VNU-UET Repository: No conditions. Results ordered -Date Deposited. 2024-03-29T13:15:39ZEPrintshttp://eprints.uet.vnu.edu.vn/images/sitelogo.pnghttps://eprints.uet.vnu.edu.vn/eprints/2020-07-10T15:05:06Z2020-12-21T09:36:15Zhttp://eprints.uet.vnu.edu.vn/eprints/id/eprint/3995This item is in the repository with the URL: http://eprints.uet.vnu.edu.vn/eprints/id/eprint/39952020-07-10T15:05:06ZSecrecy Performance of Cooperative Cognitive
Radio Networks Under Joint Secrecy Outage and
Primary User Interference ConstraintsIn this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio
Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three
constraints which include peak transmit power level and interference limitation with respect to the primary
user (PU) as well as secrecy outage constraints due to the EAV. Secrecy outage is achieved when the EAV
cannot decode the targeted signal, but communications in the secondary network is still possible (non-zero
capacity exists). Approximation expressions of the secrecy outage probability and the probability of non-zero
secrecy capacity are derived to evaluate the secrecy performance. Monte Carlo simulations are provided to
examine the accuracy of the derived approximation expressions. Based on this, power allocation policies
for the SUs are derived, satisfying all the constraints while maximizing the secrecy performance as well as
the quality of service performance of the secondary network. It can be concluded that with knowledge of
the channel state information (CSI) of the EAV it is possible to calculate the optimal value for the secrecy
outage threshold of the secondary user (SU) which in turn allows maximizing the secrecy performance. Most
interestingly, our numerical results illustrate that the secrecy performance of the system is much improved
when the parameters obtained using the CSI of the EAV are calculated optimally. Thence, the system can
adjust the power allocation so that no eavesdropping occurs even without reducing quality of service (QoS)
performance compared to a network without any EAV.Xuan Truong Quachqxtruong@ictu.edu.vnHung Trantran.hung@mdh.seElisabeth Uhlemannelisabeth.uhlemann@mdh.seTruc Mai Tranmai.tran@vnu.edu.vn2018-12-25T11:05:27Z2019-02-19T02:05:42Zhttp://eprints.uet.vnu.edu.vn/eprints/id/eprint/3387This item is in the repository with the URL: http://eprints.uet.vnu.edu.vn/eprints/id/eprint/33872018-12-25T11:05:27ZSecrecy Performance of Cognitive Cooperative
Industrial Radio NetworksAlthough cognitive radio networks (CRNs) were
originally intended as a powerful solution to enhance spectrum
utilization, it can also be used to improve reliability by avoiding
interference in the 2.4 or 5 GHz band. Using multiple relay nodes
in CRNs, the outage probability, i.e., the probability that the endto-end signal-to-noise ratio drops below a predefined threshold,
can be reduced significantly. This implies that the probability
that a message is not delivered within a specific time frame,
can be kept below a required threshold, even when there are
constraints on energy efficiency in terms of peak transmit power.
This is particularly useful for industrial networks with realtime constraints. However, using CRNs may also reveal secret
information to eavesdroppers (EAVs). Therefore, guaranteeing
secure and reliable communications in CRNs is still a challenging
problem. To this end, the secrecy performance of a proactive
decode-and-forward relaying scheme in a cognitive cooperative
radio network is investigated. More specifically, analytical as well
as approximate expressions for the secrecy outage probability and
probability of non-zero secrecy capacity are derived to evaluate
the system performance. Numerical results show that the approximation tightly match the analytical results and simulations,
and thus it can be used to provide a fast evaluation of the
security and reliability of communications using a considered
assignment of relay nodes in a cognitive cooperative radio
network (CCRN). Consequently, our results enable to secure
the communication, and increasing the reliability, availability,
robustness, and maintainability of wireless industrial network,
subject to various constraints from the CRNXuan Truong Quachqxtruong@ictu.edu.vnHung Trantran.hung@mdh.seElisabeth Uhlemannelisabeth.uhlemann@mdh.seTruc Mai Tranmai.tran@vnu.edu.vn2015-11-03T10:34:38Z2015-11-03T11:14:02Zhttp://eprints.uet.vnu.edu.vn/eprints/id/eprint/781This item is in the repository with the URL: http://eprints.uet.vnu.edu.vn/eprints/id/eprint/7812015-11-03T10:34:38ZĐiều khiển tốc độ dựa trên thông số tầng MAC cho giao thức tầng giao vận trong mạng không dây đa bướcTruc Mai Tranmai.tran@vnu.edu.vnLe Minh Duongminhdl@vnu.edu.vn2015-11-03T10:23:20Z2015-11-03T10:24:21Zhttp://eprints.uet.vnu.edu.vn/eprints/id/eprint/779This item is in the repository with the URL: http://eprints.uet.vnu.edu.vn/eprints/id/eprint/7792015-11-03T10:23:20ZCải tiến cho điều khiển tốc độ tầng giao vận trong mạng điều khiển không dây đa bướcTruc Mai Tranmai.tran@vnu.edu.vnLe Minh Duongminhdl@vnu.edu.vn2013-08-08T06:26:21Z2013-08-08T06:26:21Zhttp://eprints.uet.vnu.edu.vn/eprints/id/eprint/183This item is in the repository with the URL: http://eprints.uet.vnu.edu.vn/eprints/id/eprint/1832013-08-08T06:26:21ZMAC-based Improvement for Transport Rate Control in Multihop Wireless NetworksTruc Mai Tranmai.tran@vnu.edu.vnLe Minh Duongminhdl@vnu.edu.vn