521%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1786941168&rft_id=info:pmid/&rft_ieee_id=7370884&rfr_iscdi=true |