Y Cai, X Xu, B He, W Yang… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
In this paper, we study secure transmission designs for underlay cognitive radio networks in the present of randomly distributed eavesdroppers. We consider the scenario where a …
Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed …
C Wang, HM Wang - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
This paper studies the secure multiple-antenna transmission in slow fading channels for the cognitive radio network, where a multiple-input, single-output, multieavesdropper (MISOME) …
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage multitier hierarchical networks. Securing data transmission in these networks is of the utmost …
This letter investigates secure communications against eavesdropping in an underlay cognitive radio network. The secondary users do not know the interference level that they …
SÖ Ata, E Erdogan - International Journal of Communication …, 2020 - Wiley Online Library
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the …
T Zhang, Y Cai, Y Huang, C Zhong… - 2016 IEEE 83rd …, 2016 - ieeexplore.ieee.org
In this paper, we analyze the secrecy performance of multi-antenna cognitive wiretap network, where the secondary transmitter (Alice) communicates with the secondary receiver …
T Zhang, Y Huang, Y Cai, C Zhong… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a multiantenna cognitive wiretap network, where the secondary transmitter (Alice) communicates with the secondary receiver …
Wireless communication systems are vulnerable to eavesdropping attack in which the attacker overhear the transmitted data in the network. Hence, the physical-layer security is of …