Y Zou, X Wang, W Shen - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
… attacks in the cognitive radionetwork and propose the user … and maximizes the achievable secrecy rate of cognitive transmissions … We analyze the achievable secrecy rate and intercept …
… secrecycapacity of the secondary system, as well as to help the primary system improve the secrecycapacity… [20] to improve the secrecycapacity of the primary system while satisfying …
… ; ie, the primary receiver is viewed as an eavesdropper from the secondary network perspective. In this paper we investigate cooperation for secrecy in cognitive radionetworks from an …
T Liu, S Shamai - IEEE Transactions on Information Theory, 2009 - ieeexplore.ieee.org
… This paper presents an alternative characterization of the secrecycapacity of the multiple-antenna wiretap channel under a more general matrix constraint on the channel input using a …
… In this paper, we investigate a secure cognitive radionetwork (CRN), which deploys non-… This scenario models a NOMA-based overlay cognitive radio paradigm with an external …
… cognitive radionetwork is derived with perfect CSI assumption, we explore the secrecy performance under imperfect CSI conditions. Note that, impact of imperfect CSI on the secrecy …
W Li, M Ghogho, B Chen… - IEEE Communications …, 2012 - ieeexplore.ieee.org
… Authors in [13] proposed a two-antenna full duplex radio design that uses a balun. The transmit antenna transmits the positive signal, and to cancel self-interference, the radio combines …
N Marina, R Bose, A Hjørungnes - … , Indoor and Mobile Radio …, 2009 - ieeexplore.ieee.org
… We will see later that the secrecycapacity in the abovementioned region vanishes. That … SecrecyCapacity In this section, we develop expressions for the secrecycapacity of the …
… that the secrecycapacity of the primary network is not affected, while the secondary network … for overlaid wireless networks: A cognitive radionetwork versus a primary network,” IEEE/…