JOURNAL ARTICLE

Multi-Phase Smart Relaying and Cooperative Jamming in Secure Cognitive Radio Networks

Pin-Hsun LinFrédéric GabryRagnar ThobabenEduard A. JorswieckMikael Skoglund

Year: 2016 Journal:   IEEE Transactions on Cognitive Communications and Networking Vol: 2 (1)Pages: 38-52   Publisher: Institute of Electrical and Electronics Engineers

Abstract

In this paper, we investigate cooperative secure communications in a four-node cognitive radio network where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission. The secondary user is allowed to transmit his own signals under the condition that the primary user's secrecy rate and transmission scheme are intact. Under this setting, we derive the secondary user's achievable rates and the related constraints to guarantee the primary user's weak secrecy rate, when Gelfand-Pinsker coding is used at the secondary transmitter. In addition, we propose a multiphase transmission scheme to include: 1) the phases of the clean relaying with cooperative jamming and 2) the latency to successfully decode the primary message at the secondary transmitter. A capacity upper bound for the secondary user is also derived. Numerical results show that: 1) the proposed scheme can outperform the traditional ones by properly selecting the secondary user's parameters of different transmission schemes according to the relative positions of the nodes and 2) the derived capacity upper bound is close to the secondary user's achievable rate within 0.3 bits/channel use, especially when the secondary transmitter/receiver is far/close enough to the primary receiver/transmitter, respectively. Thereby, a smart secondary transmitter is able to adapt the relaying and cooperative jamming to guarantee primary secrecy rates and to transmit its own data at the same time from relevant geometric positions.

Keywords:
Transmitter Cognitive radio Jamming Computer science Computer network Secrecy Transmission (telecommunications) Node (physics) Channel (broadcasting) Transmitter power output Secure transmission Upper and lower bounds Electronic engineering Topology (electrical circuits) Telecommunications Wireless Electrical engineering Computer security Engineering Mathematics Physics

Metrics

20
Cited By
1.28
FWCI (Field Weighted Citation Impact)
38
Refs
0.85
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Cooperative Communication and Network Coding
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Wireless Communication Technologies
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
© 2026 ScienceGate Book Chapters — All rights reserved.