2017
DOI: 10.3390/s17051026
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance Analysis of Cognitive Sensor Radio Networks with an EH-Based Eavesdropper

Abstract: Security and privacy are crucial for cognitive sensor radio networks (CSRNs) due to the possible eavesdropping between secondary sensors and the secondary fusion center. Motivated by this observation, we investigate the physical layer security performance of CSRNs with an external energy harvesting (EH)-based eavesdropper. Considering the underlay working paradigm of CSRNs, the transmit power of the secondary sensor node must be adjusted to guarantee the quality-of-service (QoS) of the primary user. Hence, two… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 43 publications
0
11
0
Order By: Relevance
“…Since energy harvesting is an appealing and promising technology [ 31 , 32 ], more and more papers study PLS problems with EH nodes recently. In [ 10 ], the PLS issue of cognitive sensor radio networks (CSRNs) with an external EH eavesdropper was investigated. Underlay spectrum sharing was used in CSRNs.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Since energy harvesting is an appealing and promising technology [ 31 , 32 ], more and more papers study PLS problems with EH nodes recently. In [ 10 ], the PLS issue of cognitive sensor radio networks (CSRNs) with an external EH eavesdropper was investigated. Underlay spectrum sharing was used in CSRNs.…”
Section: Related Workmentioning
confidence: 99%
“…The sensor node acts as the secondary user, and adjusts its transmit power to guarantee the primary user’s quality-of-service (QoS). Two scenarios with different interference power constraints were studied and the closed-form analytical expressions of secrecy outage probability for both cases were derived [ 10 ]. Authors in [ 33 ] considered an underlay cognitive radio system, where a source in a secondary system transmitted information to a full-duplex (FD) wireless EH destination node in the presence of an eavesdropper.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations