作者
Pratik Chakraborty, Shankar Prakriya
发表日期
2019/6/10
期刊
IEEE Transactions on Cognitive Communications and Networking
卷号
5
期号
3
页码范围
491-503
出版商
IEEE
简介
In a recent paper, network management rules were evolved to maximize sum throughput of two co-existing underlay secondary networks that reuse the spectrum of a licensed primary network. Such rules require secondary networks to either transmit concurrently by optimal apportioning of the interference temperature limit (ITL), or in isolation. In this paper, we analyze the secrecy outage performance of the primary downlink network for a scenario when receivers of the two co-existing secondary networks are untrusted and eavesdrop on the primary downlink transmissions. We analytically establish that it is only when secondary networks transmit concurrently, that the primary network is most secure. Further, we derive an optimum ITL apportioning mechanism that guarantees maximum secrecy for the primary network, and also present closed-form expressions in a special case. The optimum apportioning parameter …
引用总数
201920202021202220231211
学术搜索中的文章