Joint Relay Selection and Power Allocation through a Genetic Algorithm for Secure Cooperative Cognitive Radio Networks
Abstract
:1. Introduction
- Different from the existing researches on physical layer security in both CWSNs and CCRNs such as [9,10,11,12,13,14,15,16,17,18,19,21,22,23,24,25,26] in which some COTs (due to their high computation load) are adopted while causing high complexity and ES (due to high computational time) as well as undesired delays to solve the optimization problem. Therefore, a low-complexity meta-heuristic GA-based scheme is proposed in this paper to solve the optimization problem.
- We develop a meta-heuristic GA to overcome the difficulty arising from the MIP problem due to the coexistence of binary integer and real valued variables in the problem.
- To comprehensively evaluate the SR performance of the proposed scheme, we compare the proposed scheme with opportunistic RS (ORS), partial RS (PRS), and random RS schemes according to the different node locations, numbers of SU relays, maximum permissible transmission power of the SUs, interference thresholds for the PU receiver, variances of the additive white Gaussian noise (AWGN).
- We propose a low complexity GA-based solution which can solve the optimization problem very efficiently with much lower computational complexity and shows a near optimal performance with ES scheme.
- We verify through simulation results that, the proposed scheme achieves highest SR performance than some other conventional schemes with a much lower computational complexity than the ES scheme.
- It is also shown that the computation time of the proposed scheme is effectively reduced until when the maximum SR of the considered CCRNs is archived.
2. Related Works
2.1. SR Maximization of CWSNs and CCRNs
2.2. GA for Resource Allocation in CWSNs and CCRNs
3. System Model
Problem Formulation
4. The Proposed GA-based MRS and PA Scheme for CCRNs
- Step 1 (Initialization): Randomly create populations for all chromosomes .
- Step 3 (Selection operation): In the proposed scheme, we use a roulette wheel selection method to breed a new generation to save the best chromosome.
- Step 4 (Crossover operation): Repeat the crossover operation to generate a new population set with a crossover probability .
- Step 5 (Mutation operation) : Repeat the mutation operation to generate a new population set .
- Step 6 (Repeat): The steps of the proposed scheme will be repeated for the next generation until the generation is completed or converged.
Algorithm 1: Pseudocode of the GA. |
1 Choose an initial random population of individuals 2 Evaluate the fitness of the individuals 3 Repeat 4 Selection operation 5 // Select the best individuals by roulette wheel selection 6 z:= , where 7 sum:= 0; 8 for each chromosome 9 Calculate 10 Calculate 11 if 12 Return 13 end if 14 end for 15 Crossover operation 16 Generate new individuals by using crossover operation of the GA with a crossover probability 17 Mutation operation 18 Mutate the generated offspring with a mutation probability 19 Evaluate the fitness of the new individuals 20 Replace the worst individuals of the population by the new individuals 21 Until the stopping criteria met |
4.1. Steps of the Proposed GA-Based MRS and PA Scheme for SR Maximization
4.1.1. Step 1: Initialization of the Population
4.1.2. Step 2: Evaluation
4.1.3. Step 3: Selection Operation
4.1.4. Step 4: Crossover Operation
4.1.5. Step 5: Mutation Operation
4.1.6. Step 6: Repeat
Algorithm 2: The proposed GA-based MRS and PA scheme for SR maximization. |
