Improving physical‐layer security for primary users in cognitive radio networks

D Xu, Q Li - IET Communications, 2017 - Wiley Online Library
In this study, the authors investigate the physical‐layer security in a cognitive radio network
where both the secondary user (SU) and the primary user (PU) are facing security threats …

Minimizing secrecy outage probability for primary users in cognitive radio networks

Q Li, D Xu - AEU-International Journal of Electronics and …, 2018 - Elsevier
This paper considers a cognitive radio network with a set of secondary users (SUs) who
share a spectrum band licensed to a primary user (PU). The PU is assumed to be …

Improving Physical-Layer Security for Cognitive Networks via Artificial Noise-Aided Rate Splitting

P Yan, W Duan, Q Sun, G Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
This letter investigates secrecy performance for cognitive transmissions, where a secondary
user (SU) shares same spectrum with a primary user (PU) simultaneously ensuring the …

Proposed relay selection scheme for physical layer security in cognitive radio networks

H Sakran, M Shokair, O Nasr, S El-Rabaie, AA El-Azm - Iet Communications, 2012 - IET
In this study, the physical layer security for cognitive radio network (CRN) will be
investigated in which a secondary user transmitter (SU-Tx) sends confidential information to …

Joint beamforming and power allocation for secure communication in cognitive radio networks

T Chen, HQ Yuan, TZ Zhao, ZS Zhang… - IET …, 2016 - Wiley Online Library
In this study, secure communication in cognitive radio networks is investigated. A
cooperative jammer is utilised to transmit artificial noise for interfering with the …

On physical layer security for cognitive radio networks with primary user interference

L Sibomana, H Tran… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secondary network physical layer security under the outage
constraint of the primary user (PU) receiver and interference from the PU transmitter to the …

Resource allocation for cognitive radio with primary user secrecy outage constraint

D Xu, Q Li - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
We consider a cognitive radio network where multiple secondary users (SUs) coexist with a
primary user (PU). There exist multiple eavesdroppers (EAVs) who attempt to overhear the …

Enhancing security of primary user in underlay cognitive radio networks with secondary user selection

M Qin, S Yang, H Deng, MH Lee - IEEE Access, 2018 - ieeexplore.ieee.org
This paper investigates the effect of multiuser gain provided by the secondary user selection
on the secrecy performance of the primary users. We first propose a simple scheme where …

Cognitive radio network with secrecy and interference constraints

H Tran, G Kaddoum, F Gagnon, L Sibomana - Physical Communication, 2017 - Elsevier
In this paper, we investigate the physical-layer security of a secure communication in single-
input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two …

Physical layer security of underlay cognitive radio using maximal ratio combining

H Zhao, D Wang, C Tang, Y Liu, G Pan, T Li… - Frontiers of Information …, 2016 - Springer
We investigate the secrecy outage performance of maximal ratio combining (MRC) in
cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output …