Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Secrecy Performance Maximization for Underlay CR Networks with an Energy Harvesting Jammer
by
Chi, Kaikai
, Sun, Juan
, Zhang, Shubin
in
Algorithms
/ Antennas
/ Computer Communication Networks
/ Computer Simulation
/ Confidentiality
/ CR networks
/ DC programming
/ Electronic surveillance
/ Energy efficiency
/ Energy Transfer
/ Lagrange duality method
/ physical layer security
/ Receivers & amplifiers
/ RF energy-harvesting
/ Wireless communications
/ Wireless networks
2021
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Secrecy Performance Maximization for Underlay CR Networks with an Energy Harvesting Jammer
by
Chi, Kaikai
, Sun, Juan
, Zhang, Shubin
in
Algorithms
/ Antennas
/ Computer Communication Networks
/ Computer Simulation
/ Confidentiality
/ CR networks
/ DC programming
/ Electronic surveillance
/ Energy efficiency
/ Energy Transfer
/ Lagrange duality method
/ physical layer security
/ Receivers & amplifiers
/ RF energy-harvesting
/ Wireless communications
/ Wireless networks
2021
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Secrecy Performance Maximization for Underlay CR Networks with an Energy Harvesting Jammer
by
Chi, Kaikai
, Sun, Juan
, Zhang, Shubin
in
Algorithms
/ Antennas
/ Computer Communication Networks
/ Computer Simulation
/ Confidentiality
/ CR networks
/ DC programming
/ Electronic surveillance
/ Energy efficiency
/ Energy Transfer
/ Lagrange duality method
/ physical layer security
/ Receivers & amplifiers
/ RF energy-harvesting
/ Wireless communications
/ Wireless networks
2021
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Secrecy Performance Maximization for Underlay CR Networks with an Energy Harvesting Jammer
Journal Article
Secrecy Performance Maximization for Underlay CR Networks with an Energy Harvesting Jammer
2021
Request Book From Autostore
and Choose the Collection Method
Overview
This paper investigates the secrecy communication in an underlay cognitive radio (CR) networks with one primary user (PU) as well as multiple PUs, where the radio frequency (RF) energy-harvesting secondary user (SU) transmits the confidential information to the destination in the presence of a potential eavesdropper. We introduce a RF energy-harvesting secondary jammer (SJ) to secure the SU transmissions. The system works in time slots, where each time slot is divided into the energy transfer (ET) phase and the information transfer (IT) phase. In ET phase, the SU and SJ capture energy from the PU transmissions; in the IT phase, the SU uses the harvested energy to transmit information to the destination without causing the harmful interference to the PU transmissions, while the SJ utilizes the captured energy to generate jamming signals to the eavesdropper to secure the SU transmissions. We aim to maximize the secrecy rate for SU transmissionsby jointly optimizing the time allocation between ET phase and IT phase and the transmit power allocation at the SU and SJ. We first formulate the secrecy rate maximization as non-convex optimization problems. Then, we propose efficient nested form algorithms for the non-convex problems. In the outer layer, we obtain the optimal time allocation by the one dimension search method. In the inner layer, we obtain the optimal transmit power allocation by the DC programming, where the Lagrange duality method is employed to solve the convex approximation problem. Simulation results verify that the proposed schemes essentially improve the secrecy rate of the secondary network as compared to the benchmark schemes.
Publisher
MDPI AG,MDPI
Subject
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.