{"id":"https://openalex.org/W2511771585","doi":"https://doi.org/10.1109/jstsp.2016.2600514","title":"A Collaboration Incentive Exploiting the Primary-Secondary Systems\u2019 Cross Interference for PHY Security Enhancement","display_name":"A Collaboration Incentive Exploiting the Primary-Secondary Systems\u2019 Cross Interference for PHY Security Enhancement","publication_year":2016,"publication_date":"2016-08-16","ids":{"openalex":"https://openalex.org/W2511771585","doi":"https://doi.org/10.1109/jstsp.2016.2600514","mag":"2511771585"},"language":"en","primary_location":{"id":"doi:10.1109/jstsp.2016.2600514","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jstsp.2016.2600514","pdf_url":null,"source":{"id":"https://openalex.org/S42167783","display_name":"IEEE Journal of Selected Topics in Signal Processing","issn_l":"1932-4553","issn":["1932-4553","1941-0484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal of Selected Topics in Signal Processing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048965981","display_name":"Kamel Tourki","orcid":"https://orcid.org/0000-0002-1859-3460"},"institutions":[{"id":"https://openalex.org/I4210123571","display_name":"Huawei Technologies (France)","ror":"https://ror.org/02rbzf697","country_code":"FR","type":"company","lineage":["https://openalex.org/I2250955327","https://openalex.org/I4210123571"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Kamel Tourki","raw_affiliation_strings":["Huawei Technologies France, Boulogne-Billancourt, France"],"affiliations":[{"raw_affiliation_string":"Huawei Technologies France, Boulogne-Billancourt, France","institution_ids":["https://openalex.org/I4210123571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062167084","display_name":"Mazen O. Hasna","orcid":"https://orcid.org/0000-0002-3088-6899"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mazen O. Hasna","raw_affiliation_strings":["Department of Electrical Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048965981"],"corresponding_institution_ids":["https://openalex.org/I4210123571"],"apc_list":null,"apc_paid":null,"fwci":1.4914,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.84292085,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"10","issue":"8","first_page":"1346","last_page":"1358"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7195432186126709},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6972752809524536},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6902390718460083},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6368945240974426},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.6041197776794434},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5134187936782837},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5010128021240234},{"id":"https://openalex.org/keywords/phy","display_name":"PHY","score":0.4898512065410614},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.4834328889846802},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.4831949770450592},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4161391258239746},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.40941908955574036},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.33284664154052734},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2524995803833008},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16033485531806946},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.10012015700340271}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7195432186126709},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6972752809524536},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6902390718460083},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6368945240974426},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.6041197776794434},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5134187936782837},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5010128021240234},{"id":"https://openalex.org/C41918916","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"PHY","level":4,"score":0.4898512065410614},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.4834328889846802},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.4831949770450592},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4161391258239746},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.40941908955574036},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.33284664154052734},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2524995803833008},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16033485531806946},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.10012015700340271},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jstsp.2016.2600514","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jstsp.2016.2600514","pdf_url":null,"source":{"id":"https://openalex.org/S42167783","display_name":"IEEE Journal of Selected Topics in Signal Processing","issn_l":"1932-4553","issn":["1932-4553","1941-0484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal of Selected Topics in Signal Processing","raw_type":"journal-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/5148","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/5148","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1568096262","https://openalex.org/W1967040861","https://openalex.org/W1967516555","https://openalex.org/W1968049174","https://openalex.org/W1970578484","https://openalex.org/W1972485395","https://openalex.org/W1973857490","https://openalex.org/W1977283868","https://openalex.org/W1989821035","https://openalex.org/W2003764872","https://openalex.org/W2010412759","https://openalex.org/W2014832495","https://openalex.org/W2016807091","https://openalex.org/W2028354208","https://openalex.org/W2038279219","https://openalex.org/W2043769961","https://openalex.org/W2045570050","https://openalex.org/W2054759283","https://openalex.org/W2056923645","https://openalex.org/W2059437848","https://openalex.org/W2062099380","https://openalex.org/W2078100021","https://openalex.org/W2093554016","https://openalex.org/W2110822293","https://openalex.org/W2133108373","https://openalex.org/W2136876942","https://openalex.org/W2156759922","https://openalex.org/W2240195223","https://openalex.org/W2280945522","https://openalex.org/W2330857137","https://openalex.org/W3102431592","https://openalex.org/W3103417192","https://openalex.org/W4300223101"],"related_works":["https://openalex.org/W2994999158","https://openalex.org/W4360996312","https://openalex.org/W2945523224","https://openalex.org/W4313639042","https://openalex.org/W2529506699","https://openalex.org/W2444418218","https://openalex.org/W4241709719","https://openalex.org/W2727597159","https://openalex.org/W2514934301","https://openalex.org/W2111773294"],"abstract_inverted_index":{"We":[0,49,156],"investigate":[1],"the":[2,11,26,33,56,68,75,78,91,103,106,110,114,122,126,142,168,181,199,204,214,225,230],"spectrum":[3,76],"sharing":[4],"possibility":[5],"as":[6,45,62,83,87],"an":[7,190],"incentive":[8],"to":[9,44,66,73,82,94,136,152,178,185,197,224],"enhance":[10],"physical":[12],"layer":[13],"security.":[14],"The":[15],"concept":[16],"behind":[17],"is":[18,162,174,193],"that":[19,158,180,213],"a":[20,29,52,63,88,159,163,171,175,186],"legitimate":[21,79],"source-destination":[22,37],"pair,":[23,80],"communicating":[24],"in":[25],"presence":[27],"of":[28,35,77,105,116,125,227],"passive":[30],"eavesdropper,":[31],"stimulates":[32],"help":[34],"another":[36],"nodes":[38],"looking":[39],"for":[40,131,166,203,238],"transmission":[41],"opportunities,":[42],"referred":[43,81],"secondary":[46,57],"network":[47,85],"(SN).":[48],"thus":[50,101],"propose":[51],"cooperative":[53,118,133],"scheme,":[54,119],"whereby":[55],"transmitter":[58],"(ST)":[59],"will":[60],"act":[61],"friendly":[64],"jammer":[65],"confound":[67],"eavesdropper":[69],"and":[70,100,147,241],"be":[71],"granted":[72],"share":[74],"primary":[84,215,231],"(PN),":[86],"reward.":[89],"Meanwhile,":[90],"ST":[92],"has":[93,210],"secure":[95],"its":[96,138,154,218],"own":[97],"secrecy":[98,127,201,220],"communication":[99],"exploit":[102],"impact":[104],"induced":[107],"interference":[108],"by":[109],"PN.":[111],"To":[112],"evaluate":[113],"performance":[115],"our":[117],"we":[120,140,148],"derive":[121,153,198],"closed-form":[123],"expressions":[124],"outage":[128,144],"probability":[129,145],"(SOP)":[130],"both":[132],"networks.":[134],"However,":[135],"assess":[137],"usefulness,":[139],"introduce":[141],"mutual":[143],"(MOP)":[146],"carry":[149],"out":[150,196],"analysis":[151,192],"expression.":[155],"show":[157],"satisfactory":[160,172],"SOP":[161],"necessary":[164],"condition":[165,177],"triggering":[167],"cooperation,":[169],"whereas":[170],"MOP":[173],"sufficient":[176],"guarantee":[179],"PN-SN":[182],"collaboration":[183],"leads":[184],"win-win":[187],"situation.":[188],"Furthermore,":[189],"asymptotic":[191],"also":[194],"carried":[195],"generalized":[200],"diversity":[202,221],"scheme":[205],"under":[206],"investigation,":[207],"where":[208],"it":[209],"been":[211],"shown":[212],"system":[216],"achieves":[217],"full":[219],"order,":[222],"equal":[223],"number":[226],"antenna":[228],"at":[229],"transmitter.":[232],"Such":[233],"results":[234],"present":[235],"useful":[236],"insights":[237],"practical":[239],"design":[240],"setups.":[242]},"counts_by_year":[{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
