Redirigiendo al acceso original de articulo en 19 segundos...
Inicio  /  Applied Sciences  /  Vol: 10 Par: 5 (2020)  /  Artículo
ARTÍCULO
TITULO

Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers

Zhihui Shang    
Tao Zhang    
Yueming Cai    
Weiwei Yang    
Hao Wu    
Yu Zhang and Liwei Tao    

Resumen

This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while the malicious eavesdropper (Eve) is used to eavesdrop the confidential information from Alice and Relay. To improve security, we design two transmission schemes, namely maximal-ratio combining/maximal-ratio transmission-selection combining (MRC/MRT-SC) with half-duplex (HD) receiver and maximal-ratio combining-zero forcing beamforming/maximal-ratio transmission-selection combining-zero forcing beamforming (MRC-ZFB/MRT-SC-ZFB) with full-duplex (FD) receiver. To evaluate the secrecy performance obtained from the proposed schemes comprehensively, the new closed-form and simple asymptotic expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) of our considered networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes are derived, respectively. Thus, we explore the effect of various schemes on system secrecy performance in terms of SOP and ST. Analytical results and numerical simulations demonstrate that MRC-ZFB/MRT-SC-ZFB achieves better performance in the two proposed schemes. In particular, we show that the FD receiver plays a crucial role in designing the cognitive wiretap networks for protecting the legitimate link against attack from the malicious eavesdropping.

 Artículos similares

       
 
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers

 
Argyrios Sideris and Minas Dasygenis    
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat... ver más
Revista: Computation

 
I-Hsien Liu, Meng-Huan Lee, Hsiao-Ching Huang and Jung-Shian Li    
New mobile network technologies, particularly 5G, have spurred a growth in smart healthcare networks. They enable real-time monitoring, personalized treatments, and more. However, these transformative capabilities have also uncovered potential vulnerabil... ver más
Revista: Applied Sciences

 
Lingtong Min, Jiawei Li, Yixin He and Weiguang Wang    
This paper investigates the secure rate-splitting multiple access (RSMA) cooperation for the maritime cognitive unmanned aerial vehicle (UAV) network. Specifically, we first take into account the primary privacy information and the secondary maritime UAV... ver más

 
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian    
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr... ver más
Revista: Applied Sciences