Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks

Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered... Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks Ding Xu, Member, IEEE, and Qun Li, Member, IEEE Abstract—We consider a cognitive wireless powered com- the SU. By doing so, the PU has motivation for allowing the munication network (CWPCN) sharing the spectrum with a SU to utilize the licensed spectrum. primary network who faces security threats from eavesdroppers Security is an important requirement for wireless networks, (EAVs). We propose a new cooperative protocol for the wireless and there is no exception for the PU networks. In particular, powered secondary users (SU) to cooperate with the primary we are interested in one kind of security threats to the PU user (PU). In the protocol, the SUs first harvest energy from the power signals transmitted by the cognitive hybrid access networks, i.e., eavesdropping from malicious users who try to point during the wireless power transfer (WPT) phase, and then decode messages broadcasted from the PU. In this context, use the harvested energy to interfere with the EAVs and gain secrecy rate [3], [4], defined as the achievable non-negative transmission opportunities at the same time during the wireless rate of the perfectlysecure informationsent fromthe sourceto information transfer (WIT) phase. Taking the maximization of the destination with the presenceof the eavesdroppers(EAVs), the SU ergodic rate as the design objective, resource allocation algorithms based on the dual optimization method and the is usually adopted to measure the physical-layer security block coordinate descent method are proposed for the cases performance. However, only zero or trivial secrecy rate can of perfect channel state information (CSI) and collusive/non- be achieved by the PU when the source-to-EAV channel is collusive EAVs under the PU secrecy constraint. More PU strong. Generally, the SU can act as a cooperative relay or a favorable greedy algorithms aimed at minimizing the PU secrecy friendly jammer to improve the PU security performance [5]. outage probability are also proposed. We furthermore consider the unknown EAVs’ CSI case and propose an efficient algorithm Meanwhile, wireless power transfer (WPT) has greet po- to improve the PU security performance. Extensive simulations tential to become a perpetual energy source for wireless show that our proposed protocol and corresponding resource equipments by harvesting ambient radio signals [6], [7]. For allocation algorithms can not only let the SU gain transmission example,apowerstationtransmittingtensofwattscansupport opportunities but also improve the PU security performance even maximum WPT distance in the range of meter for with unknown EAVs’ CSI. powering smart phones and tablet computers [8]. Thus, wire- Index Terms—Cognitive radio, resource allocation, wireless less powered communication networks (WPCNs), in which powered communication, eavesdropping, cooperation wireless equipments are powered by WPT, have received a lot of attention . A typical transmission protocol for the WPCNs I. INTRODUCTION is the so-called “harvest-then-transmit” protocol [9], where in each transmission time block, users first harvest energy OGNITIVE radio (CR) has been widely studied in re- during the WPT phase and then transmit information during cent years due to its capability of improving spectrum thewirelessinformationtransfer(WIT)phase.Asforcognitive utilization [1]. In CR networks, there are two kinds of users, WPCNs (CWPCNs), in which the SU or the PU is wireless one is called secondary user (SU) who does not have its own powered, one has to optimize the time and power allocation spectrum, and the other one is called primary user (PU) who for maximizing the SU performance while also restricting the owns licensed spectrum. Basically, there are three main CR interferenceto the PU or improvingthe PU performance[10]– paradigms for the SU to utilize the spectrum licensed to the [12]. PU: interweave, underlay and overlay [2]. In interweave CR For CWPCNs, by allowing a portion of time exclusively networks,theSUmustsensethespectrumstatusandutilizethe for the wireless powered SU to harvest energy from RF spectrum when the spectrum is sensed as vacant. In underlay signals, the SU can then act as a friendly jammer to improve CR networks, the SU can utilize the spectrum as long as the the PU security performance and gain its own transmission interference caused to the PU is acceptable for the PU. These opportunity simultaneously during the remaining portion of two CR paradigms do not provide incentives for the PU to time. By doing so, since the PU security performance is allow the SU to utilize its spectrum. In contrast to interweave improved, the PU has incentive to let the SU harvest energy and underlay CR networks, in overlay CR networks, the and transmit information on its licensed spectrum band. Such transmissionof the PU is facilitated fromthe cooperationfrom cooperation leads to a win-win situation for both the CR Ding Xu is with the Wireless Communication Key Lab of Jiangsu Province, networks and the PU networks. This motivates the work in Nanjing University of Posts and Telecommunications, Nanjing 210003, China this paper. (e-mail: xuding@ieee.org). Qun Li is with the Jiangsu Key Lab of Big In this paper, we propose a new protocol for a CWPCN Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing 210046, China. (e-mail: liqun@njupt.edu.cn). to cooperate with a PU network who faces security threats 2 from EAVs. In the proposed protocol, the SUs first harvest The main contributions of this paper are summarized as energy from the power signals transmitted by a half-duplex follows: cognitive hybrid access point (CHAP) during the WPT phase, We propose a new cooperative protocol for the CWPCN and then by using the harvested energy, at most one SU is to coexist with the PU network and improve the PU scheduledtotransmitinformationtothe CHAP whilethe other security performance, where the wireless powered SUs SUs are sending artificial noise to interfere with the EAVs to first harvestenergy,and then at most oneSU is scheduled improve the PU security performance during the WIT phase. to transmit information while the remaining SUs are The CHAP is responsible for transmitting energy wirelessly sending artificial noise to interfere with the EAVs to to the SU in the downlink and receiving information from the improve the PU security performance. SU in the uplink. For those SUs far from the CHAP and very With the proposed protocol, we first consider the case close to the PU transmitter, the PU transmitter can also decide when perfect CSI is available at the SUs and the EAVs to broadcast energy to these SUs during the WPT phase. It is are not collusive, and maximize the SU ergodic rate assumed that the PU has no knowledge of the channel state under the PU secrecy constraint by jointly optimizing SU information (CSI) related to the EAVs and thus transmits at a scheduling, power and time allocation. The optimization constantsecrecyrate.Therefore,thesecrecyoutageprobability problem is shown to be highly non-convex, and we is adopted as a performance metric for the PU. To encourage propose a suboptimal algorithm by applying the dual thePUtocooperatewiththeSU,weintroduceanewconstraint optimization method and the BCD method. named as the PU secrecy constraint, which requires that the We then extend the work to consider the case when the PU secrecy outage probability with the cooperation from the EAVs are collusive. Besides, more PU favorable greedy SU shall be lowered to a desired target threshold compared to algorithms are also proposed aiming at minimizing the the case without the cooperation. PUsecrecyoutageprobability.Forthemorepracticalcase Our goal is to maximize the SU ergodic rate by opti- when the CSI related to the EAVs is unknownto the SUs, mizing SU scheduling, power and time allocation under the wefurthermoreproposeanefficientalgorithmfortheSUs PU secrecy constraint. Compared to the work such as [5], to improve the PU security performance. [13] that considered the SUs are powered by conventional Extensive simulation results reveal interesting phe- energy sources, the investigated problem in this paper is more nomenons such as increasing the number of EAVs actu- intractable due to the fact that the transmit power of the SU ally improves the SU performance while it degrades the depends on the time allocated for the WPT phase and the PU security performance, and compared to non-collusive power allocation of the PU, which makes the optimization EAVs, collusive EAVs are actually more beneficial to the variables coupled together and hard to be optimized. We first SUs while they are more harmful to the PU. Besides, it consider the case when perfect CSI is available at the SUs is shown that with unknown EAVs’ CSI, the PU security and the EAVs are not collusive. In this case, by deriving some performance can still be improved significantly at the important properties of the optimal solution, the optimization sacrifice of the SU performance. problem is simplified and an algorithm based on the dual Therestofthispaperisorganizedasfollows.Theworkrelated optimization method and the block coordinate descent (BCD) to this paper is described in Section II. Section III presents the method is proposed to address the problem. We then extend system model and formulates the optimization problem. Sec- the work to consider the case when the EAVs are collusive. tion IV proposesthe resource allocation algorithm for the case Besides, aiming at minimizing the PU secrecy outage proba- ofperfectCSI withnon-collusiveEAVs. Section V extendsthe bility,more PU favorablegreedyalgorithmsare also proposed. work to consider the case of collusive EAVs, proposes greedy Furthermore, we also consider the case when the CSI related algorithms to minimize the PU secrecy outage probability, to the EAVs is unknown to the SUs and propose an efficient and furthermore considers the more practical unknown EAVs’ algorithm to improve the PU security performance. Extensive CSI case. Section VI verifies the proposed algorithms with simulation results confirm the effectiveness of our proposed extensive simulation results. Finally, Section VII concludes CWPCN protocol and correspondingresource allocation algo- the paper. rithms. It is noted that using wireless powered SUs to improve the II. RELATED WORK PU security performance is appealing due to the following considerations:1) Since the SU is wirelessly powered,there is The PU security performance with the cooperation of the no need to replace the exhausted battery and thus the lifetime SU was investigated in [5], [13]–[19]. Specifically, in [5], the of the SU is theoretically infinite; 2) Since no battery is resource allocation problem to maximize the SU ergodic rate needed for the SU, the size of the SU equipment can be small. under the condition that the PU secrecy outage probability Thus, the deployment of the SU is flexible and will not get does not deteriorate due to the existence of the SU was inves- attention by the EAVs. It is also noted that the shortcoming of tigated. In [13], besides the PU, the SU was also considered low available transmit power of the SU can be overcame by to be threatened by the EAVs, and the SU ergodic secrecy deploying the SUs close to the CHAP or the PU transmitter, rate was maximized with imperfect CSI under the PU secrecy while the effect of interfering to the EAVs can be improved outage constraint. In [14], the SU secrecy rate was maximized by increasing the number of SUs and deploying the SUs close by optimizing power allocation, time allocation and relay to the EAVs. selection subject to the minimum PU secrecy rate constraint 3 for both perfect and imperfect CSI. In [15], the SU was probability of strictly positive secrecy rate at the SU was proposed to interfere with the EAV and the PU secrecy outage investigated. In [31], the SU secrecy rate was improved by probabilitywas derivedin closed-formwith fixedvaluesof the letting a wireless powered jammer to degrade the performance SU configuration parameters such as transmit power. In [16], of the EAV. In [32], a SU scheduling scheme was proposed the transmit power of the SU was minimized under different for a CWPCN with the interference power constraint at the SINR constraints at the EAV, the PU and the SU. In [17], PU, and its closed-form expressions of outage probability the PU secrecy rate and the SU secrecy rate were optimized and intercept probability were derived over Rayleigh fading based on Stackelberg game. In [18], the power allocation channels. Compared to these related works in [27]–[32] , our problem to maximize the SU rate under the zero PU secrecy work is different in that secure communications for the PU is rate loss requirement was investigated. In [19], the close-form our concern. expressions of ergodic PU secrecy rate were analyzed with The work in [33]–[37]considered PU security in CWPCNs. different SU selection schemes. Note that, unlike this paper, In [33]–[35], the SU was assumed to harvest energy from the the above references [5], [13]–[19] all assumed that the SU is environment or the PU signals and then relay PU messages equipped with constant energy supplies. to enhance PU secrecy performance. Note that [33]–[35] Thephysical-layersecurityinWPCNs hasbeeninvestigated consideredonlyonepairofSUsandtheproposedschemescan in [20]–[26]. In [20], the source node was assumed to harvest improve PU secrecy performance only if the SU is far from energy from the base station and use these energy for interfer- the EAV. In [36], the wireless powered SU was considered as ing with the EAVs, andthe secrecy throughputwas maximized a potential EAV for the PU and the SU rate was maximized underthe secrecy constraint and the transmit power constraint. under the SINR constraints at the PU and the SU. In [37], In [21], a simple communication protocol for secure commu- the secrecy guard zones were set by the primary network to nications with the help from a wireless powered jammer was protect itself from eavesdropping from the wireless powered proposed and the secrecy throughput was maximized. In [22], secondary network. It is noted that the SU was considered as a two-phaseprotocol,wherethe destinationnodewas assumed a potential EAV in [36], [37], while this paper treats the SU as to harvest energy from the source node in the first phase a friendly jammer for the PU. To our best knowledge,no work and then use these energy to interfere with the EAVs in the in existing literature has considered to use wireless powered second phase, was proposed and the secrecy energy efficiency SUs to act as friendly jammers to improve the PU security was maximize by optimizing the time allocation and the performance and gain their own transmission opportunities at power allocation. In [23], by considering both the minimum the same time. secrecy rate requirement and the minimum harvested energy requirement, the secrecy energy efficiency was maximized by III. SYSTEM MODEL optimizing power allocation and power splitting ratio. In [24], aWPCN with a wirelesspoweredjammerwasconsidered,and the timeallocationwasoptimizedto maximizethe secrecyrate and minimize the secrecy outage probability.In [25], a WPCN with a wireless powered jammer and an energy receiver who is a potential EAV was considered,and the power allocation at the source node and the jammer to maximize the secrecy rate was optimized. In [26], a multicarrier WPCN with a wireless powered jammer was considered, and the secrecy rate was maximized by jointly optimizing time allocation and power Figure 1. System