• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • About QSpace
    • Vision & Mission
  • Help
    • Item Submission
    • Publisher policies
    • User guides
      • QSpace Browsing
      • QSpace Searching (Simple & Advanced Search)
      • QSpace Item Submission
      • QSpace Glossary
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Cooperative Secondary Encryption for Primary Privacy Preserving in Cognitive Radio Networks

    Thumbnail
    Date
    2019
    Author
    Wang, Dawei
    Zhang, Ruonan
    Li, Lixin
    Men, Shaoyang
    Zhou, Deyun
    Guizani, Mohsen
    ...show more authors ...show less authors
    Metadata
    Show full item record
    Abstract
    Aiming at protecting primary privacy messages and supporting secondary quality-of-service (QoS), we propose a secondary encrypted secure strategy for cognitive radio networks. In this scheme, a primary system directly transmits privacy messages or employs pre-transmitted secure secondary messages to encrypt the primary privacy information, and the secondary system acquires a fraction of the interference-free licensed spectrum. Following this idea, we consider two secure communication scenarios: the non-buffer scenario and the buffer-aided scenario. For the non-buffer scenario, the primary system first evaluates the channel quality of the direct transmission link. Then, the primary transmitter adaptively chooses to directly transmit the privacy messages or employ the encryption of the secure secondary messages according to the evaluation results. For this scenario, we investigate the primary ergodic secrecy performance and the secondary average performance. For the buffer-aided scenario, the secure secondary messages can be stored in the buffers at both the primary transmitter and receivers. According to the buffer states and channel quality, the primary system adaptively chooses to directly transmit the primary privacy information, permit the secondary secure transmission, or utilize the encryption of the stored secure secondary information. For this scenario, we also investigate the performances of both the primary and secondary systems, and derive the closed-form expression of the primary information delay. Numerical results are given to prove that the proposed scheme can provide privacy preserving for the primary information and acquire high secondary average transmission rate. - 2013 IEEE.
    DOI/handle
    http://dx.doi.org/10.1109/ACCESS.2019.2950948
    http://hdl.handle.net/10576/15647
    Collections
    • Computer Science & Engineering [‎2485‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us
    Contact Us | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policies

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us
    Contact Us | QU

     

     

    Video