Secrecy analysis of cognitive radio networks over generalized fading channels

J Sun, Z Bie, H Bie, P He, M Jin - … and Communication Networks, 2020 - Wiley Online Library
… security of 5G-IoT networks. Based on this, we perform a security analysis of cognitive radio
networks (CRN) for IoT, … To analyze the confidentiality of the system under consideration, we …

Secrecy outage and diversity analysis of cognitive radio systems

Y Zou, X Li, YC Liang - IEEE Journal on Selected Areas in …, 2014 - ieeexplore.ieee.org
… On the other hand, we are focused on the secrecy outage probability analysis of cognitive
radio networks in the presence of both the uncoordinated and coordinated eavesdroppers, …

An information secrecy game in cognitive radio networks

Y Wu, KJR Liu - IEEE Transactions on Information Forensics …, 2011 - ieeexplore.ieee.org
… First, primary users are prioritized in a cognitive radio network, because they own the … -theoretic
secrecy in a cognitive radio network. We model and analyze the achievable secrecy for a …

The secrecy analysis over physical layer in NOMA-enabled cognitive radio networks

L Wei, T Jing, X Fan, Y Wen… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
… to analyze the secrecy performance of applying the NOMA protocol in a CRN by considering
a downlink communication scenario. The network … We analyze the overall network secrecy

Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading

H Dang-Ngoc, K Ho-Van, T Do-Dac - Wireless Personal Communications, 2021 - Springer
… This paper proposes SUs who are able to scavenge radio frequency energy in … secrecy
performance indicators of overlay mechanism in radio frequency energy harvesting networks with …

Secrecy analysis for energy harvesting-enabled cognitive radio networks in cascaded fading channels

DH Tashman, W Hamouda - ICC 2021-IEEE International …, 2021 - ieeexplore.ieee.org
Physical-layer security (PLS) for an underlay cognitive radio network (CRN)-based simultaneous
wireless information and power transfer (SWIPT) over cascaded κ-µ fading channels is …

Impact of interference on secrecy capacity in a cognitive radio network

Z Shu, Y Yang, Y Qian, RQ Hu - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
… In this paper we present a secrecy capacity study for a cognitive radio network model. The
… In Section II we describe the cognitive radio network model. In section III, we analyze the …

Secrecy analysis of reconfigurable underlay cognitive radio networks with SWIPT and imperfect CSI

A Thakur, A Kumar, N Gupta… - … Transactions on Network …, 2020 - ieeexplore.ieee.org
… underlay cognitive radio network (CRN) is considered to examine the secrecy performance
… The main objective is to derive the exact, intercept and asymptotic secrecy outage probability …

Energy efficiency analysis of cooperative jamming in cognitive radio networks with secrecy constraints

F Gabry, A Zappone, R Thobaben… - IEEE Wireless …, 2015 - ieeexplore.ieee.org
… user wants to keep its message secret to the primary network; ie, the primary … network
perspective. In this paper we investigate cooperation for secrecy in cognitive radio networks from …

Secrecy capacity of the primary system in a cognitive radio network

VD Nguyen, TM Hoang, OS Shin - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
… have analyzed the ergodic secrecy capacity of the primary system in a cognitive radio network
system on the secrecy capacity of the primary system has been analyzed in two regimes of …