The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Incorporating cognitive radio technology into wire-less sensor networks enables the sensor nodes to use the idle channels to meet their communication demands, but the spectrum sensing process inevitably brings extra energy consumption. Since cognitive sensor nodes are generally low-powered with limited batteries, we consider a novel spectrum sensing scheme with combined clustering and censoring for...
In this study, the authors investigate the employment of transmit antenna selection (<underline>TAS</underline>) against eavesdropping in cognitive radio systems, where a cognitive source (CS) node transmits to a cognitive destination (CD) node in the face of an eavesdropper, each equipped with multiple antennas. The authors derive a closed-form expression of secrecy outage probability...
In this paper, we consider a cognitive radio (CR) network which is made up of multiple secondary users (SUs), a secondary destination (SD) and an eavesdropper (E) which may overhear the legitimate communication between SUs and SD. In order to ensure the secure communication from SUs to SD, we investigate round-robin scheduling and optimal user scheduling to prohibit eavesdropper attacking. In optimal...
In this paper, we consider a multi-input-multi-output cognitive radio (MIMO-CR) system which consists of one secondary user (SU) and one secondary destination (SD), in which one eavesdropper (E) attempts to tap the information from SU to SD. All of the aforementioned nodes are equipped with multiple antennas. For enhancing physical layer security, we propose so-called optimal antenna selection (OAS)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.