Secrecy and throughput performance of an energy harvesting hybrid cognitive radio network with spectrum sensing
暂无分享,去创建一个
Sumit Kundu | Pranabesh Maji | Kuldeep Yadav | Sanjay Dhar Roy | S. Kundu | Kuldeep Yadav | S. Roy | Pranabesh Maji
[1] Liang Zhou,et al. Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.
[2] Andrea J. Goldsmith,et al. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.
[3] Victor C. M. Leung,et al. Artificial Noise Assisted Secure Interference Networks With Wireless Power Transfer , 2017, IEEE Transactions on Vehicular Technology.
[4] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[5] Sanjay Dhar Roy,et al. Secrecy Outage of a Cognitive Radio Network with Selection of Energy Harvesting Relay and Imperfect CSI , 2018, Wirel. Pers. Commun..
[6] Yonghong Zeng,et al. Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..
[7] Ali A. Nasir,et al. Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.
[8] Victor C. M. Leung,et al. Wireless energy harvesting in interference alignment networks , 2015, IEEE Communications Magazine.
[9] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[10] Victor C. M. Leung,et al. Exploiting Interference for Energy Harvesting: A Survey, Research Issues, and Challenges , 2017, IEEE Access.
[11] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[12] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[13] Yue Gao,et al. Outage Performance Study of Cognitive Relay Networks with Imperfect Channel Knowledge , 2013, IEEE Communications Letters.
[14] Sanjay Dhar Roy,et al. Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link , 2018, IET Commun..
[15] Wan Choi,et al. On the Optimal Switching Probability for a Hybrid Cognitive Radio System , 2013, IEEE Transactions on Wireless Communications.
[16] A. Anpalagan,et al. Throughput Analysis of Opportunistic Access Strategies in Hybrid Underlay—Overlay Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.
[17] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[18] Mansoor Shafi,et al. Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge , 2010, IEEE Transactions on Vehicular Technology.
[19] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[20] H. Urkowitz. Energy detection of unknown deterministic signals , 1967 .
[21] Helmut Knebl,et al. Introduction to Cryptography: Principles and Applications (Information Security and Cryptography) , 2007 .
[22] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[23] Sanjay Dhar Roy,et al. Outage performance of cognitive relay network with imperfect channel estimation under proactive DF relaying , 2014, 2014 Twentieth National Conference on Communications (NCC).
[24] Qian Zhang,et al. Cooperative relay to improve diversity in cognitive radio networks , 2009, IEEE Commun. Mag..
[25] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.