We consider a cognitive radio (CR) network consisting of a secondary transmitter (ST), a secondary destination (SD) and multiple secondary relays (SRs) in the presence of an …
In this paper, we propose physical layer security for cooperative cognitive radio networks (CCRNs) with relay selection in the presence of multiple primary users and multiple …
X Xu, W Yang, Y Cai, S Jin - IEEE Journal on selected areas in …, 2016 - ieeexplore.ieee.org
Spectrum efficiency (SE) and energy efficiency (EE) in secure communications have attracted much attention recently due to the fact that future wireless networks need to …
In this study, the physical layer security for cognitive radio network (CRN) will be investigated in which a secondary user transmitter (SU-Tx) sends confidential information to …
J Bang, J Lee, S Kim, D Hong - IEEE Transactions on Wireless …, 2014 - ieeexplore.ieee.org
Cognitive radio networks using relays have been introduced to enhance secondary network performance by having secondary users (SUs) transmit in two hops. This paper develops a …
M Shokair, W Saad, SM Ibraheem - China Communications, 2018 - ieeexplore.ieee.org
In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop …
Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed …
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We consider an underlay relay assisted CRN consisting of multiple secondary sources …
The security in cognitive radio networks (CRNs) has been attracting continuously growing attention, due to the open and dynamic nature of cognitive radio architecture. In this paper …