Abstract

Aiming at protecting primary privacy messages and supporting secondary quality-of-service (QoS), we propose a secondary encrypted secure strategy for cognitive radio networks. In this scheme, a primary system directly transmits privacy messages or employs pre-transmitted secure secondary messages to encrypt the primary privacy information, and the secondary system acquires a fraction of the interference-free licensed spectrum. Following this idea, we consider two secure communication scenarios: the non-buffer scenario and the buffer-aided scenario. For the non-buffer scenario, the primary system first evaluates the channel quality of the direct transmission link. Then, the primary transmitter adaptively chooses to directly transmit the privacy messages or employ the encryption of the secure secondary messages according to the evaluation results. For this scenario, we investigate the primary ergodic secrecy performance and the secondary average performance. For the buffer-aided scenario, the secure secondary messages can be stored in the buffers at both the primary transmitter and receivers. According to the buffer states and channel quality, the primary system adaptively chooses to directly transmit the primary privacy information, permit the secondary secure transmission, or utilize the encryption of the stored secure secondary information. For this scenario, we also investigate the performances of both the primary and secondary systems, and derive the closed-form expression of the primary information delay. Numerical results are given to prove that the proposed scheme can provide privacy preserving for the primary information and acquire high secondary average transmission rate.

Highlights

  • Rapid proliferation of wireless devices and techniques enables anywhere and anytime communications which makes life comfortable and convenient

  • When primary transmitter (PT) and primary receiver (PR) are equipped with buffers, the secure secondary messages can be stored for some time slots that can encrypt the primary information in the following primary transmission

  • In [34], a fraction of power is used for the interference signal which will interfere the secondary transmission and the secondary average transmission rate decreases

Read more

Summary

INTRODUCTION

Rapid proliferation of wireless devices and techniques enables anywhere and anytime communications which makes life comfortable and convenient. Besides the secrecy policy of the primary system, the secondary system can employ the physical-layer security to assist the primary secure transmission through cooperative relaying and/or cooperative jamming and acquire some licensed spectrum as a reward. The primary privacy information is adaptively transmitted through the direct communication link or by utilizing the pre-transmitted secure secondary packets to encrypt Following this policy, we first consider the secondary encrypted secure transmission for the non-buffer scenario, and we extend our work to the buffer-aided scenario. The stored secondary messages will be consumed to encrypt the following transmitted primary privacy messages For this scenario, the secure transmission policy can be summarized as: (i) if the primary network can offer information security, the primary system will directly.

SYSTEM MODEL
PERFORMANCE ANALYSIS
SECONDARY ENCRYPTED SECURE TRANSMISSION WITH DATA BUFFER
TRANSMISSION POLICY FOR DATA BUFFER-AIDED SCENARIO
PRIMARY INFORMATION DELAY ANALYSIS
NUMERICAL RESULTS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.