{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T07:15:09Z","timestamp":1677050109412},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T00:00:00Z","timestamp":1503964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471393"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501507"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Provincial Natural Science Foundation of China","award":["BK20150719"]},{"name":"China Postdoctoral Science Foundation under a Special Financial","award":["2013T60912"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13638-017-0923-2","type":"journal-article","created":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T20:19:42Z","timestamp":1565209182000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On the security of cooperative cognitive radio networks with distributed beamforming"],"prefix":"10.1186","volume":"2017","author":[{"given":"Weifeng","family":"Mou","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0220-4088","authenticated-orcid":false,"given":"Weiwei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yuzhen","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yueming","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Kaihua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,29]]},"reference":[{"issue":"8","key":"923_CR1","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"D Wyner","year":"1975","unstructured":"D Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131367 (1975).","journal-title":"Bell Syst. Tech. J"},{"issue":"9","key":"923_CR2","doi-asserted-by":"publisher","first-page":"3945","DOI":"10.1109\/TIT.2009.2025539","volume":"55","author":"A Jovicic","year":"2009","unstructured":"A Jovicic, P Viswanath, Cognitive radio: an information-theoretic perspective. IEEE Trans. Inf. Theory. 55(9), 3945\u20133958 (2009).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"923_CR3","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.1109\/SURV.2014.021414.00066","volume":"16","author":"X Chen","year":"2014","unstructured":"X Chen, H-H Chen, W Meng, Cooperative communication for cognitive radio networks\u2014from theory to application. IEEE Commun. Surv. Tutor. 16(3), 1180\u20131192 (2014).","journal-title":"IEEE Commun. Surv. Tutor"},{"issue":"3","key":"923_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MNET.2013.6523805","volume":"27","author":"Z Shu","year":"2013","unstructured":"Z Shu, Y Qian, S Ci, On physical layer security for cognitive radio networks. IEEE Netw. 27(3), 28\u201333 (2013).","journal-title":"IEEE Netw"},{"issue":"6","key":"923_CR5","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/LWC.2014.2350501","volume":"3","author":"C Tang","year":"2014","unstructured":"C Tang, G Pan, T Li, Secrecy outage analysis of underlay cognitive radio unit over Nakagami-m fading channels. IEEE Wirel. Commun. Lett. 3(6), 609\u2013612 (2014).","journal-title":"IEEE Wirel. Commun. Lett"},{"issue":"4","key":"923_CR6","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/TWC.2010.04.090746","volume":"9","author":"Y Pei","year":"2010","unstructured":"Y Pei, Y-C Liang, L Zhang, KC Teh, KH Li, Secure communication over MISO cognitive radio channels. IEEE Trans. Wirel. Commun. 9(4), 1494\u20131502 (2010).","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"11","key":"923_CR7","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/JSAC.2014.141121","volume":"32","author":"Y Zou","year":"2014","unstructured":"Y Zou, X Li, Y-C Liang, Secrecy outage and diversity analysis of cognitive radio systems. IEEE J. Sel. Areas Commun. 32(11), 2222\u20132236 (2014).","journal-title":"IEEE J. Sel. Areas Commun"},{"issue":"8","key":"923_CR8","doi-asserted-by":"publisher","first-page":"3790","DOI":"10.1109\/TVT.2014.2358624","volume":"64","author":"M Elkashlan","year":"2015","unstructured":"M Elkashlan, L Wang, TQ Duong, GK Karagiannidis, A Nallanathan, On the security of cognitive radio networks. IEEE Trans. Veh. Techol. 64(8), 3790\u20133795 (2015).","journal-title":"IEEE Trans. Veh. Techol"},{"issue":"12","key":"923_CR9","doi-asserted-by":"publisher","first-page":"10126","DOI":"10.1109\/TVT.2016.2536801","volume":"65","author":"H Lei","year":"2016","unstructured":"H Lei, H Zhang, IS Ansari, C Gao, Y Guo, G Pan, KA Qaraqe, Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-m channels. IEEE Trans. Veh. Techol. 