首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9篇
  免费   0篇
无线电   9篇
  2021年   2篇
  2020年   3篇
  2019年   2篇
  2018年   2篇
排序方式: 共有9条查询结果,搜索用时 732 毫秒
1
1.
Wireless Personal Communications - In cognitive radio networks (CRNs), primary interference is either neglected or considered as an additive white Gaussian random variable (r.v.). Current...  相似文献   
2.
Wireless Personal Communications - Underlay mode of cognitive radio networks (CRNs) permits secondary users (SUs) to simultaneously operate with primary users (PUs), inducing mutual interference...  相似文献   
3.
Wireless Personal Communications - The spectrum sharing paradigm is a promising countermeasure to the spectrum under-utilization problem. However, it causes both primary interference (inflicted by...  相似文献   
4.
Do-Dac  Thiem  Ho-Van  Khuong 《Wireless Networks》2021,27(3):1561-1572

Energy harvesting has lately been of particular attention to researchers. In addition, cognitive radio networks (CRNs) are recognized as an attainable measure for the problem of radio spectrum shortage in next generation radio access. A combination of these two technologies, which forms energy harvesting CRNs (EHCRNs), allows wireless communication terminals to prolong their operation time in limited spectrum scenarios. Nonetheless, that CRNs create opportunities for secondary users to access primary users’ spectrum induces vulnerability of message security. So far, security capability analysis of EHCRNs has been limited to Rayleigh fading whilst Nakagami-m fading is more common than Rayleigh fading and better reflects distinct fading severity degrees in practical scenarios. Accordingly, this paper firstly offers the precise security capability analysis of EHCRNs under interference power constraint, Nakagami-m fading, maximum transmit power constraint, and primary interference. Then, the offered analysis is ratified by computer simulations. Ultimately, multiple results reveal that the security capability is considerably improved with smaller primary interference and lower required security threshold. Moreover, the security capability is significantly impacted by channel severity and is optimized with appropriate selection of time percentage.

  相似文献   
5.
Telecommunication Systems - The promise of high-bandwidth and low-latency wireless applications has placed unprecedented stress on the limited spectrum for future 5G networks. Thus, dynamic...  相似文献   
6.
Wireless Personal Communications - An unlicensed relay is located between an unlicensed sender and an unlicensed recipient for securing the sender’s message against a wire-tapper in underlay...  相似文献   
7.

EHONs (Energy Harvesting Overlay Networks) satisfy stringent design requirements such as high energy-and-spectrum utilization efficiencies. However, due to open access nature of these networks, eavesdroppers can emulate cognitive radios to wire-tap legitimate information, inducing information security to become a great concern. In order to protect legitimate information against eavesdroppers, this paper generates artificial noise transmitted simultaneously with legitimate information to interfere eavesdroppers. Nonetheless, artificial noise cannot be perfectly suppressed at legitimate receivers as for its primary purpose of interfering only eavesdroppers. Moreover, channel information used for signal detection is hardly estimated at receivers with absolute accuracy. As such, to quickly evaluate impact of channel estimation-and-artificial noise cancellation imperfection on secrecy performance of secondary/primary communication in ANaEHONs (Artificial Noise-aided EHONs), this paper firstly proposes precise closed-form formulas of primary/secondary SOP (Secrecy Outage Probability). Then, computer simulations are provided to corroborate these formulas. Finally, various results are illustrated to shed insights into secrecy performance of ANaEHON with key system parameters from which optimum parameters are recognized. Notably, secondary/primary communication can be secured at different levels by flexibly adjusting various parameters of the proposed system model.

  相似文献   
8.
Mobile Networks and Applications - Interference from primary transmitters in underlay cognitive networks is practically neither neglected nor integrated into noise terms although most literature...  相似文献   
9.
Underlay mechanism allows concurrent communications of primary users and secondary users in cognitive radio networks (CRNs), causing mutual interference between them. However, current literature neglects primary interference or considers it as Gaussian noise. In addition, artificial noise, which is intentionally generated to interfere eavesdroppers, can improve security performance of CRNs. This paper analyzes security performance of CRNs, accounting for artificial noise and considering primary interference as non-Gaussian noise, under maximum transmit power constraint, interference power constraint, and Rayleigh fading channels. The security performance is evaluated through proposed exact expressions of secrecy outage probability, non-zero achievable secrecy rate probability, and intercept probability, which are verified by Monte-Carlo simulations. Various results demonstrate that CRNs suffer security performance saturation in the range of large maximum transmit power or large maximum interference power, and primary interference significantly deteriorates security performance while artificial noise is useful in enhancing this performance.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号