Loading [MathJax]/extensions/MathMenu.js
The Security–Reliability Tradeoff of Multiuser Scheduling-Aided Energy Harvesting Cognitive Radio Networks | IEEE Journals & Magazine | IEEE Xplore

The Security–Reliability Tradeoff of Multiuser Scheduling-Aided Energy Harvesting Cognitive Radio Networks


Abstract:

We study the physical-layer security of a cognitive radio system in the face of multiple eavesdroppers (EDs), which is composed of a secondary base station (SBS), multipl...Show More

Abstract:

We study the physical-layer security of a cognitive radio system in the face of multiple eavesdroppers (EDs), which is composed of a secondary base station (SBS), multiple secondary users (SUs) as well as a pair of primary transmitter (PT) and primary receiver (PR), where the SUs first harvest energy from their received radio frequency signals transmitted by the PT and then communicate with the SBS relying on opportunistic scheduling. We consider two specific user scheduling schemes, namely, the channel-aware user scheduling (CaUS) and the energy-aware user scheduling (EaUS). In the CaUS scheme, an SU having the best instantaneous SU-SBS link (spanning from SUs to SBS) will be activated to communicate with the SBS. By contrast, the EaUS scheme takes into account both the amount of energy harvested from the PT and the instantaneous quality of the SU-SBS link. We analyze the security-reliability tradeoff (SRT) of both the CaUS and EaUS schemes in terms of their intercept versus outage probability. We also provide the SRT analysis of traditional round-robin user scheduling (RrUS) used as a benchmarker of the CaUS and EaUS schemes. We demonstrate that the EaUS scheme achieves the best outage and secrecy performance in the high main-to-eavesdropper ratio (MER) region, but a worse secrecy performance than the CaUS method in the low-MER region. Moreover, from a security versus reliability perspective, the CaUS outperforms both the EaUS and the RrUS in the low-MER region. Surprisingly, this also implies that although the user scheduling criterion of EaUS exploits the knowledge of both the amount of harvested power and instantaneous channel state information (CSI), it exhibits a degraded physical-layer security in the low-MER region due to the fact that the increased harvested energy is beneficial not only for the legitimate SBS receiver but also for the EDs.
Published in: IEEE Transactions on Communications ( Volume: 67, Issue: 6, June 2019)
Page(s): 3890 - 3904
Date of Publication: 10 March 2019

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

Energy harvesting is capable of extracting energy from the surrounding environment, which is emerging as an efficient technique of supplying energy and has been beneficially integrated into cognitive radio (CR) systems [1], [2] for extending the life-time of energy-constrained networks, whilst reducing their deployment cost. There are two widely adopted energy harvesting architectures, namely power splitting (PS) and time switching (TS) [3], [4]. In a PS architecture, the received signal power can be split into two parts, where a certain fraction is used for harvesting energy, while the rest is used for processing the received signal. By contrast, in a TS architecture, the transmission slot is divided into two phases. In the first phase, the system harvests energy from the surrounding environment and the harvested energy is used for transmitting the signal in the second phase. In CR networks, the SUs are vulnerable to both internal as well as to external attacks [5]. Furthermore, due to the broadcast nature of radio propagation, the confidential messages transmitted in the CR networks may become overheard by malicious EDs. Hence, apart from maintaining the reliability of transmission, we have to protect the CR networks against malicious eavesdropping.

