Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers

This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of join...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Communications and Computer Sciences, 2018/11/01, Vol.E101.A(11), pp.1970-1974
Hauptverfasser: XU, Ding, LI, Qun
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1974
container_issue 11
container_start_page 1970
container_title IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
container_volume E101.A
creator XU, Ding
LI, Qun
description This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.
doi_str_mv 10.1587/transfun.E101.A.1970
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2301823444</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2301823444</sourcerecordid><originalsourceid>FETCH-LOGICAL-c414t-a6dd5ba660343d2f658fcddcbab0a4fd046c04eb06f152e277c8d4570e1eef813</originalsourceid><addsrcrecordid>eNplkMtOwzAQRS0EEqXwBywisU6xY-fRZVWVh1QBAro2jj1uXdI42E4r_p5EAYTEahb3nhnNQeiS4AlJi_w6OFF73daTBcFkMpuQaY6P0IjkLI0JpfkxGuEpyeIixcUpOvN-izEpEsJG6O0FZOsgmtvdrq2NFMHY2kfauujJmZ1wn9HKg_ORqbvOujbB7CF6FsrY6AHCwbp3Hx1M2HRpVbW-TxdiD1452zQdeI5OtKg8XHzPMVrdLF7nd_Hy8fZ-PlvGkhEWYpEplZYiyzBlVCU6SwstlZKlKLFgWmGWScygxJkmaQJJnstCsTTHQAB0QegYXQ17G2c_WvCBb23r6u4kT2j_LWWMdS02tKSz3jvQvBm-5ATz3iX_ccl7l3zGe5cdthywrQ9iDb-QcMHICv5D5C_-W5Mb4TjU9AvCHofU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2301823444</pqid></control><display><type>article</type><title>Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers</title><source>J-STAGE Free</source><creator>XU, Ding ; LI, Qun</creator><creatorcontrib>XU, Ding ; LI, Qun</creatorcontrib><description>This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.</description><identifier>ISSN: 0916-8508</identifier><identifier>EISSN: 1745-1337</identifier><identifier>DOI: 10.1587/transfun.E101.A.1970</identifier><language>eng</language><publisher>Tokyo: The Institute of Electronics, Information and Communication Engineers</publisher><subject>Cognitive radio ; collusive ; Eavesdropping ; Power control ; secrecy outage probability</subject><ispartof>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2018/11/01, Vol.E101.A(11), pp.1970-1974</ispartof><rights>2018 The Institute of Electronics, Information and Communication Engineers</rights><rights>Copyright Japan Science and Technology Agency 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c414t-a6dd5ba660343d2f658fcddcbab0a4fd046c04eb06f152e277c8d4570e1eef813</citedby><cites>FETCH-LOGICAL-c414t-a6dd5ba660343d2f658fcddcbab0a4fd046c04eb06f152e277c8d4570e1eef813</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,781,785,1884,27929,27930</link.rule.ids></links><search><creatorcontrib>XU, Ding</creatorcontrib><creatorcontrib>LI, Qun</creatorcontrib><title>Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers</title><title>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</title><addtitle>IEICE Trans. Fundamentals</addtitle><description>This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.</description><subject>Cognitive radio</subject><subject>collusive</subject><subject>Eavesdropping</subject><subject>Power control</subject><subject>secrecy outage probability</subject><issn>0916-8508</issn><issn>1745-1337</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNplkMtOwzAQRS0EEqXwBywisU6xY-fRZVWVh1QBAro2jj1uXdI42E4r_p5EAYTEahb3nhnNQeiS4AlJi_w6OFF73daTBcFkMpuQaY6P0IjkLI0JpfkxGuEpyeIixcUpOvN-izEpEsJG6O0FZOsgmtvdrq2NFMHY2kfauujJmZ1wn9HKg_ORqbvOujbB7CF6FsrY6AHCwbp3Hx1M2HRpVbW-TxdiD1452zQdeI5OtKg8XHzPMVrdLF7nd_Hy8fZ-PlvGkhEWYpEplZYiyzBlVCU6SwstlZKlKLFgWmGWScygxJkmaQJJnstCsTTHQAB0QegYXQ17G2c_WvCBb23r6u4kT2j_LWWMdS02tKSz3jvQvBm-5ATz3iX_ccl7l3zGe5cdthywrQ9iDb-QcMHICv5D5C_-W5Mb4TjU9AvCHofU</recordid><startdate>20181101</startdate><enddate>20181101</enddate><creator>XU, Ding</creator><creator>LI, Qun</creator><general>The Institute of Electronics, Information and Communication Engineers</general><general>Japan Science and Technology Agency</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20181101</creationdate><title>Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers</title><author>XU, Ding ; LI, Qun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c414t-a6dd5ba660343d2f658fcddcbab0a4fd046c04eb06f152e277c8d4570e1eef813</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Cognitive radio</topic><topic>collusive</topic><topic>Eavesdropping</topic><topic>Power control</topic><topic>secrecy outage probability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>XU, Ding</creatorcontrib><creatorcontrib>LI, Qun</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>XU, Ding</au><au>LI, Qun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers</atitle><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle><addtitle>IEICE Trans. Fundamentals</addtitle><date>2018-11-01</date><risdate>2018</risdate><volume>E101.A</volume><issue>11</issue><spage>1970</spage><epage>1974</epage><pages>1970-1974</pages><issn>0916-8508</issn><eissn>1745-1337</eissn><abstract>This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.</abstract><cop>Tokyo</cop><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transfun.E101.A.1970</doi><tpages>5</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0916-8508
ispartof IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2018/11/01, Vol.E101.A(11), pp.1970-1974
issn 0916-8508
1745-1337
language eng
recordid cdi_proquest_journals_2301823444
source J-STAGE Free
subjects Cognitive radio
collusive
Eavesdropping
Power control
secrecy outage probability
title Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-12T11%3A35%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Communications%20for%20Primary%20Users%20in%20Cognitive%20Radio%20Networks%20with%20Collusive%20Eavesdroppers&rft.jtitle=IEICE%20Transactions%20on%20Fundamentals%20of%20Electronics,%20Communications%20and%20Computer%20Sciences&rft.au=XU,%20Ding&rft.date=2018-11-01&rft.volume=E101.A&rft.issue=11&rft.spage=1970&rft.epage=1974&rft.pages=1970-1974&rft.issn=0916-8508&rft.eissn=1745-1337&rft_id=info:doi/10.1587/transfun.E101.A.1970&rft_dat=%3Cproquest_cross%3E2301823444%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2301823444&rft_id=info:pmid/&rfr_iscdi=true