2015 IEEE Global Communications Conference (GLOBECOM) 2014
DOI: 10.1109/glocom.2014.7417101
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security for Primary System: A Symbiotic Approach in Cooperative Cognitive Radio Networks

Abstract: In this paper, we proposed a symbiotic approach for a secure primary network by allowing the secondary users to send the jamming noise to degrade the wiretap ability of the eavesdropper. In particular, assuming that the global channel state information is perfectly known at tranceivers, we consider the case of the primary transmitter equipped with only one antenna, which implies that the primary transmitter does not have beamforming capability. As the reward of having access to the frequency spectrum which is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…To find an initial feasible point to (11), we solve the following convex optimization problem and stop at reaching:…”
Section: Proposed Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…To find an initial feasible point to (11), we solve the following convex optimization problem and stop at reaching:…”
Section: Proposed Solutionmentioning
confidence: 99%
“…Being a critical issue, PHY security of cognitive radio networks (CRNs), which are faced with specific security risks due to the broadcasting nature of radio signals [4]- [6], however, has not been well investigated until recently, e.g., in [7]- [11]. More specifically, in [7] and [8], multiantennas at the secondary transmitter were utilized to attain beamforming that maximizes the secrecy capacity of the secondary system, while adhering to the peak interference constraint at the primary receiver.…”
Section: Introductionmentioning
confidence: 99%
“…Being a critical issue, PHY security of cognitive radio networks (CRNs), which deal with specific security risks due to the broadcasting nature of radio signals, has not been well investigated until recently, e.g., in [22]- [29]. More specifically, in [22]- [24], multi-antennas at the secondary transmitter were utilized to attain beamforming that maximizes the secrecy capacity of the secondary system, while adhering to the peak interference constraint at the primary receiver.…”
Section: Introductionmentioning
confidence: 99%
“…Though this assumption is quite ideal, however, the performance with assumption of perfect CSI is still of practical importance since it plays as a benchmark how the CRN system may achieve in more realistic conditions[24],[27]-[29].…”
mentioning
confidence: 99%
“…With the advances of cognitive radio (CR) and cooperative communications technologies, cooperative CR networking (CCRN) is emerging as an efficient solution to utilise radio resources. Yet, the wide adoption and deployment of CCRNs is shadowed by security concerns [15]. To be specific, due to the openness of the wireless medium, signals can be intercepted and decoded by an eavesdropper.…”
Section: Introductionmentioning
confidence: 99%