87 research outputs found
Enhancing secrecy rate in cognitive radio networks via stackelberg game
In this paper, a game theory based cooperation scheme is investigated to enhance the physical layer security in both primary and secondary transmissions of a cognitive radio network (CRN). In CRNs, the primary network may decide to lease its own spectrum for a fraction of time to the secondary nodes in exchange of appropriate remuneration. We consider the secondary transmitter node as a trusted relay for primary transmission to forward primary messages in a decode-and-forward (DF) fashion and, at the same time, allows part of its available power to be used to transmit artificial noise (i.e., jamming signal) to enhance primary and secondary secrecy rates. In order to allocate power between message and jamming signals, we formulate and solve the optimization problem for maximizing the secrecy rates under malicious attempts from EDs. We then analyse the cooperation between the primary and secondary nodes from a game-theoretic perspective where we model their interaction as a Stackelberg game with a theoretically proved and computed Stackelberg equilibrium. We show that the spectrum leasing based on trading secondary access for cooperation by means of relay and jammer is a promising framework for enhancing security in CRNs
Enhancing secrecy rate in cognitive radio networks via stackelberg game
In this paper, a game theory based cooperation scheme is investigated to enhance the physical layer security in both primary and secondary transmissions of a cognitive radio network (CRN). In CRNs, the primary network may decide to lease its own spectrum for a fraction of time to the secondary nodes in exchange of appropriate remuneration. We consider the secondary transmitter node as a trusted relay for primary transmission to forward primary messages in a decode-and-forward (DF) fashion and, at the same time, allows part of its available power to be used to transmit artificial noise (i.e., jamming signal) to enhance primary and secondary secrecy rates. In order to allocate power between message and jamming signals, we formulate and solve the optimization problem for maximizing the secrecy rates under malicious attempts from EDs. We then analyse the cooperation between the primary and secondary nodes from a game-theoretic perspective where we model their interaction as a Stackelberg game with a theoretically proved and computed Stackelberg equilibrium. We show that the spectrum leasing based on trading secondary access for cooperation by means of relay and jammer is a promising framework for enhancing security in CRNs
Subcarrier Pairing as Channel Gain Tailoring: Joint Resource Allocation for Relay-Assisted Secure OFDMA with Untrusted Users
Joint resource allocation involving optimization of subcarrier allocation,
subcarrier pairing (SCP), and power allocation in a cooperative secure
orthogonal frequency division multiple access (OFDMA) communication system with
untrusted users is considered. Both amplify and forward (AF), and decode and
forward (DF) modes of operations are considered with individual power budget
constraints for source and relay. After finding optimal subcarrier allocation
for an AF relayed system, we prove the joint power allocation as a generalized
convex problem, and solve it optimally. Compared to the conventional channel
gain matching view, the optimal SCP is emphasized as a novel concept of channel
gain tailoring. We prove that the optimal SCP pairs subcarriers such that the
variance among the effective channel gains is minimized. For a DF relayed
system, we show that depending on the power budgets of source and relay, SCP
can either be in a subordinate role where it improves the energy efficiency, or
in a main role where it improves the spectral efficiency of the system. In an
AF relayed system we confirm that SCP plays a crucial role, and improves the
spectral efficiency of the system. The channel gain tailoring property of SCP,
various roles of SCP in improving the spectral and the energy efficiency of a
cooperative communication system are validated with the help of simulation
results
Trajectory and power design for aerial CRNs with colluding eavesdroppers
Unmanned aerial vehicles (UAVs) can provide wireless access services to
terrestrial users without geographical limitations and will become an essential
part of the future communication system. However, the openness of wireless
channels and the mobility of UAVs make the security of UAV-based communication
systems particularly challenging. This work investigates the security of aerial
cognitive radio networks (CRNs) with multiple uncertainties colluding
eavesdroppers. A cognitive aerial base station transmits messages to cognitive
terrestrial users using the spectrum resource of the primary users. All
secondary terrestrial users and illegitimate receivers jointly decode the
received message. The average secrecy rate of the aerial CRNs is maximized by
jointly optimizing the UAV's trajectory and transmission power. An iterative
algorithm based on block coordinate descent and successive convex approximation
is proposed to solve the non-convex mixed-variable optimization problem.
Numerical results verify the effectiveness of our proposed algorithm and show
that our scheme improves the secrecy performance of airborne CRNs.Comment: 10 pages, 7 figures.submitted to the IEEE journal for revie
Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70
On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying with Cooperative Jamming and SWIPT
This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV)
aided transmission protocol, where a source (Alice) sends confidential
information to a destination (Bob) via an energy-constrained UAV-mounted
amplify-and-forward (AF) relay in the presence of a ground eavesdropper (Eve).
We adopt destination-assisted cooperative jamming (CJ) as well as simultaneous
wireless information and power transfer (SWIPT) at the UAV-mounted relay to
enhance physical-layer security (PLS) and transmission reliability. Assuming a
low altitude UAV, we derive connection probability (CP), secrecy outage
probability (SOP), instantaneous secrecy rate, and average secrecy rate (ASR)
of the proposed protocol over Air-Ground (AG) channels, which are modeled as
Rician fading with elevation-angel dependent parameters. By simulations, we
verify our theoretical results and demonstrate significant performance
improvement of our protocol, when compared to conventional transmission
protocol with ground relaying and UAV-based transmission protocol without
destination-assisted jamming. Finally, we evaluate the impacts of different
system parameters and different UAV's locations on the proposed protocol in
terms of ASR.Comment: 10 pages, 9 figures, Submitted for possible journal publicatio
- …