About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
amsys 15(7): e1

Research Article

Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy

Download1211 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.22-7-2015.2260193,
        author={Pin-Hsun Lin and Frederic Gabry and Ragnar Thobaben and Eduard Jorswieck and Mikael Skoglund},
        title={Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy},
        journal={EAI Endorsed Transactions on Ambient Systems},
        volume={2},
        number={7},
        publisher={EAI},
        journal_a={AMSYS},
        year={2015},
        month={8},
        keywords={physical layer security, cognitive radio, jamming, interference neutralization, relaying},
        doi={10.4108/eai.22-7-2015.2260193}
    }
    
  • Pin-Hsun Lin
    Frederic Gabry
    Ragnar Thobaben
    Eduard Jorswieck
    Mikael Skoglund
    Year: 2015
    Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy
    AMSYS
    EAI
    DOI: 10.4108/eai.22-7-2015.2260193
Pin-Hsun Lin1, Frederic Gabry2,*, Ragnar Thobaben3, Eduard Jorswieck1, Mikael Skoglund3
  • 1: Communications Laboratory, Faculty of Electrical and Computer Engineering, Technische Universitat Dresden, Dresden, Germany
  • 2: Mathematical and Algorithmic Sciences Lab, Huawei France Research Center, Paris
  • 3: School of Electrical Engineering and the ACCESS Linnaeus Centre, KTH Royal Institute of Technology, Stockholm, Sweden
*Contact email: frederic.gabry@huawei.com

Abstract

In this paper we study cognitive radio networks with secrecy constraints on the primary transmission. In particular we consider several transmission schemes for the secondary transmitter, namely interference neutralization (IN) and cooperative jamming with and without clean relaying (CR). We derive and analyze the achievable secondary rate performance of the schemes. Furthermore we thoroughly investigate the advantages and shortcomings of these schemes through numerical simulations in a geometric model where we highlight the impact of the users’ locations and show the important difference in all schemes depending on the topology. Our results show that the secondary transmitter can successfully adapt its transmission scheme (and parameters), i.e., either IN or CR, depending on its location to maximize its rate while insuring perfect secrecy of the primary transmission.

Keywords
physical layer security, cognitive radio, jamming, interference neutralization, relaying
Published
2015-08-11
Publisher
EAI
http://dx.doi.org/10.4108/eai.22-7-2015.2260193

Copyright © 2015 F. Gabry et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL