Two-path successive relaying and jamming for securing the primary system

Dawei Wang, Pinyi Ren, Yichen Wang, Li Sun, Qinghe Du

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

To guarantee secure communication of the primary system and efficiently utilize the licensed spectrum, in this paper, we propose a two-path successive relaying and jamming based cooperative transmission (TSRJC) scheme. In TSRJC scheme, two secondary users (SU) successively relay the primary message and jam the primary eavesdropper to confirm secure and reliable transmission of the primary system during the first stage. During the second stage, the secondary system will be allowed to access the licensed spectrum for the secondary transmission as a reward. To maximize the secondary transmission, a suboptimal algorithm is proposed to allocate the relaying and jamming power. In addition, the closed-form expressions of both SU's relaying and jamming power and jamming power beamforming vector are derived. Simulation results demonstrate the superior performance of our developed scheme over conventional secure communication scheme in terms of primary users' (PU) secure outage probability and SUs' average transmission rate.

Original languageEnglish
Title of host publication2016 19th International Symposium on Wireless Personal Multimedia Communications, WPMC 2016
PublisherIEEE Computer Society
Pages166-171
Number of pages6
ISBN (Electronic)9784904020098
StatePublished - 2 Jul 2016
Externally publishedYes
Event19th International Symposium on Wireless Personal Multimedia Communications, WPMC 2016 - Shenzhen, China
Duration: 14 Nov 201616 Nov 2016

Publication series

NameInternational Symposium on Wireless Personal Multimedia Communications, WPMC
Volume0
ISSN (Print)1347-6890

Conference

Conference19th International Symposium on Wireless Personal Multimedia Communications, WPMC 2016
Country/TerritoryChina
CityShenzhen
Period14/11/1616/11/16

Fingerprint

Dive into the research topics of 'Two-path successive relaying and jamming for securing the primary system'. Together they form a unique fingerprint.

Cite this