Security in Cognitive Radio Networks

被引:0
|
作者
Akin, Sami [1 ]
机构
[1] Leibniz Univ Hannover, Inst Commun Technol, D-30167 Hannover, Germany
关键词
Cognitive radio; effective capacity; quality of service (QoS) constraints; information-theoretic security; EFFECTIVE-CAPACITY; SECRECY; COMMUNICATION; CHANNELS; QUALITY; DELAY; LAYER;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the information-theoretic security by modeling a cognitive radio wiretap channel under quality-of-service (QoS) constraints and interference power limitations inflicted on primary users (PUs). We initially define four different transmission scenarios regarding channel sensing results and their correctness. We provide effective secure transmission rates at which a secondary eavesdropper is refrained from listening to a secondary transmitter (ST). Then, we construct a channel state transition diagram that characterizes this channel model. We obtain the effective secure capacity which describes the maximum constant buffer arrival rate under given QoS constraints. We find out the optimal transmission power policies that maximize the effective secure capacity, and then, we propose an algorithm that, in general, converges quickly to these optimal policy values. Finally, we show the performance levels and gains obtained under different channel conditions and scenarios. And, we emphasize, in particular, the significant effect of hidden-terminal problem on information-theoretic security in cognitive radios.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Security in Cognitive Radio Networks
    Ren, Kui
    Zhu, Haojin
    Han, Zhu
    Poovendran, Radha
    [J]. IEEE NETWORK, 2013, 27 (03): : 2 - 3
  • [2] On the Security of Cognitive Radio Networks
    Elkashlan, Maged
    Wang, Lifeng
    Duong, Trung Q.
    Karagiannidis, George K.
    Nallanathan, Arumugam
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (08) : 3790 - 3795
  • [3] Security in cognitive radio networks
    Pei, Qing-Qi
    Li, Hong-Ning
    Zhao, Hong-Yang
    Li, Nan
    Min, Ying
    [J]. Tongxin Xuebao/Journal on Communications, 2013, 34 (01): : 144 - 158
  • [4] Security and Resilience in Cognitive Radio Networks
    Angelakis, Vangelis
    Askoxylakis, Ioannis
    Fowler, Scott
    Gundlegard, David
    Traganitis, Apostolos
    Yuan, Di
    [J]. ERCIM NEWS, 2011, (85): : 48 - 49
  • [5] Security in Cognitive Radio Networks - A Survey
    Sumathi, A. C.
    Vidhyapriya, R.
    [J]. 2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2012, : 114 - 118
  • [6] Study on Security in Cognitive Radio Networks
    Wang Weifang
    [J]. 2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 366 - 369
  • [7] A Survey on Security in Cognitive Radio Networks
    Khasawneh, Mahmoud
    Agarwal, Anjali
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 64 - 70
  • [8] Security Threats in Cognitive Radio Networks
    Zhang, Yuan
    Xu, Gaochao
    Geng, Xiaozhong
    [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1036 - 1041
  • [9] Survey of Security Issues in Cognitive Radio Networks
    El-Hajj, Wassim
    Safa, Haidar
    Guizani, Mohsen
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (02): : 181 - 198
  • [10] Security in cognitive radio networks: Threats and mitigation
    Clancy, T. Charles
    Goergen, Nathan
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2008, : 440 - 447