This paper considers the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user and designs four transmission protocols to achieve the secure transmission in the CR network.
Abstract:
In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter–receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
TL;DR: Two schemes to improve the sum rate of SUs while guaranteeing the secrecy rate of PU and the principle of interference alignment is employed to eliminate interference from PU and other SUs at each secondary receiver and the interference from SUs is zero-forced at the primary receiver.
TL;DR: In this article, the authors analyzed the covert communication between Alice and Bob subject to given requirements on the covertness against Willie and the reliability of decoding at Bob, and obtained interesting findings on the impacts of the density and the transmit power of the concurrent interferers on covert throughput.
TL;DR: A tractable analysis framework to evaluate the reliability and security performance of cooperative non-orthogonal multiple access (co-NOMA) in cognitive networks, where both a primary base station and a NOMA-strong primary user (PU) send confidential messages to multiple uniformly distributed PUs in the presence of randomly located external eavesdroppers is developed.
TL;DR: A framework to study the SE and EE for secure transmission in underlay random cognitive radio (CR) networks where the primary, secondary, and eavesdropper nodes are randomly distributed according to Poisson point processes is developed and an iterative algorithm is proposed based on the separation optimization of the transmission power and the intensity.
TL;DR: With RKRL, cognitive radio agents may actively manipulate the protocol stack to adapt known etiquettes to better satisfy the user's needs and transforms radio nodes from blind executors of predefined protocols to radio-domain-aware intelligent agents that search out ways to deliver the services the user wants even if that user does not know how to obtain them.
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Q1. What are the contributions in "Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers" ?
In this paper, the authors study physical layer security in an underlay cognitive radio ( CR ) network. The authors consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. The authors give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, the authors determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints.
Q2. What have the authors stated for future works in "Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers" ?
One interesting future research direction is to investigate the scenario where the encoding rates can be designed. Thus, it is interesting to study the impact of having imperfect CSI at the receiver on the design of secure CR networks. The authors can further analyze the benefits brought by the design of encoding rates by comparing the achievable secrecy throughput in such a scenario and the achievable secrecy throughput in this work. The authors first determine the dependence of η on r and µ. Substituting ( 39 ) and ( 41 ) into ( 11 ), the secrecy throughput η can be derived as η= I0d α SP exp ( −πλEr2 ) max { 2RB − 1, µ } σ2dαSD + I0dαSP × LZΦ̃E ( max { 2RB−1, µ } σ2dαSD+I0d α SP ( 2RB−RS−1 ) σ2 ) RS. ( 53 ) Taking first-order derivative of η with respect to r, they obtain ∂η ( r, µ ) ∂r =−2π