Transmission over Cognitive Radio Channel with Novel Secure LT Code

DOI: 10.4236/cn.2013.53023   PDF   HTML     4,312 Downloads   6,045 Views   Citations

Abstract

With the increasing of communication applications in recent years, the demand for radio spectral resources has increased significantly. Cognitive radio scenario was proposed to improve spectrum efficiency in wireless communication systems. In cognitive radio network, it is essential that control information is sent securely and reliably. Ensuring the trustworthiness of the transmitting of spectrum sensing information is important in the CR networks since spectrum sensing directly affects spectrum management and incumbent coexistence. In this paper, the first secondary link channel model is presented, then a secure LT Code is proposed to be compatible with presented channel model and acquires good QoS. As we may know, LT code overcomes packet loss when the channel of the SU is reclaimed by PU. In the new proposed combined encoding and ciphered block, a LT code matrix is used to generate a symmetric cryptographic key. Thus, less complexity observed in the processing computation. Besides, cryptographic key is not sent over the channel. As a result, an attacker has no way to eavesdrop the key unless he is prepared to consider all possible key combinations. This replaced block supplies secure controlling channel and increases spectrum efficiency too.

Share and Cite:

E. Hosseini and A. Falahati, "Transmission over Cognitive Radio Channel with Novel Secure LT Code," Communications and Network, Vol. 5 No. 3, 2013, pp. 198-203. doi: 10.4236/cn.2013.53023.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] L. B. Wang and K. J. Ray Liu, “Advances in Cognitive Radio Networks: A Survey,” IEEE Journal of Selected Topics in Signal Processing, Vol. 5, No. 1, 2011, pp. 5-23.
[2] N. Devroye, P. Mitran and V. Tarokh, “Limits on Communications in a Cognitive Radio Channel,” IEEE Communications Magazine, Vol. 44, No. 6, 2006, pp. 44-49. doi:10.1109/MCOM.2006.1668418
[3] Q. Zhao and B. M. Sadler, “Dynamic Spectrum Access: Signal Processing, Networking, and Regulatory Policy,” IEEE Signal Processing Magazine, Vol. 24, 2006, pp. 79-89.
[4] R. Etkin, A. Parekh and D. Tse, “Spectrum Sharing for Unlicensed Bands,” IEEE Journal on Selected Areas in Communications, Vol. 25, No. 3, 2005, pp. 517-528.
[5] S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications,” IEEE Journal on Selected Areas Communications, Vol. 23, No. 2, 2005, pp. 201-220. doi:10.1109/JSAC.2004.839380
[6] A. Nosratinia, T. E. Hunter and A. Hedayat, “Cooperative communication in wireless network,” IEEE Communications Magazine, Vol. 42, No. 10, 2004, pp. 68-73. doi:10.1109/MCOM.2004.1341264
[7] S. Somasundaram and K. P. Subbalakshmi, “3-D Multiple Description Video Coding for Packet Switched Networks,” Proceedings of the IEEE International Conference on Multimedia and Expo, Baltimore, 6-9 July 2003, pp. 589-592.
[8] M. Luby, “LT Codes,” Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, Vancouver, November 2002, pp. 271-282.
[9] J. W. Byers, M. Luby, M. Mitzenmacher and A. Rege, “A Digital Fountain Approach to Reliable Distribution of Bulk Data,” Proceedings of ACM SIGCOMM’98, Vancouver, September 1998, pp. 56-67.
[10] D. J. C. MacKay, “Fountain Codes,” IEEE Communications, Vol. 152, No. 6, 2005, pp. 1062-1068.
[11] K. V. Goenka and R. D. Raut, “Application of Fountain Codes to Cognitive Radio Networks and MBMS—A Review,” International Journal of Computer Applications (0975-8887), Vol. 66, No. 14, 2013, pp. 28-30.
[12] H. Kushwaha and R. Chandramouli, “Secondary Spectrum Access with LT Codes for Delay Constrained Applications,” Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, January 2007, pp. 1017-1021.
[13] A. Ghasemi and E. S. Sousa, “Collaborative Spectrum Sensing for Opportunistic Access in Fading Environments,” Proceedings of IEEE International Symposium on New Frontier in Dynamic Spectrum Access Network, Baltimore, 8-11 November 2005, pp. 131-136.
[14] F. Digham, M.-S. Alouini and M. K. Simon, “On the Energy Detection of Unknown Signals over Fading Channels,” IEEE Transactions on Communictions, 11-15 May 2003, pp. 3575-3579.
[15] G. Ganesan and Y. Li, “Cooperative Spectrum Sensing in Cognitive Radio Networks,” Proceedings of IEEE International Symposium on New Frontier in Dynamic Spectrum Access Network, Baltimore, 8-11 November 2005, pp. 137-143.
[16] H. Urkowitz, “Energy Detection of Unknown Deterministic Signals,” Proceedings of the IEEE, Vol. 55, No. 4, 1967, pp. 523-531. doi:10.1109/PROC.1967.5573
[17] S. Cheng, V. Stankovic and L. Stankovic′, “An Efficient Spectrum Sensing Scheme for Cognitive Radio,” IEEE Signal Processing Letters, Vol. 16, No. 6, 2009, pp. 501-504.

  
comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.