Filters








554 Hits in 3.8 sec

Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy

Keonkook Lee, Chan-Byoung Chae, Joonhyuk Kang
2013 IEEE Transactions on Vehicular Technology  
Spectrum leasing via cooperation refers to the possibility for primary users to lease part of the spectral resources to secondary users in exchange for cooperation.  ...  Index Terms-Physical security, spectrum leasing, Pareto boundary, interference channel.  ...  The main contributions of this work are: i) proposal of a spectrum leasing scheme via cooperation based on enhancement of the primary secrecy rate; ii) analysis of the optimal beamforming vector maximizing  ... 
doi:10.1109/tvt.2013.2269617 fatcat:gszg3wmwsvdizco2ngiddvhczu

Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy

Keonkook Lee, Osvaldo Simeone, Chan-Byoung Chae, Joonhyuk Kang
2011 2011 IEEE International Conference on Communications (ICC)  
Spectrum leasing via cooperation refers to the possibility for primary users to lease part of the spectral resources to secondary users in exchange for cooperation.  ...  Index Terms-Physical security, spectrum leasing, Pareto boundary, interference channel.  ...  The main contributions of this work are: i) proposal of a spectrum leasing scheme via cooperation based on enhancement of the primary secrecy rate; ii) analysis of the optimal beamforming vector maximizing  ... 
doi:10.1109/icc.2011.5963501 dblp:conf/icc/LeeSCK11 fatcat:qkoohpdeqrecnppa6m6p552pbi

Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy [article]

Keonkook Lee, Chan-Byoung Chae, Joonhyuk Kang
2012 arXiv   pre-print
Spectrum leasing via cooperation refers to the possibility of primary users leasing a portion of the spectral resources to secondary users in exchange for cooperation.  ...  no spectrum leasing.  ...  The problem of spectrum leasing via cooperation for enhanced physical-layer secrecy can be formulated as the maximization of the secrecy rate of the primary network subject to the power constraint and  ... 
arXiv:1205.0085v1 fatcat:c4tepol5tjhtzf3hr3z5ghtkpy

Transmit beamforming with imperfect CSIT in spectrum leasing for physical-layer security

Seongah Jeong, Keonkook Lee, Joonhyuk Kang, Youngseok Baek, Bontae Koo
2012 2012 IEEE Consumer Communications and Networking Conference (CCNC)  
In this paper, we consider spectrum leasing via cooperation for physical-layer security that the secondary cooperation exists for improving the primary secrecy rate while maintaining its quality of service  ...  Index Terms-Physical security, spectrum leasing, interference channel, imperfect channel state information.  ...  CONCLUSION We have studied the impact of imperfect CSIT in spectrum leasing via cooperation for physical-layer security in this paper.  ... 
doi:10.1109/ccnc.2012.6181182 dblp:conf/ccnc/JeongLKBK12 fatcat:heyasofmb5dpzantikvrylyjoy

Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game

Ali Al-Talabani, Yansha Deng, A. Nallanathan, Huan X. Nguyen
2016 IEEE Communications Letters  
Finally, numerical examples are provided to demonstrate that the spectrum leasing based on trading secondary access for cooperation is a promising framework for enhancing secrecy rate in CRNs.  ...  In this letter, physical layer (PHY) security is investigated for both primary and secondary transmissions of a cognitive radio network (CRN) that is in danger of malicious attempt by an eavesdropper (  ...  INTRODUCTION Cooperative jamming received significant attention over the past few years to increase physical layer (PHY) security.  ... 
doi:10.1109/lcomm.2016.2541658 fatcat:ibo53csqgnco3iroob5bjjoonm

Performance Enhancement of Cognitive Radio Networks Using SINR-Based Cooperative Beamforming

P. Suresh Kumar, G. Nirmala, S. Manimegalai, H. Arulvedi
2022 International Journal of Advanced Science and Engineering  
The Model Cognitive Radio Network (MCRN) is developed as a cooperative beam forming method specially designed to provide dynamic spectrum allocation for Primary and Secondary Users.  ...  Fig.3 Spectrum leasing for physical layer secrecy via SINR-based cooperative beam forming The baseband transmitted signal at ST can be expressed as 𝑥 𝑠 = ∑ 𝑠𝑚𝑣𝑚 + 𝑤𝑣𝑒, 𝑚∈𝐾𝑀 (1) where vm≈ CN  ...  It also investigates the cooperative spectrum access for SISO CRNs, which indicates to improve the secure transmission of PUs via cooperating SUs.  ... 
doi:10.29294/ijase.8.3.2022.2260-2267 fatcat:ycfdwo4swvh7tfplperbv3ribe

Distributed coalitional game for friendly jammer selection in ultra-dense networks

