亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        A Spectrum Sharing Model that Counters Eavesdropping:An Energy Efficiency View

        2021-04-30 07:23:34YeeLooFoo

        Yee-Loo Foo

        (Faculty of Engineering, Multimedia University, Cyberjaya 63100, Malaysia)

        Abstract: Wireless transmission is subject to eavesdropping. When wireless transmission ceases, the assigned frequency channel is unused, wasting the spectral opportunity given. In this study, a spectrum sharing model that reduces spectral wastage and protects against eavesdropping is proposed. First, cognitive radio (CR) shares the channel access with primary user (PU). When the CR senses that the channel is idle, CR can seize the unoccupied channel for its own use. If the channel is detected to be occupied by PU, CR transmits artificial noise to jam any potential eavesdropper. To what extent is this operation beneficial to the CR? The main concern of this study is the energy efficiency (μ) of CR, i.e., the ratio of channel throughput to its energy consumption. The relationship between μ and the percentage of frame duration allocated for sensing (τ) was investigated. This study contributes a novel theoretical expression that allows us to find the optimal μ and τ values, denoted by μ* and τ*. With the availability of this expression, the relationships between (μ*,τ*) and other important system parameters can be understood thoroughly. Our investigation reveals that strong CR signal will result in high μ* without the need of increasing τ*. On the other hand, a strong primary signal allows a short τ* and it improves μ*. High sampling rate for sensing may be unnecessary, as it does not improve μ* significantly. A more demanding target probability of detection requires a higher sensing duration, but it has insignificant impact on μ*.

        Keywords: spectrum sharing; cognitive radio; physical layer security; eavesdropping; jamming; throughput; energy efficiency

        0 Introduction

        The channel resource assigned to a wireless transmitter becomes a waste if it stays idle, while an active transmission of data could be eavesdropped. Spectrum sharing overcomes the first problem by having the primary user (PU) of the channel resource to share it with a secondary user. The latter can then help the former in defending against eavesdropping. The secondary user is expected to be a cognitive radio (CR) equipped with spectrum sensing function that identifies spectral opportunity or unoccupied channel. CR can make use of an unused channel to send its own data. On the other hand, when the PU has data to send, CR relinquishes the channel. CR returns the favor by transmitting artificial noise to jam the eavesdropper (EA), thus protecting the secrecy of primary data. This technique is named as physical layer security[1-2], which originates from information theory. It utilizes the physics of radio signal decaying with propagation distance. As long as the artificial noise that reaches EA is strong enough, it could garble the information that EA attempts to steal.

        PU consists of two nodes, i.e., the primary transmitter (PT) and primary receiver (PR). CR is taken as the secondary user (SU). Conventionally, PU does not like sharing the spectral opportunity with CR, because CR’s transmission could harmfully interfere with the data reception at PR. Now there is an incentive for PU, because CR helps defending against eavesdropping when PT transmits. CR sends out friendly jamming signal that is decodable by the PR, which harms only the EA but not PR. In return, CR has the benefit of sending its own data over the channel when it is unused. Such spectrum sharing scheme benefits both PU and CR. Fig.1 illustrates the proposed model.

        Fig.1 System model

        Fig.2 shows a state transition diagram that depicts CR’s operation. At first, CR senses the spectrum to identify channel occupancy. If a channel is found to be occupied (by PU), CR transits to the state of jamming EA. Otherwise, it transits to the state of transmitting its data over the unoccupied channel. Although an EA’s exact location may not be known, it is assumed to be close to the PR, and that it targets only the data sent out from PT but not CR.

        Fig.2 CR’s state transition diagram

        CR’s energy and time are divided between the three states depicted in Fig. 2. Suppose the duration of a data packet isTseconds. CR spendstseconds for sensing, andT-tseconds in any of the other two states (transmitting data or jamming EA). Fig.3 illustrates the time allocation. Letτ=t/Tdenote the portion of time allocated for spectrum sensing.

