Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks

In this paper, a cooperative secure transmission strategy is proposed for cognitive radio networks (CRNs) comprising of multiple primary users (PUs), multiple secondary users (SUs) and malicious eavesdroppers. Specifically, we construct the utility functions for primary users and secondary users tha...

Full description

Bibliographic Details
Main Authors: Zhou Tian, Shen Yi, Pan Zhiwen, Liu Nan, You Xiaohu
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9381877/
id doaj-909600aa930e467d9296afc728da790d
record_format Article
spelling doaj-909600aa930e467d9296afc728da790d2021-03-31T01:25:22ZengIEEEIEEE Access2169-35362021-01-019462014620910.1109/ACCESS.2021.30673459381877Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio NetworksZhou Tian0https://orcid.org/0000-0001-5765-605XShen Yi1https://orcid.org/0000-0002-0941-8644Pan Zhiwen2https://orcid.org/0000-0002-7266-7264Liu Nan3https://orcid.org/0000-0003-4155-0685You Xiaohu4https://orcid.org/0000-0002-0809-8511School of Cyber Science and Engineering, Southeast University, Nanjing, ChinaSchool of Cyber Science and Engineering, Southeast University, Nanjing, ChinaSchool of Cyber Science and Engineering, Southeast University, Nanjing, ChinaNational Mobile Communications Research Laboratory, Southeast University, Nanjing, ChinaNational Mobile Communications Research Laboratory, Southeast University, Nanjing, ChinaIn this paper, a cooperative secure transmission strategy is proposed for cognitive radio networks (CRNs) comprising of multiple primary users (PUs), multiple secondary users (SUs) and malicious eavesdroppers. Specifically, we construct the utility functions for primary users and secondary users that try to achieve the transmission opportunities, and optimization problem aiming at maximizing the aggregated throughput of network is formulated. Then, distributed primary users-secondary users matching algorithm is proposed to solve the optimization problem, and the final cooperative secure transmission strategy is obtained. Simulation results show that our proposed strategy outperforms existing schemes.https://ieeexplore.ieee.org/document/9381877/Cognitive radio networkscooperative secure transmissionmatching theory
collection DOAJ
language English
format Article
sources DOAJ
author Zhou Tian
Shen Yi
Pan Zhiwen
Liu Nan
You Xiaohu
spellingShingle Zhou Tian
Shen Yi
Pan Zhiwen
Liu Nan
You Xiaohu
Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks
IEEE Access
Cognitive radio networks
cooperative secure transmission
matching theory
author_facet Zhou Tian
Shen Yi
Pan Zhiwen
Liu Nan
You Xiaohu
author_sort Zhou Tian
title Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks
title_short Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks
title_full Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks
title_fullStr Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks
title_full_unstemmed Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks
title_sort matching theory based physical layer secure transmission strategy for cognitive radio networks
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2021-01-01
description In this paper, a cooperative secure transmission strategy is proposed for cognitive radio networks (CRNs) comprising of multiple primary users (PUs), multiple secondary users (SUs) and malicious eavesdroppers. Specifically, we construct the utility functions for primary users and secondary users that try to achieve the transmission opportunities, and optimization problem aiming at maximizing the aggregated throughput of network is formulated. Then, distributed primary users-secondary users matching algorithm is proposed to solve the optimization problem, and the final cooperative secure transmission strategy is obtained. Simulation results show that our proposed strategy outperforms existing schemes.
topic Cognitive radio networks
cooperative secure transmission
matching theory
url https://ieeexplore.ieee.org/document/9381877/
work_keys_str_mv AT zhoutian matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks
AT shenyi matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks
AT panzhiwen matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks
AT liunan matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks
AT youxiaohu matchingtheorybasedphysicallayersecuretransmissionstrategyforcognitiveradionetworks
_version_ 1724178639448178688