{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T04:27:38Z","timestamp":1648528058256},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T00:00:00Z","timestamp":1544572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11036-018-1185-x","type":"journal-article","created":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T11:29:39Z","timestamp":1544614179000},"page":"4-15","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter"],"prefix":"10.1007","volume":"25","author":[{"given":"Khuong","family":"Ho-Van","sequence":"first","affiliation":[]},{"given":"Thiem","family":"Do-Dac","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,12]]},"reference":[{"issue":"2","key":"1185_CR1","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.phycom.2015.10.006","volume":"18","author":"N Panwar","year":"2016","unstructured":"Panwar N, Sharma S, Singh AK (2016) A survey on 5G: the next generation of mobile communication. Elsevier Physical Communication 18(2):64\u201384","journal-title":"Elsevier Physical Communication"},{"issue":"1","key":"1185_CR2","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/LCOMM.2016.2613858","volume":"21","author":"M Tavana","year":"2017","unstructured":"Tavana M, Rahmati A, Shah-Mansouri V, Maham B (2017) Cooperative sensing with joint energy and correlation detection in cognitive radio networks. IEEE Commun Lett 21(1):132\u2013135","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"1185_CR3","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/JCN.2016.000044","volume":"18","author":"K Ho-Van","year":"2016","unstructured":"Ho-Van K (2016) Exact outage probability analysis of proactive relay selection in cognitive radio networks with MRC receivers. IEEE\/KICS Journal of Communications and Networks 18(3):288\u2013298","journal-title":"IEEE\/KICS Journal of Communications and Networks"},{"issue":"8","key":"1185_CR4","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1109\/JSEN.2017.2674181","volume":"17","author":"D Darsena","year":"2017","unstructured":"Darsena D, Gelli G, Verde F (2017) An opportunistic spectrum access scheme for multicarrier cognitive sensor networks. IEEE Sensors J 17(8):2596\u20132606","journal-title":"IEEE Sensors J"},{"issue":"1","key":"1185_CR5","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/COMST.2016.2598968","volume":"19","author":"Y Liu","year":"2017","unstructured":"Liu Y, Chen H, Wang L (2017) Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutorials 19(1):347\u2013376. First Quarter","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"2","key":"1185_CR6","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1109\/COMST.2014.2380998","volume":"17","author":"R Sharma","year":"2015","unstructured":"Sharma R, Rawat D (2015) Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun Surv Tutorials 17(2):1023\u20131043","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"3","key":"1185_CR7","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"Z Gan","year":"2011","unstructured":"Gan Z, Li-Chia C, Kai-Kit W (2011) Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans Sig Processing 59(3):1317\u20131322","journal-title":"IEEE Trans Sig Processing"},{"key":"1185_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MNET.2013.6523805","volume":"27","author":"S Zhihui","year":"2013","unstructured":"Zhihui S, Yi Q, Song C (2013) On physical layer security for cognitive radio networks. IEEE Netw 27:28\u201333","journal-title":"IEEE Netw"},{"key":"1185_CR9","first-page":"48","volume":"53","author":"Z Yulong","year":"2015","unstructured":"Yulong Z, Jia Z, Liuqing Y, Ying-chang L, Yu-dong Y (2015) Securing physical-layer communications for cognitive radio networks. IEEE Commun Mag 53:48\u201354","journal-title":"IEEE Commun Mag"},{"key":"1185_CR10","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/CC.2015.7084371","volume":"12","author":"J Li","year":"2015","unstructured":"Li J, Feng Z, Feng Z, Zhang P (2015) A survey of security issues in cognitive radio networks. China Communications 12:132\u2013 150","journal-title":"China Communications"},{"issue":"10","key":"1185_CR11","doi-asserted-by":"publisher","first-page":"8812","DOI":"10.1109\/TVT.2015.2513003","volume":"65","author":"TX Zheng","year":"2016","unstructured":"Zheng TX, Wang HM (2016) Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers. IEEE Trans Veh Tech 65(10):8812\u20138817","journal-title":"IEEE