The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study user cooperation to enhance the physical layer security. Specifically, the source cooperates with friendly intermediate nodes to transmit message securely in the presence of multiple eavesdroppers. We propose a cooperative framework, whereby the source selects multiple partners and stimulates them by granting an amount of reward. First, multiple cooperative relays and jammers...
In this paper, we study user cooperation to enhance secure communication. Specifically, the source cooperates with intermediate nodes for secure information transfer when multiple eavesdroppers exist. We propose a three-step cooperative scheme, whereby the source selects partners and stimulates them for secure communications by paying an amount of reward. Specifically, a set of partners are selected...
In this paper, a cooperative cognitive radio networking framework, which enhances the security of communications for the primary users (PUs) and provides transmission opportunities to secondary users (SUs), is proposed. Particularly, a PU selects two cooperating SUs, a relay SU and a jammer SU, for improving communication secrecy and grants a fraction of the bandwidth resource as a reward to the SUs,...
In this paper, we investigate cooperative networking in cognitive radio networks (CRNs), which targets to help the primary users (PUs) for secure communications and provide transmission opportunities to secondary users (SUs). Two cooperation schemes: relay-jammer (R-J) scheme and cluster-beamforming (C-B) scheme, are proposed. In R-J cooperation scheme, two individual SUs, a relay and a friendly jammer,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.