References
- S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201-220, Feb 2005. https://doi.org/10.1109/JSAC.2004.839380
- A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: An information theoretic perspective," Proceedings of the IEEE, vol. 97, no. 5, pp. 894-914, May 2009. https://doi.org/10.1109/JPROC.2009.2015717
- W. D. Horne, "Adaptive spectrum access: Using the full spectrum space," The MITRE Corporation McLean, VA, Tech. Rep., 2003.
- R. Gibbons, "Game Theory for Applied Economist," Princeton University Press, 1992.
- M. Shubik, "Game Theory in the Social Sciences," MIT Press, 1982.
- A. J. McKenzie, "Evolutionary Game Theory," The Stanford Encyclopedia of Philosophy, 2009.
- Z. Han,Y. Gu, and W. Saad, Matching Theory for Wireless Networks, Springer International Publishing, 2017.
- E. C. van der Meulen, "Three-terminal communication channels," Advances in Applied Probability, vol. 3, no. 1, pp. 120-154, 1971. https://doi.org/10.2307/1426331
- J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062-3080, Dec 2004. https://doi.org/10.1109/TIT.2004.838089
- T. Luan, F. Gao, X. D. Zhang, J. C. F. Li, and M. Lei, "Rate maximization and beamforming design for relay-aided multiuser cognitive networks," IEEE Transactions on Vehicular Technology, vol. 61, no. 4, pp. 1940-1945, May 2012. https://doi.org/10.1109/TVT.2012.2184312
- K. Lee and A. Yener, "CTH17-4: Outage performance of cognitive wireless relay networks," in Proc. of IEEE Globecom 2006, Nov 2006, pp. 1-5.
- J. Jia, J. Zhang, and Q. Zhang, "Cooperative relay for cognitive radio networks," in Proc. of INFOCOM 2009, IEEE, April 2009, pp. 2304-2312.
- P. Lin, J. Jia, Q. Zhang, and M. Hamdi, "Dynamic spectrum sharing with multiple primary and secondary users," IEEE Transactions on Vehicular Technology, vol. 60, no. 4, pp. 1756-1765, May 2011. https://doi.org/10.1109/TVT.2011.2132156
- S. Bayat, R. H. Y. Louie, Y. Li and B. Vucetic, "Cognitive radio relay networks with multiple primary and secondary users: distributed stable matching algorithms for spectrum access," in Proc. of 2011 IEEE International Conference on Communications (ICC), Kyoto, pp. 1-6, 2011.
- S. Bayat, R. H. Y. Louie, B. Vucetic, and Y. Li, "Dynamic decentralised algorithms for cognitive radio relay networks with multiple primary and secondary users utilising matching theory," Transactions on Emerging Telecommunications Technologies, vol. 24, no. 5, pp. 486-502, 2013. https://doi.org/10.1002/ett.2663
- W. Liang, S. X. Ng, J. Feng, and L. Hanzo, "Pragmatic distributed algorithm for spectral access in cooperative cognitive radio networks," IEEE Transactions on Communications, vol. 62, no. 4, pp. 1188-1200, April 2014. https://doi.org/10.1109/TCOMM.2014.030214.130326
- P. Rawat, M. Haddad, and E. Altman, "Towards Efficient Disaster Management: 5G and Device to Device Communication," in Proc. of 2015 2nd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), Rennes, pp. 79-87, 2015.
- G. Baldini, S. Karanasios, D. Allen, and F. Vergari, "Survey of Wireless Communication Technologies for Public Safety," IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 619-641, Second Quarter 2014. https://doi.org/10.1109/SURV.2013.082713.00034
- A. Orsino, L. Militano, G. Araniti, A. Molinaro, and A. Iera, "Efficient Data Uploading Supported by D2D Communications in LTE-A Systems," in Proc. of Proceedings of European Wireless 2015; 21th European Wireless Conference, Budapest, Hungary, 2015, pp. 1-6.
- H. Tang and S. Watson, "Cognitive Radio Networks for Tactical Wireless Communications," Scientific Report, No. DRDC-RDDC-2014-R185, Defence Research and Development Canada-Ottawa Research Centre Ottawa, Ontario Canada, 2014.
- Y. Saleem, M. H. Rehmani, and S. Zeadally, "Integration of Cognitive Radio Technology with Unmanned Aerial Vehicles: Issues, Opportunities, and Future Research Challenges," Journal of Network and Computer Applications, vol. 50, pp. 15-31, 2015. https://doi.org/10.1016/j.jnca.2014.12.002
- S. Ghafoor, P. D. Sutton, C. J. Sreenan, and K. N. Brown, "Cognitive Radio for Disaster Response Networks: Survey, Potential, and Challenges," IEEE Wireless Communications, vol. 21, no. 5, pp. 70-80, 2015. https://doi.org/10.1109/MWC.2014.6940435
- A. Medeisis and O. Holland, "Cognitive Radio Policy and Regulation: Techno-Economic Studies to Facilitate Dynamic Spectrum Access," Springer, 2014.
- R. Doost-Mohammady and K. R. Chowdhury, "Transforming Healthcare and Medical Telemetry through Cognitive Radio Networks," IEEE Wireless Communications, vol. 19, no. 4, pp. 67-73, August 2012. https://doi.org/10.1109/MWC.2012.6272425
- R. Chavez-Santiago et al., "Cognitive Radio for Medical Body Area Networks using Ultra Wideband," IEEE Wireless Communications, vol. 19, no. 4, pp. 74-81, August 2012. https://doi.org/10.1109/MWC.2012.6272426
- A. K. Sadek, W. Yu, and K. J. R. Liu, "On the energy efficiency of cooperative communications in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 6, no. 1, pp. 5:1-5:21, Jan. 2010.
- Z. Sheng and C. H. Liu, "Energy Efficient Cooperative Wireless Communication and Networks," CRC Press, 2014.
- W. Fang, F. Liu, F. Yang, L. Shu, and S. Nishio, "Energy-efficient cooperative communication for data transmission in wireless sensor networks," IEEE Transactions on Consumer Electronics, vol. 56, no. 4, pp. 2185-2192, November 2010. https://doi.org/10.1109/TCE.2010.5681089
- M. Nasim and S. Qaisar, "Cooperative Communication for Energy Efficiency in Mobile Wireless Sensor Networks," Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 159-172, 2011.
- X. Feng, G. Sun, X. Gan, F. Yang, X. Tian, X. Wang, and M. Guizani, "Cooperative Spectrum Sharing in Cognitive Radio Networks: A Distributed Matching Approach," IEEE Transactions on Communications, vol. 62, no. 8, pp. 2651-2664, Aug. 2014. https://doi.org/10.1109/TCOMM.2014.2322352
- D. Liu, Y. Xu, L. Shen, and Y. Xu, "Self-Organizing Multiuser Matching in Cellular Networks: A Score-Based Mutually Beneficial Approach," IET Communications, vol. 10, no. 15, pp. 1928-1937, Oct. 2016. https://doi.org/10.1049/iet-com.2016.0129
- S. X. Ng and L. Hanzo, "On the MIMO channel capacity of multidimensional signal sets," IEEE Transactions on Vehicular Technology, vol. 55, no. 2, pp. 528-536, March 2006. https://doi.org/10.1109/TVT.2005.863357
- L. Hanzo, T. H. Liew, B. L. Yeap, R. Y. S. Tee, S. X. Ng, "Turbo Coding, Turbo Equalisation and Space-Time Coding: EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels, 2nd Edition," John Wiley and Sons, Mar 1, 2011.
- M. F. U. Butt, S. X. Ng, and L. Hanzo, "EXIT chart aided design of near-capacity self-concatenated trellis coded modulation using iterative decoding," in Proc. of 67th IEEE Vehicular Technology Conference, Singapore, pp.734-738, May 2008.
- M. F. U. Butt, S. X. Ng, and L. Hanzo, "Self-concatenated code design and its application in power-efficient cooperative communications," IEEE Communications Surveys Tutorials, vol. 14, no. 3, pp. 858-883, Third 2012.
- D. Divsalar and F. Pollara, "Serial and hybrid concatenated codes with applications," in Proc. of Intl. Symp. Turbo Codes and Appls, pp.80-87, 1997.
