A Novel Framework for Achievable Secrecy Throughput of Distributed Cognitive Radio Wireless Networks

نویسندگان

  • Hongyu Ma
  • Kai Niu
چکیده

—The achievable secrecy throughput of the distributed cognitive radio wireless networks (DCRWNs) is investigated in this paper. The related works on the secrecy performance mainly focus on the average value depending on nodes spatial distribution. However, these results neglect the effect of nodes location on the performance discrepancies. To break this bottleneck, a new framework is developed to derive a closedform expression of the achievable secrecy throughput for the secondary network under the outage constraint of the primary network. Moreover, the nearest routing protocols is considered. Through the stochastic geometry analysis, it is shown that the new framework highlights the performance discrepancy resulting from spatial distribution. Besides, we derive the optimal value of connection outage probability of the SR network maximizing the successful transmission probability for DCRWNs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Multicast Tree Construction Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks

Many appealing multicast services such as on-demand TV, teleconference, online games and etc. can benefit from high available bandwidth in multi-radio multi-channel wireless mesh networks. When multiple simultaneous transmissions use a similar channel to transmit data packets, network performance degrades to a large extant. Designing a good multicast tree to route data packets could enhance the...

متن کامل

On the security of cooperative cognitive radio networks with distributed beamforming

This paper investigates the secrecy performance of amplify-and-forward (AF)-relaying cooperative cognitive radio networks (CCRNs) over Rayleigh-fading channels. Specifically, we consider practical passive eavesdropping scenarios, where the channel state information of the eavesdropper’s link is not available at the secondary transmitter. In order to avoid interfering with the primary receiver a...

متن کامل

Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks

The recent development of vehicular networking technologies brings the promise of improved driving safety and traffic efficiency. Cooperative communication is recognized as a low-complexity solution for enhancing both the reliability and the throughput of vehicular networks. However, due to the openness of wireless medium, the vehicular wireless communications (VWC) is also vulnerable to potent...

متن کامل

Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel

In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...

متن کامل

On The Secrecy of the Cognitive Interference Channel with Channel State

In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCM

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2015