Cognitive radio network with secrecy and interference constraints

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cognitive radio network with secrecy and interference constraints

In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU commun...

متن کامل

Resource allocation for LTE-based cognitive radio network with queue stability and interference constraints

We consider the problem of interference management and resource allocation in a cognitive radio network (CRNs) where the licensed spectrum holders (primary users) share their spare capacity with the non-licensed spectrum holders (secondary users). Under such shared spectrum usage the transmissions of the secondary users should have a minimal impact on the quality of service (QoS) and the operat...

متن کامل

On The Secrecy of the Cognitive Interference Channel with Channel State

In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...

متن کامل

Cognitive Radio Transmission under QoS Constraints and Interference Limitations

In this paper, the performance of cognitive transmission under quality of service (QoS) constraints and interference limitations is studied. Cognitive secondary users are assumed to initially perform sensing over multiple frequency bands (or equivalently channels) to detect the activities of primary users. Subsequently, they perform transmission in a single channel at variable power and rates d...

متن کامل

Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints

Please note that all the discussion referring to Theorem 5.4.1 has been revised accordingly. The corrected version of Chapter 5 has been published as follows: [WXSP15a] Zhao Wang, Ming Xiao, Mikael Skoglund, and H. Vincent Poor, “Secure degrees of freedom of wireless X networks using artificial noise alignment,” IEEE Trans. Commun., to appear. Online access: http://arxiv.org/abs/1410.5009. • 83...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Communication

سال: 2017

ISSN: 1874-4907

DOI: 10.1016/j.phycom.2016.12.001