1 Input: , , , L, , , , , , , , , T, , and 2 Initialization: 3 Set, ; where 4 GA Initialization (Step 1) 5 Randomly select and allocate power to the SU relays 6 while or not converged do 7 Increase generation counter 8 for to T 9 Calculate 10 Calculate and by using Equations (7) and (8), optimal transmission power of the SU source from Equation (19), and from step 1 of the proposed scheme 11 Calculate and by using Equations (10) and (11) and from step 1 of the proposed scheme 12 Evaluation (Step 2) 13 if the constraints of C.1 (in Equation (15)) and C.4 (in Equation (17)) are satisfied 14 Calculate SR by substituting and in Equation (20) 15 else 16 Secrecy rate 17 end if 18 end for 19 Selection operation (Step 3) 20 Select the best individuals to breed a new generation 21 Crossover operation (Step 4) 22 Perform crossover to produce new offspring with 23 Mutation operation (Step 5) 24 Mutate the resulting new offspring with 25 end while 26 Return the best solution of the problem in Equation (20) |
5. Simulation Results
5.1. SR Performance and Convergence of the Proposed Scheme
5.2. SR Performance with Number of SU relays
5.3. SR Performance with Maximum Permissible Transmission Power
5.4. SR Performance with Acceptable Interference Threshold
5.5. SR Performance with Changing the Distance of the Eavesdropper
5.6. SR Performance with the Variance of the AWGN
5.7. Computational Complexity Analysis
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
- Li, J.; Petropulu, A.P.; Weber, S. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process. 2011, 59, 4985–4996. [Google Scholar] [CrossRef]
- Qin, M.; Yang, S.; Deng, H.; Lee, M.H. Enhancing security of primary user in underlay cognitive radio networks with secondary user selection. IEEE Access 2018, 6, 32624–32636. [Google Scholar] [CrossRef]
- Tran, H.; Kaddoum, G.; Gagnon, F.; Sibomana, L. Cognitive radio network with secrecy and interference constraints. Phys. Commun. 2017, 22, 32–41. [Google Scholar] [CrossRef]
- Kong, L.; Vuppala, S.; Kaddoum, G. Secrecy analysis of random MIMO wireless networks over α channels. IEEE Trans. Veh. Technol. 2018. [Google Scholar] [CrossRef]
- Tolossa, Y.J.; Vuppala, S.; Kaddoum, G.; Abreu, G. On the uplink secrecy capacity analysis in D2D-enabled cellular Network. IEEE Syst. J. 2018, 12, 2297–2307. [Google Scholar] [CrossRef]
- Vuppala, S.; Tolossa, Y.J.; Kaddoum, G.; Abreu, G. On the physical layer security analysis of hybrid millimeter wave networks. IEEE Trans. Commun. 2018, 66, 1139–1152. [Google Scholar] [CrossRef]
- Jameel, F.; Wyne, S.; Jayakody, D.N.K.; Kaddoum, G.; Kennedy, R.O. Wireless social networks: A survey of recent advances, applications and challenges. IEEE Access 2018, 6, 59589–59617. [Google Scholar] [CrossRef]
- Mukherjee, A.; Swindle Hurst, A.L. Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers. In Proceedings of the Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Marrakech, Morocco, 20–23 June 2010; pp. 1–5. [Google Scholar]
- Wang, H.-M.; Yin, Q.; Xia, X.-G. Distributed beamforming for physical-layer security of two-way relay networks. IEEE Trans. Signal Process. 2012, 60, 3532–3545. [Google Scholar] [CrossRef]
- Wang, D.; Bai, B.; Chen, W.; Han, Z. Secure green communication via untrusted two-way relaying: A physical layer approach. IEEE Trans. Commun. 2016, 64, 1861–1874. [Google Scholar] [CrossRef]
- Wang, D.; Bai, B.; Chen, W.; Han, Z. Achieving high energy efficiency and physical-layer security in AF relaying. IEEE Trans. Wirel. Commun. 2016, 15, 740–752. [Google Scholar] [CrossRef]
