[go: up one dir, main page]

Quach et al., 2019 - Google Patents

Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks

Quach et al., 2019

View HTML
Document ID
7556630883309837021
Author
Quach T
Tran H
Uhlemann E
Kaddoum G
Tran Q
Publication year
Publication venue
Wireless networks

External Links

Snippet

This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • H04W72/08Wireless resource allocation where an allocation plan is defined based on quality criteria
    • H04W72/082Wireless resource allocation where an allocation plan is defined based on quality criteria using the level of interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control

Similar Documents

Publication Publication Date Title
Sanchez et al. Survey on physical layer security for 5G wireless networks
Wang et al. Security and privacy in 6G networks: New areas and new challenges
Quach et al. Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks
Celik et al. 5G device-to-device communication security and multipath routing solutions
Wang et al. Collaborative jamming and collaborative defense in cognitive radio networks
Sun et al. Covertness and secrecy study in untrusted relay-assisted D2D networks
Tashman et al. Physical-layer security on maximal ratio combining for SIMO cognitive radio networks over cascaded κ-μ fading channels
Basu et al. Security issues of low power wide area networks in the context of lora networks
Gao et al. Worst-case jamming on MIMO Gaussian channels
Zhao et al. Safeguarding RFID wireless communication against proactive eavesdropping
Maji et al. Secrecy outage of a cognitive radio network with selection of energy harvesting relay and imperfect CSI
Raghuwanshi et al. Secrecy performance of a dual hop cognitive relay network with an energy harvesting relay
Ma et al. Secure communication in millimeter wave relaying networks
Ghourab et al. Benign false-data injection as a moving-target defense to secure mobile wireless communications
Ha et al. Secure cognitive reactive decode-and-forward relay networks: With and without eavesdropper
Thakur et al. Secrecy analysis of reconfigurable underlay cognitive radio networks with SWIPT and imperfect CSI
Zhang et al. Opportunistic wiretapping/jamming: A new attack model in millimeter-wave wireless networks
Godugu et al. Investigations on secrecy performance of downlink overlay CR-NOMA system with SIC imperfections
Dubey et al. Secure and trusted algorithm for cognitive radio network
Kim Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas
Sikiru et al. Physical layer security using boundary technique for emerging wireless communication systems
Devi et al. Physical layer security for IoT over Nakagami-m and mixed Rayleigh–Nakagami-m fading channels
Maji et al. Secrecy outage analysis in a hybrid cognitive relay network with energy harvesting
Do et al. Impact of untrusted relay on physical layer security in non-orthogonal multiple access networks
Thanh et al. Secure multi-hop data transmission in cognitive radio networks under attack in the physical layer