2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 2017
DOI: 10.1109/pimrc.2017.8292734
|View full text |Cite
|
Sign up to set email alerts
|

Optimal energy harvesting time and power allocation policy in CRN under security constraints from eavesdroppers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…This increases the transmit power of the relay according to (27), which can better compensate for more interference from the primary transmitter due to larger value of / 0 , ultimately reducing the SOP. Figure 3 demonstrates the SOP versus the required outage probability of PUs, , for / 0 = 15 dB, = 0.5, = 0.8, = 0.6, 1 = 0.2 bps/Hz, 2 = 0.3 bps/Hz, 3 decreases the SOP. This is because such an increase allows PUs to tolerate more interference from SUs.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This increases the transmit power of the relay according to (27), which can better compensate for more interference from the primary transmitter due to larger value of / 0 , ultimately reducing the SOP. Figure 3 demonstrates the SOP versus the required outage probability of PUs, , for / 0 = 15 dB, = 0.5, = 0.8, = 0.6, 1 = 0.2 bps/Hz, 2 = 0.3 bps/Hz, 3 decreases the SOP. This is because such an increase allows PUs to tolerate more interference from SUs.…”
Section: Resultsmentioning
confidence: 99%
“…Cognitive radios operate on three (overlay, underlay, and interweave) mechanisms amidst which the underlay one is more preferable owing to its low system design complexity [2]. According to the underlay mechanism, the transmit power of secondary users (SUs) must be adaptively limited to obey the maximum transmit power constraint imposed by hardware design and the primary outage constraint imposed by communication reliability of primary users (PUs) [3]. These power constraints set the upper-bound on the power of secondary transmitters, inflicting unreliable communication through the direct channel between a secondary source and a secondary destination.…”
Section: Introductionmentioning
confidence: 99%
“…Suppose that the GBS is equipped with V antennas, while the PR, PB, ST, IDs, and URs are each equipped with a single antenna [13], [26], [27]. For the GBS-PR, ST-PR, ST-UR 1 , UR 1 -PR, UR n -UR n+1 , UR N -D p , UR N -D q , GBS-UR N , GBS-D p , GBS-D p , UR N -E, and GBS-E links, the channel gains are denoted by g GvP , g SP , g SU 1 , g UnU n+1 , g U N Dp , g U N Dp , g GvU N , g GvDp , g GvDq , g U N E , and g GvE , respectively, and the distances are denoted by…”
Section: System Model and Communication Protocol A System Model And C...mentioning
confidence: 99%
“…The PTx and STx send their CSIs to the central controller, and this central controller uses finite-rate feedback connections [37]- [39] to send back some quantized CSIs to the PTx and STx. Thus, once the STx knows the CSI of the PTx→PBS links, it can utilize the licensed spectrum of the PU and apply the NOMA principle to deliver the confidential signals to SRx 1 and SRx 2 without causing harmful interference for the PUs [40]- [42].…”
Section: B Communication Protocolmentioning
confidence: 99%
“…S , respectively. We consider the case in which the transmission protocol is used in each time block [40]. As the STx utilizes the n-th channel of PTx n while PTx n communicates with the PBS, it generates limited interference for the PBS.…”
Section: śăŷŷğů žĩ Wddžmentioning
confidence: 99%