TY - JOUR
T1 - Securing physical-layer communications for cognitive radio networks
AU - Zou, Yulong
AU - Zhu, Jia
AU - Yang, Liuqing
AU - Liang, Ying Chang
AU - Yao, Yu Dong
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/9
Y1 - 2015/9
N2 - This article investigates the physical-layer security of CR networks, which are vulnerable to various newly arising attacks targeting the weaknesses of CR communications and networking. We first review a range of physical-layer attacks in CR networks, including primary user emulation, sensing falsification, intelligence compromise, jamming, and eavesdropping attacks. Then we focus on the physical-layer security of CR networks against eavesdropping and examine the secrecy performance of cognitive communications in terms of secrecy outage probability. We further consider the use of relays for improving CR security against eavesdropping and propose an opportunistic relaying scheme, where a relay node that makes CR communications most resistant to eavesdropping is chosen to participate in assisting the transmission from a cognitive source to its destination. It is illustrated that the physical- layer secrecy of CR communications relying on opportunistic relaying can be significantly improved by increasing the number of relays, showing the security benefit of exploiting relay nodes. Finally, we present some open challenges in the field of relay-assisted physical-layer security for CR networks.
AB - This article investigates the physical-layer security of CR networks, which are vulnerable to various newly arising attacks targeting the weaknesses of CR communications and networking. We first review a range of physical-layer attacks in CR networks, including primary user emulation, sensing falsification, intelligence compromise, jamming, and eavesdropping attacks. Then we focus on the physical-layer security of CR networks against eavesdropping and examine the secrecy performance of cognitive communications in terms of secrecy outage probability. We further consider the use of relays for improving CR security against eavesdropping and propose an opportunistic relaying scheme, where a relay node that makes CR communications most resistant to eavesdropping is chosen to participate in assisting the transmission from a cognitive source to its destination. It is illustrated that the physical- layer secrecy of CR communications relying on opportunistic relaying can be significantly improved by increasing the number of relays, showing the security benefit of exploiting relay nodes. Finally, we present some open challenges in the field of relay-assisted physical-layer security for CR networks.
KW - Interference
KW - Jamming
KW - Physical layer
KW - Relays
KW - Sensors
KW - Signal to noise ratio
KW - Wireless communication
UR - http://www.scopus.com/inward/record.url?scp=84959568783&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84959568783&partnerID=8YFLogxK
U2 - 10.1109/MCOM.2015.7263345
DO - 10.1109/MCOM.2015.7263345
M3 - Article
AN - SCOPUS:84959568783
SN - 0163-6804
VL - 53
SP - 48
EP - 54
JO - IEEE Communications Magazine
JF - IEEE Communications Magazine
IS - 9
M1 - 7263345
ER -