… evaluate the secrecy outage performance and throughput of a hybrid cognitive radionetwork, … The secondary network employs a decode and forward relay which harvests energy from …
J Li, H Zhao, M Johnson - Wireless Communications and …, 2021 - Wiley Online Library
… which can be adopted to these B5G networks, which works on the … radionetwork (CRNs) for IoT over k-μ fading channels, with the information transmitted between secondary networks …
… Resource allocation (RA) problems to maximize the secondary secrecy rate underlay … jammer in the underlay cognitive radionetwork was studied in [8]. In [17], the secrecy rate of PU is …
K Xiao, S Zhang, Y He - Wireless Communications and Mobile …, 2018 - Wiley Online Library
… of several 5G new radio communication technologies, including … network channel model and reveal that the secrecy capacity in mmWave band widely depends on the richness of radio …
Z Chen, L Hadley, Z Ding, X Dai - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper considers the secrecy communication of a wirelessly powered network, where … and secrecy outage probability are derived for both protocols. Furthermore, the secrecy …
J Zhu, Y Zou, G Wang, YD Yao… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… In [20] and [21], multiuser scheduling was shown as a promising approach to protect cognitive radionetworks against eavesdropping. Recently, extensive efforts have been devoted to …
… secrecy as well as secondary outage performance [15]. In this work we analyze secrecy performance … 1Like most work on underlay cognitive radio, we assume the primary source to be …
H Dang-Ngoc, B Ho-Quoc… - 2020 4th International …, 2020 - ieeexplore.ieee.org
… by taking advantages of both efficient (cognitive radio and energy … key secrecyperformance metrics for promptly evaluating secrecyperformance of licensed and unlicensed networks …
VD Nguyen, TM Hoang, OS Shin - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
… In [16], the secrecy capacity of a cognitive radionetwork was … not consider a cognitive radio network where interference between … In this paper, we first consider a cognitive radionetwork …