Physical Layer Security in Cognitive Untrusted Relay Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Implementation Algorithm for Physical Layer Security Based on Untrusted Relay Cooperation and Artificial Noise

© 2014 Xiangyu Li et al. 183 http://dx.doi.org/10.4218/etrij.14.0213.0090 In this letter, we consider a cooperation system with multiple untrusted relays (URs). To keep the transmitted information confidential, we obtain joint channel characteristics (JCCs) through combining the channels from the source to the destination. Then, in the null space of the JCCs, jammers construct artificial noise ...

متن کامل

Effective Optimization Criteria and Relay Selection Algorithms for Physical-Layer Security in Multiple-Antenna Relay Networks

Physical-layer security for wireless networks has become an effective approach and recently drawn significant attention in the literature. In particular, the deployment and allocation of resources such as relays to assist the transmission have gained significant interest due to their ability to improve the secrecy rate of wireless networks. In this work, we examine relay selection criteria with...

متن کامل

The Security of Physical Layer in Cognitive Radio Networks

—Cognitive Radio (CR) is a novel technology that promises to solve the lack of spectrum by allowing secondary users to use licensed band, so that they can coexist with primary users without causing interference to their communications. With the development of CR, extending to the level of network, cognitive radio networks (CRNs) emerge as the times require. Nowadays the operational aspects of ...

متن کامل

Physical Layer Security in Wireless Communication Networks

Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2018

ISSN: 2169-3536

DOI: 10.1109/access.2017.2762738