Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers
In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. F...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2016-02, Vol.11 (2), p.373-387 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 387 |
---|---|
container_issue | 2 |
container_start_page | 373 |
container_title | IEEE transactions on information forensics and security |
container_volume | 11 |
creator | Xu, Xiaoming He, Biao Yang, Weiwei Zhou, Xiangyun Cai, Yueming |
description | In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols. |
doi_str_mv | 10.1109/TIFS.2015.2500178 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1749032831</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7328286</ieee_id><sourcerecordid>1778029814</sourcerecordid><originalsourceid>FETCH-LOGICAL-c369t-544b22300b2fd21194cf350f464f4c9360c9eb1914d68f247a725d733882dbef3</originalsourceid><addsrcrecordid>eNpdkD1PwzAQhiMEEqXwAxCLJRaWFJ_tOM6ISguVKkC0iI0oH-fi0sbFTor49yRq1YHpbnieV3dvEFwCHQDQ5HY-Gc8GjEI0YBGlEKujoAdRJENJGRwfduCnwZn3S0qFAKl6wccMi8Yhmbus8mvjvbEVuUdvFhXR1pGhXVSmNlskr1lpLHnC-se6L0_eTf1JXmxrdILxtTN5U2NJRtkWfensZoPOnwcnOlt5vNjPfvA2Hs2Hj-H0-WEyvJuGBZdJHUZC5IxxSnOmSwaQiELziGohhRZFwiUtEswhAVFKpZmIs5hFZcy5UqzMUfN-cLPL3Tj73aCv0_aXAlerrELb-BTiWFGWKBAtev0PXdrGVe11LSUSypni0FKwowpnvXeo040z68z9pkDTrvG0azztGk_3jbfO1c4xiHjg4zaQKcn_AH0kfEo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1749032831</pqid></control><display><type>article</type><title>Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers</title><source>IEEE Electronic Library (IEL)</source><creator>Xu, Xiaoming ; He, Biao ; Yang, Weiwei ; Zhou, Xiangyun ; Cai, Yueming</creator><creatorcontrib>Xu, Xiaoming ; He, Biao ; Yang, Weiwei ; Zhou, Xiangyun ; Cai, Yueming</creatorcontrib><description>In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2015.2500178</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Cognitive radio ; cognitive radio networks ; Computer information security ; Design engineering ; Fading ; Measurement ; Networks ; on-off transmission ; Optimization ; Physical layer security ; Protocol (computers) ; Protocols ; Reliability ; Secrecy aspects ; secrecy guard zone ; Security ; Throughput ; Wireless networks</subject><ispartof>IEEE transactions on information forensics and security, 2016-02, Vol.11 (2), p.373-387</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Feb 2016</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c369t-544b22300b2fd21194cf350f464f4c9360c9eb1914d68f247a725d733882dbef3</citedby><cites>FETCH-LOGICAL-c369t-544b22300b2fd21194cf350f464f4c9360c9eb1914d68f247a725d733882dbef3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7328286$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,782,786,798,27931,27932,54765</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7328286$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xu, Xiaoming</creatorcontrib><creatorcontrib>He, Biao</creatorcontrib><creatorcontrib>Yang, Weiwei</creatorcontrib><creatorcontrib>Zhou, Xiangyun</creatorcontrib><creatorcontrib>Cai, Yueming</creatorcontrib><title>Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.</description><subject>Cognitive radio</subject><subject>cognitive radio networks</subject><subject>Computer information security</subject><subject>Design engineering</subject><subject>Fading</subject><subject>Measurement</subject><subject>Networks</subject><subject>on-off transmission</subject><subject>Optimization</subject><subject>Physical layer security</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>Reliability</subject><subject>Secrecy aspects</subject><subject>secrecy guard zone</subject><subject>Security</subject><subject>Throughput</subject><subject>Wireless networks</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkD1PwzAQhiMEEqXwAxCLJRaWFJ_tOM6ISguVKkC0iI0oH-fi0sbFTor49yRq1YHpbnieV3dvEFwCHQDQ5HY-Gc8GjEI0YBGlEKujoAdRJENJGRwfduCnwZn3S0qFAKl6wccMi8Yhmbus8mvjvbEVuUdvFhXR1pGhXVSmNlskr1lpLHnC-se6L0_eTf1JXmxrdILxtTN5U2NJRtkWfensZoPOnwcnOlt5vNjPfvA2Hs2Hj-H0-WEyvJuGBZdJHUZC5IxxSnOmSwaQiELziGohhRZFwiUtEswhAVFKpZmIs5hFZcy5UqzMUfN-cLPL3Tj73aCv0_aXAlerrELb-BTiWFGWKBAtev0PXdrGVe11LSUSypni0FKwowpnvXeo040z68z9pkDTrvG0azztGk_3jbfO1c4xiHjg4zaQKcn_AH0kfEo</recordid><startdate>201602</startdate><enddate>201602</enddate><creator>Xu, Xiaoming</creator><creator>He, Biao</creator><creator>Yang, Weiwei</creator><creator>Zhou, Xiangyun</creator><creator>Cai, Yueming</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>201602</creationdate><title>Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers</title><author>Xu, Xiaoming ; He, Biao ; Yang, Weiwei ; Zhou, Xiangyun ; Cai, Yueming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c369t-544b22300b2fd21194cf350f464f4c9360c9eb1914d68f247a725d733882dbef3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Cognitive radio</topic><topic>cognitive radio networks</topic><topic>Computer information security</topic><topic>Design engineering</topic><topic>Fading</topic><topic>Measurement</topic><topic>Networks</topic><topic>on-off transmission</topic><topic>Optimization</topic><topic>Physical layer security</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>Reliability</topic><topic>Secrecy aspects</topic><topic>secrecy guard zone</topic><topic>Security</topic><topic>Throughput</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Xiaoming</creatorcontrib><creatorcontrib>He, Biao</creatorcontrib><creatorcontrib>Yang, Weiwei</creatorcontrib><creatorcontrib>Zhou, Xiangyun</creatorcontrib><creatorcontrib>Cai, Yueming</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xu, Xiaoming</au><au>He, Biao</au><au>Yang, Weiwei</au><au>Zhou, Xiangyun</au><au>Cai, Yueming</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2016-02</date><risdate>2016</risdate><volume>11</volume><issue>2</issue><spage>373</spage><epage>387</epage><pages>373-387</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2015.2500178</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2016-02, Vol.11 (2), p.373-387 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_journals_1749032831 |
source | IEEE Electronic Library (IEL) |
subjects | Cognitive radio cognitive radio networks Computer information security Design engineering Fading Measurement Networks on-off transmission Optimization Physical layer security Protocol (computers) Protocols Reliability Secrecy aspects secrecy guard zone Security Throughput Wireless networks |
title | Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-04T00%3A46%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Transmission%20Design%20for%20Cognitive%20Radio%20Networks%20With%20Poisson%20Distributed%20Eavesdroppers&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Xu,%20Xiaoming&rft.date=2016-02&rft.volume=11&rft.issue=2&rft.spage=373&rft.epage=387&rft.pages=373-387&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2015.2500178&rft_dat=%3Cproquest_RIE%3E1778029814%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1749032831&rft_id=info:pmid/&rft_ieee_id=7328286&rfr_iscdi=true |