2020
DOI: 10.1049/iet-com.2019.1369
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced physical layer security for cognitive radio systems through joint spectrum access and power allocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…In addition, CR networks are also vulnerable to malicious eavesdropping, which have drawn significant attention. The authors in [27] studied the spectrum access method and the PLS of CR networks, where some mathematical expressions for PLS performance metrics were derived. The authors in [28] proposed a game theory to optimize the secondary secrecy rate and the primary secrecy rate in CR networks, where the SU transmitted jamming signals for both the primary transmission and secondary transmission.…”
Section: Achieving Pls Of Cr Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, CR networks are also vulnerable to malicious eavesdropping, which have drawn significant attention. The authors in [27] studied the spectrum access method and the PLS of CR networks, where some mathematical expressions for PLS performance metrics were derived. The authors in [28] proposed a game theory to optimize the secondary secrecy rate and the primary secrecy rate in CR networks, where the SU transmitted jamming signals for both the primary transmission and secondary transmission.…”
Section: Achieving Pls Of Cr Networkmentioning
confidence: 99%
“…We target to maximize the secrecy rate in (33), subject to the time constraint in (1), the transmit power constraints in ( 28) and (30), and the energy causality constraints in (27) and (29). The secrecy rate maximization problem is formulated as…”
Section: Problem Formulationmentioning
confidence: 99%