Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks
暂无分享,去创建一个
Georges Kaddoum | Hung Tran | Elisabeth Uhlemann | Quang Anh Tran | Truong Xuan Quach | E. Uhlemann | Quang Anh Tran | Hung Tran | Georges Kaddoum
[1] Tran Trung Duy,et al. Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.
[2] Michael Gastpar,et al. On Capacity Under Receive and Spatial Spectrum-Sharing Constraints , 2007, IEEE Transactions on Information Theory.
[3] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[4] Xiangyun Zhou,et al. Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.
[5] Xiaodong Wang,et al. A robust MDP approach to secure power control in cognitive radio networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Mikael Skoglund,et al. Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.
[8] Joseph Mitola. Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..
[9] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[10] Stefania Sesia,et al. LTE - The UMTS Long Term Evolution, Second Edition , 2011 .
[11] Tran Trung Duy,et al. Secure Cognitive Reactive Decode-and-Forward Relay Networks: With and Without Eavesdropper , 2015, Wirel. Pers. Commun..
[12] Leila Musavian,et al. Fundamental capacity limits of cognitive radio in fading environments with imperfect channel information , 2009, IEEE Transactions on Communications.
[13] Aylin Yener,et al. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.
[14] Hung Tran. Performance Analysis of Cognitive Radio Networks with Interference Constraints , 2013 .
[15] M. H. Rehmani,et al. White space : De fi nitional perspectives and their role in exploiting spectrum opportunities , 2016 .
[16] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[17] Georges Kaddoum,et al. Survey on Threats and Attacks on Mobile Networks , 2016, IEEE Access.
[18] Tongtong Li,et al. Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[19] Yueming Cai,et al. Increasing secrecy capacity via joint design of cooperative beamforming and jamming , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[20] Gongpu Wang,et al. Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.
[21] Behnam Bahrak,et al. Protecting the primary users' operational privacy in spectrum sharing , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).
[22] Yiyang Pei,et al. Achieving cognitive and secure transmissions using multiple antennas , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[23] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[24] Ahmed Abdel-Hadi,et al. A Multitier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions , 2015, IEEE Transactions on Cognitive Communications and Networking.
[25] Tran Trung Duy,et al. Secrecy performance analysis with relay selection methods under impact of co-channel interference , 2015, IET Commun..
[26] Jia Zhu,et al. Physical-Layer Security for Cooperative Relay Networks , 2016, Wireless Networks.
[27] Mauro Barni,et al. An Information Theoretic Perspective , 2004 .
[28] Yu-Dong Yao,et al. An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[29] Octavia A. Dobre,et al. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[30] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[31] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[32] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[33] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[34] Hans-Jürgen Zepernick,et al. On physical layer security for reactive DF cognitive relay networks , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[35] Chittabrata Ghosh,et al. Secure Communication in Cognitive Radio Networks , 2022 .
[36] Martin Reisslein,et al. White space , 2016 .
[37] Yasir Saleem,et al. Primary radio user activity models for cognitive radio networks: A survey , 2014, J. Netw. Comput. Appl..
[38] Martin Reisslein,et al. Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols , 2016, IEEE Communications Surveys & Tutorials.
[39] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[40] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[41] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[42] Alexander M. Wyglinski,et al. A Spectrum Surveying Framework for Dynamic Spectrum Access Networks , 2009, IEEE Transactions on Vehicular Technology.
[43] Salman Durrani,et al. Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.
[44] Liuqing Yang,et al. Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.
[45] Hung Tran,et al. Impact of secondary user communication on security communication of primary user , 2014, Secur. Commun. Networks.
[46] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[47] Hung Tran,et al. Impact of primary networks on the performance of secondary networks , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).