Managing Security Levels in a Cognitive Radio Network

Journal of Communications Engineering and Networks
Jan 2014, Vol. 2 Iss. 1, PP. 14-22
Managing Security Levels in a Cognitive Radio
Network
1
Kan Chen, 2Balasubramaniam Natarajan
Department of Electrical & Computer Engineering, Kansas State University, Manhattan, Kansas, USA
1
[email protected]; 2 [email protected]
Abstract- The open network architecture commonly envisioned for cognitive radio networks (CRNs), while offering flexibility, increases
vulnerability from a security standpoint. Therefore, understanding and managing the trade-off between CRN performance and security is critical for practical operation. In this paper, we attempt to design a secure CRN by optimizing the total throughput performance
subject to constraints on expected security level. We employ block cipher as the security mechanism, vulnerability level as the security
metric, and consider an exponential adversary attack model. In order to balance physical layer security and throughput in CRNs, we
propose a security level adjustment (SLA) algorithm based on the idea of water-filling. The SLA algorithm can distribute the optimal
security levels as well as the optimal cipher block length for each communication link in the CRN depending on the corresponding
channel quality. Simulation results for throughput show that our SLA algorithm outperforms conventional fixed block length cipher.
Keywords-Cognitive Radio Networks; Physical Layer Security; Encryption; Optimization.
I.
INTRODUCTION
Unlicensed users (cognitive users) have the ability to sense and identify white spaces in licensed spectrum and then opportunistically utilize these white spaces by operating with tolerable interference to primary users (PUs). For example, IEEE 802.22
standard on Wireless Regional Area Networks (WRANs) includes the idea of cognitive radio to allow sharing of unused channels
allocated to television broadcast services, and consequently brings broadband access to hard-to-reach low-population-density
areas (e.g., rural environments) [1]. Cognitive radio networks (CRNs) are modeled as open architecture networks, making CRNs
more vulnerable from a security perspective. An eavesdropper can easily capture the communication by snooping on transmit
data. Therefore, successful deployment of CRNs is dependent on the implementation of proper security mechanisms. Implementing a security strategy in a CRN requires adequate understanding of its effect on network performance. Typically, achievable
throughput is considered as a key metric in wireless communication. While a number of distinguished studies have been conducted on achievable throughput in CRNs [2–6], security issues have always been overlooked in these studies. Since securing
communications against the adversary typically consumes network resources in terms of bandwidth [7], it is not possible to study
these issues in isolation. The objective of this study is to find a balance between physical layer security and throughput in order
to build a more efficient and secure CRN.
A.
Related Work
In [2–6], the authors present a plethora of results related to achievable throughput in CRNs. In [2], a CRN model based on
two-sender, two-receiver interference channel is considered with sender 2 having knowledge of the encoded message sender 1
plans to transmit. The authors derive the achievable rate for both genie-aided cognitive radio channel case and additive Gaussian
noise case. Goldsmith et al. survey fundamental capacity limits and associated transmission techniques for different wireless
network design paradigms based on CRNs in [3]. [4] considers a communication scenario in which the primary and the cognitive
radios wish to communicate to different receivers, subject to mutual interference. The highest rate at which the cognitive radio
can reliably communicate under the constraint that no rate degradation occurs for the primary user is derived. The variation
of capacity when constraints are placed on the channel output signal (as well as generalizations thereof) is investigated in [5].
In [6], Liang et al. study the problem of designing the sensing duration to maximize the achievable throughput for the secondary
network under the constraint that the primary users are sufficiently protected. They formulate the sensing-throughput tradeoff
problem mathematically and use energy detection sensing scheme to prove that the formulated problem indeed has one optimal
sensing time which yields the highest throughput for the secondary network. However, all the above efforts related to CRN
performance assume a perfectly secure environment.
Clancy et al. in [8] introduce a class of attacks specific to CRNs, such as, manipulation of spectral and self-propagating
articial intelligence virus. They also propose a mitigation method for some of these attacks and a road-map for implementing
these ideas in the network stack. Shu et al. explore the existing attacks to physical layer of CRNs and discuss how to defend
against these attacks in [9]. Nevertheless, the throughput performance of CRNs is ignored in both these efforts.
14
Journal of Communications Engineering and Networks
Jan 2014, Vol. 2 Iss. 1, PP. 14-22
Ruiliang et al. in [10] propose a new security mechanism that deploys helper nodes (HN) near the primary transmitter to
protect CRNs from primary user emulation (PUE) attack. However, the system and HN implementation requires additional cost
as well as energy. The secrecy capacity (defined as the difference of the Shannon capacity of the channel between the source and
destination and the Shannon capacity of the channel between the source and eavesdropper) of CRNs is studied in [11]. However,
in secrecy capacity efforts, the emphasis is not on ways to protect the communication, but rather, understanding the fundamental
limits on communication in the presence of eavesdropper. In [12], the authors present a framework to maximize the throughput
under a specified security condition. However, their approach is focused on the data-link layer of a point to point communication
network. Wang et al. concentrate on the security of physical layer spectrum sensing in [13]. They investigate collaborative
sensing of cognitive radio networks under malicious attacks, and analyze the spectrum sensing performance in a generalized
framework. Nonetheless, the goal of [13] is to improve efficiency of spectrum access.
In spite of all these efforts, there is still a fundamental unanswered question: how can we balance physical layer security
and throughput in a CRN? That is, how much information can a user transmit safely under the exponential adversary attack.
Encryption at the physical layer is one way of securing communication. Physical layer encryption offers a number of advantages
over encryption at higher layers [14] and it is easily integrated with traditional upper layers encryption techniques [15, 16]. In
this work, we will focus our attention on physical layer encryption and evaluate the tradeoff between security and throughput.
B.
Contributions
In this work, we restrict ourselves to security of the primary tier since only primary users are licensed in a CRN. We assume
a two-tier underlay cognitive radio network with all PUs and cognitive users (CUs) distributed as Poisson Point Process (PPP).
Then, we employ block cipher as the security mechanism and use vulnerability level as the security metric to evaluate our CRN
model. The secure CRN is studied under an exponential adversary attack. Based on this secure CRN model, we formulate the
security-throughput tradeoff problem mathematically, and aim to optimize throughput with constraints on vulnerability level for
each link. In order to solve the constrained throughput maximization problem, we propose a security level adjustment (SLA)
algorithm based on water-filling. Results show that our SLA algorithm performs much better than the conventional fixed block
length cipher. The contributions of this paper can be summarized as follows:
• The optimal trade-off between security and throughput is quantified via a constrained throughput maximization problem.
• A simple and efficient security level adjustment (SLA) algorithm based on water-filling is proposed to achieve balance
between security and throughput.
• To the best of our knowledge, this is the first work to demonstrate the effectiveness of security level management on CRN
throughput.
The remainder of the paper is organized as follows: Section II describes the system model and the security metric used in this
paper. The formulation of constrained optimization problem and its analysis is given in Section III. In Section IV, the simulation
results are presented. Section V summarizes the conclusions and future work.
II.
A.
SYSTEM MODEL
CRN Model
We consider a two-tier underlay cognitive radio network with all PUs and CUs using the same frequency band. The CRN is
modeled as a bipolar network [17], as shown in Fig. 1, in which each transmitter is at a fixed distance from corresponding
receivers. The PTs are distributed as a homogeneous PPP: Ψp = {pt1 , pt2 , . . .} ⊂ R2 with density λp , and the location of
potential CTs follows another homogenous PPP: Ψc = {ct1 , ct2 , . . .} ⊂ R2 with density λc (independent of PTs). Since we
assume all primary receivers (PRs) and cognitive receivers (CRs) are located at a fixed distance from corresponding PTs and
CTs, PRs and CRs also follow a PPP with density λp and λc . To protect the quality of primary user communication, we set up
exclusive regions, which are circular with radius D. Within the exclusive regions, CUs cannot be active in order to limit the
interference to PUs. The activation of CTs is highly dependent on exclusive regions, and distribution of active CTs follows a
Poisson Hole Process [18]. In this work, we assume that CUs have complete information regarding PU locations.
B.
