Secure transmission of underlay cognitive radio with passive eavesdropping

Our objective is to enhance the secrecy performance of the secondary user (SU) in the presence of passive eavesdropper, whose channel state information (CSI) is unknown at the transmitter side. Two beamforming techniques are proposed; transmit beamforming (BF) and beamforming with jamming (BFJ). We investigate the impact of using artificial jamming (AJ) signal in improving the secrecy performance of the SU in underlay CRNs, where the AJ noise signal is used to confuse the eavesdropper’s channel. | International Journal of Computer Networks and Communications Security VOL. 4, NO. 5, MAY 2016, 159–164 Available online at: E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Secure Transmission of Underlay Cognitive Radio with Passive Eavesdropping Azzam Al-nahari1, Mukarram Al-jamali2 and Mohammed AlKhawlani3 1 2, 3 Department of Electrical Engineering, Ibb University, Ibb, Yemen Department of Electronics Engineering, University of Science and Technology, Sana'a, Yemen E-mail: 1azzamyn@, 2mukarramja@, ABSTRACT The security in cognitive radio networks (CRNs) has attracted recently a significant attention due to the open environment of the spectrum sharing networks, which make them more vulnerable to wireless attacks. In this paper, we consider the problem of physical layer security in CRNs. Our objective is to enhance the secrecy performance of the secondary user (SU) in the presence of passive eavesdropper, whose channel state information (CSI) is unknown at the transmitter side. Two beamforming techniques are proposed; transmit beamforming (BF) and beamforming with jamming (BFJ). We investigate the impact of using artificial jamming (AJ) signal in improving the secrecy performance of the SU in underlay CRNs, where the AJ noise signal is used to confuse the eavesdropper’s channel. Two power constraints are considered in the system; transmit power constraint and the interference power threshold at the primary user (PU). The performance of the proposed techniques is analyzed in terms of the achievable secrecy rate and the secrecy outage probability. Keywords: CRNs, secrecy rate, artificial jamming, underlay cognitive radio, eavesdropping. 1 INTRODUCTION Cognitive radio networks (CRNs) are intelligent networks that adapt to changes in their environments to make a better use of the radio spectrum. Depending on the knowledge that is needed to coexist with the primary network, cognitive radio approaches fall

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.