TY - JOUR
T1 - Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers
AU - Xu, Xiaoming
AU - He, Biao
AU - Yang, Weiwei
AU - Zhou, Xiangyun
AU - Cai, Yueming
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/2
Y1 - 2016/2
N2 - In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter- receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols. Index Terms-Physical layer security, cognitive radio networks, on-off transmission, secrecy guard zone.
AB - In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter- receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols. Index Terms-Physical layer security, cognitive radio networks, on-off transmission, secrecy guard zone.
UR - http://www.scopus.com/inward/record.url?scp=85011712573&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2015.2500178
DO - 10.1109/TIFS.2015.2500178
M3 - Article
SN - 1556-6013
VL - 11
SP - 373
EP - 387
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 2
M1 - 7328286
ER -