Cipher Mode
All primary transmissions are protected via a cipher. In this work, a block cipher is used. There are five basic modes of operation
for a block cipher: Electronic CodeBook (ECB) mode, Cipher Block Chaining (CBC) mode, Cipher FeedBack (CFB) mode,
Output FeedBack (OFB) mode and the CounTeR (CTR) mode. ECB mode and CBC mode are defined as block modes because
plaintext is independently encrypted into a block at a time to produce corresponding ciphertext. Stream mode, including CFB
mode, OFB mode, and CTR mode, encrypt one bit at a time. As a result, in these modes, there is no propagation error across
transmissions. However, for block modes (ECB mode and CBC mode), a single bit error in the received ciphertext block may
15
Journal of Communications Engineering and Networks
Jan 2014, Vol. 2 Iss. 1, PP. 14-22
CRN Model
0.6
primary transmitter
primary user
cognitve transmitter
cognitive user
0.4
0.2
0
−0.2
rc
−0.4
−0.8
−1
D
rp
−0.6
−0.8
−0.6
−0.4
−0.2
0
0.2
0.4
0.6
0.8
Fig. 1 Bipolar network model. The stars are primary transmitters and the circles are primary receivers. The primary transmitter-receiver pairs
are represented by lines with arrows pointing to the receivers. The distance between a primary transmitter-receiver pair is rp . The rhombuses
are active cognitive transmitters and the triangles are active cognitive receivers. We have eliminated the inactive cognitive communication pair
which is located in the exclusive region, and denoted as a large circle with radius D. The cognitive transmitter-receiver pairs are also represented
by lines with arrows pointing to the receivers, and the distance between a cognitive transmitter-receiver pair is rc .
result in an error in every bit of the decrypted block (error propagation), which leads to a fundamental trade-off between security
and throughput in encryption based CRN security. Thus, our study primarily focuses on block mode cipher [19].
C. Exponential Adversary Attack Model
There are several ways using which one can quantify the strength of an encryption scheme. One way is to use the brute force
technique, i.e., for a given ciphertext, try decrypting with all possible encryption keys until it decrypts to the corresponding plaintext [20]. In practice, however, encryption systems are frequently subject to vulnerabilities which ultimately lead to short-cut
attacks. Such vulnerabilities indicate that it is reasonable to model the attacker strength as a random parameter using some probability distribution. We define the attacker strength as α. The probability of cracking a cipher with block length N corresponds
to Pr (α = N ). This implies that the attacker with strength α has the ability to crack any cipher with block length less than α
within reasonable constraints related to cost and time required to crack the cipher. In our work, we employ exponential adversary
attack model. Here, an exponential distribution is used to describe the attacker strength. Therefore, the protection probability of
an exponential adversary attack model can be written as [12]:
ϕi = Pr (α ≥ Ni ) = e−kNi ,
(1)
where, Ni is the block length of the cipher for ith communication link and k > 0 is a constant.
III.
A.
SECURITY AND THROUGHPUT TRADE-OFF
Analysis of the CRN
As indicated above, we model a CRN as a two-tier bipolar network: primary tier and cognitive tier. The transmitters in each
tier differ in terms of transmit power (denoted as Pp and Pc ), data rate (Cp and Cc ), and spatial density (λp and λc ). Without
loss of generality, we consider the ith primary user located at the origin. Distance between the j th primary transmitter and ith
primary transmitter and the distance between the k th cognitive transmitter and ith primary transmitter are denoted by dpp (j, i)
and dcp (k, i). The corresponding power fading parameters hpp (j, i) and hcp (k, i) are assumed to be i.i.d exponential distribution
−α
(Rayleigh fading). The standard path loss function is given by l (x) = kxk , where α > 2 is the path loss exponent. Therefore,
−α
(i) (i,i) (i,i) (i,i)
the received power of the ith primary receiver from the ith primary transmitter is Pp hpp . dpp , where hpp ∼ exp (1)
(i)
and Pp is transmit power of the ith primary transmitter. The resulting SINR at the ith primary receiver is:
SIN R(i) =
−α
(i) (i,i) (i,i) Pp hpp . dpp n0 + Ipp + Icp
16
,
(2)
Journal of Communications Engineering and Networks
Jan 2014, Vol. 2 Iss. 1, PP. 14-22
where, n0 is the background noise power. Ipp is the interference from other primary transmitters, given by:
m
X
Ipp =
−α
(j,i) (j,i) Pp(j) hpp
. dpp .
(3)
j∈Ψp \i
The interference generated by other cognitive transmitters is represented as:
Icp =
n
X
(k,i) −α
Pc(k) h(k,i)
.
