2019
DOI: 10.3390/e21020217
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments

Abstract: In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
24
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(25 citation statements)
references
References 52 publications
(56 reference statements)
1
24
0
Order By: Relevance
“…Therefore, the transmit power of all sources and relays increases, leading to an increase in IP. This can be verified using Equations (17) and (18). As in Figures 3 and 4, we can see that the simulation and analytical values are the same, and the values obtained with the MRC technique are better than those obtained with the SC technique for verifying the correctness of the system performance analysis described in the third section.…”
Section: Numerical Results and Discussionsupporting
confidence: 62%
See 2 more Smart Citations
“…Therefore, the transmit power of all sources and relays increases, leading to an increase in IP. This can be verified using Equations (17) and (18). As in Figures 3 and 4, we can see that the simulation and analytical values are the same, and the values obtained with the MRC technique are better than those obtained with the SC technique for verifying the correctness of the system performance analysis described in the third section.…”
Section: Numerical Results and Discussionsupporting
confidence: 62%
“…With the SC technique, E will choose the max SNR from Equations (17) and (18). Hence, the end-to-end SNR at E can be expressed by…”
Section: The Integral In Equationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we present numerical results to demonstrate the system performance of the proposed system network in the above section. The correctness of the analytical analysis in the above section is verified by the Monte Carlo simulation as in [25][26][27][28][29][36][37][38][39][40][41][42][43][44].…”
Section: Numerical Results and Discussionmentioning
confidence: 92%
“…For multiple-input multiple-output relay channels [24], proposed a low complexity dynamic antenna switching between information decoding and energy harvesting based on the principles of the generalized selection combiner. The authors in [25] proposed and studied a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks by formulating an effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold, and the hardware impairment level. Furthermore [26], presented a partial relay selection (PRS) protocol to enhance the secrecy performance for cooperative cognitive radio networks (CRNs).…”
Section: Introductionmentioning
confidence: 99%