Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack

  • PDF / 582,337 Bytes
  • 10 Pages / 595.276 x 793.701 pts Page_size
  • 67 Downloads / 173 Views

DOWNLOAD

REPORT


RESEARCH

Open Access

Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack Jia Zhu

Abstract In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of an eavesdropper. In the cognitive radio network, CBS first detects whether there is spectrum hole through spectrum sensing and then communicates with CUs over the detected spectrum hole. Due to the broadcast nature of wireless transmission, the eavesdropper can overhear the cognitive transmissions between CBS and CUs and attempts to decode its overheard signals for interception purpose. In order to effectively defend against the eavesdropping attack, we propose a multiuser scheduling scheme for cognitive transmissions, where a CU with the highest instantaneous capacity to CBS is selected and scheduled to communicate with CBS. We analyze the security-reliability trade-off performance of proposed multiuser scheduling scheme for cognitive transmissions with the imperfect spectrum sensing over Rayleigh fading channels, where the security and reliability are evaluated in terms of the intercept probability and the outage probability, respectively. Numerical results illustrate that as the intercept probability requirement loosens, the outage probability of proposed multiuser scheduling scheme decreases accordingly, showing the trade-off between security and reliability. In addition, as the number of CUs increases, numerical intercept probability and outage probability of the multiuser scheduling scheme significantly improve, implying the security and reliability benefits through multiuser scheduling. Keywords: Security-reliability trade-off; Cognitive radio; Eavesdropping; Intercept probability; Outage probability

1 Introduction Cognitive radio (CR) is emerging as a means to improve the spectrum resource utilization and allows unlicensed users (also called secondary user or cognitive user) to access the licensed spectrum in an opportunistic way [1-3]. Nowadays, most of radio spectrum is already licensed to particular wireless systems, e.g., the very high frequency (VHF) band from 174 to 216 MHz is allocated to broadcast television systems in North America, the ultra-high frequency (UHF) band from 880 to 915 MHz is allocated to the Global System for Mobile Communications (GSM), and so on. There is no available spectrum suited for developing new wireless communication systems. However, it has been reported by Federal Correspondence: [email protected] School of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, People's Republic of China

Communications Commission (FCC) that the utilization of licensed spectrum typically ranges from 15% to 85% with a high variance in time, showing that the licensed spectrum is underutilized [4]. This provides us with an opportunity to develop a cognitive radio system that opportunistically utilizes the licensed spectrum. More speci