Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami- Fading Channels

R Zhao, Y Yuan, L Fan, YC He - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… topology, and has become an important class in the cognitive radio networks [30]. This
dynamic cooperation structure implicitly provides more opportunities for the eavesdropper to …

Secrecy in cognitive radio networks

F Gabry - 2014 - diva-portal.org
radio network with multiple secondary pairs. Moreover we consider the important concept of
energy efficiency (EE) for the performance of the cognitive radio network … theoretic secrecy

Secrecy performance of wireless powered communication networks with multiple eavesdroppers and outdated CSI

Y Huang, P Zhang, Q Wu, J Wang - IEEE Access, 2018 - ieeexplore.ieee.org
… Abstract—In this paper, we present a comprehensive secrecy performance analysis of …
limited information source with multiple antennas harvests the radio frequency (RF) energy from a …

Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers

J Tang, G Chen, JP Coon - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
… The proposed system model can be applied to the application scenarios such as countersurveillance
against the illegal amateur drones monitoring on ground radio communications …

Physical layer security in multi-antenna cognitive heterogeneous cellular networks: a unified secrecy performance analysis

X Qi, K Huang, B Li, L Jin, X Ji - Science China Information Sciences, 2018 - Springer
secrecy performance by properly setting the predetermined access threshold and the radius
of detection region for the secrecy … can share the radio spectrum of the PUs. Based on the …

Secrecy outage probability of inter‐vehicular cognitive radio networks

SÖ Ata, E Erdogan - International Journal of Communication …, 2020 - Wiley Online Library
… Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary …
primary network, and for both methods, exact and asymptotic expressions of secrecy outage …

An analysis on secure millimeter wave NOMA communications in cognitive radio networks

Y Song, W Yang, Z Xiang, N Sha, H Wang… - IEEE Access, 2020 - ieeexplore.ieee.org
… throughput (ST) are derived by using the sector eavesdropper-exclusion zone, and the
reliability and secrecy performance of the secondary networks are measured by different system …

Secrecy performance of friendly jammer assisted cooperative NOMA systems with internal eavesdroppers

M Abolpour, S Aïssa, M Mirmohseni… - … and Mobile Radio …, 2020 - ieeexplore.ieee.org
… In this context, we study a network consisting of a base station (BS), a near user and a far …
We investigate the secrecy performance of the network by characterizing the secrecy outage …

Exploiting secrecy performance of uplink NOMA in cellular networks

MS Van Nguyen, DT Do, F Afghah, SMR Islam… - IEEE …, 2021 - ieeexplore.ieee.org
… In research of [14], the performance of a secondary network is determined in the system
model which is enabled by a cognitive radio network with a NOMA scheme (namely CR-NOMA …

Secrecy rate optimization for cooperative cognitive radio networks aided by a wireless energy harvesting jammer

X Chen, L Guo, X Li, C Dong, J Lin… - IEEE …, 2018 - ieeexplore.ieee.org
… in their considered networks. It is also noted that the secrecy performance of their design …
eavesdroppers existed, as this would cause more secrecy degradation. In this paper, we follow …