亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        A Spectrum Sharing Model that Counters Eavesdropping:An Energy Efficiency View

        2021-04-30 07:23:34YeeLooFoo

        Yee-Loo Foo

        (Faculty of Engineering, Multimedia University, Cyberjaya 63100, Malaysia)

        Abstract: Wireless transmission is subject to eavesdropping. When wireless transmission ceases, the assigned frequency channel is unused, wasting the spectral opportunity given. In this study, a spectrum sharing model that reduces spectral wastage and protects against eavesdropping is proposed. First, cognitive radio (CR) shares the channel access with primary user (PU). When the CR senses that the channel is idle, CR can seize the unoccupied channel for its own use. If the channel is detected to be occupied by PU, CR transmits artificial noise to jam any potential eavesdropper. To what extent is this operation beneficial to the CR? The main concern of this study is the energy efficiency (μ) of CR, i.e., the ratio of channel throughput to its energy consumption. The relationship between μ and the percentage of frame duration allocated for sensing (τ) was investigated. This study contributes a novel theoretical expression that allows us to find the optimal μ and τ values, denoted by μ* and τ*. With the availability of this expression, the relationships between (μ*,τ*) and other important system parameters can be understood thoroughly. Our investigation reveals that strong CR signal will result in high μ* without the need of increasing τ*. On the other hand, a strong primary signal allows a short τ* and it improves μ*. High sampling rate for sensing may be unnecessary, as it does not improve μ* significantly. A more demanding target probability of detection requires a higher sensing duration, but it has insignificant impact on μ*.

        Keywords: spectrum sharing; cognitive radio; physical layer security; eavesdropping; jamming; throughput; energy efficiency

        0 Introduction

        The channel resource assigned to a wireless transmitter becomes a waste if it stays idle, while an active transmission of data could be eavesdropped. Spectrum sharing overcomes the first problem by having the primary user (PU) of the channel resource to share it with a secondary user. The latter can then help the former in defending against eavesdropping. The secondary user is expected to be a cognitive radio (CR) equipped with spectrum sensing function that identifies spectral opportunity or unoccupied channel. CR can make use of an unused channel to send its own data. On the other hand, when the PU has data to send, CR relinquishes the channel. CR returns the favor by transmitting artificial noise to jam the eavesdropper (EA), thus protecting the secrecy of primary data. This technique is named as physical layer security[1-2], which originates from information theory. It utilizes the physics of radio signal decaying with propagation distance. As long as the artificial noise that reaches EA is strong enough, it could garble the information that EA attempts to steal.

        PU consists of two nodes, i.e., the primary transmitter (PT) and primary receiver (PR). CR is taken as the secondary user (SU). Conventionally, PU does not like sharing the spectral opportunity with CR, because CR’s transmission could harmfully interfere with the data reception at PR. Now there is an incentive for PU, because CR helps defending against eavesdropping when PT transmits. CR sends out friendly jamming signal that is decodable by the PR, which harms only the EA but not PR. In return, CR has the benefit of sending its own data over the channel when it is unused. Such spectrum sharing scheme benefits both PU and CR. Fig.1 illustrates the proposed model.

        Fig.1 System model

        Fig.2 shows a state transition diagram that depicts CR’s operation. At first, CR senses the spectrum to identify channel occupancy. If a channel is found to be occupied (by PU), CR transits to the state of jamming EA. Otherwise, it transits to the state of transmitting its data over the unoccupied channel. Although an EA’s exact location may not be known, it is assumed to be close to the PR, and that it targets only the data sent out from PT but not CR.

        Fig.2 CR’s state transition diagram

        CR’s energy and time are divided between the three states depicted in Fig. 2. Suppose the duration of a data packet isTseconds. CR spendstseconds for sensing, andT-tseconds in any of the other two states (transmitting data or jamming EA). Fig.3 illustrates the time allocation. Letτ=t/Tdenote the portion of time allocated for spectrum sensing.

        Fig.3 Time spent in sensing, jamming, or transmitting data

        The scheme encourages PU to share its spectral channel with CR, since CR can protect PU from being eavesdropped. Here the benefit that the CR gets is a question. CR’s throughput increases because it can transmit data when PU becomes inactive. However, jamming EA consumes energy. This may be risky for CR that has limited amount of energy. Whether it is possible to attain high throughput at low energy consumption is the topic for investigation.

        Energy efficiencyμis defined as the ratio of channel throughput to energy consumption. Being highly energy efficient is critical for CR. Determining the changes ofμwith respect toτand other parameters is the way to find out howμvaries with the sensing duration and other operation parameters. Intuitively, increasingτwill increase sensing accuracy, thus the throughput should increase too, which results in higherμ. However, increasingτalso reduces the duration for sending CR’s data and its throughput, implying reducedμ. These conflicting tendencies result in a maximalμvalue. Letμ*denote the optimal energy efficiency, andτ*denote the value ofτthat optimizesμ. This study seeks to understand how the values ofμ*andτ*change under different circumstances. Therefore, a novel theoretical expression is contributed, which reveals that the (τ*,μ*) pair depends only on the following system parameters:

        1) Ratio of the CR’s jamming power to transmission power,PJ/PT;

        2) Ratio of the CR’s sensing power to transmission power,PS/PT;

        3) Probability of PU being present and active (Pr1);

        4) Probability of detection (PrD), which is the requirement imposed on CR by PU, with the purpose of guaranteeing sufficient protection from CR transmission;

        5) Ratio of received PT signal power to noise power (SNRP);

        6) Sampling rate used for sensing (fs).

        In the following sections, how these parameters affect the value of (τ*,μ*) will be demonstrated. The remaining part of this paper is organized in the following manner. Section 1 describes the related works. The spectrum sensing technique is described and the problem of finding energy efficiency is formulated in Section 2. Section 3 presents the results and discussions, and Section 4 concludes this paper.

        1 Related Works

        There are different ways of sharing the spectrum[3-7]. It could be shared following the use of game theory[3-5]. The users could bid for the available spectrum in an auction[3], or enforced among themselves certain rules in order to share the spectrum more efficiently[4]. In Ref. [5], the PUs compete among themselves in order to provide CRs some spectral opportunities with competitive pricing. In Ref. [6], the gain of utilizing channel fading in favor of CR transmission was analyzed, and the performance gain of using multi-antennas for spectrum sharing was presented in Ref. [7]. In contrast to these works, this study provides an incentive to PU for sharing its spectrum.

        The secrecy of PU’s data is an important issue[8-13]. Artificial noise was introduced in Ref. [8] to jam the EA. The idea was then expanded in Refs. [9-10]. The noise pattern was selected from the null space of the receiver’s channel but not that of the EA’s channel. As a result, the noise causes adverse effect to the EA’s reception but not that of the legitimate receiver. Since an eavesdropper is passive, the secrecy scheme proposed in Refs. [8-10] does not assume knowing its presence or even its location. Without the knowledge of the location of EA, there is still a guaranteed minimum rate of transmission secrecy[9]and minimum secrecy capacity[10]. A 2-stage protocol is proposed in Refs. [8, 10] to get CR’s help in transmitting artificial noise to jam the EA:

        Stage 1: Both the PT and PR send out artificial noises. Different weighted versions of them are received by the CR and EA. LetaXYdenote the channel gain between senderXand receiverY,rAthe signal received by nodeA. Subscripts T, R, C, and E denote PT, PR, CR, and EA, respectively.

        PT transmits signalaTRx, whereas PR transmitsy. CR receives the signal

        rC=αTCαTRx+αRCy+nC

        EA receives the signal

        rE,1=αTEαTRx+αREy+e1

        BothnCande1are independent and identically distributed additive white Gaussian noise (AWGN) random variables.

        Stage 2: CR retransmits the weighted version of the received noises while PT transmits data that will cancel out the artificial noise at the PR.

        CR transmitsβrC, whereβis a random weight. PT transmits the signal

        -βαTCαCRx+z

        wherezis the information signal to be sent by PT. PR receives signal

        rR=αTRz+βαCRαRCy+βαCRnC+nR

        Note that the term associated withxhas vanished, i.e., PR is not affected by the artificial noise.

        EA receives signal

        nRande2are i.i.d. AWGN random variables. Note that the term associated withxis artificial noise and non-zero. The proposed scheme is effective in spite of EA’s location being unknown.

        In the model proposed by Lu et al.[11], the jamming signal was sent out by PT instead of CR. The latter only relayed the former’s message to PR. In Refs. [12-13], the authors aimed to achieve higher secrecy performance for PU by optimizing CR’s schedule and power allocation. Our objective is to achieve higher energy efficiency for CR. Xu and Li[14]have considered optimal scheduling and power allocation among multiple CRs, but not CR’s energy efficiency. Yan et al.[15]have considered CR as the victim of eavesdropping. In this work, PR is the victim of eavesdropping.

        Although energy efficiency has been a concern in CR networks[16-19], the issue has not been considered in the context of CR consuming energy in order to jam the EA. To attain higher energy efficiency, Pei et al.[16]optimized the times of transmitting and sensing, and the order of sensing the channels. To minimize energy consumption, Deng et al.[17]proposed an optimal schedule for spectrum sensing. Xie et al.[18]proposed an energy-efficient resource allocation method in a heterogeneous CR network architecture. The CR network structure considered in Ref. [19] is also different. It consists of a cognitive base station that allocates frequency resources to the CRs. Scheduling of such allocation was analyzed, with the objective of reaching maximum energy efficiency. Liu et al.[20]has considered the joint issue of spectrum sharing and energy efficiency of PU but not that of CR.

        2 Spectrum Sensing and Energy Efficiency

        In this section, the relationship between energy efficiency and the performance of spectrum sensing is formulated. For tractable analysis, energy detector is chosen to serve the purpose of spectrum sensing. Urkowitz was the first to present the theory of energy detection[21], then Digham et al.[22]extended the theory. Ghasemi and Sousa[23]applied the theory in spectrum sensing. Now in this study, aT-second frame is considered. CR spendstseconds for sensing and the sampling rate isfs. The total number of collected energy samplesN=fst. The central limit theorem applies when there is a large number of energy samples[24]. At the CR receiver, the ratio of PT signal power to noise power is denoted by SNRP. Given a target probability of detection PrD, the probability of false alarm PrFcan be expressed as follows[24]:

        (1)

        Q(?) is the standard Gaussian complementary cumulative distribution function (CDF), whereasQ-1(?) is its inverse.

        LetCdenote the channel capacity (normalized by channel bandwidth) of CR when PT relinquishes the channel. CR’s channel capacity is assumed negligible when PT acquires the channel and is actively transmitting. At the CR receiver, the CR’s transmitted signal to noise power ratio is denoted by SNRCR.Cis given by

        C=log2(1+SNRCR)

        (2)

        Let Pr1and Pr0denote the respective probabilities of PT actively transmitting and being idle. When PT is idle, CR achieves the channel throughput[24]that is given by

        R=(1-τ)Pr0(1-PrF)C

        (3)

        whereτ=t/T.

        The probability of CR perceiving PT to be idle is denoted by Pr(0). The bracket in the subscript emphasizes that it is only the CR’s perception, which may not be the truth. Two conditions contribute towards Pr(0): 1) PT is idle and there is no false alarm, 2) PT actively transmits but CR does not detect it[25]. Hence,

        Pr(0)=Pr0(1-PrF)+Pr1(1-PrD)

        (4)

        Suppose CR allocatesPSwatts for spectrum sensing andPTwatts for transmitting its data. Sensing usually consumes lower power than data transmission. Intuitively,PSincreases withfs. To relate the magnitudes betweenPSandPT, the following simple model is proposed:

        PS=k?(fs)?PT

        (5)

        where 0

        HerePSis assumed to increase linearly withfsin MHz.

        LetETandESdenote the respective energies CR consumes in transmitting data and sensing. Then (as in Ref. [25]),

        ES=PSt

        (6)

        ET=PT(T-t) Pr(0)

        (7)

        Once CR senses an actively transmitting PT, the former relinquishes the channel. CR then sends out artificial noise to EA to garble its reception. It is assumed that EA is always active. Pr(1)= 1-Pr(0)denotes the probability of friendly jamming. LetPJandEJdenote the respective power and energy consumed for jamming.

        EJ=PJ(T-t) Pr(1)

        (8)

        The total energy that the CR consumes isE=ES+ET+EJ.

        Being defined as the ratio of channel throughput to consumed energy[16, 25], energy efficiency is given by

        (9)

        After some steps, it is found that

        (10)

        (11)

        Eq. (11) is a novel expression that allows to find theτvalue that optimizesμ(i.e.,τ*). It reveals that the optimal value depends only on the following parameters:

        Note that Eq. (11) does not depend on SNRCR, i.e., SNRCRdoes not affect the choice ofτ, despite the fact that a strong CR signal will result in highμ*(i.e., the maximum value ofμ). By using numerical method, Eq. (11) can be solved. Subsequently, the sets of (τ*,μ*) values that vary with these parameters will be determined.

        3 Results and Discussions

        Table 1 List of symbols

        Note:krepresents constant that relatesPStoPT.

        First, the changes of (τ*,μ*) with respect toPJ/PTare investigated, which vary from 0.2 to 0.7, whilePTremains at 1 W.

        From Fig.4, it can be observed that 1)μ*decreases linearly with the ratioPJ/PT; as more power being consumed for jamming EA, the optimal energy efficiency naturally reduces; 2)τ*increases only a little withPJ/PT, which shows thatτ*is nearly independent ofPJ/PT.

        Fig.4 μ* and τ* vs. PJ/PT

        Now the changes of (τ*,μ*) are investigated with respect toPS/PT, which varies from 0.1 to 1, whilePTremains at 1 W.

        From Fig.5, it can be observed that 1)μ*decreases with the ratioPS/PT; as more power is consumed for sensing, the optimal energy efficiency is reduced; 2)τ*also decreases withPS/PT; as more power is allocated for spectrum sensing, smaller duration of sensing is needed.

        Fig.5 μ* and τ* vs. PS/PT

        Next, the change of (τ*,μ*) is investigated with respect to Pr1, which varies from 0.01 to 0.99.

        From Fig.6, it can be observed that 1)μ*decreases significantly with Pr1; when it becomes more likely for PU to be present and active, there is less chance for the CR to transmit its data, resulting in lower optimal energy efficiency; 2)τ*increases with Pr1; when it is more probable for PT to be transmitting, CR needs to allocate a larger portion of a frame for accurately sensing the presence and activity of PU.

        Fig.6 μ* and τ* vs. Pr1

        τ*andμ*change with the target PrD, which varies from 0.6 to 0.99. Fig.7 shows the result.

        Fig.7 μ* and τ* vs. PrD

        From Fig. 7, it can be observed that 1)μ*initially increases and later decreases with PrD, both in a very small extent, which means that PrDdoes not have any significant impact onμ*as long asτ*varies accordingly; 2)τ*increases with PrD; a more demanding PrDrequires higherτ*in order to attain the maximal energy efficiencyμ*.

        Howτ*andμ*change with the SNRPmeasured at the CR is also assessed. Fig.8 shows the result.

