About Communications       Author's Guide       Reviewers       Editorial Members       Archive
Archive
Volume 8
2021
Volume 7
2020
Volume 6
2019
Volume 5
2018
Volume 4
2017
Volume 3
2016
Volume 2
2015
Volume 1
2014
AASCIT Communications | Volume 5, Issue 1 | Mar. 14, 2018 online | Page:8-21
Secure Massive MIMO Transmission for Cognitive Radio Networks
Abstract
In this paper, we consider the problem of physical layer security in Cognitive Radio Networks (CRNs), where a Secondary User Transmitter (SU-Tx) sends confidential messages to a Secondary User Receiver (SU-Rx) on the same frequency band of a primary user (PU) in the presence of a multiple antennas Eavesdropper. Massive Multiple Input Multiple Output (M-MIMO) technology is considered a key technology for next generation wireless systems, which provide higher rates and improve the reliability through diversity gains and spectrum efficiencies. We consider the effect of M-MIMO in improving the physical layer security in the presence of multiple antennas eavesdropper in CRNs, which has not yet been clarified. The Channel State Information (CSI) of the SU-Rx is assumed to be available at the transmitter side, whereas the CSI of the eavesdropper is assumed not known. It is found that M-MIMO is able to combat passive eavesdropping. Moreover, in order to investigate the effect of active eavesdropping on the secrecy performance of CRNs, the secrecy rate and the secrecy outage probability of this case is studied. The effects of some parameters such as the transmitted power at SU-Tx, interference temperature limit, and number of PUs are studied.
Authors
[1]
Hefdhallah Sakran, Department of Electrical Engineering, IBB University, Yemen.
[2]
Azzam Al-nahari, Department of Electrical Engineering, IBB University, Yemen.
[3]
Faisal Al-kamali, Department of Electrical Engineering, IBB University, Yemen.
[4]
Sami Tarbosh, Department of Electrical Engineering, IBB University, Yemen.
Keywords
Cognitive Radio, Massive MIMO, Achievable Secrecy Rate, Secrecy Outage Probability
Reference
[1]
Federal Communications Commission, “Spectrum Policy Task Force Report,” FCC Document ET Docket no. 02-155, Nov. 2002.
[2]
Notice of Proposed Rulemaking on Cognitive Radio, Federal Communications Commission (FCC) Std. no. 03-322, Dec. 2003.
[3]
J. Mitola, “Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio,” Ph.D. Thesis, KTH, Stockholm, Sweden, 2000.
[4]
S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, Feb. 2005.
[5]
P. J. Kolodzy, “Interference Temperatue: a Metric for Dynamic Spectrum Utilization,” International Journal of Network Management, vol. 16, pp. 103–113, Apr. 2006.
[6]
A. Wyner, “The Wire-tap Channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
[7]
Y. Pei, Y.-C. Liang, K. C. Teh and K. H. Li, “Achieving Cognitive and Secure Transmissions Using Multiple Antennas,” IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1–5, Sep. 2009.
[8]
Y. Pei, Y.-C. Liang, K. C. Teh and K. H. Li, “Secure Communication over MISO Cognitive Radio Channels,” IEEE Transaction on Wireless Communications, vol. 9, no. 4, pp. 1494–1502, Apr. 2010.
[9]
Y. Pei, Y. Liang, K. Chan and K. Li “Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information,” IEEE Transactions on Signal Processing, vol. 59, no. 4, Apr. 2011.
[10]
H. Sakran, M. Shokair, O. Nasr, S. El-Rabaie, and A. A. El-Azm,“Proposed relay selection scheme for physical layer security incognitive radio networks,” IET Communications, vol. 6, no. 16, pp. 2676–2687, 2012.
[11]
M. Z. I. Sarkar and T. Ratnarajah, “Enhancing security in the cognitive relay assisted co-existing radio systems with interferences,” in Proceedings of the IEEE International Conference on Communications (ICC ’13), pp. 4729–4733, June 2013.
[12]
Y. Yu, L. Hu, H. Li, Y. Zhang, F. Wu, and J. Chu, “The Security of Physical Layer in Cognitive Radio Networks,” Journal of Communications, vol. 9, No. 12, December 2014.
[13]
L. Jiang and H. Tian, “Energy-Efficient Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks,” Hindawi Publishing Corporation, vol. 2015, 2015.
[14]
H. Zhang, T. Wang, L. Song, Z. Han, “Interference Improves PHY Security for Cognitive Radio Network,” IEEE Transactions on Information Forensics and Security, vol. 11, pp. 609 – 620, 2016.
[15]
T. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” IEEE Trans. Wirel. Commun., pp. 3590–3600, 2010.
[16]
F. Rusek, D. Persson, B. K. Lau, et al. “Scaling up MIMO: opportunities and challenges with very large arrays,” IEEE Signal Process. Mag., pp. 40–60, 2013.
[17]
J. Zhu, R. Schober, and V. K. Bhargava, “Linear precoding of data and artificial noise in secure massive MIMO systems,” IEEE Trans. on Wireless Commun., 15 (3), pp. 2245-2261, 2016.
[18]
L. Wang, K. K. Wong, M. Elkashlan, A. Nallanathan, and S. Lambotharan, “Secrecy and energy efficiency in massive MIMO aided heterogeneous C-RAN: A new look at interference”, IEEE Journal of Selected Topics in Signal Processing, 10 (8), pp. 1375-1389, 2016.
[19]
A. Al-nahari, “Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers,” IET Communications, vol. 10, pp. 50–56, 2016.
[20]
X. Zhou, B. Maham, A., Hjørungnes, “Pilot contamination for active eavesdropping,” IEEE Trans. Wirel. Commun., vol. 11, pp. 903–907, 2012.
Arcticle History
Submitted: Jan. 16, 2018
Accepted: Feb. 18, 2018
Published: Mar. 14, 2018
The American Association for Science and Technology (AASCIT) is a not-for-profit association
of scientists from all over the world dedicated to advancing the knowledge of science and technology and its related disciplines, fostering the interchange of ideas and information among investigators.
©Copyright 2013 -- 2019 American Association for Science and Technology. All Rights Reserved.