2015
DOI: 10.1109/tvt.2014.2359246
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Capacity of the Primary System in a Cognitive Radio Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
40
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(40 citation statements)
references
References 19 publications
0
40
0
Order By: Relevance
“…However, in [8], the impact of multipath fading was neglected. In [9], the secrecy D. S. Karas capacity was investigated for a cognitive radio system with security based on artificial noise, assuming full channel state information (CSI) knowledge for the legitimate RX's channel, and partial CSI for the eavesdropper's channel. Finally, the impact of interference on multi-user scheduling transmission schemes was investigated in [10] and [11].…”
Section: Introductionmentioning
confidence: 99%
“…However, in [8], the impact of multipath fading was neglected. In [9], the secrecy D. S. Karas capacity was investigated for a cognitive radio system with security based on artificial noise, assuming full channel state information (CSI) knowledge for the legitimate RX's channel, and partial CSI for the eavesdropper's channel. Finally, the impact of interference on multi-user scheduling transmission schemes was investigated in [10] and [11].…”
Section: Introductionmentioning
confidence: 99%
“…Accordingly, PHY security for CRNs has been investigated in [10]- [14]. In [10], [11], multi-antennas at the secondary transmitter were utilized to realize a beamforming that maximizes the secrecy capacity of secondary system while satisfying a peak interference constraint at the primary receiver.…”
Section: Introductionmentioning
confidence: 99%
“…Cooperation between the secondary system and the primary system was proposed to improve the secrecy capacity of the primary system in [12]. A simple case with single antenna at eavesdropper was considered in [13], [14]. In [13], a joint beamforming for information and jamming noise was proposed to protect both the primary system and the secondary system, where the secondary system acts as amplify-forward relaying the information of the primary system.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations