Abstract
In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) networks for secrecy enhancement by formulating the probability of non-zero secrecy capacity (PNSC). In the proposed work, it is assumed that uniform transmit power for the secondary transmitters and jammers must be adjusted to guarantee quality of service (QoS) of the primary network, follows a simple and efficient power allocation strategy. To improve the channel capacity, the best receiver is selected at each cluster to relay the source data to the next hop. Additionally, a jammer is randomly chosen at each cluster to generate noises on an eavesdropper, and to reduce the quality of the eavesdropping links. Three methods are studied in this paper. First, we propose the BEST path selection method (BEST) to maximize the end-to-end instantaneous secrecy capacity. Second, the path obtaining the MAXimum Value for the average end-to-end PNSC (MAXV) is selected for data transmission. Third, we also propose a RAND method in which a RANDom path is employed. For performance evaluation and comparison, we derive exact closed-form expressions for the end-to-end PNSC of the BEST, MAXV and RAND methods over Rayleigh fading channel. Monte Carlo simulations are then performed to verify the derived theoretical results.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Gopala, P.K., Lai, L., Gamal, H.E.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54(10), 4687–4698 (2008)
Zhang, J., Duong, T.Q., Woods, R., Marshall, A.: Securing wireless communications of the internet of things from the physical layer. Overv. Entropy 19(8), 420 (2017)
Yang, N., Yeoh, P.L., Elkashlan, M., Schober, R., Collings, I.B.: Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Commun. 61(1), 144–154 (2013)
Xiong, J., Tang, Y., Ma, D., Xiao, P., Wong, K.-K.: Secrecy performance analysis for TAS-MRC system with imperfect feedback. IEEE Trans. Inf. Forensics Secur. 10(8), 1617–1629 (2015)
Zhao, R., Lin, H., He, Y.-C., Chen, D.-H., Huang, Y., Yang, L.: Secrecy performance of transmit antenna selection for MIMO relay systems with outdated CSI. IEEE Trans. Commun. 66(2), 546–559 (2018)
Krikidis, I.: Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun. 4(15), 1787–1791 (2010)
Yang, M., Guo, D., Huang, Y., Duong, T.Q., Zhang, B.: Secure multiuser scheduling in downlink dual-hop regenerative relay networks over Nakagami-m fading channels. IEEE Trans. Wirel. Commun. 15(12), 8009–8024 (2016)
Qing, L., Guangyao, H., Xiaomei, F.: Physical layer security in multi-hop AF relay network based on compressed sensing. IEEE Commun. Lett. 22(9), 1882–1885 (2018)
Hoang, T.M., Duong, T.Q., Vo, N.-S., Kundu, C.: Physical layer security in cooperative energy harvesting networks with a friendly jammer. IEEE Wirel. Commun. Lett. 6(2), 174–177 (2017)
Ma, H., Cheng, J., Wang, X., Ma, P.: Robust MISO beamforming with cooperative jamming for secure transmission from perspectives of QoS and secrecy rate. IEEE Trans. Commun. 66(2), 767–780 (2018)
Duy, T.T., Kong, H.Y.: Secrecy performance analysis of multihop transmission protocols in cluster networks. Wirel. Pers. Commun. 82(4), 2505–2518 (2015)
Tin, P.T., Duy, T.T., Phuong, T.T., Voznak, M.: Secrecy performance of joint relay and jammer selection methods in cluster networks: with and without hardware noises. In: International Conference on Advanced Engineering - Theory and Applications, Busan, pp. 769–779 (2016)
Lee, J.-H.: Full-duplex relay for enhancing physical layer security in multi-hop relaying systems. IEEE Commun. Lett. 19(4), 525–528 (2015)
Atapattu, S., Ross, N., Jing, Y., He, Y., Evans, J.S.: Physical-layer security in full-duplex multi-hop multi-user wireless network with relay selection. IEEE Trans. Wirel. Commun. 18(2), 1216–1232 (2019)
Liu, Y., Wang, L., Duy, T.T., Elkashlan, M., Duong, T.Q.: Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 4(1), 46–49 (2015)
Nguyen, V.D., Duong, T.Q., Dobre, O.A., Shin, O.-S.: Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 11(11), 2609–2623 (2016)
Liu, Y., Wang, L., Zaidi, S.A.R., Elkashlan, M., Duong, T.Q.: Secure D2D communica-tion in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Trans. Commun. 64(1), 329–342 (2016)
Li, M., Yin, H., Huang, Y., Wang, Y., Yu, R.: Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Trans. Veh. Technol. 67(11), 11274–11279 (2018)
Xu, Q., Ran, P., He, H., Xu, D.: Security-aware routing for artificial-noise-aided multi-hop secondary communications. In: IEEE Wireless Communications and Networking Conference, pp. 1–6. IEEE, Barcelona (2018)
Tin, P.T., Hung, D.T., Tan, N.N., Duy, T.T., Voznak, M.: Secrecy performance en-hancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments. Entropy 221(2), 217 (2019)
Tin, P.T., Nam, P.M., Duy, T.T., Phuong, T.T., Voznak, M.: Secrecy performance en-hancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments. Sensors 19(5), 1160 (2019)
Laneman, J.N., Tse, D.N., Wornell, G.W.: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans. Inf. Theory 50(12), 3062–3080 (2004)
Gradshteyn, I.S., Ryzhik, I.M.: Table of Integrals, Series, and Products, 7th edn. Elsevier Inc., San Diego (2007)
Acknowledgment
This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2017.317.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Nam, P.M., Van Ca, P., Duy, T.T., Le, K.N. (2019). Secrecy Performance Enhancement Using Path Selection over Cluster-Based Cognitive Radio Networks. In: Duong, T., Vo, NS., Nguyen, L., Vien, QT., Nguyen, VD. (eds) Industrial Networks and Intelligent Systems. INISCOM 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 293. Springer, Cham. https://doi.org/10.1007/978-3-030-30149-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-30149-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30148-4
Online ISBN: 978-3-030-30149-1
eBook Packages: Computer ScienceComputer Science (R0)