Industrial Networks and Intelligent Systems. 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedings

Research Article

Secrecy Performance Enhancement Using Path Selection over Cluster-Based Cognitive Radio Networks

Download
69 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-30149-1_6,
        author={Pham Nam and Phan Ca and Tran Duy and Khoa Le},
        title={Secrecy Performance Enhancement Using Path Selection over Cluster-Based Cognitive Radio Networks},
        proceedings={Industrial Networks and Intelligent Systems. 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedings},
        proceedings_a={INISCOM},
        year={2019},
        month={9},
        keywords={Physical-layer security Cognitive radio Cluster networks Path selection Secrecy capacity},
        doi={10.1007/978-3-030-30149-1_6}
    }
    
  • Pham Nam
    Phan Ca
    Tran Duy
    Khoa Le
    Year: 2019
    Secrecy Performance Enhancement Using Path Selection over Cluster-Based Cognitive Radio Networks
    INISCOM
    Springer
    DOI: 10.1007/978-3-030-30149-1_6
Pham Nam1,*, Phan Ca1,*, Tran Duy2,*, Khoa Le3,*
  • 1: University of Technology and Education
  • 2: Posts and Telecommunications Institute of Technology
  • 3: Western Sydney University
*Contact email: 1727002@student.hcmute.edu.vn, capv@hcmute.edu.vn, trantrungduy@ptithcm.edu.vn, lenkhoa@gmail.com

Abstract

In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) networks for secrecy enhancement by formulating the probability of non-zero secrecy capacity (PNSC). In the proposed work, it is assumed that uniform transmit power for the secondary transmitters and jammers must be adjusted to guarantee quality of service (QoS) of the primary network, follows a simple and efficient power allocation strategy. To improve the channel capacity, the best receiver is selected at each cluster to relay the source data to the next hop. Additionally, a jammer is randomly chosen at each cluster to generate noises on an eavesdropper, and to reduce the quality of the eavesdropping links. Three methods are studied in this paper. First, we propose the BEST path selection method (BEST) to maximize the end-to-end instantaneous secrecy capacity. Second, the path obtaining the MAXimum Value for the average end-to-end PNSC (MAXV) is selected for data transmission. Third, we also propose a RAND method in which a RANDom path is employed. For performance evaluation and comparison, we derive exact closed-form expressions for the end-to-end PNSC of the BEST, MAXV and RAND methods over Rayleigh fading channel. Monte Carlo simulations are then performed to verify the derived theoretical results.