Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy

Cited 28 time in webofscience Cited 0 time in scopus
  • Hit : 388
  • Download : 1
DC FieldValueLanguage
dc.contributor.authorLee, Keonkookko
dc.contributor.authorChae, Chan-Byoungko
dc.contributor.authorKang, Joonhyukko
dc.date.accessioned2014-08-27T02:27:48Z-
dc.date.available2014-08-27T02:27:48Z-
dc.date.created2013-10-14-
dc.date.created2013-10-14-
dc.date.issued2013-11-
dc.identifier.citationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.62, no.9, pp.4672 - 4678-
dc.identifier.issn0018-9545-
dc.identifier.urihttp://hdl.handle.net/10203/187365-
dc.description.abstractSpectrum leasing via cooperation refers to the possibility of primary users to lease a portion of their spectral resources to secondary users in exchange for cooperation. This paper proposes a novel application of this concept, where in the presence of an eavesdropper, the secondary cooperation aims at improving the secrecy of the primary network. It does this by creating more interference to the eavesdropper than to the primary receiver. To generate the interference in a positive way, this paper studies an optimal design of a beamformer at the secondary transmitter with multiple antennas. The design maximizes the secrecy rate of the primary network while satisfying a required rate for the secondary network. Moreover, we investigate two scenarios that are contingent on how the eavesdropper operates: 1) The eavesdropper treats the interference by the secondary transmission as additive noise [single-user decoding (SD)]; and 2) the eavesdropper tries to decode and remove the secondary signal [joint decoding (JD)]. Numerical results confirm that, for a wide range of required secondary-rate constraints, the proposed spectrum-leasing strategy increases the secrecy rate of the primary network.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectNETWORKS-
dc.subjectINFORMATION-
dc.subjectCHANNELS-
dc.titleSpectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy-
dc.typeArticle-
dc.identifier.wosid000326981200046-
dc.identifier.scopusid2-s2.0-80052139032-
dc.type.rimsART-
dc.citation.volume62-
dc.citation.issue9-
dc.citation.beginningpage4672-
dc.citation.endingpage4678-
dc.citation.publicationnameIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY-
dc.identifier.doi10.1109/TVT.2013.2269617-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKang, Joonhyuk-
dc.contributor.nonIdAuthorChae, Chan-Byoung-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorPareto boundary-
dc.subject.keywordAuthorphysical-layer security-
dc.subject.keywordAuthorpower gain region-
dc.subject.keywordAuthorsecrecy capacity-
dc.subject.keywordAuthorspectrum leasing-
dc.subject.keywordPlusNETWORKS-
dc.subject.keywordPlusINFORMATION-
dc.subject.keywordPlusCHANNELS-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 28 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0