Spectrum leasing via cooperation for enhanced physical-layer secrecy

Keonkook Lee, Osvaldo Simeone, Chan Byoung Chae, Joonhyuk Kang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

Abstract

Spectrum leasing via cooperation refers to the possibility for primary users to lease part of the spectral resources to secondary users in exchange for cooperation. This paper proposes a novel implementation of this concept in which secondary cooperation aims at improving the secrecy of the primary link. In particular, a secondary transmission with multiple antennas creates interference on both primary and eavesdropping receivers but an appropriately designed beamformer may impair more the eavesdropper's reception and thus enhance primary secrecy. Design of the secondary beamformer that maximizes the primary secrecy rate while guaranteeing a minimal secondary rate is studied. It is proved that the problem can be solved in a domain that includes only two real numbers irrespective of the number of antennas. Numerical results show that the proposed spectrum leasing strategy increases the primary secrecy rate compared to the case of no spectrum leasing for a wide range of secondary minimum rate constraints.

Original languageEnglish (US)
Title of host publication2011 IEEE International Conference on Communications, ICC 2011
DOIs
StatePublished - 2011
Event2011 IEEE International Conference on Communications, ICC 2011 - Kyoto, Japan
Duration: Jun 5 2011Jun 9 2011

Publication series

NameIEEE International Conference on Communications
ISSN (Print)0536-1486

Other

Other2011 IEEE International Conference on Communications, ICC 2011
Country/TerritoryJapan
CityKyoto
Period6/5/116/9/11

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Keywords

  • Pareto boundary
  • Physical security
  • interference channel
  • spectrum leasing

Fingerprint

Dive into the research topics of 'Spectrum leasing via cooperation for enhanced physical-layer secrecy'. Together they form a unique fingerprint.

Cite this