- Research
- Open access
- Published:
Spectrum sharing with secure transmission
EURASIP Journal on Wireless Communications and Networking volume 2014, Article number: 134 (2014)
Abstract
In this paper, we propose a cooperative scheme between primary and secondary networks. In this scheme, a secondary user (SU) accepts a lease of a part of the licensed band according to a cooperative request of a primary user (PU). Hence, the SU helps the PU in transmitting primary signals and has an opportunity to access the frequency spectrum. On the other hand, the SU owns important data and may mistrust the intention of a primary transmitter. Physical layer security is applied to evaluate the cooperative efficiency in terms of the data transmission and data security. The numerical and simulative results show that the system performance of the primary network in the cooperative scheme is improved in terms of the outage probability and the symbol error rate and is compared with that in the direct transmission scheme. In addition, the secure performance of the secondary network, as expressed by the outage secrecy probability and the average secrecy capacity, is maintained under the eavesdropping of the primary transmitter.
1 Introduction
Cognitive radio (CR) is a concept that enhances the utilization efficiency of the licensed frequency spectrum in that wireless devices are continuously developed for modern applications, but the spectrum bands are limited [1]. In cognitive radio networks, unlicensed users, which are known as secondary users (SUs), only access the licensed bands without causing interference to licensed users, which are known as primary users (PUs). To do this, SUs always opportunistically sense the presence or absence of the licensed bands to make a transmission decision. When the quality of service (QoS) of the primary network is very high, the transmission of the secondary network depends on the cooperative request of the PU. In this scheme, the PU leases a part of the licensed band to the SU to increase the QoS of the primary network as well as the spectrum access capacity of the secondary network [2–5]. At this time, a SU has the right to use the licensed band, but the SU does not know the artifice of PUs which PUs want to eavesdrop on the information of the SU.
Due to the broadcast characteristic of the wireless environment, the secrecy of data transmissions is very important. Physical layer security is proposed to solve the security problem in which the secrecy principle is based on the exploitation of the physical characteristics of the wireless channel [6–24]. In [6], Wyner showed that the important data is secure if the quality of the main channel is larger than that of the wiretap channel. Physical layer security has been investigated in the Gaussian channel [7], the broadcast channel [8], and the wireless fading channels [9] and has been extended to the relay-eavesdropper channel [10], the parallel relay-eavesdropper channel [11], and the multi-access channel [12, 13, 15]. The achievable secrecy rate (ASR) is the metric used to measure the amount of secure data that is successfully received at the intended user [17]. In [17, 19], global channel state information (CSI) is available in which Dong et al. regarded a practical assumption that the eavesdropper nodes are active and their CSIs are monitored by the center network [17]. Kim et al. assumed that the source and relay nodes can detect the CSI based on frequent response messages of the eavesdropper nodes. These messages will be used to inform the source node that the eavesdropper nodes want to be served in the next phases [20]. Exploitation of relays has been proposed to overcome the fading environment as well as to enhance secrecy capacity [10, 11, 17–24]. Optimal relay selection methods [18, 23] and weight optimization methods of the cooperative relays [17, 19] have been studied to maximize the ASR and satisfy a total transmit power constraint. In [21–24], a utilization of jamming signals has been investigated in which friendly wireless nodes or relays operate as jammers to create artificial interference to reduce the quality of the eavesdropping channel. The authors assumed that the jamming signals are known at both the destination nodes and the relays; hence, the quality of the desired channel cannot be affected by the interference signals. A special case in which the cooperative relay does not behave as a trusted node is proposed [25].
In [4, 5], the SUs have opportunity to wiretap the primary data of the PUs, and then these SUs are mistrusted as eavesdropper nodes. In [16–18, 20], the eavesdropper nodes are assumed as special wireless nodes, whereas the primary data are wiretapped by nodes as relays in [19, 25]. Motivated by the above issues, in this paper, we propose a cooperative scheme between the primary and secondary networks in which the PU leases a part of the licensed band to the SU to improve the performance of its system. In this proposed scheme, the SU uses the licensed band to perform two jobs as follows: First, the SU helps the PU by decoding and using the amount of power needed for forwarding the primary signals. Second, the SU uses the remaining power to transmit the important data against the eavesdropping of the primary transmitter. The cooperative efficiency of the primary network is obtained in terms of the outage probability and symbol error rate (SER) and is compared with the direct transmission scheme. For the secondary network, the outage secrecy probability and the average secrecy capacity are presented to evaluate the efficiency of the spectrum lease.
The rest of the paper is organized as follows: In Section 2, we present the cooperative system model and operation principle. The performance analysis of the primary and secondary networks is presented in Section 3. Section 4 discusses the numerical and simulative results using the Monte Carlo method and theoretical expressions. The conclusions are summarized in Section 5.
2 System model
Figure 1 presents a system model of cooperative communication between primary and secondary networks. The primary network includes the primary transmitter (PT) and primary receiver (PR) and has a licensed spectrum band. On the other hand, the primary network does not share this spectrum band, because its QoS is very high. The secondary network has two nodes, denoted as a secondary transmitter (ST) and a secondary receiver (SR), where the ST only transmits its data when receiving a spectrum lease contract from the PT. We assume that each node has a single antenna and the same transmit power P and that all nodes suffer the zero-mean additive white Gaussian noise (AWGN) with the same variance N0.
In Figure 1, (h1, d1), (h2, d2), (h31, d3), (h32, d3), (h4, d4), and (h5, d5) denote the Rayleigh fading channel coefficients and the link distances of ST-SR, ST-PR, PT-ST, ST-PT, PT-SR, and PT-PR, respectively. Therefore, the channel gains g i =|h i |2 and g3j=|h3j|2 are exponential distribution random variables (RVs) with parameters λ i and λ3, respectively, which are given as and where β is the path loss exponent, i∈{1,2,4,5}, j∈{1,2}. We note that links PT-ST and ST-PT have the same distance but different direction.
Before transmitting a data packet, a connection establishment phase is performed using the media access control (MAC) layer protocol, which is similar to the CoopMAC in [26]. First, PT broadcasts a request-to-send (RTS) message to nodes ST, SR, and PR. Hence, ST can estimate the fading channel coefficient h31 when receiving the RTS message. Because of the transmission desire of the secondary network on the licensed band, ST will immediately reply to the RTS message by sending a helper-ready-to-send (HTS) to nodes PT, PR, and SR. Relying on the receipt of the RTS and HTS messages, nodes PR and SR can estimate the fading channel coefficient pairs (h5, h2) and (h4, h1), respectively, and then these nodes will broadcast clear-to-send (CTS) messages that include their estimated fading channel coefficients. If PT wants to cooperate with ST, it will send a RTS message which includes h32 estimated from the HTS message to notify a cooperative acceptance to ST. Based on the above steps of the setup phase, ST will know the fading channel coefficients (h31, h32) from the RTS messages, (h4, h1) from the CTS message of SR, and (h5, h2) from the CTS message of PR. Therefore, ST can select a power sharing parameter as well as evaluate the secrecy performance of the secondary network. Similarly, PT will know the fading channel coefficients h31, h2, and h5 for selecting the cooperative method and analyzing the system performance of the primary network.
The operation principle and related formulations of the system model are expressed in two time slots as follows: In the first time slot, PT broadcasts a signal x P to ST, SR, and PR by using a RTS message [26]. The received signals at ST, SR, and PR are given, respectively, as
where nST, nSR, and nPR are the zero-mean AWGN at nodes ST, SR, and PR, respectively.
In this case, ST can successfully decode the signal x P . Then, if the PR cannot successfully decode the signal x P , it will send a CTS message. After that, PT receives the CTS message, and it will send a RTS message to ST to require cooperation. Because the secondary network cannot use the licensed spectrum band of the primary network, ST will accept the cooperation request of PT by leasing a part of the licensed spectrum band. This procedure is performed at ST by combining the signal x P with its signal x S based on the power allocation strategy, which is proposed in [4, 5] as
where α(0<α<1) is the fraction of the transmit power allocated to the signal x P and α P is like the money of the secondary network for payment of a leased spectrum band.
Then, ST broadcasts the combined signal x C to nodes SR, PR, and even PT. The received signals at SR, PR, and PT in the second time slot can be given, respectively, as
where nPT is the zero-mean AWGN at node PT.
