Power allocation design and optimization for secure transmission in cognitive relay networks

In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2016-12, Vol.9 (18), p.5133-5142
Hauptverfasser: Zhang, Pei, Liu, Yi‐Liang, Zhang, Jian‐ming, Wang, Liang‐min
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5142
container_issue 18
container_start_page 5133
container_title Security and communication networks
container_volume 9
creator Zhang, Pei
Liu, Yi‐Liang
Zhang, Jian‐ming
Wang, Liang‐min
description In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers or secondary receivers. The power allocation method at secondary source and artificial noise at relays are utilized to secure the secondary source‐destination transmission. Two optimization problems, namely, to maximize the received signal‐to‐interference‐and‐noise ratio of secondary source in the lightly‐loaded relay cluster situation, and to minimize the relay cluster total power in the fully‐loaded relay cluster situation, are formulated. In addition, these two problems should ensure both physical‐layer security and lower interference temperature. The semi‐definite relaxation technique is used to solve the considered optimization problems. In the second problems, we further optimize the performance with the help of the bisection method. Complexity analysis shows that our proposed method is efficient and also can be solved in polynomial time. Theoretical analysis and the Monte‐Carlo simulation results validate the proposed method. Copyright © 2016 John Wiley & Sons, Ltd. In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network. By considering the relay cluster load capacity, two optimization problems, namely, to maximize the secondary source received signal‐to‐interference‐and‐noise ratio in the lightly loaded situation and to minimize the relay cluster total power in the fully loaded situation, are formulated. The semi‐definite relaxation technique is used to solve the power allocation problems, and we further optimize the performance by the bisection method in the second situation.
doi_str_mv 10.1002/sec.1683
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1893906087</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4321295891</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3263-5a01fc22f2a2429e14b841ed4967bdd393d6a13b0be8f19bbb1116885c5fb1bd3</originalsourceid><addsrcrecordid>eNp1kEtLAzEUhYMoWKvgTwi4cTM1N0nnsZTiCwoK6k4IycydkjpNajK11F9vakVBcHUvh4_DOYeQU2AjYIxfRKxHkJdijwygElXGgPP9nx_kITmKcc5YDrKQA_Ly4NcYqO46X-veekcbjHbmqHYN9cveLuzHTm99oMl8FZD2Qbu4sDFudeto7WfO9vYdacBOb6jDfu3DazwmB63uIp583yF5vr56mtxm0_ubu8nlNKsFz0U21gzamvOWay55hSBNKQEbWeWFaRpRiSbXIAwzWLZQGWMAUsVyXI9bA6YRQ3K-810G_7bC2KsUrsau0w79KiooU3uWs7JI6NkfdO5XwaV0iSo5FFJWxa9hHXyMAVu1DHahw0YBU9uZVVpCbWdOaLZD17bDzb-ceryafPGftOF_LQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1882174497</pqid></control><display><type>article</type><title>Power allocation design and optimization for secure transmission in cognitive relay networks</title><source>Free E-Journal (出版社公開部分のみ)</source><source>Alma/SFX Local Collection</source><creator>Zhang, Pei ; Liu, Yi‐Liang ; Zhang, Jian‐ming ; Wang, Liang‐min</creator><creatorcontrib>Zhang, Pei ; Liu, Yi‐Liang ; Zhang, Jian‐ming ; Wang, Liang‐min</creatorcontrib><description>In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers or secondary receivers. The power allocation method at secondary source and artificial noise at relays are utilized to secure the secondary source‐destination transmission. Two optimization problems, namely, to maximize the received signal‐to‐interference‐and‐noise ratio of secondary source in the lightly‐loaded relay cluster situation, and to minimize the relay cluster total power in the fully‐loaded relay cluster situation, are formulated. In addition, these two problems should ensure both physical‐layer security and lower interference temperature. The semi‐definite relaxation technique is used to solve the considered optimization problems. In the second problems, we further optimize the performance with the help of the bisection method. Complexity analysis shows that our proposed method is efficient and also can be solved in polynomial time. Theoretical analysis and the Monte‐Carlo simulation results validate the proposed method. Copyright © 2016 John Wiley &amp; Sons, Ltd. In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network. By considering the relay cluster load capacity, two optimization problems, namely, to maximize the secondary source received signal‐to‐interference‐and‐noise ratio in the lightly loaded situation and to minimize the relay cluster total power in the fully loaded situation, are formulated. The semi‐definite relaxation technique is used to solve the power allocation problems, and we further optimize the performance by the bisection method in the second situation.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1683</identifier><language>eng</language><publisher>Chichester, UK: John Wiley &amp; Sons, Ltd</publisher><subject>Allocations ; Amplification ; bisection method ; Clusters ; cognitive relay networks ; Optimization ; physical‐layer security ; power allocation ; Receivers ; Relay ; Relay networks ; Security ; semi‐definite relaxation ; SINR</subject><ispartof>Security and communication networks, 2016-12, Vol.9 (18), p.5133-5142</ispartof><rights>Copyright © 2016 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3263-5a01fc22f2a2429e14b841ed4967bdd393d6a13b0be8f19bbb1116885c5fb1bd3</citedby><cites>FETCH-LOGICAL-c3263-5a01fc22f2a2429e14b841ed4967bdd393d6a13b0be8f19bbb1116885c5fb1bd3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Zhang, Pei</creatorcontrib><creatorcontrib>Liu, Yi‐Liang</creatorcontrib><creatorcontrib>Zhang, Jian‐ming</creatorcontrib><creatorcontrib>Wang, Liang‐min</creatorcontrib><title>Power allocation design and optimization for secure transmission in cognitive relay networks</title><title>Security and communication networks</title><description>In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers or secondary receivers. The power allocation method at secondary source and artificial noise at relays are utilized to secure the secondary source‐destination transmission. Two optimization problems, namely, to maximize the received signal‐to‐interference‐and‐noise ratio of secondary source in the lightly‐loaded relay cluster situation, and to minimize the relay cluster total power in the fully‐loaded relay cluster situation, are formulated. In addition, these two problems should ensure both physical‐layer security and lower interference temperature. The semi‐definite relaxation technique is used to solve the considered optimization problems. In the second problems, we further optimize the performance with the help of the bisection method. Complexity analysis shows that our proposed method is efficient and also can be solved in polynomial time. Theoretical analysis and the Monte‐Carlo simulation results validate the proposed method. Copyright © 2016 John Wiley &amp; Sons, Ltd. In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network. By considering the relay cluster load capacity, two optimization problems, namely, to maximize the secondary source received signal‐to‐interference‐and‐noise ratio in the lightly loaded situation and to minimize the relay cluster total power in the fully loaded situation, are formulated. The semi‐definite relaxation technique is used to solve the power allocation problems, and we further optimize the performance by the bisection method in the second situation.</description><subject>Allocations</subject><subject>Amplification</subject><subject>bisection method</subject><subject>Clusters</subject><subject>cognitive relay networks</subject><subject>Optimization</subject><subject>physical‐layer security</subject><subject>power allocation</subject><subject>Receivers</subject><subject>Relay</subject><subject>Relay networks</subject><subject>Security</subject><subject>semi‐definite relaxation</subject><subject>SINR</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kEtLAzEUhYMoWKvgTwi4cTM1N0nnsZTiCwoK6k4IycydkjpNajK11F9vakVBcHUvh4_DOYeQU2AjYIxfRKxHkJdijwygElXGgPP9nx_kITmKcc5YDrKQA_Ly4NcYqO46X-veekcbjHbmqHYN9cveLuzHTm99oMl8FZD2Qbu4sDFudeto7WfO9vYdacBOb6jDfu3DazwmB63uIp583yF5vr56mtxm0_ubu8nlNKsFz0U21gzamvOWay55hSBNKQEbWeWFaRpRiSbXIAwzWLZQGWMAUsVyXI9bA6YRQ3K-810G_7bC2KsUrsau0w79KiooU3uWs7JI6NkfdO5XwaV0iSo5FFJWxa9hHXyMAVu1DHahw0YBU9uZVVpCbWdOaLZD17bDzb-ceryafPGftOF_LQ</recordid><startdate>201612</startdate><enddate>201612</enddate><creator>Zhang, Pei</creator><creator>Liu, Yi‐Liang</creator><creator>Zhang, Jian‐ming</creator><creator>Wang, Liang‐min</creator><general>John