2016 International Conference on Advanced Technologies for Communications (ATC) 2016
DOI: 10.1109/atc.2016.7764755
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of underlay cognitive radio networks over Nakagami-m fading channels with energy harvesting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Although various works analyzed the security performance of the direct message transmission (i.e., no relay) in underlay cognitive networks with energy scavenging (e.g., [6][7][8][9][10][11][12][13][14] and references therein), few publications [15][16][17][18][19][20] have paid attention to security evaluation for the underlay cognitive network with the energy-scavenging capable relay (UCNwEScR). To be more specific, the authors in [15] investigated the UCNwEScR in which the decode-and-forward unlicensed relay consumes its energy scavenged from the RF signals of the unlicensed sender and the licensed transmitter to forward the unlicensed sender's message to the unlicensed recipient as the direct message transmission is unreliable.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Although various works analyzed the security performance of the direct message transmission (i.e., no relay) in underlay cognitive networks with energy scavenging (e.g., [6][7][8][9][10][11][12][13][14] and references therein), few publications [15][16][17][18][19][20] have paid attention to security evaluation for the underlay cognitive network with the energy-scavenging capable relay (UCNwEScR). To be more specific, the authors in [15] investigated the UCNwEScR in which the decode-and-forward unlicensed relay consumes its energy scavenged from the RF signals of the unlicensed sender and the licensed transmitter to forward the unlicensed sender's message to the unlicensed recipient as the direct message transmission is unreliable.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For system resource saving, R employs the power-dividing method [28,29] as shown in (the power-dividing model is linear in Figure 2, which was assumed in most recent publications [6-21, 26, 29]) Figure 2(b) for energy scavenging. is method divides the signal received at R into two fractions with different powers which are represented by the power percentage 0 < ρ < 1: one fraction for restoring the sender's message (it is common in existing works (e.g., [6][7][8][9][10][11][12]15] and references therein) that the message decoder consumes the negligible amount of power for its operation; therefore, its energy consumption can be ignored) and the other for scavenging the energy.…”
Section: System Modelmentioning
confidence: 99%
“…The current paper assumes that information decoder consumes negligible energy. This assumption is mostly acknowledged in the literature (e.g.,[27][28][29][30][31][32][33]). …”
mentioning
confidence: 99%
“…Moreover, this may lead to leakage of confidential information to the eaversdroppers (EAVs), who want to illegally exploit the communication in CRNs. To overcome the security problems in CRN, works reported in [12]- [14] have focused on solutions at the physical layer in order to reduce the risk of eavesdropping or jamming attacks. In [12], the authors consider a system model where a friendly jammer harvests energy from the RF of the secondary transmitter (S-Tx) and then generates jamming signals to protect against EAV.…”
mentioning
confidence: 99%
“…To overcome the security problems in CRN, works reported in [12]- [14] have focused on solutions at the physical layer in order to reduce the risk of eavesdropping or jamming attacks. In [12], the authors consider a system model where a friendly jammer harvests energy from the RF of the secondary transmitter (S-Tx) and then generates jamming signals to protect against EAV. Asymptotic closed-form expressions of the outage probability and the intercept probability for Nakagami-m fading channels have been obtained to analyze the system performance.…”
mentioning
confidence: 99%