Intercept probability of underlay uplink CRNs with multi-eavesdroppers

M Bouabdellah, F El Bouanani… - 2019 IEEE 30th …, 2019 - ieeexplore.ieee.org
The present contribution investigates the physical layer security in a cognitive radio network
(CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary …

On the secrecy analysis of dual-hop underlay multi-source CRNs with multi-eavesdroppers and a multi-antenna destination

M Bouabdellah, F El Bouanani… - 2019 International …, 2019 - ieeexplore.ieee.org
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated.
We consider an underlay relay assisted CRN consisting of multiple secondary sources …

A PHY layer security analysis of uplink cooperative jamming-based underlay CRNs with multi-eavesdroppers

M Bouabdellah, F El Bouanani… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, the physical layer security of a dual-hop underlay uplink cognitive radio
network is investigated over Nakagami-m fading channels. Specifically, multiple secondary …

Towards secure and energy-efficient CRNs via embracing interference: A stochastic geometry approach

X Liu, K Zheng, XY Liu, X Wang, G Dai - IEEE Access, 2018 - ieeexplore.ieee.org
In a cognitive radio network (CRN), the interference caused by secondary users (SUs) is
conventionally regarded as an obstacle to the throughput of the primary network. However …

Physical-Layer Security in Cognitive Radio Networks

D Tashman - 2022 - spectrum.library.concordia.ca
The fifth-generation (5G) communications and beyond are expected to serve a huge number
of devices and services. However, due to the fixed spectrum allocation policies, the need for …

Physical Layer Security in Underlay Cognitive Radio Networks Over Fading Channels

S Yadav, DS Gurjar - 2020 IEEE Latin-American Conference on …, 2020 - ieeexplore.ieee.org
This paper investigates physical layer security of underlay cognitive radio networks with
interference constraint over α-μ fading channels. Specifically, in the secondary network, a …

Physical-layer security for cognitive radio networks over cascaded Rayleigh fading channels

DH Tashman, W Hamouda - GLOBECOM 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In this paper, physical-layer security (PLS) for an underlay cognitive radio network (CRN)
over cascaded Rayleigh fading channels is studied. The underlying cognitive radio system …

Proactive eavesdropping via jamming in cognitive radio networks

P Li, H Zhang, W Wu, H Dai… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
This paper considers a proactive eavesdropping problem, in which a full-duplex legitimate
monitor aims to eavesdrop on a suspicious communication link between the secondary pairs …

On physical layer security for cognitive radio networks with primary user interference

L Sibomana, H Tran… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secondary network physical layer security under the outage
constraint of the primary user (PU) receiver and interference from the PU transmitter to the …

Aided opportunistic jammer selection for secrecy improvement in underlay cognitive radio networks

P Xie, J Zhu, M Zhang, L Xing, G Zhang… - Wireless Personal …, 2019 - Springer
In this paper, we consider the physical-layer security for the primary system in an underlay
cognitive radio model which comprises of a primary source–destination pair, a secondary …