메뉴 건너뛰기




Volumn 2016-July, Issue , 2016, Pages

Secure secondary communications with curious primary users in cognitive underlay networks

Author keywords

Full duplex; Jamming; Physical layer security; Power allocation; Underlay cognitive networks

Indexed keywords

COGNITIVE RADIO; COMMUNICATION CHANNELS (INFORMATION THEORY); DECODING; JAMMING; NETWORK LAYERS; QUALITY OF SERVICE; SECURE COMMUNICATION; SIGNAL RECEIVERS; TRANSMITTERS;

EID: 84979783746     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VTCSpring.2016.7504464     Document Type: Conference Paper
Times cited : (3)

References (14)
  • 1
    • 67349259569 scopus 로고    scopus 로고
    • Breaking spectrum gridlock with cognitive radios: An information theoretic perspective
    • May
    • A. Goldsmith, S. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: An information theoretic perspective, " Proc. IEEE, vol. 97, no. 5, pp. 894-914, May 2009.
    • (2009) Proc. IEEE , vol.97 , Issue.5 , pp. 894-914
    • Goldsmith, A.1    Jafar, S.2    Maric, I.3    Srinivasa, S.4
  • 2
    • 33847696923 scopus 로고    scopus 로고
    • Fundamental limits of spectrum-sharing in fading environments
    • Feb.
    • A. Ghasemi and E. S. Sousa, "Fundamental limits of spectrum-sharing in fading environments, " IEEE Trans. Wireless Commun., vol. 6, no. 2, pp. 649-658, Feb. 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.2 , pp. 649-658
    • Ghasemi, A.1    Sousa, E.S.2
  • 3
    • 61349094185 scopus 로고    scopus 로고
    • Optimal power allocation for fading channels in cognitive radio networks: Ergodic capacity and outage capacity
    • Feb.
    • X. Kang, Y. Liang, A. Nallanathan, H. Garg, and R. Zhang, "Optimal power allocation for fading channels in cognitive radio networks: ergodic capacity and outage capacity, " IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 940C950, Feb. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.2 , pp. 940C950
    • Kang, X.1    Liang, Y.2    Nallanathan, A.3    Garg, H.4    Zhang, R.5
  • 4
    • 38149123501 scopus 로고    scopus 로고
    • Joint beamforming and power allocation for multiple access channels in cognitive radio networks
    • Jan.
    • L. Zhang, Y.-C. Liang, and Y. Xin, "Joint beamforming and power allocation for multiple access channels in cognitive radio networks, " IEEE J. Select. Areas Commun., vol. 26, no. 1, pp. 38-51, Jan. 2008.
    • (2008) IEEE J. Select. Areas Commun. , vol.26 , Issue.1 , pp. 38-51
    • Zhang, L.1    Liang, Y.-C.2    Xin, Y.3
  • 5
    • 84873097542 scopus 로고    scopus 로고
    • Improving secrecy rate via spectrum leasing for friendly jamming
    • Jan.
    • I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming, " IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134C145, Jan. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.1 , pp. 134C145
    • Stanojev, I.1    Yener, A.2
  • 6
    • 84927743467 scopus 로고    scopus 로고
    • Spectrum leasing via cooperation for enhanced physical-layer secrecy
    • Nov.
    • K. Lee, O. Simeone, C. Chae, and J. Kang, "Spectrum leasing via cooperation for enhanced physical-layer secrecy, " IEEE Trans. Veh. Technol., vol. 62, no. 9, pp. 4672C4678, Nov. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.9 , pp. 4672C4678
    • Lee, K.1    Simeone, O.2    Chae, C.3    Kang, J.4
  • 7
    • 77951274829 scopus 로고    scopus 로고
    • Secure communication over MISO cognitive radio channels
    • Apr.
    • Y. Pei, Y. Liang, L. Zhang, K. Teh, and K. Li, "Secure communication over MISO cognitive radio channels, " IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494C1502, Apr. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.4 , pp. 1494C1502
    • Pei, Y.1    Liang, Y.2    Zhang, L.3    Teh, K.4    Li, K.5
  • 8
    • 84899917172 scopus 로고    scopus 로고
    • Secure communications with untrusted secondary nodes in cognitive radio networks
    • April
    • H. Jeon, S. W. McLaughlin, Il-Min Kim, and J. Ha, "Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks, " IEEE Trans. Wireless Commun., vol. 13, no. 4, pp. 1790-1805, April 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.4 , pp. 1790-1805
    • Jeon, H.1    McLaughlin, S.W.2    Kim, I.3    Ha, J.4
  • 9
    • 84979774364 scopus 로고    scopus 로고
    • Smart power allocation for secrecy transmission in reciprocally cooperative spectrum sharing
    • Jan.
    • S. Pham, D. Har, and H. Kong, "Smart Power Allocation for Secrecy Transmission in Reciprocally Cooperative Spectrum Sharing, " IEEE Trans. Veh. Technol. Society, vol. PP, no. 99, pp. 1-1, Jan. 2015.
    • (2015) IEEE Trans. Veh. Technol. Society , vol.PP , Issue.99 , pp. 1
    • Pham, S.1    Har, D.2    Kong, H.3
  • 10
    • 77954833497 scopus 로고    scopus 로고
    • Co-channel interference cancellation using single radio frequency and baseband chain
    • July
    • S. W. Kim, Y. J. Chun, and S. Kim, "Co-channel interference cancellation using single radio frequency and baseband chain, " emphIEEE Trans. Commun., vol. 58, no. 7, pp. 2169C2175, July 2010.
    • (2010) EmphIEEE Trans. Commun. , vol.58 , Issue.7 , pp. 2169C2175
    • Kim, S.W.1    Chun, Y.J.2    Kim, S.3
  • 11
    • 67651165310 scopus 로고    scopus 로고
    • Optimized gain control for single-frequency relaying with loop interference
    • Jun.
    • T. Riihonen, S. Werner, and R. Wichman, "Optimized gain control for single-frequency relaying with loop interference, " IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 2801C2806, Jun. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.6 , pp. 2801C2806
    • Riihonen, T.1    Werner, S.2    Wichman, R.3
  • 12
    • 84867873837 scopus 로고    scopus 로고
    • Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
    • Oct.
    • W. Li, M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: outage secrecy capacity/region analysis, " IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.10 , pp. 1628-1631
    • Li, W.1    Ghogho, M.2    Chen, B.3    Xiong, C.4
  • 13
    • 84883785476 scopus 로고    scopus 로고
    • Improving physical layer secrecy using full-duplex jamming receivers
    • Oct.
    • G. Zheng, I. Krikidis, J. Li, A. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers, " IEEE Trans. Signal Process., vol. 61, pp. 4962C4974, Oct. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , pp. 4962C4974
    • Zheng, G.1    Krikidis, I.2    Li, J.3    Petropulu, A.4    Ottersten, B.5
  • 14
    • 0017996501 scopus 로고
    • The Gaussian wiretap channel
    • July
    • S. L. Y. Cheong and M. Hellman, "The Gaussian wiretap channel, " IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.4 , pp. 451-456
    • Cheong, S.L.Y.1    Hellman, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.