Research Article

Reliability-Security Trade-Off Analysis of Cognitive Radio Networks with Jamming and Licensed Interference

Table 2

Related works where jamming signal and legitimate signal are transmitted by two different users. The characteristic marked with “x” implies that it is considered in the corresponding reference.

ReferenceInterference from LUsMaximum transmit power constraintInterference power constraintThermal noiseReliability-security trade-off analysis

[25]xx
[26]xxx
[27]xxx
[28]xxxx
[29]xxx
[30]x
[31]xx
[32]xxx