2021
DOI: 10.4108/eai.26-1-2021.168229
|View full text |Cite
|
Sign up to set email alerts
|

Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming

Abstract: This paper evaluates intercept probability (IP) of a cooperative cognitive radio network. Using Fountain codes, a secondary source continuously generates encoded packets, and sends them to secondary destination and relay nodes that attempt to receive a sufficient number of the encoded packets for recovering the source data. If the relay can sufficiently collect the packets before the destination, it replaces the source to transmit the encoded packets to the destination. Also in the secondary network, a passive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(18 citation statements)
references
References 30 publications
0
18
0
Order By: Relevance
“…-Different with published work [37], this paper does not consider Fountain codes and the cooperative jamming technique.…”
Section: A Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…-Different with published work [37], this paper does not consider Fountain codes and the cooperative jamming technique.…”
Section: A Related Workmentioning
confidence: 97%
“…At first, different with [27]- [30], this paper considers the PLS USS-CR networks. Next, although the related works [22]- [26] and [33]- [37] also study the IP/OP trade-off performance for the PLS USS-CR networks, the main difference can be listed as follows:…”
Section: A Related Workmentioning
confidence: 99%
“…Physical layer security and throughout maximization are challenges to be resolved in AANETs that can be handled through multiple access schemes [ 48 ]. As such, physical layer security can be an efficient tool to cope with the increased concern in secured AANETs [ 49 , 50 ].…”
Section: Aanet—security Perspectivementioning
confidence: 99%
“…However, the MIMO-NOMA paradigm in [53] only includes one destination, and does not exploit advantage of the CJ technique. Next, although reference [54] also studies the IP performance of secure relaying protocols employing RCs and CJ, but this work operates on cognitive environment, and a single-relay scheme is considered. Unlike [40]- [46], the relay in [54] does not forward each RCs packet to the destination.…”
Section: Introductionmentioning
confidence: 99%
“…Next, although reference [54] also studies the IP performance of secure relaying protocols employing RCs and CJ, but this work operates on cognitive environment, and a single-relay scheme is considered. Unlike [40]- [46], the relay in [54] does not forward each RCs packet to the destination. Instead, it attempts to recover the original data as soon as possible, so that it can replace the source to transmit the RCs packets to the destination.…”
Section: Introductionmentioning
confidence: 99%