model. allocation at the source node and the jammer over subcarriers. Note that, compared to these works on security in WPCNs in [20]–[26],our problem is different due to the need to improve We consideranuplinkCWPCN with SUs andoneCHAP the PU security performanceas well as providingtransmission sharing the narrow spectrum band with one pair of PUs (a opportunities for the SU. primary transmitter (PTx) and a primary receiver (PRx)) who As for the physical-layer security in CWPCNs, some recent faces security threats from EAVs, as shown in Fig. 1. Let work focused on investigating secure communications for the and denote the sets of SUs and EAVs, respectively. It SU, such as [27]–[32]. In [27], the secrecy outage probability is assumed that the SUs are powered only by the energy of the SU was derived in closed-form under the interference harvested from RF signals while the rest nodes are powered power constraint at the PU. In [28], multiple design objectives by constant energy sources. All the channels involved are for the SU were considered under the secrecy performance assumed to be block fading, i.e., all the channel power gains guarantee at the SU and the interference power constraint at are constant within a transmission block and may change the PU. In [29], the PU was assumed to be a potential EAV independently from one block to another. The channel power for the SU and the SU transmit power was minimized under gains between SU and the CHAP, from SU the minimum SU secrecy rate and the minimum harvested to the PRx, from SU to EAV , from the PTx energy constraints. In [30], under the interference power to the PRx, from the PTx to SU , from the PTx to constraint at the PU and assuming that the secondary receiver the CHAP, and from the PTx to EAV are denoted by is full-duplex and sends jamming signals to the EAV, the , , , , , ,and 4 respectively, where denotes the joint fading state for all the and the maximum secrecy rate of the PU is given as [42] channelsinvolved.It is assumed that thePU hasno knowledge on the CSI of the links related to the EAVs and thus transmits (5) at a constant secrecy rate . As for the SUs’ knowledge on the CSI, two cases are considered. In the first case, the CSI Since the PU transmitsat a constantsecrecy rate ,thePUse- is assumed to be perfectly available at the SUs. In the second crecy outage probability is given by . case, the CSI of the links involving the EAVs is assumed to Note that, is a known value if and the distribution be unavailable while the other CSI is assumed to be perfectly of and are given. known at the SUs . It is noted that although perfect CSI is Now, supposing that the SU cooperates with the PU. In this hard to be realized in practice, it can be served as an upper case, the CHAP transmits RF energy with constant power bound or a benchmark for imperfect CSI. Investigating the during WPT. In addition, the PTx transmits RF energy with perfect CSI case can let us know the potential benefits of such power duringWPTandtransmitsinformationwithpower cooperation between the SU and the PU and guide the design during WIT at fading state . Note that can be of the imperfect CSI case. equal to zero and this means the PTx will not transfer energy to the SUs. The energy harvested by SU during WPT For each transmission block, without loss of generality, the is where ( )is time is assumed to be unit. The unit time is assumed to be divided into two phases: the WPT phase and the WIT the energy harvesting efficiency . The energy consumed by phase. In the first WPT phase with time duration the SU during WIT cannot be higher than that harvested CHAP and the PTx broadcast RF energy to the SUs, and during WPT. Let and denote the transmit powers meanwhile the SUs harvest energy from these RF signals ofSU forinformationtransmissionandjammingduring and then store the energy in supercapacitors. Compared to WIT at fading state , respectively. Then, we have rechargeable batteries, supercapacitors have smaller form- Since each SU factor, faster charging cycle and longer life [39]. However, is scheduled either for information transmission or jamming energy leakage for a supercapacitor is very large [40] and and at most one SU is scheduled for informationtransmission, thus the energy might not be able to be stored long enough we have for all and for the next transmission block. For simplicity, similar to [41], Similar to the existing work such as [14], [15], we assume that the harvested energy in current transmission we assume that the PU and the EAVs treat the information block cannot be used for future transmission blocks. In the signals from the SU as interference. We also assume that the second WIT phase with time duration , the PTx transmits artificial noise sent from the SUs can be canceled at the PU information to the PRx, and meanwhile at most one SU is and the CHAP but cannot be canceled at the EAVs. Such scheduled to transmit information to the CHAP and the other assumptioncan bepracticallyrealizedbythemethodproposed SUs are sending artificial noise to interfere with the EAVs. in [44]: the SUs, the CHAP and the PU pre-store a set of Supposing that the cooperation from the SU is not available Gaussiandistributedrandomsequencesusedforartificialnoise and all the time within each transmission block are used by with the indices of the sequences treated as the keys. The the PU for information transmission with maximum transmit SU randomly select a sequence and send its key secretly to power , then the achievable rate at the PU and the EAV the CHAP and the PU using the phase-shift modulation-based at fading state can be written as [5] method proposed in [45]. Since the set of random sequences is unknown to the EAVs, the EAVs cannot know the sequence (1) used by the SU even if the key is intercepted by the EAVs. Then, with SUs’ cooperation, the achievable rate at the PU and and the EAV at fading state can be written as (2) (6) respectively, where is the noise power. Then, if the EAVs and are non-collusive, the maximum secrecy rate of the PU is [5] (3) (7) where denotes . If the EAVs are collusive and usemaximumratiocombining,theachievablerate attheEAVs respectively. Supposing that the EAVs are non-collusive, the is given as [42] maximum secrecy rate of the PU with SUs’ cooperation at fading state is (4) 1 (8) Note that the effects of the imperfect CSI of the links not involving EAVs (such as the links between the SUs and the CHAP, and the links between the SUs and the PU) have been well researched in existing literature such as [38]. Thus, we focus on our main contributions of this paper and consider the CSI Note that the energy harvesting efficiency achieved by commercial prod- of the links related to the EAVs is unknown. ucts can be as high as [43]. 5 Supposing that the EAVs are collusive and use maximum ratio be considered as the average rate under no transmission delay combining, the achievable rate at the EAVs is given as requirement, we adopt ergodic rate as our performance metric fortheSU.Theconstraintin(13)isusedtorestrictthetransmit powers of the PU in the WPT and WIT phases such that the average transmit power over the two phases is below . (9) The constraint in (13) is also used for a fair comparison with the case without SU’s cooperation. Since unit transmission and the maximum secrecy rate of the PU is given as block is assumed, the constraint in (13) can also be interpreted as a constraint to restrict the total energy consumed by the PU in the two phases. The constraint in (14) indicates that (10) the total time length of the two phases must be no larger than . The constraint in (15) indicates that the energy consumed It is notedthat schedulingthe SU nearthe PRx forinformation by the SU during WIT must be no larger than the energy transmission will cause severe interference to the PRx. Thus harvested during WPT. The constraint in (16) indicates that through proper SU scheduling, the SU who causes minor each SU is scheduled either for information transmission or interference to the PRx shall be scheduled for information jamming. The constraint in (17) indicates that at most one SU transmission. If such SU does not exist, no SU shall be is scheduled for information transmission. The constraint in scheduled for information transmission. (18) is the PU secrecy constraint used to encourage the PU to The PU secrecy outage probability with the cooperation cooperate with the SU such that the PU secrecy performance from the SU is written as To in terms of secrecy outage probability can be improved by the encourage the PU to cooperate with the SU, the PU secrecy cooperationfromtheSU. Itisnotedthatthevalueof should outageprobability is requiredto be lowerthanthat without be not too small (i.e., should be not too large), otherwise the SU’s cooperation, i.e., P1 will be infeasible. Here, we assume that the value of (11) is small enough such that P1 is feasible . where ( )denotestherequiredPUsecrecyoutage probability reduction . We denote the above constraint as the PU secrecy constraint. IV. RESOURCE ALLOCATION ALGORITHM WITH PERFECT We aim to optimize SU scheduling, power and time alloca- CSI AND NON-COLLUSIVE EAVS tion to maximize the SU ergodic rate as (P1) This section considers the case of perfect CSI and non- collusive EAVs for P1. To our best knowledge, P1 is a highly non-linear non-convex problem that cannot be solved directly (12) with standard method. To solve P1, we first derive some (13) properties of the optimal solution to P1, and then we simplify P1 using these properties. (14) Proposition 1: The optimal solution to P1 must satisfy the (15) constraintin(13)withstrict equality,i.e., (16) Proof: Please refer to Appendix A. (17) Proposition 2: Theoptimalsolutionto P1 can alwayssatisfy (18) the constraint in (14) with strict equality, i.e., Proof: Please refer to Appendix B. (19) Based on Propositions 1-2, we have the following rela- tionships between the optimization variables for the optimal In P1, the objective function in (12) is the SU ergodic rate solution to P1 as defined as the rate averaged over all transmission fading blocks. Here, we assume that the SU carries delay-tolerant services. Such assumption is reasonable as the SU transmis- (20) sion is opportunistic and thus stringent transmission delay requirement for the SU is improper. Since ergodic rate can Inserting the above expressions into P1, P1 is reduced to the In this paper, we assume that the PU always has data to transmit/receive. In such a case, the PU can cooperate with the SU to improve its own secrecy performance as enforced by the constraint in (11). For the case when the It is noted that the greedy algorithms proposed in Section V-B can be PU has no data to transmit/receive, the SU can occupy the spectrum freely used to check the feasibility of P1. As long as in the greedy algorithm or being charged with a price. The interested readers may refer to [46] and is very large, the obtained PU secrecy outage probability is practically the references therein for the work on pricing-based methods dealing with the smallest PU secrecy outage probability that can be achieved by cooperation case when the PU is willing to lease its unused spectrum to the SU. from the SU. Thus, if the PU secrecy outage probability obtained from the Hereafter, we omit the index for the fading state wherever it is clear greedy algorithm is larger than , then P1 is infeasible, and otherwise, P1 from the context. is feasible. 6 following problem as (P2) dual problem written as The optimal solution obtained from the two levels of optimization is the optimal solution of P2 if the duality gap is zero [47], otherwise, the solutionisa feasiblesolutionofP2.Luckily,it hasbeenshown (21) in[49]thatthetime-sharingconditionissatisfiedifthechannel power gain distributions are continuous for a problem similar (22) to P2, and the duality gap is zero by satisfying the time- (23) sharing condition. Therefore, adopting the dual optimization is appropriate for P2. Since the master dual problem can be (24) easily solved by updating via the subgradient method until convergence [47], we focus on solving the problem in (30) in (25) what follows. and constraints (16)-(18) Sincetheproblemin(30)isnonconvex,theoptimalsolution is computationally difficult to derive. Instead, we adopt the To solve P2, we introduce a virtual SU indexed by BCD method to obtain a suboptimal solution by iteratively and schedule it for information transmission if all the actual optimizing with given optimizing with SUs are scheduled for jamming. The channel power gains given and optimizing with given related to this virtual SU are set to zero. In what follows, we until convergence.Firstly, with given the assume that SU is included in the SU set . The following value of is optimized as indicator function is introduced as (26) (31) Then, the constraint (18) can be rewritten as (27) It is observed that P2 is still highly non-convex and hard to be solved with standard methods. In the following, we solve (32) P2 with the dual optimization method [47] and the block coordinate descent (BCD) method [48]. Since increases as increases if is nonzero or It is seen that the optimization variables for all the channel keeps unchanged as increases if is zero, the indicator fading states are coupled in constraint (27). Thus, it makes function may decrease from to or sense to adopt dual decomposition by forming the Lagrangian remainunchangedas increases.Thus,theobjectivefunction function to relax the coupling constraint (27) as given by [47] in (31) is maximized at the maximum allowable given by (28) (33) where isthedualvariableassociatedwiththeconstraint(27). Then, the Lagrange dual function is written as [47] Next,withgiven thevalueof isoptimized as (29) constraints (16) (17) (22) (25) Using (28), we can rewrite the above problem as (34) where (35) where Let (30) . It is easily constraints (16) (17) (22) (25) seen that is a monotonically decreasing function of . Thus, through the dual decomposition, P2 is separated into It is noted that the objective function in (34) now becomes two levels of optimization. At the lower level, we have the From (26), if , subproblems, one for each channel fading state as given by we have From (6)-(8), we can the problem in (30). At the higher level, we have the master reformulate the inequality as a set of inequalities 7 given by where transmission, i.e., , then the secrecy rate of the PU becomes (36) (46) The following indicator function is then introduced as and constraint (44) is rewritten as (37) (47) (48) Based on the above reformulation, we can rewrite where as Then, the problem in (49) (34) is reformulated as (38) (50) (39) Clearly, in (46) is a non-decreasing function of . Thus, Based on the above reformulation of the problem in (34), its the transmit power of the SU scheduled for jamming can be solution can be obtained by first deriving optimal ’s, one set to its maximum allowable value, i.e., ,in for each of the inner maximization problems in (38), and then order to decrease the PU secrecy outage probability as low as picking the one that minimizes the objective function in (38). possible. Therefore, assuming that SU is scheduled for The following theorem presents the optimal solution to the information transmission, the problem in (41) is simplified as problem in (38). Theorem 1: The optimal solution to the problem in (38) (51) is given by where and is given by (52) where (40) (53) and and Proof: Please refer to Appendix C. Then,withgiven ,thevalueof isoptimized as (54) Let . It is easily seen that (41) isamonotonicallyincreasingfunctionof .Itisnoted (42) that the objective function in (51) now becomes From (54), the inequality can be rewritten (43) as a set of inequalities given by where (44) (45) (55) Since only one SU can be scheduled for information trans- mission, i.e., only one can be nonzero, we can solve Then, we can rewrite as the problem in (41) by first deriving optimal power where allocations, one for each of the total SUs, and then selecting the one that maximizes the objective function in (56) (41). Assuming that SU is scheduled for information 8 Algorithm 1 Proposed joint SU scheduling, power and time Then, the problem in (51) can be rewritten as allocation algorithm based on the dual optimization method (57) and the BCD method. 1: Initialize , , and (58) . 2: repeat Therefore, the problem in (51) can be solved by first solving 3: For each channel fading state, do the following steps the inner maximization problem in (57) for each and 4-12. then selecting the one that minimizes the objective function in 4: Initialize , (57). The following theorem presents the optimal solution to 5: repeat the problem in (57). 6: for all such that do Theorem 2: The optimal solution to the problem in (57) is 7: For all , calculate from (59). given by where is given by 8: Calculate from (60) and obtain . 9: end for 10: Calculate as , and let for all . 11: Obtain from (33), and then obtain according to Theorem . 12: until improvement of the objective function value in (30) converges to a prescribed accuracy. (59) 13: Update and 14: (60) 15: until where is the accuracy, is a sequence of step sizes. (61) polynomialinthenumberofdualvariables[47],itscomplexity (62) is . In each iteration of obtaining , , and requires calculations, where is the number (63) of iterations for the BCD method to converge. Thus, the total complexity of Algorithm 1 is which is linear in the number of SUs and the number of EAVs. V. EXTENSIONS (64) A. Collusive EAVs Here, we consider the EAVs are collusive and perfect CSI is available at the SUs. The case of unknown EAVs’ CSI is discussed in Section V-C. It can be noted that the summation term in (9) makes the problem highly intractable. For this, considering the fact that at most one is nonzero, (65) a lower bound on in (10) denoted as is proposed by ignoring the interference term in the second part of (9). Using , the PU secrecy outage probability Proof: Please refer to Appendix D. Once is obtained for each by searching over all is an upper bound on and thus the possible SU schedulings, the solution to the problem in PU secrecy constraint in (11) must be satisfied if (41) is the one that maximizes the objective function in (51). holds. By following the procedures used in Section IV, P1 The index of the SU scheduled for information transmission with collusive EAVs can be solved with an algorithm similar is obtained as ,and we to Algorithm 1. The details are omitted here due to page limit. then have obtained from Theorem and Note that if , then all the SUs are B. Greedy Algorithms scheduled for jamming. The proposed algorithm based on the dual optimization In this subsection, we consider that the PU is greedy and method and the BCD method is summarized in Algorithm 1. requires the cooperative SUs to minimize the PU secrecy Remark 1: The complexity of Algorithm 1 is analyzed as outageprobabilitywithperfectCSI availableattheSUs.Based follows. Since the subgradient method used to update is on this motivation, we formulate the optimization problem as 9 (P3) . Then, the problem in (67) reduces to the following problem as (70) (66) It can be verified that the above problem is non-linear and (13) (17) (19) non-convex.Since is restricted in the narrow interval , we can apply a one-dimensional search algorithm (such as where the value of is a very large positive number. The the fminbnd function in MATLAB) within the interval second part of the objective function in (66) is introduced as to find the optimal . The overall algorithm with unknown a penalty function for punishing causing secrecy outage to the EAVs’ CSI is summarized in Algorithm 2. PU. It can be verified that Propositions 1-2 still hold for P3. Based on Propositions 1-2 and using the indicator function in Algorithm 2 Proposed algorithm with unknown EAVs’ CSI. (26), P3 can be reformulated and then decoupled into parallel subproblemswith the same structure,each for one fading state 1: Obtain as . as given by the problem in (30). Thus, using the BCD method 2: Obtain by solving the problem in (70) via one- adopted in Section IV, the solution for the case of perfect CSI dimensional search algorithms and let . with non-collusive EAVs can be obtained. As for the case of 3: Let collusive EAVs, the method proposed in Sections V-A can be and for all used to solvethe problem.We omitthe detailsherefor brevity. C. Unknown EAVs’ CSI VI. SIMULATION RESULTS Here, this subsection investigates the unknown EAVs’ CSI In this section, we verify the effectiveness of the proposed case. We assume that the instantaneous values as well as algorithms by Monte Carlo simulations. When performing the distribution information of and are unknown. simulations, the PTx is located at the center, the PRx is In such a case, it is impossible to theoretically guarantee the randomly deployed in a ring with inner radius meter and PU secrecy constraint in (11). Instead, we design an efficient outer radius meter, while the CHAP, the SUs and the EAVs algorithm that can decrease the PU secrecy outage probability arerandomlydeployedinaringwithinnerradius meterand as much as possible in what follows. Firstly, in order to let outer radius meter. The channel power gains are modeled the PU achieve a higher secrecy rate, the value of is set as where represents the large-scale pathloss to zero and the value of is set to its maximum allowable modeled as dB with denoting the distance, value . Secondly,inorderto letthe SU achieveasatisfac- and is the normalized small-scale fading with exponential tory performance, the SU with the maximum communication distribution. Besides, we set , bits/s/Hz, channel power gain to the CHAP is scheduled for information dBW, dBW and dBW. For the transmission in the WIT phase, i.e., purpose of comparison, a benchmark algorithm without SU’s where . Thirdly, in order to interfere cooperation is considered. The benchmark algorithm assumes with the EAVs to the most extent, the transmit power of the that the PRx is wireless powered and supports full-duplex SU scheduled for jamming is set to the maximum allowable communication,andthusthe PRx can sendjammingsignalsto power, i.e., for all . Then, the remaining the EAV using the harvestedenergyby powersplitting, similar variables are optimized to maximize the SU rate to the one proposed in [30]. given by Fig. 2a and Fig. 2b show the SU ergodic rate and the PU secrecyoutageprobabilityagainsttherequiredPUsecrecyout- (67) age probability reduction , respectively. Since the greedy algorithm does not apply the PU secrecy constraint, the value (68) of has no impact on the SU ergodic rate and the PU se- crecyoutageprobabilityachievedbythegreedyalgorithm.Itis (69) shown that, as increases, the SU ergodic rate and the PU It can be verified that the optimal solution to the problem in secrecy outage probability achieved by Algorithm 1 decrease (67)satisfies .Itisprovedbrieflyhere.Supposethat and are higher than that achieved by the greedy algorithm. the optimal solution satisfies . Then, the value of This is because that when dealing with the PU secrecy outage can be increased to satisfy and such solution probability, Algorithm 1 aims to guarantee the reduction of provides the same objective function value and satisfies the the PU secrecy outage probability, while the greedy algorithm constraints. Thus, the optimal solution shall use up all the aims to minimize the PU secrecy outage probability. It is also available time. It can be also verified that the optimal solution shown that the greedy algorithm achieves significantly lower to the problem in (67) satisfies otherwise, PU secrecy outage probability than the benchmark algorithm, we can increase to get a higher objective function value. and Algorithm 1 outperformsthe benchmarkalgorithm if Basedonthe above analysis,wehave and is not too small and their performance gap increases as 10 0.8 Algorithm 1, non-collusive EAVs 0.75 6.9 Greedy algorithm, non-collusive EAVs 0.7 Algorithm 1, collusive EAVs 6.8 0.65 Greedy algorithm, collusive EAVs Collusive EAVs 0.6 6.7 0.55 6.6 0.5 6.5 0.45 6.4 0.4 6.3 0.35 Algorithm 1 6.2 Non-collusive Greedy algorithm EAVs 0.3 Benchmark algorithm 6.1 Without SU 0 0.05 0.1 0.15 0.2 0 0.05 0.1 0.15 0.2 (a) SU ergodic rate. (b) PU secrecy outage probability. Figure 2. Performance against the secrecy outage probability reduction ( ). increases. As expected, it is seen that the PU secrecy outage achieved by Algorithm 1 and the greedy algorithm increase as probability with collusive EAVs is higher than that with non- increases. This is as expected since more EAVs leads to collusive EAVs. It is interesting to observe that the SU ergodic lower PU secrecy rate that can be achieved as observed from ratewith collusiveEAVsishigherthanthatwithnon-colllusive (8) and (10). It is also shown that with the increase of , EAVs. This can be explained as follows. Since the PU secrecy the SU ergodic rates achieved by both Algorithm 1 and the outage probability with collusive EAVs is higher than that greedyalgorithmincreases.Thisindicatesthata largernumber with non-colllusive EAVs, the SU will have more flexibility in of EAVs is actually beneficial to the SUs for both algorithms. cooperation with the PU for decreasing the PU secrecy outage This can be explained as follows. Since a larger leads to probability. This indicates that it is beneficial to the SUs if the a higher PU secrecy outage probability, this can let the SUs EAVs are collusive. cooperate with the PUs more flexibly and give the SUs more opportunities to achieve a higher SU ergodic rate. Fig. 3a and Fig. 3b show the SU ergodic rate and the PU secrecy outage probability against the number of SUs , respectively. It is shown that, with the increase of ,the SU ergodic rates achieved by Algorithm 1 and the greedy Next, we investigate the performance of the proposed al- algorithm increase. This indicates that increasing the value of gorithm with unknown EAVs’ CSI. Fig. 5a and Fig. 5b show is beneficialto theSUs forbothAlgorithm1 andthegreedy the SU ergodic rate and the PU secrecy outage probability algorithm. This is because that by increasing the number of with unknown EAVs’ CSI against the number of SUs , SUs, there is a much better chance that the scheduled SU respectively. By comparing Fig. 5a with Fig. 3a, it is seen has more harvested energy and better channel conditions to that the SU ergodic rate with unknown EAVs’ CSI drops achievea higherrate.It isalso shownthat, with the increaseof significantly compared to the one with perfect CSI. From Fig. , the PU secrecy outage probability achieved by Algorithm 5b,it is shownthat the PU secrecyoutageprobabilityachieved 1 keeps constant, while the PU secrecy outage probability bytheproposedalgorithmwithunknownEAVs’CSIdecreases achieved by the greedy algorithm decreases. This indicates as increases and is lower than that without SU when is that increasing the value of is beneficial to the PU only not small. This indicatesthat as long as is sufficiently large, for the greedy algorithm. The above differences between the the PU security performance can be improved significantly two algorithms lie in the fact that the aim of Algorithm 1 is even without knowlwdge of EAVs’ CSI. Further in Fig. 6, to maximize the SU ergodic rate with guaranteed reduction of we show the PU secrecy outage probability with unknown the PU secrecy outage probability while the aim of the greedy EAVs’ CSI against the number of EAVs . Note that, since algorithm is to minimize the PU secrecy outage probability. the proposed algorithm with unknown EAVs’ CSI does not Besides, it is shown that both Algorithm 1 and the greedy dependsonanyinformationonEAVs,theachievedSUergodic algorithm outperform the benchmark algorithm in terms of rate is constant as changes. It is shown that the PU secrecy PU secrecy outageprobability,and the gapbetweenthe greedy outage probability achieved by the proposed algorithm with algorithmand the benchmarkalgorithmincreasesgreatly as unknown EAVs’ CSI increases as increases and is largerly increases. lower than that without SU. From Fig. 5 and Fig. 6, we Fig. 4a and Fig. 4b show the SU ergodic rate and the PU conclude that with unknown EAVs’ CSI, the SU performance secrecy outage probability against the number of EAVs ,re- isgreatlydegradedwhilethe PU securityperformancecanstill spectively. It is shown that the PU secrecy outage probabilities be improved largely by the proposed algorithm. SU ergodic rate (bits/s/Hz) PU secrecy outage probability 11 0.8 0.7 Algorithm 1 Collusive EAVs Greedy algorithm 0.6 Benchmark algorithm 7 Without SU 0.5 0.4 Non-collusive EAVs 0.3 Algorithm 1, non-collusive EAVs Greedy algorithm, non-collusive EAVs Algorithm 1, collusive EAVs Greedy algorithm, collusive EAVs 20 40 60 80 100 120 140 160 180 200 20 40 60 80 100 120 140 160 180 200 (a) SU ergodic rate. (b) PU secrecy outage probability. Figure 3. Performance against the number of SUs ( , ). 6.8 6.7 0.9 0.8 6.6 0.7 Collusive EAVs 6.5 0.6 6.4 0.5 6.3 0.4 6.2 Non-collusive 6.1 0.3 EAVs Algorithm 1, non-collusive EAVs Algorithm 1 Greedy algorithm, non-collusive EAVs Greedy algorithm Algorithm 1, collusive EAVs Benchmark algorithm 5.9 Greedy algorithm, collusive EAVs 0.2 Without SU 5.8 4 6 8 101214 16 4 6 8 1012 1416 (a) SU ergodic rate. (b) PU secrecy outage probability. Figure 4. Performance against the number of EAVs ( , ). VII. CONCLUSIONS SUs is beneficial to both the SU and the PU, and increasing the number of EAVs degrades the PU security performance This paper proposes a new cooperative protocol for the while actually improves the SU performance. It is also shown CWPCN to cooperate with the PU to improve the security that, compared to non-collusive EAVs, collusive EAVs are performance of the PU who faces security threats from EAVs. more harmful to the PU while actually are more beneficial In the protocol, the SUs first harvest energy and then use the to the SUs. Besides, it is shown that with unknown EAVs’ harvestedenergyto interferewith theEAVsandgaintheirown CSI, the SU performance is significantly degraded while the transmissionopportunitiesat the same time. Assumingthat the PU security performance can still be improved significantly CSI is perfect and the EAVs are collusive/non-collusive, we by the proposed algorithm. propose joint SU scheduling, power and time allocation algo- rithms based on the dual optimization method and the BCD There are some possible extensions for the work in this method to maximize the SU ergodicrate underthe PU secrecy paper. First, we have considered a single primary commu- constraint. In addition, we also propose more PU favorable nication link in this paper, while it would be interesting to greedy algorithms aimed at minimizing the PU secrecy outage extend the results to support multiple primary links. In such probability. For the more practical unknown EAVs’ CSI case, a case, the SUs shall comply with the PU secrecy constraints we furthermore propose an efficient algorithm for the SUs to for multiple primary communications links and the resource improve the PU security performance. allocation shall achieve a balance among the requirements Extensive simulations show that increasing the number of of different primary communication links. Second, we have SU ergodic rate (bits/s/Hz) SU ergodic rate (bits/s/Hz) PU secrecy outage probability PU secrecy outage probability 12 0.8 Unknown EAVs'' CSI 0.7 0.9 0.6 0.8 0.5 0.7 0.4 0.6 0.3 0.5 0.4 0.2 Unknown EAVs' CSI, non-collusive EAVs Unknown EAVs' CSI, collusive EAVs 0.3 Greedy algorithm with perfect CSI, non-collusive EAVs Greedy algorithm with perfect CSI, collusive EAVs 0.2 Without SU, non-collusive EAVs Without SU, collusive EAVs 0.1 0.1 20 40 60 80 100 120 140 160 180 200 20 40 60 80 100 120 140 160 180 200 (a) SU ergodic rate. (b) PU secrecy outage probability. Figure 5. Performance with unknown EAVs’ CSI against the number of SUs ( ). 0.9 value of is chosen such that 0.8 It can be easily seen that all the constraints of P1 are 0.7 still satisfied by . Thus, the so- 0.6 lution is a feasible solution to 0.5 P1. It can be seen that both and 0.4 achieve the same objective func- tionin(12).Thismeansthat isalso 0.3 an optimal solution to P1 and thus the optimal solution to P1 can always use up all the available transmit power of the PU. Unknown EAVs' CSI, non-collusive EAVs 0.2 This completes the proof. Unknown EAVs' CSI, collusive EAVs Greedy algorithm with perfect CSI, non-collusive EAVs Greedy algorithm with perfect CSI, collusive EAVs APPENDIX B Without SU, non-collusive EAVs PROOF OF PROPOSITION 2 Without SU, collusive EAVs 0.1 Suppose that is the optimal so- 4 6 8 10 12 14 16 lution to P1 that satisfies Then, we con- structanothersolution thatsatisfies Figure 6. PU secrecy outage probability with unknown EAVs’ CSI against the number of EAVs ( ). where The value of is chosen such that It can be easily verified that all the constraints of P1 still hold for . considered that both the SU and the EAV are equipped with a Thus, is a feasible solution to P1. singleantenna,whileequippingmultipleantennascanenhance Since the values of the the performance of the SU and the EAV. In such a case, objectivefunctionin (12)achievedbythetwosolutionsarethe multiple antennas at the SU can let the SU interfere with same. This means that the optimal solution to P1 can always the EAV more efficiently using beamforming technologies, use up all the available unit time. This completes the proof. while multiple antennasat the EAV can let the EAV eavesdrop the primary communication more conveniently using diversity combining technologies, and thus extending the results to this APPENDIX C case is also interesting. PROOF OF THEOREM 1 After a few mathematical manipulations, the inequality APPENDIX A can be rewritten as PROOF OF PROPOSITION 1 (71) Suppose that denote the opti- mal solution to P1 that satisfies where Then, Then,we consideranothersolution that satisfies we can make the following discussions on the value of where The : PU secrecy outage probability SU ergodic rate (bits/s/Hz) PU secrecy outage probability 13 Case 1: In this case, the inequality Case 3: In this case, is reformulated as Thus the inequality is equals to if the inequality satisfied only if where holds and equals to otherwise. and Case 2: In this case, considering the fact that , the inequality cannot be satisfied. Thus, we have if Therefore, equals to . and otherwise. Let denote the optimal solution to the inner maximization Based on the abovediscussions on for a given problem in (38) for a given . Based on the above the optimal solution of the inner maximization problem in discussions, we can make discussions on as: (57), , is discussed in the following three cases: Case 1: In this case, we discuss the value of Case 1: In this case, in two subcases. In the subcase of ,thevalue and thus the objective function be- of equals to under the constraint comes Therefore, it is easy to check that (39), and thus . In the subcase of , due to the fact that is an increasing the value is the critical value of over which function of Case 2: In this case, we have the value of changes from to under the constraint (39). Thus the inner maximization only if Considering the problem in (38) is maximized at two possible points as constraint if or given by , the objective function in (57) becomes and thus . Otherwise, under the condition the objective function in (57) is (72) if andis if Case 2: In this case, since Therefore, assuming that we have equals to under the constraint (39), we can easily have if and The above discussions lead to the expression of given by otherwise. In summary, we have (73) (74) Therefore, the optimal solution of the problem in (38) is Case 3: In this case, we have given by where only if Considering the constraint the value of is discussed in the following five subcases. APPENDIX D – Subcase 1: or .In this PROOF OF THEOREM 2 subcase, the objective function in (57) becomes Thus, in what follows, we focus on solving the inner and thus we have maximization problem in (57). For a given after a few – Subcase 2: , In this mathematical manipulations, the inequality can be subcase, the objective function in (57) is if rewrittenas where and is if and aregivenby(60),(64)and(65),respectively.Clearly, Therefore,since is an increasing function Then, we can make the following observations on of the maximum value of the objective function the value of : in (57) is attained at or as given by Case 1: Inthiscase,theinequality cannot be satisfied and (75) thus we have . Case 2: Inthiscase,theinequality – Subcase 3: , In this subcase, is satisfied only if the objective function in (57) is and thus the .Thus wehave if and maximum value of the objective function is attained otherwise. at 14 – Subcase 4: In this subcase, [15] K. Tourki and M. O. Hasna, “Proactive spectrum sharing incentive for physical layer security enhancement using outdated csi,” IEEE the objective function in (57) is if Transactions on Wireless Communications, vol. 15, no. 9, pp. 6273– 6283, 2016. and is if [16] F. Zhu and M. Yao, “Improving physical-layer security for crns using or Therefore, since is an sinr-based cooperative beamforming,” IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1835–1841, 2016. increasing function of the maximum value of the [17] A.Al-Talabani, Y.Deng, A.Nallanathan, and H.X.Nguyen,“Enhancing objective function in (57) is attained at or secrecy rate in cognitive radio networks via stackelberg game,” IEEE Transactions on Communications, vol. 64, no. 11, pp. 4764–4775, 2016. as given by [18] D.Xu and Q.Li,“Optimal power allocation for cognitive radio networks with primary user secrecy rate loss constraint,” in Proceedings of IEEE International Conference on Communications, 2015, pp. 7615–7621. (76) [19] M. Qin, S. Yang, H. Deng, and M. H. Lee, “Enhancing security of primary user in underlay cognitive radio networks with secondary user selection,” IEEE Access, vol. 6, pp. 32624–32636, 2018. – Subcase 5: In this [20] L. Tang and Q. Li, “Wireless power transfer and cooperative jamming for secrecy throughput maximization,” IEEE Wireless Communications subcase, the objective function in (57) is if Letters, vol. 5, no. 5, pp. 556–559, 2016. and is if [21] W. Liu, X. Zhou, S. Durrani, and P. Popovski, “Secure communica- Thus, the maximum value of the objective tion with a wireless-powered friendly jammer,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 401–415, 2016. function is attained at [22] W. Yang, W. Mou, X. Xu, W. Yang, and Y. Cai, “Energy efficiency Based on the above discussions, the optimal solution of analysis and enhancement for secure transmission in swipt systems exploiting full duplex techniques,” IET Communications, vol. 10, no. 14, the inner maximization problem in (57), , is summa- pp. 1712–1720, 2016. rized by expression (59). Then, the optimal solution of the [23] H. Yu, S. Guo, Y. Yang, L. Ji, and Y. Yang, “Secrecy energy efficiency problem in (57) is given by where optimization for downlink two-user ofdma networks with swipt,” IEEE Systems Journal, https://doi.org/10.1109/JSYST.2017.2775607. This completes the proof. [24] J. Moon, H. Lee, C. Song, and I. Lee, “Secrecy performance opti- mization for wireless powered communication networks with an energy harvesting jammer,” IEEE Transactions on Communications, vol. 65, REFERENCES no. 2, pp. 764–774, 2017. [25] M. Liu and Y. Liu, “Power allocation for secure swipt systems with [1] Y.-C. Liang, K.-C. Chen, G. Y. Li, and P. Mahonen, “Cognitive radio wireless-powered cooperative jamming,” IEEE Communications Letters, networking and communications: An overview,” IEEE Transactions on vol. 21, no. 6, pp. 1353–1356, 2017. Vehicular Technology, vol. 60, no. 7, pp. 3386–3407, 2011. [26] G. Zhang, J. Xu, Q. Wu, M. Cui, X. Li, and F. Lin, “Wireless powered [2] A.Goldsmith, S.A.Jafar, I.Maric, and S.Srinivasa, “Breaking spectrum cooperative jamming for secure ofdm system,” IEEE transactions on gridlock with cognitive radios: An information theoretic perspective,” vehicular technology, vol. 67, no. 2, pp. 1331–1346, 2018. Proceedings of the IEEE, vol. 97, no. 5, pp. 894–914, 2009. [27] A. Singh, M. R. Bhatnagar, and R. K. Mallik, “Secrecy outage of a [3] A. D. Wyner, “The wire-tap channel,” The bell system technical journal, simultaneous wireless information and power transfer cognitive radio vol. 54, no. 8, pp. 1355–1387, 1975. system,” IEEE Wireless Communications Letters, vol. 5, no. 3, pp. 288– [4] X. Ge, H. Jin, J. Zhu, J. Cheng, and V. C. Leung, “Exploiting oppor- 291, 2016. tunistic scheduling in uplink wiretap networks,” IEEE Transactions on [28] D. W. K. Ng, E. S. Lo, and R. Schober, “Multiobjective resource Vehicular Technology, vol. 66, no. 6, pp. 4886–4897, 2017. allocation for secure communication in cognitive radio networks with [5] D. Xu and Q. Li, “Resource allocation for cognitive radio with primary wireless information and power transfer,” IEEE Transactions on Vehic- user secrecy outage constraint,” IEEE Systems Journal, vol. 12, no. 1, ular Technology, vol. 65, no. 5, pp. 3166–3184, 2016. p. 893, 2018. [29] Y. Wu and X. Chen, “Robust beamforming and power splitting for [6] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks secrecy wireless information and power transfer in cognitive relay with rf energy harvesting: A contemporary survey,” IEEE Communica- networks,” IEEE Communications Letters, vol.20, no.6,pp.1152–1155, tions Surveys & Tutorials, vol. 17, no. 2, pp. 757–789, 2015. [7] D. Xu and Q. Li, “Optimization of wireless information and power [30] J. Zhang, G. Pan, and H.-M. Wang, “On physical-layer security in transfer in multiuser ofdm systems,” AEU-International Journal of underlay cognitive radio networks with full-duplex wireless-powered Electronics and Communications, vol. 90, pp. 171–174, 2018. secondary system,” IEEE Access, vol. 4, pp. 3887–3893, 2016. [8] K. Huang and X. Zhou, “Cutting the last wires for mobile communica- [31] X. Chen, L. Guo, X. Li, C. Dong, J. Lin, and P. T. Mathiopoulos, tions by microwave power transfer,” IEEE Communications Magazine, “Secrecy rate optimization for cooperative cognitive radio networks vol. 53, no. 6, pp. 86–93, 2015. aided by a wireless energy harvesting jammer,” IEEE Access, 2018. [9] H. Ju and R. Zhang, “Throughput maximization in wireless powered [32] P. Yan, Y. Zou, and J. Zhu, “Energy-aware multiuser scheduling for communication networks,” IEEE Transactions on Wireless Communica- physical-layer security in energy-harvesting underlay cognitive radio tions, vol. 13, no. 1, pp. 418–428, 2014. systems,” IEEE Transactions on Vehicular Technology, vol. 67, no. 3, [10] D. Xu and Q. Li, “Joint power control and time allocation for wireless pp. 2084–2096, 2018. powered underlay cognitive radio networks,” IEEE Wireless Communi- [33] L. Chen, L. Huang, H. Xu, C. Yang, Z. Sun, and X. Wang, “Primary cations Letters, vol. 6, no. 3, pp. 294–297, 2017. secrecy is achievable: Optimal secrecy rate in overlay crns with an [11] S. Lee and R. Zhang, “Cognitive wireless powered network: Spectrum energy harvesting secondary transmitter,” in proceedings of International sharing models and throughput maximization,” IEEE Transactions on Conference on Computer Communication and Networks, 2015, pp. 1–6. Cognitive Communications and Networking, vol. 1, no. 3, pp. 335–346, [34] L. Chen, L. Huang, H. Sun, H. Xu, and C. Yang, “Achieving primary secrecy in energy harvesting crns using stackelberg game,” in proceed- [12] D. Xu and Q. Li, “Cooperative resource allocation in cognitive radio ings of International Conference on Wireless Communications & Signal networks with wireless powered primary users,” IEEE Wireless Com- Processing, 2015, pp. 1–5. munications Letters, vol. 6, no. 5, pp. 658–661, 2017. [13] ——, “Improving physical-layer security for primary users in cognitive [35] D. Wang, P. Ren, Q. Du, L. Sun, and Y. Wang, “Primary secure radio networks,” IET Communications, vol. 11, no. 15, pp. 2303–2310, communication with the cooperation of energy harvesting secondary 2017. system,” in proceedings of IEEE Vehicular Technology Conference Fall, [14] N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, “Cooperative secure 2016, pp. 1–5. resource allocation in cognitive radio networks with guaranteed secrecy [36] L.Jiang, H.Tian, C. Qin, S.Gjessing, and Y. Zhang, “Secure beamform- rate for primary users,” IEEE transactions on wireless communications, ing in wireless-powered cooperative cognitive radio networks,” IEEE vol. 13, no. 2, pp. 1058–1073, 2014. Communications Letters, vol. 20, no. 3, pp. 522–525, 2016. 15 [37] M. A. Kishk and H. S. Dhillon, “Coexistence of rf-powered iot and a primary wireless network with secrecy guard zones,” IEEE Transactions on Wireless Communications, vol. 17, no. 3, pp. 1460–1473, 2018. [38] P. J. Smith, P. A. Dmochowski, H. A. Suraweera, and M. Shafi, “The effects of limited channel knowledge on cognitive radio system capacity,” IEEE Transactions on Vehicular Technology, vol. 62, no. 2, pp. 927–933, 2013. [39] F. Simjee and P. H. Chou, “Everlast: long-life, supercapacitor-operated wireless sensor node,” in International Symposium on Low Power Electronics and Design, 2006, pp. 197–202. [40] O. Ozel, K. Shahzad, and S. Ulukus, “Optimal energy allocation for energy harvesting transmitters with hybrid energy storage and processing cost,” IEEE Transactions on Signal Processing, vol. 62, no. 12, pp. 3232–3245, 2014. [41] X. Kang, C. K. Ho, and S. Sun, “Full-duplex wireless-powered commu- nication network with energy causality,” IEEE Transactions on Wireless Communications, vol. 14, no. 10, pp. 5539–5551, 2015. [42] Y. Zou, X. Li, and Y.-C. Liang, “Secrecy outage and diversity analysis of cognitive radio systems,” IEEE Journal on Selected Areas in Com- munications, vol. 32, no. 11, pp. 2222–2236, 2014. [43] C. Greene, “RF wireless power: An enabling technology,” Powercast Corporation, Tech. Rep., 2014. [Online]. Available: http://www.powercastco.com/documentation/ [44] M. Zhang, Y. Liu, and R. Zhang, “Artificial noise aided secrecy information and power transfer in ofdma systems,” IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 3085–3096, 2016. [45] H. Koorapaty, A. A. Hassan, and S. Chennakeshu, “Secure information transmission for mobile radio,” IEEE Communications Letters,vol. 4, no. 2, pp. 52–55, 2000. [46] R. Fan, Y. Zheng, J. An, H. Jiang, and X. Li, “Dynamic pricing over multiple rounds of spectrum leasing in cognitive radio,” IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1782–1789, [47] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Cambridge Univ. Press, 2004. [48] D. P. Bertsekas, Nonlinear programming. Athena scientific Belmont, [49] W. Yu and R. Lui, “Dual methods for nonconvex spectrum optimiza- tion of multicarrier systems,” IEEE Transactions on Communications, vol. 54, no. 7, pp. 1310–1322, 2006. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Electrical Engineering and Systems Science arXiv (Cornell University)

Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks

Electrical Engineering and Systems Science , Volume 2018 (1810) – Sep 29, 2018

Loading next page...
 
/lp/arxiv-cornell-university/resource-allocation-for-secure-communications-in-cooperative-cognitive-j0HOXlaEcX

References (49)

ISSN
1932-8184
eISSN
ARCH-3348
DOI
10.1109/JSYST.2018.2883491
Publisher site
See Article on Publisher Site

Abstract

Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks Ding Xu, Member, IEEE, and Qun Li, Member, IEEE Abstract—We consider a cognitive wireless powered com- the SU. By doing so, the PU has motivation for allowing the munication network (CWPCN) sharing the spectrum with a SU to utilize the licensed spectrum. primary network who faces security threats from eavesdroppers Security is an important requirement for wireless networks, (EAVs). We propose a new cooperative protocol for the wireless and there is no exception for the PU networks. In particular, powered secondary users (SU) to cooperate with the primary we are interested in one kind of security threats to the PU user (PU). In the protocol, the SUs first harvest energy from the power signals transmitted by the cognitive hybrid access networks, i.e., eavesdropping from malicious users who try to point during the wireless power transfer (WPT) phase, and then decode messages broadcasted from the PU. In this context, use the harvested energy to interfere with the EAVs and gain secrecy rate [3], [4], defined as the achievable non-negative transmission opportunities at the same time during the wireless rate of the perfectlysecure informationsent fromthe sourceto information transfer (WIT) phase. Taking the maximization of the destination with the presenceof the eavesdroppers(EAVs), the SU ergodic rate as the design objective, resource allocation algorithms based on the dual optimization method and the is usually adopted to measure the physical-layer security block coordinate descent method are proposed for the cases performance. However, only zero or trivial secrecy rate can of perfect channel state information (CSI) and collusive/non- be achieved by the PU when the source-to-EAV channel is collusive EAVs under the PU secrecy constraint. More PU strong. Generally, the SU can act as a cooperative relay or a favorable greedy algorithms aimed at minimizing the PU secrecy friendly jammer to improve the PU security performance [5]. outage probability are also proposed. We furthermore consider the unknown EAVs’ CSI case and propose an efficient algorithm Meanwhile, wireless power transfer (WPT) has greet po- to improve the PU security performance. Extensive simulations tential to become a perpetual energy source for wireless show that our proposed protocol and corresponding resource equipments by harvesting ambient radio signals [6], [7]. For allocation algorithms can not only let the SU gain transmission example,apowerstationtransmittingtensofwattscansupport opportunities but also improve the PU security performance even maximum WPT distance in the range of meter for with unknown EAVs’ CSI. powering smart phones and tablet computers [8]. Thus, wire- Index Terms—Cognitive radio, resource allocation, wireless less powered communication networks (WPCNs), in which powered communication, eavesdropping, cooperation wireless equipments are powered by WPT, have received a lot of attention . A typical transmission protocol for the WPCNs I. INTRODUCTION is the so-called “harvest-then-transmit” protocol [9], where in each transmission time block, users first harvest energy OGNITIVE radio (CR) has been widely studied in re- during the WPT phase and then transmit information during cent years due to its capability of improving spectrum thewirelessinformationtransfer(WIT)phase.Asforcognitive utilization [1]. In CR networks, there are two kinds of users, WPCNs (CWPCNs), in which the SU or the PU is wireless one is called secondary user (SU) who does not have its own powered, one has to optimize the time and power allocation spectrum, and the other one is called primary user (PU) who for maximizing the SU performance while also restricting the owns licensed spectrum. Basically, there are three main CR interferenceto the PU or improvingthe PU performance[10]– paradigms for the SU to utilize the spectrum licensed to the [12]. PU: interweave, underlay and overlay [2]. In interweave CR For CWPCNs, by allowing a portion of time exclusively networks,theSUmustsensethespectrumstatusandutilizethe for the wireless powered SU to harvest energy from RF spectrum when the spectrum is sensed as vacant. In underlay signals, the SU can then act as a friendly jammer to improve CR networks, the SU can utilize the spectrum as long as the the PU security performance and gain its own transmission interference caused to the PU is acceptable for the PU. These opportunity simultaneously during the remaining portion of two CR paradigms do not provide incentives for the PU to time. By doing so, since the PU security performance is allow the SU to utilize its spectrum. In contrast to interweave improved, the PU has incentive to let the SU harvest energy and underlay CR networks, in overlay CR networks, the and transmit information on its licensed spectrum band. Such transmissionof the PU is facilitated fromthe cooperationfrom cooperation leads to a win-win situation for both the CR Ding Xu is with the Wireless Communication Key Lab of Jiangsu Province, networks and the PU networks. This motivates the work in Nanjing University of Posts and Telecommunications, Nanjing 210003, China this paper. (e-mail: xuding@ieee.org). Qun Li is with the Jiangsu Key Lab of Big In this paper, we propose a new protocol for a CWPCN Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing 210046, China. (e-mail: liqun@njupt.edu.cn). to cooperate with a PU network who faces security threats 2 from EAVs. In the proposed protocol, the SUs first harvest The main contributions of this paper are summarized as energy from the power signals transmitted by a half-duplex follows: cognitive hybrid access point (CHAP) during the WPT phase, We propose a new cooperative protocol for the CWPCN and then by using the harvested energy, at most one SU is to coexist with the PU network and improve the PU scheduledtotransmitinformationtothe CHAP whilethe other security performance, where the wireless powered SUs SUs are sending artificial noise to interfere with the EAVs to first harvestenergy,and then at most oneSU is scheduled improve the PU security performance during the WIT phase. to transmit information while the remaining SUs are The CHAP is responsible for transmitting energy wirelessly sending artificial noise to interfere with the EAVs to to the SU in the downlink and receiving information from the improve the PU security performance. SU in the uplink. For those SUs far from the CHAP and very With the proposed protocol, we first consider the case close to the PU transmitter, the PU transmitter can also decide when perfect CSI is available at the SUs and the EAVs to broadcast energy to these SUs during the WPT phase. It is are not collusive, and maximize the SU ergodic rate assumed that the PU has no knowledge of the channel state under the PU secrecy constraint by jointly optimizing SU information (CSI) related to the EAVs and thus transmits at a scheduling, power and time allocation. The optimization constantsecrecyrate.Therefore,thesecrecyoutageprobability problem is shown to be highly non-convex, and we is adopted as a performance metric for the PU. To encourage propose a suboptimal algorithm by applying the dual thePUtocooperatewiththeSU,weintroduceanewconstraint optimization method and the BCD method. named as the PU secrecy constraint, which requires that the We then extend the work to consider the case when the PU secrecy outage probability with the cooperation from the EAVs are collusive. Besides, more PU favorable greedy SU shall be lowered to a desired target threshold compared to algorithms are also proposed aiming at minimizing the the case without the cooperation. PUsecrecyoutageprobability.Forthemorepracticalcase Our goal is to maximize the SU ergodic rate by opti- when the CSI related to the EAVs is unknownto the SUs, mizing SU scheduling, power and time allocation under the wefurthermoreproposeanefficientalgorithmfortheSUs PU secrecy constraint. Compared to the work such as [5], to improve the PU security performance. [13] that considered the SUs are powered by conventional Extensive simulation results reveal interesting phe- energy sources, the investigated problem in this paper is more nomenons such as increasing the number of EAVs actu- intractable due to the fact that the transmit power of the SU ally improves the SU performance while it degrades the depends on the time allocated for the WPT phase and the PU security performance, and compared to non-collusive power allocation of the PU, which makes the optimization EAVs, collusive EAVs are actually more beneficial to the variables coupled together and hard to be optimized. We first SUs while they are more harmful to the PU. Besides, it consider the case when perfect CSI is available at the SUs is shown that with unknown EAVs’ CSI, the PU security and the EAVs are not collusive. In this case, by deriving some performance can still be improved significantly at the important properties of the optimal solution, the optimization sacrifice of the SU performance. problem is simplified and an algorithm based on the dual Therestofthispaperisorganizedasfollows.Theworkrelated optimization method and the block coordinate descent (BCD) to this paper is described in Section II. Section III presents the method is proposed to address the problem. We then extend system model and formulates the optimization problem. Sec- the work to consider the case when the EAVs are collusive. tion IV proposesthe resource allocation algorithm for the case Besides, aiming at minimizing the PU secrecy outage proba- ofperfectCSI withnon-collusiveEAVs. Section V extendsthe bility,more PU favorablegreedyalgorithmsare also proposed. work to consider the case of collusive EAVs, proposes greedy Furthermore, we also consider the case when the CSI related algorithms to minimize the PU secrecy outage probability, to the EAVs is unknown to the SUs and propose an efficient and furthermore considers the more practical unknown EAVs’ algorithm to improve the PU security performance. Extensive CSI case. Section VI verifies the proposed algorithms with simulation results confirm the effectiveness of our proposed extensive simulation results. Finally, Section VII concludes CWPCN protocol and correspondingresource allocation algo- the paper. rithms. It is noted that using wireless powered SUs to improve the II. RELATED WORK PU security performance is appealing due to the following considerations:1) Since the SU is wirelessly powered,there is The PU security performance with the cooperation of the no need to replace the exhausted battery and thus the lifetime SU was investigated in [5], [13]–[19]. Specifically, in [5], the of the SU is theoretically infinite; 2) Since no battery is resource allocation problem to maximize the SU ergodic rate needed for the SU, the size of the SU equipment can be small. under the condition that the PU secrecy outage probability Thus, the deployment of the SU is flexible and will not get does not deteriorate due to the existence of the SU was inves- attention by the EAVs. It is also noted that the shortcoming of tigated. In [13], besides the PU, the SU was also considered low available transmit power of the SU can be overcame by to be threatened by the EAVs, and the SU ergodic secrecy deploying the SUs close to the CHAP or the PU transmitter, rate was maximized with imperfect CSI under the PU secrecy while the effect of interfering to the EAVs can be improved outage constraint. In [14], the SU secrecy rate was maximized by increasing the number of SUs and deploying the SUs close by optimizing power allocation, time allocation and relay to the EAVs. selection subject to the minimum PU secrecy rate constraint 3 for both perfect and imperfect CSI. In [15], the SU was probability of strictly positive secrecy rate at the SU was proposed to interfere with the EAV and the PU secrecy outage investigated. In [31], the SU secrecy rate was improved by probabilitywas derivedin closed-formwith fixedvaluesof the letting a wireless powered jammer to degrade the performance SU configuration parameters such as transmit power. In [16], of the EAV. In [32], a SU scheduling scheme was proposed the transmit power of the SU was minimized under different for a CWPCN with the interference power constraint at the SINR constraints at the EAV, the PU and the SU. In [17], PU, and its closed-form expressions of outage probability the PU secrecy rate and the SU secrecy rate were optimized and intercept probability were derived over Rayleigh fading based on Stackelberg game. In [18], the power allocation channels. Compared to these related works in [27]–[32] , our problem to maximize the SU rate under the zero PU secrecy work is different in that secure communications for the PU is rate loss requirement was investigated. In [19], the close-form our concern. expressions of ergodic PU secrecy rate were analyzed with The work in [33]–[37]considered PU security in CWPCNs. different SU selection schemes. Note that, unlike this paper, In [33]–[35], the SU was assumed to harvest energy from the the above references [5], [13]–[19] all assumed that the SU is environment or the PU signals and then relay PU messages equipped with constant energy supplies. to enhance PU secrecy performance. Note that [33]–[35] Thephysical-layersecurityinWPCNs hasbeeninvestigated consideredonlyonepairofSUsandtheproposedschemescan in [20]–[26]. In [20], the source node was assumed to harvest improve PU secrecy performance only if the SU is far from energy from the base station and use these energy for interfer- the EAV. In [36], the wireless powered SU was considered as ing with the EAVs, andthe secrecy throughputwas maximized a potential EAV for the PU and the SU rate was maximized underthe secrecy constraint and the transmit power constraint. under the SINR constraints at the PU and the SU. In [37], In [21], a simple communication protocol for secure commu- the secrecy guard zones were set by the primary network to nications with the help from a wireless powered jammer was protect itself from eavesdropping from the wireless powered proposed and the secrecy throughput was maximized. In [22], secondary network. It is noted that the SU was considered as a two-phaseprotocol,wherethe destinationnodewas assumed a potential EAV in [36], [37], while this paper treats the SU as to harvest energy from the source node in the first phase a friendly jammer for the PU. To our best knowledge,no work and then use these energy to interfere with the EAVs in the in existing literature has considered to use wireless powered second phase, was proposed and the secrecy energy efficiency SUs to act as friendly jammers to improve the PU security was maximize by optimizing the time allocation and the performance and gain their own transmission opportunities at power allocation. In [23], by considering both the minimum the same time. secrecy rate requirement and the minimum harvested energy requirement, the secrecy energy efficiency was maximized by III. SYSTEM MODEL optimizing power allocation and power splitting ratio. In [24], aWPCN with a wirelesspoweredjammerwasconsidered,and the timeallocationwasoptimizedto maximizethe secrecyrate and minimize the secrecy outage probability.In [25], a WPCN with a wireless powered jammer and an energy receiver who is a potential EAV was considered,and the power allocation at the source node and the jammer to maximize the secrecy rate was optimized. In [26], a multicarrier WPCN with a wireless