2012 IEEE International Conference on Communications (ICC) 2012
DOI: 10.1109/icc.2012.6364834
|View full text |Cite
|
Sign up to set email alerts
|

Cooperation for secure broadcasting in cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…Observe that (25b) is well presented in (12). It is now clear that the difficulty in solving (25) is due to (25c)-(25e) since the remaining constraints are convex and approximate convex. Instead of this, we can find a sub-optimal solution of (25) as follows maximize w,U,t,z,ϕ,φ,α,β ϕ (26a)…”
Section: B Optimization Problem Formulationmentioning
confidence: 90%
“…Observe that (25b) is well presented in (12). It is now clear that the difficulty in solving (25) is due to (25c)-(25e) since the remaining constraints are convex and approximate convex. Instead of this, we can find a sub-optimal solution of (25) as follows maximize w,U,t,z,ϕ,φ,α,β ϕ (26a)…”
Section: B Optimization Problem Formulationmentioning
confidence: 90%
“…[10] extends the work in [9] by considering the system model under a target physical layer security rate constraint. In [11], the trade-off between cooperation and secrecy in cognitive radio networks is studied. Achievable rate regions are presented with a constraint that primary transmitter has to be concealed from secondary receiver.…”
Section: Introductionmentioning
confidence: 99%
“…In [10], [11], multi-antennas at the secondary transmitter were utilized to realize a beamforming that maximizes the secrecy capacity of secondary system while satisfying a peak interference constraint at the primary receiver. Cooperation between the secondary system and the primary system was proposed to improve the secrecy capacity of the primary system in [12]. A simple case with single antenna at eavesdropper was considered in [13], [14].…”
Section: Introductionmentioning
confidence: 99%
“…The assumption is reasonable in practice, when the data from the primary system is more attractive to the eavesdropper than the data from the secondary system [12]- [14]. We assume that the primary transmitter has only one antenna, which implies that the primary transmitter cannot generate a jamming signal to protect itself from eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation