Title :
Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks
Author :
Hyoungsuk Jeon ; McLaughlin, Steven W. ; Il-Min Kim ; Jeongseok Ha
Author_Institution :
Dept. of Electr. Eng., Korea Adv. Inst. of Sci. & Technol., Daejeon, South Korea
Abstract :
We consider a cooperation scenario between primary users and untrusted secondary users in cognitive radio networks. The secondary users are willing to help the primary users to relay the primary users´ messages in reward for being allowed to share the primary users´ spectrum bands. However, the primary users might be reluctant to accept this help, since the secondary users are untrustworthy and may try unauthorized decoding of the primary users´ messages. This paper will answer the question: when is this cooperation mutually beneficial for primary and secondary users? Taking an approach of information-theoretic secrecy, such as coding techniques for wiretap channels, the primary users can allow the secondary users to sense and relay the message, while ensuring that the secondary users are ignorant of the primary users´ messages. We characterize an achievable secrecy rate of primary users with a rate of the secondary users´ communication. From the derived rate pairs, an optimization problem is formulated such that the secondary transmitter distributes its transmit power to maximize its data rate while providing a higher secrecy rate to the primary users. We demonstrate that this cooperation can provide a positive secrecy rate, even when a non-cooperative scheme achieves a zero secrecy rate.
Keywords :
amplify and forward communication; cognitive radio; cooperative communication; network coding; optimisation; protocols; radio spectrum management; radio transmitters; relay networks (telecommunication); telecommunication security; amplify-and-forward relay protocol; coding techniques; cognitive radio networks; cooperation scenario; data rate maximization; eavesdropping; information-theoretic secrecy; noncooperative scheme; optimization problem; positive secrecy rate; primary user secrecy rate; secondary transmitter; secure communications; spectrum band sharing; unauthorized decoding; untrusted secondary nodes; wiretap channels; zero secrecy rate; Cognitive radio; Decoding; Joints; Radio transmitters; Receivers; Relays; Amplify-and-forward relay protocol; cognitive radio; eavesdropping; information-theoretic secrecy; untrusted secondary users; wiretap channel;
Journal_Title :
Wireless Communications, IEEE Transactions on
DOI :
10.1109/TWC.2013.021214.130089