65(12), 10126\u201310132 (2016).","journal-title":"IEEE Trans. Veh. Techol"},{"issue":"12","key":"923_CR10","doi-asserted-by":"publisher","first-page":"10236","DOI":"10.1109\/TVT.2016.2529704","volume":"65","author":"H Zhao","year":"2016","unstructured":"H Zhao, Y Tan, G Pan, Y Chen, N Yang, Secrecy outage on transmit antenna selection\/maximal ratio combining in MIMO cognitive radio networks. IEEE Trans. Veh. Techol. 65(12), 10236\u201310242 (2016).","journal-title":"IEEE Trans. Veh. Techol"},{"issue":"9","key":"923_CR11","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCOM.2015.7263345","volume":"53","author":"Y Zou","year":"2015","unstructured":"Y Zou, J Zhu, L Yang, Y-C Liang, Y-D Yao, Securing physical layer communications for cognitive radio networks. IEEE Commun. Mag. 53(9), 48\u201354 (2015).","journal-title":"IEEE Commun. Mag"},{"key":"923_CR12","volume-title":"IEEE WCNC 2014","author":"W Yang","year":"2014","unstructured":"W Yang, X Xu, Y Cai, in IEEE WCNC 2014. Secrecy outage analysis for DF underlay CRNs with outdate CSI (Wireless Communications and Networking Conference (WCNC), 2014 IEEEIstanbul, 2014)."},{"issue":"1","key":"923_CR13","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/LWC.2014.2365808","volume":"4","author":"Y Liu","year":"2015","unstructured":"Y Liu, L Wang, TT Duy, M Elkashlan, TQ Duong, Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 4(1), 46\u201349 (2015).","journal-title":"IEEE Wirel. Commun. Lett"},{"issue":"1","key":"923_CR14","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TCOMM.2014.2377239","volume":"63","author":"Y Zou","year":"2015","unstructured":"Y Zou, B Champagne, W-P Zhu, L Hanzo, Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans. Commun.63(1), 215\u2013228 (2015).","journal-title":"IEEE Trans. Commun."},{"key":"923_CR15","first-page":"1","volume":"2014","author":"Q Gu","year":"2015","unstructured":"Q Gu, G Wang, L Gao, M Peng, Security-reliability performance of cognitive AF relay-based wireless communication system with channel estimation error. EURASIP J. Adv. Signal Process. 2014:, 1\u201311 (2015).","journal-title":"EURASIP J. Adv. Signal Process"},{"key":"923_CR16","volume-title":"WOCC 2016","author":"W Yang","year":"2016","unstructured":"W Yang, K Wang, X Xu, J Zhou, in WOCC 2016. Secure transmission for AF relaying spectrum-sharing systems with collaborative distributed beamforming (Wireless and Optical Communication Conference (WOCC), 2016 25thChengdu, 2016)."},{"issue":"3","key":"923_CR17","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1109\/TCOMM.2014.032014.130399","volume":"62","author":"A Afana","year":"2014","unstructured":"A Afana, V Asghari, A Ghrayeb, S Affes, On the performance of cooperative relaying spectrum-sharing system with collaborative distributed beamforming. IEEE Trans. Commun. 62(3), 857\u2013871 (2014).","journal-title":"IEEE Trans. Commun"},{"key":"923_CR18","unstructured":"RJ Pavur, Quadratic forms involving the complex Gaussian. M.Sc. dissertation, Math. Dept., Texas Tech Univ.Lubbock, TX, (1980)."},{"key":"923_CR19","volume-title":"Table of integrals, series, and products","author":"IS Gradshteyn","year":"2000","unstructured":"IS Gradshteyn, IM Ryzhik, Table of integrals, series, and products, sixth ed (Academic Press, London, 2000)."},{"issue":"15","key":"923_CR20","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1049\/iet-com.2009.0634","volume":"4","author":"I Krikidis","year":"2010","unstructured":"I Krikidis, Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun. 4(15), 1787\u20131791 (2010).","journal-title":"IET Commun"},{"issue":"2","key":"923_CR21","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/WCL.2013.113013.130653","volume":"3","author":"A Behnad","year":"2014","unstructured":"A Behnad, X Wang, Accuracy of harmonic mean approximation in performance analysis of multihop amplify-and-forward relaying. IEEE Wirel. Commun. Lett. 3(2), 125\u2013128 (2014).","journal-title":"IEEE Wirel. Commun. Lett"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-017-0923-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-017-0923-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-017-0923-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,22]],"date-time":"2019-09-22T16:46:17Z","timestamp":1569170777000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-017-0923-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,29]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["923"],"URL":"https:\/\/doi.org\/10.1186\/s13638-017-0923-2","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,29]]},"assertion":[{"value":"10 October 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"144"}}