On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels

C Wang, HM Wang - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
This paper studies the secure multiple-antenna transmission in slow fading channels for the
cognitive radio network, where a multiple-input, single-output, multieavesdropper (MISOME) …

Secrecy performance of SIMO underlay cognitive radio networks over α–μ fading channels

S Yadav, DS Gurjar - IEEE Access, 2021 - ieeexplore.ieee.org
This paper investigates the secrecy performance of a single-input multiple-output (SIMO)
based underlay cognitive radio networks. In particular, a single-antenna secondary …

Secrecy Outage Analysis for SIMO Underlay Cognitive Radio Networks over Generalized- Fading Channels

H Lei, H Zhang, IS Ansari, G Pan… - IEEE Signal Processing …, 2016 - ieeexplore.ieee.org
In this letter, we consider a single-input multiple-output cognitive wiretap system over
generalized-K channels, where the eavesdropper overhears the transmission from the …

Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise

Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where
the primary users, the secondary users and the eavesdroppers are randomly distributed …

Beamforming with artificial noise for secure MISOME cognitive radio transmissions

A Al-Nahari, G Geraci, M Al-Jamali… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In this paper, we consider multiple-input single-output multi-eavesdropper cognitive radio
networks (MISOME-CRNs), where a secondary user (SU) aims to transmit confidential …

Secure multiantenna cognitive wiretap networks

T Zhang, Y Huang, Y Cai, C Zhong… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a multiantenna cognitive wiretap
network, where the secondary transmitter (Alice) communicates with the secondary receiver …

On the security of cognitive radio networks

M Elkashlan, L Wang, TQ Duong… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage
multitier hierarchical networks. Securing data transmission in these networks is of the utmost …

Secure transmission in cognitive MIMO relaying networks with outdated channel state information

T Zhang, Y Cai, Y Huang, TQ Duong, W Yang - IEEE Access, 2016 - ieeexplore.ieee.org
In this paper, we introduce transmit antenna selection/maximal-ratio combining (TAS/MRC)
scheme in dual-hop randomize-and-forward (RaF) cognitive multiple-input multiple-output …

Secrecy performance of underlay cognitive radio networks with primary interference

S Thakur, A Singh - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
This work explores the physical layer security of an underlay cognitive radio network (CRN)
in the presence of a powerful interferer called a primary transmitter (PT) under peak …

Secure communication over MISO cognitive radio channels

Y Pei, YC Liang, L Zhang, KC Teh… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In this paper, we address the physical-layer security issue of a secondary user (SU) in a
spectrum-sharing cognitive radio network (CRN) from an information-theoretic perspective …