2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) 2018
DOI: 10.1109/asianhost.2018.8607164
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance of Cognitive Radio Sensor Networks with an Energy-Harvesting based Eavesdropper and Imperfect CSI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Previous Works. While most recent publications focused on securing direct transmission (i.e., without relaying [17][18][19][20][21][22][23]) and relaying transmission (i.e., without relay selection [24][25][26][27][28]) in cognitive radio networks with energy harvesting (CRNwEH) by the physical layer security technique (e.g., [29][30][31][32][33]), to the best of our understanding only three works in [34][35][36] mentioned the relay selection in these networks. To be specific, [34] studied the security capability of the conventional reactive relay selection in CRNwEH in terms of the secrecy outage probability (SOP) through Monte-Carlo simulations under the (peak transmission and interference) power constraints.…”
Section: Introductionmentioning
confidence: 99%
“…Previous Works. While most recent publications focused on securing direct transmission (i.e., without relaying [17][18][19][20][21][22][23]) and relaying transmission (i.e., without relay selection [24][25][26][27][28]) in cognitive radio networks with energy harvesting (CRNwEH) by the physical layer security technique (e.g., [29][30][31][32][33]), to the best of our understanding only three works in [34][35][36] mentioned the relay selection in these networks. To be specific, [34] studied the security capability of the conventional reactive relay selection in CRNwEH in terms of the secrecy outage probability (SOP) through Monte-Carlo simulations under the (peak transmission and interference) power constraints.…”
Section: Introductionmentioning
confidence: 99%