Improving Physical-Layer Security for Cognitive Networks via Artificial Noise-Aided Rate Splitting

P Yan, W Duan, Q Sun, G Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
This letter investigates secrecy performance for cognitive transmissions, where a secondary
user (SU) shares same spectrum with a primary user (PU) simultaneously ensuring the …

Secrecy cognitive gain of cognitive radio sensor networks with primary outage constraint

H Ma, K Niu, W Wu, S Li, G Chu - International Journal of …, 2015 - journals.sagepub.com
This paper studies the physical layer security issue for cognitive radio sensor networks
(CRSNs) with primary outage constraint, for which a tractable framework is developed to …

Opportunistic relay selection improves reliability–reliability tradeoff and security–reliability tradeoff in random cognitive radio networks

X Xu, W Yang, Y Cai - Iet Communications, 2017 - Wiley Online Library
This study investigates the physical‐layer security in random cognitive radio network (CRN)
consisting of randomly distributed primary nodes, secondary nodes, relay nodes and …

The Art of Using Cross-Layer Design in Cognitive Radio Networks

QM Salih, MA Rahman, MZA Bhuiyan… - Security, Privacy, and …, 2017 - Springer
Abstract Cognitive Radio Networks (CRNs) have been obtained a significant focusing due to
the ability of this technology to dissolve the issues of spectrum overcrowding and …

Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints

TX Quach, H Tran, E Uhlemann, MT Truc - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio
Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are …

Probability of secrecy outage in cognitive radio networks over Rician-fading channels

G Pan - International Journal of Electronics and …, 2016 - ijet.ise.pw.edu.pl
In Rician-fading scenario, cognitive radio networks (CRNs) with a source (S) in a secondary
system transmitting its confidential information to a legitimate destination (D) in the presence …

Towards Security Issues and Solutions in Cognitive Radio Networks

S Alrabaee, M Khasawneh, A Agarwal - Handbook of Research on …, 2015 - igi-global.com
Cognitive radio technology is the vision of pervasive wireless communications that improves
the spectrum utilization and offers many social and individual benefits. The objective of the …

Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers

X Hu, X Zhang, H Huang, Y Li - 2016 IEEE 27th Annual …, 2016 - ieeexplore.ieee.org
This paper studies the physical layer security (PLS) in an underlay cognitive radio (CR)
network. Under an interference constraint set by the primary user, we propose a secure …

Secrecy Performance of SWIPT Cognitive Radio Networks with Eavesdropper's Decoding Capability

S Kousar, A Singh - 2024 National Conference on …, 2024 - ieeexplore.ieee.org
The concept of secrecy outage probability is a fundamental aspect used to study the
performance of secrecy in wireless communication networks. While this metric constitutes …

Constructing secured cognitive wireless networks: experiences and challenges

X Zhang, C Li - Wireless Communications and Mobile …, 2010 - Wiley Online Library
Recent development in wireless communications has lead to the problem of growing
spectrum shortage. Cognitive radio, as a novel technology, has been proposed in recent …