        Fig.8 μ* and τ* vs. SNRP

        From Fig. 8, the following trends can be observed:

        1)μ*increases with SNRP, but the rate of increment slows down for SNRP> -15 dB. Higher SNRPmakes detection more accurate. CR can make more accurate judgment on PT’s activity. This translates into higher throughput and higherμ*.

        2)τ*decreases with SNRP. When the signal from PT is weak (e.g., SNRP= -22.5 dB), the CR requires large sensing duration to achieve the target detection accuracy. Given the same target detection accuracy, only short sensing duration is required when PT’s signal is powerful.

        Next, how the changes in sampling ratefsaffectτ*andμ*are evaluated. Fig.9 records the result.

        Fig.9 μ* and τ* vs. fs

        The following trends are observed in Fig.9:

        1)μ*increases little withfs, whereasτ*decreases withfs.

        2) The result shows that increasing the sampling rate does not significantly improve the optimal energy efficiency, other than requiring a shorter sensing duration to reach the same detection accuracy. Based on this, this study argues that a high sampling rate may not be necessary.

        All the findings under the given circumstances are summarized as follows:

        2)μ*decreases withPJ/PT,PS/PT,Pr1, but increases with SNRP. On the other hand, PrDandfshave little effect onμ*;

        3)τ*decreases withPS/PT, SNRP,fs, but increases with Pr1and PrD. On the other hand,PJ/PThas little effect onτ*.

        4 Conclusions

        This study proposes a spectrum sharing model that counters eavesdropping. The CR jams an eavesdropper in return for the opportunity of spectrum access. CR’s energy consumption in friendly jamming and data transmission becomes a concern. Attaining the optimal energy efficiency of CR (μ*) is the main objective of the study here. The study’s primary contribution is a novel mathematical expression that allows us to find the (τ*,μ*) pair of values in the given scenario. Following that, the relationships between the (τ*,μ*) pair and six different important system parameters have been analyzed. It has been found that a strong PT’s signal allows a short sensing duration and it improvesμ*, but there is a limit on the amount of improvement. Increasing the sampling rate of CR may not be worthy since it does not improveμ*significantly. A more demanding target probability of detection requires a larger sensing duration, but it has insignificant impact onμ*. In this work, the security threat of eavesdropping is considered. Our future work will consider the security threat of hostile jamming. A possible solution is to require CR to relay PT’s data to PR, creating a diversity of information.

        亚洲—本道中文字幕久久66| 亚洲中文字幕久久精品无码a| 国产成人aaaaa级毛片| 欧美丰满少妇xxxx性| 亚洲午夜精品a片久久www慈禧| 无码国产精品一区二区免| 成人国产自拍在线播放| 偷拍与自偷拍亚洲精品| 国产青青草在线观看视频| 欧美牲交a欧美牲交aⅴ| 亚洲日韩精品欧美一区二区| 91精品啪在线看国产网站| 91麻豆精品一区二区三区| 最近中文字幕精品在线| 三个男吃我奶头一边一个视频| 久久久久久免费毛片精品| 九一成人AV无码一区二区三区| 亚洲丝袜美腿精品视频| 男人的天堂av网站| 亚洲精品无码av片| 国产免费三级三级三级| 手机在线播放成人av| 欧美国产激情二区三区| 色猫咪免费人成网站在线观看 | 亚洲高清无码第一| 日韩av一区二区三区在线观看 | 久久精品女同亚洲女同| 国产成人无码18禁午夜福利p| 久操视频新免费伊人| 国产亚洲亚洲精品视频| 国内精品免费一区二区三区| 最近最新中文字幕| 国产av一区二区三区区别| 中文字幕在线乱码日本| 日本做受120秒免费视频| 无码国产亚洲日韩国精品视频一区二区三区 | 亚洲国产字幕| 中文字幕一区二区网址| 国偷自拍av一区二区三区| 亚洲人成网站18禁止久久影院| 全部免费国产潢色一级|