2014
DOI: 10.1109/lwc.2014.2350501
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- <inline-formula> <tex-math notation="TeX">$m$</tex-math></inline-formula> Fading Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
30
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 79 publications
(31 citation statements)
references
References 13 publications
1
30
0
Order By: Relevance
“…In this model, we consider only one case as assumed in earlier system model of Network-A, which PU-TX is far away from the secondary nodes as in Tang, Pan, and Li's study. 2 So, interference from the PU-TX is negligible at each USAFR and at the SD. All other assumptions are the same as in the system model of Network-A.…”
Section: System Model Of Network-bmentioning
confidence: 99%
“…In this model, we consider only one case as assumed in earlier system model of Network-A, which PU-TX is far away from the secondary nodes as in Tang, Pan, and Li's study. 2 So, interference from the PU-TX is negligible at each USAFR and at the SD. All other assumptions are the same as in the system model of Network-A.…”
Section: System Model Of Network-bmentioning
confidence: 99%
“…One is underlay spectrum sharing model and the other is overlay spectrum sharing model. In underlay spectrum sharing model, even if primary user (PU) is working, secondary user (SU) can transmit signal simultaneously under the licensed PU spectrum [2]. For underlay CR design, the interference from SUs' communication must be tolerable to PU.…”
Section: Introductionmentioning
confidence: 99%
“…In [17], a hybrid visible light communication radio frequency (RF) system with legitimate receiver and an eavesdropper was considered where legitimate receiver can harvest energy from the light emitted by light-emitting diodes, and exact and asymptotic SOP was derived by using stochastic geometry method. The closed-form expressions for SOP and non-zero secrecy capacity for underlay CR unit over Nakagami-m fading were investigated in [18], and the secrecy outage performance of PU system in the presence of the eavesdropping and interfering of SU was analyzed in [19]. Generalizedselection combining (GSC) is a hybrid technique that overcomes the limitation of MRC and selection combining (SC).…”
Section: Introductionmentioning
confidence: 99%