Select All
1.
J. Ren, J. Hu, D. Zhang, H. Guo, Y. Zhang and X. Shen, "RF energy harvesting and transfer in cognitive radio sensor networks: Opportunities and challenges", IEEE Commun. Mag., vol. 56, no. 1, pp. 104-110, Jan. 2018.
2.
A. Banerjee, A. Paul and S. P. Maity, "Joint power allocation and route selection for outage minimization in multihop cognitive radio networks with energy harvesting", IEEE Trans. Cogn. Commun. Netw., vol. 4, no. 1, pp. 82-92, Mar. 2018.
3.
R. Zhang and C. K. Ho, "MIMO broadcasting for simultaneous wireless information and power transfer", IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 1989-2001, May 2013.
4.
Y. Liu, S. A. Mousavifar, Y. Deng, C. Leung and M. Elkashlan, "Wireless energy harvesting in a cognitive relay network", IEEE Trans. Wireless Commun., vol. 15, no. 4, pp. 2498-2508, Apr. 2016.
5.
A. Al-Talabani, Y. Deng, A. Nallanathan and H. X. Nguyen, "Enhancing secrecy rate in cognitive radio networks via Stackelberg game", IEEE Trans. Commun., vol. 64, no. 11, pp. 4764-4775, Nov. 2016.
6.
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
7.
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel", IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
8.
X. Chen and Y. Zhang, "Mode selection in MU-MIMO downlink networks: A physical-layer security perspective", IEEE Syst. J., vol. 11, no. 2, pp. 1128-1136, Jun. 2017.
9.
H.-M. Wang, K.-W. Huang, Q. Yang and Z. Han, "Joint source-relay secure precoding for MIMO relay networks with direct links", IEEE Trans. Commun., vol. 65, no. 7, pp. 2781-2793, Jul. 2017.
10.
B. Wang, P. Mu and Z. Li, "Artificial-noise-aided beamforming design in the MISOME wiretap channel under the secrecy outage probability constraint", IEEE Trans. Wireless Commun., vol. 16, no. 11, pp. 7207-7220, Nov. 2017.
11.
C. Jeong, I. M. Kim and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system", IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
12.
Y. Liu, J. Li and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security", IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013.
13.
H.-M. Wang, F. Liu and M. Yang, "Joint cooperative beamforming jamming and power allocation to secure AF relay systems", IEEE Trans. Veh. Technol., vol. 64, no. 10, pp. 4893-4898, Oct. 2015.
14.
H. Deng, H.-M. Wang, J. Yuan, W. Wang and Q. Yin, "Secure communication in uplink transmissions: User selection and multiuser secrecy gain", IEEE Trans. Commun., vol. 64, no. 8, pp. 3492-3506, Aug. 2016.
15.
I. Bang, S. M. Kim and D. K. Sung, "Artificial noise-aided user scheduling for optimal secrecy multiuser diversity", IEEE Commun. Lett., vol. 21, no. 3, pp. 528-531, Mar. 2017.
16.
S. Poursajadi and M. H. Madani, "Analysis and enhancement of joint security and reliability in cooperative networks", IEEE Trans. Veh. Technol., vol. 67, no. 12, pp. 12003-12012, Dec. 2018.
17.
H. Deng, H.-M. Wang, W. Guo and W. Wang, "Secrecy transmission with a helper: To relay or to jam", IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 293-307, Feb. 2015.
18.
Z. Ding, Z. Ma and P. Fan, "Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise", IEEE Trans. Wireless Commun., vol. 13, no. 4, pp. 2189-2203, Apr. 2014.
19.
X. Ding, T. Song, Y. Zou, X. Chen and L. Hanzo, "Security-reliability tradeoff analysis of artificial noise aided two-way opportunistic relay selection", IEEE Trans. Veh. Technol., vol. 66, no. 5, pp. 3930-3941, May 2017.
20.
Y. Wu and X. Chen, "Robust beamforming and power splitting for secrecy wireless information and power transfer in cognitive relay networks", IEEE Commun. Lett., vol. 20, no. 6, pp. 1152-1155, Jun. 2016.
21.
X. Chen, L. Guo, X. Li, C. Dong, J. Lin and P. T. Mathiopoulos, "Secrecy rate optimization for cooperative cognitive radio networks aided by a wireless energy harvesting jammer", IEEE Access, vol. 6, pp. 34127-34134, Jun. 2018.
22.
F. Zhou, Z. Li, J. Cheng, Q. Li and J. Si, "Robust AN-aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT", IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2450-2464, Apr. 2017.
23.
M. Li, H. Yin, Y. Huang, Y. Wang and R. Yu, "Physical layer security in overlay cognitive radio networks with energy harvesting", IEEE Trans. Veh. Technol., vol. 67, no. 11, pp. 11274-11279, Nov. 2018.
24.
H. Lei, M. Xu, I. Ansari, G. Pan, K. Qaraqe and M. Alouini, "On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection", IEEE Trans. Green Commun. Netw., vol. 1, no. 2, pp. 192-203, Jun. 2017.
25.
C. E. Shannon, "A mathematical theory of communication", Bell Syst. Tech. J., vol. 27, pp. 379-423, Oct. 1948.
26.
Y. Zou, "Intelligent Interference exploitation for heterogeneous cellular networks against eavesdropping", IEEE J. Sel. Areas Commun., vol. 36, no. 7, pp. 1453-1464, Jul. 2018.
27.
X. Tang, R. Liu, P. Spasojevic and H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels", IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1575-1591, Apr. 2009.
28.
Y. Zou, X. Li and Y. Liang, "Secrecy outage and diversity analysis of cognitive radio systems", IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2222-2236, Nov. 2014.
29.
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels", IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
30.
H. Lei et al., "Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-m channels", IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 10126-10132, Dec. 2016.
Contact IEEE to Subscribe

References

References is not available for this document.