,
d
cp
cp (4)
k=1
(k)
where, Pc is the transmit power of k th cognitive transmitter.
The Shannon Capacity of the wireless communication channel between the ith primary transmit and the ith primary receiver
can be evaluated from function (2) as:
(5)
Ci = log2 1 + SIN R(i)
Pm
Thus, the total capacity of the entire primary tier is: Ctotal = i=1 Ci .
B.
Security Metric
In this section, we introduce a security metric of interest in this work: average vulnerability level. We consider this as the metric
for managing security in the CRN. If each communication link is encrypted with a distinct block length, the expression of average
vulnerability level can be defined as:
Pm
Pr (α ≥ Ni )
(6)
Φ = i=1
m
where, m represents that there are m communication pairs in the primary tier, and the ith communication link is encrypted using
block length Ni . It is important to mention that the average vulnerability level has an inverse relationship to the security level as
defined in [12].
C. Problem Formulation
As we have mentioned in section II B, in block cipher model, an error in the received ciphertext block will result in the loss
of the entire block due to error propagation after decryption. Hence, it will lead to communication failure. Therefore, the
throughput of communication channel i can be written as Ci (1 − pi )Ni , where pi denotes the bit error probability of the ith
communication channel; Ni is the block length of corresponding cipher for ith communication pair; Ci stands for the capacity
of ith communication channel. The goal of our work is to maximize overall throughput while simultaneously guaranteeing a
certain average vulnerability level for each communication link in the CRN. Therefore, the throughput for the whole primary
communication tier is:
m
X
T =
Ci (1 − Ni pi ) .
(7)
i=1
In the exponential adversary attack model, we can substitute for Ni from (1) to rewrite (7) as:
maximize : T =
ϕi
m
X
pi
Ci 1 + ln ϕi
k
i=1
(8)
subject to:
ϕi − ϕmin ≥ 0
(C1)
ϕmax − ϕi ≥ 0
Pm
ϕi
Φ0 − i=1
=0
m
(C2)
(C3)
As we have derived that the optimal solution ϕi should be ϕmin 6 ϕi 6 ϕmax . The first constraint C1 and the second constraint
C2 mean the optimal solution should be greater than or equal to the minimum protection probability and should be less than or
equal to the maximum protection probability. Φ0 denotes the maximum allowable overall vulnerability level and i = 1, 2, . . . , m.
The equality in (C3) results from the following argument. We have m communication channels in our CRN model. For each of
the channels we have different channel quality. Hence, we should employ different security levels for the channels. We observe
that the increase in security level will lead to a decrease in throughput. Thus, in order to achieve the maximum throughput, we
17
Journal of Communications Engineering and Networks
Jan 2014, Vol. 2 Iss. 1, PP. 14-22
should use the maximum allowed overall vulnerability level, which has an inverse relationship to the security level. Therefore,
we have this constraint in place to guarantee the maximum throughput.
The Lagrangian corresponding to (8) can be written as:
m
X
m
X
pi
Ci 1 + ln ϕi +
νi (ϕi − ϕmin )
k
i=1
i=1
!
m
m
X
X
ϕi
vi (ϕmax − ϕi ) + u mΦ0 −
+
L=
(9)
i=1
i=1
where, νi , vi and u, i = 1, 2, . . . , m are the Lagrange multipliers. Using the KKT conditions, we have:
Primal feasible condition:
Pm
ϕi
Φ0 − i=1
=0
m
Dual feasible condition:
νi ≥ 0, vi ≥ 0, u ≥ 0
(10)
(11)
Complementary slackness condition:
νi (ϕi − ϕmin ) = 0
(12)
vi (ϕmax − ϕi ) = 0
(13)
Ci pi
k (u + νi + vi )
(14)
Stationary condition:
ϕi =
In order to solve (8) via KKT condition, we need to optimize the throughput for every communication link in primary tier of our
CRN model. Therefore, for i = 1, 2, . . . , m, we have only three cases to consider, namely,
• Case 1: νi = 0, vi 6= 0, we have ϕi = ϕmax
• Case 2: νi 6= 0, vi = 0, we have ϕi = ϕmin
• Case 3: νi = 0, vi = 0, ϕi =
Ci pi
ku
Using these cases, we can develop an efficient algorithm to solve our optimization problem as described below:
First, by observing the role of optimization parameters, we have:
T =
m
X
Ci (1 +
i=1
m
m
X
1X
pi
lnϕi ) =
Ci +
Ci pi lnϕi
k
k i=1
i=1
(15)
Pm
Here, since ϕi is the variable, only the
part ( i=1 Ci pi lnϕi ) influences the total throughput. Therefore, in order to find
Psecond
m
the optimalP
ϕi that maximizes T = i=1 Ci (1 + pki lnϕi ), we can solve the equivelent problem of finding the optimal ϕi that
m
maximizes i=1 Ci pi lnϕi .
