Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers
This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of join...
Gespeichert in:
Veröffentlicht in: | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Communications and Computer Sciences, 2018/11/01, Vol.E101.A(11), pp.1970-1974 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1974 |
---|---|
container_issue | 11 |
container_start_page | 1970 |
container_title | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
container_volume | E101.A |
creator | XU, Ding LI, Qun |
description | This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI. |
doi_str_mv | 10.1587/transfun.E101.A.1970 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2301823444</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2301823444</sourcerecordid><originalsourceid>FETCH-LOGICAL-c414t-a6dd5ba660343d2f658fcddcbab0a4fd046c04eb06f152e277c8d4570e1eef813</originalsourceid><addsrcrecordid>eNplkMtOwzAQRS0EEqXwBywisU6xY-fRZVWVh1QBAro2jj1uXdI42E4r_p5EAYTEahb3nhnNQeiS4AlJi_w6OFF73daTBcFkMpuQaY6P0IjkLI0JpfkxGuEpyeIixcUpOvN-izEpEsJG6O0FZOsgmtvdrq2NFMHY2kfauujJmZ1wn9HKg_ORqbvOujbB7CF6FsrY6AHCwbp3Hx1M2HRpVbW-TxdiD1452zQdeI5OtKg8XHzPMVrdLF7nd_Hy8fZ-PlvGkhEWYpEplZYiyzBlVCU6SwstlZKlKLFgWmGWScygxJkmaQJJnstCsTTHQAB0QegYXQ17G2c_WvCBb23r6u4kT2j_LWWMdS02tKSz3jvQvBm-5ATz3iX_ccl7l3zGe5cdthywrQ9iDb-QcMHICv5D5C_-W5Mb4TjU9AvCHofU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2301823444</pqid></control><display><type>article</type><title>Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers</title><source>J-STAGE Free</source><creator>XU, Ding ; LI, Qun</creator><creatorcontrib>XU, Ding ; LI, Qun</creatorcontrib><description>This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.</description><identifier>ISSN: 0916-8508</identifier><identifier>EISSN: 1745-1337</identifier><identifier>DOI: 10.1587/transfun.E101.A.1970</identifier><language>eng</language><publisher>Tokyo: The Institute of Electronics, Information and Communication Engineers</publisher><subject>Cognitive radio ; collusive ; Eavesdropping ; Power control ; secrecy outage probability</subject><ispartof>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2018/11/01, Vol.E101.A(11), pp.1970-1974</ispartof><rights>2018 The Institute of Electronics, Information and Communication Engineers</rights><rights>Copyright Japan Science and Technology Agency 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c414t-a6dd5ba660343d2f658fcddcbab0a4fd046c04eb06f152e277c8d4570e1eef813</citedby><cites>FETCH-LOGICAL-c414t-a6dd5ba660343d2f658fcddcbab0a4fd046c04eb06f152e277c8d4570e1eef813</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,781,785,1884,27929,27930</link.rule.ids></links><search><creatorcontrib>XU, Ding</creatorcontrib><creatorcontrib>LI, Qun</creatorcontrib><title>Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers</title><title>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</title><addtitle>IEICE Trans. Fundamentals</addtitle><description>This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.</description><subject>Cognitive radio</subject><subject>collusive</subject><subject>Eavesdropping</subject><subject>Power control</subject><subject>secrecy outage probability</subject><issn>0916-8508</issn><issn>1745-1337</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNplkMtOwzAQRS0EEqXwBywisU6xY-fRZVWVh1QBAro2jj1uXdI42E4r_p5EAYTEahb3nhnNQeiS4AlJi_w6OFF73daTBcFkMpuQaY6P0IjkLI0JpfkxGuEpyeIixcUpOvN-izEpEsJG6O0FZOsgmtvdrq2NFMHY2kfauujJmZ1wn9HKg_ORqbvOujbB7CF6FsrY6AHCwbp3Hx1M2HRpVbW-TxdiD1452zQdeI5OtKg8XHzPMVrdLF7nd_Hy8fZ-PlvGkhEWYpEplZYiyzBlVCU6SwstlZKlKLFgWmGWScygxJkmaQJJnstCsTTHQAB0QegYXQ17G2c_WvCBb23r6u4kT2j_LWWMdS02tKSz3jvQvBm-5ATz3iX_ccl7l3zGe5cdthywrQ9iDb-QcMHICv5D5C_-W5Mb4TjU9AvCHofU</recordid><startdate>20181101</startdate><enddate>20181101</enddate><creator>XU, Ding</creator><creator>LI, Qun</creator><general>The Institute of Electronics, Information and Communication Engineers</general><general>Japan Science and Technology Agency</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20181101</creationdate><title>Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers</title><author>XU, Ding ; LI, Qun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c414t-a6dd5ba660343d2f658fcddcbab0a4fd046c04eb06f152e277c8d4570e1eef813</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Cognitive radio</topic><topic>collusive</topic><topic>Eavesdropping</topic><topic>Power control</topic><topic>secrecy outage probability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>XU, Ding</creatorcontrib><creatorcontrib>LI, Qun</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>XU, Ding</au><au>LI, Qun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers</atitle><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle><addtitle>IEICE Trans. Fundamentals</addtitle><date>2018-11-01</date><risdate>2018</risdate><volume>E101.A</volume><issue>11</issue><spage>1970</spage><epage>1974</epage><pages>1970-1974</pages><issn>0916-8508</issn><eissn>1745-1337</eissn><abstract>This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.</abstract><cop>Tokyo</cop><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transfun.E101.A.1970</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0916-8508 |
ispartof | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2018/11/01, Vol.E101.A(11), pp.1970-1974 |
issn | 0916-8508 1745-1337 |
language | eng |
recordid | cdi_proquest_journals_2301823444 |
source | J-STAGE Free |
subjects | Cognitive radio collusive Eavesdropping Power control secrecy outage probability |
title | Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-12T11%3A35%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Communications%20for%20Primary%20Users%20in%20Cognitive%20Radio%20Networks%20with%20Collusive%20Eavesdroppers&rft.jtitle=IEICE%20Transactions%20on%20Fundamentals%20of%20Electronics,%20Communications%20and%20Computer%20Sciences&rft.au=XU,%20Ding&rft.date=2018-11-01&rft.volume=E101.A&rft.issue=11&rft.spage=1970&rft.epage=1974&rft.pages=1970-1974&rft.issn=0916-8508&rft.eissn=1745-1337&rft_id=info:doi/10.1587/transfun.E101.A.1970&rft_dat=%3Cproquest_cross%3E2301823444%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2301823444&rft_id=info:pmid/&rfr_iscdi=true |