DocumentCode
59258
Title
On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels
Author
Chao Wang ; Hui-Ming Wang
Author_Institution
Sch. of Electron. & Inf. Eng., Xian Jiaotong Univ., Xian, China
Volume
9
Issue
11
fYear
2014
fDate
Nov. 2014
Firstpage
1814
Lastpage
1827
Abstract
This paper studies the secure multiple-antenna transmission in slow fading channels for the cognitive radio network, where a multiple-input, single-output, multieavesdropper (MISOME) primary network coexisting with a multiple-input single-output secondary user (SU) pair. The SU can get the transmission opportunity to achieve its own data traffic by providing the secrecy guarantee for the PU with artificial noise. Different from the existing works, which adopt the instantaneous secrecy rate as the performance metric, with only the statistical channel state information (CSI) of the eavesdroppers, we maximize the secrecy throughput of the PU by designing and optimizing the beamforming, rate parameters of the wiretap code adopted by the PU, and power allocation between the information signal and the artificial noise of the SU, subjected to the secrecy outage constraint at the PU and a throughput constraint at the SU. We propose two design strategies: 1) nonadaptive secure transmission strategy (NASTS) and 2) adaptive secure transmission strategy, which are based on the statistical and instantaneous CSIs of the primary and secondary links, respectively. For both strategies, the exact rate parameters can be optimized through numerical methods. Moreover, we derive an explicit approximation for the optimal rate parameters of the NASTS at high SNR regime. Numerical results are illustrated to show the efficiency of the proposed schemes.
Keywords
cognitive radio; fading channels; telecommunication security; telecommunication traffic; CSI; MISO cognitive radio network; MISOME; NASTS; SNR; channel state information; data traffic; fading channels; multiple-antenna transmission; multiple-input single-output multieavesdropper; multiple-input single-output secondary user; nonadaptive secure transmission strategy; power allocation; Communication system security; Fading; Noise; Resource management; Security; Throughput; Wireless communication; Cognitive radio; artificial noise; physical layer security; power allocation; secrecy outage; secrecy throughput;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2014.2356339
Filename
6894130
Link To Document