The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Cette lettre étudie la sécurité de la couche physique dans un réseau de radio cognitive (CR), où un utilisateur principal (PU) est écouté par de multiples espions collusoires. Sous la contrainte de rupture de secret du PU pour protéger le PU, les utilisateurs secondaires (SU) sont supposés être autorisés à transmettre. Le problème de la planification conjointe du SU et du contrôle de puissance afin de maximiser le taux de transmission ergodique du SU est étudié à la fois pour les scénarios d'information sur l'état du canal (CSI) parfait et imparfait. Il est démontré que, bien que les écoutes collusoires dégradent les performances du PU par rapport aux écoutes non collusives, les performances du SU sont en réalité améliorées lorsque le nombre d’écoutes indiscrètes est grand. Il est également montré que notre schéma proposé avec CSI imparfait peut garantir que les performances du PU ne sont pas affectées par un CSI imparfait.
Ding XU
Nanjing University of Posts and Telecommunications
Qun LI
Nanjing University of Posts and Telecommunications
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Ding XU, Qun LI, "Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers" in IEICE TRANSACTIONS on Fundamentals,
vol. E101-A, no. 11, pp. 1970-1974, November 2018, doi: 10.1587/transfun.E101.A.1970.
Abstract: This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E101.A.1970/_p
Copier
@ARTICLE{e101-a_11_1970,
author={Ding XU, Qun LI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers},
year={2018},
volume={E101-A},
number={11},
pages={1970-1974},
abstract={This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.},
keywords={},
doi={10.1587/transfun.E101.A.1970},
ISSN={1745-1337},
month={November},}
Copier
TY - JOUR
TI - Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1970
EP - 1974
AU - Ding XU
AU - Qun LI
PY - 2018
DO - 10.1587/transfun.E101.A.1970
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E101-A
IS - 11
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - November 2018
AB - This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.
ER -