powered jammer was considered, and the secrecy rate was maximized by jointly optimizing time allocation and power Figure 1. System model. allocation at the source node and the jammer over subcarriers. Note that, compared to these works on security in WPCNs in [20]–[26],our problem is different due to the need to improve We consideranuplinkCWPCN with SUs andoneCHAP the PU security performanceas well as providingtransmission sharing the narrow spectrum band with one pair of PUs (a opportunities for the SU. primary transmitter (PTx) and a primary receiver (PRx)) who As for the physical-layer security in CWPCNs, some recent faces security threats from EAVs, as shown in Fig. 1. Let work focused on investigating secure communications for the and denote the sets of SUs and EAVs, respectively. It SU, such as [27]–[32]. In [27], the secrecy outage probability is assumed that the SUs are powered only by the energy of the SU was derived in closed-form under the interference harvested from RF signals while the rest nodes are powered power constraint at the PU. In [28], multiple design objectives by constant energy sources. All the channels involved are for the SU were considered under the secrecy performance assumed to be block fading, i.e., all the channel power gains guarantee at the SU and the interference power constraint at are constant within a transmission block and may change the PU. In [29], the PU was assumed to be a potential EAV independently from one block to another. The channel power for the SU and the SU transmit power was minimized under gains between SU and the CHAP, from SU the minimum SU secrecy rate and the minimum harvested to the PRx, from SU to EAV , from the PTx energy constraints. In [30], under the interference power to the PRx, from the PTx to SU , from the PTx to constraint at the PU and assuming that the secondary receiver the CHAP, and from the PTx to EAV are denoted by is full-duplex and sends jamming signals to the EAV, the , , , , , ,and 4 respectively, where denotes the joint fading state for all the and the maximum secrecy rate of the PU is given as [42] channelsinvolved.It is assumed that thePU hasno knowledge on the CSI of the links related to the EAVs and thus transmits (5) at a constant secrecy rate . As for the SUs’ knowledge on the CSI, two cases are considered. In the first case, the CSI Since the PU transmitsat a constantsecrecy rate ,thePUse- is assumed to be perfectly available at the SUs. In the second crecy outage probability is given by . case, the CSI of the links involving the EAVs is assumed to Note that, is a known value if and the distribution be unavailable while the other CSI is assumed to be perfectly of and are given. known at the SUs . It is noted that although perfect CSI is Now, supposing that the SU cooperates with the PU. In this hard to be realized in practice, it can be served as an upper case, the CHAP transmits RF energy with constant power bound or a benchmark for imperfect CSI. Investigating the during WPT. In addition, the PTx transmits RF energy with perfect CSI case can let us know the potential benefits of such power duringWPTandtransmitsinformationwithpower cooperation between the SU and the PU and guide the design during WIT at fading state . Note that can be of the imperfect CSI case. equal to zero and this means the PTx will not transfer energy to the SUs. The energy harvested by SU during WPT For each transmission block, without loss of generality, the is where ( )is time is assumed to be unit. The unit time is assumed to be divided into two phases: the WPT phase and the WIT the energy harvesting efficiency . The energy consumed by phase. In the first WPT phase with time duration the SU during WIT cannot be higher than that harvested CHAP and the PTx broadcast RF energy to the SUs, and during WPT. Let and denote the transmit powers meanwhile the SUs harvest energy from these RF signals ofSU forinformationtransmissionandjammingduring and then store the energy in supercapacitors. Compared to WIT at fading state , respectively. Then, we have rechargeable batteries, supercapacitors have smaller form- Since each SU factor, faster charging cycle and longer life [39]. However, is scheduled either for information transmission or jamming energy leakage for a supercapacitor is very large [40] and and at most one SU is scheduled for informationtransmission, thus the energy might not be able to be stored long enough we have for all and for the next transmission block. For simplicity, similar to [41], Similar to the existing work such as [14], [15], we assume that the harvested energy in current transmission we assume that the PU and the EAVs treat the information block cannot be used for future transmission blocks. In the signals from the SU as interference. We also assume that the second WIT phase with time duration , the PTx transmits artificial noise sent from the SUs can be canceled at the PU information to the PRx, and meanwhile at most one SU is and the CHAP but cannot be canceled at the EAVs. Such scheduled to transmit information to the CHAP and the other assumptioncan bepracticallyrealizedbythemethodproposed SUs are sending artificial noise to interfere with the EAVs. in [44]: the SUs, the CHAP and the PU pre-store a set of Supposing that the cooperation from the SU is not available Gaussiandistributedrandomsequencesusedforartificialnoise and all the time within each transmission block are used by with the indices of the sequences treated as the keys. The the PU for information transmission with maximum transmit SU randomly select a sequence and send its key secretly to power , then the achievable rate at the PU and the EAV the CHAP and the PU using the phase-shift modulation-based at fading state can be written as [5] method proposed in [45]. Since the set of random sequences is unknown to the EAVs, the EAVs cannot know the sequence (1) used by the SU even if the key is intercepted by the EAVs. Then, with SUs’ cooperation, the achievable rate at the PU and and the EAV at fading state can be written as (2) (6) respectively, where is the noise power. Then, if the EAVs and are non-collusive, the maximum secrecy rate of the PU is [5] (3) (7) where denotes . If the EAVs are collusive and usemaximumratiocombining,theachievablerate attheEAVs respectively. Supposing that the EAVs are non-collusive, the is given as [42] maximum secrecy rate of the PU with SUs’ cooperation at fading state is (4) 1 (8) Note that the effects of the imperfect CSI of the links not involving EAVs (such as the links between the SUs and the CHAP, and the links between the SUs and the PU) have been well researched in existing literature such as [38]. Thus, we focus on our main contributions of this paper and consider the CSI Note that the energy harvesting efficiency achieved by commercial prod- of the links related to the EAVs is unknown. ucts can be as high as [43]. 5 Supposing that the EAVs are collusive and use maximum ratio be considered as the average rate under no transmission delay combining, the achievable rate at the EAVs is given as requirement, we adopt ergodic rate as our performance metric fortheSU.Theconstraintin(13)isusedtorestrictthetransmit powers of the PU in the WPT and WIT phases such that the average transmit power over the two phases is below . (9) The constraint in (13) is also used for a fair comparison with the case without SU’s cooperation. Since unit transmission and the maximum secrecy rate of the PU is given as block is assumed, the constraint in (13) can also be interpreted as a constraint to restrict the total energy consumed by the PU in the two phases. The constraint in (14) indicates that (10) the total time length of the two phases must be no larger than . The constraint in (15) indicates that the energy consumed It is notedthat schedulingthe SU nearthe PRx forinformation by the SU during WIT must be no larger than the energy transmission will cause severe interference to the PRx. Thus harvested during WPT. The constraint in (16) indicates that through proper SU scheduling, the SU who causes minor each SU is scheduled either for information transmission or interference to the PRx shall be scheduled for information jamming. The constraint in (17) indicates that at most one SU transmission. If such SU does not exist, no SU shall be is scheduled for information transmission. The constraint in scheduled for information transmission. (18) is the PU secrecy constraint used to encourage the PU to The PU secrecy outage probability with the cooperation cooperate with the SU such that the PU secrecy performance from the SU is written as To in terms of secrecy outage probability can be improved by the encourage the PU to cooperate with the SU, the PU secrecy cooperationfromtheSU. Itisnotedthatthevalueof should outageprobability is requiredto be lowerthanthat without be not too small (i.e., should be not too large), otherwise the SU’s cooperation, i.e., P1 will be infeasible. Here, we assume that the value of (11) is small enough such that P1 is feasible . where ( )denotestherequiredPUsecrecyoutage probability reduction . We denote the above constraint as the PU secrecy constraint. IV. RESOURCE ALLOCATION ALGORITHM WITH PERFECT We aim to optimize SU scheduling, power and time alloca- CSI AND NON-COLLUSIVE EAVS tion to maximize the SU ergodic rate as (P1) This section considers the case of perfect CSI and non- collusive EAVs for P1. To our best knowledge, P1 is a highly non-linear non-convex problem that cannot be solved directly (12) with standard method. To solve P1, we first derive some (13) properties of the optimal solution to P1, and then we simplify P1 using these properties. (14) Proposition 1: The optimal solution to P1 must satisfy the (15) constraintin(13)withstrict equality,i.e., (16) Proof: Please refer to Appendix A. (17) Proposition 2: Theoptimalsolutionto P1 can alwayssatisfy (18) the constraint in (14) with strict equality, i.e., Proof: Please refer to Appendix B. (19) Based on Propositions 1-2, we have the following rela- tionships between the optimization variables for the optimal In P1, the objective function in (12) is the SU ergodic rate solution to P1 as defined as the rate averaged over all transmission fading blocks. Here, we assume that the SU carries delay-tolerant services. Such assumption is reasonable as the SU transmis- (20) sion is opportunistic and thus stringent transmission delay requirement for the SU is improper. Since ergodic rate can Inserting the above expressions into P1, P1 is reduced to the In this paper, we assume that the PU always has data to transmit/receive. In such a case, the PU can cooperate with the SU to improve its own secrecy performance as enforced by the constraint in (11). For the case when the It is noted that the greedy algorithms proposed in Section V-B can be PU has no data to transmit/receive, the SU can occupy the spectrum freely used to check the feasibility of P1. As long as in the greedy algorithm or being charged with a price. The interested readers may refer to [46] and is very large, the obtained PU secrecy outage probability is practically the references therein for the work on pricing-based methods dealing with the smallest PU secrecy outage probability that can be achieved by cooperation case when the PU is willing to lease its unused spectrum to the SU. from the SU. Thus, if the PU secrecy outage probability obtained from the Hereafter, we omit the index for the fading state wherever it is clear greedy algorithm is larger than , then P1 is infeasible, and otherwise, P1 from the context. is feasible. 6 following problem as (P2) dual problem written as The optimal solution obtained from the two levels of optimization is the optimal solution of P2 if the duality gap is zero [47], otherwise, the solutionisa feasiblesolutionofP2.Luckily,it hasbeenshown (21) in[49]thatthetime-sharingconditionissatisfiedifthechannel power gain distributions are continuous for a problem similar (22) to P2, and the duality gap is zero by satisfying the time- (23) sharing condition. Therefore, adopting the dual optimization is appropriate for P2. Since the master dual problem can be (24) easily solved by updating via the subgradient method until convergence [47], we focus on solving the problem in (30) in (25) what follows. and constraints (16)-(18) Sincetheproblemin(30)isnonconvex,theoptimalsolution is computationally difficult to derive. Instead, we adopt the To solve P2, we introduce a virtual SU indexed by BCD method to obtain a suboptimal solution by iteratively and schedule it for information transmission if all the actual optimizing with given optimizing with SUs are scheduled for jamming. The channel power gains given and optimizing with given related to this virtual SU are set to zero. In what follows, we until convergence.Firstly, with given the assume that SU is included in the SU set . The following value of is optimized as indicator function is introduced as (26) (31) Then, the constraint (18) can be rewritten as (27) It is observed that P2 is still highly non-convex and hard to be solved with standard methods. In the following, we solve (32) P2 with the dual optimization method [47] and the block coordinate descent (BCD) method [48]. Since increases as increases if is nonzero or It is seen that the optimization variables for all the channel keeps unchanged as increases if is zero, the indicator fading states are coupled in constraint (27). Thus, it makes function may decrease from to or sense to adopt dual decomposition by forming the Lagrangian remainunchangedas increases.Thus,theobjectivefunction function to relax the coupling constraint (27) as given by [47] in (31) is maximized at the maximum allowable given by (28) (33) where isthedualvariableassociatedwiththeconstraint(27). Then, the Lagrange dual function is written as [47] Next,withgiven thevalueof isoptimized as (29) constraints (16) (17) (22) (25) Using (28), we can rewrite the above problem as (34) where (35) where Let (30) . It is easily constraints (16) (17) (22) (25) seen that is a monotonically decreasing function of . Thus, through the dual decomposition, P2 is separated into It is noted that the objective function in (34) now becomes two levels of optimization. At the lower level, we have the From (26), if , subproblems, one for each channel fading state as given by we have From (6)-(8), we can the problem in (30). At the higher level, we have the master reformulate the inequality as a set of inequalities 7 given by where transmission, i.e., , then the secrecy rate of the PU becomes (36) (46) The following indicator function is then introduced as and constraint (44) is rewritten as (37) (47) (48) Based on the above reformulation, we can rewrite where as Then, the problem in (49) (34) is reformulated as (38) (50) (39) Clearly, in (46) is a non-decreasing function of . Thus, Based on the above reformulation of the problem in (34), its the transmit power of the SU scheduled for jamming can be solution can be obtained by first deriving optimal ’s, one set to its maximum allowable value, i.e., ,in for each of the inner maximization problems in (38), and then order to decrease the PU secrecy outage probability as low as picking the one that minimizes the objective function in (38). possible. Therefore, assuming that SU is scheduled for The following theorem presents the optimal solution to the information transmission, the problem in (41) is simplified as problem in (38). Theorem 1: The optimal solution to the problem in (38) (51) is given by where and is given by (52) where (40) (53) and and Proof: Please refer to Appendix C. Then,withgiven ,thevalueof isoptimized as (54) Let . It is easily seen that (41) isamonotonicallyincreasingfunctionof .Itisnoted (42) that the objective function in (51) now becomes From (54), the inequality can be rewritten (43) as a set of inequalities given by where (44) (45) (55) Since only one SU can be scheduled for information trans- mission, i.e., only one can be nonzero, we can solve Then, we can rewrite as the problem in (41) by first deriving optimal power where allocations, one for each of the total SUs, and then selecting the one that maximizes the objective function in (56) (41). Assuming that SU is scheduled for information 8 Algorithm 1 Proposed joint SU scheduling, power and time Then, the problem in (51) can be rewritten as allocation algorithm based on the dual optimization method (57) and the BCD method. 