Papers
Topics
Authors
Recent
AI Research Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 60 tok/s
Gemini 2.5 Pro 46 tok/s Pro
GPT-5 Medium 14 tok/s Pro
GPT-5 High 15 tok/s Pro
GPT-4o 93 tok/s Pro
Kimi K2 156 tok/s Pro
GPT OSS 120B 441 tok/s Pro
Claude Sonnet 4 37 tok/s Pro
2000 character limit reached

Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks (1810.00142v1)

Published 29 Sep 2018 in eess.SP

Abstract: We consider a cognitive wireless powered communication network (CWPCN) sharing the spectrum with a primary network who faces security threats from eavesdroppers (EAVs). We propose a new cooperative protocol for the wireless powered secondary users (SU) to cooperate with the primary user (PU). In the protocol, the SUs first harvest energy from the power signals transmitted by the cognitive hybrid access point during the wireless power transfer (WPT) phase, and then use the harvested energy to interfere with the EAVs and gain transmission opportunities at the same time during the wireless information transfer (WIT) phase. Taking the maximization of the SU ergodic rate as the design objective, resource allocation algorithms based on the dual optimization method and the block coordinate descent method are proposed for the cases of perfect channel state information (CSI) and collusive/non-collusive EAVs under the PU secrecy constraint. More PU favorable greedy algorithms aimed at minimizing the PU secrecy outage probability are also proposed. We furthermore consider the unknown EAVs' CSI case and propose an efficient algorithm to improve the PU security performance. Extensive simulations show that our proposed protocol and corresponding resource allocation algorithms can not only let the SU gain transmission opportunities but also improve the PU security performance even with unknown EAVs' CSI.

Summary

We haven't generated a summary for this paper yet.

Lightbulb On Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (2)

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.