2019
DOI: 10.1155/2019/5080952
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis for Underlay Cognitive Network with Energy-Scavenging Capable Relay over Nakagami-m Fading Channels

Abstract: This study suggests an energy-scavenging capable unlicensed relay not only to retain communications between an unlicensed sender-recipient pair in underlay cognitive networks but also to secure these communications against eavesdropping of malicious users. Message-securing capability of such a network configuration is assessed through secrecy outage probability (SOP). For this purpose, a precise closed-form formula of the SOP accounting for interference power restriction, Nakagami-m fading, and maximum transmi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

1
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 31 publications
1
2
0
Order By: Relevance
“…and "Ana." as simulated and analytical results, and demonstrate the agreement between analysis and simulation, ratifying the exactness of the analysis in(30) and (51).…”
supporting
confidence: 75%
“…and "Ana." as simulated and analytical results, and demonstrate the agreement between analysis and simulation, ratifying the exactness of the analysis in(30) and (51).…”
supporting
confidence: 75%
“…In the interweave cognitive radio [5], the SUs use spectrum sensing methods to detect the unoccupied spectra to avoid interference to the PUs. In an opposite way, the SUs in the overlay and underlay methods can access the licensed bands at the same time with the PUs [6][7][8][9]. The overlay approach requires the cooperation between the SUs and the PUs; i.e., the secondary transmitters have to combine the data of the SUs and the PUs and then send the combined data to the intended secondary and primary receivers [6].…”
Section: Introductionmentioning
confidence: 99%
“…The overlay approach requires the cooperation between the SUs and the PUs; i.e., the secondary transmitters have to combine the data of the SUs and the PUs and then send the combined data to the intended secondary and primary receivers [6]. The SUs in the underlay approach can access the spectra at any time provided that the interferences affected on the PUs must be below a tolerable interference level [7][8][9]. Based on the required QoS, the PUs can calculate the tolerable interference level and send it to the secondary network so that the SUs can appropriately adjust their transmit powers.…”
Section: Introductionmentioning
confidence: 99%