Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
On Physical Layer Security for Reactive DF Cognitive Relay Networks
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.ORCID-id: 0000-0003-3604-2766
2014 (Engelska)Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

This paper analyzes the physical layer security for cognitive relay networks under the peak interference power constraint of the primary user receiver. In particular, a secondary user (SU) transmitter communicates with an SU receiver through the help of multiple secondary relays (SRs) using a decode-and- forward (DF) protocol. There exist multiple eavesdroppers (EAVs) who illegally listen to the secondary network communication. We consider a reactive DF scheme, and only the SRs that satisfy a decoding threshold participate in the relay selection. Analytical expressions of the probability of existence of secrecy capacity and secrecy outage probability are obtained. Numerical results are provided to evaluate the impact of the number of SRs, number of EAVs and channel mean powers on the secondary system security. We also investigate the effect of the interference from the primary network to the secondary network performance. Moreover, the performance of proactive DF is analyzed for the purpose of comparison.

Ort, förlag, år, upplaga, sidor
Austin, USA: IEEE , 2014.
Nyckelord [en]
Physical Layer Security, Reactive Decode-and-forwardm, Cognitive Relay Networks
Nationell ämneskategori
Telekommunikation
Identifikatorer
URN: urn:nbn:se:bth-6561ISI: 000381558700216Lokalt ID: oai:bth.se:forskinfoD600175EFB472F3DC1257D91003908B3OAI: oai:DiVA.org:bth-6561DiVA, id: diva2:834079
Konferens
IEEE Global Communications Conference
Tillgänglig från: 2014-11-17 Skapad: 2014-11-15 Senast uppdaterad: 2021-05-03Bibliografiskt granskad
Ingår i avhandling
1. Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints
Öppna denna publikation i ny flik eller fönster >>Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints
2016 (Engelska)Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
Abstract [en]

The cognitive radio network (CRN) concept has been proposed as a solution to the growing demand and underutilization of the radio spectrum. To improve the radio spectrum utilization, CRN technology allows the coexistence of licensed and unlicensed systems over the same spectrum. In an underlay spectrum sharing system, secondary users (SUs) transmit simultaneously with the primary users (PUs) in the same frequency band given that the interference caused by the SU to the PU remains below a tolerable interference limit. Besides the transmission power limitation, a secondary network is subject to distinct channel impairments such as fading and interference from the primary transmissions. Also, CRNs face new security threats and challenges due to their unique cognitive characteristics.This thesis analyzes the performance of underlay CRNs and underlay cognitive relay networks under spectrum sharing constraints and security constraints. Distinct SU transmit power policies are obtained considering various interference constraints such as PU outage constraint or PU peak interference power constraint.

The thesis is divided into an introduction and two research parts based on peer-reviewed publications. The introduction provides an overview of radio spectrum management, basic concepts of CRNs, and physical layer security. In the first research part, we study the performance of underlay CRNs with emphasis on a multiuser environment.In Part I-A, we consider a secondary network with delay-tolerant applications and analyze the ergodic capacity. Part I-B analyzes the secondary outage capacity which characterises the maximum data rate that can be achieved over a channel for a given outage probability. In Part I-C, we consider a secondary network with delay constrained applications, and derive expressions of the outage probability and delay-limited throughput. Part I-D presents a queueing model that provides an analytical tool to evaluate the secondary packet-level performance with multiple classes of traffic considering general interarrival and service time distributions. Analytical expressions of the SU average packet transmission time, waiting time in the queue, andtime spent in the system are provided.In the second research part, we analyze the physical layer security for underlay CRNs and underlay cognitive relay networks. Analytical expressions of the probability of non-zero secrecy capacity and secrecy outage probability are derived.Part II-A considers a single hop underlay CRN in the presence of multiple eavesdroppers (EAVs) and multiple SU-Rxs. In Part II-B, an underlay cognitive relay network in the presence of multiple secondary relays and multiple EAVs is studied.Numerical examples illustrate that it is possible to exploit the physical layer characteristics to achieve both security and quality of service in CRNs while satisfying spectrum sharing constraints.

Ort, förlag, år, upplaga, sidor
Karlskrona: Blekinge Tekniska Högskola, 2016
Serie
Blekinge Institute of Technology Doctoral Dissertation Series, ISSN 1653-2090 ; 3
Nyckelord
Underlay cognitive radio networks, spectrum sharing constraints, physical layer security
Nationell ämneskategori
Kommunikationssystem
Identifikatorer
urn:nbn:se:bth-11739 (URN)978-91-7295-324-6 (ISBN)
Disputation
2016-05-12, J1650, Campus Gräsvik, Karlskrona, 10:15 (Engelska)
Opponent
Handledare
Tillgänglig från: 2016-03-17 Skapad: 2016-03-16 Senast uppdaterad: 2016-08-09Bibliografiskt granskad

Open Access i DiVA

fulltext(254 kB)420 nedladdningar
Filinformation
Filnamn FULLTEXT01.pdfFilstorlek 254 kBChecksumma SHA-512
30b364ff295163439517290dc3d74e9888816daee47696329267e161167687d3e8e16a834503259fb587d9172d7faaef28e18904b28a643207969d270cbc0b56
Typ fulltextMimetyp application/pdf

Person

Sibomana, LouisZepernick, Hans-Jürgen

Sök vidare i DiVA

Av författaren/redaktören
Sibomana, LouisZepernick, Hans-Jürgen
Av organisationen
Institutionen för kommunikationssystem
Telekommunikation

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 420 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

urn-nbn

Altmetricpoäng

urn-nbn
Totalt: 225 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf