Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems
Top Cited Papers
- 4 December 2014
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Communications
- Vol. 63 (1), 215-228
- https://doi.org/10.1109/tcomm.2014.2377239
Abstract
We consider a cognitive radio (CR) network consisting of a secondary transmitter (ST), a secondary destination (SD) and multiple secondary relays (SRs) in the presence of an eavesdropper, where the ST transmits to the SD with the assistance of SRs, while the eavesdropper attempts to intercept the secondary transmission. We rely on careful relay selection for protecting the ST-SD transmission against the eavesdropper with the aid of both single-relay and multi-relay selection. To be specific, only the “best” SR is chosen in the single-relay selection for assisting the secondary transmission, whereas the multi-relay selection invokes multiple SRs for simultaneously forwarding the ST's transmission to the SD. We analyze both the intercept probability and outage probability of the proposed single-relay and multi-relay selection schemes for the secondary transmission relying on realistic spectrum sensing. We also evaluate the performance of classic direct transmission and artificial noise based methods for the purpose of comparison with the proposed relay selection schemes. It is shown that as the intercept probability requirement is relaxed, the outage performance of the direct transmission, the artificial noise based and the relay selection schemes improves, and vice versa. This implies a trade-off between the security and reliability of the secondary transmission in the presence of eavesdropping attacks, which is referred to as the security-reliability trade-off (SRT). Furthermore, we demonstrate that the SRTs of the single-relay and multi-relay selection schemes are generally better than that of classic direct transmission, explicitly demonstrating the advantage of the proposed relay selection in terms of protecting the secondary transmissions against eavesdropping attacks. Moreover, as the number of SRs increases, the SRTs of the proposed single-relay and multi-relay selection approaches significantly improve. Finally, our numerical results show that as expected, the multi-relay selection scheme achieves a better SRT performance than the single-relay selection.Keywords
Other Versions
Funding Information
- Priority Academic Program Development of Jiangsu Higher Education Institutions
- National Natural Science Foundation of China (61302104, 61401223)
- Scientific Research Foundation of Nanjing University of Posts and Telecommunications (NY213014, NY214001)
- 1311 Talent Program of Nanjing University of Posts and Telecommunications
- Natural Science Foundation of Jiangsu Province (BK20140887)
- Programme de bourses d'excellence pour etudiants etrangers (PBEEE) of the Government of Quebec
This publication has 32 references indexed in Scilit:
- Security Versus Reliability Analysis of Opportunistic RelayingIEEE Transactions on Vehicular Technology, 2013
- On physical layer security for cognitive radio networksIEEE Network, 2013
- Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region AnalysisIEEE Communications Letters, 2012
- Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive RadioIEEE Transactions on Communications, 2012
- Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel StatisticsIEEE Transactions on Wireless Communications, 2010
- Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANsIEEE Transactions on Wireless Communications, 2010
- Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and AssessmentMobile Networks and Applications, 2008
- Guaranteeing Secrecy using Artificial NoiseIEEE Transactions on Wireless Communications, 2008
- Securing Wireless Data Networks against Eavesdropping using Smart AntennasPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- A survey of key management schemes in wireless sensor networksComputer Communications, 2007