首页> 外文期刊>IEEE Transactions on Cognitive Communications and Networking >Securing Primary Downlink Transmissions From Untrusted Receivers of Co-Existing Underlay Cognitive Networks
【24h】

Securing Primary Downlink Transmissions From Untrusted Receivers of Co-Existing Underlay Cognitive Networks

机译:保护来自共存的底层认知网络的不受信任的接收者的主要下行链路传输

获取原文
获取原文并翻译 | 示例
           

摘要

In a recent paper, network management rules were evolved to maximize sum throughput of two co-existing underlay secondary networks that reuse the spectrum of a licensed primary network. Such rules require secondary networks to either transmit concurrently by optimal apportioning of the interference temperature limit (ITL), or in isolation. In this paper, we analyze the secrecy outage performance of the primary downlink network for a scenario when receivers of the two co-existing secondary networks are untrusted and eavesdrop on the primary downlink transmissions. We analytically establish that it is only when secondary networks transmit concurrently, that the primary network is most secure. Further, we derive an optimum ITL apportioning mechanism that guarantees maximum secrecy for the primary network, and also present closed-form expressions in a special case. The optimum apportioning parameter shows that the network management rule that maximizes secrecy of the primary network is not the same as that which maximizes secondary sum throughput. Computer simulations are presented that demonstrate accuracy of the derived expressions.
机译:在最近的一篇论文中,网络管理规则得到了发展,以使两个并存的底层辅助网络的总和吞吐量最大化,这些辅助网络可重复使用许可的主要网络的频谱。此类规则要求辅助网络通过干扰温度极限(ITL)的最佳分配同时进行传输,或者隔离进行传输。在本文中,我们分析了当两个并存二级网络的接收者不受信任并窃听初级下行链路传输的情况下,主下行链路网络的保密中断性能。我们通过分析确定,只有在辅助网络同时传输时,主网络才是最安全的。此外,我们推导了一种最佳的ITL分配机制,该机制可以保证主网络的最大机密性,并且在特殊情况下还可以提供闭式表达式。最优分配参数表明,使主网络的保密性最大化的网络管理规则与使次要和吞吐量最大化的网络管理规则不同。提出了计算机仿真,证明了派生表达式的准确性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号