26 research outputs found

    Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems

    Full text link

    Performance of multi-hop cognitive MIMO relaying networks with joint constraint of intercept probability and limited interference

    Get PDF
    In this paper, we propose a multi-hop multiple input multiple output (MIMO) decode-and-forward relaying protocol in cognitive radio networks. In this protocol, a multi-antenna secondary source attempts to send its data to a multi-antenna secondary destination with assistance of multiple intermediate multi-antenna nodes, in presence of a multi-antenna secondary eavesdropper. A primary network includes a primary transmitter and a primary receiver which are equipped with multiple antennas, and use transmit antenna selection (TAS) and selection combining (SC) to communicate with each other. Operating on the underlay spectrum sharing method, the secondary source and relay nodes have to adjust their transmit power so that the outage performance of the primary network is not harmful and satisfy the quality of service (QoS). Moreover, these secondary nodes also reduce their transmit power so that the intercept probability (IP) at the eavesdropper at each hop is below a desired value. To improve the outage performance of the secondary network under the joint constraint of IP and limited interference, the TAS/SC method is employed to relay the source data hop-by-hop to the destination. We derived exact closed-form expressions of the end-to-end (e2e) outage probability (OP) and IP of the proposed protocol over Rayleigh fading channels. Monte Carlo simulations are then performed to verify the theoretical derivations

    Physical layer security enhancement in multi-user multi-full-duplex-relay networks

    Get PDF
    We propose a novel joint user and full-duplex (FD) relay selection (JUFDRS) scheme to enhance physical layer security in a multi-user multi-relay network. In this scheme, the user and the FD decode-and-forward relay are selected such that the capacity of the end-to-end channel (i.e., the user-relaydestination channel) is maximized to ensure the highest quality of cooperative transmission. In order to fully examine the benefits of the JUFDRS scheme, we derive a new closed-form expression for the secrecy outage probability. We show that the JUFDRS scheme significantly outperforms the joint user and half-duplex relay selection (JUHDRS) scheme when the self-interference at the FD relay can be reasonably suppressed. This result indicates that adopting the FD technique at relays can effectively enhance the physical layer secrecy performance in the multi-user multirelay network.ARC Discovery Projects Grant DP150103905

    Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks

    Get PDF
    This paper investigates the secrecy outage performance of transmit antenna selection (TAS)/maximal ratio combining (MRC) in multiple input multiple output (MIMO) cognitive radio networks (CRNs) over Rayleigh fading channels. In the considered system, a secondary user (SU-TX) equipped with NA (NA 1) antennas uses TAS to transmit confidential messages to another secondary user (SU-RX), which is equipped with NB (NB 1) antennas and adopts MRC scheme to process multiple received signals. Meanwhile, an eavesdropper equipped with NE (NE 1) antennas also adopts MRC scheme to overhear the transmitted information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the quality of service of the primary user without spectrum sensing. In this paper, we derive the exact and asymptotic closed-form expressions for the secrecy outage probability. Simulations are conducted to validate the accuracy of the analysis.ARC Discovery Projects Grant DP150103905

    Efficient Advanced Encryption Standard for Securing Cognitive Radio Networks

    Get PDF
    During the last decade, the CR (Cognitive Radio) came into view as a major wireless technology to resolve the issue of spectrum secrecy and efficient spectrum utilization. However, due to unlicensed (secondary) users, there are various security threats to the CRN (Cognitive Radio Networks). Some malicious users may access the CRN and mislead the secondary users to vacate the occupied channel, which may stop the communication. In this work, we propose a new cryptographic-based algorithm, CRAES (Cognitive Radio-Advanced Encryption Standard), inspired by the traditional AES to secure the CRN. The data of the primary and secondary users is encrypted at the transmitter and decrypted at the receiver. Unlike the conventional AES, we introduce the data-dependent key-generation and shift-rows process. We also reduce the rounds of AES from 10-6 to improve the computational efficiency without compromising the overall security. The experimental results demonstrate the effectiveness of the proposed CR-AES in terms of better security, reliability, and computational efficiency
    corecore