        Fig.3 Time spent in sensing, jamming, or transmitting data

        The scheme encourages PU to share its spectral channel with CR, since CR can protect PU from being eavesdropped. Here the benefit that the CR gets is a question. CR’s throughput increases because it can transmit data when PU becomes inactive. However, jamming EA consumes energy. This may be risky for CR that has limited amount of energy. Whether it is possible to attain high throughput at low energy consumption is the topic for investigation.

        Energy efficiencyμis defined as the ratio of channel throughput to energy consumption. Being highly energy efficient is critical for CR. Determining the changes ofμwith respect toτand other parameters is the way to find out howμvaries with the sensing duration and other operation parameters. Intuitively, increasingτwill increase sensing accuracy, thus the throughput should increase too, which results in higherμ. However, increasingτalso reduces the duration for sending CR’s data and its throughput, implying reducedμ. These conflicting tendencies result in a maximalμvalue. Letμ*denote the optimal energy efficiency, andτ*denote the value ofτthat optimizesμ. This study seeks to understand how the values ofμ*andτ*change under different circumstances. Therefore, a novel theoretical expression is contributed, which reveals that the (τ*,μ*) pair depends only on the following system parameters:

        1) Ratio of the CR’s jamming power to transmission power,PJ/PT;

        2) Ratio of the CR’s sensing power to transmission power,PS/PT;

        3) Probability of PU being present and active (Pr1);

        4) Probability of detection (PrD), which is the requirement imposed on CR by PU, with the purpose of guaranteeing sufficient protection from CR transmission;

        5) Ratio of received PT signal power to noise power (SNRP);

        6) Sampling rate used for sensing (fs).

        In the following sections, how these parameters affect the value of (τ*,μ*) will be demonstrated. The remaining part of this paper is organized in the following manner. Section 1 describes the related works. The spectrum sensing technique is described and the problem of finding energy efficiency is formulated in Section 2. Section 3 presents the results and discussions, and Section 4 concludes this paper.

        1 Related Works

        There are different ways of sharing the spectrum[3-7]. It could be shared following the use of game theory[3-5]. The users could bid for the available spectrum in an auction[3], or enforced among themselves certain rules in order to share the spectrum more efficiently[4]. In Ref. [5], the PUs compete among themselves in order to provide CRs some spectral opportunities with competitive pricing. In Ref. [6], the gain of utilizing channel fading in favor of CR transmission was analyzed, and the performance gain of using multi-antennas for spectrum sharing was presented in Ref. [7]. In contrast to these works, this study provides an incentive to PU for sharing its spectrum.

        The secrecy of PU’s data is an important issue[8-13]. Artificial noise was introduced in Ref. [8] to jam the EA. The idea was then expanded in Refs. [9-10]. The noise pattern was selected from the null space of the receiver’s channel but not that of the EA’s channel. As a result, the noise causes adverse effect to the EA’s reception but not that of the legitimate receiver. Since an eavesdropper is passive, the secrecy scheme proposed in Refs. [8-10] does not assume knowing its presence or even its location. Without the knowledge of the location of EA, there is still a guaranteed minimum rate of transmission secrecy[9]and minimum secrecy capacity[10]. A 2-stage protocol is proposed in Refs. [8, 10] to get CR’s help in transmitting artificial noise to jam the EA:

        Stage 1: Both the PT and PR send out artificial noises. Different weighted versions of them are received by the CR and EA. LetaXYdenote the channel gain between senderXand receiverY,rAthe signal received by nodeA. Subscripts T, R, C, and E denote PT, PR, CR, and EA, respectively.

        PT transmits signalaTRx, whereas PR transmitsy. CR receives the signal

        rC=αTCαTRx+αRCy+nC

        EA receives the signal

        rE,1=αTEαTRx+αREy+e1

        BothnCande1are independent and identically distributed additive white Gaussian noise (AWGN) random variables.

        Stage 2: CR retransmits the weighted version of the received noises while PT transmits data that will cancel out the artificial noise at the PR.

        CR transmitsβrC, whereβis a random weight. PT transmits the signal

        -βαTCαCRx+z

        wherezis the information signal to be sent by PT. PR receives signal

        rR=αTRz+βαCRαRCy+βαCRnC+nR

        Note that the term associated withxhas vanished, i.e., PR is not affected by the artificial noise.

        EA receives signal

        nRande2are i.i.d. AWGN random variables. Note that the term associated withxis artificial noise and non-zero. The proposed scheme is effective in spite of EA’s location being unknown.

        In the model proposed by Lu et al.[11], the jamming signal was sent out by PT instead of CR. The latter only relayed the former’s message to PR. In Refs. [12-13], the authors aimed to achieve higher secrecy performance for PU by optimizing CR’s schedule and power allocation. Our objective is to achieve higher energy efficiency for CR. Xu and Li[14]have considered optimal scheduling and power allocation among multiple CRs, but not CR’s energy efficiency. Yan et al.[15]have considered CR as the victim of eavesdropping. In this work, PR is the victim of eavesdropping.

        Although energy efficiency has been a concern in CR networks[16-19], the issue has not been considered in the context of CR consuming energy in order to jam the EA. To attain higher energy efficiency, Pei et al.[16]optimized the times of transmitting and sensing, and the order of sensing the channels. To minimize energy consumption, Deng et al.[17]proposed an optimal schedule for spectrum sensing. Xie et al.[18]proposed an energy-efficient resource allocation method in a heterogeneous CR network architecture. The CR network structure considered in Ref. [19] is also different. It consists of a cognitive base station that allocates frequency resources to the CRs. Scheduling of such allocation was analyzed, with the objective of reaching maximum energy efficiency. Liu et al.[20]has considered the joint issue of spectrum sharing and energy efficiency of PU but not that of CR.

        2 Spectrum Sensing and Energy Efficiency

        In this section, the relationship between energy efficiency and the performance of spectrum sensing is formulated. For tractable analysis, energy detector is chosen to serve the purpose of spectrum sensing. Urkowitz was the first to present the theory of energy detection[21], then Digham et al.[22]extended the theory. Ghasemi and Sousa[23]applied the theory in spectrum sensing. Now in this study, aT-second frame is considered. CR spendstseconds for sensing and the sampling rate isfs. The total number of collected energy samplesN=fst. The central limit theorem applies when there is a large number of energy samples[24]. At the CR receiver, the ratio of PT signal power to noise power is denoted by SNRP. Given a target probability of detection PrD, the probability of false alarm PrFcan be expressed as follows[24]:

        (1)

        Q(?) is the standard Gaussian complementary cumulative distribution function (CDF), whereasQ-1(?) is its inverse.

        LetCdenote the channel capacity (normalized by channel bandwidth) of CR when PT relinquishes the channel. CR’s channel capacity is assumed negligible when PT acquires the channel and is actively transmitting. At the CR receiver, the CR’s transmitted signal to noise power ratio is denoted by SNRCR.Cis given by

        C=log2(1+SNRCR)

        (2)

        Let Pr1and Pr0denote the respective probabilities of PT actively transmitting and being idle. When PT is idle, CR achieves the channel throughput[24]that is given by

        R=(1-τ)Pr0(1-PrF)C

        (3)

        whereτ=t/T.

        The probability of CR perceiving PT to be idle is denoted by Pr(0). The bracket in the subscript emphasizes that it is only the CR’s perception, which may not be the truth. Two conditions contribute towards Pr(0): 1) PT is idle and there is no false alarm, 2) PT actively transmits but CR does not detect it[25]. Hence,

        Pr(0)=Pr0(1-PrF)+Pr1(1-PrD)

        (4)

        Suppose CR allocatesPSwatts for spectrum sensing andPTwatts for transmitting its data. Sensing usually consumes lower power than data transmission. Intuitively,PSincreases withfs. To relate the magnitudes betweenPSandPT, the following simple model is proposed:

        PS=k?(fs)?PT

        (5)

        where 0

        HerePSis assumed to increase linearly withfsin MHz.

        LetETandESdenote the respective energies CR consumes in transmitting data and sensing. Then (as in Ref. [25]),

        ES=PSt

        (6)

        ET=PT(T-t) Pr(0)

        (7)

        Once CR senses an actively transmitting PT, the former relinquishes the channel. CR then sends out artificial noise to EA to garble its reception. It is assumed that EA is always active. Pr(1)= 1-Pr(0)denotes the probability of friendly jamming. LetPJandEJdenote the respective power and energy consumed for jamming.

        EJ=PJ(T-t) Pr(1)

        (8)

        The total energy that the CR consumes isE=ES+ET+EJ.

        Being defined as the ratio of channel throughput to consumed energy[16, 25], energy efficiency is given by

        (9)

        After some steps, it is found that

        (10)

        (11)

        Eq. (11) is a novel expression that allows to find theτvalue that optimizesμ(i.e.,τ*). It reveals that the optimal value depends only on the following parameters:

        Note that Eq. (11) does not depend on SNRCR, i.e., SNRCRdoes not affect the choice ofτ, despite the fact that a strong CR signal will result in highμ*(i.e., the maximum value ofμ). By using numerical method, Eq. (11) can be solved. Subsequently, the sets of (τ*,μ*) values that vary with these parameters will be determined.

        3 Results and Discussions

        Table 1 List of symbols

        Note:krepresents constant that relatesPStoPT.

        First, the changes of (τ*,μ*) with respect toPJ/PTare investigated, which vary from 0.2 to 0.7, whilePTremains at 1 W.

        From Fig.4, it can be observed that 1)μ*decreases linearly with the ratioPJ/PT; as more power being consumed for jamming EA, the optimal energy efficiency naturally reduces; 2)τ*increases only a little withPJ/PT, which shows thatτ*is nearly independent ofPJ/PT.

        Fig.4 μ* and τ* vs. PJ/PT

        Now the changes of (τ*,μ*) are investigated with respect toPS/PT, which varies from 0.1 to 1, whilePTremains at 1 W.

        From Fig.5, it can be observed that 1)μ*decreases with the ratioPS/PT; as more power is consumed for sensing, the optimal energy efficiency is reduced; 2)τ*also decreases withPS/PT; as more power is allocated for spectrum sensing, smaller duration of sensing is needed.

        Fig.5 μ* and τ* vs. PS/PT

        Next, the change of (τ*,μ*) is investigated with respect to Pr1, which varies from 0.01 to 0.99.

        From Fig.6, it can be observed that 1)μ*decreases significantly with Pr1; when it becomes more likely for PU to be present and active, there is less chance for the CR to transmit its data, resulting in lower optimal energy efficiency; 2)τ*increases with Pr1; when it is more probable for PT to be transmitting, CR needs to allocate a larger portion of a frame for accurately sensing the presence and activity of PU.

        Fig.6 μ* and τ* vs. Pr1

        τ*andμ*change with the target PrD, which varies from 0.6 to 0.99. Fig.7 shows the result.

        Fig.7 μ* and τ* vs. PrD

        From Fig. 7, it can be observed that 1)μ*initially increases and later decreases with PrD, both in a very small extent, which means that PrDdoes not have any significant impact onμ*as long asτ*varies accordingly; 2)τ*increases with PrD; a more demanding PrDrequires higherτ*in order to attain the maximal energy efficiencyμ*.

        Howτ*andμ*change with the SNRPmeasured at the CR is also assessed. Fig.8 shows the result.

