87 research outputs found

    Enhancing secrecy rate in cognitive radio networks via stackelberg game

    Get PDF
    In this paper, a game theory based cooperation scheme is investigated to enhance the physical layer security in both primary and secondary transmissions of a cognitive radio network (CRN). In CRNs, the primary network may decide to lease its own spectrum for a fraction of time to the secondary nodes in exchange of appropriate remuneration. We consider the secondary transmitter node as a trusted relay for primary transmission to forward primary messages in a decode-and-forward (DF) fashion and, at the same time, allows part of its available power to be used to transmit artificial noise (i.e., jamming signal) to enhance primary and secondary secrecy rates. In order to allocate power between message and jamming signals, we formulate and solve the optimization problem for maximizing the secrecy rates under malicious attempts from EDs. We then analyse the cooperation between the primary and secondary nodes from a game-theoretic perspective where we model their interaction as a Stackelberg game with a theoretically proved and computed Stackelberg equilibrium. We show that the spectrum leasing based on trading secondary access for cooperation by means of relay and jammer is a promising framework for enhancing security in CRNs

    Enhancing secrecy rate in cognitive radio networks via stackelberg game

    Get PDF
    In this paper, a game theory based cooperation scheme is investigated to enhance the physical layer security in both primary and secondary transmissions of a cognitive radio network (CRN). In CRNs, the primary network may decide to lease its own spectrum for a fraction of time to the secondary nodes in exchange of appropriate remuneration. We consider the secondary transmitter node as a trusted relay for primary transmission to forward primary messages in a decode-and-forward (DF) fashion and, at the same time, allows part of its available power to be used to transmit artificial noise (i.e., jamming signal) to enhance primary and secondary secrecy rates. In order to allocate power between message and jamming signals, we formulate and solve the optimization problem for maximizing the secrecy rates under malicious attempts from EDs. We then analyse the cooperation between the primary and secondary nodes from a game-theoretic perspective where we model their interaction as a Stackelberg game with a theoretically proved and computed Stackelberg equilibrium. We show that the spectrum leasing based on trading secondary access for cooperation by means of relay and jammer is a promising framework for enhancing security in CRNs

    Subcarrier Pairing as Channel Gain Tailoring: Joint Resource Allocation for Relay-Assisted Secure OFDMA with Untrusted Users

    Full text link
    Joint resource allocation involving optimization of subcarrier allocation, subcarrier pairing (SCP), and power allocation in a cooperative secure orthogonal frequency division multiple access (OFDMA) communication system with untrusted users is considered. Both amplify and forward (AF), and decode and forward (DF) modes of operations are considered with individual power budget constraints for source and relay. After finding optimal subcarrier allocation for an AF relayed system, we prove the joint power allocation as a generalized convex problem, and solve it optimally. Compared to the conventional channel gain matching view, the optimal SCP is emphasized as a novel concept of channel gain tailoring. We prove that the optimal SCP pairs subcarriers such that the variance among the effective channel gains is minimized. For a DF relayed system, we show that depending on the power budgets of source and relay, SCP can either be in a subordinate role where it improves the energy efficiency, or in a main role where it improves the spectral efficiency of the system. In an AF relayed system we confirm that SCP plays a crucial role, and improves the spectral efficiency of the system. The channel gain tailoring property of SCP, various roles of SCP in improving the spectral and the energy efficiency of a cooperative communication system are validated with the help of simulation results

    Trajectory and power design for aerial CRNs with colluding eavesdroppers

    Full text link
    Unmanned aerial vehicles (UAVs) can provide wireless access services to terrestrial users without geographical limitations and will become an essential part of the future communication system. However, the openness of wireless channels and the mobility of UAVs make the security of UAV-based communication systems particularly challenging. This work investigates the security of aerial cognitive radio networks (CRNs) with multiple uncertainties colluding eavesdroppers. A cognitive aerial base station transmits messages to cognitive terrestrial users using the spectrum resource of the primary users. All secondary terrestrial users and illegitimate receivers jointly decode the received message. The average secrecy rate of the aerial CRNs is maximized by jointly optimizing the UAV's trajectory and transmission power. An iterative algorithm based on block coordinate descent and successive convex approximation is proposed to solve the non-convex mixed-variable optimization problem. Numerical results verify the effectiveness of our proposed algorithm and show that our scheme improves the secrecy performance of airborne CRNs.Comment: 10 pages, 7 figures.submitted to the IEEE journal for revie

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying with Cooperative Jamming and SWIPT

    Full text link
    This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source (Alice) sends confidential information to a destination (Bob) via an energy-constrained UAV-mounted amplify-and-forward (AF) relay in the presence of a ground eavesdropper (Eve). We adopt destination-assisted cooperative jamming (CJ) as well as simultaneous wireless information and power transfer (SWIPT) at the UAV-mounted relay to enhance physical-layer security (PLS) and transmission reliability. Assuming a low altitude UAV, we derive connection probability (CP), secrecy outage probability (SOP), instantaneous secrecy rate, and average secrecy rate (ASR) of the proposed protocol over Air-Ground (AG) channels, which are modeled as Rician fading with elevation-angel dependent parameters. By simulations, we verify our theoretical results and demonstrate significant performance improvement of our protocol, when compared to conventional transmission protocol with ground relaying and UAV-based transmission protocol without destination-assisted jamming. Finally, we evaluate the impacts of different system parameters and different UAV's locations on the proposed protocol in terms of ASR.Comment: 10 pages, 9 figures, Submitted for possible journal publicatio
    • …
    corecore