Trans Veh Tech"},{"issue":"1","key":"1185_CR12","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TWC.2016.2621040","volume":"16","author":"J Hu","year":"2017","unstructured":"Hu J, Cai Y, Yang N, Zhou X, Yang W (2017) Artificial-noise-aided secure transmission scheme with limited training and feedback overhead. IEEE Trans Wire Commun 16(1):193\u2013205","journal-title":"IEEE Trans Wire Commun"},{"issue":"11","key":"1185_CR13","doi-asserted-by":"publisher","first-page":"1814","DOI":"10.1109\/TIFS.2014.2356339","volume":"9","author":"C Wang","year":"2014","unstructured":"Wang C, Wang HM (2014) On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans Inf Forensics Secur 9(11):1814\u20131827","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"1185_CR14","doi-asserted-by":"publisher","first-page":"1700","DOI":"10.1016\/j.aeue.2015.08.004","volume":"69","author":"K Ho-Van","year":"2015","unstructured":"Ho-Van K (2015) Outage analysis in cooperative cognitive networks with opportunistic relay selection under imperfect channel information. Int J Electron Commun 69(11):1700\u20131708","journal-title":"Int J Electron Commun"},{"key":"1185_CR15","doi-asserted-by":"crossref","unstructured":"Wang D, Ren P, Du Q, Sun L, Wang Y (2016) Cooperative relaying and jamming for primary secure communication in cognitive two-way networks. In: Proceedings of IEEE VTC. Nanjing, China, pp 1\u20135","DOI":"10.1109\/VTCSpring.2016.7504177"},{"issue":"9","key":"1185_CR16","doi-asserted-by":"publisher","first-page":"1632","DOI":"10.1109\/LCOMM.2015.2449315","volume":"19","author":"B Fang","year":"2015","unstructured":"Fang B, Qian Z, Zhong W, Shao W (2015) AN-Aided secrecy precoding for SWIPT in cognitive MIMO broadcast channels. IEEE Commun Lett 19(9):1632\u20131635","journal-title":"IEEE Commun Lett"},{"issue":"11","key":"1185_CR17","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1109\/TIFS.2016.2594131","volume":"11","author":"VD Nguyen","year":"2016","unstructured":"Nguyen VD, Duong TQ, Dobre OA, Shin OS (2016) Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans Inf Forensics Secur 11(11):2609\u20132623","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"1185_CR18","doi-asserted-by":"publisher","first-page":"6753","DOI":"10.1109\/TVT.2015.2477305","volume":"65","author":"B Fang","year":"2016","unstructured":"Fang B, Qian Z, Shao W, Zhong W (2016) Precoding and artificial noise design for cognitive MIMOME wiretap channels. IEEE Trans Veh Tech 65(8):6753\u20136758","journal-title":"IEEE Trans Veh Tech"},{"key":"1185_CR19","doi-asserted-by":"crossref","unstructured":"Wu Y, Chen X, Chen X (2015) Secure beamforming for cognitive radio networks with artificial noise. In: Proceedings of IEEE WCSP. Nanjing, China, pp 1\u20135","DOI":"10.1109\/WCSP.2015.7341139"},{"key":"1185_CR20","doi-asserted-by":"crossref","unstructured":"Hu X, Zhang X, Huang H, Li Y (2016) Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers. In: Proceedings of IEEE PIMRC. Valencia, Spain, pp 1\u20136","DOI":"10.1109\/PIMRC.2016.7794918"},{"issue":"15","key":"1185_CR21","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1049\/iet-com.2016.0117","volume":"10","author":"Y Cai","year":"2016","unstructured":"Cai Y, Xu X, Yang W (2016) Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise. IET Commun. 10(15):1904\u20131913","journal-title":"IET Commun."},{"key":"1185_CR22","unstructured":"Li Z, Jing T, Cheng X, Huo Y, Zhou W, Chen D (2015) Cooperative jamming for secure communications in MIMO cooperative cgnitive radio networks. In: Proceedings of IEEE ICC. London, UK, pp 7609\u20137614"},{"key":"1185_CR23","doi-asserted-by":"crossref","unstructured":"Liu W, Guo L, Kang T, Zhang J, Lin J (2015) Secure cognitive radio system with cooperative secondary networks. In: Proceedings IEEE ICT. Sydney, Australia, pp 6\u201310","DOI":"10.1109\/ICT.2015.7124648"},{"key":"1185_CR24","doi-asserted-by":"crossref","unstructured":"He T, Chen H, Liu Q (2013) Qos-based beamforming with cooperative jamming in cognitive radio networks. In: Proceedings of ICCCAS. Chengdu, China, pp 42\u201345","DOI":"10.1109\/ICCCAS.2013.6765282"},{"key":"1185_CR25","doi-asserted-by":"crossref","unstructured":"Liu W, Sarkar MZI, Ratnarajah T (2014) On the security of cognitive radio networks: cooperative jamming with relay selection. In: Proceedings of EUCNC. Bologna, Italy, pp 1\u20135","DOI":"10.1109\/EuCNC.2014.6882674"},{"issue":"1","key":"1185_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-com.2016.0114","volume":"11","author":"W Liu","year":"2017","unstructured":"Liu W, Sarkar MZI, Ratnarajah T, Du H (2017) Securing cognitive radio with a combined approach of beamforming and cooperative jamming. IET Commun 11(1):1\u20139","journal-title":"IET Commun"},{"issue":"2","key":"1185_CR27","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TWC.2016.2645200","volume":"16","author":"Y Zou","year":"2017","unstructured":"Zou Y (2017) Physical-layer security for spectrum sharing systems. IEEE Trans Wire Commun 16(2):1319\u20131329","journal-title":"IEEE Trans Wire Commun"},{"issue":"1","key":"1185_CR28","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/LWC.2014.2365808","volume":"4","author":"Y Liu","year":"2015","unstructured":"Liu Y, Wang L, Duy TT, Elkashlan M, Duong TQ (2015) Relay selection for security enhancement in cognitive relay networks. IEEE Wire Commun Lett 4(1):46\u201349","journal-title":"IEEE Wire Commun Lett"},{"issue":"10","key":"1185_CR29","doi-asserted-by":"publisher","first-page":"9555","DOI":"10.1109\/TVT.2017.2698162","volume":"66","author":"P Chakraborty","year":"2017","unstructured":"Chakraborty P, Prakriya S (2017) Secrecy performance of an idle receiver assisted underlay secondary network. IEEE Trans Veh Tech 66(10):9555\u20139560","journal-title":"IEEE Trans Veh Tech"},{"issue":"1","key":"1185_CR30","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/JCN.2014.000004","volume":"16","author":"K Ho-Van","year":"2014","unstructured":"Ho-Van K, Sofotasios PC, Freear S (2014) Underlay cooperative cognitive networks with imperfect Nakagami-m fading channel information and strict transmit power constraint: interference statistics and outage probability analysis. IEEE\/KICS Journal of Communications and Networks 16(1):10\u201317","journal-title":"IEEE\/KICS Journal of Communications and Networks"},{"issue":"6","key":"1185_CR31","doi-asserted-by":"publisher","first-page":"2619","DOI":"10.1109\/18.720551","volume":"44","author":"E Biglieri","year":"1998","unstructured":"Biglieri E, Proakis J, Shamai S (1998) Fading channels: information-theoretic and communications aspects. IEEE Trans Inf Theory 44(6):2619\u20132692","journal-title":"IEEE Trans Inf Theory"},{"issue":"8","key":"1185_CR32","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner AD (1975) The wire-tap channel. Bell Syst Tech Journ 54(8):1355\u20131387","journal-title":"Bell Syst Tech Journ"},{"key":"1185_CR33","volume-title":"Table of integrals, series and products","author":"IS Gradshteyn","year":"2000","unstructured":"Gradshteyn IS, Ryzhik IM (2000) Table of integrals, series and products, 6th edn. Academic, San Diego","edition":"6th edn."},{"issue":"12","key":"1185_CR34","doi-asserted-by":"publisher","first-page":"5103","DOI":"10.1109\/TCOMM.2013.111213.130235","volume":"61","author":"Y Zou","year":"2013","unstructured":"Zou Y, Wang X, Shen W (2013) Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans Commun 61(12):5103\u20135113","journal-title":"IEEE Trans Commun"},{"key":"1185_CR35","doi-asserted-by":"crossref","unstructured":"Ahmed N, Khojastepour M, Aazhang B (2004) Outage minimization and optimal power control for the fading relay channel. In: Proceedings of IEEE information theory workshop. San Antonio, pp 458\u2013462","DOI":"10.1109\/ITW.2004.1405347"},{"key":"1185_CR36","volume-title":"Numerical recipes in C: the art of scientific computing","author":"WH Press","year":"1992","unstructured":"Press WH, Teukolsky SA, Vetterling WT, Flannery BP (1992) Numerical recipes in C: the art of scientific computing, 2nd edn. Cambridge University Press, Cambridge","edition":"2nd edn."}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1185-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1185-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1185-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,15]],"date-time":"2020-02-15T17:22:03Z","timestamp":1581787323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1185-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,12]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1185"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1185-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,12]]},"assertion":[{"value":"12 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}