JOURNAL ARTICLE

Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users

Meng ZhangYuan Liu

Year: 2014 Journal:   2015 IEEE Global Communications Conference (GLOBECOM) Vol: 6 Pages: 1-6

Abstract

In this paper, we consider a cognitive radio network (CRN) consisting of a primary transmitter-receiver pair and an untrusted secondary transmitter-receiver pair, and each pair is a multiple-input single-output (MISO) link. We consider two transmission schemes, namely underlay scheme and cooperative scheme. For the underlay scheme, the secondary user (SU) is allowed to transmit simultaneously in the presence of primary transmission. For the cooperative scheme, the secondary transmitter acts as a relay node to increase the secrecy rate of primary transmission in exchange for its own transmission. For both schemes, the SU is untrusted and considered as a potential eavesdropper. Our goal is to minimize the total power consumption while satisfying the primary user (PU)'s required secrecy rate and SU's required information rate. By suitable optimization tools, we design the joint secure beamforming for both schemes. The simulation results show that in the considered system model, the underlay scheme performs better than the cooperative scheme, especially with high rate requirements and large number of antennas at secondary transmitter.

Keywords:
Underlay Transmitter Beamforming Computer science Cognitive radio Computer network Transmission (telecommunications) Node (physics) Transmitter power output Relay Secure transmission Secrecy Interference (communication) Signal-to-noise ratio (imaging) Telecommunications Wireless Power (physics) Channel (broadcasting) Engineering Computer security

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
19
Refs
0.18
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Cognitive Radio Networks and Spectrum Sensing
Physical Sciences →  Computer Science →  Computer Networks and Communications
Cooperative Communication and Network Coding
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users

Meng ZhangYuan Liu

Journal:   2015 IEEE Global Communications Conference (GLOBECOM) Year: 2015 Pages: 1-6
JOURNAL ARTICLE

Secure Beamforming for Untrusted MISO Cognitive Radio Networks

Meng ZhangYuan Liu

Journal:   IEEE Transactions on Wireless Communications Year: 2018 Vol: 17 (7)Pages: 4861-4872
JOURNAL ARTICLE

Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks

Hyoungsuk JeonStephen McLaughlinIl‐Min KimJeongseok Ha

Journal:   IEEE Transactions on Wireless Communications Year: 2014 Vol: 13 (4)Pages: 1790-1805
© 2026 ScienceGate Book Chapters — All rights reserved.