Cognitive Radio Networks with Energy Harvesting and Eavesdropping-Emulation Resilience

A. Banerjee, S. Maity
{"title":"Cognitive Radio Networks with Energy Harvesting and Eavesdropping-Emulation Resilience","authors":"A. Banerjee, S. Maity","doi":"10.1109/COMSNETS48256.2020.9027337","DOIUrl":null,"url":null,"abstract":"Spectrum scarcity, limited power and coverage, reliable data transmission, security threats, etc. are few challenges in future 5G enabling wireless transceiver nodes. Cognitive radio (CR) while looks promising to address spectrum scarcity problem, energy harvesting (EH) would then provide operation sustainability, thus integration leads to EH-enabled CR network (CRN). Since spectrum sensing (SS) and secondary data transmission are two key issues in a CR system, primary user emulation attack (PUEA) and eavesdropping are the two common security threats in any CRN. Thus a CR system design needs opportunistic sharing for reliable data transmission with sustainable network operation in presence of such security threats. A CRN model is proposed here that includes a set of transmit-receive node pairs of secondary users (SUs) to share primary user (PU) spectrum, one fusion center (FC), one PUEA node, an eavesdropper node and multiple cooperative jammers to countermeasure the effect of eavesdropping. Protection in eavesdropping is done by selecting the best friendly jammer that minimizes the signal-to-interference plus noise ratio at the eavesdropper. The objective of this study is to maximize the sum secondary throughput of the network under the constraints of meeting the sensing reliability of PU, individual energy causality for each SU and friendly jammer, interference at PU receiver, individual secondary and secrecy outage probability. Simulation result show the efficacy of the proposed scheme.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS48256.2020.9027337","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Spectrum scarcity, limited power and coverage, reliable data transmission, security threats, etc. are few challenges in future 5G enabling wireless transceiver nodes. Cognitive radio (CR) while looks promising to address spectrum scarcity problem, energy harvesting (EH) would then provide operation sustainability, thus integration leads to EH-enabled CR network (CRN). Since spectrum sensing (SS) and secondary data transmission are two key issues in a CR system, primary user emulation attack (PUEA) and eavesdropping are the two common security threats in any CRN. Thus a CR system design needs opportunistic sharing for reliable data transmission with sustainable network operation in presence of such security threats. A CRN model is proposed here that includes a set of transmit-receive node pairs of secondary users (SUs) to share primary user (PU) spectrum, one fusion center (FC), one PUEA node, an eavesdropper node and multiple cooperative jammers to countermeasure the effect of eavesdropping. Protection in eavesdropping is done by selecting the best friendly jammer that minimizes the signal-to-interference plus noise ratio at the eavesdropper. The objective of this study is to maximize the sum secondary throughput of the network under the constraints of meeting the sensing reliability of PU, individual energy causality for each SU and friendly jammer, interference at PU receiver, individual secondary and secrecy outage probability. Simulation result show the efficacy of the proposed scheme.
具有能量收集和窃听仿真弹性的认知无线电网络
频谱稀缺、有限的功率和覆盖、可靠的数据传输、安全威胁等是未来5G无线收发器节点面临的一些挑战。认知无线电(CR)虽然看起来有希望解决频谱短缺问题,但能量收集(EH)随后将提供操作可持续性,因此集成导致支持EH的CR网络(CRN)。由于频谱感知(SS)和二次数据传输是CR系统中的两个关键问题,因此主用户仿真攻击(PUEA)和窃听是任何CRN中常见的两种安全威胁。因此,CR系统设计需要机会共享,以便在存在此类安全威胁的情况下实现可靠的数据传输和可持续的网络运行。本文提出了一种CRN模型,该模型包括一组辅助用户(su)的收发节点对来共享主用户(PU)频谱,一个融合中心(FC)、一个PUEA节点、一个窃听节点和多个协同干扰器来对抗窃听的影响。窃听保护是通过选择最友好的干扰器来实现的,该干扰器的信噪比最小。本研究的目标是在满足PU的感知可靠性、每个SU和友好干扰机的单个能量因果关系、PU接收器的干扰、单个次要和保密中断概率的约束下,使网络的总次要吞吐量最大化。仿真结果表明了该方案的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信