Resource Allocation for Secure Communication in Cooperative CR Networks

  • Weidang LuEmail author
  • Kecai Gu
  • Zhanghui Lu
  • Hong Peng
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 463)


This paper investigates joint resource allocation to provide information security in a five nodes CRNS system, which includes a primary transmitter (PT), a primary receiver (PR), a secondary transmitter (ST), a secondary receiver (SR) and an eavesdropper (E). To ensure the security of the information, PT and PR are allowed to use part of power to transmit artificial noise to confuse the eavesdropper. PT firstly transmits signal containing secrecy information and artificial noise by using all power and bandwidth resources. Then ST as a trusted relay accesses to the licensed bandwidth and allocates a fraction of bandwidth resources to forward primary information in decode-and-forward (DF) mode. As a reward, it can utilize the remaining bandwidth to transmit its own information simultaneously. We study joint optimization of the bandwidth, time and power allocation to maximize the secondary rate while satisfying the secrecy transmission rate requirements of PR. Numerical results demonstrate that our strategy can realize win-win result.


Cognitive radio Physical layer security Artificial noise Secrecy rate 



This work was supported by China National Science Foundation under Grand No. 61402416 and 61601221, Project funded by China Postdoctoral Science Foundation under Grand No. 2017M612027.


  1. 1.
    Zou, Y., Zhu, J., Yang, L., Ying, C.L., Yao, Y.D.: Securing physical-layer communications for cognitive radio networks. IEEE Commun. Mag. 53, 48–54 (2015)Google Scholar
  2. 2.
    Wyner, A.D.: The wire-tap channel. Bell Labs Tech. J. 54, 1355–1387 (1975)Google Scholar
  3. 3.
    Csiszar, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theor. 24, 339–348 (1978)Google Scholar
  4. 4.
    Deng, H., Wang, H.M., Guo, W., Wang, W.: Secrecy transmission with a helper: to relay or to jam. J. IEEE Trans. Inf. Forensics Secur. 10, 293–307 (2015)Google Scholar
  5. 5.
    Deng, H, Wang, H.M, Wang, W., Yin, Q.J.: Secrecy transmission with a helper: to relay or not to relay. In: IEEE International Conference on Communications Workshops (ICC), pp. 825–830. IEEE Press, Sydney (2014)Google Scholar
  6. 6.
    Wang, H.M., Xia, X.G.: Enhancing wireless secrecy via cooperation: signal design and optimization. IEEE Commun. Mag. 53, 47–53 (2015)Google Scholar
  7. 7.
    Jia Min, G., Xuemai, G.Q., Wei, X., Naitong, Z.: Broadband hybrid satellite-terrestrial communication systems based on cognitive radio towards 5G. IEEE Wirel. Commun. 23, 96–106 (2016)Google Scholar
  8. 8.
    Jia, M., Wang, L., Yin, Z., Guo, Q., Gu, X.: A novel spread slotted ALOHA based on cognitive radio for satellite communications system. EURASIP J. Wirel. Commun. Netw. 50, 1–9 (2016)Google Scholar
  9. 9.
    Lu, W., Wang, J., Ge, W., Li, F., Hua, J., Meng, L.: An anti-interference cooperative bandwidth sharing strategy with joint optimization of time and bandwidth. Commun. Netw. 16, 141–145 (2014)Google Scholar
  10. 10.
    Hafeez, M., Elmirghani, J.M.H.: Analysis of dynamic bandwidth leasing for coded bi-directional communication. IEEE J. Sel. Areas Commun. 30, 1500–1512 (2012)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.College of Information EngineeringZhejiang University of TechnologyHangzhouChina
  2. 2.Haitian Plastics Machinery Group Co., Ltd.NingboChina

Personalised recommendations