• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cooperative Jamming for Enhancing Security of Cognitive Radio Networks with Multiple Primary Users

    2017-05-09 01:39:23XiaofengFengXinboGaoRuZong
    China Communications 2017年7期

    Xiaofeng Feng, Xinbo Gao , Ru Zong

    State Key Laboratory of Integrated Services Networks, School of Electronic Engineering, Xidian University, Xi’an 710071, China

    * The corresponding author, email: xbgao@mail.xidian.edu.cn

    I. INTRODUCTION

    Recently, cognitive radio (CR) has been proposed and regarded as a promising technique to solve the spectrum shortage problem or to improve the spectrum efficiency in future wireless communication systems [1, 2]. In a cognitive radio networks (CRNs), secondary user (SU) is allowed to access to the licensed spectrum of the primary user (PU), while the interference power generated by the SU does not interfere with the PU’s communications.Moreover, security is an important requirement for future wireless communications networks, and CRN is critical as it is easily exposed to external threats [3-6], such as eavesdropping [7].

    Traditionally, the security is dealt with cryptographic method at upper layers [8].However, the cryptographic methods rely on the computational hardness on decrypting the message to achieve security. As the computational power increases, the computational hardness of certain mathematical problems may no longer hold, causing many current cryptosystems to break down. As a solution to support and supplement existing cryptographic protocols, physical layer security (PLS) has attracted much more attention in academia community [9-12]. The main idea behind PLS is to exploit the wireless channel characteristics to improve the security of wireless transmission.This security is quanti fied through the notion of secrecy rate, which is defined as the rate of secret information sent from a source to its destination without being tapped in by malicious eavesdroppers.

    However, the secrecy rate would be equal to zero when the source-destination channel is worse than the source-eavesdropper channel[13]. To overcome this limitation, cooperative jamming has been employed to improve the secrecy rate, in which appropriate jammer will be selected to impair eavesdropper’s ability to decode the source’s information through transmitting codewords [14-15] or noise [16] independent of the source message. Cooperative jamming was firstly proposed in [14], which be used to increase achievable rates in the scenarios where a general Gaussian multiple access wiretap channel and two-way wiretap channel were assumed, respectively. In [17-19], some cooperative jamming schemes are proposed to guarantee the security in wireless relay network. In these schemes, the sources,relays and even destinations can be used as helper to provide jamming signals to confuse the eavesdropper.

    In CRNs, PU is the licensed user and has higher priorities for spectrum usage. SU has the requirement on data transmission,but do not has the right to use the spectrum.Therefore, in order to improve the secrecy rate obtained by PU, SU can be recruited as friendly jammer to cooperate with PU. As a compensation, SU can obtain some spectrum resource from PU for their own data transmission. Considering both of PU and SU are sel fish individual and not willing to cooperate unconditionally with each other, some corresponding cooperative jamming schemes have been studied. In [20] and [21], two cooperative schemes are proposed for CRNs, whereby the PU can cooperate with trustworthy SUs to enhance its security level and SUs can gain transmission opportunities. In [22] and [32], a game-theoretic mechanism and a QoS-aware auction framework are proposed for recruiting sel fish users as cooperative jammer to enhance secret communications, respectively. In [23],[31] and [33], three cooperative jamming schemes are proposed for CRNs, whereby a trustworthy SU with multiple antennas will creates interference on both primary and eavesdropping receivers, and an appropriately designed beamformer is proposed to maximize the secrecy rate of PU. In [24], a cooperation paradigm was proposed for CRNs, where cooperative simultaneous transmissions of PU and SU yield mutual bene fits in the presence of an eavesdropper.

    A multi-leaders and single-follower Stackelberg game is proposed to model the interaction between multiple primary users and single secondary users.

    However, all the above works only considered the simplify scenario with a single PU in their framework, which might not be sufficient to exploit the cooperation benefits in the whole network. In contrast, it will be more practical to consider the scenario with multiple PUs. In fact, the cooperation scheme for CRNs has been extended to the scenario with multiple PUs in some recent research. In[25], a cooperative scheme was proposed for a cognitive radio relay network with multiple PUs and multiple SUs, in which the minimum sum-rate requirement of all matched PUs and SUs is guaranteed. In [26], a SU assisted cooperative relaying mechanism in CRNs with multiple PUs was investigated, and a distributed matching algorithm which determines the matched pairs between PUs and SUs was proposed. In [27], a new cooperative scheme was proposed for cognitive radio relay networks with multiple PUs, in which PUs can achieve power saving due to cooperative relaying of SU. However, in all above of these works,SU takes on the role of a relay to improve the transmission rate of PU, and the secrecy rate of PU is not considered.

    In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming scheme between multiple PUs and a single SU for secure information transfer in CRNs. Considering the features of CRNs, the cooperation is performed on a mutual bene fit basis. Since the PU has the high priority on spectrum usage,the objective of cooperation is to maximize the secrecy rate of PU, given that the SU has the requirement on the transmission rate. In order to obtain more spectrum for data transmission, SU will takes on the role of a friendly jammer and cooperate with multiple PUs at the same time. As a compensation, multiple PUs will grant rewarding spectrum fraction to cooperating SU for their own transmission.Both PU and SU are considered as a selfish and rational individuals and have their own interest. In order to maximize its achievable transmission rate, SU needs to reasonably allocate its limited jamming power between multiple PUs according to all PU’s rewarding spectrum fraction.

    Moreover, each PU will make their decision on rewarding spectrum fraction to compete for the limited jamming power, knowing that the SU’s jamming power allocation result is the function of all PUs’ decisions. Due to the jamming power allocated to each PU is not only affected by this PU’s decision but also affected by the rival’s decision, each PU has to consider the in fluence generated by rival in the optimal decision making process. As a result,the optimal decision making process of each PU becomes more complicated and difficult.

    Fig. 1 System model of cooperative jamming in CRN with multiple PUs

    Compared with the previous research works, our contributions are listed as the following.

    ● We propose a novel game-theoretical framework for recruiting the sel fish SU as the cooperative jammer of multiple PUs to enhance the secret communications in CRNs. Different from the scenario where only one PU is considered, the coming of more PUs brings new challenges into the cooperation paradigm.

    ● In order to analyse the behaviour of each user in the proposed scenario, the interaction between multiple PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game. We prove the existence of equilibrium solution and present a Gauss-Jacobi iterative algorithm to compute a Stackelberg equilibrium solution.

    ● Numerical results show that under our proposed framework, both PU and SU can achieve better performance in terms of secrecy rate and transmission rate when doing cooperation.

    The remainder of the paper is organized as follows. The detailed description of the system model is given in Section II. In Section III, a game-theoretic framework is proposed to formulate the competition among PUs and the interaction between PUs and the SU. And a Gauss-Jacobi iterative algorithm is presented to compute an equilibrium solution. Simulation results are provided in Section IV, followed by the conclusion in Section V.

    II. SYSTEM MODEL

    Then, the secrecy rate gained by PUican be de fined as

    In many practical circumstances, eavesdropper is a passive attacker and becomes undetectable since the eavesdropper just overhears and interprets the CR transmission without transmitting any active signals. Therefore, the channel information between each PU and the malicious eavesdropper might not be known or accurately known. Under this condition, the secrecy capacity formula should be rewritten considering the uncertainty. In this paper, to simplify the analysis, we assume perfect channel information, which means all nodes have all channel information. This is a typical assumption in studying physical layer security.

    The overall achievable transmission rate of the SU is de fined as

    III. GAME-THEORETIC FRAMEWORK

    In this section, we study how to use game theory to analyse cooperative between multiple PUs and a single SU in CRNs. In CRNs, both of PU and SU are considered as a rational and sel fish individuals, they always make decision independently to maximize their own utility.Moreover, since PU is the licensed user and has higher priority on spectrum usage, it has the ability to move first and determine the bandwidth fraction preserved for its secret communication. After observing PUs’ decisions, the SU will make the best reaction and decide the jamming power allocated to each PU.

    As the actions occur sequentially, the Stackelberg game [28] provides a natural framework to model the interactions between PUs and SU. In a Stackelberg game, some players act as the leader and the others as the follower. The leader moves first, and is assumed to possess all necessary information about the follower’s possible reactions to the decisions taken by the leader. Then the follower observes the leader’s actions before reacting optimally to them. Obviously, in our paradigm,it is reasonable to make PU as the leader, and SU as the follower. Therefore, the interaction between PUs and SU can be formulated as a multi-leaders and single-follower Stackelberg game. Each leader anticipate the response of the followers, and uses this ability to select its strategy to compete with the other leaders in the Nash non-cooperative way.

    3.1 Follower (SU) model

    Notice that the first part of the utility (7)re flects the node’s satisfaction from accessing the spectrum, in terms of amount of data it can transmit, while the second part stands for its expense, in terms of power required to provide friendly jamming for each PU. We remark that the second part of utility needs not be constrained to a linear function, which is applied here for analytical convenience. Furthermore,notice that SU’s transmission is not subject to secrecy requirements.

    Considering SU is a rational individual, the necessary condition that SU is willing to cooperate with PUiis

    Then, the optimization problem for SU to make optimal strategy is formulated as

    Now, for a given PUs’ strategy prois supposed as a solution of the optimization problem (12). Then, there is a multiplierso that the classicalKarush-Kuhn-Tucker(KKT)conditions [29]

    3.2 Leader (PU) Model

    As the leader, each PU will first determine the optimal strategy, aiming to maximize its secrecy rate. Due to each PU knows that SU’s reaction is the function of all PUs’ strategies,they will anticipate the reaction of SU to their strategies and include the optimality condition and constraints into their utility function.Therefore, the utility function of PUican be denoted as

    According to (4), in order to guarantee the secrecy rate obtained by PUiwith cooperative jamming is greater than zero, the following conditions need to be satis fied:

    If the condition (19) is satis fied, substituting (15) into (20), the conditions (20) can be rewritten as follows:

    Now, substituting (15) and (23) into (18),the optimization problem can be reformulated as follows:

    3.3 Existence of Stackelberg Equilibrium (SE)

    According to the conclusion of previous section, we can know that the competition relationship between multiple PUs can be formulated as a GNEP. In this section, we will analyse the existence of equilibrium solution for our proposed multi-leaders and single-follower Stackelberg game. First, for the GNEP given by (24), the de finition of equilibrium is given as follows.

    The outputs from Stackelberg game is theStackelberg Equilibrium(SE). The SE can be expressed as a pro file of equilibrium strategies over which each player will not deviate from the equilibrium. Next, the formal definition of the SE corresponding to our proposed multi-leaders and single-follower Stackelberg game is given below.

    For a multi-leaders and single-follower Stackelberg game, the existence of SE is not always guaranteed. Now, we will analyse our proposed Stackelberg game and prove that when a certain condition satisfied, our proposed multi-leaders and single-follower Stackelberg game exist a SE.

    Proposition 1.If condition 1 is satisfied,

    Proof: See Appendix.

    Proposition 2.If condition 1 is satisfied,then our proposed multi-leaders and single-follower Stackelberg game exists a SE.

    Proof: According to De finition 1 and De fimulti-leaders and single-follower Stackelberg game. It means that if the GNEP defined by(24) exists a GNE, then the proposed Stackelberg game also exists a SE.

    According to Theorem 6 given by [30], for a given GNEP in which each player’s optimization problem is maximization problem, if each player’s object function is quasi-concave,and for an arbitrary given rival’s strategies,each player’s feasible strategy set is nonempty, closed and convex, then the given GNEP exists a GNE. As shown in Proposition 1, if Condition 1 satisfied, the object function of each PU in our proposed GNEP is concave.Therefore, it also a quasi-concave. Moreover,according to (25) and (26), we can see that each player’s feasible strategy set is a one dimensional range or single element set. Therefore, for a given rival’s strategies, each PU’s feasible strategy set is obviously nonempty,closed, and convex. Then, if Condition 1 is satis fied, the proposed GNEP de fined by (24)exists a GNE.