        Fig.8 μ* and τ* vs. SNRP

        From Fig. 8, the following trends can be observed:

        1)μ*increases with SNRP, but the rate of increment slows down for SNRP> -15 dB. Higher SNRPmakes detection more accurate. CR can make more accurate judgment on PT’s activity. This translates into higher throughput and higherμ*.

        2)τ*decreases with SNRP. When the signal from PT is weak (e.g., SNRP= -22.5 dB), the CR requires large sensing duration to achieve the target detection accuracy. Given the same target detection accuracy, only short sensing duration is required when PT’s signal is powerful.

        Next, how the changes in sampling ratefsaffectτ*andμ*are evaluated. Fig.9 records the result.

        Fig.9 μ* and τ* vs. fs

        The following trends are observed in Fig.9:

        1)μ*increases little withfs, whereasτ*decreases withfs.

        2) The result shows that increasing the sampling rate does not significantly improve the optimal energy efficiency, other than requiring a shorter sensing duration to reach the same detection accuracy. Based on this, this study argues that a high sampling rate may not be necessary.

        All the findings under the given circumstances are summarized as follows:

        2)μ*decreases withPJ/PT,PS/PT,Pr1, but increases with SNRP. On the other hand, PrDandfshave little effect onμ*;

        3)τ*decreases withPS/PT, SNRP,fs, but increases with Pr1and PrD. On the other hand,PJ/PThas little effect onτ*.

        4 Conclusions

        This study proposes a spectrum sharing model that counters eavesdropping. The CR jams an eavesdropper in return for the opportunity of spectrum access. CR’s energy consumption in friendly jamming and data transmission becomes a concern. Attaining the optimal energy efficiency of CR (μ*) is the main objective of the study here. The study’s primary contribution is a novel mathematical expression that allows us to find the (τ*,μ*) pair of values in the given scenario. Following that, the relationships between the (τ*,μ*) pair and six different important system parameters have been analyzed. It has been found that a strong PT’s signal allows a short sensing duration and it improvesμ*, but there is a limit on the amount of improvement. Increasing the sampling rate of CR may not be worthy since it does not improveμ*significantly. A more demanding target probability of detection requires a larger sensing duration, but it has insignificant impact onμ*. In this work, the security threat of eavesdropping is considered. Our future work will consider the security threat of hostile jamming. A possible solution is to require CR to relay PT’s data to PR, creating a diversity of information.

        杨幂一区二区系列在线| 国产精品免费久久久免费| 亚洲国产日韩在线精品频道| 丝袜美腿在线观看视频| 丰满人妻被两个按摩师| 欧美aa大片免费观看视频| 亚洲狼人社区av在线观看| 久久精品国产四虎| 国产99精品精品久久免费| 亚洲日本中文字幕高清在线| 最新露脸自拍视频在线观看| 国产精品ⅴ无码大片在线看| 色综合久久无码中文字幕app| 亚洲av高清在线一区二区三区| 日韩精品视频久久一区二区| 国产精品无码午夜福利| 亚洲午夜无码久久yy6080| 精品国产污黄网站在线观看| 精品亚洲成av人在线观看| 欧美日韩国产一区二区三区不卡| 人妻少妇一区二区三区| 今井夏帆在线中文字幕| 亚洲乱码一区av春药高潮| 天天av天天爽无码中文| 中文字幕精品人妻av在线| 伊人久久精品亚洲午夜| 全免费a级毛片免费看网站| 中文字幕avdvd| 男女啪啪在线视频网站| 亚洲av成人噜噜无码网站| 91av手机在线观看| 亚洲一区二区三区新视频 | 国产 精品 自在 线免费| aaaaaa级特色特黄的毛片 | 精品人妻午夜中文字幕av四季| 天天做天天添av国产亚洲| 97一区二区国产好的精华液| 亚洲日本人妻中文字幕| 一个少妇的淫片免费看| 好吊色欧美一区二区三区四区| 狠狠色丁香婷婷久久综合2021|