首页> 外文期刊>IEEE transactions on wireless communications >Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users
【24h】

Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users

机译:保证主要用户保密率的认知无线电网络中的协作安全资源分配

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we introduce a new cooperative paradigm for secure communication in cognitive radio networks (CRNs) where secondary users (SUs) are allowed to access the spectrum of primary users (PUs) as long as they preserve the secure communication of PUs in the presence of malicious eavesdroppers. To do so, the SU transmission is divided into two hops: at first hop, the SU transmitter sends the information to a relay set and the SU receiver acts as a friendly jammer to disturb the overhearing of eavesdroppers and at the second hop, one of the relays is selected to pass the information to the SU receiver and the SU transmitter acts as a friendly jammer for the PU. In this new setup, the time duration for each hop, the power transmissions of all nodes in CRN, and relay selection at the second hop are allocated in such a way that the secrecy rate of the SU is maximized subject to the minimum required PU's secrecy rate. From primary service perspective, this transforms the possibly disturbing secondary service activities into a beneficial network element. We investigate instantaneous and ergodic resource allocation problems for perfect and imperfect channel state information (CSI). Since these problems are non-convex, we propose a solution based on decomposition of main optimization problem into three subproblems related to the power allocation, time allocation, and relay selection. We show that the power allocation problem can be transformed into a generalized geometric programming (GGP) model via the so-called scaled algorithm and it can be solved very efficiently. Simulation results indicate that in terms of the secondary secrecy rate, the proposed setup outperforms the conventional setup in which the secrecy rate of the PU is not guaranteed.
机译:在本文中,我们介绍了一种新的合作模式,用于认知无线电网络(CRN)中的安全通信,在该网络中,只要次要用户(SU)保留了主用户(PU)在设备中的安全通信,就可以访问它们的频谱。恶意窃听者的存在。为此,将SU传输分为两跳:在第一跳时,SU发送器将信息发送到中继设备,SU接收器充当友好的干扰器,以干扰窃听者的监听,而在第二跳时,选择中继器将信息传递给SU接收器,SU发射器充当PU的友好干扰器。在此新设置中,以这样的方式分配每个跃点的持续时间,CRN中所有节点的功率传输以及第二跳处的中继选择,以使SU的秘密率最大化,这取决于最小所需的PU秘密。率。从主要服务的角度来看,这将可能会干扰的辅助服务活动转换为有益的网络元素。我们调查瞬时和遍历资源分配问题,以获取完美和不完美的信道状态信息(CSI)。由于这些问题是非凸的,因此我们提出了一种基于主要优化问题分解为与功率分配,时间分配和继电器选择有关的三个子问题的解决方案。我们表明,功率分配问题可以通过所谓的缩放算法转换为广义几何规划(GGP)模型,并且可以非常有效地解决。仿真结果表明,就二级保密率而言,所提出的设置优于传统的不能保证PU保密率的设置。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号