About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Workshop on Wireless Communication Security at the Physical Layer

Research Article

Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.22-7-2015.2260193,
        author={Pin-Hsun Lin and Frederic Gabry and Ragnar Thobaben and Eduard Jorswieck and Mikael Skoglund},
        title={Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy},
        proceedings={Workshop on Wireless Communication Security at the Physical Layer},
        publisher={EAI},
        proceedings_a={WICOMSEC-PHY},
        year={2015},
        month={8},
        keywords={physical layer security cognitive radio jamming interference neutralization relaying},
        doi={10.4108/eai.22-7-2015.2260193}
    }
    
  • Pin-Hsun Lin
    Frederic Gabry
    Ragnar Thobaben
    Eduard Jorswieck
    Mikael Skoglund
    Year: 2015
    Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy
    WICOMSEC-PHY
    ACM
    DOI: 10.4108/eai.22-7-2015.2260193
Pin-Hsun Lin1, Frederic Gabry2,*, Ragnar Thobaben3, Eduard Jorswieck1, Mikael Skoglund3
  • 1: Communications Laboratory, Faculty of Electrical and Computer Engineering, Technische Universitat Dresden, Dresden, Germany
  • 2: Mathematical and Algorithmic Sciences Lab, Huawei France Research Center, Paris
  • 3: School of Electrical Engineering and the ACCESS Linnaeus Centre, KTH Royal Institute of Technology, Stockholm, Sweden
*Contact email: frederic.gabry@huawei.com

Abstract

In this paper we study cognitive radio networks with secrecy constraints on the primary transmission. In particular we consider several transmission schemes for the secondary transmitter, namely interference neutralization (IN) and cooperative jamming with and without clean relaying (CR). We derive and analyze the achievable secondary rate performance of the schemes. Furthermore we thoroughly investigate the advantages and shortcomings of these schemes through numerical simulations in a geometric model where we highlight the impact of the users’ locations and show the important difference in all schemes depending on the topology. Our results show that the secondary transmitter can successfully adapt its transmission scheme (and parameters), i.e., either IN or CR, depending on its location to maximize its rate while insuring perfect secrecy of the primary transmission.

Keywords
physical layer security cognitive radio jamming interference neutralization relaying
Published
2015-08-11
Publisher
EAI
http://dx.doi.org/10.4108/eai.22-7-2015.2260193
Copyright © 2015–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL