Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 587104, 9 pages
http://dx.doi.org/10.1155/2015/587104
Research Article

Energy-Efficient Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks

State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China

Received 24 October 2014; Accepted 29 December 2014

Academic Editor: Elmetwally Elabbasy

Copyright © 2015 Li Jiang and Hui Tian. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Simon, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. Q. Zhao and B. M. Sadler, “A survey of dynamic spectrum access,” IEEE Signal Processing Magazine, vol. 24, no. 3, pp. 79–89, 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Jia, J. Zhang, and Q. Zhang, “Cooperative relay for cognitive radio networks,” in Proceedings of the IEEE INFOCOM, pp. 2304–2312, IEEE, Rio de Janeiro, Brazil, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Mietzner, L. Lampe, and R. Schober, “Distributed transmit power allocation for multihop cognitive-radio systems,” IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5187–5201, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. D. Chen, H. Ji, and V. C. M. Leung, “Distributed best-relay selection for improving TCP performance over cognitive radio networks: a cross-layer design approach,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 315–322, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Sagong, J. Lee, and D. Hong, “Capacity of reactive DF scheme in cognitive relay networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 10, pp. 3133–3138, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. P. Li, S. Guo, W. Zhuang, and B. Ye, “Capacity maximization in cooperative CRNs: joint relay assignment and channel allocation,” in Proceedings of the IEEE International Conference on Communications (ICC '12), pp. 5097–5101, Ottawa, Canada, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. C. Luo, G. Min, F. R. Yu, M. Chen, L. T. Yang, and V. C. M. Leung, “Energy-efficient distributed relay and power control in cognitive radio cooperative communications,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 11, pp. 2442–2452, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. C. T. Clancy and N. Goergen, “Security in cognitive radio networks: threats and mitigation,” in Proceedings of the 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom '08), pp. 1–8, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. Z. Shu, Y. Qian, and S. Ci, “On physical layer security for cognitive radio networks,” IEEE Network, vol. 27, no. 3, pp. 28–33, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975. View at Publisher · View at Google Scholar · View at MathSciNet
  12. S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wire-tap channel,” IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451–456, 1978. View at Publisher · View at Google Scholar · View at MathSciNet
  13. I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Transaction on Information Theory, vol. 24, no. 3, pp. 339–348, 1978. View at Publisher · View at Google Scholar · View at MathSciNet
  14. Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, “Secure communication over MISO cognitive radio channels,” IEEE Transactions on Wireless Communications, vol. 9, no. 4, pp. 1494–1502, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. Y. Pei, Y.-C. Liang, K. C. Teh, and K. H. Li, “Secure communication in multiantenna cognitive radio networks with imperfect channel state information,” IEEE Transactions on Signal Processing, vol. 59, no. 4, pp. 1683–1693, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. T. Kwon, V. W. S. Wong, and R. Schober, “Secure MISO cognitive radio system with perfect and imperfect CSI,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '12), pp. 1236–1241, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. L. Zhang, R. Zhang, Y.-C. Liang, Y. Xin, and S. Cui, “On the relationship between the multi-antenna secrecy communications and cognitive radio communications,” IEEE Transactions on Communications, vol. 58, no. 6, pp. 1877–1886, 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Zou, X. Wang, and W. Shen, “Physical-layer security with multiuser scheduling in cognitive radio networks,” IEEE Transactions on Communications, vol. 61, no. 12, pp. 5103–5113, 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Sakran, M. Shokair, O. Nasr, S. El-Rabaie, and A. A. El-Azm, “Proposed relay selection scheme for physical layer security in cognitive radio networks,” IET Communications, vol. 6, no. 16, pp. 2676–2687, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  20. T. Wang, L. Song, Z. Han, X. Cheng, and B. Jiao, “Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,” in Proceedings of the IEEE International Conference on Communications (ICC '12), pp. 1683–1687, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Z. I. Sarkar and T. Ratnarajah, “Enhancing security in the cognitive relay assisted co-existing radio systems with interferences,” in Proceedings of the IEEE International Conference on Communications (ICC '13), pp. 4729–4733, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Bloch, J. O. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515–2534, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, part 2, pp. 1875–1888, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. P. Hu, Z. Zhou, Q. Liu, and F. Li, “The HMM-based modeling for the energy level prediction in wireless sensor networks,” in Proceedings of the 2nd IEEE Conference on Industrial Electronics and Applications (ICIEA '07), pp. 2253–2258, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  25. D. Bertsimas and J. Niño-Mora, “Restless bandits, linear programming relaxations, and a primal-dual index heuristic,” Operations Research, vol. 48, no. 1, pp. 80–90, 2000. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus