Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2018, Article ID 5457176, 15 pages
https://doi.org/10.1155/2018/5457176
Research Article

Reliability-Security Trade-Off Analysis of Cognitive Radio Networks with Jamming and Licensed Interference

Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam

Correspondence should be addressed to Khuong Ho-Van; ac.oohay@navoh.gnouhk

Received 26 July 2017; Revised 20 November 2017; Accepted 13 December 2017; Published 22 January 2018

Academic Editor: Donatella Darsena

Copyright © 2018 Khuong Ho-Van and Thiem Do-Dac. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Panwar, S. Sharma, and A. K. Singh, “A survey on 5G: The next generation of mobile communication,” Physical Communication, vol. 18, pp. 64–84, 2016. View at Publisher · View at Google Scholar · View at Scopus
  2. M. Tavana, A. Rahmati, V. Shah-Mansouri, and B. Maham, “Cooperative sensing with joint energy and correlation detection in cognitive radio networks,” IEEE Communications Letters, vol. 21, no. 1, pp. 132–135, 2017. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Darsena, G. Gelli, and F. Verde, “An opportunistic spectrum access scheme for multicarrier cognitive sensor networks,” IEEE Sensors Journal, vol. 17, no. 8, pp. 2596–2606, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. Y. Liu, H. H. Chen, and L. Wang, “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Communications Surveys and Tutorials, vol. 19, no. 1, pp. 347–376, 2017. View at Publisher · View at Google Scholar
  5. Z. Shu, Y. Qian, and S. Ci, “On physical layer security for cognitive radio networks,” IEEE Network, vol. 27, no. 3, pp. 28–33, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Li, Z. Feng, Z. Feng, and P. Zhang, “A survey of security issues in Cognitive Radio Networks,” China Communications, vol. 12, no. 3, Article ID 7084371, pp. 132–150, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Zou, J. Zhu, L. Yang, Y.-C. Liang, and Y.-D. Yao, “Securing physical-layer communications for cognitive radio networks,” IEEE Communications Magazine, vol. 53, no. 9, pp. 48–54, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. R. K. Sharma and D. B. Rawat, “Advances on security threats and countermeasures for cognitive radio networks: A survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 2, pp. 1023–1043, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. T.-X. Zheng and H.-M. Wang, “Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8812–8817, 2016. View at Publisher · View at Google Scholar
  10. J. Hu, Y. Cai, N. Yang, X. Zhou, and W. Yang, “Artificial-Noise-Aided Secure Transmission Scheme with Limited Training and Feedback Overhead,” IEEE Transactions on Wireless Communications, vol. 16, no. 1, pp. 193–205, 2017. View at Publisher · View at Google Scholar · View at Scopus
  11. X. Ding, T. Song, Y. Zou, and X. Chen, “Security-Reliability Tradeoff for Friendly Jammer Assisted User-Pair Selection in the Face of Multiple Eavesdroppers,” IEEE Access, vol. 4, pp. 8386–8393, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Li, Z. Dong, and G. Wang, “Security versus Reliability Analysis for Multi-Eavesdropper Cooperation Wireless Networks with Best Relay,” in Proceedings of the 2017 IEEE International Conference on Energy Internet (ICEI), pp. 244–249, Beijing, China, April 2017. View at Publisher · View at Google Scholar
  13. A. Kalantari, S. Maleki, G. Zheng, S. Chatzinotas, and B. Ottersten, “Joint power control in wiretap interference channels,” IEEE Transactions on Wireless Communications, vol. 14, no. 7, pp. 3810–3823, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Wang and H.-M. Wang, “On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1814–1827, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. K. Ho-Van, “Outage analysis in cooperative cognitive networks with opportunistic relay selection under imperfect channel information,” International Journal of Electronics and Communications, vol. 69, no. 11, pp. 1700–1708, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. K. Ho-Van, “Exact outage probability analysis of proactive relay selection in cognitive radio networks with MRC receivers,” Journal of Communications and Networks, vol. 18, no. 3, Article ID 7575795, pp. 288–298, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. D. Wang, P. Ren, Q. Du, L. Sun, and Y. Wang, “Cooperative relaying and jamming for primary secure communication in cognitive two-way networks,” in Proceedings of the 83rd IEEE Vehicular Technology Conference, VTC Spring 2016, Nanjing, China, May 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. B. Fang, Z. Qian, W. Zhong, and W. Shao, “AN-Aided Secrecy Precoding for SWIPT in Cognitive MIMO Broadcast Channels,” IEEE Communications Letters, vol. 19, no. 9, pp. 1632–1635, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. V.-D. Nguyen, T. Q. Duong, O. A. Dobre, and O.-S. Shin, “Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2609–2623, 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Fang, Z. Qian, W. Shao, and W. Zhong, “Precoding and Artificial Noise Design for Cognitive MIMOME Wiretap Channels,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6753–6758, 2016. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Wu, X. Chen, and X. Chen, “Secure beamforming for cognitive radio networks with artificial noise,” in Proceedings of the 2015 International Conference on Wireless Communications & Signal Processing (WCSP), pp. 1–5, Nanjing, China, October 2015. View at Publisher · View at Google Scholar
  22. X. Hu, X. Zhang, H. Huang, and Y. Li, “Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers,” in Proceedings of the 27th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2016, Spain, September 2016. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Cai, X. Xu, and W. Yang, “Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise,” IET Communications, vol. 10, no. 15, pp. 1904–1913, 2016. View at Publisher · View at Google Scholar · View at Scopus
  24. V. Nguyen, T. Q. Duong, O. Shin, A. Nallanathan, and G. K. Karagiannidis, “Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications,” IEEE Transactions on Cognitive Communications and Networking, 2017. View at Publisher · View at Google Scholar
  25. Z. Li, T. Jing, X. Cheng, Y. Huo, W. Zhou, and D. Chen, “Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks,” in Proceedings of the IEEE International Conference on Communications, ICC 2015, pp. 7609–7614, London, UK, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  26. W. Liu, L. Guo, T. Kang, J. Zhang, and J. Lin, “Secure cognitive radio system with cooperative secondary networks,” in Proceedings of the 2015 22nd International Conference on Telecommunications, ICT 2015, pp. 6–10, Sydney, Australia, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. T. He, H. Chen, and Q. Liu, “QoS-based beamforming with cooperative jamming in Cognitive Radio Networks,” in Proceedings of the 2013 International Conference on Communications, Circuits and Systems, ICCCAS 2013, pp. 42–45, Chengdu, China, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  28. W. Liu, M. Z. I. Sarkar, and T. Ratnarajah, “On the security of cognitive radio networks: Cooperative jamming with relay selection,” in Proceedings of the 2014 European Conference on Networks and Communications, EuCNC 2014, Bologna, Italy, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. W. Liu, M. Z. I. Sarkar, T. Ratnarajah, and H. Du, “Securing cognitive radio with a combined approach of beamforming and cooperative jamming,” IET Communications, vol. 11, no. 1, pp. 1–9, 2017. View at Publisher · View at Google Scholar · View at Scopus
  30. Y. Zou, “Physical-Layer Security for Spectrum Sharing Systems,” IEEE Transactions on Wireless Communications, vol. 16, no. 2, pp. 1319–1329, 2017. View at Publisher · View at Google Scholar · View at Scopus
  31. Y. W. Liu, L. F. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, “Relay selection for security enhancement in cognitive relay networks,” IEEE Wireless Communications Letters, vol. 4, no. 1, pp. 46–49, 2015. View at Publisher · View at Google Scholar
  32. P. Chakraborty and S. Prakriya, “Secrecy Performance of an Idle Receiver Assisted Underlay Secondary Network,” IEEE Transactions on Vehicular Technology, vol. 66, no. 10, pp. 9555–9560, 2017. View at Publisher · View at Google Scholar
  33. K. Ho-Van, P. C. Sofotasios, and S. Freear, “Underlay cooperative cognitive networks with imperfect Nakagami-m fading channel information and strict transmit power constraint: Interference statistics and outage probability analysis,” Journal of Communications and Networks, vol. 16, no. 1, pp. 10–17, 2014. View at Publisher · View at Google Scholar · View at Scopus
  34. E. Biglieri, J. Proakis, and S. Shamai, “Fading channels: information-theoretic and communications aspects,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 44, no. 6, pp. 2619–2692, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  35. I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, Academic Press, San Diego, CA, USA, 6th edition, 2000.
  36. N. Ahmed, M. A. Khojastepour, and B. Aazhang, “Outage minimization and optimal power control for the fading relay channel,” in Proceedings of the 2004 IEEE Information Theory Workshop - Proceedings, ITW, pp. 458–462, San Antonio, TX, USA, October 2004. View at Scopus