The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020
DOI: 10.1155/2020/8867148
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhancement for Energy Harvesting Cognitive Networks with Relay Selection

Abstract: Relay selection is proposed in this paper as an efficient solution to secure information transmission of secondary users against eavesdroppers in energy harvesting cognitive networks. The proposed relay selection method selects a secondary relay among available secondary relays, which are capable of harvesting radio frequency energy in signals of the secondary transmitter and correctly restore secondary message, to curtail signal-to-noise ratio at the wire-tapper. In order to evaluate the security performance … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 59 publications
(82 reference statements)
0
22
0
Order By: Relevance
“…As such, the SINRs at E for recovering x s and x p are inferred from (12). Inserting (6) into (12) results in…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…As such, the SINRs at E for recovering x s and x p are inferred from (12). Inserting (6) into (12) results in…”
Section: System Modelmentioning
confidence: 99%
“…CRs (Cognitive Radios), which typically operate in overlay, underlay, and interweave modes, can access the licensed frequency band of PUs (Primary Users) without causing any performance degradation for PUs, thus significantly improving spectral efficiency and mitigating spectrum scarcity issue [6]. In the underlay mode, CRs utilize the licensed spectrum but must upperbound interference caused at PUs.…”
Section: Introductionmentioning
confidence: 99%
“…Previous Works. While most recent publications focused on securing direct transmission (i.e., without relaying [17][18][19][20][21][22][23]) and relaying transmission (i.e., without relay selection [24][25][26][27][28]) in cognitive radio networks with energy harvesting (CRNwEH) by the physical layer security technique (e.g., [29][30][31][32][33]), to the best of our understanding only three works in [34][35][36] mentioned the relay selection in these networks. To be specific, [34] studied the security capability of the conventional reactive relay selection in CRNwEH in terms of the secrecy outage probability (SOP) through Monte-Carlo simulations under the (peak transmission and interference) power constraints.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, [35] solely analyzed the connection outage probabilities (The connection outage probability indicates the possibility that the received SNR is smaller than a target value) of the wire-tapper and the unlicensed destination. Recently, ( [37] is the conference version of [36]. In [37], a part of the results of [36] was briefly presented without any proof.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation