2016
DOI: 10.1049/iet-com.2014.1243
|View full text |Cite
|
Sign up to set email alerts
|

Joint beamforming and power allocation for secure communication in cognitive radio networks

Abstract: In this study, secure communication in cognitive radio networks is investigated. A cooperative jammer is utilised to transmit artificial noise for interfering with the eavesdropper. The authors' objective is to maximise the available secrecy rate of the secondary user (SU) under the interference power constraint at the primary user and the global transmit power constraint at the transmitters. In that case, beamforming vectors of the SU transmitter and the cooperative jammer, and power allocation between them n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 26 publications
(44 reference statements)
0
4
0
Order By: Relevance
“…where ξ, β, and θ are respectively the shape, scale and location parameters of the GEV distribution and are given by: 26) and the mean, the variance and the skewness of X LE are given by Corollary 1.…”
Section: A Le Detector In Asymptotic Regimementioning
confidence: 99%
See 1 more Smart Citation
“…where ξ, β, and θ are respectively the shape, scale and location parameters of the GEV distribution and are given by: 26) and the mean, the variance and the skewness of X LE are given by Corollary 1.…”
Section: A Le Detector In Asymptotic Regimementioning
confidence: 99%
“…In the context of massive antenna deployment (up to few hundred in the literature), it is very likely for CRs to exploit the advantages offered by the multiple-input multiple-output (MIMO) technologies to improve secondary communications [21]- [26]. For instance, massive antenna technology allows the secondary users exploiting the angle-of-arrival dimension in the transmission hyperspace using beamforming [27]- [30].…”
mentioning
confidence: 99%
“…In the DAU receiver, by introducing the beamforming weights w d [46], the received signal at the DAU receiver is…”
Section: Transmission Formulation Of the Networkmentioning
confidence: 99%
“…The proposed solutions reported in the literature can be mainly classified into different categories, such as (i) beamforming‐based [1517], (ii) radio resource allocation‐based [17, 18], (iii) relay‐assisted transmission [1820], (iv) transmit antenna selection [2124], (v) jamming‐based [11, 16], and (vi) game theoretic‐based [25] techniques and algorithms. For instance, the authors in [17] have investigated the PHY security of joint beamforming and power allocation scheme in a CR network. A scheme for joint jammer selection and beamforming has been proposed in [16] for securing a multiple‐input multiple‐output (MIMO) cooperative CR network.…”
Section: Introductionmentioning
confidence: 99%