- Wang, D.; Bai, B.; Chen, W.; Han, Z. Energy efficient secure communication over decode-and-forward relay channels. IEEE Trans. Commun. 2015, 63, 892–905. [Google Scholar] [CrossRef]
- Lee, J.-H. Optimal power allocation for physical layer security in multi-hop DF relay networks. IEEE Trans. Wirel. Commun. 2016, 15, 28–38. [Google Scholar] [CrossRef]
- Guo, H.; Yang, Z.; Zhang, L.; Zhu, J.; Zou, Y. Power-constrained secrecy rate maximization for joint relay and jammer selection assisted wireless networks. IEEE Trans. Commun. 2017, 65, 2180–2193. [Google Scholar] [CrossRef]
- El-Malek, A.H.A.; Salhab, A.M.; Zummo, S.A. New bandwidth efficient relaying schemes in cooperative cognitive two-way relay networks with physical layer security. IEEE Trans. Veh. Technol. 2017, 66, 5372–5386. [Google Scholar] [CrossRef]
- Nguyen, M.N.; Nguyen, N.P.; Da Costa, D.B.; Nguyen, H.K.; De Sousa, R.T. Secure cooperative half-duplex cognitive radio networks with K-th best relay selection. IEEE Access 2017, 5, 6678–6687. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, L.; Duy, T.T.; Elkashlan, M.; Duong, T.Q. Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 2015, 4, 46–49. [Google Scholar] [CrossRef]
- El-Malek, A.H.A.; Zummo, S.A. Cooperative cognitive radio model for enhancing physical layer Security in Two-Path Amplify-and-Forward Relaying networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
- Rahman, M.A.; Lee, Y.D.; Koo, I. Low-complexity timer-based multi-relay selection and sequential power allocation of cooperative cognitive radio networks for future Internet of things. Int. J. Distrib. Sens. Netw. 2016, 12. [Google Scholar] [CrossRef] [Green Version]
- Abedi, M.R.; Mokari, N.; Javan, M.R.; Yanikomeroglu, H. Secure communication in OFDMA-based cognitive radio networks: An incentivized secondary network coexistence approach. IEEE Trans. Veh. Technol. 2017, 66, 1171–1185. [Google Scholar] [CrossRef]
- Abedi, M.R.; Mokari, N.; Saeedi, H.; Yanikomeroglu, H. Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary. IEEE Trans. Wirel. Commun. 2017, 16, 885–899. [Google Scholar] [CrossRef]
- Mokari, N.; Parsaeefard, S.; Saeedi, H.; Azmi, P. Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users. IEEE Trans. Wirel. Commun. 2014, 13, 1058–1073. [Google Scholar] [CrossRef]
- Wang, C.; Wang, H.M. On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1814–1827. [Google Scholar] [CrossRef]
- Wang, C.; Wang, H.M.; Xia, X.G. Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans. Wirel. Commun. 2015, 14, 589–605. [Google Scholar] [CrossRef]
- Wang, H.M.; Xia, X.G. Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Commun. Mag. 2015, 53, 47–53. [Google Scholar] [CrossRef]
- Okati, N.; Mosavi, M.R.; Behroozi, H. A novel Genetic-based resource allocation and cooperative node selection technique for physical layer security designs. Wirel. Per. Commun. 2017, 95, 4733–4746. [Google Scholar] [CrossRef]
- Fang, W.-H.; Chen, C.-F.; Lang, H.-S. Joint resource allocation and relay selection via genetic algorithm in multi-user decode-and-forward cooperative systems. IET Netw. 2014, 3, 65–73. [Google Scholar] [CrossRef]
- Lai, T.-I.; Wen-Hsien, F.; Shih-Chun, L. Efficient subcarrier pairing and power allocation in multi-relay cognitive networks. In Proceedings of the 2nd International Conference on Intelligent Green Building and Smart Grid (IGBSG), Prague, Czech Republic, 27–29 June 2016. [Google Scholar]
- Zhang, N.; Bai, Z.Q.; Zhang, B.; Su, Y.Y.; Han, T.; Kwak, K.S. Genetic algorithm based pilot allocation scheme for massive MIMO system. In Proceedings of the IEEE International Conference on Communication Systems (ICCS), Shenzhen, China, 14–16 December 2016; pp. 1–5. [Google Scholar]
- Ahmad, A.; Hakim, G.; Mohamed-Slim, A. A genetic algorithm for multiple relay selection in two-way relaying cognitive radio networks. In Proceedings of the IEEE 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2–5 September 2013; pp. 1–5. [Google Scholar]
- Yang, W.; Ban, D.; Liang, W.; Dou, W. A Genetic algorithm for joint resource allocation in cooperative cognitive radio networks. In Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, Istanbul, Turkey, 4–8 July 2011; pp. 167–172. [Google Scholar]
- Lui, K.J.R.; Sadek, A.K.; Su, W.; Kwasinski, A. Cooperative Communications and Networking; Cambridge University Press: New York, NY, USA, 2009. [Google Scholar]
- Yu, C.H.; Tirkkonen, O. Opportunistic multiple relay selection with diverse mean channel gains. IEEE Trans. Wirel. Commun. 2012, 11, 885–891. [Google Scholar] [CrossRef]
- Chen, M.; Liu, T.C.-K.; Dong, X. Opportunistic multiple relay selection with outdated channel state information. IEEE Trans. Veh. Technol. 2012, 61, 1333–1345. [Google Scholar] [CrossRef]
- Lu, L.; Li, G.-Y.; Wu, G. Optimal power allocation for CR networks with direct and relay-aided transmissions. In Proceedings of the IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013; pp. 2780–2784. [Google Scholar]
- Ke, G.; Qiang, G.; Li, F.; Huagang, X. Relay selection in cooperative communication systems over continuous time-varying fading channel. Chin. J. Aeronaut. 2017, 30, 391–398. [Google Scholar]
Name of the Parameter | Notation | Parameter Value |
---|---|---|
Network area | 600 m × 600 m | |
Number of SU source | s | 1 |
Number of SU relays | L | 10 |
Number of SU destination | d | 1 |
Number of eavesdropper | e | 1 |
SU source coordinates | (0,0) | |
SU destination coordinates | (500,0) | |
Carrier frequency | 700 MHz | |
Path-loss exponent [6] | 4 | |
Population of the GA | T | 100 |
Number of generations | 100 | |
Crossover probability | 0.6 | |
Mutation probability | 0.02 |
L | ES Scheme | Proposed Scheme | OpportunisticRS Scheme | PartialRS Scheme | RandomRS Scheme |
---|---|---|---|---|---|
2 | 6.8517 (s) | 2.2900 (s) | 6.7500 (s) | 6.9100 (s) | 7.3100 (s) |
4 | 300.6213 (s) | 6.4500 (s) | 21.7600 (s) | 22.4900 (s) | 22.0800 (s) |
6 | 2172.5438 (s) | 12.1200 (s) | 38.2200 (s) | 39.3500 (s) | 38.4200 (s) |
8 | 3277.6352 (s) | 20.1300 (s) | 59.0400 (s) | 58.5700 (s) | 60.2300 (s) |
10 | 5289.5759 (s) | 29.8000 (s) | 81.0000 (s) | 80.8500 (s) | 83.1400 (s) |
Name of the Scheme | Arithmetic Operations Required |
---|---|
Exhaustive search scheme | |
OpportunisticRS scheme | |
PartialRS scheme | |
RandomRs scheme | |
Proposed scheme |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rahman, M.A.; Lee, Y.; Koo, I. Joint Relay Selection and Power Allocation through a Genetic Algorithm for Secure Cooperative Cognitive Radio Networks. Sensors 2018, 18, 3934. https://doi.org/10.3390/s18113934
Rahman MA, Lee Y, Koo I. Joint Relay Selection and Power Allocation through a Genetic Algorithm for Secure Cooperative Cognitive Radio Networks. Sensors. 2018; 18(11):3934. https://doi.org/10.3390/s18113934
Chicago/Turabian StyleRahman, Md Arifur, YoungDoo Lee, and Insoo Koo. 2018. "Joint Relay Selection and Power Allocation through a Genetic Algorithm for Secure Cooperative Cognitive Radio Networks" Sensors 18, no. 11: 3934. https://doi.org/10.3390/s18113934
APA StyleRahman, M. A., Lee, Y., & Koo, I. (2018). Joint Relay Selection and Power Allocation through a Genetic Algorithm for Secure Cooperative Cognitive Radio Networks. Sensors, 18(11), 3934. https://doi.org/10.3390/s18113934