메뉴 건너뛰기




Volumn 63, Issue 1, 2015, Pages 215-228

Relay-selection improves the security-reliability trade-off in cognitive radio systems

Author keywords

eavesdropping attack; intercept probability; outage probability; relay selection; Security reliability trade off

Indexed keywords

COGNITIVE RADIO; COGNITIVE SYSTEMS; ECONOMIC AND SOCIAL EFFECTS; PROBABILITY; RADIO SYSTEMS; RELIABILITY; SECURITY SYSTEMS; TELECOMMUNICATION REPEATERS;

EID: 84921348505     PISSN: 00906778     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCOMM.2014.2377239     Document Type: Article
Times cited : (266)

References (36)
  • 1
    • 0033171330 scopus 로고    scopus 로고
    • Cognitive radio: Making software radios more personal
    • Aug.
    • J. Mitola and G. Q. Maguire, "Cognitive radio: Making software radios more personal," IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.
    • (1999) IEEE Pers. Commun , vol.6 , Issue.4 , pp. 13-18
    • Mitola, J.1    Maguire, G.Q.2
  • 3
    • 84861330060 scopus 로고    scopus 로고
    • Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead
    • May
    • G. Baldini, T. Sturman, A. R. Biswas, and R. Leschhorn, "Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead," IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 355-379, May 2012.
    • (2012) IEEE Commun. Surveys Tuts , vol.14 , Issue.2 , pp. 355-379
    • Baldini, G.1    Sturman, T.2    Biswas, A.R.3    Leschhorn, R.4
  • 5
    • 77955017479 scopus 로고    scopus 로고
    • Cooperative spectrum sensing via belief propagation in spectrumheterogeneous cognitive radio systems
    • Apr
    • H. Li, "Cooperative spectrum sensing via belief propagation in spectrumheterogeneous cognitive radio systems," in Proc. IEEE WCNC, Sydney, N.S.W., Australia, Apr. 2010, pp. 1-6.
    • (2010) Proc IEEE WCNC, Sydney, N.S.W., Australia , pp. 1-6
    • Li, H.1
  • 6
    • 57149146164 scopus 로고    scopus 로고
    • Soft combination and detection for cooperative spectrum sensing in cognitive radio networks
    • Nov.
    • J.Ma, G. Zhao, and Y. Li, "Soft combination and detection for cooperative spectrum sensing in cognitive radio networks," IEEE Trans. Wireless Commun., vol. 7, no. 11, pp. 4502-4507, Nov. 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.11 , pp. 4502-4507
    • Ma, J.1    Zhao, G.2    Li, Y.3
  • 7
    • 33847696923 scopus 로고    scopus 로고
    • Fundamental limits of spectrum-sharing in fading environments
    • Feb.
    • A. Ghasemi and E. S. Sousa, "Fundamental limits of spectrum-sharing in fading environments," IEEE Trans Wireless Commun., vol. 6, no. 2, pp. 649-658, Feb. 2007.
    • (2007) IEEE Trans Wireless Commun , vol.6 , Issue.2 , pp. 649-658
    • Ghasemi, A.1    Sousa, E.S.2
  • 9
    • 42649092608 scopus 로고    scopus 로고
    • A survey on spectrum management in cognitive radio networks
    • Apr.
    • I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, "A survey on spectrum management in cognitive radio networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 40-48, Apr. 2008.
    • (2008) IEEE Commun. Mag , vol.46 , Issue.4 , pp. 40-48
    • Akyildiz, I.F.1    Lee, W.-Y.2    Vuran, M.C.3    Mohanty, S.4
  • 10
    • 78449306498 scopus 로고    scopus 로고
    • Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems part I: Known channel statistics
    • Nov.
    • H. Li and Z. Han, "Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems part I: Known channel statistics," IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3566-3577, Nov. 2010.
    • (2010) IEEE Trans. Wireless Commun , vol.9 , Issue.11 , pp. 3566-3577
    • Li, H.1    Han, Z.2
  • 11
    • 51349141382 scopus 로고    scopus 로고
    • Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
    • Aug.
    • T. Brown and A. Sethi, "Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment," in Proc. 2nd Int. Conf. CROWNCOM, Orlando, FL, USA, Aug. 2007, pp. 456-464.
    • (2007) Proc. 2nd Int. Conf. CROWNCOM, Orlando, FL, USA , pp. 456-464
    • Brown, T.1    Sethi, A.2
  • 13
    • 74549175881 scopus 로고    scopus 로고
    • Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs
    • Jan.
    • A. Olteanu and Y. Xiao, "Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs," IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 218-226, Jan. 2010.
    • (2010) IEEE Trans. Wireless Commun , vol.9 , Issue.1 , pp. 218-226
    • Olteanu, A.1    Xiao, Y.2
  • 14
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Sep.
    • Y. Xiao, V. K. Rayi, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Comput. Commun., vol. 30, no. 11-12, pp. 2314-2341, Sep. 2007.
    • (2007) Comput. Commun , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Du, X.3    Hu, F.4    Galloway, M.5
  • 15
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical layer security in multiuser wireless networks: A survey
    • Aug.
    • A. Mukherjee, S. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Aug. 2014.
    • (2014) IEEE Commun. Surveys Tuts , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.A.2    Huang, J.3    Swindlehurst, A.L.4
  • 16
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 18
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • Sep.
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE ISIT, Adelaide, SA, Australia, Sep. 2005, pp. 2152-2155.
    • (2005) Proc IEEE ISIT, Adelaide, SA, Australia , pp. 2152-2155
    • Parada, P.1    Blahut, R.2
  • 20
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    Gamal, H.3
  • 22
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug.
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2007.
    • (2007) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 24
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 25
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physical-layer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X.Wang, andW. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
    • (2013) IEEE J. Sel. Areas Commun , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Shen, W.2
  • 26
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Jan.
    • A. Mukherjee and A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.2
  • 27
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I. Kim, and K. Dong, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.2    Dong, K.3
  • 28
    • 79952680469 scopus 로고    scopus 로고
    • Secure communication in multiantenna cognitive radio networks with imperfect channel state information
    • Apr.
    • Y. Pei, Y.-C. Liang, K. C. Teh, and K. Li, "Secure communication in multiantenna cognitive radio networks with imperfect channel state information," IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1683-1693, Apr. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.4 , pp. 1683-1693
    • Pei, Y.1    Liang, Y.-C.2    Teh, K.C.3    Li, K.4
  • 29
    • 84891743872 scopus 로고    scopus 로고
    • Physical-layer security with multiuser scheduling in cognitive radio networks
    • Dec.
    • Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
    • (2013) IEEE Trans. Commun , vol.61 , Issue.12 , pp. 5103-5113
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 30
    • 84879072350 scopus 로고    scopus 로고
    • On physical layer security for cognitive radio networks
    • Jun.
    • Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Netw. Mag., vol. 27, no. 3, pp. 28-33, Jun. 2013.
    • (2013) IEEE Netw. Mag , vol.27 , Issue.3 , pp. 28-33
    • Shu, Z.1    Qian, Y.2    Ci, S.3
  • 31
    • 84904614329 scopus 로고    scopus 로고
    • Security versus reliability analysis of opportunistic relaying
    • Jun.
    • Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Tech., vol. 63, no. 6, pp. 2653-2661, Jun. 2014.
    • (2014) IEEE Trans. Veh. Tech , vol.63 , Issue.6 , pp. 2653-2661
    • Zou, Y.1    Wang, X.2    Shen, W.3    Hanzo, L.4
  • 32
    • 0344666663 scopus 로고    scopus 로고
    • A sufficient condition based on the Cauchy-Schwarz inequality for efficient template matching
    • Sep.
    • L. Di Stefano and S. Mattoccia, "A sufficient condition based on the Cauchy-Schwarz inequality for efficient template matching," in Proc. Int. Conf. Image Process., Catalonia, Spain, Sep. 2003, pp. 269-272.
    • (2003) Proc. Int. Conf. Image Process., Catalonia, Spain , pp. 269-272
    • Di Stefano, L.1    Mattoccia, S.2
  • 34
    • 84866740077 scopus 로고    scopus 로고
    • Diversity-multiplexing tradeoff in selective cooperation for cognitive radio
    • Sep.
    • Y. Zou, Y.-D. Yao, and B. Zheng, "Diversity-multiplexing tradeoff in selective cooperation for cognitive radio," IEEE Trans. Commun., vol. 60, no. 9, pp. 2467-2481, Sep. 2012.
    • (2012) IEEE Trans. Commun , vol.60 , Issue.9 , pp. 2467-2481
    • Zou, Y.1    Yao, Y.-D.2    Zheng, B.3
  • 35
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 36
    • 84867873837 scopus 로고    scopus 로고
    • Artificial noise by the receiver: Outage secrecy capacity/region analysis
    • Oct.
    • W. Li, M. Ghogho, B. Chen, and C. Xiong, "Artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
    • (2012) IEEE Commun. Lett , vol.16 , Issue.10 , pp. 1628-1631
    • Li, W.1    Ghogho, M.2    Chen, B.3    Xiong, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.