Secrecy analysis of cognitive radio networks over generalized fading channels

J Sun, Z Bie, H Bie, P He, M Jin - Security and Communication …, 2020 - Wiley Online Library
At present, the fifth generation (5G) communication networks are in the time of large‐scale
deployment principally because its characteristics consists of large bandwidth, fast …

Physical Layer Security for CRNs over Beaulieu‐Xie Fading Channels

Y Zeng, Y Hua, Y Fang, X Wang - … Communications and Mobile …, 2022 - Wiley Online Library
In recent years, the access of massive communication devices leads to the insufficient
spectrum resources of wireless networks. One of the practical means to resolve the problem …

Secure communications in cognitive underlay networks over Nakagami-m channel

NP Nguyen, TL Thanh, TQ Duong… - Physical Communication, 2017 - Elsevier
In this paper, the secure communication of a cognitive radio network (CRN) over Nakagami-
m fading channel is investigated. An underlay protocol is used in the considered network …

Secrecy Performance Analysis of a Cognitive Network for IoT over kμ Channels

J Li, H Zhao, M Johnson - Wireless Communications and …, 2021 - Wiley Online Library
With the development of Internet of Things (IoTs), devices are now connecting and
communicating together on a heretofore unheard‐of scale, forming huge heterogeneous …

Secrecy performance of SIMO underlay cognitive radio networks over α–μ fading channels

S Yadav, DS Gurjar - IEEE Access, 2021 - ieeexplore.ieee.org
This paper investigates the secrecy performance of a single-input multiple-output (SIMO)
based underlay cognitive radio networks. In particular, a single-antenna secondary …

Secrecy Outage Analysis for SIMO Underlay Cognitive Radio Networks over Generalized- Fading Channels

H Lei, H Zhang, IS Ansari, G Pan… - IEEE Signal Processing …, 2016 - ieeexplore.ieee.org
In this letter, we consider a single-input multiple-output cognitive wiretap system over
generalized-K channels, where the eavesdropper overhears the transmission from the …

On the secrecy analysis of dual-hop SWIPT-based multi-source underlay cognitive radio networks

F El Bouanani, I Lahmar, ZEAA Ismaili… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates the intercept probability (IP) performance for a dual-hop multi-
secondary user (SU) underlay cognitive-radio networks. Whereby, the relay R is self …

Secrecy analysis of underlay CRN in the presence of correlated and imperfect channel

S Thakur, A Singh, S Majhi - IEEE Transactions on Cognitive …, 2023 - ieeexplore.ieee.org
The presence of correlated and imperfect channel state information (CSI) affects the secrecy
performance of cognitive radio networks (CRN). In this paper, we propose a physical layer …

On the secrecy capacity of fading cognitive wireless networks

S Anand, R Chandramouli - 2008 3rd International Conference …, 2008 - ieeexplore.ieee.org
In this paper, we compute the primary exclusive region (PER) and the secrecy capacity at a
primary receiver in a fading cognitive radio network. We consider Rayleigh fading and log …

On physical layer security for cognitive radio networks with primary user interference

L Sibomana, H Tran… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secondary network physical layer security under the outage
constraint of the primary user (PU) receiver and interference from the PU transmitter to the …