Secure Cognitive Communication via Cooperative Jamming

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Nowadays, unmanned aerial vehicles (UAVs) are widely used to ensure the security of wireless communications. In this paper, we propose a cooperative jamming scheme to secure cognitive radio (CR) networks. In the proposed scheme, the source UAV transmits confidential information to ground users. Because of the presence of an eavesdropper (Eve), the UAV jammer sends friendly interference signals to protect private information. It should be noted that the primary transmission of CR networks cannot be disturbed. Therefore, we formulate an optimization problem to maximize the average secrecy rate under the constraint of primary interference. Since trajectory planning and power control are coupled, we propose the alternative optimization (AO) algorithm. Furthermore, as the sub-problems are non-convex, sequential convex approximation (SCA) algorithm is a good choice, which makes our scheme converge to the Karush-Kuhn-Tucker point. Simulation results show that the joint optimization of power and trajectory of our proposed scheme is effective for improving the systematic secure performance.

Original languageEnglish
Title of host publication2020 IEEE/CIC International Conference on Communications in China, ICCC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages594-599
Number of pages6
ISBN (Electronic)9781728173276
DOIs
StatePublished - 9 Aug 2020
Event2020 IEEE/CIC International Conference on Communications in China, ICCC 2020 - Chongqing, China
Duration: 9 Aug 202011 Aug 2020

Publication series

Name2020 IEEE/CIC International Conference on Communications in China, ICCC 2020

Conference

Conference2020 IEEE/CIC International Conference on Communications in China, ICCC 2020
Country/TerritoryChina
CityChongqing
Period9/08/2011/08/20

Keywords

  • cognitive network
  • cooperative jamming
  • joint power and trajectory planning
  • physical layer safety
  • UAV

Fingerprint

Dive into the research topics of 'Secure Cognitive Communication via Cooperative Jamming'. Together they form a unique fingerprint.

Cite this