Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers

In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. F...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2016-02, Vol.11 (2), p.373-387
Hauptverfasser: Xu, Xiaoming, He, Biao, Yang, Weiwei, Zhou, Xiangyun, Cai, Yueming
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 387
container_issue 2
container_start_page 373
container_title IEEE transactions on information forensics and security
container_volume 11
creator Xu, Xiaoming
He, Biao
Yang, Weiwei
Zhou, Xiangyun
Cai, Yueming
description In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.
doi_str_mv 10.1109/TIFS.2015.2500178
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1749032831</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7328286</ieee_id><sourcerecordid>1778029814</sourcerecordid><originalsourceid>FETCH-LOGICAL-c369t-544b22300b2fd21194cf350f464f4c9360c9eb1914d68f247a725d733882dbef3</originalsourceid><addsrcrecordid>eNpdkD1PwzAQhiMEEqXwAxCLJRaWFJ_tOM6ISguVKkC0iI0oH-fi0sbFTor49yRq1YHpbnieV3dvEFwCHQDQ5HY-Gc8GjEI0YBGlEKujoAdRJENJGRwfduCnwZn3S0qFAKl6wccMi8Yhmbus8mvjvbEVuUdvFhXR1pGhXVSmNlskr1lpLHnC-se6L0_eTf1JXmxrdILxtTN5U2NJRtkWfensZoPOnwcnOlt5vNjPfvA2Hs2Hj-H0-WEyvJuGBZdJHUZC5IxxSnOmSwaQiELziGohhRZFwiUtEswhAVFKpZmIs5hFZcy5UqzMUfN-cLPL3Tj73aCv0_aXAlerrELb-BTiWFGWKBAtev0PXdrGVe11LSUSypni0FKwowpnvXeo040z68z9pkDTrvG0azztGk_3jbfO1c4xiHjg4zaQKcn_AH0kfEo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1749032831</pqid></control><display><type>article</type><title>Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers</title><source>IEEE Electronic Library (IEL)</source><creator>Xu, Xiaoming ; He, Biao ; Yang, Weiwei ; Zhou, Xiangyun ; Cai, Yueming</creator><creatorcontrib>Xu, Xiaoming ; He, Biao ; Yang, Weiwei ; Zhou, Xiangyun ; Cai, Yueming</creatorcontrib><description>In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2015.2500178</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Cognitive radio ; cognitive radio networks ; Computer information security ; Design engineering ; Fading ; Measurement ; Networks ; on-off transmission ; Optimization ; Physical layer security ; Protocol (computers) ; Protocols ; Reliability ; Secrecy aspects ; secrecy guard zone ; Security ; Throughput ; Wireless networks</subject><ispartof>IEEE transactions on information forensics and security, 2016-02, Vol.11 (2), p.373-387</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Feb 2016</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c369t-544b22300b2fd21194cf350f464f4c9360c9eb1914d68f247a725d733882dbef3</citedby><cites>FETCH-LOGICAL-c369t-544b22300b2fd21194cf350f464f4c9360c9eb1914d68f247a725d733882dbef3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7328286$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,782,786,798,27931,27932,54765</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7328286$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xu, Xiaoming</creatorcontrib><creatorcontrib>He, Biao</creatorcontrib><creatorcontrib>Yang, Weiwei</creatorcontrib><creatorcontrib>Zhou, Xiangyun</creatorcontrib><creatorcontrib>Cai, Yueming</creatorcontrib><title>Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.</description><subject>Cognitive radio</subject><subject>cognitive radio networks</subject><subject>Computer information security</subject><subject>Design engineering</subject><subject>Fading</subject><subject>Measurement</subject><subject>Networks</subject><subject>on-off transmission</subject><subject>Optimization</subject><subject>Physical layer security</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>Reliability</subject><subject>Secrecy aspects</subject><subject>secrecy guard zone</subject><subject>Security</subject><subject>Throughput</subject><subject>Wireless networks</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkD1PwzAQhiMEEqXwAxCLJRaWFJ_tOM6ISguVKkC0iI0oH-fi0sbFTor49yRq1YHpbnieV3dvEFwCHQDQ5HY-Gc8GjEI0YBGlEKujoAdRJENJGRwfduCnwZn3S0qFAKl6wccMi8Yhmbus8mvjvbEVuUdvFhXR1pGhXVSmNlskr1lpLHnC-se6L0_eTf1JXmxrdILxtTN5U2NJRtkWfensZoPOnwcnOlt5vNjPfvA2Hs2Hj-H0-WEyvJuGBZdJHUZC5IxxSnOmSwaQiELziGohhRZFwiUtEswhAVFKpZmIs5hFZcy5UqzMUfN-cLPL3Tj73aCv0_aXAlerrELb-BTiWFGWKBAtev0PXdrGVe11LSUSypni0FKwowpnvXeo040z68z9pkDTrvG0azztGk_3jbfO1c4xiHjg4zaQKcn_AH0kfEo</recordid><startdate>201602</startdate><enddate>201602</enddate><creator>Xu, Xiaoming</creator><creator>He, Biao</creator><creator>Yang, Weiwei</creator><creator>Zhou, Xiangyun</creator><creator>Cai, Yueming</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>201602</creationdate><title>Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers</title><author>Xu, Xiaoming ; He, Biao ; Yang, Weiwei ; Zhou, Xiangyun ; Cai, Yueming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c369t-544b22300b2fd21194cf350f464f4c9360c9eb1914d68f247a725d733882dbef3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Cognitive radio</topic><topic>cognitive radio networks</topic><topic>Computer information security</topic><topic>Design engineering</topic><topic>Fading</topic><topic>Measurement</topic><topic>Networks</topic><topic>on-off transmission</topic><topic>Optimization</topic><topic>Physical layer security</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>Reliability</topic><topic>Secrecy aspects</topic><topic>secrecy guard zone</topic><topic>Security</topic><topic>Throughput</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Xiaoming</creatorcontrib><creatorcontrib>He, Biao</creatorcontrib><creatorcontrib>Yang, Weiwei</creatorcontrib><creatorcontrib>Zhou, Xiangyun</creatorcontrib><creatorcontrib>Cai, Yueming</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xu, Xiaoming</au><au>He, Biao</au><au>Yang, Weiwei</au><au>Zhou, Xiangyun</au><au>Cai, Yueming</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2016-02</date><risdate>2016</risdate><volume>11</volume><issue>2</issue><spage>373</spage><epage>387</epage><pages>373-387</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2015.2500178</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2016-02, Vol.11 (2), p.373-387
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_journals_1749032831
source IEEE Electronic Library (IEL)
subjects Cognitive radio
cognitive radio networks
Computer information security
Design engineering
Fading
Measurement
Networks
on-off transmission
Optimization
Physical layer security
Protocol (computers)
Protocols
Reliability
Secrecy aspects
secrecy guard zone
Security
Throughput
Wireless networks
title Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-04T00%3A46%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Transmission%20Design%20for%20Cognitive%20Radio%20Networks%20With%20Poisson%20Distributed%20Eavesdroppers&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Xu,%20Xiaoming&rft.date=2016-02&rft.volume=11&rft.issue=2&rft.spage=373&rft.epage=387&rft.pages=373-387&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2015.2500178&rft_dat=%3Cproquest_RIE%3E1778029814%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1749032831&rft_id=info:pmid/&rft_ieee_id=7328286&rfr_iscdi=true