Probability of Secrecy Outage in Cognitive Radio Networks over Rician-Fading Channels
Journal Title: International Journal of Electronics and Telecommunications - Year 2016, Vol 62, Issue 2
Abstract
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system transmitting its confidential information to a legitimate destination in the presence of an eavesdropper, are considered in this paper. Under CRNs, the interference power reaching at primary user (PU) is limited by some pre-defined threshold. Secrecy outage not only occurs when the achievable secrecy capacity for source-destination link is smaller than a target rate, but also occurs in the case that the interference power at PU is greater than that threshold. Analytical expression for secrecy outage probability has been derived and verified with simulation results. In addition, we have also derived the analytical expression for probability of non-zero secrecy capacity.
Authors and Affiliations
Jiliang Zhang, Hong Jiang, Gaofeng Pan
Noise Detection for Biosignals Using an Orthogonal Wavelet Packet Tree Denoising Algorithm
This article deals with the noise detection of discrete biosignals using an orthogonal wavelet packet. More specifically, it compares the usefulness of Daubechies wavelets with different vanishing moments for the denoisi...
Method for Filling and Sharpening False Colour Layers of Dual Energy X-ray Images
An X-ray scanning and image processing have a vast range of applications in the security. An image of a content of some package being passed for example to an airplane or to the court house may help to figure out if the...
Probability of Secrecy Outage in Cognitive Radio Networks over Rician-Fading Channels
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system transmitting its confidential information to a legitimate destination in the presence of an eavesdropper, are considered in t...
Low-Power High-Speed Double Gate 1-bit Full Adder Cell
In this paper, we proposed an efficient full adder circuit using 16 transistors. The proposed high-speed adder circuit is able to operate at very low voltage and maintain the proper output voltage swing and also balance...
Network Steganography in the DNS Protocol
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can b...