Opportunistic scheduling for average secrecy rate enhancement in fading downlink channel with potential eavesdroppers

MA Abbas, H Song, JP Hong - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider user scheduling and power allocation techniques for downlinks
where transmitted message must be kept confidential from all other unintended users and …

Adaptive spectrum leasing with secondary user scheduling in cognitive radio networks

C Zhai, W Zhang - IEEE transactions on wireless …, 2013 - ieeexplore.ieee.org
In this paper, an adaptive spectrum-leasing scheme is proposed for multiuser cognitive radio
networks. Based on two-path successive relaying and decode-and-forward protocols, each …

Hybrid opportunistic scheduling in cognitive radio networks

Y Li, A Nosratinia - IEEE transactions on wireless …, 2011 - ieeexplore.ieee.org
In a cognitive (secondary) multiple-access network which is subject to interference power
constraints imposed by a primary system, it is desirable to mitigate the interference on the …

Distributed exploitation of spectrum and channel state information for channel reservation and selection in interweave cognitive radio networks

SH Wang, CY Hsu, YWP Hong - IEEE Transactions on Wireless …, 2013 - ieeexplore.ieee.org
A channel-and-sensing-aware channel access (CSCA) policy is proposed for multi-channel
interweave cognitive radio systems, where multiple secondary users (SUs) are competing …

Resource allocation for OFDM-based multiuser cooperative underlay cognitive systems

M Chami, M Pischella, D Le Ruyet - EURASIP Journal on Wireless …, 2017 - Springer
This paper investigates the resource allocation problem for a multiuser underlay cognitive
system where the secondary system is allowed to transmit and cooperate with the primary …

Capacity analysis of multicast transmission schemes in a spectrum-sharing scenario

J Ji, W Chen - IET Communications, 2012 - IET
In this study, the authors consider the asymptotic capacity of wireless multicast and unicast
transmission schemes in a spectrum-sharing system. In these schemes, a secondary access …

Asymptotic capacity analysis in point-to-multipoint cognitive radio networks

J Ji, W Chen - 2012 IEEE International Conference on …, 2012 - ieeexplore.ieee.org
In this paper, we analyze the asymptotic capacity in a spectrum sharing system where a
secondary access point (SAP) restrictively utilizes the licensed spectrum of an active primary …

[PDF][PDF] Asymptotically optimal scheduling in cognitive multiple-access channel

Y Li, A Nosratinia - Information Theory and Applications Workshop …, 2011 - researchgate.net
This paper considers a cognitive (secondary) multiple-access network with n transmitters,
subject to a set of interference power constraints imposed by a primary system with Mp …

Throughput limits and multiuser diversity of multiantenna spectrum sharing networks

Y Li, A Nosratinia - 2011 IEEE Global Telecommunications …, 2011 - ieeexplore.ieee.org
This paper investigates the secondary multiuser diversity in spectrum sharing networks. We
show that by exploiting the fading nature of interference links, the secondary system to …

[PDF][PDF] Power Allocation and Opportunistic User Scheduling for Secrecy Rate Enhancement in Downlink Network with Potential Eavesdroppers

M ABBAS - 2017 - repository.pknu.ac.kr
Due to the broadcast nature of the wireless medium, the wireless networks are more
vulnerable to the security threats than the wired networks. For this reason, the concerns on …