2021
DOI: 10.23919/jcc.2021.12.002
|View full text |Cite
|
Sign up to set email alerts
|

Relay-assisted secure short-packet transmission in cognitive IoT with spectrum sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Later, Chen and others expanded their previous security works to cognitive relaying networks [15,16]. The relay design in previous works [15,16] exploits the maximum ratio combining/zero forcing beamforming scheme to guarantee the secrecy performance of dual-hop short-packet communications. In the underlay cognitive relaying network of Ho and others [17], secondary-source and secondary-energy-harvesting relays send short packets to a secondary destination under interference constraints.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…Later, Chen and others expanded their previous security works to cognitive relaying networks [15,16]. The relay design in previous works [15,16] exploits the maximum ratio combining/zero forcing beamforming scheme to guarantee the secrecy performance of dual-hop short-packet communications. In the underlay cognitive relaying network of Ho and others [17], secondary-source and secondary-energy-harvesting relays send short packets to a secondary destination under interference constraints.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Their proposed protocol lowers the latency and improves the reliability from those of the benchmark scheme (long packet communications created in the same model settings). However, previous works [14][15][16][17][18][19] have ignored the emerging IRS.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…Packet replication and interface diversity schemes were employed in [ 14 ] to improve the secure spectral efficiency, where eavesdroppers are randomly distributed according to Poisson point processes. In [ 15 ], the spectrum sensing blocklength and transmission blocklength were jointly optimized to maximize the secrecy throughput. In order to achieve both high spectral efficiency and low communication delay, incorporating short-packet communications with non-orthogonal multiple access (NOMA) networks was investigated in [ 16 , 17 , 18 ].…”
Section: Introductionmentioning
confidence: 99%