4.6 Article

Secure Cognitive MIMO Wiretap Networks With Different Antenna Transmission Schemes

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 5779-5790

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.3048158

Keywords

Physical layer security; cognitive radio; differential spatial modulation; secrecy outage probability; secrecy throughput

Funding

  1. Project of Natural Science Foundation of China [61801496, 61801497, 61771487]
  2. Defense Science Foundations of China [2019-JCJQ-JJ-221]
  3. National University of Defense Technology Youth Innovation Award Research Project [23200306]

Ask authors/readers for more resources

This paper investigates secure transmission in MIMO cognitive wiretap networks, proposing two antenna transmission schemes and introducing a power control mechanism to protect the quality of service for primary users. The secrecy performance of the two schemes is evaluated through the derivation of secrecy outage probability and secrecy throughput, with further exploration of security diversity gain and coding gain based on asymptotic secrecy outage probability.
This paper investigates a secure transmission in the multiple-input multiple-output (MIMO) cognitive wiretap networks, where a secondary transmitter (Alice) sends data to a secondary receiver (Bob) in the presence of an eavesdropper (Eve). In order to solve the problems of inter channel interference and inter antenna synchronization encountered by traditional MIMO technologies, the antenna transmission scheme is adopted at the transmitter. As a comparison, we design two different antenna transmission schemes, namely transmit antenna selection maximal-ratio combining (TAS-MRC) scheme and differential spatial modulation maximal-ratio combining (DSM-MRC) scheme, respectively. Moreover, due to outdated channel state information (CSI) of the interference link from Alice to the primary user (PU), we propose power control mechanism to protect the quality of service (QoS) of PU. Furthermore, the closed-form for the secrecy outage probability and the secrecy throughput with TAS-MRC and DSM-MRC schemes are derived to evaluate the secrecy performance, respectively. What's more, we explore the security diversity gain and coding gain based on the asymptotic secrecy outage probability. As the results, it demonstrates that DSM-MRC requires less CSI and is convenient for modulation and demodulation, but sacrifices some secrecy performance gains between two proposed schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available