Enhancing secrecy rate in cognitive radio networks via multilevel Stackelberg game

Article English OPEN
Al Talabani, Ali; Deng, Yansha; Nallanathan, Arumugam; Nguyen, Huan X.;
  • Publisher: Institute of Electrical and Electronics Engineers (IEEE)

In this letter, physical layer (PHY) security is investigated for both primary and secondary transmissions of a cognitive radio network (CRN) that is in danger of malicious attempt by an eavesdropper (ED). In our proposed system, the secondary transmitter (ST) is acted ... View more
  • References (9)

    [1] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “Interference assisted secret communication,” IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153- 3167, May 2011.

    [2] E. Tekin and A. Yener, “The general Gaussian multiple access and two way wire-tap channels: achievable rates and cooperative jamming,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.

    [3] K. Lee, C. Chae, and J. Kang, “Spectrum leasing via cooperation for enhanced physical-layer secrecy,” IEEE Trans. Veh. Technol., vol. 62, no. 9, Nov. 2013.

    [4] Z. Chu, K. Cumanan, Z. Ding, M. Johnston and S. Le Goff, “Secrecy rate optimizations for a MIMO secrecy channel with a cooperative Jammer,” IEEE Trans. Veh. Technol., vol. 64, no. 5, May 2015.

    [5] N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. (Sherman) Shen, “Cooperative spectrum access towards secure information transfer for CRNs,” IEEE J. Sel. Areas Commun., vol. 31, no. 11, Mar. 2013.

    [6] L. Dong, H. Yousefizadeh and H. Jafarkhani, “Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper,” Proc. IEEE International Conf. Communications (ICC), 2011.

    [7] Q. Ma and C. Tepedelenlioglu, “Antenna selection for space-time coded systems with imperfect channel estimation,” IEEE Trans. Wireless Commun., vol. 6, no. 2, pp. 710-719, Feb. 2007.

    [8] H. Xing, L. Liu and R. Zhang, “Secrecy wireless information and power transfer in fading wiretap channel,” IEEE Trans. Veh. Technol., no. 99, Jan. 2015.

    [9] H. Koorapaty, A. A.Hassan and S. Chennakeshu, “Secure information transmission for mobile radio” IEEE Commun. Lett., vol. 4, no. 2, Feb. 2000.

  • Metrics
Share - Bookmark