2016
DOI: 10.1109/lsp.2016.2587323
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage Analysis for SIMO Underlay Cognitive Radio Networks over Generalized-K Fading Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
26
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 28 publications
(26 citation statements)
references
References 20 publications
0
26
0
Order By: Relevance
“…In [15][16][17][18], the authors considered cooperative jamming approaches to reduce the data rate received at the eavesdroppers. The authors of [19][20][21][22][23][24][25] considered the secrecy performance enhancement for underlay cognitive radio (UCR) networks in which transmit power of secondary users (SUs) is limited by maximum interference levels required by primary users (PUs). The authors of [26][27][28][29] proposed secure communication protocols for two-way relay networks.…”
mentioning
confidence: 99%
“…In [15][16][17][18], the authors considered cooperative jamming approaches to reduce the data rate received at the eavesdroppers. The authors of [19][20][21][22][23][24][25] considered the secrecy performance enhancement for underlay cognitive radio (UCR) networks in which transmit power of secondary users (SUs) is limited by maximum interference levels required by primary users (PUs). The authors of [26][27][28][29] proposed secure communication protocols for two-way relay networks.…”
mentioning
confidence: 99%
“…The authors derived the analytical expression for SOP over Nakagami‐ m fading channels for single‐input multiple‐output systems with generalized selection combining . The secrecy outage performance of a SIMO cognitive wiretap system over generalized‐K channels, where both the primary user and the secondary transmitter are equipped with a single antenna, and the legitimate and the eavesdropper receivers are equipped with multiple antennas is considered . The authors investigated the probability of outage of secrecy for an underlay cognitive radio system over Rayleigh fading channels, where the secondary users deployed single antenna operating in full duplex mode …”
Section: Introductionmentioning
confidence: 99%
“…An issue of performance analysis in physical layer security over GK fading channels is that the exact probability density function (PDF) of GK fading is very complex, and typically leads to a Meijer's G-function in the final closed-form expression [13], [14], and there is a strong debate about whether the Meijer's G-function can be seen as a closed-form or not [15]. Therefore, a tight and tractably approximate PDF of GK fading was proposed in [16], called the mixture Gamma distribution method, which is composed by only elementary functions.…”
Section: Introductionmentioning
confidence: 99%
“…The DF relay can use an independent codeword from that of the source such that the eavesdropper (even powerful eavesdropper) cannot employ maximal ratio combining[23] 2. There is a strong debate about whether the Meijer's G-function can be considered as the closed-form or not[15] 3. In this approximate PDF and CDF, mt and kt are only allowed to take positive integers.…”
mentioning
confidence: 99%