Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers

X Hu, X Zhang, H Huang, Y Li - 2016 IEEE 27th Annual …, 2016 - ieeexplore.ieee.org
This paper studies the physical layer security (PLS) in an underlay cognitive radio (CR)
network. Under an interference constraint set by the primary user, we propose a secure …

Protecting cognitive radio networks against poisson distributed eavesdroppers

Y Cai, X Xu, B He, W Yang… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
In this paper, we study secure transmission designs for underlay cognitive radio networks in
the present of randomly distributed eavesdroppers. We consider the scenario where a …

Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise

Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where
the primary users, the secondary users and the eavesdroppers are randomly distributed …

On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels

C Wang, HM Wang - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
This paper studies the secure multiple-antenna transmission in slow fading channels for the
cognitive radio network, where a multiple-input, single-output, multieavesdropper (MISOME) …

On the security of cognitive radio networks

M Elkashlan, L Wang, TQ Duong… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage
multitier hierarchical networks. Securing data transmission in these networks is of the utmost …

Secure communications in underlay cognitive radio networks: User scheduling and performance analysis

L Yang, H Jiang, SA Vorobyov, J Chen… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter investigates secure communications against eavesdropping in an underlay
cognitive radio network. The secondary users do not know the interference level that they …

Secrecy outage probability of inter‐vehicular cognitive radio networks

SÖ Ata, E Erdogan - International Journal of Communication …, 2020 - Wiley Online Library
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary
user wishes to transmit a confidential information to the secondary destination in the …

Secure transmission in cognitive wiretap networks

T Zhang, Y Cai, Y Huang, C Zhong… - 2016 IEEE 83rd …, 2016 - ieeexplore.ieee.org
In this paper, we analyze the secrecy performance of multi-antenna cognitive wiretap
network, where the secondary transmitter (Alice) communicates with the secondary receiver …

Secure multiantenna cognitive wiretap networks

T Zhang, Y Huang, Y Cai, C Zhong… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a multiantenna cognitive wiretap
network, where the secondary transmitter (Alice) communicates with the secondary receiver …

Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels

M Bouabdellah, F El Bouanani… - 2018 International …, 2018 - ieeexplore.ieee.org
Wireless communication systems are vulnerable to eavesdropping attack in which the
attacker overhear the transmitted data in the network. Hence, the physical-layer security is of …