2017
DOI: 10.1109/tvt.2016.2578180
|View full text |Cite
|
Sign up to set email alerts
|

Bidirectional AF Relaying With Underlay Spectrum Sharing in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 28 publications
0
18
0
Order By: Relevance
“…Finally, in Case III, while the same CSI assumption as in Case II are made, an optimal relay selection scheme is implemented, whereby the relay that achieves the maximum secrecy rate is chosen for retransmission. Compared to conventional relay selection approaches [47][48][49][50][51] where only the CSI of the legitimate S − Rm and Rm − D links are required, in the optimal IR scheme, knowledge of the channel gain magnitudes of eavesdroppers channels is also needed for maximizing the secrecy rate through the use of an error-free feedback channel between E and D [14,16,52,53]). The assumption of known eavesdropper CSI can be justified when the eavesdropper is seen as another legitimate user waiting to be served by the source while the latter is serving the destination securely.…”
Section: Security-reliability Analysis Of Ir Schemesmentioning
confidence: 99%
“…Finally, in Case III, while the same CSI assumption as in Case II are made, an optimal relay selection scheme is implemented, whereby the relay that achieves the maximum secrecy rate is chosen for retransmission. Compared to conventional relay selection approaches [47][48][49][50][51] where only the CSI of the legitimate S − Rm and Rm − D links are required, in the optimal IR scheme, knowledge of the channel gain magnitudes of eavesdroppers channels is also needed for maximizing the secrecy rate through the use of an error-free feedback channel between E and D [14,16,52,53]). The assumption of known eavesdropper CSI can be justified when the eavesdropper is seen as another legitimate user waiting to be served by the source while the latter is serving the destination securely.…”
Section: Security-reliability Analysis Of Ir Schemesmentioning
confidence: 99%
“…the third constraint in (26) is now in quadratic convex form since (J T m + J m + 2I m ) is a symmetric positive semi-definite matrix. Note that the optimization problem is still the same (since x T q J m x q ≤ and J T m = J −m then x T q J T m x q ≤ also holds and from the first constraint x T q I m x q ≤ p).…”
Section: Pilot Sequence Designmentioning
confidence: 99%
“…Step 2: Update the current design of X and Y by solving cyclic optimization problem (26) and (25) µ times (or until convergence).…”
Section: Algorithm 1 Cyclic Algorithm For Constrained Pilot Sequence mentioning
confidence: 99%
See 1 more Smart Citation
“…Unlike [29] which has focused on the security of the repair links using concatenated codes, the current paper presents simultaneous security and privacy of the data storage nodes by only using RLF codes. References [30] and [31] have studied the problem of security in the presence of overhearing interference in cooperative communications. Further [32], [33] studied the same problem on multi-tier networks.…”
Section: Related Workmentioning
confidence: 99%