Secure Cognitive Reactive Decode-and-Forward Relay Networks: With and Without Eavesdropper
详细信息    查看全文
  • 作者:Dac-Binh Ha ; Tung Thanh Vu ; Tran Trung Duy…
  • 关键词:Underlay cognitive radio ; Reactive relay selection ; Physical ; layer security ; Channel capacity ; Secrecy capacity
  • 刊名:Wireless Personal Communications
  • 出版年:2015
  • 出版时间:December 2015
  • 年:2015
  • 卷:85
  • 期:4
  • 页码:2619-2641
  • 全文大小:915 KB
  • 参考文献:1.Ghasemi, A., & Sousa, E. S. (2007). Fundamental limits of spectrum-sharing in fading environments. IEEE Transactions on Wireless Communications, 6, 649鈥?58.CrossRef
    2.Duong, T. Q., Yeoh, P. L., Bao, Vo Nguyen Quoc, Elkashlan, M., & Yang, N. (2012). Cognitive relay networks with multiple primary transceivers under spectrum sharing. IEEE Signal Processing Letters, 19, 741鈥?44.CrossRef
    3.Duy, T. T., & Kong, H. Y. (2014). Adaptive cooperative decode-and-forward transmission with power allocation under interference constraint. Wireless Personal Communications, 74, 401鈥?14.CrossRef
    4.Bletsas, A., Shin, H., & Win, M. Z. (2007). Cooperative communications with outage-optimal opportunistic relaying. IEEE Transactions on Wireless Communications, 6, 3450鈥?460.CrossRef
    5.Suraweera, H. A., Smith, P. J., & Shafi, M. (2010). Capacity limits and performance analysis of cognitive radio with imperfect channel knowledge. IEEE Transactions on Vehicular Technology, 59, 1811鈥?822.CrossRef
    6.Duong, T. Q., da Costa, D. B., Elkashlan, M., & Bao, V. N. Q. (2012). Cognitive amplify-and- forward relay networks over Nakagami-m fading. IEEE Transactions on Vehicular Technology, 61, 2368鈥?374.CrossRef
    7.Kim, K. J., Duong, T. Q., & Tran, X.-N. (2012). Performance analysis of cognitive spectrum-sharing single-carrier systems with relay selection. IEEE Transactions on Signal Processing, 60, 6435鈥?449.MathSciNet CrossRef
    8.Duong, T. Q., Duy, T. T., Matthaiou, M., Tsiftsis, T., & Karagiannidis, G. K. (2013). Cognitive cooperative networks in dual-hop asymmetric fading channels. In Proceedings of IEEE Global Communications Conference (Globecom), Atlanta, GA, (pp. 977-983).
    9.Bao, V. N. Q., Duong, T. Q., da Costa, D. B., Alexandropoulos, G. C., & Nallanathan, A. (2013). Cognitive amplify-and-forward relaying with best relay selection in non-identical Rayleigh fading. IEEE Communications Letters, 17, 475鈥?78.CrossRef
    10.Sagong, S., Lee, J., & Hong, D. (2011). Capacity of reactive DF scheme in cognitive relay networks. IEEE Transactions on Wireless Communications, 10, 1276鈥?536.CrossRef
    11.Duy, T. T., & Kong, H. Y. (2013). Performance analysis of incremental amplify-and-forward relaying protocols with nth best partial relay selection under interference constraint. Wireless Personal Communications, 71, 2741鈥?757.CrossRef
    12.Zhang, X., Yan, Z., Gao, Y., & Wang, W. (2013). On the study of outage performance for cognitive relay networks (CRN) with the Nth best-relay selection in Rayleigh-fading channels. IEEE Transactions on Wireless Communications, 2, 110鈥?13.CrossRef
    13.Wyner, A. D. (1975). The wire-tap channel. Bell System Techical Journal, 54, 13551367.
    14.Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaughlin, S. W. (2008). Wireless information theoretic security. IEEE Transactions on Information Theory, 54, 2515鈥?534.MathSciNet CrossRef
    15.Gopala, P. K., Lai, L., & Gamal, H. E. (2008). On the secrecy capacity of fading channels. IEEE Transactions on Information Theory, 54, 4687鈥?698.CrossRef
    16.Wang, L., Yang, N., Elkashlan, M., Yeoh, P. L., & Yuan, J. (2014). Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels. IEEE Transactions on Information Forensics and Security, 9, 247鈥?58.CrossRef
    17.Elkashlan, M., Wang, L., Duong, T. Q., Karagiannidis, G. K., & Nallanathan, A. (2014). On the security of cognitive radio networks. IEEE Transactions on Vehicular Technology. doi:10.鈥?109/鈥婽VT.鈥?014.鈥?358624 .
    18.Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Collings, I. B. (2013). Transmit antenna selection for security enhancement in mimo wiretap channels. IEEE Transactions on Communications, 61, 144鈥?54.CrossRef
    19.Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Yuan, J. (2013). MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining. IEEE Communications Letters, 17, 1754鈥?757.CrossRef
    20.Wang, L., Elkashlan, M., Huang, J., Schober, R., & Mallik, R. K. (2014). Secure transmission with antenna selection in MIMO Nakagami-m channels. IEEE Transactions on Wireless Communications, 13, 6054鈥?067.CrossRef
    21.Wang, L., Elkashlan, M., Huang, J., Tran, N. H., & Duong, T. Q. (2014). Secure transmission with optimal power allocation in untrusted relay networks. IEEE Wireless Communications Letters, 3, 289鈥?92.CrossRef
    22.Wang, L., Kim, K. J., Duong, T. Q., Elkashlan, M., & Poor, H. V. (2015). Security enhancement of cooperative single carrier systems. IEEE Transactions on Information Forensics and Security, 10, 90鈥?03.CrossRef
    23.Liu, Y., Wang, L., Duy, T. T., Elkashlan, M., & Duong, T. Q. (2015). Relay selection for security enhancement in cognitive relay networks. IEEE Wireless Communications Letters, 4, 46鈥?9.CrossRef
    24.Duy, T. T., & Kong, H. Y. (2013). Performance analysis of two-way hybrid decode-and-amplify relaying scheme with relay selection for secondary spectrum access. Wireless Personal Communications, 69, 857鈥?78.CrossRef
    25.Lee, J., Wang, H., Andrews, J. G., & Hong, D. (2011). Outage probability of cognitive relay networks with interference constraints. IEEE Transactions on Wireless Communications, 10, 390395.
    26.Gradshteyn, I., & Ryzhik, I. (2007). Table of integrals, series, and products (7th ed.). New York, London: Academic Press Inc.
    27.Duong, T. Q., Duy, T. T., Elkashlan, M., Tran, Nghi. H., & Dobre, Octavia A. (2014). Secured cooperative cognitive radio networks with relay selection. In Proceedings of IEEE Globecom2014, Austin, TX USA, (pp. 3151-3156).
    28.Bao, V. N. Q., & Duy, T. T. (2012). Performance analysis of cognitive underlay DF relay protocol with Kth best partial relay selection. In Proceedings of ATC2012, Ha Noi, VietNam, (pp. 130-135).
    29.Duy, T. T., Duong, T. Q., da Costa, D. B., Bao, V. N. Q., & Elkashlan, M. (2015). Proactive relay selection with joint impact of hardware impairment and co-channel interference. IEEE Transactions on Communications, 63, 1594鈥?606.CrossRef
  • 作者单位:Dac-Binh Ha (1)
    Tung Thanh Vu (1)
    Tran Trung Duy (2)
    Vo Nguyen Quoc Bao (2)

    1. Duy Tan University, Da Nang, Vietnam
    2. Posts and Telecommunications Institute of Technology, Hochiminh city, Vietnam
  • 刊物类别:Engineering
  • 刊物主题:Electronic and Computer Engineering
    Signal,Image and Speech Processing
    Processor Architectures
  • 出版者:Springer Netherlands
  • ISSN:1572-834X
文摘
In this paper, we study performances of cooperative relay networks in cognitive radio with reactive multiple decode-and-forward (DF) relays. In particular, we first derive exact and asymptotic expressions of outage probability for the considered scheme with K-th best relay selection over Rayleigh fading channel. Next, in the presence of an eavesdropper and the same relay selection scheme, secrecy performance of the cognitive relay network is also evaluated, in terms of average secrecy capacity. We then perform Monte-Carlo simulations to verify the theoretical derivations. Our results have presented the significance of using relay networks to enhance the system and secrecy performance of cognitive reactive DF relay networks. Keywords Underlay cognitive radio Reactive relay selection Physical-layer security Channel capacity Secrecy capacity

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700