2017
DOI: 10.1109/tccn.2017.2748132
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications

Abstract: Abstract-In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves from eavesdropping. The main objective of this work is to maximize the secrecy rate of the secondary sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(26 citation statements)
references
References 51 publications
(134 reference statements)
0
26
0
Order By: Relevance
“…Interference power constraint Thermal noise Reliability-security trade-off analysis [14] x x [17] x x x [18][19][20][21] x x x [22] x x [23] x [24] x x x 1.1. Related Works.…”
Section: Referencementioning
confidence: 99%
See 4 more Smart Citations
“…Interference power constraint Thermal noise Reliability-security trade-off analysis [14] x x [17] x x x [18][19][20][21] x x x [22] x x [23] x [24] x x x 1.1. Related Works.…”
Section: Referencementioning
confidence: 99%
“…Therefore, the connection outage constraint together with ignored thermal noise considerably simplifies information securing capability analysis in [23]. The authors in [24] design a beamforming vector at the multiantenna unlicensed source to maximize the minimum secrecy rate of the unlicensed network while guaranteeing the minimum secrecy rate of the licensed network and satisfying maximum transmit power constraint for cognitive multicast communications. Besides beamforming the legitimate signals, the source transmits the jamming signal together with them to further secure information transmission.…”
Section: Referencementioning
confidence: 99%
See 3 more Smart Citations