ترغب بنشر مسار تعليمي؟ اضغط هنا

Exploiting Deep Learning for Secure Transmission in an Underlay Cognitive Radio Network

68   0   0.0 ( 0 )
 نشر من قبل Miao Zhang
 تاريخ النشر 2021
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

This paper investigates a machine learning-based power allocation design for secure transmission in a cognitive radio (CR) network. In particular, a neural network (NN)-based approach is proposed to maximize the secrecy rate of the secondary receiver under the constraints of total transmit power of secondary transmitter, and the interference leakage to the primary receiver, within which three different regularization schemes are developed. The key advantage of the proposed algorithm over conventional approaches is the capability to solve the power allocation problem with both perfect and imperfect channel state information. In a conventional setting, two completely different optimization frameworks have to be designed, namely the robust and non-robust designs. Furthermore, conventional algorithms are often based on iterative techniques, and hence, they require a considerable number of iterations, rendering them less suitable in future wireless networks where there are very stringent delay constraints. To meet the unprecedented requirements of future ultra-reliable low-latency networks, we propose an NN-based approach that can determine the power allocation in a CR network with significantly reduced computational time and complexity. As this trained NN only requires a small number of linear operations to yield the required power allocations, the approach can also be extended to different delay sensitive applications and services in future wireless networks. When evaluate the proposed method versus conventional approaches, using a suitable test set, the proposed approach can achieve more than 94% of the secrecy rate performance with less than 1% computation time and more than 93% satisfaction of interference leakage constraints. These results are obtained with significant reduction in computational time, which we believe that it is suitable for future real-time wireless applications.

قيم البحث

اقرأ أيضاً

In this paper, we investigate different secrecy energy efficiency (SEE) optimization problems in a multiple-input single-output underlay cognitive radio (CR) network in the presence of an energy harvesting receiver. In particular, these energy effici ent designs are developed with different assumptions of channels state information (CSI) at the transmitter, namely perfect CSI, statistical CSI and imperfect CSI with bounded channel uncertainties. In particular, the overarching objective here is to design a beamforming technique maximizing the SEE while satisfying all relevant constraints linked to interference and harvested energy between transmitters and receivers. We show that the original problems are non-convex and their solutions are intractable. By using a number of techniques, such as non-linear fractional programming and difference of concave (DC) functions, we reformulate the original problems so as to render them tractable. We then combine these techniques with the Dinkelbachs algorithm to derive iterative algorithms to determine relevant beamforming vectors which lead to the SEE maximization. In doing this, we investigate the robust design with ellipsoidal bounded channel uncertainties, by mapping the original problem into a sequence of semidefinite programs by employing the semidefinite relaxation, non-linear fractional programming and S-procedure. Furthermore, we show that the maximum SEE can be achieved through a search algorithm in the single dimensional space. Numerical results, when compared with those obtained with existing techniques in the literature, show the effectiveness of the proposed designs for SEE maximization.
Understanding the performance of cognitive radio systems is of great interest. To perform dynamic spectrum access, different paradigms are conceptualized in the literature. Of these, Underlay System (US) has caught much attention in the recent past. According to US, a power control mechanism is employed at the Secondary Transmitter (ST) to constrain the interference at the Primary Receiver (PR) below a certain threshold. However, it requires the knowledge of channel towards PR at the ST. This knowledge can be obtained by estimating the received power, assuming a beacon or a pilot channel transmission by the PR. This estimation is never perfect, hence the induced error may distort the true performance of the US. Motivated by this fact, we propose a novel model that captures the effect of channel estimation errors on the performance of the system. More specifically, we characterize the performance of the US in terms of the estimation-throughput tradeoff. Furthermore, we determine the maximum achievable throughput for the secondary link. Based on numerical analysis, it is shown that the conventional model overestimates the performance of the US.
Cognitive radio networks (CRNs) and millimeter wave (mmWave) communications are two major technologies to enhance the spectrum efficiency (SE). Considering that the SE improvement in the CRNs is limited due to the interference temperature imposed on the primary user (PU), and the severe path loss and high directivity in mmWave communications make it vulnerable to blockage events, we introduce an intelligent reflecting surface (IRS) into mmWave CRNs. This paper investigates the robust secure beamforming (BF) design in the IRS-assisted mmWave CRNs. By using a uniform linear array (ULA) at the cognitive base station (CBS) and a uniform planar array (UPA) at the IRS, and supposing that the imperfect channel state information (CSI) of wiretap links is known, we formulate a constrained problem to maximize the worst-case achievable secrecy rate (ASR) of the secondary user (SU) by jointly designing the transmit BF at the CBS and reflect BF at the IRS. To solve the non-convex problem with coupled variables, an efficient alternating optimization algorithm is proposed. As for the transmit BF at the CBS, we propose a heuristic robust transmit BF algorithm to attain the BF vectors analytically. As for the reflect BF at the IRS, by means of an auxiliary variable, we transform the non-convex problem into a semi-definite programming (SDP) problem with rank-1 constraint, which is handled with the help of an iterative penalty function, and then obtain the optimal reflect BF through CVX. Finally, the simulation results indicate that the ASR performance of our proposed algorithm has a small gap with that of the optimal solution with perfect CSI compared with the other benchmarks.
174 - Xuewen Wu , Jingxiao Ma , Zhe Xing 2021
This paper investigates the application of intelligent reflecting surface (IRS) in an underlay cognitive radio network (CRN), where a multi-antenna cognitive base station (CBS) utilizes spectrum assigned to the primary user (PU) to communicate with a secondary user (SU) via IRS in the presence of multiple coordinated eavesdroppers. To achieve the trade-off between the secrecy rate (SR) and energy consumption, we propose a secrecy energy efficiency (SEE) maximization scheme by jointly design the transmit beamforming at CBS and the reflect beamforming at IRS under the SR constraint of SU, the transmit power constraint of CBS, the limited interference temperature of PU and the unit modulus constraint of IRS. The problem is challenging to solve due to the coupled optimization variables and unit modulus constraint, for which an iterative alternating optimization algorithm is proposed. As for optimizing the reflect beamforming, we introduce an auxiliary variable and convert the original non-convex problem into a semi-definite programming with rank-1 constraint, and then propose an iterative penalty function based algorithm to implement the optimal reflect beamforming. As for optimizing the transmit beamforming, we convert the original problem into an equivalent subtractive form, which is further transformed into a convex function by employing the difference of two-convex functions method. Furthermore, we provide a second-order-cone-programming approximation approach to reduce the computational complexity. The effectiveness and superiority of our proposed algorithm are verified in the simulation results.
Blind Null Space Learning (BNSL) has recently been proposed for fast and accurate learning of the null-space associated with the channel matrix between a secondary transmitter and a primary receiver. In this paper we propose a channel tracking enhanc ement of the algorithm, namely the Blind Null Space Tracking (BNST) algorithm that allows transmission of information to the Secondary Receiver (SR) while simultaneously learning the null-space of the time-varying target channel. Specifically, the enhanced algorithm initially performs a BNSL sweep in order to acquire the null space. Then, it performs modified Jacobi rotations such that the induced interference to the primary receiver is kept lower than a given threshold $P_{Th}$ with probability $p$ while information is transmitted to the SR simultaneously. We present simulation results indicating that the proposed approach has strictly better performance over the BNSL algorithm for channels with independent Rayleigh fading with a small Doppler frequency.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا