2018 IEEE Wireless Communications and Networking Conference (WCNC) 2018
DOI: 10.1109/wcnc.2018.8377071
|View full text |Cite
|
Sign up to set email alerts
|

Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…Relevant users in the considered system model of the underlay cognitive radio with the energy-scavenging capable unlicensed relay R are denoted in Figure 1. e unlicensed sender S broadcasts legitimate message to the unlicensed recipient D. is transmission is wire-tapped by the eavesdropper E and interferes the signal reception of the licensed receiver P (it is almost assumed in publications related to the SSP (e.g., [26,27] and references therein) that licensed transmitters may inflict the ignorable amount of interference to unlicensed recipients; this can be justified due to long distance between licensed transmitters and unlicensed recipients or such Gaussian-distributed interferences). Due to unexpected causes (e.g., severe shadowing, deep fading, and heavy path loss), D and E may receive the signals of S not strong enough for successful decoding.…”
Section: System Modelmentioning
confidence: 99%
“…Relevant users in the considered system model of the underlay cognitive radio with the energy-scavenging capable unlicensed relay R are denoted in Figure 1. e unlicensed sender S broadcasts legitimate message to the unlicensed recipient D. is transmission is wire-tapped by the eavesdropper E and interferes the signal reception of the licensed receiver P (it is almost assumed in publications related to the SSP (e.g., [26,27] and references therein) that licensed transmitters may inflict the ignorable amount of interference to unlicensed recipients; this can be justified due to long distance between licensed transmitters and unlicensed recipients or such Gaussian-distributed interferences). Due to unexpected causes (e.g., severe shadowing, deep fading, and heavy path loss), D and E may receive the signals of S not strong enough for successful decoding.…”
Section: System Modelmentioning
confidence: 99%
“…Most works (e.g., [17]- [21]) assumed the artificial noise x a to be completely known at the legitimate receivers (P R and SR), not at E, in order for P R and SR to totally eliminate the effect of x a on their received signal but this assumption seems impractical because the regeneration of x a is hardly achieved with the absolute probability. Therefore, this paper assumes x a to be regenerated at P R and SR with the accuracy of 1 − χ, χ ∈ [0, 1], which indicates that χx a represents the residual artificial noise due to imperfect artificial noise cancellation at P R and SR.…”
Section: System Modelmentioning
confidence: 99%
“…Similarly, the channel capacities at E for decoding x s and x p in Stage II are inferred from (20) and (21), correspondingly, as…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Whilst most publications have investigated the PHY security for energy harvesting (interweave/underlay) networks, a handful works have paid attention to the overlay mechanism [5,[21][22][23][24][25][26][27][28]. More specifically, [21] investigated the almost similar system model to ours but EHONs are secured by asking a devoted jammer to jam the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%