Computer Science ›› 2017, Vol. 44 ›› Issue (9): 172-177.doi: 10.11896/j.issn.1002-137X.2017.09.033

Previous Articles     Next Articles

Design for Improving Energy-efficiency and Ensuring Physical-layer Security in Full-duplex Cognitive Relay Networks

ZHANG Pei, ZHANG Jian-ming and WANG Liang-min   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Under the “green” and secure communication background,we studied the co-time co-frequency full-duplex cognitive relay networks consisting of two secondary source nodes,multiple cognitive relay nodes,multiple primary nodes and multiple primary eavesdroppers.To improve the total energy efficiency on the premise of ensuring the physical-layer security and the primary node’s performance whether the selection relay protocol is the amplify-and-forward or decode-and-forward,we proposed the power allocation schemes to obtain a cooperative beamforming coefficient and an artificial noise matrix after taking both self-cancellation and forwarding fairness into consideration.It is mainly optimized by the “hill climbing” algorithm that combines the semidefinite relaxation (SDR) technology.Simulation results and theoretical analysis show the effectiveness and rationality of our scheme.Moreover,the choice of amplify-and-forward relay protocol contributes to the higher total energy efficiency.

Key words: Green communication,Physical-layer security,Cognitive relay networks,Energy-efficiency,Co-time co-frequency full-duplex,SDR

[1] CHEN Y,ZHANG S,XU S,et al.Fundamental trade-offs on green wireless networks[J].IEEE Communications Magazine,2011,49(6):30-37.
[2] NOSRATINIA A,HUNTER T E,Hedayat A.Cooperative com-munication in wireless networks[J].IEEE Communications Magazine,2004,42(10):74-80.
[3] HAYKIN S.Cognitive radio:brain-empowered wireless communications[J].IEEE Journal on Selected Areas in Communications,2005,23(2):201-220.
[4] ZHANG D D,WANG X,ZHANG Z S.Key techniques research on full duplex wireless communications[J].Science in China Series F:Information Science,2014,4(8):951-964.(in Chinese) 张丹丹,王兴,张中山.全双工通信关键技术研究[J].中国科学:信息科学,2014,4(8):951-964.
[5] COVER T,GAMAL A E L.Capacity theorems for the relay channel[J].IEEE Transactions on Information Theory,1979,25(5):572-584.
[6] WANG Q H,WANG H M,YIN Q Y.Distributed beamforming for multi-relay cognitive radio systems[J].Science in China Series F:Information Sciences,2014,44(8):980-992.(in Chinese) 王群欢,王慧明,殷勤业.认知无线电系统中的多中继分布式波束成形方法[J].中国科学:信息科学,2014,44(8):980-992.
[7] LI Y,SUN L,ZHAO C,et al.A digital self-interference cancellation algorithm based on spectral estimation in co-time co-frequency full duplex system[C]∥2015 10th International Confe-rence on Computer Science & Education (ICCSE).IEEE,2015:412-415.
[8] MUKHERJEE A,FAKOORIAN S A A,HUANG J,et al.Principles of physical layer security in multiuser wireless networks:A survey[J].IEEE Communications Surveys & Tutorials,2014,16(3):1550-1573.
[9] LI L,HUANG C,CHEN Z.Cooperative secrecy beamforming in wiretap interference channels[J].IEEE Signal Processing Letters,2015,22(12):2435-2439.
[10] GOEL S,NEGI R.Guaranteeing secrecy using artificial noise[J].IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
[11] CHEN J,ZHANG R,SONG L,et al.Joint relay and jammer selection for secure decode-and-forward two-way relay networks[C]∥IEEE International Conference Proc.of communications (ICC).2011.
[12] CHEN J,ZHANG R,SONG L,et al.Joint relay and jammer selection for secure two-way relay networks[J].IEEE Transactions on Information Forensics and Security,2012,7(1):310-320.
[13] FRAGKIADAKIS A G,TRAGOS E Z,A SKOXYLAKIS I G.A survey on security threats and detection techniques in cognitive radio networks[J].IEEE Communications Surveys & Tutorials,2013,15(1):428-445.
[14] PEI Y,LIANG Y C,ZHANG L,et al.Secure communicationover MISO cognitive radio channels[J].IEEE Transactions on Wireless Communications,2010,9(4):1494-1502.
[15] PEI Y,LIANG Y C,TEH K C,et al.Secure communication in multiantenna cognitive radio networks with imperfect channel state information[J].IEEE Transactions on Signal Processing,2011,59(4):1683-1693.
[16] WANG C,WANG H M.On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1814-1827.
[17] ALAVI F,SAEEDI H.Radio resource allocation to providephysical layer security in relay-assisted cognitive radio networks[J].IET Communications,2015,9(17):2124-2130.
[18] ZOU Y,ZHU J,YANG L,et al.Securing physical-layer communications for cognitive radio networks[J].IEEE Communications Magazine,2015,53(9):48-54.
[19] ZHU F,YAO M.Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming[J].IEEE Tran-sactions on Vehicular Technology,2016,65(3):1835-1841.
[20] LUO Z Q,MA W,SO A M C,et al.Semidefinite relaxation of quadratic optimization problems[J].IEEE Signal Processing Magazine,2010,27(3):20.
[21] GRANT M,BOYD S,YE Y.CVX:Matlab software for disci-plined convex programming[J].Golbal Optimization,2008:155-210.
[22] SIDIROPOULOS N D,DAVIDSON T N,L UO Z Q.Transmit beamforming for physical-layer multicasting[J].IEEE Transactions on Signal Processing,2006,54(6):2239-2251.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .