Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks

VD Nguyen, TQ Duong, OA Dobre… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… Traditionally, one possible way to improve the secrecy rate is to … ] analyzed and optimized
the secrecy performance of the systems. … For the case of active eavesdroppers, the secrecy rate …

Secrecy and throughput performance of an energy harvesting hybrid cognitive radio network with spectrum sensing

P Maji, K Yadav, SD Roy, S Kundu - Wireless Networks, 2020 - Springer
… evaluate the secrecy outage performance and throughput of a hybrid cognitive radio network,
… The secondary network employs a decode and forward relay which harvests energy from …

Secrecy Performance Analysis of a Cognitive Network for IoT over kμ Channels

J Li, H Zhao, M Johnson - Wireless Communications and …, 2021 - Wiley Online Library
… which can be adopted to these B5G networks, which works on the … radio network (CRNs)
for IoT over k-μ fading channels, with the information transmitted between secondary networks

Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users

N Mokari, S Parsaeefard, H Saeedi… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
… Resource allocation (RA) problems to maximize the secondary secrecy rate underlay …
jammer in the underlay cognitive radio network was studied in [8]. In [17], the secrecy rate of PU is …

On the secrecy capacity of 5G new radio networks

K Xiao, S Zhang, Y He - Wireless Communications and Mobile …, 2018 - Wiley Online Library
… of several 5G new radio communication technologies, including … network channel model
and reveal that the secrecy capacity in mmWave band widely depends on the richness of radio

Improving secrecy performance of a wirelessly powered network

Z Chen, L Hadley, Z Ding, X Dai - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper considers the secrecy communication of a wirelessly powered network, where …
and secrecy outage probability are derived for both protocols. Furthermore, the secrecy

On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping

J Zhu, Y Zou, G Wang, YD Yao… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… In [20] and [21], multiuser scheduling was shown as a promising approach to protect cognitive
radio networks against eavesdropping. Recently, extensive efforts have been devoted to …

Secrecy performance of an idle receiver assisted underlay secondary network

P Chakraborty, S Prakriya - IEEE Transactions on Vehicular …, 2017 - ieeexplore.ieee.org
secrecy as well as secondary outage performance [15]. In this work we analyze secrecy
performance … 1Like most work on underlay cognitive radio, we assume the primary source to be …

Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise

H Dang-Ngoc, B Ho-Quoc… - 2020 4th International …, 2020 - ieeexplore.ieee.org
… by taking advantages of both efficient (cognitive radio and energy … key secrecy performance
metrics for promptly evaluating secrecy performance of licensed and unlicensed networks

Secrecy capacity of the primary system in a cognitive radio network

VD Nguyen, TM Hoang, OS Shin - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
… In [16], the secrecy capacity of a cognitive radio network was … not consider a cognitive radio
network where interference between … In this paper, we first consider a cognitive radio network