Search
Now showing items 1-8 of 8
Performance of eigenvalue based spectrum sensing in full-duplex cognitive radio networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Spectrum sensing is a key component in any cognitive radio network. Recently full-duplex communication, i.e., the ability to transmit and receive at the same time at the same frequency, has become feasible. Residual self ...
Estimating the number of sources in white Gaussian noise: Simple eigenvalues based approaches
(
Institution of Engineering and Technology
, 2017 , Article)
Estimating the number of sources is a key task in many array signal processing applications. Conventional algorithms such as Akaike's information criterion (AIC) and minimum description length (MDL) suffer from underestimation ...
On the performance of spectrum sensing based on GLR for full-duplex cognitive radio networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In cognitive radio networks, secondary users (SUs) utilize the unused spectrum slots in the assigned band for the primary users (PUs). Conventional cognitive radio networks operate in half-duplex (HD) mode. Recently, ...
Secure multiple-users transmission using multi-path directional modulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
The Secure Degrees of Freedom of the MIMO BC and MIMO MAC with Multiple Unknown Eavesdroppers
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, a legitimate receiver and an unknown number of eavesdroppers each with ...
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
Exploiting spectrum sensing data for key management
(
Elsevier B.V.
, 2017 , Article)
In cognitive radio networks, secondary users (SUs) communicate on unused spectrum slots in the frequency bands assigned to primary users (PUs). Like any other wireless communication system, cognitive radio networks are ...
Secure Spatial Multiple Access Using Directional Modulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In this paper, we introduce a secure multiple access scheme, which exploits the multipath structure of the channel to create a multi-user interference environment. The generated interference enables legitimate users to ...