4.7 Article Proceedings Paper

A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach

期刊

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
卷 18, 期 3, 页码 1548-1565

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2019.2893381

关键词

Cognitive radio; statistical queueing analysis; QoS provisioning; information security protection; effective capacity; effective bandwidth; power allocation

资金

  1. National Natural Science Foundation of China [61871314]
  2. National Science and Technology Major Project [2018ZX03001003-004]
  3. Key Laboratory of Wireless Sensor Network and Communication, Chinese Academy of Sciences [2015003]

向作者/读者索取更多资源

Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS) provisioning for primary users (PUs) and protecting information security for secondary users (SUs) are two crucial and fundamental issues for CRNs. Consequently, in this paper, we establish a unified QoS and security provisioning framework for wiretap CRNs. Specifically, different from the widely used deterministic QoS provisioning method and information-theoretical security protection approach, our established framework, which is built on the theory of statistical queueing analysis, can quantitatively characterize the PU's QoS and the SU's security requirements. By adopting the theories of effective capacity and effective bandwidth, we further convert the QoS and security requirements to the equivalent PU's effective capacity and SU's effective bandwidth constraints. Following our developed framework, we formulate the nonconvex optimization problem, which aims at maximizing the average throughput of SU subject to PU's QoS requirement, SU's security constraint, as well as SU's average and peak transmit power limitations. Then, we adopt the techniques of convex hull and probabilistic transmission to convert the original nonconvex problem to the equivalent convex problem and obtain the optimal power allocation scheme through the Lagrangian method. Moreover, we also develop a fixed power allocation scheme which is suboptimal but has low complexity. The simulation results are also provided, which demonstrate the impact of the PU's QoS and the SU's security requirements on SU's throughput as well as the advantage of our proposed optimal power allocation scheme over the fixed power allocation scheme and the conventional security-based water-filling policy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据