TY - CHAP
T1 - ON SECURITY OF COGNITIVE RADIO NETWORKS
T2 - AN INFORMATION THEORETIC MODEL WITH WIRETAP CHANNELS
AU - Li, Congduan
N1 - Full text of this publication does not contain sufficient affiliation information. With consent from the author(s) concerned, the Research Unit(s) information for this record is based on the existing academic department affiliation of the author(s).
PY - 2018/3
Y1 - 2018/3
N2 - In this chapter, we will study the security issues of cognitive radio networks. One big challenge in cognitive radio networks is how to protect the transmitted information under wiretapping, especially for the primary users of the frequency band, since the wireless channels are open and public. The most popular way is to encode the source with a secrecy key. However, if the secrecy key is fixed, even it is long and hard to decrypt, there still exists risk of being decrypted in a long enough time period. For absolutely security, one may need to use random key at each time step, and the information can be decoded successfully only if one collects sufficient number of packets for that particular time step. This is referred as information theoretic secrecy. We will study the information theoretical secrecy in a multi-source network model, which can represent the cognitive radio networks with wiretapping channels. The optimality of superposition (source separation) coding will also be investigated.
AB - In this chapter, we will study the security issues of cognitive radio networks. One big challenge in cognitive radio networks is how to protect the transmitted information under wiretapping, especially for the primary users of the frequency band, since the wireless channels are open and public. The most popular way is to encode the source with a secrecy key. However, if the secrecy key is fixed, even it is long and hard to decrypt, there still exists risk of being decrypted in a long enough time period. For absolutely security, one may need to use random key at each time step, and the information can be decoded successfully only if one collects sufficient number of packets for that particular time step. This is referred as information theoretic secrecy. We will study the information theoretical secrecy in a multi-source network model, which can represent the cognitive radio networks with wiretapping channels. The optimality of superposition (source separation) coding will also be investigated.
KW - Cognitive networks
KW - Information theory
KW - Multilevel diversity coding
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85048412559&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-85048412559&origin=recordpage
M3 - RGC 12 - Chapter in an edited book (Author)
SN - 9781536130683
T3 - ELECTRONICS AND TELECOMMUNICATIONS RESEARCH
SP - 291
EP - 312
BT - COGNITIVE RADIO NETWORKS
A2 - TAN, CHEE WEI
PB - Nova Science Publishers
ER -