메뉴 건너뛰기




Volumn 9, Issue 11, 2014, Pages 1814-1827

On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels

Author keywords

artificial noise; Cognitive radio; physical layer security; power allocation; secrecy outage; secrecy throughput

Indexed keywords

ARTIFICIAL NOISE; COGNITIVE RADIO NETWORK; PHYSICAL LAYER SECURITY; POWER ALLOCATIONS; SECRECY OUTAGES; SLOW FADING CHANNEL; THROUGHPUT MAXIMIZATION;

EID: 84907533750     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2356339     Document Type: Article
Times cited : (115)

References (37)
  • 1
    • 67349259569 scopus 로고    scopus 로고
    • Breaking spectrum gridlock with cognitive radios: An information theoretic perspective
    • May
    • A. Goldsmith, S. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: An information theoretic perspective," Proc. IEEE, vol. 97, no. 5, pp. 894-914, May 2009.
    • (2009) Proc. IEEE , vol.97 , Issue.5 , pp. 894-914
    • Goldsmith, A.1    Jafar, S.2    Maric, I.3    Srinivasa, S.4
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 85032751776 scopus 로고    scopus 로고
    • Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches
    • Sep.
    • Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 29-40
    • Hong, Y.-W.P.1    Lan, P.-C.2    Kuo, C.-C.J.3
  • 4
    • 85032751357 scopus 로고    scopus 로고
    • Cooperative security at the physical layer: A summary of recent advances
    • Sep.
    • R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 16-28
    • Bassily, R.1
  • 5
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar.
    • G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.-C.2    Wong, K.-K.3
  • 6
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct.
    • J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 7
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative Beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
    • Jan.
    • H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative Beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.-M.1    Luo, M.2    Xia, X.-G.3    Yin, Q.4
  • 8
    • 84888318377 scopus 로고    scopus 로고
    • Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
    • Dec.
    • H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 2007-2020
    • Wang, H.-M.1    Luo, M.2    Yin, Q.3    Xia, X.-G.4
  • 9
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul.
    • H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 61, no. 5, pp. 3532-3545, Jul. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.61 , Issue.5 , pp. 3532-3545
    • Wang, H.-M.1    Yin, Q.2    Xia, X.-G.3
  • 10
    • 84904282993 scopus 로고    scopus 로고
    • Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks
    • Aug.
    • H.-M. Wang, F. Liu, and X.-G. Xia, "Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240-1250, Aug. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.8 , pp. 1240-1250
    • Wang, H.-M.1    Liu, F.2    Xia, X.-G.3
  • 11
    • 84907557424 scopus 로고    scopus 로고
    • Robust joint beamforming and jamming for secure AF networks: Low complexity design
    • to be published
    • C. Wang and H.-M. Wang, "Robust joint beamforming and jamming for secure AF networks: Low complexity design," IEEE Trans. Veh. Technol., to be published.
    • IEEE Trans. Veh. Technol.
    • Wang, C.1    Wang, H.-M.2
  • 12
    • 84907557423 scopus 로고    scopus 로고
    • Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
    • to be published
    • C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., to be published.
    • IEEE Trans. Wireless Commun.
    • Wang, C.1    Wang, H.-M.2    Xia, X.-G.3
  • 13
    • 80051757604 scopus 로고    scopus 로고
    • An information secrecy game in cognitive radio networks
    • Sep.
    • Y. Wu and K. J. R. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 831-842
    • Wu, Y.1    Liu, K.J.R.2
  • 14
    • 84873097542 scopus 로고    scopus 로고
    • Improving secrecy rate via spectrum leasing for friendly jamming
    • Jan.
    • I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-135, Jan. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.1 , pp. 134-135
    • Stanojev, I.1    Yener, A.2
  • 15
    • 84886662535 scopus 로고    scopus 로고
    • Cooperative spectrum access towards secure information transfer for CRNs
    • Nov.
    • N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, "Cooperative spectrum access towards secure information transfer for CRNs," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 2453-2464, Nov. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 2453-2464
    • Zhang, N.1    Lu, N.2    Cheng, N.3    Mark, J.W.4    Shen, X.5
  • 16
    • 84891743872 scopus 로고    scopus 로고
    • Physical-layer security with multiuser scheduling in cognitive radio networks
    • Dec.
    • Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.12 , pp. 5103-5113
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 17
    • 4444219556 scopus 로고    scopus 로고
    • IEEE P802.22/D1.0 Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands, 22, Apr.
    • IEEE P802.22/D1.0 Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands, IEEE Standard 802.22, Apr. 2008.
    • (2008) IEEE Standard , vol.802