At node PR, the well-known maximal ratio combining (MRC) technique is employed from two signals that are received from PT (the first time slot) and ST (the second time slot) to decode x P [4], Equation 23, so the received signal-to-noise ratio (SNR) at PR can be expressed as
where γ=P/N0 is the transmit SNR.
Because SR also receives the signal x P in the first time slot, there are two cases for decoding the signal x P from the received signal (2) as + SR successfully decodes x P , and then SR can cancel the interference component x P in (5). The received signal after canceling the interference at SR is given as
and the corresponding received SNR γ1 at SR is given to decode x S as
+ SR does not successfully decode x P , and then the received SNR γ1 at SR is expressed as
In addition, the secondary network has important data and suspects the help request of the primary network, so physical layer security is applied to the secondary network in evaluating the secure performance. In this system model, we assume that PT wants to eavesdrop the signal x S of ST while PR only receives the signal x P of PT in the second time slot. The received ASR at SR is given as [17]
where {x}+ is noted for max(0,x) function; RST-SR and RST-PT are the achievable data rates of links ST-SR and ST-PT, respectively, and are given as
where the factor (1/2) means that the signals are transmitted in two time slots, and γ32 is the received SNR at PT from ST to decode the signal x S .
From (7), x P is the transmitted signal of the eavesdropper PT. The x P can be considered as a side information that is available at the transmitter ST and the eavesdropper PT [27]. Hence, the eavesdropper PT can cancel the self-interference x P . As a result, the received SNR γ32 at PT is given as
3 Performance analysis
3.1 The primary network: outage probability and symbol error rate
3.1.1 Outage probability
In this paper, it is assumed that a receiver drops an outage event in the decoding operation if the achievable data rate is less than a target data rate. The achievable data rate between PT and ST is given in the first time slot from (1) as
If the achievable data rate RPT-ST is less than the target data rate R P of the primary network, ST cannot successfully decode x P . The outage probability at ST in this case is given as
where θ=22R P −1.
We note that g31 in (16) and g32 in (15) have different meanings because these symbols are calculated in the different time slots and directions. Hence, we can assume that g31 and g32 are independent exponential RVs with the same parameter λ3. When ST successfully decodes the signal x P , ST accepts the help request of PT and combines x P with its signal x S as x C in (4). After applying the MRC technique, the achievable data rate at PR is given as
The outage probability at PR is expressed as
where is the cumulative distribution function (CDF) of the RV γMRC.
Theorem 1
The following single-integral form expression is valid for
Proof
The proof is performed in Appendix 5.
From Theorem 1, the outage probability at PR is obtained in the single-integral form as
We denote m(u) as a function of variable u and is defined as m(u)=λ5u+α λ2/u, u∈[0,∞). By performing a function survey method, m(u) is minimum at m(u∗), is a decreasing function in [0,u∗], and is an increasing function in [u∗,∞), where . Hence, Theorem 2 will obtain a lower bound of as
Theorem 2
The following lower bound expression is valid for
where , and η=λ2/λ5.
Proof.
Given in Appendix 5.
When node ST does not successfully decode x P , node PR only receives the direct signal from PT in the first time slot, so γMRC equals γ g5 in (8). The outage probability at PR in this case is given as
Finally, based on the operation principle of cooperative communication between primary and secondary networks, the outage probability of the primary network is a combination of the outage probabilities, which are obtained in (17), (21), and (23) as
where , , and are obtained in (17), (21) and (23), respectively.
In addition, from Theorem 2 and (24), the lower bound form of the outage probability of the primary network is expressed as
where is obtained in (22).
Next, we compare the proposed cooperative transmission protocol with the direct transmission protocol (DT protocol). In the DT protocol, PT directly transmits the signal x P to PR without the help of ST. In this case, ST does not have opportunities to transmit its signal x S . For a fair evaluation, PT will transmit the same signal x P during two time slots, and PR will use the MRC technique to combine these received signals to increase the decoding capacity. The received SNR at PR is given as
where g51 and g52 are the channel gains of link PT-PR in the first and second time slots, respectively, and we assume that g51 and g52 are independent exponential RVs with the same parameter λ5.
Lemma 1
The CDF of RV can be expressed in the exact closed form as
Proof.
The CDF of is expressed as
where and are the probability density function (PDF) and CDF of RVs g51 and g52, respectively.
Hence, in (28) is calculated as . Then, substituting and into (28), Lemma 1 is proven.
From Lemma 1, the outage probability of the DT protocol is given as
3.1.2 Symbol error rate
The average SER of link PT-ST in the first time slot can be calculated [28], Eq. (27)] as
where a and b are constants that depend on the modulation type, e.g., a=b=1 for BPSK modulation, γ g31 is the received SNR at ST, and is the CDF of the RV γ g31 and is given as .
Then, (30) is solved as
When ST successfully decodes x P , PR receives two signal paths such as the direct path from PT and the cooperative path from ST at the different time slots. To restore x P , PR performs the MRC decoding by storing the received signal yPT-PR (3) at the first time slot and then waiting to the second time slot to combine with the received signal yST-PR (6). Two received signals yPT-PR and yST-PR in the two-phase transmission can be seen as an equivalent single-input multi-output (SIMO) [5]. As described in [4, 5], the MRC decoding is easier to implement. With the help of the equation [28, Eq. (27)], the average SER at PR after applying the MRC technique is expressed as
Note that the regeneration of x P can be performed by the minimum mean square error decoding (MMSE decoding) [29, 30]. The analysis of SER in the MMSE decoding is complex because it relates resolution of posterior distributions. The MMSE decoding will be our future work.
To solve in the formula (32), Theorem 3 is obtained as follows:
Theorem 3
The following representation is valid for
where Erfc[x] is the complementary error function [31, Eq. (8.250.4)].
Proof.
Substituting in Theorem 1 into (32), we obtain as
After some manipulations of (34), the proof of Theorem 3 is completed.
From the result of Theorem 3, the integral component depends on variable x and the function m(u)=λ5u+α λ2/u has a complex form. Hence, the analysis of in the lower bound form as in Theorem 2 is not feasible.
When node ST does not successfully decode x P , PR only directly receives the signal x P in the first time slot. The average SER at PR in this case is given as
where is the CDF of the exponential RV γ g5 and is expressed as .
Using the law of total probability, the average SER of the cooperative communication between the primary and secondary networks is given as
where , , and are obtained in (31), (35), and Theorem 3, respectively.
For the DT protocol with a fair evaluation, PT also transmits the same signal x P during two time slots, and PR uses the MRC technique. The average SER of the DT protocol is expressed as
Using in the Lemma 1, (37) is obtained in the closed-form expression as
3.2 The secondary network: outage secrecy probability and average secrecy capacity
3.2.1 Outage secrecy probability
When ST successfully decodes the signal x P , it will then transmit the combined signal x C as (4). However, the ST does not believe the help request of PT, because ST thinks that PT wants to get its information. Therefore, ST only considers the security of the important information. Physical layer security is applied at the secondary network in Figure 1, where ST wants to secure the important information against the eavesdropping of PT in the second time slot. The outage secrecy probability of link ST-SR is given as
where ASR is given in (12), R S is the target secrecy rate [18], and RPT-SR is the achievable data rate from PT to SR and is obtained from (2) as
Substituting (40) into (39), we obtain
Theorem 4
The following closed-form expression is valid for
Proof.
By expanding the expression {x}+ in (41), the probability is given as
where are the PDF and CDF of RVs g32 and g1, respectively, and are given as follows: and ; ρ=22R S .
Hence, in (43) is obtained as . Then, substituting and into (43), the proof of Theorem 4 is provided.
Likewise, the probability is solved in the next theorem.
Theorem 5
The following single-integral form representation is valid for
Proof.
The proof is provided in Appendix 3.
We set as n(y)=λ3y/ρ−λ1/y, . By performing a function survey method, n(y) is an increasing function in [0,(1−ρ α)/(1−α)]. As a result of the increasing function n(y), we have an inequality as n(y)≤n((1−ρ α)/(1−α)). Hence, the lower bound of is obtained as
Substituting the result of Theorems 4 and 5 into (41), we have in hand. Finally, the outage secrecy probability of the secondary network during two time slots is given as
where is given in (17).
In addition, from the lower bound of in (45), the lower bound form of is expressed as
where is obtained from (41) as
3.2.2 Average secrecy capacity
In the operation protocol of the secondary network, ST only transmits the secrecy signals when ST successfully decodes the primary signal x P of PT. The average secrecy capacity of the secondary network is defined by calculating the expected value over ASR [32], ([33] Eq. (8)), ([34] Eq. (3)). In addition, the ASR expression in (12) depends on the decoding of the primary signal x P at SR (10-11). Hence, the average secrecy capacity of the secondary network is formulated as
where E[X] is the expected operation of RV X; is the outage probability when SR cannot successfully decode the signal x P in the first time slot and is obtained as
At a high SNR γ value, and in (49) can be formulated, respectively, as
where Z=g1/(α γ g1+1) as defined in Appendix 3.
Theorem 6
The following asymptotic expressions are valid for and , respectively
where Γ(n,x) is the ‘upper’ incomplete gamma function ([31] Eq. (8.350.2)) (), and EulerGamma is Euler’s constant (E u l e r G a m m a≈0.577216) ([31] Eq. (8.367.1)).
Proof.
The proof is solved in Appendix 5.
Substituting (17), (50), and the results of Theorem 6 into (49), we obtain the asymptotic form of the average secrecy capacity of the secondary network as
4 Numerical and simulative results
In this section, the performance of the primary and secondary networks is analyzed by using the Monte Carlo simulation method and the theoretical expressions. The performance analyses include the outage probability and SER of the primary network and the outage secrecy probability and the average secrecy capacity of the secondary network. We note that the single-integral expression of (21) and (44) and the double-integral expression of (33) are not presented in the closed forms but are easily solved by the numerical method in Matlab. In a two-dimensional plane, the coordinates of the primary and secondary nodes are set to PT (0, 0), PR (1, 0), ST (0.5, y1), and SR (0.5, y2). Hence, the distance of the PT-PR link is 1 (d5=1) during the simulation intervals, and ST and SR move on the median line of the PT-PR line segment, which depend on the values of the variables y1 and y2 on the y-axis. We assume that the path loss exponent, the target data rate of the primary network, and the target secrecy rate of the secondary network are constants (β=3, R P =1 bit/s/Hz,R S =0.1 bit/s/Hz), and the SNR symbol in the x-axis is defined as SNR=P/N0.
Figure 2 presents the outage probability of the primary network at PR versus SNR (dB) when y1=0.1 and with different values of the power allocation at ST (α). In Figure 2, for the cooperative communication protocol (called the CC protocol), the outage probability of the primary network is the smallest when α is the largest (α=0.9), and the primary system performance is improved when the SNR increases. These results are explained that when the fraction of the transmit power α increases, ST uses more power for forwarding the signal of PT to PR in the second time slot. For comparison purposes, the CC protocol outperforms the DT protocol when ST shares the high power to help PT (α≥0.8). In addition, the theoretical expressions match very well with the simulation results, and the lower bound forms converge to the exact theories when the fractions of the transmit power α are small.
In addition to the outage probability, the SER is suitable for evaluating the QoS of the primary network. Figure 3 presents the SER of the primary network with the same ST location as in Figure 2. In this simulation result, we assume that the cooperative system uses the BPSK modulation (e.g., a=b=1) and coherent maximum likelihood detection [35]. The SER of the CC protocol is the smallest at α=0.9. For different values of α, the SER of the CC protocol is smaller than that of the DT protocol when SNR≤−1 dB for α=0.5, SNR<8 dB for α=0.7, and SNR<17 dB for α=0.8. These results are explained as follows. In the symmetric network model, when the fraction of the transmit power α is enough large (such as α=0.5, 0.7, 0.8), the demodulation of the primary data at PR depends on the total transmit power P of ST in the second time slot. For example, if ST uses the small total transmit power P, PR is difficult to demodulate the primary data when α is fixed. Therefore, the SER at PR will increase. In addition, in the DT protocol, by transmitting the same primary data during two time slots, PR will increase the demodulation capacity by the MRC technique.
From Figures 3 and 4, the performance of the CC protocol is better than that of the DT protocol at high values of α (e.g., α=0.9), because the located power for helping the primary user PT is higher by far than that for transmitting the own signal of the secondary user ST.
Figure 4 presents the outage secrecy probability of the secondary network versus the SNR (dB) when y1=0.1 and y2=0. In Figure 4, the outage secrecy probability decreases when the SNR increases and α decreases (the secrecy performance is the best when α=0.1). These results are explained that when α decreases, ST uses more power for transmitting the own signal than forwarding the signal of PT to PR in the second time slot. In addition, with the high SNR (SNR≥10 dB), the outage secrecy probability is almost independent of the values of α. Hence, from Figures 2, 3 and 4, ST can provide the high power to help the primary network so that the performance of the cooperative primary network (the CC protocol) outperforms the DT protocol and the secure performance of the secondary network is maintained, especially in the high SNR region. For example, when SNR≈12 dB, the outage secrecy probability of the secondary network is maintained at 5 × 10−2, and ST can assign the parameter α=0.9 to improve the performance of the primary network. In addition, the theoretical expressions are valid for the simulation results, and the lower bound forms converge to the exact results when the fractions of the transmit power α are large.
Next, we discuss the average secrecy capacity of the secondary network when ST cooperates with the primary network. Figure 5 presents the average secrecy capacity versus the SNR (dB) when the locations of nodes ST and SR are the same as in Figure 4. In Figure 5, the average secrecy capacity increases when α decreases because the allocated power for transmitting the signal of ST increases. In addition, the average secrecy capacity also converges to the asymptotic value when the transmit SNR is high, but the convergence of the average secrecy capacity is faster when α is smaller.
Finally, we analyze and evaluate the effects of the locations of the secondary nodes ST and SR on the performance of both networks. Figure 6 presents the outage probability and the outage secrecy probability of the primary network and the secondary network, respectively, when the parameter α is set to α=0.9. In Figure 6, when SR is fixed at (0.5, 0) and the ST moves on the median line of the PT-PR line segment where y1 ranges from 0.1 to 1, the performance of both networks decreases. These results are explained as follows. Because of the movement of ST, the distances of links PT-ST, ST-PR, and ST-SR increase, so it is difficult for ST to decode the received signal from PT, and the data rate at SR decreases. Whereas, when ST is set at the central point (0.5, 0) and SR moves on the median line of the PT-PR line segment where y2 ranges from 0.1 to 1, the outage probability of the primary network does not change, while the outage secrecy probability of the secondary network increases. These results are explained by three factors as follows. First, the primary network does not depend on the action of SR. Second, because SR goes farther, SR hardly decodes the signal of PT to cancel the interference elements. Third, the distance of the ST-SR link increases. For these reasons, the performance of the secondary network is poor, while that of the primary network is stable. From Figure 6, the lower bound forms of the outage secrecy probabilities well converge to the exact results when α=0.9.
5 Conclusions
In this paper, the artifice of the primary user in the spectrum lease is investigated. The basis of this problem is based on the transmission desire of the secondary user. The system performance of the primary network is evaluated by using the outage probability and the symbol error rate, while that of the secondary network is analyzed in terms of the outage secrecy probability and the asymptotic average secrecy capacity. The simulation results show that the primary network outperforms the direct transmission protocol when the spectrum share coefficient of the secondary user increases and that the secrecy performance of the secondary network is better in the high SNR region. These results are important for selecting the best power sharing fraction so that the performance of the primary network is improved and the secrecy performance of the secondary network is maintained in the cooperative communication. In addition, the location of the secondary nodes is discussed to evaluate the effects on both networks.
Appendices
Appendix 1
Proof of Theorem 1
We set U=α g2/((1−α)γ g2+1), so the CDF of U is given as
From (8), the CDF of γMRC is expressed as
where is the PDF of the RV g5.
The term F U (x/γ−t) is calculated from (56) as
Substituting (58) into (57), the CDF of γMRC is obtained as
Performing a variable transformation method as u=α−(θ/γ−t)(1−α)γ, is solved in the single-integral form as (20). Hence, Theorem 1 is proven.
Appendix 2
Proof of Theorem 2
First, we consider the condition θ≥α/(1−α) and the integral expression in the region u∈[0,α] in (21), there are two minimum values of the function m(u) as
Substituting into (60), we obtain as
where η=λ2/λ5.
