scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Transmit antenna selection in MIMO Cognitive Radio networks

TL;DR: Transmit Antenna Selection (TAS) scheme in MIMO CR network has been proposed for improving the physical layer security compared to SRS and MRS schemes in CR network.
Abstract: One of the methods to solve the problem of spectrum demand is spectrum sharing and can be achieved using Cognitive Radio (CR) network. The problem in CR network is physical layer security. The physical layer security can be improved using relays in the secondary network. There are two types of relay slection schemes which are Single Relay Selection (SRS) and Multiple Relay Selection (MRS) schemes. In SRS and MRS schemes, the coordination between primary and secondary network is lost due to mutual interference which results in imperfect Channel State Information (CSI). In this paper,Transmit Antenna Selection (TAS) scheme in MIMO CR network has been proposed for improving the physical layer security compared to SRS and MRS schemes in CR network. The physical layer security is analyzed through Security Reliability Tradeoff (SRT) in terms of Outage Probability (OP) and Intercept Probability (IP) for SRS, MRS and TAS schemes. Simulation results show that SRT performance of TAS scheme in MIMO CR network is better than SRS and MRS schemes.
References
More filters
Proceedings ArticleDOI
07 Nov 2004
TL;DR: To improve radio sensitivity of the sensing function through processing gain, three digital signal processing techniques are investigated: matched filtering, energy detection and cyclostationary feature detection.
Abstract: There are new system implementation challenges involved in the design of cognitive radios, which have both the ability to sense the spectral environment and the flexibility to adapt transmission parameters to maximize system capacity while coexisting with legacy wireless networks. The critical design problem is the need to process multigigahertz wide bandwidth and reliably detect presence of primary users. This places severe requirements on sensitivity, linearity and dynamic range of the circuitry in the RF front-end. To improve radio sensitivity of the sensing function through processing gain we investigated three digital signal processing techniques: matched filtering, energy detection and cyclostationary feature detection. Our analysis shows that cyclostationary feature detection has advantages due to its ability to differentiate modulated signals, interference and noise in low signal to noise ratios. In addition, to further improve the sensing reliability, the advantage of a MAC protocol that exploits cooperation among many cognitive users is investigated.

2,806 citations


"Transmit antenna selection in MIMO ..." refers background in this paper

  • ...Cognitive Radio (CR) network face many problems during Spectrum Sharing (SS) [1], Spectrum Sensing [2], Spectrum Management [3] and Spectrum mobility [4, 5]....

    [...]

Journal ArticleDOI
TL;DR: Recent developments and open research issues in spectrum management in CR networks are presented and four main challenges of spectrum management are discussed: spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility.
Abstract: Cognitive radio networks will provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. However, CR networks impose challenges due to the fluctuating nature of the available spectrum, as well as the diverse QoS requirements of various applications. Spectrum management functions can address these challenges for the realization of this new network paradigm. To provide a better understanding of CR networks, this article presents recent developments and open research issues in spectrum management in CR networks. More specifically, the discussion is focused on the development of CR networks that require no modification of existing networks. First, a brief overview of cognitive radio and the CR network architecture is provided. Then four main challenges of spectrum management are discussed: spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility.

1,722 citations


"Transmit antenna selection in MIMO ..." refers background in this paper

  • ...Eavesdropping is the other main issue that happens in the transmission from secondary transmitter to secondary destination [9]....

    [...]

Journal ArticleDOI
TL;DR: Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.
Abstract: Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel conditions: absent feedback, they are typically feasible only when the source-destination channel is better than the source-eavesdropper channel. Node cooperation is a means to overcome this challenge and improve the performance of secure wireless communications. This paper addresses secure communications of one source-destination pair with the help of multiple cooperating relays in the presence of one or more eavesdroppers. Three cooperative schemes are considered: decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming (CJ). For these schemes, the relays transmit a weighted version of a reencoded noise-free message signal (for DF), a received noisy source signal (for AF), or a common jamming signal (for CJ). Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or, minimize the transmit power subject to a secrecy rate constraint. For DF in the presence of one eavesdropper, closed-form optimal solutions are derived for the relay weights. For other problems, since the optimal relay weights are difficult to obtain, several criteria are considered leading to suboptimal but simple solutions, i.e., the complete nulling of the message signals at all eavesdroppers (for DF and AF), or the complete nulling of jamming signal at the destination (for CJ). Based on the designed relay weights, for DF in the presence of multiple eavesdroppers, and for CJ in the presence of one eavesdropper, the optimal power allocation is obtained in closed-form; in all other cases the optimal power allocation is obtained via iterative algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results show that the proposed design can significantly improve the performance of secure wireless communications.

1,385 citations


"Transmit antenna selection in MIMO ..." refers methods in this paper

  • ...Fig 2 shows the system model for Relay Selection scheme in CR network, where both SD and E are out of coverage area of ST [16, 17]....

    [...]

Journal ArticleDOI
TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Abstract: This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area.

1,294 citations


"Transmit antenna selection in MIMO ..." refers background in this paper

  • ...The primary aim is to determine the SRT of CR network in presence of multiple secondary relay and in terms of outage probability and intercept probability [13]....

    [...]

Journal ArticleDOI
TL;DR: This paper investigates the capacity gains offered by this dynamic spectrum sharing approach when channels vary due to fading and quantifies the relation between the secondary channel capacity and the interference inflicted on the primary user.
Abstract: Traditionally, the frequency spectrum is licensed to users by government agencies in a rigid manner where the licensee has the exclusive right to access the allocated band. Therefore, licensees are protected from any interference all the time. From a practical standpoint, however, an unlicensed (secondary) user may share a frequency band with its licensed (primary) owner as long as the interference it incurs is not deemed harmful by the licensee. In a fading environment, a secondary user may take advantage of this fact by opportunistically transmitting with high power when its signal, as received by the licensed receiver, is deeply faded. In this paper we investigate the capacity gains offered by this dynamic spectrum sharing approach when channels vary due to fading. In particular, we quantify the relation between the secondary channel capacity and the interference inflicted on the primary user. We further evaluate and compare the capacity under different fading distributions. Interestingly, our results indicate a significant gain in spectrum access in fading environments compared to the deterministic case

1,047 citations


"Transmit antenna selection in MIMO ..." refers background in this paper

  • ...One of the main problem in CR networks is security [6, 7]....

    [...]