    Therefore, if Condition 1 is satisfied, the proposed Stackelberg game also exists a SE.

    3.4 Gauss-Jacobi Iterative Algorithm

    Once the existence of SE is proved, the next question would be compute a SE. According to the analysis in Section 3.3, in order to compute a SE of the proposed Stackelberg game,a GNEP given by (24) needs to be solving firstly. Once a GNE solution is obtained, then it would be the final strategies accepted by all PUs.

    Substituting the GNE into SU’s optimization problem given by (12), then the corresponding reaction strategy of SU also can be obtained through solving the given optimization problem. The GNE and the corresponding reaction strategy compose a SE of our proposed multi-leaders and single-follower Stackelberg game.

    To solve the GNEP defined by (24), we present a classical Gauss-Jacobi iteration algorithm, as shown in Algorithm I. The main idea underlying this algorithm is to solve all player’s optimization problem in GNEP one by one. In the initialization phase, each PU needs to randomly choose an available strategy and announce it to other PUs. Once a PU knows all of its rival’s strategies, it can compute the optimal reaction strategy through solving the programing problem (24) and update its strategy according to the solution. Specially, at each time, only one PU’s optimization is solved,assuming that other PUs’ current strategies are still their previous strategies. After the strategy updating, if current strategy is different from the previous strategy, PU needs to broadcast its newest strategy. The above process will be repeated until none of PUs update its strategy.

    Moreover, the convergence of Algorithm I cannot be guaranteed. But due to the implementation of Algorithm I is very easy, in the general case, the equilibrium solution can be found through repeated using Algorithm I.

    ?

    IV. NUMERICAL RESULTS

    To evaluate the performance of the proposed framework, we conduct the following simulations. For the sake of simplicity and without loss a generality, we consider a CRN with only five PUs (N=5), one SU, and one malicious eavesdropper. The coordinates of each node are shown in Figure 3. We assume that the distance between SUJand its destinationDJis fixed and equal to 20m. The other simulation parameters are

    set up as follows: Each PU’s average transused.

    Using the spectrum under different frequency range, the corresponding channel gain will also be different. Under different channel state,the corresponding Stackelberg equilibrium results and the utility of each player are shown in Fig. 3. As shown in Fig. 3(a), different channel state will lead to different equilibrium result. Each PU can adaptively adjust its equilibrium strategy according to channel state.Moreover, as shown in Fig. 3(b), due to the influence of channel gain, the PU who grant SU the biggest spectrum fraction does not necessarily obtain maximum jamming power allocation. We can also observed that as long as a PU participates in the cooperation, the secrecy rate obtained by this PU would be greater than zero, and SU can also obtain some spectrum fraction from this PU. When the secrecy rate obtained by a PU cannot be improved through cooperation with SU, PU will refuses to grant any spectrum to SU. Correspondingly, SU will not allocate any jamming power to this PU,and the final secrecy rate obtained by this PU would be equal to zero.

    Next, in order to intuitively observe the reaction strategy and the final equilibrium results, we assume that only PU 1 and PU 2 are allowed to anticipate the game. In this case,when one PU changes its strategy, the optimal point to achieve the highest secrecy rate of other PU changes. The best response curve of both PUs are shown in Fig. 4(a). The best response curve re flects the best strategy selection under the given rival’s strategy. For example, the point (x,y) on PU1’s best response curve means that when PU2’s strategy isy,PU1 should selectxas its strategy to maximize its utility. As shown in Fig. 4(a), when PU 1 increases the spectrum fraction granted to SU, the spectrum fraction granted by PU 2 will also increase. The reason is that when the spectrum granted by PU 1 increases, SU will allocate more jamming power to PU 1, and subsequently the jamming power allocated to PU 2 will decreases. In order to obtain its desired jamming power, PU 2 has to increase the granted spectrum fraction. Moreover, we also can observed that different maximum available jamming power of SU will lead to different equilibrium strategy results.

    Fig. 2 A Simulation of the CRN with five PUs, a SU, and an eavesdropper

    When maximum available jamming power decreases, the equilibrium strategies of both PUs will decreases, the competition between PUs will be enhanced. Each PU will have to grant more spectrum in exchange for the desired jamming power. The convergence of proposed Gauss-Jacobi iterative algorithm is shown in Fig. 4(b). From Fig. 4(b), we can observe that, at each iteration, the strategy selected by each PU is the best response strategy assuming its rival’s strategy is still the strategy at the previous iteration. Moreover, in our proposed scenario, the proposed algorithm may achieve convergence after several iterations.And the final result is same as the equilibrium point in Fig. 4(a). It means that when the algorithm convergence, the equilibrium result can be obtained through using our proposed algorithm. But it should be pointed out that the convergence of our algorithm cannot always be guaranteed.

    Fig. 3 The Stackelberg equilibrium results under different channel state. (a) The Stackelberg equilibrium strategy of each PU. (b) The optimal reaction strategy of SU

    From Fig. 5(b), we can observe that with the cost of per unit jamming powerCincreases, the secrecy rate obtained by PU will decreases. This is because the rising cost will lead to the decrease of jamming power allo-cation for the same granted spectrum fraction.Fig. 6 shows that with the increase of the number of PU, the average secrecy rate obtained by PU decreases, but the utility achieved by SU increases. The reason is that with the increases of the number of PU, the competition between PUs will become more serious. In this case, each PU will grant more spectrum fraction to SU, but get less jamming power from SU. Therefore, the secrecy rate obtained by each PU will deceases. Moreover, according to the assumption, both of the secrecy rate obtained by PU and the utility of SU are equal to zero. However, as shown in Fig. 6, both of the secrecy capacity of PU and the utility of SU are greater than zero if the cooperation is built between PU and SU. It means that both PUs’ secrecy rate and SU’s utility can be improved through cooperation.

    Fig. 4 The results obtained in the scenario only with PU1 and PU2. (a) Best response curve of both PUs. (b) Each PU’s best strategy in every iterations

    V. CONCLUSION

    In this paper, we have investigated the cooperative jamming between multiple PUs and single SU for secure transmission of CRNs.It focuses on such a cooperative jamming scenario in which, on the one hand, more than one PUs want to grant part of their spectral resources in exchange for friendly jamming provided by SU; on the other hand, SU might gain the transmission opportunity from multiple PUs through offering jamming service.A multi-leaders and single-follower Stackelberg game has been proposed to model the interaction between multiple PUs and single SU. Moreover, the competition among PUs is formulated as a GNEP, and the GNE is considered as the solution. If the proposed GNEP exists a GNE solution, then this GNE solution and its corresponding reaction strategy determined by SU constitute a Stackelberg equilibrium of the proposed Stackelberg game.Through analysis we obtained a meaningful conclusion, when the SINRs obtained by each PU’s destination node and eavesdropper node are much greater than one, the proposed Stackelberg game exists a Stackelberg equilibrium.Moreover, a Gauss-Jacobi iterative algorithm has been proposed to compute an equilibrium solution. Numerical results corroborate that both PUs’ secrecy rate and SU’s utility can be improved through cooperation, and the existing of competition among multiple PUs makes the Su gain more utility than without competition.

    For future work, we will design a cooperative jamming scheme for the scenario with multiple PUs and multiple SUs. In addition,we will exploit the channel statistic information to make the proposed scheme more effi-cient. The effect of imperfect CSI on cooperation will be studied as well.

    Appendix:Proof of Proposition 1

    Proof: If Condition 1 satisfied, then the utility function of PUican be rewritten as follows

    Now, taking the second-order derivatives of PU’s utility, we can get

    Fig. 5 The effect of different parameters on the final results. (a) The average granted spectrum fraction versus the number of PU and the maximum available jamming power. (b) The secrecy rate obtained by each PU versus the cost per unit jamming power of SU

    Fig. 6 The PU’s average secrecy rate and SU’s utility versus the number of PUs

    Therefore, if Condition 1 satisfied, for all

    ACKNOWLEDGEMENTS

    This work was supported in part by the National Key Research and Development Program of China under Grant 2016QY01W0204, in part by Key Industrial Innovation Chain in Industrial Domain under Grant 2016KTZDGY-02,and in part by National High-Level Talents Special Support Program of China under Grant CS31117200001.

    [1] S. Haykin, “Cognitive radio: brain-empowered wireless communications.”IEEE journal on selected areas in communications, vol. 23, no. 2,pp. 201-220, February, 2005.

    [2] B. Wang, K J R. Liu, “Advances in cognitive radio networks: A survey”,IEEE Journal of Selected Topics in Signal Processing, vol. 5, no. 1, pp.5-23, February, 2011.

    [3] Q. Pei, B. Yuan, L. Li, et al. “A sensing and etiquette reputation-based trust management for centralized cognitive radio networks”,Neurocomputing, 2013, vol. 101, no. 3, pp. 129-138,February, 2013.

    [4] A. Attar, H. Tang, A. V. Vasilakos, et al., “A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions”,Proceedings of the IEEE, vol. 100, no. 12,pp. 3172-3186, December, 2012.

    [5] M. Khasawneh, A. Agarwal, “A survey on security in Cognitive Radio networks”,IEEE 6th International Conference on Computer Science and Information Technology (CSIT), pp. 64-70,March, 2014.

    [6] A. G. Fragkiadakis, E. Z. Tragos, I. G. Askoxylakis,“A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks”.IEEE Communications Surveys & Tutorials, vol. 15,no. 1, pp. 428-445, First Quarter, 2013.

    [7] Y. Liang, A. Somekh-Baruch, H. V. Poor, et al.,“Capacity of Cognitive Interference Channels With and Without Secrecy”,IEEE Transactions on Information Theory, vol. 55, no. 2, pp. 604-619,February, 2009.

    [8] E. Silva, A. Dos Santos, L. C. P. Albini, et al.,“Identity-Based Key Management in Mobile Ad Hoc Networks: Techniques and Applications”.IEEE Wireless Communications, vol. 15, no. 5.pp. 46-52, October, 2008.

    [9] A. D. Wyner, “The wire-tap channel”,Bell Labs Technical Journal, vol. 54, no. 8, pp. 1355-1387,October, 1975.

    [10] Y. S. Shiu, S. Y. Chang, H. C. Wu, et al., “Physical layer security in wireless networks: A tutorial”,IEEE wireless Communications, vol. 18, no. 2, pp.66-74, April, 2011.

    [11] S. Leung-Yan-Cheong, Hellman M E. “The Gaussian wire-tap channel”,IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, January, 1978.

    [12] J. Huang, A. L. Swindlehurst, “Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization”,IEEE Transactions on Signal Processing, vol. 60, no. 4, pp. 1696-1707,December, 2011.

    [13] I. Csiszar, J. Korner, “Broadcast channels with confidential messages”,IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348,May, 1978.

    [14] L. Lai, H. El Gamal, “The Relay—Eavesdropper Channel: Cooperation for Secrecy”,IEEE Transactions on Information Theory, vol. 54, no. 9, pp.4005-4019, August, 2008.

    [15] X. Tang, R. Liu, P. Spasojevi?, et al., “Interference Assisted Secret Communication”,IEEE Transactions on Information Theory, vol. 57, no. 5, pp.3153-3167, April, 2009.

    [16] E. Tekin, A. Yener, “The General Gaussian Multiple-Access and Two-Way Wiretap Channels:Achievable Rates and Cooperative Jamming”,IEEE Transactions on Information Theory, vol. 54,no. 6, pp. 2735-2751, May, 2008.

    [17] K. H. Park, T. Wang, M. S. Alouini, “On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming”,IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1741-1750,August, 2013.

    [18] J. Huang, A. L. Swindlehurst, “Cooperative Jamming for Secure Communications in MIMO Relay Networks”,IEEE Transactions on Signal Processing, vol. 59, no. 10, pp. 4871-4884, July,2011.

    [19] Y. Liu, A. P. Petropulu, “Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security”,IEEE Transactions on Information Forensics & Security, vol. 8, no. 4, pp. 682-694,February, 2013.

    [20] A. G. Fragkiadakis, E. Z. Tragos, I. G. Askoxylakis,“A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks”,IEEE Communications Surveys & Tutorials, vol. 15,no. 1, pp. 428-445, First Quarter, 2013.

    [21] N. Zhang, N. Lu, N. Cheng, et al., “Cooperative Spectrum Access Towards Secure Information Transfer for CRNs”,IEEE Journal on Selected Areas in Communications, vol. 31, no. 11, pp.2453-2464, October, 2013.

    [22] I. Stanojev, A. Yener, “Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming”IEEE Transactions on Wireless Communications,vol. 12, no. 1, pp. 134-145, December, 2013.

    [23] K. Lee, O. Simeone, C. B. Chae, et al., “Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy”,IEEE Transactions on Vehicular Technology, vol. 62, no. 9, pp. 1-5, June,2011.

    [24] Y. Wu, K. J. R. Liu, “An Information Secrecy Game in Cognitive Radio Networks”,IEEE Transactions on Information Forensics & Security, vol. 6, no.3, pp. 831-842, April, 2011.

    [25] S. Bayat, R. H. Y. Louie, Y. Li, et al., “Cognitive Radio Relay Networks with Multiple Primary and Secondary Users: Distributed Stable Matching Algorithms for Spectrum Access”,IEEE International Conference on Communications (ICC), pp.1-6, June, 2011.

    [26] S. He, L. Jiang, C. He, “A novel secondary user assisted relay mechanism in cognitive radio networks with multiple primary users”,IEEE International Conference on Global Communications Conference (GLOBECOM), pp. 1254-1259December, 2012.

    [27] S. K. Jayaweera, M. Bkassiny, K. A. Avery, “Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks”,IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2716-2724,June, 2011.

    [28] M. J. Osborne, A. Rubinstein, “A course in game theory”.MIT Press, 1994.

    [29] S. Boyd, L. Vandenberghe, “Convex Optimization”,Cambridge University Press, 2004.

    [30] F. Facchinei, C. Kanzow, “Generalized Nash Equilibrium Problems”,Annals of Operations Research, vol. 175, no. 1, pp. 177-211, March,2010.

    [31] Z. Li, T. Jing, X. Cheng, et al., “Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks”,IEEE International Conference on Communications(ICC), pp. 7609-7614, June, 2015.

    [32] X. Wang, Y. Ji, H. Zhou, et al., “A Non-monetary QoS-aware Auction Framework towards Secure Communications for Cognitive Radio Networks”,IEEE Transactions on Vehicular Technology, vol. 65, no. 7, pp. 5611-5623, August, 2016.

    [33] T. Chen, H. Q. Yuan, T. Z. Zhao, et al., “Joint beamforming and power allocation for secure communication in cognitive radio networks”,Iet Communications, vol. 10, no. 10, pp. 1156-1162,July, 2016.

