Skip navigation
Skip navigation

Protecting cognitive radio networks against poisson distributed eavesdroppers

Cai, Yueming; Xu, Xiaoming; He, Biao; Yang, Weiwei; Zhou, Xiangyun

Description

In this paper, we study secure transmission designs for underlay cognitive radio networks in the present of randomly distributed eavesdroppers. We consider the scenario where a secondary transmitter sends confidential messages to a secondary receiver subject to an interference constraint set by the primary user. We design two transmission protocols under different channel knowledge assumptions at the transmitter. For each protocol, we first give a comprehensive performance analysis to...[Show more]

dc.contributor.authorCai, Yueming
dc.contributor.authorXu, Xiaoming
dc.contributor.authorHe, Biao
dc.contributor.authorYang, Weiwei
dc.contributor.authorZhou, Xiangyun
dc.date.accessioned2018-09-17T05:56:33Z
dc.date.available2018-09-17T05:56:33Z
dc.date.created2016
dc.identifier.isbn978-1-4799-6664-6
dc.identifier.urihttp://hdl.handle.net/1885/147674
dc.description.abstractIn this paper, we study secure transmission designs for underlay cognitive radio networks in the present of randomly distributed eavesdroppers. We consider the scenario where a secondary transmitter sends confidential messages to a secondary receiver subject to an interference constraint set by the primary user. We design two transmission protocols under different channel knowledge assumptions at the transmitter. For each protocol, we first give a comprehensive performance analysis to investigate the transmission delay, secrecy, and reliability performance. We then optimize the transmission design for maximizing the secrecy throughput subject to both secrecy and reliability constraints. Finally, we numerically compare the performance of the two transmission protocols.
dc.description.sponsorshipARC Discovery Projects Grant DP150103905
dc.format.extent15 pages
dc.format.mimetypeapplication/pdf
dc.language.isoen_AU
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.rightsIEEE
dc.titleProtecting cognitive radio networks against poisson distributed eavesdroppers
dc.typeConference paper
local.publisher.urlhttp://www.ieee.org/index.html
local.type.statusAccepted Version
local.contributor.affiliationZhou, Xiangyun, Research School of Engineering, The Australian National University
dc.relationhttp://purl.org/au-research/grants/arc/DP150103905
local.bibliographicCitation.startpage1
local.bibliographicCitation.lastpage7
local.identifier.doi10.1109/ICC.2016.7511337
dcterms.accessRightsOpen Access
dc.provenancehttps://www.ieee.org/publications/rights/index.html#ieee-open-access..."The revised policy reaffirms the principle that authors are free to post the accepted version of their articles on their personal websites or those of their employers." from SHERPA/RoMEO site (as at 10/09/18).
CollectionsANU Research Publications

Download

File Description SizeFormat Image
icc16b_prep.pdfAuthor/s Accepted Manuscript (AAM)176.25 kBAdobe PDFThumbnail


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  17 November 2022/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator