- Research
- Open access
- Published:
Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack
EURASIP Journal on Advances in Signal Processing volume 2013, Article number: 169 (2013)
Abstract
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of an eavesdropper. In the cognitive radio network, CBS first detects whether there is spectrum hole through spectrum sensing and then communicates with CUs over the detected spectrum hole. Due to the broadcast nature of wireless transmission, the eavesdropper can overhear the cognitive transmissions between CBS and CUs and attempts to decode its overheard signals for interception purpose. In order to effectively defend against the eavesdropping attack, we propose a multiuser scheduling scheme for cognitive transmissions, where a CU with the highest instantaneous capacity to CBS is selected and scheduled to communicate with CBS. We analyze the security-reliability trade-off performance of proposed multiuser scheduling scheme for cognitive transmissions with the imperfect spectrum sensing over Rayleigh fading channels, where the security and reliability are evaluated in terms of the intercept probability and the outage probability, respectively. Numerical results illustrate that as the intercept probability requirement loosens, the outage probability of proposed multiuser scheduling scheme decreases accordingly, showing the trade-off between security and reliability. In addition, as the number of CUs increases, numerical intercept probability and outage probability of the multiuser scheduling scheme significantly improve, implying the security and reliability benefits through multiuser scheduling.
1 Introduction
Cognitive radio (CR) is emerging as a means to improve the spectrum resource utilization and allows unlicensed users (also called secondary user or cognitive user) to access the licensed spectrum in an opportunistic way[1–3]. Nowadays, most of radio spectrum is already licensed to particular wireless systems, e.g., the very high frequency (VHF) band from 174 to 216 MHz is allocated to broadcast television systems in North America, the ultra-high frequency (UHF) band from 880 to 915 MHz is allocated to the Global System for Mobile Communications (GSM), and so on. There is no available spectrum suited for developing new wireless communication systems. However, it has been reported by Federal Communications Commission (FCC) that the utilization of licensed spectrum typically ranges from 15% to 85% with a high variance in time, showing that the licensed spectrum is underutilized[4]. This provides us with an opportunity to develop a cognitive radio system that opportunistically utilizes the licensed spectrum. More specifically, if the licensed spectrum band is detected as idle, i.e., the band is not occupied by a licensed user (referred to as primary user), the cognitive radio system can reuse such idle licensed spectrum for data transmission[5]. In view of the above observations, cognitive radio relies on the spectrum sensing that is responsible for detecting and identifying the idle spectrum (known as spectrum hole).
Spectrum sensing enables the cognitive users to be adapted to the radiofrequency (RF) environment by detecting spectrum holes, and the simplest way for spectrum hole detection is to detect whether the primary user is present (or absent). Specifically, the presence of primary user implies the unavailability of licensed spectrum and the absence of primary user implies an available spectrum hole. At present, there are three main signal detection approaches for the spectrum sensing, i.e., the energy detection[6], matched filter detection[7], and cyclostationary detection[8, 9]. In general, the energy detection is sensitive to the background noise and unintended interference, which, however, has the advantage of simpler implementation than the matched filter detection and cyclostationary detection. In contrast, the matched filter detection is robust to the unintended interference, but requires some prior knowledge about the primary user signal such as the modulation type and signal waveform which may not be available in practice. As an alternative, the cyclostationary detection is presented through exploiting the cyclostationary feature of modulated signals, which typically requires long observation time to extract certain signal features. In addition, in order to combat the wireless fading effect, cooperative spectrum sensing[10–12] emerges by allowing cognitive users to cooperate with each other in detecting the presence of primary user. It is shown that the detection performance can be significantly improved through cooperative spectrum sensing.
It is pointed out that most existing work on cognitive radio is focused on the spectrum sensing and less attention has been paid to the cognitive radio security against eavesdropping attack. As is known, in cognitive radio networks, CUs first perform the spectrum sensing to identify spectrum holes and then communicate with each other over the detected spectrum holes[2, 3]. However, due to the broadcast nature of wireless medium, an eavesdropping attacker within the transmit coverage of cognitive source node will be able to overhear the cognitive transmissions and may decode its overheard signals for the interception purpose. Traditionally, cryptographic techniques relying on secret keys are employed to protect the confidential transmissions from eavesdropping, which, however, is not secure when the eavesdropper is with sufficient computational capacity for exhaustive key search (also known as brute-force attack)[13, 14]. To this end, physical layer security is now emerging as a means to secure wireless transmissions against the eavesdropping attack[15, 16]. In[17], the authors have proposed the concept of security-reliability trade-off (SRT) for wireless communications and examined the opportunistic relay selection for improving SRT. It has been shown in[17] that as the number of cooperative relays increases, the SRT performance of wireless communications can be significantly improved.
In this paper, we investigate the security-reliability trade-off for cognitive radio transmissions with imperfect spectrum sensing, where mutual interference between primary and cognitive users should be taken in account in characterizing the SRT performance. This differs from[17] where no interference is considered in performing the SRT analysis. We consider a cognitive radio network consisting of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of an eavesdropper, where CBS communicates with CUs over detected spectrum holes and the eavesdropper attempts to intercept the cognitive transmission. We propose a multiuser scheduling scheme to improve the security of cognitive transmission against eavesdropping attack and conduct the SRT analysis of proposed multiuser scheduling scheme in Rayleigh fading channels. Numerical results show that with an increasing number of CUs, the SRT performance of cognitive radio transmissions significantly improves, showing the advantage of proposed multiuser scheduling scheme against eavesdropping attack.
The rest of this paper is organized as follows. Section 2 presents the conventional direct transmission for cognitive radio in the presence of an eavesdropper and proposes the multiuser scheduling scheme to improve the cognitive transmission security against the eavesdropping attack. In Section 3, we perform the SRT analysis of traditional direct transmission and proposed multiuser scheduling schemes over Rayleigh fading channels. Next, in Section 4, the numerical SRT performance of proposed multiuser scheduling scheme is provided and compared with the traditional direct transmission. Finally, we give some concluding remarks in Section 5.
2 Proposed multiuser scheduling scheme in cognitive radio networks
In this section, we first describe the traditional direct transmission for cognitive radio in the presence of an eavesdropper and then propose the multiuser scheduling scheme to defend against eavesdropping attack.
2.1 Direct transmission
Figure 1 shows a cognitive radio network with one CBS and one CU, which is allowed to opportunistically access the spectrum licensed to the primary network that consists of one primary base station (PBS) and one primary user (PU). Specifically, if PBS and PU are communicating with each other over the licensed spectrum, CBS and CU are not allowed to transmit. If the licensed spectrum is detected as idle (i.e., the spectrum is not being used by PBS and PU), CBS and CU can reuse the detected idle spectrum (also referred to as spectrum hole) for data transmission. For notational convenience, let H = H 0 represent the case that the licensed spectrum is idle and H = H 1 represent the other case of the spectrum being occupied by PBS and PU. The probability of the licensed spectrum being idle and available for CBS and CU is denoted by P a = Pr(H = H 0). In addition, let and denote the licensed spectrum being detected as idle and busy, respectively, at cognitive users. Moreover, the probabilities of detection and false alarm of the presence of spectrum hole are represented by and, respectively. In order to protect the quality of service (QoS) of primary transmissions, the detection probability and false alarm probability should be guaranteed to be above certain requirements. Throughout this paper, we consider the cognitive downlink transmission from CBS to CU. Notice that similar performance analysis and results can be obtained for the cognitive uplink transmission from CU to CBS.
Without loss of generality, let x p and x s denote the primary and secondary signals, respectively. Given the spectrum hole detected (i.e.,), CBS starts transmitting its signal x s to CU with power P s and data rate R, thus the received signal at CU is written as
where h CBS‒CU and h PBS‒CU represent the fading coefficients of the channel from CBS to CU and that from PBS to CU, P p is the transmit power of PBS, n CU is the additive white Gaussian noise (AWGN) with zero mean and variance N 0, and α is defined as
where H = H 0 means that the licensed spectrum is unoccupied by primary users and thus PBS keeps silent, leading to α = 0 in this case. Moreover, α = 1 occurs when H = H 1, which is due to the fact that PBS is transmitting its signal x p to PU in the case of H = H 1. Notice that due to the background noise and unintended interference, it is not possible to achieve the perfect spectrum sensing without missed detection and false alarm. In other words, the detected result may happen even when there is actually no spectrum hole (i.e., H = H 1), which is referred to as false alarm of the presence of spectrum hole and causes mutual interference between primary and secondary users. Meanwhile, the broadcast nature of wireless transmission leads the cognitive transmission to be overheard and possibly intercepted by the eavesdropper. Thus, given that CBS transmits its signal x s, we can express the signal overheard at eavesdropper (Eav) as
where h CBS‒Eav and h PBS‒Eav represent the fading coefficients of the channel from CBS to Eav and that from PBS to Eav, n Eav is the zero-mean AWGN with variance N 0 received at Eav. Using Equation 1, we can easily obtain the capacity of main channel from CBS to CU as
where subscript 'm’ denotes the main channel from CBS to CU. Also, using Equation 3, we can obtain the capacity of wiretap channel from CBS to Eav as
where subscript 'w’ denotes the wiretap channel from CBS to Eav.
2.2 Multiuser scheduling scheme
In this subsection, we propose a multiuser scheduling scheme for cognitive radio security against eavesdropping attack. Figure 2 shows a cognitive radio network consisting of one CBS and multiple CUs in the presence of an Eav, where the multiple CUs are denoted by U = {CU i |i = 1, 2,…, N}. If a spectrum hole is detected, CBS can transmit to multiple CUs by using various orthogonal multiplexing approaches, such as time-division multiplexing (TDM), orthogonal frequency division multiplexing (OFDM), and so on. Moreover, given an orthogonal subchannel, we can dynamically choose the best CU to access the subchannel against the eavesdropping attack. Following [13] and [14], we assume that the channel state information (CSI) of both the main link and wiretap link is available at CBS, which is a commonly used assumption in physical layer security literature.
Without loss of generality, we consider that CU i is selected as the best user to access the detected spectrum hole. Assuming that CBS starts transmitting its signal x s to CU i with power P s and data rate R, we can express the received signal at CU i as
where and represent the fading coefficients of the channel from CBS to CU i and that from PBS to CU i , is the zero-mean AWGN with variance N 0 at CU i , and α is given by Equation 2. Meanwhile, the received signal at Eav is written as
where h CBS‒Eav and h PBS‒Eav represent the fading coefficients of the channel from CBS to Eav and that from PBS to Eav, n Eav is the zero-mean AWGN with variance N 0 received at Eav. Obviously, the capacity of main channel from CBS to CU i is obtained from Equation 6 as
where superscript 'i’ denotes CU i . Similarly, the capacity of wiretap channel from CBS to Eav can be computed from Equation 7 as
which is determined by the fading coefficients of channels from CBS and PBS to Eav and has nothing to do with CU i . This means that the eavesdropper's CSI will not affect the multiuser scheduling policy. In general, a CU with the highest instantaneous capacity is regarded as the best user. Therefore, the multiuser scheduling criterion can be given by
where U represents the set of all CUs. Substituting from Equation 8 to Equation 10 gives
Using Equation 11, we can obtain the main channel capacity of proposed multiuser scheduling scheme as given in as
So far, we have presented the conventional direct transmission for cognitive radio in the presence of eavesdropping attack and also proposed the multiuser scheduling scheme to enhance the cognitive transmission security.
