Quach et al., 2019 - Google Patents
Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networksQuach et al., 2019
View HTML- Document ID
- 7556630883309837021
- Author
- Quach T
- Tran H
- Uhlemann E
- Kaddoum G
- Tran Q
- Publication year
- Publication venue
- Wireless networks
External Links
Snippet
This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the …
- 238000004891 communication 0 title abstract description 52
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
- H04W72/08—Wireless resource allocation where an allocation plan is defined based on quality criteria
- H04W72/082—Wireless resource allocation where an allocation plan is defined based on quality criteria using the level of interference
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sanchez et al. | Survey on physical layer security for 5G wireless networks | |
| Wang et al. | Security and privacy in 6G networks: New areas and new challenges | |
| Quach et al. | Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks | |
| Celik et al. | 5G device-to-device communication security and multipath routing solutions | |
| Wang et al. | Collaborative jamming and collaborative defense in cognitive radio networks | |
| Sun et al. | Covertness and secrecy study in untrusted relay-assisted D2D networks | |
| Tashman et al. | Physical-layer security on maximal ratio combining for SIMO cognitive radio networks over cascaded κ-μ fading channels | |
| Basu et al. | Security issues of low power wide area networks in the context of lora networks | |
| Gao et al. | Worst-case jamming on MIMO Gaussian channels | |
| Zhao et al. | Safeguarding RFID wireless communication against proactive eavesdropping | |
| Maji et al. | Secrecy outage of a cognitive radio network with selection of energy harvesting relay and imperfect CSI | |
| Raghuwanshi et al. | Secrecy performance of a dual hop cognitive relay network with an energy harvesting relay | |
| Ma et al. | Secure communication in millimeter wave relaying networks | |
| Ghourab et al. | Benign false-data injection as a moving-target defense to secure mobile wireless communications | |
| Ha et al. | Secure cognitive reactive decode-and-forward relay networks: With and without eavesdropper | |
| Thakur et al. | Secrecy analysis of reconfigurable underlay cognitive radio networks with SWIPT and imperfect CSI | |
| Zhang et al. | Opportunistic wiretapping/jamming: A new attack model in millimeter-wave wireless networks | |
| Godugu et al. | Investigations on secrecy performance of downlink overlay CR-NOMA system with SIC imperfections | |
| Dubey et al. | Secure and trusted algorithm for cognitive radio network | |
| Kim | Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas | |
| Sikiru et al. | Physical layer security using boundary technique for emerging wireless communication systems | |
| Devi et al. | Physical layer security for IoT over Nakagami-m and mixed Rayleigh–Nakagami-m fading channels | |
| Maji et al. | Secrecy outage analysis in a hybrid cognitive relay network with energy harvesting | |
| Do et al. | Impact of untrusted relay on physical layer security in non-orthogonal multiple access networks | |
| Thanh et al. | Secure multi-hop data transmission in cognitive radio networks under attack in the physical layer |