DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeon, Hyoungsuk | ko |
dc.contributor.author | McLaughlin, Steven W. | ko |
dc.contributor.author | Kim, Il-Min | ko |
dc.contributor.author | Ha, Jeongseok | ko |
dc.date.accessioned | 2014-09-01T07:42:03Z | - |
dc.date.available | 2014-09-01T07:42:03Z | - |
dc.date.created | 2014-06-09 | - |
dc.date.created | 2014-06-09 | - |
dc.date.created | 2014-06-09 | - |
dc.date.issued | 2014-04 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.13, no.4, pp.1790 - 1805 | - |
dc.identifier.issn | 1536-1276 | - |
dc.identifier.uri | http://hdl.handle.net/10203/189318 | - |
dc.description.abstract | We consider a cooperation scenario between primary users and untrusted secondary users in cognitive radio networks. The secondary users are willing to help the primary users to relay the primary users' messages in reward for being allowed to share the primary users' spectrum bands. However, the primary users might be reluctant to accept this help, since the secondary users are untrustworthy and may try unauthorized decoding of the primary users' messages. This paper will answer the question: when is this cooperation mutually beneficial for primary and secondary users? Taking an approach of information-theoretic secrecy, such as coding techniques for wiretap channels, the primary users can allow the secondary users to sense and relay the message, while ensuring that the secondary users are ignorant of the primary users' messages. We characterize an achievable secrecy rate of primary users with a rate of the secondary users' communication. From the derived rate pairs, an optimization problem is formulated such that the secondary transmitter distributes its transmit power to maximize its data rate while providing a higher secrecy rate to the primary users. We demonstrate that this cooperation can provide a positive secrecy rate, even when a non-cooperative scheme achieves a zero secrecy rate. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | WIRE-TAP CHANNEL | - |
dc.subject | SECRECY CAPACITY | - |
dc.subject | OUTAGE PROBABILITY | - |
dc.subject | BROADCAST CHANNELS | - |
dc.subject | ARTIFICIAL NOISE | - |
dc.subject | FADING CHANNELS | - |
dc.subject | POLAR CODES | - |
dc.subject | INTERFERENCE | - |
dc.subject | MESSAGES | - |
dc.title | Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks | - |
dc.type | Article | - |
dc.identifier.wosid | 000335154100006 | - |
dc.identifier.scopusid | 2-s2.0-84899917172 | - |
dc.type.rims | ART | - |
dc.citation.volume | 13 | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 1790 | - |
dc.citation.endingpage | 1805 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | - |
dc.identifier.doi | 10.1109/TWC.2013.021214.130089 | - |
dc.contributor.localauthor | Ha, Jeongseok | - |
dc.contributor.nonIdAuthor | McLaughlin, Steven W. | - |
dc.contributor.nonIdAuthor | Kim, Il-Min | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Amplify-and-forward relay protocol | - |
dc.subject.keywordAuthor | cognitive radio | - |
dc.subject.keywordAuthor | eavesdropping | - |
dc.subject.keywordAuthor | information-theoretic secrecy | - |
dc.subject.keywordAuthor | untrusted secondary users | - |
dc.subject.keywordAuthor | wiretap channel | - |
dc.subject.keywordAuthor | Amplify-and-forward relay protocol | - |
dc.subject.keywordAuthor | cognitive radio | - |
dc.subject.keywordAuthor | eavesdropping | - |
dc.subject.keywordAuthor | information-theoretic secrecy | - |
dc.subject.keywordAuthor | untrusted secondary users | - |
dc.subject.keywordAuthor | wiretap channel | - |
dc.subject.keywordPlus | WIRE-TAP CHANNEL | - |
dc.subject.keywordPlus | SECRECY CAPACITY | - |
dc.subject.keywordPlus | OUTAGE PROBABILITY | - |
dc.subject.keywordPlus | BROADCAST CHANNELS | - |
dc.subject.keywordPlus | ARTIFICIAL NOISE | - |
dc.subject.keywordPlus | FADING CHANNELS | - |
dc.subject.keywordPlus | POLAR CODES | - |
dc.subject.keywordPlus | INTERFERENCE | - |
dc.subject.keywordPlus | MESSAGES | - |
dc.subject.keywordPlus | WIRE-TAP CHANNEL | - |
dc.subject.keywordPlus | SECRECY CAPACITY | - |
dc.subject.keywordPlus | OUTAGE PROBABILITY | - |
dc.subject.keywordPlus | BROADCAST CHANNELS | - |
dc.subject.keywordPlus | ARTIFICIAL NOISE | - |
dc.subject.keywordPlus | FADING CHANNELS | - |
dc.subject.keywordPlus | POLAR CODES | - |
dc.subject.keywordPlus | INTERFERENCE | - |
dc.subject.keywordPlus | MESSAGES | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.