3 Security-reliability trade-off analysis for cognitive transmissions over Rayleigh fading channels
In this section, we present the SRT analysis for the traditional direct transmission and proposed multiuser scheduling schemes in cognitive radio networks.
3.1 Direct transmission
This subsection analyzes the SRT analysis of conventional direct transmission over Rayleigh fading channels, where the security and reliability are characterized by the intercept probability at Eav and outage probability at CU, respectively. According to the Shannon's channel coding theorem, when the channel capacity falls below the data rate, the receiver is impossible to recover the source signal and an outage event occurs in this case. Otherwise, the receiver is able to succeed in decoding the source signal. Thus, given a spectrum hole detected (i.e.,), the outage probability of direct transmission at CU is written as
where C m is given by Equation 4 and R is the data rate. Substituting C m from Equation 4 into Equation 13 yields
Using the law of total probability and Equation 2, we can rewrite Equation 14 as
Using the Bayes' theorem, we can obtain as
where P a = Pr(H = H 0) is the probability of licensed spectrum being idle and available for CBS, and and represent the probabilities of detection and false alarm of the presence of spectrum hole, respectively. Similarly, can be given by
Denoting |h CBS‒CU|2 = x, |h PBS‒CU|2 = y, γ s = P s/N 0, γ p = P p/N 0,, and, we obtain
From the Appendix, we can obtain
and
Thus, substituting Equations 19 and 20 into Equation 18, we can obtain the closed-form outage probability expression of direct transmission scheme as
In addition, when the wiretap channel capacity becomes larger than the data rate, the eavesdropper will be able to succeed in decoding the source signal and an intercept event occurs[17]. Therefore, given a spectrum hole detected, the intercept probability of direct transmission at Eav is obtained as
where C w is given by Equation 5. Substituting C w from Equation 5 into Equation 22 yields
Similar to Equation 15, we can rewrite Equation 23 as
where and, which are given by Equations 16 and 17, respectively. Considering that random variables |h CBS‒Eav|2 and |h PBS‒Eav|2 follow independent exponential distributions with respective means and, we obtain
and
where γ s = P s/N 0 and γ p = P p/N 0. Substituting Equations 25 and 26 into Equation 24, we obtain a closed-form intercept probability expression of traditional direct transmission as
One can see that the outage probability and intercept probability of direct transmission are, respectively, given by Equations 21 and 27, which characterize the trade-off between security and reliability.
3.2 Proposed multiuser scheduling scheme
In this subsection, we present the SRT analysis of proposed multiuser scheduling scheme in Rayleigh fading channels. Similar to Equation 13, the outage probability of proposed multiuser scheduling scheme can be obtained as
where is given by Equation 12. Substituting from Equation 12 into Equation 28 gives
By using the law of total probability, Equation 29 is rewritten as
which can be further obtained as
where,, N is the number of CUs, and the second equation arises due to the fact that random variables and are independent for different CUs. Noting that and follow independent exponential distributions with respective means and, we can obtain
and
Hence, substituting Equations 32 and 33 into Equation 31, we obtain the closed-form outage probability expression of proposed multiuser scheduling scheme as
In addition, similar to Equation 22, the intercept probability of proposed multiuser scheduling scheme is obtained as
where C w is given by Equation 9. Substituting C w from Equation 9 into Equation 35 yields
which can be further rewritten as
Note that |h CBS‒Eav|2 and |h PBS‒Eav|2 follow independent exponentially distributed random variables with respective means and. Thus, we obtain
which is the same as the intercept probability of conventional direct transmission. As shown in Equations 34 and 38, we have derived the closed-form expression of outage probability and intercept probability of proposed multiuser scheduling scheme in Rayleigh fading channels. So far, we have completed the SRT analysis of conventional direct transmission and proposed multiuser scheduling schemes in cognitive radio networks.
4 Numerical results and discussion
In the section, we present the numerical results of outage and intercept probabilities to show the trade-off between security and reliability for cognitive radio networks in the presence of eavesdropping attack. In cognitive radio networks, the detection probability and false alarm probability should be guaranteed to be above certain requirements in order to protect the QoS of primary transmissions. According to the IEEE 802.22 standard, the detection and false alarm probabilities are specified to P d = 0.9 and P f = 0.1 throughout this paper. Moreover, the probability of licensed spectrum being idle and available is set to P a = 0.8.
Figure 3 shows the intercept probability versus outage probability of direct transmission and proposed multiuser scheduling schemes through using Equations 21, 27, 34, and 38 with P a = 0.8, P d = 0.9, P f = 0.1,,, and γ s = γ p = 10 dB. One can see from Figure 3 that as the outage probability increases from 10-4 to 100, the intercept probabilities of conventional direct transmission and proposed multiuser schemes both decrease from 100 to 10-3, showing that the security performance improves as the reliability requirement loosens. In addition, it is shown from Figure 3 that the SRT performance of multiuser scheduling scheme always outperforms the conventional direct transmission. Moreover, as the number of users increases from N = 4 to N = 16, the SRT performance of proposed multiuser scheduling scheme significantly improves, meaning the security and reliability benefit through multiuser scheduling.
In Figure 4, we show the intercept probability versus outage probability of the conventional direct transmission and proposed multiuser scheduling schemes for different γ s with N = 8, P a = 0.8, P d = 0.9, P f = 0.1,,, and γ p = 10 dB. It is seen from Figure 4 that for both the direct transmission and multiuser scheduling scheme, the SRT performance corresponding to γ s = 0 dB is almost identical to that corresponding to γ s = 20 dB. This implies that increasing the transmit power of CBS cannot improve the SRT performance. Figure 4 also shows that for both cases of γ s = 0 dB and γ s = 20 dB, the proposed multiuser scheduling scheme always performs better than the direct transmission in terms of SRT performance.
Figure 5 illustrates the intercept probability versus outage probability of the conventional direct transmission and proposed multiuser scheduling schemes for different γ p with N = 8, P a = 0.8, P d = 0.9, P f = 0.1,,, and γ s = 10 dB. As is shown in Figure 5, as the primary signal-to-noise ratio γ p increases from γ p = 0 dB to γ p = 20 dB, the SRT performance of both direct transmission and multiuser scheduling scheme almost keep unchanged. This means that the SRT for cognitive radio networks has nothing to do with the primary transmit power and background noise.
Figure 6 shows the intercept probability versus outage probability of the multiuser scheduling scheme for different λ me with N = 8, P a = 0.8, P d = 0.9, P f = 0.1,,, and γ s = γ p = 10 dB, where λ me is defined as which is the ratio of average gain of main channel from CBS to CU to that of wiretap channel from CBS to Eav, which is called main-to-eavesdropper ratio (MER) throughout this paper. One can observe from Figure 6 that as the MER increases from λ me = 0 dB to λ me = 10 dB, the SRT performance of proposed multiuser scheduling scheme improves significantly. This is due to the fact that with an increasing MER, the capacity of wiretap channel from PBS to Eav degrades and thus the probability of succeeding in intercepting the cognitive transmission at Eav decreases.
5 Conclusions
In this paper, we have investigated the security-reliability trade-off for cognitive radio networks in the presence of an eavesdropper. We have proposed a multiuser scheduling scheme to improve the SRT performance of cognitive radio transmission against eavesdropping attack. We have derived closed-form expressions of intercept probability and outage probability of the proposed multiuser scheduling scheme in cognitive radio networks with imperfect spectrum sensing. For the comparison purpose, we have also analyzed the SRT performance of traditional direct transmission in Rayleigh fading channels. Numerical results have shown that the proposed multiuser scheduling scheme strictly outperforms the conventional direct transmission in terms of SRT performance. In addition, with an increasing number of cognitive users, the SRT performance of proposed multiuser scheduling scheme significantly improves, showing the security and reliability benefits through multiuser scheduling.
Appendix
It is noticed that random variables |h CBS‒CU|2 = x and |h PBS‒CU|2 = y follow independent exponential distributions with respective means and. Thus, the joint probability density function (PDF) of (x, y) is given by
for (x > 0, y > 0). Using the PDF of exponentially distributed random variable |h CBS‒CU|2 = x with mean, we obtain
which is Equation 19. Using the joint PDF of (x, y), we have
where Θ = {(x, y)|γ s x - γ P(2R - 1)y < 2R - 1}. From Equation 41, we obtain
Performing the double integral in Equation 42 yields
This completes the calculation of Equation 20.
References
Mitola J, Maguire GQ: Cognitive radio: making software radios more personal. IEEE Pers Commun 1999, 6: 13-18. 10.1109/98.788210
Zou Y, Yao Y-D, Zheng B: Cooperative relay techniques for cognitive radio systems: spectrum sensing and secondary user transmissions. IEEE Commun Mag 2012, 50: 4.
Zou Y, Yao Y-D, Zheng B: Cognitive transmissions with multiple relays in cognitive radio networks. IEEE Trans Wireless Commun 2011, 10(2):648-659.
Federal Communications Commission (FCC): Notice of proposed rule-making and order. Rep ET Docket; 2003:03-322.
Hu S, Yao Y, Yang Z: Cognitive medium access control protocols for secondary users sharing a common channel with time division multiple access primary users. Wiley Wireless Commun. and Mobile Computing; 2012. doi:10.1002/wcm.2185
Urkowitz H: Energy detection of unknown deterministic signals. Proceedings of IEEE 1967, 55(4):523-231.
Sahai A, Hoven N, Tandra R: Some fundamental limits in cognitive radio, in Proceedings of the 42nd Allerton Conference on Communication. Monticello: Control and Computing; 2004.
Fehske A, Gaeddert JD, Reed JH: A new approach to signal classification using spectral correlation and neural networks. Baltimore: in Proceedings of the Symposium on IEEE DySPAN; 2005.
Kim K, Akbar I, Bae K, Um J, Spooner C, Reed J: Cyclostationary approaches to signal detection and classification in cognitive radio, in. Dublin: Proceedings of the Symposium on IEEE DySPAN; April 2007:17-20.
Ghasemi A, Sousa ES: Collaborative spectrum sensing for opportunistic access in fading environment. IEEE DYSPAN: Proc; 2005:131-136.
Zou Y, Yao Y-D, Zheng B: A selective-relay based cooperative spectrum sensing scheme without dedicated reporting channels in cognitive radio networks. IEEE Trans. Wireless Commun. 2011, 10(4):1188-1198.
Zhu J, Zou Y, Zheng B: Cooperative detection for primary user in cognitive radio networks. EURASIP J Wirel Commun Netw. 2009, 2009(617320):12.
Bloch M, Barros JO, Rodrigues M, McLaughlin SW: Wireless information-theoretic security. IEEE Trans Inf Theory 2008, 54(6):2515-2534.
Zou Y, Wang X, Shen W: Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Area Commun. 2013, 31(10):2099-2111.
Khisti A, Wornell GW: Secure transmission with multiple antennas: the MISOME wiretap channel. IEEE Trans Inf Theory 2010, 56(7):3088-3104.
Oggier F, Hassibi B: The secrecy capacity of the MIMO wiretap channel. IEEE Trans Inf Theory 2011, 57(8):4961-4972.
Zou Y, Wang X, Shen W, Hanzo L: Security versus reliability analysis for opportunistic relaying. IEEE Trans. Veh. Tech, in press;
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (grant no. 61302104) and the Scientific Research Foundation of Nanjing University of Posts and Telecommunications (grant no. NY213014).
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interest
The author declares that she has no competing interest.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Zhu, J. Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack. EURASIP J. Adv. Signal Process. 2013, 169 (2013). https://doi.org/10.1186/1687-6180-2013-169
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/1687-6180-2013-169