2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC) 2012
DOI: 10.1109/iwcmc.2012.6314351
|View full text |Cite
|
Sign up to set email alerts
|

Proposed relay selection scheme for physical layer security in Cognitive Radio networks

Abstract: Cognitive Radio (CR) technology is one of the strong candidate technologies to solve the spectrum scarcity problems. In this paper, we tackle the problem of secure data transmission between a secondary user transmitter and receiver through a relay in the presence of an eavesdropper in a cognitive radio network. The proposed scheme selects the best Decode-and-Forward relay among different relays to assist the transmitter, and to maximize the achievable secrecy rate without harming the primary user. Simulation r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
56
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(56 citation statements)
references
References 10 publications
0
56
0
Order By: Relevance
“…Recently, the SOP was studied in [12] under the assumption that the relay is untrusted. In [13], the authors proposed a relay selection scheme for security constrained in the CRNs with an eavesdropper. In [14], the authors proposed four different relay selection schemes to enhance the security in the CRNs, i.e., random relay and random jammer, random jammer and best relay, best relay and best jammer, and best relay and no jammer.…”
Section: T L Thanh Is With Posts and Telecommunications Institute Omentioning
confidence: 99%
“…Recently, the SOP was studied in [12] under the assumption that the relay is untrusted. In [13], the authors proposed a relay selection scheme for security constrained in the CRNs with an eavesdropper. In [14], the authors proposed four different relay selection schemes to enhance the security in the CRNs, i.e., random relay and random jammer, random jammer and best relay, best relay and best jammer, and best relay and no jammer.…”
Section: T L Thanh Is With Posts and Telecommunications Institute Omentioning
confidence: 99%
“…A centralized control scheme is presented in [16,17], which needs setting a cognitive user as the target user to compare with others, then FC adjudges whether the user is abnormal by iteration. This scheme will bring FC huge amount of computation as N 2 because direct and indirect information interactions have occurred in any of the two or more users.…”
Section: The Analysis Of Complexity From Computational Aspectmentioning
confidence: 99%
“…Zhang et al in [15] proposed a security scheme based on localized combinatorial keying (LOCK) scheme and employees IDbased secure group key management, which minimizes the number of key storage requirement and the number of the communication messages for rekeying. Sakran et al in [16] proposed a secure relay selection scheme which selects a trusted decode and forward relay to assist the SUs and maximize the achievable secrecy rate that is subjected to the interference power constraints at the PUs for the different number of eavesdroppers and PUs under available channel knowledge in the security constrained CRNs. In [17], Chen et al proposed a game theoretical anti-jamming scheme and modeled the jamming and antijamming process as a Markov decision process.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, the researches of CRNPLS transmission scheme mainly focus on relay selection [10,11,12,13,14] and relay beamforming [15,16]. There is also some research work reported in Chinese journals [6,7,8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Given that relay beamforming is an important method of PLS, this paper mainly researches the CRNPLS transmission problems based on relay beamforming. There is a pair of nodes and some relay nodes in the bibliographies [10,11,12,13,14], but they just select the best one of the relays to transmit signal. Although bibliographies [15,16] mainly concern about CRNPLS transmission schemes with multi-relay collaboration, they concern only the condition of a pair of secondary users.…”
Section: Introductionmentioning
confidence: 99%