This paper investigates the secrecy performance of a single-input multiple-output (SIMO) based underlay cognitive radio networks. In particular, a single-antenna secondary …
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized-K channels, where the eavesdropper overhears the transmission from the …
Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed …
In this paper, we consider multiple-input single-output multi-eavesdropper cognitive radio networks (MISOME-CRNs), where a secondary user (SU) aims to transmit confidential …
T Zhang, Y Huang, Y Cai, C Zhong… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a multiantenna cognitive wiretap network, where the secondary transmitter (Alice) communicates with the secondary receiver …
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage multitier hierarchical networks. Securing data transmission in these networks is of the utmost …
T Zhang, Y Cai, Y Huang, TQ Duong, W Yang - IEEE Access, 2016 - ieeexplore.ieee.org
In this paper, we introduce transmit antenna selection/maximal-ratio combining (TAS/MRC) scheme in dual-hop randomize-and-forward (RaF) cognitive multiple-input multiple-output …
S Thakur, A Singh - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
This work explores the physical layer security of an underlay cognitive radio network (CRN) in the presence of a powerful interferer called a primary transmitter (PT) under peak …
Y Pei, YC Liang, L Zhang, KC Teh… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In this paper, we address the physical-layer security issue of a secondary user (SU) in a spectrum-sharing cognitive radio network (CRN) from an information-theoretic perspective …