Computer Science ›› 2017, Vol. 44 ›› Issue (7): 89-93.doi: 10.11896/j.issn.1002-137X.2017.07.016

Previous Articles     Next Articles

LDPC Coded Primary Transmitter Authentication Schemes in Cognitive Radio Networks

ZHOU Xue-qian, WU Xiao-fu and YU Xun-jian   

  • Online:2018-11-13 Published:2018-11-13

Abstract: In this paper,the capacity of embedded primary transmitter authentication channel in cognitive radio is investigated.By employing the log-likelihood ratios(LLRs) of a tag bit and its approximation,we showed that the equivalent authentication channel observed by the secondary receiver can be viewed as a binary-input additive white Gaussian noise(BI-AWGN) channel.Then,we investigated the practical performance of the embedded authentication channel with the use of LDPC coding.With the approximate form of LLRs,we found that it performs very close to that of belief propagation decoding over the ideal BI-AWGN channel.Hence,we concluded that a good error-control coding scheme for a BI-AWGN channel is also good for embedded primary transmitter authentication channel,and the proposed approximate form of LLRs can be well exploited to facilitate the computation in practice with low complexity.

Key words: Cognitive radio,Embedded authentication channel,Log-likelihood ratios(LLRs),Binary-input additive white Gaussian noise(BI-AWGN) channel,Error-control coding

[1] STOTAS S,NALLANATHAN A.Enhancing the Capacity of Spectrum Sharing Cognitive Radio Networks [J].IEEE Tran-sactions on Vehicular Technology,2011,60(8):3768-3779.
[2] ZHAO C D,XIE L,JIANG X Y,et al.A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks[C]∥2010 International Conference on Communications and Mobile Computing (CMC).2010:154-158.
[3] SHU Z H,QIAN Y,CI S.On physical layer security for cognitive radio networks [J].IEEE Network,2013,27(3):28-33.
[4] SHANNON C E.Probability of error for optimal codes in a Gaussian channel [J].Bell System Technical Journal,1959,38(3):611-656.
[5] ZOU Y L,WANG X B,SHEN W M.Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks [J].IEEE Transactions on Communications,2013,61(12):5103-5113.
[6] SAKRAN H,SHOKAIR M,NASR O,et al.Proposed relay selection scheme for physical layer security in cognitive radio networks [J].IET Communications,2012,6(16):2676-2687.
[7] TAN X,BORLE K,DU W,et al.Cryptographic link signatures for spectrum usage authentication in cognitive radio [C]∥Proc.2011 ACM WiSec.2011:79-90.
[8] JIANG T,ZENG H,YAN Q,et al.On the limitation of embedding cryptographic signature for primary transmitter authentication [J].IEEE Wireless Communication Letter,2012,1(4):324-327.
[9] BORLE K M,CHEN B,DU W K.Physical Layer Spectrum Usa-ge Authentication in Cognitive Radio:Analysis and Implementation [J].IEEE Transaction Inference Forensics Security,2015,10(10):2225-2235.
[10] IDA A,FUJII T.Physical layer security using multi-band transmission considering channel selection for cognitive radio networks [C]∥Signal and Information Processing Association,Annual Summit and Conference(APSIPA).2014:1-5.
[11] ZOU Y L,ZHU J,YANG L Q,et al.Securing physical-layercommunications for cognitive radio networks [J].IEEE Communications,2015,53(9):48-54.
[12] CEPHELI O,KURT G K.Physical layer security in cognitive radio networks:A beamforming approach [C]∥First International Black Sea Conference Communications and Networking(BlackSeaCom).2013:233-237.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!