1 |
S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb.2005.
DOI
|
2 |
Z. Xu, W. Qin, Q. Tang, and D. Jiang, "Energy-efficient cognitive access approach to convergence communications," SCIENCE CHINA Information Sciences, vol. 57, no. 4, pp. 1-12, April. 2014. 2014, 57(4): 1-12. http://www.cnki.com.cn/Article/CJFDTotal-JFXG201404006.htm
|
3 |
K. Tourki, Khalid. A. Qaraqe, and M. -S. Alouini, "Outage analysis for underlay cognitive networks using incremental regenerative relaying," IEEE Trans. Veh. Technol., vol. 62, no. 2, pp. 721-734, Feb. 2013.
DOI
|
4 |
Y. Zou, J. Zhu, B. Zheng and Y.-D. Yao, "An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks," IEEE Trans. Sig. Pross., vol. 58, no. 10, pp. 5438-5445, Oct. 2010.
DOI
|
5 |
T. Q. Duong, V. N. Q. Bao, H. Tran, G. C. Alexandropoulos., and H.-J. Zepernick, "Effect of primary network on performance of spectrum sharing AF relaying," Electron, Lett., vol. 48, no. 1, pp. 25-27, 2012.
DOI
|
6 |
W. Xu, J. Zhang, P. Zhang, and C. Tellambure, "Outage probability os denode-and-forword cognitive relay in presence of primary user's interference," IEEE Commun. Lett., vol. 16, no. 8, pp. 1252-1255, Aug. 2012.
DOI
|
7 |
S. I. Hussain, M.-S. Alouini, K. Qaraqe, and M. Hasna, "Reactive relay selection in underlay cognitive networks with fixed gain relays," in Proc. of IEEE ICC. 2012.
|
8 |
S. I. Hussain, M.-S. Alouini, K. Qaraqe, and M. Hasna, "Outage Analysis of Selective Cooperation in Underlay Cognitive Networks with Fixed Gain Relays and Primary Interference Modeling," in Proc. of IEEE PIMRC, 2012.
|
9 |
H. Hakim, H. Boujemmaa, and W. Ajib, "Performance comparison between adaptive and fixed transmit power in underlay cognitive radio networks," IEEE Trans. Commun. vol.61, no. 12, pp. 4836-4846, Dec. 2013.
DOI
|
10 |
Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Network, vol. 12, no. 5, pp. 28-33, 2013.
DOI
|
11 |
H. Delfs, and H. Knebl, Introduction to cryptography: principles and applications, 2nd edn. Springer, 2007.
|
12 |
Y. Pei, Y.-C. Liang, K. C. The, and K. H. Li, "Secure communication over MISO cognitive ratio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
DOI
|
13 |
A Mukherjee, S. A. Fakoorian, J. Huang and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless network: a survey," IEEE Commun. Survey & Tutorials, vol. 16, no. 3, pp. 1550-1573, 2014.
DOI
|
14 |
B. Makki and T. Eriksson, "Secure spectrum sharing via rate adaptation," in Proc. of ICNC, 2013.
|
15 |
Y. Pei, Y.-C. Liang, K. C. The, and K. H. Li, "Achieving cognitive and secure transmissions using multiple antennas," in Proc. of IEEE PIMRC, 2009.
|
16 |
Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitve radio networks," IEEE Trans. Commun. vol.61, no. 12, pp. 5103-5113, Dec. 2013.
DOI
|
17 |
Y. Wu and K. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sept. 2011.
DOI
|
18 |
P. N. Son and H. Y. Kong, "The underlay cooperative cognitive network with secure transmission," Communications (QBSC), 27th Biennial Symposium on, pp. 164 - 167, June 2014.
|
19 |
N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, "Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users," IEEE Trans.Wireless Commun., vol. 13, no. 2, pp. 1058-1073, Feb. 2013.
|
20 |
C. Wang and H. -M. Wang, "On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1814-1827, Nov. 2014.
DOI
|
21 |
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
DOI
|
22 |
H. Sakran, M. Shokair, O. Nasr, S. El-Rabaie, and A. A. El-Azm, "Proposed relay selection scheme for physical layer security in cognitive ratio networks," IET Commun., vol. 6, iss. 16, pp. 2676-2687, Jun. 2012.
DOI
|
23 |
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
DOI
|
24 |
H. -M. Wang, M. Luo, X. -G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE signal process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
DOI
|
25 |
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
DOI
|
26 |
Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099 - 2111, Oct. 2013.
DOI
|
27 |
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th edition. Academic Press, San Diego, 2007. http://www.scirp.org/reference/ReferencesPapers.aspx? ReferenceID=697112
|
28 |
L. Zheng and D. Tse, "Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels," IEEE Trans. Inf. Theory, vol. 49, no.5, pp. 1073-1096, May 2003.
DOI
|
29 |
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun. vol.61, no. 1, pp. 144-154, Jan. 2013.
DOI
|
30 |
S. I. Hussain, M. M. Abdallah, M.-S. Alouini, M. O. Hasna, K. Qaraqe, "Performance analysis of selective cooperation in underlay cognitive networks over Rayleigh channels," in Proc. of IEEE SPAWC, 2011.
|