Thus, we can rewrite the objective function as:
maximize : t =
ϕi
m
X
Ci pi · ln ϕi
(16)
i=1
subject to: (C1)-(C3). Since each element in t is concave, the solution to (16) can be solved via water-filling approach as
presented in security level adjustment (SLA) algorithm (see Algorithm 1). Our SLA algorithm is extended from the standard
water-filling algorithm in [12] and briefly described below: let ti = Ci pi ln ϕi , the first order derivative of ti with respect to ϕi
∂ti
Ci pi
is:
=
. We sort the channels in nonincreasing order of Ci pi . Then, starting from ϕ1 = ϕmin , each ϕi is updated based
∂ϕi
ϕi
Pm
ϕi
ϕi
on the water level
. This procedure to find the optimal ϕi allocations is continued until the constraint Φ0 − i=1
=0
Ci pi
m
is reached.
18
Journal of Communications Engineering and Networks
Jan 2014, Vol. 2 Iss. 1, PP. 14-22
Algorithm 1 SLA algorithm to find the optimal security allocation
1) Sort the communication links in non-increasing order of Ci pi , i = 1, 2, . . . , m.
ϕmin
2) Let j = 1, compute α =
.
Ci pi
3) Then ϕi P
= αCi pi , for i = 1, 2, . . . , m; if ϕi < ϕmin , let ϕi = ϕmin ; if ϕi > ϕmax , let ϕi = ϕmax .
m
ϕi
4) If Φ0 < i=1 , set j = j + 1 and go to step 2); otherwise proceed to step 5).
m
Pm
ϕi
5) If Φ0 = i=1 , the current set of ϕi , i = 1, 2, . . . , m are solution; otherwise proceed to step 6).
m
6) Suppose the optimal α is between αj and αj−1 , set α = αj−1 . Let l be the index of the largest Ci pi , i = 1, 2, . . . , m such
that ϕl < ϕmax , and imin is the index of smallest Ci pi , i = 1, 2, . . . , m such that ϕi > ϕmin .
ϕmin
ϕmax
, set ϕi = αCi pi , for i = 1, 2, . . . , m; ϕi (ϕi < ϕmin ) = ϕmin ; ϕi (ϕi > ϕmax ) =
; if α <
7) Let α =
Cl pl
Cimin+1 pimin+1
ϕmax ; go toP
step 8); otherwise set l = l − 1 and go to step 9).
Pm
m
ϕi
ϕi
8) If Φ0 = i=1 , the optimal set is found; otherwise if Φ0 < i=1 , set l = l + 1 go to step 7); otherwise set l = l − 1
m
m
and go to step 9).
1
9) The optimal α is found as α = Pl
(mΦ0 − (m − imin ) ϕmin + (l − 1) ϕmax ); set ϕi = αCi pi , for i =
i=imin Ci pi
1, 2, . . . , m, ϕi (ϕi < ϕmin ) = ϕmin ; ϕi (ϕi > ϕmax ) = ϕmax .
Parameter
Path loss exponent: α
The transmit power of PTs: Pp
The transmit power of CTs: Pc
The background noise power: n0
The radius of protect region: D
The distance between PTs and PRs: rp
The distance between CTs and CRs: rc
The exponent: k
The density of PTs: λp
The density of CTs: λc
Fading function: h
Modulation method:
Value
4
1W
0.1W
0.05W
0.45
0.25
0.10
0.0001
4,5,6,7,8,9
12,15,18,21,24,27
∼ exp (1)
BPSK
TABLE I Simulation Parameters
IV.
SIMULATION RESULTS
In this section, we evaluate our proposed security level management strategy using simulations. The CRN parameters associated
with our simulation are presented in Table I. We employ the ECB block cipher with target, maximum and minimum block cipher
length of 128, 1024 and 16 corresponding to the target (Φ0 ), maximum (Φmax ) and minimum (Φmin ) security level in our CRN
model. The optimal security block lengths of each communication link are determined based on security level adjustment (SLA)
algorithm.
We define two metrics for evaluating the impact of our proposed security level adjustment (SLA) algorithm on throughput.
Tnew − Tf ix
The first metric is the throughout gain, G =
, where, Tnew and Tf ix represent the throughput of optimal block
Tf ix
length allocation and the throughput of fixed block length allocation (i.e., no security management). The second metric is the
T
normalized throughput TN =
, where T is normalized by the maximum transmission rate Cmax = max {Ci }. The
mCmax
first metric, i.e., throughput gain enables us to differentiate between the performance of the CRN with our proposed security
management algorithm and the performance of the CRN without using a security management algorithm. The second metric,
i.e., normalized throughput provides a measure of the standalone individual performance of the security strategies considered in
the CRN.
Fig. 2 indicates that we can vary the average SINR by changing the densities of PUs (e.g., as PU density increases, the
average SINR decreases as interference increases). It is important to note the meaning of average SINR in this context. We set
the PU densities and CU densities to obtain a realization of the CRNs. This sets the number of PU links m. The average SINR
is the instantaneous SINR (define in (2)) averaged over these m links.
19
Journal of Communications Engineering and Networks
Jan 2014, Vol. 2 Iss. 1, PP. 14-22
Trade−off between density of PUs and average SINR
18
16
Average SINR
14
12
10
8
6
4
5
6
7
Density of PUs
8
9
Fig. 2 The relationship between average SINR of primary tier and the density of PUs.
Trade−off between gain in throughput and average SINR
0.24
0.22
Gain in throughput
0.2
0.18
0.16
0.14
0.12
0.1
0.08
0.06
6
8
10
12
Average SINR
14
16
18
Fig. 3 Trade-off between throughput gain and average SINR generated by our CRN model using BPSK modulation with exponential adversary
attack model.
Fig. 3 illustrates the variation of throughput gain G as a function of average SINR. It shows that the throughput gain
decreases with increasing SINR. This can be explained based on Eq. (7). For high average SINR (i.e. lower bit error probability),
throughputs
Pm of optimal block length allocation and fixed block length allocation are both close to the achievable throughput
(T = i=1 Ci ). At lower SINR, (i.e. higher bit error probability), the throughput of optimal block length allocation performs
significantly better than the fixed block length allocation.
Fig. 4 demonstrates the effect of security management on normalized throughput TN . Once again, we vary the average SINR
and observe TN for the cases when we use security management and when we use a fixed security level, respectively . Figure
4 shows that the security level adjustment (SLA) algorithm enhances the throughput of the system relative to the fixed security
level algorithm. Combining results from Fig. 3 and Fig. 4, we observe that as communication quality improves, the performance
gap between these two methods reduces.
V.
CONCLUSIONS
This paper focuses on managing security levels in CRNs to build more efficient and secure networks so as to optimize the
throughput of every link while simultaneously maintaining necessary security levels for them. We employ block cipher as the
security mechanism and use vulnerability level as the security metric. The secure CRN is studied under an exponential adversary
attack. In order to balance the tradeoff between physical layer security and throughput in CRNs, we propose a security level
20
Journal of Communications Engineering and Networks
Jan 2014, Vol. 2 Iss. 1, PP. 14-22
Comparison of normalized throughputs
0.38
Tnew
Tfix
0.36
Normalized throughput
0.34
0.32
0.3
0.28
0.26
0.24
0.22
0.2
0.18
6
8
10
12
Average SINR
14
16
18
Fig. 4 Comparison of system normalized throughput using our new algorithm allocation and fixed block length allocation for BPSK with
exponential adversary attack model.
adjustment (SLA) algorithm based on water-filling. The SLA algorithm can distribute the optimal security level as well as the
optimal cipher block length for each communication link in our CRN model corresponding to their channel quality. Results
show that our SLA algorithm performs much better than the conventional fixed block length approach. Future work involves the
exploration of alternative security mechanism and optimization the trade-off between security and throughput.
REFERENCES
[1] C. Stevenson, G. Chouinard, Zhongding Lei, Wendong Hu, S.J. Shellhammer, and W. Caldwell. Ieee 802.22: The first
cognitive radio wireless regional area network standard. Communications Magazine, IEEE, 47:130–138, 2009.
[2] N. Devroye, P. Mitran, and Vahid Tarokh. Achievable rates in cognitive radio channels. Information Theory, IEEE Transactions on, 52:1813–1827, 2006.
[3] A. Goldsmith, S.A. Jafar, I. Maric, and S. Srinivasa. Breaking spectrum gridlock with cognitive radios: An information
theoretic perspective. Proceedings of the IEEE, 97:894–914, 2009.
[4] A. Jovicic and P. Viswanath. Cognitive radio: An information-theoretic perspective. Information Theory, IEEE Transactions
on, 55:3945–3958, 2009.
[5] M. Gastpar. On capacity under receive and spatial spectrum-sharing constraints. Information Theory, IEEE Transactions
on, 53:471–487, 2007.
[6] Ying-Chang Liang, Yonghong Zeng, E.C.Y. Peh, and Anh Tuan Hoang. Sensing-throughput tradeoff for cognitive radio
networks. Wireless Communications, IEEE Transactions on, 7:1326–1337, 2008.
[7] Bin Ning Li Zhu, F Richard Yu and Tao. A joint design of security and quality-ofservice (qos) provisioning in vehicular ad
hoc networks with cooperative communications. EURASIP Journal on Wireless Communications and Networking, 1:34–45,
2013.
[8] T.C. Clancy and N. Goergen. Security in cognitive radio networks: Threats and mitigation. In Cognitive Radio Oriented
Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference on, pages 1–8, 2008.
[9] Zhihui Shu, Yi Qian, and Song Ci. On physical layer security for cognitive radio networks. Network, IEEE, 27(3):28–33,
2013.
[10] Ruiliang Chen, Jung-Min Park, and J.H. Reed. Defense against primary user emulation attacks in cognitive radio networks.
Selected Areas in Communications, IEEE Journal on, 26:25–37, 2008.
[11] Zhihui Shu, Yaoqing Yang, Yi Qian, and R.Q. Hu. Impact of interference on secrecy capacity in a cognitive radio network.
In Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, pages 1–6, 2011.
21
Journal of Communications Engineering and Networks
Jan 2014, Vol. 2 Iss. 1, PP. 14-22
[12] M.A. Haleem, C.N. Mathur, R. Chandramouli, and K. P. Subbalakshmi. Opportunistic encryption: A trade-off between
security and throughput in wireless networks. Dependable and Secure Computing, IEEE Transactions on, 4(4):313–324,
2007.
[13] Huahui Wang, L. Lightfoot, and Tongtong Li. On phy-layer security of cognitive radio: Collaborative sensing under
malicious attacks. In Information Sciences and Systems (CISS), 2010 44th Annual Conference on, pages 1–6, 2010.
[14] A. Chorti and I. Kanaras. Masked m-qam ofdm: A simple approach for enhancing the security of ofdm systems. In
Personal, Indoor and Mobile Radio Communications, 2009 IEEE 20th International Symposium on, pages 1682–1686,
2009.
[15] Yi Peng, Zengli Liu, Hua Long, and Jie Peng. The research of cross-layer design between the phy and mac layer for ofdmbased cognitive radio network. In Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC
’09. International Conference on, volume 2, pages 290–293, 2009.
[16] A. Ahmad, A. Biri, and H. Afifi. Study of a new physical layer encryption concept. In Mobile Ad Hoc and Sensor Systems,
2008. MASS 2008. 5th IEEE International Conference on, pages 860–865, 2008.
[17] M. Haenggi and R. K. Ganti. Interference in large wireless networks. NOW Publishers, 2008.
[18] Chia han Lee and M. Haenggi. Interference and outage in poisson cognitive networks. Wireless Communications, IEEE
Transactions on, 11:1392–1401, 2012.
[19] W. Stallings. Cryptography and Network Security. Peaterson Education, New Jersey, 5th edition edition, 2003.
[20] D. Stintson. Cryptography Theory and Practice. CRC Press, New York, third edition edition, 2005.
22