2020
DOI: 10.3390/app10051840
|View full text |Cite
|
Sign up to set email alerts
|

Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers

Abstract: This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while the malicious eavesdropper (Eve) is used to eavesdrop the confidential information from Alice and Relay. To improve security, we design two transmission schemes, namely maximal-ratio combining/maximal-ratio transmission-selection combining (MRC/MRT-SC) with half… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…The secrecy performance for a new collaboration interference transmission scheme (TAS/MRC/ZFB) for overlay FD operative was analyzed in [20]. In [21], the authors analyzed the secrecy performance for MRC-ZFB/MRT-SC-ZFB scheme with FD receiver underlay CRNs of perfect channel state information (CSI) over Rayleigh fading channels. The effects of perfect CSI on the system performance have been investigated in collaborative zero-forcing beamforming [8], [14][15][16], cooperative relays network [17][18][19], and the FD technique [20][21].…”
Section: Introductionmentioning
confidence: 99%
“…The secrecy performance for a new collaboration interference transmission scheme (TAS/MRC/ZFB) for overlay FD operative was analyzed in [20]. In [21], the authors analyzed the secrecy performance for MRC-ZFB/MRT-SC-ZFB scheme with FD receiver underlay CRNs of perfect channel state information (CSI) over Rayleigh fading channels. The effects of perfect CSI on the system performance have been investigated in collaborative zero-forcing beamforming [8], [14][15][16], cooperative relays network [17][18][19], and the FD technique [20][21].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the self-jamming approach has been widely studied and extended in numerous schemes to enhance the PLS, i.e., the FD transceiver can simultaneously receive the intended message and broadcast the AN to degrade the eavesdropper channel [ 15 , 16 , 17 ]. The AN technique is also used for secure transmission in cognitive wiretap networks with FD receivers [ 18 ] or FD relay systems [ 19 ]. Usually, the PLS mechanism related to the self-jamming and AN has been studied assuming that the eavesdropper cannot estimate the wiretap channel or jamming channel based on the known training pilots and transmitted power [ 20 ].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, to improve the transmission reliability, CWNs with full-duplex (FD) operation have been widely studied. [22][23][24][25][26][27] The FD sensor node can receive information from other nodes while transmitting artificial jamming signals to prevent illegal eavesdropping, which can improve the SE by simultaneously learning the radio environments and delivering data traffic of the system. The author explored how much selfinterference should be suppressed to make FD-CWNs more advantageous than HD-CWNs.…”
Section: Introductionmentioning
confidence: 99%
“…24 The authors designed a joint FD-aware channel assignment and route selection protocol in FD-based CWNs under time-varying channel conditions and transmission rates, which maximizes the D2D network throughput. 25 Different schemes at the FD relay were proposed, 26,27 in which the secrecy outage probability (SOP) between the source and the destination was obtained to maximize the achievable secrecy performance of SU transmission link.…”
Section: Introductionmentioning
confidence: 99%