2018
DOI: 10.1186/s13638-018-1100-y
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy analysis of cognitive radio network with MS-GSC/MRC scheme

Abstract: We propose and analyze minimum selection-generalized selection combining (MS-GSC) at secondary receiver (SR) with maximal ratio combining at eavesdropper (ER) to enhance data security at physical layer. We consider an underlay cognitive radio network (CRN) where SR and ER are equipped with multiple antennas, and secondary transmitter (ST) has single antenna with a primary user. Passive eavesdropping is also taken into account.This work is aimed to find the effect of MS-GSC diversity technique on secrecy outage… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…The equation can be further simplified into 8 Poutage=true0true0Fγmainfalse(X=xfalse)false(γhfalse)fγevefalse|false(X=xfalse)false(γhfalse)fxfalse(xfalse)dγhdx, where F γmain ( X = x ) (∈ γ h ) is the CDF of γ h conditioned on x and the power gain between ST x and PU is represented by X . Further, ∈ γ h =2 R s (1+ γ h )−1, f x ( x ) is PDF conditioned on x , and fγevefalse|false(X=xfalse)false(γhfalse) is the PDF of γ eve conditioned on x .…”
Section: Secrecy Outage Probabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…The equation can be further simplified into 8 Poutage=true0true0Fγmainfalse(X=xfalse)false(γhfalse)fγevefalse|false(X=xfalse)false(γhfalse)fxfalse(xfalse)dγhdx, where F γmain ( X = x ) (∈ γ h ) is the CDF of γ h conditioned on x and the power gain between ST x and PU is represented by X . Further, ∈ γ h =2 R s (1+ γ h )−1, f x ( x ) is PDF conditioned on x , and fγevefalse|false(X=xfalse)false(γhfalse) is the PDF of γ eve conditioned on x .…”
Section: Secrecy Outage Probabilitymentioning
confidence: 99%
“…The eavesdropper is a malicious node that intercepts the data transmission of legitimate user 7 . The main aim of physical layer security is to increase the gain of legitimate SU receiver's channel as compared with the eavesdropper's channel to acquire perfect secrecy 8 . The physical layer security work was firstly carried out by Shannon 9 and was further extended by Wyner 10 in which the secrecy capacity was derived in contest of information theory.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation