Cognitive radio network with secrecy and interference constraints
نویسندگان
چکیده
منابع مشابه
Cognitive radio network with secrecy and interference constraints
In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU commun...
متن کاملResource allocation for LTE-based cognitive radio network with queue stability and interference constraints
We consider the problem of interference management and resource allocation in a cognitive radio network (CRNs) where the licensed spectrum holders (primary users) share their spare capacity with the non-licensed spectrum holders (secondary users). Under such shared spectrum usage the transmissions of the secondary users should have a minimal impact on the quality of service (QoS) and the operat...
متن کاملOn The Secrecy of the Cognitive Interference Channel with Channel State
In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...
متن کاملCognitive Radio Transmission under QoS Constraints and Interference Limitations
In this paper, the performance of cognitive transmission under quality of service (QoS) constraints and interference limitations is studied. Cognitive secondary users are assumed to initially perform sensing over multiple frequency bands (or equivalently channels) to detect the activities of primary users. Subsequently, they perform transmission in a single channel at variable power and rates d...
متن کاملInterference Alignment with Imperfect Channel Knowledge and Secrecy Constraints
Please note that all the discussion referring to Theorem 5.4.1 has been revised accordingly. The corrected version of Chapter 5 has been published as follows: [WXSP15a] Zhao Wang, Ming Xiao, Mikael Skoglund, and H. Vincent Poor, “Secure degrees of freedom of wireless X networks using artificial noise alignment,” IEEE Trans. Commun., to appear. Online access: http://arxiv.org/abs/1410.5009. • 83...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Communication
سال: 2017
ISSN: 1874-4907
DOI: 10.1016/j.phycom.2016.12.001