2016
DOI: 10.1109/tifs.2015.2500178
|View full text |Cite
|
Sign up to set email alerts
|

Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers

Abstract: In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protoc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 78 publications
(54 citation statements)
references
References 71 publications
0
54
0
Order By: Relevance
“…Moreover, antenna correlation improves the secrecy performance in the low SNR regime but degrades the secrecy performance in the moderate and high SNR regimes. In [21], the authors investigated PHYlayer security in an underlay cognitive radio (CR) network in the presence of randomly distributed eavesdroppers. For different CSI knowledge at the transmitting node, the authors proposed four transmission protocols to improve the secure transmission in the CR network.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, antenna correlation improves the secrecy performance in the low SNR regime but degrades the secrecy performance in the moderate and high SNR regimes. In [21], the authors investigated PHYlayer security in an underlay cognitive radio (CR) network in the presence of randomly distributed eavesdroppers. For different CSI knowledge at the transmitting node, the authors proposed four transmission protocols to improve the secure transmission in the CR network.…”
Section: A Related Workmentioning
confidence: 99%
“…APPENDIX D PROOF OF LEMMA 3 Starting with the instantaneous secrecy rate expression in (21), the secrecy outage probability for a fixed | j∈J φ * q,j h j,E | 2 is given by , we get the secrecy outage probability as follows…”
Section: Appendix Bmentioning
confidence: 99%
“…Thus, the SU must have a suitable power allocation policy which does not only satisfy the above constraints but also can obtain a reasonable performance. We assume that the Wyner wiretap code [16] is used for SU communication, and hence a positive rate, R 0 [ 0, should be maintained to provide secure communication for the SU, which can be defined by [42,45] …”
Section: Performance Metric For the Su Communicationmentioning
confidence: 99%
“…The difficulty of researching the secrecy performance in such wireless networks is how to model the random locations distribution of nodes accurately. Fortunately, stochastic geometry has provided a powerful tool to address this difficulty and achieved great success in ad hoc networks [9,10], random cognitive radio networks [11,12], and largescale cellular networks [13][14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%