Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
In this paper we investigate cooperative secure communications in a four-node cognitive radio network where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission. The secondary user is allowed to transmit his own signals under the condition that the primary user's secrecy rate and transmission scheme are intact. Under this setting we derive the secondary user's achievable rates and the related constraints to guarantee the primary user's weak secrecy rate, when Gelfand-Pinsker coding is used at the secondary transmitter.In addition, we propose a multi-phase transmission scheme to include 1) the phases of the clean relaying with cooperative jamming and 2) the latency to successfully decode the primary message at the secondary transmitter. A capacity upper bound for the secondary user is also derived. Numerical results show that: 1) the proposed scheme can outperform the traditional ones by properly selecting the secondary user's parameters of different transmission schemes according to the relative positions of the nodes; 2) the derived capacity upper bound is close to the secondary user's achievable rate within 0.3 bits/channel use, especially when the secondary transmitter/receiver is far/close enough to the primary receiver/transmitter, respectively. Thereby, a smart secondary transmitter is able to adapt its relaying and cooperative jamming to guarantee primary secrecy rates and to transmit its own data at the same time from relevant geometric positions.
In this paper we investigate cooperative secure communications in a four-node cognitive radio network where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission. The secondary user is allowed to transmit his own signals under the condition that the primary user's secrecy rate and transmission scheme are intact. Under this setting we derive the secondary user's achievable rates and the related constraints to guarantee the primary user's weak secrecy rate, when Gelfand-Pinsker coding is used at the secondary transmitter.In addition, we propose a multi-phase transmission scheme to include 1) the phases of the clean relaying with cooperative jamming and 2) the latency to successfully decode the primary message at the secondary transmitter. A capacity upper bound for the secondary user is also derived. Numerical results show that: 1) the proposed scheme can outperform the traditional ones by properly selecting the secondary user's parameters of different transmission schemes according to the relative positions of the nodes; 2) the derived capacity upper bound is close to the secondary user's achievable rate within 0.3 bits/channel use, especially when the secondary transmitter/receiver is far/close enough to the primary receiver/transmitter, respectively. Thereby, a smart secondary transmitter is able to adapt its relaying and cooperative jamming to guarantee primary secrecy rates and to transmit its own data at the same time from relevant geometric positions.
The secrecy problem in the state‐dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter–receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by two channel state sequences, which are known at the cognitive transmitter and the corresponding receiver, separately. The cognitive transmitter should cooperate with the primary one, and it wishes to keep its message secure at the primary receiver. The achievable equivocation‐rate regions for this channel are derived using two approaches: the binning scheme coding and superposition coding. Then, comparisons between the results using two coding approaches, in Gaussian case, shows that there is a trade‐off between the achievable rate of the primary transmitter and the equivocation rate of the cognitive one. Moreover, the outer bounds on the capacity of the channel are derived. Copyright © 2016 John Wiley & Sons, Ltd.
Information-theoretic limits of cognitive radio networks have been under exploration since more than a decade ago. Although such limits are unknown for many networks, including the simplest case with two pairs of transmitter-receiver, there are several cases for which the capacity limits are obtained either exactly or up to a constant gap. The goal of this chapter is to provide insights into the nature of transmission techniques associated with optimal communication when cognitive radio technology is used. Outlining the state of the art in the information-theoretic analysis of different cognitive systems, we highlight the salient features/points of the capacity-achieving or capacity-approaching strategies that should be considered in wireless network design paradigms based on this technology. In particular, we emphasize on the interaction of cognitive radio with emerging technologies for 5G networks. * E-mail address: mvaezi@princeton.edu arXiv:2001.09261v1 [cs.IT] 25 Jan 2020 i Cognitive Radio Network ParadigmsDepending on the type of available network side information and the regulatory constraints, cognitive radio networks can be divided into three main paradigms [1]: interweave, underlay, and overlay. While in the last two cases, the cognitive users concurrently transmit over i Article Name 3 the same spectrum as the primary users, in the first case cognitive users use spectrum holes (temporary space-time frequency voids) for transmission.i 4 Authors Cognitive Radio Channels: Capacity Results and IntuitionsInformation theory provides a framework for analyzing the fundamental limits of communication. Fundamental limits can then be used as benchmarks for the operation of the desired communication system (cognitive radio networks here). This, in turns, allows researchers and engineers to measure to what extent a practical network is efficient and also guides them in the design and standardization phases. The two-user interference channel (IC) is a two-transmitter two-receiver network, in which each transmitter has an independent message for its respective receiver [3][4][5][6][7]. The transmitters do not have side information about the other user's communication. Since users communicate over a shared channel, they interfere with each other. In the cognitive radio communication setting, one transmitter (cognitive transmitter) is able to sense the environment and obtain side information about the other transmitter (noncognitive or primary transmitter). Such a communication channel is called cognitive interference channel, also known as interference channel with "unidirectional" cooperation, or simply cognitive channel. We formally define this channel and its derivatives in the following.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.