  • 18
    • 84877644812 scopus 로고    scopus 로고
    • Secure MISO cognitive radio system with perfect and imperfect CSI
    • Dec.
    • T. Kwon, V. W. S. Wong, and R. Schober, "Secure MISO cognitive radio system with perfect and imperfect CSI," in Proc. IEEE Int. Conf. Commun. (ICC), Dec. 2012, pp. 1236-1241.
    • (2012) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 1236-1241
    • Kwon, T.1    Wong, V.W.S.2    Schober, R.3
  • 19
    • 79952680469 scopus 로고    scopus 로고
    • Secure communication in multiantenna cognitive radio networks with imperfect channel state information
    • Apr.
    • Y. Pei, Y.-C. Liang, K. C. Teh, and K. H. Li, "Secure communication in multiantenna cognitive radio networks with imperfect channel state information," IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1683-1693, Apr. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.4 , pp. 1683-1693
    • Pei, Y.1    Liang, Y.-C.2    Teh, K.C.3    Li, K.H.4
  • 20
    • 77951274829 scopus 로고    scopus 로고
    • Secure communication over MISO cognitive radio channels
    • Apr.
    • Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.4 , pp. 1494-1502
    • Pei, Y.1    Liang, Y.-C.2    Zhang, L.3    Teh, K.C.4    Li, K.H.5
  • 23
    • 79952706123 scopus 로고    scopus 로고
    • Rethinking the secrecy outage formulation: A secure transmission design perspective
    • Mar.
    • X. Zhou, M. R. McKay, B. Maham, and A. Hjrungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.3 , pp. 302-304
    • Zhou, X.1    McKay, M.R.2    Maham, B.3    Hjrungnes, A.4
  • 24
    • 84879203277 scopus 로고    scopus 로고
    • On the design of artificialnoise- aided secure multi-antenna transmission in slow fading channels
    • Jun.
    • X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificialnoise- aided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2170-2181
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 25
    • 84907557422 scopus 로고    scopus 로고
    • Robust multiple antenna cooperative spectrum sharing design with random vector quantization
    • to be published
    • F.-S. Tseng and C.-Y. Hsu, "Robust multiple antenna cooperative spectrum sharing design with random vector quantization," IEEE Trans. Veh. Technol., to be published. [Online]. Available http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6697840
    • IEEE Trans. Veh. Technol.
    • Tseng, F.-S.1    Hsu, C.-Y.2
  • 26
    • 40849136148 scopus 로고    scopus 로고
    • Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks
    • Feb.
    • R. Zhang and Y.-C. Liang, "Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 2, no. 1, pp. 88-102, Feb. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.2 , Issue.1 , pp. 88-102
    • Zhang, R.1    Liang, Y.-C.2
  • 27
    • 84860213891 scopus 로고    scopus 로고
    • Orthogonal transmissions for spectrum underlay MISO cognitive radio
    • Apr.
    • H. Guo and V. C. M. Leung, "Orthogonal transmissions for spectrum underlay MISO cognitive radio," IEEE Trans. Wireless Commun., vol. 11, no. 4, pp. 1266-1270, Apr. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.4 , pp. 1266-1270
    • Guo, H.1    Leung, V.C.M.2
  • 28
    • 51649110931 scopus 로고    scopus 로고
    • Achievable rates in Gaussian MISO channels with secrecy constraints
    • Jun.
    • S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 2466-2470.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 2466-2470
    • Shafiee, S.1    Ulukus, S.2
  • 30
    • 84893431203 scopus 로고    scopus 로고
    • Adaptive limited feedback for MISO wiretap channels with cooperative jamming
    • Feb.
    • M. Pei, A. L. Swindlehurst, D. Ma, and J. Wei, "Adaptive limited feedback for MISO wiretap channels with cooperative jamming," IEEE Trans. Signal Process, vol. 62, no. 4, pp. 993-1004, Feb. 2014.
    • (2014) IEEE Trans. Signal Process , vol.62 , Issue.4 , pp. 993-1004
    • Pei, M.1    Swindlehurst, A.L.2    Ma, D.3    Wei, J.4
  • 35
    • 85032752174 scopus 로고    scopus 로고
    • Scaling up MIMO: Opportunities and challenges with very large arrays
    • Jan.
    • F. Rusek et al., "Scaling up MIMO: Opportunities and challenges with very large arrays," IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40-60, Jan. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.1 , pp. 40-60
    • Rusek, F.1
  • 36
    • 84896823919 scopus 로고    scopus 로고
    • Massive MIMO for next generation wireless systems
    • Feb.
    • E. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, "Massive MIMO for next generation wireless systems," IEEE Commun. Mag., vol. 52, no. 2, pp. 186-195, Feb. 2014. [Online]. Available: http://arxiv.org/pdf/1304.6690v3.pdf
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.2 , pp. 186-195
    • Larsson, E.1    Edfors, O.2    Tufvesson, F.3    Marzetta, T.L.4
  • 37
    • 84867511032 scopus 로고    scopus 로고
    • The topological proof of Abel-Ruffini theorem
    • Jun.
    • H. Zöladek, "The topological proof of Abel-Ruffini theorem," J. Juliusz Schauder Center, vol. 16, no. 6, pp. 253-265, Jun. 2000.
    • (2000) J. Juliusz Schauder Center , vol.16 , Issue.6 , pp. 253-265
    • Zöladek, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.