When the condition θ<α/(1−α) and the integral expression in the region u∈[α−θ(1−α),α], three minimum values of the function m(u) are given as
After some manipulations of (62), we obtain as
Substituting (61) and (63) into (21), the lower bound form of is given as
where and .
By solving the integrals in (64), the proof of Theorem 2 is completely provided.
Appendix 3
Proof of Theorem 5
By expanding the expression {x}+ in (41), the probability is given as
We set Z=g1/(α γ g1+1) and look at the CDF of the RV U in (56), the CDF of Z is given as
From (66), is obtained as
After performing a variable transformation method as y=1−((ρ−1)/((1−α)γ)+ρ x)α γ, is obtained in the single-integral form as (44). Hence, the proof of Theorem 5 is completed.
Appendix 4
Proof of Theorem 6
We set X=g1/g32, and the CDF and PDF of RV X are given as
From (69) and the expression of the expected operation [36, Eq. (5.55)], in (51) is formulated as
Solving the integral in (70), is obtained as (53).To solve , we set Y=Z/g32, where Z is a RV and is defined in Appendix 33, and the CDF of RV Y is given as
In (71), the CDF of Z is solved in (66), and then F Y (x) is rewritten as
Again, when γ is high (γ→+∞), the integral term in (72) goes to 1. Hence, F Y (x) is asymptotically obtained as
From (73), the PDF of RV Y is solved as
From (74) and the expression of the expected operation [36, Eq. (5.55)], in (52) is formulated in the asymptotic form as
Solving the integral in (75), we obtain as (54).
Hence, the proof of Theorem 6 is proven.
References
Mitola J, Maguire GQ: Cognitive radio: making software radios more personal. IEEE Pers. Commun 1999, 6(4):13-18. 10.1109/98.788210
Weng M-D, Lee B-H, Chen J-M: Two novel price-based algorithms for spectrum sharing in cognitive radio networks. EURASIP J. Wireless Commun. Netw 2013, 2013: 1-16. 10.1186/1687-1499-2013-1
Lu L, Zhou X, Onunkwo U, Li GY: Ten years of research in spectrum sensing and sharing in cognitive radio. EURASIP J. Wireless Commun. Netw 2012, 2012: 1-16. 10.1186/1687-1499-2012-1
Duy TT, Kong H-Y: Performance analysis of two-way hybrid decode-and-amplify relaying scheme with relay selection for secondary spectrum access. Wireless Pers. Commun 2013, 69(2):857-878. 10.1007/s11277-012-0616-4
Han Y, Pandharipande A, Ting SH: Cooperative decode-and-forward relaying for secondary spectrum access. IEEE Trans. Wireless Commun 2009, 8(10):4945-4950.
AD Wyner: The wire-tap channel. Bell Syst. Tech. J 1975, 54(8):1355-1367. 10.1002/j.1538-7305.1975.tb02040.x
Leung-Yan-Cheong S, Hellman ME: The Gaussian wire-tap channel. IEEE Trans. Inform. Theory 1978, 24(4):451-456. 10.1109/TIT.1978.1055917
Csiszar I, Korner J: Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892
Liang Y, Poor HV, Shamai S: Secure communication over fading channels. IEEE Trans. Inform. Theory 2008, 54(6):2470-2492.
Lai L, Gamal HE: The relay-eavesdropper channel: cooperation for secrecy. IEEE Trans. Inform. Theory 2008, 54(9):4005-4019.
Awan ZH, Zaidi A, Vandendorpe L: Secure communication over parallel relay channel. IEEE Trans. Inform. Forensics Secur 2012, 7(2):359-371.
Awan ZH, Zaidi A, Vandendorpe L: On multiaccess channel with unidirectional cooperation and security constraints. In 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton). Monticello; 1–5 Oct 2012:982-987.
Awan ZH, Zaidi A, Vandendorpe L: Multiaccess channel with partially cooperating encoders and security constraints. IEEE Trans. Inform. Forensics Secur 2013, 8(7):1243-1254.
Tekin E, Yener A: The Gaussian multiple access wire-tap channel. IEEE Trans. Inform. Theory 2008, 54(12):5747-5755.
