Secure Transmission via a Wireless-Powered Untrusted Relay in Underlay CRNs
暂无分享,去创建一个
[1] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[2] Hai Jiang,et al. Secure Communications in Underlay Cognitive Radio Networks: User Scheduling and Performance Analysis , 2016, IEEE Communications Letters.
[3] Hui-Ming Wang,et al. On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system , 2016, IEEE Access.
[4] Dongtang Ma,et al. Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.
[5] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[6] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[7] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[8] Yu-Dong Yao,et al. An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[9] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[10] Ali A. Nasir,et al. Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis , 2013, IEEE Transactions on Communications.
[11] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[12] Gaofeng Pan,et al. Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.
[13] Wei-Ping Zhu,et al. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.
[14] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.