Abstract

In this paper, a cooperative secure transmission strategy is proposed for cognitive radio networks (CRNs) comprising of multiple primary users (PUs), multiple secondary users (SUs) and malicious eavesdroppers. Specifically, we construct the utility functions for primary users and secondary users that try to achieve the transmission opportunities, and optimization problem aiming at maximizing the aggregated throughput of network is formulated. Then, distributed primary users-secondary users matching algorithm is proposed to solve the optimization problem, and the final cooperative secure transmission strategy is obtained. Simulation results show that our proposed strategy outperforms existing schemes.

Highlights

  • Cognitive radio network (CRN), which allows the primary users to share the spectrum with secondary users without impairing the quality of service (QoS) of primary users, is a promising scheme to improve the spectrum utilization efficiency [1].Information security is a critically important issue in cognitive radio networks (CRNs)

  • SIMULATION RESULTS we show the performance of the proposed distributed primary users-secondary users matching algorithm through numerical simulations

  • The base station is located in the center of the area at [50m, 50m], and 4 eavesdroppers locate at [0m, 0m], [0m, 100m], Algorithm 1 Distributed Primary Users-Secondary Users

Read more

Summary

INTRODUCTION

Cognitive radio network (CRN), which allows the primary users to share the spectrum with secondary users without impairing the quality of service (QoS) of primary users, is a promising scheme to improve the spectrum utilization efficiency [1]. In [13], [14], the authors investigate the problem of helper assignment and resource allocation issues for a CRN based on auction theory Their auction-theory based algorithm has some nice economic properties, but is not efficient, which means many PUs cannot obtain help from SUs. In [15], a scheme for trustworthy friendly jammer selection is designed for a centralized cooperative cognitive radio network. Some distributed and flexible methods based on matching theory are proposed to address the joint optimization issues of jammer selection and resource allocation for physical layer security [17]–[20].They prove that by utilizing matching theory, network users can make independent and rational strategic decisions, highefficiency and low-complexity algorithms can be developed to model collaboration among many users.

SYSTEM MODEL
PROBLEM FORMULATION
SIMULATION RESULTS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call