TY - GEN
T1 - Secure Cognitive Communication via Cooperative Jamming
AU - Wu, Keting
AU - Wang, Dawei
AU - Zhang, Ruonan
AU - Zhai, Daosen
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/8/9
Y1 - 2020/8/9
N2 - Nowadays, unmanned aerial vehicles (UAVs) are widely used to ensure the security of wireless communications. In this paper, we propose a cooperative jamming scheme to secure cognitive radio (CR) networks. In the proposed scheme, the source UAV transmits confidential information to ground users. Because of the presence of an eavesdropper (Eve), the UAV jammer sends friendly interference signals to protect private information. It should be noted that the primary transmission of CR networks cannot be disturbed. Therefore, we formulate an optimization problem to maximize the average secrecy rate under the constraint of primary interference. Since trajectory planning and power control are coupled, we propose the alternative optimization (AO) algorithm. Furthermore, as the sub-problems are non-convex, sequential convex approximation (SCA) algorithm is a good choice, which makes our scheme converge to the Karush-Kuhn-Tucker point. Simulation results show that the joint optimization of power and trajectory of our proposed scheme is effective for improving the systematic secure performance.
AB - Nowadays, unmanned aerial vehicles (UAVs) are widely used to ensure the security of wireless communications. In this paper, we propose a cooperative jamming scheme to secure cognitive radio (CR) networks. In the proposed scheme, the source UAV transmits confidential information to ground users. Because of the presence of an eavesdropper (Eve), the UAV jammer sends friendly interference signals to protect private information. It should be noted that the primary transmission of CR networks cannot be disturbed. Therefore, we formulate an optimization problem to maximize the average secrecy rate under the constraint of primary interference. Since trajectory planning and power control are coupled, we propose the alternative optimization (AO) algorithm. Furthermore, as the sub-problems are non-convex, sequential convex approximation (SCA) algorithm is a good choice, which makes our scheme converge to the Karush-Kuhn-Tucker point. Simulation results show that the joint optimization of power and trajectory of our proposed scheme is effective for improving the systematic secure performance.
KW - cognitive network
KW - cooperative jamming
KW - joint power and trajectory planning
KW - physical layer safety
KW - UAV
UR - http://www.scopus.com/inward/record.url?scp=85097547245&partnerID=8YFLogxK
U2 - 10.1109/ICCC49849.2020.9238993
DO - 10.1109/ICCC49849.2020.9238993
M3 - 会议稿件
AN - SCOPUS:85097547245
T3 - 2020 IEEE/CIC International Conference on Communications in China, ICCC 2020
SP - 594
EP - 599
BT - 2020 IEEE/CIC International Conference on Communications in China, ICCC 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 IEEE/CIC International Conference on Communications in China, ICCC 2020
Y2 - 9 August 2020 through 11 August 2020
ER -