Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks
In this paper, a cooperative secure transmission strategy is proposed for cognitive radio networks (CRNs) comprising of multiple primary users (PUs), multiple secondary users (SUs) and malicious eavesdroppers. Specifically, we construct the utility functions for primary users and secondary users tha...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9381877/ |
id |
doaj-909600aa930e467d9296afc728da790d |
---|---|
record_format |
Article |
spelling |
doaj-909600aa930e467d9296afc728da790d2021-03-31T01:25:22ZengIEEEIEEE Access2169-35362021-01-019462014620910.1109/ACCESS.2021.30673459381877Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio NetworksZhou Tian0https://orcid.org/0000-0001-5765-605XShen Yi1https://orcid.org/0000-0002-0941-8644Pan Zhiwen2https://orcid.org/0000-0002-7266-7264Liu Nan3https://orcid.org/0000-0003-4155-0685You Xiaohu4https://orcid.org/0000-0002-0809-8511School of Cyber Science and Engineering, Southeast University, Nanjing, ChinaSchool of Cyber Science and Engineering, Southeast University, Nanjing, ChinaSchool of Cyber Science and Engineering, Southeast University, Nanjing, ChinaNational Mobile Communications Research Laboratory, Southeast University, Nanjing, ChinaNational Mobile Communications Research Laboratory, Southeast University, Nanjing, ChinaIn this paper, a cooperative secure transmission strategy is proposed for cognitive radio networks (CRNs) comprising of multiple primary users (PUs), multiple secondary users (SUs) and malicious eavesdroppers. Specifically, we construct the utility functions for primary users and secondary users that try to achieve the transmission opportunities, and optimization problem aiming at maximizing the aggregated throughput of network is formulated. Then, distributed primary users-secondary users matching algorithm is proposed to solve the optimization problem, and the final cooperative secure transmission strategy is obtained. Simulation results show that our proposed strategy outperforms existing schemes.https://ieeexplore.ieee.org/document/9381877/Cognitive radio networkscooperative secure transmissionmatching theory |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhou Tian Shen Yi Pan Zhiwen Liu Nan You Xiaohu |
spellingShingle |
Zhou Tian Shen Yi Pan Zhiwen Liu Nan You Xiaohu Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks IEEE Access Cognitive radio networks cooperative secure transmission matching theory |
author_facet |
Zhou Tian Shen Yi Pan Zhiwen Liu Nan You Xiaohu |
author_sort |
Zhou Tian |
title |
Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks |
title_short |
Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks |
title_full |
Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks |
title_fullStr |
Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks |
title_full_unstemmed |
Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks |
title_sort |
matching theory based physical layer secure transmission strategy for cognitive radio networks |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2021-01-01 |
description |
In this paper, a cooperative secure transmission strategy is proposed for cognitive radio networks (CRNs) comprising of multiple primary users (PUs), multiple secondary users (SUs) and malicious eavesdroppers. Specifically, we construct the utility functions for primary users and secondary users that try to achieve the transmission opportunities, and optimization problem aiming at maximizing the aggregated throughput of network is formulated. Then, distributed primary users-secondary users matching algorithm is proposed to solve the optimization problem, and the final cooperative secure transmission strategy is obtained. Simulation results show that our proposed strategy outperforms existing schemes. |
topic |
Cognitive radio networks cooperative secure transmission matching theory |
url |
https://ieeexplore.ieee.org/document/9381877/ |
work_keys_str_mv |
AT zhoutian matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks AT shenyi matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks AT panzhiwen matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks AT liunan matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks AT youxiaohu matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks |
_version_ |
1724178639448178688 |