Skip to main content
Log in

Aided Opportunistic Jammer Selection for Secrecy Improvement in Underlay Cognitive Radio Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we consider the physical-layer security for the primary system in an underlay cognitive radio model which comprises of a primary source–destination pair, a secondary receiver (SR), K secondary transmitters (STi, i = 1,…,K) and an eavesdropper (E). To protecting the transmission confidentiality of the primary transmission system against eavesdropping, we propose secondary transmitter (ST) aided opportunistic jamming transmission protocols. In our protocols, the selection of ST plays a crucial role. To this end, we propose the optimal secondary transmission selection (OSTS) and the Optimal Cooperative Jammer Selection (OCJS), respectively. For the non-security management, OSTS, OCJS schemes, we derive the closed-form expressions of the outage probability and the intercept probability for primary system, respectively. Furthermore, we also derive the closed-form expressions of the outage probability for the secondary user for the selective schemes. Numerical results show that the OCJS scheme has the best security performance and the conventional non-security management scheme has the worst security performance for primary system. In addition, the outage performances of OSTS and OCJS are better than the conventional non-security protocol in high secondary transmitting SNR region.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.

    Article  Google Scholar 

  2. Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.

    Article  Google Scholar 

  3. Zhang, M., Yang, M., & Wu, Q (2018). Smart perception and autonomic optimization: A novel bio-inspired hybrid routing protocol for MANETs. Future generation computer systems, 81, 505–513.

    Article  Google Scholar 

  4. Rajesh, K. S., & Danda, B. R. (2015). Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communication Surveys and Tutorials, 17(2), 1023–1043.

    Article  Google Scholar 

  5. Li, J., Feng, Z., Feng, Z., & Zhang, P. (2015). A survey of security issues in cognitive radio networks. IEEE Journals and Magazines of China Communication, 12(3), 132–150.

    MathSciNet  Google Scholar 

  6. Nguyen, V. D., Hoang, T. M., & Shin, O. S. (2015). Secrecy capacity of the primary system in a cognitive radio network. IEEE Transaction on Vehicular Technology, 64(8), 3834–3843.

    Article  Google Scholar 

  7. Yulong, Z., Xianbin, W., & Weiming, S. (2013). Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Transactions on Communications, 61(12), 5103–5113.

    Article  Google Scholar 

  8. Zhihui, S., Yi, Q., & Song, C. (2013). On physical layer security for cognitive radio networks. IEEE Network, 27(3), 28–33.

    Article  Google Scholar 

  9. Wyner, A. D. (1975). The wire-tap channel. Bell System Technology Journal, 54(8), 1355–1387.

    Article  MathSciNet  MATH  Google Scholar 

  10. Leung-Yan-Cheong, S. K., & Hellman, M. E. (1978). The Gaussian wiretap channel. IEEE Transaction Information Theory, 24(4), 451–456.

    Article  MATH  Google Scholar 

  11. Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transaction Wireless Communication, 7(6), 2180–2189.

    Article  Google Scholar 

  12. Ding, Z., Ma, Z., & Fan, P. (2014). Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise. IEEE Transaction Wireless Communication, 13(4), 2189–2203.

    Article  Google Scholar 

  13. Chae, S., Choi, W., Lee, J., & Quek, T. (2014). Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone. IEEE Transaction Information Forensics and Security, 9(10), 1617–1628.

    Article  Google Scholar 

  14. Wang, Z., Xiao, M., Skoglund, M., & Poor, H. V. (2015). Secure degrees of freedom of wireless X networks using artificial noise alignment. IEEE Transaction Communication, 63(7), 2632–2646.

    Article  Google Scholar 

  15. Nguyen, V.D., Duong, T.Q., Shin, O.S. (2015). Physical layer security for primary system: A symbiotic approach in cooperative cognitive radio networks. In IEEE Global Communications Conference (pp. 1–6).

  16. Wang, X., Ji, Y., Zhou, H., et al. (2017). Auction based frameworks for secure communications in static and dynamic cognitive radio networks. IEEE Transactions on Vehicular Technology, 66(3), 2658–2673.

    Article  Google Scholar 

  17. Xu, D., & Li, Q. (2016). Resource allocation for cognitive radio with primary user secrecy outage constraint. IEEE System Journal. https://doi.org/10.1109/jsyst.2016.2585654.

    Google Scholar 

  18. Pei, Y., Liang, Y.-C., Teh, K. C., & Li, K. (2011). Secure communication in multiantenna cognitive radio networks with imperfect channel state information. IEEE Transactions Signal Process, 59(4), 1683–1693.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Natural Science Foundation of China (NSFC) under Grants Nos. 61801171, 61701172, 61771185 and 61772175, in part by the Science and Technology Research of Henan Province under Grants Nos. 182102210044 and 182102210285, in part by Key scientific research programs of henan higher education (Nos. 16A510005, 17A520005 and 18A510009), in part by the Science and Technology Development Programs of Henan Province under Grant No. 192102210284.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ping Xie.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Let \(X_{1}\),\(X_{2}\), \(X_{3}\) and \(X_{4}\) be exponentially variables with parameters \({1 \mathord{\left/ {\vphantom {1 {\sigma_{\text{P}}^{2} }}} \right. \kern-0pt} {\sigma_{\text{P}}^{2} }}\), \({1 \mathord{\left/ {\vphantom {1 {\sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}} \right. \kern-0pt} {\sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}\), \({1 \mathord{\left/ {\vphantom {1 {\sigma_{\text{PE}}^{2} }}} \right. \kern-0pt} {\sigma_{\text{PE}}^{2} }}\) and \({1 \mathord{\left/ {\vphantom {1 {\sigma_{{{\text{S}}_{j} {\text{E}}}}^{2} }}} \right. \kern-0pt} {\sigma_{{{\text{S}}_{j} {\text{E}}}}^{2} }}\), respectively. Moreover, letting \(\tilde{X}_{2} = \beta X_{2} + {{N_{0} } \mathord{\left/ {\vphantom {{N_{0} } {P_{\text{S}} }}} \right. \kern-0pt} {P_{\text{S}} }}\), \(\tilde{X}_{3} = X_{3} + {{N_{0} } \mathord{\left/ {\vphantom {{N_{0} } {P_{\text{S}} }}} \right. \kern-0pt} {P_{\text{S}} }}\), \(Y_{1} = {{X_{1} } \mathord{\left/ {\vphantom {{X_{1} } {\tilde{X}_{2} }}} \right. \kern-0pt} {\tilde{X}_{2} }}\), and \(Y_{2} = {{X_{4} } \mathord{\left/ {\vphantom {{X_{4} } {\tilde{X}_{3} }}} \right. \kern-0pt} {\tilde{X}_{3} }}\). The probability distribution and density of random variables \(\tilde{X}_{2}\) can be derived as (43) and (44), respectively.

$$F_{{\tilde{X}_{2} }} \left( {\tilde{x}_{2} } \right) = \Pr \left\{ {\tilde{X}_{2} < \tilde{x}_{2} } \right\} = \Pr \left\{ {\beta X_{2} < \tilde{x}_{2} - \frac{{N_{0} }}{{P_{\text{S}} }}} \right\} = \int_{0}^{{\frac{{\tilde{x}_{2} }}{\beta } - \frac{{N_{0} }}{{\beta P_{\text{S}} }}}} {\frac{1}{{\sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}e^{{ - \frac{{x_{2} }}{{\sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}}} } dx_{2} = 1 - e^{{\frac{{N_{0} }}{{\beta P_{\text{S}} \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }} - \frac{{\tilde{x}_{2} }}{{\beta \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}}} ,$$
(43)
$$f_{{\tilde{X}_{2} }} \left( {\tilde{x}_{2} } \right) = \frac{1}{{\beta \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}e^{{\frac{{N_{0} }}{{\beta P_{\text{S}} \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }} - \frac{{\tilde{x}_{2} }}{{\beta \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}}} .$$
(44)

By using (44), the probability distribution and density of random variables \(Y_{1}\) can be derived as (45) and (46) respectively.

$$\begin{aligned} F_{{Y_{1} }} \left( {y_{1} } \right) & = \Pr \left\{ {\frac{{X_{1} }}{{\tilde{X}_{2} }} < y_{1} } \right\} = \Pr \left\{ {X_{1} < \tilde{X}_{2} y_{1} } \right\} \\ & = e^{{\frac{{N_{0} }}{{\beta P_{\text{S}} \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}}} \int_{{{{N_{0} } \mathord{\left/ {\vphantom {{N_{0} } {P_{\text{S}} }}} \right. \kern-0pt} {P_{\text{S}} }}}}^{\infty } {\frac{1}{{\beta \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}e^{{ - \frac{{\tilde{x}_{2} }}{{\beta \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}}} \int_{0}^{{\tilde{x}_{2} y_{1} }} {\frac{1}{{\sigma_{\text{P}}^{2} }}e^{{ - \frac{{x_{1} }}{{\sigma_{\text{P}}^{2} }}}} } dx_{1} d\tilde{x}_{2} } = 1 - \frac{{\sigma_{\text{P}}^{2} }}{{\beta \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} y_{1} + \sigma_{\text{P}}^{2} }}e^{{ - \frac{{N_{0} }}{{P_{\text{S}} \sigma_{\text{P}}^{2} }}y_{1} }} , \\ \end{aligned}$$
(45)
$$f_{{Y_{1} }} \left( {y_{1} } \right) = \frac{{{{N_{0} } \mathord{\left/ {\vphantom {{N_{0} } {P_{\text{S}} }}} \right. \kern-0pt} {P_{\text{S}} }}}}{{\beta \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} y_{1} + \sigma_{\text{P}}^{2} }}e^{{ - \frac{{N_{0} }}{{P_{\text{S}} \sigma_{\text{P}}^{2} }}y_{1} }} + \frac{{\beta \sigma_{\text{P}}^{2} \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} }}{{\left( {\beta \sigma_{{{\text{S}}_{i} {\text{P}}}}^{2} y_{1} + \sigma_{\text{P}}^{2} } \right)^{2} }}e^{{ - \frac{{N_{0} }}{{P_{\text{S}} \sigma_{\text{P}}^{2} }}y_{1} }} .$$
(46)

The probability distribution and density of random variables \(\tilde{X}_{2}\) can be derived as (47) and (48), respectively.

$$F_{{\tilde{X}_{3} }} \left( {\tilde{x}_{3} } \right) = \Pr \left\{ {X_{3} < \tilde{X}_{3} - \frac{{N_{0} }}{{P_{\text{S}} }}} \right\} = \int_{0}^{{\tilde{x}_{3} - \frac{{N_{0} }}{{P_{\text{S}} }}}} {\frac{1}{{\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}e^{{ - \frac{{x_{3} }}{{\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}}} } dx_{3} = 1 - e^{{\frac{{N_{0} }}{{P_{\text{S}} \sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}}} e^{{ - \frac{{\tilde{x}_{3} }}{{\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}}} ,$$
(47)
$$f_{{\tilde{X}_{3} }} \left( {\tilde{x}_{3} } \right) = \frac{1}{{\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}e^{{\frac{{N_{0} }}{{P_{\text{S}} \sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}}} e^{{ - \frac{{\tilde{x}_{3} }}{{\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}}} .$$
(48)

By using (48), the probability distribution and density of random variables \(Y_{2}\) can be derived as (49) and (50) respectively.

$$\begin{aligned} F_{{Y_{2} }} \left( {y_{2} } \right) & = \Pr \left\{ {\frac{{X_{4} }}{{\tilde{X}_{3} }} < y_{2} } \right\} = \Pr \left\{ {X_{4} < \tilde{X}_{3} y_{2} } \right\} \\ & = e^{{\frac{{N_{0} }}{{P_{\text{S}} \sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}}} \int_{{{{N_{0} } \mathord{\left/ {\vphantom {{N_{0} } {P_{\text{S}} }}} \right. \kern-0pt} {P_{\text{S}} }}}}^{\infty } {\frac{1}{{\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}e^{{ - \frac{{\tilde{x}_{3} }}{{\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} }}}} \int_{0}^{{\tilde{x}_{3} y_{2} }} {\frac{1}{{\sigma_{\text{PE}}^{2} }}e^{{ - \frac{{x_{4} }}{{\sigma_{\text{PE}}^{2} }}}} dx_{4} } d\tilde{x}_{3} } = 1 - \frac{{\sigma_{\text{PE}}^{2} }}{{\sigma_{\text{PE}}^{2} + \sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} y_{2} }}e^{{ - \frac{{N_{0} }}{{P_{\text{S}} \sigma_{{P{\text{E}}}}^{2} }}y_{2} }} , \\ \end{aligned}$$
(49)
$$f_{{Y_{2} }} \left( {y_{2} } \right) = \frac{{\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} \sigma_{\text{PE}}^{2} }}{{\left( {\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} y_{2} + \sigma_{\text{PE}}^{2} } \right)^{2} }}e^{{ - \frac{{N_{0} }}{{P_{\text{S}} \sigma_{{P{\text{E}}}}^{2} }}y_{2} }} + \frac{{{{N_{0} } \mathord{\left/ {\vphantom {{N_{0} } {P_{\text{S}} }}} \right. \kern-0pt} {P_{\text{S}} }}}}{{\sigma_{{{\text{S}}_{i} {\text{E}}}}^{2} y_{2} + \sigma_{\text{PE}}^{2} }}e^{{ - \frac{{N_{0} }}{{P_{\text{S}} \sigma_{{P{\text{E}}}}^{2} }}y_{2} }} .$$
(50)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xie, P., Zhu, J., Zhang, M. et al. Aided Opportunistic Jammer Selection for Secrecy Improvement in Underlay Cognitive Radio Networks. Wireless Pers Commun 107, 829–848 (2019). https://doi.org/10.1007/s11277-019-06304-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06304-2

Keywords

Navigation