Physical-layer security with multiuser scheduling in cognitive radio networks

Download
  1. Get@NRC: Physical-layer security with multiuser scheduling in cognitive radio networks (Opens in a new window)
DOIResolve DOI: http://doi.org/10.1109/TCOMM.2013.111213.130235
AuthorSearch for: ; Search for: ; Search for:
TypeArticle
Journal titleIEEE Transactions on Communications
ISSN0090-6778
Volume61
Issue12
Article number6678044
Pages51035113; # of pages: 11
SubjectAchievable secrecy rates; Cognitive base stations; Cognitive radio network; Cognitive transmissions; Diversity order; Multiuser scheduling; Physical-layer securities; Quality of Service constraints; Cognitive radio; Electric circuit breakers; Probability; Quality of service; Radio systems; Rayleigh fading; Scheduling
AbstractIn this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's quality of service (QoS) constraint while the eavesdroppers attempt to intercept the cognitive transmissions from CUs to CBS. We investigate the physical-layer security against eavesdropping attacks in the cognitive radio network and propose the user scheduling scheme to achieve multiuser diversity for improving the security level of cognitive transmissions with a primary QoS constraint. Specifically, a cognitive user (CU) that satisfies the primary QoS requirement and maximizes the achievable secrecy rate of cognitive transmissions is scheduled to transmit its data packet. For the comparison purpose, we also examine the traditional multiuser scheduling and the artificial noise schemes. We analyze the achievable secrecy rate and intercept probability of the traditional and proposed multiuser scheduling schemes as well as the artificial noise scheme in Rayleigh fading environments. Numerical results show that given a primary QoS constraint, the proposed multiuser scheduling scheme generally outperforms the traditional multiuser scheduling and the artificial noise schemes in terms of the achievable secrecy rate and intercept probability. In addition, we derive the diversity order of the proposed multiuser scheduling scheme through an asymptotic intercept probability analysis and prove that the full diversity is obtained by using the proposed multiuser scheduling. © 2013 IEEE.
Publication date
LanguageEnglish
AffiliationNational Research Council Canada (NRC-CNRC)
Peer reviewedYes
NPARC number21270913
Export citationExport as RIS
Report a correctionReport a correction
Record identifier200126c6-855f-45ad-872c-2a1af72da037
Record created2014-02-18
Record modified2016-05-09
Bookmark and share
  • Share this page with Facebook (Opens in a new window)
  • Share this page with Twitter (Opens in a new window)
  • Share this page with Google+ (Opens in a new window)
  • Share this page with Delicious (Opens in a new window)