Wiley &amp; Sons, Ltd</general><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>201612</creationdate><title>Power allocation design and optimization for secure transmission in cognitive relay networks</title><author>Zhang, Pei ; Liu, Yi‐Liang ; Zhang, Jian‐ming ; Wang, Liang‐min</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3263-5a01fc22f2a2429e14b841ed4967bdd393d6a13b0be8f19bbb1116885c5fb1bd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Allocations</topic><topic>Amplification</topic><topic>bisection method</topic><topic>Clusters</topic><topic>cognitive relay networks</topic><topic>Optimization</topic><topic>physical‐layer security</topic><topic>power allocation</topic><topic>Receivers</topic><topic>Relay</topic><topic>Relay networks</topic><topic>Security</topic><topic>semi‐definite relaxation</topic><topic>SINR</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Pei</creatorcontrib><creatorcontrib>Liu, Yi‐Liang</creatorcontrib><creatorcontrib>Zhang, Jian‐ming</creatorcontrib><creatorcontrib>Wang, Liang‐min</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Pei</au><au>Liu, Yi‐Liang</au><au>Zhang, Jian‐ming</au><au>Wang, Liang‐min</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Power allocation design and optimization for secure transmission in cognitive relay networks</atitle><jtitle>Security and communication networks</jtitle><date>2016-12</date><risdate>2016</risdate><volume>9</volume><issue>18</issue><spage>5133</spage><epage>5142</epage><pages>5133-5142</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers or secondary receivers. The power allocation method at secondary source and artificial noise at relays are utilized to secure the secondary source‐destination transmission. Two optimization problems, namely, to maximize the received signal‐to‐interference‐and‐noise ratio of secondary source in the lightly‐loaded relay cluster situation, and to minimize the relay cluster total power in the fully‐loaded relay cluster situation, are formulated. In addition, these two problems should ensure both physical‐layer security and lower interference temperature. The semi‐definite relaxation technique is used to solve the considered optimization problems. In the second problems, we further optimize the performance with the help of the bisection method. Complexity analysis shows that our proposed method is efficient and also can be solved in polynomial time. Theoretical analysis and the Monte‐Carlo simulation results validate the proposed method. Copyright © 2016 John Wiley &amp; Sons, Ltd. In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network. By considering the relay cluster load capacity, two optimization problems, namely, to maximize the secondary source received signal‐to‐interference‐and‐noise ratio in the lightly loaded situation and to minimize the relay cluster total power in the fully loaded situation, are formulated. The semi‐definite relaxation technique is used to solve the power allocation problems, and we further optimize the performance by the bisection method in the second situation.</abstract><cop>Chichester, UK</cop><pub>John Wiley &amp; Sons, Ltd</pub><doi>10.1002/sec.1683</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2016-12, Vol.9 (18), p.5133-5142
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_miscellaneous_1893906087
source Free E-Journal (出版社公開部分のみ); Alma/SFX Local Collection
subjects Allocations
Amplification
bisection method
Clusters
cognitive relay networks
Optimization
physical‐layer security
power allocation
Receivers
Relay
Relay networks
Security
semi‐definite relaxation
SINR
title Power allocation design and optimization for secure transmission in cognitive relay networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T03%3A19%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Power%20allocation%20design%20and%20optimization%20for%20secure%20transmission%20in%20cognitive%20relay%20networks&rft.jtitle=Security%20and%20communication%20networks&rft.au=Zhang,%20Pei&rft.date=2016-12&rft.volume=9&rft.issue=18&rft.spage=5133&rft.epage=5142&rft.pages=5133-5142&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1683&rft_dat=%3Cproquest_cross%3E4321295891%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1882174497&rft_id=info:pmid/&rfr_iscdi=true