Tekin E, Yener A: The general Gaussian multiple access and two-way wire-tap channels achievable rates and cooperative jamming. IEEE Trans. Inform. Theory 2008, 54(6):2735-2751.
Han Z, Marina N, Debbah M, Hjørungnes A: Physical layer security game: interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wireless Commun. Netw 2010, 2010: 1-10.
Dong L, Han Z, Petropulu A, Poor H: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process 2010, 58(3):1875-1888.
Sakran H, Nasr O, Shokair M, El-Rabaie S, El-Azm AA: Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications 2012, 6(16):2676-2687. 10.1049/iet-com.2011.0638
Wang H-M, Yin Q, Xia X-G: Distributed beamforming for physical-layer security of two-way relay networks. IEEE Trans. Signal Process 2012, 60(7):3532-3545.
Kim J, Ikhlef A, Schober R: Combined relay selection and cooperative beamforming for physical layer security. J. Commun. Netw 2012, 14(4):364-373.
Ding Z, Xu M, Lu J, Liu F: Improving wireless security for bidirectional communication scenarios. IEEE Trans. Vehicular Technol 2012, 61(6):2842-2848.
Krikidis I, Thompson JS, McLaughlin S: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wireless Commun 2009, 8(10):5003-5011.
Chen J, Song L, Han Z, Jiao B: Joint relay and jammer selection for secure decode-and-forward two-way relay communications. In Global Telecommunications Conference (GLOBECOM 2011). Houston; 5:1-5.
Stanojev I, Yener A: Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Trans. Wireless Commun 2013, 12(1):134-145.
He X, Yener A: Cooperation with an untrusted relay: a secrecy perspective. IEEE Trans. Inform. Theory 2010, 56(8):3801-3827.
Pei L, Zhifeng T, Zinan L, Erkip E, Panwar S: Cooperative wireless communications: a cross-layer approach. IEEE Wireless Commun 2006, 13(4):84-92. 10.1109/MWC.2006.1678169
Treust ML, Zaidi A, Lasaulce S: An achievable rate region for the broadcast wiretap channel with asymmetric side information. In 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton). Monticello; 28:68-75.
Liang Y, Qaraqe K, Serpedin E, Alouini M: Performance analysis of amplify-and-forward two-way relaying with co-channel interference and channel estimation error. IEEE Trans. Commun 2013, 61(6):2221-2231.
Li HL, Djurie PM: MMSE estimation of nonlinear parameters of multiple linear/quadratic chirps. IEEE Trans. Signal Process 1998, 46(3):796-800. 10.1109/78.661350
Gonzalez JA, Peinado AM, Gomez AM, Carmona JL: Efficient MMSE estimation and uncertainty processing for multienvironment robust speech recognition. IEEE Trans. Audio Speech Lang. Process 2011, 19(5):1206-1220.
Gradshteyn IS, Ryzhik IM, Jeffrey A, Zwillinger D: Table of Integral, Series and Products. Elsevier, Amsterdam; 2007.
Bloch M, Barros J, Rodrigues M, McLaughlin S: Wireless information-theoretic security. IEEE Trans. Inform. Theory 2008, 54(6):2515-2534.
Wang L, Yang N, Elkashlan M, Yeoh PL, Yuan J: Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels. IEEE Trans. Inform. Forensics Secur 2014, 9(2):247-258.
Sun X, Wang J, Xu W, Zhao C: Performance of secure communications over correlated fading channels. IEEE Signal Process. Lett 2012, 19(8):479-482.
Nasri A, Schober R, Uysal M: Enhanced MRC for decode-and-forward cooperative diversity systems. IEEE Trans. Wireless Commun 2012, 11(10):3418-3423.
Papoulis A, Pillai SU: Probability, Random Variables and Stochastic Processes. McGraw-Hill, New York; 2002.
Acknowledgements
This paper was supported by the 2014 Research Funds of Hyundai Heavy Industries for University of Ulsan.
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Pham, N.S., Kong, H.Y. Spectrum sharing with secure transmission. J Wireless Com Network 2014, 134 (2014). https://doi.org/10.1186/1687-1499-2014-134
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/1687-1499-2014-134