Secrecy analysis for energy harvesting-enabled cognitive radio networks in cascaded fading channels

DH Tashman, W Hamouda - ICC 2021-IEEE International …, 2021 - ieeexplore.ieee.org
… (FD) SU destination, which employs energy harvesting (EH) to extract the power … harvesting
and non-harvesting eavesdropper. Moreover, a trade-off between the system’s secrecy

Secrecy performance analysis of UAV assisted relay transmission for cognitive network with energy harvesting

B Ji, Y Li, D Cao, C Li, S Mumtaz… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… outage probability (SOP) and the probability of non-zero secrecy capacity were calculated
… cases were analyzed in detail, where the expressions of secrecy diversity order and secrecy

Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… Assuming a MISO scenario, the authors in [187] considered the maximization of the sum
logarithmic secrecy rates, by considering energy harvesting constraints. To achieve the objective…

Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading

H Dang-Ngoc, K Ho-Van, T Do-Dac - Wireless Personal Communications, 2021 - Springer
… to improve spectral efficiency and secrecy performance for the overlay mechanism in …
energy harvesting networks. Furthermore, important secrecy performance indicators are analyzed

IRS-based secrecy rate analysis in presence of an energy harvesting eavesdropper

MA Saeidi, MJ Emadi - 2020 Iran Workshop on Communication …, 2020 - ieeexplore.ieee.org
… , considering the physical layer secrecy in presence of energy harvesting nodes are of interests
[9]. … to meet the energy harvesting requirement at Eve while maximizing the secrecy rate. …

Residual energy analysis in cognitive radios with energy harvesting UAV under reliability and secrecy constraints

W Khalid, H Yu, S Noh - Sensors, 2020 - mdpi.com
… We consider an energy harvesting UAV (eg, surveillance drone) flying periodically in a
circular … energy management aspect of the energy harvesting CR-based UAV with limited-energy

Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments

D Chen, J Li, J Hu, X Zhang, S Zhang… - International Journal of …, 2024 - Wiley Online Library
… with energy harvesting technique. Additionally, the authors in [30] only studied the average
secrecy capacity for energy harvesting untrusted relay networks, while we analyze outage-…

Secrecy outage analysis of energy harvesting relay-based mixed UOWC-RF network with multiple eavesdroppers

MK Ghosh, MK Kundu, M Ibrahim… - arXiv preprint arXiv …, 2023 - arxiv.org
… is to analyze the secrecy of … energy harvesting on data security. Although a few research
has considered colluding & non-colluding eavesdropping [37], [42], [43] and energy harvesting

Secrecy outage analysis in energy harvesting relay networks with a friendly jammer

H Webb, C Yin, DN Nguyen, TTN Le… - … on Recent Advances …, 2020 - ieeexplore.ieee.org
… In this paper, a green and secure network with energy harvested … Section 3 evaluates the
secrecy outage probability (SOP) of the … The S, 𝑅 and J nodes can harvest energy from B. In this …

Secrecy performance of NOMA systems with energy harvesting and full-duplex relaying

C Guo, L Zhao, C Feng, Z Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… on the secrecy performance analysis of a cooperative NOMA system with energy harvesting
… Different from [8] and [9], we integrate both energy harvesting and full-duplex relaying into a …