2018
DOI: 10.1155/2018/5457176
|View full text |Cite
|
Sign up to set email alerts
|

Reliability‐Security Trade‐Off Analysis of Cognitive Radio Networks with Jamming and Licensed Interference

Abstract: Cognitive radio networks (CRNs) allow coexistence of unlicensed users (UUs) and licensed users (LUs) and hence, mutual interference between UUs and LUs is neither ignored nor considered as Gaussian-distributed quantity. Additionally, exploiting jamming signals to purposely interfere with signal reception of eavesdroppers is a feasible solution to improve security performance of CRNs. This paper analyzes reliability-security trade-off, which accounts for maximum transmit power constraint, interference power con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…The function Λðb, c, g, lÞ has an accurate closed form as ( [42], eq. ( 19)) by setting the argument a of ( [42], eq. ( 19)) to zero.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…The function Λðb, c, g, lÞ has an accurate closed form as ( [42], eq. ( 19)) by setting the argument a of ( [42], eq. ( 19)) to zero.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Other publications without mentioning all three characteristics (EH, TWR, PLS) of wireless networks should not be surveyed (e.g. [9][10][11][12][13][14][15][16][17][18] should not be reviewed because they did not mention EH in their system models).…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, S 1 , S 2 , and J can cooperate with each other [Following the widely accepted assumption in various publications (e.g. [10,[13][14][15][16][17][18]26]), this paper also assumes that the relay and two sources have the knowledge of jamming signals. This can be feasibly implemented by, for instance, sharing the seed of the random noise generator in a secure manner among the relay and two sources, or using some pseudo-random codes which are known to the relay and two sources but not open to the eavesdropper.].…”
Section: System Modelmentioning
confidence: 99%