• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Jiaxin, Wu Jigang, Chen Long, Sui Xiufeng. Secrecy Capacity Optimization Technique for Energy Harvest Cooperative Cognitive Radio Network[J]. Journal of Computer Research and Development, 2019, 56(3): 533-543. DOI: 10.7544/issn1000-1239.2019.20170838
Citation: Wu Jiaxin, Wu Jigang, Chen Long, Sui Xiufeng. Secrecy Capacity Optimization Technique for Energy Harvest Cooperative Cognitive Radio Network[J]. Journal of Computer Research and Development, 2019, 56(3): 533-543. DOI: 10.7544/issn1000-1239.2019.20170838

Secrecy Capacity Optimization Technique for Energy Harvest Cooperative Cognitive Radio Network

More Information
  • Published Date: February 28, 2019
  • In order to maximize the primary secrecy rate, we researched the channel resource allocation of the primary user (PU) and the secondary user (SU) in the energy harvesting cognitive radio (EHCR) which is based on the cooperative communication and energy harvesting technology. In this network, the SU, which can harvest energy from the ambient, will assist the PU with cooperative communication. As a reward, the SU can get the opportunity to access the PU’s spectrum resource when the cooperative communication is over. Given the QoS demand of SU transmission node, we design a computing method of maximizing the primary secrecy rate. Numerical results demonstrate that the secrecy capacity is inverse proportional to the energy harvesting ratio, and it is also direct proportional to the cooperative communication ratio. We also figure out that the secrecy capacity is achievable. In the end, we assume that the SU works at a constant low sending power, when the cooperative communication ratio changes from 0.2 to 0.5, our research is lifting 79.28%, 80.46%, 64.23%, 78.85% on average, respectively, on the maximization of the secrecy rate, in comparison to the existing strategy. Moreover, the proposed algorithm is about 7.34 times efficient than the existing algorithms averagely.
  • Related Articles

    [1]Su Ning, Guo Junxia, Li Zheng, Zhao Ruilian. EFSM Amorphous Slicing Based Test Case Generation[J]. Journal of Computer Research and Development, 2017, 54(3): 669-680. DOI: 10.7544/issn1000-1239.2017.20151053
    [2]You Feng, Zhao Ruilian, Lü Shanshan. Output Domain Based Automatic Test Case Generation[J]. Journal of Computer Research and Development, 2016, 53(3): 541-549. DOI: 10.7544/issn1000-1239.2016.20148045
    [3]Liu Tieqiao, Kuang Jishun, Cai Shuo, You Zhiqiang. A New Method of Embedding Test Patterns into Test-per-Clock Bit Stream[J]. Journal of Computer Research and Development, 2014, 51(9): 2022-2029. DOI: 10.7544/issn1000-1239.2014.20130179
    [4]Chen Donghuo, Liu Quan. Generation of Test Cases Based on Symbolic Execution and LTL Formula Rewriting[J]. Journal of Computer Research and Development, 2013, 50(12): 2661-2675.
    [5]He Yanxiang, Chen Yong, Wu Wei, Xu Chao, and Wu Libing. Automatically Generating Error-Traceable Test Cases Based on Compiler[J]. Journal of Computer Research and Development, 2012, 49(9): 1843-1851.
    [6]Yan Jun, Guo Tao, Ruan Hui, Xuan Jifeng. JUTA: An Automated Unit Testing Framework for Java[J]. Journal of Computer Research and Development, 2010, 47(10): 1840-1848.
    [7]Zhang Min, Feng Dengguo, and Chen Chi. A Security Function Test Suite Generation Method Based on Security Policy Model[J]. Journal of Computer Research and Development, 2009, 46(10): 1686-1692.
    [8]Tao Qiuming, Zhao Chen, Wang Yongji. An Automated Method of Test Program Generation for Compiler Optimizations Based on Process Graph[J]. Journal of Computer Research and Development, 2009, 46(9): 1567-1577.
    [9]Chen Jinfu, Lu Yansheng, and Xie Xiaodong. A Fault Injection Model of Component Security Testing[J]. Journal of Computer Research and Development, 2009, 46(7): 1127-1135.
    [10]Yuan Jiesong, Wang Linzhang, Li Xuandong, and Zheng Guoliang. UMLTGF: A Tool for Generating Test Cases from UML Activity Diagrams Based on Grey-Box Method[J]. Journal of Computer Research and Development, 2006, 43(1): 46-53.

Catalog

    Article views (911) PDF downloads (169) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return