Symbol error probability of secondary user in underlay cognitive radio networks with adaptive transmit power constraint

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The objective of this paper is to study the performance of a cognitive radio network (CRN) under the influence of an eavesdropper (EAV) which can wiretap the primary user (PU) communication. In this CRN, the secondary transmitter (SU)’s transmit power is susceptible to the collaborative constraint of its peak transmit power. Consequently, the author groups derive an adaptive transmit power policy and analytical expression of symbol error probability for the SU. From the numerical results that were obtained, it can be concluded that as the SU presents in the CRN, the primary network security is enhanced. Readers as operators or system designers may find this paper useful as it provides information about the cooperation of the PU and SU in a spectrum sharing CRN to prevent security attack.

Cite

CITATION STYLE

APA

Nguyen, H. S., Nguyen, N. X. H., Ma, Q. P., Jalowiczor, J., & Voznak, M. (2020). Symbol error probability of secondary user in underlay cognitive radio networks with adaptive transmit power constraint. In Communications in Computer and Information Science (Vol. 1284 CCIS, pp. 307–319). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-59000-0_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free