Skip to main content

Advertisement

Log in

A spectrum sharing model that counters eavesdropping

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Cybersecurity has become a major concern in the modern world. A serious threat to wireless networks is eavesdropping. On the other hand, usable spectrum is diminishing due to the presence of various wireless services. To address the problem, highly spectral efficient methods have been introduced e.g. spectrum sharing. Cognitive radio networks could sense unused spectrum and make use of it. In this paper, the cognitive radio is to perform a second task, i.e. jamming the eavesdropper. This paper is significant in revealing the cognitive radio’s energy efficiency in this setting, where a cognitive transmitter (CT) can transmit its own data when it senses the absence of primary transmitter (PT). If PT is present, CT is to jam an eavesdropper (EA) by transmitting artificial noise. Our main contribution is finding the CT’s optimal energy efficiency. Through the proposed formulas, we have determined the fractions of time and power required by CT to achieve the optimal energy efficiency, subject to constraints like minimum required secrecy rate Rs, etc. Our major findings are: (1) only a small portion of a time frame (66 μs in our setting) is required for sensing. CT can utilize the remaining time for sending its data or jamming EA. (2) To achieve a target energy efficiency of 0.5 bps/Hz/J, PT should not be actively transmitting more than 35% of the time, and Rs should not be larger than 1.2 bps/Hz.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Wyner, A. D. (1975). The wire-tap channel. The Bell System Technical Journal,54(8), 1355–1387.

    Article  Google Scholar 

  2. Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory,54(6), 2515–2534.

    Article  Google Scholar 

  3. Spectrum policy task force. (2002). Federal Communications Commission, ET Docket No. 02-135. Technical Report.

  4. Lu, W., Gu, K., Jia, M., Lu, Z., & Peng, H. (2017). Joint resource optimization for secure transmission in cooperative CR networks. EURASIP Journal on Wireless Communications and Networking,2017, 193.

    Article  Google Scholar 

  5. Gu, C., & Zhang, C. (2017). Joint distributed beamforming and jamming schemes in decode-and-forward relay networks for physical layer secrecy. EURASIP journal on wireless communications and networking. https://doi.org/10.1186/s13638-017-0997-x.

  6. Nguyen, N.-P., Thanh, T. L., Duong, T. Q., & Nallanathan, A. (2017). Secure communications in cognitive underlay networks over Nakagami-m channel. Physical Communication,25(part 2), 610–618.

    Article  Google Scholar 

  7. Xu, D., & Li, Q. (2017). Improving physical-layer security for primary users in cognitive radio networks. IET Communications,11(15), 2303–2310.

    Article  Google Scholar 

  8. Li, Q., & Xu, D. (2017). Minimizing secrecy outage probability for primary users in cognitive radio networks. AEU—International Journal of Electronics and Communications,83, 353–358.

    Article  Google Scholar 

  9. Costa, M., & Ephremides, A. (2016). Energy efficiency versus performance in cognitive wireless networks. IEEE Journal on Selected Areas in Communications,34(5), 1336–1347.

    Article  Google Scholar 

  10. Deng, R., Chen, J., Yuen, C., Cheng, P., & Sun, Y. (2012). Energy-efficient cooperative spectrum sensing by optimal scheduling in sensor-aided cognitive radio networks. IEEE Transactions on Vehicular Technology,61(2), 716–725.

    Article  Google Scholar 

  11. Xie, R., Yu, F. R., Ji, H., & Li, Y. (2012). Energy-efficient resource allocation for heterogeneous cognitive radio networks with femtocells. IEEE Transactions on Wireless Communications,11(11), 3910–3920.

    Article  Google Scholar 

  12. Pei, Y., Liang, Y. C., Teh, K. C., & Li, K. H. (2011). Energy-efficient design of sequential channel sensing in cognitive radio networks: Optimal sensing strategy, power allocation, and sensing order. IEEE Journal on Selected Areas in Communications,29(8), 1648–1659.

    Article  Google Scholar 

  13. Zheng, L., Sang, L., Liu, J., Lu, B., & Dong, Z. (2018). Maximising the degrees of freedom of the physical-layer secured relay networks with artificial jamming. IET Communications,12(6), 665–671.

    Article  Google Scholar 

  14. Sharma, S., Roy, S. D., & Kundu, S. (2019). Secrecy performance of a two-way communication network with two half-duplex DF relays. IET Communications,13(5), 620–629.

    Article  Google Scholar 

  15. Alibeigi, M., & Taherpour, A. (2019). Optimisation of secrecy rate in cooperative device to device communications underlaying cellular networks. IET Communications,13(5), 512–519.

    Article  Google Scholar 

  16. Liang, Y. C., Zeng, Y., Peh, E. C. Y., & Hoang, A. T. (2008). Sensing-throughput tradeoff for cognitive radio networks. IEEE Transactions on Wireless Communications,7(4), 1326–1337.

    Article  Google Scholar 

  17. Althunibat, S., & Granelli, F. (2016). On results’ reporting of cooperative spectrum sensing in cognitive radio networks. Telecommunication Systems,62(3), 569–580.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yee-Loo Foo.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Foo, YL. A spectrum sharing model that counters eavesdropping. Telecommun Syst 73, 183–188 (2020). https://doi.org/10.1007/s11235-019-00605-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-019-00605-4

Keywords

Navigation