26 research outputs found
Performance of multi-hop cognitive MIMO relaying networks with joint constraint of intercept probability and limited interference
In this paper, we propose a multi-hop multiple input multiple output (MIMO) decode-and-forward relaying protocol in cognitive radio networks. In this protocol, a multi-antenna secondary source attempts to send its data to a multi-antenna secondary destination with assistance of multiple intermediate multi-antenna nodes, in presence of a multi-antenna secondary eavesdropper. A primary network includes a primary transmitter and a primary receiver which are equipped with multiple antennas, and use transmit antenna selection (TAS) and selection combining (SC) to communicate with each other. Operating on the underlay spectrum sharing method, the secondary source and relay nodes have to adjust their transmit power so that the outage performance of the primary network is not harmful and satisfy the quality of service (QoS). Moreover, these secondary nodes also reduce their transmit power so that the intercept probability (IP) at the eavesdropper at each hop is below a desired value. To improve the outage performance of the secondary network under the joint constraint of IP and limited interference, the TAS/SC method is employed to relay the source data hop-by-hop to the destination. We derived exact closed-form expressions of the end-to-end (e2e) outage probability (OP) and IP of the proposed protocol over Rayleigh fading channels. Monte Carlo simulations are then performed to verify the theoretical derivations
Physical layer security enhancement in multi-user multi-full-duplex-relay networks
We propose a novel joint user and full-duplex (FD)
relay selection (JUFDRS) scheme to enhance physical layer
security in a multi-user multi-relay network. In this scheme, the
user and the FD decode-and-forward relay are selected such
that the capacity of the end-to-end channel (i.e., the user-relaydestination
channel) is maximized to ensure the highest quality of
cooperative transmission. In order to fully examine the benefits
of the JUFDRS scheme, we derive a new closed-form expression
for the secrecy outage probability. We show that the JUFDRS
scheme significantly outperforms the joint user and half-duplex
relay selection (JUHDRS) scheme when the self-interference at
the FD relay can be reasonably suppressed. This result indicates
that adopting the FD technique at relays can effectively enhance
the physical layer secrecy performance in the multi-user multirelay
network.ARC Discovery Projects Grant DP150103905
Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks
This paper investigates the secrecy outage performance
of transmit antenna selection (TAS)/maximal ratio
combining (MRC) in multiple input multiple output (MIMO)
cognitive radio networks (CRNs) over Rayleigh fading channels.
In the considered system, a secondary user (SU-TX) equipped
with NA (NA 1) antennas uses TAS to transmit confidential
messages to another secondary user (SU-RX), which is equipped
with NB (NB 1) antennas and adopts MRC scheme to
process multiple received signals. Meanwhile, an eavesdropper
equipped with NE (NE 1) antennas also adopts MRC scheme
to overhear the transmitted information between SU-TX and
SU-RX. SU-TX adopts the underlay strategy to guarantee the
quality of service of the primary user without spectrum sensing.
In this paper, we derive the exact and asymptotic closed-form
expressions for the secrecy outage probability. Simulations are
conducted to validate the accuracy of the analysis.ARC Discovery Projects Grant DP150103905
Efficient Advanced Encryption Standard for Securing Cognitive Radio Networks
During the last decade, the CR (Cognitive Radio) came into view as a major wireless technology to resolve the issue of spectrum secrecy and efficient spectrum utilization. However, due to unlicensed (secondary) users, there are various security threats to the CRN (Cognitive Radio Networks). Some malicious users may access the CRN and mislead the secondary users to vacate the occupied channel, which may stop the communication. In this work, we propose a new cryptographic-based algorithm, CRAES (Cognitive Radio-Advanced Encryption Standard), inspired by the traditional AES to secure the CRN. The data of the primary and secondary users is encrypted at the transmitter and decrypted at the receiver. Unlike the conventional AES, we introduce the data-dependent key-generation and shift-rows process. We also reduce the rounds of AES from 10-6 to improve the computational efficiency without compromising the overall security. The experimental results demonstrate the effectiveness of the proposed CR-AES in terms of better security, reliability, and computational efficiency