Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems
暂无分享,去创建一个
Wei-Ping Zhu | Lajos Hanzo | Benoît Champagne | YuLong Zou | L. Hanzo | Weiping Zhu | B. Champagne | Yulong Zou
[1] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[2] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..
[3] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[4] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[5] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[6] D. Owen. Handbook of Mathematical Functions with Formulas , 1965 .
[7] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[8] Babak Hassibi,et al. The Secrecy Capacity of the 2 × 2 MIMO Wiretap Channel , 2007 .
[9] R.W. Brodersen,et al. Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[10] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[11] Amir Ghasemi,et al. Fundamental limits of spectrum-sharing in fading environments , 2007, IEEE Transactions on Wireless Communications.
[12] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[13] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[14] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[15] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[16] M. Yuksel,et al. Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.
[17] Yang Xiao,et al. Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs , 2010, IEEE Transactions on Wireless Communications.
[18] Jianwei Huang,et al. Spectrum mobility games , 2012, 2012 Proceedings IEEE INFOCOM.
[19] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[20] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[21] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[22] Geoffrey Ye Li,et al. Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[23] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[24] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[25] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[26] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[27] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[28] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[29] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[30] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[31] Ian F. Akyildiz,et al. A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.
[32] Sigit Puspito Wigati Jarot,et al. Spectrum sensing for cognitive radios , 2011 .
[33] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[34] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[35] Luigi di Stefano,et al. A sufficient condition based on the Cauchy-Schwarz inequality for efficient template matching , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[36] Mounir Ghogho,et al. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.
[37] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[38] Raghupathy Sivakumar,et al. Securing Wireless Data Networks against Eavesdropping using Smart Antennas , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[39] Husheng Li. Cooperative Spectrum Sensing via Belief Propagation in Spectrum-Heterogeneous Cognitive Radio Systems , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[40] Yu-Dong Yao,et al. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio , 2012, IEEE Transactions on Communications.
[41] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[42] S SousaElvino,et al. Fundamental limits of spectrum-sharing in fading environments , 2007 .
[43] Stuart Wall,et al. Posts and telecommunications , 1986 .
[44] Waleed Ejaz,et al. Spectrum Sensing in Cognitive Radio Networks , 2011 .