- D. Divsalar and F. Pollara, "Hybrid concatenated codes and iterative decoding," in Proc. of Proceedings of IEEE International Symposium on Information Theory, Ulm, 1997.
- A. Payandeh, M. Ahmadian, and M. R. Aref, "A secure channel coding scheme for efficient transmission of remote sensing data over the LEO satellite channels," in Proc. of 2007 3rd International Conference on Recent Advances in Space Technologies, June 2007, pp. 510-514.
- A. Payandeh, M. Ahmadian, and M. R. Aref, "Adaptive secure channel coding based on punctured turbo codes," IEE Proceedings - Communications, vol. 153, no. 2, pp. 313-316, April 2006.
- A. A. S. Afshar, T. Eghlidos, and M. R. Aref, "Efficient secure channel coding based on quasi-cyclic low-density parity-check codes," IET Communications, vol. 3, no. 2, pp. 279-292, February 2009. https://doi.org/10.1049/iet-com:20080050
- J. L. Massey, "An introduction to contemporary cryptology," Proceedings of the IEEE, vol. 76, no. 5, pp. 533-549, May 1988. https://doi.org/10.1109/5.4440
- A. Zaidan, B. Zaidan, M. Abdulrazzaq, R. Raji, and S. Mohammed, "Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography," International Association of Computer Science and Information Technology (IACSIT), indexing by Nielsen, Thomson ISI (ISTP), IACSIT Database, British Library and EI Compendex, vol. 20, 2009.
- FIPS Pub 46, "Data Encryption Standard (DES)," National Institute of Standards and Technology (NIST), 15 January 1977.
- E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 2-21, 1991.
- FIPS 197, "Announcing the Advanced Encryption Standard (AES)," National Institute of Standards and Technology (NIST), 26 November 2001.
- T. Li, J. Ren, Q. Ling, and A. Jain, "Physical layer built-in security analysis and enhancement of CDMA systems," in Proc. of MILCOM 2005 - 2005 IEEE Military Communications Conference, Oct 2005, pp. 956-962 Vol. 2.
- T. Dean and A. Goldsmith, "Physical-layer cryptography through massive MIMO," in Proc. of Information Theory Workshop (ITW), 2013 IEEE, Sept 2013, pp. 1-5.
- L. Mucchi, L. S. Ronga, and E. Del Re, "A novel approach for physical layer cryptography in wireless networks," Wireless Personal Communications, vol. 53, no. 3, pp. 329-347, 2010. https://doi.org/10.1007/s11277-010-9950-6
- A. Zuquete and J. Barros, "Physical-layer encryption with stream ciphers," in Proc. of 2008 IEEE International Symposium on Information Theory, July 2008, pp. 106-110.
- A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Communications Surveys Tutorials, vol. 16, no. 3, pp. 1550-1573, Third 2014. https://doi.org/10.1109/SURV.2014.012314.00178
- S. A. A. Fakoorian and A. L. Swindlehurst, "On the optimality of polar codes for the deterministic wiretap channel," in Proc. of 2013 Asilomar Conference on Signals, Systems and Computers, pp. 2089-2093, Nov 2013.
- R. A. Chou, M. R. Bloch, and E. Abbe, "Polar coding for secret-key generation," CoRR, vol. abs/1305.4746, 2013.
- R. J. Aumann and M. Maschler, "Repeated Games with Incomplete Information," The MIT press, 1995.
- Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "Repeated open spectrum sharing game with cheat-proof strategies," IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1922-1933, April 2009. https://doi.org/10.1109/T-WC.2008.080182
- M. F. U. Butt, R. A. Riaz, S. X. Ng, and L. Hanzo, "Near-capacity iteratively decoded binary self-concatenated code design using EXIT charts," in Proc. of IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, Nov 2008, pp. 1-5.
- S. Benedetto, D. Divsalar, G. Montorsi, and F. Pollara, "A soft-input soft-output app module for iterative decoding of concatenated codes," IEEE Communications Letters, vol. 1, no. 1, pp. 22-24, Jan 1997. https://doi.org/10.1109/4234.552145