2019
DOI: 10.1109/tcomm.2019.2904258
|View full text |Cite
|
Sign up to set email alerts
|

The Security–Reliability Tradeoff of Multiuser Scheduling-Aided Energy Harvesting Cognitive Radio Networks

Abstract: We study the physical-layer security of a cognitive radio system in the face of multiple eavesdroppers (EDs), which is composed of a secondary base station (SBS), multiple secondary users (SUs) as well as a pair of primary transmitter (PT) and primary receiver (PR), where the SUs first harvest energy from their received radio frequency signals transmitted by the PT and then communicate with the SBS relying on opportunistic scheduling. We consider two specific user scheduling schemes, namely the channel-aware u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(29 citation statements)
references
References 43 publications
0
29
0
Order By: Relevance
“…Although various works analyzed the security performance of the direct message transmission (i.e., no relay) in underlay cognitive networks with energy scavenging (e.g., [6][7][8][9][10][11][12][13][14] and references therein), few publications [15][16][17][18][19][20] have paid attention to security evaluation for the underlay cognitive network with the energy-scavenging capable relay (UCNwEScR). To be more specific, the authors in [15] investigated the UCNwEScR in which the decode-and-forward unlicensed relay consumes its energy scavenged from the RF signals of the unlicensed sender and the licensed transmitter to forward the unlicensed sender's message to the unlicensed recipient as the direct message transmission is unreliable.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Although various works analyzed the security performance of the direct message transmission (i.e., no relay) in underlay cognitive networks with energy scavenging (e.g., [6][7][8][9][10][11][12][13][14] and references therein), few publications [15][16][17][18][19][20] have paid attention to security evaluation for the underlay cognitive network with the energy-scavenging capable relay (UCNwEScR). To be more specific, the authors in [15] investigated the UCNwEScR in which the decode-and-forward unlicensed relay consumes its energy scavenged from the RF signals of the unlicensed sender and the licensed transmitter to forward the unlicensed sender's message to the unlicensed recipient as the direct message transmission is unreliable.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [164], physical-layer security for EH-aided CR is proposed. Two scheduling algorithms that are advantageous for the users are described as channel-aware user scheduling (CaUS) and energy-aware user scheduling (EaUS).…”
Section: A Energy Efficient Resource Managementmentioning
confidence: 99%
“…In [161]- [163], scheduling for EH and spectrum sensing based heterogeneous CR sensor networks is discussed in the context of green communications. Physical layer security is also a primary concern in EH based CR, which is studied in [164]. Time scheduling for backscatteraided RF powered CR networks is discussed in [165].…”
Section: Introductionmentioning
confidence: 99%
“…Many cryptographic security frameworks for data mobility or nodes transmission have been proposed in several environments such as MANETs, VANETs, UAVs, WMNs, and WSNs [32][33][34][35]. Such frameworks cannot be directly applied in CRNs because of their unique individuality.…”
Section: Related Workmentioning
confidence: 99%