K Shim, NT Do, B An, SY Nam - 2016 International Conference …, 2016 - ieeexplore.ieee.org
In this paper, we consider a multi-hop decode-and-forward (DF) relaying transmission in underlay cognitive radio networks. Considering the presence of an eavesdropper that …
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We consider an underlay relay assisted CRN consisting of multiple secondary sources …
NT Do, B An - … Conference on Ubiquitous and Future Networks, 2015 - ieeexplore.ieee.org
In this paper, we study the physical layer security for underlay cognitive radio network in the presence of an eavesdropper that tries to intercept the secondary transmission. Specifically …
In this paper, physical-layer security (PLS) for an underlay cognitive radio network (CRN) over cascaded Rayleigh fading channels is studied. The underlying cognitive radio system …
We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output …
G Pan - International Journal of Electronics and …, 2016 - ijet.ise.pw.edu.pl
In Rician-fading scenario, cognitive radio networks (CRNs) with a source (S) in a secondary system transmitting its confidential information to a legitimate destination (D) in the presence …
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage multitier hierarchical networks. Securing data transmission in these networks is of the utmost …
Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed …
P Zhang, X Zhang, Y Zhang, Y Gao… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
This paper studies the physical layer security in cognitive relay network (CRN) with multiple antennas in the presence of multiple eavesdroppers. Under spectrum sharing scenario and …