ON SECURITY OF COGNITIVE RADIO NETWORKS: AN INFORMATION THEORETIC MODEL WITH WIRETAP CHANNELS

Congduan Li

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 12 - Chapter in an edited book (Author)peer-review

Abstract

In this chapter, we will study the security issues of cognitive radio networks. One big challenge in cognitive radio networks is how to protect the transmitted information under wiretapping, especially for the primary users of the frequency band, since the wireless channels are open and public. The most popular way is to encode the source with a secrecy key. However, if the secrecy key is fixed, even it is long and hard to decrypt, there still exists risk of being decrypted in a long enough time period. For absolutely security, one may need to use random key at each time step, and the information can be decoded successfully only if one collects sufficient number of packets for that particular time step. This is referred as information theoretic secrecy. We will study the information theoretical secrecy in a multi-source network model, which can represent the cognitive radio networks with wiretapping channels. The optimality of superposition (source separation) coding will also be investigated.
Original languageEnglish
Title of host publicationCOGNITIVE RADIO NETWORKS
Subtitle of host publicationPERFORMANCE, APPLICATIONS AND TECHNOLOGY
EditorsCHEE WEI TAN
PublisherNova Science Publishers
Chapter10
Pages291-312
ISBN (Electronic)9781536130690
ISBN (Print)9781536130683
Publication statusPublished - Mar 2018

Publication series

NameELECTRONICS AND TELECOMMUNICATIONS RESEARCH

Bibliographical note

Full text of this publication does not contain sufficient affiliation information. With consent from the author(s) concerned, the Research Unit(s) information for this record is based on the existing academic department affiliation of the author(s).

Research Keywords

  • Cognitive networks
  • Information theory
  • Multilevel diversity coding
  • Security

Fingerprint

Dive into the research topics of 'ON SECURITY OF COGNITIVE RADIO NETWORKS: AN INFORMATION THEORETIC MODEL WITH WIRETAP CHANNELS'. Together they form a unique fingerprint.

Cite this