DocumentCode
1915
Title
Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks
Author
Hyoungsuk Jeon ; McLaughlin, Steven W. ; Il-Min Kim ; Jeongseok Ha
Author_Institution
Dept. of Electr. Eng., Korea Adv. Inst. of Sci. & Technol., Daejeon, South Korea
Volume
13
Issue
4
fYear
2014
fDate
Apr-14
Firstpage
1790
Lastpage
1805
Abstract
We consider a cooperation scenario between primary users and untrusted secondary users in cognitive radio networks. The secondary users are willing to help the primary users to relay the primary users´ messages in reward for being allowed to share the primary users´ spectrum bands. However, the primary users might be reluctant to accept this help, since the secondary users are untrustworthy and may try unauthorized decoding of the primary users´ messages. This paper will answer the question: when is this cooperation mutually beneficial for primary and secondary users? Taking an approach of information-theoretic secrecy, such as coding techniques for wiretap channels, the primary users can allow the secondary users to sense and relay the message, while ensuring that the secondary users are ignorant of the primary users´ messages. We characterize an achievable secrecy rate of primary users with a rate of the secondary users´ communication. From the derived rate pairs, an optimization problem is formulated such that the secondary transmitter distributes its transmit power to maximize its data rate while providing a higher secrecy rate to the primary users. We demonstrate that this cooperation can provide a positive secrecy rate, even when a non-cooperative scheme achieves a zero secrecy rate.
Keywords
amplify and forward communication; cognitive radio; cooperative communication; network coding; optimisation; protocols; radio spectrum management; radio transmitters; relay networks (telecommunication); telecommunication security; amplify-and-forward relay protocol; coding techniques; cognitive radio networks; cooperation scenario; data rate maximization; eavesdropping; information-theoretic secrecy; noncooperative scheme; optimization problem; positive secrecy rate; primary user secrecy rate; secondary transmitter; secure communications; spectrum band sharing; unauthorized decoding; untrusted secondary nodes; wiretap channels; zero secrecy rate; Cognitive radio; Decoding; Joints; Radio transmitters; Receivers; Relays; Amplify-and-forward relay protocol; cognitive radio; eavesdropping; information-theoretic secrecy; untrusted secondary users; wiretap channel;
fLanguage
English
Journal_Title
Wireless Communications, IEEE Transactions on
Publisher
ieee
ISSN
1536-1276
Type
jour
DOI
10.1109/TWC.2013.021214.130089
Filename
6747289
Link To Document