Search
Now showing items 1-6 of 6
On the coexistence of a primary user with an energy harvesting secondary user: A case of cognitive cooperation
(
John Wiley and Sons Ltd
, 2016 , Article)
In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during ...
Relay-Assisted Primary and Secondary Transmissions in Cognitive Radio Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
We assume a set of cognitive relay nodes that assists both primary and secondary transmissions in a time-slotted cognitive radio networks. To regulate the channel access of the various nodes in the network, we propose an ...
Analysis of In-band Full-Duplex OFDM Signals Affected by Phase Noise and I/Q Imbalance
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
The idea of the simultaneous transmission and reception of data using the same frequency is a potential candidate to be deployed in the next generation wireless communications standard 5G. The In-Band Full-Duplex (IBFD) ...
The Secure Degrees of Freedom of the MIMO BC and MIMO MAC with Multiple Unknown Eavesdroppers
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, a legitimate receiver and an unknown number of eavesdroppers each with ...
Secure Communications Using Directional Modulation
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Conference Paper)
Limitations on the wireless communication resources (i.e., time and frequency) introduces the need for another domain that can help communication systems to match the increasing demand on high data transfer rates and quality ...
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...