Power allocation design and optimization for secure transmission in cognitive relay networks
In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2016-12, Vol.9 (18), p.5133-5142 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5142 |
---|---|
container_issue | 18 |
container_start_page | 5133 |
container_title | Security and communication networks |
container_volume | 9 |
creator | Zhang, Pei Liu, Yi‐Liang Zhang, Jian‐ming Wang, Liang‐min |
description | In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers or secondary receivers. The power allocation method at secondary source and artificial noise at relays are utilized to secure the secondary source‐destination transmission. Two optimization problems, namely, to maximize the received signal‐to‐interference‐and‐noise ratio of secondary source in the lightly‐loaded relay cluster situation, and to minimize the relay cluster total power in the fully‐loaded relay cluster situation, are formulated. In addition, these two problems should ensure both physical‐layer security and lower interference temperature. The semi‐definite relaxation technique is used to solve the considered optimization problems. In the second problems, we further optimize the performance with the help of the bisection method. Complexity analysis shows that our proposed method is efficient and also can be solved in polynomial time. Theoretical analysis and the Monte‐Carlo simulation results validate the proposed method. Copyright © 2016 John Wiley & Sons, Ltd.
In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network. By considering the relay cluster load capacity, two optimization problems, namely, to maximize the secondary source received signal‐to‐interference‐and‐noise ratio in the lightly loaded situation and to minimize the relay cluster total power in the fully loaded situation, are formulated. The semi‐definite relaxation technique is used to solve the power allocation problems, and we further optimize the performance by the bisection method in the second situation. |
doi_str_mv | 10.1002/sec.1683 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1893906087</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4321295891</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3263-5a01fc22f2a2429e14b841ed4967bdd393d6a13b0be8f19bbb1116885c5fb1bd3</originalsourceid><addsrcrecordid>eNp1kEtLAzEUhYMoWKvgTwi4cTM1N0nnsZTiCwoK6k4IycydkjpNajK11F9vakVBcHUvh4_DOYeQU2AjYIxfRKxHkJdijwygElXGgPP9nx_kITmKcc5YDrKQA_Ly4NcYqO46X-veekcbjHbmqHYN9cveLuzHTm99oMl8FZD2Qbu4sDFudeto7WfO9vYdacBOb6jDfu3DazwmB63uIp583yF5vr56mtxm0_ubu8nlNKsFz0U21gzamvOWay55hSBNKQEbWeWFaRpRiSbXIAwzWLZQGWMAUsVyXI9bA6YRQ3K-810G_7bC2KsUrsau0w79KiooU3uWs7JI6NkfdO5XwaV0iSo5FFJWxa9hHXyMAVu1DHahw0YBU9uZVVpCbWdOaLZD17bDzb-ceryafPGftOF_LQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1882174497</pqid></control><display><type>article</type><title>Power allocation design and optimization for secure transmission in cognitive relay networks</title><source>Free E-Journal (出版社公開部分のみ)</source><source>Alma/SFX Local Collection</source><creator>Zhang, Pei ; Liu, Yi‐Liang ; Zhang, Jian‐ming ; Wang, Liang‐min</creator><creatorcontrib>Zhang, Pei ; Liu, Yi‐Liang ; Zhang, Jian‐ming ; Wang, Liang‐min</creatorcontrib><description>In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers or secondary receivers. The power allocation method at secondary source and artificial noise at relays are utilized to secure the secondary source‐destination transmission. Two optimization problems, namely, to maximize the received signal‐to‐interference‐and‐noise ratio of secondary source in the lightly‐loaded relay cluster situation, and to minimize the relay cluster total power in the fully‐loaded relay cluster situation, are formulated. In addition, these two problems should ensure both physical‐layer security and lower interference temperature. The semi‐definite relaxation technique is used to solve the considered optimization problems. In the second problems, we further optimize the performance with the help of the bisection method. Complexity analysis shows that our proposed method is efficient and also can be solved in polynomial time. Theoretical analysis and the Monte‐Carlo simulation results validate the proposed method. Copyright © 2016 John Wiley & Sons, Ltd.
In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network. By considering the relay cluster load capacity, two optimization problems, namely, to maximize the secondary source received signal‐to‐interference‐and‐noise ratio in the lightly loaded situation and to minimize the relay cluster total power in the fully loaded situation, are formulated. The semi‐definite relaxation technique is used to solve the power allocation problems, and we further optimize the performance by the bisection method in the second situation.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1683</identifier><language>eng</language><publisher>Chichester, UK: John Wiley & Sons, Ltd</publisher><subject>Allocations ; Amplification ; bisection method ; Clusters ; cognitive relay networks ; Optimization ; physical‐layer security ; power allocation ; Receivers ; Relay ; Relay networks ; Security ; semi‐definite relaxation ; SINR</subject><ispartof>Security and communication networks, 2016-12, Vol.9 (18), p.5133-5142</ispartof><rights>Copyright © 2016 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3263-5a01fc22f2a2429e14b841ed4967bdd393d6a13b0be8f19bbb1116885c5fb1bd3</citedby><cites>FETCH-LOGICAL-c3263-5a01fc22f2a2429e14b841ed4967bdd393d6a13b0be8f19bbb1116885c5fb1bd3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Zhang, Pei</creatorcontrib><creatorcontrib>Liu, Yi‐Liang</creatorcontrib><creatorcontrib>Zhang, Jian‐ming</creatorcontrib><creatorcontrib>Wang, Liang‐min</creatorcontrib><title>Power allocation design and optimization for secure transmission in cognitive relay networks</title><title>Security and communication networks</title><description>In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers or secondary receivers. The power allocation method at secondary source and artificial noise at relays are utilized to secure the secondary source‐destination transmission. Two optimization problems, namely, to maximize the received signal‐to‐interference‐and‐noise ratio of secondary source in the lightly‐loaded relay cluster situation, and to minimize the relay cluster total power in the fully‐loaded relay cluster situation, are formulated. In addition, these two problems should ensure both physical‐layer security and lower interference temperature. The semi‐definite relaxation technique is used to solve the considered optimization problems. In the second problems, we further optimize the performance with the help of the bisection method. Complexity analysis shows that our proposed method is efficient and also can be solved in polynomial time. Theoretical analysis and the Monte‐Carlo simulation results validate the proposed method. Copyright © 2016 John Wiley & Sons, Ltd.
In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network. By considering the relay cluster load capacity, two optimization problems, namely, to maximize the secondary source received signal‐to‐interference‐and‐noise ratio in the lightly loaded situation and to minimize the relay cluster total power in the fully loaded situation, are formulated. The semi‐definite relaxation technique is used to solve the power allocation problems, and we further optimize the performance by the bisection method in the second situation.</description><subject>Allocations</subject><subject>Amplification</subject><subject>bisection method</subject><subject>Clusters</subject><subject>cognitive relay networks</subject><subject>Optimization</subject><subject>physical‐layer security</subject><subject>power allocation</subject><subject>Receivers</subject><subject>Relay</subject><subject>Relay networks</subject><subject>Security</subject><subject>semi‐definite relaxation</subject><subject>SINR</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kEtLAzEUhYMoWKvgTwi4cTM1N0nnsZTiCwoK6k4IycydkjpNajK11F9vakVBcHUvh4_DOYeQU2AjYIxfRKxHkJdijwygElXGgPP9nx_kITmKcc5YDrKQA_Ly4NcYqO46X-veekcbjHbmqHYN9cveLuzHTm99oMl8FZD2Qbu4sDFudeto7WfO9vYdacBOb6jDfu3DazwmB63uIp583yF5vr56mtxm0_ubu8nlNKsFz0U21gzamvOWay55hSBNKQEbWeWFaRpRiSbXIAwzWLZQGWMAUsVyXI9bA6YRQ3K-810G_7bC2KsUrsau0w79KiooU3uWs7JI6NkfdO5XwaV0iSo5FFJWxa9hHXyMAVu1DHahw0YBU9uZVVpCbWdOaLZD17bDzb-ceryafPGftOF_LQ</recordid><startdate>201612</startdate><enddate>201612</enddate><creator>Zhang, Pei</creator><creator>Liu, Yi‐Liang</creator><creator>Zhang, Jian‐ming</creator><creator>Wang, Liang‐min</creator><general>John Wiley & Sons, Ltd</general><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>201612</creationdate><title>Power allocation design and optimization for secure transmission in cognitive relay networks</title><author>Zhang, Pei ; Liu, Yi‐Liang ; Zhang, Jian‐ming ; Wang, Liang‐min</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3263-5a01fc22f2a2429e14b841ed4967bdd393d6a13b0be8f19bbb1116885c5fb1bd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Allocations</topic><topic>Amplification</topic><topic>bisection method</topic><topic>Clusters</topic><topic>cognitive relay networks</topic><topic>Optimization</topic><topic>physical‐layer security</topic><topic>power allocation</topic><topic>Receivers</topic><topic>Relay</topic><topic>Relay networks</topic><topic>Security</topic><topic>semi‐definite relaxation</topic><topic>SINR</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Pei</creatorcontrib><creatorcontrib>Liu, Yi‐Liang</creatorcontrib><creatorcontrib>Zhang, Jian‐ming</creatorcontrib><creatorcontrib>Wang, Liang‐min</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Pei</au><au>Liu, Yi‐Liang</au><au>Zhang, Jian‐ming</au><au>Wang, Liang‐min</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Power allocation design and optimization for secure transmission in cognitive relay networks</atitle><jtitle>Security and communication networks</jtitle><date>2016-12</date><risdate>2016</risdate><volume>9</volume><issue>18</issue><spage>5133</spage><epage>5142</epage><pages>5133-5142</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network with one secondary source, one secondary destination, multiple cognitive relays under the presence of multiple primary receivers and eavesdroppers which can be either primary receivers or secondary receivers. The power allocation method at secondary source and artificial noise at relays are utilized to secure the secondary source‐destination transmission. Two optimization problems, namely, to maximize the received signal‐to‐interference‐and‐noise ratio of secondary source in the lightly‐loaded relay cluster situation, and to minimize the relay cluster total power in the fully‐loaded relay cluster situation, are formulated. In addition, these two problems should ensure both physical‐layer security and lower interference temperature. The semi‐definite relaxation technique is used to solve the considered optimization problems. In the second problems, we further optimize the performance with the help of the bisection method. Complexity analysis shows that our proposed method is efficient and also can be solved in polynomial time. Theoretical analysis and the Monte‐Carlo simulation results validate the proposed method. Copyright © 2016 John Wiley & Sons, Ltd.
In this paper, physical layer security is investigated in the dual‐hop amplify‐and‐forward cognitive relay network. By considering the relay cluster load capacity, two optimization problems, namely, to maximize the secondary source received signal‐to‐interference‐and‐noise ratio in the lightly loaded situation and to minimize the relay cluster total power in the fully loaded situation, are formulated. The semi‐definite relaxation technique is used to solve the power allocation problems, and we further optimize the performance by the bisection method in the second situation.</abstract><cop>Chichester, UK</cop><pub>John Wiley & Sons, Ltd</pub><doi>10.1002/sec.1683</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2016-12, Vol.9 (18), p.5133-5142 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_miscellaneous_1893906087 |
source | Free E-Journal (出版社公開部分のみ); Alma/SFX Local Collection |
subjects | Allocations Amplification bisection method Clusters cognitive relay networks Optimization physical‐layer security power allocation Receivers Relay Relay networks Security semi‐definite relaxation SINR |
title | Power allocation design and optimization for secure transmission in cognitive relay networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T03%3A19%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Power%20allocation%20design%20and%20optimization%20for%20secure%20transmission%20in%20cognitive%20relay%20networks&rft.jtitle=Security%20and%20communication%20networks&rft.au=Zhang,%20Pei&rft.date=2016-12&rft.volume=9&rft.issue=18&rft.spage=5133&rft.epage=5142&rft.pages=5133-5142&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1683&rft_dat=%3Cproquest_cross%3E4321295891%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1882174497&rft_id=info:pmid/&rfr_iscdi=true |