Hyppää sisältöön
    • Suomeksi
    • In English
Trepo
  • Suomeksi
  • In English
  • Kirjaudu
Näytä viite 
  •   Etusivu
  • Trepo
  • TUNICRIS-julkaisut
  • Näytä viite
  •   Etusivu
  • Trepo
  • TUNICRIS-julkaisut
  • Näytä viite
JavaScript is disabled for your browser. Some features of this site may not work without it.

Intercept Probability of Underlay Uplink CRNs with Multi-Eavesdroppers

Bouabdellah, Mounia; Bouanani, Faissal El; Sofotasios, Paschalis C.; Da Costa, Daniel Benevides; Ben-Azza, Hussain; Mezher, Kahtan; Muhaidat, Sami (2019-09)

 
Avaa tiedosto
Intercept_Probability_of_Underlay_Uplink_2019.pdf (509.0Kt)
Lataukset: 



Bouabdellah, Mounia
Bouanani, Faissal El
Sofotasios, Paschalis C.
Da Costa, Daniel Benevides
Ben-Azza, Hussain
Mezher, Kahtan
Muhaidat, Sami
09 / 2019

8904352
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
doi:10.1109/PIMRC.2019.8904352
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:tuni-202012018378

Kuvaus

Peer reviewed
Tiivistelmä
<p>The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and that a jammer is randomly chosen from the remaining source nodes to send a jamming signal to the eavesdroppers. However, in an uplink underlay CRN, a friendly jammer is not always allowed to use its maximal transmit power as the secondary users are required to continuously adapt their power in order to avoid causing interference to the primary users. As a consequence, enhancing the system security using a jammer with low transmit power in the presence of numerous eavesdroppers turns out to be questionable. In this regard, we derive novel analytic expressions that assist in quantifying the achievable security levels and the corresponding limitations. This leads to the development of useful insights on the impact of network parameters on the performance of the system's security. The offered analytic results are corroborated through Monte Carlo simulation. It is shown, that for a low transmit power of the friendly jammer, the system's security can only be enhanced for a small number of eavesdroppers.</p>
Kokoelmat
  • TUNICRIS-julkaisut [23862]
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste
 

 

Selaa kokoelmaa

TekijätNimekkeetTiedekunta (2019 -)Tiedekunta (- 2018)Tutkinto-ohjelmat ja opintosuunnatAvainsanatJulkaisuajatKokoelmat

Omat tiedot

Kirjaudu sisäänRekisteröidy
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste