TY - GEN
T1 - Two-path successive relaying and jamming for securing the primary system
AU - Wang, Dawei
AU - Ren, Pinyi
AU - Wang, Yichen
AU - Sun, Li
AU - Du, Qinghe
N1 - Publisher Copyright:
© 2016 National Institute of Information and Communications Technology (NICT).
PY - 2016/7/2
Y1 - 2016/7/2
N2 - To guarantee secure communication of the primary system and efficiently utilize the licensed spectrum, in this paper, we propose a two-path successive relaying and jamming based cooperative transmission (TSRJC) scheme. In TSRJC scheme, two secondary users (SU) successively relay the primary message and jam the primary eavesdropper to confirm secure and reliable transmission of the primary system during the first stage. During the second stage, the secondary system will be allowed to access the licensed spectrum for the secondary transmission as a reward. To maximize the secondary transmission, a suboptimal algorithm is proposed to allocate the relaying and jamming power. In addition, the closed-form expressions of both SU's relaying and jamming power and jamming power beamforming vector are derived. Simulation results demonstrate the superior performance of our developed scheme over conventional secure communication scheme in terms of primary users' (PU) secure outage probability and SUs' average transmission rate.
AB - To guarantee secure communication of the primary system and efficiently utilize the licensed spectrum, in this paper, we propose a two-path successive relaying and jamming based cooperative transmission (TSRJC) scheme. In TSRJC scheme, two secondary users (SU) successively relay the primary message and jam the primary eavesdropper to confirm secure and reliable transmission of the primary system during the first stage. During the second stage, the secondary system will be allowed to access the licensed spectrum for the secondary transmission as a reward. To maximize the secondary transmission, a suboptimal algorithm is proposed to allocate the relaying and jamming power. In addition, the closed-form expressions of both SU's relaying and jamming power and jamming power beamforming vector are derived. Simulation results demonstrate the superior performance of our developed scheme over conventional secure communication scheme in terms of primary users' (PU) secure outage probability and SUs' average transmission rate.
UR - http://www.scopus.com/inward/record.url?scp=85023184281&partnerID=8YFLogxK
M3 - 会议稿件
AN - SCOPUS:85023184281
T3 - International Symposium on Wireless Personal Multimedia Communications, WPMC
SP - 166
EP - 171
BT - 2016 19th International Symposium on Wireless Personal Multimedia Communications, WPMC 2016
PB - IEEE Computer Society
T2 - 19th International Symposium on Wireless Personal Multimedia Communications, WPMC 2016
Y2 - 14 November 2016 through 16 November 2016
ER -