1: Initialize , , and (58) . 2: repeat Therefore, the problem in (51) can be solved by first solving 3: For each channel fading state, do the following steps the inner maximization problem in (57) for each and 4-12. then selecting the one that minimizes the objective function in 4: Initialize , (57). The following theorem presents the optimal solution to 5: repeat the problem in (57). 6: for all such that do Theorem 2: The optimal solution to the problem in (57) is 7: For all , calculate from (59). given by where is given by 8: Calculate from (60) and obtain . 9: end for 10: Calculate as , and let for all . 11: Obtain from (33), and then obtain according to Theorem . 12: until improvement of the objective function value in (30) converges to a prescribed accuracy. (59) 13: Update and 14: (60) 15: until where is the accuracy, is a sequence of step sizes. (61) polynomialinthenumberofdualvariables[47],itscomplexity (62) is . In each iteration of obtaining , , and requires calculations, where is the number (63) of iterations for the BCD method to converge. Thus, the total complexity of Algorithm 1 is which is linear in the number of SUs and the number of EAVs. V. EXTENSIONS (64) A. Collusive EAVs Here, we consider the EAVs are collusive and perfect CSI is available at the SUs. The case of unknown EAVs’ CSI is discussed in Section V-C. It can be noted that the summation term in (9) makes the problem highly intractable. For this, considering the fact that at most one is nonzero, (65) a lower bound on in (10) denoted as is proposed by ignoring the interference term in the second part of (9). Using , the PU secrecy outage probability Proof: Please refer to Appendix D. Once is obtained for each by searching over all is an upper bound on and thus the possible SU schedulings, the solution to the problem in PU secrecy constraint in (11) must be satisfied if (41) is the one that maximizes the objective function in (51). holds. By following the procedures used in Section IV, P1 The index of the SU scheduled for information transmission with collusive EAVs can be solved with an algorithm similar is obtained as ,and we to Algorithm 1. The details are omitted here due to page limit. then have obtained from Theorem and Note that if , then all the SUs are B. Greedy Algorithms scheduled for jamming. The proposed algorithm based on the dual optimization In this subsection, we consider that the PU is greedy and method and the BCD method is summarized in Algorithm 1. requires the cooperative SUs to minimize the PU secrecy Remark 1: The complexity of Algorithm 1 is analyzed as outageprobabilitywithperfectCSI availableattheSUs.Based follows. Since the subgradient method used to update is on this motivation, we formulate the optimization problem as 9 (P3) . Then, the problem in (67) reduces to the following problem as (70) (66) It can be verified that the above problem is non-linear and (13) (17) (19) non-convex.Since is restricted in the narrow interval , we can apply a one-dimensional search algorithm (such as where the value of is a very large positive number. The the fminbnd function in MATLAB) within the interval second part of the objective function in (66) is introduced as to find the optimal . The overall algorithm with unknown a penalty function for punishing causing secrecy outage to the EAVs’ CSI is summarized in Algorithm 2. PU. It can be verified that Propositions 1-2 still hold for P3. Based on Propositions 1-2 and using the indicator function in Algorithm 2 Proposed algorithm with unknown EAVs’ CSI. (26), P3 can be reformulated and then decoupled into parallel subproblemswith the same structure,each for one fading state 1: Obtain as . as given by the problem in (30). Thus, using the BCD method 2: Obtain by solving the problem in (70) via one- adopted in Section IV, the solution for the case of perfect CSI dimensional search algorithms and let . with non-collusive EAVs can be obtained. As for the case of 3: Let collusive EAVs, the method proposed in Sections V-A can be and for all used to solvethe problem.We omitthe detailsherefor brevity. C. Unknown EAVs’ CSI VI. SIMULATION RESULTS Here, this subsection investigates the unknown EAVs’ CSI In this section, we verify the effectiveness of the proposed case. We assume that the instantaneous values as well as algorithms by Monte Carlo simulations. When performing the distribution information of and are unknown. simulations, the PTx is located at the center, the PRx is In such a case, it is impossible to theoretically guarantee the randomly deployed in a ring with inner radius meter and PU secrecy constraint in (11). Instead, we design an efficient outer radius meter, while the CHAP, the SUs and the EAVs algorithm that can decrease the PU secrecy outage probability arerandomlydeployedinaringwithinnerradius meterand as much as possible in what follows. Firstly, in order to let outer radius meter. The channel power gains are modeled the PU achieve a higher secrecy rate, the value of is set as where represents the large-scale pathloss to zero and the value of is set to its maximum allowable modeled as dB with denoting the distance, value . Secondly,inorderto letthe SU achieveasatisfac- and is the normalized small-scale fading with exponential tory performance, the SU with the maximum communication distribution. Besides, we set , bits/s/Hz, channel power gain to the CHAP is scheduled for information dBW, dBW and dBW. For the transmission in the WIT phase, i.e., purpose of comparison, a benchmark algorithm without SU’s where . Thirdly, in order to interfere cooperation is considered. The benchmark algorithm assumes with the EAVs to the most extent, the transmit power of the that the PRx is wireless powered and supports full-duplex SU scheduled for jamming is set to the maximum allowable communication,andthusthe PRx can sendjammingsignalsto power, i.e., for all . Then, the remaining the EAV using the harvestedenergyby powersplitting, similar variables are optimized to maximize the SU rate to the one proposed in [30]. given by Fig. 2a and Fig. 2b show the SU ergodic rate and the PU secrecyoutageprobabilityagainsttherequiredPUsecrecyout- (67) age probability reduction , respectively. Since the greedy algorithm does not apply the PU secrecy constraint, the value (68) of has no impact on the SU ergodic rate and the PU se- crecyoutageprobabilityachievedbythegreedyalgorithm.Itis (69) shown that, as increases, the SU ergodic rate and the PU It can be verified that the optimal solution to the problem in secrecy outage probability achieved by Algorithm 1 decrease (67)satisfies .Itisprovedbrieflyhere.Supposethat and are higher than that achieved by the greedy algorithm. the optimal solution satisfies . Then, the value of This is because that when dealing with the PU secrecy outage can be increased to satisfy and such solution probability, Algorithm 1 aims to guarantee the reduction of provides the same objective function value and satisfies the the PU secrecy outage probability, while the greedy algorithm constraints. Thus, the optimal solution shall use up all the aims to minimize the PU secrecy outage probability. It is also available time. It can be also verified that the optimal solution shown that the greedy algorithm achieves significantly lower to the problem in (67) satisfies otherwise, PU secrecy outage probability than the benchmark algorithm, we can increase to get a higher objective function value. and Algorithm 1 outperformsthe benchmarkalgorithm if Basedonthe above analysis,wehave and is not too small and their performance gap increases as 10 0.8 Algorithm 1, non-collusive EAVs 0.75 6.9 Greedy algorithm, non-collusive EAVs 0.7 Algorithm 1, collusive EAVs 6.8 0.65 Greedy algorithm, collusive EAVs Collusive EAVs 0.6 6.7 0.55 6.6 0.5 6.5 0.45 6.4 0.4 6.3 0.35 Algorithm 1 6.2 Non-collusive Greedy algorithm EAVs 0.3 Benchmark algorithm 6.1 Without SU 0 0.05 0.1 0.15 0.2 0 0.05 0.1 0.15 0.2 (a) SU ergodic rate. (b) PU secrecy outage probability. Figure 2. Performance against the secrecy outage probability reduction ( ). increases. As expected, it is seen that the PU secrecy outage achieved by Algorithm 1 and the greedy algorithm increase as probability with collusive EAVs is higher than that with non- increases. This is as expected since more EAVs leads to collusive EAVs. It is interesting to observe that the SU ergodic lower PU secrecy rate that can be achieved as observed from ratewith collusiveEAVsishigherthanthatwithnon-colllusive (8) and (10). It is also shown that with the increase of , EAVs. This can be explained as follows. Since the PU secrecy the SU ergodic rates achieved by both Algorithm 1 and the outage probability with collusive EAVs is higher than that greedyalgorithmincreases.Thisindicatesthata largernumber with non-colllusive EAVs, the SU will have more flexibility in of EAVs is actually beneficial to the SUs for both algorithms. cooperation with the PU for decreasing the PU secrecy outage This can be explained as follows. Since a larger leads to probability. This indicates that it is beneficial to the SUs if the a higher PU secrecy outage probability, this can let the SUs EAVs are collusive. cooperate with the PUs more flexibly and give the SUs more opportunities to achieve a higher SU ergodic rate. Fig. 3a and Fig. 3b show the SU ergodic rate and the PU secrecy outage probability against the number of SUs , respectively. It is shown that, with the increase of ,the SU ergodic rates achieved by Algorithm 1 and the greedy Next, we investigate the performance of the proposed al- algorithm increase. This indicates that increasing the value of gorithm with unknown EAVs’ CSI. Fig. 5a and Fig. 5b show is beneficialto theSUs forbothAlgorithm1 andthegreedy the SU ergodic rate and the PU secrecy outage probability algorithm. This is because that by increasing the number of with unknown EAVs’ CSI against the number of SUs , SUs, there is a much better chance that the scheduled SU respectively. By comparing Fig. 5a with Fig. 3a, it is seen has more harvested energy and better channel conditions to that the SU ergodic rate with unknown EAVs’ CSI drops achievea higherrate.It isalso shownthat, with the increaseof significantly compared to the one with perfect CSI. From Fig. , the PU secrecy outage probability achieved by Algorithm 5b,it is shownthat the PU secrecyoutageprobabilityachieved 1 keeps constant, while the PU secrecy outage probability bytheproposedalgorithmwithunknownEAVs’CSIdecreases achieved by the greedy algorithm decreases. This indicates as increases and is lower than that without SU when is that increasing the value of is beneficial to the PU only not small. This indicatesthat as long as is sufficiently large, for the greedy algorithm. The above differences between the the PU security performance can be improved significantly two algorithms lie in the fact that the aim of Algorithm 1 is even without knowlwdge of EAVs’ CSI. Further in Fig. 6, to maximize the SU ergodic rate with guaranteed reduction of we show the PU secrecy outage probability with unknown the PU secrecy outage probability while the aim of the greedy EAVs’ CSI against the number of EAVs . Note that, since algorithm is to minimize the PU secrecy outage probability. the proposed algorithm with unknown EAVs’ CSI does not Besides, it is shown that both Algorithm 1 and the greedy dependsonanyinformationonEAVs,theachievedSUergodic algorithm outperform the benchmark algorithm in terms of rate is constant as changes. It is shown that the PU secrecy PU secrecy outageprobability,and the gapbetweenthe greedy outage probability achieved by the proposed algorithm with algorithmand the benchmarkalgorithmincreasesgreatly as unknown EAVs’ CSI increases as increases and is largerly increases. lower than that without SU. From Fig. 5 and Fig. 6, we Fig. 4a and Fig. 4b show the SU ergodic rate and the PU conclude that with unknown EAVs’ CSI, the SU performance secrecy outage probability against the number of EAVs ,re- isgreatlydegradedwhilethe PU securityperformancecanstill spectively. It is shown that the PU secrecy outage probabilities be improved largely by the proposed algorithm. SU ergodic rate (bits/s/Hz) PU secrecy outage probability 11 0.8 0.7 Algorithm 1 Collusive EAVs Greedy algorithm 0.6 Benchmark algorithm 7 Without SU 0.5 0.4 Non-collusive EAVs 0.3 Algorithm 1, non-collusive EAVs Greedy algorithm, non-collusive EAVs Algorithm 1, collusive EAVs Greedy algorithm, collusive EAVs 20 40 60 80 100 120 140 160 180 200 20 40 60 80 100 120 140 160 180 200 (a) SU ergodic rate. (b) PU secrecy outage probability. Figure 3. Performance against the number of SUs ( , ). 6.8 6.7 0.9 0.8 6.6 0.7 Collusive EAVs 6.5 0.6 6.4 0.5 6.3 0.4 6.2 Non-collusive 6.1 0.3 EAVs Algorithm 1, non-collusive EAVs Algorithm 1 Greedy algorithm, non-collusive EAVs Greedy algorithm Algorithm 1, collusive EAVs Benchmark algorithm 5.9 Greedy algorithm, collusive EAVs 0.2 Without SU 5.8 4 6 8 101214 16 4 6 8 1012 1416 (a) SU ergodic rate. (b) PU secrecy outage probability. Figure 4. Performance against the number of EAVs ( , ). VII. CONCLUSIONS SUs is beneficial to both the SU and the PU, and increasing the number of EAVs degrades the PU security performance This paper proposes a new cooperative protocol for the while actually improves the SU performance. It is also shown CWPCN to cooperate with the PU to improve the security that, compared to non-collusive EAVs, collusive EAVs are performance of the PU who faces security threats from EAVs. more harmful to the PU while actually are more beneficial In the protocol, the SUs first harvest energy and then use the to the SUs. Besides, it is shown that with unknown EAVs’ harvestedenergyto interferewith theEAVsandgaintheirown CSI, the SU performance is significantly degraded while the transmissionopportunitiesat the same time. Assumingthat the PU security performance can still be improved significantly CSI is perfect and the EAVs are collusive/non-collusive, we by the proposed algorithm. propose joint SU scheduling, power and time allocation algo- rithms based on the dual optimization method and the BCD There are some possible extensions for the work in this method to maximize the SU ergodicrate underthe PU secrecy paper. First, we have considered a single primary commu- constraint. In addition, we also propose more PU favorable nication link in this paper, while it would be interesting to greedy algorithms aimed at minimizing the PU secrecy outage extend the results to support multiple primary links. In such probability. For the more practical unknown EAVs’ CSI case, a case, the SUs shall comply with the PU secrecy constraints we furthermore propose an efficient algorithm for the SUs to for multiple primary communications links and the resource improve the PU security performance. allocation shall achieve a balance among the requirements Extensive simulations show that increasing the number of of different primary communication links. Second, we have SU ergodic rate (bits/s/Hz) SU ergodic rate (bits/s/Hz) PU secrecy outage probability PU secrecy outage probability 12 0.8 Unknown EAVs'' CSI 0.7 0.9 0.6 0.8 0.5 0.7 0.4 0.6 0.3 0.5 0.4 0.2 Unknown EAVs' CSI, non-collusive EAVs Unknown EAVs' CSI, collusive EAVs 0.3 Greedy algorithm with perfect CSI, non-collusive EAVs Greedy algorithm with perfect CSI, collusive EAVs 0.2 Without SU, non-collusive EAVs Without SU, collusive EAVs 0.1 0.1 20 40 60 80 100 120 140 160 180 200 20 40 60 80 100 120 140 160 180 200 (a) SU ergodic rate. (b) PU secrecy outage probability. Figure 5. Performance with unknown EAVs’ CSI against the number of SUs ( ). 0.9 value of is chosen such that 0.8 It can be easily seen that all the constraints of P1 are 0.7 still satisfied by . Thus, the so- 0.6 lution is a feasible solution to 0.5 P1. It can be seen that both and 0.4 achieve the same objective func- tionin(12).Thismeansthat isalso 0.3 an optimal solution to P1 and thus the optimal solution to P1 can always use up all the available transmit power of the PU. Unknown EAVs' CSI, non-collusive EAVs 0.2 This completes the proof. Unknown EAVs' CSI, collusive EAVs Greedy algorithm with perfect CSI, non-collusive EAVs Greedy algorithm with perfect CSI, collusive EAVs APPENDIX B Without SU, non-collusive EAVs PROOF OF PROPOSITION 2 Without SU, collusive EAVs 0.1 Suppose that is the optimal so- 4 6 8 10 12 14 16 lution to P1 that satisfies Then, we con- structanothersolution thatsatisfies Figure 6. PU secrecy outage probability with unknown EAVs’ CSI against the number of EAVs ( ). where The value of is chosen such that It can be easily verified that all the constraints of P1 still hold for . considered that both the SU and the EAV are equipped with a Thus, is a feasible solution to P1. singleantenna,whileequippingmultipleantennascanenhance Since the values of the the performance of the SU and the EAV. In such a case, objectivefunctionin (12)achievedbythetwosolutionsarethe multiple antennas at the SU can let the SU interfere with same. This means that the optimal solution to P1 can always the EAV more efficiently using beamforming technologies, use up all the available unit time. This completes the proof. while multiple antennasat the EAV can let the EAV eavesdrop the primary communication more conveniently using diversity combining technologies, and thus extending the results to this APPENDIX C case is also interesting. PROOF OF THEOREM 1 After a few mathematical manipulations, the inequality APPENDIX A can be rewritten as PROOF OF PROPOSITION 1 (71) Suppose that denote the opti- mal solution to P1 that satisfies where Then, Then,we consideranothersolution that satisfies we can make the following discussions on the value of where The : PU secrecy outage probability SU ergodic rate (bits/s/Hz) PU secrecy outage probability 13 Case 1: In this case, the inequality Case 3: In this case, is reformulated as Thus the inequality is equals to if the inequality satisfied only if where holds and equals to otherwise. and Case 2: In this case, considering the fact that , the inequality cannot be satisfied. Thus, we have if Therefore, equals to . and otherwise. Let denote the optimal solution to the inner maximization Based on the abovediscussions on for a given problem in (38) for a given . Based on the above the optimal solution of the inner maximization problem in discussions, we can make discussions on as: (57), , is discussed in the following three cases: Case 1: In this case, we discuss the value of Case 1: In this case, in two subcases. In the subcase of ,thevalue and thus the objective function be- of equals to under the constraint comes Therefore, it is easy to check that (39), and thus . In the subcase of , due to the fact that is an increasing the value is the critical value of over which function of Case 2: In this case, we have the value of changes from to under the constraint (39). Thus the inner maximization only if Considering the problem in (38) is maximized at two possible points as constraint if or given by , the objective function in (57) becomes and thus . Otherwise, under the condition the objective function in (57) is (72) if andis if Case 2: In this case, since Therefore, assuming that we have equals to under the constraint (39), we can easily have if and The above discussions lead to the expression of given by otherwise. In summary, we have (73) (74) Therefore, the optimal solution of the problem in (38) is Case 3: In this case, we have given by where only if Considering the constraint the value of is discussed in the following five subcases. APPENDIX D – Subcase 1: or .In this PROOF OF THEOREM 2 subcase, the objective function in (57) becomes Thus, in what follows, we focus on solving the inner and thus we have maximization problem in (57). For a given after a few – Subcase 2: , In this mathematical manipulations, the inequality can be subcase, the objective function in (57) is if rewrittenas where and is if and aregivenby(60),(64)and(65),respectively.Clearly, Therefore,since is an increasing function Then, we can make the following observations on of the maximum value of the objective function the value of : in (57) is attained at or as given by Case 1: Inthiscase,theinequality cannot be satisfied and (75) thus we have . Case 2: Inthiscase,theinequality – Subcase 3: , In this subcase, is satisfied only if the objective function in (57) is and thus the .Thus wehave if and maximum value of the objective function is attained otherwise. at 14 – Subcase 4: In this subcase, [15] K. Tourki and M. O. Hasna, “Proactive spectrum sharing incentive for physical layer security enhancement using outdated csi,” IEEE the objective function in (57) is if Transactions on Wireless Communications, vol. 15, no. 9, pp. 6273– 6283, 2016. and is if [16] F. Zhu and M. Yao, “Improving physical-layer security for crns using or Therefore, since is an sinr-based cooperative beamforming,” IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1835–1841, 2016. increasing function of the maximum value of the [17] A.Al-Talabani, Y.Deng, A.Nallanathan, and H.X.Nguyen,“Enhancing objective function in (57) is attained at or secrecy rate in cognitive radio networks via stackelberg game,” IEEE Transactions on Communications, vol. 64, no. 11, pp. 4764–4775, 2016. as given by [18] D.Xu and Q.Li,“Optimal power allocation for cognitive radio networks with primary user secrecy rate loss constraint,” in Proceedings of IEEE International Conference on Communications, 2015, pp. 7615–7621. (76) [19] M. Qin, S. Yang, H. Deng, and M. H. Lee, “Enhancing security of primary user in underlay cognitive radio networks with secondary user selection,” IEEE Access, vol. 6, pp. 32624–32636, 2018. – Subcase 5: In this [20] L. Tang and Q. Li, “Wireless power transfer and cooperative jamming for secrecy throughput maximization,” IEEE Wireless Communications subcase, the objective function in (57) is if Letters, vol. 5, no. 5, pp. 556–559, 2016. and is if [21] W. Liu, X. Zhou, S. Durrani, and P. Popovski, “Secure communica- Thus, the maximum value of the objective tion with a wireless-powered friendly jammer,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 401–415, 2016. function is attained at [22] W. Yang, W. Mou, X. Xu, W. Yang, and Y. Cai, “Energy efficiency Based on the above discussions, the optimal solution of analysis and enhancement for secure transmission in swipt systems exploiting full duplex techniques,” IET Communications, vol. 10, no. 14, the inner maximization problem in (57), , is summa- pp. 1712–1720, 2016. rized by expression (59). Then, the optimal solution of the [23] H. Yu, S. Guo, Y. Yang, L. Ji, and Y. Yang, “Secrecy energy efficiency problem in (57) is given by where optimization for downlink two-user ofdma networks with swipt,” IEEE Systems Journal, https://doi.org/10.1109/JSYST.2017.2775607. This completes the proof. [24] J. Moon, H. Lee, C. Song, and I. Lee, “Secrecy performance opti- mization for wireless powered communication networks with an energy harvesting jammer,” IEEE Transactions on Communications, vol. 65, REFERENCES no. 2, pp. 764–774, 2017. [25] M. Liu and Y. Liu, “Power allocation for secure swipt systems with [1] Y.-C. Liang, K.-C. Chen, G. Y. Li, and P. Mahonen, “Cognitive radio wireless-powered cooperative jamming,” IEEE Communications Letters, networking and communications: An overview,” IEEE Transactions on vol. 21, no. 6, pp. 1353–1356, 2017. Vehicular Technology, vol. 60, no. 7, pp. 3386–3407, 2011. [26] G. Zhang, J. Xu, Q. Wu, M. Cui, X. Li, and F. Lin, “Wireless powered [2] A.Goldsmith, S.A.Jafar, I.Maric, and S.Srinivasa, “Breaking spectrum cooperative jamming for secure ofdm system,” IEEE transactions on gridlock with cognitive radios: An information theoretic perspective,” vehicular technology, vol. 67, no. 2, pp. 1331–1346, 2018. Proceedings of the IEEE, vol. 97, no. 5, pp. 894–914, 2009. [27] A. Singh, M. R. Bhatnagar, and R. K. Mallik, “Secrecy outage of a [3] A. D. Wyner, “The wire-tap channel,” The bell system technical journal, simultaneous wireless information and power transfer cognitive radio vol. 54, no. 8, pp. 1355–1387, 1975. system,” IEEE Wireless Communications Letters, vol. 5, no. 3, pp. 288– [4] X. Ge, H. Jin, J. Zhu, J. Cheng, and V. C. Leung, “Exploiting oppor- 291, 2016. tunistic scheduling in uplink wiretap networks,” IEEE Transactions on [28] D. W. K. Ng, E. S. Lo, and R. Schober, “Multiobjective resource Vehicular Technology, vol. 66, no. 6, pp. 4886–4897, 2017. allocation for secure communication in cognitive radio networks with [5] D. Xu and Q. Li, “Resource allocation for cognitive radio with primary wireless information and power transfer,” IEEE Transactions on Vehic- user secrecy outage constraint,” IEEE Systems Journal, vol. 12, no. 1, ular Technology, vol. 65, no. 5, pp. 3166–3184, 2016. p. 893, 2018. [29] Y. Wu and X. Chen, “Robust beamforming and power splitting for [6] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks secrecy wireless information and power transfer in cognitive relay with rf energy harvesting: A contemporary survey,” IEEE Communica- networks,” IEEE Communications Letters, vol.20, no.6,pp.1152–1155, tions Surveys & Tutorials, vol. 17, no. 2, pp. 757–789, 2015. [7] D. Xu and Q. Li, “Optimization of wireless information and power [30] J. Zhang, G. Pan, and H.-M. Wang, “On physical-layer security in transfer in multiuser ofdm systems,” AEU-International Journal of underlay cognitive radio networks with full-duplex wireless-powered Electronics and Communications, vol. 90, pp. 171–174, 2018. secondary system,” IEEE Access, vol. 4, pp. 3887–3893, 2016. [8] K. Huang and X. Zhou, “Cutting the last wires for mobile communica- [31] X. Chen, L. Guo, X. Li, C. Dong, J. Lin, and P. T. Mathiopoulos, tions by microwave power transfer,” IEEE Communications Magazine, “Secrecy rate optimization for cooperative cognitive radio networks vol. 53, no. 6, pp. 86–93, 2015. aided by a wireless energy harvesting jammer,” IEEE Access, 2018. [9] H. Ju and R. Zhang, “Throughput maximization in wireless powered [32] P. Yan, Y. Zou, and J. Zhu, “Energy-aware multiuser scheduling for communication networks,” IEEE Transactions on Wireless Communica- physical-layer security in energy-harvesting underlay cognitive radio tions, vol. 13, no. 1, pp. 418–428, 2014. systems,” IEEE Transactions on Vehicular Technology, vol. 67, no. 3, [10] D. Xu and Q. Li, “Joint power control and time allocation for wireless pp. 2084–2096, 2018. powered underlay cognitive radio networks,” IEEE Wireless Communi- [33] L. Chen, L. Huang, H. Xu, C. Yang, Z. Sun, and X. Wang, “Primary cations Letters, vol. 6, no. 3, pp. 294–297, 2017. secrecy is achievable: Optimal secrecy rate in overlay crns with an [11] S. Lee and R. Zhang, “Cognitive wireless powered network: Spectrum energy harvesting secondary transmitter,” in proceedings of International sharing models and throughput maximization,” IEEE Transactions on Conference on Computer Communication and Networks, 2015, pp. 1–6. Cognitive Communications and Networking, vol. 1, no. 3, pp. 335–346, [34] L. Chen, L. Huang, H. Sun, H. Xu, and C. Yang, “Achieving primary secrecy in energy harvesting crns using stackelberg game,” in proceed- [12] D. Xu and Q. Li, “Cooperative resource allocation in cognitive radio ings of International Conference on Wireless Communications & Signal networks with wireless powered primary users,” IEEE Wireless Com- Processing, 2015, pp. 1–5. munications Letters, vol. 6, no. 5, pp. 658–661, 2017. [13] ——, “Improving physical-layer security for primary users in cognitive [35] D. Wang, P. Ren, Q. Du, L. Sun, and Y. Wang, “Primary secure radio networks,” IET Communications, vol. 11, no. 15, pp. 2303–2310, communication with the cooperation of energy harvesting secondary 2017. system,” in proceedings of IEEE Vehicular Technology Conference Fall, [14] N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, “Cooperative secure 2016, pp. 1–5. resource allocation in cognitive radio networks with guaranteed secrecy [36] L.Jiang, H.Tian, C. Qin, S.Gjessing, and Y. Zhang, “Secure beamform- rate for primary users,” IEEE transactions on wireless communications, ing in wireless-powered cooperative cognitive radio networks,” IEEE vol. 13, no. 2, pp. 1058–1073, 2014. Communications Letters, vol. 20, no. 3, pp. 522–525, 2016. 15 [37] M. A. Kishk and H. S. Dhillon, “Coexistence of rf-powered iot and a primary wireless network with secrecy guard zones,” IEEE Transactions on Wireless Communications, vol. 17, no. 3, pp. 1460–1473, 2018. [38] P. J. Smith, P. A. Dmochowski, H. A. Suraweera, and M. Shafi, “The effects of limited channel knowledge on cognitive radio system capacity,” IEEE Transactions on Vehicular Technology, vol. 62, no. 2, pp. 927–933, 2013. [39] F. Simjee and P. H. Chou, “Everlast: long-life, supercapacitor-operated wireless sensor node,” in International Symposium on Low Power Electronics and Design, 2006, pp. 197–202. [40] O. Ozel, K. Shahzad, and S. Ulukus, “Optimal energy allocation for energy harvesting transmitters with hybrid energy storage and processing cost,” IEEE Transactions on Signal Processing, vol. 62, no. 12, pp. 3232–3245, 2014. [41] X. Kang, C. K. Ho, and S. Sun, “Full-duplex wireless-powered commu- nication network with energy causality,” IEEE Transactions on Wireless Communications, vol. 14, no. 10, pp. 5539–5551, 2015. [42] Y. Zou, X. Li, and Y.-C. Liang, “Secrecy outage and diversity analysis of cognitive radio systems,” IEEE Journal on Selected Areas in Com- munications, vol. 32, no. 11, pp. 2222–2236, 2014. [43] C. Greene, “RF wireless power: An enabling technology,” Powercast Corporation, Tech. Rep., 2014. [Online]. Available: http://www.powercastco.com/documentation/ [44] M. Zhang, Y. Liu, and R. Zhang, “Artificial noise aided secrecy information and power transfer in ofdma systems,” IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 3085–3096, 2016. [45] H. Koorapaty, A. A. Hassan, and S. Chennakeshu, “Secure information transmission for mobile radio,” IEEE Communications Letters,vol. 4, no. 2, pp. 52–55, 2000. [46] R. Fan, Y. Zheng, J. An, H. Jiang, and X. Li, “Dynamic pricing over multiple rounds of spectrum leasing in cognitive radio,” IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1782–1789, [47] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Cambridge Univ. Press, 2004. [48] D. P. Bertsekas, Nonlinear programming. Athena scientific Belmont, [49] W. Yu and R. Lui, “Dual methods for nonconvex spectrum optimiza- tion of multicarrier systems,” IEEE Transactions on Communications, vol. 54, no. 7, pp. 1310–1322, 2006.

Journal

Electrical Engineering and Systems SciencearXiv (Cornell University)

Published: Sep 29, 2018

There are no references for this article.