    国产成人精品久久二区二区91| 国产一卡二卡三卡精品| 国产精品亚洲一级av第二区| 国产精品一区二区免费欧美| 青草久久国产| 中文字幕人妻丝袜一区二区| 妹子高潮喷水视频| 我的亚洲天堂| 免费在线观看成人毛片| 黄频高清免费视频| 午夜福利欧美成人| 精品福利观看| 99国产精品99久久久久| 首页视频小说图片口味搜索| 日韩av在线大香蕉| 日韩欧美一区视频在线观看| 久久香蕉精品热| 国产激情欧美一区二区| 国产视频内射| 免费人成视频x8x8入口观看| 久久狼人影院| 男人舔奶头视频| 亚洲国产精品合色在线| 国产人伦9x9x在线观看| 国产真实乱freesex| 久99久视频精品免费| 欧美激情高清一区二区三区| 国产蜜桃级精品一区二区三区| 身体一侧抽搐| 久久国产亚洲av麻豆专区| 亚洲第一欧美日韩一区二区三区| 大香蕉久久成人网| 视频区欧美日本亚洲| 97人妻精品一区二区三区麻豆 | 成人永久免费在线观看视频| 亚洲男人的天堂狠狠| 性欧美人与动物交配| av超薄肉色丝袜交足视频| 欧美黑人欧美精品刺激| 人人妻,人人澡人人爽秒播| 色老头精品视频在线观看| 日本一本二区三区精品| 国产成人av教育| 啪啪无遮挡十八禁网站| 哪里可以看免费的av片| 免费看a级黄色片| 黄色成人免费大全| 真人做人爱边吃奶动态| 特大巨黑吊av在线直播 | 无限看片的www在线观看| 高清在线国产一区| 黄色片一级片一级黄色片| 国产成人精品无人区| 岛国视频午夜一区免费看| 2021天堂中文幕一二区在线观 | 亚洲精品中文字幕一二三四区| 亚洲,欧美精品.| 2021天堂中文幕一二区在线观 | 亚洲七黄色美女视频| 国产黄色小视频在线观看| 国产欧美日韩一区二区三| 欧美+亚洲+日韩+国产| 欧美不卡视频在线免费观看 | 亚洲欧洲精品一区二区精品久久久| 免费在线观看黄色视频的| cao死你这个sao货| 99在线人妻在线中文字幕| 欧美av亚洲av综合av国产av| 午夜两性在线视频| 99久久99久久久精品蜜桃| 丰满人妻熟妇乱又伦精品不卡| 国产真实乱freesex| 一个人观看的视频www高清免费观看 | 精品少妇一区二区三区视频日本电影| 日日爽夜夜爽网站| www.精华液| bbb黄色大片| 国产成人影院久久av| 成在线人永久免费视频| 精品乱码久久久久久99久播| 午夜福利18| 国产99白浆流出| 又黄又爽又免费观看的视频| 免费在线观看日本一区| 亚洲精品国产一区二区精华液| 亚洲成人久久爱视频| 久久精品成人免费网站| 欧美性猛交黑人性爽| 国产精品,欧美在线| 欧美在线黄色| 97碰自拍视频| 亚洲人成网站在线播放欧美日韩| 91九色精品人成在线观看| 精品国产乱子伦一区二区三区| 一本精品99久久精品77| 亚洲免费av在线视频| tocl精华| av超薄肉色丝袜交足视频| 99国产综合亚洲精品| 十八禁网站免费在线| 精品国产一区二区三区四区第35| 久久久久久人人人人人| 国产精品一区二区精品视频观看| 在线国产一区二区在线| 男女那种视频在线观看| 欧美三级亚洲精品| 亚洲国产精品合色在线| 免费一级毛片在线播放高清视频| 正在播放国产对白刺激| 久久久久国产一级毛片高清牌| 国产精品美女特级片免费视频播放器 | 99热6这里只有精品| 国产精华一区二区三区| 亚洲国产精品成人综合色| 天天添夜夜摸| 波多野结衣高清作品| 香蕉av资源在线| 99re在线观看精品视频| 亚洲精品在线观看二区| 色哟哟哟哟哟哟| 麻豆久久精品国产亚洲av| 国产成人欧美| 一二三四在线观看免费中文在| 国产免费男女视频| 中文字幕高清在线视频| 免费观看精品视频网站| 天堂影院成人在线观看| 成人亚洲精品av一区二区| 首页视频小说图片口味搜索| 欧美日韩福利视频一区二区| 国产成人影院久久av| 欧美黑人巨大hd| 免费女性裸体啪啪无遮挡网站| 视频区欧美日本亚洲| 亚洲国产欧洲综合997久久, | 久久草成人影院| 亚洲免费av在线视频| 热99re8久久精品国产| 精品欧美国产一区二区三| 这个男人来自地球电影免费观看| 色播亚洲综合网| 51午夜福利影视在线观看| 成在线人永久免费视频| 久久久久久久午夜电影| av有码第一页| 亚洲熟妇熟女久久| www.999成人在线观看| 1024香蕉在线观看| 欧美黑人精品巨大| 午夜a级毛片| 久久国产精品男人的天堂亚洲| 91成人精品电影| 日本五十路高清| 神马国产精品三级电影在线观看 | 亚洲电影在线观看av| 亚洲精品一卡2卡三卡4卡5卡| 美女国产高潮福利片在线看| 色婷婷久久久亚洲欧美| 久久精品亚洲精品国产色婷小说| 久久久久久久久中文| 中文字幕av电影在线播放| 久久青草综合色| 免费观看精品视频网站| 免费观看精品视频网站| 脱女人内裤的视频| 窝窝影院91人妻| 亚洲av中文字字幕乱码综合 | 国产欧美日韩一区二区三| 亚洲精品久久成人aⅴ小说| av欧美777| 午夜福利一区二区在线看| avwww免费| 日韩欧美一区视频在线观看| 久久亚洲精品不卡| 国产av一区二区精品久久| 黄色女人牲交| 国产精品久久久久久精品电影 | 夜夜夜夜夜久久久久| 亚洲成a人片在线一区二区| 国产97色在线日韩免费| 国产亚洲欧美98| 夜夜夜夜夜久久久久| 狂野欧美激情性xxxx| 正在播放国产对白刺激| 欧美 亚洲 国产 日韩一| 波多野结衣高清无吗| 午夜福利免费观看在线| 久久性视频一级片| 午夜精品久久久久久毛片777| 午夜福利视频1000在线观看| 精品欧美国产一区二区三| 中文字幕人妻熟女乱码| 人人妻人人澡人人看| 国产视频内射| 免费看日本二区| 亚洲精品国产一区二区精华液| 日本在线视频免费播放| 亚洲天堂国产精品一区在线| 精品久久久久久久久久免费视频| av免费在线观看网站| 久久国产精品影院| 欧美日韩黄片免| 无遮挡黄片免费观看| 美女免费视频网站| 在线观看一区二区三区| 国产免费av片在线观看野外av| 亚洲,欧美精品.| 啦啦啦 在线观看视频| 一个人免费在线观看的高清视频| av在线天堂中文字幕| 亚洲av第一区精品v没综合| 久久亚洲真实| 香蕉国产在线看| 无人区码免费观看不卡| 首页视频小说图片口味搜索| 国产激情久久老熟女| 久久国产精品人妻蜜桃| 国产亚洲精品综合一区在线观看 | 精品高清国产在线一区| 国产成+人综合+亚洲专区| 老熟妇乱子伦视频在线观看| 午夜两性在线视频| 999久久久国产精品视频| 亚洲美女黄片视频| 草草在线视频免费看| 国产精品一区二区三区四区久久 | 两性夫妻黄色片| 女警被强在线播放| 成年女人毛片免费观看观看9| 在线播放国产精品三级| 免费一级毛片在线播放高清视频| 国产伦在线观看视频一区| 老熟妇乱子伦视频在线观看| 动漫黄色视频在线观看| 男人舔奶头视频| 国产不卡一卡二| 99精品欧美一区二区三区四区| videosex国产| 大型av网站在线播放| 两性夫妻黄色片| 桃色一区二区三区在线观看| 亚洲国产中文字幕在线视频| 国产精品永久免费网站| 国产99久久九九免费精品| 国产精品亚洲美女久久久| 国产精品免费视频内射| 精品国产美女av久久久久小说| 岛国视频午夜一区免费看| 久久久久久久午夜电影| 99国产精品一区二区蜜桃av| 亚洲成av人片免费观看| 老司机午夜十八禁免费视频| 国产久久久一区二区三区| 亚洲 欧美一区二区三区| 99国产精品一区二区三区| 欧美成人午夜精品| 日韩精品青青久久久久久| 午夜福利欧美成人| 国产av不卡久久| 狠狠狠狠99中文字幕| 91国产中文字幕| 亚洲成a人片在线一区二区| netflix在线观看网站| 777久久人妻少妇嫩草av网站| 成人av一区二区三区在线看| 18禁黄网站禁片免费观看直播| 亚洲精品色激情综合| 欧美激情高清一区二区三区| 禁无遮挡网站| 性欧美人与动物交配| 男女那种视频在线观看| 一本综合久久免费| 精品一区二区三区视频在线观看免费| 韩国精品一区二区三区| 久久精品国产亚洲av香蕉五月| 成人免费观看视频高清| 啪啪无遮挡十八禁网站| bbb黄色大片| 久久人妻av系列| netflix在线观看网站| 在线观看免费视频日本深夜| 欧美又色又爽又黄视频| 色综合亚洲欧美另类图片| 亚洲av电影在线进入| 又大又爽又粗| 首页视频小说图片口味搜索| 淫妇啪啪啪对白视频| 国产免费男女视频| 免费在线观看影片大全网站| 在线观看一区二区三区| 成人亚洲精品一区在线观看| 一边摸一边抽搐一进一小说| 99久久精品国产亚洲精品| 天堂影院成人在线观看| 国产成+人综合+亚洲专区| 搡老岳熟女国产| 老汉色av国产亚洲站长工具| 91av网站免费观看| 久久久国产成人免费| 日本三级黄在线观看| netflix在线观看网站| 在线观看www视频免费| 18禁黄网站禁片免费观看直播| 国产黄a三级三级三级人| 欧美成人一区二区免费高清观看 | 自线自在国产av| 亚洲激情在线av| 97人妻精品一区二区三区麻豆 | 久久亚洲真实| 国产片内射在线| 国产熟女xx| 日韩欧美 国产精品| 午夜福利一区二区在线看| 欧美日韩亚洲综合一区二区三区_| 欧美成狂野欧美在线观看| 美女扒开内裤让男人捅视频| 色综合婷婷激情| 亚洲精品国产区一区二| 久久婷婷人人爽人人干人人爱| 成在线人永久免费视频| 好男人在线观看高清免费视频 | 日韩成人在线观看一区二区三区| 亚洲熟妇中文字幕五十中出| 日本 欧美在线| 国产亚洲欧美98| 黄色毛片三级朝国网站| 中文亚洲av片在线观看爽| 亚洲自拍偷在线| 19禁男女啪啪无遮挡网站| 国产成人影院久久av| 色av中文字幕| 香蕉久久夜色| www.自偷自拍.com| 亚洲成av片中文字幕在线观看| av超薄肉色丝袜交足视频| 久久精品国产99精品国产亚洲性色| 成人欧美大片| 妹子高潮喷水视频| 国产精品久久久久久精品电影 | 99久久99久久久精品蜜桃| 久久婷婷成人综合色麻豆| 国产私拍福利视频在线观看| 久久亚洲真实| 欧美另类亚洲清纯唯美| av电影中文网址| 日韩精品青青久久久久久| 老汉色av国产亚洲站长工具| 丝袜人妻中文字幕| 成熟少妇高潮喷水视频| 又黄又粗又硬又大视频| 午夜免费成人在线视频| 亚洲中文av在线| 欧美人与性动交α欧美精品济南到| 黄色丝袜av网址大全| 老司机在亚洲福利影院| 国产又爽黄色视频| 免费观看人在逋| 国产视频内射| 午夜日韩欧美国产| 久久精品人妻少妇| 日韩三级视频一区二区三区| 两性夫妻黄色片| 国产又黄又爽又无遮挡在线| 亚洲专区国产一区二区| av欧美777| 国产精品久久久久久人妻精品电影| 成年女人毛片免费观看观看9| 国产亚洲精品一区二区www| 亚洲精品一区av在线观看| 色综合站精品国产| 国产麻豆成人av免费视频| 久久 成人 亚洲| ponron亚洲| 国产午夜精品久久久久久| 在线观看免费午夜福利视频| 欧美最黄视频在线播放免费| 老汉色∧v一级毛片| 天堂动漫精品| 欧美乱妇无乱码| 人妻丰满熟妇av一区二区三区| 在线观看www视频免费| 日韩欧美三级三区| 国产色视频综合| 欧美一级a爱片免费观看看 | 久热爱精品视频在线9| 国产免费av片在线观看野外av| 色精品久久人妻99蜜桃| 色尼玛亚洲综合影院| 侵犯人妻中文字幕一二三四区| 精品国产美女av久久久久小说| 视频在线观看一区二区三区| 中文字幕最新亚洲高清| 夜夜看夜夜爽夜夜摸| 88av欧美| 中文字幕人妻熟女乱码| 看片在线看免费视频| 韩国精品一区二区三区| 天天添夜夜摸| xxxwww97欧美| 亚洲自偷自拍图片 自拍| 巨乳人妻的诱惑在线观看| 欧美在线一区亚洲| 亚洲第一电影网av| 亚洲 欧美 日韩 在线 免费| 岛国视频午夜一区免费看| 真人一进一出gif抽搐免费| 看免费av毛片| 韩国精品一区二区三区| 99国产综合亚洲精品| 成年女人毛片免费观看观看9| 又黄又爽又免费观看的视频| 日本 av在线| 一本久久中文字幕| 人妻丰满熟妇av一区二区三区| 久久久久久九九精品二区国产 | 亚洲熟妇中文字幕五十中出| av福利片在线| netflix在线观看网站| 欧美av亚洲av综合av国产av| 久久久久久久精品吃奶| 级片在线观看| 丝袜在线中文字幕| 欧美性猛交黑人性爽| 国产成人欧美在线观看| 老司机在亚洲福利影院| 欧美激情 高清一区二区三区| 99在线视频只有这里精品首页| 日日摸夜夜添夜夜添小说| 国产精品影院久久| 51午夜福利影视在线观看| 色尼玛亚洲综合影院| 亚洲中文字幕一区二区三区有码在线看 | 色综合亚洲欧美另类图片| 男人的好看免费观看在线视频 | 中文在线观看免费www的网站 | 一边摸一边做爽爽视频免费| 十八禁网站免费在线| 无人区码免费观看不卡| 一本综合久久免费| 男女做爰动态图高潮gif福利片| 国产色视频综合| 亚洲国产欧美网| 99re在线观看精品视频| 久久久久九九精品影院| 精品久久久久久久人妻蜜臀av| 亚洲欧美日韩无卡精品| 麻豆av在线久日| 人妻丰满熟妇av一区二区三区| 人人妻,人人澡人人爽秒播| 国产高清有码在线观看视频 | a级毛片在线看网站| 亚洲欧美日韩高清在线视频| 亚洲精品在线观看二区| 大型av网站在线播放| xxx96com| 国产野战对白在线观看| a级毛片在线看网站| 一级毛片女人18水好多| 最好的美女福利视频网| 精品久久久久久久末码| 日日夜夜操网爽| www日本黄色视频网| 白带黄色成豆腐渣| 一进一出好大好爽视频| 国产精品美女特级片免费视频播放器 | 国产99白浆流出| 欧美日韩亚洲综合一区二区三区_| 午夜久久久在线观看| 每晚都被弄得嗷嗷叫到高潮| 日韩欧美免费精品| 久久午夜综合久久蜜桃| 男人舔奶头视频| 久久天躁狠狠躁夜夜2o2o| 看免费av毛片| 久久国产精品男人的天堂亚洲| 久久性视频一级片| 美国免费a级毛片| 91麻豆精品激情在线观看国产| 午夜激情福利司机影院| 777久久人妻少妇嫩草av网站| 国产午夜精品久久久久久| 人妻久久中文字幕网| 亚洲国产欧美日韩在线播放| 51午夜福利影视在线观看| 人人澡人人妻人| 亚洲国产毛片av蜜桃av| 两性夫妻黄色片| 欧美性长视频在线观看| 波多野结衣高清作品| 婷婷丁香在线五月| 少妇粗大呻吟视频| 亚洲国产精品成人综合色| 可以在线观看毛片的网站| 精品国产一区二区三区四区第35| 中文字幕人妻熟女乱码| 超碰成人久久| 岛国视频午夜一区免费看| 少妇的丰满在线观看| 身体一侧抽搐| 免费搜索国产男女视频| 男男h啪啪无遮挡| 久久精品国产清高在天天线| 两人在一起打扑克的视频| 成人特级黄色片久久久久久久| 日韩欧美免费精品| 亚洲人成网站高清观看| 搡老岳熟女国产| 国产精品美女特级片免费视频播放器 | 天天躁夜夜躁狠狠躁躁| 一个人观看的视频www高清免费观看 | 人妻久久中文字幕网| 国产成人欧美| 黄频高清免费视频| 亚洲精品av麻豆狂野| 午夜福利欧美成人| 国内精品久久久久久久电影| 精品少妇一区二区三区视频日本电影| or卡值多少钱| 久久国产精品人妻蜜桃| 村上凉子中文字幕在线| 麻豆成人午夜福利视频| 免费无遮挡裸体视频| 国产精品自产拍在线观看55亚洲| 国产在线精品亚洲第一网站| 最好的美女福利视频网| 桃红色精品国产亚洲av| 两性午夜刺激爽爽歪歪视频在线观看 | 无限看片的www在线观看| 久久久久久久久久黄片| 精品久久久久久成人av| 久久精品人妻少妇| 给我免费播放毛片高清在线观看| 日本熟妇午夜| 嫩草影院精品99| 99精品在免费线老司机午夜| 国产主播在线观看一区二区| 国产区一区二久久| 国产成人欧美| 又大又爽又粗| 亚洲国产精品合色在线| 99国产综合亚洲精品| 黄色毛片三级朝国网站| 亚洲精品色激情综合| 色尼玛亚洲综合影院| 亚洲美女黄片视频| 中文字幕人妻熟女乱码| 国产黄片美女视频| 狠狠狠狠99中文字幕| 人人妻人人看人人澡| 亚洲久久久国产精品| 国产精品永久免费网站| 精品久久久久久,| 老司机午夜十八禁免费视频| 妹子高潮喷水视频| 日韩高清综合在线| 老司机在亚洲福利影院| 91成年电影在线观看| 欧美最黄视频在线播放免费| 日韩欧美三级三区| 国产av一区在线观看免费| 日韩 欧美 亚洲 中文字幕| 亚洲免费av在线视频| 自线自在国产av| 日本免费一区二区三区高清不卡| 国产亚洲精品久久久久5区| 日日摸夜夜添夜夜添小说| 99精品欧美一区二区三区四区| 久久伊人香网站| 美女午夜性视频免费| 国产单亲对白刺激| 91成人精品电影| 日本撒尿小便嘘嘘汇集6| 自线自在国产av| 国产极品粉嫩免费观看在线| 黄色 视频免费看| 国产精华一区二区三区| 国产乱人伦免费视频| 国产成人精品久久二区二区91| 搞女人的毛片| 国产伦人伦偷精品视频| 正在播放国产对白刺激| 1024香蕉在线观看| 欧洲精品卡2卡3卡4卡5卡区| www.自偷自拍.com| 国产麻豆成人av免费视频| 一区二区三区高清视频在线| 99在线视频只有这里精品首页| 999久久久精品免费观看国产| 久久性视频一级片| 动漫黄色视频在线观看| 成人手机av| 国产一区二区三区视频了| 欧美成狂野欧美在线观看| 国产一级毛片七仙女欲春2 | 欧美激情久久久久久爽电影| 满18在线观看网站| 亚洲一区中文字幕在线| 久久久久久久精品吃奶| 手机成人av网站| 夜夜爽天天搞| 变态另类成人亚洲欧美熟女| 免费看十八禁软件| 国产精品亚洲一级av第二区| 十八禁人妻一区二区| 夜夜看夜夜爽夜夜摸| 欧美成狂野欧美在线观看| 国产一区二区三区视频了| 久久久国产成人免费| 少妇粗大呻吟视频| 国产极品粉嫩免费观看在线| www.自偷自拍.com| 两人在一起打扑克的视频| 无遮挡黄片免费观看| 婷婷丁香在线五月| 亚洲片人在线观看|