Ying Wang, Zhongyu Miao, Ruijin Sun, Lei Jiao
2016 EURASIP Journal on Wireless Communications and Networking  
This approach also permits the jamming SBSs to access extra spectrum in order to enhance the performance.  ...  Instead of transmitting noise as traditional jammers do, this paper proposes a modified spectrum leasing method, which allows SBSs to replace the thermal noise with their own traffic.  ...  This can be done through spectrum leasing.  ... 
doi:10.1186/s13638-016-0702-5 fatcat:argt7vye7badvj6tfuus76wc3u

Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration

2015 KSII Transactions on Internet and Information Systems  
To address this issue, we formulate a joint spectrum and power allocation problem to maximize the energy efficiency of the D2D communication while guaranteeing the physical layer security of the cellular  ...  More precisely, a cellular user leases part of its spectrum to facilitate the D2D communication with a goal of improving the energy efficiency of a D2D pair.  ...  From the perspective of the physical layer security for a D2D communication system, there may exist an eavesdropper who is trying to wiretap the confidential data information of cellular users via the  ... 
doi:10.3837/tiis.2015.03.012 fatcat:2pbldyhdijfz5lomzdppiajdom

Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game

Ali Al-Talabani, Yansha Deng, Arumugam Nallanathan, Huan X. Nguyen
2016 IEEE Transactions on Communications  
We show that the spectrum leasing based on trading secondary access for cooperation by means of relay and jammer is a promising framework for enhancing security in CRNs.  ...  In this paper, a game theory based cooperation scheme is investigated to enhance the physical layer security in both primary and secondary transmissions of a cognitive radio network (CRN).  ...  INTRODUCTION Recently, physical layer (PHY) security has drawn significant attention as an alternative for cryptographic algorithms at the upper layers of protocol stack in secure communication systems  ... 
doi:10.1109/tcomm.2016.2589931 fatcat:ubyy3ghyp5a5hd734jdiycmdli

Matching Theory Based Physical Layer Secure Transmission Strategy for Cognitive Radio Networks

Zhou Tian, Shen Yi, Pan Zhiwen, Liu Nan, You Xiaohu
2021 IEEE Access  
Numerous works so far focus on using spectrum leasing technique to enhance physical layer security in CRNs [7] - [16] .  ...  for physical layer security [2] - [6] .  ... 
doi:10.1109/access.2021.3067345 fatcat:owprrpito5g4vb6nlgr62vsxpe

Table of contents

2021 IEEE Transactions on Communications  
Clerckx 4504 Physical Layer Computation as NOMA for Integrated Wireless Systems ......... M. Hayashi and Á.  ...  Gurewitz 4644 Secrecy-Based Energy-Efficient Mobile Edge Computing via Cooperative Non-Orthogonal Multiple Access Transmission .................................................. L. Qian, W. Wu, W.  ... 
doi:10.1109/tcomm.2021.3091820 fatcat:ymptkb6ulbau5nrijacliund5e

Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach

Igor Stanojev, Aylin Yener
2011 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
A fully decentralized framework is put forth through a competition of potential cooperative jammers for spectrum access by trying to make the jamming offer that most improves the secrecy rate of the source-destination  ...  The proposed scheme can be alternatively seen as a practical basis for the implementation of cognitive radio networks operating according to the property-rights model, i.e., spectrum leasing.  ...  NUMERICAL RESULTS This section provides some insights into the proposed cooperative jamming via the auction-based spectrum leasing scheme using numerical results.  ... 
doi:10.1109/allerton.2011.6120291 dblp:conf/allerton/StanojevY11 fatcat:hanoucalrfg2voefguh4ptkpmy

Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

Zhen Li, Tao Jing, Liran Ma, Yan Huo, Jin Qian
2016 Sensors  
In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods.  ...  However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices.  ...  Author Contributions: Zhen Li conceived of and designed the cooperative jamming scheme and the auction framework. Yan Huo and Jin Qian designed the simulations and analyzed the data.  ... 
doi:10.3390/s16030339 pmid:26959032 pmcid:PMC4813914 fatcat:jvprjqg3gfc35bgtjjvuhs6s34

Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks [article]

Ding Xu, Qun Li
2018 arXiv   pre-print
We propose a new cooperative protocol for the wireless powered secondary users (SU) to cooperate with the primary user (PU).  ...  We consider a cognitive wireless powered communication network (CWPCN) sharing the spectrum with a primary network who faces security threats from eavesdroppers (EAVs).  ...  (EAVs), is usually adopted to measure the physical-layer security performance.  ... 
arXiv:1810.00142v1 fatcat:uszlynj6pfar7hmwpbvk4qmi64

Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

Hequn Hu, Zhenzhen Gao, Xuewen Liao, Victor Leung
2017 Sensors  
P SST is analyzed for the proposed secure schemes, and the closed form expressions of P SST for Pre-PS and Pre-TS are derived and validated through simulation results.  ...  In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices.  ...  Related Work The related research about physical layer security suitable for IoT is summarized in this section.  ... 
doi:10.3390/s17092023 pmid:28869540 pmcid:PMC5621061 fatcat:cj7vfajqfjf4zju6rg3xlxnh6a
« Previous Showing results 1 — 15 out of 554 results