Title | Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Wang, Fei, Zhang, Xi |
Conference Name | 2017 51st Annual Conference on Information Sciences and Systems (CISS) |
Keywords | antennas, Cognitive radio, Cognitive Radio Security, colocated orthogonally dual-polarized antenna, communication security, cooperative cognitive radio networks, cooperative communication, CRN, EH, electromagnetic wave polarisation, energy harvesting, frequency division multiple access, jamming, jamming signals, minimum secrecy rate requirement, numerical analyses, numerical analysis, ODPA, OFDM modulation, OFDMA, orthogonally dual-polarized antennas (ODPAs), physical-layer security, polarization-based signal processing technique, polarization-enabled green cooperative cognitive radio network, power splitting ratio, primary user, PU, pubcrawl, radio networks, radio receivers, radio reception, radio transmitters, radiofrequency signal emission, receiver, Receivers, Resiliency, resource allocation, Resource management, RF signal emission, secondary user, secure resource allocation, security, Signal processing, SU, subcarrier allocation, telecommunication security, transmitter, untrusted secondary user, untrusted secondary users |
Abstract | We address secure resource allocation for an OFDMA cooperative cognitive radio network (CRN) with energy harvesting (EH) capability. In the network, one primary user (PU) cooperates with several untrusted secondary users (SUs) with one SU transmitter and several SU receivers, where the SU transmitter and all SU receivers may overhear the PU transmitter's information while all SU receivers may eavesdrop on each other's signals. We consider the scenario when SUs are wireless devices with small physical sizes; therefore to improve system performance we suppose that SUs are equipped with co-located orthogonally dual-polarized antennas (ODPAs). With ODPAs, on one hand, the SU transmitter can first harvest energy from radio frequency (RF) signals emitted by the PU transmitter, and then utilize the harvested energy to simultaneously serve the PU and all SU receivers. On the other hand, by exploiting polarization-based signal processing techniques, both the PU's and SUs' physical-layer security can be enhanced. In particular, to ensure the PU's communication security, the PU receiver also sends jamming signals to degrade the reception performance of SUs, and meanwhile the jamming signals can also become new sources of energy powering the SU transmitter. For the considered scenario, we investigate the joint allocation of subcarriers, powers, and power splitting ratios to maximize the total secrecy rate of all SUs while ensuring the PU's minimum secrecy rate requirement. Finally, we evaluate the performance of our resource allocation scheme through numerical analyses. |
DOI | 10.1109/CISS.2017.7926133 |
Citation Key | wang_secure_2017 |