Lectures on modern convex optimization: analysis, algorithms, and engineering applications
Lectures on modern convex optimization: analysis, algorithms, and engineering applications
Convex Optimization
IEEE Transactions on Wireless Communications
Weighted sum rate optimization for cognitive radio MIMO broadcast channels
IEEE Transactions on Wireless Communications
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
A note on the secrecy capacity of the multiple-antenna wiretap channel
IEEE Transactions on Information Theory
Optimal design of learning based MIMO cognitive radio systems
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Cognitive multiple access channels: optimal power allocation for weighted sum rate maximization
IEEE Transactions on Communications
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
IEEE Transactions on Information Theory
Robust beamforming design: From cognitive radio MISO channels to secrecy MISO channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Fundamental limits of spectrum-sharing in fading environments
IEEE Transactions on Wireless Communications
The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel
IEEE Transactions on Information Theory
On the Secrecy Capacity of Fading Channels
IEEE Transactions on Information Theory
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.01 |
In this paper, we address the physical-layer security issue of a secondary user (SU) in a spectrum-sharing cognitive radio network (CRN) from an information-theoretic perspective. Specially, we consider a secure multiple-input single-output (MISO) cognitive radio channel, where a multi-antenna SU transmitter (SU-Tx) sends confidential information to a legitimate SU receiver (SU-Rx) in the presence of an eavesdropper and on the licensed band of a primary user (PU). The secrecy capacity of the channel is characterized, which is a quasiconvex optimization problem of finding the capacity-achieving transmit covariance matrix under the joint transmit power and interference power constraints. Two numerical approaches are proposed to derive the optimal transmit covariance matrix. The first approach recasts the original quasiconvex problem into a single convex semidefinite program (SDP) by exploring its inherent convexity; while the second one explores the relationship between the secure CRN and the conventional CRN and transforms the original problem into a sequence of optimization problems associated with the conventional CRN, which helps to prove that beamforming is the optimal strategy for the secure MISO CR channel. In addition, to reduce the computational complexity, three suboptimal schemes are presented, namely, scaled secret beamforming (SSB), projected secret beamforming (PSB) and projected cognitive beamforming (PCB). Lastly, computer simulation results show that the three suboptimal schemes can approach the secrecy capacity well under certain conditions.