amsys 15(7): e1

Research Article

Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy

Download934 downloads
  • @ARTICLE{10.4108/eai.22-7-2015.2260193,
        author={Pin-Hsun Lin and Frederic Gabry and Ragnar Thobaben and Eduard Jorswieck and Mikael Skoglund},
        title={Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy},
        journal={EAI Endorsed Transactions on Ambient Systems},
        volume={2},
        number={7},
        publisher={EAI},
        journal_a={AMSYS},
        year={2015},
        month={8},
        keywords={physical layer security, cognitive radio, jamming, interference neutralization, relaying},
        doi={10.4108/eai.22-7-2015.2260193}
    }
    
  • Pin-Hsun Lin
    Frederic Gabry
    Ragnar Thobaben
    Eduard Jorswieck
    Mikael Skoglund
    Year: 2015
    Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy
    AMSYS
    EAI
    DOI: 10.4108/eai.22-7-2015.2260193
Pin-Hsun Lin1, Frederic Gabry2,*, Ragnar Thobaben3, Eduard Jorswieck1, Mikael Skoglund3
  • 1: Communications Laboratory, Faculty of Electrical and Computer Engineering, Technische Universitat Dresden, Dresden, Germany
  • 2: Mathematical and Algorithmic Sciences Lab, Huawei France Research Center, Paris
  • 3: School of Electrical Engineering and the ACCESS Linnaeus Centre, KTH Royal Institute of Technology, Stockholm, Sweden
*Contact email: frederic.gabry@huawei.com

Abstract

In this paper we study cognitive radio networks with secrecy constraints on the primary transmission. In particular we consider several transmission schemes for the secondary transmitter, namely interference neutralization (IN) and cooperative jamming with and without clean relaying (CR). We derive and analyze the achievable secondary rate performance of the schemes. Furthermore we thoroughly investigate the advantages and shortcomings of these schemes through numerical simulations in a geometric model where we highlight the impact of the users’ locations and show the important difference in all schemes depending on the topology. Our results show that the secondary transmitter can successfully adapt its transmission scheme (and parameters), i.e., either IN or CR, depending on its location to maximize its rate while insuring perfect secrecy of the primary transmission.