You are required to read and agree to the below before accessing a full-text version of an article in the IDE article repository.

The full-text document you are about to access is subject to national and international copyright laws. In most cases (but not necessarily all) the consequence is that personal use is allowed given that the copyright owner is duly acknowledged and respected. All other use (typically) require an explicit permission (often in writing) by the copyright owner.

For the reports in this repository we specifically note that

  • the use of articles under IEEE copyright is governed by the IEEE copyright policy (available at http://www.ieee.org/web/publications/rights/copyrightpolicy.html)
  • the use of articles under ACM copyright is governed by the ACM copyright policy (available at http://www.acm.org/pubs/copyright_policy/)
  • technical reports and other articles issued by M‰lardalen University is free for personal use. For other use, the explicit consent of the authors is required
  • in other cases, please contact the copyright owner for detailed information

By accepting I agree to acknowledge and respect the rights of the copyright owner of the document I am about to access.

If you are in doubt, feel free to contact webmaster@ide.mdh.se

Power Allocation Policy and Performance Analysis of Secure and Reliable Communication in Cognitive Radio Networks

Fulltext:


Authors:

Quach Xuan Truong , Tran Hung, Elisabeth Uhlemann, Gorge Kaddoum , Quang Anh Tran

Research group:


Publication Type:

Journal article

Venue:

Wireless Networks (Springer)

DOI:

https://doi.org/10.1007/s11276-017-1605-z


Abstract

This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the normal interference constraint imposed by the primary user (PU). Thus, the SU must have a suitable power allocation policy which does not only satisfy the constraints of the PU but also the security constraints such that it obtains a reasonable performance for the SU, without exposing information to the eavesdropper. We derive four power allocation policies for different scenarios corresponding to whether or not the channel state information of the PU and the eavesdropper are available at the SU. Further, we introduce the concept secure and reliable communication probability (SRCP) as a performance metric to evaluate the considered system, as well as the efficiency of the four power allocation policies. Finally, we present numerical examples to illustrate the power allocation polices, and the impact of these policies on the SRCP of the SU.

Bibtex

@article{Xuan Truong4935,
author = {Quach Xuan Truong and Tran Hung and Elisabeth Uhlemann and Gorge Kaddoum and Quang Anh Tran},
title = {Power Allocation Policy and Performance Analysis of Secure and Reliable Communication in Cognitive Radio Networks},
volume = {20},
month = {October},
year = {2017},
journal = {Wireless Networks (Springer)},
url = {http://www.es.mdh.se/publications/4935-}
}