Computer Science ›› 2016, Vol. 43 ›› Issue (4): 163-166.doi: 10.11896/j.issn.1002-137X.2016.04.033

Previous Articles     Next Articles

Time-bandwidth Allocation Scheme for Physical Layer Security in Cooperative Cognitive Radio Networks

GAO Rui-feng, NI Dan-yan, BAO Zhi-hua and HU Ying-dong   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Cognitive radio (CR) technology is one of the strong candidate technologies to solve the spectrum scarcity problems.We proposed a time-bandwidth allocation scheme for physical layer security in cognitive radio networks,in which the primary users (PUs) communicate with the help of the secondary users (SUs).As feedback,PUs share the bandwidth with SUs for the communication of the secondary network.Particularly,we selected two SUs,a relay SU and a jammer SU,to maximize the physical secrecy capacity of the PUs on the premise of meeting the lowest transmission rate requirement of the SUs.The optimal bandwidth allocation factor,time allocation factor and the cooperative power allocation of the SUs were given in this paper.Numerical results show that the proposed scheme can improve the secrecy capacity of the PUs significantly.

Key words: Cooperative cognitive radio networks,Physical security,Time allocation,Bandwidth allocation

[1] Wei Ji-bo,Wang Shan,Zhao Hai-tao.Cognitive wireless net-works:key techniques and sate of the art [J].Journal on Communications,2011(11):147-158(in Chinese) 魏急波,王杉,赵海涛.认知无线网络:关键技术与研究现状[J].通信学报,2011(11):147-158
[2] Zhou Xian-wei,Meng Tan,Wang Li-na,et al.Summary of the Research on Cognitive Radio[J].Telecommunication Engineering,2006(6):1-6(in Chinese) 周贤伟,孟潭,王丽娜,等.认知无线电研究综述[J].电讯技术,2006(6):1-6
[3] Kartalopoulos S V.A primer on cryptography in communica-tions[J].Communications Magazine,IEEE,2006,4(4):146-51
[4] Zhou Jian,Zhou Xian-wei,Sun Li-yan.Key exchange protocols of cognitive radio based on self certified[J].Computer Science,2010,37(6):94-96(in Chinese) 周健,周贤伟,孙丽艳.基于自认证的认知无线电密钥交换协议研究[J].计算机科学,2010,37(6):94-96
[5] Shannon C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,8(4):656-715
[6] Wyner A D.The wire-tap channel[J].Bell System TechnicalJournal,1975,4(8):1355-1387
[7] Lun D,Zhu H,Petropulu A P,et al.Improving Wireless Physical Layer Security via Cooperating Relays[J].IEEE Transactions on Signal Processing,2010,8(3):1875-1888
[8] Maric I,Yates R D.Bandwidth and Power Allocation for Coo-perative Strategies in Gaussian Relay Networks[J].IEEE Tran-sactions on Information Theory,2010,6(4):1880-1889
[9] Haohao Q,Xiang C,Yin S,et al.Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications[C]∥2011 IEEE International Conference on Communications Workshops (ICC).2011:5-9
[10] Zou Y,Zhu J,Wang X,et al.Improving physical-layer security in wireless communications using diversity techniques[J].Network,IEEE,2015,9(1):42-48
[11] Ning Z,Ning L,Nan C,et al.Towards secure communications in cooperative cognitive radio networks[C]∥2013 IEEE/CIC International Conference on Communications in China (ICCC).2013:12-14
[12] Jain A,Kulkarni S R,Verdu S.Energy Efficiency of Decode-and-Forward for Wideband Wireless Multicasting[J].IEEE Transactions on Information Theory,2011,7(12):7695-713
[13] Ning K,et al.Performance Comparison Among ConventionalSelection Combining[C]∥2009 IEEE International Conference on Optimum Selection Combining and Maximal Ratio Combining(ICC’09).2009:14-18

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!